Вы находитесь на странице: 1из 3

Qmail Control document

Webmin
https://202.69.45.138:10000 ID: root Pwd: gerrys321

ssh:
IP: 202.69.45.138 Port: 1990 ID: root Pwd: gerrys321

https://202.69.45.138/admin-toaster/ ID: admin Pwd: gt##2017

For Email User creation/deletion/forwarding etc.


https://202.69.45.138/qmailadmin
ID: postmaster
Domain: gentipak.com
Pwd: gt##2017

Database Mysql/mariadb:
ID: root Pwd: gt#2017 Already Saved in Webmin

While User not logon after password Change on Web


service dovecot reload
service httpd reload

Webmail: Roude cube


https://202.69.45.138/roundcube/

Webmail:SquirrelMail
https://202.69.45.138/webmail (Mail will not work until actual domain
configured.)

Log Directory:
/var/log/qmail/
Multitail –f /var/log/qmail/send/current /var/log/qmail/smtp/current
/var/log/qmail/submission/current /var/log/dovecot.log

Fail2ban Configured.
/etc/fail2ban

Start Local Interface:


/etc/rc.local

/var/qmail/control/simcontrol
:clam=yes,spam=yes,spam_hits=12,attach=.mp3:.src:.pif:.com:.exe:.dll:.vbs:.rm:.wmv:.mp:
.mp4:.mpeg:.avi:.bat

route add -host 5.101.0.34 reject (for reject IP (Spaming))

For view mail queue


qmailctl queue stat
Command line:
Users Directory
/home /vpopmail/domain/gentipak.com

Spamdyke configuration
/etc/spamdyke

Spamdyke for spam prevention.


/var/log/spamdyke

Change password
/home/vpopmail/bin/vchangepw

Reject IP At email Server


Routte add –host ipaddress reject

Header Block
/etc/spamdyke/header_block

Mail Size previous (20971520)


(40971520)
Current (15728642)
/var/qmail/control/databytes
echo "10485760" > /var/qmail/control/databytes
Your attachment limits is 20971520 bytes = 20Mb, you may increase or decrease in

For IP blacklist:
/etc/spamdyke/blacklist_ip

For white list IP:


/etc/spamdyke/whitelist_ip

For blacklist sender:


/etc/spamdyke/blacklist_senders

For White list sender:


sender-whitelist-file=/etc/spamdyke/whitelist_senders
receipt-whitelist-file=/etc/spamdyke/whitelist_recipients

For Bad Mail


/var/qmail/control/badmailto any ID/Domain
/var/qmail/control/badmailfrom any ID/Domain
/var/qmail/control/badhelo

For relaying specific Pool

/etc/tcprules.d/tcp.smtp

Above commands need to command qmailctl cdb and qmailctl reload

Pl allow these IDs in /etc/spamdyke/whitelist_recipients and whitelist_senders


Monitoring
tail -f /var/log/maillog | grep password

tail -f /var/log/maillog | grep DENIED

tail -f /var/log/maillog | grep sorry,_your_envelope_sender_has_been_denied

tail –f /var/log/qmail/smtp/current | grep “bad attachment”

Tail –f /var/log/maillog | grep header

Tail –f /var/log/maillog | grep DENIED

Multitail –f /var/log/qmail/send/current /var/log/qmail/smtp/current


/var/log/qmail/submission/current /var/log/dovecot.log

For login Problem


cat /var/log/dovecot.log | grep rkhan (Aborted login)

For sending Problem


cat /var/log/qmail/smtp/current | grep “bad attachment”

Вам также может понравиться