NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Ruud0511's avatar
Ruud0511
Aspirant
Mar 13, 2012

Mail failure notice after setting it up correctly?

I set up my Duo V2 with email address as a mail box for notifications, warnings, etc. My Duo V2 says it's setup correctly. Still, I receive this message every morning. What does it mean?

Hi. This is the qmail-send program at mail.hostnet.nl.
I am afraid I was not able to deliver your message to the following addresses.
This is a permanent error; I have given up. Sorry it did not work out.

<root>:
Sorry, address must include host name. (#5.1.3)

--- Below this line is a copy of the message.

Return-Path: <email@ruud.co>
Received: (qmail 32036 invoked from network); 13 Mar 2012 08:00:08 -0000
Received: from unknown (HELO localhost) (email@ruud.co@[84.106.82.100])
by 10.184.18.7 with ESMTPSA (DHE-RSA-AES128-SHA encrypted, authenticated); 13 Mar 2012 08:00:08 -0000
From: root (Cron Daemon)
To: root
Subject: Cron <root@PrikkeldraadNAS> test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
Content-Type: text/plain; charset=ANSI_X3.4-1968
X-Cron-Env: <SHELL=/bin/sh>
X-Cron-Env: <PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin>
X-Cron-Env: <HOME=/root>
X-Cron-Env: <LOGNAME=root>

/etc/cron.daily/check_disk_usage:
File descriptor 3 (/etc/resolv.conf (deleted)) leaked on lvscan invocation. Parent PID 16369: /bin/bash
/etc/cron.daily/logtruncate:
apache-ssl: Could not reliably determine the server's fully qualified domain name, using 192.168.178.10 for ServerName

4 Replies

  • Hi all,

    I have the same problem on ReadyNAS NV+ v2.
    Seems that the username "root" to which the NAS tries to send the message to is hardcoded somehow.
    Any idea? :idea:

    Cheers
    Andy
  • So, after 2 hours of investigation, here's the issue... Followed by my ranting...

    The readynas v2's seem to use msmtp to send email. Its supposed to be a lightweight mailer to replace sendmail and postfix. By default, if you don't give it a domain to send from msmtp defaults to "localhost". Most mail servers won't allow mail from that domain to be relayed through it as it increases the chances that the mail server can be used as a mail relay for spammers. However, looking at the man page, one can add a domain line to /etc/msmtprc and mail will work from the command line. This is my msmtprc file with the domain line. Note that if you edit it manually, and then update the front view UI, it will remove the entry as it doesn't know about the setting:


    root@backup-nas:/frontview/lib# cat /etc/msmtprc

    defaults
    tls on
    tls_nocertcheck

    logfile /var/log/frontview/msmtp.log

    account default
    connect_timeout 60
    host xxx.domain.com
    port 587
    from myuser

    auth cram-md5
    user myuser
    password mypass

    domain domain.com


    Sending from the command line looks like this:

    root@backup-nas:/frontview/lib# /usr/sbin/sendmail -B8BITMIME -f from-addr@domain.com authuser to-user@domain.com
    abcd1234
    root@backup-nas:/frontview/lib#

    It sends fine. I got the string from /frontview/bin/functions (send_email_alert function to be precise). For some reason when I use the front view UI, I still can't send a test email... So, it looks like front view is a bit wasteful and has its own mail routines. digging around the UI directories a bit and apache config, it looks like all the important bits are somewhere in /frontview/lib. Now here is the catch... Readynas has encrypted all their Perl files and completely obfuscated their stuff...

    So bottom line... its broken on the readynas side of things... and we as users can't fix it. Only the readynas engineers can. Now for my rant directed at the engineers...
    * The new v2 GUI looks nice, but has no functionality. The v1 GUIs look back but are way more customizable. Examples: I can turn on and off individual file sharing services per share (such as afp, smb/cifs, http, rsync). I can't do that in the v2 version. Why not?
    * If I make a change via ssh to the system I would expect it to persist in a firmware update. I get it. You don't support us mortals doing anything via ssh, but with a completely limited GUI and no ability to do what I want without it, ssh is the only way. (I do backups over ssh and to do encryption on the disk needed some deb packages installed. Firmware updates blow it all away and break everything). An alternate approach it to put your stuff on your own partition and anything you want to persist beyond firmware updates on a different one. This is debian (or a spin off). it is possible.
    * Don't make it impossible to debug things by obfuscating everything. When I look at the source of the UI in my web browser i get a bunch of gobbledygook. Your perl is encrypted? Seriously? All I want to do is fix a problem and get email working. You're making it impossible.
    * This was the last readynas I buy. The product has gone downhill, and in todays day and age there are literally dozens of companies making workgroup sized NAS devices. I love the ReadyNas line and the fact that I can swap in and out disks on the fly to replace bad ones or grow the filesystem, and I like the fact that I get alerted on disk or other issues out of the box. But in today's day and age any workgroup NAS can do that. Why should I stick with ReadyNAS? I should be allowed to extend the functionality and fix things openly.

    Sigh... End rant.
    Scott
  • Ki_Adi_Mundi's avatar
    Ki_Adi_Mundi
    NETGEAR Employee Retired
    Hi guys,
    The obfuscated code has nothing to do with these mails. it is sent by cron daemon.When cron starts a process, it captures any output that reaches stdout and stderr, and sends that in an email.
    The messages you saw is just warnings, don' t worry about it.
    You can add MAILTO="" in /etc/crontab to avoid sending mails, like the following:
    # cat /etc/crontab
    # /etc/crontab: system-wide crontab
    # Unlike any other crontab you don't have to run the `crontab'
    # command to install the new version when you edit this file
    # and files in /etc/cron.d. These files also have username fields,
    # that none of the other crontabs do.

    SHELL=/bin/sh
    PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
    MAILTO=""

    # m h dom mon dow user command
    17 * * * * root cd / && run-parts --report /etc/cron.hourly
    35 20 * * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
    47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
    52 6 1 * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )
    #

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More