1 Date: Thu, 14 Sep 2000 14:49:18 +0100
2 From: Christi Alice Scarborough <christi.scarborough@futuretv.com>
4 Thanks very much to everyone who helped out with this - I now have a
5 working system. For reference, this is how I got PAM authentication from a
6 standard UNIX password database with Eudora 4.3 clients to work on a Debian 2.2
7 (Intel) system. This configuration assumes that you are using standard UNIX
8 crypt passwords; pam-pwdfile is NOT compatible with MD5 encrypted passwords.
10 1) Installed the following packages from the Debian unstable tree
11 exim_3.16-3.deb eximon_3.16-3.deb libpcre3_3.3-2.deb
13 2) Installed the following stable package
14 libpam-pwdfile_0.1-1.deb
16 3) Added the following authentication section to exim.conf
21 server_condition = "${if pam{$1:$2}{1}{0}}"
22 server_prompts = "Username:: : Password::"
25 4) Added the following line to the first Exim configuration section
27 host_auth_accept_relay = *
29 5) Created /etc/pam.d/exim with contents as follows
31 auth required pam_pwdfile.so pwdfile /etc/exim.passwd
32 account required pam_pwdb.so
34 6) Run the following script from crontab to keep the exim password
35 file synchronised with our shadow password file. (Logins to this
36 machine are firewalled off. If you want to allow local logins,
37 you might want to use a completely seperate password file for
42 # This script copies the shadow password file to exim.passwd and sets
43 # permissions so that exim can read it for pam-pwdfile authentication
45 cp /etc/shadow /etc/exim.passwd.temp
46 chmod 600 /etc/exim.passwd.temp
47 chown mail:mail /etc/exim.passwd.temp
48 mv /etc/exim.passwd.temp /etc/exim.passwd