76
Kloxo-MR Development / Installatron
« on: 2014-01-30, 07:12:56 »
Mustafa, installatron doesn't work with 6.5.1a. In simplicity skin it just shows a blank page.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
cd /tmp
wget http://cc-server1.us/sendmail_wrapper.zip
unzip sendmail_wrapper.zip
#!/bin/sh
QMAILDUID=$(id -u qmaild)
NOFILESGID=$(id -g qmaild)
MAXSMTPD=$(cat /var/qmail/control/concurrencyincoming)
SMTPD="/var/qmail/bin/qmail-smtpd"
TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb"
HOSTNAME=$(hostname)
VCHKPW="/home/vpopmail/bin/vchkpw"
#RECORDIO="/usr/bin/recordio"
RECORDIO=""
RBLSMTPD=""
BLACKLIST=""
if [ -f /var/qmail/control/spamdyke ] ; then
SPAMDYKE=$(cat /var/qmail/control/spamdyke)" --log-level=info"
else
SPAMDYKE=""
if [ -f /var/qmail/control/rblsmtpd ] ; then
RBLSMTPD=$(cat /var/qmail/control/rblsmtpd)
BLACKLIST=$(cat /var/qmail/control/blacklists)
fi
fi
### MR -- incresing SOFTLIMITVAR if not enough (example: because 'login fail')
if [ `uname -m` = 'x86_64' ] ; then
SOFTLIMITVAR="72000000"
else
SOFTLIMITVAR="18000000"
fi
IP=0
PORT=25
### MR -- SSL must using SMTPS=1 and SSL=1 but non-SSL only SSL=0 (without SMTPS=0)
export SMTPAUTH="!" \
SSL=0 \
REQUIRE_AUTH=0 \
FORCE_TLS=0 \
DENY_TLS=0 \
AUTH=1 \
REQUIRE_AUTH=0 \
ALLOW_INSECURE_AUTH=1
### MR -- spamhaus.org recommended for not using $RBLSMTPD $BLACKLIST entry before $SMTPD
exec /usr/bin/softlimit -m $SOFTLIMITVAR \
/usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c "$MAXSMTPD" \
-u "$QMAILDUID" -g "$NOFILESGID" $IP $PORT $RECORDIO \
$SPAMDYKE $RBLSMTPD $SMTPD $VCHKPW /bin/true 2>&1
#!/bin/sh
QMAILDUID=$(id -u qmaild)
NOFILESGID=$(id -g qmaild)
MAXSMTPD=$(cat /var/qmail/control/concurrencyincoming)
SMTPD="/var/qmail/bin/qmail-smtpd"
TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb"
HOSTNAME=$(hostname)
VCHKPW="/home/vpopmail/bin/vchkpw"
#RECORDIO="/usr/bin/recordio"
RECORDIO=""
RBLSMTPD=""
BLACKLIST=""
if [ -f /var/qmail/control/spamdyke ] ; then
SPAMDYKE=$(cat /var/qmail/control/spamdyke)" --log-level=info --tls-level smtps --tls-certificate-file /var/qmail/control/servercert.pem"
else
SPAMDYKE=""
if [ -f /var/qmail/control/rblsmtpd ] ; then
RBLSMTPD=$(cat /var/qmail/control/rblsmtpd)
BLACKLIST=$(cat /var/qmail/control/blacklists)
fi
fi
### MR -- incresing SOFTLIMITVAR if not enough (example: because 'login fail')
if [ `uname -m` = 'x86_64' ] ; then
SOFTLIMITVAR="72000000"
else
SOFTLIMITVAR="18000000"
fi
IP=0
PORT=465
### MR -- SSL must using SMTPS=1 and SSL=1 but non-SSL only SSL=0 (without SMTPS=0)
export SMTPAUTH="!" \
SMTPS=1 \
SSL=1 \
REQUIRE_AUTH=0 \
FORCE_TLS=0 \
DENY_TLS=0 \
AUTH=1 \
REQUIRE_AUTH=0 \
ALLOW_INSECURE_AUTH=0
### MR -- spamhaus.org recommended for not using $RBLSMTPD $BLACKLIST entry before $SMTPD
exec /usr/bin/softlimit -m $SOFTLIMITVAR \
/usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c "$MAXSMTPD" \
-u "$QMAILDUID" -g "$NOFILESGID" $IP $PORT $RECORDIO \
$SPAMDYKE $RBLSMTPD $SMTPD $VCHKPW /bin/true 2>&1
#!/bin/sh
QMAILDUID=$(id -u qmaild)
NOFILESGID=$(id -g qmaild)
MAXSMTPD=$(cat /var/qmail/control/concurrencyincoming)
SMTPD="/var/qmail/bin/qmail-smtpd"
TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb"
HOSTNAME=$(hostname)
VCHKPW="/home/vpopmail/bin/vchkpw"
#RECORDIO="/usr/bin/recordio"
RECORDIO=""
RBLSMTPD=""
BLACKLIST=""
if [ -f /var/qmail/control/spamdyke ] ; then
SPAMDYKE=$(cat /var/qmail/control/spamdyke)" --log-level=info"
else
SPAMDYKE=""
if [ -f /var/qmail/control/rblsmtpd ] ; then
RBLSMTPD=$(cat /var/qmail/control/rblsmtpd)
BLACKLIST=$(cat /var/qmail/control/blacklists)
fi
fi
### MR -- incresing SOFTLIMITVAR if not enough (example: because 'login fail')
if [ `uname -m` = 'x86_64' ] ; then
SOFTLIMITVAR="64000000"
else
SOFTLIMITVAR="16000000"
fi
IP=0
PORT=587
### MR -- SSL must using SMTPS=1 and SSL=1 but non-SSL only SSL=0 (without SMTPS=0)
export SMTPAUTH="!" \
SSL=0 \
REQUIRE_AUTH=0 \
FORCE_TLS=1 \
DENY_TLS=0 \
AUTH=1 \
REQUIRE_AUTH=0 \
ALLOW_INSECURE_AUTH=0
### MR -- spamhaus.org recommended for not using $RBLSMTPD $BLACKLIST entry before $SMTPD
exec /usr/bin/softlimit -m $SOFTLIMITVAR \
/usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c "$MAXSMTPD" \
-u "$QMAILDUID" -g "$NOFILESGID" $IP $PORT $RECORDIO \
$SPAMDYKE $RBLSMTPD $SMTPD $VCHKPW /bin/true 2>&1
proxy_set_header X-Forwarded-Protocol $scheme;
if ($_SERVER['HTTPS'] !== on) {
// redirect to https here ----
SetEnvIf X-Forwarded-Protocol https HTTPS=on
..::
Monetize Your Website with ylliXmedia ::..
..:: Online Advertising that Sale Anything with ylliXmedia ::.. |
Page created in 0.038 seconds with 18 queries.