home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Previous Section Next Section

AuthMaxBits

Limit max encryption strength for SASL V8.12 and later

When a client's site connects to the server, the server can offer authentication by presenting the AUTH keyword, followed by authentication mechanisms supported:

250-host.domain Hello some.domain, pleased to meet you
250-ENHANCEDSTATUSCODES
250-PIPELINING
250-8BITMIME
250-SIZE
250-DSN
250-ETRN
250-AUTH DIGEST-MD5 CRAM-MD5 KERBEROS-V4         note this line
250-DELIVERBY
250 HELP

If the connecting site wishes to authenticate itself, it replies with an AUTH command indicating the desired mechanism:

AUTH CRAM-MD5
 authentication challenge here
 authentication reply here
235 Authentication successful.        server replies

This interaction automatically establishes an authenticated stream using the CRAM-MD5 method.

If you wish to turn off additional encryption in SASL when STARTTLS is already encrypting the communication, you do so by defining this AuthMaxBits option. When set, this option limits the maximum encryption strength for the security layer in SMTP AUTH. When not set (the default) encryption strength is essentially unlimited. The AuthMaxBits option is used like this:

O AuthMaxBits=limit                  configuration file (V8.12 and later) 
-OAuthMaxBits=limit                  command line (V8.12 and later) 
define(`confAUTH_MAX_BITS', `limit') mc configuration (V8.12 and later) 

Here, limit is the maximum number of bits in the keylength. The existing encryption strength is taken into account when choosing an algorithm for the security layer. For example, if STARTTLS is used and the symmetric cipher is DES, the keylength (in bits) will be 168. By setting this option to:

define(`confAUTH_MAX_BITS', `168')

any encryption in SASL will be disabled.

The AuthMaxBits option is not safe. If specified from the command line, it can cause sendmail to relinquish its special privileges.

    Previous Section Next Section