-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 A client with a new iPhone (not sure what model), attempts to setup imap/smtp using starttls. As part of the setup, the iPhone apparently probes the smtp server on port 587 with an SSL handshake:
Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: rejecting commands from 97-93-80-251.static.rvsd.ca.charter.com [97.93.80.251] due to pre- greeting traffic after 0 seconds Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: --- 554 ns1.five- ten-sg.com ESMTP not accepting messages Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: <-- \026\003\001 Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: Sending "\026\003\001" to Milter ... Jul 29 21:35:34 ns1 sendmail[20641]: t6U4VYQL020641: lost input channel from 97-93-80-251.static.rvsd.ca.charter.com [97.93.80.251] to MSA after startup Perhaps public shaming will cause Apple to change that behavior. I don't think there is any mail server that will respond on port 587 to an unsolicited SSL handshake. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iEYEARECAAYFAlW6hxAACgkQL6j7milTFsHkkACcCAD+0EV/nO1N5PSLZyI1uS8L lakAn3qLM8ZqAUTS/ZzHyR3lPbX3pKoA =hcQH -----END PGP SIGNATURE----- _______________________________________________ mailop mailing list mailop@mailop.org http://chilli.nosignal.org/mailman/listinfo/mailop