Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HELP: cannot send email out after upgraded to 2.3.3

    Scheduled Pinned Locked Moved General pfSense Questions
    29 Posts 6 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      caigeliu
      last edited by

      I have just upgraded to pfSense 2.3.3. After upgrade, I cannot send email notification. When I click "Test SMPT Setting" button, the error message is:

      Could not send the message to @.** – Error: could not connect to the host "mail.*.": ??

      I have tried many times and it is not possible that the problem is caused by my input error. I have also tested my email server from this pfsense by using "telnet mail.. 25" or 587 or 465, all testings are good.

      Would you please give me any suggestions to fix it. Thanks.

      1 Reply Last reply Reply Quote 0
      • C
        caigeliu
        last edited by

        Still hope suggestions and help.
        It says "could not connect to the host", but it's no problem to connect to the mail server from this pfsense machine.

        1 Reply Last reply Reply Quote 0
        • D
          dgcom
          last edited by

          How is it configured?
          Are you using well-known mail provider or your own?
          Are you using authentication?
          Using ports 25/587 with authentication need STARTTLS and 465 need SMTP over SSL/TLS.

          I suggest you also try packet capture and see if it even tries to connect.

          DG

          1 Reply Last reply Reply Quote 0
          • C
            caigeliu
            last edited by

            See attached picture. Besides options shown in the picture, I have also tried:
            untick "Disable SMTP notification"
            use 587, 25, 465 ports
            All input are correct, no typo.

            The email server I input is correct, I tested with "telnet email-server 587", etc.

            I don't know why the error msg is " Error: could not connect to the host … ??".  The same setting worked in the old version of pfsense 2.3.5.

            pfsense-email.PNG
            pfsense-email.PNG_thumb

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              To repeat: Ports 25 and 587 generally need STARTTLS. SSL/TLS generally needs to be on port 465.

              The email server I input is correct, I tested with "telnet email-server 587", etc.

              The proper test for how you have that configured would be:

              openssl s_client -connect mail_server:587

              Which would almost certainly fail.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • C
                caigeliu
                last edited by

                You're right. port 25 no ssl/tls. port 465 for ssl, 587 for tls. I have tried many different combinations.

                I just tried your command from ssh console, testing is OK (see picture).

                The problem is why cannot connect the host from pfSense notification page? I can connect to the mail server host in ssh console.

                pfsense-email2.PNG
                pfsense-email2.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  That is not a successful connection.

                  To test a connection to that server using encryption on port 587 you would need:

                  openssl s_client -connect mail.server:587 -starttls smtp

                  IF YOU ARE CONNECTING ON PORT 25 or 587 AND WANT ENCRYPTION YOU NEED TO USE STARTTLS

                  IF YOU WANT TO CONNECT USING SSL/TLS YOU NEED TO USE PORT 465

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • D
                    dgcom
                    last edited by

                    The correct command for testing STARTTLS is:

                    openssl s_client -starttls smtp -crlf -connect smtp.gmail.com:587
                    

                    (use either Ctrl+C or type QUIT+CrLf to end)
                    Provide output (you can sanitize it a bit if it shows your cert info.

                    To test different versions of SSL, try -ssl3, -tls1,  -tls1_1 and  -tls1_2

                    Could be that your server is not supporting recent SSL versions which were disabled in pfSence…

                    DG

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      He is connecting to port 587 using SSL/TLS. That will never work.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • C
                        caigeliu
                        last edited by

                        Thanks for all reply. If use 587:

                        pfsense-email3.PNG
                        pfsense-email3.PNG_thumb
                        pfsense-email5.PNG
                        pfsense-email5.PNG_thumb
                        pfsense-email6.PNG
                        pfsense-email6.PNG_thumb

                        1 Reply Last reply Reply Quote 0
                        • C
                          caigeliu
                          last edited by

                          If use 465,

                          pfsense-email7.PNG
                          pfsense-email7.PNG_thumb
                          pfsense-email8.PNG
                          pfsense-email8.PNG_thumb

                          1 Reply Last reply Reply Quote 0
                          • C
                            caigeliu
                            last edited by

                            All above errors are not caused by input parameters or our email server.

                            1 Reply Last reply Reply Quote 0
                            • P
                              phil.davis
                              last edited by

                              Note this bug https://redmine.pfsense.org/issues/7516 "Notify test buttons for smtp/growl should use new unsaved settings" and PR https://github.com/pfsense/pfsense/pull/3691 that fixes it.

                              In current releases (e.g. 2.3.3-p1) you have to save the settings first, then use the test buttons. It just tests the currently-saved settings, not the changes you may just have made in the form.

                              The fix is in 2.3.4 which is coming.

                              So maybe when you are trying lots of combinations and pressing "test", you are not actually getting an effective test.

                              As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                              If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                              1 Reply Last reply Reply Quote 0
                              • D
                                dgcom
                                last edited by

                                Looking at your screenshots, I believe that something else is corrupted, possibly in the config - look at pfsense-email6.PNG - it says that it could not start TLS.
                                I would suggest you take packet capture with this setting and look at it in Wireshark - make sure it goes to the right destination, connects and tries to negotiate SSL session.

                                DG

                                1 Reply Last reply Reply Quote 0
                                • C
                                  caigeliu
                                  last edited by

                                  @phil.davis:

                                  In current releases (e.g. 2.3.3-p1) you have to save the settings first, then use the test buttons.

                                  I first click "save", then click test in above screenshots.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    dgcom
                                    last edited by

                                    Please, review this forum thread - it may have an answer for you.
                                    I did not read it in full, but it seems that there is an issue with certs used for SMTP, issued by private CA - pfSence has to trust them and some public CA certs might be missing in newer builds…

                                    DG

                                    1 Reply Last reply Reply Quote 0
                                    • N
                                      NOYB
                                      last edited by

                                      Maybe it's time to simplify and apply isolation troubleshooting techniques.

                                      Remove encryption from the equation.  To protect authentication credentials, change the password or create a throwaway account for testing.

                                      From time to time some CA's are eliminated from the store.  Don't recall the error message that occurs when that happens so don't know if your error messages are due to that or not.

                                      1 Reply Last reply Reply Quote 0
                                      • C
                                        caigeliu
                                        last edited by

                                        Here  are complete packages for one testing of 465:

