Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

The most recent posts in iRedMail.

older | 1 | .... | 1387 | 1388 | (Page 1389) | 1390 | 1391 | .... | 1394 | newer

    0 0

    Did you modify iRedAdmin-Pro source code?


    0 0

    You can:

    - Block the sender domain directly. Or block particular sender.
    - Add one line in Amavisd config file (/etc/amavisd/amavisd.conf on CentOS) to increase log, Amavisd will log matched SpamAssassin rules, try to find the rule you want to increase score, this will help mark the email as spam.

    $log_templ = $log_verbose_templ;

    Do you have DNSBL services enabled to help reduce spam?


    0 0

    ffrcaraballo wrote:

    Then I have other virtual ones that were working until I installed iredmail, since I install when I call any virutal the webmail of iredmail always speaks to me.

    Do you have config files for these web hosts under /etc/nginx/sites-enabled/ (and ends with '.conf')?


    0 0

    I'm sorry, I do not seem to be able to assemble that query successfully (not sure how to derive the correct variable from 'LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.$' )  Could you provide an example query using the standard iredmail 0.9.8 mailbox directory structure? (which is what I am using)


    0 0

    aida wrote:

    IPs can't have space in between, just a coma.

    Thanks for sharing. i added a comment line in www.conf.


    0 0

    ibrahim wrote:

    it says error connect smtp host.

    What's the original error message?


    0 0

    Finch wrote:

    Hi,

    I am also having the same problem... thanks in advance smile

    Sent. smile


    0 0
    0 0

    selea wrote:

    Anyway, looking forward to your solution!

    You can find solution like php script which implements autodiscover support.
    iRedMail Easy (https://www.iredmail.org/easy.html)offers this too.


    0 0
  • 01/09/19--23:32: SMTP banned mxtool IP?
  • ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): 0.9.9 MYSQL edition
    - Deployed with iRedMail Easy or the downloadable installer? installer
    - Linux/BSD distribution name and version: Ubuntu Ubuntu 18.04.1 LTS
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
    - Web server (Apache or Nginx): Nginx
    - Manage mail accounts with iRedAdmin-Pro? No
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    Finished basic setup. Able to send/receive email via Outlook.

    One strange issue:
    1) Before finished setup, I used mxtool (https://mxtoolbox.com/) to check my domain, e.g. SPF, DMARC, backlist, SMTP relay check and etc.  All are passed.
    2) Not until recently, when I preform the same SMTP relay check via mxtool, it says "Connecting to x.x.x.x   SendSMTPCommand: You hung up on us after we connected. Please whitelist us. (connection lost)"

    It seems to be the IP of mxtool is blocked.  How can I check it and unban it?

    run the command and get the potential blocked IP:
    $ sudo iptables -L -n

    Chain INPUT (policy DROP)
    target     prot opt source               destination
    f2b-postfix  tcp  --  0.0.0.0/0            0.0.0.0/0            multiport dports 80,443,25,587,465,110,995,143,993,4190
    ufw-before-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-before-input  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-input  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-reject-input  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-track-input  all  --  0.0.0.0/0            0.0.0.0/0

    Chain FORWARD (policy DROP)
    target     prot opt source               destination
    ufw-before-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-before-forward  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-forward  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-reject-forward  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-track-forward  all  --  0.0.0.0/0            0.0.0.0/0

    Chain OUTPUT (policy ACCEPT)
    target     prot opt source               destination
    ufw-before-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-before-output  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-output  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-after-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-reject-output  all  --  0.0.0.0/0            0.0.0.0/0
    ufw-track-output  all  --  0.0.0.0/0            0.0.0.0/0

    Chain f2b-postfix (1 references)
    target     prot opt source               destination
    RETURN     all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-after-forward (1 references)
    target     prot opt source               destination

    Chain ufw-after-input (1 references)
    target     prot opt source               destination
    ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:137
    ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:138
    ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:139
    ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:445
    ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:67
    ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:68
    ufw-skip-to-policy-input  all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type BROADCAST

    Chain ufw-after-logging-forward (1 references)
    target     prot opt source               destination
    LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-after-logging-input (1 references)
    target     prot opt source               destination
    LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-after-logging-output (1 references)
    target     prot opt source               destination

    Chain ufw-after-output (1 references)
    target     prot opt source               destination

    Chain ufw-before-forward (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 4
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
    ufw-user-forward  all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-before-input (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
    ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
    DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 4
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:67 dpt:68
    ufw-not-local  all  --  0.0.0.0/0            0.0.0.0/0
    ACCEPT     udp  --  0.0.0.0/0            224.0.0.251          udp dpt:5353
    ACCEPT     udp  --  0.0.0.0/0            239.255.255.250      udp dpt:1900
    ufw-user-input  all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-before-logging-forward (1 references)
    target     prot opt source               destination

