Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

The most recent posts in iRedMail.

older | 1 | .... | 1340 | 1341 | (Page 1342) | 1343 | 1344 | .... | 1394 | newer

    0 0

    So you are saying thats its correct that my logs show outbound email relaying as localhost? Theres nothing i need to change there?

    Theres no reason that our mails should be going to Office 365 users spam folders, is there no way that this is happening due to any settings on my side? If i check the logs, as far as deliverability goes, and i have confirmed this with Office 365 themselves, there is no issues with mail being passed between our servers. The problem is that mail goes to straight to the spam folders of anyone using Mimecast and Outlook Hosted Exchange. There must be a reason this is happening?

    Please let me know if there is anything possible that I can change. Ive tried tirelessly contacting the Office 365 team with no luck.

    Will check up on the iredapd settings you mentioned above.

    Thanks for your help, any further help would be much appreciated.


    0 0

    Yes, I agree with everything what kazix is saying - host name is different from sending domain.  I was just looking for a way to work around the warning message which MXToolbox is generating about the mismatch between the mail server's CNAME and the SMTP banner.  MXToolbox says it is not an error, it is a warning.

    I guess the only way to work around this is to use multiple public IP addresses assigned to the same iRedMail host and create multiple PTR records for each mail domain in the reverse DNS.


    0 0

    ZhangHuangbin wrote:

    on iOS device, you should add this account as an "Exchange" account (Settings -> Passwords & Accounts -> Add Account -> Exchange), it will ask you to type username and password.

    That is how I have added the account.

    I Think the problem is between SoGo (handling the EAS) and how that is handed off to dovecot/postfix (I think postfix as I'm trying to send) Postfix doesn't seem to trust connections from localhost or 127.0.0.1 is what I got from the log error I posted.


    0 0
  • 11/01/18--09:07: Relay whit sendmail
  • ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release):
    - Linux/BSD distribution name and version:
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL):
    - Web server (Apache or Nginx):
    - Manage mail accounts with iRedAdmin-Pro?
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    Hi  ,  can i  config my mail server to make a relay on  ONLY my  sendmail script.
    I have some like this

    mail.sh

    #!/bin/sh
    echo -e "From: mymail@gmail.com\nTo: domain@domain.com\nSubject: XXXxxxx\n\nHola Sergio-Armando podrias enviarme lista \nMuchas Gracias.\" | sendmail -t  
    exit

    When i run my bash this send  from  return path root@mail.mydomain.tld
    and go to spam folders i need  to fix this.
    Can i setup a relay from sendmail.
    Thx!


    0 0
  • 11/01/18--12:56: Re: Relay whit sendmail
  • viagra without a doctor prescription australia <a href=http://viagrawithoutdoctorprescr.today/>how to get viagra without a doctor prescription</a> how to get viagra without a doctor prescription


    0 0

    ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version: v2018093001
    - Linux/BSD distribution name and version: Debian 9
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL):  MySQL
    - Web server (Apache or Nginx): Nginx
    - Manage mail accounts with iRedAdmin-Pro? : No
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    Hello! First of all, sorry for my English.

    I have new clean install of iRedMail.
    Mail client is - Outlook 365.
    In web Mail (RoundCube) I see folder names in Russian. Like
    Inbox = Vhodyashie
    Sent = Otpravlennie
    etc.

    But in Outlook I see English folder names
    Sent
    Trash
    Junk E-mail

    only inbox I see in Russian.

    I try to start Outlook with key /resetdoldernames, but it not help me.

    What can I do, for all folder names have Russian names?


    0 0
  • 11/02/18--06:38: Re: The problem with SMTPs
  • ZhangHuangbin wrote:

    The error message you pasted isn't related to this SSL/TLS setting change.

    I found a description of the error and thought the same. However, changing port 465 to 587 an SSL to STARTTLS solves the problem completely. I do not make other changes. And the problem is repeated only for the migrated accounts.

