El 02/03/16 a las 14:19, Rommel Rodriguez Toirac escribió:
El Miércoles, 2 de marzo de 2016 13:01:34 Juan Carlos escribió:
El 02/03/2016 a las 08:59 a.m., Rommel Rodriguez Toirac escribió:
El Martes, 1 de marzo de 2016 16:55:53 Arian Molina Aguilera escribió:
El 01/03/16 a las 16:49, Manuel Mely escribió:
On 03/01/2016 02:28 PM, Rommel Rodriguez Toirac wrote:
No me llegó nada :-( Directamente no puedo recibir ni enviar correos
a dominios que no sean .cu y no pueden pasar de 1Mb de tamaño Nada
que nosotros todavía estamos en otra época.
De todos modos si pueden seguir el hilo o al menos postear la solucion
al problema por aqui mejor. Y si es posible acortar un poco el cuerpo
del mensaje (como acabo de hacer en este mensaje)
Sobre la solucion... te dejo en buenas manos :)


______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l
De la propia wiki de Centos Postfix SASL + Dovecot

Configuring SASL in postfix

To configure SASL in postfix, we need to make the following additions to
/etc/postfix/main.cf:


smtpd_sasl_auth_enable = yes
broken_sasl_auth_clients = yes
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/auth
smtpd_sasl_security_options = noanonymous
and add permit_sasl_authenticated to our smtpd_recipient_restrictions
section of /etc/postfix/main.cf (if you don't have a
smtpd_recipient_restrictions section, then the following example will
work fine):


smtpd_recipient_restrictions =

       permit_mynetworks,
       permit_sasl_authenticated,
       reject_unauth_destination

Next we need to configure auth default in the authentication processes
section of /etc/dovecot.conf. Uncomment and/or add the following lines
as necessary (be careful as this section is heavily commented, some
entries already exist, others are commented out and need uncommenting
such as socket listen):


auth default {

       mechanisms = plain login
       passdb pam {
       }
       userdb passwd {
       }
       user = root
       socket listen {
client { path = /var/spool/postfix/private/auth
           mode = 0660
           user = postfix
           group = postfix
} }

}
Restart dovecot and reload postfix configuration setting:


service dovecot restart
postfix reload

De la wiki de debian

PostfixAndSASL

Translation(s): none

Simple Authentication and Security Layer (SASL) with Postfix SMTP


Tabla de Contenidos
SASL authentication in the Postfix SMTP server
Implementation using Cyrus SASL
Using saslauthd with PAM
Using auxprop with sasldb
Troubleshooting tip
Implementation using Dovecot SASL
SASL authentication in the Postfix SMTP client
Postfix and sbcglobal/yahoo/att
SASL authentication in the Postfix SMTP server


Implementation using Cyrus SASL

Using saslauthd with PAM
Setup Postfix with SMTP-AUTH over SASL2 with authentication against PAM
in a chroot() environment.

Note: The following steps have been carried out and verified on a Debian
7.1 system (Jan. 2015).
Note: SASL2 (saslauthd) creates a socket in its working directory.
Postfix (smtpd) needs access to this socket. If smtpd is running
chroot()ed (what is standard on Debian) saslauthd must run within this
chroot() environment also (though not being chrooted itself). While this
is fine for smtpd there are other services (Cyrus imapd for example)
which expect saslauthd 's socket at its "regular" location
(/var/run/saslauthd).
The recommended way to solve this is to run separate saslauthd processes
for Postfix and for others. Debian is prepared for this. Alternatively a
symlink-trick can be used. See below. Or you can disable chroot()ing by
editing the chroot columns in /etc/postfix/master.cf.

