Hi all,
Well, I've compiled and installed dovecot 2.2.6 with following options:
./configure --prefix=/usr/ --sysconfdir=/etc/ --with-mysql
--libexecdir=/usr/lib/ --localstatedir=/var
--with-moduledir=/usr/lib/dovecot/modules --disable-rpath
--disable-static --with-zlib --with-bzlib --with-solr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 30 Oct 2013, m...@electronico.nc wrote:
passdb {
args = /etc/dovecot/dovecot-ldap-passdb.conf.ext
driver = ldap
}
/etc/dovecot/dovecot-ldap-passdb.conf.ext:
hosts = localhost
auth_bind = yes
auth_bind_userdn = cn=%u,OU=users,dc=domain
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 30 Oct 2013, Andrzej A. Filip wrote:
On 10/28/2013 09:29 AM, Steffen Kaiser wrote:
On Fri, 25 Oct 2013, Andrzej A. Filip wrote:
How to configure dovecot to use different default mail_location for
system (uid<1_000) and normal users (uid>=
So I suppose you're not a fan of the email hosting systems on the planet that
bundle many services onto 1 box. Thanks for the feedback.
-
Doug Mortensen
Network Consultant
Impala Networks
P: 505.327.7300
-Original Message-
From: dovecot-boun...@dovecot.org [mailto:dovecot-boun...@dovecot
I'm afraid it doesn't seem to be working.
I've compiled a patched 2.2.6 dovecot with the patch you sent and
installed it in a production server (had to be 2.2.6 cause we've
upgraded all the rest since I begun this thread months ago) and although
we still have mbox corruptions (rarely as before)
I think your problem can be more generically restated as:
- Untrusted users have access to the mailstore, eg employees who
maintain the server, attackers who break into the system as untrusted
user accounts
- There is some trusted process to get access to decryption keys and
largely this proce
Hi,
I'm trying to get Dovecot replication working between two servers. I
didn't have much luck on v2.1.3, so after receiving advice from the list I
have upgraded to v2.2.6.
I now get the error:
Oct 30 11:50:16 server1 dovecot: doveadm(mark): Error: user mark: Auth PASS
lookup failed
Oct 30 11:5
Michael Orlitzky skrev den 2013-10-28 20:49:
php_admin_value open_basedir /var/www/$domain/$host/
php_admin_value upload_tmp_dir /var/www/$domain/$host/tmp
php_admin_value session.save_path /var/www/$domain/$host/tmp
php_admin_value sys_temp_dir /var/www/$domain/$host/tmp
so dont creat
Hi all,
I believe I have worked this out, there is an entry in dovecot.conf for the
private namespace which sets the prefix required to access the namespace as
follows
prefix = INBOX.
I commented this out and restarted dovecot.
I know that I need to make this change in the template for dovecot
Hi!
I'm currently configuring the Dovecot Antispam plugin for the use with
Dspam. In general it works, but I'm not sure about one special config
parameter:
antispam_dspam_args
At the moment I set it to:
antispam_dspam_args = --source=error;--signature=%%s;--user;%u
Is that the appropriate value f
On 10/30/2013 09:01 AM, Benny Pedersen wrote:
> Michael Orlitzky skrev den 2013-10-28 20:49:
>
>> php_admin_value open_basedir /var/www/$domain/$host/
>> php_admin_value upload_tmp_dir /var/www/$domain/$host/tmp
>> php_admin_value session.save_path /var/www/$domain/$host/tmp
>> php_admin_v
On 28/10/13 23:22, Frerich Raabe wrote:
On 2013-10-28 20:23, Reindl Harald wrote:
Am 28.10.2013 20:14, schrieb Douglas Mortensen:
However, it would be nice to know that even if we were breached, the
emails on the server were encrypted and would be completely useless
to an attacker.
This type of
On 2013-10-30 16:03, Miquel van Smoorenburg wrote:
On 28/10/13 23:22, Frerich Raabe wrote:
You could imagine a system which requires users to generate a key
pair
and then submit their public key. The mail system will encrypt all
mail
received for a user with that users public key. When accessin
Am 30.10.2013 15:54, schrieb Michael Orlitzky:
> On 10/30/2013 09:01 AM, Benny Pedersen wrote:
>> Michael Orlitzky skrev den 2013-10-28 20:49:
>>
>>> php_admin_value open_basedir /var/www/$domain/$host/
>>> php_admin_value upload_tmp_dir /var/www/$domain/$host/tmp
>>> php_admin_value sessio
Quoting Miquel van Smoorenburg :
On 28/10/13 23:22, Frerich Raabe wrote:
On 2013-10-28 20:23, Reindl Harald wrote:
Am 28.10.2013 20:14, schrieb Douglas Mortensen:
However, it would be nice to know that even if we were breached, the
emails on the server were encrypted and would be completely
Hello and thanks for your answer.
Le 30/10/2013 19:32, Steffen Kaiser a écrit :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 30 Oct 2013, m...@electronico.nc wrote:
passdb {
args = /etc/dovecot/dovecot-ldap-passdb.conf.ext
driver = ldap
}
/etc/dovecot/dovecot-ldap-passdb.conf.e
Am 30.10.2013 21:17, schrieb m...@electronico.nc:
Hello and thanks for your answer.
Le 30/10/2013 19:32, Steffen Kaiser a écrit :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 30 Oct 2013, m...@electronico.nc wrote:
passdb {
args = /etc/dovecot/dovecot-ldap-passdb.conf.ext
driver
Le 31/10/2013 10:42, Achim Gottinger a écrit :
Am 30.10.2013 21:17, schrieb m...@electronico.nc:
Hello and thanks for your answer.
Le 30/10/2013 19:32, Steffen Kaiser a écrit :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 30 Oct 2013, m...@electronico.nc wrote:
passdb {
args = /e
Hi All,
For info I now believe that this is a cPanel issue not a Dovecot issue.
cPanel re-writes dovecot.conf from a template, and what it calls the
datastore. From what I have learnt so far it looks like cPanel seems to have
lost the mechanism to permit you to change the 'prefix' value in the
dat
19 matches
Mail list logo