From 8ce34c73a24df64ee2c597e99e381ba097b07a96 Mon Sep 17 00:00:00 2001 From: Guilhem Moulin Date: Thu, 3 Dec 2015 19:18:37 +0100 Subject: typo --- konfigurera.mdwn | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) (limited to 'konfigurera.mdwn') diff --git a/konfigurera.mdwn b/konfigurera.mdwn index 9ba1e3a..7c249ac 100644 --- a/konfigurera.mdwn +++ b/konfigurera.mdwn @@ -148,22 +148,22 @@ address. Pick (only one) of the following sections. ### Single relayhost (`smtp.fripost.org:587`) for all outgoing messages -Create a file `/etc/postfix/sasl/passwd` +Create a file `/etc/postfix/sasl/passwd`: sudo install -m 0400 /dev/null /etc/postfix/sasl/passwd (it should only be readable by the superuser). Edit it and enter your credentials in the following format: - [smtp.fripost.org]:587 USERNAME@fripost.org:XXXXXXXX + [smtp.fripost.org]:587 USERNAME@fripost.org:XXXXXXXX Now you need to hash the file using `postmap(1)`: sudo postmap hash:/etc/postfix/sasl/passwd -(Postfix doesn't read the file directly, but the compiled lookup table. -Thus you'll have to run that command again whenever the file is updated.) - +(Postfix doesn't read the file directly, but the compiled lookup table +instead. Thus you'll have to run `postmap(1)` again whenever the file +is updated.) Now add the following to `/etc/postfix/main.cf`: mynetworks_style = host @@ -200,10 +200,10 @@ based on the envelope sender address. This is useful if you want to use Create a file `/etc/postfix/sasl/passwd` as before (ensure that only the superuser can read it!), and enter all your credentials: - [smtp.fripost.org]:587 USERNAME1@fripost.org:XXXXXXXX - [smtp.example.org]:587 USERNAME2@example.org:XXXXXXXX + [smtp.fripost.org]:587 USERNAME1@fripost.org:XXXXXXXX + [smtp.example.org]:587 USERNAME2@example.org:XXXXXXXX -Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy` +Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy`: [smtp.example.org]:587 secure ciphers=high protocols=!SSLv2:!SSLv3 [smtp.fripost.org]:587 fingerprint ciphers=high protocols=!SSLv2:!SSLv3:!TLSv1:!TLSv1.1 @@ -212,14 +212,14 @@ Next, write your SSL/TLS client policy in `/etc/postfix/tls_policy` (see `postconf(5)` for details; the fingerprint of our [server certificate](http://git.fripost.org/fripost-ansible/plain/certs/public/smtp.fripost.org.pem)'s public key can be found [here](https://fripost.org/certs.asc)), -and your relayhost policy in `/etc/postfix/relayhost_map` +and your relayhost policy in `/etc/postfix/relayhost_map`: @fripost.org [smtp.fripost.org]:587 @example.org [smtp.example.org]:587 -Here, we tell Postfix to use the `smtp.fripost.org:587` relayhost for -which the envelope sender address is under the `fripost.org` domain, and -the `smtp.example.org:587` relayhost for which the envelope sender +Here, we tell Postfix to use the `smtp.fripost.org:587` relayhost when +the envelope sender address is under the `fripost.org` domain, and +the `smtp.example.org:587` relayhost for when the envelope sender address is under the `example.org` domain. (The brackets around the hostname tell Postfix not perform MX lookups.) @@ -232,7 +232,7 @@ Ensure to compile the lookup tables for all files that have been edited: The configuration in `/etc/postfix/main.cf` is like that of the previous section, except that we're replacing the `smtp_tls_*` options by `smtp_tls_policy_maps`. We also keep a default `relayhost` value for -envelope sender addresses that don't map the `relayhost_map` lookup +envelope sender addresses that don't match the `relayhost_map` lookup table. mynetworks_style = host -- cgit v1.2.3