IUPOP3 Version 2.0
This page is about version 2.0 of the multithreaded POP3 server for OpenVMS VAX and ALPHA.
It is based on IUPOP3 1.8,
the popular server written at the
Indiana University, which dropped the development
after version 1.8-1.
Special thanks to Alberto Meregalli, Andy Harper, Ian Miller, Karol Zielonko and some others
for sending code snippets, suggestions and/or testing and to Jacob Levanon and Larry Hughes
for writing the original version.
Notices
This version is provided "as is" without express or implied warranty.
It is distributed
as source code and can be used free of charge for non-commercial purposes.
For additional information see the copyright notice within the package.
For questions regarding the software contact the IUPOP3 mailing list
iupop3-users@indiana.edu.
Subscription is done by sending a mail message to
majordomo@indiana.edu
with
the line "subscribe iupop3-users" in the body of the message.
Features
- Full STD 53 (RFC 1939) compliant POP3 server
- Many configuration options, most options are run-time changeable
- Runs on OpenVMS VAX 5.2 and newer and on all OpenVMS Alpha versions
- Runs on all common TCP/IP stacks via the UCX compatibility mode or
the NETLIB 2.x vendor independent library
- Enhanced security by using the $SCAN_INTRUSION system service
- Multithreaded, up to 30 client connections at any given time
- Good performance, no process creation overhead
- Many advanced users on the iupop3-users@indiana.edu mailing list :-)
Security
On newer OpenVMS versions (> 6.2 alpha or 6.1 vax) breakin attacks
are detected via the $SCAN_INTRUSION system service. The "SHOW INTRUSION" command
can be used to monitor this.
The APOP command is supported as an alternative authorization mechanism.
Instead of a password
in clear text a crytographic checksum generated from a 'shared secret' and a
time stamp is sent over the network. The 'shared secret' should be different
from the interactive login password! This increases security if the server is
accessed in regular intervals (but not all clients support this command).
On the OpenVMS site the 'shared secret' is stored in the file POP_SECRET.DAT
in the user's mail directory.
Michael Stenns
Institut für Technische Chemie
Webmaster