Weird send errors #3232
-
Beta Was this translation helpful? Give feedback.
Replies: 5 comments 6 replies
-
I also checked the logs, and it doesnt really give any more useful information than is already shown. |
Beta Was this translation helpful? Give feedback.
-
Are you sending a message to another SMTP server within your network or from Postal to Postal? |
Beta Was this translation helpful? Give feedback.
-
I have found that all of these recipients are using the same receiving mail filter, on the same IP addresses. Can I somehow see the acutal SMTP commands and answers postal get? I tried capturing the traffic in the firewall but after STARTTLS its unreadable. |
Beta Was this translation helpful? Give feedback.
-
Im not 100% sure but I believe this is TLS related, and might be a ruby problem, in combination with whatever software is at the receiving end. From testing openssl:
And then nothing happens. Im guessing the same happens for postal/ruby and it times out because it never gets a 250 OK. But using openssl rarely works well for sending mail so... This is what Im getting from capturing the traffic. It could be helpful if someone could try and send a test from their postal server, to see if its a postal thing, which Im starting to think it is. |
Beta Was this translation helpful? Give feedback.
-
This is now almost solved! We did not have port 25 incoming open, due to security, and we didnt really care about bounce mails. Turns out the receiving end would not accept TLS unless port 25 is open on the sending IP. Not sure why. For now, Ive opened port 25 incoming, and thats at least a temporary solution. EDIT: Does TLS 1.3 require this natively? |
Beta Was this translation helpful? Give feedback.
This is now almost solved! We did not have port 25 incoming open, due to security, and we didnt really care about bounce mails. Turns out the receiving end would not accept TLS unless port 25 is open on the sending IP. Not sure why. For now, Ive opened port 25 incoming, and thats at least a temporary solution.
EDIT: Does TLS 1.3 require this natively?