oC: 10.6 Mail Sender Address don't work with SMTP

Has anyone also been able to determine the problem or have an idea for a solution?

Steps to reproduce

  1. Set up mail notification for SMTP
  2. Send email test

Expected behaviour

Tell us what should happen
E-mail sender should my address form the config.

A few weeks/months ago it worked correctly. Is it possibly a problem with 10.6?

Actual behaviour

Tell us what happens instead
SMTP Address (login data) from my mail account.

Server configuration

Operating system:
Raspbian GNU/Linux 10 (buster)
Web server:
Apache/2.4.38 (Raspbian)
MySQL/MariaDB-Version: 15.1 Distrib 10.3.27-MariaDB
PHP version:
PHP-Version: 7.3.27-1~deb10u1
ownCloud version: (see ownCloud admin page)
Updated from an older ownCloud or fresh install:
Where did you install ownCloud from:

Signing status (ownCloud 9.0 and above):

Login as admin user into your ownCloud and access 
paste the results into https://gist.github.com/ and puth the link here.

The content of config/config.php:
“system”: {
“instanceid”: “ocoq89hwbqzx”,
“passwordsalt”: “REMOVED SENSITIVE VALUE”,
“trusted_domains”: [
“datadirectory”: “/media/owncloud/data”,
“overwrite.cli.url”: “REMOVED SENSITIVE VALUE/owncloud”,
“htaccess.RewriteBase”: “/owncloud”,
“dbtype”: “mysql”,
“version”: “”,
“dbname”: “owncloud”,
“dbhost”: “localhost”,
“dbtableprefix”: “oc_”,
“logtimezone”: “Europe/Berlin”,
“installed”: true,
“mail_smtpmode”: “smtp”,
“default_language”: “de”,
“trashbin_retention_obligation”: “auto, 30”,
“loglevel”: 3,
“mail_from_address”: “REMOVED SENSITIVE VALUE”,
“mail_smtpport”: “465”,
“defaultapp”: “files”,
“overwriteprotocol”: “https”,
“updatechecker”: false,
“blacklisted_files”: [
“enable_avatars”: true,
“asset-pipeline.enabled”: true,
“activity_expire_days”: 365,
“quota_include_external_storage”: false,
“versions_retention_obligation”: “auto, 7”,
“allow_user_to_change_display_name”: false,
“knowledgebaseenabled”: false,
“session_lifetime”: 86400,
“check_for_working_htaccess”: true,
“maintenance”: false,
“log_rotate_size”: 1048576,
“session_keepalive”: true,
“mail_smtpdebug”: false,
“mail_smtphost”: “REMOVED SENSITIVE VALUE”,
“integrity.ignore.missing.app.signature”: [
“cache_chunk_gc_ttl”: 86400,
“skeletondirectory”: “/var/www/html/owncloud/apps/theme-mytheme/core/skeleton”,
“mail_smtpauth”: 1,
“mail_smtpname”: “REMOVED SENSITIVE VALUE”,
“mail_smtppassword”: “REMOVED SENSITIVE VALUE”,
“mail_smtpauthtype”: “LOGIN”,
“mail_smtpsecure”: “ssl”,
“memcache.local”: “\OC\Memcache\APCu”,
“filelocking.enabled”: true,
“memcache.locking”: “\OC\Memcache\Redis”,
“redis”: {
“host”: “localhost”,
“port”: 6379
“version.hide”: true,
“upgrade.disable-web”: true

Log in to the web-UI with an administrator account and click on
'admin' -> 'Generate Config Report' -> 'Download ownCloud config report'
This report includes the config.php settings, the list of activated apps
and other details in a well sanitized form.


If you have access to your command line run e.g.:
sudo -u www-data php occ config:list system
from within your ownCloud installation folder

*ATTENTION:* Do not post your config.php file in public as is. Please use one of the above
methods whenever possible. Both, the generated reports from the web-ui and from occ config:list
consistently remove sensitive data. You still may want to review the report before sending.
If done manually then it is critical for your own privacy to dilligently
remove *all* host names, passwords, usernames, salts and other credentials before posting.
You should assume that attackers find such information and will use them against your systems.

List of activated apps:

  • activity: 2.6.0
  • audioplayer: 2.8.4
  • brute_force_protection: 1.1.0
  • calendar: 1.6.4
  • comments: 0.3.0
  • configreport: 0.2.0
  • contacts: 1.5.5
  • dav: 0.6.0
  • drawio: 0.0.9
  • extract: 1.2.4
  • federatedfilesharing: 0.5.0
  • federation: 0.1.0
  • files: 1.5.2
  • files_clipboard: 1.0.3
  • files_external: 0.7.1
  • files_mediaviewer: 1.0.4
  • files_pdfviewer: 0.11.2
  • files_sharing: 0.14.0
  • files_texteditor: 2.3.0
  • files_trashbin: 0.9.1
  • files_versions: 1.3.0
  • firstrunwizard: 1.2.0
  • market: 0.6.0
  • metadata: 0.10.0
  • notifications: 0.5.2
  • password_policy: 2.1.2
  • provisioning_api: 0.5.0
  • systemtags: 0.3.0
  • templateeditor: 0.4.0
  • theme-mytheme: 2.0.0
  • updatenotification: 0.2.1
  • encryption
  • external
  • user_external
If you have access to your command line run e.g.:
sudo -u www-data php occ app:list
from within your ownCloud installation folder.

Are you using external storage, if yes which one: local/smb/sftp/…

Are you using encryption: yes/no

Are you using an external user-backend, if yes which one: LDAP/ActiveDirectory/Webdav/…

LDAP configuration (delete this part if not used)

With access to your command line run e.g.:
sudo -u www-data php occ ldap:show-config
from within your ownCloud installation folder

Without access to your command line download the data/owncloud.db to your local
computer or access your SQL server remotely and run the select query:
SELECT * FROM `oc_appconfig` WHERE `appid` = 'user_ldap';

Eventually replace sensitive data as the name/IP-address of your LDAP server or groups.

Client configuration


Operating system:


Web server error log

Insert your webserver log here

ownCloud log (data/owncloud.log)

Insert your ownCloud log here

Browser log

Insert your browser log here, this could for example include:

a) The javascript console log
b) The network log 
c) ...

I cannot confirm this, works perfectly with any sender address.

It’s difficult to say, without knowing the details. But, in case it’s not your own smtp-server: Could it be that your mail provider denies the use of senders from other domains?

1 Like

Hey alfredb!

Thanks for testing. I will check the email notification this weekend with another SMTP account.

Edit: I asked my mail provider and it is a security setting. My sender address domain is not the same as the login smtp address domain. There is no good solution for me.

1 Like

So my suspicion was correct after all.

But why do you want to use another sender address there? Avoid spamming?

1 Like

I have a hoster with a small webspace (15 GB).
At home on a Raspberry Pi runs an ownCloud instance. When I set up the instance at home, I used ddnss.de as DynDNS provider.
So far I haven’t found the motivation to change the main access url to a subdomain from my hoster. Still I want to use an account from the hoster for sending mails
and use cloud@MY.ddnss.de as sender address and not XY@MEINEDOMAIN.de of my domain. So that the user thinks that they were sent from cloud@MY.ddnss.de.

Setting up a mail server on the rpi isn’t an option for me .

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.