blob: f3f63894f2553a815eed5ba22d306d78503ffcfe (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
Using exim as SMTP-AUTH client
==============================
If you want to set up exim as SMTP AUTH client for delivery to your
internet access provider's smarthost put the name of the
server, your login and password in /etc/exim4/passwd.client:
name.of.server.example:mylogin:secretpassword
(Lines starting with a hash-mark (#) are ignored.)
--------------------------------
AUTH PLAIN and AUTH LOGIN are disabled for connections which are not
protected by SSL/TLS per default. These authentication methods use
cleartext passwords (like telnet).
If you need to enable them for unencrypted connections because your
service provider does support neither TLS encryption nor the CRAM MD5
authentication method you will have to change the "plain:" and/or
"login:" authenticator respectively in /etc/exim4/exim4.conf.template [3]
as described in the comments in the file.
--------------------------------
/etc/exim4/passwd.client needs to be readable for the exim user (user
Debian-exim, group Debian-exim) I suggest you keep the default permissions
root:Debian-exim 0640.
Using exim as SMTP-AUTH server
==============================
/etc/exim4/exim4.conf.template [3] includes multiple examples for
server-side smtp-authentication which just need to be uncommented.
If you want to authenticate against system passwords (e.g. /etc/shadow)
the easiest way is to use saslauthd in the Debian package sasl2-bin. You
have to add the exim-user (currently Debian-exim) to the sasl[1]
group[2], to give exim permission to use the saslauthd service.
[1] Not present on woody, sorry.
[2] adduser Debian-exim sasl
[3] If you are using split-configuration (dc_use_split_config='true' in
/etc/exim4/update-exim4.conf.conf), the file to edit is:
/etc/exim4/conf.d/auth/30_exim4-config_examples
# vim:tabstop=3:expandtab:shiftwidth=3:textwidth=73
|