summaryrefslogtreecommitdiffstats
path: root/konfigurera.mdwn
diff options
context:
space:
mode:
Diffstat (limited to 'konfigurera.mdwn')
-rw-r--r--konfigurera.mdwn26
1 files changed, 13 insertions, 13 deletions
diff --git a/konfigurera.mdwn b/konfigurera.mdwn
index 9ba1e3a..7c249ac 100644
--- a/konfigurera.mdwn
+++ b/konfigurera.mdwn
@@ -148,22 +148,22 @@ address. Pick (only one) of the following sections.
### Single relayhost (`smtp.fripost.org:587`) for all outgoing messages
-Create a file `/etc/postfix/sasl/passwd`
+Create a file `/etc/postfix/sasl/passwd`:
sudo install -m 0400 /dev/null /etc/postfix/sasl/passwd
(it should only be readable by the superuser). Edit it and enter your
credentials in the following format:
- [smtp.fripost.org]:587 USERNAME@fripost.org:XXXXXXXX
+ [smtp.fripost.org]:587 USERNAME@fripost.org:XXXXXXXX
Now you need to hash the file using `postmap(1)`:
sudo postmap hash:/etc/postfix/sasl/passwd
-(Postfix doesn't read the file directly, but the compiled lookup table.
-Thus you'll have to run that command again whenever the file is updated.)
-
+(Postfix doesn't read the file directly, but the compiled lookup table
+instead. Thus you'll have to run `postmap(1)` again whenever the file
+is updated.)
Now add the following to `/etc/postfix/main.cf`:
mynetworks_style = host
@@ -200,10 +200,10 @@ based on the envelope sender address. This is useful if you want to use
Create a file `/etc/postfix/sasl/passwd` as before (ensure that only the
superuser can read it!), and enter all your credentials:
- [smtp.fripost.org]:587 USERNAME1@fripost.org:XXXXXXXX
- [smtp.example.org]:587 USERNAME2@example.org:XXXXXXXX
+ [smtp.fripost.org]:587 USERNAME1@fripost.org:XXXXXXXX
+ [smtp.example.org]:587 USERNAME2@example.org:XXXXXXXX
-Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy`
+Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy`:
[smtp.example.org]:587 secure ciphers=high protocols=!SSLv2:!SSLv3
[smtp.fripost.org]:587 fingerprint ciphers=high protocols=!SSLv2:!SSLv3:!TLSv1:!TLSv1.1
@@ -212,14 +212,14 @@ Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy`
(see `postconf(5)` for details;
the fingerprint of our [server certificate](http://git.fripost.org/fripost-ansible/plain/certs/public/smtp.fripost.org.pem)'s
public key can be found [here](https://fripost.org/certs.asc)),
-and your relayhost policy in `/etc/postfix/relayhost_map`
+and your relayhost policy in `/etc/postfix/relayhost_map`:
@fripost.org [smtp.fripost.org]:587
@example.org [smtp.example.org]:587
-Here, we tell Postfix to use the `smtp.fripost.org:587` relayhost for
-which the envelope sender address is under the `fripost.org` domain, and
-the `smtp.example.org:587` relayhost for which the envelope sender
+Here, we tell Postfix to use the `smtp.fripost.org:587` relayhost when
+the envelope sender address is under the `fripost.org` domain, and
+the `smtp.example.org:587` relayhost for when the envelope sender
address is under the `example.org` domain.
(The brackets around the hostname tell Postfix not perform MX lookups.)
@@ -232,7 +232,7 @@ Ensure to compile the lookup tables for all files that have been edited:
The configuration in `/etc/postfix/main.cf` is like that of the previous
section, except that we're replacing the `smtp_tls_*` options by
`smtp_tls_policy_maps`. We also keep a default `relayhost` value for
-envelope sender addresses that don't map the `relayhost_map` lookup
+envelope sender addresses that don't match the `relayhost_map` lookup
table.
mynetworks_style = host