enable ssl for postfix/dovecot by default using a self-signed certificate if not otherwise specified
Signed-off-by: Michael Kaufmann <d00p@froxlor.org>
This commit is contained in:
@@ -85,7 +85,7 @@ return [
|
|||||||
'type' => 'text',
|
'type' => 'text',
|
||||||
'string_type' => 'file',
|
'string_type' => 'file',
|
||||||
'string_emptyallowed' => true,
|
'string_emptyallowed' => true,
|
||||||
'default' => '/etc/apache2/apache2.pem',
|
'default' => '/etc/ssl/froxlor_selfsigned.pem',
|
||||||
'save_method' => 'storeSettingField'
|
'save_method' => 'storeSettingField'
|
||||||
],
|
],
|
||||||
'system_ssl_key_file' => [
|
'system_ssl_key_file' => [
|
||||||
@@ -95,7 +95,7 @@ return [
|
|||||||
'type' => 'text',
|
'type' => 'text',
|
||||||
'string_type' => 'file',
|
'string_type' => 'file',
|
||||||
'string_emptyallowed' => true,
|
'string_emptyallowed' => true,
|
||||||
'default' => '/etc/apache2/apache2.key',
|
'default' => '/etc/ssl/froxlor_selfsigned.key',
|
||||||
'save_method' => 'storeSettingField'
|
'save_method' => 'storeSettingField'
|
||||||
],
|
],
|
||||||
'system_ssl_cert_chainfile' => [
|
'system_ssl_cert_chainfile' => [
|
||||||
|
|||||||
@@ -569,7 +569,7 @@ opcache.validate_timestamps'),
|
|||||||
('system', 'last_archive_run', '000000'),
|
('system', 'last_archive_run', '000000'),
|
||||||
('system', 'mod_fcgid_configdir', '/var/www/php-fcgi-scripts'),
|
('system', 'mod_fcgid_configdir', '/var/www/php-fcgi-scripts'),
|
||||||
('system', 'mod_fcgid_tmpdir', '/var/customers/tmp'),
|
('system', 'mod_fcgid_tmpdir', '/var/customers/tmp'),
|
||||||
('system', 'ssl_cert_file', '/etc/apache2/apache2.pem'),
|
('system', 'ssl_cert_file', '/etc/ssl/froxlor_selfsigned.pem'),
|
||||||
('system', 'use_ssl', '0'),
|
('system', 'use_ssl', '0'),
|
||||||
('system', 'default_vhostconf', ''),
|
('system', 'default_vhostconf', ''),
|
||||||
('system', 'default_sslvhostconf', ''),
|
('system', 'default_sslvhostconf', ''),
|
||||||
@@ -583,7 +583,7 @@ opcache.validate_timestamps'),
|
|||||||
('system', 'mod_fcgid_peardir', '/usr/share/php/:/usr/share/php5/'),
|
('system', 'mod_fcgid_peardir', '/usr/share/php/:/usr/share/php5/'),
|
||||||
('system', 'index_file_extension', 'html'),
|
('system', 'index_file_extension', 'html'),
|
||||||
('system', 'mod_fcgid_maxrequests', '250'),
|
('system', 'mod_fcgid_maxrequests', '250'),
|
||||||
('system', 'ssl_key_file','/etc/apache2/apache2.key'),
|
('system', 'ssl_key_file','/etc/ssl/froxlor_selfsigned.key'),
|
||||||
('system', 'ssl_ca_file', ''),
|
('system', 'ssl_ca_file', ''),
|
||||||
('system', 'debug_cron', '0'),
|
('system', 'debug_cron', '0'),
|
||||||
('system', 'store_index_file_subs', '1'),
|
('system', 'store_index_file_subs', '1'),
|
||||||
|
|||||||
@@ -32,6 +32,7 @@ use Froxlor\Froxlor;
|
|||||||
use Froxlor\PhpHelper;
|
use Froxlor\PhpHelper;
|
||||||
use Froxlor\Settings;
|
use Froxlor\Settings;
|
||||||
use Froxlor\SImExporter;
|
use Froxlor\SImExporter;
|
||||||
|
use Froxlor\System\Crypt;
|
||||||
use Symfony\Component\Console\Input\InputInterface;
|
use Symfony\Component\Console\Input\InputInterface;
|
||||||
use Symfony\Component\Console\Input\InputOption;
|
use Symfony\Component\Console\Input\InputOption;
|
||||||
use Symfony\Component\Console\Output\OutputInterface;
|
use Symfony\Component\Console\Output\OutputInterface;
|
||||||
@@ -353,6 +354,14 @@ final class ConfigServices extends CliCommand
|
|||||||
$services = $configfiles->getServices();
|
$services = $configfiles->getServices();
|
||||||
$replace_arr = $this->getReplacerArray();
|
$replace_arr = $this->getReplacerArray();
|
||||||
|
|
||||||
|
// be sure the fallback certificate specified in the settings exists
|
||||||
|
$certFile = Settings::Get('system.ssl_cert_file');
|
||||||
|
$keyFile = Settings::Get('system.ssl_key_file');
|
||||||
|
