Re: [toaster] Debian Unstable + TLS patch
you need to create a dummy package for qmail that provides mail-transport-agent for satisfy dependencies, purge exim and install it. El Viernes, 27 de Agosto de 2004 04:00, Big Chiz escribió: > i guess debian expects an mta to be inplace so removing/uninstall the > default exim will not suffice. i think you have to symlink sendmail > and just disable the exim startup script or check google for debian > equivs to replace exim and provide dummy. > > > Thanks for the quick response!! Any other gotcha's I may need to know > > as far as packages or debian specific issues? > > > > Thanks again! > > Christopher Davis
[toaster] Email to verizon.net
Recently we have been noticing that most mail going to verizon.net bounces back to the sender with the following info. I've done some searching on the internet and it appears Verizon is actually not accepting mail until it does a vrfy on the email address that the message is coming from. With qmail vrfy appears to send back 252 send some mail, i'll try my best. So I'm assuming Verizon is seeing that as a bad account. Any suggestions? Thanks Andy Email bounce messages follows. <[EMAIL PROTECTED]>: Connected to 206.46.170.12 but sender was rejected. Remote host said: 550 You are not allowed to send mail:sc024pub.verizon.net
Re: Re[2]: [toaster] smtp-auth problems in freebsd [update]
On Aug 27, 2004, at 8:57 AM, Erwin Hoffmann wrote: No. Thats wrong. The Auth patch skips the auth-id and uses the user-id and the password: You're right -- I took a closer look. I also went back to the original message that showed the error was "501 malformed auth input (#5.5.4)". So, it had nothing to do with the authentication failing. It makes me wonder what version of the SMTP AUTH patch the original poster is using, and whether any errors with base64 decoding of auth plain were fixed in recent releases. -- Tom Collins - [EMAIL PROTECTED] QmailAdmin: http://qmailadmin.sf.net/ Vpopmail: http://vpopmail.sf.net/ Info on the Sniffter hand-held Network Tester: http://sniffter.com/