Advertisement
Guest User

Untitled

a guest
Jan 28th, 2017
296
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.13 KB | None | 0 0
  1. 2017-01-28 12:54:29 1cWVWv-0007kW-AW == wcandace48@yahoo.com R=dnslookup T=remote_smtp defer (-45): SMTP error from remote mail server after MAIL FROM:<test@chyjr.com> SIZE=5704: host mta6.am0.yahoodns.net [66.196.118.240]: 421 4.7.0 [TSS04] Messages from <my ip address> temporarily deferred due to user complaints - 4.16.55.1; see https://help.yahoo.com/kb/postmaster/SLN3434.html
  2. 2017-01-28 12:54:25 1cWVWv-0007kW-AW SMTP error from remote mail server after MAIL FROM:<test@chyjr.com> SIZE=5704: host mta6.am0.yahoodns.net [98.138.112.35]: 421 4.7.0 [TSS04] Messages from <my ip address> temporarily deferred due to user complaints - 4.16.55.1; see https://help.yahoo.com/kb/postmaster/SLN3434.html
  3.  
  4. 2017-01-28 12:54:30 1cXSWS-0004Sv-BV gmail-smtp-in.l.google.com [2a00:1450:4013:c06::1a] Network is unreachable
  5. 2017-01-28 12:54:31 1cXSWS-0004Sv-BV ** myemail@gmail.com R=dnslookup T=remote_smtp X=TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128 DN="C=US,ST=California,L=Mountain View,O=Google Inc,CN=mx.google.com": SMTP error from remote mail server after end of data: host gmail-smtp-in.l.google.com [108.177.96.26]: 550-5.7.1 [<my ip address> 1] Our system has detected an unusual rate ofn550-5.7.1 unsolicited mail originating from your IP address. To protect ourn550-5.7.1 users from spam, mail sent from your IP address has been blocked.n550-5.7.1 Please visitn550-5.7.1 https://support.google.com/mail/?p=UnsolicitedIPError to review ourn550 5.7.1 Bulk Email Senders Guidelines. v8si6424547wma.41 - gsmtp
  6.  
  7. dc_eximconfig_configtype='internet'
  8. dc_other_hostnames='mydomain ; localhost'
  9. dc_local_interfaces='127.0.0.1 ; ::1 ; myip'
  10. dc_readhost=''
  11. dc_relay_domains=''
  12. dc_minimaldns='false'
  13. dc_relay_nets=''
  14. dc_smarthost=''
  15. CFILEMODE='644'
  16. dc_use_split_config='true'
  17. dc_hide_mailname=''
  18. dc_mailname_in_oh='true'
  19. dc_localdelivery='maildir_home'
  20.  
  21. # Authenticate against local passwords using sasl2-bin
  22. # Requires exim_uid to be a member of sasl group, see README.Debian.gz
  23. plain_saslauthd_server:
  24. driver = plaintext
  25. public_name = PLAIN
  26. server_condition = ${if saslauthd{{$auth2}{$auth3}}{1}{0}}
  27. server_set_id = $auth2
  28. server_prompts = :
  29. # .ifndef AUTH_SERVER_ALLOW_NOTLS_PASSWORDS
  30. # server_advertise_condition = ${if eq{$tls_in_cipher}{}{}{*}}
  31. # .endif
  32. #
  33. login_saslauthd_server:
  34. driver = plaintext
  35. public_name = LOGIN
  36. server_prompts = "Username:: : Password::"
  37. # don't send system passwords over unencrypted connections
  38. server_condition = ${if saslauthd{{$auth1}{$auth2}}{1}{0}}
  39. server_set_id = $auth1
  40. # .ifndef AUTH_SERVER_ALLOW_NOTLS_PASSWORDS
  41. # server_advertise_condition = ${if eq{$tls_in_cipher}{}{}{*}}
  42. # .endif
  43.  
  44. cram_md5:
  45. driver = cram_md5
  46. public_name = CRAM-MD5
  47. client_name = ${extract{1}{:}{${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}}}
  48. client_secret = ${extract{2}{:}{${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}}}
  49.  
  50. # this returns the matching line from passwd.client and doubles all ^
  51. PASSWDLINE=${sg{
  52. ${lookup{$host}nwildlsearch{CONFDIR/passwd.client}{$value}fail}
  53. }
  54. {\N[\^]\N}
  55. {^^}
  56. }
  57.  
  58. plain:
  59. driver = plaintext
  60. public_name = PLAIN
  61. .ifndef AUTH_CLIENT_ALLOW_NOTLS_PASSWORDS
  62. client_send = "<; ${if !eq{$tls_out_cipher}{}
  63. {^${extract{1}{:}{PASSWDLINE}}
  64. ^${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}
  65. }fail}"
  66. .else
  67. client_send = "<; ^${extract{1}{:}{PASSWDLINE}}
  68. ^${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
  69. .endif
  70.  
  71. login:
  72. driver = plaintext
  73. public_name = LOGIN
  74. .ifndef AUTH_CLIENT_ALLOW_NOTLS_PASSWORDS
  75. # Return empty string if not non-TLS AND looking up $host in passwd-file
  76. # yields a non-empty string; fail otherwise.
  77. client_send = "<; ${if and{
  78. {!eq{$tls_out_cipher}{}}
  79. {!eq{PASSWDLINE}{}}
  80. }
  81. {}fail}
  82. ; ${extract{1}{::}{PASSWDLINE}}
  83. ; ${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
  84. .else
  85. # Return empty string if looking up $host in passwd-file yields a
  86. # non-empty string; fail otherwise.
  87. client_send = "<; ${if !eq{PASSWDLINE}{}
  88. {}fail}
  89. ; ${extract{1}{::}{PASSWDLINE}}
  90. ; ${sg{PASSWDLINE}{\N([^:]+:)(.*)\N}{\$2}}"
  91. .endif
  92.  
  93. root@alpha:/etc/exim4/conf.d/auth# iptables -L
  94. Chain INPUT (policy ACCEPT)
  95. target prot opt source destination
  96. DROP tcp -- anywhere anywhere tcp dpt:smtp
  97.  
  98. root@alpha:/etc/exim4# ps -ef | grep exim
  99. root 16825 1 0 12:43 ? 00:00:00 /usr/sbin/exim4 -q
  100. Debian-+ 18190 1 0 13:07 ? 00:00:00 /usr/sbin/exim4 -bd -q30m
  101. root 18191 18190 0 13:07 ? 00:00:00 /usr/sbin/exim4 -q
  102. root 18332 16825 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
  103. Debian-+ 18335 18332 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
  104. Debian-+ 18336 18332 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
  105. root 18338 18191 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
  106. Debian-+ 18339 18338 0 13:10 ? 00:00:00 /usr/sbin/exim4 -q
  107. root 18341 12252 0 13:10 pts/1 00:00:00 grep exim
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement