AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Citizens surgemail11/25/2023 ![]() Wildcard specified and applies the specified access list to thatĭomain admin, giving / restricting thier access to certainįeatures. This setting matches the g_access_group the admin is in to the G_admin_access group="wildcard" access="list" Syntax: g_acctlog_sum_inactive bool g_admin_access - Allow / Restrictĭomain admin access to features based on g_access_group Syntax: g_acctlog_noauth bool g_acctlog_sum_inactive - Summarise local accounts that have not logged in yet as setting has no further documentation currently available Syntax: g_acctlog_aliases bool g_acctlog_noauth - Log sending usage based on from which may be fake Syntax: g_access_webonly string g_acctlog_aliases - Log redirection & aliases in account usage too Syntax: g_access_surgeweb bool g_access_webonly - Users in this group can only use web not imap or pop Syntax: g_access_group_default string g_access_surgeweb - Apply g_access_group rules to surgeweb sessions based on client's address ![]() (mustīe used in conjunction with g_access_group) Syntax: g_access_group group=string access_pop=string access_imap=string access_smtp=string access_incoming=string g_access_group_default -Īccess group defaults for users with no access groups set. G_access_group group="nowebmail" access_pop="*,!webmail.ip"Īccess_imap="*,!webmail.ip" access_smtp="*"Īnd put the users you want to limit in a group called G_access_group group="normal" access_pop="*" access_imap=*" To prevent webmail access for some users you would do this: With "Access type" set to "free_user" on accounts page orĮquivalently in nwauth authentication. G_access_group group=free_user access_pop=Īccess_imap= access_smtp= G_access_group group=paid_user access_pop=* access_imap=* this could allow you to charge webmail users for pop access When a user is authenticated access isĬhecked against group membership defined in the "mailaccess" field Syntax: g_about_disable bool g_access_group - Access groupsĪccess rules defining groups of IP addresses with certain POP, This setting has no further documentation currently available Will take ranges also like 10.0.1-120.5 and also support CIDRĪnd there is an online CIDR calculator here. Try and match on any 127.* or 10.* domains. Many settings will also accept a ! as a "not", and are processedįrom left to right. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.Note: Most 'matching' settings take wild card lists as , "cvelist":, "modified": "T00:00:00", "id": "OPENVAS:1361412562310100842", "href": "", "sourceData": "#\n# OpenVAS Vulnerability Test\n#\n# SurgeMail SurgeWeb Cross Site Scripting Vulnerability\n#\n# Authors:\n# Michael Meyer \n#\n# Copyright:\n# Copyright (C) 2010 Greenbone Networks GmbH\n#\n# This program is free software you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
0 Comments
Read More
Leave a Reply. |