Mercurial > dovecot > original-hg > dovecot-1.2
annotate dovecot-example.conf @ 284:8d7e46d41ce3 HEAD
list supported auth methods
author | Timo Sirainen <tss@iki.fi> |
---|---|
date | Fri, 20 Sep 2002 14:57:48 +0300 |
parents | fa2d1a1d025e |
children | 06576f1d9e69 |
rev | line source |
---|---|
0 | 1 ## Dovecot 1.0 configuration file |
2 | |
3 # Default values are shown after each value, it's not required to uncomment | |
4 # any of the lines. | |
5 | |
6 # Port to listen in for IMAP connections. This port is used for TLS | |
7 # connections as well. Setting it to 0 disables it. | |
8 #imap_port = 143 | |
9 | |
10 # Port to listen in for SSL IMAP connections. Setting it to 0 disables it. | |
11 #imaps_port = 993 | |
12 | |
13 # IP or host address where to listen in for IMAP connections. Empty means to | |
14 # listen in all interfaces. It's not possible to specify multiple. | |
15 #imap_listen = | |
16 | |
17 # IP or host address where to listen in for SSL IMAP connections. Defaults | |
18 # to imap_listen if not specified. | |
19 #imaps_listen = | |
20 | |
21 # SSL certificate/key, they're opened as root | |
22 #ssl_cert_file = /etc/ssl/certs/imapd.pem | |
23 #ssl_key_file = /etc/ssl/private/imapd.pem | |
24 | |
25 # Disable LOGIN command and all other plaintext authentications unless | |
26 # SSL/TLS is used (LOGINDISABLED capability) | |
27 #disable_plaintext_auth = no | |
28 | |
35
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
29 # Use this logfile instead of syslog() |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
30 #log_path = |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
31 |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
32 # Prefix for each line written to log file. % codes are in strftime(3) |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
33 # format. Note the extra space at the end of line. |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
34 #log_timestamp = %b %d %H:%M:%S |
b420373f88f6
Added log_path and log_timestamp settings to config file. Removed -l command
Timo Sirainen <tss@iki.fi>
parents:
27
diff
changeset
|
35 |
0 | 36 ## |
37 ## Login process | |
38 ## | |
39 | |
40 # Executable location | |
41 #login_executable = /usr/lib/dovecot/imap-login | |
42 | |
43 # User to use for imap-login process | |
44 #login_user = imapd | |
45 | |
46 # Directory where imap-auth places authentication UNIX sockets which login | |
47 # needs to be able to connect to. The sockets are created when running as | |
48 # root, so you don't need to give imap-auth any access for it. | |
49 #login_dir = /var/run/dovecot/login | |
50 | |
51 # chroot() imap-login process to the login_dir. Only reason not to do this | |
52 # is if you wish to run the whole imapd without roots. | |
53 #login_chroot = yes | |
54 | |
55 # Number of imap-login processes to use, one or two is enough | |
56 #login_processes_count = 1 | |
57 | |
58 # Maximum number of connections allowed in login state. When this limit is | |
59 # reached, the oldest connections are dropped. | |
60 #max_logging_users = 256 | |
61 | |
62 ## | |
63 ## IMAP process | |
64 ## | |
65 | |
66 # Executable location | |
67 #imap_executable = /usr/lib/dovecot/imap | |
68 | |
69 # Maximum number of running imap processes. When this limit is reached, | |
70 # new users aren't allowed to log in. | |
71 #max_imap_processes = 1024 | |
72 | |
73 # Valid UID/GID ranges for imap users, defaults to 500 and above. | |
74 # Note that denying root logins is hardcoded to imap-master binary and | |
75 # can't be done even if first_valid_uid is set to 0. | |
76 #first_valid_uid = 500 | |
77 #last_valid_uid = 0 | |
78 | |
79 #first_valid_gid = 1 | |
80 #last_valid_gid = 0 | |
81 | |
82 # ':' separated list of directories under which chrooting is allowed for imap | |
83 # processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too). | |
84 # WARNING: Never add directories here which local users can modify, that | |
85 # may lead to root exploit. Usually this should be done only if you don't | |
86 # allow shell access for users. | |
87 #valid_chroot_dirs = | |
88 | |
89 # Copy mail to another folders using hard links. This is much faster than | |
90 # actually copying the file. Only problem with it is that if either of the | |
91 # mails are modified directly both will change. This isn't a problem with | |
92 # IMAP however since it offers no way to modify the existing mails. Also | |
