curl / Mailing Lists / curl-users / Single Mail

curl-users

AW: Re: SMTP sending emails with curl 7.64 with a batch file fails

From: <eisel_at_bankettprofi.de>
Date: Tue, 12 Feb 2019 16:06:18 +0100

Hello,

thank you for your reaction.

The last e-mail was not realy readable in the mailing list. In the
confirmation e-mail i received,
the text was readable and in Outlook and Thunderbird as well.

The problem seems to be the mailing list, because the mail arrives
everywhere legibly. I now
send the mail again in the hope that it becomes readable.

We always use the same command line and change only the curl version.

Here are the Logs using Curl 7.40 (working)

   % Total    % Received % Xferd  Average Speed   Time    Time Time  Current
                                  Dload  Upload   Total   Spent Left  Speed
   0     0    0     0    0     0      0      0 --:--:-- --:--:--
--:--:--     0*   Trying 92.43.217.111...
* Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
* Marked for [keep alive]: SMTP default
* TLSv1.2, TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2, TLS handshake, Server hello (2):
{ [66 bytes data]
* TLSv1.2, TLS handshake, CERT (11):
{ [3798 bytes data]
* TLSv1.2, TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2, TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2, TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
{ [1 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
*        subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland
AG; OU=IT; CN=*.webland.ch
*        start date: 2018-08-31 00:00:00 GMT
*        expire date: 2020-06-29 12:00:00 GMT
*        issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte
RSA CA 2018
*        SSL certificate verify result: self signed certificate in
certificate chain (19), continuing anyway.
< 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12 Feb
2019 14:24:07 +0100
< 220-Webland Secure Mail Server
< 220-
< 220-All connections are logged!
< 220 This server uses antivirus and antispam technology
> EHLO test.txt
< 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
< 250-ENHANCEDSTATUSCODES
< 250-SIZE 52428800
< 250-EXPN
< 250-ETRN
< 250-ATRN
< 250-DSN
< 250-CHECKPOINT
< 250-8BITMIME
< 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
< 250 HELP
> AUTH DIGEST-MD5
< 334
cmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLHFvcD0iYXV0aCIsYWxnb3JpdGhtPW1kNS1zZXNz
>
dXNlcm5hbWU9InRlc3RAbWRhcy5jaCIscmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLGNub25jZT0iMWJiMTBhZDRkY2I3N2Y2ZTJiOTViNzk4YWNkMjNhYWUiLG5jPSIwMDAwMDAwMSIsZGlnZXN0LXVyaT0ic210cC9tczExLndlYmxhbmQuY2giLHJlc3BvbnNlPWUzOGFjNWMwMGRmM2ZmZDA0NmQ4Y2Q4ZmQxMThkOWZjLHFvcD1hdXRo
< 334 cnNwYXV0aD1jYWRjNjI0ZTM1YmQxNjAyM2I4YTIzYTljZGQ4MTU5ZA==
>
< 235 2.0.0 Authentication successful
   0     0    0     0    0     0      0      0 --:--:-- --:--:--
--:--:--     0> MAIL FROM:<test_at_mdas.ch> SIZE=2872
< 250 2.1.0 <test_at_mdas.ch>... Sender ok
> RCPT TO:<test_mail_2_at_bankettprofi.de>
< 250 2.1.5 <test_mail_2_at_bankettprofi.de>... Recipient ok; will forward
> DATA
< 354 Enter mail, end with "." on a line by itself
} [2872 bytes data]
* We are completely uploaded and fine
< 250 2.6.0 2872 bytes received in 00:00:00; Message id
01201902121424074646 accepted for delivery
100  2872    0     0  100  2872      0   3406 --:--:-- --:--:--
--:--:--  3406
* Connection #0 to host ms11smtp.webland.ch left intact

Here ist the Log of Curl 7.64 (not working, but same command line)

* Expire in 0 ms for 6 (transfer 0xb3e088)
* Expire in 1 ms for 1 (transfer 0xb3e088)
   % Total    % Received % Xferd  Average Speed   Time    Time Time  Current
                                  Dload  Upload   Total   Spent Left  Speed
   0     0    0     0    0     0      0      0 --:--:-- --:--:--
--:--:--     0* Expire in 5 ms for 1 (transfer 0xb3e088)
* Expire in 5 ms for 1 (transfer 0xb3e088)
*   Trying 92.43.217.111...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0xb3e088)
* Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [61 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [3798 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
*  subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland AG;
OU=IT; CN=*.webland.ch
*  start date: Aug 31 00:00:00 2018 GMT
*  expire date: Jun 29 12:00:00 2020 GMT
*  issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte RSA CA 2018
*  SSL certificate verify result: self signed certificate in certificate
chain (19), continuing anyway.
{ [5 bytes data]
< 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12 Feb
2019 14:25:07 +0100
< 220-Webland Secure Mail Server
< 220-
< 220-All connections are logged!
< 220 This server uses antivirus and antispam technology
} [5 bytes data]
> EHLO test.txt
{ [5 bytes data]
< 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
< 250-ENHANCEDSTATUSCODES
< 250-SIZE 52428800
< 250-EXPN
< 250-ETRN
< 250-ATRN
< 250-DSN
< 250-CHECKPOINT
< 250-8BITMIME
< 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
< 250 HELP
} [5 bytes data]
> AUTH GSSAPI
{ [5 bytes data]
< 334
   0     0    0     0    0     0      0      0 --:--:-- --:--:--
--:--:--     0
* Closing connection 0
curl: (56) Failure when receiving data from the peer

--- Ursprüngliche Nachricht ---
Von: curl-users_at_cool.haxx.se
Gesendet: 12. Februar 2019 00:00 Uhr
Betreff: Re: SMTP sending emails with curl 7.64 with a batch file fails

  On Mon, 11 Feb 2019, Rainer Eisel | Bankettprofi GmbH wrote:

> When we run this batch, Curl 7.64 returns the following error: "curl:
(55)
> RCPT failed: 550"
>
> If you use Curl 7.40, sending will work with the batch file.

Add -v and compare the protocol parts? What makes it get 550 now when it
worked previously?

-- 
   / daniel.haxx.se
-----------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
Etiquette:   https://curl.haxx.se/mail/etiquette.html
-----------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
Etiquette:   https://curl.haxx.se/mail/etiquette.html
Received on 2019-02-12