Re: Opensmtpd failover

2018-11-23 Thread Peter J. Philipp
If I only knew what others use when they do this successfully then all 
my problems would be solved.   Just kidding.


However here is a try.  In 1998 I was a sysadmin and our setup was with 
sendmail and postfix not smtpd.  We had 3 Sun Ultra Sparc computers 
connected with a small switch to a Netapp NFS filer, the MX priority was 
all the same in DNS so as to achieve a load-share (probably not a true 
share).  The problems back then were NFS related particularily locking 
meaning the Sun computers ran Solaris because it at the time did this 
best.  Back then it was proper to have backup MX's too I think with a 
higher priority field in DNS, this ran postfix and all they did was 
queue the mail and wait for the main mail hosts to come back from 
whatever caused them to be down, then they'd deliver the mail there.  It 
was just a relayer.


You can try making a NFS solution, but the NFS filer is a single point 
of failure itself, ours had multiple power supplies and I was there too 
short a time to see it work over a few years.  I don't know how well 
CARP'ed NFS servers behave, I don't know if it creates problems, that's 
for you to find out.  I also don't know how well the locking works with 
NFS and OpenBSD these days.  A solution is to use dot-lock files which 
gets its atomicity around an NFS stat operation (if that even exists, if 
not then open operation).


The removal of the single point of failure is the tough part, it isn't 
simple, IMO.  Now that I've tried giving you insights to the holy grail 
of mail, I wish you luck building your own system.


Regards,

-peter


On 11/24/18 1:15 AM, Mik J wrote:

Hello,

I'm wondering how to do a proper mail server failover.

Let's say smtp1 is down, the internet client resolves the other mx 
with a lower priority and the mail goes to smtp2.

Now smtp2 writes the message on the disk in order to store it.
What do you people do in order to have a common storage for both smtp 
which can be correct regardless whether a smtp goes up or down.

How do you manage the failover ?

Thank you


--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



Re: Opensmtpd failover

2018-11-24 Thread Peter J. Philipp
On Sat, Nov 24, 2018 at 06:52:00PM +, Craig Skinner wrote:
> Hi Peter,
> 
> On Sat, 24 Nov 2018 08:21:46 +0100 "Peter J. Philipp" wrote:
> 
> > ... the MX priority was all the same in DNS ...
> 
> This is a vastly different scenario to Mik's question. Not the same...
> 
> 
> >  backup MX's too I think with a higher priority field in DNS,
> > ... all they did was queue the mail and wait for the main mail hosts
> > to come back from whatever caused them to be down, then they'd
> > deliver the mail there.??It was just a relayer.
> 
> Yes, that is what Mik was asking about;- The MX backup servers spool
> mail while the primary mail servers are down, then relay over SMTP when
> the primary can recieve the spooled mail.
> 
> 
> > ... A solution is to use dot-lock files ...
> 
> Maildirs solve the hideous problems of mboxes... whether on NFS or not.

This is good advice.  I'm gonna try this in the future.  I read about this on
wikipedia and it seems to me every message is in its own file.  Would it be
easy to unison (2 way rsync) mail that's in the new folder to a backup and
thus keep them synced for failover?

Happy Sunday!
-peter

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



connect to cyrus lmtp with "as user"

2018-12-26 Thread Peter J. Philipp
Hi,

I'm somewhat at a dillema.  I'm on OpenBSD 6.3 and upgraded the CVS tree for
smtpd to -current.  With this I wanted to achieve configuring the smtpd for
an upgrade to 6.4.  However my old config does not fit after having translated
it to 6.4 syntax.

The host in question is an internal LAN host that fetchmail's mail from my VPS
and inserts it into cyrus imapd so that the LAN here can use IMAP.  The line
in the smtpd.conf used to say this:

accept for local alias  deliver to lmtp "/var/imap/socket/lmtp" as 
_cyrus

And the new action I have this:

action "local" lmtp "/var/imap/socket/lmtp" alias 

In a ktrace dump I get this then due to the missing "as":

 78041 mail.lmtp CALL  connect(3,0x7f7dea30,106)
 78041 mail.lmtp STRU  struct sockaddr { AF_LOCAL, "/var/imap/socket/lmtp" }
 78041 mail.lmtp NAMI  "/var/imap/socket/lmtp"
 78041 mail.lmtp RET   connect -1 errno 13 Permission denied

Does anyone know off hand how to fix this, either on smtpd or on cyrus's side?