    Chain ufw-before-logging-input (1 references)
    target     prot opt source               destination

    Chain ufw-before-logging-output (1 references)
    target     prot opt source               destination

    Chain ufw-before-output (1 references)
    target     prot opt source               destination
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
    ufw-user-output  all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-logging-allow (0 references)
    target     prot opt source               destination
    LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "

    Chain ufw-logging-deny (2 references)
    target     prot opt source               destination
    RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID limit: avg 3/min burst 10
    LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-not-local (1 references)
    target     prot opt source               destination
    RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL
    RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type MULTICAST
    RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type BROADCAST
    ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10
    DROP       all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-reject-forward (1 references)
    target     prot opt source               destination

    Chain ufw-reject-input (1 references)
    target     prot opt source               destination

    Chain ufw-reject-output (1 references)
    target     prot opt source               destination

    Chain ufw-skip-to-policy-forward (0 references)
    target     prot opt source               destination
    DROP       all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-skip-to-policy-input (7 references)
    target     prot opt source               destination
    DROP       all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-skip-to-policy-output (0 references)
    target     prot opt source               destination
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-track-forward (1 references)
    target     prot opt source               destination

    Chain ufw-track-input (1 references)
    target     prot opt source               destination

    Chain ufw-track-output (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            ctstate NEW
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            ctstate NEW

    Chain ufw-user-forward (1 references)
    target     prot opt source               destination

    Chain ufw-user-input (1 references)
    target     prot opt source               destination
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:30022
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:30022
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:80
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:80
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:443
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:443
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:25
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:25
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:143
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:143
    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:587
    ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:587

    Chain ufw-user-limit (0 references)
    target     prot opt source               destination
    LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
    REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable

    Chain ufw-user-limit-accept (0 references)
    target     prot opt source               destination
    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

    Chain ufw-user-logging-forward (0 references)
    target     prot opt source               destination

    Chain ufw-user-logging-input (0 references)
    target     prot opt source               destination

    Chain ufw-user-logging-output (0 references)
    target     prot opt source               destination

    Chain ufw-user-output (1 references)
    target     prot opt source               destination

    Thanks in advance!


    0 0

    smiller50 wrote:

    Could you provide an example query using the standard iredmail 0.9.8 mailbox directory structure? (which is what I am using)

    Turn on debug mode in Dovecot, then try to send an email to reproduce this per-user alias address issue, you will find the full SQL statement in Dovecot log.

    Your previous post didn't paste full SQL statement.


    0 0

    ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
    - iRedMail version (check /etc/iredmail-release): 0.9.9
    - Deployed with iRedMail Easy or the downloadable installer? downloadable installer
    - Linux/BSD distribution name and version: Debian 9.6
    - Store mail accounts in which backend (LDAP/MySQL/PGSQL): LDAP
    - Web server (Apache or Nginx): Apache
    - Manage mail accounts with iRedAdmin-Pro? yes
    - [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
    ====

    Hello

    after an upgrade from 0.9.8 to 0.9.9 i get an internal server error when trying to edit a users profile with iRedAdmin-Pro. Apaches error.log:

    [DoW Mon xx xx:xx:xx.199605 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] Traceback (most recent call last):
    [DoW Mon xx xx:xx:xx.199642 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 239, in process
    [DoW Mon xx xx:xx:xx.199657 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return self.handle()
    [DoW Mon xx xx:xx:xx.199671 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 230, in handle
    [DoW Mon xx xx:xx:xx.199685 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return self._delegate(fn, self.fvars, args)
    [DoW Mon xx xx:xx:xx.199698 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 462, in _delegate
    [DoW Mon xx xx:xx:xx.199712 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return handle_class(cls)
    [DoW Mon xx xx:xx:xx.199725 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 438, in handle_class
    [DoW Mon xx xx:xx:xx.199739 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return tocall(*args)
    [DoW Mon xx xx:xx:xx.199752 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/opt/www/iredadmin/controllers/ldap/user.py", line 293, in GET
    [DoW Mon xx xx:xx:xx.199766 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     _qr = mlmmj.get_subscribed_lists(mail=mail, query_all_lists=False)
    [DoW Mon xx xx:xx:xx.199779 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/opt/www/iredadmin/libs/mlmmj/__init__.py", line 338, in get_subscribed_lists
    [DoW Mon xx xx:xx:xx.199792 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     r = requests.get(url, params=params, headers=api_headers, verify=_verify_ssl)
    [DoW Mon xx xx:xx:xx.199806 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get
    [DoW Mon xx xx:xx:xx.199819 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return request('get', url, params=params, **kwargs)
    [DoW Mon xx xx:xx:xx.199832 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request
    [DoW Mon xx xx:xx:xx.199846 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return session.request(method=method, url=url, **kwargs)
    [DoW Mon xx xx:xx:xx.199859 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request
    [DoW Mon xx xx:xx:xx.199873 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     resp = self.send(prep, **send_kwargs)
    [DoW Mon xx xx:xx:xx.199886 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send
    [DoW Mon xx xx:xx:xx.199899 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     r = adapter.send(request, **kwargs)
    [DoW Mon xx xx:xx:xx.199913 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send
    [DoW Mon xx xx:xx:xx.199926 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     raise ConnectionError(e, request=request)
    [DoW Mon xx xx:xx:xx.199940 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] ConnectionError: HTTPConnectionPool(host='127.0.0.1', port=7790): Max retries exceeded with url: /api/subscriber/demo@example.com/subscribed?query_all_lists=no&email_only=no (Caused by NewConnectionError('<requests.packages.urllib3.connection.HTTPConnection object at 0x7f98ebb52ad0>: Failed to establish a new connection: [Errno 111] Connection refused',))
    [DoW Mon xx xx:xx:xx.199973 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] 

