Hi, On Tue, 2013-03-05 at 22:36 -0500, Kevin J. Cummings wrote: > I'm not sure what this proves as so many hosts these days are configure > to not respond to pings, so they can't be DDOSed via ping. Yeah does seem more common now. > > > Then see if you can open a session using telnet on all the ports and run > > the SMTP hello message: > > # telnet smtp.verizon.net 25 > > ehlo hostname > Trying 206.46.232.100... > ehlo kjc386 > ^C This we expect. > > > # telnet smtp.verizon.net 465 > > ehlo hostname > Trying 206.46.232.100... > Connected to smtp.verizon.net. > Escape character is '^]'. > ehlo kjc386 > Connection closed by foreign host. > > > # telnet smtp.verizon.net 587 > > ehlo hostname > Trying 206.46.232.100... > ehlo kjc386 > ^C So port 465 is the only one being listened on and will not except anything other than an SSL connection at all, so can't really gain any information. Sounds like your best bet is to use stunnel. I don't have a reference for sendmail but you could probably adapt the one for postfix[0] pretty trivially. Debian also has a pretty nice write up[1] on this. Thanks, Michael [0]http://www.postfix.org/TLS_README.html#client_smtps [1]http://www.debian-administration.org/article/604/Postfix_Smarthost_using_Auth_and_SMTPS -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org