NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Ruud0511
Mar 13, 2012Aspirant
Mail failure notice after setting it up correctly?
I set up my Duo V2 with email address as a mail box for notifications, warnings, etc. My Duo V2 says it's setup correctly. Still, I receive this message every morning. What does it mean?
Hi. This is the qmail-send program at mail.hostnet.nl.
I am afraid I was not able to deliver your message to the following addresses.
This is a permanent error; I have given up. Sorry it did not work out.
<root>:
Sorry, address must include host name. (#5.1.3)
--- Below this line is a copy of the message.
Return-Path: <email@ruud.co>
Received: (qmail 32036 invoked from network); 13 Mar 2012 08:00:08 -0000
Received: from unknown (HELO localhost) (email@ruud.co@[84.106.82.100])
by 10.184.18.7 with ESMTPSA (DHE-RSA-AES128-SHA encrypted, authenticated); 13 Mar 2012 08:00:08 -0000
From: root (Cron Daemon)
To: root
Subject: Cron <root@PrikkeldraadNAS> test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
Content-Type: text/plain; charset=ANSI_X3.4-1968
X-Cron-Env: <SHELL=/bin/sh>
X-Cron-Env: <PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin>
X-Cron-Env: <HOME=/root>
X-Cron-Env: <LOGNAME=root>
/etc/cron.daily/check_disk_usage:
File descriptor 3 (/etc/resolv.conf (deleted)) leaked on lvscan invocation. Parent PID 16369: /bin/bash
/etc/cron.daily/logtruncate:
apache-ssl: Could not reliably determine the server's fully qualified domain name, using 192.168.178.10 for ServerName
Hi. This is the qmail-send program at mail.hostnet.nl.
I am afraid I was not able to deliver your message to the following addresses.
This is a permanent error; I have given up. Sorry it did not work out.
<root>:
Sorry, address must include host name. (#5.1.3)
--- Below this line is a copy of the message.
Return-Path: <email@ruud.co>
Received: (qmail 32036 invoked from network); 13 Mar 2012 08:00:08 -0000
Received: from unknown (HELO localhost) (email@ruud.co@[84.106.82.100])
by 10.184.18.7 with ESMTPSA (DHE-RSA-AES128-SHA encrypted, authenticated); 13 Mar 2012 08:00:08 -0000
From: root (Cron Daemon)
To: root
Subject: Cron <root@PrikkeldraadNAS> test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
Content-Type: text/plain; charset=ANSI_X3.4-1968
X-Cron-Env: <SHELL=/bin/sh>
X-Cron-Env: <PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin>
X-Cron-Env: <HOME=/root>
X-Cron-Env: <LOGNAME=root>
/etc/cron.daily/check_disk_usage:
File descriptor 3 (/etc/resolv.conf (deleted)) leaked on lvscan invocation. Parent PID 16369: /bin/bash
/etc/cron.daily/logtruncate:
apache-ssl: Could not reliably determine the server's fully qualified domain name, using 192.168.178.10 for ServerName
4 Replies
- Ruud0511AspirantNo one? :(
- eddashAspirantHi all,
I have the same problem on ReadyNAS NV+ v2.
Seems that the username "root" to which the NAS tries to send the message to is hardcoded somehow.
Any idea? :idea:
Cheers
Andy - skibumatbuAspirantSo, after 2 hours of investigation, here's the issue... Followed by my ranting...
The readynas v2's seem to use msmtp to send email. Its supposed to be a lightweight mailer to replace sendmail and postfix. By default, if you don't give it a domain to send from msmtp defaults to "localhost". Most mail servers won't allow mail from that domain to be relayed through it as it increases the chances that the mail server can be used as a mail relay for spammers. However, looking at the man page, one can add a domain line to /etc/msmtprc and mail will work from the command line. This is my msmtprc file with the domain line. Note that if you edit it manually, and then update the front view UI, it will remove the entry as it doesn't know about the setting:
root@backup-nas:/frontview/lib# cat /etc/msmtprc
defaults
tls on
tls_nocertcheck
logfile /var/log/frontview/msmtp.log
account default
connect_timeout 60
host xxx.domain.com
port 587
from myuser
auth cram-md5
user myuser
password mypass
domain domain.com
Sending from the command line looks like this:
root@backup-nas:/frontview/lib# /usr/sbin/sendmail -B8BITMIME -f from-addr@domain.com authuser to-user@domain.com
abcd1234
root@backup-nas:/frontview/lib#
It sends fine. I got the string from /frontview/bin/functions (send_email_alert function to be precise). For some reason when I use the front view UI, I still can't send a test email... So, it looks like front view is a bit wasteful and has its own mail routines. digging around the UI directories a bit and apache config, it looks like all the important bits are somewhere in /frontview/lib. Now here is the catch... Readynas has encrypted all their Perl files and completely obfuscated their stuff...
So bottom line... its broken on the readynas side of things... and we as users can't fix it. Only the readynas engineers can. Now for my rant directed at the engineers...
* The new v2 GUI looks nice, but has no functionality. The v1 GUIs look back but are way more customizable. Examples: I can turn on and off individual file sharing services per share (such as afp, smb/cifs, http, rsync). I can't do that in the v2 version. Why not?
* If I make a change via ssh to the system I would expect it to persist in a firmware update. I get it. You don't support us mortals doing anything via ssh, but with a completely limited GUI and no ability to do what I want without it, ssh is the only way. (I do backups over ssh and to do encryption on the disk needed some deb packages installed. Firmware updates blow it all away and break everything). An alternate approach it to put your stuff on your own partition and anything you want to persist beyond firmware updates on a different one. This is debian (or a spin off). it is possible.
* Don't make it impossible to debug things by obfuscating everything. When I look at the source of the UI in my web browser i get a bunch of gobbledygook. Your perl is encrypted? Seriously? All I want to do is fix a problem and get email working. You're making it impossible.
* This was the last readynas I buy. The product has gone downhill, and in todays day and age there are literally dozens of companies making workgroup sized NAS devices. I love the ReadyNas line and the fact that I can swap in and out disks on the fly to replace bad ones or grow the filesystem, and I like the fact that I get alerted on disk or other issues out of the box. But in today's day and age any workgroup NAS can do that. Why should I stick with ReadyNAS? I should be allowed to extend the functionality and fix things openly.
Sigh... End rant.
Scott - Ki_Adi_MundiNETGEAR Employee RetiredHi guys,
The obfuscated code has nothing to do with these mails. it is sent by cron daemon.When cron starts a process, it captures any output that reaches stdout and stderr, and sends that in an email.
The messages you saw is just warnings, don' t worry about it.
You can add MAILTO="" in /etc/crontab to avoid sending mails, like the following:
# cat /etc/crontab
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=""
# m h dom mon dow user command
17 * * * * root cd / && run-parts --report /etc/cron.hourly
35 20 * * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
52 6 1 * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )
#
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!