Skip to main content

Testing SMTP verbs and sending an alert based on the SMTP reply code

I had an interesting problem with a SMTP gateway this week because one of its internal processes had failed the server was processing mail down to the TO verb in the SMTP Protocol exchange and then failing with a specific Status code. Usually you could detect this type of fault by looking at growing queue sizes or delayed delivery times but I wanted a solution that would go out and proactively check the SMTP verbs on a mail server so I could make sure that I would be alerted if there was any issue with anything going on in the SMTP stack.

A while ago I posted a SMTP test script for Powershell which simulated a telnet test against port 25 using Powershell. Using this as a base I streamlined the code to stop outputting information to the commandline and added some logic to parse the first 3 characters from the exchange SMTP response which will relate to the SMTP status code. If everything is going well with your SMTP box you should get a 250 status code see for a full list of status codes. If you don’t get a 250 (or 200) then there’s a possible problem in your SMTP stack the script then creates and sends a SMTP message. The way I used this was to do a direct delivery to my cell phone email account which then gets sent to me as an SMS. You really want to bypass going through your normal gateway for alerting eg if this script is checking that gateway. For the first helo verb I set the script to detect both 220 and 250 response codes this was because I was having an issue where certain firewalls would affect this response code.

Alerting is great but I didn’t want the script to constantly alert me for the same issue once it was detected so there are routines in the script to ensure that it doesn’t send any more the 1 alert per hour. It does this by creating a file in the temp directory and writing the date the last alert was sent. When an error is detected and an alert needs to be sent this file is checked and if the timespan between the last alert being sent and the current date is greater than 60 minutes then an alert is sent if not the script just exits without sending an alert.

Because the script is meant to be self contained I used hardcoded variables which need to be set

$remoteHost = "host.targetdomain.com"
$domain = "targetdomain.com"
$sendingdomain = "youdomain.com"
$AlertFilePath="c:\temp\msMailAlert.txt"
$SmtpServerforAlertDelivery = "smsgateway.com"
$AlertFrom = mailserverwarning@youdomain.com
$AerttTo = "0419999999@youcelphone.com"

To run the script I used a schedule task which is a little tricky under powershell in the run line of the scheduled task you need a line such as

powershell -nologo -noprofile -command "c:\utils\smtpverbmailalert.ps1"

I’ve put a downloadable copy of the script here the script itself looks like.

$remoteHost = "host.targetdomain.com"
$domain = "targetdomain.com"
$sendingdomain = "youdomain.com"
$Global:SendAlert = 0
$Global:SentAlert = 0
$AlertFilePath="c:\temp\msMailAlert.txt"
$SmtpServerforAlertDelivery = "smsgateway.com"
$AlertFrom = "mailserverwarning@youdomain.com"
$AerttTo = "0419999999@youcelphone.com"

function readResponse($verb) {

while($stream.DataAvailable)
{
$read = $stream.Read($buffer, 0, 1024)
$rstring = $encoding.GetString($buffer, 0, $read)
switch ($verb){
"HELO" {if ($rstring.substring(0,3) -ne "220"){
if ($rstring.substring(0,3) -ne "250"){
SendAlert("HELO verb Result " + $rstring.substring(0,3))}}
}
"FROM" {if ($rstring.substring(0,3) -ne "250"){SendAlert("From verb Result " +
$rstring.substring(0,3))} }
"TO" {if ($rstring.substring(0,3) -ne "250"){SendAlert("To verb ResultStatus " +
$rstring.substring(0,3))} }
}
}
}

function SendAlert($Problem) {

# Create and write to a file
if (! [System.Io.File]::Exists($AlertFilePath))
{ $alertFile=[System.Io.File]::Createtext($AlertFilePath)
$cdate = get-date
$alertFile.WriteLine($cdate.ToString())
$alertFile.Close()
$Global:SendAlert = 1
}
else{
$alertFile = [System.Io.File]::OpenText($AlertFilePath)
$alertTime = $alertFile.ReadLine()
$alertFile.Close()
$LastAlertTimeSpan = New-TimeSpan -start ($alertTime) -end $(Get-Date)
if ($LastAlertTimeSpan.TotalMinutes -gt 60){
[System.Io.File]::Delete($AlertFilePath)
if (! [System.Io.File]::Exists($AlertFilePath))
{ $alertFile=[System.Io.File]::Createtext($AlertFilePath)
$cdate = get-date
$alertFile.WriteLine($cdate.ToString())
$alertFile.Close()
$Global:SendAlert = 1
}
}
else{
$Global:SendAlert = 0
}

