On 08/19/12 22:16, James wrote: > On 08/19/12 18:44, Wietse Venema wrote: >> James: >>> # testsaslauthd -u rjl -p >>> works fine. >>> >>> I don't think postfix is even calling saslauthd. >>> AUTH PLAIN base64string (obtained by doing perl -MMIME::Base64 -e 'print >>> encode_base64("rjl\0rjl\0passwd");') >>> It's saying authentication failed: authentication failure but there is >>> nothing shown on the screen I did saslauthd -d -a pam >> >> Please follow instructions in http://www.postfix.org/SASL_README.html. >> Then, run the "saslfinger" command as described there, and report >> the output. >> >> Wietse >> > I fixed it. > I had the username but not the @domain > It would've been nice if postfix gave a specific error. :-)
Thunderbird was submitting but isn't anymore, I could never use AUTH PLAIN from a telnet. saslfinger is not documented on http://www.postfix.org/SASL_README.html but I found instructions. I start saslauthd with debugging but it is not printing anything when I do AUTH PLAIN (or submit via Thunderbird). # saslauthd -d -a pam saslauthd[13078] :main : num_procs : 5 saslauthd[13078] :main : mech_option: NULL saslauthd[13078] :main : run_path : /var/run/saslauthd saslauthd[13078] :main : auth_mech : pam saslauthd[13078] :ipc_init : using accept lock file: /var/run/saslauthd/mux.accept saslauthd[13078] :detach_tty : master pid is: 0 saslauthd[13078] :ipc_init : listening on socket: /var/run/saslauthd/mux saslauthd[13078] :main : using process model saslauthd[13078] :have_baby : forked child: 13079 saslauthd[13078] :have_baby : forked child: 13080 saslauthd[13078] :have_baby : forked child: 13081 saslauthd[13078] :have_baby : forked child: 13082 saslauthd[13078] :get_accept_lock : acquired accept lock # saslfinger -s saslfinger - postfix Cyrus sasl configuration Mon Aug 20 01:15:52 EDT 2012 version: 1.0.4 mode: server-side SMTP AUTH -- basics -- Postfix: 2.9.3 System: Ubuntu 12.04 LTS \n \l -- smtpd is linked to -- libsasl2.so.2 => /usr/lib/i386-linux-gnu/libsasl2.so.2 (0xb7697000) -- active SMTP AUTH and TLS parameters for smtpd -- smtpd_sasl_auth_enable = yes smtpd_sasl_local_domain = $myhostname smtpd_sasl_path = /var/run/saslauthd smtpd_sasl_security_options = noanonymous smtpd_sasl_type = cyrus -- listing of /usr/lib/sasl2 -- total 24 drwxr-xr-x 2 root root 4096 May 26 13:12 . drwxr-xr-x 67 root root 16384 Aug 16 22:16 .. -rw-r--r-- 1 root root 1 May 4 00:17 berkeley_db.txt -- listing of /etc/postfix/sasl -- total 12 drwxr-xr-x 2 root root 4096 Aug 19 03:21 . drwxr-xr-x 3 root root 4096 Aug 20 01:14 .. -rw-r--r-- 1 root root 49 Aug 19 01:20 smtpd.conf -- content of /etc/postfix/sasl/smtpd.conf -- pwcheck_method: saslauthd mech_list: PLAIN LOGIN -- content of /etc/postfix/sasl/smtpd.conf -- pwcheck_method: saslauthd mech_list: PLAIN LOGIN -- active services in /etc/postfix/master.cf -- # service type private unpriv chroot wakeup maxproc command + args # (yes) (yes) (yes) (never) (100) smtp inet n - - - - smtpd -o content_filter=spamassassin smtps inet n - - - - smtpd -o smtpd_sasl_auth_enable=yes -o smtpd_client_restrictions=permit_sasl_authenticated,reject -o milter_macro_daemon_name=ORIGINATING pickup fifo n - - 60 1 pickup cleanup unix n - - - 0 cleanup qmgr fifo n - n 300 1 qmgr tlsmgr unix - - - 1000? 1 tlsmgr rewrite unix - - - - - trivial-rewrite bounce unix - - - - 0 bounce defer unix - - - - 0 bounce trace unix - - - - 0 bounce verify unix - - - - 1 verify flush unix n - - 1000? 0 flush proxymap unix - - n - - proxymap proxywrite unix - - n - 1 proxymap smtp unix - - - - - smtp relay unix - - - - - smtp -o smtp_fallback_relay= showq unix n - - - - showq error unix - - - - - error retry unix - - - - - error discard unix - - - - - discard local unix - n n - - local virtual unix - n n - - virtual lmtp unix - - - - - lmtp anvil unix - - - - 1 anvil scache unix - - - - 1 scache maildrop unix - n n - - pipe flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) ifmail unix - n n - - pipe flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) bsmtp unix - n n - - pipe flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient scalemail-backend unix - n n - 2 pipe flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} mailman unix - n n - - pipe flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py ${nexthop} ${user} spamassassin unix - n n - - pipe user=spamd argv=/usr/bin/spamc -f -e /usr/sbin/sendmail -oi -f ${sender} ${recipient} -- mechanisms on localhost -- 250-AUTH DIGEST-MD5 CRAM-MD5 NTLM LOGIN PLAIN -- end of saslfinger output --