Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- relayhost @linux:email:postfix
- {{:suse.png}} ==== Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings ==== smtp**d** (smtp + daemon) = server = **Postfix receives mail** from a client \\ smtp = client = **Postfix sends mail** to another mailserver \\ ** used P... mavisd-new 10025/tcp: policyd-weight \\ **/etc/postfix/main.cf:** alias_maps = hash:/etc/aliases bif
- monitoring @linux:email:monitoring
- very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly g... not specified, mailgraph will monitor logfile for Postfix log entries in logfile (/var/log/syslog unless ... vides: mailgraph # Required-Start: $postfix # Required-Stop: # Default-Start: 3 5 #... cs for $host</h1>\n"; - print "<a href=\"postfix-statistics.cgi\">back to postfix-statistics.cgi</
- email @linux:email
- ssin, dSpam, rspamd], SPF, DKIM, PFS etc. \\}} {{:postfix.png?80|}} ===== Postfix smtpd ===== Postfix ist ein sehr mächtiger Mail Transport Agent, entwickelt von Wietse Venema.\\ * [[linux:email:postfix:config|Postfix Konfiguration für einen Mailserver
- postgrey @linux:email:greylisting
- \\ \\ There are several greylisting daemons for Postfix available. I stick to David Schweikert's [[http:/... ng daemon ==== **perldoc postgrey:** postgrey - Postfix Greylisting Policy Server SYNOPSIS <pos... put db files in PATH (default: /var/spool/postfix/postgrey) --delay=N greylist for... --greylist-action=A if greylisted, return A to Postfix (default: DEFER_IF_PERMIT) --greylist-text
- config @linux:email:postfix
- {{:postfix-logo.png}} ===== Postfix ===== smtp**d** (smtp + daemon) = server = **Postfix receives mail** from a client \\ smtp = client = **Postfix sends mail** to another mailserver \\ === Edit
- pfs @linux:email:postfix
- === Postfix Perfect Forwarding Secrecy (PFS) === <code console> openssl gendh -out /etc/postfix/dh_512.pem -2 512 openssl gendh -out /etc/postfix/dh_1024.pem -2 1024 postconf -e "smtpd_tls_dh1024_param_file = /etc/postfix/dh_1024.pem" postconf -e "smtpd_tls_dh512_param_f
- postfix_secure @linux:email:postfix
- {{:suse.png}} === Postfix with TLS and SSL (smtps) === Use a portscanner like "nmap": station7:/etc/init.... \\ === TLS === Modify the TLS-settings in /etc/postfix/main.cf #--- SSL/TLS setting ---# smtpd_clien... th_destination, check_sender_access hash:/etc/postfix/access, check_recipient_access hash:/etc/postfix/access, permit smtp_sasl_auth_enable = yes sm
- sign @linux:email:amavisd:dkim
- es Keys: <code console> # amavisd-new genrsa /etc/postfix/dkim/2014082601_haas-online.org_key.pem 1024 Private RSA key successfully written to file "/etc/postfix/dkim/2014082601_haas-online.org_key.pem" (1024 bi... -online.org ; key#1, domain haas-online.org, /etc/postfix/dkim/2014082601_haas-online.org_key.pem 201408260... d dkim_key('haas-online.org', '2014082601', '/etc/postfix/dkim/2014082601_haas-online.org_key.pem'); dkim_k
- commserv @linux
- config|SASL configuraton]] * [[commserv:email:postfix:config|Postfix configuration (SMTP)]] * [[commserv:email:postfix:ldap|use of LDAP lookup maps]] * [[commserv:email:postfix:smtp-authentication|SMTP-authentication]] *
- smtp-authentication @linux:email:postfix
- tication === SASL must be configured! \\ in /etc/postfix/main.cf: smtpd_sasl_auth_enable = yes smtpd_s... for a telnet session at port 25: station7:/etc/postfix # telnet localhost 25 Trying 127.0.0.1... Con... aracter is '^]'. 220 station7.example.com ESMTP Postfix ehlo station7.example.com 250-station7.exampl... tication === SASL must be configured! \\ in /etc/postfix/main.cf: smtp_sasl_auth_enable = yes Attention
- amavisd @linux:email:amavisd
- ogether # when enabling addr extensions do also Postfix/main.cf: recipient_delimiter=+ $path = '/usr... return@lists.sophos.com' => -3.0, 'owner-postfix-users@postfix.org' => -3.0, 'owner-postfix-announce@postfix.org' => -3.0, 'owner-sendmail-annou
- pflogsum @linux:email:monitoring
- {{:debian-2.png}} === Postfix-Reporting mit Pflogsum === <code> apt-get install pflogsum </code> /usr/local/bin/postfix_report.sh <code> #!/bin/bash /usr/sbin/pflogsum... > /tmp/pflogsumm /usr/bin/mailx -s "Automatischer Postfix-Report von $(hostname)" -r postfix-admin@station7.example.de postfix-admin@station7.example.de < /tmp/pflo
- ca @linux:commserv:ca
- **S**ecurity (TLS) with OpenLDAP, Cyrus imapd and Postfix smtpd. But I failed ;-) \\ The certs and keys in... ldap # OPENLDAP_GROUP="ldap" \\ With Cyrus, Postfix and Apache2 I got similar issues ... Because for ... "ldap.ldap", for **Cyrus** by "cyrus.mail", for **Postfix** by "postfix.postfix" and for **Apache** by "wwwrun.www". \\ \\ So I created a new user-group "SSL-user
- config @linux:email:cyrus
- same as in the mailbox_transport-setting of /etc/postfix/main.cf ! lmtpunix cmd="lmtpd" listen="/var/spool/postfix/public/lmtp" prefork=1 } EVENTS { chec... IN LOGIN # 17.01.2007, chhaas: Fehlermeldung an Postfix, wenn Mailbox voll lmtp_overquota_perm_failure:... same as in the mailbox_transport-setting of /etc/postfix/main.cf ! lmtpsocket: /var/spool/postfix/public
- ldap @linux:email:postfix
- ==== using LDAP ==== **/etc/postfix/ldap-aliases.cf:** server_host= ldaps://localhost:636 server_port=... 36 start_tls = no tls_ca_cert_file = /etc/ssl/postfix/certs/ca_cert.pem tls_ca_cert_dir = /etc/ssl/postfix/certs/ tls_cert = /etc/ssl/postfix/certs/station7_cert.pem tls_key = /etc/ssl/postfix/private/station7