Policyd v2 (codenamed "cluebringer") is a multi-platform policy
server for popular MTAs. This policy daemon is designed mostly
for large scale mail hosting environments.
WWW: http://www.policyd.org
PR: ports/129385
Submitted by: Chifeng QU <chifeng at gmail.com>
ago, has been marked deprecated since January 2005 and is not used by
any other port in the tree.
PR: ports/128322
Submitted by: Daniel Roethlisberger <daniel@roe.ch> (maintainer)
Policy Delegation Protocol implementing an ACL (Access Control List) system,
making very easy to improve and create nice controls on your e-mail traffic.
You can use it to verify SPF records too.
WWW: http://www.apolicy.org
PR: ports/129162
Submitted by: Chifeng QU <chifeng at gmail.com>
Modular Python Postfix Policy Server is tool for extending Postfix
checking capabilities. It uses Postfix access policy delegation
(http://www.postfix.org/SMTPD_POLICY_README.html) to check incoming
SMTP request and accept or reject it according provided data. It can
reduce mailserver load with rejecting incorrect mail during SMTP
connection. It was made with stress to height reliability and performance
by providing caching of required data and results.
WWW: http://bimbo.fjfi.cvut.cz/ppolicy
PR: ports/129256
Submitted by: Chifeng QU <chifeng at gmail.com>
It authenticates sender's address with SPF and Sender ID, then labels
the result onto the Authentication-Results: field.
WWW: http://sourceforge.net/projects/enma/
PR: ports/127158
Submitted by: Hirohisa Yamaguchi <umq at ueo.co.jp>
server and proxying.
Three proxy modes are supported.
- Unathenticated proxying mode in which case it just sits between
the client and specified server.
- Athenticated proxying mode, which is the same as above, but only
for authenticated connection.
- Smart proxying mode in which it accepts will send the mail through
a server specified in the user's config by matching the the sender
using regexps to determine what server should be used.
PR: 124967
Submitted by: "Zane C.B." <vvelox at vvelox dot net>
in plain rfc822 and MIME format. The parser uses a callback mechanism to
report parsing events such as the start of an entity header, the start
of a body, etc. If you are familiar with the SAX XML parser interface
you should have no problem getting started with mime4j.
The parser only deals with the structure of the message stream. It won't
do any decoding of base64 or quoted-printable encoded header fields and
bodies.
The parser has been designed to be extremely tolerant against messages
violating the standards.
mime4j can also be used to build a tree representation of an e-mail
message using the Message class. Using this facility mime4j
automatically handles the decoding of fields and bodies and uses
temporary files for large attachments.
WWW: http://james.apache.org/mime4j/
for messaging and collaboration - email, group calendaring,
contacts, and web document management and authoring.
NGMP is written in PHP and requires the PostgreSQL database.
WWW: http://www.prevantage.com/
PR: ports/126095
Submitted by: Luke Jee <lukejee at gmail.com>
Implements the same API as Net::SMTP, but uses IO::Socket::SSL for its
network operations. Due to the nature of Net::SMTP's new method, it is
not overridden to make use of a default port for the SMTPS service.
Perhaps future versions will be smart like that. Port 465 is usually
what you want, and it's not a pain to specify that.
WWW: http://search.cpan.org/dist/Net-SMTP-SSL/
It aims to provide a elegant Ajax webmail client for existing
IMAP mailservers, with less bloat and a focus on an intuitive,
simple user interface.
WWW: http://atmail.org/
PR: ports/124705
Submitted by: Wen heping <wenheping at gmail.com>
The program uses the postfix policy delegation protocol to control access to
the mail system before a message has been accepted (please visit
http://www.postfix.org/SMTPD_POLICY_README.html for more information). It
allows you to choose an action (e.g. reject, dunno) for a combination of
several smtp parameters (like sender and recipient address, size or the
client's TLS fingerprint).
PR: ports/123544
Submitted by: Sahil Tandon <sahil at tandon.net>
Live account. The mail is then presented to any filter (typically
procmail) for further processing or dropping in a local mailbox.
WWW: http://sourceforge.net/projects/getlive
PR: ports/122979
Submitted by: ayunyan
sender has confirmed their address. It can be used in conjunction with a spam
filter to prevent delivery of spammy-looking email unless the sender is
confirmed as valid.
jmba is designed to be used in conjunction with a spam filter such as QSF and
the mail processor procmail. When the spam filter says it thinks an email is
spam, it can be passed to jmba. jmba will queue it and send an email to the
sender containing a key; if the sender replies, the original email is
"unfrozen" from the queue and delivered.
WWW: http://www.ivarch.com/programs/jmba.shtml
PR: ports/122962
Submitted by: Romain Tartiere <romain at blogreen.org>
connections between a remote host and a qmail server. Spam
is blocked while the remote server (spammer) is still
connected; no additional processing or storage is needed.
