dohash(8) System Manager's Manual dohash(8)NAME
dohash, undohash - Hashes or unhashes IMAP configuration directories
SYNOPSIS
/usr/sbin/dohash [-f] [-h] [-i]
/usr/sbin/undohash
OPTIONS
The following options are available only for the dohash command: Forces the hashing process to continue even if the command encounters
errors. Prints a usage message for the command. Runs the hashing process interactively.
DESCRIPTION
The dohash command converts the IMAP configuration directories from the format for older versions of the Cyrus IMAP4 Revision 1 server to
the new format for Version 1.6.1 or higher.
Starting with Version 1.6.1 of the server, the IMAP user files in the quota and user directories are stored in a through z subdirectories,
sorted by the first character of each user name. This arrangement reduces the number of entries in a given directory and consequently
increases performance and scalability. The dohash command creates the a through z subdirectories and sorts the existing IMAP files as
described; the undohash command reverses this process, in case you need to revert to a previous version of the server.
You can optionally sort the users' directories in the IMAP mail spool in the same manner if you enable the hashimapspool option in the
/etc/imapd.conf file before invoking the dohash command. See imapd.conf(4) for more information.
Note that you must be logged in as the imap user to use the dohash command; otherwise, the newly-created subdirectories will not have the
proper ownership.
EXAMPLES
The following example shows output from the dohash command: # /usr/sbin/dohash configuration directory /var/imap... hashing user directory
hashing quota directory done hashing
In this example, the configuration directory is /var/imap; therefore, you could check that the dohash command has successfully hashed the
directories by using the ls command as follows: # ls /var/imap/quota /var/imap/user /var/imap/quota: a b c d e f g h i j k l m
n o p q r s t u v w x y z
/var/imap/user: a b c d e f g h i j k l m n o p q r s t u v w x y z
The slash () indicates line continuation.
FILES
Configuration file for the IMAP server. Specifies the location of the IMAP configuration directory.
SEE ALSO
Commands: imapd(8)
Files: imapd.conf(4)
Network Administration
dohash(8)
Check Out this Related Man Page
imapd.conf(4) Kernel Interfaces Manual imapd.conf(4)NAME
imapd.conf - IMAP configuration file
SYNOPSIS
/etc/imapd.conf
DESCRIPTION
The /etc/imapd.conf file is the configuration file for the IMAP server. It defines local parameters for IMAP.
Each line of the /etc/imapd.conf file has the form option: value where option is the name of the configuration option being set and value
is the value that the configuration option is being set to.
Blank lines and lines beginning with ``#'' are ignored.
For Boolean options, the values ``yes'', ``on'', ``t'', and ``1'' turn the option on, the values ``no'', ``off'', ``f'', and ``0'' turn the
option off.
Field Descriptions
The following sections detail options that can be placed in the /etc/imapd.conf file, and show each option's default value. Some options
have no default value, these are listed with ``<no default>''. Some options default to the empty string, these are listed with ``<none>''.
The pathname of the IMAP configuration directory. This field is required. The partition name used by default for new mailboxes. The
pathname of the partition name. At least one field, for the partition named in the defaultpartition option, is required. For example, if
the value of the defaultpartition option is default, then the partition-default field is required. The umask value used by various IMAP
programs. Permit logins by the user "anonymous" using any password. Also allows use of the SASL ANONYMOUS mechanism. The percent of
quota utilization over which the server generates warnings. The length of the IMAP server's inactivity autologout timer, in minutes. The
minimum value is 30, the default. The list of userids with administrative rights. Separate each userid with a space.
Any account that receives mail via the IMAP server should not be included in the list as an administrator account. This could cause
problems. For instance, this type of administrator would be able to create top-level mailboxes that are visible to users, but not
writable by users. The Access Control List (ACL) placed on a newly-created (non-user) mailbox that does not have a parent mailbox.
If nonzero, normal users may create their own IMAP accounts by creating the mailbox INBOX. The user's quota is set to the value if
it is positive, otherwise the user has unlimited quota. Include notations in the protocol telemetry logs indicating the number of
seconds since the last command or response. If enabled, the deliver command rejects messages with 8-bit characters in their head-
ers. Otherwise, 8-bit characters are changed to X. Number of seconds to pause after a successful plain text login. For systems
that support strong authentication, this permits users to perceive the cost of using plain text passwords. (This does not affect
the use of PLAIN in SASL authentications.) The pathname of the srvtab file that contains the server's private key. This option is
passed to the SASL library and overrides its default setting. The list of remote realms whose users may log in using cross-realm
authentications. Separate each realm name by a space. (A cross-realm identity is considered any identity returned by SASL with an
"@" in it.) If enabled, any authentication identity that has rights on a user's INBOX may log in as that user. If enabled, the
user mailbox directories in the /var/spool/imap/user directory are sorted into subdirectories a through z, just as the files in the
user and quota configuration directories. This is recommended if the data partition has a highly populated mailbox tree. The mech-
anism used by the server to verify plain text passwords. In Tru64 UNIX, this should be set to tru64. It is needed for authentica-
tion in a C2 environment and for proper mail password usage. Other possible values also include passwd and shadow. If enabled, the
SASL library automatically creates authentication secrets when given a plain text password. Any other SASL option can be set by
preceding it with sasl_.
RELATED INFORMATION
Commands: cyradm(1), deliver(8), imapd(8), imapquota(8), reconstruct(8)
Network Administration delim off
imapd.conf(4)