On Sat, Aug 8, 2020 at 1:26 PM Eric Broch <ebr...@whitehorsetc.com> wrote:

> What version of qmail do you have?
>
qmail-1.03-3.2.qt.el7.x86_64

>
> And, what about the email coming from the qmailtoaster-list? Can you send
> that header along?
>
I send most mailing list emails to my gmail account, so I can communicate
with the list even if my mail server is down.  :)

-Chris



> It can depend on the remote host as well. If you have a gmail account send
> yourself an email from it and send the header along. Here's a header from
> a gmail account.
>
> Received: from unknown (HELO mail-qk1-f177.google.com) (209.85.222.177)
>   by myhost.whitehorsetc.com with ESMTPS (ECDHE-RSA-AES128-GCM-SHA256 
> encrypted)
>
>
> On 8/7/2020 7:12 PM, Chris wrote:
>
> When I disabled TLS in spamdyke, I sent myself a message from one of the
> problematic systems that was known to trigger repeats.  That message's
> headers indicate qmail did not pick up the TLS encryption:
>
> Content-Type: ⁨text/html; charset=UTF-8⁩
> Mime-Version: ⁨1.0⁩
> X-Ses-Outgoing: ⁨2020.08.07-54.240.37.249⁩
> Dkim-Signature: ⁨v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple;
> s=2ybsbk45dtwlgerewyfzx5qt442lak5j; d=reddit.com; t=1596830148;
> h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date;
> bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=;
> b=QrrO2K0wMkJ8uIgTRE1XSNq892ay6s7FXgEnkwZY0KaDDViiUV4h5y5HVYIoZjcv
> wqZ97y/QgJEKnC98NPGJ9bJJnGbdoHUdaxY+VOx52u6nm8ofu3cS3BQELBuid+PMf2Y
> E+QOoLacnNtusPmpc1+PVwJKNuIGRsk2pCUmk7os=⁩
> Dkim-Signature: ⁨v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple;
> s=224i4yxa5dv7c2xz3womw6peuasteono; d=amazonses.com; t=1596830148;
> h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date:Feedback-ID;
> bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=;
> b=V18r7xu5iTXqr9kSFDcX/StzbVKQX9nSXcJ/Q4JoHpVRoK5u2sCNikDVVBghOzeT
> vInG1XcJaOMYMofcCKv0F8TwYAc253AdkK+b5PRn/eE1C2BucNO73/zCggwTSTI6lZG
> IMPzOiBk77HYMfSH4YEKQWY7dWSqdQGPX0Glf7Wg=⁩
> Return-Path: ⁨<
> 01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@amazonses.com
> >⁩
> Feedback-Id:
> ⁨1.us-east-1.UqlFplRllIQtiw+Kq2b87y7uRSu9p66fMici2AQNsMU=:AmazonSES⁩
> Content-Transfer-Encoding: ⁨7bit⁩
> Received: ⁨(qmail 8880 invoked by uid 89); 7 Aug 2020 19:56:04 -0000⁩
> Received: ⁨by simscan 1.4.0 ppid: 8871, pid: 8873, t: 2.0387s scanners:
> attach: 1.4.0 clamav: 0.101.4/m:59/d:25897 spam: 3.4.2⁩
> *Received: ⁨from unknown (HELO a37-249.smtp-out.amazonses.com
> <http://a37-249.smtp-out.amazonses.com>) (54.240.37.249) by
> mail.bayhosting.net <http://mail.bayhosting.net> with SMTP; 7 Aug 2020
> 19:56:02 -0000⁩*
> ⁨<
> 01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@email.amazonses.com
> >⁩
> Delivered-To: ⁨ckni...@ghostwheel.com⁩
> Received-Spf: ⁨pass (mail.bayhosting.net: SPF record at amazonses.com
> designates 54.240.37.249 as permitted sender)
>
>
>
> On Sat, Aug 8, 2020 at 12:59 PM Eric Broch <ebr...@whitehorsetc.com>
> wrote:
>
>> That's the nature of spamdyke. See the documentation. I understand why it
>> was programmed the way it was, with TLS, so that it could, after decrypting
>> the email, operate spam blocking techniques. With qmail doing decryption
>> everything that passes through spamdyke is encrypted so examining the email
>> is not possible.
>> tls-level   none, smtp smtp-no-passthrough or smtps none: Do not offer
>> or allow SSL/TLS, even if qmail supports it.
>>
>> smtp: If tls-certificate-file is given, offer TLS during the SMTP
>> conversation and decrypt the traffic. If tls-certificate-file is not
>> given, allow qmail to offer TLS (if it has been patched to provide TLS) and
>> pass the encrypted traffic to qmail.
>>
>> smtp-no-passthrough: If tls-certificate-file is given, offer TLS during
>> the SMTP conversation and decrypt the traffic. If tls-certificate-file is
>> not given, prevent TLS from starting.
>>
>> smtps: Initiate a SSL session at the beginning of the connection, before
>> SMTP begins.
>>
>> If tls-level is given multiple times, spamdyke will use the last value
>> it finds.
>>
>> If tls-level is not given, spamdyke will use a value of smtp.
>>
>> tls-level is not valid within configuration directories.
>>
>> See TLS <https://www.spamdyke.org/documentation/README.html#TLS> for
>> details.
>>
>>
>> Qmail will pick up TLS negotiation if spamdyke is disabled. You can check
>> the headers of incoming email to confirm.
>>
>> Received: from unknown (HELO mail.qmailtoaster.com) (162.213.42.64)
>>   by myhost.whitehorsetc.com with ESMTPS (DHE-RSA-AES256-SHA encrypted);
>>
>> or in older TLS patches
>>
>> Received: from unknown (HELO mail.qmailtoaster.com) (162.213.42.64)
>>   by myhost.whitehorsetc.com with SMTP (DHE-RSA-AES256-SHA encrypted);
>>
>>
>>
>>
>> On 8/7/2020 6:36 PM, Chris wrote:
>>
>> Why does 'Setting tls-level=none turns of ALL TLS even in qmail's
>> offering' when it's a spamdyke config file, not qmail?
>>
>> What if I think spamdyke is part of my multi-delivery problem?  If I take
>> spamdyke out of the equation in smtp/run how do I get qmail to pick up the
>> TLS negotiation?
>>
>> On Sat, Aug 8, 2020 at 12:28 PM Eric Broch <ebr...@whitehorsetc.com>
>> wrote:
>>
>>> I'm not sure I like how spamdyke handles tls, though I don't know
>>> another way one would do it.
>>>
>>> Setting tls-level=none turns of ALL TLS even in qmail's offering.
>>>
>>> If you want qmail to handle TLS comment the certificate file:
>>>
>>> #tls-certificate-file=/var/qmail/control/servercert.pem
>>>
>>> However, if you do this, spamdyke (I think) will not work anymore
>>> because all traffic through it is now encrypted (you could check if I'm
>>> correct on the spamdyke mailing list).
>>> On 8/7/2020 6:13 PM, Chris wrote:
>>>
>>> I know I'm responding to a really old thread here, but I stumbled upon
>>> this trying to solve another issue.
>>>
>>> When I set tls-level=none in /opt/spamdyke/etc/spamdyke.conf and
>>> reboot, I now completely fail the SMTP TLS checker at
>>> https://luxsci.com/smtp-tls-checker
>>> It would appear that qmail isn't doing the tls at all.
>>>
>>> Where are the settings to telling qmail to handle the tls? Is it in the
>>> run file, or elsewhere?
>>>
>>> On Wed, Jun 19, 2019 at 3:14 AM Eric Broch <ebr...@whitehorsetc.com>
>>> wrote:
>>>
>>>> In /etc/spamdyke/spamdyke.conf set 'tls-level' to 'none'.
>>>>
>>>> tls-level=none
>>>>
>>>> allow qmail to do the tls and see if it works.
