这是上一条消息的后续内容,因为它被视为垃圾邮件而被拒绝

这是上一条消息的后续内容,因为它被视为垃圾邮件而被拒绝

---身份验证信息---

AuthInfo: "U:root" "I:info@***domain***" "P:mypasswd"

当我发送包含以下内容的电子邮件时:

mail -s "subject" myemailaddress </tmp/work

我在 /var/log/maillog 中得到这个

Nov  1 18:11:05 ****host*** sendmail[7847]: 3A1HB5Ro007845: SMTP outgoing connect on [ip***]
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS: ClientCertFile missing
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS: ClientKeyFile missing
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS: CACertPath missing
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS: CACertFile missing
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS: CRLFile missing
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, init=1
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, start=ok
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, info: fds=11/10, err=2
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, info: fds=11/10, err=2
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, get_verify: 20 get_peer: 0x861b488
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, relay=smtp.office365.com, version=TLSv1/SSLv3, verify=FAIL, cipher=AES256-SHA, bits=256/256
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=client, cert-subject=/C=US/ST=Washington/L=Redmond/O=Microsoft+20Corporation/CN=outlook.com, cert-issuer=/C=US/O=DigiCert+20Inc/CN=DigiCert+20Cloud+20Services+20CA-1, verifymsg=unable to get local issuer certificate
Nov  1 18:11:05 ****host*** sendmail[7847]: STARTTLS=read, info: fds=11/10, err=2
Nov  1 18:11:05 ****host*** last message repeated 4 times
Nov  1 18:11:05 ****host*** sendmail[7847]: 3A1HB5Ro007845: to=<mymailto>, ctladdr=<tbred@****host***> (501/501), delay=00:00:00, xdelay=00:00:00, mailer=relay, pri=120501, relay=smtp.office365.com [52.97.215.114], dsn=4.0.0, stat=Deferred

当我查看日志文件时,我看到一条有关证书的消息。我需要证书吗?我的客户使用 msmtp 发送了一封没有证书的电子邮件,这很有效

---配置 msmtp---

host smtp.office365.com
protocol smtp
auth on
tls on
tls_starttls on
tls_certcheck on
#tls_trust_file /etc/ssl/certs/ca-certificates.crt
from info@***domain***
port 587
user info@***domain***
password mypasswd

答案1

auth on
tls on
tls_starttls on
tls_certcheck on

需要客户端上有信任链锚的服务器证书。

相关内容