if (empty($certFile) || empty($keyFile) || !file_exists($certFile) || !file_exists($keyFile)) {
|
||||||
|
$output->writeln('<comment>Creating missing certificate ' . $certFile . '</>');
|
||||||
|
Crypt::createSelfSignedCertificate();
|
||||||
|
}
|
||||||
|
|
||||||
foreach ($services as $si => $service) {
|
foreach ($services as $si => $service) {
|
||||||
$output->writeln("--- Configuring: " . strtoupper($si) . " ---");
|
$output->writeln("--- Configuring: " . strtoupper($si) . " ---");
|
||||||
if (!isset($decoded_config[$si]) || $decoded_config[$si] == 'x') {
|
if (!isset($decoded_config[$si]) || $decoded_config[$si] == 'x') {
|
||||||
@@ -495,7 +504,9 @@ final class ConfigServices extends CliCommand
|
|||||||
'<WEBSERVER_RELOAD_CMD>' => Settings::Get('system.apachereload_command'),
|
'<WEBSERVER_RELOAD_CMD>' => Settings::Get('system.apachereload_command'),
|
||||||
'<CUSTOMER_LOGS>' => FileDir::makeCorrectDir(Settings::Get('system.logfiles_directory')),
|
'<CUSTOMER_LOGS>' => FileDir::makeCorrectDir(Settings::Get('system.logfiles_directory')),
|
||||||
'<FPM_IPCDIR>' => FileDir::makeCorrectDir(Settings::Get('phpfpm.fastcgi_ipcdir')),
|
'<FPM_IPCDIR>' => FileDir::makeCorrectDir(Settings::Get('phpfpm.fastcgi_ipcdir')),
|
||||||
'<WEBSERVER_GROUP>' => Settings::Get('system.httpgroup')
|
'<WEBSERVER_GROUP>' => Settings::Get('system.httpgroup'),
|
||||||
|
'<SSL_CERT_FILE>' => Settings::Get('system.ssl_cert_file'),
|
||||||
|
'<SSL_KEY_FILE>' => Settings::Get('system.ssl_key_file'),
|
||||||
];
|
];
|
||||||
return $replace_arr;
|
return $replace_arr;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -242,6 +242,18 @@ class Crypt
|
|||||||
*/
|
*/
|
||||||
public static function createSelfSignedCertificate()
|
public static function createSelfSignedCertificate()
|
||||||
{
|
{
|
||||||
|
// validate that we have file names in the settings
|
||||||
|
$certFile = Settings::Get('system.ssl_cert_file');
|
||||||
|
$keyFile = Settings::Get('system.ssl_key_file');
|
||||||
|
if (empty($certFile)) {
|
||||||
|
$certFile = '/etc/ssl/froxlor_selfsigned.pem';
|
||||||
|
Settings::Set('system.ssl_cert_file', $certFile);
|
||||||
|
}
|
||||||
|
if (empty($keyFile)) {
|
||||||
|
$keyFile = '/etc/ssl/froxlor_selfsigned.key';
|
||||||
|
Settings::Set('system.ssl_key_file', $keyFile);
|
||||||
|
}
|
||||||
|
|
||||||
// certificate info
|
// certificate info
|
||||||
$dn = [
|
$dn = [
|
||||||
"countryName" => "DE",
|
"countryName" => "DE",
|
||||||
@@ -262,7 +274,7 @@ class Crypt
|
|||||||
// sign csr
|
// sign csr
|
||||||
$x509 = openssl_csr_sign($csr, null, $privkey, 365, array('digest_alg' => 'sha384'));
|
$x509 = openssl_csr_sign($csr, null, $privkey, 365, array('digest_alg' => 'sha384'));
|
||||||
// export to files
|
// export to files
|
||||||
openssl_x509_export_to_file($x509, Settings::Get('system.ssl_cert_file'));
|
openssl_x509_export_to_file($x509, $certFile);
|
||||||
openssl_pkey_export_to_file($privkey, Settings::Get('system.ssl_key_file'));
|
openssl_pkey_export_to_file($privkey, $keyFile);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2347,15 +2347,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -2374,35 +2377,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (yes) (never) (100)
|
# (yes) (yes) (yes) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - y - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - y - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - y - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - y - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - y - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - y - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - y - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -3414,14 +3419,14 @@ service dict {
|
|||||||
##
|
##
|
||||||
|
|
||||||
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
||||||
ssl = no
|
ssl = yes
|
||||||
|
|
||||||
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
||||||
# dropping root privileges, so keep the key file unreadable by anyone but
|
# dropping root privileges, so keep the key file unreadable by anyone but
|
||||||
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
||||||
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
||||||
#ssl_cert = </etc/dovecot/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
#ssl_key = </etc/dovecot/private/dovecot.pem
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
|
||||||
# If key file is password protected, give the password here. Alternatively
|
# If key file is password protected, give the password here. Alternatively
|
||||||
# give it when starting dovecot with -p parameter. Since this file is often
|
# give it when starting dovecot with -p parameter. Since this file is often
|
||||||
@@ -3453,8 +3458,11 @@ ssl = no
|
|||||||
# auth_ssl_username_from_cert=yes.
|
# auth_ssl_username_from_cert=yes.
|
||||||
#ssl_cert_username_field = commonName
|
#ssl_cert_username_field = commonName
|
||||||
|
|
||||||
# DH parameters length to use.
|
# SSL DH parameters
|
||||||
#ssl_dh_parameters_length = 1024
|
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
||||||
|
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
||||||
|
# gives on startup when ssl_dh is unset.
|
||||||
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
# SSL protocols to use
|
# SSL protocols to use
|
||||||
#ssl_protocols = !SSLv3
|
#ssl_protocols = !SSLv3
|
||||||
@@ -3903,6 +3911,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
@@ -2306,15 +2306,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -2333,35 +2336,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (yes) (never) (100)
|
# (yes) (yes) (yes) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - y - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - y - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - y - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - y - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - y - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - y - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - y - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -2515,8 +2520,9 @@ service stats {
|
|||||||
}
|
}
|
||||||
|
|
||||||
ssl = yes
|
ssl = yes
|
||||||
ssl_cert = </etc/dovecot/private/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
ssl_key = </etc/dovecot/private/dovecot.key
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
postmaster_address = postmaster@<SERVERNAME>
|
postmaster_address = postmaster@<SERVERNAME>
|
||||||
|
|
||||||
@@ -2539,6 +2545,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[service dovecot restart]]></command>
|
<command><![CDATA[service dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
@@ -2306,15 +2306,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -2333,35 +2336,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (yes) (never) (100)
|
# (yes) (yes) (yes) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - y - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - y - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - y - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - y - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - y - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - y - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - y - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -3453,8 +3458,8 @@ ssl = yes
|
|||||||
# dropping root privileges, so keep the key file unreadable by anyone but
|
# dropping root privileges, so keep the key file unreadable by anyone but
|
||||||
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
||||||
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
||||||
ssl_cert = </etc/dovecot/private/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
