how to enable TLs encryption only ?

Jorey Bump list at
Mon Apr 2 09:40:02 EDT 2007

JOYDEEP wrote:

> thanks a lot for so in depth discussion.  I have already enabled SSL
> encryption :-)   as  I have come to know from some documentation that
> the STARTTLS is stillnot very standard and the client side support for
> it is not become standard too.

Actually, it's very standardized and widely supported by nearly all new 
versions of client software. You only need to consider alternatives for 
existing legacy clients and perhaps newer buggy ones.

> and  now I am going for the secured authentication.
> I may be permitted to give here the so that you can suggest the
> necessary tweaking I need.

For the most part, this looks good.

> -------------------------------------------------------------------------------------------------
> configdirectory: /var/lib/imap
> partition-default: /var/spool/imap
> sievedir: /var/lib/sieve
> admins: cyrus
> allowplaintext: yes

This is fine, as long as you've considered the risk and educated your 
users to use the most secure approach available. It's quite trivial to 
decode LOGIN authentication, if it can be sniffed on the wire.

> sasl_mech_list: LOGIN PLAIN

Consider supporting CRAM-MD5 and DIGEST-MD5 (see below).

> allowanonymouslogin: no
> autocreatequota: 10000
> reject8bit: no
> quotawarn: 90
> timeout: 30
> poptimeout: 10
> dracinterval: 0
> drachost: localhost

Are you actually using drac? It's hard to make a case for 
POP-before-SMTP, these days. I'd disable it in favor of per-user 

> sasl_pwcheck_method: saslauthd

Consider switching to auxprop so you can support CRAM-MD5 and 
DIGEST-MD5. Administering sasldb2 is no harder than maintaining local 
system users, but I feel it narrows the risk. There are two sides to 
this argument, so do some research before you make your decision.

> #auxprop saslauthd
> #sasl_auxprop_plugin: sasldb2
> lmtp_overquota_perm_failure: no
> lmtp_downcase_rcpt: yes
> #
> # if you want TLS, you have to generate certificates and keys
> #
> tls_cert_file: /etc/openldap/myca/servercert.pem
> tls_key_file:  /etc/openldap/myca/serverkey.pem
> tls_ca_file:  /etc/openldap/myca/cacert.pem
> tls_ca_path:  /etc/openldap/myca/
> tls_require_cert: no
> tlscache_db: berkeley
> unixhierarchysep:  yes

Do you need to support dots in usernames or mailboxes? This is purely a 
matter of choice, but not all systems support usernames with dots, so it 
may affect future migrations to other IMAP servers. I prefer to have 
logins without dots, but allow dots in the local part of aliases. Of 
course, if you have existing accounts that already contain dots, you'll 
probably need this for migration.

> virtdomains:       yes
> defaultdomain:
> loginrealms:
> hashimapspool: true
> lmtpsocket:  /var/lib/imap/socket/lmtp

More information about the Info-cyrus mailing list