curl / Mailing Lists / curl-users / Single Mail

curl-users

Re: SMTP sending emails with curl 7.64 with a batch file fails, Version 7.40 works

From: Ray Satiro <raysatiro_at_yahoo.com>
Date: Tue, 12 Mar 2019 01:05:06 -0400

On 3/7/2019 8:37 AM, eisel_at_bankettprofi.de wrote:
>
> we send e-mails with a curl command line. Previously we used the
> version 7.40 and sending the e-mail works fine.
> Since we have to switch to a current version, sending does not work
> anymore.
>
> We always use the same command line and change only the curl version.
>
> Here are the Logs using Curl 7.40 (working)
>
>   % Total    % Received % Xferd  Average Speed   Time    Time Time 
> Current
>                                  Dload  Upload   Total   Spent Left  Speed
>   0     0    0     0    0     0      0      0 --:--:-- --:--:--
> --:--:--     0*   Trying 92.43.217.111...
> * Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
> * Marked for [keep alive]: SMTP default
> * TLSv1.2, TLS handshake, Client hello (1):
> } [512 bytes data]
> * TLSv1.2, TLS handshake, Server hello (2):
> { [66 bytes data]
> * TLSv1.2, TLS handshake, CERT (11):
> { [3798 bytes data]
> * TLSv1.2, TLS handshake, Server key exchange (12):
> { [333 bytes data]
> * TLSv1.2, TLS handshake, Server finished (14):
> { [4 bytes data]
> * TLSv1.2, TLS handshake, Client key exchange (16):
> } [70 bytes data]
> * TLSv1.2, TLS change cipher, Client hello (1):
> } [1 bytes data]
> * TLSv1.2, TLS handshake, Finished (20):
> } [16 bytes data]
> * TLSv1.2, TLS change cipher, Client hello (1):
> { [1 bytes data]
> * TLSv1.2, TLS handshake, Finished (20):
> { [16 bytes data]
> * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
> * Server certificate:
> *        subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein;
> O=Webland AG; OU=IT; CN=*.webland.ch
> *        start date: 2018-08-31 00:00:00 GMT
> *        expire date: 2020-06-29 12:00:00 GMT
> *        issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte
> RSA CA 2018
> *        SSL certificate verify result: self signed certificate in
> certificate chain (19), continuing anyway.
> < 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12
> Feb 2019 14:24:07 +0100
> < 220-Webland Secure Mail Server
> < 220-
> < 220-All connections are logged!
> < 220 This server uses antivirus and antispam technology
>> EHLO test.txt
> < 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
> < 250-ENHANCEDSTATUSCODES
> < 250-SIZE 52428800
> < 250-EXPN
> < 250-ETRN
> < 250-ATRN
> < 250-DSN
> < 250-CHECKPOINT
> < 250-8BITMIME
> < 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
> < 250 HELP
>> AUTH DIGEST-MD5
> < 334
> cmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLHFvcD0iYXV0aCIsYWxnb3JpdGhtPW1kNS1zZXNz
>>
> dXNlcm5hbWU9InRlc3RAbWRhcy5jaCIscmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLGNub25jZT0iMWJiMTBhZDRkY2I3N2Y2ZTJiOTViNzk4YWNkMjNhYWUiLG5jPSIwMDAwMDAwMSIsZGlnZXN0LXVyaT0ic210cC9tczExLndlYmxhbmQuY2giLHJlc3BvbnNlPWUzOGFjNWMwMGRmM2ZmZDA0NmQ4Y2Q4ZmQxMThkOWZjLHFvcD1hdXRo
> < 334 cnNwYXV0aD1jYWRjNjI0ZTM1YmQxNjAyM2I4YTIzYTljZGQ4MTU5ZA==
>>
> < 235 2.0.0 Authentication successful
>   0     0    0     0    0     0      0      0 --:--:-- --:--:--
> --:--:--     0> MAIL FROM:<test_at_mdas.ch> SIZE=2872
> < 250 2.1.0 <test_at_mdas.ch>... Sender ok
>> RCPT TO:<test_mail_2_at_bankettprofi.de>
> < 250 2.1.5 <test_mail_2_at_bankettprofi.de>... Recipient ok; will forward
>> DATA
> < 354 Enter mail, end with "." on a line by itself
> } [2872 bytes data]
> * We are completely uploaded and fine
> < 250 2.6.0 2872 bytes received in 00:00:00; Message id
> 01201902121424074646 accepted for delivery
> 100  2872    0     0  100  2872      0   3406 --:--:-- --:--:--
> --:--:--  3406
> * Connection #0 to host ms11smtp.webland.ch left intact
>
>
>
> Here ist the Log of Curl 7.64 (not working, but same command line)
>
> * Expire in 0 ms for 6 (transfer 0xb3e088)
> * Expire in 1 ms for 1 (transfer 0xb3e088)
>   % Total    % Received % Xferd  Average Speed   Time    Time Time 
> Current
>                                  Dload  Upload   Total   Spent Left  Speed
>   0     0    0     0    0     0      0      0 --:--:-- --:--:--
> --:--:--     0* Expire in 5 ms for 1 (transfer 0xb3e088)
> * Expire in 5 ms for 1 (transfer 0xb3e088)
> *   Trying 92.43.217.111...
> * TCP_NODELAY set
> * Expire in 200 ms for 4 (transfer 0xb3e088)
> * Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
> } [5 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> } [512 bytes data]
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> { [61 bytes data]
> * TLSv1.2 (IN), TLS handshake, Certificate (11):
> { [3798 bytes data]
> * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
> { [333 bytes data]
> * TLSv1.2 (IN), TLS handshake, Server finished (14):
> { [4 bytes data]
> * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
> } [70 bytes data]
> * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
> } [1 bytes data]
> * TLSv1.2 (OUT), TLS handshake, Finished (20):
> } [16 bytes data]
> * TLSv1.2 (IN), TLS handshake, Finished (20):
> { [16 bytes data]
> * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
> * Server certificate:
> *  subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland AG;
> OU=IT; CN=*.webland.ch
> *  start date: Aug 31 00:00:00 2018 GMT
> *  expire date: Jun 29 12:00:00 2020 GMT
> *  issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte RSA CA
> 2018
> *  SSL certificate verify result: self signed certificate in
> certificate chain (19), continuing anyway.
> { [5 bytes data]
> < 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12
> Feb 2019 14:25:07 +0100
> < 220-Webland Secure Mail Server
> < 220-
> < 220-All connections are logged!
> < 220 This server uses antivirus and antispam technology
> } [5 bytes data]
>> EHLO test.txt
> { [5 bytes data]
> < 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
> < 250-ENHANCEDSTATUSCODES
> < 250-SIZE 52428800
> < 250-EXPN
> < 250-ETRN
> < 250-ATRN
> < 250-DSN
> < 250-CHECKPOINT
> < 250-8BITMIME
> < 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
> < 250 HELP
> } [5 bytes data]
>> AUTH GSSAPI
> { [5 bytes data]
> < 334
>   0     0    0     0    0     0      0      0 --:--:-- --:--:--
> --:--:--     0
> * Closing connection 0
> curl: (56) Failure when receiving data from the peer
>
> Are there new command line parameters that you have to use now? When
> looking at the parameters,
> I did not notice anybody whom I connect with the error message "curl:
> (56) Failure when receiving data from the peer".

The log shows success auth is DIGEST-MD5 and fail auth is GSSAPI. The
last message in the fail case is code 334 [1] as an empty challenge.
Whether this is correct or not for GSSAPI I don't know, hopefully
someone else can chime in. Does curl briefly hang at that point or
terminate immediately? Anyway, you can force DIGEST-MD5 like
smtps://;AUTH=DIGEST-MD5_at_ms11smtp.webland.ch

[1]: https://tools.ietf.org/html/rfc4954#page-4

-----------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
Etiquette: https://curl.haxx.se/mail/etiquette.html
Received on 2019-03-12