1. Betriebssysteme >
  2. Linux Tipps >
  3. iRedMail server no SMTP/IMAP connection

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

iRedMail server no SMTP/IMAP connection


Linux Tipps vom | Direktlink: reddit.com Nachrichten Bewertung

Hi all,

I have configured a iRedMail server with SSL certificates on my Ubuntu 18.04 machine, but I can't manage to connect my devices (via Outlook or Spark) via SMTP/IMAP protocols.

I have opened ports 593, 143, 993, 995 and still, devices cannot connect to the server.

Logs from netstat

Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name

tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN 644/systemd-resolve

tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 907/sshd

tcp 0 0 127.0.0.1:24 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 2352/master

tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 969/nginx: master p

tcp 0 0 127.0.0.1:8125 0.0.0.0:* LISTEN 2373/netdata

tcp 0 0 127.0.0.1:4190 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 127.0.0.1:19999 0.0.0.0:* LISTEN 2373/netdata

tcp 1 0 127.0.0.1:20000 0.0.0.0:* LISTEN 1291/sogod

tcp 0 0 127.0.0.1:7777 0.0.0.0:* LISTEN 1318/python2

tcp 0 0 0.0.0.0:993 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 0.0.0.0:995 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 127.0.0.1:10024 0.0.0.0:* LISTEN 1871/amavisd-new (m

tcp 0 0 127.0.0.1:10025 0.0.0.0:* LISTEN 2352/master

tcp 0 0 127.0.0.1:10026 0.0.0.0:* LISTEN 1871/amavisd-new (m

tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN 1145/mysqld

tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 2352/master

tcp 0 0 127.0.0.1:10027 0.0.0.0:* LISTEN 1871/amavisd-new (m

tcp 0 0 127.0.0.1:11211 0.0.0.0:* LISTEN 844/memcached

tcp 0 0 127.0.0.1:10028 0.0.0.0:* LISTEN 2352/master

tcp 0 0 127.0.0.1:9998 0.0.0.0:* LISTEN 1871/amavisd-new (m

tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 127.0.0.1:7790 0.0.0.0:* LISTEN 864/uwsgi

tcp 0 0 127.0.0.1:9999 0.0.0.0:* LISTEN 836/php-fpm: master

tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 127.0.0.1:7791 0.0.0.0:* LISTEN 866/uwsgi

tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 969/nginx: master p

tcp 0 0 127.0.0.1:24242 0.0.0.0:* LISTEN 804/dovecot

tcp 0 0 127.0.0.1:12340 0.0.0.0:* LISTEN 804/dovecot

tcp6 0 0 :::21 :::* LISTEN 5516/vsftpd

tcp6 0 0 :::22 :::* LISTEN 907/sshd

tcp6 0 0 :::25 :::* LISTEN 2352/master

tcp6 0 0 :::443 :::* LISTEN 969/nginx: master p

tcp6 0 0 :::993 :::* LISTEN 804/dovecot

tcp6 0 0 :::995 :::* LISTEN 804/dovecot

tcp6 0 0 :::587 :::* LISTEN 2352/master

tcp6 0 0 :::110 :::* LISTEN 804/dovecot

tcp6 0 0 :::143 :::* LISTEN 804/dovecot

tcp6 0 0 :::80 :::* LISTEN 969/nginx: master p

Logs from mail.log

Feb 20 07:59:29 rod postfix/submission/smtpd[7282]: disconnect from unknown[52.125.140.5] ehlo=2 starttls=1 auth=1 quit=1 commands=5

Feb 20 07:59:29 rod postfix/submission/smtpd[7287]: disconnect from unknown[52.125.140.5] ehlo=2 starttls=1 auth=1 quit=1 commands=5

Feb 20 07:59:35 rod postfix/postscreen[7283]: PASS NEW [52.125.140.5]:57384

Feb 20 07:59:35 rod postfix/postscreen[7283]: PASS OLD [52.125.140.5]:57378

Feb 20 07:59:35 rod postfix/smtpd[7297]: connect from unknown[52.125.140.5]

