Bienvenido(a) a Alcance Libre 10/09/2025, 08:57

Alcance Libre Foros

 Índice del foro > Todo acerca de Linux > Redes y Servidores New Topic Post Reply
 Dovecot 2 y outlook express
Tópico anterior Tópico siguiente
   
gontzal
 20/07/13 11:42 (Leído 2,591 veces)  

Miembro regular

Estado: desconectado
Forum User

Identificado: 07/05/08
Mensajes: 75
Buenas tardes.

Tengo configurado centos 6.4 con sendmail y dovecot2 todo funciona correctamente, pero los usuarios de outlook express no pueden enviar correo, el mesaje de error es

dovecot: pop3-login: Disconnected (no auth attempts): rip=172.26.1.1, lip=192.168.0.250
dovecot: pop3-login: Disconnected (no auth attempts): rip=172.26.1.1, lip=192.168.0.250

Una ayudita por favor

gracias
 
Profile Email
 Quote
Joel Barrios Dueñas
 20/07/13 04:10  

Admin

Estado: desconectado
Site Admin

Identificado: 17/02/07
Mensajes: 1761
Localización:Mexico
Si no pueden enviar, el problema no está en dovecot. Está en el MTA (sendmail).

Lo que publicas sólo indica que hubo conexiones POP3 pero sin intento de autenticar. Nada que ver con el envío de correo.

¿Configuraste Sendmail exactamente como se muestra en el manual de este sitio???

¿Configurate el soporte para SSL/TLS?

Outlook Express carece de soporte para TLS, sólo tiene soporte para SSL. Es decir, debe usar los puertos 465 (smtps), 993 (imaps) o 995 (pop3s).

Por favor, publica el contenido de /etc/mail/sendmail.mc, /etc/sysconfig/saslauthd y /etc/mail/access.
 
