On Thu, 19 Jan 2006, Tony Heal wrote:
> Now I can appreciate all the comments, they are not answering my questions.
> Is there a preferred way to set up exim securely?
Yes. Configure TLS as described in chapter 38 of the spec, and configure
authentication as described in chapter 33. You will need to adjust your
ACLs: see chapter 39. If you want to see an advanced example, look at
http://www.cus.cam.ac.uk/~fanf2/hermes/doc/talks/2005-02-eximconf/
For other hints and tips, look at the wiki.
http://www.exim.org/eximwiki/
Tony.
--
<fanf@???> <dot@???>
http://dotat.at/ ${sg{\N${sg{\
N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\
\N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}