在 /etc/dovecot.conf 里打开 debug 参数,用户登录时可以从 /var/log/dovecot.log 里看到该用户的邮箱路径。可以通过此信息来帮你调试。
支持 Red Hat Enterprise Linux, CentOS, Scientific Linux, Debian, Ubuntu, FreeBSD, OpenBSD
您尚未登陆。 请选择登陆或是注册一个新账号。
iRedMail 开源邮件服务解决方案 » 由 ZhangHuangbin 发表的文章
在 /etc/dovecot.conf 里打开 debug 参数,用户登录时可以从 /var/log/dovecot.log 里看到该用户的邮箱路径。可以通过此信息来帮你调试。
这个内容不对,不至于那么少。
你使用 amavisd-new 提供的默认配置文件,再对照 iRedMail 里的配置脚本自己设置一下吧:
http://iredmail.googlecode.com/svn/trun … amavisd.sh
以下是我的虚拟机里的配置,仅供参考(使用以下命令获得:grep -v '^#' /etc/amavisd.conf):
use strict;
$max_servers = 2; # num of pre-forked children (2..30 is common), -m
$daemon_user = "amavis"; # (no default; customary: vscan or amavis), -u
$daemon_group = "amavis"; # (no default; customary: vscan or amavis), -g
$mydomain = "r6.iredmail.org"; # = 'example.com'; # a convenient default for other settings
$TEMPBASE = "$MYHOME/tmp"; # working directory, needs to exist, -T
$ENV{TMPDIR} = $TEMPBASE; # environment variable TMPDIR, used by SA, etc.
$QUARANTINEDIR = "/var/virusmails";
$db_home = "$MYHOME/db"; # dir for bdb nanny/cache/snmp databases, -D
$log_level = 0; # verbosity 0..5, -d
$log_recip_templ = undef; # disable by-recipient level-0 log entries
$DO_SYSLOG = 1; # log via syslogd (preferred)
$syslog_facility = 'mail'; # Syslog facility as a string
# e.g.: mail, daemon, user, local0, ... local7
$syslog_priority = 'debug'; # Syslog base (minimal) priority as a string,
# choose from: emerg, alert, crit, err, warning, notice, info, debug
$enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
$nanny_details_level = 2; # nanny verbosity: 1: traditional, 2: detailed
$enable_dkim_verification = 1; # enable DKIM signatures verification
$enable_dkim_signing = 1; # load DKIM signing code, keys defined by dkim_key
@local_domains_maps = ( [".$mydomain","a.cn"] ); # list of all local domains
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 );
$unix_socketname = "$MYHOME/amavisd.sock"; # amavisd-release or amavis-milter
# option(s) -p overrides $inet_socket_port and $unix_socketname
$inet_socket_port = 10024; # listen on this local TCP port(s)
$policy_bank{'MYNETS'} = { # mail originating from @mynetworks
originating => 1, # is true in MYNETS by default, but let's make it explicit
os_fingerprint_method => undef, # don't query p0f for internal clients
};
$interface_policy{'10026'} = 'ORIGINATING';
$policy_bank{'ORIGINATING'} = { # mail supposedly originating from our users
originating => 1, # declare that mail was submitted by our smtp client
allow_disclaimers => 1, # enables disclaimer insertion if available
# notify administrator of locally originating malware
virus_admin_maps => ["root\@$mydomain"],
spam_admin_maps => ["root\@$mydomain"],
warnbadhsender => 1,
# forward to a smtpd service providing DKIM signing service
forward_method => 'smtp:[127.0.0.1]:10027',
# force MTA conversion to 7-bit (e.g. before DKIM signing)
smtpd_discard_ehlo_keywords => ['8BITMIME'],
bypass_banned_checks_maps => [1], # allow sending any file names and types
terminate_dsn_on_notify_success => 0, # don't remove NOTIFY=SUCCESS option
};
$interface_policy{'SOCK'} = 'AM.PDP-SOCK'; # only applies with $unix_socketname
$policy_bank{'AM.PDP-SOCK'} = {
protocol => 'AM.PDP',
auth_required_release => 0, # do not require secret_id for amavisd-release
};
$sa_tag_level_deflt = 2.0; # add spam info headers if at, or above that level
$sa_tag2_level_deflt = 6.2; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 6.9; # triggers spam evasive actions (e.g. blocks mail)
$sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent
$sa_crediblefrom_dsn_cutoff_level = 18; # likewise, but for a likely valid From
$penpals_bonus_score = 8; # (no effect without a @storage_sql_dsn database)
$penpals_threshold_high = $sa_kill_level_deflt; # don't waste time on hi spam
$bounce_killer_score = 100; # spam score points to add for joe-jobbed bounces
$sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0; # only tests which do not require internet access?
$virus_admin = "root\@$mydomain"; # notifications recip.
$mailfrom_notify_admin = "root\@$mydomain"; # notifications sender
$mailfrom_notify_recip = "root\@$mydomain"; # notifications sender
$mailfrom_notify_spamadmin = "root\@$mydomain"; # notifications sender
$mailfrom_to_quarantine = ''; # null return path; uses original sender if undef
@addr_extension_virus_maps = ('virus');
@addr_extension_banned_maps = ('banned');
@addr_extension_spam_maps = ('spam');
@addr_extension_bad_header_maps = ('badh');
$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA = 100*1024; # bytes (default undef, not enforced)
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes (default undef, not enforced)
$sa_spam_subject_tag = "[SPAM] ";
$defang_virus = 1; # MIME-wrap passed infected mail
$defang_banned = 0; # MIME-wrap passed mail containing banned name
$defang_by_ccat{+CC_BADH.",3"} = 1; # NUL or CR character in header
$defang_by_ccat{+CC_BADH.",5"} = 1; # header line longer than 998 characters
$defang_by_ccat{+CC_BADH.",6"} = 1; # header field syntax error
@keep_decoded_original_maps = (new_RE(
qr'^MAIL-UNDECIPHERABLE, # recheck full mail if it contains undecipherables
qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
));
$banned_filename_re = new_RE(
qr'^\.(exe-ms|dll), # banned file(1) types, rudimentary
[ qr'^\.(rpm|cpio|tar) => 0 ], # allow any in Unix-type archives
qr'.\.(pif|scr)i, # banned extensions - rudimentary
qr'^application/x-msdownloadi, # block these MIME types
qr'^application/x-msdos-programi,
qr'^application/htai,
# block certain double extensions in filenames
qr'\.[^./]*[A-Za-z][^./]*\.\s*(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)[.\s]*i,
qr'.\.(exe|vbs|pif|scr|cpl)i, # banned extension - basic
);
@score_sender_maps = ({ # a by-recipient hash lookup table,
# results from all matching recipient tables are summed
## site-wide opinions about senders (the '.' matches any recipient)
'.' => [ # the _first_ matching sender determines the score boost
new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
[qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
[qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
[qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
[qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
[qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
[qr'^(your_friend|greatoffers)@'i => 5.0],
[qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
),
{ # a hash-type lookup table (associative array)
'nobody@cert.org' => -3.0,
'cert-advisory@us-cert.gov' => -3.0,
'owner-alert@iss.net' => -3.0,
'slashdot@slashdot.org' => -3.0,
'securityfocus.com' => -3.0,
'ntbugtraq@listserv.ntbugtraq.com' => -3.0,
'security-alerts@linuxsecurity.com' => -3.0,
'mailman-announce-admin@python.org' => -3.0,
'amavis-user-admin@lists.sourceforge.net'=> -3.0,
'amavis-user-bounces@lists.sourceforge.net' => -3.0,
'spamassassin.apache.org' => -3.0,
'notification-return@lists.sophos.com' => -3.0,
'owner-postfix-users@postfix.org' => -3.0,
'owner-postfix-announce@postfix.org' => -3.0,
'owner-sendmail-announce@lists.sendmail.org' => -3.0,
'sendmail-announce-request@lists.sendmail.org' => -3.0,
'donotreply@sendmail.org' => -3.0,
'ca+envelope@sendmail.org' => -3.0,
'noreply@freshmeat.net' => -3.0,
'owner-technews@postel.acm.org' => -3.0,
'ietf-123-owner@loki.ietf.org' => -3.0,
'cvs-commits-list-admin@gnome.org' => -3.0,
'rt-users-admin@lists.fsck.com' => -3.0,
'clp-request@comp.nus.edu.sg' => -3.0,
'surveys-errors@lists.nua.ie' => -3.0,
'emailnews@genomeweb.com' => -5.0,
'yahoo-dev-null@yahoo-inc.com' => -3.0,
'returns.groups.yahoo.com' => -3.0,
'clusternews@linuxnetworx.com' => -3.0,
lc('lvs-users-admin@LinuxVirtualServer.org') => -3.0,
lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
# soft-blacklisting (positive score)
'sender@example.net' => 3.0,
'.example.net' => 1.0,
},
], # end of site-wide tables
});
@decoders = (
['mail', \&do_mime_decode],
['asc', \&do_ascii],
['uue', \&do_ascii],
['hqx', \&do_ascii],
['ync', \&do_ascii],
['F', \&do_uncompress, ['unfreeze','freeze -d','melt','fcat'] ],
['Z', \&do_uncompress, ['uncompress','gzip -d','zcat'] ],
['gz', \&do_uncompress, 'gzip -d'],
['gz', \&do_gunzip],
['bz2', \&do_uncompress, 'bzip2 -d'],
['lzo', \&do_uncompress, 'lzop -d'],
['rpm', \&do_uncompress, ['rpm2cpio.pl','rpm2cpio'] ],
['cpio', \&do_pax_cpio, ['pax','gcpio','cpio'] ],
['tar', \&do_pax_cpio, ['pax','gcpio','cpio'] ],
['deb', \&do_ar, 'ar'],
['zip', \&do_unzip],
['7z', \&do_7zip, ['7zr','7za','7z'] ],
['rar', \&do_unrar, ['rar','unrar'] ],
['arj', \&do_unarj, ['arj','unarj'] ],
['arc', \&do_arc, ['nomarch','arc'] ],
['zoo', \&do_zoo, ['zoo','unzoo'] ],
['lha', \&do_lha, 'lha'],
['cab', \&do_cabextract, 'cabextract'],
['tnef', \&do_tnef_ext, 'tnef'],
['tnef', \&do_tnef],
['exe', \&do_executable, ['rar','unrar'], 'lha', ['arj','unarj'] ],
);
$notify_method = 'smtp:[127.0.0.1]:10025';
$forward_method = 'smtp:[127.0.0.1]:10025';
$final_virus_destiny = D_DISCARD;
$final_banned_destiny = D_PASS;
$final_spam_destiny = D_PASS;
$final_bad_header_destiny = D_PASS;
@av_scanners = (
#### http://www.clamav.net/
['ClamAV-clamd',
\&ask_daemon, ["CONTSCAN {}\n", "/tmp/clamd.socket"],
qr/\bOK$/, qr/\bFOUND$/,
qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
);
@av_scanners_backup = (
### http://www.clamav.net/ - backs up clamd or Mail::ClamAV
['ClamAV-clamscan', 'clamscan',
"--stdout --disable-summary -r --tempdir= {}", [0], [1],
qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
);
$sa_debug = 0;
$sa_spam_modifies_subj = 1;
$warnvirussender = 1;
$warnspamsender = 0;
$warnbannedsender = 0;
$warnbadhsender = 0;
$warnvirusrecip = 0;
$warnbannedrecip = 0;
$warn_offsite = 1;
$signed_header_fields{'received'} = 0;
$signed_header_fields{'to'} = 1;
dkim_key("a.cn", "dkim", "/var/lib/dkim/a.cn.pem");