Thanks a lot and seasons greetings,
-peter

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



Re: connect to cyrus lmtp with "as user"

2018-12-26 Thread Peter J. Philipp
On Wed, Dec 26, 2018 at 05:37:49PM +0100, Peter J. Philipp wrote:
>  78041 mail.lmtp NAMI  "/var/imap/socket/lmtp"
>  78041 mail.lmtp RET   connect -1 errno 13 Permission denied
> 
> Does anyone know off hand how to fix this, either on smtpd or on cyrus's side?
> 
> Thanks a lot and seasons greetings,
> -peter

Ahh never mind.  I checked the path and it was in /var/imap that the 
permissions were at 750 by default.  I changed them to 755 and now it works.

Regards,
-peter

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



Re: Unable to relay email

2019-04-06 Thread Peter J. Philipp

Hi,

I'd like to help you, but I'm late to the thread and some parts were 
deleted by me by accident.


I think we may need to clear up some things first:

1.  When you attempt to relay through Bell's smtp relay are you sending 
mail as y...@bell.ca or


any of the domains that falls under bell's domains?  Perhaps they 
implemented a block that


prevents you@home.local, or better even y...@anythingotherthanbell.ca.  
What I'm trying to guess at is that bell refuses to relay for anything 
other than its domains.


2.  Use port 587, check connection with 'openssl  s_client -connect 
host:587 -starttls smtp'


3. Use section D.1 of RFC 5321 to help you write a test mail, use RFC 
4954 to help you construct a


needed authentication, section 4.1 has an example.  Steps are a) connect 
b) ehlo c) auth d) mail from


e) rcpt to f) data g) quit

4. once you have achieved sending a test mail through the bell relay 
reflect what you did into your config.   Try sending as root@home.local 
and see it fail or not fail, try sending as y...@bell.ca and see it fail 
or not fail.  Know the capabilities (protocol and behaviour) of the bell 
relay.


I hope that helps in any way.  Also just 535 doesn't tell me anything 
when I checked it up in RFC 5321 other than that it's a permanent 
failure.  Was there an error string appended to this code?


Regards,

-peter


On 4/6/19 6:45 PM, Juan Trippe wrote:

Can you authenticate with openssl?

No, I got the user and password prompts but auth failed.


Ok, lets rethink this. Assuming it stopped working the moment the system
got rebooted. Than there once was a working configuration, that can be
recreated. But if it stopped working around the time of the reboot there
is the possibility the provider changed something, making it
incompatible with OpenSMTPD. (Than it would be nice to have real hostnames.)

It's possible something with the provider changed but I don't think so. I called
them and they told me to use my browser.

This is my host and the source of the connection info I use:
https://support.bell.ca/internet/email/how-to-use-bell-mail?step=5


You could try:

action "relay" relay host smtps://my_re...@smtphm.example0.co.jp:465
auth 

No route available


or:
action "relay" relay host smtp+tls://smtphm.example0.co.jp

No auth table:

When auth  is appended I get the same 535 auth failed.


(I assume you use smtpd only to send system message to your personal
inbox on smtphm.example0.co.jp. So maybe sending to someone on the
system doesn't require authentication.)

Yes, that's what I'm using it for basically.
I get local "daily output" emails from "r...@local.home" sent to
"r...@local.home".
Note: the domain is "local.home" and not "local.home.org" which is what it is
when I try to send to external addresses.



--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



Re: Unable to relay email

2019-04-06 Thread Peter J. Philipp

On 4/7/19 4:54 AM, Juan Trippe wrote:

Hello Peter,


Good morning.



1.  When you attempt to relay through Bell's smtp relay are you sending
mail as y...@bell.ca or

any of the domains that falls under bell's domains?  Perhaps they
implemented a block that

prevents you@home.local, or better even y...@anythingotherthanbell.ca.
What I'm trying to guess at is that bell refuses to relay for anything
other than its domains.

When it was working the sender was y...@local.home.org

After it stopped working I made a /etc/mail/mailname file (which I've since
removed) with sympatico.ca and tried sending as different senders but no luck. I
tried different accounts and changing the passwords, still nothing.


