Quantcast
Channel: iRedMail — iRedMail Support
Viewing all 12092 articles
Browse latest View live

Fitness For 50 And Beyond Testcore Pro

$
0
0

We can care hindermost on careers, friends, and origin that we are supercilious of, but what do we poorness to do with our mid years?

How can we eliminate the most of our lives?
Testcore Pro
Perhaps the most unnoticed prospect of our after age, as considerably as the one that may love the preeminent outcome on our gross well-being, is our eudaemonia and shape.

How, then, can we unexceeded ensure our eudaimonia and condition into our mid and afterward geezerhood?

Use can better fall fallen the start of the symptoms of aging.

The eudaemonia benefits of a great take system are numerous.
Testcore Pro
Lesson helps defend hooligan capability and common flexibility.

In addition, the stress put on our castanets finished practice provide confirm their magnitude and state.
http://testcorepromuscleuk.com/


Incomming mail transfered via alia get rejected

$
0
0

==== Required information ====
- iRedMail version: 0.8.7 (Pro 1.8.2)
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: Debian Wheezy
- Related log if you're reporting an issue:
====

One of our users have a @qsl.net alias that forwards mail to firstname.lastname@mydomain_a.com.

We have tested when sending from a e-mail address on an other domain towards the alias (and the alias should then forward that mail to firstname.lastname@mydomain_a.com).

We do see what the error message say, but why do the sender get this? Is it any secure way to solve this on our side? Or should it be fixed on the other end?

Error message:

------- Forwarded message -------
From: "Mail Delivery System" <MAILER-DAEMON@mailman.qth.net>
To: firstname.lastname@mydomain_a.com
Cc:
Subject: Undelivered Mail Returned to Sender
Date:

This is the mail system at host mailman.qth.net.

I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can delete your own text from the attached returned message.

                     The mail system

<firstname.lastname@mydomain_a.com> (expanded from <user_alias@qsl.net>): host
      hostname.myserver.com[MY.IP.AD.DDR] said: 553 5.7.1
<firstname.lastname@mydomain_a.com>:
      Sender address rejected: not logged in (in reply to RCPT TO command)

Banned Contents Alert .xlsx and .docx

$
0
0

======== Required information ====
- IRedMail Pro version: v1.8.2
- Store email accounts in Which backend (LDAP / MySQL / PGSQL): MySQL
- Linux / BSD distribution name and version: CentOS 6.5 x86_64 on Centos v6.5
====

I'm having problem sending email with attachments in. Xlsx,. Docx or even a file. Compressed zip MacOS

The error messages I get are:

BANNED CONTENTS ALERT

Our content checker found
banned name: docProps

and

BANNED CONTENTS ALERT

Our content checker found
banned name: __ MACOSX

Delivery of the email was stopped!

The message has been blocked because it contains a component
(as a MIME part or nested Within) with declared name
or MIME type or contents type violating our access policy.

To transfer contents que May Be Considered risky or unwanted
by site policies, or simply too large for mailing, please consider
publishing your content on the web, and only sending an URL of the
document to the recipient.

Depending on the recipient and sender site policies, with a little
effort it might still be possible to send any contents (including
viruses) using one of the methods Following:

- Encrypted using pgp, gpg or other encryption methods;

- Wrapped in a password-protected or scrambled container or archive
(eg: zip-e, arj-g, arc g, rar-p, or other methods)

Note que if the contents is not Intended to be secret, the
encryption key or password may be included in the same message
for recipient's convenience.

We are sorry for inconvenience if the contents was not malicious.

The purpose of these restrictions is to cut the most common propagation
methods used by viruses and other malware. Often these automatic exploit
mechanisms and security holes in more popular mail readers (Microsoft
mail readers and browsers are a common target). By Requiring an explicit
and decisive action from the recipient to decode mail, the danger of
automatic malware propagation is largely reduced.

The amavisd.conf configuration is as follows:

use strict; 

# A minimalistic configuration file for amavisd-new with all Necessary settings 
# 
# See amavisd.conf-default for a list of all variables with Their defaults; 
# For more details see documentation in INSTALL, README_FILES / * 
# And at [url]http://www.ijs.si/software/amavisd/amavisd-new-docs.html[/url] 


# Commonly ADJUSTED SETTINGS: 

# @ = Bypass_virus_checks_maps (1); # Controls running of anti-virus code 
# @ = Bypass_spam_checks_maps (1); # Controls running of anti-spam code 
Bypass_decode_parts # $ = 1; # Controls running of decoders & dearchivers 

$ max_servers = 2; # Num of pre-forked children (2 .. 30 is common),-m 
$ daemon_user = 'amavis'; # (The default; customary: vscan or amavis),-u 
$ daemon_group = 'amavis'; # (The default; customary: vscan or amavis),-g 

$ mydomain = "domain"; # = "Example.com"; # A convenient default for other settings 

$ MYHOME = '/ var / spool / amavisd'; # A convenient default for other settings,-H 
$ TEMPBASE = "$ MYHOME / tmp"; # Working directory, needs to exist,-T 
$ ENV {TMPDIR} = $ TEMPBASE; # Environment variable TMPDIR, used by SA, etc.. 
$ QUARANTINEDIR = "/ var / spool / amavisd / quarantine"; 
Quarantine_subdir_levels # $ = 1; # Add level of subdirs to disperse quarantine 
# $ Release_format = 'resend'; # 'Attach', 'plain', 'resend' 
# $ Report_format = 'arf'; # 'Attach', 'plain', 'resend', 'arf' 

# $ $ = Daemon_chroot_dir MYHOME; # Chroot directory or undef,-R 

$ db_home = "$ MYHOME / db"; # Dir for bdb nanny / cache / snmp databases,-D 
# $ Helpers_home = "$ MYHOME / var"; # Working directory for SpamAssassin,-S 
$ lock_file = "/ var / run / amavisd / amavisd.lock"; # L-
$ pid_file = "/ var / run / amavisd / amavisd.pid"; # P-
# NOTE: $ MYHOME create directories / tmp, $ MYHOME / var, $ MYHOME / db manually 

$ log_level = 0; # Verbosity 0 .. 5-d 
$ log_recip_templ = undef; # Disable by-recipient level-0 log entries 
do_syslog = $ 1; # Logging via syslogd (preferred) 
$ syslog_facility = 'mail'; # Syslog facility as a string 
            # Eg: mail, daemon, user, local0, ... local7 

enable_db = $ 1; # Enable use of BerkeleyDB / libdb (SNMP and nanny) 
Enable_zmq # $ = 1; # Enable use of ZeroMQ (SNMP and nanny) 
$ nanny_details_level = 2; # Nanny verbosity: 1: traditional, 2: detailed 
enable_dkim_verification = $ 1; # Enable DKIM signatures verification 
enable_dkim_signing = $ 1; # Load DKIM signing code, keys defined by dkim_key 

@ local_domains_maps = 1; 

@ mynetworks = qw (127.0.0.0 / 8 [:: 1] [FE80 ::] / 10 [FEC0 ::] / 10 
                   10.0.0.0 / 8 172.16.0.0/12 192.168.0.0/16); 

$ unix_socketname = "$ MYHOME / amavisd.sock"; # Amavis-milter amavisd-release or 
                # Option (s)-p overrides $ inet_socket_port and $ unix_socketname 

$ inet_socket_port = [10024, 9998]; 
# $ Inet_socket_port = [10024, 9998]; 

policy_bank $ {'MYNETS'} = {# mail Originating from @ mynetworks 
   Originating => 1, # is true in MYNETS by default, but let's make it explicit 
   os_fingerprint_method => undef, # do not query p0f for internal clients 
   allow_disclaimers => 1, # Enables disclaimer insertion if available 
}; 

# It is up to MTA to re-route mail from authenticated roaming users or 
# From internal hosts to a dedicated TCP port (such as 10026) for filtering 
interface_policy $ {'10026 '} =' ORIGINATING '; 

policy_bank $ {'ORIGINATING'} = {# mail supposedly Originating from our users 
   Originating => 1, # declare that mail was submitted by our smtp client 
   allow_disclaimers => 1, # Enables disclaimer insertion if available 
   # Notify administrator of locally Originating malware 
   virus_admin_maps => ["root \ @ $ mydomain"], 
   spam_admin_maps => ["root \ @ $ mydomain"], 
   warnbadhsender => 1 
   # Forward to a smtpd service providing DKIM signing service 
   forward_method => 'smtp: [127.0.0.1]: 10027', 
   # Force MTA conversion to 7-bit (eg before DKIM signing) 
   smtpd_discard_ehlo_keywords => [BITMIME '8 '] 
   bypass_banned_checks_maps => [1], # allow sending any file names and types 
   terminate_dsn_on_notify_success => 0, # do not remove NOTIFY = SUCCESS option 
}; 

interface_policy $ {'SOCK'} = 'AM.PDP-SOCK'; # Applies only with $ unix_socketname 

# Use with amavis-release over a socket or with Petr REHOR's amavis-milter.c 
# (With amavis-milter.c from this package or old amavis.c client use 'AM.CL'): 
policy_bank $ {'AM.PDP-SOCK'} = {
   protocol => 'AM.PDP' 
   auth_required_release => 0, # not require the secret_id for amavisd-release 
}; 

$ sa_tag_level_deflt = 2.0; # Add spam info headers if at, or above level que 
$ sa_tag2_level_deflt = 6.2; # Add 'spam detected' headers at level que 
$ sa_kill_level_deflt = 6.9; # Triggers spam evasive actions (eg blocks mail) 
sa_dsn_cutoff_level = $ 10; # Spam level beyond Which the DSN is not sent 
sa_crediblefrom_dsn_cutoff_level = $ 18; # Likewise, but for a valid Likely From 
# $ Sa_quarantine_cutoff_level = 25; # Spam level beyond Which quarantine is off 
penpals_bonus_score $ = 8; # (No effect without a @ storage_sql_dsn database) 
$ $ = penpals_threshold_high sa_kill_level_deflt; # Do not waste time on hi spam 
bounce_killer_score $ = 100; # Spam score points to add for joe-jobbed bounces 

$ sa_mail_body_size_limit = 400 * 1024; # Do not waste time on SA if mail is larger 
$ sa_local_tests_only = 0; # Only tests Which do not require internet access? 

# @ Lookup_sql_dsn = 
# (['DBI: mysql: database = mail, host = 127.0.0.1, port = 3306', 'user1', 'passwd1'] 
# ['DBI: mysql: database = mail; host = host2', 'username2', 'password2'] 
# ['DBI: SQLite: dbname = $ MYHOME / sql / mail_prefs.sqlite','','']); 
# @ @ = Storage_sql_dsn lookup_sql_dsn; # None, same, or separate database 
# @ Storage_redis_dsn = ({server => '127 .0.0.1:6379 'db_id => 1}); 
# $ Redis_logging_key = 'amavis-log'; 
# $ Redis_logging_queue_size_limit = 300000; # About 250 MB / 100000 

Timestamp_fmt_mysql # $ = 1; # If using MySQL * and * msgs.time_iso is TIMESTAMP;
# Defaults to 0, Which is good for non-MySQL or if msgs.time_iso is CHAR (16) 

$ virus_admin = undef; # Notifications recip. 

$ mailfrom_notify_admin = undef; # Notifications sender 
$ mailfrom_notify_recip = undef; # Notifications sender 
$ mailfrom_notify_spamadmin = undef; # Notifications sender 
$ mailfrom_to_quarantine =''; # Null return path; uses original sender if undef 

@ addr_extension_virus_maps = ('virus'); 
@ addr_extension_banned_maps = ('banned'); 
@ addr_extension_spam_maps = ('spam'); 
@ addr_extension_bad_header_maps = ('Badh'); 
# $ Recipient_delimiter = '+'; # Undef disables address extensions altogether 
# When enabling addr extensions DO ALSO postfix / main.cf: recipient_delimiter = + 

$ path = '/ usr / local / sbin :/ usr / local / bin :/ usr / sbin :/ sbin :/ usr / bin :/ bin'; 
# $ Dspam = 'dspam'; 

MAXLEVELS = $ 14; 
MAXFILES = $ 3000; 
$ MIN_EXPANSION_QUOTA = 100 * 1024; # Bytes (default undef, not enforced) 
$ MAX_EXPANSION_QUOTA = 500 * 1024 * 1024; # Bytes (default undef, not enforced) 

$ sa_spam_subject_tag = '*** SPAM ***'; 
defang_virus = $ 1; # MIME-wrap passed mail infected 
$ defang_banned = 0; # MIME-wrap passed mail containing banned name 
# Defanging for bad headers only turn on Certain minor contents categories: 
defang_by_ccat CC_BADH $ {"3".} = 1; # NUL or CR character in header 
defang_by_ccat CC_BADH $ {"5".} = 1; # Header line longer than 998 characters 
defang_by_ccat CC_BADH {$ "6".} = 1; # Header field syntax error 


# OTHER MORE COMMON SETTINGS (defaults may suffice): 

# $ Myhostname = 'host.example.com'; # Must be a fully-qualified domain name! 

# $ Notify_method = 'smtp: [127.0.0.1]: 10025'; 
# $ Forward_method = 'smtp: [127.0.0.1]: 10025'; # Set to undef with milter! 

# $ final_virus_destiny = D_DISCARD; 
# $ = final_banned_destiny D_BOUNCE; 
# $ final_spam_destiny = D_DISCARD; #! D_DISCARD / D_REJECT 
# $ = final_bad_header_destiny D_BOUNCE; 
# $ Bad_header_quarantine_method = undef; 

Os_fingerprint_method # $ = 'p0f: *: 2345'; # To query p0f-analyzer.pl 

# # Hierarchy by Which the final setting is chosen: 
# # Policy bank (based on port or IP address) -> * _by_ccat 
# # * _by_ccat (Based on mail contents) -> * _maps 
# # * _maps (Based on recipient address) -> end configuration value 


# SOME OTHER VARIABLES WORTH CONSIDERING (see amavisd.conf-default for all) 

# $ Warnbadhsender, 
# $ Warnvirusrecip, warnbannedrecip $, $ warnbadhrecip, (or @ warn * recip_maps) 
# 
Bypass_virus_checks_maps # @, @ bypass_spam_checks_maps, 
Bypass_banned_checks_maps # @, @ bypass_header_checks_maps, 
# 
Virus_lovers_maps # @, @ spam_lovers_maps, 
Banned_files_lovers_maps # @, @ bad_header_lovers_maps, 
# 
Blacklist_sender_maps # @, @ score_sender_maps, 
# 
# $ Clean_quarantine_method, virus_quarantine_to $, $ banned_quarantine_to, 
Bad_header_quarantine_to # $, $ spam_quarantine_to, 
# 
# $ Defang_bad_header, defang_undecipherable $, $ defang_spam 


# REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS 

@ keep_decoded_original_maps = (new_RE (
   qr '^ MAIL $', # let virus scanner see full original message 
   qr '^ MAIL-undecipherable $', # same as ^ MAIL $ if mail is undecipherable 
   qr '^ (ASCII (cpio) |! text | uuencoded | xxencoded | binhex)' i, 
# Qr '^ Zip archive data', # do not trust Archive :: Zip 
)); 


$ banned_filename_re new_RE = (

# # # BLOCKED ANYWHERE 
# Qr '^ undecipherable $', # is or contains any undecipherable components 
qr '^ \ (ms-exe | dll). $', # banned file (1) types, rudimentary 

qr '^ \ (exe | zip | lha | tnef). $' i, 

qr'.\.(exe|vbs|pif|scr|cpl|dll|ade|adp|app|asp|bas|bat|cer|chm|cmd|com|cpl|crt|csh|der|exe|fxp|gadget|hlp|hta|inf|ins|isp|its|js|jse|ksh|lnk|mad|maf|mag|mam|maq|mar|mas|mat|mau|mav|maw|mda|mdb|mde|mdt|mdw|mdz|mp3|msc|msh|msh1|msh2|mshxml|msh1xml|msh2xml|msi|msp|mst|ops|pcd|pif|plg|prf|prg|pst|reg|scf|scr|sct|shb|shs|ps1|ps1xml|ps2|ps2xml|psc1|psc2|tmp|url|vb|vbe|vbs|vsmacros|vsw|ws|wsc|wsf|wsh|xnk)$'i,


# Qr '^ \ (exe | lha | cab | dll). $', # Banned file (1) types 

# # # BLOCK THE FOLLOWING, EXCEPT WITHIN UNIX ARCHIVES: 
# [Qr '^ \ (gz | bz2). $' => 0], # allow any in gzip or bzip2 
   [Qr '^ \ (rpm | cpio | tar). $' => 0], # allow any in Unix-type archives 

   qr | i, # banned extensions - rudimentary '\ (pif scr) $..' 
# Qr '^ \. $ Zip', # zip block type 

# # # BLOCK THE FOLLOWING, EXCEPT WITHIN ARCHIVES: 
# [Qr '^ \. (Zip | rar | arc | arj | zoo) $' => 0], # allow any Within these archives 

   qr '^ application / x-msdownload $' i, # block these MIME types 
   qr '^ application / x-msdos-program $' i, 
   qr '^ application / hta $' i, 

# Qr '^ message / partial $' i, # RFC2046 MIME type 
# Qr '^ message / external-body $' i, # RFC2046 MIME type 

# Qr '^ (application / x-msmetafile | image / x-wmf) $' i, # Windows Metafile MIME type 
# Qr '^ \. Wmf $', # Windows Metafile file (1) type 

   # Block Certain double extensions in filenames 
   qr '^ (cid :) * \ [^ /.] * [A-Za-z] [^ /.] * \ \ s * (exe |!... vbs | pif | scr | bat | cmd | com | cpl | [. \ s] dll) * $ 'i, 

# Qr '\ {[0-9a-f] {8} (- [0-9a-f] {4})} {3 - [0-9a-f] {12} \}?' I, # Class CLSID ID, strict 
# Qr '\ {[0-9a-z] {4} (- [0-9a-z] {4}) {0,7} \}?' I, # Class ID CLSID extension, loose 

# qr '\ (exe | vbs | pif | scr | cpl).. $' i, # banned extension - basic 
# qr '\ (exe | vbs | pif | scr | cpl).. $' i, # banned extension - basic 
Qr # i, # banned extension - basic cmd + '\ (exe | vbs | pif | scr | cpl | bat | | with cmd) $..' 
qr '\ (ade |.. adp | app | bas | bat | chm | cmd | com | cpl | crt | emf | exe | fxp | grp | hlp | hta | 
         inf | ini | ins | isp | js | jse | lib | lnk | mda | mdb | mde | mdt | mdw | mdz | msc | msi | 
         msp | mst | OCX | ops | pcd | pif | prg | reg | scr | sct | shb | shs | sys | vb | vbe | vbs | vxd | 
         wmf | wsc | wsf | wsh) $ 'ix, # banned extensions - long 
# Qr '\ (asd | asf | asx | url | vcs | wmd | wmz).. $' I, # Also consider 
# Qr '\ (ani | cur | ico).. $' I, # banned cursors and icons filename 
# Qr '^ \. Ani $', # banned animated cursor file (1) type 
Qr # i, # banned extension - WinZip vulnerab '\ (i | b64 | bhx | hqx | XXe | | uu uue) $..'. 
); 
# See [url]http://support.microsoft.com/default.aspx?scid=kb;[/url] EN-US; q262631 
# And [url]http://www.cknow.com/vtutor/vtextensions.htm[/url] 


# ENVELOPE SENDER SOFT-whitelisting / blacklisting SOFT-

@ score_sender_maps = ({# a by-recipient hash lookup table, 
                         # Results from all matching recipient tables are summed 

# # # Per-recipient personal tables (NOTE: positive: black, negative: white) 
# 'User1@example.com' => [{'bla-mobile.press @ example.com' => 10.0}] 
# 'User3@example.com' => [{'. Ebay.com' => -3.0}] 
# 'User4@example.com' => [{'cleargreen@cleargreen.com' => -7.0, 
# '. Cleargreen.com' => -5.0}] 

   # # Site-wide opinions about senders (the '.' Any recipient matches) 
   '.' => [# The _first_ matching sender determines the score boost 

    new_RE (# regexp-type lookup table, just happens to be all soft-blacklist 
     [qr '^ (bulkmail | offers | cheapbenefits | earnmoney | foryou) @' i => 5.0], 
     [qr '^ (greatcasino | investments | lose_weight_today. | market \ alert) @' i => 5.0], 
     [qr '^ (money2you | MyGreenCard. | new \ tld \ registry. | opt-out | opt-in) @' i => 5.0], 
     [qr '^ (optin | saveonlsmoking2002k | Specialoffer | Promotional Items) @' i => 5.0], 
     [qr '^ (stockalert | stopsnoring | wantsome | workathome | yesitsfree) @' i => 5.0], 
     [qr '^ (your_friend | greatoffers) @' i => 5.0], 
     [qr '^ (inkjetplanet | marketopt | makemoney) \ d * @' i => 5.0], 
    ) 

# Read_hash ("/ var / amavis / sender_scores_sitewide") 

    {# A hash-type lookup table (associative array) 
      'nobody@cert.org' => -3.0, 
      'cert-advisory@us-cert.gov' => -3.0, 
      'owner-alert@iss.net' => -3.0, 
      'slashdot@slashdot.org' => -3.0, 
      'securityfocus.com' => -3.0, 
      'ntbugtraq@listserv.ntbugtraq.com' => -3.0, 
      'security-alerts@linuxsecurity.com' => -3.0, 
      'mailman-announce-admin@python.org' => -3.0, 
      'amavis-user-admin@lists.sourceforge.net' => -3.0, 
      'amavis-user-bounces@lists.sourceforge.net' => -3.0, 
      'spamassassin.apache.org' => -3.0, 
      'notification-return@lists.sophos.com' => -3.0, 
      'owner-postfix-users@postfix.org' => -3.0, 
      'owner-postfix-announce@postfix.org' => -3.0, 
      'owner-sendmail-announce@lists.sendmail.org' => -3.0, 
      'sendmail-announce-request@lists.sendmail.org' => -3.0, 
      'donotreply@sendmail.org' => -3.0, 
      'envelope@sendmail.org + ca' => -3.0, 
      'noreply@freshmeat.net' => -3.0, 
      'owner-technews@postel.acm.org' => -3.0, 
      'ietf-123-owner@loki.ietf.org' => -3.0, 
      'cvs-commits-list-admin@gnome.org' => -3.0, 
      'rt-users-admin@lists.fsck.com' => -3.0, 
      'clp-request@comp.nus.edu.sg' => -3.0, 
      'surveys-errors@lists.nua.ie' => -3.0, 
      'emailnews@genomeweb.com' => -5.0, 
      'yahoo-dev-null@yahoo-inc.com' => -3.0, 
      'returns.groups.yahoo.com' => -3.0, 
      'clusternews@linuxnetworx.com' => -3.0, 
      lc ('lvs-users-admin@LinuxVirtualServer.org') => -3.0, 
      lc ('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0, 

      # Soft-blacklisting (positive score) 
      'sender@example.net' => 3.0, 
      '. example.net' => 1.0, 

    } 
   ] Tables, # end of site-wide 
}); 


@ decoders = (
   ['mail', \ & do_mime_decode] 
# [[Qw (asc uue ync hqx)], \ & do_ascii], # not safe 
   ['F', \ & do_uncompress, ['unfreeze', 'freeze-d', 'melt', 'FCAT']], 
   ['Z', \ & do_uncompress, ['uncompress', 'gzip-d', 'zcat']], 
   ['gz', \ & do_uncompress, 'gzip-d'], 
   ['gz', \ & do_gunzip] 
   ['bz2', \ & do_uncompress, 'bzip2-d'], 
   ['xz', \ & do_uncompress, 
            ['xzdec', 'xz-dc', 'unxz-c', 'xzcat']], 
   ['lzma', \ & do_uncompress, 
            ['lzmadec', 'xz-dc - format = lzma' 
             'lzma-dc', 'unlzma-c', 'lzcat', 'lzmadec']], 
   ['lrz', \ & do_uncompress, 
            ['lrzip-q-k-d-o -', 'lrzcat-q-k]], 
   ['lzo', \ & do_uncompress, 'lzop-d'], 
   ['rpm', \ & do_uncompress, ['rpm2cpio.pl', 'rpm2cpio']], 
   [['cpio', 'tar'], \ & do_pax_cpio, ['sleeps', 'gcpio', 'cpio']], 
            # ['/ Usr/local/heirloom/usr/5bin/pax', 'sleeps', 'gcpio', 'cpio'] 
   ['deb', \ & do_ar, 'ar'] 
# ['A', \ & do_ar, 'ar'], # unpacking. Seems an overkill to 
   ['rar', \ & do_unrar, ['unrar', 'zip']], 
   ['arj', \ & do_unarj, ['unarj', 'arj']], 
   ['arc', \ & do_arc, ['nomarch', 'arc']], 
   ['zoo', \ & do_zoo, ['zoo', 'unzoo']], 
# ['Doc', \ & do_ole, 'ripole'], # ripole the package so far 
   ['cab', \ & do_cabextract, 'cabextract'] 
# ['Tnef', \ & do_tnef_ext, 'tnef'], # use internal do_tnef () instead 
   ['tnef', \ & do_tnef] 
# ['Lha', \ & do_lha, 'lha'], # not safe, use 7z instead 
# ['Sit', \ & do_unstuff, 'unstuff'], # not safe 
   [['zip', 'kmz'], \ & do_7zip, ['7 za ', '7 z']], 
   [['zip', 'kmz'], \ & do_unzip] 
   ['7 Z ', \ & do_7zip, ['7 zr', '7 za ', '7 z']], 
   [[qw (zip 7z tar gz bz2 Z)], 
            \ & do_7zip [za '7 ', '7 z']] 
   [[qw (xz lzma jar cpio lha arj rar swf iso cab deb rpm)] 
            \ & do_7zip, '7 z '], 
   ['exe', \ & do_executable, ['unrar', 'zip'], 'lha', ['unarj', 'arj']], 
); 
$ sa_debug = 0; 
# Set hostname. 
$ myhostname = "domain"; 

# Set listen IP / PORT. 
$ notify_method = 'smtp: [127.0.0.1]: 10025'; 
$ forward_method = 'smtp: [127.0.0.1]: 10025'; 

# Set default action. 
# Available actions: D_PASS, D_BOUNCE, D_REJECT, D_DISCARD. 
$ final_virus_destiny = D_DISCARD; 
$ final_banned_destiny = D_BOUNCE; 
$ final_spam_destiny = D_PASS; 
$ final_bad_header_destiny = D_PASS; 

@ av_scanners = (

     # # # # [url=http://Http://www.clamav.net/]Http://www.clamav.net/[/url] 
     ['ClamAV-clamd', 
     \ & ask_daemon, ["CONTSCAN {} \ n", "/ tmp / clamd.socket"] 
     qr / \ bOK $ /, qr / \ bFOUND $ /, 
     qr / ^ *:. (! Infected Archive) (. *) FOUND $ /], 
); 

@ av_scanners_backup = (

     # # # [url=http://Http://www.clamav.net/]Http://www.clamav.net/[/url] - backs up clamd or Mail :: ClamAV 
     ['ClamAV-clamscan', 'clamscan', 
     "- stdout - disable-summary-r - tempdir = $ TEMPBASE {}", [0], [1], 
     qr / ^ *:. (! Infected Archive) (. *) FOUND $ /], 
); 

# This policy will perform virus checks only. 
interface_policy # $ {'10026 '} = "VIRUSONLY'; 
# $ {policy_bank 'VIRUSONLY'} = {# mail from the pickup daemon 
Bypass_spam_checks_maps # => [1], # do not spam-check this mail 
Bypass_banned_checks_maps # => [1], # do not banned-check this mail 
Bypass_header_checks_maps # => [1], # do not header-check this mail 
#}; 

# Allow SASL authenticated users to bypass scanning. Typically SASL 
# Users already submit messages to the submission port (587) or the 
# Smtps port (465): 
interface_policy # $ {'10026 '} = "SASLBYPASS'; 
# $ {policy_bank 'SASLBYPASS'} = {# mail from submission and smtps ports 
Bypass_spam_checks_maps # => [1], # do not spam-check this mail 
Bypass_banned_checks_maps # => [1], # do not banned-check this mail 
Bypass_header_checks_maps # => [1], # do not header-check this mail 
#}; 

# Which Apply to emails coming from internal networks or authenticated 
# Roaming users. 
# Mail supposedly Originating from our users 
policy_bank $ {'MYUSERS'} = {
     # Declare that mail was submitted by our smtp client 
     Originating => 1 

     # Enables disclaimer insertion if available 
     allow_disclaimers => 1 

     # Notify administrator of locally Originating malware 
     virus_admin_maps => ["root \ @ $ mydomain"], 
     spam_admin_maps => ["root \ @ $ mydomain"], 

     # Forward to a smtpd service providing DKIM signing service 
     # forward_method => 'smtp: [127.0.0.1]: 10027', 

     # Force MTA conversion to 7-bit (eg before DKIM signing) 
     smtpd_discard_ehlo_keywords => [BITMIME '8 '] 

     # Do not remove NOTIFY = SUCCESS option 
     terminate_dsn_on_notify_success => 0, 

     # Do not perform spam / virus / header check. 
     bypass_spam_checks_maps # => [1], 
     bypass_virus_checks_maps # => [1], 
     bypass_header_checks_maps # => [1], 

