
- MAC MAIL GMAIL OSX PASSWORD
- MAC MAIL GMAIL OSX MAC
Generate the certificate (this was copied from post above) The content of /etc/postfix/sasl_passwd file is Smtp_tls_per_site = hash:/etc/postfix/smtp_tls_sites Smtp_tls_CAfile = /System/Library/OpenSSL/certs/cert.pemĪs you can see I didn't use parameter, which appears to be not required for gmail. Smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd I found this hint very useful and wanted to illustrate its use based on the example of gmail as your outgoing SMTP server.
MAC MAIL GMAIL OSX MAC
I make no guarantees, but I hope it helps someone. The Apple Mail storages the email data into configured Mac Machine (Local Mac Computer) while Google Mail stores the data on the cloud. I pieced this information together from lots of useless searches and several useful how-to's and postings. Only the root user should be able to read it.
MAC MAIL GMAIL OSX PASSWORD
The chmod go-rx smtp_sasl_passwords removes the group and other/world read/execute permissions on the password files.When I get it working, I may post an update. This, I believe, is configured with smtp_tls_CAfile. Other options are NONE, MAY, and MUST, but some will require configuration of the CA so that a trust can be established with the server.
This, overall, is not a good idea, but I didn't have time to play with it yet and configure the CA.
The MUST_NOPEERMATCH in the smtp_tls_sites file ignores certificate mismatches when negotiating TLS. The *_security_options settings allow postfix to use plain text passwords during authentication (albeit over TLS). You can now check the logs: tail /var/log/mail.logOr, if you're crafty, you'll open a second Terminal window, and before running the tests in the first window, do: tail -f /var/log/mail.logHere are some notes about options that you see in the content above: If that's the case, try: printf "Subject: TestnHello" | sendmail -f second test form specifies the "from" address as you, but can be changed to anything you want as long as it passes muster with your provider's server. Relayhost = # (you can use :port, such as :587)smtp_sasl_auth_enable = yessmtp_use_tls = yessmtp_enforce_tls = yessmtp_sasl_security_options =smtp_sasl_tls_security_options =smtp_sasl_tls_verified_security_options =smtp_tls_loglevel = 2 # optional if you wan to see what's going on with the TLS negotiation in /var/log/mail.logsmtp_sasl_password_maps = hash:/etc/postfix/smtp_sasl_passwordssmtp_tls_per_site = hash:/etc/postfix/smtp_tls_sitestls_random_source = dev:/dev/urandomCreate /etc/postfix/smtp_sasl_passwords with the following contents: username:passwordCreate /etc/postfix/smtp_tls_sites with the following contents: MUST_NOPEERMATCHThen run the following commands: $ cd /etc/postfix$ chmod go-rx smtp_sasl_passwords$ postmap smtp_sasl_passwords$ postmap smtp_tls_sitesTo test, try: echo "Hello" | mail -s "Test" above test may not work if your provider requires a valid source e-mail address.