On 08/19/12 22:16, James wrote:
> On 08/19/12 18:44, Wietse Venema wrote:
>> James:
>>> # testsaslauthd -u rjl -p
>>> works fine.
>>>
>>> I don't think postfix is even calling saslauthd.
>>> AUTH PLAIN base64string (obtained by doing perl -MMIME::Base64 -e 'print 
>>> encode_base64("rjl\0rjl\0passwd");')
>>> It's saying authentication failed: authentication failure but there is 
>>> nothing shown on the screen I did saslauthd -d -a pam
>>
>> Please follow instructions in http://www.postfix.org/SASL_README.html.
>> Then, run the "saslfinger" command as described there, and report
>> the output.
>>
>>      Wietse
>>
> I fixed it.
> I had the username but not the @domain
> It would've been nice if postfix gave a specific error. :-)

Thunderbird was submitting but isn't anymore, I could never use AUTH PLAIN from 
a telnet.

saslfinger is not documented on http://www.postfix.org/SASL_README.html but I 
found instructions.

I start saslauthd with debugging but it is not printing anything when I do AUTH 
PLAIN (or submit via Thunderbird).


# saslauthd -d -a pam
saslauthd[13078] :main            : num_procs  : 5
saslauthd[13078] :main            : mech_option: NULL
saslauthd[13078] :main            : run_path   : /var/run/saslauthd
saslauthd[13078] :main            : auth_mech  : pam
saslauthd[13078] :ipc_init        : using accept lock file: 
/var/run/saslauthd/mux.accept
saslauthd[13078] :detach_tty      : master pid is: 0
saslauthd[13078] :ipc_init        : listening on socket: /var/run/saslauthd/mux
saslauthd[13078] :main            : using process model
saslauthd[13078] :have_baby       : forked child: 13079
saslauthd[13078] :have_baby       : forked child: 13080
saslauthd[13078] :have_baby       : forked child: 13081
saslauthd[13078] :have_baby       : forked child: 13082
saslauthd[13078] :get_accept_lock : acquired accept lock


# saslfinger -s
saslfinger - postfix Cyrus sasl configuration Mon Aug 20 01:15:52 EDT 2012
version: 1.0.4
mode: server-side SMTP AUTH

-- basics --
Postfix: 2.9.3
System: Ubuntu 12.04 LTS \n \l

-- smtpd is linked to --
        libsasl2.so.2 => /usr/lib/i386-linux-gnu/libsasl2.so.2 (0xb7697000)

-- active SMTP AUTH and TLS parameters for smtpd --
smtpd_sasl_auth_enable = yes
smtpd_sasl_local_domain = $myhostname
smtpd_sasl_path = /var/run/saslauthd
smtpd_sasl_security_options = noanonymous
smtpd_sasl_type = cyrus


-- listing of /usr/lib/sasl2 --
total 24
drwxr-xr-x  2 root root  4096 May 26 13:12 .
drwxr-xr-x 67 root root 16384 Aug 16 22:16 ..
-rw-r--r--  1 root root     1 May  4 00:17 berkeley_db.txt

-- listing of /etc/postfix/sasl --
total 12
drwxr-xr-x 2 root root 4096 Aug 19 03:21 .
drwxr-xr-x 3 root root 4096 Aug 20 01:14 ..
-rw-r--r-- 1 root root   49 Aug 19 01:20 smtpd.conf




-- content of /etc/postfix/sasl/smtpd.conf --
pwcheck_method: saslauthd
mech_list: PLAIN LOGIN

-- content of /etc/postfix/sasl/smtpd.conf --
pwcheck_method: saslauthd
mech_list: PLAIN LOGIN


-- active services in /etc/postfix/master.cf --
# service type  private unpriv  chroot  wakeup  maxproc command + args
#               (yes)   (yes)   (yes)   (never) (100)

smtp      inet  n       -       -       -       -       smtpd
        -o content_filter=spamassassin
smtps     inet  n       -       -       -       -       smtpd
   -o smtpd_sasl_auth_enable=yes
   -o smtpd_client_restrictions=permit_sasl_authenticated,reject
   -o milter_macro_daemon_name=ORIGINATING
pickup    fifo  n       -       -       60      1       pickup
cleanup   unix  n       -       -       -       0       cleanup
qmgr      fifo  n       -       n       300     1       qmgr
tlsmgr    unix  -       -       -       1000?   1       tlsmgr
rewrite   unix  -       -       -       -       -       trivial-rewrite
bounce    unix  -       -       -       -       0       bounce
defer     unix  -       -       -       -       0       bounce
trace     unix  -       -       -       -       0       bounce
verify    unix  -       -       -       -       1       verify
flush     unix  n       -       -       1000?   0       flush
proxymap  unix  -       -       n       -       -       proxymap
proxywrite unix -       -       n       -       1       proxymap
smtp      unix  -       -       -       -       -       smtp
relay     unix  -       -       -       -       -       smtp
        -o smtp_fallback_relay=
showq     unix  n       -       -       -       -       showq
error     unix  -       -       -       -       -       error
retry     unix  -       -       -       -       -       error
discard   unix  -       -       -       -       -       discard
local     unix  -       n       n       -       -       local
virtual   unix  -       n       n       -       -       virtual
lmtp      unix  -       -       -       -       -       lmtp
anvil     unix  -       -       -       -       1       anvil
scache    unix  -       -       -       -       1       scache
maildrop  unix  -       n       n       -       -       pipe
  flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
uucp      unix  -       n       n       -       -       pipe
  flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
ifmail    unix  -       n       n       -       -       pipe
  flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp     unix  -       n       n       -       -       pipe
  flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
scalemail-backend unix  -       n       n       -       2       pipe
  flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} 
${user} ${extension}
mailman   unix  -       n       n       -       -       pipe
  flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
  ${nexthop} ${user}

spamassassin unix -     n       n       -       -       pipe
        user=spamd argv=/usr/bin/spamc -f -e    
        /usr/sbin/sendmail -oi -f ${sender} ${recipient}

-- mechanisms on localhost --
250-AUTH DIGEST-MD5 CRAM-MD5 NTLM LOGIN PLAIN


-- end of saslfinger output --

Reply via email to