FiddleComputers

Untitled

Apr 10th, 2024
27
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.94 KB | None | 0 0
  1. # -----------------------------------------------
  2. # --- Mailserver Environment Variables ----------
  3. # -----------------------------------------------
  4.  
  5. # DOCUMENTATION FOR THESE VARIABLES IS FOUND UNDER
  6. # https://docker-mailserver.github.io/docker-mailserver/latest/config/environment/
  7.  
  8. # -----------------------------------------------
  9. # --- General Section ---------------------------
  10. # -----------------------------------------------
  11.  
  12. # empty => uses the `hostname` command to get the mail server's canonical hostname
  13. # => Specify a fully-qualified domainname to serve mail for. This is used for many of the config features so if you can't set your hostname (e.g. you're in a container platform that doesn't let you) specify it in this environment variable.
  14. OVERRIDE_HOSTNAME=mail.server.com
  15.  
  16. # REMOVED in version v11.0.0! Use LOG_LEVEL instead.
  17. DMS_DEBUG=0
  18.  
  19. # Set the log level for DMS.
  20. # This is mostly relevant for container startup scripts and change detection event feedback.
  21. #
  22. # Valid values (in order of increasing verbosity) are: `error`, `warn`, `info`, `debug` and `trace`.
  23. # The default log level is `info`.
  24. LOG_LEVEL=info
  25.  
  26. # critical => Only show critical messages
  27. # error => Only show erroneous output
  28. # **warn** => Show warnings
  29. # info => Normal informational output
  30. # debug => Also show debug messages
  31. SUPERVISOR_LOGLEVEL=
  32.  
  33. # Support for deployment where these defaults are not compatible (eg: some NAS appliances):
  34. # /var/mail vmail User ID (default: 5000)
  35. DMS_VMAIL_UID=
  36. # /var/mail vmail Group ID (default: 5000)
  37. DMS_VMAIL_GID=
  38.  
  39. # **empty** => use FILE
  40. # LDAP => use LDAP authentication
  41. # OIDC => use OIDC authentication (not yet implemented)
  42. # FILE => use local files (this is used as the default)
  43. ACCOUNT_PROVISIONER=
  44.  
  45. # empty => [email protected]
  46. # => Specify the postmaster address
  47.  
  48. # Check for updates on container start and then once a day
  49. # If an update is available, a mail is sent to POSTMASTER_ADDRESS
  50. # 0 => Update check disabled
  51. # 1 => Update check enabled
  52. ENABLE_UPDATE_CHECK=1
  53.  
  54. # Customize the update check interval.
  55. # Number + Suffix. Suffix must be 's' for seconds, 'm' for minutes, 'h' for hours or 'd' for days.
  56. UPDATE_CHECK_INTERVAL=1d
  57.  
  58. # Set different options for mynetworks option (can be overwrite in postfix-main.cf)
  59. # **WARNING**: Adding the docker network's gateway to the list of trusted hosts, e.g. using the `network` or
  60. # `connected-networks` option, can create an open relay
  61. # https://github.com/docker-mailserver/docker-mailserver/issues/1405#issuecomment-590106498
  62. # The same can happen for rootless podman. To prevent this, set the value to "none" or configure slirp4netns
  63. # https://github.com/docker-mailserver/docker-mailserver/issues/2377
  64. #
  65. # none => Explicitly force authentication
  66. # container => Container IP address only
  67. # host => Add docker container network (ipv4 only)
  68. # network => Add all docker container networks (ipv4 only)
  69. # connected-networks => Add all connected docker networks (ipv4 only)
  70. PERMIT_DOCKER=connected-networks
  71.  
  72. # Set the timezone. If this variable is unset, the container runtime will try to detect the time using
  73. # `/etc/localtime`, which you can alternatively mount into the container. The value of this variable
  74. # must follow the pattern `AREA/ZONE`, i.e. of you want to use Germany's time zone, use `Europe/Berlin`.