2.  Use port 587, check connection with 'openssl  s_client -connect
host:587 -starttls smtp'

I tried that and previously "openssl s_client -debug -starttls smtp -crlf
-connect host:25", and after the certificate I get:



That string I gave you needs improvement, add a -quiet so that it 
doesn't renegotiate upon R for


RCPT TO:



---
250 STARTTLS
AUTH LOGIN
334 VXNlcm5hbWU6
BASE64USERNAME
334 UGFzc3dvcmQ6
BASE64PASSWORD
535 Authentication failed


Maybe you should use PLAIN instead of LOGIN.  I tried to find a good 
example for this in the RFC's but resulted reading the smtpd source on 
how to do this.  Anyhow start skimming RFC 4616, and read the smtpd 
source around line 315 in smtp_client.c it seems the Realm or authzid is 
blank, so you can construct an AUTH PLAIN string like so:


printf "\0username\0password" | openssl enc -a

I tested this with my username and password on opensmtpd and was able to 
relay through it so this fashion works.



3. Use section D.1 of RFC 5321 to help you write a test mail, use RFC
4954 to help you construct a

needed authentication, section 4.1 has an example.  Steps are a) connect
b) ehlo c) auth d) mail from

e) rcpt to f) data g) quit

4. once you have achieved sending a test mail through the bell relay
reflect what you did into your config.   Try sending as root@home.local
and see it fail or not fail, try sending as y...@bell.ca and see it fail
or not fail.  Know the capabilities (protocol and behaviour) of the bell
relay.

  Going off this: https://tools.ietf.org/html/rfc4954#section-4.1

S: 220-smtp.example.com ESMTP Server
C: EHLO client.example.com
S: 250-smtp.example.com Hello client.example.com
S: 250-AUTH GSSAPI DIGEST-MD5
S: 250-ENHANCEDSTATUSCODES
S: 250 STARTTLS
C: STARTTLS

I get:

250 STARTTLS
EHLO
250-mtlspm02.bell.net
250-HELP
250-XREMOTEQUEUE
250-ETRN
250-CHUNKING
250-BINARYMIME
250-AUTH=LOGIN PLAIN
250-AUTH LOGIN PLAIN
250-PIPELINING
250-DSN
250-8BITMIME
250 SIZE 36700160
STARTTLS
502 You are not authorized to use SSL

when you pass -starttls smtp to openssl s_client you're already 
starttls'ed so no need to do it again.  Sorry this was misleading.



I hope that helps in any way.  Also just 535 doesn't tell me anything
when I checked it up in RFC 5321 other than that it's a permanent
failure.  Was there an error string appended to this code?

This is the line from smtpd -dv that had the error:

c41771ec2113e5d0 mta error reason=AUTH rejected: 535 Authentication failed

Thanks for the ideas, hopefully this will get sorted soon

No problem, hope it works for you.  I'm gonna try to donate some money 
to Gilles for my efforts to teach raw SMTP which has little to do with 
opensmtpd.


Regards,

-peter


--
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



how could a safety mechanism be configured?

2019-05-01 Thread Peter J. Philipp
Hi,

This is sorta a feature request, but may be solveable by a better config:

https://marc.info/?l=openbsd-misc&m=155670259203430&w=2

What I did was explained there.

Here is my config for the mail system in question:

--->
... some keys cut ...

listen on lo0
listen on ix1 tls auth

table aliases file:/etc/mail/aliases
table secrets file:/etc/mail/secrets

action "local" lmtp "/var/imap/socket/lmtp" user _cyrus alias 
action "relay" relay tls no-verify host smtps://la...@mail.solarscale.de \
auth 

match for local action "local"
match for any action "relay"
match auth from any for any action "relay"
<---

So what happened to me was that I activated a crontab accidentally that
fetchmails POP3 mail.  It connects to localhost and delivers to me
(pjp@localhost).  In my case the lmtp delivery caused a no such mailbox
error, and opensmtpd then sent a bounce to the originators of the mail as
MAILER-DAEMON via the relay.  How can I in future prevent this through the 
config?

If not possible, is it simple to somehow work out a workaround for such
situations?  I'm just lucky OpenBSD mailing lists seem to have a catch
for such bounces, but I still had to say sorry.

Regards,
-peter

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



Re: how could a safety mechanism be configured?

