On 1/30/2014 9:34 AM, Noel Jones wrote: > > > I changed the level to 2. I am not seeing what you suggest but > > there is one additional line initializing TLS engine. Here is > > the output: > > > ... useless debug output deleted > > > > To repeat my previous question, is there no way to force a > > login regardless of the EHLO responses? > > > No, there is no way to force a login if the server doesn't offer > AUTH. Even if you did force it, it's highly unlikely the server > would accept it, and it wouldn't be safe since you're not > encrypting your connection -- no encryption is the root of the > problem. > > Your TLS is screwed up. Show "postconf -n" output. > > > > -- Noel Jones > Thanks for your patience but why wouldn't the working server also be failing if TLS was indeed screwed up?
Here is the postconf -n output: alias_database = hash:/etc/postfix/aliases alias_maps = hash:/etc/postfix/aliases, hash:/var/lib/mailman/data/aliases command_directory = /usr/sbin config_directory = /etc/postfix daemon_directory = /usr/libexec/postfix data_directory = /var/lib/postfix debug_peer_level = 2 debug_peer_list = smtp.att.yahoo.com html_directory = no inet_interfaces = all inet_protocols = all mail_owner = postfix mailq_path = /usr/bin/mailq.postfix manpage_directory = /usr/share/man message_size_limit = 51200000 mydestination = $myhostname, localhost.$mydomain, localhost mynetworks_style = host newaliases_path = /usr/bin/newaliases.postfix queue_directory = /var/spool/postfix readme_directory = /usr/share/doc/postfix-2.6.6/README_FILES relayhost = [smtp.att.yahoo.com]:587 sample_directory = /etc/postfix sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay manpage_directory = /usr/share/man message_size_limit = 51200000 mydestination = $myhostname, localhost.$mydomain, localhost mynetworks_style = host newaliases_path = /usr/bin/newaliases.postfix queue_directory = /var/spool/postfix readme_directory = /usr/share/doc/postfix-2.6.6/README_FILES relayhost = [smtp.att.yahoo.com]:587 sample_directory = /etc/postfix sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay sendmail_path = /usr/sbin/sendmail.postfix setgid_group = postdrop smtp_generic_maps = hash:/etc/postfix/generic smtp_helo_name = home.bellsouth.net smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_security_options = smtp_sender_dependent_authentication = yes smtp_tls_loglevel = 2 smtp_tls_policy_maps = hash:/etc/postfix/tls_policy smtpd_banner = $myhostname ESMTP $mail_name ($mail_version) (CentOS Linux) syslog_name = postfix unknown_local_recipient_reject_code = 550 In case it is needed here is the content of tls_policy: in.mailjet.com may smtp.att.yahoo.com:587 encrypt MailJet is the server that is working (Note: until this thread the entry for yahoo was the same).
signature.asc
Description: OpenPGP digital signature