Quantcast
Channel: iRedMail
Viewing all 45918 articles
Browse latest View live

Re: Error: OperationalError(1054, "Unknown column 'disabled_mail_services

$
0
0

Did you modify iRedAdmin-Pro source code?


Re: A log of junk mail send into mail server, how to block it.

$
0
0

You can:

- Block the sender domain directly. Or block particular sender.
- Add one line in Amavisd config file (/etc/amavisd/amavisd.conf on CentOS) to increase log, Amavisd will log matched SpamAssassin rules, try to find the rule you want to increase score, this will help mark the email as spam.

$log_templ = $log_verbose_templ;

Do you have DNSBL services enabled to help reduce spam?

Re: Problems with configuration in nginx

$
0
0
ffrcaraballo wrote:

Then I have other virtual ones that were working until I installed iredmail, since I install when I call any virutal the webmail of iredmail always speaks to me.

Do you have config files for these web hosts under /etc/nginx/sites-enabled/ (and ends with '.conf')?

Re: Per-user alias addresses have stopped working after 0.9.9 update

$
0
0

I'm sorry, I do not seem to be able to assemble that query successfully (not sure how to derive the correct variable from 'LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.$' )  Could you provide an example query using the standard iredmail 0.9.8 mailbox directory structure? (which is what I am using)

Re: 0.9.9 Roundcube - 502 Bad Gateway - upstream prematurely closed

$
0
0
aida wrote:

IPs can't have space in between, just a coma.

Thanks for sharing. i added a comment line in www.conf.

Re: Error In sending mail in wordpress

$
0
0
ibrahim wrote:

it says error connect smtp host.

What's the original error message?

Re: "not found" error when clicking link to request license upgrade

$
0
0
Finch wrote:

Hi,

I am also having the same problem... thanks in advance smile

Sent. smile

Re: How to turn off spam-filter and antivirus filtering


Re: Support for Exchange 2019

SMTP banned mxtool IP?

$
0
0

==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
- iRedMail version (check /etc/iredmail-release): 0.9.9 MYSQL edition
- Deployed with iRedMail Easy or the downloadable installer? installer
- Linux/BSD distribution name and version: Ubuntu Ubuntu 18.04.1 LTS
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL
- Web server (Apache or Nginx): Nginx
- Manage mail accounts with iRedAdmin-Pro? No
- [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
====

Finished basic setup. Able to send/receive email via Outlook.

One strange issue:
1) Before finished setup, I used mxtool (https://mxtoolbox.com/) to check my domain, e.g. SPF, DMARC, backlist, SMTP relay check and etc.  All are passed.
2) Not until recently, when I preform the same SMTP relay check via mxtool, it says "Connecting to x.x.x.x   SendSMTPCommand: You hung up on us after we connected. Please whitelist us. (connection lost)"

It seems to be the IP of mxtool is blocked.  How can I check it and unban it?

run the command and get the potential blocked IP:
$ sudo iptables -L -n

Chain INPUT (policy DROP)
target     prot opt source               destination
f2b-postfix  tcp  --  0.0.0.0/0            0.0.0.0/0            multiport dports 80,443,25,587,465,110,995,143,993,4190
ufw-before-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-input  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-input  all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination
ufw-before-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-forward  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-forward  all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ufw-before-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-before-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-after-logging-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-reject-output  all  --  0.0.0.0/0            0.0.0.0/0
ufw-track-output  all  --  0.0.0.0/0            0.0.0.0/0

Chain f2b-postfix (1 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-after-forward (1 references)
target     prot opt source               destination

Chain ufw-after-input (1 references)
target     prot opt source               destination
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:137
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:138
ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:139
ufw-skip-to-policy-input  tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:445
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:67
ufw-skip-to-policy-input  udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:68
ufw-skip-to-policy-input  all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type BROADCAST

Chain ufw-after-logging-forward (1 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-input (1 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-after-logging-output (1 references)
target     prot opt source               destination

Chain ufw-after-output (1 references)
target     prot opt source               destination

Chain ufw-before-forward (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
ufw-user-forward  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-before-input (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:67 dpt:68
ufw-not-local  all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            224.0.0.251          udp dpt:5353
ACCEPT     udp  --  0.0.0.0/0            239.255.255.250      udp dpt:1900
ufw-user-input  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-before-logging-forward (1 references)
target     prot opt source               destination

Chain ufw-before-logging-input (1 references)
target     prot opt source               destination

Chain ufw-before-logging-output (1 references)
target     prot opt source               destination

Chain ufw-before-output (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
ufw-user-output  all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-logging-allow (0 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "

Chain ufw-logging-deny (2 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID limit: avg 3/min burst 10
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

Chain ufw-not-local (1 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type MULTICAST
RETURN     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type BROADCAST
ufw-logging-deny  all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 10
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-reject-forward (1 references)
target     prot opt source               destination

Chain ufw-reject-input (1 references)
target     prot opt source               destination

Chain ufw-reject-output (1 references)
target     prot opt source               destination

Chain ufw-skip-to-policy-forward (0 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-skip-to-policy-input (7 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-skip-to-policy-output (0 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-track-forward (1 references)
target     prot opt source               destination

Chain ufw-track-input (1 references)
target     prot opt source               destination

Chain ufw-track-output (1 references)
target     prot opt source               destination
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            ctstate NEW
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            ctstate NEW

Chain ufw-user-forward (1 references)
target     prot opt source               destination

Chain ufw-user-input (1 references)
target     prot opt source               destination
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:30022
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:30022
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:80
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:80
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:443
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:443
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:25
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:25
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:143
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:143
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:587
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:587

Chain ufw-user-limit (0 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0            limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable

Chain ufw-user-limit-accept (0 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain ufw-user-logging-forward (0 references)
target     prot opt source               destination

Chain ufw-user-logging-input (0 references)
target     prot opt source               destination

Chain ufw-user-logging-output (0 references)
target     prot opt source               destination

Chain ufw-user-output (1 references)
target     prot opt source               destination

Thanks in advance!

Re: Per-user alias addresses have stopped working after 0.9.9 update

$
0
0
smiller50 wrote:

Could you provide an example query using the standard iredmail 0.9.8 mailbox directory structure? (which is what I am using)

Turn on debug mode in Dovecot, then try to send an email to reproduce this per-user alias address issue, you will find the full SQL statement in Dovecot log.

Your previous post didn't paste full SQL statement.

Internal Server Error after upgrade when changing users profile (wsgi)

$
0
0

==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====
- iRedMail version (check /etc/iredmail-release): 0.9.9
- Deployed with iRedMail Easy or the downloadable installer? downloadable installer
- Linux/BSD distribution name and version: Debian 9.6
- Store mail accounts in which backend (LDAP/MySQL/PGSQL): LDAP
- Web server (Apache or Nginx): Apache
- Manage mail accounts with iRedAdmin-Pro? yes
- [IMPORTANT] Related original log or error message is required if you're experiencing an issue.
====

Hello

after an upgrade from 0.9.8 to 0.9.9 i get an internal server error when trying to edit a users profile with iRedAdmin-Pro. Apaches error.log:

[DoW Mon xx xx:xx:xx.199605 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] Traceback (most recent call last):
[DoW Mon xx xx:xx:xx.199642 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 239, in process
[DoW Mon xx xx:xx:xx.199657 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return self.handle()
[DoW Mon xx xx:xx:xx.199671 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 230, in handle
[DoW Mon xx xx:xx:xx.199685 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return self._delegate(fn, self.fvars, args)
[DoW Mon xx xx:xx:xx.199698 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 462, in _delegate
[DoW Mon xx xx:xx:xx.199712 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return handle_class(cls)
[DoW Mon xx xx:xx:xx.199725 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/web/application.py", line 438, in handle_class
[DoW Mon xx xx:xx:xx.199739 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return tocall(*args)
[DoW Mon xx xx:xx:xx.199752 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/opt/www/iredadmin/controllers/ldap/user.py", line 293, in GET
[DoW Mon xx xx:xx:xx.199766 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     _qr = mlmmj.get_subscribed_lists(mail=mail, query_all_lists=False)
[DoW Mon xx xx:xx:xx.199779 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/opt/www/iredadmin/libs/mlmmj/__init__.py", line 338, in get_subscribed_lists
[DoW Mon xx xx:xx:xx.199792 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     r = requests.get(url, params=params, headers=api_headers, verify=_verify_ssl)
[DoW Mon xx xx:xx:xx.199806 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get
[DoW Mon xx xx:xx:xx.199819 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return request('get', url, params=params, **kwargs)
[DoW Mon xx xx:xx:xx.199832 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request
[DoW Mon xx xx:xx:xx.199846 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     return session.request(method=method, url=url, **kwargs)
[DoW Mon xx xx:xx:xx.199859 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request
[DoW Mon xx xx:xx:xx.199873 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     resp = self.send(prep, **send_kwargs)
[DoW Mon xx xx:xx:xx.199886 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send
[DoW Mon xx xx:xx:xx.199899 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     r = adapter.send(request, **kwargs)
[DoW Mon xx xx:xx:xx.199913 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]   File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send
[DoW Mon xx xx:xx:xx.199926 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744]     raise ConnectionError(e, request=request)
[DoW Mon xx xx:xx:xx.199940 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] ConnectionError: HTTPConnectionPool(host='127.0.0.1', port=7790): Max retries exceeded with url: /api/subscriber/demo@example.com/subscribed?query_all_lists=no&email_only=no (Caused by NewConnectionError('<requests.packages.urllib3.connection.HTTPConnection object at 0x7f98ebb52ad0>: Failed to establish a new connection: [Errno 111] Connection refused',))
[DoW Mon xx xx:xx:xx.199973 2019] [wsgi:error] [pid 24759] [remote x.x.x.x:41744] 