     # Allow sending any file names and types 
     bypass_banned_checks_maps # => [1], 

     # Quarantine clean messages 
     # clean_quarantine_method => 'sql', 
     # final_destiny_by_ccat => {CC_CLEAN, D_DISCARD} 
}; 

# Regular incoming mail, Originating from anywhere (usually from outside) 
# $ {policy_bank 'EXT'} = {
# # Just use global settings, no special overrides 
#}; 

# 
# Port used to release quarantined mails. 
# 
interface_policy $ {'9998 '} =' AM.PDP-INET '; 
policy_bank $ {'AM.PDP-INET'} = {
     protocol => 'AM.PDP', # select Amavis policy delegation protocol 
     inet_acl => [qw (127.0.0.1 [:: 1])], # restrict access to these IP addresses 
     auth_required_release => 1, # 0 - do not require secret_id for amavisd-release 
     # log_level => 4 
     # always_bcc_by_ccat => {CC_CLEAN 'admin@example.com'}, 
}; 

# # # # # # # # # # # # # # # # # # # # # # # # # 
# Quarantine mails. 
# 

# Do not quarantine emails with bad header. 
$ bad_header_quarantine_method = undef; 

# Quarantine SPAM. 
# Where to store quarantined mail message: 
# - 'Local: spam-% m-% i', quarantine mail on the local file system. 
# - 'Sql:' mail quarantine in SQL server specified in @ storage_sql_dsn. 
# - Undef, not quarantine the mail. 
$ spam_quarantine_method = undef; 
# $ spam_quarantine_method = 'sql'; 
# $ spam_quarantine_to = 'spam-quarantine'; 

# # # # # # # # # # # # # # # # # # # # # # # # # 
# Quarantine VIRUS mails. 
# 
# $ virus_quarantine_to = 'virus-quarantine'; 
# $ virus_quarantine_method = 'sql'; 

# # # # # # # # # # # # # # # # # # # # # # # # # 
# Quarantine BANNED mails. 
# 
$ banned_files_quarantine_method = undef; 
# Or quarantine banned mail to SQL server. 
# $ banned_files_quarantine_method = 'sql'; 
# $ banned_quarantine_to = 'banned-quarantine'; 

# # # # # # # # # # # # # # # # # # # # # # # # # 
# Quarantine CLEAN mails. 
# Do not forget to enable clean quarantine in policy bank 'MYUSERS'. 
# 
# = 'Sql'; 
# = 'Clean-quarantine'; 

# Modify email subject, add '$ sa_spam_subject_tag'. 
# 0: disable 
# 1: enable 
sa_spam_modifies_subj = $ 1; 

# Remove existing headers 
# $ remove_existing_x_scanned_headers = 0; 
# $ remove_existing_spam_headers = 0; 

# Leave empty (undef) to add the header. 
# Modify / usr / sbin / amavisd or / usr / sbin / amavisd-new add file to customize header in: 
# 
# Sub add_forwarding_header_edits_per_recip 
# 
# $ X_HEADER_TAG = 'X-Virus-Scanned'; 
# $ X_HEADER_LINE = "by amavisd at $ myhostname"; 

# Notify virus sender? 
# $ warnvirussender = 0; 

# Notify spam sender? 
# $ warnspamsender = 0; 

# Notify sender of banned files? 
$ warnbannedsender = 0; 

# Notify sender of syntactically invalid header containing non-ASCII characters? 
$ warnbadhsender = 0; 

# Notify virus (or banned files) RECIPIENT? 
# (Not very useful, but some policies demand it) 
$ warnvirusrecip = 0; 
$ warnbannedrecip = 0; 

# Also Notify non-local virus / banned recipients if $ warn * recip is true? 
# (Including Those not matching local_domains *) 
$ warn_offsite = 0; 

# $ notify_sender_templ Read_Text = ('/ var / amavis / notify_sender.txt'); 
# $ notify_virus_sender_templ Read_Text = ('/ var / amavis / notify_virus_sender.txt'); 
# $ notify_virus_admin_templ Read_Text = ('/ var / amavis / notify_virus_admin.txt'); 
# $ notify_virus_recips_templ Read_Text = ('/ var / amavis / notify_virus_recips.txt'); 
# $ notify_spam_sender_templ Read_Text = ('/ var / amavis / notify_spam_sender.txt'); 
# $ notify_spam_admin_templ Read_Text = ('/ var / amavis / notify_spam_admin.txt'); 

sql_allow_8bit_address = $ 1; 
timestamp_fmt_mysql = $ 1; 

# A string to prepend to Subject (is local recipients only) if mail Could 
# Not be decoded or checked entirely, eg due to password-protected archives 
# $ undecipherable_subject_tag = '*** UNCHECKED ***'; # Undef disables it 
$ undecipherable_subject_tag = undef; 
# Hope to fix 'nested MAIL command' issue on high server load. 
$ smtp_connection_cache_enable = 0; 

# The default set of header fields to be signed can be controlled 
#% By setting signed_header_fields elements to true (to sign) or 
# To false (not to sign). Keys must be in lowercase, eg: 
# 0 -> off 
# 1 -> on 
signed_header_fields $ {'received'} = 0; 
signed_header_fields {$ 'to'} = 1; 

# Make sure it sings all inbound emails, avoid error log like this: 
# 'Dkim: not signing inbound mail'. 
$ Originating = 1; 

# Add dkim_key here. 
dkim_key ("gafernandes.com.br", "dkim", "/ var / lib / dkim / gafernandes.com.br.pem"); 
dkim_key ("clarotemtudo.com.br", "dkim", "/ var / lib / dkim / clarotemtudo.com.br.pem"); 


# Note que signing mail for subdomains with a key of the parent 
# Domain is treated by recipients as a third-party key, Which 
# May 'hold less merit' in Their Eyes. If one has a choice, 
# It is better to publish a key for each domain (eg host1.a.cn) 
# If mail is really coming from it. Sharing a pem file 
# For multiple domains may be acceptable, so you do not need 
# To generate a different key for each subdomain, but you 
# The need to publish it in each subdomain. It is probably 
# Easier to avoid sending addresses like host1.a.cn and 
# Always use the parent domain (a.cn) in 'From:' Thus 
# Avoiding the issue altogether. 
# dkim_key ("host1.gafernandes.com.br", "dkim", "/ var / lib / dkim / gafernandes.com.br.pem"); 
# dkim_key ("host3.gafernandes.com.br", "dkim", "/ var / lib / dkim / gafernandes.com.br.pem"); 

# Add new dkim_key for other domain. 
# dkim_key ('Your_New_Domain_Name', 'dkim', 'Your_New_Pem_File'); 

@ dkim_signature_options_bysender_maps = ({
     # ------------------------------------ 
     # For domain: gafernandes.com.br. 
     # ------------------------------------ 
     # 'D' defaults to the domain of an author / sender address, 
     # 'S' defaults to whatever selector is Offered by matching the key 

     # 'postmaster@gafernandes.com.br' => {d => "gafernandes.com.br", a => 'rsa-sha256', ttl => 7 * 24 * 3600}, 
     # "spam-reporter@gafernandes.com.br" => {d => "gafernandes.com.br", a => 'rsa-sha256', ttl => 7 * 24 * 3600}, 

     # Explicit 'd' forces a third-party signature on foreign (hosted) domains 
     "gafernandes.com.br" => {d => "gafernandes.com.br", a => 'rsa-sha256', ttl => 10 * 24 * 3600}, 
     # "host1.gafernandes.com.br" => {d => "host1.gafernandes.com.br", a => 'rsa-sha256', ttl => 10 * 24 * 3600}, 
     # "host2.gafernandes.com.br" => {d => "host2.gafernandes.com.br", a => 'rsa-sha256', ttl => 10 * 24 * 3600}, 
     # ---- End domain: gafernandes.com.br ---- 

     # Catchall defaults 
     '.' => {A => 'rsa-sha256', c => 'relaxed / simple', ttl => 30 * 24 * 3600}, 
}); 
# ------------ Disclaimer Setting --------------- 
# Uncomment this line to enable singing disclaimer in outgoing emails. 
# $ defang_maps_by_ccat CC_CATCHALL {+} = ['disclaimer']; 

# Program used to signing disclaimer in outgoing emails. 
$ altermime = '/ usr / bin / altermime'; 

Disclaimer # formart in plain text. 
@ altermime_args_disclaimer = qw (- disclaimer = / etc / postfix / disclaimer / _OPTION_.txt - disclaimer-html = / etc / postfix / disclaimer / _OPTION_.txt - force-is-bad-html); 

@ disclaimer_options_bysender_maps = ({
     # Per-domain disclaimer setting: / etc/postfix/disclaimer/host1.iredmail.org.txt 
     # 'host1.iredmail.org' => 'host1.iredmail.org' 

     # Sub-domain disclaimer setting: / etc / postfix / disclaimer / iredmail.org.txt 
     # '. iredmail.org' => 'iredmail.org' 

     # Per-user setting disclaimer: / etc / postfix / disclaimer / boss.iredmail.org.txt 
     # 'boss@iredmail.org' => 'boss.iredmail.org' 

     # Catch-all disclaimer setting: / etc / postfix / disclaimer / default.txt 
     '.' => 'Default', 
}); 
# ------------ Disclaimer Setting --------------- End 
@ storage_sql_dsn = (
     ['DBI: mysql: database = amavisd, host = 127.0.0.1, port = 3306', 'amavisd', 'W0lw7uci37hAOUYgVDYBwZfrxR4Vmz'] 
); 
# Uncomment below two lines to lookup virtual mail domains from MySQL database. 
# @ lookup_sql_dsn = (
# ['DBI: mysql: database = vmail, host = 127.0.0.1, port = 3306', 'vmail', '35kJPNFQxIF7qOI2Fd9Hxzna2rKUse '] 
#); 
# For Amavisd-new-2.7.0 and later versions. Placeholder '% d' is available in Amavisd-2.7.0 +. 
# $ sql_select_policy = "SELECT domain FROM domain WHERE domain = '% d'"; 

# For Amavisd-new-2.6.x. 
# WARNING: IN () may cause MySQL lookup performance issue. 
# $ sql_select_policy = "SELECT domain FROM domain WHERE CONCAT (" @ ", domain) IN (% k) '; 
admin_maps_by_ccat delete $ {&} CC_UNCHECKED; 

# Num of pre-forked children. 
# WARNING: It must match (equal to or larger than) the number set in 
# / Etc / postfix / master.cf "maxproc" column for the 'smtp-amavis' service. 
max_servers = $ 10; 

one; # Insure a defined return 

I searched the forum and on the internet somehow unlock this file type but found nothing.
Could anyone help me?

Very grateful.

Need paid professional iredmail installation service

$
0
0

Hello
We are looking for a person who can install iredmail for us. We are ready to pay for the same.

Nothing being marked as spam!

$
0
0

==== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: Ubuntu 14.04.1
- Related log if you're reporting an issue:
====

HI,

I have install iRedMail and it is very good, but I am getting huge amounts of spam.

I have been looking at the X-Spam-Score headers of the spam arriving in my inbox and they show low numbers (like 1 - 3.5) so they are not being marked as spam when the contents of them shows they quite obviously are.

Any help would be most welcome!

Edit:

I have set up the Bayes filter with MySQL as outlined on your wiki and I am running sa-learn with my spam folder right now so that it learns.

How can I tell if incoming mail is being scanned with the Bayes filter?

AuthMYSQLEnable

$
0
0

==== Required information ====
- iRedMail version:
- Store mail accounts in which backend (LDAP/MySQL/PGSQL):
- Linux/BSD distribution name and version:
- Related log if you're reporting an issue:
======== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: CentOS 6.5
====

Hello,

I get the following error message when trying to start apache after installing iRedMail:

Starting httpd: Syntax error on line 22 of /etc/httpd/conf.d/cluebringer.conf:
Invalid command 'AuthMYSQLEnable', perhaps misspelled or defined by a module not included in the server configuration

ERROR 1054 (42S22): Unknown column 'islist' in 'field list'

$
0
0

==== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: CentOS 6.5
====

Hello,

I am trying to migrate data from an old iRedMail 0.8.4 server to a new one 0.8.7 using the instructions here:

http://www.iredmail.org/wiki/index.php? … l_accounts

When I get to the point of cleaning up the database after import (under "MySQL/PostgreSQL: Migrate mail accounts"), the following command gives me an error message:

mysql> UPDATE alias SET islist=1 WHERE address NOT IN (SELECT username FROM mailbox);
ERROR 1054 (42S22): Unknown column 'islist' in 'field list'
mysql>

lmtp User doesn't exist

$
0
0

======== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version:  Ubuntu 14.04
- Related log if you're reporting an issue:
====

Good day!

When a message is received, the following occurs:
1. sharov@svetets.ru send message to mail@domain.ru.
2. Amavis identifies a message as spam.
3. Amavis send message to root@domain.ru, root@domain.ru - virtual address as postmaster@domain.ru.
4. I receive an error - (host mail.domain.ru[private/dovecot-lmtp] said: 550 5.1.1 <root@domain.ru> User doesn't exist: root@domain.ru (in reply to RCPT TO command)

As a result, getting two letters:
1. mail@domain.ru - ok
2. postmaster@domain.ru - Undelivered Mail Returned to Sender
Reporting-MTA: dns; mail.domain.ru
Original-Envelope-Id: AM.22477-01.20140806T194025Z@mail.domain.ru
X-Postfix-Queue-ID: 1DBE9281B19
X-Postfix-Sender: rfc822; root@domain.ru
Arrival-Date: Wed,  6 Aug 2014 23:40:25 +0400 (MSK)

Final-Recipient: rfc822; root@domain.ru
Original-Recipient: rfc822;root@domain.ru
Action: failed
Status: 5.1.1
Remote-MTA: dns; mail.domain.ru
Diagnostic-Code: smtp; 550 5.1.1 <root@domain.ru> User doesn't exist:
    root@domain.ru


with an investment in a message:
Spam FROM LOCAL [193.95.97.79]:35744 <sharov@svetets.ru>


How to fix bugs?


503 5.5.1 Error: authentication not enabled

$
0
0

==== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: Ubuntu 14.04.1
- Related log if you're reporting an issue:
====

Authentication does not appear to be working for port 25 on my server.

user@mail:~$ telnet localhost 25
Trying ::1...
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
220 mail.myserver.com ESMTP Postfix (Ubuntu)
EHLO mail.myserver.com
250-mail.myserver.com
250-PIPELINING
250-SIZE 15728640
250-ETRN
250-STARTTLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
AUTH LOGIN
503 5.5.1 Error: authentication not enabled

It seems to work with authentication via port 587, but not 25.

