diff --git a/src/sbbs3/mailsrvr.c b/src/sbbs3/mailsrvr.c index 9d03c428303871801aa4ce795bc6c3375f5de1e9..23aba638fbf7fc78a46920aa682a220f6e618d6e 100644 --- a/src/sbbs3/mailsrvr.c +++ b/src/sbbs3/mailsrvr.c @@ -5014,7 +5014,7 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m if((i=nonblocking_connect(sock, (struct sockaddr *)&server_addr, xp_sockaddr_len(&server_addr), startup->connect_timeout))!=0) { SAFEPRINTF2(err,"ERROR %d connecting to SMTP server: %s" ,i, server); - lprintf(LOG_WARNING,"%04d !SEND %s" ,sock, err); + lprintf(LOG_INFO,"%04d !SEND %s" ,sock, err); listAddNodeData(failed_server_list,&server_addr,sizeof(server_addr),i,NULL); continue; } @@ -5024,7 +5024,7 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m /* HELO */ if(!sockgetrsp(sock,*session,"220",buf,sizeof(buf))) { SAFEPRINTF3(err,badrsp_err,server,buf,"220"); - lprintf(LOG_WARNING, "%04d SEND %s", sock, err); + lprintf(LOG_INFO, "%04d SEND %s", sock, err); continue; } success=TRUE; @@ -5064,22 +5064,22 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m if (sockgetrsp(sock, *session, "220", buf, sizeof(buf))) { if ((status=cryptCreateSession(session, CRYPT_UNUSED, CRYPT_SESSION_SSL)) != CRYPT_OK) { SAFEPRINTF2(err, "ERROR %d creating TLS session to SMTP server: %s", status, server); - lprintf(LOG_WARNING,"%04d !SEND %s", sock, err); + lprintf(LOG_INFO,"%04d !SEND %s", sock, err); continue; } if ((status=cryptSetAttribute(*session, CRYPT_SESSINFO_SSL_OPTIONS, CRYPT_SSLOPTION_DISABLE_CERTVERIFY)) != CRYPT_OK) { SAFEPRINTF2(err, "ERROR %d disabling certificate validation with SMTP server: %s", status, server); - lprintf(LOG_WARNING,"%04d !SEND %s" ,sock, err); + lprintf(LOG_INFO,"%04d !SEND %s" ,sock, err); continue; } if ((status=cryptSetAttribute(*session, CRYPT_OPTION_CERT_COMPLIANCELEVEL, CRYPT_COMPLIANCELEVEL_OBLIVIOUS)) != CRYPT_OK) { SAFEPRINTF2(err, "ERROR %d setting oblivious certificate compliance level with SMTP server: %s", status, server); - lprintf(LOG_WARNING,"%04d !SEND %s" ,sock, err); + lprintf(LOG_INFO,"%04d !SEND %s" ,sock, err); continue; } if ((status=cryptSetAttribute(*session, CRYPT_SESSINFO_PRIVATEKEY, scfg.tls_certificate)) != CRYPT_OK) { SAFEPRINTF2(err, "ERROR %d setting private key with SMTP server: %s", status, server); - lprintf(LOG_WARNING,"%04d !SEND %s", sock, err); + lprintf(LOG_INFO,"%04d !SEND %s", sock, err); continue; } nodelay = TRUE; @@ -5088,7 +5088,7 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m ioctlsocket(sock,FIONBIO,&nb); if ((status=cryptSetAttribute(*session, CRYPT_SESSINFO_NETWORKSOCKET, sock)) != CRYPT_OK) { SAFEPRINTF2(err, "ERROR %d setting network socket with SMTP server: %s", status, server); - lprintf(LOG_WARNING,"%04d !SEND %s", sock, err); + lprintf(LOG_INFO,"%04d !SEND %s", sock, err); continue; } if ((status=cryptSetAttribute(*session, CRYPT_SESSINFO_ACTIVE, 1)) != CRYPT_OK) { @@ -5096,7 +5096,7 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m SAFEPRINTF3(err, "ERROR %d (%s) activating TLS session with SMTP server: %s", status, estr ? estr : "<unknown>", server); if (estr) free_crypt_attrstr(estr); - lprintf(LOG_WARNING,"%04d !SEND %s", sock, err); + lprintf(LOG_INFO,"%04d !SEND %s", sock, err); continue; } if (startup->max_inactivity) { @@ -5105,14 +5105,14 @@ static SOCKET sendmail_negotiate(CRYPT_SESSION *session, smb_t *smb, smbmsg_t *m SAFEPRINTF3(err, "ERROR %d (%s) setting max inactivity with SMTP server: %s", status, estr ? estr : "<unknown>", server); if (estr) free_crypt_attrstr(estr); - lprintf(LOG_WARNING,"%04d !SEND %s", sock, err); + lprintf(LOG_INFO,"%04d !SEND %s", sock, err); continue; } } sockprintf(sock,*session,"EHLO %s",startup->host_name); if(!sockgetrsp(sock,*session,"250",buf,sizeof(buf))) { SAFEPRINTF3(err,badrsp_err,server,buf,"220"); - lprintf(LOG_WARNING, "%04d SEND %s", sock, err); + lprintf(LOG_INFO, "%04d SEND %s", sock, err); continue; } }