Bienvenido(a) a Alcance Libre 10/09/2025, 08:57
|
![]() |
Índice del foro > Todo acerca de Linux > Redes y Servidores |
![]() ![]() |
![]() |
gontzal |
|
|||||||
![]() ![]() ![]() ![]() ![]() Miembro regular Estado: desconectado ![]() Identificado: 07/05/08 Mensajes: 75 |
Buenas tardes.
Tengo configurado centos 6.4 con sendmail y dovecot2 todo funciona correctamente, pero los usuarios de outlook express no pueden enviar correo, el mesaje de error es dovecot: pop3-login: Disconnected (no auth attempts): rip=172.26.1.1, lip=192.168.0.250 dovecot: pop3-login: Disconnected (no auth attempts): rip=172.26.1.1, lip=192.168.0.250 Una ayudita por favor gracias |
|||||||
|
||||||||
Joel Barrios Dueñas |
|
|||||||
![]() ![]() ![]() ![]() ![]() Admin ![]() Estado: desconectado ![]() Identificado: 17/02/07 Mensajes: 1761 Localización:Mexico |
Si no pueden enviar, el problema no está en dovecot. Está en el MTA (sendmail).
Lo que publicas sólo indica que hubo conexiones POP3 pero sin intento de autenticar. Nada que ver con el envío de correo. ¿Configuraste Sendmail exactamente como se muestra en el manual de este sitio??? ¿Configurate el soporte para SSL/TLS? Outlook Express carece de soporte para TLS, sólo tiene soporte para SSL. Es decir, debe usar los puertos 465 (smtps), 993 (imaps) o 995 (pop3s). Por favor, publica el contenido de /etc/mail/sendmail.mc, /etc/sysconfig/saslauthd y /etc/mail/access. |
|||||||
|
||||||||
gontzal |
|
|||||||
![]() ![]() ![]() ![]() ![]() Miembro regular Estado: desconectado ![]() Identificado: 07/05/08 Mensajes: 75 |
sendmail.mc
PHP Formatted Code -------------------------divert(-1)dnl dnl # dnl # This is the sendmail macro config file for m4. If you make changes to dnl # /etc/mail/sendmail.mc, you will need to regenerate the dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is dnl # installed and then performing a dnl # dnl # make -C /etc/mail dnl # include(`/usr/share/sendmail-cf/m4/cf.m4')dnl VERSIONID(`setup for Red Hat Linux')dnl OSTYPE(`linux')dnl dnl # dnl # default logging level is 9, you might want to set it higher to dnl # debug the configuration dnl # dnl define(`confLOG_LEVEL', `9')dnl dnl # dnl # Uncomment and edit the following line if your outgoing mail needs to dnl # be sent out through an external mail server: dnl # dnl define(`SMART_HOST',`smtp.your.provider') dnl # define(`confSMTP_LOGIN_MSG',`$j ; $b')dnl define(`confDEF_USER_ID',``8:12'')dnl dnl define(`confAUTO_REBUILD')dnl define(`confTO_CONNECT', `1m')dnl define(`confTRY_NULL_MX_LIST',true)dnl define(`confDONT_PROBE_INTERFACES',true)dnl define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl define(`ALIAS_FILE', `/etc/aliases')dnl define(`STATUS_FILE', `/var/log/mail/statistics')dnl define(`UUCP_MAILER_MAX', `2000000')dnl define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl dnl # Cambio de flags a goaway para obligar la peticion de HELO dnl # original dnl # dnl # define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun') dnl # dnl # Cambio define(`confPRIVACY_FLAGS', `goaway')dnl dnl # define(`confAUTH_OPTIONS', `A')dnl dnl # dnl # The following allows relaying if the user authenticates, and disallows dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links dnl # dnl define(`confAUTH_OPTIONS', `A p')dnl dnl # dnl # PLAIN is the preferred plaintext authentication method and used by dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do dnl # use LOGIN. Other mechanisms should be used if the connection is not dnl # guaranteed secure. dnl # Please remember that saslauthd needs to be running for AUTH. dnl # TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl dnl # dnl # Rudimentary information on creating certificates for sendmail TLS: dnl # cd /usr/share/ssl/certs; make sendmail.pem dnl # Complete usage: dnl # make -C /usr/share/ssl/certs usage dnl # define(`confCACERT_PATH',`/etc/pki/tls/certs')dnl define(`confCACERT',`/etc/pki/tls/certs/ca-bundle.crt')dnl define(`confSERVER_CERT',`/etc/pki/tls/certs/midominio.com.crt')dnl define(`confSERVER_KEY',`/etc/pki/tls/private/midominio.com.key')dnl dnl # dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's dnl # slapd, which requires the file to be readble by group ldap dnl # dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl dnl # dnl define(`confTO_QUEUEWARN', `4h')dnl dnl define(`confTO_QUEUERETURN', `5d')dnl dnl define(`confQUEUE_LA', `12')dnl dnl define(`confREFUSE_LA', `18')dnl define(`confTO_IDENT', `0')dnl dnl # Establece el numero maximo de destinatarios de un mensaje a 15 dnl # define(`confMAX_RCPTS_PER_MESSAGE', `20')dnl dnl # dnl # Establece a 2 segundos el tiempo de letargo por cada destinatario dnl # rechazado por sobrepasar el limite de destinatarios permitidos dnl # define(`confBAD_RCPT_THOTTLE', `2')dnl dnl # dnl # Limita el tamaño maximo de la cabecera de un mensaje a 16 Ks dnl # define(`confMAX_HEADERS_LENGTH', `16348')dnl dnl # dnl # Limita el tamaño maximo de un mensaje a 20 MB dnl # define(`confMAX_MESSAGE_SIZE', `20971520')dnl dnl # dnl FEATURE(delay_checks)dnl FEATURE(`no_default_msa',`dnl')dnl FEATURE(`smrsh',`/usr/sbin/smrsh')dnl FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl FEATURE(redirect)dnl FEATURE(always_add_domain)dnl FEATURE(use_cw_file)dnl FEATURE(use_ct_file)dnl dnl # dnl # The following limits the number of processes sendmail can fork to accept dnl # incoming messages or process its message queues to 12.) sendmail refuses dnl # to accept connections once it has reached its quota of child processes. dnl # define(`confMAX_DAEMON_CHILDREN', 12)dnl dnl # dnl # Limits the number of new connections per second. This caps the overhead dnl # incurred due to forking new sendmail processes. May be useful against dnl # DoS attacks or barrages of spam. (As mentioned below, a per-IP address dnl # limit would be useful but is not available as an option at this writing.) dnl # define(`confCONNECTION_RATE_THROTTLE', 3)dnl dnl # dnl # The -t option will retry delivery if e.g. the user runs over his quota. dnl # FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl FEATURE(`blacklist_recipients')dnl EXPOSED_USER(`root')dnl dnl # dnl # The following causes sendmail to only listen on the IPv4 loopback address dnl # 127.0.0.1 and not on any other network devices. Remove the loopback dnl # address restriction to accept email from the internet or intranet. dnl # dnl DAEMON_OPTIONS(`Port=smtp,Addr=127.0.0.1, Name=MTA')dnl dnl # dnl # The following causes sendmail to additionally listen to port 587 for dnl # mail from MUAs that authenticate. Roaming users who can't reach their dnl # preferred sendmail daemon due to port 25 being blocked or redirected find dnl # this useful. dnl # dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl dnl # dnl # The following causes sendmail to additionally listen to port 465, but dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1. dnl # dnl # For this to work your OpenSSL certificates must be configured. dnl # dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl dnl # dnl # The following causes sendmail to additionally listen on the IPv6 loopback dnl # device. Remove the loopback address restriction listen to the network. dnl # dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl dnl # dnl # enable both ipv6 and ipv4 in sendmail: dnl # dnl DAEMON_OPTIONS(`Name=MTA-v4, Family=inet, Name=MTA-v6, Family=inet6') dnl # dnl # We strongly recommend not accepting unresolvable domains if you want to dnl # protect yourself from spam. However, the laptop and users on computers dnl # that do not have 24x7 DNS do need this. dnl # dnl FEATURE(`accept_unresolvable_domains')dnl dnl # FEATURE(`relay_based_on_MX')dnl dnl # dnl # Also accept email sent to "localhost.localdomain" as local email. dnl # LOCAL_DOMAIN(`localhost.localdomain')dnl dnl # dnl # The following example makes mail from this host and any additional dnl # specified domains appear to be sent from mydomain.com dnl # dnl MASQUERADE_AS(`mydomain.com')dnl dnl # dnl # masquerade not just the headers, but the envelope as well dnl # dnl FEATURE(masquerade_envelope)dnl dnl # dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well dnl # dnl FEATURE(masquerade_entire_domain)dnl dnl # dnl MASQUERADE_DOMAIN(localhost)dnl dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl dnl MASQUERADE_DOMAIN(mydomain.lan)dnl dnl FEATURE(dnsbl, `blackholes.mail-abuse.org', `Rechazado - vea http://www.mail-abuse.org/rbl/')dnl dnl FEATURE(dnsbl, `dialups.mail-abuse.org', `Rechazado - vea http://www.mail-abuse.org/dul/')dnl dnl FEATURE(dnsbl, `relays.mail-abuse.org', `Rechazado - vea http://work-rss.mail-abuse.org/rss/')dnl dnl FEATURE(dnsbl, `sbl-xbl.spamhaus.org', `"550 Su IP esta en lista negra en Spamhaus - Por favor vea http://www.spamhaus.org/query/bl?ip=+"$&{client_addr}')dnl dnl FEATURE(dnsbl, `bl.spamcop.net', `"550 Su IP esta en lista negra en SpamCOP - Por favor vea http://spamcop.net/bl.shtml?"