When a client's site connects to the server, the server can offer authentication by presenting the AUTH keyword, followed by authentication mechanisms supported: 250-host.domain Hello some.domain, pleased to meet you 250-ENHANCEDSTATUSCODES 250-PIPELINING 250-8BITMIME 250-SIZE 250-DSN 250-ETRN 250-AUTH DIGEST-MD5 CRAM-MD5 KERBEROS-V4 note this line 250-DELIVERBY 250 HELP If the connecting site wishes to authenticate itself, it replies with an AUTH command indicating the desired mechanism: AUTH CRAM-MD5 authentication challenge here authentication reply here 235 Authentication successful. server replies This interaction automatically establishes an authenticated stream using the CRAM-MD5 method. If you wish to turn off additional encryption in SASL when STARTTLS is already encrypting the communication, you do so by defining this AuthMaxBits option. When set, this option limits the maximum encryption strength for the security layer in SMTP AUTH. When not set (the default) encryption strength is essentially unlimited. The AuthMaxBits option is used like this: O AuthMaxBits= limit configuration file (V8.12 and later) -OAuthMaxBits= limit command line (V8.12 and later) define(`confAUTH_MAX_BITS', ` limit') mc configuration (V8.12 and later) Here, limit is the maximum number of bits in the keylength. The existing encryption strength is taken into account when choosing an algorithm for the security layer. For example, if STARTTLS is used and the symmetric cipher is DES, the keylength (in bits) will be 168. By setting this option to: define(`confAUTH_MAX_BITS', `168') any encryption in SASL will be disabled. The AuthMaxBits option is not safe. If specified from the command line, it can cause sendmail to relinquish its special privileges. |