  75. # You can lookup all available timezones here: https://en.wikipedia.org/wiki/List_of_tz_database_time_zones#List
  76. TZ=Europe/Paris
  77.  
  78. # In case you network interface differs from 'eth0', e.g. when you are using HostNetworking in Kubernetes,
  79. # you can set NETWORK_INTERFACE to whatever interface you want. This interface will then be used.
  80. # - **empty** => eth0
  81. NETWORK_INTERFACE=
  82.  
  83. # empty => modern
  84. # modern => Enables TLSv1.2 and modern ciphers only. (default)
  85. # intermediate => Enables TLSv1, TLSv1.1 and TLSv1.2 and broad compatibility ciphers.
  86. TLS_LEVEL=
  87.  
  88. # Configures the handling of creating mails with forged sender addresses.
  89. #
  90. # **0** => (not recommended) Mail address spoofing allowed. Any logged in user may create email messages with a forged sender address (see also https://en.wikipedia.org/wiki/Email_spoofing).
  91. # 1 => Mail spoofing denied. Each user may only send with his own or his alias addresses. Addresses with extension delimiters(http://www.postfix.org/postconf.5.html#recipient_delimiter) are not able to send messages.
  92. SPOOF_PROTECTION=1
  93.  
  94. # Enables the Sender Rewriting Scheme. SRS is needed if your mail server acts as forwarder. See [postsrsd](https://github.com/roehling/postsrsd/blob/master/README.md#sender-rewriting-scheme-crash-course) for further explanation.
  95. # - **0** => Disabled
  96. # - 1 => Enabled
  97. ENABLE_SRS=0
  98.  
  99. # Enables the OpenDKIM service.
  100. # **1** => Enabled
  101. # 0 => Disabled
  102. ENABLE_OPENDKIM=1
  103.  
  104. # Enables the OpenDMARC service.
  105. # **1** => Enabled
  106. # 0 => Disabled
  107. ENABLE_OPENDMARC=1
  108.  
  109.  
  110. # Enabled `policyd-spf` in Postfix's configuration. You will likely want to set this
  111. # to `0` in case you're using Rspamd (`ENABLE_RSPAMD=1`).
  112. #
  113. # - 0 => Disabled
  114. # - **1** => Enabled
  115. ENABLE_POLICYD_SPF=1
  116.  
  117. # Enables POP3 service
  118. # - **0** => Disabled
  119. # - 1 => Enabled
  120. ENABLE_POP3=
  121.  
  122. # Enables IMAP service
  123. # - 0 => Disabled
  124. # - **1** => Enabled
  125. ENABLE_IMAP=1
  126.  
  127. # Enables ClamAV, and anti-virus scanner.
  128. # 1 => Enabled
  129. # **0** => Disabled
  130. ENABLE_CLAMAV=0
  131.  
  132. # Add the value as a prefix to the mail subject when spam is detected.
  133. # NOTE: By default spam is delivered to a junk folder, reducing the value of a subject prefix for spam.
  134. # NOTE: When not using Docker Compose, other CRI may not support quote-wrapping the value here to preserve any trailing white-space.
  135. SPAM_SUBJECT=
  136.  
  137. # Enables Rspamd
  138. # **0** => Disabled
  139. # 1 => Enabled
  140. ENABLE_RSPAMD=0
  141.  
  142. # When `ENABLE_RSPAMD=1`, an internal Redis instance is enabled implicitly.
  143. # This setting provides an opt-out to allow using an external instance instead.
  144. # 0 => Disabled
  145. # 1 => Enabled
  146. ENABLE_RSPAMD_REDIS=
  147.  
  148. # When enabled,
  149. #
  150. # 1. the "[autolearning][rspamd-autolearn]" feature is turned on;
  151. # 2. the Bayes classifier will be trained when moving mails from or to the Junk folder (with the help of Sieve scripts).
  152. #
  153. # **0** => disabled
  154. # 1 => enabled
  155. RSPAMD_LEARN=0
  156.  
