From 9998416590e2c7ed304020f480d72fea60de2522 Mon Sep 17 00:00:00 2001 From: Christoph Date: Mon, 25 Jul 2016 22:50:36 +0200 Subject: [PATCH 1/3] Add paths to CA to postifx Fixes untrusted TLS connections See: http://giantdorks.org/alain/fix-for-postfix-untrusted-certificate-tls-error/ --- target/postfix/main.cf | 2 ++ 1 file changed, 2 insertions(+) diff --git a/target/postfix/main.cf b/target/postfix/main.cf index 4ab8c0d9..1b77a283 100644 --- a/target/postfix/main.cf +++ b/target/postfix/main.cf @@ -33,6 +33,8 @@ smtp_tls_protocols=!SSLv2,!SSLv3 smtpd_tls_mandatory_ciphers = high smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3 smtpd_tls_exclude_ciphers = aNULL, LOW, EXP, MEDIUM, ADH, AECDH, MD5, DSS, ECDSA, CAMELLIA128, 3DES, CAMELLIA256, RSA+AES, eNULL +smtpd_tls_CApath = /etc/ssl/certs +smtp_tls_CApath = /etc/ssl/certs # Settings to prevent SPAM early smtpd_helo_required = yes From 43b366aaadeb7dc2a99b2569c1855cc62670b123 Mon Sep 17 00:00:00 2001 From: Kyle Ondy Date: Thu, 28 Jul 2016 14:34:20 -0400 Subject: [PATCH 2/3] Add echo when Fail2ban is enabled --- target/start-mailserver.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/target/start-mailserver.sh b/target/start-mailserver.sh index 37859b28..9d6a56cf 100644 --- a/target/start-mailserver.sh +++ b/target/start-mailserver.sh @@ -264,6 +264,7 @@ SA_KILL=${SA_KILL:="6.31"} && sed -i -r 's/^\$sa_kill_level_deflt (.*);/\$sa_kil test -e /tmp/docker-mailserver/spamassassin-rules.cf && cp /tmp/docker-mailserver/spamassassin-rules.cf /etc/spamassassin/ if [ "$ENABLE_FAIL2BAN" = 1 ]; then + echo "Fail2ban enabled" test -e /tmp/docker-mailserver/fail2ban-jail.cf && cp /tmp/docker-mailserver/fail2ban-jail.cf /etc/fail2ban/jail.local else # Disable logrotate config for fail2ban if not enabled From f4f70899c9f657159e536b7659d50c689282f68e Mon Sep 17 00:00:00 2001 From: Kyle Ondy Date: Thu, 28 Jul 2016 14:35:09 -0400 Subject: [PATCH 3/3] Add echo when sieve managemnt is enabled --- target/start-mailserver.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/target/start-mailserver.sh b/target/start-mailserver.sh index 9d6a56cf..31bdae72 100644 --- a/target/start-mailserver.sh +++ b/target/start-mailserver.sh @@ -304,6 +304,7 @@ cron # Enable Managesieve service by setting the symlink # to the configuration file Dovecot will actually find if [ "$ENABLE_MANAGESIEVE" = 1 ]; then + echo "Sieve management enabled" mv /etc/dovecot/protocols.d/managesieved.protocol.disab /etc/dovecot/protocols.d/managesieved.protocol fi