Table of Contents Previous Next Index

Section 2 What’s New for the Site Administrator

Section 2 What’s New for the Site Administrator
Version 16.0 of LISTSERV has several new features and enhancements for the site administrator. This section gives you detailed information about the following new features:
For Windows, sites with significant inbound spam problems can now scan and reject spam before it reaches the main LISTSERV process, freeing LISTSERV so it can handle legitimate email. For details, see Section 2.6 Using the SMTPL-Level Spam Control for Windows.
The SPAM_FEEDBACK_PROBE variable has been updated to accommodate the changes to the Feedback Loop Auto-Processing. For details, see Section 2.7.1 Configuring the SPAM_FEEDBACK_PROBE Variable.
The SPAM_FEEDBACK_ACTION variable is now available and documented in the Site Configuration wizard on the Anti-Spam tab. For details, see Section 2.7.2 Configuring the SPAM_FEEDBACK_ACTION Variable.
For Solaris, setting up LISTSERV to authenticate via LDAP with SSL can be challenging. There are several scenarios that are dependent primarily on the version of Solaris you are running. For details, see Section 2.11 Configuring LISTSERV to use LDAP over SSL for the Solaris Operating System.
2.1 Setting the DEBUG Parameters on the Fly
A DEBUG FLAGS command has been added in LISTSERV 16.0, allowing you to set the debug parameters on the fly. The DEBUG FLAGS have the following syntax:
DEBUG FLAGS [update1 [update2 [...]]]
Each update has the format:
[+|-]flag
where 'flag' can be either the name of a debug flag or its corresponding hex value. A plus sign turns on the flag, minus turns it off, no sign sets the specified flag and clears all others. The command updates the session debug flags as requested, then displays a summary:
* Debug flags for this session: 00000022
*
* 00000001 TRACE_DIST [Trace DISTRIBUTE processing - OFF]
* 00000002 TRACE_MIME Trace MIME parser
* 00000004 TRACE_LISTS [Trace (a few) list-related functions - OFF]
* 00000008 TRACE_SPAM [Trace spam filter calls - OFF]
* 00000010 TRACE_EMM [Trace Embedded Mail-Merge processor - OFF]
* 00000020 TRACE_DEV Temporary ad hoc tracing for development use
* 00000040 TRACE_FSAV [Trace FSAV calls - OFF]
* 00000080 TRACE_LDAP_CALLS [Trace LDAP library calls - OFF]
* 00000100 TRACE_LDAP_DATA [Trace data obtained from LDAP - OFF]
* 08000000 HOLD_DISTBG [Do not process background DISTRIBUTE jobs - OFF]
* 10000000 HOLD_XB64 [Hold X-B64 jobs instead of processing them - OFF]
* 20000000 KEEP_JOBFILES [Keep successfully processed job files - OFF]
* 40000000 TRACE_TCPGUI [Additional TCPGUI tracing - OFF]
Flags that have not yet been assigned a function will display as RESERVED in the summary and do nothing. The TRACE_DEV flag is used by L-Soft Development to trace various aspects of whatever is being worked on at the time. While TRACE_DEV may be enabled by site maintainers (and in certain cases the support department may request that TRACE_DEV be enabled for debugging purposes), the results will vary depending on the build (and will not be publicly documented for that reason).
Any changes made using the DEBUG FLAGS command are for the current session only (they will be reset when LISTSERV is restarted). For certain purposes it can make sense to have some flags permanently turned on, and the DEBUG_FLAGS site configuration variable remains available for those special cases.
2.2 New SERVE OFF DROP Command
Administrators may now serve users off with the DROP command directly from the Web Interface. To access the Command Interface, click on the Server Administration or List Management menu from the Toolbar, and then click LISTSERV Command.
2.3 Defining the LDAP_PW_BIND Site Configuration Variable
The optional LDAP_PW_BIND site configuration variable is now available in all LISTSERV 16.0 builds. This variable contains the string to format and use when logging on a user. The default is "%n", which works "out of the box" with Active Directory and, in most cases, with OpenLDAP. For other LDAP implementations, or if a different bind string is required for your local installation, it can be defined in this setting and may use the %u/%h/%s escapes.
