On Fri, Mar 23, 2012 at 11:33 AM, francis picabia <fpica...@gmail.com> wrote:
> We have a difficulty delivering to a site running a barracuda appliance.
> I can email them from a gmail account, or via a telnet session,
> but not via postfix on our SMTP gateway. I've contacted the remote
> site from my gmail to discuss it but no progress so far.
>
> I have the default pix conf settings and we are running postfix 2.8.6
>
> In the logs we see it times out.
>
> Mar 21 15:01:30 thabit postfix-internal/smtpd[9296]: 6E7211F44DD:
> client=localhost[127.0.0.1]
> Mar 21 15:01:30 thabit postfix-internal/cleanup[9274]: 6E7211F44DD:
> message-id=<moodlepost153...@acorn.mydomain.ca>
> Mar 21 15:01:30 thabit postfix-internal/qmgr[28954]: 6E7211F44DD:
> from=<lms.ad...@mydomain.ca>, size=6449, nrcpt=1 (queue active)
> Mar 21 15:01:30 thabit postfix-internal/lmtp[9288]: 2A0561F44EE:
> to=<usern...@theirdomain.ca>, relay=127.0.0.1[127.0.0.1]:10026,
> delay=189085, delays=189084/0.03/0.01/0.3, dsn=2.0.0, status=sent (250
> 2.0.0 Ok, id=09101-06, from MTA([127.0.0.1]:10027): 250 2.0.0 Ok:
> queued as 6E7211F44DD)
> Mar 21 15:01:30 thabit postfix-internal/smtp[9198]: 6E7211F44DD:
> enabling PIX workarounds: disable_esmtp delay_dotcrlf for
> barracuda1.theirdomain.ca[24.224.X.Y]:25
> Mar 21 15:11:30 thabit postfix-internal/smtp[9198]: 6E7211F44DD:
> conversation with barracuda1.theirdomain.ca[24.224.X.Y] timed out
> while sending end of data -- message may be sent more than once
>
> I saw an older article about delivering to a barracuda gateway and
> tried the solution with
>
> smtp_discard_ehlo_keyword_address_maps =
> hash:/etc/postfix-internal/smtp_discard_ehlo
>
> and that file containing:
>
> 24.224.X.Y      pipelining
>
> This setting made no difference in the result and error.
>
> I wonder if the pix settings are not the right fit for this case?
>
> Is there a method to not use the pix workarounds for a single destination?

I read another old thread about Cisco firewalls associated with the
pix workaround.

When I telnet to the remote site, the response shows:

220 ************************************************************

Is this a sign of the Cisco firewall or could it be something else masked?

Should I look at suppressing dkim headers?

Reply via email to