2019-05-02 Thread Peter J. Philipp
On Thu, May 02, 2019 at 02:17:27AM +0200, Thomas Bohl wrote:
> Hello,
> 
> > So what happened to me was that I activated a crontab accidentally that
> > fetchmails POP3 mail.  It connects to localhost and delivers to me
> > (pjp@localhost).  In my case the lmtp delivery caused a no such mailbox
> > error, and opensmtpd then sent a bounce to the originators of the mail as
> > MAILER-DAEMON via the relay.  How can I in future prevent this through the
> > config?
> 
> Let fetchmail directly deliver to /var/imap/socket/lmtp should do the trick,
> because no bouncing smtpd is involved.

Thank you for the hint!  I finally have it working with directly delivering
to lmtp.  No more accidental bounces I hope!

Best Regards,
-peter

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org



request (privately) for maillog

2020-02-24 Thread Peter J. Philipp
Hi,

I got another "bouncing messages from misc@opensmtpd.org" message.  The
particular message was 4669 that bounced.  Yet I have no record of this in
my maillog, so I suspect a DNS fault.  

Feb 24 12:07:04 was the time when the 4668 message came to me so I suspect
that 4669 came after.  

I do have a query log for DNS and isolating the fault requires perhaps having
some logs from opensmtpd.org for the mail to me (if possible).  These logs
should state if it was a DNS fault in their own wording.

Every answered DNS packet should be accounted for.  I have a fairly good idea 
of one of the vultr nameservers that opensmtpd.org uses but there is other 
addresses like IPv6 addresses that I'm not sure of.  Being given a list of
the nameservers would help me in the debug as well.

Would opensmtpd.org be able to provide me the logs so I can attempt tracking
the problem?

Best Regards,
-peter



Re: "bouncing messages from ..." (was: request (privately) for maillog)

2020-02-26 Thread Peter J. Philipp
On Wed, Feb 26, 2020 at 07:40:10AM +, gil...@poolp.org wrote:
> > I can confirm it is an issue with mlmmj, there's no failed SMTP attempt
> > for any of you who reported getting this message.
> > 
> 
> found out.
> 
> upon restart of the MX @ opensmtpd.org, the list goes through greylisting
> and the first session gets bounced once. I sometimes restart several time
> to test diffs which explains why at times people get more of these, and I
> obviously did a restart when the errata was published.
> 
> I changed the config so it doesn't go through greylisting again.

Thanks Gilles for the quick debug and fix!

Best Regards,
-peter



how to match my relay rules against a list of IP's?

2020-03-20 Thread Peter J. Philipp
Hi,

Is this possible?  This is what I got but it gives me an error...

arrowhead# smtpd -dvvv
/etc/mail/smtpd.conf:34: table "mylocalhosters" may not be used for from lookups
arrowhead# grep mylocalhosters smtpd.conf 
table mylocalhosters file:/etc/mail/localhosters
match auth from src  for any action "relay"

OS and smtpd are OpenBSD 6.6 with patches.

Regards,
-peter



Re: how to match my relay rules against a list of IP's?

2020-03-20 Thread Peter J. Philipp
On Fri, Mar 20, 2020 at 08:51:50PM +0100, Thomas Bohl wrote:
> Hi
> 
> > Is this possible?
> 
> Yes
> 
> > This is what I got but it gives me an error...
> > 
> > arrowhead# smtpd -dvvv
> > /etc/mail/smtpd.conf:34: table "mylocalhosters" may not be used for from 
> > lookups
> > arrowhead# grep mylocalhosters smtpd.conf
> > table mylocalhosters file:/etc/mail/localhosters
> > match auth from src  for any action "relay"
> 
> Looks ok.
> What does your /etc/mail/localhosters look like?

arrowhead$ more /etc/mail/localhosters
[::1]/128

I also tried without the [] brackets but that did the same error.

Regards,
-peter



Re: mail log oddity

2020-06-11 Thread Peter J. Philipp

I had the same IP connect to me, with the same failed-command.

-peter

On 2020-06-12 02:02, Edgar Pettijohn wrote:

On Thu, Jun 11, 2020 at 04:26:37PM -0700, Niklas wrote:

I'm curious what this would actually accomplish on a vulnerable server.

There's no path or executable its trying to find in its iterations. This looks 
more like an arbitrary shell command meant to act as a scan/test to find 
vulnerable servers without fully leveraging the exploit.