ssl_key = </etc/dovecot/private/dovecot.key
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
|
||||||
# If key file is password protected, give the password here. Alternatively
|
# If key file is password protected, give the password here. Alternatively
|
||||||
# give it when starting dovecot with -p parameter. Since this file is often
|
# give it when starting dovecot with -p parameter. Since this file is often
|
||||||
@@ -3495,7 +3500,7 @@ ssl_client_ca_dir = /etc/ssl/certs
|
|||||||
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
||||||
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
||||||
# gives on startup when ssl_dh is unset.
|
# gives on startup when ssl_dh is unset.
|
||||||
ssl_dh = </usr/share/dovecot/dh.pem
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
# Minimum SSL protocol version to use. Potentially recognized values are SSLv3,
|
# Minimum SSL protocol version to use. Potentially recognized values are SSLv3,
|
||||||
# TLSv1, TLSv1.1, and TLSv1.2, depending on the OpenSSL version used.
|
# TLSv1, TLSv1.1, and TLSv1.2, depending on the OpenSSL version used.
|
||||||
@@ -4110,6 +4115,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[service dovecot restart]]></command>
|
<command><![CDATA[service dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
@@ -2306,15 +2306,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -2333,35 +2336,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (yes) (never) (100)
|
# (yes) (yes) (yes) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - y - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - y - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - y - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - y - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - y - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - y - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - y - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - y - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - y 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - y - 0 cleanup
|
cleanup unix n - y - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -3453,8 +3458,8 @@ ssl = yes
|
|||||||
# dropping root privileges, so keep the key file unreadable by anyone but
|
# dropping root privileges, so keep the key file unreadable by anyone but
|
||||||
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
||||||
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
||||||
ssl_cert = </etc/dovecot/private/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
ssl_key = </etc/dovecot/private/dovecot.key
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
|
||||||
# If key file is password protected, give the password here. Alternatively
|
# If key file is password protected, give the password here. Alternatively
|
||||||
# give it when starting dovecot with -p parameter. Since this file is often
|
# give it when starting dovecot with -p parameter. Since this file is often
|
||||||
@@ -3491,7 +3496,7 @@ ssl_client_ca_dir = /etc/ssl/certs
|
|||||||
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
||||||
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
||||||
# gives on startup when ssl_dh is unset.
|
# gives on startup when ssl_dh is unset.
|
||||||
ssl_dh = </usr/share/dovecot/dh.pem
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
# Minimum SSL protocol version to use. Potentially recognized values are SSLv3,
|
# Minimum SSL protocol version to use. Potentially recognized values are SSLv3,
|
||||||
# TLSv1, TLSv1.1, and TLSv1.2, depending on the OpenSSL version used.
|
# TLSv1, TLSv1.1, and TLSv1.2, depending on the OpenSSL version used.
|
||||||
@@ -4105,6 +4110,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
@@ -1753,15 +1753,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -1780,36 +1783,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (no) (never) (100)
|
# (yes) (yes) (no) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - n - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - n - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - n - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - n - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - n - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - n - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_tls_auth_only=yes
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - n - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - n - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - n 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - n - 0 cleanup
|
cleanup unix n - n - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -2831,14 +2835,14 @@ service dict {
