MeTA1 1.0.PreAlpha27.0 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News MeTA1 1.0.PreAlpha27.0 (Default branch)
# 1  
Old 07-15-2008
MeTA1 1.0.PreAlpha27.0 (Default branch)

MeTA1 is a modularized message transfer agent (MTA)consisting of five (or more) persistent processes,four of which are multi-threaded. A queue managercontrols SMTP servers and SMTP clients to receiveand send email messages, an address resolverprovides lookups in various maps (including DNS)for mail routing, and a main control programstarts the other processes and watches over theirexecution. The queue manager organizes the flow ofmessages through the system and provides measuresto avoid overloading the local or remote systemsby implementing a central control instance. It issimple to configure using a C-like syntax and issecure and efficient.License: Other/Proprietary License with SourceChanges:
This version is the first step towards anti-spam measures per recipient using smtps_rcpt_conf as a tag in the access map. For now only greylisting can be requested, but further development is planned.Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
saslfinger(1)						      General Commands Manual						     saslfinger(1)

NAME
saslfinger - A utility to collect SMTP AUTH relevant configuration for Postfix SYNOPSIS
saslfinger [-chs] DESCRIPTION
saslfinger is a utility to collect SMTP AUTH relevant configuration for Postfix. Depending on how you run it, it will search for informa- tion on server-side or client-side SMTP AUTH configuration settings in Postfix and Cyrus SASL. OPTIONS
-c If you run saslfinger with the option -c it will collect data required for client-side SMTP AUTH. Client-side SMTP AUTH is when Postfix smtp daemon uses SMTP AUTH to authenticate itself with a remote mail server that offers SMTP AUTH. saslfinger will try to telnet to all hosts listed in smtp_sasl_password_maps, if it may read smtp_sasl_password_maps The telnet test verifies your host is able to reach the remote servers and shows what AUTH mechanisms they offer - in some cases this is required to debug client-side SMTP AUTH. Important: By default smtp_sasl_password_maps must be read-only to root, since these maps contain the usernames and passwords to authenticate. If you run saslfinger as root access will be no problem, but saslfinger will fail if you lack the permissions to access smtp_sasl_password_maps. If you want to run the telnet test, but don't want to run saslfinger as root change permissions of smtp_sasl_password_maps so that the user running saslfinger may access smtp_sasl_password_maps while you debug. *note: You don't need to worry about saslfinger doing anything with the username or password stored next to the remote hosts in your smtp_sasl_password_maps; saslfinger completely ignores these informations! -h If you run saslfinger with the option -h it will print a little help message that tells you about the options you can use. -s If you run saslfinger with the option -s it will collect data required for server-side SMTP AUTH. Server-side SMTP AUTH is when Postfix smtpd daemon offers SMTP AUTH to mail clients. FILES
saslfinger - the script you need to run. saslfinger.1 - the man page you are currently reading. AUTHOR
Patrick Koetter, <patrick.koetter@state-of-mind.de>, http://www.state-of-mind.de You will find the newest version of saslfinger at http://postfix.state-of-mind.de/patrick.koetter/saslfinger/. BUGS
Please report bugs to <patrick.koetter@state-of-mind.de> Manuals User saslfinger(1)