If you had the IP it originates from it could tell you a lot.On Jun 10, 2020 8:08 PM, 
Ryan Kavanagh  wrote:

61.148.74.134

Edgar


On Wed, Jun 10, 2020 at 10:00:08PM -0500, Edgar Pettijohn wrote:

Saw this in the maillog today. Any ideas what they are trying to do?

?? 249c054a86af9328 smtp failed-command command="MAIL FROM: <;for i in 0 1 2 3 4 5 6 7 8 9 a b c 
d;do read r;done;sh;exit 0;>" result="530 5.5.1 Invalid command: Must issue an AUTH command 
first"

My guess is that they're trying to exploit CVE-2020-7247. Search the
advisory text for that command:

https://www.qualys.com/2020/01/28/cve-2020-7247/lpe-rce-opensmtpd.txt

Best,
Ryan





Re: smtp-out: Address family mismatch

2020-07-21 Thread Peter J. Philipp
Hi, I had these when I changed my secrets password, smtpd needs to be 
restarted after.


Regards,

-peter

On 2020-07-20 11:14, Harald Dunkel wrote:

Currently I have 100+ EMails queued with "Network error on
destination MX". This is a severe regression since OpenBSD
6.6.

Every insightful comment is highly appreciated

Harri


On 7/6/20 9:01 AM, Harald Dunkel wrote:

Hi folks,

I see a lot of outgoing EMails queued with a message "smtp-out:
Address family mismatch" in the log file. My colleagues don't like
EMails being put on hold at all.

Prior to 6.4 there was a

 limit mta inet4

The upgrade guide to the new smtpd.conf syntax 
(https://www.openbsd.org/faq/upgrade64.html)

mentioned "set and limit removed as main keywords" and a new
"mta namespace", but smtpd.conf(5) is insufficient in this aspect.
It doesn't tell. 
https://poolp.org/posts/2018-05-21/switching-to-opensmtpd-new-config/

doesn't tell, either.

My current (new-style) smtpd.conf has a line

 action "relay_external" relay src 192.168.1.1 helo 
"mail.example.com"


i.e. the AF is implicitly defined, but as the AF mismatch messages 
indicate

this is not sufficient.

Could you please elaborate?


Regards
Harri








dmarc

2020-07-25 Thread Peter J. Philipp
Hi,

This is sorta a feature request.  A lot of people use dmarc to check for
incoming mails.  Is there a way to turn off dmarc checking in the smtpd?
This would be valuable for trusted sources such as mailing lists.

Let me give you an example.  I mail 1000 bytes to openbsd-misc and there is
thousands of recipients on that mailing list.  When their software delivers
to these thousands I get a DNS request (I'm predicting 40 bytes in the question,
and no less than 40 bytes in the answer * thousands) that's already a minimum
of 80K bytes DNS traffic generated by a 1K byte mail.

It would be cool if OpenBSD could set a "X-DMARC-VERIFIED" header or something
and based on a policy on every smtpd that receives this no dmarc dns request
is caused.  This would make me very happy.

Is this all technically possible?

Best Regards,
-peter



Re: dmarc

2020-07-25 Thread Peter J. Philipp
On Sat, Jul 25, 2020 at 01:43:23PM +0200, Martijn van Duren wrote:
> I'm not 100% sure what you mean, but let me give it a best effort.
> 
> On Sat, 2020-07-25 at 11:00 +0200, Peter J. Philipp wrote:
> > Hi,
> > 
> > This is sorta a feature request.  A lot of people use dmarc to check for
> > incoming mails.  Is there a way to turn off dmarc checking in the smtpd?
> > This would be valuable for trusted sources such as mailing lists.
> 
> This reads as if you want to disable checking on the receiving end,
> which is smtpd. This is not needed since smtpd has no support for
> DMARC, SPF, or DKIM verification at this moment.

Oh sorry then.  Well maybe keep it in mind in the future when this functionality
is put into OpenSMTPD, perhaps then.  Right now it's super annoying doing any 
posting, not that I can't handle it, it's more the economic footprint of 
posting.  Let me try to explain below.

> > Let me give you an example.  I mail 1000 bytes to openbsd-misc and there is
> > thousands of recipients on that mailing list.  When their software delivers
> > to these thousands I get a DNS request (I'm predicting 40 bytes in the 
> > question,
> > and no less than 40 bytes in the answer * thousands) that's already a 
> > minimum
> > of 80K bytes DNS traffic generated by a 1K byte mail.
> 
> If you're worried about those numbers I would stop hosting DNS yourself
> and just put it at a company who can handle it.

