Re: SMTP sending emails with curl greater than Version 7.40 with a batch file fails, Version 7.40 works
Date: Fri, 24 May 2019 11:42:27 +0200
Hello Dan,
i tried the parameters (--tlsv1.2 , --tlsv1.1 and --tlsv1.0) in the
command line of the batch,
but still the same error
Log of Curl 7.65, added --tlsv1.0 ((--tlsv1.2 and --tlsv1.1 same result):
e:\Curl Batch\Curl7.65>curl.exe smtps://ms11smtp.webland.ch:465
--tlsv1.0 --verbose --ssl --insecure --mail-from <removed> --mail-rcpt
<removed> --user "<removed>" -T "test.txt"
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0* Trying 92.43.217.111:465...
* TCP_NODELAY set
* Connected to ms11smtp.webland.ch (92.43.217.111) port 465 (#0)
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [61 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [3798 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
* subject: C=CH; ST=Basel-Landschaft; L=Muenchenstein; O=Webland AG;
OU=IT; CN=*.webland.ch
* start date: Aug 31 00:00:00 2018 GMT
* expire date: Jun 29 12:00:00 2020 GMT
* issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte RSA CA 2018
* SSL certificate verify result: self signed certificate in certificate
chain (19), continuing anyway.
{ [5 bytes data]
< 220-ms11.webland.ch ESMTP Webland Mail Server v. 12.1.1.; Fri, 24 May
2019 11:30:38 +0200
< 220-Webland Secure Mail Server
< 220-
< 220-All connections are logged!
< 220 This server uses antivirus and antispam technology
} [5 bytes data]
> EHLO test.txt
{ [5 bytes data]
< 250-ms11.webland.ch Hello test.txt [24.134.53.25], pleased to meet you.
< 250-ENHANCEDSTATUSCODES
< 250-SIZE 52428800
< 250-EXPN
< 250-ETRN
< 250-ATRN
< 250-DSN
< 250-CHECKPOINT
< 250-8BITMIME
< 250-AUTH PLAIN LOGIN DIGEST-MD5 CRAM-MD5 GSSAPI
< 250 HELP
} [5 bytes data]
> AUTH GSSAPI
{ [5 bytes data]
< 334
0 0 0 0 0 0 0 0 --:--:-- --:--:--
--:--:-- 0
* Closing connection 0
} [5 bytes data]
* TLSv1.2 (OUT), TLS alert, close notify (256):
} [2 bytes data]
curl: (56) Failure when receiving data from the peer
Kind regrads
Rainer Eisel
Am 24.05.2019 um 11:15 schrieb Dan Fandrich:
> On Fri, May 24, 2019 at 10:58:34AM +0200, eisel_at_bankettprofi.de wrote:
>> this ist the output of "curl -V" Version 7.40:
>>
>> curl 7.40.0 (i386-pc-win32) libcurl/7.40.0 OpenSSL/1.0.1j zlib/1.2.8
>> libssh2/1.4.3
>> This ist the output of "curl -V" Version 7.65:
>>
>> curl 7.65.0 (i386-pc-win32) libcurl/7.65.0 OpenSSL/1.1.1b (Schannel)
>> zlib/1.2.11 brotli/1.0.7 WinIDN libssh2/1.8.2 nghttp2/1.38.0
> The OpenSSL version is 4 years newer on this version, which is likely the
> cause of the underlying problem. But whether it's an issue with OpenSSL or with
> the remove server, I don't know. You could try downgrading to an older TLS
> version at run-time with --tlsv1.2 or --tlsv1.1 (or even --tlsv1.0) and see if
> that helps.
>
>>>> Dan
> -----------------------------------------------------------
> Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
> Etiquette: https://curl.haxx.se/mail/etiquette.html
-----------------------------------------------------------
Unsubscribe: https://cool.haxx.se/list/listinfo/curl-users
Etiquette: https://curl.haxx.se/mail/etiquette.html
Received on 2019-05-24