Download E-books The Book of IMAP: Building a Mail Server with Courier and Cyrus PDF

By Peer Heinlein

IMAP (the net Message entry Protocol) permits consumers to entry their electronic mail on a distant server, no matter if from the place of work, a distant position, or a cellular phone or different equipment. IMAP is robust and versatile, yet it is also advanced to establish; it is tougher to enforce than POP3 and extra error-prone for either consumer and server.

The e-book of IMAP bargains a close advent to IMAP and POP3, the 2 protocols that govern all smooth mail servers and consumers. you will find out how the protocols paintings in addition to tips to set up, configure, and keep the 2 most well-liked open resource mail structures, Courier and Cyrus.

Authors Peer Heinlein and Peer Hartleben have manage 1000s of mail servers and provide functional tricks approximately troubleshooting blunders, migration, filesystem tuning, cluster setups, and password safety that can assist you extricate your self from all types of difficult events. you are going to additionally find out how to:

  • Create and use shared folders, digital domain names, and consumer quotas
  • Authenticate consumer information with PAM, MySQL, PostgreSQL, and LDAP
  • Handle heavy site visitors with load balancers and proxies
  • Use integrated instruments for server research, upkeep, and repairs
  • Implement complementary webmail consumers like Squirrelmail and Horde/IMP
  • Set up and use the Sieve electronic mail filter

    Thoroughly commented references to the POP and IMAP protocols around out the booklet, making The booklet of IMAP an important source for even the main skilled method administrators.

  • Show description

    Read or Download The Book of IMAP: Building a Mail Server with Courier and Cyrus PDF

    Best Internet books

    Cryptography and Network Security: Principles and Practice (7th Edition)

    The foundations and perform of Cryptography and community defense Stallings’ Cryptography and community safeguard, 7th variation, introduces the reader to the compelling and evolving box of cryptography and community safety. In an age of viruses and hackers, digital eavesdropping, and digital fraud on a world scale, safety is paramount.

    Building Successful Online Communities: Evidence-Based Social Design (MIT Press)

    On-line groups are one of the hottest locations on the web, yet now not all on-line groups are both profitable. for each flourishing fb, there's a moribund Friendster -- let alone the rankings of smaller social networking websites that by no means attracted sufficient contributors to be potential.

    Dot.Bomb: My Days and Nights at an Internet Goliath

    Greatly hailed because the most pleasurable enterprise publication of contemporary seasons, dot. bomb is the fantastic tale of the net gold rush because it might purely be informed by means of an insider. J. David Kuo observed all of it: the sky's-the-limit optimism, the masses of hundreds of thousands spent in a giddy seize for industry percentage, the traders slavering to be inside of, the assumption that there rather have been new ideas.

    TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

    “For an engineer made up our minds to refine and safe web operation or to discover substitute recommendations to continual difficulties, the insights supplied via this publication might be priceless. ” —Vint Cerf, web pioneer   TCP/IP Illustrated, quantity 1, moment variation, is a close and visible advisor to today’s TCP/IP protocol suite.

    Additional info for The Book of IMAP: Building a Mail Server with Courier and Cyrus

    Show sample text content

    De")) (("Peer Heinlein" NIL "p. heinle in" "heinlein-support. de")) (("Tux" NIL "tux" "example. com")) NIL NIL NIL "<200704070102. 11133. p. heinlein@heinlein-support. de>")) a5 okay FETCH accomplished. Let’s examine the entire message for message quantity 2, utilizing the subcommand Ç : Ì À a6 FETCH 2 BODY[] * 2 FETCH (BODY[] 1646 Return-Path: X-Original-To: p. heinlein@heinlein-support. de Delivered-To: p. heinlein@heinlein-support. de bought: from [10. zero. forty two. 2] (unknown [10. zero. forty two. 2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client didn't current a certificates) through plasma. heinlein-support. de (Postfix) with ESMTP identity BEA0581A4B for ; Sat, 7 Apr 2007 01:02:01 +0200 (CEST) From: Peer Heinlein To: Tux topic: try out message 2 Date: Sat, 7 Apr 2007 01:02:01 +0200 User-Agent: KMail/1. nine. five MIME-Version: 1. zero Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Message-Id: <200704070102. 01895. p. heinlein@heinlein-support. de> X-Length: 1519 prestige: R X-Status: NC X-UID: zero hi! i'm a attempt message. =2D-=20 Heinlein specialist Linux aid GmbH Linux: Academy - help - internet hosting 38 2. 2 IMAP http://www. heinlein-support. de compulsory info in keeping with =A735a HGB (German advertisement Code) HRB 93818 B / Berlin Charlottenburg neighborhood Court,=20 handling Director: Peer Heinlein =A0-- Registered workplace: Berlin ) a6 okay FETCH accomplished. it's also attainable to obtain person header strains: a7 FETCH 2 BODY[HEADER. FIELDS Message-ID] * 2 FETCH (BODY[HEADER. FIELDS ("Message-ID")] fifty nine Message-Id: <200704070102. 01895. p. heinlein@heinlein-support. de> ) a7 okay FETCH accomplished. we will additionally reproduction messages, both to a different folder or (just to make existence more straightforward) again to ÁÆ Ç ºÌ ×Ø. a8 replica 2:3 INBOX. attempt a8 okay [COPYUID 1175900586 2:3 4:5] reproduction accomplished. Messages 2 and three are actually duplicated as messages four and five. It doesn't Ð Ø flag make experience to maintain duplicates in a folder, so we assign the to them. which means they are going to be deleted the following time an ÈÍÆ , Ë Ä Ì, or ÄÇË command is done (see pages 304, 298, and 303):8 a9 shop 2,3 +FLAGS Ð Ø * 2 FETCH (FLAGS (\Deleted)) * three FETCH (FLAGS (\Deleted)) a9 okay shop accomplished The IMAP server now offers up to date prestige details for this folder. It doesn't point out any new messages, although our copying has elevated the variety of messages considerably: a10 * five * zero a10 NOOP EXISTS contemporary okay NOOP accomplished it really is nonetheless attainable to exploit the messages which were flagged for deletion. The message merely disappears from the server once we depart the folder, e. g. through picking a brand new listing. eight . . . yet now not after we go away the folder utilizing ÍÆË Ä Ì, in accordance with the IMAP extension from RFC 3691. 39 2 POP3 and IMAP on the Protocol point looking for electronic mail Contents there are various complicated and robust question tools on hand for looking e-mail at the server. you could seek via age and dimension of the message, in addition to via sender, header line, IMAP flag, and real content material of the e-mail.

    Rated 4.71 of 5 – based on 24 votes