If CRAM-MD5 works correctly without spamdyke, you could be looking at some kind of permission or environmental problem. Have you tried running spamdyke's "config-test" feature to see if it can shed some light (it will test your authentication commands to see if CRAM-MD5 is supported)? Be sure to use the "config-test-user", "config-test-smtpauth-username" and "config-test-smtpauth-password" flags.
Also, I seem to recall (but I can't recall why) relaylock doesn't work well with spamdyke when it runs first. Try reordering the command lines in your inetd.conf file to run spamdyke before relaylock. See also this message for some information about running the "config-test" feature with relaylock: http://www.mail-archive.com/spamdyke-users@spamdyke.org/msg00389.html The other option is to simply remove spamdyke's SMTP AUTH flags. When you do that, spamdyke won't be able to check authentication itself; it will just observe the client's authentication attempt and trust qmail's response. If CRAM-MD5 works for qmail, this could solve your problem. -- Sam Clippinger Stefan Pausch wrote: > Hello again, > > my "cram-md5" authentication problem drives me nuts. It seems as if my > server supports cram-md5 and has no errors with it. If i telnet into my > server, *without* spamdyke enabled and use cram-md5 i can successfully send > emails, if i enable spamdyke the logfile outputs a "authentication failure" > - in the telnet settion the server tells me "go ahead". If i input any > futher line i get the dlrbs (in my case spamhaus) message. > > Is there anything / logs i can look into where i can get more information > about my issue? > > Maybe it is a good thing to mention that my username is the email address. > which contains "@" and "." ... maybe this is causing issues. > > #### Logfile with spamdyke enabled and telnet SMTP Session > May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying > 202.203.1.91.in-addr.arpa with DNS server 85.214.7.22:53 (attempt 1) > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 83 bytes > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: PTR > May 22 21:42:45 h868914 spamdyke[5745]: INFO: found PTR record for > 202.203.1.91.in-addr.arpa: p5B01CBCA.dip.t-dialin.net > May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory > entry: > /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip/p5b01cbca.dip.t-dial > in.net > May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory > entry: /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip.t-dialin.net > May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory > entry: /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/t-dialin.net > May 22 21:42:45 h868914 spamdyke[5745]: INFO: searching for domain directory > entry: /var/qmail/spamdyke/blacklist_rdns.d/net/n/net > May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying > p5b01cbca.dip.t-dialin.net with DNS server 85.214.7.22:53 (attempt 1) > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 60 bytes > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: A > May 22 21:42:45 h868914 spamdyke[5745]: INFO: found A record for > p5b01cbca.dip.t-dialin.net: 91.1.203.202 > May 22 21:42:45 h868914 spamdyke[5745]: INFO: querying > 202.203.1.91.zen.spamhaus.org with DNS server 85.214.7.22:53 (attempt 1) > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS packet: 108 bytes > May 22 21:42:45 h868914 spamdyke[5745]: INFO: received DNS response: TXT > May 22 21:42:45 h868914 spamdyke[5745]: INFO: found TXT record for > 202.203.1.91.zen.spamhaus.org: > http://www.spamhaus.org/query/bl?ip=91.1.203.202 > May 22 21:43:57 h868914 spamdyke[5745]: INFO: executing SMTP AUTH command > /var/qmail/bin/smtp_auth for user: [EMAIL PROTECTED] > May 22 21:43:57 h868914 spamdyke[5745]: ERROR: authentication failure (bad > username/password, vchkpw uses this to indicate SMTP access is not allowed): > [EMAIL PROTECTED] > May 22 21:43:57 h868914 spamdyke[5745]: INFO: executing SMTP AUTH command > /var/qmail/bin/cmd5checkpw for user: [EMAIL PROTECTED] > May 22 21:43:57 h868914 spamdyke[5745]: ERROR: authentication failure (bad > username/password, vchkpw uses this to indicate SMTP access is not allowed): > [EMAIL PROTECTED] > > #### Logfile with spamdyke enabled and Thunderbird2 > May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying > 202.203.1.91.in-addr.arpa with DNS server 85.214.7.22:53 (attempt 1) > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 83 bytes > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: PTR > May 22 22:03:39 h868914 spamdyke[10205]: INFO: found PTR record for > 202.203.1.91.in-addr.arpa: p5B01CBCA.dip.t-dialin.net > May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain > directory entry: > /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip/p5b01cbca.dip.t-dial > in.net > May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain > directory entry: > /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/dip.t-dialin.net > May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain > directory entry: > /var/qmail/spamdyke/blacklist_rdns.d/net/t/t-dialin/t-dialin.net > May 22 22:03:39 h868914 spamdyke[10205]: INFO: searching for domain > directory entry: /var/qmail/spamdyke/blacklist_rdns.d/net/n/net > May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying > p5b01cbca.dip.t-dialin.net with DNS server 85.214.7.22:53 (attempt 1) > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 60 bytes > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: A > May 22 22:03:39 h868914 spamdyke[10205]: INFO: found A record for > p5b01cbca.dip.t-dialin.net: 91.1.203.202 > May 22 22:03:39 h868914 spamdyke[10205]: INFO: querying > 202.203.1.91.zen.spamhaus.org with DNS server 85.214.7.22:53 (attempt 1) > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS packet: 108 > bytes > May 22 22:03:39 h868914 spamdyke[10205]: INFO: received DNS response: TXT > May 22 22:03:39 h868914 spamdyke[10205]: INFO: found TXT record for > 202.203.1.91.zen.spamhaus.org: > http://www.spamhaus.org/query/bl?ip=91.1.203.202 > May 22 22:03:39 h868914 spamdyke[10205]: INFO: executing SMTP AUTH command > /var/qmail/bin/smtp_auth for user: [EMAIL PROTECTED] > May 22 22:03:39 h868914 spamdyke[10205]: ERROR: authentication failure (bad > username/password, vchkpw uses this to indicate SMTP access is not allowed): > [EMAIL PROTECTED] > May 22 22:03:39 h868914 spamdyke[10205]: INFO: executing SMTP AUTH command > /var/qmail/bin/cmd5checkpw for user: [EMAIL PROTECTED] > May 22 22:03:39 h868914 spamdyke[10205]: ERROR: authentication failure (bad > username/password, vchkpw uses this to indicate SMTP access is not allowed): > [EMAIL PROTECTED] > May 22 22:03:39 h868914 spamdyke[10205]: DENIED_RBL_MATCH from: > [EMAIL PROTECTED] to: [EMAIL PROTECTED] origin_ip: 91.1.203.202 > origin_rdns: p5b01cbca.dip.t-dialin.net auth: (unknown) > > #### spamdyke.conf: > log-level=4 > log-target=1 > local-domains-file=/var/qmail/control/rcpthosts > idle-timeout-secs=300 > graylist-dir=/var/qmail/spamdyke/greylist > graylist-min-secs=300 > graylist-max-secs=4814400 > policy-url=http://stefanpausch.com/greylist.php > sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders > recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients > ip-in-rdns-keyword-file=/var/qmail/spamdyke/blacklist_keywords > ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip > rdns-blacklist-dir=/var/qmail/spamdyke/blacklist_rdns.d > rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns > ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip > sender-whitelist-file=/var/qmail/spamdyke/whitelist_sender > greeting-delay-secs=3 > tls-certificate-file=/var/qmail/control/servercert.pem > local-domains-file=/var/qmail/control/rcpthosts > smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true > smtp-auth-command=/var/qmail/bin/cmd5checkpw /var/qmail/bin/true > check-dnsrbl=zen.spamhaus.org > check-dnsrbl=bl.spamcop.net > check-dnsrbl=psbl.surriel.com > check-dnsrbl=dsn.rfc-ignorant.org > check-dnsrbl=dul.dnsbl.sorbs.net > check-dnsrbl=list.dsbl.org > reject-missing-sender-mx > reject-empty-rdns > reject-unresolvable-rdns > tls-certificate-file=/var/qmail/control/servercert.pem > hostname-file=/var/qmail/control/me > > #### /etc/inetd.conf: > submission stream tcp nowait.1000 qmaild /var/qmail/bin/tcp-env tcp-env -Rt0 > /usr/bin/env SUBMISSION=1 SMTPAUTH=1 /var/qmail/bin/qmail-smtpd > /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw > /var/qmail/bin/true > poppassd stream tcp nowait/1000 root /usr/sbin/tcpd > /opt/psa/admin/bin/poppassd > smtp stream tcp nowait.1000 root /var/qmail/bin/tcp-env tcp-env -Rt0 > /usr/bin/env SMTPAUTH=1 END=1 /var/qmail/bin/relaylock > /usr/local/bin/spamdyke -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd > /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw > /var/qmail/bin/true > smtps stream tcp nowait.1000 root /var/qmail/bin/tcp-env tcp-env -Rt0 > /usr/bin/env SMTPAUTH=1 END=1 /var/qmail/bin/relaylock > /usr/local/bin/spamdyke -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd > /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw > /var/qmail/bin/true > > _______________________________________________ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > _______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users