This commit is contained in:
github-actions[bot] 2021-10-30 20:13:46 +00:00
parent 32d968854d
commit ba1da0185d
5 changed files with 7 additions and 7 deletions

View file

@ -3314,7 +3314,7 @@ FAIL2BAN_BLOCKTYPE=drop</li>
<li>custom =&gt; Provide your own certificate as a single file containing both the private key and full certificate chain. (Docs: <code>None</code>)</li>
<li>self-signed =&gt; Provide your own self-signed certificate files. Expects a self-signed CA cert for verification. <strong>Use only for local testing of your setup</strong>. (Docs: <a href="../security/ssl/#self-signed-certificates">Self-Signed Certificates</a>)</li>
</ul>
<p>Please read <a href="./config/security/ssl.md">the SSL page in the documentation</a> for more information.</p>
<p>Please read <a href="../security/ssl/">the SSL page in the documentation</a> for more information.</p>
<h5 id="tls_level"><a class="toclink" href="#tls_level">TLS_LEVEL</a></h5>
<ul>
<li><strong>empty</strong> =&gt; modern</li>
@ -3368,7 +3368,7 @@ FAIL2BAN_BLOCKTYPE=drop</li>
<li><strong>1</strong> =&gt; Dovecot quota is enabled</li>
<li>0 =&gt; Dovecot quota is disabled</li>
</ul>
<p>See <a href="./config/user-management/accounts.md#notes">mailbox quota</a>.</p>
<p>See <a href="../user-management/accounts/#notes">mailbox quota</a>.</p>
<h5 id="postfix_message_size_limit"><a class="toclink" href="#postfix_message_size_limit">POSTFIX_MESSAGE_SIZE_LIMIT</a></h5>
<p>Set the message size limit for all users. If set to zero, the size will be unlimited (not recommended!)</p>
<ul>

View file

@ -1547,7 +1547,7 @@
<ul>
<li><code>imap-quota</code> is enabled and allow clients to query their mailbox usage.</li>
<li>When the mailbox is deleted, the quota directive is deleted as well.</li>
<li>Dovecot quotas support LDAP, <strong>but it's not implemented</strong> (<em>PR are welcome!</em>).</li>
<li>Dovecot quotas support LDAP, <strong>but it's not implemented</strong> (<em>PRs are welcome!</em>).</li>
</ul>

View file

@ -1564,7 +1564,7 @@ ufw allow <span class="m">465</span>
</div>
</li>
<li>
<p>Configure your DNS service to use an MX record for the <em>hostname</em> (eg: <code>mail</code>) you configured in the previous step and add the <a href="../../config/best-practice/spf.md">SPF</a> TXT record.</p>
<p>Configure your DNS service to use an MX record for the <em>hostname</em> (eg: <code>mail</code>) you configured in the previous step and add the <a href="../../../config/best-practices/spf/">SPF</a> TXT record.</p>
<p>If you manually manage the DNS zone file for the domain, it would look something like this:</p>
<div class="highlight"><pre><span></span><code>mail IN A 10.11.12.13
@ -1577,7 +1577,7 @@ ufw allow <span class="m">465</span>
<p>Then don't forget to change the serial number and to restart the service.</p>
</li>
<li>
<p><a href="../../config/best-practice/dkim.md">Generate DKIM keys</a> for your domain via <code>./setup.sh config dkim</code>.</p>
<p><a href="../../../config/best-practices/dkim/">Generate DKIM keys</a> for your domain via <code>./setup.sh config dkim</code>.</p>
<p>Copy the content of the file <code>docker-data/dms/config/opendkim/keys/example.com/mail.txt</code> and add it to your DNS records as a TXT like SPF was handled above.</p>
<p>I use <a href="https://github.com/docker-scripts/bind9">bind9</a> for managing my domains, so I just paste it on <code>example.com.db</code>:</p>
<div class="highlight"><pre><span></span><code>mail._domainkey IN TXT ( &quot;v=DKIM1; h=sha256; k=rsa; &quot;

View file

@ -1545,7 +1545,7 @@
<span class="na">userPassword</span><span class="o">:</span> <span class="s">{SSHA}abcdefghi123456789</span>
<span class="na">email</span><span class="o">:</span> <span class="s">external-account@gmail.com</span>
</code></pre></div>
<p>This structure is different from what is expected/assumed from the configuration scripts of <code>docker-mailserver</code>, so it doesn't work just by using the <code>LDAP_QUERY_FILTER_...</code> settings. Instead, I had to use a custom configuration (<a href="./config/advanced/override-defaults/user-patches.md">via <code>user-patches.sh</code></a>). I created the script <code>docker-data/dms/config/user-patches.sh</code>, with content like this:</p>
<p>This structure is different from what is expected/assumed from the configuration scripts of <code>docker-mailserver</code>, so it doesn't work just by using the <code>LDAP_QUERY_FILTER_...</code> settings. Instead, I had to use a custom configuration (<a href="../../../config/advanced/override-defaults/user-patches/">via <code>user-patches.sh</code></a>). I created the script <code>docker-data/dms/config/user-patches.sh</code>, with content like this:</p>
<div class="highlight"><pre><span></span><code><span class="ch">#!/bin/bash</span>
rm -f /etc/postfix/<span class="o">{</span>ldap-groups.cf,ldap-domains.cf<span class="o">}</span>

File diff suppressed because one or more lines are too long