}

if ($Global:SendAlert -eq 1 -band $Global:SentAlert -eq 0) {

$Title = "Mail Server Failed " + $Problem
$Body = $Problem
$SmtpClient = new-object system.net.mail.smtpClient
$SmtpClient.host = $SmtpServerforAlertDelivery
$SmtpClient.Send($AlertFrom,$AerttTo,$title,$Body)
$Global:SentAlert = 1

}

}

$port = 25
$socket = new-object System.Net.Sockets.TcpClient($remoteHost, $port)
if($socket -eq $null) { return; }
$stream = $socket.GetStream()
$writer = new-object System.IO.StreamWriter($stream)
$buffer = new-object System.Byte[] 1024
$encoding = new-object System.Text.AsciiEncoding
readResponse($stream)
$command = "HELO "+ $domain
$writer.WriteLine($command)
$writer.Flush()
start-sleep -m 500
readResponse($stream,"HELO")
$command = "MAIL FROM: <smtpcheck@" + $sendingdomain + ">"
$writer.WriteLine($command)
$writer.Flush()
start-sleep -m 500
readResponse($stream,"FROM")
$command = "RCPT TO: <postmaster@" + $domain + ">"
$writer.WriteLine($command)
$writer.Flush()
start-sleep -m 500
readResponse($stream,"TO")
$command = "QUIT"
$writer.WriteLine($command)
$writer.Flush()
start-sleep -m 500
readResponse($stream,"QUIT")
## Close the streams
$writer.Close()
$stream.Close()

Popular posts from this blog

Testing and Sending email via SMTP using Opportunistic TLS and oAuth in Office365 with PowerShell

As well as EWS and Remote PowerShell (RPS) other mail protocols POP3, IMAP and SMTP have had OAuth authentication enabled in Exchange Online (Official announcement here ). A while ago I created  this script that used Opportunistic TLS to perform a Telnet style test against a SMTP server using SMTP AUTH. Now that oAuth authentication has been enabled in office365 I've updated this script to be able to use oAuth instead of SMTP Auth to test against Office365. I've also included a function to actually send a Message. Token Acquisition  To Send a Mail using oAuth you first need to get an Access token from Azure AD there are plenty of ways of doing this in PowerShell. You could use a library like MSAL or ADAL (just google your favoured method) or use a library less approach which I've included with this script . Whatever way you do this you need to make sure that your application registration  https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-

The MailboxConcurrency limit and using Batching in the Microsoft Graph API

If your getting an error such as Application is over its MailboxConcurrency limit while using the Microsoft Graph API this post may help you understand why. Background   The Mailbox  concurrency limit when your using the Graph API is 4 as per https://docs.microsoft.com/en-us/graph/throttling#outlook-service-limits . This is evaluated for each app ID and mailbox combination so this means you can have different apps running under the same credentials and the poor behavior of one won't cause the other to be throttled. If you compared that to EWS you could have up to 27 concurrent connections but they are shared across all apps on a first come first served basis. Batching Batching in the Graph API is a way of combining multiple requests into a single HTTP request. Batching in the Exchange Mail API's EWS and MAPI has been around for a long time and its common, for email Apps to process large numbers of smaller items for a variety of reasons.  Batching in the Graph is limited to a m

How to test SMTP using Opportunistic TLS with Powershell and grab the public certificate a SMTP server is using

Most email services these day employ Opportunistic TLS when trying to send Messages which means that wherever possible the Messages will be encrypted rather then the plain text legacy of SMTP.  This method was defined in RFC 3207 "SMTP Service Extension for Secure SMTP over Transport Layer Security" and  there's a quite a good explanation of Opportunistic TLS on Wikipedia  https://en.wikipedia.org/wiki/Opportunistic_TLS .  This is used for both Server to Server (eg MTA to MTA) and Client to server (Eg a Message client like Outlook which acts as a MSA) the later being generally Authenticated. Basically it allows you to have a normal plain text SMTP conversation that is then upgraded to TLS using the STARTTLS verb. Not all servers will support this verb so if its not supported then a message is just sent as Plain text. TLS relies on PKI certificates and the administrative issue s that come around certificate management like expired certificates which is why I wrote th
All sample scripts and source code is provided by for illustrative purposes only. All examples are untested in different environments and therefore, I cannot guarantee or imply reliability, serviceability, or function of these programs.

All code contained herein is provided to you "AS IS" without any warranties of any kind. The implied warranties of non-infringement, merchantability and fitness for a particular purpose are expressly disclaimed.