On Thu, 19 Jan 2006, Tony Heal wrote: > Now I can appreciate all the comments, they are not answering my questions. > Is there a preferred way to set up exim securely?
Yes. Configure TLS as described in chapter 38 of the spec, and configure authentication as described in chapter 33. You will need to adjust your ACLs: see chapter 39. If you want to see an advanced example, look at http://www.cus.cam.ac.uk/~fanf2/hermes/doc/talks/2005-02-eximconf/ For other hints and tips, look at the wiki. http://www.exim.org/eximwiki/ Tony. -- <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> http://dotat.at/ ${sg{\N${sg{\ N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\ \N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}} -- ## List details at http://www.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://www.exim.org/eximwiki/