    ZhangHuangbin wrote:

    the smtp authentication username is different than the sender address specified in mail header.

    Should I fix this on the client or server side? (I didn't use aliases or maillists)


    0 0
  • 11/02/18--08:09: Sendmailanalyzer whit nginx
  • ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): 0.9.8
    - Linux/BSD distribution name and version: Centos 7
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): LDAP
    - Web server (Apache or Nginx): NGINX
    - Manage mail accounts with iRedAdmin-Pro? No
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    ZhangHuangbin greetings, my intention here like user of iredmail is to utilize the continuous tools in the world of linux, now, my consultation like novice is that I intend to incorporate my mail server aside from the netdata, utilizing log's viewfinder of mail Sendmailanalyzer, but speaking the obvious not himself like to do it in nginx, last configuration that I tried was:

    location /sendmailanalyzer {
            root /var/www;
            allow 127.0.0.1;
            allow 192.168.1.0/24;
            deny all;
            auth_basic "Solamente usuarios autorizados";
            auth_basic_user_file /var/www/claves;
            index sa_report.cgi;
            location ~ \.pl|cgi$ {
                try_files $uri =404;
                gzip off;
                fastcgi_pass  127.0.0.1:8999;
                fastcgi_index index.pl;
                fastcgi_param  SCRIPT_FILENAME  $document_root$fastcgi_script_name;
                include fastcgi_params;
            }
        }
    But being sincere not to configure it to him in the servant nginx, I am very newcomer Linux's user and I am  learning, at present I maintain for my company a mail server based in Iredmail and you want to have netdata and sendmailanalyzer working near, it would become of me a lot of help


    Now that would like just like use netdata itself outside could have used sendmailanalyzer, I to configure it to him even at the end, but no himself the configuration file in Nginx in order that this be  visualized equal happens with netdata....Any help would be  liked with regard to this matter, because I intend to utilize Iredmail for a long time, but adding him this tool.

    Dispense the bother


    0 0
  • 11/02/18--13:21: SPAM Question
  • ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): 0.9.7
    - Linux/BSD distribution name and version: Ubuntu 16.04.5
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
    - Web server (Apache or Nginx): Nginx
    - Manage mail accounts with iRedAdmin-Pro?  Yes  2.8.0
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    So to avoid our own emails from ending up as SPAM, I whitelisted our own domain for incoming email. However recently, our users have been receiving emails that look like they are from themselves (demanding bitcoin claiming to have our info, and emails requesting us to change our passwords). What is the proper way for me to combat this? When looking at the source you can eventually see that it comes from a different IP address... See below.....Any help appreciated...

    Return-Path: <smsmith@mydomain.com>
    Delivered-To: smsmith@mydomain.com
    Received: from mail.mydomain.com (mail.mydomain.com [127.0.0.1])
            by mail.mydomain.com (Postfix) with ESMTP id 166861F81241
            for <smsmith@mydomain.com>; Mon, 29 Oct 2018 03:50:35 -0400 (EDT)
    X-Virus-Scanned: Debian amavisd-new at mail.mydomain.com
    X-Spam-Flag: NO
    X-Spam-Score: 0
    X-Spam-Level:
    X-Spam-Status: No, score=x tagged_above=-100 required=1.5 WHITELISTED tests=[]
            autolearn=unavailable
    Received: from mail.mydomain.com ([127.0.0.1])
            by mail.mydomain.com (mail.mydomain.com [127.0.0.1]) (amavisd-new, port 10024)
            with ESMTP id pe2Mp5mlM33U for <smsmith@mydomain.com>;
            Mon, 29 Oct 2018 03:50:34 -0400 (EDT)
    Received: from [103.71.77.175] (unknown [103.71.77.175])                                    <------------This is the foreign IP address
            by mail.mydomain.com (Postfix) with ESMTP id 874831F80500
            for <smsmith@mydomain.com>; Mon, 29 Oct 2018 03:50:33 -0400 (EDT)
    From: <smsmith@mydomain.com>
    To: <smsmith@mydomain.com>
    Subject: smsmith@mydomain.com is compromised. Password must be changed
    Date: 29 Oct 2018 16:59:48 +0400
    Message-ID: <004401d46f8a$04c41686$9a9380b2$@sbcjolley.com>
    MIME-Version: 1.0
    Content-Type: text/plain;
            charset="ibm852"
    Content-Transfer-Encoding: 8bit
    X-Mailer: Microsoft Office Outlook 12.0
    Thread-Index: Acy3r9771dnhc3u5y3r9771dnhc3u5==
    Content-Language: en
    x-cr-hashedpuzzle: 2D4= r977 1dnh c3u5 y3r9 771d nhc3 u5y3 r977 1dnh c3u5 y3r9 771d nhc3 u5y3 r977;1;1dnhc3u5y3r9771dnhc3u5y3r9771dnhc3u5y3r9771dnhc3;Sosha1_v1;7;\{A5874389-A361-4D69-4B8F-456FAD81A587\};ZQB3AGUAZgr9771dnhc3u5y3r9771dnhc3u5y3r9771dnhc3;29 Oct 2018 16:59:48 +0400;u5y3r9771dnhc3u5
    x-cr-puzzleid: \{A5874389-A361-4D69-4B8F-456FAD81A587\}

    Hello!

    I'm a programmer who cracked your email account and device about half year ago.
    You entered a password on one of the insecure site you visited, and I catched it.

    Of course you can will change your password, or already made it.
    But it doesn't matter, my rat software update it every time.

    Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.

    Through your e-mail, I uploaded malicious code to your Operation System.
    I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources.
    Also I installed a rat software on your device and long tome spying for you.

    You are not my only victim, I usually lock devices and ask for a ransom.
    But I was struck by the sites of intimate content that you very often visit.

    I am in shock of your reach fantasies! Wow! I've never seen anything like this!
    I did not even know that SUCH content could be so exciting!

    So, when you had fun on intime sites (you know what I mean!)
    I made screenshot with using my program from your camera of yours device.
    After that, I jointed them to the content of the currently viewed site.

    Will be funny when I send these photos to your contacts! And if your relatives see it?
    BUT I'm sure you don't want it. I definitely would not want to ...

    I will not do this if you pay me a little amount.
    I think $845 is a nice price for it!

    I accept only Bitcoins.
    My BTC wallet: 17XHRucfd4kx3W5ty7ySLGiKHqmPUUdpus

    If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy.
    After receiving the above amount, all your data will be immediately removed automatically.
    My virus will also will be destroy itself from your operating system.

    My Trojan have auto alert, after this email is looked, I will be know it!

    You have 2 days (48 hours) for make a payment.
    If this does not happen - all your contacts will get crazy shots with your dirty life!
    And so that you do not obstruct me, your device will be locked (also after 48 hours)

    Do not take this frivolously! This is the last warning!
    Various security services or antiviruses won't help you for sure (I have already collected all your data).

    Here are the recommendations of a professional:
    Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!

    I hope you will be prudent.
    Bye.


    0 0

    ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release):
    - Linux/BSD distribution name and version:
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL):
    - Web server (Apache or Nginx):
    - Manage mail accounts with iRedAdmin-Pro?
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====


    I use Iredmail 0,9,8 With Active Directory ( AD ) Integration, but my question is if exists some mechanism either script or something like that that you afford than when an user authenticate for the first time With Active Directory ( AD ) in the mail server himself this, send a message of welcome to that user that I enter for the first time, automatically as the servant Mdaemon when we give him does it tall to a new user.


    Any idea with regard to this matter that you may be useful for what I attempt, since the iredmail does not have this facility incorporatedly.

