El Miércoles, 2 de marzo de 2016 13:01:34 Juan Carlos escribió:
> El 02/03/2016 a las 08:59 a.m., Rommel Rodriguez Toirac escribió:
> > El Martes, 1 de marzo de 2016 16:55:53 Arian Molina Aguilera escribió:
> >> El 01/03/16 a las 16:49, Manuel Mely escribió:
> >>> On 03/01/2016 02:28 PM, Rommel Rodriguez Toirac wrote:
> >>>> No me llegó nada :-( Directamente no puedo recibir ni enviar correos
> >>>> a dominios que no sean .cu y no pueden pasar de 1Mb de tamaño Nada
> >>>> que nosotros todavía estamos en otra época.
> >>> 
> >>> De todos modos si pueden seguir el hilo o al menos postear la solucion
> >>> al problema por aqui mejor. Y si es posible acortar un poco el cuerpo
> >>> del mensaje (como acabo de hacer en este mensaje)
> >>> Sobre la solucion... te dejo en buenas manos :)
> >>> 
> >>> 
> >>> ______________________________________________________________________
> >>> Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
> >>> Gutl-l@jovenclub.cu
> >>> https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l
> >> 
> >> De la propia wiki de Centos Postfix SASL + Dovecot
> >> 
> >> Configuring SASL in postfix
> >> 
> >> To configure SASL in postfix, we need to make the following additions to
> >> /etc/postfix/main.cf:
> >> 
> >> 
> >> smtpd_sasl_auth_enable = yes
> >> broken_sasl_auth_clients = yes
> >> smtpd_sasl_type = dovecot
> >> smtpd_sasl_path = private/auth
> >> smtpd_sasl_security_options = noanonymous
> >> and add permit_sasl_authenticated to our smtpd_recipient_restrictions
> >> section of /etc/postfix/main.cf (if you don't have a
> >> smtpd_recipient_restrictions section, then the following example will
> >> work fine):
> >> 
> >> 
> >> smtpd_recipient_restrictions =
> >> 
> >>       permit_mynetworks,
> >>       permit_sasl_authenticated,
> >>       reject_unauth_destination
> >> 
> >> Next we need to configure auth default in the authentication processes
> >> section of /etc/dovecot.conf. Uncomment and/or add the following lines
> >> as necessary (be careful as this section is heavily commented, some
> >> entries already exist, others are commented out and need uncommenting
> >> such as socket listen):
> >> 
> >> 
> >> auth default {
> >> 
> >>       mechanisms = plain login
> >>       passdb pam {
> >>       }
> >>       userdb passwd {
> >>       }
> >>       user = root
> >>       socket listen {
> >>       
> >>         client {
> >>         
> >>           path = /var/spool/postfix/private/auth
> >>           mode = 0660
> >>           user = postfix
> >>           group = postfix
> >>         
> >>         }
> >>       
> >>       }
> >> 
> >> }
> >> Restart dovecot and reload postfix configuration setting:
> >> 
> >> 
> >> service dovecot restart
> >> postfix reload
> >> 
> >> De la wiki de debian
> >> 
> >> PostfixAndSASL
> >> 
> >> Translation(s): none
> >> 
> >> Simple Authentication and Security Layer (SASL) with Postfix SMTP
> >> 
> >> 
> >> Tabla de Contenidos
> >> SASL authentication in the Postfix SMTP server
> >> Implementation using Cyrus SASL
> >> Using saslauthd with PAM
> >> Using auxprop with sasldb
> >> Troubleshooting tip
> >> Implementation using Dovecot SASL
> >> SASL authentication in the Postfix SMTP client
> >> Postfix and sbcglobal/yahoo/att
> >> SASL authentication in the Postfix SMTP server
> >> 
> >> 
> >> Implementation using Cyrus SASL
> >> 
> >> Using saslauthd with PAM
> >> Setup Postfix with SMTP-AUTH over SASL2 with authentication against PAM
> >> in a chroot() environment.
> >> 
> >> Note: The following steps have been carried out and verified on a Debian
> >> 7.1 system (Jan. 2015).
> >> Note: SASL2 (saslauthd) creates a socket in its working directory.
> >> Postfix (smtpd) needs access to this socket. If smtpd is running
> >> chroot()ed (what is standard on Debian) saslauthd must run within this
> >> chroot() environment also (though not being chrooted itself). While this
> >> is fine for smtpd there are other services (Cyrus imapd for example)
> >> which expect saslauthd 's socket at its "regular" location
> >> (/var/run/saslauthd).
> >> The recommended way to solve this is to run separate saslauthd processes
> >> for Postfix and for others. Debian is prepared for this. Alternatively a
> >> symlink-trick can be used. See below. Or you can disable chroot()ing by
> >> editing the chroot columns in /etc/postfix/master.cf.