@dkim_signature_options_bysender_maps = ( {
# ------------------------------------
# For domain: a.cn.
# ------------------------------------
# 'd' defaults to a domain of an author/sender address,
# 's' defaults to whatever selector is offered by a matching key
'postmaster@a.cn' => { d => "a.cn", a => 'rsa-sha256', ttl => 7*24*3600 },
#"spam-reporter@a.cn" => { d => "a.cn", a => 'rsa-sha256', ttl => 7*24*3600 },
# explicit 'd' forces a third-party signature on foreign (hosted) domains
"a.cn" => { d => "a.cn", a => 'rsa-sha256', ttl => 10*24*3600 },
#"host1.a.cn" => { d => "host1.a.cn", a => 'rsa-sha256', ttl => 10*24*3600 },
#"host2.a.cn" => { d => "host2.a.cn", a => 'rsa-sha256', ttl => 10*24*3600 },
# ---- End domain: a.cn ----
# catchall defaults
'.' => { a => 'rsa-sha256', c => 'relaxed/simple', ttl => 30*24*3600 },
} );
1; # insure a defined return
从出错信息来看,应该是配置文件有问题。
贴一下这个命令的输出:
# grep -i 'port' /etc/amavisd.conf
spamassassin 不需要启动。amavisd 会调用它来做垃圾邮件扫描。
黑白名单在论坛里已经有过解答,搜索一下
另外:一个问题一个帖子,不要一个帖子里问多个问题。:L
等我把iRedMail玩转了..我会写个完整的安装配置文档的..
其中会包括:
1.Centos 5.2 64bit 的安装
2.php5.2.9(FastCGI)+nginx0.6.35编译安装
3.proftpd(for mysql+quota)编译安装(centos 无此 rpm 源%_%, dag源有)
4.修改iRedMail安装脚本..
5.nginx 泛域名配置
6.64bit下注意事项
太好了。期待分享 :loveliness:
amavisd 启动失败,很可能是因为退出时没有将 pid 文件干掉导致的。尝试删除 /var/amavis/ 目录下的 pid 文件后再启动 amavisd 试试。
消息来源:https://www.redhat.com/archives/nahant- … 00000.html
Red Hat is pleased to announce the availability of the
*beta* release of 4.8 (kernel-2.6.9-82.EL) for the Red Hat
Enterprise Linux 4 family of products including:
- Red Hat Enterprise Linux AS 4 for x86, AMD64/Intel(r) 64,
Itanium Processor Family, S/390, System p and System z
- Red Hat Enterprise Linux ES 4 for x86, AMD64/Intel(r) 64,
and Itanium Processor Family
- Red Hat Enterprise Linux WS 4 for x86, AMD64/Intel(r) 64,
and Itanium Processor Family
- Red Hat Enterprise Linux Desktop 4 for x86 and
AMD64/Intel(r) 64
Red Hat Enterprise Linux 4.8 is in development and therefore the
contents of the beta media kit, the implemented features, and the
supported configurations are subject to change before the release
of the final product. The supplied beta packages and CD and DVD
images are intended for testing purposes only. Remember that
this early access software is not supported and is not intended
for production environments. Benchmark and performance results
cannot be published based on this beta release without explicit
approval from Red Hat.
While anaconda's "upgrade" option will perform an upgrade from
Red Hat Enterprise Linux 4.7 to Red Hat Enterprise Linux 4.8 beta,
there is no guarantee that the upgrade will preserve all of a
system's settings, services, and custom configurations. For this
reason, Red Hat recommends that you perform a fresh installation
rather than an upgrade. Also note that upgrading from beta
release to the GA product is not supported.
The beta testing period is scheduled to continue through
May 1, 2009.