93 # at least mutt modifies mails by deleting the old one and inserting a new | |
94 # modified mail. So if performance matters at all you should turn this on. | |
95 #maildir_copy_with_hardlinks = no | |
96 | |
97 # Check if mails' content has been changed by external programs. This slows | |
98 # down things as extra stat() needs to be called for each file. | |
99 #maildir_check_content_changes = no | |
100 | |
101
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
101 # If main index file is incompatible with us, should we overwrite it or |
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
102 # create a new index with another name. Unless you are running Dovecot in |
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
103 # multiple computers with different architectures accessing the same |
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
104 # mailboxes (eg. via NFS), it's safe to set this "yes". |
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
105 #overwrite_incompatible_index = no |
edc37d046b08
Added overwrite_incompatible_index setting. Also we now try to use only
Timo Sirainen <tss@iki.fi>
parents:
35
diff
changeset
|
106 |
0 | 107 # umask to use for mail files and directories |
108 #umask = 0077 | |
109 | |
110 ## | |
111 ## Authentication processes | |
112 ## | |
113 | |
114 # You can have multiple processes; each time "auth = xx" is seen, a new | |
115 # process definition is started. The point of multiple processes is to be | |
116 # able to set stricter permissions to others. For example, plain/PAM | |
117 # authentication requires roots, but if you also use digest-md5 authentication | |
118 # for some users, you can authenticate them without any privileges in a | |
119 # separate auth process. Just remember that only one auth process is asked | |
120 # for the password, so you can't have different passwords with different | |
121 # processes (unless they have different auth methods, and you're ok with | |
122 # having different password for each method). | |
123 | |
124 # Authentication process name. | |
125 auth = default | |
126 | |
284 | 127 # Authentication methods this process allows separated with a space. |
128 # Currently supported: plain digest-md5 | |
0 | 129 auth_methods = plain |
130 | |
131 # Space separated list of realms with authentication methods that need them. | |
132 # This is usually empty or the host name of the server (eg. | |
133 # mail.mycompany.com). | |
134 # - plain auth checks the password from all realms specified in here | |
135 # - digest-md5 must have the password added for each realm separately, and | |
136 # many clients simply use the first realm listed here. so if you really | |
137 # need to add more realms, add them to end of the list. | |
138 #auth_realms = | |
139 | |
140 # Where the user information and passwords are stored into: | |
141 # passwd: /etc/passwd or similiar, using getpwnam() | |
142 # shadow: /etc/shadow or similiar, using getspnam() | |
143 # pam: PAM authentication | |
144 # passwd-file /etc/passwd.imap: /etc/passwd-like file. Supports digest-md5 | |
145 # style passwords | |
280
fa2d1a1d025e
vpopmail authentication. compiles, not tested if it really works.
Timo Sirainen <tss@iki.fi>
parents:
101
diff
changeset
|
146 # vpopmail: vpopmail authentication |
27 | 147 auth_userinfo = pam |
0 | 148 |
149 # Executable location | |
150 #auth_executable = /var/lib/dovecot/imap-auth | |
151 | |
152 # User to use for the process. Only shadow and pam authentication requires | |
153 # roots, so use something else if possible. | |
154 auth_user = root | |
155 | |
156 # Directory where to chroot the process | |
157 #auth_chroot = | |
158 | |
159 # Number of authentication processes to create | |
160 #auth_count = 1 | |
161 | |
162 | |
163 # digest-md5 authentication process. It requires special MD5 passwords which | |
164 # /etc/shadow and PAM doesn't support, so we never need roots to handle it. | |
165 # Note that the passwd-file is opened before chrooting and dropping root | |
166 # privileges, so it may be 0600-root owned file. | |
167 | |
168 #auth = digest_md5 | |
169 #auth_methods = digest-md5 | |
170 #auth_realms = | |
171 #auth_userinfo = passwd-file /etc/passwd.imap | |
172 #auth_user = imapauth | |
173 #auth_chroot = /var/run/dovecot/auth | |
174 | |
175 # if you plan to use only passwd-file, you don't need the two auth processes, | |
176 # simply set "auth_methods = plain digest-md5" |