This file is indexed.

/etc/pysieved.ini is in pysieved 1.2-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
[main]
# Authentication back-end to use
auth    = passwd

# User DB back-end to use
userdb  = passwd

# Storage back-end to use
storage = Dovecot

# Who are SIEVE scripts intended for ? (Dovecot or Exim)
consumer = Dovecot

# Bind to what address?  (Ignored with --stdin)
#bindaddr = 127.0.0.1

# Listen on what port?  (Ignored with --stdin)
port    = 2000

# Write a pidfile here
pidfile = /var/run/pysieved.pid

# Prepend this path to result of userdb lookup if not absolute
#base = /var/mail

# Where to create temporary files
#tmpdir = /tmp


[TLS]
# Require STARTTLS before authentication
#required = False

# TLS private key file
#key = /etc/ssl/private/woozle.org.key

# TLS certificate file
#cert = /etc/ssl/private/woozle.org.pem

# Passphrase if the TLS private key is encrypted
# (this file should not be world-readable !)
#passphrase = magic


[SASL]
# How do we identify ourself to saslauthd?
service = managesieve

# Where's the magic mux file?
mux = /var/run/saslauthd/mux


[PAM]
# How do we identify ourself to PAM?
service = pysieved


[Virtual]
# Path to storage.  %u = user, %d = domain
path = /usr/local/virtual/%d/%u

# What domain to use if no domain name is specified by the user
#defaultdomain =

# What UID and GID should own all files?  -1 to not bother
uid = 1001
gid = 1001


[LDAP]
# Where the LDAP server is located.
ldap_url = ldap://127.0.0.1

# Credentials to connect to the LDAP server and perform the user search.
bind_dn = cn=root
bind_pw = foobar

# Whether to use the bind method of authentication
# (the alternative is to have pysieved compare passwords,
# which requires the password attribute to be readable
# with the above credentials).
auth_bind = True

# Base, scope and filter to perform the user search.
# In the filter, the available substitutions are :
# %l : login (as provided by the user for authentication)
# %u : username part of login
# %d : domain part of login (defaultdomain if none)
# %m : email address (as derived from %u@%d)
base = 
scope = sub
filter = uid=%u
#default_domain =

# What UID and GID to use if not found in LDAP ?
default_uid = 1001
default_gid = 1001

# Attributes to look for.
#pw_attr = userPassword
#uid_attr = uidNumber
#gid_attr = gidNumber
#home_attr = homeDirectory


[MySQL]
dbhost = localhost
dbuser = user
dbpass = pass
dbname = db
auth_query = SELECT username FROM users WHERE username = "%(username)s" AND password = "%(password)s" AND (active = "1")
user_query = SELECT homedir FROM users WHERE username = "%(username)s" AND (active = "1")

list_query = SELECT name FROM sieve WHERE address = "%(username)s"
get_query = SELECT script FROM sieve WHERE address = "%(username)s" AND name = "%(name)s"
update_query = UPDATE sieve SET script = "%(script)s" WHERE address = "%(username)s" AND name = "%(name)s"
insert_query = INSERT INTO sieve ( address , name , script ) values ( "%(username)s" , "%(name)s" , "%(script)s" ) 
delete_query = DELETE FROM sieve WHERE address = "%(username)s" AND name = "%(name)s"
active_query = SELECT name FROM sieve WHERE address = "%(username)s" AND active > 0 LIMIT 1
set_active_query = UPDATE sieve SET active = 1 WHERE address = "%(username)s" AND name = "%(name)s"
clear_active_query = UPDATE sieve SET active = 0 WHERE address = "%(username)s" AND active > 0


[htpasswd]
passwdfile = /etc/exim/virtual/passwd


[Dovecot]
# Path to Dovecot's auth socket (do not set unless you're using Dovecot auth)
#mux = /var/spool/postfix/auth/dovecot

# Path to Dovecot's master socket (if using Dovecot userdb lookup)
#master = /var/run/dovecot/auth-master

# Path to sievec
sievec = /usr/bin/sievec

# Where in user directory to store scripts
scripts = .pysieved

# Filename used for the active SIEVE filter (see README.Dovecot)
active = .dovecot.sieve

# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1


[Exim]
# Path to sendmail
sendmail = /usr/sbin/sendmail

# Where in user directory to store scripts
scripts = .pysieved

# Filename used for the active SIEVE filter
active = .forward

# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1


[Courier]
# Courier's authentication socket
mux = /var/run/courier-authlib/socket

# Service name to use for communications on that socket
service = managesieve

# What user/group owns the mail storage (-1 to never setuid/setgid)
uid = -1
gid = -1


[lmtpd]
# Where in user directory to store scripts
scripts = .pysieved

# Filename used for the active SIEVE filter
active = ssfilter

# Program to validate SIEVE scripts
checker = /usr/bin/sieve-check