Hello I have a working smtp server that is failing the outlook test. (wish is needed for adding a new account.) The error i GET: "Test-e-mailbericht verzenden: De reactie van de server was: 550 5.7.1 Command rejected" when i use the same acount that is already in use I can send e-mail with the same server. But when i run the test on that account (also all other accounts op the server), it will always fail the test. Can someone help me out? In the mail Log i get this: Jun 24 09:41:25 [email protected] postfix/smtpd[40880]: connect from MY.IPS.HOST[MYIP] Jun 24 09:41:25 [email protected] postfix/smtpd[40880]: NOQUEUE: filter: RCPT from MY.IPS.HOST[MYIP]: <[email protected]>: Sender address triggers FILTER amavis:[127.0.0.1]:10026; from=<[email protected]> to=<of$ Jun 24 09:41:25 [email protected] postfix/smtpd[40880]: 8E59B1CE985: client=MY.IPS.HOST[MYIP], sasl_method=LOGIN, sasl_username=[email protected] Jun 24 09:41:25 [email protected] postfix/cleanup[40883]: 8E59B1CE985: message-id=<> Jun 24 09:41:25 [email protected] postfix/cleanup[40883]: 8E59B1CE985: milter-reject: END-OF-MESSAGE from MY.IPS.HOST[MYIP]: 5.7.1 Command rejected; from=<[email protected]> to=<[email protected]> proto=ESMTP he$ Jun 24 09:41:25 [email protected] postfix/smtpd[40880]: disconnect from MY.IPS.HOST[MYIP]
Your log entries are cut off, so can't see what the actual command being rejected was (and I'm not sure if it is printed or not), but maybe you need to use a different port (eg. 587, not 25) and authenticate? You could check postfix settings like smtpd_forbidden_commands, smtpd_junk_command_limit and even smtpd_command_filter.
Hello, I have the problem on all ports encrypted or not encrypted. In my /etc/postfix/main.cf i don't have: smtpd_forbidden_commands, smtpd_junk_command_limit and even smtpd_command_filter. This is the rest of the log file that was missing, but i don't think. that helps out. Code: Jun 27 08:34:14 server5 postfix/submission/smtpd[6747]: NOQUEUE: filter: RCPT from ISP.access.HOST.be[MYIP]: <[email protected]>: Sender address triggers FILTER amavis:[127.0.0.1]:10026; from=<[email protected]> to=<[email protected]> proto=ESMTP helo=<DESKTOP> Jun 27 08:34:14 server5 postfix/submission/smtpd[6747]: B460C1CEC24: client=ISP.access.HOST.be[MYIP], sasl_method=LOGIN, [email protected] Jun 27 08:34:14 server5 postfix/cleanup[4198]: B460C1CEC24: message-id=<> Jun 27 08:34:15 server5 postfix/cleanup[4198]: B460C1CEC24: milter-reject: END-OF-MESSAGE from ISP.access.HOST.be[MYIP]: 5.7.1 Command rejected; from=<[email protected]> to=<[email protected]> proto=ESMTP helo=<DESKTOP> Jun 27 08:34:15 server5 postfix/submission/smtpd[6747]: disconnect from ISP.access.HOST.be[MYIP]
The /etc/postfix/master.cf Code: # # Postfix master process configuration file. For details on the format # of the file, see the master(5) manual page (command: "man 5 master" or # on-line: http://www.postfix.org/master.5.html). # # Do not forget to execute "postfix reload" after editing this file. # # ========================================================================== # service type private unpriv chroot wakeup maxproc command + args # (yes) (yes) (yes) (never) (100) # ========================================================================== smtp inet n - - - - smtpd 888 inet n - - - - smtpd #smtp inet n - - - 1 postscreen #smtpd pass - - - - - smtpd #dnsblog unix - - - - 0 dnsblog #tlsproxy unix - - - - 0 tlsproxy submission inet n - - - - smtpd -o syslog_name=postfix/submission -o smtpd_tls_security_level=encrypt -o smtpd_sasl_auth_enable=yes -o smtpd_client_restrictions=permit_sasl_authenticated,reject # -o smtpd_reject_unlisted_recipient=no # -o smtpd_client_restrictions=$mua_client_restrictions # -o smtpd_helo_restrictions=$mua_helo_restrictions # -o smtpd_sender_restrictions=$mua_sender_restrictions # -o smtpd_recipient_restrictions= # -o smtpd_relay_restrictions=permit_sasl_authenticated,reject # -o milter_macro_daemon_name=ORIGINATING smtps inet n - - - - smtpd -o syslog_name=postfix/smtps -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes -o smtpd_client_restrictions=permit_sasl_authenticated,reject # -o smtpd_reject_unlisted_recipient=no # -o smtpd_client_restrictions=$mua_client_restrictions # -o smtpd_helo_restrictions=$mua_helo_restrictions # -o smtpd_sender_restrictions=$mua_sender_restrictions # -o smtpd_recipient_restrictions= # -o smtpd_relay_restrictions=permit_sasl_authenticated,reject # -o milter_macro_daemon_name=ORIGINATING #628 inet n - - - - qmqpd pickup unix n - - 60 1 pickup cleanup unix n - - - 0 cleanup qmgr unix n - n 300 1 qmgr #qmgr unix n - n 300 1 oqmgr tlsmgr unix - - - 1000? 