>>>>
>>>>
>>>> On 6/18/2019 9:07 AM, Rajesh M wrote:
>>>>
>>>> eric
>>>>
>>>> in the spamdyke.conf i can see this
>>>> tls-certificate-file=/var/qmail/control/servercert.pem
>>>>
>>>> also i am using the
>>>> /var/qmail/control/servercert.pem
>>>> for domain key signing of outgoing emails.
>>>>
>>>> rajesh
>>>>
>>>> ----- Original Message -----
>>>> From: Eric Broch [mailto:ebr...@whitehorsetc.com <ebr...@whitehorsetc.com>]
>>>> To: qmailtoaster-list@qmailtoaster.com
>>>> Sent: Tue, 18 Jun 2019 08:52:13 -0600
>>>> Subject:
>>>>
>>>> So you have spamdyke doing the TLS?
>>>>
>>>> On 6/18/2019 8:38 AM, Rajesh M wrote:
>>>>
>>>> Hi
>>>>
>>>> ISSUE 1
>>>> all of a sudden we are receiving error on one of our servers for one 
>>>> specific sender domain (sending from microsoft server)
>>>>
>>>> the sender domain is not able to send emails to the recepient domain on 
>>>> our server. The email bounces with the following error
>>>> encryption: TLS reason: 503_MAIL_first_(#5.5.1)
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> DENIED_OTHER from: rethish.n...@sender.com to: 
>>>> nominati...@dxb.recepient.com origin_ip: 40.107.69.126 origin_rdns: 
>>>> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) 
>>>> encryption: TLS reason: 503_MAIL_first_(#5.5.1)
>>>> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
>>>> QUIT
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: The 
>>>> operation failed due to an I/O error, Connection reset by peer
>>>> ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
>>>> descriptor 1: Connection reset by peer
>>>> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
>>>> 221 ns1.HOSTNAME.com
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: The 
>>>> operation failed due to an I/O error, Unexpected EOF found
>>>>
>>>> 06/18/2019 19:33:16 - TLS ended and closed
>>>>
>>>>
>>>> the error log of spamdyke  full-log-dir is give below follows
>>>>
>>>>
>>>> ISSUE 2
>>>> also i noted that spamdyke log mentions as such
>>>> reset address space soft limit to infinity: please stop using the 
>>>> softlimit program
>>>>
>>>> What exactly does this mean. What is the alternative to prevent large 
>>>> files should i disable softlimit program in
>>>> /usr/bin/softlimit -m 64000000 \
>>>> in the smtp run file
>>>>
>>>> require your kind help in resolving the above 2 issues
>>>>
>>>> thanks
>>>> rajesh
>>>>
>>>> 06/18/2019 19:32:54 STARTED: VERSION = 5.0.1+TLS+CONFIGTEST+DEBUG, PID = 
>>>> 19829
>>>>
>>>> 06/18/2019 19:32:54 CURRENT ENVIRONMENT
>>>> PATH=/var/qmail/bin:/usr/local/bin:/usr/bin:/bin
>>>> PWD=/var/qmail/supervise/smtp
>>>> SHLVL=0
>>>> PROTO=TCP
>>>> TCPLOCALIP=103.241.181.154
>>>> TCPLOCALPORT=25
>>>> TCPLOCALHOST=ns1.HOSTNAME.com
>>>> TCPREMOTEIP=40.107.69.126
>>>> TCPREMOTEPORT=42264
>>>> BADMIMETYPE=
>>>> BADLOADERTYPE=M
>>>> QMAILQUEUE=/var/qmail/bin/simscan
>>>> CHKUSER_START=ALWAYS
>>>> CHKUSER_RCPTLIMIT=50
>>>> CHKUSER_WRONGRCPTLIMIT=10
>>>> NOP0FCHECK=1
>>>> DKQUEUE=/var/qmail/bin/qmail-queue.orig
>>>> DKVERIFY=DEGIJKfh
>>>> DKSIGN=/var/qmail/control/domainkeys/%/private
>>>>
>>>> 06/18/2019 19:32:54 CURRENT CONFIG
>>>> config-file=/etc/spamdyke/spamdyke.conf
>>>> dns-blacklist-entry=zen.spamhaus.org
>>>> full-log-dir=/var/log/spamdyke
>>>> graylist-dir=/var/spamdyke/graylist
>>>> graylist-max-secs=2678400
>>>> graylist-min-secs=180
>>>> header-blacklist-entry=From:*>,*<*
>>>> idle-timeout-secs=600
>>>> ip-blacklist-file=/etc/spamdyke/blacklist_ip
>>>> ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
>>>> ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
