IMAP connection from the command line

While I connect to an SMTP server via telnet regularly, I do it seldom for IMAP servers.

More as a personal note I want to cite what I found on imap via linux shell

Connect to server:

openssl s_client -connect SERVERNAME-OR-IP:993

# IMAP commands:



Roundcube installer (version 0.3) and eAccelerator

I use Roundcube mail from time to time, but faced some errors or weird behaviour regularly. I therefore decided to re-install the latest stable version, which is 0.3 at the time of this writing.

It was quite easy the last time, so I expected having it done in minutes. I failed!! I regularly got empty pages and wasn't able to run through the installer... *sigh* After a while of debugging the code, I got the idea that eAccelerator might cause the trouble and added

  1. php_admin_value eaccelerator.enable 0

to my Apache's vhost settings.




Success of policyd-weight and RBL

As I already told I'm using policyd-weight for SPAM protection purposes. Since I'm always curious how it behaves I use the mailgraph to get some statistics from my logs.

If you look on the number of past week's sent and received mails is approx. 0.13 mail/minute.

Sent/received mails



Special character for IMAP folder on Exchange

As I've already written in a previous post, it's quite simple to connect from a Perl to Exchange (in german). Unfortunately you get into trouble if you have some special character in the folder names, e.g. german umlaute. Luckily Holger found a solution for this special character in IMAP folder problem.




SPAM protection on Postfix (Part 3)

Most spammers are very aggressive in terms of connection and re-connection to mail servers. Of course they want to send as many SPAM as possible in the shortest time period.

However if you're using postfix you can throttle that by being a bit more restrictive in your anvil settings in main.cf

RBLs on Postfix made easy

Real-time blacklists, DNS RBL precisely, are a convenient way to mitigate the SPAM problem on your server despite all critics about it. policyd is another option that you should consider. If you're using Postfix as your MTA it's quite easy to setup RBLs. Simply add the reject_rbl_client option to your main.cf and you're done. reject_rbl_client zen.spamhaus.org,


policyd-weight and Postfix SPAM fighting

If you run your own mail server you have to think carefully about SPAM protection of course. The first line of defence is in front of the actual mail server or at least before accepting the actual mail body.

The problem is that in some countries the mail mustn't be rejected or dropped after the mail server accepted the mail from the outside. Therefore techniques like RBL or greylisting could help here.

Another option is using policyd-weight. This is a

POP3 on the command line

You sometimes find the need to run a protocol dialogue on the command line via telnet. I recently had to do this for POP3. In fact it's quite simple if you follow the example below where lines starting with a plus are responses from the server:

  1. telnet my.pop.server 110
  2. Trying 123.456.789.123...
  3. Connected to my.pop.server.
  4. Escape character is '^]'.
  5. +OK Hello there.
  6. user <a href="mailto:user@my.pop.server">user@my.pop.server</a>
  7. +OK Password required.
  8. pass secret
  9. +OK logged in.
  10. list
  11. +OK POP3 clients that break here, they violate STD53.
  12. 1 2213
  13. 2 2823
  14. .
  15. retr 1
  16. +OK 2213 octets follow.
  17. [email content]
  18. .



msmtp mit mutt nutzen

Da bin ich doch gerade über einen interessanten Beitrag zu msmtp vom gestolpert.

Er erklärt kurz und knapp wie ich mutt auf einer beliebiegen Maschine nutzen kann und doch meinen eigenen Mailserver nutzen.

Muss ich mal antesten...



Parsing Pidgin logs (Part 2)

I already wrote some stuff on parsing Pidgin log files in a previous post.




Subscribe to RSS - E-Mail


Subscribe to Syndicate