|
|||||||
##
|
##
|
||||||
|
|
||||||
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
||||||
ssl = no
|
ssl = yes
|
||||||
|
|
||||||
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
||||||
# dropping root privileges, so keep the key file unreadable by anyone but
|
# dropping root privileges, so keep the key file unreadable by anyone but
|
||||||
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
||||||
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
||||||
#ssl_cert = </etc/dovecot/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
#ssl_key = </etc/dovecot/private/dovecot.pem
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
|
||||||
# If key file is password protected, give the password here. Alternatively
|
# If key file is password protected, give the password here. Alternatively
|
||||||
# give it when starting dovecot with -p parameter. Since this file is often
|
# give it when starting dovecot with -p parameter. Since this file is often
|
||||||
@@ -2870,8 +2874,11 @@ ssl = no
|
|||||||
# auth_ssl_username_from_cert=yes.
|
# auth_ssl_username_from_cert=yes.
|
||||||
#ssl_cert_username_field = commonName
|
#ssl_cert_username_field = commonName
|
||||||
|
|
||||||
# DH parameters length to use.
|
# SSL DH parameters
|
||||||
#ssl_dh_parameters_length = 1024
|
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
||||||
|
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
||||||
|
# gives on startup when ssl_dh is unset.
|
||||||
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
# SSL protocols to use
|
# SSL protocols to use
|
||||||
#ssl_protocols = !SSLv3
|
#ssl_protocols = !SSLv3
|
||||||
@@ -3320,6 +3327,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[service dovecot restart]]></command>
|
<command><![CDATA[service dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
@@ -1648,17 +1648,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_use_tls = yes
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/server.pem
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_key_file = /etc/ssl/server/server.key
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_CAfile = /etc/ssl/cacert.class3.crt # Just an example for CACert.org
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_auth_only = no
|
smtpd_tls_received_header = yes
|
||||||
#smtpd_tls_loglevel = 1
|
smtp_use_tls = yes
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_use_tls = yes
|
||||||
#smtpd_tls_session_cache_timeout = 3600s
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
#tls_random_source = dev:/dev/urandom
|
#tls_random_source = dev:/dev/urandom
|
||||||
|
|
||||||
### Quota Settings with vda useflag
|
### Quota Settings with vda useflag
|
||||||
@@ -2002,10 +2003,10 @@ protocols = imap pop3 sieve
|
|||||||
### SSL Settings
|
### SSL Settings
|
||||||
### After you obtained an SSL-certificate enable ssl here and
|
### After you obtained an SSL-certificate enable ssl here and
|
||||||
### set disable_plaintext_auth to yes (see above)
|
### set disable_plaintext_auth to yes (see above)
|
||||||
ssl = no
|
ssl = yes
|
||||||
#ssl_cert = </etc/ssl/server/<SERVERNAME>.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
#ssl_key = </etc/ssl/server/<SERVERNAME>.key
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
passdb {
|
passdb {
|
||||||
args = /etc/dovecot/dovecot-sql.conf
|
args = /etc/dovecot/dovecot-sql.conf
|
||||||
driver = sql
|
driver = sql
|
||||||
@@ -2340,6 +2341,7 @@ plugin {
|
|||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[rc-update add dovecot default]]></command>
|
<command><![CDATA[rc-update add dovecot default]]></command>
|
||||||
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
<command><![CDATA[/etc/init.d/dovecot restart]]></command>
|
||||||
</daemon>
|
</daemon>
|
||||||
|
|||||||
@@ -1753,15 +1753,18 @@ virtual_mailbox_limit = 0
|
|||||||
### TLS settings
|
### TLS settings
|
||||||
###
|
###
|
||||||
## TLS for outgoing mails from the server to another server
|
## TLS for outgoing mails from the server to another server
|
||||||
#smtp_tls_security_level = may
|
smtp_tls_security_level = may
|
||||||
#smtp_tls_note_starttls_offer = yes
|
smtp_tls_note_starttls_offer = yes
|
||||||
## TLS for incoming connections (clients or other mail servers)
|
## TLS for incoming connections (clients or other mail servers)
|
||||||
#smtpd_tls_security_level = may
|
smtpd_tls_security_level = may
|
||||||
#smtpd_tls_cert_file = /etc/ssl/server/<SERVERNAME>.pem
|
smtpd_tls_cert_file = <SSL_CERT_FILE>
|
||||||
#smtpd_tls_key_file = $smtpd_tls_cert_file
|
smtpd_tls_key_file = <SSL_KEY_FILE>
|
||||||
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
#smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
|
||||||
#smtpd_tls_loglevel = 1
|
smtpd_tls_loglevel = 1
|
||||||
#smtpd_tls_received_header = yes
|
smtpd_tls_received_header = yes
|
||||||
|
smtp_use_tls = yes
|
||||||
|
smtpd_use_tls = yes
|
||||||
|
smtpd_tls_session_cache_timeout = 3600s
|
||||||
]]>
|
]]>
|
||||||
</content>
|
</content>
|
||||||
</file>
|
</file>
|
||||||
@@ -1780,36 +1783,37 @@ virtual_mailbox_limit = 0
|
|||||||
# service type private unpriv chroot wakeup maxproc command + args
|
# service type private unpriv chroot wakeup maxproc command + args
|
||||||
# (yes) (yes) (no) (never) (100)
|
# (yes) (yes) (no) (never) (100)
|
||||||
# ==========================================================================
|
# ==========================================================================
|
||||||
smtp inet n - n - - smtpd
|
#smtp inet n - y - - smtpd
|
||||||
#smtp inet n - n - 1 postscreen
|
smtp inet n - y - 1 postscreen
|
||||||
#smtpd pass - - n - - smtpd
|
smtpd pass - - y - - smtpd
|
||||||
#dnsblog unix - - n - 0 dnsblog
|
dnsblog unix - - y - 0 dnsblog
|
||||||
#tlsproxy unix - - n - 0 tlsproxy
|
tlsproxy unix - - y - 0 tlsproxy
|
||||||
#submission inet n - n - - smtpd
|
submission inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/submission
|
-o syslog_name=postfix/submission
|
||||||
# -o smtpd_tls_security_level=encrypt
|
-o smtpd_tls_security_level=encrypt
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_tls_auth_only=yes
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#smtps inet n - n - - smtpd
|
smtps inet n - y - - smtpd
|
||||||
# -o syslog_name=postfix/smtps
|
-o syslog_name=postfix/smtps
|
||||||
# -o smtpd_tls_wrappermode=yes
|
-o smtpd_tls_wrappermode=yes
|
||||||
# -o smtpd_sasl_auth_enable=yes
|
-o smtpd_sasl_auth_enable=yes
|
||||||
# -o smtpd_reject_unlisted_recipient=no
|
-o smtpd_reject_unlisted_recipient=no
|
||||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||||
# -o smtpd_recipient_restrictions=
|
# -o smtpd_recipient_restrictions=
|
||||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
-o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||||
# -o milter_macro_daemon_name=ORIGINATING
|
-o milter_macro_daemon_name=ORIGINATING
|
||||||
#628 inet n - n - - qmqpd
|
#628 inet n - y - - qmqpd
|
||||||
pickup unix n - n 60 1 pickup
|
pickup unix n - y 60 1 pickup
|
||||||
|
-o content_filter=
|
||||||
|
-o receive_override_options=no_header_body_checks
|
||||||
cleanup unix n - n - 0 cleanup
|
cleanup unix n - n - 0 cleanup
|
||||||
qmgr unix n - n 300 1 qmgr
|
qmgr unix n - n 300 1 qmgr
|
||||||
#qmgr unix n - n 300 1 oqmgr
|
#qmgr unix n - n 300 1 oqmgr
|
||||||
@@ -2831,14 +2835,14 @@ service dict {
|
|||||||
##
|
##
|
||||||
|
|
||||||
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
# SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
|
||||||
ssl = no
|
ssl = yes
|
||||||
|
|
||||||
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
|
||||||
# dropping root privileges, so keep the key file unreadable by anyone but
|
# dropping root privileges, so keep the key file unreadable by anyone but
|
||||||
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
# root. Included doc/mkcert.sh can be used to easily generate self-signed
|
||||||
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
# certificate, just make sure to update the domains in dovecot-openssl.cnf
|
||||||
#ssl_cert = </etc/dovecot/dovecot.pem
|
ssl_cert = <<SSL_CERT_FILE>
|
||||||
#ssl_key = </etc/dovecot/private/dovecot.pem
|
ssl_key = <<SSL_KEY_FILE>
|
||||||
|
|
||||||
# If key file is password protected, give the password here. Alternatively
|
# If key file is password protected, give the password here. Alternatively
|
||||||
# give it when starting dovecot with -p parameter. Since this file is often
|
# give it when starting dovecot with -p parameter. Since this file is often
|
||||||
@@ -2870,8 +2874,12 @@ ssl = no
|
|||||||
# auth_ssl_username_from_cert=yes.
|
# auth_ssl_username_from_cert=yes.
|
||||||
#ssl_cert_username_field = commonName
|
#ssl_cert_username_field = commonName
|
||||||
|
|
||||||
# DH parameters length to use.
|
# SSL DH parameters
|
||||||
#ssl_dh_parameters_length = 1024
|
# Generate new params with `openssl dhparam -out /etc/dovecot/dh.pem 4096`
|
||||||
|
# Or migrate from old ssl-parameters.dat file with the command dovecot
|
||||||
|
# gives on startup when ssl_dh is unset.
|
||||||
|
ssl_dh = </etc/dovecot/dh.pem
|
||||||
|
|
||||||
|
|
||||||
# SSL protocols to use
|
# SSL protocols to use
|
||||||
#ssl_protocols = !SSLv3
|
#ssl_protocols = !SSLv3
|
||||||
@@ -3320,6 +3328,7 @@ plugin {
|
|||||||
</file>
|
</file>
|
||||||
</files>
|
</files>
|
||||||
<commands index="1">
|
<commands index="1">
|
||||||
|
<command><![CDATA[openssl dhparam -out /etc/dovecot/dh.pem 4096]]></command>
|
||||||
<command><![CDATA[service dovecot restart]]></command>
|
<command><![CDATA[service dovecot restart]]></command>
|
||||||
</commands>
|
</commands>
|
||||||
</general>
|
</general>
|
||||||
|
|||||||
Reference in New Issue
Block a user