SubEtha SMTP 2.0.1 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News SubEtha SMTP 2.0.1 (Default branch)
# 1  
Old 01-25-2008
SubEtha SMTP 2.0.1 (Default branch)

SubEthaSMTP is an easy to understand Java library that provides a receptive SMTP server component. By plugging this component into your Java application, you can easily receive SMTP mail using a simple abstract Java interface. Also included is a small sub-project called Wiser, an easy to use incoming mail testing framework. It is based on top of Apache MINA for high performance new I/O (NIO) operation. License: The Apache License 2.0 Changes:
An issue with Wiser not storing messages for re-use has been fixed. Major refactoring to prevent OOM and improve perfs when dealing with large attached files. The returned hostname is now locahost when null. A -1 value has been added to override limits on setMaxConnections() and setMaxRecipients(). Handling of auth mechanisms has been fixed to require a configured auth mechanism when needed. A missing space char in the extended HELO AUTH string has been fixed. This release will prevent an SLF4J error on startup by linking the jdk14 logging facility.Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
saslfinger(1)						      General Commands Manual						     saslfinger(1)

NAME
saslfinger - A utility to collect SMTP AUTH relevant configuration for Postfix SYNOPSIS
saslfinger [-chs] DESCRIPTION
saslfinger is a utility to collect SMTP AUTH relevant configuration for Postfix. Depending on how you run it, it will search for informa- tion on server-side or client-side SMTP AUTH configuration settings in Postfix and Cyrus SASL. OPTIONS
-c If you run saslfinger with the option -c it will collect data required for client-side SMTP AUTH. Client-side SMTP AUTH is when Postfix smtp daemon uses SMTP AUTH to authenticate itself with a remote mail server that offers SMTP AUTH. saslfinger will try to telnet to all hosts listed in smtp_sasl_password_maps, if it may read smtp_sasl_password_maps The telnet test verifies your host is able to reach the remote servers and shows what AUTH mechanisms they offer - in some cases this is required to debug client-side SMTP AUTH. Important: By default smtp_sasl_password_maps must be read-only to root, since these maps contain the usernames and passwords to authenticate. If you run saslfinger as root access will be no problem, but saslfinger will fail if you lack the permissions to access smtp_sasl_password_maps. If you want to run the telnet test, but don't want to run saslfinger as root change permissions of smtp_sasl_password_maps so that the user running saslfinger may access smtp_sasl_password_maps while you debug. *note: You don't need to worry about saslfinger doing anything with the username or password stored next to the remote hosts in your smtp_sasl_password_maps; saslfinger completely ignores these informations! -h If you run saslfinger with the option -h it will print a little help message that tells you about the options you can use. -s If you run saslfinger with the option -s it will collect data required for server-side SMTP AUTH. Server-side SMTP AUTH is when Postfix smtpd daemon offers SMTP AUTH to mail clients. FILES
saslfinger - the script you need to run. saslfinger.1 - the man page you are currently reading. AUTHOR
Patrick Koetter, <patrick.koetter@state-of-mind.de>, http://www.state-of-mind.de You will find the newest version of saslfinger at http://postfix.state-of-mind.de/patrick.koetter/saslfinger/. BUGS
Please report bugs to <patrick.koetter@state-of-mind.de> Manuals User saslfinger(1)