On Sat, Nov 22, 2008 at 4:27 PM, Per Jessen
Ciro Iriarte wrote:
Post tcpdump.dmp generated by "tcpdump -w /tmp/tcpdump.dmp -s 0 -i <interface> port 25", that can be analyzed with wireshark.
I ran this yesterday:
tcpdump -n -i eth0 -s 1500 -w file host 195.65.248.162
http://jessen.ch/files/cellere-tcpdump-full-fe1 http://jessen.ch/files/cellere-tcpdump-full-fe2
If there's no response at all, would be nice to take a look at the logs from remote site (assuming it's a friendly site :D)...
Well, for starters I'd like to ascertain that it's not my side creating the problem. I have not yet been able to establish contact to the other side, and chances are it's a Windows site ...
-- /Per Jessen, Zürich
the smtp session is
220 inbound.spamchek.net ESMTP Postfix (louiswu7 via aluminium)
EHLO CV-TM1.cvsg.local
250-inbound.spamchek.net
250-PIPELINING
250-SIZE
250-VRFY
250-ETRN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
MAIL FROM: