SMTP Authentication

damn

Verified User
Joined
Nov 30, 2004
Messages
101
Is popb4smtp the only form of outgoing authentication peformed on my DA / FreeBSD box?

Or does it also accept people providing their username / password as authentication as well?

I ask this because new clients like Outlook 2003 give you the choice to POP before SMTP, but older Outlook Express clients allow you to provide your username / password for authentication, but not pop'ing before smtp'ing.
 
Thanks Jeff.

Do people disable popb4smtp and just roll with outgoing authenication, which leads me to my next question, how long does popb4smtp cache the IP address for?

If I wanted to disable popb4smtp - how do I do that?
 
damn said:
Do people disable popb4smtp and just roll with outgoing authenication
We don't; it's never been a problem for us.

If it becomes a problem we will.

I anticipate that within another two years or so we'll only be using port 25 for unauthenticated access to domains we host, and we'll be using port 587 only for authenticated access to our users. The world seems to be going in this direction.

Jeff
 
So the outgoing authorisation happens on another port?

I'll have to check that my firewall allows this in :confused:
 
Unless you've changed it, then exim is only listening on port 25.

I was writing about what we expect in the future based on current RFCs and how they're being implemented.

Jeff
 
This gives me a question, can I have exim listen to port 25 and any other port I want or just 587 as an alternate?

I ask because many ISPs are blocking port 25 and I have my clients use 2525 that have that problem. 587 is like you said becomeing the new standard so I can see it getting blocked also and then we will not have an alternate anymore.
 
You can use any port you want.

587 should always work as long as you use it only for authenticated email.

There have been posts on these forums on how to do it.

Jeff
 
Any usage that is kept by using log files in the /var/log directory is counted towards the user's usage as long as the logs indicate which user the usage belongs to. That's how I understand it.
 
Back
Top