$&{client_addr}')dnl dnl FEATURE(dnsbl, `list.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?"$&{client_addr}')dnl dnl FEATURE(dnsbl, `multihop.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?"$&{client_addr}')dnl dnl FEATURE(dnsbl, `dnsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl dnl FEATURE(dnsbl, `rhsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl dnl FEATURE(dnsbl, `bl.csma.biz', `"550 Su IP esta en lista negra en CSMA - Por favor vea http://bl.csma.biz/cgi-bin/listing.cgi?ip="$&{client_addr}')dnl dnl FEATURE(dnsbl, `dnsbl.antispam.or.id', `"550 Su IP esta en lista negra en ADNSBL - Por favor vea http://antispam.or.id/?ip="$&{client_addr}')dnl dnl FEATURE(dnsbl, `blacklist.spambag.org', `"550 Su IP esta en lista negra en SPAMBAG - Por favor vea http://www.spambag.org/cgi-bin/spambag?query="$&{client_addr}')dnl MAILER(smtp)dnl MAILER(procmail)dnl INPUT_MAIL_FILTER(`dkim-milter', `S=inet:8892@localhost')dnl ------------------- Si activo DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s' ![]() access PHP Formatted Code ----------------------# Check the /usr/share/doc/sendmail/README.cf file for a description # of the format of this file. (search for access_db in that file) # The /usr/share/doc/sendmail/README.cf is part of the sendmail-doc # package. # # by default we allow relaying from localhost... Connect:localhost.localdomain RELAY Connect:localhost RELAY Connect:127.0.0.1 RELAY Connect:midominio.com RELAY Connect:222 REJECT Connect:220 REJECT Connect:221 REJECT Connect:219 REJECT Connect:218 REJECT Connect:211 REJECT Connect:210 REJECT Connect:203 REJECT Connect:202 REJECT Connect:140.109 REJECT Connect:133 REJECT Connect:61 REJECT Connect:60 REJECT Connect:59 REJECT Connect:58 REJECT Connect:boletxu@yahoo.com REJECT Connect:hotmail.com DISCARD -------------------- saslauthd PHP Formatted Code --------------------# Directory in which to place saslauthd's listening socket, pid file, and so # on. This directory must already exist. SOCKETDIR=/var/run/saslauthd # Mechanism to use when checking passwords. Run "saslauthd -v" to get a list # of which mechanism your installation was compiled with the ablity to use. MECH=pam # Options sent to the saslauthd. If the MECH is other than "pam" uncomment the next line. # DAEMONOPTS=--user saslauth # Additional flags to pass to saslauthd on the command line. See saslauthd(8) # for the list of accepted flags. FLAGS= -------------------- |
|||||||
|
||||||||
gontzal |
|
|||||||
![]() ![]() ![]() ![]() ![]() Miembro regular Estado: desconectado ![]() Identificado: 07/05/08 Mensajes: 75 |
Ya he conseguido que funcione, pero las aplicaciones que usaban el puerto 25 han dejado de funcionar, como la alerta de virus de avast.
NO existe alguna manera de que pueda funcionar como funcionaba antes con el centos 5? |
|||||||
|
||||||||
Joel Barrios Dueñas |
|
|||||||
![]() ![]() ![]() ![]() ![]() Admin ![]() Estado: desconectado ![]() Identificado: 17/02/07 Mensajes: 1761 Localización:Mexico |
Habilita las siguientes líneas, que se supone deber?ias estar descomentadas...
PHP Formatted Code DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnlDAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s') La primera define que trabajas por puerto 25 como MTA, por cualquier interfaz (sólo servidores se conectan aquí) La segunda habilita el puerto 587 para MSA (TODOS deben usar este puerto para enviar). La tercera habilita el puerto 465 (SSL) para clientes de correo viejos (Outlook Express). Sendmail en CentOS 6 funciona exactamente igual que en CentOS 5. |
|||||||
|
||||||||
Contenido generado en: 0.29 segundos |
![]() ![]() |
Todas las horas son CST. Hora actual 08:57 . |
|
|