In addition to all of its anti-spam filters, spamdyke also
includes a number of features to enhance qmail.
Best of all, using spamdyke does not require patching or
recompiling qmail!
PR: ports/119579
Submitted by: Peter Kieser <peter@kieser.ca>
Approved by: garga (mentor)
2008-03-20 x11/e17-module-devian: abandoned by developer
2008-03-20 x11/e17-module-engage: abandoned by developer
2008-03-20 x11/e17-module-eveil: abandoned by developer
It allows you to edit the white- and blacklists as
well as the current state of the greylist.
WWW: http://www.vanheusden.com/sgwi/
PR: ports/121630
Submitted by: Lukasz Wasikowski <lukasz at wasikowski.net>
Approved by: tabthorpe (mentor)
2007-12-01 www/xpi-surfkeys: Development has been ceased
2008-02-01 sysutils/eventwatcher: no active development
2007-10-27 sysutils/p5-UPS-Nut: Version branch long since retired
2007-10-31 net-mgmt/netsaint: Now developed as Nagios, see net-mgmt/nagios port
2007-10-31 net-mgmt/netsaint-plugins: Now developed as Nagios, see net-mgmt/nagios port
2008-01-22 benchmarks/tsung: "fails to install"
2007-10-03 games/ggo: developer's focus have moved elsewhere
2008-02-15 mail/claws-mail-etpan_privacy: no longer supported by developers
treated as special, that is that these folders will be shown at the top of the
folders lists, and in different colour on the left frame (if you have the
option turned on).
WWW: http://www.squirrelmail.org/plugin_view.php?id=183
a real-time Sender e-Mail Address Verification technology. This technology
can stop some kinds of SPAM with a spoofed sender's e-Mail address.
Also it implements a real-time Recipient e-Mail Address Verification
technology. It can be useful if your machine is a backup MX for the recipient's
domains or if your machine forwards all e-Mail messages as a relay host for your
domains to another internal or external e-Mail servers.
It's a lite alternative for the spamilter, milter-sender and milter-ahead
milters.
WWW: http://smfs.sourceforge.net/
PR: ports/116948
Submitted by: Anton Lysenok / Bart Tapolsky <bart@tapolsky.net.ua>
the right of any folders in their folder list that contain at least one
message. Clicking on the link will then mark all messages in this folder as
read/unread. Note that you may turn the "read/unread" link on and off by going
to the Folders page. You may even turn only the "read" or the "unread" link on
or off. It also displays a "mark all read/unread" link below the folder list to
mark all folders read/unread that are selected on the Folders page.
WWW: http://www.squirrelmail.org/plugin_view.php?id=218
images (that are linked to remote sites) will be shown in HTML messages. If a
message matches any of the rules and contains images that would normally be
initially hidden, then they are now shown by default.
The user may choose to always show unsafe images, for all message. This is
obviously not recommended by the core SquirrelMail Project Team - or they
wouldn't have built this functionality to begin with ( See the following:
http://www.squirrelmail.org/wiki/UnsafeImages ).
A new section is added to the options page titled, 'Unsafe Image Rules'. Within
this page the user may define a number of rules to determine when messages are
from a trusted source.
These options are very similar to the core message filters plugin. A message
field (To, From, CC, Subject) can be matched either against a regular
expression, or simply searched to see if the given string is within the field.
If a match is found then unsafe images are always shown for this source.
WWW: http://www.squirrelmail.org/plugin_view.php?id=98
maximum quota usage is displayed in easy-to-read graphical format. Optional
warnings may also be displayed to users who are nearing their quota allocation
when they log in (where the "Message Of The Day" would normally be displayed).
This plugin is compatible with three types of mail quota systems:
UNIX (filesystem), IMAP-based, and cPanel quotas.
WWW: http://www.squirrelmail.org/plugin_view.php?id=237
Claws Mail has a high number of configurable options and, in order to keep
the binary small and fast, some of these preferences which are not widely
used are not provided with a graphical interface for inspection and/or
modification.
Users wanting to edit such preferences had to face editing the configuration
text files directly, now it is possible with a convenient GTK2 interface using
Clawsker.
Other features:
* Handling of all hidden preferences
* Fully internationalized interface using gettext
* Detection of running Claws Mail
* Support for alternate configuration directories
WWW: http://www.claws-mail.org/clawsker
PR: ports/120681
Submitted by: Pawel Pekala <c0rn at o2.pl>
or awstats disregarding the lines relating to the re-injection of
messages into postfix.
It is very useful for a postfix setup which uses amavis for virus filtering.
WWW: http://www.gufonero.com/postfix/prepflog.html
PR: ports/119646
Submitted by: Terry Sposato
used when taking a vacation / holiday / leave of absence.
WWW: http://www.linux.it/~md/software/
PR: ports/120309
Submitted by: Adam McDougall <mcdouga9 at egr.msu.edu>