= Links Used = * http://www.cyrusimap.org/docs/cyrus-sasl/2.1.23/components.php * http://www.howtoforge.com/virtual_postfix_mysql_quota_courier_p2 * http://www.freebsddiary.org/samba-pam.php * http://www.freebsd.org/doc/en/articles/pam/index.html * http://www.sendmail.org/~ca/email/cyrus2/sysadmin.html * http://www.postfix.org/SASL_README.html#server_sasl * http://enc.com.au/2005/03/postfixmysql/ * http://tldp.org/HOWTO/Cyrus-IMAP-7.html * http://www.gsp.com/cgi-bin/man.cgi?section=8&topic=saslpasswd2 * http://olivier.sessink.nl/jailkit/howtos_debug_jails.html * http://asyd.net/docs/cyrus-options.html * http://bobpeers.com/technical/telnet_imap * http://email.uoa.gr/projects/cyrus/autocreate/README.autocreate-cyrus-2.3 * http://delouw.ch/linux/Postfix-Cyrus-Web-cyradm-HOWTO/html/cyrus-config.html * http://www.sendmail.org/~ca/email/cyrus2/components.html * http://dev.mysql.com/doc/refman/5.0/en/encryption-functions.html * http://comments.gmane.org/gmane.comp.security.cyrus.sasl/2532 * http://www.jeff-barr.com/?p=112 * http://asyd.net/docs/cyrus-options.html * http://southbrain.com/south/2008/08/cmusaslsecretcrammd5-cmusaslse.html = Mailman = To avoid backscatter on mailman instances use the following parameters {{{ subscribe_policy = 2 respond_to_post_requests = 0 reject_these_nonmember = [] generic_nonmember_action = 3 forward_auto_discards = 1 }}} Also make sure the owner addresses have trust rules for mail coming from mail-man, since all (bounce) spam gets forwarded to the address. If you for example use a free account at BigCorp, you end up getting your mailman instance blacklisted in RBL rules due to backscatter SPAM and 'spammy' forwards.