I don't know if you're old enough to remember what a slashdotting is.  
In effect with all these dmarc requests out there you get a little slashdotting
and it makes writing on small hosts to large mailing lists costly.

This does have a natural "put your money where your mouth is", but it has an
unneeded economical footprint.  We're talking thousands of packets and MB of
volume for 1 little post (especially when you have DNSSEC enabled and reply
with a proof of non-existance to everyone).  Now you can imagine where this 
goes when there is a large ML and everyone posts on it.  Different parts of 
the Internet are lighting up and it's really a waste of electricity.

> > It would be cool if OpenBSD could set a "X-DMARC-VERIFIED" header or 
> > something
> > and based on a policy on every smtpd that receives this no dmarc dns request
> > is caused.  This would make me very happy.
> 
> I'm not aware of this mail header, nor is google. Also this would make
> your mail susceptible for a man in the middle to disabling DMARC.
> 
> But if you want this header you should be able to do this quite easily
> with a custom filter. The documentation is not installed by default, but
> a draft is available in the smtpd soures: smtpd-filters.7.

Something like this would be very good.  The individual person will not care.
So it's left to the makers of mail software to do something (if only for the
need to burn less coal to make electricity).  I may be noone but I think it's
worthy raising this as the trend especially in the OpenBSD community is to
be a small guy with a small self run network (I'm part of that).  In effect 
this independence is causing a miscalculated evil.  I'm just viewing this and 
saying "this could get out of control!".  Oh I can handle it, but what if we
grow 10x, 100x, 1000x, 1x do I want to see this or do I sign off the
mailing lists?

If email was more like a multicasting it would be very efficient, but then
opensmtpd also wouldn't be needed anymore.  So we need to be aware of the
faults and side-effects of large unicasts that cause extra unicast lookups.

> > 
> > Is this all technically possible?
> > 
> > Best Regards,
> > -peter
> > 
> martijn@

Best Regards,
-peter



Re: smtp-out: Address family mismatch

2020-07-26 Thread Peter J. Philipp

Hi,

I don't know what this error entails but I took a peek at the source and 
found this in mta.c around lines 1575:


    if ((c->source->sa &&
 c->source->sa->sa_family != 
mx->host->sa->sa_family) ||

    (l->family && l->family != mx->host->sa->sa_family)) {
    log_debug("debug: mta-routing: skipping host 
%s: AF mism

atch",
    mta_host_to_text(mx->host));
    family_mismatch = 1;
    continue;
    }

notice there is a DEBUG level log with a conversion indicating which 
host it has problems with.  Not saying you need to run it in debug mode, 
but you can to see this message.


Best Regards,

-peter


On 2020-07-23 09:45, Harald Dunkel wrote:

The Network error on destination MX has been resolved.
The Address family mismatch is still open.

smtpctl show queue gives me

a9f755dd88e88083|inet4|mta||u...@example.com|cont...@bugs.debian.org|cont...@bugs.debian.org|1595227438|1595227438|0|27|pending|29446|Address 
family mismatch on destination MXs
ebbe485d057fa820|inet4|mta||u...@example.com|xxx...@bugs.debian.org|xxx...@bugs.debian.org|1595227386|1595227386|0|27|pending|29394|Address 
family mismatch on destination MXs


Please note the "inet4" and

% host bugs.debian.org
bugs.debian.org has address 140.211.166.212
bugs.debian.org has address 209.87.16.39
bugs.debian.org has IPv6 address 2605:bc80:3010:b00:0:deb:166:212
bugs.debian.org has IPv6 address 2607:f8f0:614:1::1274:39
bugs.debian.org mail is handled by 10 buxtehude.debian.org.
% host buxtehude.debian.org.
buxtehude.debian.org has address 209.87.16.39
buxtehude.debian.org has IPv6 address 2607:f8f0:614:1::1274:39
buxtehude.debian.org mail is handled by 10 mailly.debian.org.
buxtehude.debian.org mail is handled by 10 muffat.debian.org.


Currently telnet 140.211.166.212 smtp fails with Connection refused, but
where is the address family mismatch between inet4 and 209.87.16.39 ?


Regards
Harri