Replacing iredadmin.conf like mentioned in https://forum.iredmail.org/post66809.html#p66809 with an adjusted Alias-path for Debian doesn't help and brings up new errors (No protocol handler was valid for the URL /iredadmin/).

Any ideas ? Thanks in advance.

Re: Error: OperationalError(1054, "Unknown column 'disabled_mail_services

$
0
0

Hi

I downloaded your code from iredmail.org, no modification

now, to solve this issue I added a disabled_mail_services fileds after domain fields in domain table.
In this case when I add new domain, it works and disabled_mail_services filled with "(trhottle)" value

M

Re: Per-user alias addresses have stopped working after 0.9.9 update

$
0
0

Yes, the SQL statement was truncated, sorry. The full dovecot debug line is:


Jan 10 07:51:23 mx1 dovecot: auth-worker(6606): Debug: sql(alias_address@mydomain.com): SELECT 'alias_address@mydomain.com' AS master_user, LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.storagenode, '/', mailbox.maildir)) AS home, CONCAT(mailbox.mailboxformat, ':~/', mailbox.mailboxfolder, '/') AS mail, CONCAT('*:bytes=', mailbox.quota*1048576) AS quota_rule FROM mailbox,domain WHERE mailbox.username='alias_address@mydomain.com' AND mailbox.`enablelda`=1 AND mailbox.active=1 AND mailbox.domain=domain.domain AND domain.backupmx=0 AND domain.active=1



However this can't be the literal query sent to MySQL since it contains several variables (i.e. LOWER(CONCAT(mailbox.storagebasedirectory, '/', mailbox.storagenode, '/', m
ailbox.maildir))
, etc.) which if not populated with the actual path will not be a valid query(?)  What I'm trying to figure out is to how to convert the variables so I can obtain the literal text of the query so I can submit it as a test. Or... if this is literally what is being sent to MySQL no wonder it is failing(?)

Sorry if I am  missing something here.

Re: on user panel the maillist is not check even it is member of maillist

$
0
0
ZhangHuangbin wrote:

Could you help capture few screenshots to help me understand this issue?

Dear Zhang,
  Please view the below images


Re: on user panel the maillist is not check even it is member of maillist

$
0
0

You can make some sample test also.

Re: License certificate error

$
0
0
ZhangHuangbin wrote:
edward.toledo wrote:

The update occurred without any problems, but the certificate error continues.

Which Linux/BSD distribution and release are you running on this server?

CentOS 7.5.1804

Re: Internal Server Error after upgrade when changing users profile (wsgi)

$
0
0

Is service "mlmmjadmin" running?

Re: Per-user alias addresses have stopped working after 0.9.9 update

$
0
0
smiller50 wrote:

... WHERE mailbox.username='alias_address@mydomain.com' ...

Wait a second, you sure it queries (per-user) alias addresses instead of user's primary address? This is not right.

Did you modify any postfix settings? especially parameter "smtpd_recipient_maps =" and files under /etc/postfix/mysql/.
Please show us output of command "postconf -n" for troubleshooting.

Re: Error: OperationalError(1054, "Unknown column 'disabled_mail_services

$
0
0
bsd3000 wrote:

now, to solve this issue I added a disabled_mail_services fileds after domain fields in domain table.
In this case when I add new domain, it works and disabled_mail_services filled with "(trhottle)" value

This is not right.

- I can not reproduce this issue locally. And there's no sql column "disabled_mail_services" at all.
- Could you try to add a new domain name? any domain name is ok. let's see whether you can reproduce this issue steadily: each time you add new domain, it raises this error.
- Is it possible to give me direct ssh access with root privilege? I'd like to debug it directly. If it's a bug of iRedAdmin-Pro, it will be free, but if it's not, i will charge one support ticket ($99) for this, ok for you?

Viewing all 45918 articles
Browse latest View live




Latest Images