Table of Contents
-----------------
Features
Technology Previews
Accessing the Software
Installation-Related Known Issues
Additional Information
Lifecycle
Documentation
Defect Reporting
Mailing Lists
Features
--------
This release includes the following improvements:
* Encryption and Security Enhancements
- krb5 utilities are now PAM enabled
* System Enhancements
- updated ipmitool to v1.8.10
- rpm now correctly fails on archives larger than 2GB
* Storage Enhancements
- updated device-mapper to 1.02.28
- updated device-mapper-multipath dm_hp_sw handler for HP Storage Arrays
- updated device-mapper-multipath mpath_prio_ontap for improved
error handling on NetApp
- iscsi-initiator-utils now has IPv6 support
* Networking
- Added router solicitation support
- Enforced sg requires tx csum in ethtool
- OFED updated to v1.4
- Added virtio drivers to support KVM hypervisor environments
* Platform Enhancements
- Added new AMD HDMI audio support to ATI HDMI
- Updated Alsa hda driver update from upstream 2008-07-22
- Added support for affected_cpus for cpufreq
- Removed i8042 polling timer
- Fixed and properly detect pmtimer on asus a8v motherboard
- Backport usbfs_mutex in usbfs
* Kernel Improvements
- General Features
- Added "wake_balance" tunable parameter to /proc/sys/kernel/ to
allow the scheduler to run the thread on any available CPU rather
than scheduling it on the optimal CPU.
- Added "max_writeback_pages" tunable parameter to /proc/sys/vm/
to allow the max number of modified pages kupdate writes to disk
per iteration per run
- Added "swap_token_timeout" tunable parameter to /proc/sys/vm/
to provide a valid hold time of swap out protection token.
- Added diskdump support to sata_svw driver
- Limits 32 bit kernel to boot on systems with more than 64GB of
RAM to 64G max.
- Improved reliability of Autofs
- Added support for 'rdattr_error' in NFSv4 readdir request
- Fixed various short packet handling for NFSv4 readdir and sunrpc issues
- Updated CIFS to latest upstream
- Architecture Specific Support
+ x86/x86_64
- Added Intel ibex peak PCH support
- Added initialization vendor info in boot_cpu_data
+ PPC64
- Added support for digi pci-e gen1 4-8 port async io adapter on
i/p6 servers
- Updated ehea driver from version 0078-04 to 0078-08
- Updated logging of checksum errors in ehea driver
+ s390x
- Added support for N_Port ID Virtualization (NPIV) to zFCP
- New Driver support or Driver Updates
+ Network Driver Updates
- Updated forcedeth driver to latest upstream version 0.61
- Fixed various e1000 issues with e1000_clean_tx_irq call from e1000_netpoll
and restart receive unit on esb2 hardware
- Updated e1000e driver to upstream version 0.3.3.3-k6
- Updated igb to upstream version 1.2.45-k2
- Updated tg3 to upstream version 3.96
- Updated ixgbe to upstream version 1.3.18-k4
- Updated bnx2 to upstream version 1.7.9
- Updated bnx2x to upstream version 1.45.23
- Added netxen 3031 initial and msi-x support and fw bugfixes
enhancement
- Improved netxen 2031 tx locking, interrupt handling, ethtool support
- Added realtek support for 8111cp and 8111bp with Intel Tylersburg chipset
+ Storage Driver Updates
- Fixed various SCSI layer issues such as
* avoid an unnecessary error message
* handle async iscsi scsi sense events
* harden against possible data corrupter
* sd driver calls revalidate_disk wrapper
- Fixed dm-raid bug with reduce io delay in dm-raid1
- Removed quirk aac_quirk_scsi_32 for some aaccraid controllers
- Updated fcp driver with backport of fcp point to point connection support
- Updated lpfc to version 8.0.16.46
- Updated megaraid_sas to version 4.01-rh1
- Updated mptfusion driver to version 3.12.29.00rh
- Updated qla2xxx firmware to 4.06.01 for 4GB/s and 8GB/s adapters
- Updated qla2xxx driver to version 8.02.09.00.04.08-d
- Fixed sata_nv in libsata to disable adma by default
* Laptop and Desktop Enhancements
- Better support for Graphire CTE-440 and Graphire4
* Developer Enhancements
- Red Hat is moving GCC4 in Enterprise Linux 4 from Tech Preview
to supported with the following caveats:
- GCC4 in Enterprise Linux 4 is not fully ABI compatible
with Red Hat Enterprise Linux 5:
* Applications compiled on the older version, Enterprise
Linux 4, are expected to continue to work on the newer
version 5 as long as they use libraries, that are also
supported on Enterprise Linux 5 (either directly or via
compatibility libraries).
* Applications compiled on Enterprise Linux 5 on the other
hand, may *not* run on the older version, Red Hat
Enterprise Linux 4.
- In Red Hat Enterprise Linux 4, gcc 3.4.6 libstdc++ is used
(including its headers). While the Enterprise Linux 5
libstdc++ is backward compatible with that, there are
symbol additions etc. Now, both libraries have the same
SONAME and it is not feasible to have two different
libraries with identical SONAME. Also, Red Hat is not
backporting any of these changes to Red Hat Enterprise
Linux 4. This is consistent with Red Hat's policy to
avoid introducing incompatibilities into an existing
version, that would be problematic for ISVs. These types
of changes are reserved for major releases (e.g. going
from 4 to 5).
