Carlos E. R. wrote:
Apr 10 12:06:32 nimrodel postfix/smtp[21659]: maps_find: smtp_sasl_passwd: hash:/etc/postfix/sasl_passwd(0,lock|fold_fix): smtp.my.isp = mylogin:mypassword Apr 10 12:06:32 nimrodel postfix/smtp[21659]: smtp_sasl_passwd_lookup: host `smtp.my.isp' user `mylogin' pass `mypassword' Apr 10 12:06:32 nimrodel postfix/smtp[21659]: starting new SASL client Apr 10 12:06:32 nimrodel postfix/smtp[21659]: starting new SASL client Apr 10 12:06:32 nimrodel postfix/smtp[21659]: smtp_sasl_authenticate: smtp.my.isp[213.4.149.66]: SASL mechanisms LOGIN LOGIN CRAM-MD5 DIGEST-MD5 Apr 10 12:06:32 nimrodel postfix/smtp[21659]: > smtp.my.isp[213.4.149.66]: AUTH DIGEST-MD5 Apr 10 12:06:32 nimrodel postfix/smtp[21659]: < smtp.my.isp[213.4.149.66]: 334 cmVhbG09ImN0c210cG91... Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_client_next: decoded challenge: realm="ctsmtpout1.frontal.correo",nonce="3947F000ECF7BB....",algorithm=md5-sess,qop="auth" Apr 10 12:06:32 nimrodel postfix/smtp[21659]: SASL authentication debug: DIGEST-MD5 client step 2 Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_user: mylogin Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_user: mylogin Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_passwd: mypassword Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_client_next: uncoded client response username="mylogin",realm="ctsmtpout1.frontal.correo",nonce="3947F000ECF7BBDB5FA...",cnonce="ooSxxt9m...=",nc=00000001,qop=auth,digest-uri="smtp/smtp.my.isp",response=5dd... Apr 10 12:06:32 nimrodel postfix/smtp[21659]: > smtp.my.isp[213.4.149.66]: dXNlcm5hbWU9ImNlcm9iaW4uam9icyIscmVhbG09ImN0... Apr 10 12:06:37 nimrodel postfix/smtp[21659]: < smtp.my.isp[213.4.149.66]: 535 invalid user ID or password
Your Postfix obviously tries to authenticate using your user:pass in /etc/postfix/sasl_passwd, but the password OR user is not accepted. If you are sure that user:pass is correct, you could try to force Postfix to use another auth mech. Usually Postfix will use the most secure auth mech available, in this case Digest-md5. If there is some problem, you might try the other mechs. smtp_discard_ehlo_keyword_address_maps = hash:/etc/postfix/ehlo_discard_words /etc/postfix/ehlo_discard_words: 213.4.149.66 digest-md5 That should disable digest-md5 for the isp server. -- Sandy List replies only please! Please address PMs to: news-reply2 (@) japantest (.) homelinux (.) com -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org