Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- operation @linux:email:amavisd
- ntine for files older than 31 days: #10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -exec rm {} \; #15 1 * * * root find /var/lib/amavis/tmp/ -mtime +31 -exec rm -r {} \; # oder: # 15 1 * * * root find /var/lib/amavis/ -iname "amavis-*" -mtime +31 -exec rm -r {} \; # oder: 10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -pri
- cyrus_secure @linux:email:cyrus
- \\ Test MECH=LOGIN: \\ station7:/ # imtest -a root -u root -m LOGIN station7.example.com -s verify error:num=20:unable to get local issuer certificate ... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us... \\ Test MECH=PLAIN: \\ station7:/ # imtest -a root -u root -m PLAIN station7.example.com -s verify
- config @linux:email:cyrus
- ue \\ ==== Testing ==== station7:/ # imtest -a root -u root -m LOGIN station7.example.com S: * OK station7 Cyrus IMAP4 v2.2.12 server ready C: C01 CAPA... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us
- monitoring @linux:email:monitoring
- o crontab: ### Postfix-Monitoring: * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/active/ > /srv/www/cgi-bin/active * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/deferred/ > /srv/www/cgi-bin/deferred * * * * * root /usr/local/bin/logtail.pl -f /var/log/mail | egre
- sasl @linux:email:postfix
- ault smtp_sasl_password_maps must be read-only to root, since these maps contain the usernames and passwords to authenticate. If you run saslfinger as root access will be no problem, but saslfinger will fa... telnet test, but don't want to run saslfinger as root change permissions of smtp_sasl_password_maps so
- amavisd @linux:email:amavisd
- MYHOME/var"; # prefer $MYHOME clean and owned by root? # $pid_file = "$MYHOME/var/amavisd.pid"; # ... e '-f=/var/amavis' is needed if not running it as root, so it # can find, read, and write its pid
- config @linux:email:postfix
- ct \\ === Testing === station7:/ # smtptest -u root -a root station7.example.com S: 220 station7.example.com ESMTP Example Inc. Mailserver C: EHLO exam
- postfix_secure @linux:email:postfix
- smtps is running at port 465** \\ smtptest -u root -a root station7.example.com -s verify error:num=20:unable to get local issuer certificate verify e
- ssh-smtp-tunnel @linux:email:postfix
- # 25, or if you need to start the tunnel as a non-root user, as ## OpenSSH only allows root users to start tunnels to low-numbered ## "privileged ports." If t
- pflogsum @linux:email:monitoring
- e> /etc/cron.d/postfix_report <code> 55 6 * * * root /usr/local/bin/postfix-report.sh </code> \\ \\ <
- relayhost @linux:email:postfix
- aas.$mydomain $mydomain masquerade_exceptions = root message_size_limit = 30000000 mydestination =