Feb 20 07:59:35 rod postfix/smtpd[7298]: connect from unknown[52.125.140.5]

Feb 20 07:59:35 rod postfix/smtpd[7298]: Anonymous TLS connection established from unknown[52.125.140.5]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:35 rod postfix/smtpd[7298]: disconnect from unknown[52.125.140.5] ehlo=2 starttls=1 quit=1 commands=4

Feb 20 07:59:35 rod postfix/smtpd[7297]: Anonymous TLS connection established from unknown[52.125.140.5]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:35 rod postfix/smtpd[7297]: disconnect from unknown[52.125.140.5] ehlo=2 starttls=1 quit=1 commands=4

Feb 20 07:59:44 rod postfix/postscreen[7283]: CONNECT from [52.125.141.115]:38656 to [165.22.193.58]:25

Feb 20 07:59:44 rod postfix/postscreen[7283]: CONNECT from [52.125.141.115]:38660 to [165.22.193.58]:25

Feb 20 07:59:44 rod postfix/submission/smtpd[7287]: connect from unknown[52.125.141.115]

Feb 20 07:59:44 rod postfix/submission/smtpd[7282]: connect from unknown[52.125.141.115]

Feb 20 07:59:45 rod postfix/submission/smtpd[7282]: Anonymous TLS connection established from unknown[52.125.141.115]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:45 rod postfix/submission/smtpd[7287]: Anonymous TLS connection established from unknown[52.125.141.115]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:45 rod postfix/submission/smtpd[7282]: disconnect from unknown[52.125.141.115] ehlo=2 starttls=1 auth=1 quit=1 commands=5

Feb 20 07:59:45 rod postfix/submission/smtpd[7287]: disconnect from unknown[52.125.141.115] ehlo=2 starttls=1 auth=1 quit=1 commands=5

Feb 20 07:59:50 rod postfix/postscreen[7283]: PASS NEW [52.125.141.115]:38656

Feb 20 07:59:50 rod postfix/postscreen[7283]: PASS OLD [52.125.141.115]:38660

Feb 20 07:59:50 rod postfix/smtpd[7298]: connect from unknown[52.125.141.115]

Feb 20 07:59:50 rod postfix/smtpd[7297]: connect from unknown[52.125.141.115]

Feb 20 07:59:50 rod postfix/smtpd[7297]: Anonymous TLS connection established from unknown[52.125.141.115]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:50 rod postfix/smtpd[7298]: Anonymous TLS connection established from unknown[52.125.141.115]: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)

Feb 20 07:59:50 rod postfix/smtpd[7297]: disconnect from unknown[52.125.141.115] ehlo=2 starttls=1 quit=1 commands=4

Feb 20 07:59:50 rod postfix/smtpd[7298]: disconnect from unknown[52.125.141.115] ehlo=2 starttls=1 quit=1 commands=4

Feb 20 08:03:10 rod postfix/anvil[7234]: statistics: max connection rate 2/60s for (submission:52.125.140.5) at Feb 20 07:59:29

Feb 20 08:03:10 rod postfix/anvil[7234]: statistics: max connection count 2 for (submission:52.125.140.5) at Feb 20 07:59:29

Feb 20 08:03:10 rod postfix/anvil[7234]: statistics: max cache size 4 at Feb 20 07:59:50

Feb 20 08:06:07 rod postfix/submission/smtpd[7443]: connect from unknown[52.125.140.0]

Feb 20 08:06:07 rod postfix/submission/smtpd[7443]: Anonymous TLS connection established from unknown[52.125.140.0]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)

Feb 20 08:06:07 rod postfix/submission/smtpd[7443]: lost connection after STARTTLS from unknown[52.125.140.0]

Feb 20 08:06:07 rod postfix/submission/smtpd[7443]: disconnect from unknown[52.125.140.0] ehlo=1 starttls=1 commands=2

Feb 20 08:07:13 rod postfix/submission/smtpd[7443]: connect from unknown[52.125.140.0]

Feb 20 08:07:13 rod postfix/submission/smtpd[7443]: Anonymous TLS connection established from unknown[52.125.140.0]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)

Feb 20 08:07:13 rod postfix/submission/smtpd[7443]: lost connection after STARTTLS from unknown[52.125.140.0]

Feb 20 08:07:13 rod postfix/submission/smtpd[7443]: disconnect from unknown[52.125.140.0] ehlo=1 starttls=1 commands=2

Feb 20 08:08:09 rod postfix/postscreen[7485]: CONNECT from [45.143.223.14]:53448 to [165.22.193.58]:25

Feb 20 08:08:09 rod postfix/dnsblog[7487]: addr 45.143.223.14 listed by domain zen.spamhaus.org as 127.0.0.3

Feb 20 08:08:09 rod postfix/dnsblog[7487]: addr 45.143.223.14 listed by domain zen.spamhaus.org as 127.0.0.11

Feb 20 08:08:09 rod postfix/dnsblog[7487]: addr 45.143.223.14 listed by domain zen.spamhaus.org as 127.0.0.4

Feb 20 08:08:15 rod postfix/postscreen[7485]: DNSBL rank 3 for [45.143.223.14]:53448

Feb 20 08:08:15 rod postfix/postscreen[7485]: DISCONNECT [45.143.223.14]:53448

Feb 20 08:10:33 rod postfix/anvil[7447]: statistics: max connection rate 1/60s for (submission:52.125.140.0) at Feb 20 08:06:07

Feb 20 08:10:33 rod postfix/anvil[7447]: statistics: max connection count 1 for (submission:52.125.140.0) at Feb 20 08:06:07

Feb 20 08:10:33 rod postfix/anvil[7447]: statistics: max cache size 1 at Feb 20 08:06:07

Feb 20 08:48:04 rod postfix/postscreen[8591]: CONNECT from [218.1.18.154]:54420 to [165.22.193.58]:25

Feb 20 08:48:04 rod postfix/dnsblog[8592]: addr 218.1.18.154 listed by domain zen.spamhaus.org as 127.0.0.2

Feb 20 08:48:04 rod postfix/dnsblog[8592]: addr 218.1.18.154 listed by domain zen.spamhaus.org as 127.0.0.4

Feb 20 08:48:10 rod postfix/postscreen[8591]: DNSBL rank 3 for [218.1.18.154]:54420

Feb 20 08:48:10 rod postfix/postscreen[8591]: DISCONNECT [218.1.18.154]:54420

submitted by /u/rodnekhaev
[link] [comments]...
https://www.reddit.com/r/linux/comments/f6qlff/iredmail_server_no_smtpimap_connection/

Externe Quelle mit kompletten Inhalt anzeigen


Zur Startseite von Team IT Security

➤ Weitere Beiträge von Team Security | IT Sicherheit

USN-4160-1: UW IMAP vulnerability

vom 258.33 Punkte ic_school_black_18dp
uw-imap vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary UW IMAP could be made to execute programs if it received specially crafted input. Software Desc

Btlejack - Bluetooth Low Energy Swiss-army Knife

vom 246.21 Punkte ic_school_black_18dp
Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an Adafruit's Bluefruit LE sniffer or a nRF51822 Eval Kit

Azure Marketplace new offers – Volume 28

vom 194.18 Punkte ic_school_black_18dp
We continue to expand the Azure Marketplace ecosystem. From November 17 to November 30, 2018, 80 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Virtual machines CloudflareA

iRedMail server no SMTP/IMAP connection

vom 189.79 Punkte ic_school_black_18dp
Hi all, I have configured a iRedMail server with SSL certificates on my Ubuntu 18.04 machine, but I can't manage to connect my devices (via Outlook or Spark) via SMTP/IMAP protocols. I have opened ports 593, 143, 993, 995 and still, devices cannot co

