Ok, I went in and extended the idle time out to 5mins and had her send me another email.
Following is the log file that I got from that test:
06/09/2011 12:46:52 STARTED: VERSION = 4.2.0+TLS+CONFIGTEST+DEBUG, PID = 15900

06/09/2011 12:46:52 CURRENT ENVIRONMENT
PATH=/var/qmail/bin:/usr/local/bin:/usr/bin:/bin
PWD=/var/qmail/supervise/smtp
SHLVL=0
PROTO=TCP
TCPLOCALIP=65.116.220.139
TCPLOCALPORT=25
TCPLOCALHOST=mail2.nsii.net
TCPREMOTEIP=64.58.208.13
TCPREMOTEPORT=48100
BADMIMETYPE=
BADLOADERTYPE=M
CHKUSER_RCPTLIMIT=50
CHKUSER_WRONGRCPTLIMIT=10
DKSIGN=/var/qmail/control/domainkeys/%/private

06/09/2011 12:46:52 CURRENT CONFIG
config-file=/etc/spamdyke/spamdyke.conf
connection-timeout-secs=3600
dns-blacklist-entry=zen.spamhaus.org
dns-blacklist-entry=bl.spamcop.net
full-log-dir=/var/log/spamdyke
graylist-dir=/var/spamdyke/graylist
graylist-level=always
graylist-max-secs=2678400
graylist-min-secs=180
greeting-delay-secs=5
idle-timeout-secs=300
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
local-domains-file=/var/qmail/control/rcpthosts
log-level=debug
max-recipients=50
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
reject-empty-rdns=1
reject-ip-in-cc-rdns=1
reject-missing-sender-mx=1
reject-unresolvable-rdns=1
sender-blacklist-file=/etc/spamdyke/blacklist_senders
sender-whitelist-file=/etc/spamdyke/whitelist_senders
tls-certificate-file=/var/qmail/control/servercert.pem

06/09/2011 12:46:52 - Remote IP = 64.58.208.13

06/09/2011 12:46:52 CURRENT CONFIG
config-file=/etc/spamdyke/spamdyke.conf
connection-timeout-secs=3600
dns-blacklist-entry=zen.spamhaus.org
dns-blacklist-entry=bl.spamcop.net
dns-server-ip=205.171.3.65
dns-server-ip-primary=8.8.8.8
full-log-dir=/var/log/spamdyke
graylist-dir=/var/spamdyke/graylist
graylist-level=always
graylist-max-secs=2678400
graylist-min-secs=180
greeting-delay-secs=5
idle-timeout-secs=300
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
local-domains-file=/var/qmail/control/rcpthosts
log-level=debug
max-recipients=50
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
reject-empty-rdns=1
reject-ip-in-cc-rdns=1
reject-missing-sender-mx=1
reject-unresolvable-rdns=1
sender-blacklist-file=/etc/spamdyke/blacklist_senders
sender-whitelist-file=/etc/spamdyke/whitelist_senders
tls-certificate-file=/var/qmail/control/servercert.pem

06/09/2011 12:46:52 - Remote rDNS = mail-out-01.healthways.com

06/09/2011 12:46:52 LOG OUTPUT
DEBUG(filter_rdns_missing()@filter.c:897): checking for missing rDNS; rdns: mail-out-01.healthways.com DEBUG(filter_ip_in_rdns_cc()@filter.c:928): checking for IP in rDNS +country code; rdns: mail-out-01.healthways.com DEBUG(filter_rdns_whitelist_file()@filter.c:1005): searching rDNS whitelist file(s); rdns: mail-out-01.healthways.com DEBUG(filter_rdns_blacklist_file()@filter.c:1108): searching rDNS blacklist file(s); rdns: mail-out-01.healthways.com DEBUG(filter_ip_whitelist()@filter.c:1176): searching IP whitelist file(s); ip: 64.58.208.13
FILTER_WHITELIST_IP ip: 64.58.208.13 file: /etc/spamdyke/whitelist_ip(2)

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 48 bytes
220 mail2.nsii.net - Welcome to nsii.net ESMTP

06/09/2011 12:46:52 FROM REMOTE TO CHILD: 33 bytes
EHLO mail-out-01.healthways.com

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 42 bytes
250-mail2.nsii.net - Welcome to nsii.net

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 14 bytes
250-STARTTLS

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 16 bytes
250-PIPELINING

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 14 bytes
250-8BITMIME

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 19 bytes
250-SIZE 20971520

06/09/2011 12:46:52 FROM CHILD TO REMOTE: 31 bytes
250 AUTH LOGIN PLAIN CRAM-MD5

06/09/2011 12:46:52 FROM REMOTE TO CHILD: 10 bytes
STARTTLS

06/09/2011 12:46:52 FROM SPAMDYKE TO REMOTE: 14 bytes
220 Proceed.

06/09/2011 12:46:53 - TLS negotiated and started

06/09/2011 12:46:53 FROM REMOTE TO CHILD: 33 bytes TLS
EHLO mail-out-01.healthways.com

06/09/2011 12:46:53 FROM CHILD TO REMOTE: 42 bytes TLS
250-mail2.nsii.net - Welcome to nsii.net

06/09/2011 12:46:53 FROM CHILD, FILTERED: 14 bytes TLS
250-STARTTLS

06/09/2011 12:46:53 FROM CHILD TO REMOTE: 16 bytes TLS
250-PIPELINING

06/09/2011 12:46:53 FROM CHILD TO REMOTE: 14 bytes TLS
250-8BITMIME

06/09/2011 12:46:53 FROM CHILD TO REMOTE: 19 bytes TLS
250-SIZE 20971520

06/09/2011 12:46:53 FROM CHILD TO REMOTE: 31 bytes TLS
250 AUTH LOGIN PLAIN CRAM-MD5

06/09/2011 12:51:53 LOG OUTPUT TLS
ERROR: unable to read from SSL/TLS stream: The operation failed due to an I/O error, Unexpected EOF found

06/09/2011 12:51:53 - TLS ended and closed

06/09/2011 12:51:53 CLOSED

*Ron Olds *
*National Service Information *
145 Baker St
Marion, Ohio 43302
_ron@nsii.net_
800-235-0337 X122


On 6/9/2011 12:26 PM, Eric Shubert wrote:
I'm not really concerned about the former.

Will you care to elaborate on the latter? I would think that the -c
option (maxsmtpd) on tcpserver would mitigate that.

_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to