  157. # This settings controls whether checks should be performed on emails coming
  158. # from authenticated users (i.e. most likely outgoing emails). The default value
  159. # is `0` in order to align better with SpamAssassin. We recommend reading
  160. # through https://rspamd.com/doc/tutorials/scanning_outbound.html though to
  161. # decide for yourself whether you need and want this feature.
  162. #
  163. # Note that DKIM signing of e-mails will still happen.
  164. RSPAMD_CHECK_AUTHENTICATED=0
  165.  
  166. # Controls whether the Rspamd Greylisting module is enabled.
  167. # This module can further assist in avoiding spam emails by greylisting
  168. # e-mails with a certain spam score.
  169. #
  170. # **0** => disabled
  171. # 1 => enabled
  172. RSPAMD_GREYLISTING=0
  173.  
  174. # Can be used to enable or disable the Hfilter group module.
  175. #
  176. # - 0 => Disabled
  177. # - **1** => Enabled
  178. RSPAMD_HFILTER=1
  179.  
  180. # Can be used to control the score when the HFILTER_HOSTNAME_UNKNOWN symbol applies. A higher score is more punishing. Setting it to 15 is equivalent to rejecting the email when the check fails.
  181. #
  182. # Default: 6
  183. RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE=6
  184.  
  185. # Can be used to enable or disable the (still experimental) neural module.
  186. #
  187. # - **0** => Disabled
  188. # - 1 => Enabled
  189. RSPAMD_NEURAL=0
  190.  
  191. # Amavis content filter (used for ClamAV & SpamAssassin)
  192. # 0 => Disabled
  193. # 1 => Enabled
  194. ENABLE_AMAVIS=1
  195.  
  196. # -1/-2/-3 => Only show errors
  197. # **0** => Show warnings
  198. # 1/2 => Show default informational output
  199. # 3/4/5 => log debug information (very verbose)
  200. AMAVIS_LOGLEVEL=0
  201.  
  202. # This enables DNS block lists in Postscreen.
  203. # Note: Emails will be rejected, if they don't pass the block list checks!
  204. # **0** => DNS block lists are disabled
  205. # 1 => DNS block lists are enabled
  206. ENABLE_DNSBL=0
  207.  
  208. # If you enable Fail2Ban, don't forget to add the following lines to your `compose.yaml`:
  209. # cap_add:
  210. # - NET_ADMIN
  211. # Otherwise, `nftables` won't be able to ban IPs.
  212. ENABLE_FAIL2BAN=0
  213.  
  214. # Fail2Ban blocktype
  215. # drop => drop packet (send NO reply)
  216. # reject => reject packet (send ICMP unreachable)
  217. FAIL2BAN_BLOCKTYPE=drop
  218.  
  219. # 1 => Enables Managesieve on port 4190
  220. # empty => disables Managesieve
  221. ENABLE_MANAGESIEVE=
  222.  
  223. # **enforce** => Allow other tests to complete. Reject attempts to deliver mail with a 550 SMTP reply, and log the helo/sender/recipient information. Repeat this test the next time the client connects.
  224. # drop => Drop the connection immediately with a 521 SMTP reply. Repeat this test the next time the client connects.
  225. # ignore => Ignore the failure of this test. Allow other tests to complete. Repeat this test the next time the client connects. This option is useful for testing and collecting statistics without blocking mail.
  226. POSTSCREEN_ACTION=enforce
  227.  
  228. # empty => all daemons start
  229. # 1 => only launch postfix smtp
  230. SMTP_ONLY=
  231.  
  232. # Please read [the SSL page in the documentation](https://docker-mailserver.github.io/docker-mailserver/latest/config/security/ssl) for more information.
  233. #
  234. # empty => SSL disabled
  235. # letsencrypt => Enables Let's Encrypt certificates
  236. # custom => Enables custom certificates
  237. # manual => Let's you manually specify locations of your SSL certificates for non-standard cases
  238. # self-signed => Enables self-signed certificates
  239. SSL_TYPE=letsencrypt
  240.  
  241. # These are only supported with `SSL_TYPE=manual`.
  242. # Provide the path to your cert and key files that you've mounted access to within the container.
  243. SSL_CERT_PATH=/etc/letsencrypt/archive/server.comr/cert.pem
  244. SSL_KEY_PATH=/etc/letsencrypt/archive/server.com/privkey.pem
  245. # Optional: A 2nd certificate can be supported as fallback (dual cert support), eg ECDSA with an RSA fallback.
  246. # Useful for additional compatibility with older MTA and MUA (eg pre-2015).
  247. SSL_ALT_CERT_PATH=
  248. SSL_ALT_KEY_PATH=
  249.  
  250. # Set how many days a virusmail will stay on the server before being deleted
  251. # empty => 7 days
  252. VIRUSMAILS_DELETE_DELAY=
  253.  
  254. # Configure Postfix `virtual_transport` to deliver mail to a different LMTP client (default is a dovecot socket).
  255. # Provide any valid URI. Examples:
  256. #
  257. # empty => `lmtp:unix:/var/run/dovecot/lmtp` (default, configured in Postfix main.cf)
  258. # `lmtp:unix:private/dovecot-lmtp` (use socket)
  259. # `lmtps:inet:<host>:<port>` (secure lmtp with starttls)
  260. # `lmtp:<kopano-host>:2003` (use kopano as mailstore)
  261. POSTFIX_DAGENT=
  262.  
  263. # Set the mailbox size limit for all users. If set to zero, the size will be unlimited (default). Size is in bytes.
  264. #
  265. # empty => 0
  266. POSTFIX_MAILBOX_SIZE_LIMIT=
  267.  
  268. # See https://docker-mailserver.github.io/docker-mailserver/edge/config/user-management/accounts/#notes
  269. # 0 => Dovecot quota is disabled
  270. # 1 => Dovecot quota is enabled
  271. ENABLE_QUOTAS=1
  272.  
  273. # Set the message size limit for all users. If set to zero, the size will be unlimited (not recommended!). Size is in bytes.
  274. #
  275. # empty => 10240000 (~10 MB)
  276. POSTFIX_MESSAGE_SIZE_LIMIT=
  277.  
  278. # Mails larger than this limit won't be scanned.
  279. # ClamAV must be enabled (ENABLE_CLAMAV=1) for this.
  280. #
  281. # empty => 25M (25 MB)
  282. CLAMAV_MESSAGE_SIZE_LIMIT=
  283.  
  284. # Enables regular pflogsumm mail reports.
  285. # This is a new option. The old REPORT options are still supported for backwards compatibility. If this is not set and reports are enabled with the old options, logrotate will be used.
  286. #
  287. # not set => No report
  288. # daily_cron => Daily report for the previous day
  289. # logrotate => Full report based on the mail log when it is rotated
  290. PFLOGSUMM_TRIGGER=
  291.  
  292. # Recipient address for pflogsumm reports.
  293. #
  294. # not set => Use REPORT_RECIPIENT or POSTMASTER_ADDRESS
  295. # => Specify the recipient address(es)
  296. PFLOGSUMM_RECIPIENT=
  297.  
  298. # Sender address (`FROM`) for pflogsumm reports if pflogsumm reports are enabled.
  299. #
  300. # not set => Use REPORT_SENDER
  301. # => Specify the sender address
  302. PFLOGSUMM_SENDER=
  303.  
  304. # Interval for logwatch report.
  305. #
  306. # none => No report is generated
  307. # daily => Send a daily report
  308. # weekly => Send a report every week
  309. LOGWATCH_INTERVAL=
  310.  
  311. # Recipient address for logwatch reports if they are enabled.
  312. #
  313. # not set => Use REPORT_RECIPIENT or POSTMASTER_ADDRESS
  314. # => Specify the recipient address(es)
  315. LOGWATCH_RECIPIENT=
  316.  
  317. # Sender address (`FROM`) for logwatch reports if logwatch reports are enabled.
  318. #
  319. # not set => Use REPORT_SENDER
  320. # => Specify the sender address
  321. LOGWATCH_SENDER=
  322.  
  323. # Defines who receives reports if they are enabled.
  324. # **empty** => ${POSTMASTER_ADDRESS}
  325. # => Specify the recipient address
  326. REPORT_RECIPIENT=
  327.  
  328. # Defines who sends reports if they are enabled.
  329. # **empty** => mailserver-report@${DOMAINNAME}
  330. # => Specify the sender address
  331. REPORT_SENDER=
  332.  
  333. # Changes the interval in which log files are rotated
  334. # **weekly** => Rotate log files weekly
  335. # daily => Rotate log files daily
  336. # monthly => Rotate log files monthly
  337. #
  338. # Note: This Variable actually controls logrotate inside the container
  339. # and rotates the log files depending on this setting. The main log output is
  340. # still available in its entirety via `docker logs mail` (Or your
  341. # respective container name). If you want to control logrotation for
  342. # the Docker-generated logfile see:
  343. # https://docs.docker.com/config/containers/logging/configure/
  344. #
  345. # Note: This variable can also determine the interval for Postfix's log summary reports, see [`PFLOGSUMM_TRIGGER`](#pflogsumm_trigger).
  346. LOGROTATE_INTERVAL=weekly
  347.  
  348.  
  349. # If enabled, employs `reject_unknown_client_hostname` to sender restrictions in Postfix's configuration.
  350. #
  351. # - **0** => Disabled
  352. # - 1 => Enabled
  353. POSTFIX_REJECT_UNKNOWN_CLIENT_HOSTNAME=0
  354.  
  355. # Choose TCP/IP protocols for postfix to use
  356. # **all** => All possible protocols.
  357. # ipv4 => Use only IPv4 traffic. Most likely you want this behind Docker.
  358. # ipv6 => Use only IPv6 traffic.
  359. #
  360. # Note: More details at http://www.postfix.org/postconf.5.html#inet_protocols
  361. POSTFIX_INET_PROTOCOLS=ipv4
  362.  
  363. # Enables MTA-STS support for outbound mail.
  364. # More details: https://docker-mailserver.github.io/docker-mailserver/latest/config/advanced/mail-mta-sts/
  365. # - **0** ==> MTA-STS disabled
  366. # - 1 => MTA-STS enabled
  367. ENABLE_MTA_STS=0
  368.  
  369. # Choose TCP/IP protocols for dovecot to use
  370. # **all** => Listen on all interfaces
  371. # ipv4 => Listen only on IPv4 interfaces. Most likely you want this behind Docker.
  372. # ipv6 => Listen only on IPv6 interfaces.
  373. #
  374. # Note: More information at https://dovecot.org/doc/dovecot-example.conf
  375. DOVECOT_INET_PROTOCOLS=ipv4
  376.  
  377. # -----------------------------------------------
  378. # --- SpamAssassin Section ----------------------
  379. # -----------------------------------------------
  380.  
  381. ENABLE_SPAMASSASSIN=0
  382.  
  383. # KAM is a 3rd party SpamAssassin ruleset, provided by the McGrail Foundation.
  384. # If SpamAssassin is enabled, KAM can be used in addition to the default ruleset.
  385. # - **0** => KAM disabled
  386. # - 1 => KAM enabled
  387. #
  388. # Note: only has an effect if `ENABLE_SPAMASSASSIN=1`
  389. ENABLE_SPAMASSASSIN_KAM=0
  390.  
  391. # deliver spam messages to the inbox (tagged using SPAM_SUBJECT)
  392. SPAMASSASSIN_SPAM_TO_INBOX=1
  393.  
  394. # spam messages will be moved in the Junk folder (SPAMASSASSIN_SPAM_TO_INBOX=1 required)
  395. MOVE_SPAM_TO_JUNK=1
  396.  
  397. # spam messages will be marked as read
  398. MARK_SPAM_AS_READ=0
  399.  
  400. # add 'spam info' headers at, or above this level
  401. SA_TAG=2.0
  402.  
  403. # add 'spam detected' headers at, or above this level
  404. SA_TAG2=6.31
  405.  
  406. # triggers spam evasive actions
  407. SA_KILL=10.0
  408.  
  409. # -----------------------------------------------
  410. # --- Fetchmail Section -------------------------
  411. # -----------------------------------------------
  412.  
  413. ENABLE_FETCHMAIL=0
  414.  
  415. # The interval to fetch mail in seconds
  416. FETCHMAIL_POLL=300
  417. # Use multiple fetchmail instances (1 per poll entry in fetchmail.cf)
  418. # Supports multiple IMAP IDLE connections when a server is used across multiple poll entries
  419. # https://otremba.net/wiki/Fetchmail_(Debian)#Immediate_Download_via_IMAP_IDLE
  420. FETCHMAIL_PARALLEL=0
  421.  
  422. # Enable or disable `getmail`.
  423. #
  424. # - **0** => Disabled
  425. # - 1 => Enabled
  426. ENABLE_GETMAIL=0
  427.  
  428. # The number of minutes for the interval. Min: 1; Max: 30.
  429. GETMAIL_POLL=5
  430.  
  431. # -----------------------------------------------
  432. # --- OAUTH2 Section ----------------------------
  433. # -----------------------------------------------
  434.  
  435. # empty => OAUTH2 authentication is disabled
  436. # 1 => OAUTH2 authentication is enabled
  437. ENABLE_OAUTH2=
  438.  
  439. # Specify the user info endpoint URL of the oauth2 provider
  440. # Example: https://oauth2.example.com/userinfo/
  441. OAUTH2_INTROSPECTION_URL=
  442.  
  443. # -----------------------------------------------
  444. # --- LDAP Section ------------------------------
  445. # -----------------------------------------------
  446.  
  447. # A second container for the ldap service is necessary (i.e. https://hub.docker.com/r/bitnami/openldap/)
  448.  
  449. # empty => no
  450. # yes => LDAP over TLS enabled for Postfix
  451. LDAP_START_TLS=
  452.  
  453. # empty => mail.example.com
  454. # Specify the `<dns-name>` / `<ip-address>` where the LDAP server is reachable via a URI like: `ldaps://mail.example.com`.
  455. # Note: You must include the desired URI scheme (`ldap://`, `ldaps://`, `ldapi://`).
  456. LDAP_SERVER_HOST=
  457.  
  458. # empty => ou=people,dc=domain,dc=com
  459. # => e.g. LDAP_SEARCH_BASE=dc=mydomain,dc=local
  460. LDAP_SEARCH_BASE=
  461.  
  462. # empty => cn=admin,dc=domain,dc=com
  463. # => take a look at examples of SASL_LDAP_BIND_DN
  464. LDAP_BIND_DN=
  465.  
  466. # empty** => admin
  467. # => Specify the password to bind against ldap
  468. LDAP_BIND_PW=
  469.  
  470. # e.g. `"(&(mail=%s)(mailEnabled=TRUE))"`
  471. # => Specify how ldap should be asked for users
  472. LDAP_QUERY_FILTER_USER=
  473.  
  474. # e.g. `"(&(mailGroupMember=%s)(mailEnabled=TRUE))"`
  475. # => Specify how ldap should be asked for groups
  476. LDAP_QUERY_FILTER_GROUP=
  477.  
  478. # e.g. `"(&(mailAlias=%s)(mailEnabled=TRUE))"`
  479. # => Specify how ldap should be asked for aliases
  480. LDAP_QUERY_FILTER_ALIAS=
  481.  
  482. # e.g. `"(&(|(mail=*@%s)(mailalias=*@%s)(mailGroupMember=*@%s))(mailEnabled=TRUE))"`
  483. # => Specify how ldap should be asked for domains
  484. LDAP_QUERY_FILTER_DOMAIN=
  485.  
  486. # -----------------------------------------------
  487. # --- Dovecot Section ---------------------------
  488. # -----------------------------------------------
  489.  
  490. # empty => no
  491. # yes => LDAP over TLS enabled for Dovecot
  492. DOVECOT_TLS=
  493.  
  494. # e.g. `"(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))"`
  495. DOVECOT_USER_FILTER=
  496.  
  497. # e.g. `"(&(objectClass=PostfixBookMailAccount)(uniqueIdentifier=%n))"`
  498. DOVECOT_PASS_FILTER=
  499.  
  500. # Define the mailbox format to be used
  501. # default is maildir, supported values are: sdbox, mdbox, maildir
  502. DOVECOT_MAILBOX_FORMAT=maildir
  503.  
  504. # empty => no
  505. # yes => Allow bind authentication for LDAP
  506. # https://wiki.dovecot.org/AuthDatabase/LDAP/AuthBinds
  507. DOVECOT_AUTH_BIND=
  508.  
  509. # -----------------------------------------------
  510. # --- Postgrey Section --------------------------
  511. # -----------------------------------------------
  512.  
  513. ENABLE_POSTGREY=0
  514. # greylist for N seconds
  515. POSTGREY_DELAY=300
  516. # delete entries older than N days since the last time that they have been seen
  517. POSTGREY_MAX_AGE=35
  518. # response when a mail is greylisted
  519. POSTGREY_TEXT="Delayed by Postgrey"
  520. # whitelist host after N successful deliveries (N=0 to disable whitelisting)
  521. POSTGREY_AUTO_WHITELIST_CLIENTS=5
  522.  
  523. # -----------------------------------------------
  524. # --- SASL Section ------------------------------
  525. # -----------------------------------------------
  526.  
  527. ENABLE_SASLAUTHD=0
  528.  
  529. # empty => pam
  530. # `ldap` => authenticate against ldap server
  531. # `shadow` => authenticate against local user db
  532. # `mysql` => authenticate against mysql db
  533. # `rimap` => authenticate against imap server
  534. # Note: can be a list of mechanisms like pam ldap shadow
  535. SASLAUTHD_MECHANISMS=
  536.  
  537. # empty => None
  538. # e.g. with SASLAUTHD_MECHANISMS rimap you need to specify the ip-address/servername of the imap server ==> xxx.xxx.xxx.xxx
  539. SASLAUTHD_MECH_OPTIONS=
  540.  
  541. # empty => Use value of LDAP_SERVER_HOST
  542. # Note: You must include the desired URI scheme (`ldap://`, `ldaps://`, `ldapi://`).
  543. SASLAUTHD_LDAP_SERVER=
  544.  
  545. # empty => Use value of LDAP_BIND_DN
  546. # specify an object with privileges to search the directory tree
  547. # e.g. active directory: SASLAUTHD_LDAP_BIND_DN=cn=Administrator,cn=Users,dc=mydomain,dc=net
  548. # e.g. openldap: SASLAUTHD_LDAP_BIND_DN=cn=admin,dc=mydomain,dc=net
  549. SASLAUTHD_LDAP_BIND_DN=
  550.  
  551. # empty => Use value of LDAP_BIND_PW
  552. SASLAUTHD_LDAP_PASSWORD=
  553.  
  554. # empty => Use value of LDAP_SEARCH_BASE
  555. # specify the search base
  556. SASLAUTHD_LDAP_SEARCH_BASE=
  557.  
  558. # empty => default filter `(&(uniqueIdentifier=%u)(mailEnabled=TRUE))`
  559. # e.g. for active directory: `(&(sAMAccountName=%U)(objectClass=person))`
  560. # e.g. for openldap: `(&(uid=%U)(objectClass=person))`
  561. SASLAUTHD_LDAP_FILTER=
  562.  
  563. # empty => no
  564. # yes => LDAP over TLS enabled for SASL
  565. # If set to yes, the protocol in SASLAUTHD_LDAP_SERVER must be ldap:// or missing.
  566. SASLAUTHD_LDAP_START_TLS=
  567.  
