[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#296037: marked as done (RFP: magic-smtpd -- replacement for qmail-smtpd with user checking support)



Your message dated Tue, 16 Oct 2007 11:59:42 -0600
with message-id <E1Ihqhi-0007Ns-VG@merkel.debian.org>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist


* Package name    : magic-smtpd
  Version         : 0.8.3-rc2
  Upstream Author : LinuxMagic Inc. <info@linuxmagic.com>
* URL             : http://www.linuxmagic.com/opensource/magicmail/magic-smtpd/
* License         : LinuxMagic FreeSouce License
  Description     : magic-smtpd is a drop in replacement for qmail-smtpd, and supports valid user checking to reduce server loads as well as many different rule checks.

magic-smtpd is a drop in replacement for Dan Bernsteins qmail-smtpd, and was originally designed to be part of the 
LinuxMagic Magic Mail Server. This opensource version has been released to allow others to benifit from it's anti-spam 
components, and valid user checking to reduce server loads, and spam volumes. It is designed to support stock qmail 
installations, qmail/vpopmail installations, as well as having database support. Designed for ISP service, this will work 
for all mail servers large and small.

The 'magic-smtpd' daemon comes complete with the following features. 

* Drop in replacement for qmail-smtpd
* Support for stock qmail installations, qmail/vpopmail installations, and database installations.
* Valid User Checking
* Anti-Spam and Virus checks can be enabled at the user or email level. (ISP's like that as they can charge extra for the 
service)
* Ability to Set Various Tarpitting Rate Limits on SMPTD connections (Stops those spammers who try to send to a million 
addresses on your server)
* Simple Rule Based system, designed to work with any system, and provide simple integration into Web Based User Defined 
Rule Systems, so that users can set their own policies
* Support for global Rule Sets as well
* Ability to set sane defaults easily
* Support for the BMS&153; "Blacklist Mastering System" 
* Support for TLS, SMTPD AUTH, Valid User Checking, SMTPD Spam Protection 

Some low level rule checks you can set are: 

* By reverse name lookups 
* By double DNS verification 
* By forcing MAILFROM 
* By validating MAILFROM 
* By validating connection IP 
* By Blacklists 
* By WhiteLists 
* By Domain Extension requirements 
* By country of Connecting IP 
* By country of MAILFROM 
* By syntax 
* By checking HELO signatures 
* By Language

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.23-1-686
Locale: LANG=C, LC_CTYPE=C


--- End Message ---
--- Begin Message ---
Hello,

This is an automatic mail sent to close the RFP you have reported or 
are involved with.

Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:

 reopen 296037
 stop

Further comments on the work done in the bug sent to
296037@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <damog@debian.org>.
 


--- End Message ---

Reply to: