View Issue Details

IDProjectCategoryView StatusLast Update
0000667Main CAcert Websitemy accountpublic2009-04-21 12:08
Reporterph3 Assigned To 
PrioritynormalSeveritycrashReproducibilityalways
Status newResolutionopen 
PlatformMain CAcert WebsiteOSN/A 
Summary0000667: E-Mail verify does not work if recipient's server requres TLS
DescriptionE-Mail addresses can not be verified if recipient's server requires ESMTP STARTTLS TLS to deliver mail. This works for normal notify/... mails.
Additional InformationPostfix logfile:

Jan 3 21:27:13 ph7 postfix/smtpd[8647]: connect from www.cacert.org[213.154.225.245]
Jan 3 21:27:19 ph7 postfix/smtpd[8647]: lost connection after HELO from www.cacert.org[213.154.225.245]
TagsNo tags attached.
Reviewed by
Test Instructions

Relationships

related to 0000239 closed Use real MTA which doesn't fail on greylisting 

Activities

Sourcerer

2009-01-04 19:36

administrator   ~0001266

Yes, can anyone provide a patch, please?

Daniel Black

2009-03-25 04:20

reporter   ~0001326

I think like bug 239, that occurred when a staff member trying to get a certificate, a proper MTA should be used as a fallback to a direct sending failing.

That would fix this bug too with opportunistic TLS enabled.

It would also make feature bug 545 possible.

Daniel Black

2009-03-25 20:28

reporter   ~0001327

a solution to the negative user reporting aspects of bug 239 could be done by presenting the user with a view of the mail queue as it relates to their email address. That way they would see greylisting delay messages or any other reject messages.

Issue History

Date Modified Username Field Change
2009-01-03 20:32 ph3 New Issue
2009-01-04 19:36 Sourcerer Note Added: 0001266
2009-03-25 04:20 Daniel Black Note Added: 0001326
2009-03-25 20:28 Daniel Black Note Added: 0001327
2009-04-21 12:08 ph3 Relationship added related to 0000239