>>>> ip-whitelist-file=/etc/spamdyke/whitelist_ip
>>>> log-level=info
>>>> max-recipients=100
>>>> rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
>>>> rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
>>>> recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
>>>> recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
>>>> reject-empty-rdns=1
>>>> reject-sender=no-mx
>>>> reject-sender=authentication-domain-mismatch
>>>> reject-unresolvable-rdns=1
>>>> relay-level=normal
>>>> sender-blacklist-file=/etc/spamdyke/blacklist_senders
>>>> sender-whitelist-file=/etc/spamdyke/whitelist_senders
>>>> tls-certificate-file=/var/qmail/control/servercert.pem
>>>>
>>>> 06/18/2019 19:32:54 - Remote IP = 40.107.69.126
>>>>
>>>> 06/18/2019 19:32:54 CURRENT CONFIG
>>>> config-file=/etc/spamdyke/spamdyke.conf
>>>> dns-blacklist-entry=zen.spamhaus.org
>>>> dns-server-ip-primary=8.8.8.8
>>>> full-log-dir=/var/log/spamdyke
>>>> graylist-dir=/var/spamdyke/graylist
>>>> graylist-max-secs=2678400
>>>> graylist-min-secs=180
>>>> header-blacklist-entry=From:*>,*<*
>>>> idle-timeout-secs=600
>>>> ip-blacklist-file=/etc/spamdyke/blacklist_ip
>>>> ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
>>>> ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
>>>> ip-whitelist-file=/etc/spamdyke/whitelist_ip
>>>> log-level=info
>>>> max-recipients=100
>>>> rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
>>>> rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
>>>> recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
>>>> recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
>>>> reject-empty-rdns=1
>>>> reject-sender=no-mx
>>>> reject-sender=authentication-domain-mismatch
>>>> reject-unresolvable-rdns=1
>>>> relay-level=normal
>>>> sender-blacklist-file=/etc/spamdyke/blacklist_senders
>>>> sender-whitelist-file=/etc/spamdyke/whitelist_senders
>>>> tls-certificate-file=/var/qmail/control/servercert.pem
>>>>
>>>> 06/18/2019 19:32:54 - Remote rDNS = 
>>>> mail-eopbgr690126.outbound.protection.outlook.com
>>>>
>>>> 06/18/2019 19:32:54 LOG OUTPUT
>>>> DEBUG(filter_rdns_missing()@filter.c:947): checking for missing rDNS; 
>>>> rdns: mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_rdns_whitelist_file()@filter.c:1055): searching rDNS 
>>>> whitelist file(s); rdns: mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_rdns_blacklist_file()@filter.c:1159): searching rDNS 
>>>> blacklist file(s); rdns: mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_ip_whitelist()@filter.c:1228): searching IP whitelist 
>>>> file(s); ip: 40.107.69.126
>>>> DEBUG(filter_ip_blacklist()@filter.c:1279): searching IP blacklist 
>>>> file(s); ip: 40.107.69.126
>>>> DEBUG(filter_ip_in_rdns_whitelist()@filter.c:1380): checking for IP in 
>>>> rDNS +keyword(s) in whitelist file; ip: 40.107.69.126 rdns: 
>>>> mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_ip_in_rdns_blacklist()@filter.c:1333): checking for IP in 
>>>> rDNS +keyword(s) in blacklist file; ip: 40.107.69.126 rdns: 
>>>> mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_rdns_resolve()@filter.c:1426): checking rDNS resolution; 
>>>> rdns: mail-eopbgr690126.outbound.protection.outlook.com
>>>> DEBUG(filter_dns_rbl()@filter.c:1645): checking DNS RBL(s); ip: 
>>>> 40.107.69.126
>>>> DEBUG(undo_softlimit()@spamdyke.c:3203): reset address space soft limit to 
>>>> infinity: please stop using the softlimit program
>>>> DEBUG(undo_softlimit()@spamdyke.c:3223): reset data segment soft limit to 
>>>> infinity: please stop using the softlimit program
>>>> DEBUG(undo_softlimit()@spamdyke.c:3241): reset stack size soft limit to 
>>>> infinity: please stop using the softlimit program
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 33 bytes
>>>> 220 ns1.HOSTNAME.com ESMTP
>>>>
>>>> 06/18/2019 19:32:54 FROM REMOTE TO CHILD: 52 bytes
>>>> EHLO NAM04-CO1-obe.outbound.protection.outlook.com
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 27 bytes250-ns1.HOSTNAME.com
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
>>>> 250-STARTTLS
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 16 bytes
>>>> 250-PIPELINING
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
>>>> 250-8BITMIME
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 19 bytes
>>>> 250-SIZE 31457280
>>>>
>>>> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 31 bytes
>>>> 250 AUTH LOGIN PLAIN CRAM-MD5
>>>>
>>>> 06/18/2019 19:32:55 FROM REMOTE TO CHILD: 10 bytes
>>>> STARTTLS
>>>>
>>>> 06/18/2019 19:32:55 FROM SPAMDYKE TO REMOTE: 14 bytes
>>>> 220 Proceed.
>>>>
>>>> 06/18/2019 19:32:56 LOG OUTPUT TLS
>>>> DEBUG(tls_start()@tls.c:417): TLS/SSL connection established, using cipher 
>>>> AES256-GCM-SHA384, 256 bits
>>>>
>>>> 06/18/2019 19:32:56 - TLS negotiated and started
>>>>
>>>> 06/18/2019 19:32:56 FROM REMOTE TO CHILD: 52 bytes TLS
>>>> EHLO NAM04-CO1-obe.outbound.protection.outlook.com
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 27 bytes TLS250-ns1.HOSTNAME.com
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD, FILTERED: 14 bytes TLS
>>>> 250-STARTTLS
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 16 bytes TLS
>>>> 250-PIPELINING
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 14 bytes TLS
>>>> 250-8BITMIME
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 19 bytes TLS
>>>> 250-SIZE 31457280
>>>>
>>>> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 31 bytes TLS
>>>> 250 AUTH LOGIN PLAIN CRAM-MD5
>>>>
>>>> 06/18/2019 19:32:57 FROM REMOTE TO CHILD: 48 bytes TLS
>>>> MAIL FROM:<rethish.n...@sender.com> <rethish.n...@sender.com> SIZE=68640
>>>>
>>>> 06/18/2019 19:32:57 LOG OUTPUT TLS
>>>> DEBUG(find_username()@spamdyke.c:127): searching for username between 
>>>> positions 11 and 33: MAIL FROM:<rethish.n...@sender.com> 
>>>> <rethish.n...@sender.com> SIZE=68640
>>>> RCPT TO:<ranj...@dxb.recepient.com> <ranj...@dxb.recepient.com>
>>>> RCPT TO:<nominati...@dxb.recepient.com> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_domain()@spamdyke.c:361): searching for domain between 
>>>> positions 23 and 33: MAIL FROM:<rethish.n...@sender.com> 
>>>> <rethish.n...@sender.com> SIZE=68640
>>>> RCPT TO:<ranj...@dxb.recepient.com> <ranj...@dxb.recepient.com>
>>>> RCPT TO:<nominati...@dxb.recepient.com> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_address()@spamdyke.c:726): found username: Rethish.Nair
>>>> DEBUG(find_address()@spamdyke.c:743): found domain: SENDER.com
>>>> DEBUG(filter_sender_whitelist()@filter.c:1871): searching sender 
>>>> whitelist(s); sender: rethish.n...@sender.com
>>>> FILTER_SENDER_WHITELIST sender: rethish.n...@sender.com file: 
>>>> /etc/spamdyke/whitelist_senders(781)
>>>>
>>>> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 33 bytes TLS
>>>> 451 SPF lookup failure (#4.3.0)
>>>>
>>>> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 40 bytes TLS
>>>> RCPT TO:<ranj...@dxb.recepient.com> <ranj...@dxb.recepient.com>
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> DEBUG(find_username()@spamdyke.c:127): searching for username between 
>>>> positions 9 and 36: RCPT TO:<ranj...@dxb.recepient.com> 
>>>> <ranj...@dxb.recepient.com>
>>>> RCPT TO:<nominati...@dxb.recepient.com> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_domain()@spamdyke.c:361): searching for domain between 
>>>> positions 16 and 36: RCPT TO:<ranj...@dxb.recepient.com> 
>>>> <ranj...@dxb.recepient.com>
>>>> RCPT TO:<nominati...@dxb.recepient.com> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_address()@spamdyke.c:726): found username: ranjini
>>>> DEBUG(find_address()@spamdyke.c:743): found domain: dxb.RECEPIENT.com
>>>> DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
>>>> /var/qmail/control/morercpthosts.cdb for 20 byte key = dxb.RECEPIENT.com, 
>>>> hash = 3655419700, main index = 52, num_slots = 2, slot_num = 1
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> FILTER_OTHER response: "503 MAIL first (#5.5.1)"
>>>>
>>>> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
>>>> 503 MAIL first (#5.5.1)
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> DENIED_OTHER from: rethish.n...@sender.com to: ranj...@dxb.recepient.com 
>>>> origin_ip: 40.107.69.126 origin_rdns: 
>>>> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) 
>>>> encryption: TLS reason: 503_MAIL_first_(#5.5.1)
>>>>
>>>> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 44 bytes TLS
>>>> RCPT TO:<nominati...@dxb.recepient.com> <nominati...@dxb.recepient.com>
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> DEBUG(find_username()@spamdyke.c:127): searching for username between 
>>>> positions 9 and 40: RCPT TO:<nominati...@dxb.recepient.com> 
>>>> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_domain()@spamdyke.c:361): searching for domain between 
>>>> positions 20 and 40: RCPT TO:<nominati...@dxb.recepient.com> 
>>>> <nominati...@dxb.recepient.com>
>>>> DEBUG(find_address()@spamdyke.c:726): found username: nominations
>>>> DEBUG(find_address()@spamdyke.c:743): found domain: dxb.RECEPIENT.com
>>>> DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
>>>> /var/qmail/control/morercpthosts.cdb for 20 byte key = dxb.RECEPIENT.com, 
>>>> hash = 3655419700, main index = 52, num_slots = 2, slot_num = 1
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> FILTER_OTHER response: "503 MAIL first (#5.5.1)"
>>>>
>>>> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
>>>> 503 MAIL first (#5.5.1)
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> DENIED_OTHER from: rethish.n...@sender.com to: 
>>>> nominati...@dxb.recepient.com origin_ip: 40.107.69.126 origin_rdns: 
>>>> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) 
>>>> encryption: TLS reason: 503_MAIL_first_(#5.5.1)
>>>>
>>>> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
>>>> QUIT
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: The 
>>>> operation failed due to an I/O error, Connection reset by peer
>>>> ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
>>>> descriptor 1: Connection reset by peer
>>>>
>>>> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
>>>> 221 ns1.HOSTNAME.com
>>>>
>>>> 06/18/2019 19:33:16 LOG OUTPUT TLS
>>>> ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: The 
>>>> operation failed due to an I/O error, Unexpected EOF found
>>>>
>>>> 06/18/2019 19:33:16 - TLS ended and closed
>>>>
>>>> 06/18/2019 19:33:16 CLOSED
>>>>
>>>>
>>>>
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
>>>> For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
>>>>
>>>>
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
>>>> For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
>>>>
>>>>

Reply via email to