If CRAM-MD5 works correctly without spamdyke, you could be looking at 
some kind of permission or environmental problem.  Have you tried 
running spamdyke's "config-test" feature to see if it can shed some 
light (it will test your authentication commands to see if CRAM-MD5 is 
supported)?  Be sure to use the "config-test-user", 
"config-test-smtpauth-username" and "config-test-smtpauth-password" flags.

Also, I seem to recall (but I can't recall why) relaylock doesn't work 
well with spamdyke when it runs first.  Try reordering the command lines 
in your inetd.conf file to run spamdyke before relaylock.  See also this 
message for some information about running the "config-test" feature 
with relaylock:
    http://www.mail-archive.com/spamdyke-users@spamdyke.org/msg00389.html

The other option is to simply remove spamdyke's SMTP AUTH flags.  When 
you do that, spamdyke won't be able to check authentication itself; it 
will just observe the client's authentication attempt and trust qmail's 
response.  If CRAM-MD5 works for qmail, this could solve your problem.

-- Sam Clippinger

Stefan Pausch wrote:
> Hello again,
>
> my "cram-md5" authentication problem drives me nuts. It seems as if my
> server supports cram-md5 and has no errors with it. If i telnet into my
> server, *without* spamdyke enabled and use cram-md5 i can successfully send
> emails, if i enable spamdyke the logfile outputs a "authentication failure"
> - in the telnet settion the server tells me "go ahead". If i input any
> futher line i get the dlrbs (in my case spamhaus) message.
>
> Is there anything / logs i can look into where i can get more information
> about my issue?
>
> Maybe it is a good thing to mention that my username is the email address.
> which contains "@" and "." ... maybe this is causing issues.
>
> #### Logfile with spamdyke enabled and telnet SMTP Session
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying
> 202.203.1.91.in-addr.arpa with DNS server 85.214.7.22:53 (attempt 1)
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 83 bytes
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: PTR
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: found PTR record for
> 202.203.1.91.in-addr.arpa: p5B01CBCA.dip.t-dialin.net
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory
> entry:
> /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip/p5b01cbca.dip.t-dial
> in.net
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory
> entry: /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip.t-dialin.net
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory
> entry: /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/t-dialin.net
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory
> entry: /var/qmail/spamdyke/blacklist_rdns.d/net/n/net
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying
> p5b01cbca.dip.t-dialin.net with DNS server 85.214.7.22:53 (attempt 1)
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 60 bytes
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: A
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: found A record for
> p5b01cbca.dip.t-dialin.net: 91.1.203.202
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying
> 202.203.1.91.zen.spamhaus.org with DNS server 85.214.7.22:53 (attempt 1)
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 108 bytes
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: TXT
> May 22 21:42:45 h868914 spamdyke[5745]: INFO: found TXT record for
> 202.203.1.91.zen.spamhaus.org:
> http://www.spamhaus.org/query/bl?ip=91.1.203.202
> May 22 21:43:57 h868914 spamdyke[5745]: INFO: executing SMTP AUTH command
> /var/qmail/bin/smtp_auth for user: [EMAIL PROTECTED]
> May 22 21:43:57 h868914 spamdyke[5745]: ERROR: authentication failure (bad
> username/password, vchkpw uses this to indicate SMTP access is not allowed):
> [EMAIL PROTECTED]
> May 22 21:43:57 h868914 spamdyke[5745]: INFO: executing SMTP AUTH command
> /var/qmail/bin/cmd5checkpw for user: [EMAIL PROTECTED]
> May 22 21:43:57 h868914 spamdyke[5745]: ERROR: authentication failure (bad
> username/password, vchkpw uses this to indicate SMTP access is not allowed):
> [EMAIL PROTECTED]
>
> #### Logfile with spamdyke enabled and Thunderbird2
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying
> 202.203.1.91.in-addr.arpa with DNS server 85.214.7.22:53 (attempt 1)
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 83 bytes
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: PTR
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: found PTR record for
> 202.203.1.91.in-addr.arpa: p5B01CBCA.dip.t-dialin.net
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain
> directory entry:
> /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip/p5b01cbca.dip.t-dial
> in.net
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain
> directory entry:
> /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip.t-dialin.net
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain
> directory entry:
> /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/t-dialin.net
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain
> directory entry: /var/qmail/spamdyke/blacklist_rdns.d/net/n/net
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying
> p5b01cbca.dip.t-dialin.net with DNS server 85.214.7.22:53 (attempt 1)
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 60 bytes
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: A
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: found A record for
> p5b01cbca.dip.t-dialin.net: 91.1.203.202
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying
> 202.203.1.91.zen.spamhaus.org with DNS server 85.214.7.22:53 (attempt 1)
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 108
> bytes
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: TXT
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: found TXT record for
> 202.203.1.91.zen.spamhaus.org:
> http://www.spamhaus.org/query/bl?ip=91.1.203.202
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: executing SMTP AUTH command
> /var/qmail/bin/smtp_auth for user: [EMAIL PROTECTED]
> May 22 22:03:39 h868914 spamdyke[10205]: ERROR: authentication failure (bad
> username/password, vchkpw uses this to indicate SMTP access is not allowed):
> [EMAIL PROTECTED]
> May 22 22:03:39 h868914 spamdyke[10205]: INFO: executing SMTP AUTH command
> /var/qmail/bin/cmd5checkpw for user: [EMAIL PROTECTED]
> May 22 22:03:39 h868914 spamdyke[10205]: ERROR: authentication failure (bad
> username/password, vchkpw uses this to indicate SMTP access is not allowed):
> [EMAIL PROTECTED]
> May 22 22:03:39 h868914 spamdyke[10205]: DENIED_RBL_MATCH from:
> [EMAIL PROTECTED] to: [EMAIL PROTECTED] origin_ip: 91.1.203.202
> origin_rdns: p5b01cbca.dip.t-dialin.net auth: (unknown)
>
> #### spamdyke.conf:
> log-level=4
> log-target=1
> local-domains-file=/var/qmail/control/rcpthosts
> idle-timeout-secs=300
> graylist-dir=/var/qmail/spamdyke/greylist
> graylist-min-secs=300
> graylist-max-secs=4814400
> policy-url=http://stefanpausch.com/greylist.php
> sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders
> recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
> ip-in-rdns-keyword-file=/var/qmail/spamdyke/blacklist_keywords
> ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
> rdns-blacklist-dir=/var/qmail/spamdyke/blacklist_rdns.d
> rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
> ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
> sender-whitelist-file=/var/qmail/spamdyke/whitelist_sender
> greeting-delay-secs=3
> tls-certificate-file=/var/qmail/control/servercert.pem
> local-domains-file=/var/qmail/control/rcpthosts
> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true
> smtp-auth-command=/var/qmail/bin/cmd5checkpw /var/qmail/bin/true
> check-dnsrbl=zen.spamhaus.org
> check-dnsrbl=bl.spamcop.net
> check-dnsrbl=psbl.surriel.com
> check-dnsrbl=dsn.rfc-ignorant.org
> check-dnsrbl=dul.dnsbl.sorbs.net
> check-dnsrbl=list.dsbl.org
> reject-missing-sender-mx
> reject-empty-rdns
> reject-unresolvable-rdns
> tls-certificate-file=/var/qmail/control/servercert.pem
> hostname-file=/var/qmail/control/me
>
> #### /etc/inetd.conf:
> submission stream tcp nowait.1000 qmaild /var/qmail/bin/tcp-env tcp-env -Rt0
> /usr/bin/env SUBMISSION=1 SMTPAUTH=1 /var/qmail/bin/qmail-smtpd
> /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw
> /var/qmail/bin/true
> poppassd stream tcp nowait/1000 root /usr/sbin/tcpd
> /opt/psa/admin/bin/poppassd
> smtp stream tcp nowait.1000 root /var/qmail/bin/tcp-env tcp-env -Rt0
> /usr/bin/env SMTPAUTH=1    END=1 /var/qmail/bin/relaylock
> /usr/local/bin/spamdyke -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd
> /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw
> /var/qmail/bin/true
> smtps stream tcp nowait.1000 root /var/qmail/bin/tcp-env tcp-env -Rt0
> /usr/bin/env  SMTPAUTH=1    END=1 /var/qmail/bin/relaylock
> /usr/local/bin/spamdyke -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd
> /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw
> /var/qmail/bin/true
>
> _______________________________________________
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to