1

Тема: Ipfw Smtp

На сервере фри стоит IPFW. Нужно установить медок и соответственно почту для отправки. Решил например ukr.net. Он использует 465 порт с TLS. Почта не уходит.
Я во фри совсем не силен. Комп в 33 сети.
В оутбук експ настраюю 3 разный почты и одна и таже ошибка


The connection to the server has failed. Account: 'офис', Server: 'mail.*****.net.ua', 
Protocol: SMTP, Port: 25, Secure(SSL): No, Socket Error: 10060, Error Number: 0x800CCC0E 
The connection to the server has failed. Account: 'pop.mail.ru', Server: 'smtp.mail.ru', 
Protocol: SMTP, Port: 465, Secure(SSL): Yes, Socket Error: 10060, Error Number: 0x800CCC0E 
The connection to the server has failed. Account: 'ukr.net', Server: 'smtp.ukr.net', 
Protocol: SMTP, Port: 465, Secure(SSL): Yes, Socket Error: 10060, Error Number: 0x800CCC0E

вот настройки IPFW в чем ошибка? Спасибо !

#!/bin/sh - 
FwCMD="/sbin/ipfw -q" 
LanOut="re0" 
IpOut="195.*.*.*" 
LanIn="re1" 
LanIn2="re2" 
ip_lan="192.168.3" 
ip_lan2="192.168.33" 
NetIn="192.168.3.0/24" 
NetIn2="192.168.33.0/24" 
#NetMask="24" 
#Ip kompa kot. soedinyaetsya po Vtun 
IpTun="192.168.3.32" 
${FwCMD} -f flush 
${FwCMD} -f pipe flush 
${FwCMD} -f queue flush 
#---zapret na inet po ip 
#${FwCMD} add deny ip from 192.168.3.81 to any via ${LanOut} 
#---Vtund 
${FwCMD} add allow ip from any to any via tun0 
${FwCMD} add allow tcp from 93.*.*.* to ${IpOut} 5000 
${FwCMD} add allow ip from ${IpTun} to 192.168.0.1 via ${LanIn} 
${FwCMD} add allow ip from 192.168.0.1 to ${IpTun} via ${LanIn} 
#---------dostup po OpenVpn-------------------------------------------- 
#${FwCMD} add allow ip from any to any 1494 
#${FwCMD} add allow ip from any to any 1604 
#${FwCMD} add allow udp from any to any 5656 
#${FwCMD} add allow ip from any to any via tun2 
#${FwCMD} add allow udp from any to any 138 
#${FwCMD} add allow tcp from any to any 139 
#${FwCMD} add allow tcp from any to any 445 
#${FwCMD} add allow tcp from any to  176.36.*.* 12121 in via ${LanOut} 
#${FwCMD} add allow tcp from any to  176.36.*.* 5006 in via ${LanOut} 
#---------------------------------------------------------------------- 
#----------------------------------------------------- 
${FwCMD} add allow ip from any to any 1494 
${FwCMD} add allow ip from any to any 1604 
${FwCMD} add allow udp from any to any 137 
${FwCMD} add allow udp from any to any 138 
${FwCMD} add allow tcp from any to any 139 
${FwCMD} add allow tcp from any to any 445 
${FwCMD} add allow tcp from any to 195.*.*.* 12121 in via ${LanOut} 
${FwCMD} add allow tcp from any to 195.*.*.* 5006 in via ${LanOut} 
#---------------------------------------------------------------------- 
${FwCMD} add allow gre from any to any 
${FwCMD} add allow tcp from any to me 1723 
${FwCMD} add allow ip from any to any via lo0 
${FwCMD} add deny ip from any to 127.0.0.0/8 
${FwCMD} add deny ip from 127.0.0.0/8 to any 
#---chastnye seti 
${FwCMD} add deny ip from any to 10.0.0.0/8 in via ${LanOut} 
${FwCMD} add deny ip from any to 172.16.0.0/12 in via ${LanOut} 
${FwCMD} add deny ip from any to 192.168.0.0/16 in via ${LanOut} 
${FwCMD} add deny ip from any to 0.0.0.0/8 in via ${LanOut} 
${FwCMD} add deny ip from any to 169.254.0.0/16 in via ${LanOut} 
#---mul'tikastovye rassylki 
${FwCMD} add deny ip from any to 240.0.0.0/4 in via ${LanOut} 
#---fragmentirovannye icmp 
${FwCMD} add deny icmp from any to any frag 
#---shirokoveschatil'nye icmp na vneshnem interface 
${FwCMD} add deny log icmp from any to 255.255.255.255 in via ${LanOut} 
${FwCMD} add deny log icmp from any to 255.255.255.255 out via ${LanOut} 
#---NAT 
#---for net 192.168.3 
${FwCMD} add divert natd ip from ${NetIn} to any out via ${LanOut} 
#---for net 192.168.33 
${FwCMD} add divert natd ip from ${NetIn2} to any out via ${LanOut} 
${FwCMD} add divert natd ip from any to ${IpOut} in via ${LanOut} 
#---rubim trafik k chastnym setyam cherez vneshniy interfeys 
${FwCMD} add deny ip from 10.0.0.0/8 to any out via ${LanOut} 
${FwCMD} add deny ip from 172.16.0.0/12 to any out via ${LanOut} 
#${FwCMD} add deny ip from 192.168.0.0/16 to any out via ${LanOut} 
${FwCMD} add deny ip from 0.0.0.0/8 to any out via ${LanOut} 
#---rubim avtokonfigurennuyu chastnuyu set' 
${FwCMD} add deny ip from 169.254.0.0/16 to any out via ${LanOut} 
#---rubim mul'tikastovye rassylki 
${FwCMD} add deny ip from 224.0.0.0/4 to any out via ${LanOut} 
${FwCMD} add deny ip from 240.0.0.0/4 to any out via ${LanOut} 
#---razreshaem vse ustanovlennye soedineniya 
${FwCMD} add allow tcp from any to any established 
#---rareshaem ishodyaschiy trafik 
${FwCMD} add allow ip from ${IpOut} to any out xmit ${LanOut} 
#---DNS 
${FwCMD} add allow udp from any 53 to any via ${LanOut} 
${FwCMD} add allow udp from any to any 53 via ${LanOut} 
#---UDP (dlya sinhronizacii vremeni - 123 port) 
${FwCMD} add allow udp from any to any 123 via ${LanOut} 
#ICMP trafik- echo zapros, echo otvet i vremya zhizni isteklo 
${FwCMD} add allow icmp from any to any icmptypes 0,8,11 
#---SSH 
${FwCMD} add allow tcp from any to ${IpOut} 22 via ${LanOut} 
#---tcp vnutri localki (na vnutrennem interface) 
${FwCMD} add allow tcp from any to any via ${LanIn} 
${FwCMD} add allow tcp from any to any via ${LanIn2} 
#---udp  vnutri localki (na vnutrennem interface) 
${FwCMD} add allow udp from any to any via ${LanIn} 
${FwCMD} add allow udp from any to any via ${LanIn2} 
#--- 
${FwCMD} add allow udp from any to 192.168.3.2 258 via ${LanOut} 
${FwCMD} add allow udp from any to 192.168.3.1 266 via ${LanOut} 
${FwCMD} add allow udp from any to 192.168.3.3 274 via ${LanOut} 
${FwCMD} add allow udp from any to 192.168.3.7 282 via ${LanOut} 
${FwCMD} add allow udp from any to 192.168.3.8 278 via ${LanOut} 
${FwCMD} add allow udp from any to 192.168.3.9 290 via ${LanOut} 
#--- 
#${FwCMD} add allow udp from any 258 to any via ${LanOut} 
#${FwCMD} add allow udp from any 266 to any via ${LanOut} 
#${FwCMD} add allow udp from any 274 to any via ${LanOut} 
#${FwCMD} add allow udp from any 282 to any via ${LanOut} 
#${FwCMD} add allow udp from any 278 to any via ${LanOut} 
#${FwCMD} add allow udp from any 290 to any via ${LanOut} 
#TLS SSl 
${FwCMD} add allow tcp from any to any 443 via ${LanOut} 
${FwCMD} add allow tcp from any 443 to any via ${LanOut} 
# smtp 
${FwCMD} add allow tcp from any  to any 25 via ${LanOut} 
${FwCMD} add allow tcp from any 25 to any via ${LanOut} 
${FwCMD} add allow tcp from any 465 to any via ${LanOut} 
${FwCMD} add allow tcp from any 465 to any via ${LanIn2} 
${FwCMD} add allow tcp from any to any 465 via ${LanOut} 
${FwCMD} add allow tcp from any to any 465 via ${LanIn2} 
# pop 
${FwCMD} add allow tcp from any 110 to any via ${LanIn} 
${FwCMD} add allow tcp from any 110 to any via ${LanIn2} 
#---icmp  vnutri localki (na vnutrennem interface) 
${FwCMD} add allow icmp from any to any via ${LanIn} 
${FwCMD} add allow icmp from any to any via ${LanIn2} 
${FwCMD} add deny ip from any to any

2

Re: Ipfw Smtp

включайте логирование и смотрите что у вас творится. ipfw show покажет, вообще отрабатываются у вас правила smtp или нет, то есть попадало туда хоть что-то

3

Re: Ipfw Smtp

Всем спасибо за помощь!!! Ответ был банально прост)) Провайдер закрыл SMTP порт!!