    I do not use iredmail with native ldap, use it With Active Directory ( AD ) Integration in Windows Server 2016

    As do I do it? I need helps


    0 0

    ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): 0.9.8
    - Linux/BSD distribution name and version: Debian Stretch
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
    - Web server (Apache or Nginx): Nginx
    - Manage mail accounts with iRedAdmin-Pro?  No
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    When ClamAV catches a virus in an outbound email message it properly intercepts the message and quarantines the file, and sends a warning message from postmaster@<mydomain> to root@<mydomain>. This is all great, but I would prefer to send the warning message back to the originator of the message rather than the user 'root' (otherwise, with no bounce the user has no way of knowing that the message was intercepted and will never arrive at the destination.)

    I found the template for the warning message in /usr/sbin/amavisd-new but I've been unable to figure out how to change the recipient from 'root' to the actual originator of the message. Can anyone help?

    TIA for any tips.


    0 0

    This won't work. You need a perl processor (e.g. fcgiwrap) to process perl files with Nginx. There is no perl processor with a default iRedmail installation.

    Also Sendmail Analyzer is not very reliable with iRedmail. It does not help at all.

    And nested location directives are not a good idea either.

    If you still want to do it:
    Here are instructions how to serve perl via Nginx:
    https://www.scalescale.com/tips/nginx/s … pts-nginx/

    And this is our Nginx location directive for Sendmail Analyzer:

    location /sareport/ {
       alias /var/www/sendmailanalyzer/;
       index sa_report.cgi;
       try_files $uri $uri/ sa_report.cgi;
    }

    HTH


    0 0
  • 11/03/18--11:58: iRedmail SSL issue
  • ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): Latest
    - Linux/BSD distribution name and version: Debian 9
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): PGSQL
    - Web server (Apache or Nginx): Nginx
    - Manage mail accounts with iRedAdmin-Pro? No
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====
    Hi,

    I have updated the certificate with command

    acme.sh --install-cert --issue --dns dns_namesilo --dnssleep 600 -d example.com -d *.example.com -d srv.example.com --cert-file /etc/ssl/certs/iRedMail.crt --key-file /etc/ssl/private/iRedMail.key --fullchain-file /etc/ssl/certs/Fullchain.crt --reloadcmd "chmod +r /etc/ssl/certs/iRedMail.crt && chmod +r /etc/ssl/private/iRedMail.key && service nginx reload && service postfix restart && service dovecot restart"

    However, I cannot connect to the mail server via imap/smtp after this. Does iRedmail support wildcard SSL?


    0 0
  • 11/03/18--12:32: Re: iRedmail SSL issue
  • Are you sure you got the valid ssl cert/key after this command?


    0 0

    In old amavisd release, there's an option "warnvirussender" for this purpose, but it was retired in recent amavisd releases.


    0 0
    0 0
  • 11/03/18--12:44: Re: SPAM Question
  • Luke6283 wrote:

    Received: from [103.71.77.175] (unknown [103.71.77.175])                                    <------------This is the foreign IP address

    Any related log in /var/log/iredapd/iredapd.log regarding this IP address?


    0 0

    Unfortunately, this is an Outlook "issue", not server side (iRedMail) issue.


    0 0

    I researched 'warnvirussender' (thanks for the lead) and the reason why it was removed is below. On one hand I can understand why this was done, but on the other they seem to be ignoring the obvious potential for a user to inadvertently attach an infected file to an email (vs. the email necessarily originating from a spammer, as they seem to assume all cases will be.) In the case of an innocent user attaching a virus, it seems a questionable practice to simply send the message to the bitbucket with no notification whatsoever to the sender. Not only is that undesirable for the obvious reasons but it also leaves the sender unaware that he attached a virus in the first place, leading to potential further spread.

    https://sourceforge.net/p/amavis/mailma … /26477229/


    0 0
  • 11/03/18--13:29: Re: iRedmail SSL issue
  • Yes. Issued by let's encrypt


older | 1 | .... | 1340 | 1341 | (Page 1342) | 1343 | 1344 | .... | 1394 | newer