-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmsmtprc
151 lines (111 loc) · 4.77 KB
/
msmtprc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
# Set default values for all following accounts.
defaults
# Use the mail submission port 587 instead of the SMTP port 25.
port 587
# Always use TLS.
tls on
# Set a list of trusted CAs for TLS. You can use a system-wide default file,
# as in this example, or download the root certificate of your CA and use that.
# tls_trust_file /etc/ssl/certs/ca-certificates.crt
# Additionally, you should use the tls_crl_file command to check for revoked
# certificates, but unfortunately getting revocation lists and keeping them
# up to date is not straightforward.
#tls_crl_file ~/.tls-crls
logfile ~/.msmtp.log
# Accounts
account hsma
# Host name of the SMTP server
host mail.hs-mannheim.de
port 465
tls_starttls off
# As an alternative to tls_trust_file/tls_crl_file, you can use tls_fingerprint
# to pin a single certificate. You have to update the fingerprint when the
# server certificate changes, but an attacker cannot trick you into accepting
# a fraudulent certificate. Get the fingerprint with
# $ msmtp --serverinfo --tls --tls-certcheck=off --host=smtp.freemail.example
# tls_fingerprint A4:FE:40:94:D6:E3:93:6E:0C:AC:1D:F9:1F:2A:CD:E2:B3:EB:7D:DE:43:4D:9F:A6:3E:26:85:97:8C:2F:60:28
# Envelope-from address
from k.eckert@hs-mannheim.de
# Authentication. The password is given using one of five methods, see below.
auth on
user eckert
# Password method 1: Add the password to the system keyring, and let msmtp get
# it automatically. To set the keyring password using Gnome's libsecret:
# $ secret-tool store --label=msmtp \
# host smtp.freemail.example \
# service smtp \
# user joe.smith
# Password method 2: Store the password in an encrypted file, and tell msmtp
# which command to use to decrypt it. This is usually used with GnuPG, as in
# this example. Usually gpg-agent will ask once for the decryption password.
passwordeval gpg2 --no-tty -q -d ~/.kak/hsma.gpg
# Password method 3: Store the password directly in this file. Usually it is not
# a good idea to store passwords in plain text files. If you do it anyway, at
# least make sure that this file can only be read by yourself.
#password secret123
# Password method 4: Store the password in ~/.netrc. This method is probably not
# relevant anymore.
# Password method 5: Do not specify a password. Msmtp will then prompt you for
# it. This means you need to be able to type into a terminal when msmtp runs.
account hdm
# Host name of the SMTP server
host smtp.hdm-stuttgart.de
# As an alternative to tls_trust_file/tls_crl_file, you can use tls_fingerprint
# to pin a single certificate. You have to update the fingerprint when the
# server certificate changes, but an attacker cannot trick you into accepting
# a fraudulent certificate. Get the fingerprint with
# $ msmtp --serverinfo --tls --tls-certcheck=off --host=smtp.freemail.example
# tls_fingerprint A4:FE:40:94:D6:E3:93:6E:0C:AC:1D:F9:1F:2A:CD:E2:B3:EB:7D:DE:43:4D:9F:A6:3E:26:85:97:8C:2F:60:28
# Envelope-from address
from eckert@hdm-stuttgart.de
# Authentication. The password is given using one of five methods, see below.
auth on
user eckert
# Password method 1: Add the password to the system keyring, and let msmtp get
# it automatically. To set the keyring password using Gnome's libsecret:
# $ secret-tool store --label=msmtp \
# host smtp.freemail.example \
# service smtp \
# user joe.smith
# Password method 2: Store the password in an encrypted file, and tell msmtp
# which command to use to decrypt it. This is usually used with GnuPG, as in
# this example. Usually gpg-agent will ask once for the decryption password.
passwordeval gpg2 --no-tty -q -d ~/.kak/hdm.gpg
# Password method 3: Store the password directly in this file. Usually it is not
# a good idea to store passwords in plain text files. If you do it anyway, at
# least make sure that this file can only be read by yourself.
#password secret123
# Password method 4: Store the password in ~/.netrc. This method is probably not
# relevant anymore.
# Password method 5: Do not specify a password. Msmtp will then prompt you for
# it. This means you need to be able to type into a terminal when msmtp runs.
# hallo {{{
account hallo
# tls_fingerprint 3A:D0:DA:44:25:0C:8C:CC:B9:38:0B:EF:F1:A8:FA:A6:8F:1E:71:66:47:EC:D7:0C:83:F2:7C:D2:CA:A7:FD:EA
tls_certcheck off
auth on
host smtp.gmail.com
user hallo@kaiec.de
from hallo@kaiec.de
passwordeval gpg2 --no-tty -q -d ~/.kak/hallo.gpg
#}}}
# gen {{{
account gen : hallo
user gen@kaiec.de
from gen@kaiec.de
passwordeval gpg2 --no-tty -q -d ~/.kak/gen.gpg
#}}}
# kep {{{
account kep : hallo
user kai.eckert@ke-p.de
from kai.eckert@ke-p.de
passwordeval gpg2 --no-tty -q -d ~/.kak/kep.gpg
#}}}
# flokai {{{
account flokai : hallo
user brautpaar@fam-eckert.net
from flo-kai@fam-eckert.net
passwordeval gpg2 --no-tty -q -d ~/.kak/flokai.gpg
#}}}
# Set a default account
# account default : hdm