> >> 
> >> Install libsasl2-modules, postfix, sasl2-bin
> >> Create a file /etc/postfix/sasl/smtpd.conf:
> >> pwcheck_method: saslauthd
> >> mech_list: PLAIN LOGIN
> >> Setup a separate saslauthd process to be used from Postfix:
> >> Create a copy of saslauthd's config file
> >> ~# cp /etc/default/saslauthd /etc/default/saslauthd-postfix
> >> and edit it
> >> START=yes
> >> DESC="SASL Auth. Daemon for Postfix"
> >> NAME="saslauthd-postf"      # max. 15 char.
> >> # Option -m sets working dir for saslauthd (contains socket)
> >> OPTIONS="-c -m /var/spool/postfix/var/run/saslauthd"        #
> >> postfix/smtp in chroot()
> >> (See /usr/share/doc/sasl2-bin/README.Debian.gz)
> >> Alternatively you can replace the directory /run/saslauthd with a
> >> symlink to /var/spool/postfix/var/run/saslauthd
> >> ~# rm -rf /run/saslauthd
> >> ~# ln -s /var/spool/postfix/var/run/saslauthd   /run/saslauthd
> >> This is a quick-and-dirty hack, useful only for testing purposes. After
> >> the next reboot the contents of /run will be reset.
> >> Create required subdirectories in postfix chroot directory:
> >> dpkg-statoverride --add root sasl 710
> >> /var/spool/postfix/var/run/saslauthd
> >> Add the user "postfix" to the group "sasl":
> >> adduser postfix sasl
> >> Restart saslauthd:
> >> ~# service saslauthd  restart
> >> [ ok ] Stopping SASL Auth. Daemon: saslauthd.
> >> [ ok ] Stopping SASL Auth. Daemon for Postfix: saslauthd-postf.
> >> [ ok ] Starting SASL Auth. Daemon: saslauthd.
> >> [ ok ] Starting SASL Auth. Daemon for Postfix: saslauthd-postf.
> >> Edit Postfix configuration:
> >> ~# postconf -e 'smtpd_sasl_local_domain = $myhostname'
> >> ~# postconf -e 'smtpd_sasl_auth_enable = yes'
> >> ~# postconf -e 'broken_sasl_auth_clients = yes'
> >> ~# postconf -e 'smtpd_sasl_security_options = noanonymous'
> >> ~# postconf -e 'smtpd_recipient_restrictions =
> >> permit_sasl_authenticated, permit_mynetworks, reject_unauth_destination'
> >> (Optionally) Create a new PAM fragment and adjust it to your needs:
> >> ~# cd /etc/pam.d
> >> ~# cp other smtp
> >> ~# editor /etc/pam.d/smtp
> >> Restart (reloading is not enough) postfix:
> >> ~# service postfix restart
> >> That's it, you're done, everything should work fine now.
> >> 
> >> Using auxprop with sasldb
> >> Setup Postfix with SMTP-AUTH over SASL2 with authentication against
> >> sasldb in a chroot() environment.
> >> 
> >> Note: The following steps have been carried out and verified on a Debian
> >> 8.3 system (Feb. 2016).
> >> 
> >> Install libsasl2-modules, sasl2-bin
> >> Create a file /etc/postfix/sasl/smtpd.conf:
> >> pwcheck_method: auxprop
> >> auxprop_plugin: sasldb
> >> mech_list: plain login
> >> Add an user to sasldb2
> >> 
> >>    ~# saslpasswd2 -c -u domain user
> >>    ~# sasldblistusers2
> >> 
> >> Postfix needs /etc/sasldb2 in his chroot environment. One solution is to
> >> change init script to copy sasldb2 at startup.
> >> 
> >> In /etc/init.d/postfix, add etc/sasldb2 in the variable FILES :
> >>           FILES="etc/localtime etc/services etc/resolv.conf etc/hosts \
> >>           
> >>               etc/host.conf etc/nsswitch.conf etc/nss_mdns.config
> >> 
> >> etc/sasldb2"
> >> Edit Postfix configuration:
> >> ~# postconf -e 'smtpd_sasl_local_domain = $myhostname'
> >> ~# postconf -e 'smtpd_sasl_auth_enable = yes'
> >> ~# postconf -e 'smtpd_sasl_security_options = noanonymous'
> >> Restart (reloading is not enough) postfix:
> >> ~# service postfix restart
> >> ~# systemctl daemon-reload
> >> That's it, you're done, everything should work fine now.