Alternative input methods for Android TV

vom 184.66 Punkte ic_school_black_18dp
Posted by Benjamin Baxter, Developer Advocate and Bacon Connoisseur All TVs have the same problem with keyboard input: It is very cumbersome to hunt and peck for each letter using a D-pad with a remote. And if you make a mistake, trying to correct it compounds the problem. APIs like Smart Lock and Autofill, can ease user's frustrations, but for certain types of input, like login, you ne

ASP.NET Core and Blazor updates in .NET Core 3.0 Preview 8

vom 161.94 Punkte ic_school_black_18dp
.NET Core 3.0 Preview 8 is now available and it includes a bunch of new updates to ASP.NET Core and Blazor. Here’s the list of what’s new in this preview: Project template updates Cleaned up top-level templates in Visual Studio Angular template updated to Angular 8 Blaz

Mistica - An Open Source Swiss Army Knife For Arbitrary Communication Over Application Protocols

vom 144.03 Punkte ic_school_black_18dp
Mística is a tool that allows to embed data into application layer protocol fields, with the goal of establishing a bi-directional channel for arbitrary communications. Currently, encapsulation into HTTP, DNS and ICMP protocols has been implemented, b

Jok3R - Network And Web Pentest Framework

vom 142.06 Punkte ic_school_black_18dp
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.Its main goal is to save time on everything that can be automated during network/web pentest in order to enjoy more

HPR3060: Running a local imap server

vom 138.67 Punkte ic_school_black_18dp
Setting up a local imap server To install a local imap daemon that will only listen to localhost connections, made via ssh tunneling. This is for use as a local backup of your imap files, or for keeping a remote backup somewhere. This is not a mail deli

Blazor Server in .NET Core 3.0 scenarios and performance

vom 128.95 Punkte ic_school_black_18dp
Since the release of Blazor Server with .NET Core 3.0 last month lots of folks have shared their excitement with us about being able to build client-side web UI with just .NET and C#. At the same time, we’ve also heard lots of questions about what Bl

Open-Xchange: Null pointer dereference in SMTP server function smtp_command_parse_data_with_size

vom 120.41 Punkte ic_school_black_18dp
Sending the following bytes to the SMTP server induces a NULL pointer dereference 0x20,0x0,0x0,0x1,0xa,0x20,0x0,0xa,0x20,0x39,0x20,0xa,0x8,0x3b,0xa,0x0,0x1,0xa,0x0,0x20,0xa,0x8,0x3b,0xa,0x42,0x46,0x41,0x54,0xa,0x44,0x41,0x54,0x20,0x51,0xa,0xa,0x42,0x44,0x41,0x54,0x20,0x35,0x20,0x42,0x44,0x41,0xa,0xff,0xa,0x20,0xfd,0xc1,0x42,0x20,0xfd,0x20,0xa,0xa,0x20,0x20,0xfd,0xa7,0x41,0x54,0x41,0x49,0x54,0x20,0x20,0xa,0x20,0xde,0x9e,0x9e,0x20,0x20,0xa,0xa,0x20,0xde,0xa,0xee,0xa,0x41,0x54,0x20,0x30,0x20,0xa,0x20,0x41,0x67,0xa,0x4d,0x41,0x49,0x4c,0x8a,0x20,0xa,0x42,0x44,0x41,0x54,0xa,0x42,0x44,0x41,0x54,0x20,0xa,0x52,0x53,0x45,0x54,0xa,0x20,0xbb,0x9c,0x2a,0x9,0x9,0x9,0x9,0x9,0x9,0x9,0x9,0xa,0x9,0x9,0x9,0x9,0x9,0x9,0x9,0xff,0x2d,0x54,0x54,0x2a,0xa, Stack trace is #0 0x10083ef30 in smtp_command_parse_data_with_size smtp-command-parser.c:498 #1

Hydra 9.0 - Fast and Flexible Network Login Hacker

vom 116.29 Punkte ic_school_black_18dp
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a s

Team Security Diskussion über iRedMail server no SMTP/IMAP connection