                                        13:07:21.615841 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32106, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x97b0 (correct), seq 2191407335:2191408795, ack 2273860481, win 16309, length 1460
                                        13:07:21.643670 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 59, id 43376, offset 0, flags [DF], proto TCP (6), length 40)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0xd3da (correct), seq 1, ack 11680, win 1748, length 0
                                        13:07:21.643920 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 526: (tos 0x0, ttl 63, id 32107, offset 0, flags [DF], proto TCP (6), length 512)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [P.], cksum 0xe604 (correct), seq 11680:12152, ack 1, win 16309, length 472
                                        13:07:21.650116 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 59, id 43377, offset 0, flags [DF], proto TCP (6), length 40)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0xd1c5 (correct), seq 1, ack 12152, win 1809, length 0
                                        13:07:21.650363 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32113, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x6236 (correct), seq 17992:19452, ack 1, win 16309, length 1460
                                        13:07:21.657134 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43378, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x925e (correct), seq 1, ack 12152, win 1809, options [nop,nop,sack 1 {17992:19452}], length 0
                                        13:07:21.958969 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32114, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0xd8ef (correct), seq 12152:13612, ack 1, win 16309, length 1460
                                        13:07:21.965808 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43379, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x8caa (correct), seq 1, ack 13612, win 1809, options [nop,nop,sack 1 {17992:19452}], length 0
                                        13:07:21.966116 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32115, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [P.], cksum 0x09f4 (correct), seq 19452:20912, ack 1, win 16309, length 1460
                                        13:07:21.966144 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32116, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x4330 (correct), seq 20912:22372, ack 1, win 16309, length 1460
                                        13:07:21.972885 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43380, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x86f6 (correct), seq 1, ack 13612, win 1809, options [nop,nop,sack 1 {17992:20912}], length 0
                                        13:07:21.974129 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43381, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x8142 (correct), seq 1, ack 13612, win 1809, options [nop,nop,sack 1 {17992:22372}], length 0
                                        13:07:22.308207 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 1868, offset 0, flags [DF], proto TCP (6), length 60)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags , cksum 0x4e45 (incorrect -> 0xc40a), seq 2198535874, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 3724690981 ecr 0], length 0
                                        13:07:22.330747 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 59, id 0, offset 0, flags [DF], proto TCP (6), length 60)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [S.], cksum 0x6922 (correct), seq 2017900417, ack 2198535875, win 14480, options [mss 1460,sackOK,TS val 1841922946 ecr 3724690981,nop,wscale 7], length 0
                                        13:07:22.330792 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 4415, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [.], cksum 0x4e3d (incorrect -> 0xce60), seq 1, ack 1, win 520, options [nop,nop,TS val 3724691003 ecr 1841922946], length 0
                                        13:07:22.359282 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 583: (tos 0x0, ttl 64, id 25093, offset 0, flags [DF], proto TCP (6), length 569)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [P.], cksum 0x5042 (incorrect -> 0x1caf), seq 1:518, ack 1, win 520, options [nop,nop,TS val 3724691032 ecr 1841922946], length 517
                                        13:07:22.365140 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 13339, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [.], cksum 0xcd98 (correct), seq 1, ack 518, win 122, options [nop,nop,TS val 1841922998 ecr 3724691032], length 0
                                        13:07:22.369283 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 59, id 13340, offset 0, flags [DF], proto TCP (6), length 1500)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [.], cksum 0x40c3 (correct), seq 1:1449, ack 518, win 122, options [nop,nop,TS val 1841923000 ecr 3724691032], length 1448
                                        13:07:22.369318 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 44488, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [.], cksum 0x4e3d (incorrect -> 0xc661), seq 518, ack 1449, win 509, options [nop,nop,TS val 3724691042 ecr 1841923000], length 0
                                        13:07:22.370515 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 59, id 13341, offset 0, flags [DF], proto TCP (6), length 1500)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [.], cksum 0xba14 (correct), seq 1449:2897, ack 518, win 122, options [nop,nop,TS val 1841923000 ecr 3724691032], length 1448
                                        13:07:22.370549 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 11179, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [.], cksum 0x4e3d (incorrect -> 0xc0b8), seq 518, ack 2897, win 509, options [nop,nop,TS val 3724691043 ecr 1841923000], length 0
                                        13:07:22.371468 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 1259: (tos 0x0, ttl 59, id 13342, offset 0, flags [DF], proto TCP (6), length 1245)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0xf721 (correct), seq 2897:4090, ack 518, win 122, options [nop,nop,TS val 1841923000 ecr 3724691032], length 1193
                                        13:07:22.371500 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 51963, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [.], cksum 0x4e3d (incorrect -> 0xbc0c), seq 518, ack 4090, win 511, options [nop,nop,TS val 3724691044 ecr 1841923000], length 0
                                        13:07:22.378422 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 268: (tos 0x0, ttl 64, id 26698, offset 0, flags [DF], proto TCP (6), length 254)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [P.], cksum 0x4f07 (incorrect -> 0xe7bc), seq 518:720, ack 4090, win 520, options [nop,nop,TS val 3724691051 ecr 1841923000], length 202
                                        13:07:22.384517 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 324: (tos 0x0, ttl 59, id 13343, offset 0, flags [DF], proto TCP (6), length 310)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0x1909 (correct), seq 4090:4348, ack 720, win 130, options [nop,nop,TS val 1841923017 ecr 3724691051], length 258
                                        13:07:22.384548 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 11560, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [.], cksum 0x4e3d (incorrect -> 0xba1b), seq 720, ack 4348, win 518, options [nop,nop,TS val 3724691057 ecr 1841923017], length 0
