Well ... OK then: sorry, I am not overly expert in managing the server
and am learning as I go so please bear with me.

Here is the output from postconf -n

alias_maps = hash:/etc/postfix/aliases,hash:/usr/local/mailman/data/aliases
broken_sasl_auth_clients = yes
command_directory = /usr/sbin
config_directory = /etc/postfix
daemon_directory = /usr/libexec/postfix
disable_vrfy_command = yes
header_checks = regexp:/etc/postfix/header_checks
html_directory = no
inet_interfaces = all
invalid_hostname_reject_code = 554
mail_owner = postfix
mailbox_size_limit = 0
mailq_path = /usr/bin/mailq
manpage_directory = /usr/local/man
message_size_limit = 0
multi_recipient_bounce_reject_code = 554
mydestination =
rosewood.zuka.net,localhost.localdomain,localhost.zuka.net,lists.zuka.net
mydomain = dummy.zuka.net
myhostname = rosewood.zuka.net
mynetworks = 127.0.0.0/8
myorigin = zuka.net
newaliases_path = /usr/bin/newaliases
non_fqdn_reject_code = 554
owner_request_special = no
queue_directory = /var/spool/postfix
readme_directory = no
recipient_delimiter = +
relay_domains = $mynetworks
relay_domains_reject_code = 554
sample_directory = /etc/postfix
sendmail_path = /usr/sbin/sendmail
setgid_group = postdrop
smtp_host_lookup = native,dns
smtp_tls_note_starttls_offer = yes
smtp_use_tls = yes
smtpd_client_restrictions =
smtpd_data_restrictions = reject_unauth_pipelining,    permit
smtpd_helo_required = yes
smtpd_helo_restrictions =
smtpd_recipient_restrictions = permit_sasl_authenticated,   
reject_invalid_hostname,    reject_non_fqdn_recipient,   
reject_non_fqdn_sender,    check_sender_access
pcre:/etc/postfix/sender.pcre,    reject_unknown_sender_domain,   
reject_unknown_recipient_domain,    permit_mynetworks,   
reject_unauth_destination,    reject_rbl_client zen.spamhaus.org,   
reject_rbl_client cbl.abuseat.org,    reject_rbl_client
dul.dnsbl.sorbs.net,    permit
smtpd_sasl_auth_enable = yes
smtpd_sasl_authenticated_header = yes
smtpd_sasl_local_domain =
smtpd_sasl_path = private/auth
smtpd_sasl_security_options = noanonymous
smtpd_sasl_type = dovecot
smtpd_sender_restrictions =
smtpd_tls_CAfile = /etc/postfix/ssl/smtpd.pem
smtpd_tls_cert_file = /etc/postfix/ssl/smtpd.pem
smtpd_tls_key_file = /etc/postfix/ssl/smtpd.pem
smtpd_tls_loglevel = 1
smtpd_tls_received_header = yes
smtpd_tls_security_level = may
smtpd_tls_session_cache_timeout = 3600s
strict_rfc821_envelopes = yes
tls_random_source = dev:/dev/urandom
transport_maps = hash:/etc/postfix/transport
unknown_address_reject_code = 554
unknown_client_reject_code = 554
unknown_hostname_reject_code = 554
unknown_local_recipient_reject_code = 554
unknown_relay_recipient_reject_code = 554
unknown_virtual_alias_reject_code = 554
unknown_virtual_mailbox_reject_code = 554
unverified_recipient_reject_code = 554
unverified_sender_reject_code = 554
virtual_alias_maps = mysql:/etc/postfix/maps/sql-aliases.cf
virtual_gid_maps = static:85
virtual_mailbox_base = /var/spool/virtual
virtual_mailbox_domains = mysql:/etc/postfix/maps/sql-domains.cf
virtual_mailbox_limit = 0
virtual_mailbox_maps = mysql:/etc/postfix/maps/sql-mailboxes.cf
virtual_minimum_uid = 85
virtual_transport = virtual
virtual_uid_maps = static:85

So again, you will notice the path to the CAfile, cert file and key
file. However, what the server seems to be reading is files found under
/etc/ssl/certs. Here is a listing:
-rw-r--r--  1 root root  517 Sep 25  2006 dovecot.cnf
-rw-r--r--  1 root root 1066 Sep 25  2006 dovecot.crt
-rw-r--r--  1 root root  891 Sep 25  2006 dovecot.key
-rw-r--r--  1 root root 1070 Aug  1  2006 dovecot.pem

I know that these are likely the files that are being read because the
email address in these files are the email address of the person who was
administering the server,

Again, please bear with me as I am just working my way through the
learning curve.

Dave



On 23/12/10 12:20 PM, Victor Duchovni wrote:
> postconf -n

Reply via email to