> >> 
> >> Troubleshooting tip
> >> Check your configuration with saslfinger :
> >> ~# saslfinger -s
> >> If something goes wrong (cannot connect to server, authentification
> >> fails) try to see what is happening behind the scenes. Try to connect to
> >> your mailserver via
> >> ~# telnet server 25
> >> Can smtpd be connected? If yes, enter the command "ehlo dummy". What
> >> does smtpd respond? For more information see Check for SMTP AUTH support
> >> 
> >> 
> >> Implementation using Dovecot SASL
> >> 
> >> See also: http://wiki.dovecot.org/HowTo/PostfixAndDovecotSASL
> >> 
> >> 
> >> SASL authentication in the Postfix SMTP client
> >> 
> >> 
> >> Postfix and sbcglobal/yahoo/att
> >> 
> >> SBC global block port 25 on its DSL users:
> >> http://help.sbcglobal.net/article.php?item=4640
> >> We will use sbc smtp server via authentication to send emails. Do this:
> >> 
> >> apt-get install libsasl2-modules
> >> ADD to main.cf by using postconf. Just type (smtp.att.yahoo.com requires
> >> the port 587 otherwise you don't need it):
> >> 
> >> postconf -e "relayhost = [smtp.sbcglobal.yahoo.com]:587"
> >> postconf -e "smtp_sasl_auth_enable = yes"
> >> postconf -e "smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd"
> >> postconf -e "smtp_sasl_security_options = noanonymous"
> >> Create a file called sasl_passwd in /etc/postfix/sasl_passwd. Inside type
> >> in
> >> 
> >> [smtp.sbcglobal.yahoo.com]:587 usern...@sbcglobal.net:mypassword
> >> Now change permissions so others can't read it:
> >> 
> >> chmod 600 /etc/postfix/sasl_passwd
> >> Now postmap it. (It creates a database-like file so postfix can read it.)
> >> 
> >> postmap /etc/postfix/sasl_passwd
> >> Restart postfix
> >> 
> >> postfix reload
> >> 
> >> He aquí ambos soluciones para implementación de SASL. Salu2.
> >> 
> >   Estoy haciendo la de Cyrus (la de dovecot la dejaré para último).
> >   
> >   Ya creé un nuevo arranque de saslauthd para postfix, en
> > 
> > /usr/lib/systemd/system/ cree un nuevo servicio que coge la configuración
> > de /etc/sysconfig/saslauthd-postfix. Mas o menos queda así:
> > 
> > ******
> > en /usr/lib/systemd/system/saslauthd-postfix.service
> > 
> > [Unit]
> > Description=SASL authentication daemon para Postfix.
> > After=syslog.target
> > 
> > [Service]
> > Type=forking
> > PIDFile=/var/spool/postfix/private/saslauthd-postfix/saslauthd.pid
> > EnvironmentFile=/etc/sysconfig/saslauthd-postfix
> > ExecStart=/usr/sbin/saslauthd -m $SOCKETDIR -a $MECH $FLAGS
> > 
> > [Install]
> > WantedBy=multi-user.target
> > 
> > 
> > en /etc/sysconfig/saslauthd-postfix
> > 
> > SOCKETDIR=/var/spool/postfix/private/saslauthd-postfix
> > MECH=pam
> > FLAGS=
> > ******
> > 
> > Y en /etc/postfix/sasl/smtp-postfix adicioné:
> > 
> > pwcheck_method: saslauthd
> > mech_list: plain login
> > 
> > y además cambié de path  en el /etc/postfix/main.cf el parámetro quedó así:
> >   smtpd_sasl_path = /etc/postfix/sasl/smtpd-postfix
> >   
> >   Creé un grupo llamado sasl donde como usuarios miembros puse a postfix y
> >   a
> > 
> > root. Creé un directorio en /var/spool/postfix/private/saslauthd-postfix/
> > que es donde el saslauthd creará su socket y su .pid y modifiqué los
> > permisos para que los dueños sean root y el grupo sasl.
> > 
> > Hasta ahí todo correcto (según la wiki). Arranco y arranca Ok, pero,
> > postfix no tiene permiso para huzmear en y dentro de
> > /var/spool/postfix/private/saslauthd- postfix/ por que cada vez que
> > levanto el saslathd-postfix se eliminan los permisos del ese directorio.
> > 
> > ******
> > Mar  2 08:54:49 gtmem postfix/postfix-script[5922]: warning: not owned by
> > postfix: /var/spool/postfix/private/saslauthd-postfix
> > Mar  2 08:54:49 gtmem postfix/postfix-script[5923]: warning: not owned by
> > postfix: /var/spool/postfix/private/saslauthd-postfix/mux.accept
> > Mar  2 08:54:49 gtmem postfix/postfix-script[5924]: warning: not owned by
> > postfix: /var/spool/postfix/private/saslauthd-postfix/saslauthd.pid
> > ******
> > 
> >   Esa es mi pregunta, como lograr que ese directorio tenga PERMANENTEMENTE
> > 
> > permiso para root como dueño y sasl como grupo y así postfix pueda leer
> > dentro.
> Brother ahi algo llamado Iredmail que te monta un server de correo con
> todo en minutos buscalo para centos y tendras tu problema resuelto de
> una vez..

 No, prefiero postfix y dovecot

-- 
Rommel Rodriguez Toirac
Administrador de red ONAT Guantánamo
Teléfono (pizarra): 327444,326625,326376,327677,326576
Extensión: 120


______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Responder a