Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2017-01-28 12:54:29 1cWVWv-0007kW-AW == wcandace48@yahoo.com R=dnslookup T=remote_smtp defer (-45): SMTP error from remote mail server after MAIL FROM:<test@chyjr.com> SIZE=5704: host mta6.am0.yahoodns.net [66.196.118.240]: 421 4.7.0 [TSS04] Messages from <my ip address> temporarily deferred due to user complaints - 4.16.55.1; see https://help.yahoo.com/kb/postmaster/SLN3434.html
- 2017-01-28 12:54:25 1cWVWv-0007kW-AW SMTP error from remote mail server after MAIL FROM:<test@chyjr.com> SIZE=5704: host mta6.am0.yahoodns.net [98.138.112.35]: 421 4.7.0 [TSS04] Messages from <my ip address> temporarily deferred due to user complaints - 4.16.55.1; see https://help.yahoo.com/kb/postmaster/SLN3434.html
- 2017-01-28 12:54:30 1cXSWS-0004Sv-BV gmail-smtp-in.l.google.com [2a00:1450:4013:c06::1a] Network is unreachable
- 2017-01-28 12:54:31 1cXSWS-0004Sv-BV ** myemail@gmail.com R=dnslookup T=remote_smtp X=TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128 DN="C=US,ST=California,L=Mountain View,O=Google Inc,CN=mx.google.com": SMTP error from remote mail server after end of data: host gmail-smtp-in.l.google.com [108.177.96.26]: 550-5.7.1 [<my ip address> 1] Our system has detected an unusual rate ofn550-5.7.1 unsolicited mail originating from your IP address. To protect ourn550-5.7.1 users from spam, mail sent from your IP address has been blocked.n550-5.7.1 Please visitn550-5.7.1 https://support.google.com/mail/?p=UnsolicitedIPError to review ourn550 5.7.1 Bulk Email Senders Guidelines. v8si6424547wma.41 - gsmtp
- dc_eximconfig_configtype='internet'
- dc_other_hostnames='mydomain ; localhost'
- dc_local_interfaces='127.0.0.1 ; ::1 ; myip'
- dc_readhost=''
- dc_relay_domains=''
- dc_minimaldns='false'
- dc_relay_nets=''
- dc_smarthost=''
- CFILEMODE='644'
- dc_use_split_config='true'
- dc_hide_mailname=''
- dc_mailname_in_oh='true'
- dc_localdelivery='maildir_home'
- # Authenticate against local passwords using sasl2-bin
- # Requires exim_uid to be a member of sasl group, see README.Debian.gz
- plain_saslauthd_server:
- driver = plaintext
- public_name = PLAIN
- server_condition = ${if saslauthd{{$auth2}{$auth3}}{1}{0}}
- server_set_id = $auth2
- server_prompts = :
- # .ifndef AUTH_SERVER_ALLOW_NOTLS_PASSWORDS
- # server_advertise_condition = ${if eq{$tls_in_cipher}{}{}{*}}
- # .endif
- #
- login_saslauthd_server:
- driver = plaintext
- public_name = LOGIN
- server_prompts = "Username:: : Password::"
- # don't send system passwords over unencrypted connections
- server_condition = ${if saslauthd{{$auth1}{$auth2}}{1}{0}}
- server_set_id = $auth1
- # .ifndef AUTH_SERVER_ALLOW_NOTLS_PASSWORDS
- # server_advertise_condition = ${if eq{$tls_in_cipher}{}{}{*}}
- # .endif
- cram_md5:
- driver = cram_md5
- public_name = CRAM-MD5
- client_name = ${extract{1}{:}{${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}}}
- client_secret = ${extract{2}{:}{${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}}}
- # this returns the matching line from passwd.client and doubles all ^
- PASSWDLINE=${sg{
- ${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}
- }
- {\N[\^]\N}
- {^^}
- }
- plain:
- driver = plaintext
- public_name = PLAIN
- .ifndef AUTH_CLIENT_ALLOW_NOTLS_PASSWORDS
- client_send = "<; ${if !eq{$tls_out_cipher}{}
- {^${extract{1}{:}{PASSWDLINE}}
- ^${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}
- }fail}"
- .else
- client_send = "<; ^${extract{1}{:}{PASSWDLINE}}
- ^${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
- .endif
- login:
- driver = plaintext
- public_name = LOGIN
- .ifndef AUTH_CLIENT_ALLOW_NOTLS_PASSWORDS
- # Return empty string if not non-TLS AND looking up $host in passwd-file
- # yields a non-empty string; fail otherwise.
- client_send = "<; ${if and{
- {!eq{$tls_out_cipher}{}}
- {!eq{PASSWDLINE}{}}
- }
- {}fail}
- ; ${extract{1}{::}{PASSWDLINE}}
- ; ${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
- .else
- # Return empty string if looking up $host in passwd-file yields a
- # non-empty string; fail otherwise.
- client_send = "<; ${if !eq{PASSWDLINE}{}
- {}fail}
- ; ${extract{1}{::}{PASSWDLINE}}
- ; ${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
- .endif
- root@alpha:/etc/exim4/conf.d/auth# iptables -L
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- DROP tcp -- anywhere anywhere tcp dpt:smtp
- root@alpha:/etc/exim4# ps -ef | grep exim
- root 16825 1 0 12:43 ? 00:00:00 /usr/sbin/exim4 -q
- Debian-+ 18190 1 0 13:07 ? 00:00:00 /usr/sbin/exim4 -bd -q30m
- root 18191 18190 0 13:07 ? 00:00:00 /usr/sbin/exim4 -q
- root 18332 16825 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
- Debian-+ 18335 18332 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
- Debian-+ 18336 18332 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
- root 18338 18191 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
- Debian-+ 18339 18338 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
- root 18341 12252 0 13:10 pts/1 00:00:00 grep exim
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement