--- dovecot-1.1.2/dovecot-example.conf.orig 2008-07-24 19:26:22 +0400 +++ dovecot-1.1.2/dovecot-example.conf 2008-07-24 19:39:59 +0400 @@ -13,14 +13,14 @@ # any of the lines. Exception to this are paths, they're just examples with # the real defaults being based on configure options. The paths listed here # are for configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var -# --with-ssldir=/etc/ssl +# --with-ssldir=/var/lib/ssl --libexecdir=/usr/lib # Base directory where to store runtime data. #base_dir = /var/run/dovecot/ # Protocols we want to be serving: imap imaps pop3 pop3s # If you only want to use dovecot-auth, you can set this to "none". -#protocols = imap imaps +protocols = imap imaps pop3 pop3s # A space separated list of IP or host addresses where to listen in for # connections. "*" listens in all IPv4 interfaces. "[::]" listens in all IPv6 @@ -90,8 +90,8 @@ # dropping root privileges, so keep the key file unreadable by anyone but # root. Included doc/mkcert.sh can be used to easily generate self-signed # certificate, just make sure to update the domains in dovecot-openssl.cnf -#ssl_cert_file = /etc/ssl/certs/dovecot.pem -#ssl_key_file = /etc/ssl/private/dovecot.pem +ssl_cert_file = /var/lib/ssl/certs/dovecot.cert +ssl_key_file = /var/lib/ssl/private/dovecot.key # If key file is password protected, give the password here. Alternatively # give it when starting dovecot with -p parameter. @@ -271,7 +271,7 @@ # Group to enable temporarily for privileged operations. Currently this is # used only with INBOX when either its initial creation or dotlocking fails. # Typically this is set to "mail" to give access to /var/mail. -#mail_privileged_group = +mail_privileged_group = mail # Grant access to these supplementary groups for mail processes. Typically # these are used to set up access to shared mailboxes. Note that it may be @@ -328,6 +328,7 @@ # Dotlocking uses some tricks which may create more disk I/O than other locking # methods. NFS users: flock doesn't work, remember to change mmap_disable. #lock_method = fcntl +lock_method = fcntl # Drop all privileges before exec()ing the mail process. This is mostly # meant for debugging, otherwise you don't get core dumps. It could be a small @@ -1007,7 +1008,7 @@ #ssl_username_from_cert = no # It's possible to export the authentication interface to other programs: - #socket listen { + socket listen { #master { # Master socket provides access to userdb information. It's typically # used to give Dovecot's local delivery agent access to userdb so it @@ -1025,7 +1026,13 @@ #path = /var/run/dovecot/auth-client #mode = 0660 #} - #} +# client {#postfix +# path = /var/spool/postfix/private/auth +# mode = 0660 +# user = postfix +# group = postfix +# }#postfix + } } # If you wish to use another authentication server than dovecot-auth, you can