                                        13:07:22.384753 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 97: (tos 0x0, ttl 64, id 43524, offset 0, flags [DF], proto TCP (6), length 83)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [P.], cksum 0x4e5c (incorrect -> 0x64db), seq 720:751, ack 4348, win 520, options [nop,nop,TS val 3724691057 ecr 1841923017], length 31
                                        13:07:22.387929 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24108, offset 0, flags [DF], proto TCP (6), length 52)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [F.], cksum 0x4e3d (incorrect -> 0xb9f6), seq 751, ack 4348, win 520, options [nop,nop,TS val 3724691060 ecr 1841923017], length 0
                                        13:07:22.389948 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 174: (tos 0x0, ttl 59, id 13344, offset 0, flags [DF], proto TCP (6), length 160)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0x5a0d (correct), seq 4348:4456, ack 720, win 130, options [nop,nop,TS val 1841923022 ecr 3724691057], length 108
                                        13:07:22.389982 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 2526, offset 0, flags [DF], proto TCP (6), length 40)
                                            pfsense-ip.36683 > mail-sever-ip.465: Flags [R], cksum 0x4e31 (incorrect -> 0x4c10), seq 2198536594, win 0, length 0
                                        13:07:22.390025 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 13345, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [F.], cksum 0xbb0d (correct), seq 4456, ack 751, win 130, options [nop,nop,TS val 1841923023 ecr 3724691057], length 0
                                        13:07:22.393318 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 13346, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [.], cksum 0xbb06 (correct), seq 4457, ack 752, win 130, options [nop,nop,TS val 1841923026 ecr 3724691060], length 0
                                        13:07:22.879497 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32127, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0xda47 (correct), seq 13612:15072, ack 1, win 16309, length 1460
                                        13:07:22.947930 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 174: (tos 0x0, ttl 59, id 13347, offset 0, flags [DF], proto TCP (6), length 160)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0x5835 (correct), seq 4348:4456, ack 752, win 130, options [nop,nop,TS val 1841923459 ecr 3724691060], length 108
                                        13:07:22.948379 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43382, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x7b99 (correct), seq 1, ack 15072, win 1798, options [nop,nop,sack 1 {17992:22372}], length 0
                                        13:07:22.948869 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32128, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0xe265 (correct), seq 22372:23832, ack 1, win 16309, length 1460
                                        13:07:22.948886 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32129, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x1c25 (correct), seq 23832:25292, ack 1, win 16309, length 1460
                                        13:07:22.955779 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43383, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x75e5 (correct), seq 1, ack 15072, win 1798, options [nop,nop,sack 1 {17992:23832}], length 0
                                        13:07:22.956866 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43384, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x7031 (correct), seq 1, ack 15072, win 1798, options [nop,nop,sack 1 {17992:25292}], length 0
                                        13:07:23.874785 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 174: (tos 0x0, ttl 59, id 13348, offset 0, flags [DF], proto TCP (6), length 160)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0x54cb (correct), seq 4348:4456, ack 752, win 130, options [nop,nop,TS val 1841924333 ecr 3724691060], length 108
                                        13:07:25.504447 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 174: (tos 0x0, ttl 59, id 13349, offset 0, flags [DF], proto TCP (6), length 160)
                                            mail-sever-ip.465 > pfsense-ip.36683: Flags [P.], cksum 0x4df7 (correct), seq 4348:4456, ack 752, win 130, options [nop,nop,TS val 1841926081 ecr 3724691060], length 108
                                        13:07:25.968249 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32150, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x8d20 (correct), seq 15072:16532, ack 1, win 16309, length 1460
                                        13:07:26.311212 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43385, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x6a88 (correct), seq 1, ack 16532, win 1787, options [nop,nop,sack 1 {17992:25292}], length 0
                                        13:07:26.311668 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32151, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x4617 (correct), seq 25292:26752, ack 1, win 16309, length 1460
                                        13:07:26.311692 00:08:a2:09:4b:7f > 00:31:46:3d:ab:84, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 63, id 32152, offset 0, flags [DF], proto TCP (6), length 1500)
                                            pfsense-ip.47374 > mail-sever-ip.465: Flags [.], cksum 0x5bf6 (correct), seq 26752:28212, ack 1, win 16309, length 1460
                                        13:07:26.442459 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43386, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x64d4 (correct), seq 1, ack 16532, win 1787, options [nop,nop,sack 1 {17992:26752}], length 0
                                        13:07:26.442489 00:31:46:3d:ab:84 > 00:08:a2:09:4b:7f, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 59, id 43387, offset 0, flags [DF], proto TCP (6), length 52)
                                            mail-sever-ip.465 > pfsense-ip.47374: Flags [.], cksum 0x5f20 (correct), seq 1, ack 16532, win 1787, options [nop,nop,sack 1 {17992:28212}], length 0

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          dgcom
                                          last edited by

                                          You should really do this with port 587, save pcap file and review it in Wireshark.
                                          But even with this capture - it looks like it connects, but can't authenticate or negotiate proper SSL channel.

                                          DG

                                          1 Reply Last reply Reply Quote 0
                                          • N
                                            NOYB
                                            last edited by

                                            @dgcom:

                                            You should really do this with port 587, save pcap file and review it in Wireshark.
                                            But even with this capture - it looks like it connects, but can't authenticate or negotiate proper SSL channel.

                                            pfSense likely missing the CA for the server cert.  As is pointed out in that thread you linked to a few posts ago.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.