diff -Nru dovecot-2.0.1.orig/doc/example-config/conf.d/10-master.conf dovecot-2.0.1/doc/example-config/conf.d/10-master.conf --- dovecot-2.0.1.orig/doc/example-config/conf.d/10-master.conf 2010-08-28 15:12:36.969547056 +0200 +++ dovecot-2.0.1/doc/example-config/conf.d/10-master.conf 2010-08-28 15:12:48.680717737 +0200 @@ -105,3 +105,10 @@ #group = } } + +service tcpwrap { + unix_listener login/tcpwrap { + mode = 0666 + } +} + diff -Nru dovecot-2.0.1.orig/doc/example-config/conf.d/10-ssl.conf dovecot-2.0.1/doc/example-config/conf.d/10-ssl.conf --- dovecot-2.0.1.orig/doc/example-config/conf.d/10-ssl.conf 2010-08-28 15:12:36.969547056 +0200 +++ dovecot-2.0.1/doc/example-config/conf.d/10-ssl.conf 2010-08-28 15:12:48.680717737 +0200 @@ -9,8 +9,8 @@ # dropping root privileges, so keep the key file unreadable by anyone but # root. Included doc/mkcert.sh can be used to easily generate self-signed # certificate, just make sure to update the domains in dovecot-openssl.cnf -ssl_cert = -passdb { - driver = pam +#passdb { + #driver = pam # [session=yes] [setcred=yes] [failure_show_msg=yes] [max_requests=] # [cache_key=] [] #args = dovecot -} +#} # System users (NSS, /etc/passwd, or similiar). # In many systems nowadays this uses Name Service Switch, which is @@ -26,11 +26,11 @@ # Shadow passwords for system users (NSS, /etc/shadow or similiar). # Deprecated by PAM nowadays. # -#passdb { - #driver = shadow +passdb { + driver = shadow # [blocking=no] #args = -#} +} # PAM-like authentication for OpenBSD. # diff -Nru dovecot-2.0.1.orig/doc/example-config/dovecot.conf dovecot-2.0.1/doc/example-config/dovecot.conf --- dovecot-2.0.1.orig/doc/example-config/dovecot.conf 2010-08-28 15:12:36.969547056 +0200 +++ dovecot-2.0.1/doc/example-config/dovecot.conf 2010-08-28 15:12:48.680717737 +0200 @@ -29,6 +29,7 @@ # If you want to specify non-default ports or anything more complex, # edit conf.d/master.conf. #listen = *, :: +listen = * # Base directory where to store runtime data. #base_dir = /var/run/dovecot/ @@ -43,7 +44,7 @@ #login_trusted_networks = # Sepace separated list of login access check sockets (e.g. tcpwrap) -#login_access_sockets = +login_access_sockets = tcpwrap # Show more verbose process titles (in ps). Currently shows user name and # IP address. Useful for seeing who are actually using the IMAP processes