  568. # empty => no
  569. # yes => Require and verify server certificate
  570. # If yes you must/could specify SASLAUTHD_LDAP_TLS_CACERT_FILE or SASLAUTHD_LDAP_TLS_CACERT_DIR.
  571. SASLAUTHD_LDAP_TLS_CHECK_PEER=
  572.  
  573. # File containing CA (Certificate Authority) certificate(s).
  574. # empty => Nothing is added to the configuration
  575. # Any value => Fills the `ldap_tls_cacert_file` option
  576. SASLAUTHD_LDAP_TLS_CACERT_FILE=
  577.  
  578. # Path to directory with CA (Certificate Authority) certificates.
  579. # empty => Nothing is added to the configuration
  580. # Any value => Fills the `ldap_tls_cacert_dir` option
  581. SASLAUTHD_LDAP_TLS_CACERT_DIR=
  582.  
  583. # Specify what password attribute to use for password verification.
  584. # empty => Nothing is added to the configuration but the documentation says it is `userPassword` by default.
  585. # Any value => Fills the `ldap_password_attr` option
  586. SASLAUTHD_LDAP_PASSWORD_ATTR=
  587.  
  588. # empty => `bind` will be used as a default value
  589. # `fastbind` => The fastbind method is used
  590. # `custom` => The custom method uses userPassword attribute to verify the password
  591. SASLAUTHD_LDAP_AUTH_METHOD=
  592.  
  593. # Specify the authentication mechanism for SASL bind
  594. # empty => Nothing is added to the configuration
  595. # Any value => Fills the `ldap_mech` option
  596. SASLAUTHD_LDAP_MECH=
  597.  
  598. # -----------------------------------------------
  599. # --- SRS Section -------------------------------
  600. # -----------------------------------------------
  601.  
  602. # envelope_sender => Rewrite only envelope sender address (default)
  603. # header_sender => Rewrite only header sender (not recommended)
  604. # envelope_sender,header_sender => Rewrite both senders
  605. # An email has an "envelope" sender (indicating the sending server) and a
  606. # "header" sender (indicating who sent it). More strict SPF policies may require
  607. # you to replace both instead of just the envelope sender.
  608. SRS_SENDER_CLASSES=envelope_sender
  609.  
  610. # empty => Envelope sender will be rewritten for all domains
  611. # provide comma separated list of domains to exclude from rewriting
  612. SRS_EXCLUDE_DOMAINS=
  613.  
  614. # empty => generated when the image is built
  615. # provide a secret to use in base64
  616. # you may specify multiple keys, comma separated. the first one is used for
  617. # signing and the remaining will be used for verification. this is how you
  618. # rotate and expire keys
  619. SRS_SECRET=
  620.  
  621. # -----------------------------------------------
  622. # --- Default Relay Host Section ----------------
  623. # -----------------------------------------------
  624.  
  625. # Setup relaying all mail through a default relay host
  626. #
  627. # Set a default host to relay all mail through (optionally include a port)
  628. # Example: [mail.example.com]:587
  629. DEFAULT_RELAY_HOST=
  630.  
  631. # -----------------------------------------------
  632. # --- Multi-Domain Relay Section ----------------
  633. # -----------------------------------------------
  634.  
  635. # Setup relaying for multiple domains based on the domain name of the sender
  636. # optionally uses usernames and passwords in postfix-sasl-password.cf and relay host mappings in postfix-relaymap.cf
  637. #
  638. # Set a default host to relay mail through
  639. # Example: mail.example.com
  640. RELAY_HOST=
  641.  
  642. # empty => 25
  643. # default port to relay mail
  644. RELAY_PORT=
  645.  
  646. # -----------------------------------------------
  647. # --- Relay Host Credentials Section ------------
  648. # -----------------------------------------------
  649.  
  650. # Configure a relay user and password to use with RELAY_HOST / DEFAULT_RELAY_HOST
  651.  
  652. # empty => no default
  653. RELAY_USER=
  654.  
  655. # empty => no default
  656. RELAY_PASSWORD=
  657.  
Add Comment
Please, Sign In to add comment