Install libsasl2-modules, postfix, sasl2-bin
Create a file /etc/postfix/sasl/smtpd.conf:
pwcheck_method: saslauthd
mech_list: PLAIN LOGIN
Setup a separate saslauthd process to be used from Postfix:
Create a copy of saslauthd's config file
~# cp /etc/default/saslauthd /etc/default/saslauthd-postfix
and edit it
START=yes
DESC="SASL Auth. Daemon for Postfix"
NAME="saslauthd-postf"      # max. 15 char.
# Option -m sets working dir for saslauthd (contains socket)
OPTIONS="-c -m /var/spool/postfix/var/run/saslauthd"        #
postfix/smtp in chroot()
(See /usr/share/doc/sasl2-bin/README.Debian.gz)
Alternatively you can replace the directory /run/saslauthd with a
symlink to /var/spool/postfix/var/run/saslauthd
~# rm -rf /run/saslauthd
~# ln -s /var/spool/postfix/var/run/saslauthd   /run/saslauthd
This is a quick-and-dirty hack, useful only for testing purposes. After
the next reboot the contents of /run will be reset.
Create required subdirectories in postfix chroot directory:
dpkg-statoverride --add root sasl 710
/var/spool/postfix/var/run/saslauthd
Add the user "postfix" to the group "sasl":
adduser postfix sasl
Restart saslauthd:
~# service saslauthd  restart
[ ok ] Stopping SASL Auth. Daemon: saslauthd.
[ ok ] Stopping SASL Auth. Daemon for Postfix: saslauthd-postf.
[ ok ] Starting SASL Auth. Daemon: saslauthd.
[ ok ] Starting SASL Auth. Daemon for Postfix: saslauthd-postf.
Edit Postfix configuration:
~# postconf -e 'smtpd_sasl_local_domain = $myhostname'
~# postconf -e 'smtpd_sasl_auth_enable = yes'
~# postconf -e 'broken_sasl_auth_clients = yes'
~# postconf -e 'smtpd_sasl_security_options = noanonymous'
~# postconf -e 'smtpd_recipient_restrictions =
permit_sasl_authenticated, permit_mynetworks, reject_unauth_destination'
(Optionally) Create a new PAM fragment and adjust it to your needs:
~# cd /etc/pam.d
~# cp other smtp
~# editor /etc/pam.d/smtp
Restart (reloading is not enough) postfix:
~# service postfix restart
That's it, you're done, everything should work fine now.

Using auxprop with sasldb
Setup Postfix with SMTP-AUTH over SASL2 with authentication against
sasldb in a chroot() environment.

Note: The following steps have been carried out and verified on a Debian
8.3 system (Feb. 2016).

Install libsasl2-modules, sasl2-bin
Create a file /etc/postfix/sasl/smtpd.conf:
pwcheck_method: auxprop
auxprop_plugin: sasldb
mech_list: plain login
Add an user to sasldb2

    ~# saslpasswd2 -c -u domain user
    ~# sasldblistusers2

Postfix needs /etc/sasldb2 in his chroot environment. One solution is to
change init script to copy sasldb2 at startup.

In /etc/init.d/postfix, add etc/sasldb2 in the variable FILES :
           FILES="etc/localtime etc/services etc/resolv.conf etc/hosts \
etc/host.conf etc/nsswitch.conf etc/nss_mdns.config

etc/sasldb2"
Edit Postfix configuration:
~# postconf -e 'smtpd_sasl_local_domain = $myhostname'
~# postconf -e 'smtpd_sasl_auth_enable = yes'
~# postconf -e 'smtpd_sasl_security_options = noanonymous'
Restart (reloading is not enough) postfix:
~# service postfix restart
~# systemctl daemon-reload
That's it, you're done, everything should work fine now.

Troubleshooting tip
Check your configuration with saslfinger :
~# saslfinger -s
If something goes wrong (cannot connect to server, authentification
fails) try to see what is happening behind the scenes. Try to connect to
your mailserver via
~# telnet server 25
Can smtpd be connected? If yes, enter the command "ehlo dummy". What
does smtpd respond? For more information see Check for SMTP AUTH support


Implementation using Dovecot SASL

See also: http://wiki.dovecot.org/HowTo/PostfixAndDovecotSASL


SASL authentication in the Postfix SMTP client


Postfix and sbcglobal/yahoo/att

SBC global block port 25 on its DSL users:
http://help.sbcglobal.net/article.php?item=4640
We will use sbc smtp server via authentication to send emails. Do this:

apt-get install libsasl2-modules
ADD to main.cf by using postconf. Just type (smtp.att.yahoo.com requires
the port 587 otherwise you don't need it):

postconf -e "relayhost = [smtp.sbcglobal.yahoo.com]:587"
postconf -e "smtp_sasl_auth_enable = yes"
postconf -e "smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd"
postconf -e "smtp_sasl_security_options = noanonymous"
Create a file called sasl_passwd in /etc/postfix/sasl_passwd. Inside type
in

[smtp.sbcglobal.yahoo.com]:587 usern...@sbcglobal.net:mypassword
Now change permissions so others can't read it:

chmod 600 /etc/postfix/sasl_passwd
Now postmap it. (It creates a database-like file so postfix can read it.)

postmap /etc/postfix/sasl_passwd
Restart postfix

postfix reload

He aquí ambos soluciones para implementación de SASL. Salu2.

   Estoy haciendo la de Cyrus (la de dovecot la dejaré para último).
Ya creé un nuevo arranque de saslauthd para postfix, en

/usr/lib/systemd/system/ cree un nuevo servicio que coge la configuración
de /etc/sysconfig/saslauthd-postfix. Mas o menos queda así:

******
en /usr/lib/systemd/system/saslauthd-postfix.service

[Unit]
Description=SASL authentication daemon para Postfix.
After=syslog.target

[Service]
Type=forking
PIDFile=/var/spool/postfix/private/saslauthd-postfix/saslauthd.pid
EnvironmentFile=/etc/sysconfig/saslauthd-postfix
ExecStart=/usr/sbin/saslauthd -m $SOCKETDIR -a $MECH $FLAGS

[Install]
WantedBy=multi-user.target


en /etc/sysconfig/saslauthd-postfix

SOCKETDIR=/var/spool/postfix/private/saslauthd-postfix
MECH=pam
FLAGS=
******

Y en /etc/postfix/sasl/smtp-postfix adicioné:

pwcheck_method: saslauthd
mech_list: plain login

y además cambié de path  en el /etc/postfix/main.cf el parámetro quedó así:
   smtpd_sasl_path = /etc/postfix/sasl/smtpd-postfix
Creé un grupo llamado sasl donde como usuarios miembros puse a postfix y
   a

root. Creé un directorio en /var/spool/postfix/private/saslauthd-postfix/
que es donde el saslauthd creará su socket y su .pid y modifiqué los
permisos para que los dueños sean root y el grupo sasl.

Hasta ahí todo correcto (según la wiki). Arranco y arranca Ok, pero,
postfix no tiene permiso para huzmear en y dentro de
/var/spool/postfix/private/saslauthd- postfix/ por que cada vez que
levanto el saslathd-postfix se eliminan los permisos del ese directorio.

******
Mar  2 08:54:49 gtmem postfix/postfix-script[5922]: warning: not owned by
postfix: /var/spool/postfix/private/saslauthd-postfix
Mar  2 08:54:49 gtmem postfix/postfix-script[5923]: warning: not owned by
postfix: /var/spool/postfix/private/saslauthd-postfix/mux.accept
Mar  2 08:54:49 gtmem postfix/postfix-script[5924]: warning: not owned by
postfix: /var/spool/postfix/private/saslauthd-postfix/saslauthd.pid
******

   Esa es mi pregunta, como lograr que ese directorio tenga PERMANENTEMENTE

permiso para root como dueño y sasl como grupo y así postfix pueda leer
dentro.
Brother ahi algo llamado Iredmail que te monta un server de correo con
todo en minutos buscalo para centos y tendras tu problema resuelto de
una vez..
  No, prefiero postfix y dovecot

iredmail monta el postfix y el dovecot, son una serie de script que configuran y hacen el trabajo duro sin complicarte tanto la vida configurando a mano, aunque después puedes retocar lo que estimes conveniente. Salu2.

--

Arian Molina Aguilera
Administrador de Redes y Servicios Telemáticos
Linux Usuario Registrado #392892
Telfs: +53(7)696-7510 ext 236
jabber: linuxc...@openmailbox.org
Brascuba Cigarrillos S.A. La Habana. Cuba.
“Nunca consideres el estudio como una obligación,
sino como una oportunidad para penetrar en el bello
y maravilloso mundo del saber. Albert Einstein”



______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Reply via email to