CentOS-6.6大型企业级邮件系统架设-postfix+dovecot+mysql+postf(3)

2019-08-31 19:37

admin index.php phpmyadmin webmail

配置http.conf设置多端口多站点 Listen 80

DocumentRoot \

ServerAdmin jun1.jungp.comm

DocumentRoot \ ServerName localhost ServerAlias localhost

ErrorLog \

CustomLog \

Listen 8080

DocumentRoot \

ServerAdmin jun2.jungp.comm

DocumentRoot \ ServerName localhost

ErrorLog \

CustomLog \

2.配置WebMail

打开 http://192.168.0.2/installer/可以查看哪些OK了 pear install Net_IDNA2 yum install php-pear* 3.修改php.ini

[root@mail installer]# vi /etc/php.ini date.timezone = Asia/Shanghai 4.修改apache中PHPini的位置

[root@mail installer]# vi /etc/httpd/conf/httpd.conf PHPIniDir \

[root@mail installer]# service httpd restart

Stopping httpd: [ OK ] Starting httpd: [ OK ] 5.修改所有Web文件的所属者与所属组 [root@mail ~]# cd /var/www/html/ [root@mail html]# ll total 16

drwxrwxr-x 14 1000 1010 4096 Jul 11 05:25 admin -rw-r--r-- 1 root root 18 Jul 11 04:12 index.php drwxr-xr-x 9 root root 4096 Jul 11 04:17 phpmyadmin drwxr-xr-x 11 501 80 4096 Jun 16 23:10 webmail [root@mail html]# chown -R vmail.vmail admin

[root@mail html]# chown -R vmail.vmail phpmyadmin [root@mail html]# chown -R vmail.vmail webmail [root@mail html]# ll total 16

drwxrwxr-x 14 vmail vmail 4096 Jul 11 05:25 admin -rw-r--r-- 1 root root 18 Jul 11 04:12 index.php drwxr-xr-x 9 vmail vmail 4096 Jul 11 04:17 phpmyadmin drwxr-xr-x 11 vmail vmail 4096 Jun 16 23:10 webmail 6.查看session保存位置

[root@mail html]# vi /etc/php.ini

session.save_path = \

7.修改session文件的所属组

[root@mail html]# cd /var/lib/php/ [root@mail php]# ll total 4

drwxrwx--- 2 root apache 4096 Feb 22 10:56 session [root@mail php]# chown -R .vmail session/ [root@mail php]# ll total 4

drwxrwx--- 2 root vmail 4096 Feb 22 10:56 session

9.单击NEXT我们继续进行设置(下面是必须配置的选项) (1).配置webmail的显示名称

一般配置的是登录页面显示的名称

(2).配置Webmail数据库相关(我这里全部设置是,roundcubemail) (3).配置IMAP

(4).配置SMTP服务器 (5).配置完成效果如下,(大家可以看到我们配置好的选项都被列出来了,我们得下载两个配置文件main.inc.php和db.inc.php并上传到时服务器中) (6).上传至服务器相关目录中

[root@mail ~]# cd /var/www/html/webmail/config/

[root@mail config]# ll total 92

-rw-r--r-- 1 root root 2905 Jul 10 22:15 db.inc.php -rw-r--r-- 1 vmail vmail 2893 Jun 16 23:10 db.inc.php.dist -rw-r--r-- 1 root root 38438 Jul 10 22:15 main.inc.php -rw-r--r-- 1 vmail vmail 38414 Jun 16 23:10 main.inc.php.dist -rw-r--r-- 1 vmail vmail 2731 Jun 16 23:10 mimetypes.php (7). 给WebMail授权

mysql> CREATE DATABASE roundcubemail; mysql> use roundcubemail;

mysql> GRANT ALL PRIVILEGES ON roundcubemail.* TO roundcubemail@localhost IDENTIFIED BY 'roundcubemail'; mysql> FLUSH PRIVILEGES;

Query OK, 0 rows affected (0.00 sec) 10.单击CONTINUE继续 11.单击初始化数据库按钮 12.初始化完成并查看数据库表 13.下面我们进行WebMail测试

postfix reload

/etc/init.d/clamd restart /etc/init.d/amavisd restart yum install clamd yum install amavisd*

十二、安装并配置病毒扫描与垃圾邮件过滤

1.安装安amavisd-new2.8、clamav及spamassassin

[root@mail ~]# yum install -y clamav clamav-devel clamd spamassassin

amavisd-new 2.8要手动下依赖包 先yum后卸载再rpm 2.查看amavisd-new、clamav及spamassassin开机自启动

大家可以看到spamassassin是个服务是停止的开机没有启动,是因为amavisd-new直接将spamassassin作为一个模块使用,所以不需要守护进程,自然开机不需要启动 3.修改SpamAssassin配置文件

SpamAssassin作为amavisd-new的模块是需要特别配置,只要安装就行,但是你也可以定制它通过修改 [root@mail ~]# vi /etc/mail/spamassassin/local.cf

# These values can be overridden by editing ~/.spamassassin/user_prefs.cf # (see spamassassin(1) for details)

# These should be safe assumptions and allow for simple visual sifting # without risking lost emails. required_hits 5 report_safe 0

rewrite_header Subject [SPAM]

我这里只是列出为给大家看一下,有需要的博友自行修改,我这里就不修改了 4.修改ClamAV配置文件/etc/clamd.conf

说明,ClamAV的设定存放在/etc/clamd.conf内,我们修改/etc/clamd.conf配置文件让ClamAV知道,Amavisd-new

将会利用本地的UNIX通讯端与它通信而不是利用tcp端口来与它通信! [root@mail ~]# vi /etc/clamd.conf #利用本地通信

LocalSocket /var/run/clamav/clamd.sock

#注释掉TCP通信端口 #TCPSocket 3310

5.修改Amavisd-new配置文件/etc/amavisd.conf vi /etc/amavisd/amavisd.conf

(1).通过去除以下数行的注释来停止检查病毒域垃圾邮件(由于下面数行默认是被注释掉的,因此病毒及垃圾邮件在预设中默认是被启动的) [root@mail ~]# vi /etc/amavisd.conf

# @bypass_virus_checks_maps = (1); # controls running of anti-virus code # @bypass_spam_checks_maps = (1); # controls running of anti-spam code # $bypass_decode_parts = 1; # controls running of decoders&dearchivers (2).接着可以看到下面几行

$max_servers = 2; # num of pre-forked children (2..30 is common), -m $daemon_user = \ # (no default; customary: vscan or amavis), -u $daemon_group = \ # (no default; customary: vscan or amavis), -g $inet_socket_port = 10024; # listen on this local TCP port(s) # $notify_method = 'smtp:[127.0.0.1]:10025';

# $forward_method = 'smtp:[127.0.0.1]:10025'; # set to undef with milter!

说明,

$max_servers 设定同步执行的Amavisd-new进程数量,而且必须与/etc/postfix/master.cf内的amavisfeed服务的maxproc中相符合

$daemon_user及$daemon_group应该用来匹配Amavisd-new的用户及群组

$inet_socket_port 定义Amavisd-new将会在哪一个tcp端口接纳来自Postfix的连接 $notify_method及$forward_method定义Amavisd-new把邮件重新注入Postfix的途径 (3).以下是必须修改项

$mydomain = 'jungp.comm'; #我这里是free.com域 $MYHOME = '/var/amavis'; $helpers_home = \ $lock_file = \ $pid_file = \

$myhostname = 'www.jungp.comm'; #我这里是mail.free.com主机 (4).下面是SpamAssassin设定来替换预设的SpamAssassin设置

$sa_tag_level_deflt = 2.0; # add spam info headers if at, or above that level $sa_tag2_level_deflt = 6.2; # add 'spam detected' headers at that level $sa_kill_level_deflt = 6.9; # triggers spam evasive actions (e.g. blocks mail) $sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent $sa_crediblefrom_dsn_cutoff_level = 18; # likewise, but for a likely valid From # $sa_quarantine_cutoff_level = 25; # spam level beyond which quarantine is off $penpals_bonus_score = 8; # (no effect without a @storage_sql_dsn database) $penpals_threshold_high = $sa_kill_level_deflt; # don't waste time on hi spam $bounce_killer_score = 100; # spam score points to add for joe-jobbed bounces $sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is larger

$sa_local_tests_only = 0; # only tests which do not require internet access?

说明,默认不需要修改但你得知道它们和意义,可以方便的帮助我们设置垃圾邮件‘

$sa_tag_level_deflt 指定Amavisd-new由哪一个级别开始写入X-Spam-Flag、X-Spam-Score、X-Spam-Status等垃圾邮件资讯标头,假如你想为所有邮件加入资讯标头,请把此值设为 -999 $sa_tag2_level_deflt 指定由哪一个级别开始在垃圾邮件的标头上标签它们 $sa_kill_level_deflt 指定Amavisd-new由哪一个级别开始拦截和扣留邮件。这个用途很大,因为SpamAssassin在预设情况下不会这样做

$sa_dsn_cutoff_level 指定由哪一个级别开始寄件失败通告不会被发送给寄件人。由于多数垃圾邮件寄件者的地址都是伪造的,不为明显的垃圾邮件发送寄件失败通告是最合理的,要不然你只会加剧反向散寄的问题

$sa_quarantine_cutoff_level 指定哪一个级别开始不必扣留垃圾邮件。这个选项预设是被注释掉的,意思是所有邮件都会被扣留

(5).下面是发送通告的邮件地址(默认是管理员邮箱,接收垃圾邮件通告的邮箱) 修改为,

$virus_admin = \ # notifications recip. $mailfrom_notify_admin = \ # notifications sender $mailfrom_notify_recip = \ # notifications sender $mailfrom_notify_spamadmin = \(6).设置ClamAV的部分

# ### http://www.clamav.net/ #['ClamAV-clamd',

# \\&ask_daemon, [\ # qr/\\bOK$/m, qr/\\bFOUND$/m,

# qr/^.*?: (?!Infected Archive)(.*) FOUND$/m ],

修改为,

#去掉相关注释就行

# ### http://www.clamav.net/ ['ClamAV-clamd',

\\&ask_daemon, [\ qr/\\bOK$/m, qr/\\bFOUND$/m,

qr/^.*?: (?!Infected Archive)(.*) FOUND$/m ],

说明,/var/run/clamav/clamd.sock这个设定必须与我们先前在/etc/clamd.conf内输入的LocalSocket /var/run/clamav/clamd.sock设定相一致。 6.修改Postfix配置文件

(1).修改/etc/postfix/master.cf

[root@mail ~]# vi /etc/postfix/master.cf

# ========================================================================== # # service type private unpriv chroot wakeup maxproc command + args # # (yes) (yes) (yes) (never) (100)

# # ========================================================================== # #

amavisfeed unix - - n - 2 smtp -o smtp_data_done_timeout=1200 -o smtp_send_xforward_command=yes


CentOS-6.6大型企业级邮件系统架设-postfix+dovecot+mysql+postf(3).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:初中名著导读试题

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: