Sorry if this has been already asked, but I haven't been able to find a
solution, I am trying to migrate a dovecot 1.2 config to 2.1, the 'dovecot
-n > dovecot.conf' migrated all the setup without issues, and the mail is
working as expected.
The only issue I've had is with the change with the mail
On 5/12/2013 10:03 AM, Gedalya wrote:
Line 33:#process_count = 1024
Probably you mean process_limit
Yes, thanks. This name changed at some point in Dovecot and I forgot to
update it for ManageSieve.
http://hg.rename-it.nl/dovecot-2.1-pigeonhole/rev/7319f0becc98
Regards,
Stephan.
On Sun, May 12, 2013 12:24 pm, Chris Richards wrote:
> Hello all,
> I'm sure this has been covered somewhere before, but my googlefu is not up
> to the challenge.
More info; this is the debug output from the doveadm command:
doveadm -Df tab quota recalc -u 'user@domain'
doveadm(root): Debug: L
> Steinar Bang :
> Professa Dementia :
>> There are plugins that allow you to call some glue logic (Perl, Python,
>> shell scripts, etc) which enables you to interface to pretty much any
>> method (SQL, LDAP, shadow files, etc) you have chosen to save passwords
>> - that is, as long as you
Hello all,
I'm sure this has been covered somewhere before, but my googlefu is not up
to the challenge.
Basically, I'm trying to configure quota plugin to use a dictionary
service (specifically proxy with mysql) so that I can store the quota
usage in a database and use that information in a lookup
Professa Dementia skrev den 2013-05-12 14:40:
On 5/12/2013 4:17 AM, Steinar Bang wrote:
I prefer not to use clear text passwords, even over an encrypted
connection.
Why? Enforce the encrypted link by not allowing unencrypted
connections. The simplest is iptables to block ports 110 and 143,
> Professa Dementia :
> Also note that MD5, the basis for CRAM-MD5, is considered weak and no
> longer recommended. Thus, if you face an attacker that is sophisticated
> enough to crack the SSL / TLS connection, they very likely will have
> little problem with the CRAM-MD5 mechanism.
Well, y
On 5/12/2013 6:18 AM, Gedalya wrote:
> On 05/12/2013 08:40 AM, Professa Dementia wrote:
>> Avoid using a self signed certificate. Get a properly signed
>> certificate for your server. CheapSSLS.com has them for less than $10.
> Look also at https://www.startssl.com/
>
StartSSL is good - and fre
On 05/12/2013 08:40 AM, Professa Dementia wrote:
Avoid using a self signed certificate. Get a properly signed
certificate for your server. CheapSSLS.com has them for less then $10.
Look also at https://www.startssl.com/
On 5/12/2013 4:17 AM, Steinar Bang wrote:
> I prefer not to use clear text passwords, even over an encrypted
> connection.
Why? Enforce the encrypted link by not allowing unencrypted
connections. The simplest is iptables to block ports 110 and 143, while
allowing 993 and 995.
As long as the und
I prefer not to use clear text passwords, even over an encrypted
connection. With IMAP, the only such mechanism with widespread client
support is CRAM-MD5 (please correct my if I'm wrong... I'd love to be
corrected here...).
On the dovecot 2 wiki, the only way I've found to implement CRAM-MD5
sup
Steve Campbell skrev den 2013-05-10 14:17:
Is there a way using dovecot facilities to block an IP from
attempting POP3 connections (similar to the sendmail access file for
smtp connections)? I usually do this at my border firewall, but if
there's a quick and dirty way in dovecot to do this, it'd
Line 33:#process_count = 1024
Probably you mean process_limit
13 matches
Mail list logo