Examples (for use with the "default" LDAP server):
unix: LDAP_PW_BIND="%n"
export LDAP_PW_BIND
Win: LDAP_PW_BIND=%n
Additionally, this variable, like most of the other LDAP-related variables, can also take an optional server-name attribute, e.g.,
unix: LDAP_PW_BIND_MYSERVER="%n"
export LDAP_PW_BIND_MYSERVER
Win: LDAP_PW_BIND_MYSERVER=%n
The above example assumes that LDAP_SERVER is set to include MYSERVER.
Important: The default value for LDAP_PW_BIND is now "%n".
To define using the Web Interface, click on Server Administration, select Site Configuration, and then finally select Site Configuration. The Site Configuration wizard opens. Click on the LDAP tab, and then define the LDAP_PW_BIND setting.
Note: If the LDAP_PW_BIND setting is not visible on the LDAP tab, you may have to click on the Show All Variables option at the bottom of the tab.
Figure 2-1 Defining the LDAP_PW_BIND Site Configuration Keyword
2.4 Defining the Default Mail-Merge Site Configuration Keyword
You can now set the default value for the Mail-Merge= list header keyword using the new DEFAULT_MAIL_MERGE site configuration keyword. This keyword sets the default value for all of the lists on the server.
Set DEFAULT_MAIL_MERGE to NO to turn off list-based mail-merge, or set it to YES to turn it on. This configuration variable can be overridden at the list level by Setting the Mail-Merge List Header Keyword.
This default value is an empty string, which is equivalent to NO.
To define using the Web Interface, click on Server Administration, select Site Configuration, and then finally select Site Configuration. The Site Configuration wizard opens. Click on the SMTP tab, and then define the DEFAULT_MAIL_MERGE setting.
Note: If the DEFAULT_MAIL_MERGE setting is not visible on the SMTP tab, you may have to click on the Show All Variables option at the bottom of the tab.
Figure 2-2 Defining the Default Mail Merge Site Configuration Keyword
2.4.1 Setting the Mail-Merge List Header Keyword
When creating a new list, you can now select whether or not to enable mail-merge for the list. If you enable mail-merge, the default bottom banner will include an automatically generated one-click unsubscribe link for each subscriber. Without mail-merge, the link will instead lead to the generic subscription management page of the list.
To enable using the List Creation Wizard, go to the Archives page of the wizard and select Yes for the Enable Mail Merge for List option. The default setting is yes.
Figure 2-3 Enabling Mail-Merge for a New List
To enable manually, enter the default value of the “Mail-Merge=” list header keyword using the new DEFAULT_MAIL_MERGE site configuration keyword. The default is Yes.
2.5 Resetting Site Configuration Variables
When editing the Site Configuration variables through the Web Interface, LISTSERV automatically saves the new settings in a file named SITECFG.FILE. Settings stored in SITECFG.FILE take precedence over settings in the legacy site.cfg (on Windows systems) or go.user (on Unix systems) files. Configuration options that have not been changed using the Web Interface will continue to be read from site.cfg or go.user. This ensures a seamless transition for sites to begin using the Web Interface.
In special cases, if you have edited a configuration setting through the Web Interface and you want to revert back to the old setting in site.cfg or go.user, then you can reset this value using the Web Interface.
To reset a configuration variable from the Web Interface, click on the Server Administration menu, click on Site Configuration, and then select Site Configuration. The Site Configuration wizard opens. Click on the tab of your choice and then click on the configuration variable that you want to change. The Configuration Variable screen opens. Click on the [Reset] button. You will be prompted to restart LISTSERV, after which the old setting from site.cfg or go.user will take effect again.
Figure 2-4 Resetting a Site Configuration Variable
2.6 Using the SMTPL-Level Spam Control for Windows
The SMTPL.EXE SMTP "listener" service has the ability to submit inbound mail to a third-party spam scanning product. In LISTSERV 16.0, this feature allows sites with significant inbound spam problems to scan and reject spam before it reaches the main LISTSERV process, thus freeing LISTSERV itself to handle legitimate mail.
Note: Although this hook can, in principle, be used with any spam scanning product, all the examples and step-by-step instructions in this section will relate to SpamAssassin, a popular freeware spam filter that can be downloaded from http://spamassassin.apache.org.
Important: L-Soft did not author SpamAssassin and is unable to correct problems with the SpamAssassin product itself. L-Soft does not make any legal representations or warranties about SpamAssassin. Although L-Soft’s support department will gladly answer questions about the integration of SpamAssassin and SMTPL, we cannot answer questions about SpamAssassin itself.
2.6.1 Enabling
To enable SMTPL-level spam filtering, you must:
1.
2.
3.
SMTPL will then scan every message it processes, with a few exceptions, and reject messages identified as spam.
2.6.2 Configuring LISTSERV to Use SpamAssasin
This section contains step-by-step instructions for configuring LISTSERV to use SpamAssassin using one of the L-Soft supplied scripts. Throughout this section, we will make the following assumptions:
You are running the LISTSERV 16.0 with the version of SMTPL.EXE that shipped with it (version 1.0w) or later.
SpamAssassin has already been installed and configured on a server that we will call spamd.example.com. This can, but does not have to be, the machine on which LISTSERV is installed (i.e. you can run LISTSERV on Windows and SpamAssassin on unix).
Step 1 of 4: Install and Test SpamAssassin Client
Download and install the lspamc.exe executable from L-Soft, and place it in a directory in LISTSERV’s path – for instance, the LISTSERV\MAIN directory.
Note: lspamc.exe is slightly different from the spamc.exe provided for LISTSERV spam scanning. lspamc.exe should be used for SMTPL spam scanning.
To test the client, issue the following command:
C:\> lspamc -c -d spamd.example.com < testmsg.txt
3.8/5.0
The response must be two numbers as shown above, but the numbers can be different than in the example (they are the SpamAssassin score of the test message). Any other response indicates an error. In that case, make sure that spamd is configured to allow connections from the LISTSERV host.
Step 2 of 4: Install REXX (if not already available)
Download REXX.EXE from L-Soft and place it in the same directory where you saved lspamc.exe.
Note: SASMTPL.REXX is incompatible with Regina REXX version 3.1 and later. The version of REXX.EXE downloadable from L-Soft is known to work with the script.
Step 3 of 4: Install and Configure SASMTPL Script
ftp://ftp.lsoft.com/LISTSERV/Windows/CONTRIB/SASMTPL.REXX
Edit the script to configure, at a minimum, the address of your SpamAssassin server. You may also want to change the other parameters.
Step 4 of 4: Enable the SASMTPL Script
To enable the script, add the following lines to LISTSERV’s configuration:
SMTP_SPAM_EXIT=!C:\LISTSERV\MAIN\REXX.EXE C:\LISTSERV\MAIN\SASMTPL.REXX
SMTP_SPAM_THREADS=75
SMTP_SPAM_CHECK=[list of target hostnames to check]
Change the paths in SMTP_SPAM_EXIT to match your local installation. Ensure that the line begins with an exclamation point (!).
Normally, SMTP_SPAM_CHECK may be set to %MYDOMAIN%. If you host multiple domains on the same LISTSERV server, you will need to list each domain (space-separated).
Note: For the 75 concurrent spam scans configured in the example, 750M-1G of memory will be required. Depending on available resources, you may want to start lower.
Restart SMTPL to make the change take effect, then mail a known spam message to a test list to confirm that everything is working as it should.
2.7 Changes to Feedback Loop Auto-Processing
The Feedback Loop Auto-Processing reports are no longer specific to AOL since other ISPs can now be included. In addition to this, other changes have been made. See the sections below for specific details.
Note: Information on the Feedback Loop Auto-Processing can also be found in the Advanced Topics Manual for LISTSERV 16.0.
2.7.1 Configuring the SPAM_FEEDBACK_PROBE Variable
The SPAM_FEEDBACK_PROBE variable defines the domains for which to enable automatic processing of Spam Feedback Loops. Feedback Loop reports are sent automatically by some ISPs, such as AOL and Yahoo!, to organizations that are on their whitelist. Once configured, LISTSERV automatically parses the reports and implements the actions required by the whitelist agreement. This helps preserve whitelist status and reduce the number of spam complaints from subscribers.
There are two steps in configuring automatic feedback loop processing.
1.
Define this configuration variable with the space-separated domain names for which to enable Spam Feedback Loops, for example AOL.COM or YAHOO.COM.
2.
Create a LISTSERV list dedicated to feedback loop processing. It can be configured as you wish as long as the special addresses from which the spam reports are sent are authorized to post to the list. Test the list carefully to make sure that archiving is working properly and that the list will not send any replies back. Then, add Misc-Options= PROCESS_SPAM_FEEDBACK to the list configuration to activate automatic report processing.
If the message is recognized as a spam report and refers to a message that originated after you set the SPAM_FEEDBACK_PROBE configuration option, LISTSERV will:
1.
Immediately delete the user from all LISTSERV lists, on the first spam report. This does not include Dynamic Query Lists, which are managed outside LISTSERV.
2.
3.
Add the user to the spam feedback list with the NOMAIL option to keep a record of who has lodged spam complaints. The subscription date is set to the date of the first complaint and the last activity date is set to the date of the last complaint.
4.
Log a SPAM_COMPLAINT record to the list's change log, if one has been defined. You can use this information to remove the user from Dynamic Query Lists, if you have any such lists.
This ensures that no further mail will be sent to the user and minimizes the risk for further complaints (although experience has shown that people sometimes find old messages in their mailbox days or weeks later, which can lead to a handful of additional spam reports).
To define in the Web Interface, click on Server Administration, select Site Configuration, and then finally select Site Configuration. The Site Configuration wizard opens. Click on the Anti-Spam tab, and then define SPAM_FEEDBACK_PROBE. For example:
SPAM_FEEDBACK_PROBE=AOL.COM
This configuration variable is not set by default.
2.7.2 Configuring the SPAM_FEEDBACK_ACTION Variable
The SPAM_FEEDBACK_ACTION variable is now available and documented in the Site Configuration wizard on the Anti-Spam tab. This variable determines what actions to take when LISTSERV receives spam complaints through Feedback Loops.
By default, when a spam complaint is received through a Feedback Loop, LISTSERV will:
1.
Immediately delete the user from all LISTSERV lists, on the first spam report. This does not include Dynamic Query Lists, which are managed outside LISTSERV.
2.
3.
Add the user to the spam feedback list with the NOMAIL option to keep a record of who has lodged spam complaints. The subscription date is set to the date of the first complaint and the last activity date is set to the date of the last complaint.
4.
Log a SPAM_COMPLAINT record to the list's change log, if one has been defined. You can use this information to remove the user from Dynamic Query Lists, if you have any such lists that may contain users.
To define in the Web Interface, click on Server Administration, select Site Configuration, and then finally select Site Configuration. The Site Configuration wizard opens. Click on the Anti-Spam tab, and then define SPAM_FEEDBACK_ACTION.
Possible definitions include (all space-separated actions are taken in turn):
DELETE: The user is deleted from all LISTSERV lists.
EXCLUDE: The user is added to the spam feedback lists with the NOMAIL option.
SERVEOFF: The user is served off.
SERVEDROP: The user is served off with the DROP option.
NONE: No action is taken other than logging an entry to the list's change log (if defined).
LOGALL: An advanced option for customers operating multiple LISTSERV instances, which collects a central copy of all spam reports and forces them to be logged on that instance even if the reports are for another instance.
This default value is DELETE EXCLUDE.
2.7.3 Configuring the SPAM_FEEDBACK_EXCLUDE_LIST Variable
In LISTSERV 16.0, it is now possible to exclude subscribers who have complained about spam from your organization. At this time, the exclusion is only allowed via DISTRIBUTE; this does not include administrative messages.
Important: The SPAM_FEEDBACK_EXCLUDE_LIST variable is only available when LISTSERV is in Expert Mode.
To define in the Web Interface, click on Server Administration, select Site Configuration, and then finally select Site Configuration. The Site Configuration wizard opens. Click on the Anti-Spam tab, and define the following:
SPAM_FEEDBACK_EXCLUDE_LIST – This variable tells LISTSERV to exclude all of the subscribers of the Spam Feedback Loop list in question from future bulk mailings, even if subscribed to a list or targeted for a mailing via LISTSERV Maestro or home-made DISTRIBUTE job or any other channel. This does not blackhole administrative messages; therefore, the users can still receive confirmation cookies necessary to execute commands and so on.
To enable this setting, enter the name of the Spam Feedback Loop list as the value of this configuration variable. For example, for a list named Spam-Feedback:
SPAM_FEEDBACK_EXCLUDE_LIST=SPAM-FEEDBACK
This configuration variable is not set by default.
Note: L-Soft does not recommend defining multiple lists. For maximum performance, this variable is only intended for use with one list. Then, you can ADD anyone that you want to exclude to this list. (Make sure to set the options for this list to NOMAIL.)
2.8 Using the New Hosted Content Analysis Feature
This feature is now available for customers with paid maintenance.
For some time, LISTSERV Maestro has incorporated the ability to perform a deliverability evaluation on messages it is used to compose and send. However, this feature required several prerequisites:
Because the first two prerequisites are difficult to implement, few sites use this feature. Therefore, L-Soft has implement a hosted service that will be available at no charge to customers with maintenance. This feature is enabled when LISTSERV is installed and your current maintenance LAK is applied. Once this is done, there is nothing to configure; it is entirely automatic.
If a SPAM_EXIT is present, by default, both the SPAM_EXIT report and the hosted report are shown. The hosted report can be disabled if it is preferred to show the results of local spam filter instead.
For details on using the Content Analysis feature in the Web Interface, see Section 1.6 Spam Checking Messages.
2.9 Delayed Mailing List Posting
Since LISTSERV 1.8e (13.0), it has been possible to delay execution of DISTRIBUTE jobs until a given time, by use of the JOB card keyword AFTER=. However, this was never an option for regular postings to mailing lists.
Now, LISTSERV 16.0 introduces the ability to schedule standard mailing list postings using a new, internal RFC822 mail header tag as follows:
X-LSVAfter: date time
This tag, like all other X-LSV tags inserted by LISTSERV, is deleted from the header before being sent to the recipient. The date and time parameters can be specified in any of the formats supported by LISTSERV, except those that contain white space. It is suggested that the format
yyyy-mm-dd hh:mm:ss
should be used. For example:
X-LSVAfter: 2009-11-26 13:41:00
Important: The value MUST NOT be enclosed in quotes or LISTSERV will not recognize it. Similarly, the value MUST NOT be a standard RFC822 date field. A setting like
X-LSVAfter: Tue, 20 Oct 2009 12:00:00 -0400
is invalid, and it will not be recognized.
When the scheduled posting time arrives, LISTSERV will substitute the current local server date and time for the value in the original RFC822 Date: field.
The simple message below utilizes X-LSVAfter to delay an early-morning post until noon:
Date: Tue, 20 Oct 2009 09:14:00 -0400
From: joe.user@example.com
To: lunch@listserv.example.com
Subject: Lunchtime!
X-LSVAfter: 2009-10-20 12:00:00
It's time for lunch!
Note: This feature requires either a mail client that is capable of adding ad-hoc RFC822 headers into messages or the ability to construct RFC821/822 email messages manually and feed them directly to SMTP for delivery to LISTSERV.
The complete RFC821 envelope for the above example would be something like
HELO
MAIL FROM:<joe.user@example.com>
RCPT TO:<lunch@listserv.example.com>
DATA
Date: Tue, 20 Oct 2009 09:14:00 -0400
From: joe.user@example.com
To: lunch@listserv.example.com
Subject: Lunchtime!
X-LSVAfter: 2009-10-20 12:00:00
It's time for lunch!
.
QUIT
The LISTSERV console log shows the following:
20 Oct 2009 09:12:37 Processing file 0077 from MAILER@LISTSERV.EXAMPLE.COM
20 Oct 2009 09:12:37 File 0077 suspended until 20 Oct 2009 12:00:00
(…)
20 Oct 2009 12:00:00 Processing file 0077 from MAILER@LISTSERV.THEBRINDLES.ORG
20 Oct 2009 12:00:00 Processing mail from joe.user@EXAMPLE.COM for LUNCH
20 Oct 2009 12:00:00 Rebuilding HTML page for LUNCH...
20 Oct 2009 12:00:01 Message DISTRIBUTEd to 125 recipients.
Note: If LISTSERV finds an X-LSVAfter: header in the message that either is blank or does not match any of the standard date/time formats understood by the server, then the following will appear and the message will be processed immediately:
20 Oct 2009 09:26:35 Processing file 0078 from MAILER@LISTSERV.EXAMPLE.COM
>>> Invalid date/time specification in X-LSVAfter: tag - ignored
20 Oct 2009 09:26:35 Processing mail from joe.user@example.com for LUNCH
20 Oct 2009 09:26:35 Message DISTRIBUTEd to 125 recipients.
For details on using this feature using the Message Posting Interface, see Section 1.5 Using the Updated Message Posting Interface. (The delayed delivering settings are located in the Show Advanced section.)
2.10 New DQL Exit Point Enhances Distributed Query List Processing
LISTSERV 16.0 now supports a dynamic query exit to provide support for custom data sources other than LDAP and SQL databases, or to query LDAP or SQL data sources in a specific manner not otherwise supported by LISTSERV. For further details regarding this new exit functionality please refer to the Dynamic Queries section in the Advanced Topics Manual.
2.11 Improvements for Solaris
This section contains information on the LISTSERV 16.0 improvements for Solaris.
2.11.1 Configuring LISTSERV to use LDAP over SSL for the Solaris Operating System
Setting up LISTSERV to authenticate via LDAP with SSL can be challenging when dealing with older versions of Solaris. There are several scenarios that are dependent primarily on the version of Solaris you are running.
Note: Solaris 10 is the most current version of Solaris. Using LDAP with Solaris 10 will not cause any problems.
There are two LISTSERV kits involved:
2.11.1.1 Generic Solaris Instructions
1.
# ls /var/ldap/*.db
STOP NOW AND GO TO STEP 2 if there are already files in there.
# <path-to-certutil>/certutil –N –d /var/ldap
# ls /var/ldap/*.db
# chmod 644 /var/ldap/*.db
Do not provide a password. Just type RETURN twice. Verify that you created the right ‘flavor’ of database: cert7 for Solaris 8 and 9, cert8 for Solaris 10. Otherwise you need to start again with the right certutil.
2.
Obtain the public SSL certificate for the LDAP server you want to connect to. This example assumes you used the standard PEM exchange format (base64-encoded ASCII), there are other formats that may require additional or different switches. We will assume that you have saved the certificate in a file called cert.txt.
3.
# <path-to-certutil>/certutil –A –n "nickname" –d /var/ldap –a –t CT –i cert.txt
The nickname is just a dummy name for your convenience in remembering what this certificate is for.
That’s it! You are now set up for LDAP over SSL to that particular server. Remember to specify port 636 in LISTSERV’s configuration, for instance:
LDAP_SERVER="ldap.example.com:636"
2.11.1.2 Instructions for OpenLDAP
This section contains the OpenLDAP instructions, which are the same regardless of the brand of unix you are running.
1.
Obtain the public SSL certificate for the LDAP server you want to connect to, in PEM format (ASCII). If you receive the file in a different format, it is probably easier to ask the LDAP server administrator for a PEM file in ASCII than to try and convert it yourself. If you must convert the file, there are too many possible scenarios to cover here, but check the man pages for the openssl command.
2.
Save this file in the home directory of the ‘listserv’ user as ‘SSL.pem’. If working as root, make sure the ‘listserv’ user has at least read access.
3.
$ cat > ~listserv/.ldaprc
TLS_CACERT /home/listserv/SSL.pem
<Ctrl-D>
Substitute the path to the home directory for the ‘listserv’ user. You may or may not be able to use ‘~listserv’, but an explicit path will always work. As before, if working as root, make sure the ‘listserv’ user has at least read access.
That’s it! Remember to specify ldaps access, for instance:
LDAP_SERVER="ldaps://ldap.example.com"
2.11.1.3 SCENARIO 1: Solaris 10 with the Solaris 10 LISTERV kit
Solaris 10 does understand the cert8.db files created by its version of certutil. You will find certutil pre-installed in /usr/sfw/bin, so just follow the Generic Solaris Instructions. Note that /usr/sfw/bin is not in root’s path.
2.11.1.4 SCENARIO 2: Solaris 9 with the Solaris 10 LISTSERV kit
This scenario will generally be unworkable because of certificate incompatibilities introduced by Sun in Solaris 9. Although Sun's LDAP for Solaris 9 requires certificates to be formatted in the older cert7.db format, the certutil utility that ships with Solaris 9 creates cert8.db format files.
Important: We strongly recommend that Solaris 9 users wishing to use LDAP with LISTSERV contact Sun directly for support on this issue. L-Soft is unable to provide support for this issue as it is a problem that only Sun can resolve.
If you have a Solaris 8 system available, you can use it to follow the Generic Solaris Instructions, below, and then FTP the resulting certificate files to your Solaris 9 system.
If you do not have a Solaris 8 system available, you could download and install the "Directory Server Resource Kit 5.2.1" from Sun, and install it in a temporary directory.
Important: If you install the Directory Server Resource Kit 5.2.1 under Solaris 9, then you must NOT overwrite anything that came with your Solaris 9 system.
Alternately, and perhaps preferably, Sun may have a conversion program or another way to help you with this incompatibility issue. Please contact Sun directly for more information.
2.11.1.5 SCENARIO 3: Using the Solaris 8 LISTSERV Kit on any Version of Solaris
This kit uses a statically linked copy of OpenLDAP. None of the Solaris instructions apply because Sun’s LDAP is not used at all. STOP HERE and use the Instructions for OpenLDAP instead.
2.11.1.6 SCENARIO 4: Solaris 8 with the Solaris 10 LISTSERV kit
This scenario assumes and REQUIRES that you are running Solaris 8 with Sun's LDAP library.
If you are running OpenLDAP on Solaris 8, you MUST use the Solaris 8 kit, and the Instructions for OpenLDAP.
In this scenario, you must first take the following steps:
1.
Confirm that you have the ‘certutil’ utility on your system AND that it operates in the old cert7.db format. This utility does not come pre-installed and is unlikely to be in root’s default path. This would be something you or a colleague installed manually at some point, presumably in /usr/local/bin, but it could be elsewhere.
2.
If you do not have or cannot find certutil, download the “Directory Server Resource Kit 5.2.1” from Sun and install it. This contains a suitable certutil utility.
At this point, you may continue with the Generic Solaris Instructions found below.
2.11.2 Support for Solaris x64
LISTSERV 16.0 and later are now supported on Solaris x64.
2.12 Daily Changelog Updates
Please take note that the daily changelog option was never available in LISTSERV and that it’s mention in the documentation was a mistake.
2.13 LISTSERV Password Requirement Changes
In LISTSERV 16.0, the password’s minimum length is now six characters.
 

L-Soft international, Inc.
1-800-399-5449