Profile Email Website
 Quote
gontzal
 21/07/13 02:35  

Miembro regular

Estado: desconectado
Forum User

Identificado: 07/05/08
Mensajes: 75
sendmail.mc

PHP Formatted Code
-------------------------

divert(-1)dnl
dnl #
dnl # This is the sendmail macro config file for m4. If you make changes to
dnl # /etc/mail/sendmail.mc, you will need to regenerate the
dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
dnl # installed and then performing a
dnl #
dnl #     make -C /etc/mail
dnl #
include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
VERSIONID(`setup for Red Hat Linux'
)dnl
OSTYPE(`linux')dnl
dnl #
dnl # default logging level is 9, you might want to set it higher to
dnl # debug the configuration
dnl #
dnl define(`confLOG_LEVEL'
, `9')dnl
dnl #
dnl # Uncomment and edit the following line if your outgoing mail needs to
dnl # be sent out through an external mail server:
dnl #
dnl define(`SMART_HOST'
,`smtp.your.provider')
dnl #
define(`confSMTP_LOGIN_MSG'
,`$j ; $b')dnl
define(`confDEF_USER_ID'
,``8:12'')dnl
dnl define(`confAUTO_REBUILD')dnl
define(`confTO_CONNECT'
, `1m')dnl
define(`confTRY_NULL_MX_LIST'
,true)dnl
define(`confDONT_PROBE_INTERFACES',true)dnl
define(`PROCMAIL_MAILER_PATH'
,`/usr/bin/procmail')dnl
define(`ALIAS_FILE'
, `/etc/aliases')dnl
define(`STATUS_FILE'
, `/var/log/mail/statistics')dnl
define(`UUCP_MAILER_MAX'
, `2000000')dnl
define(`confUSERDB_SPEC'
, `/etc/mail/userdb.db')dnl
dnl # Cambio de flags a goaway para obligar la peticion de HELO
dnl # original
dnl #
dnl # define(`confPRIVACY_FLAGS'
, `authwarnings,novrfy,noexpn,restrictqrun')
dnl #
dnl # Cambio
define(`confPRIVACY_FLAGS'
, `goaway')dnl
dnl #
define(`confAUTH_OPTIONS'
, `A')dnl
dnl #
dnl # The following allows relaying if the user authenticates, and disallows
dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
dnl #
dnl define(`confAUTH_OPTIONS'
, `A p')dnl
dnl #
dnl # PLAIN is the preferred plaintext authentication method and used by
dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
dnl # use LOGIN. Other mechanisms should be used if the connection is not
dnl # guaranteed secure.
dnl # Please remember that saslauthd needs to be running for AUTH.
dnl #
TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN'
)dnl
define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
dnl #
dnl # Rudimentary information on creating certificates for sendmail TLS:
dnl #     cd /usr/share/ssl/certs; make sendmail.pem
dnl # Complete usage:
dnl #     make -C /usr/share/ssl/certs usage
dnl #
define(`confCACERT_PATH',`/etc/pki/tls/certs')dnl
define(`confCACERT',`/etc/pki/tls/certs/ca-bundle.crt')dnl
define(`confSERVER_CERT',`/etc/pki/tls/certs/midominio.com.crt')dnl
define(`confSERVER_KEY',`/etc/pki/tls/private/midominio.com.key')dnl
dnl #
dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
dnl # slapd, which requires the file to be readble by group ldap
dnl #
dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl
dnl #
dnl define(`confTO_QUEUEWARN', `4h')dnl
dnl define(`confTO_QUEUERETURN', `5d')dnl
dnl define(`confQUEUE_LA', `12')dnl
dnl define(`confREFUSE_LA', `18')dnl
define(`confTO_IDENT', `0')dnl
dnl # Establece el numero maximo de destinatarios de un mensaje a 15
dnl #
define(`confMAX_RCPTS_PER_MESSAGE', `20')dnl
dnl #
dnl # Establece a 2 segundos el tiempo de letargo por cada destinatario
dnl # rechazado por sobrepasar el limite de destinatarios permitidos
dnl #
define(`confBAD_RCPT_THOTTLE', `2')dnl
dnl #
dnl # Limita el tamaño maximo de la cabecera de un mensaje a 16 Ks
dnl #
define(`confMAX_HEADERS_LENGTH', `16348')dnl
dnl #
dnl # Limita el tamaño maximo de un mensaje a 20 MB
dnl #
define(`confMAX_MESSAGE_SIZE', `20971520')dnl
dnl #
dnl FEATURE(delay_checks)dnl
FEATURE(`no_default_msa',`dnl')dnl
FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
FEATURE(redirect)dnl
FEATURE(always_add_domain)dnl
FEATURE(use_cw_file)dnl
FEATURE(use_ct_file)dnl
dnl #
dnl # The following limits the number of processes sendmail can fork to accept
dnl # incoming messages or process its message queues to 12.) sendmail refuses
dnl # to accept connections once it has reached its quota of child processes.
dnl #
define(`confMAX_DAEMON_CHILDREN', 12)dnl
dnl #
dnl # Limits the number of new connections per second. This caps the overhead
dnl # incurred due to forking new sendmail processes. May be useful against
dnl # DoS attacks or barrages of spam. (As mentioned below, a per-IP address
dnl # limit would be useful but is not available as an option at this writing.)
dnl #
define(`confCONNECTION_RATE_THROTTLE'
, 3)dnl
dnl #
dnl # The -t option will retry delivery if e.g. the user runs over his quota.
dnl #
FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl
FEATURE(`blacklist_recipients')dnl
EXPOSED_USER(`root'
)dnl
dnl #
dnl # The following causes sendmail to only listen on the IPv4 loopback address
dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
dnl # address restriction to accept email from the internet or intranet.
dnl #
dnl DAEMON_OPTIONS(`Port=smtp,Addr=127.0.0.1, Name=MTA')dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 587 for
dnl # mail from MUAs that authenticate. Roaming users who can'
t reach their
dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
dnl # this useful.
dnl #
dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 465, but
dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can'
t
dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps
dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
dnl #
dnl # For this to work your OpenSSL certificates must be configured.
dnl #
dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
dnl #
dnl # The following causes sendmail to additionally listen on the IPv6 loopback
dnl # device. Remove the loopback address restriction listen to the network.
dnl #
dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6'
)dnl
dnl #
dnl # enable both ipv6 and ipv4 in sendmail:
dnl #
dnl DAEMON_OPTIONS(`Name=MTA-v4, Family=inet, Name=MTA-v6, Family=inet6')
dnl #
dnl # We strongly recommend not accepting unresolvable domains if you want to
dnl # protect yourself from spam. However, the laptop and users on computers
dnl # that do not have 24x7 DNS do need this.
dnl #
dnl FEATURE(`accept_unresolvable_domains'
)dnl
dnl #
FEATURE(`relay_based_on_MX')dnl
dnl #
dnl # Also accept email sent to "localhost.localdomain" as local email.
dnl #
LOCAL_DOMAIN(`localhost.localdomain'
)dnl
dnl #
dnl # The following example makes mail from this host and any additional
dnl # specified domains appear to be sent from mydomain.com
dnl #
dnl MASQUERADE_AS(`mydomain.com')dnl
dnl #
dnl # masquerade not just the headers, but the envelope as well
dnl #
dnl FEATURE(masquerade_envelope)dnl
dnl #
dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
dnl #
dnl FEATURE(masquerade_entire_domain)dnl
dnl #
dnl MASQUERADE_DOMAIN(localhost)dnl
dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
dnl FEATURE(dnsbl, `blackholes.mail-abuse.org'
, `Rechazado - vea http://www.mail-abuse.org/rbl/')dnl
dnl FEATURE(dnsbl, `dialups.mail-abuse.org', `Rechazado - vea http://www.mail-abuse.org/dul/')dnl
dnl FEATURE(dnsbl, `relays.mail-abuse.org', `Rechazado - vea http://work-rss.mail-abuse.org/rss/')dnl
dnl FEATURE(dnsbl, `sbl-xbl.spamhaus.org', `"550 Su IP esta en lista negra en Spamhaus - Por favor vea http://www.spamhaus.org/query/bl?ip=+"$&{client_addr}')dnl
dnl FEATURE(dnsbl, `bl.spamcop.net', `"550 Su IP esta en lista negra en SpamCOP - Por favor vea http://spamcop.net/bl.shtml?"$&{client_addr}')dnl
dnl FEATURE(dnsbl, `list.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?"$&{client_addr}')dnl
dnl FEATURE(dnsbl, `multihop.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?"$&{client_addr}')dnl
dnl FEATURE(dnsbl, `dnsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl
dnl FEATURE(dnsbl, `rhsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl
dnl FEATURE(dnsbl, `bl.csma.biz', `"550 Su IP esta en lista negra en CSMA - Por favor vea http://bl.csma.biz/cgi-bin/listing.cgi?ip="$&{client_addr}')dnl
dnl FEATURE(dnsbl, `dnsbl.antispam.or.id', `"550 Su IP esta en lista negra en ADNSBL - Por favor vea http://antispam.or.id/?ip="$&{client_addr}')dnl
dnl FEATURE(dnsbl, `blacklist.spambag.org', `"550 Su IP esta en lista negra en SPAMBAG - Por favor vea http://www.spambag.org/cgi-bin/spambag?query="$&{client_addr}')dnl
MAILER(smtp)dnl
MAILER(procmail)dnl
INPUT_MAIL_FILTER(`dkim-milter', `S=inet:8892@localhost')dnl

