Hey Demi:
I would start with sql authentication for DBMail and rimap for MTA authentication. I believe you are on the right track. Certainly you can use auxprop/sql ("pam mySQL")although it's installation has some twists and turns.

I imagine using LDAP for small systems where other applications need to read-write a directory of simple data which is shared among apps. You have suggested eGroupWare. I can see DBMail w/LDAP-auth (2.2 later this year) getting the nod because it can fit an environment already having a populated LDAP directory, IOW integrating with DBMail from an exisiting LDAP setup. There is no way I would want the extra layer of LDAP on a 900-thousand mailbox system though! Its a customization/extensibility thing. And the database vs directory argument I am sure will continue among the unenlightened ;o) SQL is emerging as a strong language and computing is becoming less and less namespace-focussed and more object-oriented without geo-awareness == directory looses, database wins. Meanwhile there are a still gazillions of existing data directories (LDAP). I won't be struggling with that decision--SQL/RDBMS-everything.

Don't read too much into the name "rimap" but instead just consider it to be one of the mechanisms (methods) used by the SASL authentication server (saslauthd). (Arguably Remote IMAP is a misnomer in your case because you are authenticating on the same host.) "ldap" is another method (answering your other question) and MECHANISMS="ldap blah blah" can be used with parameters as set out in the dist file "LDAP_SASLAUTHD". This is all independent of DBMail and in the case of MECHANISMS="rimap -O localhost", the SASL authentication server will work on any IMAP4 server.

The saslauthd daemon knows to use IMAP syntax from the instruction, "MECHANISMS="rimap -O localhost"" in its config which says "forward authentication requests to localhost:143" (but could be a remote host specified by the -O flag as in "rimap -O 192.168.1.1"). The connection is made to the DBMail IMAP server and the LOGIN command with supplied credentials is issued. If LOGIN succeeds the requested connection (MTA SMTP) is authenticated. The IMAP connection is closed upon receipt of the tagged response from the 'LOGIN'. Concomittantly authenticatin fails if LOGIN is rejected.

best...
Mike



----- Original Message ----- From: "Demi" <[EMAIL PROTECTED]>
To: "DBMail mailinglist" <[email protected]>
Sent: Friday, April 28, 2006 2:48 AM
Subject: Re: [Dbmail] pam setup


On 4/27/06, M. J. [Mike] O'Brien <[EMAIL PROTECTED]> wrote:
It would seem that 'rimap' is the simplest authentication
method. You are asking saslauthd to do the IMAP login
request for an SMTP authentication. It's fast and it's good.

Hi Mike
I figured I send you the Debian way for your wiki aka manual but you
guest it that's not all I have some questions.

What is the ANONYMOUS for in 'mech_list: PLAIN LOGIN ANONYMOUS'
and
you said with rimap we are authenticating against imap.
Does that mean it goes goes like this?
saslauthd
-->rimap
---->imap
-------->mysql   answer OK or NOPE
------------->imap
----------------->rimap
---------------------->saslauthd

Does that also work with LDAP?
See my plan is it to have LDAP as the user DB so I was OK with
pam-mySQL for now till dbMail is ready to go production with the LDAP
module.
I mainly am going to move my xoops users over to this server and xoops
is going LDAP. I am also setting up egroupware which is also OK with
LDAP.

Now tell me is this rimap think still ok for my setup?

We are having sasl in postfix because we are running it chrooted:
 nano /etc/postfix/sasl/smtpd.conf

 mech_list: PLAIN LOGIN ANONYMOUS
 pwcheck_method: saslauthd

 nano /etc/default/saslauthd

START=yes
 PARAMS="-m /var/spool/postfix/var/run/saslauthd -r"
 #MECHANISMS="pam"
 MECHANISMS="rimap -O localhost"

--
Demi
_______________________________________________
Dbmail mailing list
[email protected]
https://mailman.fastxs.nl/mailman/listinfo/dbmail

Reply via email to