Postfix docs Search Results:

Looking for auth in entire archive - Found 178 matches in 14 files
Showing results 1 - 14
Postfix Configuration Parameters, Feb 8 2008
broken_sasl_auth_clients
Enable inter-operability with SMTP clients that implement an obsolete version of the AUTH command (RFC 4954). Examples of such clients are MicroSoft Outlook Express version 4 and MicroSoft Exchange version 5.0.
Specify "broken_sasl_auth_clients = yes" to have Postfix advertise AUTH support in a non-standard way.
Lookup tables, indexed by the remote LMTP server address, with case insensitive lists of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server. See lmtp_discard_lhlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server.
lmtp_sasl_auth_cache_name
The LMTP-specific version of the smtp_sasl_auth_cache_name
lmtp_sasl_auth_cache_time
The LMTP-specific version of the smtp_sasl_auth_cache_time
lmtp_sasl_auth_enable
lmtp_sasl_auth_soft_bounce
The LMTP-specific version of the smtp_sasl_auth_soft_bounce
Append the domain name in $myorigin or $mydomain when the client is successfully authenticated via the RFC 4954 (AUTH) protocol.
SASL authentication method specified in the remote client AUTH command. Available in Postfix version 2.2 and later.
SASL username specified in the remote client AUTH command.
What destination domains (and subdomains thereof) this system will relay mail to. Subdomain matching is controlled with the parent_domain_matches_subdomains parameter. For details about how the relay_domains value is used, see the description of the permit_auth_destination and reject_unauth_destination SMTP recipient restrictions.
Lookup tables, indexed by the remote SMTP server address, with case insensitive lists of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server. See smtp_discard_ehlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server.
smtp_sasl_auth_cache_name
information does no change, and as long as the smtp_sasl_auth_cache_name
...limit of 20 lines reached, additional matching lines are not shown...

Postfix Configuration Parameters, Feb 8 2008
broken_sasl_auth_clients
Enable inter-operability with SMTP clients that implement an obsolete version of the AUTH command (RFC 4954). Examples of such clients are MicroSoft Outlook Express version 4 and MicroSoft Exchange version 5.0.
Specify "broken_sasl_auth_clients = yes" to have Postfix advertise AUTH support in a non-standard way.
Lookup tables, indexed by the remote LMTP server address, with case insensitive lists of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server. See lmtp_discard_lhlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server.
lmtp_sasl_auth_cache_name
The LMTP-specific version of the smtp_sasl_auth_cache_name
lmtp_sasl_auth_cache_time
The LMTP-specific version of the smtp_sasl_auth_cache_time
lmtp_sasl_auth_enable
lmtp_sasl_auth_soft_bounce
The LMTP-specific version of the smtp_sasl_auth_soft_bounce
Append the domain name in $myorigin or $mydomain when the client is successfully authenticated via the RFC 4954 (AUTH) protocol.
SASL authentication method specified in the remote client AUTH command. Available in Postfix version 2.2 and later.
SASL username specified in the remote client AUTH command.
What destination domains (and subdomains thereof) this system will relay mail to. Subdomain matching is controlled with the parent_domain_matches_subdomains parameter. For details about how the relay_domains value is used, see the description of the permit_auth_destination and reject_unauth_destination SMTP recipient restrictions.
Lookup tables, indexed by the remote SMTP server address, with case insensitive lists of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server. See smtp_discard_ehlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server.
smtp_sasl_auth_cache_name
information does no change, and as long as the smtp_sasl_auth_cache_name
...limit of 20 lines reached, additional matching lines are not shown...

Postfix Configuration Parameters, Feb 8 2008
broken_sasl_auth_clients
Enable inter-operability with SMTP clients that implement an obsolete version of the AUTH command (RFC 4954). Examples of such clients are MicroSoft Outlook Express version 4 and MicroSoft Exchange version 5.0.
Specify "broken_sasl_auth_clients = yes" to have Postfix advertise AUTH support in a non-standard way.
Lookup tables, indexed by the remote LMTP server address, with case insensitive lists of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server. See lmtp_discard_lhlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of LHLO keywords (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server.
lmtp_sasl_auth_cache_name
The LMTP-specific version of the smtp_sasl_auth_cache_name
lmtp_sasl_auth_cache_time
The LMTP-specific version of the smtp_sasl_auth_cache_time
lmtp_sasl_auth_enable
lmtp_sasl_auth_soft_bounce
The LMTP-specific version of the smtp_sasl_auth_soft_bounce
Append the domain name in $myorigin or $mydomain when the client is successfully authenticated via the RFC 4954 (AUTH) protocol.
SASL authentication method specified in the remote client AUTH command. Available in Postfix version 2.2 and later.
SASL username specified in the remote client AUTH command.
What destination domains (and subdomains thereof) this system will relay mail to. Subdomain matching is controlled with the parent_domain_matches_subdomains parameter. For details about how the relay_domains value is used, see the description of the permit_auth_destination and reject_unauth_destination SMTP recipient restrictions.
Lookup tables, indexed by the remote SMTP server address, with case insensitive lists of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server. See smtp_discard_ehlo_keywords for details. The table is not indexed by hostname for consistency with smtpd_discard_ehlo_keyword_address_maps.
A case insensitive list of EHLO keywords (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server.
smtp_sasl_auth_cache_name
information does no change, and as long as the smtp_sasl_auth_cache_name
...limit of 20 lines reached, additional matching lines are not shown...

Postfix SASL Howto, Feb 8 2008
% make makefiles CCARGS='-DUSE_SASL_AUTH -DDEF_SERVER_SASL_TYPE=\"dovecot\"'
% make tidy # if you have left-over files from a previous build % make makefiles CCARGS="-DUSE_SASL_AUTH -DUSE_CYRUS_SASL \ -I/usr/local/include" AUXLIBS="-L/usr/local/lib -lsasl"
% make tidy # if you have left-over files from a previous build % make makefiles CCARGS="-DUSE_SASL_AUTH -DUSE_CYRUS_SASL \ -I/usr/local/include/sasl" AUXLIBS="-L/usr/local/lib -lsasl2"
% make tidy # if you have left-over files from a previous build % make makefiles CCARGS="-DUSE_SASL_AUTH -DUSE_CYRUS_SASL \ -I/usr/local/include" AUXLIBS="-L/usr/local/lib \ -R/usr/local/lib -lsasl"
% make tidy # if you have left-over files from a previous build % make makefiles CCARGS="-DUSE_SASL_AUTH -DUSE_CYRUS_SASL \ -I/usr/local/include/sasl" AUXLIBS="-L/usr/local/lib \ -R/usr/local/lib -lsasl2"
/etc/postfix/main.cf: smtpd_sasl_auth_enable = yes
Older Microsoft SMTP client software implements a non-standard version of the AUTH protocol syntax, and expects that the SMTP server replies to EHLO with "250 AUTH=mechanism-list" instead of "250 AUTH mechanism-list". To accommodate such clients (in addition to conformant clients) use the following:
/etc/postfix/main.cf: broken_sasl_auth_clients = yes
/etc/postfix/main.cf: smtpd_sasl_type = dovecot smtpd_sasl_path = private/auth
/some/where/dovecot.conf: auth default { mechanisms = plain login passdb pam { } userdb passwd { } socket listen { client { path = /var/spool/postfix/private/auth mode = 0660 user = postfix group = postfix } } }
250-server.example.com 250-PIPELINING 250-SIZE 10240000 250-ETRN 250-AUTH DIGEST-MD5 PLAIN CRAM-MD5 250 8BITMIME AUTH PLAIN AHRlc3QAdGVzdHBhc3M=
then run the resulting sample Cyrus SASL server and client in separate terminals. The sample applications send log messages to the syslog facility auth. Check the log to fix the problem or run strace / ktrace / truss on the server to see what makes it unhappy. Repeat the previous step until you can successfully authenticate with the sample Cyrus SASL client. Only then get back to Postfix.
/etc/postfix/main.cf: smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_type = cyrus relayhost = # Alternative form: # relayhost = :submission
The Postfix SMTP client is backwards compatible with SMTP servers that use the non-standard "AUTH=method..." syntax in response to the EHLO command; there is no Postfix client configuration needed to work around it.
/etc/postfix/main.cf: smtp_sender_dependent_authentication = yes sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd relayhost = # Alternative form: # relayhost = :submission

Postfix manual - smtp(8), Feb 8 2008
RFC 821 (SMTP protocol) RFC 822 (ARPA Internet Text Messages) RFC 1651 (SMTP service extensions) RFC 1652 (8bit-MIME transport) RFC 1870 (Message Size Declaration) RFC 2033 (LMTP protocol) RFC 2034 (SMTP Enhanced Error Codes) RFC 2045 (MIME: Format of Internet Message Bodies) RFC 2046 (MIME: Media Types) RFC 2554 (AUTH command) RFC 2821 (SMTP protocol) RFC 2920 (SMTP Pipelining) RFC 3207 (STARTTLS command) RFC 3461 (SMTP DSN Extension) RFC 3463 (Enhanced Status Codes) RFC 4954 (AUTH command)
Lookup tables, indexed by the remote SMTP server address, with case insensitive lists of EHLO key- words (pipelining, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server.
A case insensitive list of EHLO keywords (pipelin- ing, starttls, auth, etc.) that the Postfix SMTP client will ignore in the EHLO response from a remote SMTP server.
Lookup tables, indexed by the remote LMTP server address, with case insensitive lists of LHLO key- words (pipelining, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server.
A case insensitive list of LHLO keywords (pipelin- ing, starttls, auth, etc.) that the LMTP client will ignore in the LHLO response from a remote LMTP server.
smtp_sasl_auth_enable (no)
smtp_sasl_auth_cache_name (empty)
smtp_sasl_auth_cache_time (90d)
The maximal age of an smtp_sasl_auth_cache_name
smtp_sasl_auth_soft_bounce (yes)

Postfix TLS Support, Feb 8 2008
Supporting AUTH over TLS only
/etc/postfix/master.cf: smtps inet n - n - - smtpd -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes
Supporting AUTH over TLS only
Sending AUTH data over an unencrypted channel poses a security risk. When TLS layer encryption is required ("smtpd_tls_security_level = encrypt" or the obsolete "smtpd_enforce_tls = yes"), the Postfix SMTP server will announce and accept AUTH only after the TLS layer has been activated with STARTTLS. When TLS layer encryption is optional ("smtpd_tls_security_level = may" or the obsolete "smtpd_enforce_tls = no"), it may however still be useful to only offer AUTH when TLS is active. To maintain compatibility with non-TLS clients, the default is to accept AUTH without encryption.
In order to change this behavior, set "smtpd_tls_auth_only = yes".
/etc/postfix/main.cf: smtpd_tls_auth_only = no

Postfix Small/Home Office Hints and Tips, Feb 8 2008
/etc/postfix/main.cf: smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_type = cyrus relayhost = # Alternative form: # relayhost = :submission
The Postfix SMTP client is backwards compatible with SMTP servers that use the non-standard "AUTH=method..." syntax in response to the EHLO command; there is no Postfix client configuration needed to work around it.
/etc/postfix/main.cf: smtp_sender_dependent_authentication = yes sender_dependent_relayhost_maps = hash:/etc/postfix/sender_relay smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd relayhost = # Alternative form: # relayhost = :submission

Postfix Add-on Software, Feb 8 2008
authentication |
before smtp auth |

Postfix Add-on Software, Feb 8 2008
authentication |
before smtp auth |

Non-English Postfix Information, Feb 8 2008
Postfix+SMTP AUTH+IMAP+SpamAssassin(SA)+procmail
SMTP AUTH und Client Zertifikat basiertes relayen by Patrick Ben Koetter.

Postfix LDAP Howto, Feb 8 2008
Liviu Daia: Support for SSL/STARTTLS. Support for storing map definitions in external files (ldap:/path/ldap.cf) needed to securely store passwords for plain auth.

Postfix XFORWARD Howto, Feb 8 2008
It is not implemented by passing additional parameters via the MAIL FROM command, because doing so would require extending the MAIL FROM command length limit by another 600 or more characters beyond the space that is already needed to support other extensions such as AUTH and DSN.

Postfix Howtos and FAQs, Feb 8 2008
Guru Labs class GL275 covers Postfix, email theory, DNS, SMTP Auth, STARTTLS, SpamAssassin, POP3/IMAP4 daemons, and Webmail with Squirrelmail.

http://www.postfix.org#auth, Feb 8 2008

New Query: Rank by:
Search results by Webglimpse Advanced Site Search Engine