-------------------


Si activo DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s'Winkdnl el squirrelmail ya no funciona

access

PHP Formatted Code
----------------------

# Check the /usr/share/doc/sendmail/README.cf file for a description
# of the format of this file. (search for access_db in that file)
# The /usr/share/doc/sendmail/README.cf is part of the sendmail-doc
# package.
#
# by default we allow relaying from localhost...
Connect:localhost.localdomain           RELAY
Connect:localhost                       RELAY
Connect:127.0.0.1                       RELAY
Connect:midominio.com                   RELAY
Connect:222                             REJECT
Connect:220                             REJECT
Connect:221                             REJECT
Connect:219                             REJECT
Connect:218                             REJECT
Connect:211                             REJECT
Connect:210                             REJECT
Connect:203                             REJECT
Connect:202                             REJECT
Connect:140.109                         REJECT
Connect:133                             REJECT
Connect:61                              REJECT
Connect:60                              REJECT
Connect:59                              REJECT
Connect:58                              REJECT
Connect:boletxu@yahoo.com               REJECT
Connect:hotmail.com     DISCARD

--------------------

saslauthd
PHP Formatted Code
--------------------

# Directory in which to place saslauthd's listening socket, pid file, and so
# on.  This directory must already exist.
SOCKETDIR=/var/run/saslauthd

# Mechanism to use when checking passwords.  Run "saslauthd -v" to get a list
# of which mechanism your installation was compiled with the ablity to use.
MECH=pam

# Options sent to the saslauthd. If the MECH is other than "pam" uncomment the next line.
# DAEMONOPTS=--user saslauth

# Additional flags to pass to saslauthd on the command line.  See saslauthd(8)
# for the list of accepted flags.
FLAGS=

--------------------
 
Profile Email
 Quote
gontzal
 21/07/13 02:20  

Miembro regular

Estado: desconectado
Forum User

Identificado: 07/05/08
Mensajes: 75
Ya he conseguido que funcione, pero las aplicaciones que usaban el puerto 25 han dejado de funcionar, como la alerta de virus de avast.

NO existe alguna manera de que pueda funcionar como funcionaba antes con el centos 5?
 
Profile Email
 Quote
Joel Barrios Dueñas
 22/07/13 11:49  

Admin

Estado: desconectado
Site Admin

Identificado: 17/02/07
Mensajes: 1761
Localización:Mexico
Habilita las siguientes líneas, que se supone deber?ias estar descomentadas...

PHP Formatted Code
DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea'
)dnl
DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')


La primera define que trabajas por puerto 25 como MTA, por cualquier interfaz (sólo servidores se conectan aquí)
La segunda habilita el puerto 587 para MSA (TODOS deben usar este puerto para enviar).
La tercera habilita el puerto 465 (SSL) para clientes de correo viejos (Outlook Express).

Sendmail en CentOS 6 funciona exactamente igual que en CentOS 5.
 
Profile Email Website
 Quote
Contenido generado en: 0.29 segundos New Topic Post Reply
 Todas las horas son CST. Hora actual 08:57 .
Tópico normal Tópico normal
Tópico Pegado Tópico Pegado
Tópico bloqueado Tópico bloqueado
Mensaje Nuevo Mensaje Nuevo
Tópico pegado con nuevo mensaje Tópico pegado con nuevo mensaje
Tópico bloqueado con nuevo mensaje Tópico bloqueado con nuevo mensaje
Ver mensajes anónimos 
Los usuarios anónimos pueden enviar 
Se permite HTML Filtrado 
Contenido censurado