1 tlsmgr rewrite unix - - - - - trivial-rewrite bounce unix - - - - 0 bounce defer unix - - - - 0 bounce trace unix - - - - 0 bounce verify unix - - - - 1 verify flush unix n - - 1000? 0 flush proxymap unix - - n - - proxymap proxywrite unix - - n - 1 proxymap smtp unix - - - - - smtp relay unix - - - - - smtp # -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 showq unix n - - - - showq error unix - - - - - error retry unix - - - - - error discard unix - - - - - discard local unix - n n - - local virtual unix - n n - - virtual lmtp unix - - - - - lmtp anvil unix - - - - 1 anvil scache unix - - - - 1 scache # # ==================================================================== # Interfaces to non-Postfix software. Be sure to examine the manual # pages of the non-Postfix software to find out what options it wants. # # Many of the following services use the Postfix pipe(8) delivery # agent. See the pipe(8) man page for information about ${recipient} # and other message envelope options. # ==================================================================== # # maildrop. See the Postfix MAILDROP_README file for details. # Also specify in main.cf: maildrop_destination_recipient_limit=1 # maildrop unix - n n - - pipe flags=DRhu user=vmail argv=/usr/bin/maildrop -d vmail ${extension} ${recipient} ${user} ${nexthop} ${sender} # # ==================================================================== # # Recent Cyrus versions can use the existing "lmtp" master.cf entry. # # Specify in cyrus.conf: # lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 # # Specify in main.cf one or more of the following: # mailbox_transport = lmtp:inet:localhost # virtual_transport = lmtp:inet:localhost # # ==================================================================== # # Cyrus 2.1.5 (Amos Gouaux) # Also specify in main.cf: cyrus_destination_recipient_limit=1 # #cyrus unix - n n - - pipe # user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} # # ==================================================================== # Old example of delivery via Cyrus. # #old-cyrus unix - n n - - pipe # flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} # # ==================================================================== # # See the Postfix UUCP_README file for configuration details. # uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) # # Other external delivery methods. # ifmail unix - n n - - pipe flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) bsmtp unix - n n - - pipe flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient scalemail-backend unix - n n - 2 pipe flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} mailman unix - n n - - pipe flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py ${nexthop} ${user} dovecot unix - n n - - pipe flags=DRhu user=vmail:vmail argv=/usr/lib/dovecot/deliver -f ${sender} -d ${user}@${nexthop} amavis unix - - - - 2 smtp -o smtp_data_done_timeout=1200 -o smtp_send_xforward_command=yes 127.0.0.1:10025 inet n - n - - smtpd -o content_filter= -o local_recipient_maps= -o relay_recipient_maps= -o smtpd_restriction_classes= -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o mynetworks=127.0.0.0/8 -o strict_rfc821_envelopes=yes -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks -o smtp_send_xforward_command=yes 127.0.0.1:10027 inet n - n - - smtpd -o content_filter= -o local_recipient_maps= -o relay_recipient_maps= -o smtpd_restriction_classes= -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o mynetworks=127.0.0.0/8 -o strict_rfc821_envelopes=yes -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks -o smtp_send_xforward_command=yes -o milter_default_action=accept -o milter_macro_daemon_name=ORIGINATING # policy-spf unix - n n - - spawn # user=nobody argv=/usr/bin/policyd-spf policy-spf unix - n n - - spawn user=nobody argv=/usr/bin/policyd-spf
I notice today the 'milter-reject' in there, so it is a milter which is returning '550 5.7.1 Command rejected'. What milters do you have setup? (should be smtpd_milters setting)
This or the smtpd_milters setting: Code: # Added by BitDefender on Thu Nov 24 08:42:23 WET 2016 smtpd_milters=unix:/var/spool/postfix/BitDefender/bdmilterd.sock milter_protocol = 2 milter_default_action = tempfail milter_connect_timeout = 30s milter_command_timeout = 30s milter_content_timeout = 30s # End of added lines If i comment all of this, the it seems to be working again. But is that safe to do?
I've not used, nor have any opinion on, bitdefender; as far as "safe," I'd definitely recommend having a decent virus scanner in your mix. As to your issue, the error was "command rejected" - maybe it needs a different milter_protocol setting ?