Commit Graph

2655 Commits (df07c9df012df17ab047ab327a9a1a6cedf46af6)

Author SHA1 Message Date
andryyy df07c9df01
[Compose] Update Rspamd and watchdog image 2019-03-07 00:04:34 +01:00
andryyy bb065dbc22
[Rspamd] Add fuzzy worker with worker-fuzzy.inc 2019-03-06 15:14:25 +01:00
andryyy ac6e379f09
[Web] Fix bootstrap pathes 2019-03-06 15:11:40 +01:00
andryyy 9abbe7eb1d
[Postfix] Mandatory protocol for authenticated clients over 587/tcp and 465/tcp is now TLSv1.0+ (reverts previous protocol change for authenticated users only)
[Postfix] Force route localhost$ over local:
2019-03-06 15:09:28 +01:00
andryyy 6dc5318673
[Rspamd] Delete rspamd.conf.local 2019-03-06 15:08:18 +01:00
andryyy e1ebacca27
[Rspamd] Drop rspamd.conf.local file 2019-03-06 15:06:51 +01:00
andryyy 81f581247b
[Compose] Update Rspamd image 2019-03-06 15:06:39 +01:00
andryyy 4d32eb49ee
[Dovecot] Revert to TLS1+ 2019-03-04 17:57:44 +01:00
andryyy 00b7a47cae
[Compose] Update watchdog image 2019-03-04 17:56:38 +01:00
andryyy 5bc8289d32
[Watchdog] Minor fixes, print last log lines on error 2019-03-04 17:56:27 +01:00
André Peters ed7a8431b4
Merge pull request #2394 from tha80/master
Downgrade rspamd deb repository
2019-03-04 14:13:23 +01:00
tha80 d365813997
Downgraded rspamd deb repository 2019-03-04 13:59:31 +01:00
andryyy c4dfed8a96
[Compose, Rspamd] Downgrade Rspamd 2019-03-03 22:54:47 +01:00
andryyy 950ab30462
[Rspamd] Upgrade Rspamd
[Compose] New Rspamd image
2019-03-03 22:25:56 +01:00
andryyy 0375703198
[Postfix] Fix mandatory encryption protocols and always require at least TLS 1.2 for LMTP 2019-03-03 12:11:39 +01:00
andryyy eccf3ff4da
[Postfix] Mandatory encryption protocol is now min. TLS 1.2 2019-03-03 12:09:10 +01:00
andryyy 69f54b99a1
[Dovecot] ssl_min_protocol is now TLS 1.2 2019-03-03 12:08:26 +01:00
andryyy 083b822cbf
[Compose] Update SOGo image 2019-03-03 12:07:54 +01:00
andryyy 52890e113f
[Web] Update bootstrap to 3.4.1, fixes #2381 2019-03-03 12:07:33 +01:00
andryyy 3873b7a768
[Update] Add /opt/bin to PATH, fixes #2391 2019-03-02 23:48:26 +01:00
andryyy 1e79ea6c7e
[Web] Fix transport_check over port 465, fixes #2386 2019-03-02 20:32:12 +01:00
andryyy ae512018a8
[Postfix] Remove sasl requiring policies from port 25 2019-02-26 21:37:08 +01:00
andryyy 97adcbe5f8
[Web] Strip < and > from start/end of full name 2019-02-26 09:23:16 +01:00
andryyy b0584b7699
[Dovecot] Remove vacation-seconds from global-only 2019-02-25 10:22:00 +01:00
andryyy 108e808d06
[Rspamd] Reduce SOGO_CONTACT score to -99 2019-02-23 23:46:01 +01:00
andryyy db17a304b0
[ClamAV] Create directory before handling whitelist 2019-02-23 10:34:16 +01:00
andryyy 354ecd727c
[ClamAV] More checks and permission fixes 2019-02-23 10:27:13 +01:00
andryyy fe9b9f5dfa
[ClamAV] Set permission recursively
[Compose] Updaet ClamAV image
2019-02-23 10:21:13 +01:00
andryyy 9213d65c85 Merge branch 'master' of https://github.com/mailcow/mailcow-dockerized 2019-02-22 18:25:48 +01:00
andryyy 28a3f5ca8c
[Dovecot] Add flags and notify to sieve_extensions 2019-02-22 18:25:35 +01:00
andryyy c987e5c3bc
[Compose] Update SOGo image (v4.0.6.20190222-1) 2019-02-22 10:52:46 +01:00
andryyy 1092d98499
[Dovecot] Enable sieve vacation seconds not just for global scripts 2019-02-22 10:52:18 +01:00
André Peters cfa44a2014
Merge pull request #2355 from gummipunkt/patch-2
Update lang.de.php
2019-02-21 23:28:28 +01:00
gummipunkt 4e4ed9c1aa
Update lang.de.php 2019-02-21 21:58:03 +01:00
andryyy fe6567a3c8
[Compose] New watchdog image
[Watchdog] Use ipv6nat-mailcow instead of ipv6nat
2019-02-19 22:25:28 +01:00
andryyy 52eb6e48f2
[Compose] New Dovecot image
[Dovecot] Fix very stupid error in quarantine_notify.py - thanks to @DevTek314
2019-02-19 15:02:18 +01:00
andryyy 30153f29cc
[Web] Changes to user interface (using tabs now) 2019-02-15 20:20:14 +01:00
andryyy 63752fe0f2
[Solr] Changes to schema - field types are updated 2019-02-15 20:19:50 +01:00
andryyy 11bc02bf29
[Compose] New Solr image 2019-02-15 20:19:16 +01:00
André Peters 4d7f2618ad
Merge pull request #2329 from vain90/master
Move unset https_port after include of vars local inc
2019-02-14 23:12:09 +01:00
vain90 d7aaa67e2e
Move unset https_port after include of vars local inc 2019-02-14 23:10:46 +01:00
andryyy a58fcff1a0 Merge branch 'master' of https://github.com/mailcow/mailcow-dockerized 2019-02-14 11:11:27 +01:00
andryyy 02b015a359
[Rspamd] Lower history nrows 2019-02-14 11:11:20 +01:00
André Peters 870fee4528
Merge pull request #2325 from extremeshok/patch-15
added information about server/vm specs
2019-02-14 11:09:55 +01:00
andryyy 32994a41ea Merge branch 'master' of https://github.com/mailcow/mailcow-dockerized 2019-02-14 10:54:16 +01:00
andryyy 8883ddc08c
[Assets] Fix Nextcloud site 2019-02-14 10:54:06 +01:00
eXtremeSHOK aef19e2a46
added information about server/vm specs 2019-02-14 09:40:59 +02:00
André Peters 343e5e2cb1
[Web] Update lang.nl.php 2019-02-13 21:03:29 +01:00
André Peters 728bc21815
[ClamAV] Set AlertOLE2Macros to no 2019-02-13 21:03:02 +01:00
eXtremeSHOK 260421448d
Update clamd.conf
AlertOLE2Macros, default should be set to NO

With this option enabled OLE2 files containing VBA macros, which were NOT detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".

This causes most microsoft office document files which contains macros to be blocked. Majority of corporate documents mailed contain macros. When the option is set to NO, emails are still checked for known malicious macros.

Due to any message failing clamav being set to a 2000 score, this causes all legitimate emails with harmless macros to be blocked.

The default for debian/ubuntu is to set this to NO
cPanel, iredmail, etc all have this option set to NO
2019-02-13 09:50:29 +02:00