I don't see anything in your config file that looks like a problem. Since it's working for some connections and not others, I'd guess it's something about those mailservers -- they're expecting some response (or something) that spamdyke isn't sending, so the connection stalls. Can you try enabling the "full-log-option" to capture the data from one of these failed connections?
-- Sam Clippinger On Dec 14, 2015, at 8:29 AM, Arne Metzger <mo...@foni.net> wrote: > Hi Sam, > > sorry for the delayed reply. > > My config files are attached below. But i can't provide any log file data - > the only hint i see in /var/log/maillog is an entry "relaylock: ..." any > nothing more. Spamdyke doesn't seem to notice the connection. > > # cat /etc/spamdyke5.conf > log-level=verbose > log-target=syslog > dns-level=normal > filter-level=normal > smtp-auth-level=ondemand-encrypted > smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true > /var/qmail/bin/cmd5checkpw /var/qmail/bin/true > relay-level=normal > tls-certificate-file=/var/qmail/control/servercert.pem > idle-timeout-secs=300 > greeting-delay-secs=0 > tls-level=smtp > max-recipients=20 > policy-url=http://www.shjjv.de/home/spamfilter > > reject-empty-rdns > reject-ip-in-cc-rdns > reject-unresolvable-rdns > ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/rdns-keyword-blacklist > ip-in-rdns-keyword-whitelist-file=/var/qmail/spamdyke/rdns-keyword-whitelist > > ip-blacklist-file=/var/qmail/spamdyke/ip-blacklist > rdns-blacklist-file=/var/qmail/spamdyke/rdns-blacklist > ip-whitelist-file=/var/qmail/spamdyke/ip-whitelist > rdns-whitelist-file=/var/qmail/spamdyke/rdns-whitelist > > dns-blacklist-entry=zen.spamhaus.org > dns-blacklist-entry=dnsbl.inps.de > dns-blacklist-entry=ix.dnsbl.manitu.net > dns-blacklist-entry=bl.spamcannibal.org > rhs-blacklist-entry=fresh.spameatingmonkey.com > #dns-whitelist-entry=list.dnswl.org > > header-blacklist-file=/var/qmail/spamdyke/header-blacklist > > reject-sender=no-mx > reject-recipient=same-as-sender > > sender-whitelist-file=/var/qmail/spamdyke/sender-whitelist > sender-blacklist-file=/var/qmail/spamdyke/sender-blacklist > > graylist-dir=/var/qmail/spamdyke/graylist > graylist-level=always-create-dir > graylist-min-secs=300 > graylist-max-secs=1814400 > qmail-rcpthosts-file=/var/qmail/control/rcpthosts > > # cat /etc/spamdyke5_smtps.conf > log-level=verbose > log-target=syslog > dns-level=normal > filter-level=normal > smtp-auth-level=ondemand-encrypted > smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true > /var/qmail/bin/cmd5checkpw /var/qmail/bin/true > relay-level=normal > tls-certificate-file=/var/qmail/control/servercert.pem > idle-timeout-secs=300 > greeting-delay-secs=0 > #151117he > tls-level=smtps > tls-certificate-file=/var/qmail/control/servercert.pem > max-recipients=20 > policy-url=http://www.shjjv.de/home/spamfilter > > reject-empty-rdns > reject-ip-in-cc-rdns > reject-unresolvable-rdns > ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/rdns-keyword-blacklist > ip-in-rdns-keyword-whitelist-file=/var/qmail/spamdyke/rdns-keyword-whitelist > > ip-blacklist-file=/var/qmail/spamdyke/ip-blacklist > rdns-blacklist-file=/var/qmail/spamdyke/rdns-blacklist > ip-whitelist-file=/var/qmail/spamdyke/ip-whitelist > rdns-whitelist-file=/var/qmail/spamdyke/rdns-whitelist > > dns-blacklist-entry=zen.spamhaus.org > dns-blacklist-entry=dnsbl.inps.de > dns-blacklist-entry=ix.dnsbl.manitu.net > dns-blacklist-entry=bl.spamcannibal.org > rhs-blacklist-entry=fresh.spameatingmonkey.com > #dns-whitelist-entry=list.dnswl.org > > header-blacklist-file=/var/qmail/spamdyke/header-blacklist > > reject-sender=no-mx > reject-recipient=same-as-sender > > sender-whitelist-file=/var/qmail/spamdyke/sender-whitelist > sender-blacklist-file=/var/qmail/spamdyke/sender-blacklist > > graylist-dir=/var/qmail/spamdyke/graylist > graylist-level=always-create-dir > graylist-min-secs=300 > graylist-max-secs=1814400 > qmail-rcpthosts-file=/var/qmail/control/rcpthosts > > Best regards, > Arne > > Am 25.11.2015 um 02:51 schrieb Sam Clippinger via spamdyke-users: >> It's hard to say what the problem might be without more information. Could >> you post your spamdyke config file? Also, if you use the full-log-dir >> option, spamdyke will capture everything that happens into a log file for >> each connection, which should show exactly what's going on. >> >> -- Sam Clippinger >> >> >> >> >> On Nov 19, 2015, at 2:41 AM, Arne Metzger via spamdyke-users >> <spamdyke-users@spamdyke.org> wrote: >> >>> Hi, >>> >>> i am using tls-level = smtp for standard smtp connections (for smtps on >>> port 465 i use a seperate configugartion file with tls-level = smtps) >>> >>> Some mails from specific mailservers were not handled by spamdyke, there >>> was just an relaylock entry in maillog, nothing more. >>> >>> My hosters support staff also tried to send mail with StartTLS on port 25 >>> and got the same result: relaylock entry and nothing more. >>> >>> Spamdyke seems not to offer StartTLS on port 25, thus delivering fails and >>> the sending server does not try to deliver without encryption. So the email >>> ist not delivered at all. >>> >>> Has anyone heard about that? Any hints? Or more information needed? >>> Using spamdyke 5.0.1 on ubuntu 14.04 >>> >>> Best regards, >>> Arne >>> _______________________________________________ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> >> >> >> _______________________________________________ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >
_______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users