On 04-02-14 17:28, Jaime Fuentes - Ditecal wrote: > This is my /etc/default/saslauthd > > START=yes > DESC="SASL Authentication Daemon" > NAME="saslauthd" > MECHANISMS="pam" > MECH_OPTIONS="" > THREADS=5 > OPTIONS="-c -m /var/run/saslauthd"
Using MECHANISM="pam" means that SASL will try to authenticate against the PAM services, which is very definitely *not* what you want. Use: MECHANISMS="rimap" MECH_OPTIONS="127.0.0.1:143" OPTIONS="-c" > if necessary, tamibén I paste my smtpd.conf > > pwcheck_method: auxprop > auxprop_plugin: sql > sql_engine: mysql > mech_list: PLAIN LOGIN > sql_hostnames: localhost > sql_user: dbmail > sql_passwd: QAwsED123 > sql_database: dbmail > sql_verbose: yes > sql_select: SELECT passwd FROM dbmail_users WHERE userid = '%u@%r' So *this* means you store your passwords in cleartext in the database, which may, or may not be true. Try: > cat /etc/postfix/sasl/smtpd.conf mech_list: PLAIN LOGIN ANONYMOUS pwcheck_method: saslauthd so sasl will know to use saslauthd. And with the example I show above, saslauthd will verify by making a IMAP connection. Modify the MECH_OPTIONS to match your imap server address. -- ________________________________________________________________ Paul J Stevens pjstevns @ gmail, twitter, github, linkedin * Premium Hosting Services and Web Application Consultancy * www.nfg.nl/i...@nfg.nl/+31.85.877.99.97 ________________________________________________________________ _______________________________________________ DBmail mailing list DBmail@dbmail.org http://mailman.fastxs.nl/cgi-bin/mailman/listinfo/dbmail