Any ideas?

imap connections fail until postfix is restarted

$
0
0

==== Required information ====
- iRedMail version: mail_version = 0.8.6
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: CentOS 6.5
- Related log if you're reporting an issue: Unsure of which log to give
====

My mail server is at times refusing imap connections and I am unable to send mail. This is occurring every so often. Once it occurred in as little as 5 minutes. All I'm doing right now is restarting postfix to get it to send mail again. There is nothing obvious in any log that I have checked (maillog, messages, dovecot, mailq) that would be the cause of this issue. I'm not sure which one would be useful so if I should include some more just ask.

Does anyone know what might be causing this or at the very least what I should be checking?

Any guidance at all would be greatly appreciated.

Edit:

I've attached the following except from the log just in case it will be of any help. This is the output of the following command.

egrep '(Error|fatal|panic):' /var/log/maillog | grep -v Login | grep 'Aug  7'

Aug  7 12:51:21 redmail02 roundcube: PHP Error: Invalid compose ID in /var/www/roundcubemail-0.9.5/program/steps/mail/compose.inc on line 51 (GET /mail/?_task=mail&_id=199599086653e3abdf883fb&_action=compose)
Aug  7 13:12:38 redmail02 roundcube: SMTP Error: SMTP error: Failed to add recipient 'cfiels@goodshepherdmidlo.com' in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407431553846&_lang=undefined?_task=mail&_action=send)
Aug  7 14:13:14 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407435089564&_lang=undefined?_task=mail&_action=send)
Aug  7 14:14:01 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407435036649&_lang=undefined?_task=mail&_action=send)
Aug  7 14:16:15 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407435265871&_lang=undefined?_task=mail&_action=send)
Aug  7 14:39:44 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407436566466&_lang=undefined?_task=mail&_action=send)
Aug  7 15:04:05 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407438028091&_lang=undefined?_task=mail&_action=send)
Aug  7 15:05:49 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407438148731&_lang=undefined?_task=mail&_action=send)
Aug  7 15:08:07 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407438376862&_lang=undefined?_task=mail&_action=send)
Aug  7 15:33:44 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407439819633&_lang=undefined?_task=mail&_action=send)
Aug  7 15:36:00 redmail02 roundcube: SMTP Error: SMTP error: Failed to send data in /var/www/roundcubemail-0.9.5/program/include/rcmail.php on line 1035 (POST /mail/?_unlock=loading1407439955969&_lang=undefined?_task=mail&_action=send)

Add iRedMail to existing web server?

$
0
0

iRedMail version: 0.8.7
OS: Raspbian on Raspberry Pi
"Webserver URL": https://example.com
"My e-mail": me@example.com
(not my real webserver or e-mail, you get the idea)
======================================================

I'd like to add e-mail capabilities to my current server that hosts a website featuring ownCloud services via Apache2. The website is accessible by SSL on port 443, and my certificates are self-signed through my own CA.

Is it possible to provide e-mail on this same server that hosts my website? I imagine this would be possible... but I run into trouble when iRedMail starts overwriting my configuration, such as changing my website's SSLCertificateFile path to its own, making my website no longer accessible using my own SSL certificates. Etc.

Can anyone help point me in the right direction? I've searched all over and attempted installing iRedMail a few times, but I just can't get the configuration right so that the webserver and e-mail function can co-exist on the same machine. There seems to be something about the Apache2 configuration for iRedMail that conflicts with the current webserver, but I'm not sure what that is.

======================================================


/etc/apache2/sites-available/example-ssl.conf
My webserver's configuration file -- again "example" is just an example smile

<VirtualHost *:443>
# Main configuration statements       
    ServerName example.com
        DocumentRoot /var/www/
        CustomLog /var/log/owncloud/ssl-access_log combined
        ErrorLog /var/log/owncloud/ssl-error_log
        ServerSignature Off
        TraceEnable off

        Options -Indexes -Includes -MultiViews

# SSL configuration
        SSLEngine on
        SSLCertificateFile /etc/ssl/crt/exampleServer-cert.pem
        SSLCertificateKeyFile /etc/ssl/key/exampleServer-key.pem
        SSLCACertificateFile /etc/ssl/crt/exampleCAcert.pem
        SSLVerifyDepth 2
        SSLCompression Off

# Force all traffic to remain on HTTPS:
            Header set Strict-Transport-Security "max-age=16070400;

includeSubDomains"

# Directory permissions
    <Directory />
            Options None
            AllowOverride None
                Deny from All
    </Directory>

    <Directory /var/www/logs/>
            Order Deny,Allow
            Deny from all
            AllowOverride None
            Options None
    </Directory>

# GeoIP settings: block all countries except US and France
        <Directory /var/www/>
        <IfModule mod_geoip.c>
                Options FollowSymLinks
                Order Deny,Allow
                Deny from all
                GeoIPEnable On
                # RewriteCond %{ENV:GEOIP_COUNTRY_CODE} !^(US)$
                # RewriteRule ^(.*)$ http://www.google.com$1 [R,L]
                SetEnvIf GEOIP_COUNTRY_CODE US AllowCountry
                SetEnvIf GEOIP_COUNTRY_CODE FR AllowCountry
                Allow from env=AllowCountry
                AllowOverride None
        </IfModule>
        </Directory>

</VirtualHost>


Other information
* Server is "hardened" and set up to be as secure as a beginner-intermediate Linux dude can make it smile
* Fail2ban set up and working
* Mod_security is enabled
* Ports 443, 80, and 21 are forwarded on the router
* UFW firewall is keeping those ports open
* Dynamic DNS is set up
* Added a mail.example.com hostname on the DNS server website just in case it would be necessary, and added that for the MX server on the Dynamic DNS site (hopefully correctly, but I don't know if it makes a difference).
* Logwatch is installed
* Please ask if anything is missing

Fitness Machine Review Nitro Shred

$
0
0

Suitableness machines are specially programme and constructed apparatuses for use in circulatory, respiratory, and muscular enhancement. These shape machines limit in office and call, depending on head and the want of the user. Both shape machines foster as many-exercises-in-one," whereas others are fashioned for a special write of read.

Nitro Shred

When it comes downcast to it, condition machines are paw to the part needs of the single. A rowing organisation is incompatible for a jack! Condition machines are real specific.

Several Suitability Machines:

Grinder: This is a virtual stepping organisation. By stepping ship on a horizontally poignant sing, leg muscles, circulation, and respiration all develop into jest. This condition tool can be orientated for zip, so if a leisurely career or a spanking canal is a druthers, than the grinder leave aid. Several fitness machines instrument alter determine metric expiration, calories toughened, miles run, and case progressed. This is nonsuch for the lap-runner and tennis player!

Nitro Shred

** Opine: Travel on a smallest carpet existence easy pulled out from down.

Support Ascender: A support arriviste is a stationary apparatus with inserts for feet that change up and hair from the pile propulsion exerted on them by the feet. Muscles and circulation get the pinion workout here. Like the treadwheel, this soundness organisation includes indicators for calories destroyed, miles run," and example performed. The feet should always be change with the story. This shape tool is model for firemen and the police!
http://workoutmens.com/

Spamassassin

$
0
0

==== Required information ====
- iRedMail version:
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: Debian 6
- Related log if you're reporting an issue:
====

Hi,

A question. The Spamassassin is enabled by default on any installation of iRedMail?

How do I know if the messages are being submitted to spamassassin? I verified that in the server the spamd daemon is not running. Should not be active?

