SMF - Just Installed!
xfs_growfs /dev/centos/root
sudo -u www-data php8.2 occ upgrade
sudo -u www-data php8.2 occ maintenance:mode --off
openssl s_client -starttls smtp -connect smtp.yandex.ru:587
openssl s_client -connect smtp.yandex.ru:465
ehlo
Цитировать250-relay.im-cloud.site Hello [192.168.0.15]
250-SIZE 10485760
250-PIPELINING
250-DSN
250-ENHANCEDSTATUSCODES
250-X-ANONYMOUSTLS
250-AUTH LOGIN PLAINT
250-X-EXPS GSSAPI NTLM
250-8BITMIME
250-BINARYMIME
250-CHUNKING
250-XEXCH50
250-XRDST
250 XSHADOW
echo -ne "текст" | base64
[System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes("текст"))
perl -MMIME::Base64 -e "print encode_base64('текст');"
AUTH LOGIN
Цитировать334 VXNlcm5hbWU6
ZG1vc2s=
Цитировать334 UGFzc3dvcmQ6
cGFzc3dvcmQ=
Цитировать235 2.0.0 Authentication successful
echo -ne "\0username\0password" | base64
[System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes("\0username\0password"))
AUTH PLAIN
Цитировать334 VXNlcm5hbWU6
cd /var/www/nextcloud/
sudo -u www-data php8.2 updater/updater.phar --no-interaction
php -v
postconf -n smtpd_banner
postconf -n myhostname
Цитироватьhostname
mkdir -p /var/lib/dkim
DOMAIN=$(hostname -d)
$inet_socket_port = [10024,10026];
$forward_method = 'smtp:[127.0.0.1]:10025';
$notify_method = $forward_method;
$interface_policy{'10026'} = 'ORIGINATING';
$policy_bank{'ORIGINATING'} = {
originating => 1,
smtpd_discard_ehlo_keywords => ['8BITMIME'],
os_fingerprint_method => undef,
bypass_banned_checks_maps => [1],
bypass_header_checks_maps => [1],
bypass_banned_checks_maps => [1],
virus_admin_maps => ["virusalert\@$mydomain"],
};
vi /etc/amavis/conf.d/50-user
$enable_dkim_verification = 1;
$enable_dkim_signing = 1;
dkim_key('im-cloud.site', "dkim", "/var/lib/dkim/im-cloud.site.pem");
@dkim_signature_options_bysender_maps = ( {
"im-cloud.site" => { d => "im-cloud.site", a => 'rsa-sha256', ttl => 10*24*3600 },
});
systemctl restart amavis
amavisd-new showkeys
amavisd-new testkeys
vi /etc/postfix/master.cf
smtp inet n - y - - smtpd
-o content_filter=scan:[127.0.0.1]:10026
submission inet n - n - - smtpd
-o content_filter=scan:[127.0.0.1]:10026
smtps inet n - n - - smtpd
-o content_filter=scan:[127.0.0.1]:10026
127.0.0.1:10027 inet n - n - 16 smtpd
-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks_style=host
-o smtpd_authorized_xforward_hosts=127.0.0.0/8
systemctl restart postfix
vi /var/www/html/webmail/config/config.inc.php
$config['smtp_server'] = 'tls://localhost';
...
$config['smtp_port'] = 587;
vi /etc/postfix/main.cf
check_sender_access hash:/etc/postfix/sender_access
vi /etc/postfix/sender_access
im-cloud.site REJECT Relay from im-cloud.site are denied
postmap /etc/postfix/sender_access
systemctl restart postfix
apt install postfix-policyd-spf-python
vi /etc/postfix/main.cf
policy-spf_time_limit = 3600s
smtpd_recipient_restrictions =
...
check_policy_service unix:private/policy-spf
permit
vi /etc/postfix/master.cf
policy-spf unix - n n - - spawn
user=nobody argv=/usr/bin/policyd-spf
systemctl restart postfix
vi /etc/postfix-policyd-spf-python/policyd-spf.conf
HELO_reject = Fail
Mail_From_reject = Softfail
man policyd-spf.conf
mailq
postqueue -p
mailq -q
postqueue -f
postsuper -d ALL
postqueue -p | tail -n +2 | awk 'BEGIN { RS = "" } /spammer@email\.com/ { print $1 }' | tr -d '*!' | postsuper -d -
find /var/spool/postfix/deferred -type f | wc -l
find /var/spool/postfix/active -type f | wc -l
find /var/spool/postfix/incoming -type f | wc -l
find /var/spool/postfix/defer -type f | wc -l
postsuper -r ALL
postfix stop
postsuper -r ALL
postfix start
postconf -e "queue_run_delay = 5m"
postconf -e "minimal_backoff_time = 10m"
postconf -e "maximal_backoff_time = 15m"
postconf -e "maximal_queue_lifetime = 1d"
service postfix restart || systemctl restart postfix