    Replacing iredadmin.conf like mentioned in https://forum.iredmail.org/post66809.html#p66809 with an adjusted Alias-path for Debian doesn't help and brings up new errors (No protocol handler was valid for the URL /iredadmin/).

    Any ideas ? Thanks in advance.


    0 0

    Hi

    I downloaded your code from iredmail.org, no modification

    now, to solve this issue I added a disabled_mail_services fileds after domain fields in domain table.
    In this case when I add new domain, it works and disabled_mail_services filled with "(trhottle)" value

    M


    0 0

    Yes, the SQL statement was truncated, sorry. The full dovecot debug line is:


    Jan 10 07:51:23 mx1 dovecot: auth-worker(6606): Debug: sql(alias_address@mydomain.com): SELECT 'alias_address@mydomain.com' AS master_user, LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.storagenode, '/', mailbox.maildir)) AS home, CONCAT(mailbox.mailboxformat, ':~/', mailbox.mailboxfolder, '/') AS mail, CONCAT('*:bytes=', mailbox.quota*1048576) AS quota_rule FROM mailbox,domain WHERE mailbox.username='alias_address@mydomain.com' AND mailbox.`enablelda`=1 AND mailbox.active=1 AND mailbox.domain=domain.domain AND domain.backupmx=0 AND domain.active=1



    However this can't be the literal query sent to MySQL since it contains several variables (i.e. LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.storagenode, '/', m
    ailbox.maildir))
    , etc.) which if not populated with the actual path will not be a valid query(?)  What I'm trying to figure out is to how to convert the variables so I can obtain the literal text of the query so I can submit it as a test. Or... if this is literally what is being sent to MySQL no wonder it is failing(?)

    Sorry if I am  missing something here.


    0 0

    ZhangHuangbin wrote:

    Could you help capture few screenshots to help me understand this issue?

    Dear Zhang,
      Please view the below images


    0 0

    You can make some sample test also.


    0 0

    ZhangHuangbin wrote:
    edward.toledo wrote:

    The update occurred without any problems, but the certificate error continues.

    Which Linux/BSD distribution and release are you running on this server?

    CentOS 7.5.1804


    0 0

    Is service "mlmmjadmin" running?


    0 0

    smiller50 wrote:

    ... WHERE mailbox.username='alias_address@mydomain.com' ...

    Wait a second, you sure it queries (per-user) alias addresses instead of user's primary address? This is not right.

    Did you modify any postfix settings? especially parameter "smtpd_recipient_maps =" and files under /etc/postfix/mysql/.
    Please show us output of command "postconf -n" for troubleshooting.


    0 0

    bsd3000 wrote:

    now, to solve this issue I added a disabled_mail_services fileds after domain fields in domain table.
    In this case when I add new domain, it works and disabled_mail_services filled with "(trhottle)" value

    This is not right.

    - I can not reproduce this issue locally. And there's no sql column "disabled_mail_services" at all.
    - Could you try to add a new domain name? any domain name is ok. let's see whether you can reproduce this issue steadily: each time you add new domain, it raises this error.
    - Is it possible to give me direct ssh access with root privilege? I'd like to debug it directly. If it's a bug of iRedAdmin-Pro, it will be free, but if it's not, i will charge one support ticket ($99) for this, ok for you?


older | 1 | .... | 1387 | 1388 | (Page 1389) | 1390 | 1391 | .... | 1394 | newer