/etc/postfix/main.cf:
Code: Alles auswählen
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
######## ____ PATHs ____ ########
#
alias_maps = hash:/etc/aliases,
hash:/www/ml.trillke.net/data/aliases
alias_database = hash:/etc/aliases
mail_spool_directory = /var/mail
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/lib/postfix
sendmail_path = /usr/sbin/sendmail
newaliases_path = /usr/bin/newaliases
mailq_path = /usr/bin/mailq
home_mailbox = Maildir/
mailbox_command = /usr/lib/dovecot/deliver -c /etc/dovecot/conf.d/01-dovecot-postfix.conf -n -m "${EXTENSION}"
virtual_alias_domains = wir-ag.net www.trillke.net
virtual_alias_maps = hash:/etc/postfix/virtual
# directly route mail for domains that I am secondary for, to prevent loops with relayhost
transport_maps = hash:/etc/postfix/transport
# domain rewriting on sender addresses of outgoing mail:
sender_canonical_maps = hash:/etc/postfix/sender_canonical
#
#
######## ____ NAMES & DOMAINS ____ ########
#
smtpd_banner = trillke.net ESMTP (Linux)
myhostname = trillke.net
myorigin = trillke.net
mydestination = trillke.net, trillke, trillke.de,
home.trillke.net, home.trillke,
localhost, localhost.trillke,
relay_domains = hiss.org, hiss.han.de, phlix.org, phlix.de, marvin.trillke.net, howto.trillke.net
mail_owner = postfix
setgid_group = postdrop
#
#
######## ____ TUNING & SIZE ____ ########
#
#in_flow_delay = 10
message_size_limit = 25000000
default_destination_concurrency_limit = 2
local_destination_concurrency_limit = 2
#debug_peer_level = 2
mailbox_size_limit = 0
biff = no
#
#
######## ____ RULES ____ ########
#
# relay ALL outgoing email to external host to omit blacklists that lists our IP for viruses etc.
#relayhost=[extern.trillke.net]
#relayhost =
inet_interfaces = all
inet_protocols = all
mynetworks = 127.0.0.0/8 !10.9.1.10/32 10.9.0.0/16
# reminder: there are firewall rules blocking some connections on port 25
unknown_local_recipient_reject_code = 550
permit_mx_backup = yes
# for mailman
owner_request_special = no
recipient_delimiter = +
# appending .domain is the MUA's job.
append_dot_mydomain = no
disable_vrfy_command = yes
strict_rfc821_envelopes = yes
smtpd_helo_required = yes
smtpd_recipient_restrictions = reject_unknown_sender_domain, reject_unknown_recipient_domain, reject_unauth_pipelining, permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination
# basics:
# more advanced:
### call greylisting daemon "postgrey"
#check_policy_service inet:127.0.0.1:60000
### DNS BLACKLISTS
#
# Heise/iX Project: http://www.dnsbl.manitu.net http://www.heise.de/ix/nixspam
#
# relays.dnsbl.sorbs.net is a aggregated zone for:
# Open HTTP Proxy Servers: http.dnsbl.sorbs.net
# Open SOCKS Proxy Servers: socks.dnsbl.sorbs.net
# other open Proxy Servers: misc.dnsbl.sorbs.net
# Open SMTP relay servers: smtp.dnsbl.sorbs.net
# http://www.de.sorbs.net/using.shtml
#NOT YET TRIED:reject_rbl_client relays.dnsbl.sorbs.net,
#
# web servers and other IPs with spammer abusable vulnerabilities (e.g. FormMail scripts):
#
# networks hijacked, some already used for spamming:
#NOT YET TRIED:reject_rbl_client zombie.dnsbl.sorbs.net,
#
# domain names' owners have indicated no email should ever originate from:
#
# bekannte spamquellen, ABER: GONE!
#reject_rbl_client list.dsbl.org,
#
# gmail.com listed :-( "Passive Spam Block List" IPs sending spam to trap, http://psbl.surriel.com
#reject_rbl_client psbl.surriel.com,
#
# dial up, ABER: too many business partners at home listed:
#reject_rbl_client dul.dnsbl.sorbs.net,
#
# bekannte spamquellen, ABER: blockiert gerne "strato" UND erpresste nic.at siehe c't 16/07 S.3
#reject_rbl_client sbl-xbl.spamhaus.org,
#
# handgepflegte liste, ABER: zu wichtige Mailkontakte sind in der Liste gelandet
#reject_rbl_client bl.spamcop.net
### END OF DNS BLACKLISTS
#
#
######## ____ TLS & SASL ____ ########
#
# TLS with smtpd: encrypting session when receiving mails
smtpd_use_tls = yes
smtpd_tls_key_file = /etc/ssl/server.pem
smtpd_tls_cert_file = /etc/ssl/server.pem
smtpd_tls_CAfile = /etc/ssl/server.pem
smtpd_tls_CApath = /etc/ssl/certs
#smtpd_tls_loglevel = 1
smtpd_tls_received_header = yes
smtpd_tls_session_cache_timeout = 3600s
tls_random_source = dev:/dev/urandom
smtpd_tls_auth_only = yes
# TLS with smtp: encryption session when sending mails to other servers
smtp_use_tls = yes
smtp_tls_cert_file = /etc/ssl/server.pem
smtp_tls_key_file = /etc/ssl/server.pem
smtp_tls_CAfile = /etc/ssl/server.pem
smtp_tls_CApath = /etc/ssl/certs
#smtp_tls_loglevel = 1
# SASL SERVER: name and password authentication of incomin clients
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_sasl_application_name = smtpd
smtpd_sasl_path = /var/spool/postfix/private/dovecot-auth
smtpd_sasl_local_domain = $myhostname
# SASL CLIENT: in some cases authenticate this server sending to other servers
smtp_sasl_auth_enable = yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl_as_client_pw
smtpd_sasl_type = dovecot
smtpd_sasl_authenticated_header = yes
smtpd_sender_restrictions = reject_unknown_sender_domain
smtpd_tls_mandatory_protocols = SSLv3, TLSv1
smtpd_tls_mandatory_ciphers = medium
Code: Alles auswählen
"|IFS=' ' && exec /usr/bin/procmail -f-|| exit 75 #dirk"
Code: Alles auswählen
VERBOSE="on"
LOGABSTRACT="all"
MAILDIR=$HOME/Maildir
#PROCMAILDIR=$HOME/Procmail
PROCMAILDIR=$HOME
LOGFILE=$PROCMAILDIR/procmail.log
:0c:
$HOME/mail.backup
#:0
#* ^Subject:.***SPAM***
#./.Spam
:0
* ^Subject:.*testing
.testing
Die korrekt angezeigten mails liegen alle in einem "cur"-Verzeichnis unterhalb von /home/dirk/Maildir/.POSTFACHNAME und heisen z.B. "1370329416.M620039P31741.banal,S=12681,W=12998:2,S"
Ich denke mir, dass sie an der falschen Stelle in der Mail-bearbeitungsqueue "abgezweigt" wird. wie schaff ichs, dass die mail automatisch in das "cur" Unterverzeichnis sortiert wird, und von thunderbird/webmailer auch angezeigt wird ?
Ich habe root zugang auf dem mailserver, will aber ausserhalb meines Verzeichnisses lieber nichts ändern, weil die mailzustellung für alle andreen Nutzer(ca. 50 Personen) funktioniert.