curl-users
SMTP sending emails with curl 7.64 with a batch file fails, Version 7.40 works
Date: Thu, 7 Mar 2019 14:37:14 +0100
Hello,
we send e-mails with a curl command line. Previously we used the version
7.40 and sending the e-mail works fine.
Since we have to switch to a current version, sending does not work anymore.
We always use the same command line and change only the curl version.
Here are the Logs using Curl 7.40 (working)
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0* Trying 92.43.217.111...
* Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
* Marked for [keep alive]: SMTP default
* TLSv1.2, TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2, TLS handshake, Server hello (2):
{ [66 bytes data]
* TLSv1.2, TLS handshake, CERT (11):
{ [3798 bytes data]
* TLSv1.2, TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2, TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2, TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
{ [1 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
* subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland
AG; OU=IT; CN=*.webland.ch
* start date: 2018-08-31 00:00:00 GMT
* expire date: 2020-06-29 12:00:00 GMT
* issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte
RSA CA 2018
* SSL certificate verify result: self signed certificate in
certificate chain (19), continuing anyway.
< 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12 Feb
2019 14:24:07 +0100
< 220-Webland Secure Mail Server
< 220-
< 220-All connections are logged!
< 220 This server uses antivirus and antispam technology
> EHLO test.txt
< 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
< 250-ENHANCEDSTATUSCODES
< 250-SIZE 52428800
< 250-EXPN
< 250-ETRN
< 250-ATRN
< 250-DSN
< 250-CHECKPOINT
< 250-8BITMIME
< 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
< 250 HELP
> AUTH DIGEST-MD5
< 334
cmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLHFvcD0iYXV0aCIsYWxnb3JpdGhtPW1kNS1zZXNz
>
dXNlcm5hbWU9InRlc3RAbWRhcy5jaCIscmVhbG09Im1zMTEud2VibGFuZC5jaCIsbm9uY2U9IllqRTBZbU13WW1RMU0yRmwiLGNub25jZT0iMWJiMTBhZDRkY2I3N2Y2ZTJiOTViNzk4YWNkMjNhYWUiLG5jPSIwMDAwMDAwMSIsZGlnZXN0LXVyaT0ic210cC9tczExLndlYmxhbmQuY2giLHJlc3BvbnNlPWUzOGFjNWMwMGRmM2ZmZDA0NmQ4Y2Q4ZmQxMThkOWZjLHFvcD1hdXRo
< 334 cnNwYXV0aD1jYWRjNjI0ZTM1YmQxNjAyM2I4YTIzYTljZGQ4MTU5ZA==
>
< 235 2.0.0 Authentication successful
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0> MAIL FROM:<test_at_mdas.ch> SIZE=2872
< 250 2.1.0 <test_at_mdas.ch>... Sender ok
> RCPT TO:<test_mail_2_at_bankettprofi.de>
< 250 2.1.5 <test_mail_2_at_bankettprofi.de>... Recipient ok; will forward
> DATA
< 354 Enter mail, end with "." on a line by itself
} [2872 bytes data]
* We are completely uploaded and fine
< 250 2.6.0 2872 bytes received in 00:00:00; Message id
01201902121424074646 accepted for delivery
100 2872 0 0 100 2872 0 3406 --:--:-- --:--:--
--:--:-- 3406
* Connection #0 to host ms11smtp.webland.ch left intact
Here ist the Log of Curl 7.64 (not working, but same command line)
* Expire in 0 ms for 6 (transfer 0xb3e088)
* Expire in 1 ms for 1 (transfer 0xb3e088)
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0* Expire in 5 ms for 1 (transfer 0xb3e088)
* Expire in 5 ms for 1 (transfer 0xb3e088)
* Trying 92.43.217.111...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0xb3e088)
* Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [61 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [3798 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
* subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland AG;
OU=IT; CN=*.webland.ch
* start date: Aug 31 00:00:00 2018 GMT
* expire date: Jun 29 12:00:00 2020 GMT
* issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte RSA CA 2018
* SSL certificate verify result: self signed certificate in certificate
chain (19), continuing anyway.
{ [5 bytes data]
< 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Tue, 12 Feb
2019 14:25:07 +0100
< 220-Webland Secure Mail Server
< 220-
< 220-All connections are logged!
< 220 This server uses antivirus and antispam technology
} [5 bytes data]
> EHLO test.txt
{ [5 bytes data]
< 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
< 250-ENHANCEDSTATUSCODES
< 250-SIZE 52428800
< 250-EXPN
< 250-ETRN
< 250-ATRN
< 250-DSN
< 250-CHECKPOINT
< 250-8BITMIME
< 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
< 250 HELP
} [5 bytes data]
> AUTH GSSAPI
{ [5 bytes data]
< 334
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0
* Closing connection 0
curl: (56) Failure when receiving data from the peer
Are there new command line parameters that you have to use now? When
looking at the parameters,
I did not notice anybody whom I connect with the error message "curl:
(56) Failure when receiving data from the peer".
Kind Regards
Rainer Eisel
-----------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
Etiquette: https://curl.haxx.se/mail/etiquette.html
Received on 2019-03-07