Solved

Sendmail log > What does this error mean?

Posted on 2013-06-05
3
1,070 Views
Last Modified: 2013-07-10
Can you tell me why this mail client isn't able to connect and send mail?  Maybe the mail client supplied auth mechanism wasn't correct - but what auth mech did the client try?  And what auth mechanism is available? BTW, sendmail running on port 465 w/SSL.

Jun  5 23:11:32 www sendmail[7182]: NOQUEUE: connect from static.lsanca.fios.verizon.net [71.177.1.6]
Jun  5 23:11:32 www sendmail[7183]: NOQUEUE: connect from static.lsanca.fios.verizon.net [71.177.1.6]
Jun  5 23:11:32 www sendmail[7182]: AUTH: available mech=CRAM-MD5 DIGEST-MD5, allowed mech=LOGIN PLAIN
Jun  5 23:11:32 www sendmail[7183]: AUTH: available mech=CRAM-MD5 DIGEST-MD5, allowed mech=LOGIN PLAIN
Jun  5 23:11:32 www sendmail[7182]: r55NBWRX007182: Milter: no active filter
Jun  5 23:11:32 www sendmail[7183]: r55NBWlV007183: Milter: no active filter
Jun  5 23:11:32 www sendmail[7182]: r55NBWRX007182: static.lsanca.fios.verizon.net [71.177.1.6] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Jun  5 23:11:32 www sendmail[7183]: r55NBWlV007183: static.lsanca.fios.verizon.net [71.177.1.6] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Jun  5 23:11:32 www sendmail[7184]: NOQUEUE: connect from static.lsanca.fios.verizon.net [71.177.1.6]
Jun  5 23:11:32 www sendmail[7184]: AUTH: available mech=CRAM-MD5 DIGEST-MD5, allowed mech=LOGIN PLAIN
Jun  5 23:11:32 www sendmail[7184]: r55NBWhU007184: Milter: no active filter

Open in new window

0
Comment
Question by:Geoff Millikan
  • 2
3 Comments
 
LVL 76

Expert Comment

by:arnold
ID: 39224551
What error is the client getting.
The error means the connection was made, but no command was sent.
0
 

Author Comment

by:Geoff Millikan
ID: 39224687
The email client is a LSI RAID controller card.

Are you sure that's what it means because I think the log is saying the client offered the auth types of CRAM-MD5 or DIGEST-MD5 but my mail server requires auth type of PLAIN.

Thoughts? How could we test this?
0
 
LVL 76

Accepted Solution

by:
arnold earned 500 total points
ID: 39225320
Try,
openssl s_client -connect youmailserver:465
Ehlo yourserver

As a response you see the available auth methods.
The log I think reflects that your server supports three auth methods, but allowed the client that used login plain.

The few lines after, it has the entries that the client did not send any of the specific commands, mail,expn,etrn.
The issue might be that your controller does not wait for the mail server's response before sending commands.

You could use tcpdump to capture an interaction between the two to see what is being sent.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Email signatures have numerous marketing benefits. Here are 8 top reasons to turn your email signature into a marketing channel.
Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
In this video we show how to create an Address List in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Organization >> Ad…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now