On 1/30/2014 9:34 AM, Noel Jones wrote:
>
> > I changed the level to 2. I am not seeing what you suggest but
> > there is one additional line initializing TLS engine. Here is
> > the output:
>
>
> ... useless debug output deleted
>
>
> > To repeat my previous question, is there no way to force a
> > login regardless of the EHLO responses?
>
>
> No, there is no way to force a login if the server doesn't offer
> AUTH.  Even if you did force it, it's highly unlikely the server
> would accept it, and it wouldn't be safe since you're not
> encrypting your connection -- no encryption is the root of the
> problem.
>
> Your TLS is screwed up. Show "postconf -n" output.
>
>
>
>   -- Noel Jones
>
Thanks for your patience but why wouldn't the working server also be
failing if TLS was indeed screwed up?

Here is the postconf -n output:

alias_database = hash:/etc/postfix/aliases
alias_maps = hash:/etc/postfix/aliases, hash:/var/lib/mailman/data/aliases
command_directory = /usr/sbin
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
data_directory = /var/lib/postfix
debug_peer_level = 2
debug_peer_list = smtp.att.yahoo.com
html_directory = no
inet_interfaces = all
inet_protocols = all
mail_owner = postfix
mailq_path = /usr/bin/mailq.postfix
manpage_directory = /usr/share/man
message_size_limit = 51200000
mydestination = $myhostname, localhost.$mydomain, localhost
mynetworks_style = host
newaliases_path = /usr/bin/newaliases.postfix
queue_directory = /var/spool/postfix
readme_directory = /usr/share/doc/postfix-2.6.6/README_FILES
relayhost = [smtp.att.yahoo.com]:587
sample_directory = /etc/postfix
sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay
manpage_directory = /usr/share/man
message_size_limit = 51200000
mydestination = $myhostname, localhost.$mydomain, localhost
mynetworks_style = host
newaliases_path = /usr/bin/newaliases.postfix
queue_directory = /var/spool/postfix
readme_directory = /usr/share/doc/postfix-2.6.6/README_FILES
relayhost = [smtp.att.yahoo.com]:587
sample_directory = /etc/postfix
sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay
sendmail_path = /usr/sbin/sendmail.postfix
setgid_group = postdrop
smtp_generic_maps = hash:/etc/postfix/generic
smtp_helo_name = home.bellsouth.net
smtp_sasl_auth_enable = yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
smtp_sasl_security_options =
smtp_sender_dependent_authentication = yes
smtp_tls_loglevel = 2
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
smtpd_banner = $myhostname ESMTP $mail_name ($mail_version) (CentOS Linux)
syslog_name = postfix
unknown_local_recipient_reject_code = 550

In case it is needed here is the content of tls_policy:

in.mailjet.com  may
smtp.att.yahoo.com:587  encrypt


MailJet is the server that is working (Note: until this thread the entry
for yahoo was the same).

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to