-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A client with a new iPhone (not sure what model), attempts to setup
imap/smtp using starttls. As part of the setup, the iPhone apparently
probes the smtp server on port 587 with an SSL handshake:



Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: rejecting commands
from 97-93-80-251.static.rvsd.ca.charter.com [97.93.80.251] due to pre-
greeting traffic after 0 seconds

Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: --- 554 ns1.five-
ten-sg.com ESMTP not accepting messages

Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: <-- \026\003\001

Jul 29 21:31:34 ns1 sendmail[20641]: t6U4VYQL020641: Sending
"\026\003\001" to Milter


...

Jul 29 21:35:34 ns1 sendmail[20641]: t6U4VYQL020641: lost input channel
from 97-93-80-251.static.rvsd.ca.charter.com [97.93.80.251] to MSA after
startup


Perhaps public shaming will cause Apple to change that behavior. I don't
think there is any mail server that will respond on port 587 to an
unsolicited SSL handshake.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEARECAAYFAlW6hxAACgkQL6j7milTFsHkkACcCAD+0EV/nO1N5PSLZyI1uS8L
lakAn3qLM8ZqAUTS/ZzHyR3lPbX3pKoA
=hcQH
-----END PGP SIGNATURE-----



_______________________________________________
mailop mailing list
mailop@mailop.org
http://chilli.nosignal.org/mailman/listinfo/mailop

Reply via email to