Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <ab5d1c4c076e86afe8fd0c3b1df362ac@www.novabbs.com>
Deutsch   English   Français   Italiano  
<ab5d1c4c076e86afe8fd0c3b1df362ac@www.novabbs.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: hquest@hquest.pro.br (HQuest)
Newsgroups: comp.mail.sendmail
Subject: Re: [client] did not issue MAIL/EXPN/VRFY/ETRN during connection
Date: Sat, 27 Apr 2024 17:23:40 +0000
Organization: novaBBS
Message-ID: <ab5d1c4c076e86afe8fd0c3b1df362ac@www.novabbs.com>
References: <5c620d24d884ece84a12b62e2a4cbf45@www.novabbs.com> <v0h2fl$c0c$1@news.misty.com> <9c036674340a558c742c864a95764304@www.novabbs.com> <205d2ce2e6d1f636cb9afd2d26ae53fe@www.novabbs.com> <v0if4m$2sq$1@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
	logging-data="2547223"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="2XJ8hjIEUuziWBqN+XBS7yv7yfwqQ5GdIjLva+fAx2c";
User-Agent: Rocksolid Light
X-Rslight-Site: $2y$10$QgNpRqM6KJ5PDwEvlkm2mel.5NAmT7D5kvMlpjgocyIPYSQCnCG7u
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Rslight-Posting-User: 3d3517e5dd24387fdf8da64199401ea731577ab2
Bytes: 2779
Lines: 37

Claus Aßmann wrote:
>> On a positive note, I got information from the remote end:
> The site which tries to connect to your sendmail server?
Correct.

>> Remote server returned "554 5.4.0 < #4.4.2>"
> "Remote server" would be you MTA -- but that doesn't look like
> anything sendmail would return -- unless you have "weird" entries
> in the access map.

Zero entries related to these destinations. Mostly entries to allow relaying from internal networks, and options to disable, such as below. Internal entries and exceptions removed - but once again, none for any of the problematic sender domains.

# more /etc/mail/access
# Internal hosts whitelisted off DNS BL checks
Connect:127.0.0.1                       RELAY

# Trusted subnets and domains
127.0.0.1                               RELAY
domain.com                             RELAY

# Exceptions for broken systems

# Refer to section "Allowing Connections" on Sendmail's cf/README file
#
# Srv_features:
# RFCs require CR LF . CR LF for end of email message. Many systems won't respect that. Set
# G to allow for end of email with single LF
# U to allow for end of email with single CR
# tls_server: called when sendmail act as client, ready to send an email
# message after a STARTTLS command (should) have been issued;
# tls_client: called when sendmail act as server, ready to receive an email
# message after a STARTTLS command (should) have been issued, and/or from
# check_mail;

# Default TLS settings
Try_TLS:                                YES,VERIFY,ENCR
TLS_Srv:                                VERIFY,ENCR
TLS_Clt:                                VERIFY,ENCR