[Bug 150430] Sending Mail via SMTP-AUTH fails ... qmail mailserver with smtpauth + pop-before-smtp
Valeriy Kassenbaev
vkassenbaev at gmail.com
Wed Oct 17 19:29:45 BST 2007
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
http://bugs.kde.org/show_bug.cgi?id=150430
vkassenbaev gmail com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vkassenbaev gmail com
------- Additional Comments From vkassenbaev gmail com 2007-10-17 20:29 -------
>As you can see from my telnet session, qmail does accept authentication and print those AUTH=... lines
Was your telnet connection opened from the same host from which you authenticated via pop? Because, as you know, when smtp-after-pop authorization method enabled, qmail remebers the host after pop authetication so user from this host can use qmail as open relay without autentication during poplock time. If so, are you sure that you were in "poplock window" when opening that telnet conection?
Yes, seems like kmail is right when it throws the error. According to rfc server must return 503 error only when using AUTH command after it was used once and autentication was successfull. kmail uses AUTH first time, so it doesn't expect this error.
As I can see, thunderbird even doesn't try to autenticate (doesn't use AUTH command) if it's not needed:
Auth is not needed (pop auth has been used before, and we are in "poplock window"):
--------------------------------------------------------------------
<...>
[pid 1444] write(1, "220 ##SERVER_HOSTNAME## ESMTP\r\n", 31) = 31
[pid 1444] select(1, [0], NULL, NULL, {1200, 0}) = 1 (in [0], left {1199, 964000})
[pid 1444] read(0, "EHLO ##LOCAL_HOSTNAME##\r\n", 1024) = 25
[pid 1444] select(2, NULL, [1], NULL, {1200, 0}) = 1 (out [1], left {1200, 0})
[pid 1444] write(1, "250-##SERVER_HOSTNAME##\r\n250-STARTTLS\r\n250-PIPELINING\r\n250 8BITMIME\r\n", 69) = 69
[pid 1444] select(1, [0], NULL, NULL, {1200, 0}) = 1 (in [0], left {1199, 960000})
[pid 1444] read(0, "MAIL FROM:<##SENDER##>\r\n", 1024) = 39
[pid 1444] select(2, NULL, [1], NULL, {1200, 0}) = 1 (out [1], left {1200, 0})
[pid 1444] write(1, "250 ok\r\n", 8) = 8
[pid 1444] select(1, [0], NULL, NULL, {1200, 0}) = 1 (in [0], left {1199, 966000})
[pid 1444] read(0, "RCPT TO:<##RECIPIENT##>\r\n", 1024) = 32
<...>
--------------------------------------------------------------------
Auth is needed:
--------------------------------------------------------------------
<...>
[pid 1497] write(1, "220 ##SERVER_HOSTNAME## ESMTP\r\n", 31) = 31
[pid 1497] select(1, [0], NULL, NULL, {1200, 0}) = 1 (in [0], left {1199, 965000})
[pid 1497] read(0, "EHLO ##LOCAL_HOSTNAME##\r\n", 1024) = 25
[pid 1497] select(2, NULL, [1], NULL, {1200, 0}) = 1 (out [1], left {1200, 0})
[pid 1497] write(1, "250-##SERVER_HOSTNAME##\r\n250-AUTH=LOGIN CRAM-MD5 PLAIN\r\n250-AUTH LOGIN CRAM-MD5 PLAIN\r\n250-STARTTLS\r\n250-PIPELINING\r\n250 8BITMIME\r\n", 131) = 131
[pid 1497] select(1, [0], NULL, NULL, {1200, 0}) = 1 (in [0], left {1199, 967000})
[pid 1497] read(0, "AUTH CRAM-MD5\r\n", 1024) = 15
<...>
--------------------------------------------------------------------
I think the kmail behaviour should be similar.
More information about the Kdepim-bugs
mailing list