Restricting IMAP/POP3 access¶
Below examples show how you can give POP3 access to everyone, but IMAP access only for some people. The exact solution you want depends on what passdb you use. The solutions can also be modified for other types of IMAP/POP3/SMTP/etc. access checks.
PAM¶
Set PAM service name to %s
, ie.:
passdb {
driver = pam
args = %s
}
That way PAM uses /etc/pam.d/imap
for IMAP, and /etc/pam.d/pop3
for POP3.
In /etc/pam.d/imap
you could then use eg. the pam_listfile.so
module:
# allow IMAP access only for users in /etc/imapusers file
auth required pam_listfile.so item=user sense=allow file=/etc/imapusers onerr=fail
SQL¶
You can use the %s
variable which expands to imap
or pop3
in
password_query
, eg:
password_query = SELECT password FROM users WHERE userid = '%u' and not (imap_allowed = false and '%s' = 'imap')
LDAP¶
Just like with SQL, you can use %s
in pass_filter, eg.:
pass_filter = (&(objectClass=posixAccount)(uid=%u)(service=%s))
That would require setting both service=pop3 and service=imap attributes to the user objects.
passwd-file¶
You can create a deny passwd-file based on the service:
passdb {
driver = passwd-file
args = /etc/dovecot/deny.%s
deny = yes
}
This makes Dovecot look for /etc/dovecot/deny.imap
and
/etc/dovecot/deny.pop3
files. If the user exists in it, the access
is denied. The files don’t need to have anything else than one username
per line.
Note that this deny passdb must be before other passdbs. It also means that it can be used with any other passdb, not just with passwd-file passdbs.
Restricting IP Access¶
It’s possible to allow a user to authenticate only from a specific IP or network. This is especially useful for master users. This can be done by returning allow_nets extra field in passdb.