Tks,

M Martinatti

Centos 7 Support

$
0
0

I know this has been asked several times, but would like to check how i can keep posted when iRedMail is available for Centos 7.
I tried 8.7, but  still running into issues on dependencies.

maillist address sending email???

$
0
0

Greetings,
I have created a maillist using the instructions placed on the page: http://www.iredmail.org/wiki/index.php? … pLDAPadmin

The problem is that while it's a maillist, for some reason I'm getting return emails via the maillist from bad email addresses saying my maillist sent an email.

Basically, maillist@domain.com is sending email, to which is being bounced back to maillist@domain.com.  But because maillist@domain.com belongs to six accounts, all six email accounts are getting the bounceback.

I think it's a hack, because a maillist shouldn't be sending email, yes?
How do I troubleshoot?
Thank you.


authentication not enabled ??

$
0
0

============ Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Linux/BSD distribution name and version: Ubuntu 14.04 TLS
- Related log if you're reporting an issue:
====
Hello,

I installed iRedMail and working properly when using webmail. But when I try to send mail using telnet on
localhost: mails are not delivered (I did not use auth login) when try using auth login, given error:authentication not enabled)
non-local: 503 5.5.1 Error: authentication not enabled

Is there any changes I need to do on main.cf and master.cf to enable smtp authentication?


Thank you

Tries to send from @127.0.0.1 instead of @mydomain.com

$
0
0

==== Required information ====
- iRedMail version: 0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): LDAP
- Linux/BSD distribution name and version: Raspbian
- Related log if you're reporting an issue:
====

I'm currently setting up iRedMail and attempted to compose and send a test e-mail. However, when I click Compose, it lists my From address as netrin@127.0.0.1 instead of netrin@mydomain.com. Does anyone know why it does this?

If I attempt to click Send anyway, the error is:
SMTP Error (501): Failed to set sender "netrin@127.0.0.1" (5.1.7 Bad sender address syntax).

Any help would be appreciated.

Work to help you become slim

$
0
0

May be said here over the internet the power connected with Goji Berries about fat reduction, seemed to be not long ago introduced in Brazilian a brand new merchandise according to this kind of great fruit, your Goji Vita! Let's speak here about how precisely to obtain less expensive, as it might help you lose fat, plus much more significantly, precisely why they doesn't need unwanted side effects.The Goji Vita can be considered the dietary supplement, it is composed of berries Goji Super berry, the newest planet associated with weight reduction achievement, significantly acclaimed by means of people. In addition to high quality criteria, arranged towards high-tech solution is usually 100% accepted by means of ANVISA, hence making certain the actual protection of the people who wish to invest in.

http://gojivitablog.com

problem with amavis and spamassassin

$
0
0

==== Required information ====
- iRedMail version: iRedMail-0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL):  mysql
- Linux/BSD distribution name and version:  debian 7
- Related log if you're reporting an issue:
====

Hi
Im tested iredmial  iRedMail-0.8.7

I have some problem with amavis + sa (filtered outgoing e-mail)

i read faq and i find http://www.iredmail.org/wiki/index.php? … oing.Mails


but this not working very god beacuse this solutions disabled sa outgoing and incoming e-mails

-------------------- start --------------------------------


$policy_bank{'MYUSERS'} = {

    originating => 1,
    allow_disclaimers => 1,
    smtpd_discard_ehlo_keywords => ['8BITMIME'],
    terminate_dsn_on_notify_success => 0,

    bypass_spam_checks_maps => [1],
    bypass_virus_checks_maps => [1],   
    bypass_header_checks_maps => [1], 

    # allow sending any file names and types
    bypass_banned_checks_maps => [1],

};
-------------- stop ---------------




i sending  virus test e-mail from other host and oder mta to me:


ug 11 13:37:08 umfc amavis[20658]: (20658-01) Passed CLEAN {RelayedInternal}, MYUSERS LOCAL [194.176.x.x]:51630 [194.176.x.x] <root@xxxx.xxx> -> <asd@iredmail.myvdomain.pl>, Queue-ID: 8CAB8180075, Message-ID


and spam is not tagged

if I send outgoing email from myhost (iredmail) to other mta (outgoing) e-mail is not scaned

My conclusion - this issue diabled todatl SA in outgoind and incoming e-mail


what is resolve this problem ?

problem with amavis and SA - two ways to resolve problem

$
0
0

==== Required information ====
- iRedMail version: iRedMail-0.8.7
- Store mail accounts in which backend (LDAP/MySQL/PGSQL):  mysql
- Linux/BSD distribution name and version:  debian 7
- Related log if you're reporting an issue:
====

Hi
Im tested iredmial  iRedMail-0.8.7

I have some problem with amavis + sa (filtered outgoing e-mail)

i read faq and i find http://www.iredmail.org/wiki/index.php? … oing.Mails


but this not working very god beacuse this solutions disabled sa outgoing and incoming e-mails

-------------------- start --------------------------------


$policy_bank{'MYUSERS'} = {

    originating => 1,
    allow_disclaimers => 1,
    smtpd_discard_ehlo_keywords => ['8BITMIME'],
    terminate_dsn_on_notify_success => 0,

    bypass_spam_checks_maps => [1],
    bypass_virus_checks_maps => [1],   
    bypass_header_checks_maps => [1], 

    # allow sending any file names and types
    bypass_banned_checks_maps => [1],

};
-------------- stop ---------------




i sending  virus test e-mail from other host and oder mta to me:


ug 11 13:37:08 umfc amavis[20658]: (20658-01) Passed CLEAN {RelayedInternal}, MYUSERS LOCAL [194.176.x.x]:51630 [194.176.x.x] <root@xxxx.xxx> -> <asd@iredmail.myvdomain.pl>, Queue-ID: 8CAB8180075, Message-ID


and spam is not tagged

if I send outgoing email from myhost (iredmail) to other mta (outgoing) e-mail is not scaned

My conclusion - this issue diabled total SA in outgoind and incoming e-mail


what is resolve this problem by Iredmail support ?




to resolved this option are two / three way:

1) if any users send only for 587:

587       inet  n       -       n       -       -       smtpd
  -o content_filter=
  -o milter_macro_daemon_name=ORIGINATING
  -o smtpd_client_restrictions=
  -o smtpd_helo_restrictions=
  -o smtpd_sender_restrictions=permit_sasl_authenticated,reject
  -o receive_override_options=no_header_body_checks,no_address_mappings
  -o smtpd_recipient_restrictions=reject_non_fqdn_recipient,reject_unknown_recipient_domain,permit_sasl_authenticated,reject

or promitive mode wink

2) disable all sections in amavis and create new transport in postfix:

main.cf

smtpd_recipient_restrictions =

       .............................................

        check_recipient_access hash:/etc/postfix/skanowane

       .............................................
        permit_mynetworks,
        permit_sasl_authenticated,


cat /etc/postfix/skanowane
v1.vdomain.pl      FILTER spamassassin:


master.cf:

spamassassin unix -     n       n       -       -       pipe
        user=amavis argv=/usr/bin/spamc -f -e /usr/sbin/sendmail -oi -f ${sender} ${recipient}

3) by amavis policy_bank

add server ip to mynetworks in amavis

and add

$policy_bank{'MYNETS'} = { 
  bypass_spam_checks_maps   => [1],  # don't spam-check internal mail
  bypass_banned_checks_maps => [1],  # don't banned-check internal mail
  final_spam_destiny   => D_PASS,
  final_banned_destiny   => D_PASS,
};


what options is recomended by iredmail support ?

Viewing all 12092 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>