- 论坛徽章:
- 0
|
/var/log/maillog
Sep 27 20:51:06 asialinux sendmail[3835]: i8RCp6qQ003835: [192.168.2.236] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Sep 27 20:51:07 asialinux sendmail[3836]: i8RCp7qQ003836: [192.168.2.236] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Sep 27 20:51:08 asialinux sendmail[3837]: i8RCp8qQ003837: [192.168.2.236] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Sep 27 20:51:09 asialinux ipop3d[3838]: pop3 service init from 192.168.2.236
Sep 27 20:51:09 asialinux ipop3d[3838]: Login user=tec host=[192.168.2.236] nmsgs=0/0
Sep 27 20:51:09 asialinux ipop3d[3838]: Logout user=tec host=[192.168.2.236] nmsgs=0 ndele=0
Sep 27 20:51:16 asialinux sendmail[3839]: i8RCpGqQ003839: [192.168.2.236] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Sep 27 20:51:17 asialinux ipop3d[3840]: pop3 service init from 192.168.2.236
Sep 27 20:51:17 asialinux ipop3d[3840]: Login user=tec host=[192.168.2.236] nmsgs=0/0
Sep 27 20:51:17 asialinux ipop3d[3840]: Logout user=tec host=[192.168.2.236] nmsgs=0 ndele=0
Sep 27 20:52:29 asialinux sendmail[3843]: i8RCqSqQ003843: from=<tec@asialinux.3322.org>;, size=1196, class=0, nrcpts=1, msgid=<002d01c4a490$af1b8a00$ec02a8c0@kagawip2>;, proto=SMTP, daemon=MTA, relay=[192.168.2.236]
Sep 27 20:52:29 asialinux sendmail[3844]: i8RCqSqQ003843: to=<public@asialinux.3322.org>;, ctladdr=<tec@asialinux.3322.org>; (505/500), delay=00:00:00, xdelay=00:00:00, mailer=local, pri=31378, dsn=2.0.0, stat=Sent
Sep 27 20:52:29 asialinux ipop3d[3846]: pop3 service init from 192.168.2.236
Sep 27 20:52:29 asialinux ipop3d[3846]: Login user=tec host=[192.168.2.236] nmsgs=0/0
Sep 27 20:52:29 asialinux ipop3d[3846]: Logout user=tec host=[192.168.2.236] nmsgs=0 ndele=0
如果我在outlook客户端使用smtp则用户名和密码不能通过.如果不用认证则可以了,为什么?
下面是我的sendmail.mc
divert(-1)dnl
dnl #
dnl # This is the sendmail macro config file for m4. If you make changes to
dnl # /etc/mail/sendmail.mc, you will need to regenerate the
dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
dnl # installed and then performing a
dnl #
dnl # make -C /etc/mail
dnl #
include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
VERSIONID(`setup for Red Hat Linux')dnl
OSTYPE(`linux')dnl
dnl #
dnl # Uncomment and edit the following line if your outgoing mail needs to
dnl # be sent out through an external mail server:
dnl #
dnl define(`SMART_HOST',`smtp.your.provider')
dnl #
define(`confDEF_USER_ID',``8:12'')dnl
dnl define(`confAUTO_REBUILD')dnl
define(`confTO_CONNECT', `1m')dnl
define(`confTRY_NULL_MX_LIST',true)dnl
define(`confDONT_PROBE_INTERFACES',true)dnl
define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl
define(`ALIAS_FILE', `/etc/aliases')dnl
dnl define(`STATUS_FILE', `/etc/mail/statistics')dnl
define(`UUCP_MAILER_MAX', `2000000')dnl
define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl
define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl
define(`confAUTH_OPTIONS', `A')dnl
dnl #
dnl # The following allows relaying if the user authenticates, and disallows
dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
dnl #
dnl define(`confAUTH_OPTIONS', `A p')dnl
dnl #
dnl # PLAIN is the preferred plaintext authentication method and used by
dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
dnl # use LOGIN. Other mechanisms should be used if the connection is not
dnl # guaranteed secure.
dnl #
TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
DAEMON_OPTIONS(`Port=25, Name=MTA')dnl
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
dnl #
dnl # Rudimentary information on creating certificates for sendmail TLS:
dnl # make -C /usr/share/ssl/certs usage
dnl #
dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')
dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')
dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')
dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')
dnl #
dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
dnl # slapd, which requires the file to be readble by group ldap
dnl #
dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl
dnl #
dnl define(`confTO_QUEUEWARN', `4h')dnl
dnl define(`confTO_QUEUERETURN', `5d')dnl
dnl define(`confQUEUE_LA', `12')dnl
dnl define(`confREFUSE_LA', `18')dnl
define(`confTO_IDENT', `0')dnl
dnl FEATURE(delay_checks)dnl
FEATURE(`no_default_msa',`dnl')dnl
FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
FEATURE(redirect)dnl
FEATURE(always_add_domain)dnl
FEATURE(use_cw_file)dnl
FEATURE(use_ct_file)dnl
dnl #
dnl # The -t option will retry delivery if e.g. the user runs over his quota.
dnl #
FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
FEATURE(`access_db',`hash -T<TMPF>; -o /etc/mail/access.db')dnl
FEATURE(`blacklist_recipients')dnl
EXPOSED_USER(`root')dnl
dnl #
dnl # The following causes sendmail to only listen on the IPv4 loopback address
dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
dnl # address restriction to accept email from the internet or intranet.
dnl #
dnl DAEMON_OPTIONS(`Port=smtp,Addr=192.168.2.222, Name=MTA')dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 587 for
dnl # mail from MUAs that authenticate. Roaming users who can't reach their
dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
dnl # this useful.
dnl #
dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
dnl # |
|