- Certain features couldn't be added to RHEL4 gcc4, because
the rest of the toolchain doesn't have the needed support
(glibc, binutils). Again, the reason for not backporting
these features, is to avoid introducing incompatibilities
into a an existing version of Red Hat Enterprise Linux.
Affected features are mainly:
- 128 bit long double on ppc/ppc64/s390/s390x
- -msecure-plt on ppc
- the big C++ visibility changes
- -fstack-protector
- --hash-style=gnu, --hash-style=both
Technology Previews
-------------------
Technology Preview features are included in Red Hat Enterprise
Linux to provide the features with wide exposure with the goal
of supporting these features in a future release of Red Hat
Enterprise Linux. Technology Preview features are not supported
under Red Hat Enterprise Linux 4.8 subscription services and may
not be functionally complete. Red Hat welcomes customer
feedback and suggestions for Technology Previews. Advisories
will be provided for high-severity security issues in Technology
Preview features.
There were no new or enhanced Technology Preview features in
Red Hat Enterprise Linux 4.8 beta. A previously available Technology Preview remains in Technology
Preview status:
- GCJ Java
A previously available Technology Preview has been removed:
- frysk
Accessing the Software
----------------------
Red Hat Enterprise Linux 4.8 is available to existing
Red Hat Enterprise Linux subscribers via RHN. The
channels will automatically appear in your account.
Installable binary and source ISO images are available
via Red Hat Network at:
https://rhn.redhat.com/network/software/download_isos_full.pxt
You will be required to log in using a valid RHN account
with active entitlements.
Red Hat Enterprise Linux 4.8 errata are available at:
https://rhn.redhat.com/
Installation-Related Known Issues
---------------------------------
The following are known installation related issues in the
release:
480793 - [Anaconda] raise SystemError, "lvcreate failed for %s"%(self.name,)
484908 - Unresolvable chain of dependencies for openmpi-libs 1.2.8-3.el4
488763 - PPC systems are unable to install via CD/DVD media, other methods work.
Additional Information
----------------------
Additional information is provided below on Lifecycle, Documentation,
Defect Reporting, and Mailing Lists.
Enjoy the Red Hat Enterprise Linux 4.8 release.
Sincerely,
The Red Hat Enterprise Linux Team
----------------------------------------------------------------------
Lifecycle
---------
The Red Hat Enterprise Linux 4 Life Cycle is available at:
https://www.redhat.com/security/updates/errata/
As previously announced, the release of Red Hat Enterprise
Linux 4.8 will mark the beginning of Production 2 phase of
the Red Hat Enterprise Linux 4. No new hardware enablement
will be expected during this phase.
https://www.redhat.com/archives/nahant-list/2008-July/msg00059.html
Customers should note that their subscriptions provide access to all
currently supported versions of Red Hat Enterprise Linux.
Documentation
-------------
Red Hat Enterprise Linux 4 Release Notes are available at:
http://www.redhat.com/docs/manuals/enterprise/
The Release Notes are also on your Red Hat Enterprise
Linux 4 installed system in the redhat-release package.
Defect Reporting
----------------
Red Hat Enterprise Linux 4.8 customers using the Technical
Account Manager (TAM) Service should raise all issues and
questions with this release using your current Issue Tracker
account. If you're interested in the Technical Account
Manager Service visit:
https://www.redhat.com/support/offerings/technical.html
All other customers can raise questions and issues through
the normal Red Hat support channels. Details can be found
at:
https://www.redhat.com/support/process/
While defects can be reported using Red Hat's Bugzilla,
please be advised that Bugzilla is not a support tool and
thus does not offer any Service Level Agreement (SLA) for
issues reported through that channel. Therefore, while
sufficient for defects found during testing a Beta product,
customers should *NOT* rely on Bugzilla when reporting
production issues.
Mailing Lists
-------------
Red Hat has a public mailing list for communication during
this and all future Red Hat Enterprise Linux 4 programs.
* rhelv4-announce redhat com
A low-volume, moderated, announcement-only mailing list.
Red Hat will use this list to communicate one-way
information about RHEL 4 programs, such as notifications
when releases are available or solicitations for feedback.
Subscribe at:
https://listman.redhat.com/mailman/listinfo/rhelv4-announce
* nahant-beta-list redhat com
A public general discussion mailing list for users of
Red Hat Enterprise Linux 4 releases. Subscribe at:
https://www.redhat.com/mailman/listinfo/nahant-beta-list
Mar 13 12:31:42 mail postfix/smtp[3212]: connect to 127.0.0.1[127.0.0.1]:10024: Connection refused
你的 amavisd 服务没有启动,尝试重新启动一下。
问题二.
SPF 和 DKIM 是不是必须设置...用与不用对mail server的影响是什么..对收发邮件有何影响.
不是必须,但是有利于你的邮件被对方接收。
问题三.
可不可以停止clamd服务,停止后对mail server的影响是什么..对收发邮件有何影响.
可以停止。
影响是:你的邮件不会得到病毒检测功能。
http://dovecot.org/tmp/dovecot-1.1.12.rc.tar.gz
I would have already released 1.1.12, but it needed the MAILBOXDIR
change described below, and I'm slightly worried that it might have
broken some special setup. So please test first and I'll release in
v1.1.12 then in a few days.
