View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0000667||Main CAcert Website||my account||public||2009-01-03 20:32||2009-04-21 12:08|
|Platform||Main CAcert Website||OS||N/A|
|Summary||0000667: E-Mail verify does not work if recipient's server requres TLS|
|Description||E-Mail addresses can not be verified if recipient's server requires ESMTP STARTTLS TLS to deliver mail. This works for normal notify/... mails.|
|Additional Information||Postfix logfile:|
Jan 3 21:27:13 ph7 postfix/smtpd: connect from www.cacert.org[22.214.171.124]
Jan 3 21:27:19 ph7 postfix/smtpd: lost connection after HELO from www.cacert.org[126.96.36.199]
|Tags||No tags attached.|
||Yes, can anyone provide a patch, please?|
I think like bug 239, that occurred when a staff member trying to get a certificate, a proper MTA should be used as a fallback to a direct sending failing.
That would fix this bug too with opportunistic TLS enabled.
It would also make feature bug 545 possible.
||a solution to the negative user reporting aspects of bug 239 could be done by presenting the user with a view of the mail queue as it relates to their email address. That way they would see greylisting delay messages or any other reject messages.|