要测试Ubuntu邮件服务器,您可以按照以下步骤进行:
mail
命令发送测试邮件在终端中输入以下命令:
echo "This is a test email." | mail -s "Test Subject" recipient@example.com
将 recipient@example.com
替换为收件人的实际电子邮件地址。
telnet [邮件服务器地址] [端口号]
例如:
telnet mail.example.com 25
如果连接成功,您将看到类似以下内容的欢迎信息:
220 mail.example.com ESMTP Postfix
然后,您可以输入以下命令与邮件服务器进行交互:
EHLO
或 HELO
:向邮件服务器打招呼,并请求支持的扩展功能。MAIL FROM:
:指定发件人的邮件地址。RCPT TO:
:指定收件人的邮件地址。DATA
:开始输入邮件内容。.
结束邮件内容输入。QUIT
:断开与服务器的连接。除了Telnet客户端之外,还有一些专业的工具可以用于测试邮件服务器,如下所示:
openssl
命令测试 SSL 连接(可选)如果您配置了SSL/TLS加密,可以使用以下命令测试SSL连接:
openssl s_client -connect mail.example.com:465
您应该会看到类似以下的输出:
CONNECTED(00000003)
depth=2 O=Digital Signature Trust Co., CN=DST Root CA
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=2 O=Digital Signature Trust Co., CN=DST Root CA
verify error:num=27:certificate not trusted
verify return:1
depth=0 CN=mail.example.com
verify return:1
---
Certificate chain
0 s:CN=mail.example.com i:C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
1 s:C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
i:O=Digital Signature Trust Co., CN=DST Root CA
---
Server certificate-----
BEGIN CERTIFICATE-----
...
END CERTIFICATE-----
subject=CN=mail.example.com
issuer=C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
---
No client certificate
CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONENo ALPN negotiated
Early data was not sent
Verify return code: 19 (self signed certificate)
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONENo ALPN negotiated
Early data was not sent
Verify return code: 19 (self signed certificate)
---
640 bytes
通过以上步骤,您可以测试您的Ubuntu邮件服务器是否正常工作。如果一切配置正确,您应该能够成功发送和接收测试邮件。