* Added :MAILBOXDIR= to mail_location to specify the root dir for
mailboxes. dbox users should migrate to ":MAILBOXDIR=mailboxes",
because that's going to be the default in v1.2+.
- IMAP: SELECT didn't always return first unseen message in reply
- POP3: pop3_lock_session=yes didn't use mail_privileged_group while
dotlocking.
- mbox: Don't crash if >=8192 bytes long line begins with "From ".
- Maildir: More fixes to handling over 26 keywords.
- Several logging fixes and improvements
- Fixed authentication caching with non-plaintext mechanisms when
using a blocking passdb (e.g. MySQL)
- Fixed DIGEST-MD5 authentication with user@domain style usernames.
http://iredmail.googlecode.com/svn/trun … p_MySQL.sh
通用的。当然也适用于 0.4.0。
yum 仓库是必须的,用于安装一些依赖包。
Error: vpopmail conflicts with postfix
Error: Missing Dependency: php = 5.1.6 is needed by package php-eaccelerator
1:vpopmail 和 postfix 包有冲突。
vpopmail 应该是提供 POP3/IMAP 服务的软件吧?iRedMail 里使用的是 Dovecot。所以如果你的系统不需要这个包,可以将 vpopmail 删除后重新尝试一下。
2:iRedMail 里带了 php-eaccelerator 这个包,但是它依赖 php-5.1.6,而你的系统的 PHP 版本似乎不一样。你可以尝试在 functions/packages.sh 里将 php-eaccelerator 这个包去掉,然后重试。
我觉得这是客观的以技术角度做的分析,而不是主观的好恶。
做为 iRedMail 项目的整合人员,之前带了 ExtMail,有用户实际部署了它,而我们现在突然去掉这个组件,那就必须对这些用户有个交代。
管理后台已经进入实质性开发阶段。
这里搜索 DNS name whitelisting:
http://policyd.sourceforge.net/readme.html
这是你给的参考文章中的格式:
pva.pt brokensmtp:[some.ip.add.ress]
它怎么写,你也可以怎么写。
将 MYSQL 里transport 的值得改为和它格式一样就可以了。
应该不是 dkim 的问题。但是你给的日志信息不够详细,没法判断。
iRedOS 会等 CentOS 5.3。:lol
完整的 ChangeLog: http://trac.roundcube.net/browser/trunk … /CHANGELOG
Hi folks
This service update includes more than 40 bug fixes together with some
security improvements. We also added TNEF support to decode those
proprietary MS Outlook attachments (winmail.dat) and tuned the performance
when displaying a message. Some translations have been updated since the
0.2-stable relase and are also included in the package.
This release is considered stable and we recommend to upgrade all existing
installations to this version. Download it from
http://roundcube.net/downloads and read the UPGRADING instructions.
We kindly request all packagers to update their distributions with this new
version. As usual, a pure GPL version is available here:
https://sourceforge.net/project/showfiles.php?group_id=139281&package_id=237724
Unfortunately there are still some translations waiting to be completed.
See http://translator.roundcube.net for the current completeness status and
feel free to translate the missing labels and messages. Please send the
updated files (packed in an archive) to our developers mailing list.
Cheers!
Thomas
_______________________________________________
List info: http://lists.roundcube.net/dev/
中文版发布声明:
Hi, all.
经过近 4 个月的完善,iRedMail-0.4.0 稳定版发布了。iRedOS 将会在 CentOS
5.3 发布之后推出,请大家耐心等待。
iRedMail 是针对 Red Hat(R) Enterprise Linux 和 CentOS 设计的邮件服务
解决方案,是在操作系统安装好后使用的一套 shell 脚本,用于快速部署一套
功能完善的邮件服务器解决方案。
- 基于 GPL v2 版权发布。
- 目前支持的操作系统:Red Hat(R) Enterprise Linux, CentOS。
- 支持的操作系统版本:5.0, 5.1, 5.2, 5.3
* 项目首页:
http://www.iredmail.org/
* 下载地址:
http://code.google.com/p/iredmail/downloads/list
* 安装指南:
http://www.iredmail.org/wiki/index.php?title=IRedMail_Installation_Guide
* 如果您在安装和使用的过程中碰到问题,可以到论坛发贴讨论:
http://www.iredmail.org/bbs/index.php
* 如果您已经在使用 iRedMail/iRedOS,希望您能帮助我们,以支持项目的继续
发展和长期存在:
http://www.iredmail.org/wiki/index.php?title=Help_US
后续的开发工作将集中在 bug 修正,细节的改进,以及管理后台的开发。非常欢迎
您将自己的需求、改进建议发布在项目的论坛上:
http://www.iredmail.org/bbs/index.php
以下是自 0.3.2 版本以来的主要更新,更详细的更新信息请查看 ChangeLog
文件:
http://iredmail.googlecode.com/svn/trunk/iRedMail/ChangeLog
* 所有核心组件都升级到最新稳定版:
- Postfix-2.5.6
- Dovecot-1.1.11, dovecot-sieve-1.1.6
- Amavisd-new-2.6.2
- Roundcube-0.2-stable
- awstats-6.9
- phpLDAPadmin-1.1.0.6
- rrdtool-1.2.30
* 本次发布移除了以下组件:
- ExtMail
具体原因请参考论坛帖子:iRedMail 项目组为何决定去掉 ExtMail?
