Hello Everybody, I'm looking for a few thoughts from realworld/enterprise/experienced/etc Cyrus users. I made a list of a whole bunch of questions to avoid annoying the maillist. Please feel free to answer all/any/none of these.
First off our setup: Midsized ISP, ~15,000 email accounts (just cyrus, no real machine accounts), probably a 100 or less simultaneous connections, single mail server (although seperate SMTP relay for outbound). Currently we have an older RedHat/sendmail/cyrus setup (1.5ish I think) that hits a BerkleyDB file. We want the new machine to use a MySqlDB on a remote machine for auth, and possibly would like to support virtual domains with one server/daemon ([EMAIL PROTECTED], [EMAIL PROTECTED]). We're still growing but shouldn't have to scale beyond 50k accounts in the forseeable future. So the questions: Cyrus version? The stable 2.0.16 sounds nice, but so does 2.1.0 with it's ALTNAMESPACE/HEIRSEP ability. Pros/Cons, good patches, stability, bugs? Good MTAs? We've been using the defacto Sendmail with RH, but from what I've read Exim has nice filter features (ie virus), and I know nothing about Postfix or Qmail. Performance, Setup time, stability, cyrus compatibility? Auth Methods? Ugghh, this seems to be a pain. On another server we have a hacked PAM module hitting a MysqlDB, which would seem to continue to work with SASL=PLAIN, but not too secure. I've read some about using the LDAP to help with virtual domains (http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=8020), which seems nice. And there's the LDAP-Mysql patch, but not for the 2.x versions that I know of? And there is SASL-straight-to-Mysql right? So which of these may methods is best for our desired setup? I can't see why kerberos would be neccesary, but enlighten me... Hmm, guess that wasn't soo many. Mostly right now I'm curious/confused about the Auth methods (Don't feel like becoming a Cyrus/SASL/LDAP/Berkley/patching/etc master today), and as I said it would be nice if this system was virtual-domain aware (which probably dictates the Auth method) (I guess I'm interested ideas like Perdition too, if somebody has had good experiences). Thanks for all the replies in advance, Luke Johnson