http://www.iredmail.org/bbs/viewthread.php?tid=590&extra=page%3D1
已部署了 ExtMail 的用户,我们会为您迁移到 Roundcube 提供全面的技术
支持。
- Mailgraph
原因:统计失效,形同鸡肋。但不排除后续版本对它做增强,并再次加入。
* 新功能和主要的改进:
- [安装程序] 在安装过程会提示您选择 webmail 程序的默认语言。
- [增强] 极大地扩展了 LDAP schema。
注意:如果您使用 0.3.2 版本部署基于 LDAP 的方案,此次升级需要修改
LDIF 结构。具体请参考稍后发布的升级指南。
- [增强] 所有基于 web 的管理程序默认都只能通过 https 访问,增强安全
性。例如 PostfixAdmin,phpMyAdmin,phpLDAPadmin,Awstats。
- [增强] 在 Apache 中添加 <Directory> 容器用于禁止 webmail 程序目录
的自动索引。感谢 muniao@gmail 的反馈和建议。
- [增强] 增加了 HELO 检测规则,使反垃圾效果得到至少 10% 的提升。
- [增强] 将 Postfix 队列重新投递时间改为 '300s'。
- [增强] 将 Postfix maximal_queue_lifetime 和 bounce_queue_lifetime
参数设置为 '1d'。感谢 muniao@gmail 的反馈和建议。
- [增强] Awstats 现在直接使用 LDAP/MySQL 里的管理员账号来做用户验证。
- [增强] OpenLDAP 默认使用 SSHA 加密机制。
- [新] 为 Roundcube 增加插件,用户现在可以自定义邮件过滤规则。
- [新] 为 Roundcube 增加插件,用户现在可以自行修改密码。
注:可以修改 MySQL 和 LDAP 的密码。感谢 jungleji@gmail 帮忙制作
修改 LDAP 密码的插件。
- [新] 增加几个脚本做为系统管理员的辅助工具:
+ tools/create_mail_user_OpenLDAP.sh:用于创建 LDAP 用户
+ tools/create_mail_user_MySQL.sh:用于创建 MySQL 用户
+ tools/backup_iRedMail.sh:用于备份整个邮件系统
+ tools/get_helo_count.sh:统计 HELO 标识出现的次数
--
iRedMail Team
- Open Source Mail Server Solution for RHEL/CentOS 5.x:
http://code.google.com/p/iredmail/
英文版的发布声明:
Hi, all.
We are pleased to announce that iRedMail-0.4-stable released.
- Download page: http://code.google.com/p/iredmail/downloads/list
- Home page: http://code.google.com/p/iredmail/
- Installation Guide:
http://code.google.com/p/iredmail/wiki/Installation
Questions should be post to google group:
- Group: http://groups.google.com/group/iredmail/
Please consider donating us for further development and continue to
exist:
- Donate us: http://code.google.com/p/iredmail/wiki/DonateUS
Below are major improvements in 0.4-stable, for more detail, please
refer to ChangeLog file:
- ChangeLog: http://iredmail.googlecode.com/svn/trunk/iRedMail/ChangeLog
* New features & Improvement:
- [Installer] It now will prompt to choose the default language for
webmails during installation wizard.
- [Improvement] Big improvement on LDAP schema.
Note: Manually update required: use 'enabledService=XXX' instead
of 'enableXXXService=yes', please refer to upgrade guide.
- [Improvement] All web-based admin tools are accessed via https by
default, such as PostfixAdmin, phpMyAdmin, phpLDAPadmin, awstats.
- [Improvement] Add <Directory> container to disable autoindex in
apache. Thanks muniao@gmail.
- [Improvement] Improve HELO restriction rules, reduce spam for one
more 10%.
- [Improvement] Reduce postfix queue run retry time to '300s'.
- [Improvement] Set maximal_queue_lifetime and bounce_queue_lifetime
to '1d'. Thanks muniao@gmail.
- [Improvement] Awstats now use LDAP/MySQL to auth user.
- [New] Add managesieve plugin in Roundcube for users to customize
mail filter rules.
- [New] Add change password plugin in Roundcube.
- [New] Add several shell script tools:
+ tools/create_mail_user_OpenLDAP.sh: create LDAP mail users
+ tools/create_mail_user_MySQL.sh: create MySQL mail users
+ tools/backup_iRedMail.sh: backup mail system.
+ tools/get_helo_count.sh: count helo identifier in maillog
* Major components were up to date:
- Postfix-2.5.6
- Dovecot-1.1.11, dovecot-sieve-1.1.6
- Amavisd-new-2.6.2
- Roundcube-0.2-stable
- awstats-6.9
- phpLDAPadmin-1.1.0.6
- rrdtool-1.2.30
* Packages/Components removed:
- ExtMail (webmail program wroten in perl)
- Mailgraph
* Fixed:
- Fix postfix aliases file.
- Fix crontab job for purge expired mails in dovecot. Thanks xcrossbow@gmail.
- Fix incorrect crontab job for vmail user. Thanks xcrossbow@gmail.
- Fix incorrect parameter in postfix ldap lookup table:
debug_level => debuglevel.
iRedMail-0.4 里将不带 ExtMail,所以也没有 ExtMan。
本贴由 iRedMail 开发人员 Zhang Huangbin 代表 iRedMail 项目组撰文并发布,仅供各位朋友参考。
我们的原则是:绝不会反对大家使用某个软件,但也许会推荐大家使用另外一些
软件。
这是我们在整合 ExtMail 到 iRedMail 方案的过程中发现的问题和一些考虑,仅供
参考:
* 直接操作文件的方式而不是通过 IMAP 协议来处理邮件,是最大的败笔,
IMAP 协议的优势都没了,IMAP 软件实现的一些功能也都没了。由此产生
了 N 多问题。当然,这点也恰恰是它的其它亮点的来源,比如网络磁盘。
这里说一下问题吧,给大家做个参考。
- 必须用 Apache 的 SuExec。很可惜,OpenBSD 自带的 Apache 没有
suexec。
- ExtMail 程序的 Owner 必须设置为处理邮件(MDA)的用户。
- 如果你要 chroot Apache,你还得把存放邮件的目录也放在 chroot
目录里。你觉得危险不?
- 无法自动创建用户的 Maildir/Mailbox。这个一般 IMAP/POP3 服务器
会帮你搞定,例如 Dovecot,可是 ExtMail 就是不实现,而是放在
ExtMan 管理后台去实现。
PS:iRedMail 开发组制作了补丁让 ExtMail 在文件系统上自动建立
用户的邮箱,也反馈到 ExtMail 论坛,但是没人理会。
- Web Mail 程序和 IMAP 服务器软件(例如:Courier-IMAP, Dovecot)
可以部署到不同的服务器上,有利于你做负载均衡。但用 ExtMail 却
似乎只能通过共享存储来实现这样的负载均衡?
那使用 IMAP 操作邮箱的好处呢?
- 你的 Apache 可以被放在 chroot 环境,你不需要使用虚拟主机,
你不需要使用 SuExec。
- ExtMail 说是开源,也确实可以获得源代码,但是,但是,有缺陷。
怎么说呢?
+ 安全问题。cgi 的安全问题是比较头痛的,要写出安全的 cgi
程序,需要有比较丰富的经验。我相信 ExtMail 团队的开发人员
都比较有经验,我只是对 CGI 比较头痛。
当然,任何一个事物、项目都需要成长的时间。你可以期待它,但
是对它的优缺点也要有个权衡。
+ ExtMail 的技术支持很弱。在论坛里贴帖子,难以得到回复。就
不说“及时”回复了。我贴了个 bug report,几个月了没人理。
当然,我也不知道它是否已经修正了。这也牵涉到第三点:
+ 源代码。ExtMail 说是 GPL 的,没错,确实也可以获取到源代码,
但是没有 svn 仓库可以跟踪它的进展。而 ExtMail Team 似乎
并不打算开放 svn/cvs 浏览权限给大家。。
* 不支持 OpenLDAP 里默认使用的 SSHA 加密算法。这个似乎是比较容易的
事情吧?但是比较遗憾,开发人员似乎都只用 MD5。
那使用 SquirrelMail/Roundcubemail 这类的程序,相对而言,有哪些优势呢?
* 更多人使用。这意味着什么?表示漏洞会更快被发现,并更快被解决。
在这里也建议所有使用 Roundcubemail 或其它软件在生产环境的系统
管理员,订阅你所使用的软件的邮件列表,以跟踪它的进展。例如
announcement 列表等,这样有 security fix 之类的补丁,你才能及时
升级。
* 更 "Open Source"。当然,这个只是玩笑话。我的意思是,它们的开发更
透明,让使用者更放心。
另外,对于 Web Mail 程序的执着,建议大家客观地分析一下:
* 你的用户有多少时间是使用 Web Mail,有多少时间是使用 Outlook,
Foxmail?
我个人始终觉得,webmail 不过是紧急时候的替代品而已,始终使用 webmail 的
人,多么?
I'm happy to announce a new virt-manager release, version 0.7.0. The
release can be downloaded from:
http://virt-manager.org/download.html
The direct download link is:
http://virt-manager.org/download/sources/virt-manager/virt-manager-0.7.0.tar.gz
This release includes:
- Redesigned 'New Virtual Machine' wizard
(Jeremy Perry, Tim Allen, Cole Robinson)
- Option to remove storage when deleting a virtual machine.
- File browser for libvirt storage pools and volumes, for use when
attaching storage to a new or existing guest.
- Physical device assignment (PCI, USB) for existing virtual machines.
- Bug fixes and minor improvements.
Thanks to everyone who has contributed to this release through testing,
bug reporting, submitting patches, and otherwise sending in feedback!
Thanks,
Cole
_______________________________________________
et-mgmt-tools mailing list
et-mgmt-tools@redhat.com
https://www.redhat.com/mailman/listinfo/et-mgmt-tools
iRedMail 开源邮件服务解决方案 » 由 ZhangHuangbin 发表的文章
Powered by PunBB, supported by Informer Technologies, Inc.
Currently installed 3 official extensions. Copyright © 2003–2010 PunBB.
页面生成时间 0.086 秒, 共执行查询 39 条