Applicable to:. Plesk for Linux Release notes This article's sole purpose is providing information regarding the services that Plesk interacts with.
Setup Postfix
Below you will find the configuration and log file locations of the services, which may be useful during a troubleshooting procedure. April 05, 2017 11:42 dovecot documentation STILL incorrect:. Logs can be found using the /usr/sbin/dovecot log find command This statement makes no sense – I see nothing in here about finding logs /usr/sbin/dovecot -help Usage: dovecot -F -c -p -n -a -help -version -build-options -hostdomain reload stop Dovecot repeatedly stops sending email with no errors. Having access to the logs would be helpful. /etc/sysconfig/dovecot The directory / etc/sysconfig does not exist! November 24, 2017 10:48 (Edited November 24, 2017 10:48) @ Oh, I see. In case you need to change collectd interval, the only way is to edit /etc/sw-collectd/collectd.conf file, as you mentioned.
![Plesk Plesk](https://tecadmin.net/wp-content/uploads/2014/06/dkim-domainkeys.png)
But it could be rewritten during installing Plesk updates (in case Health Monitor will be updated to a new version). So, the only workaround I can suggest is to create a cron task to keep the file modified. For example, the task from the screenshot can be used.(/etc/sw-collectd/collectd.conf.modified is the file with modified interval value).
Just found the solution by myself: Symptoms When trying to send email using Roundcube, an error occurs: SMTP Error (250): Authentication failed When connecting via telnet, following output is displayed: # telnet domain.tld 25 Trying 91.204.25.4. Connected to domain.tld. Escape character is '^'. 220 domain.tld ESMTP Postfix helo l 250 domain.tld auth login 503 5.5.1 Error: authentication not enabled Mail server does not return authentication mechanisms list: # telnet 1.2.3.4 25 Trying 1.2.3.4. Connected to 1.2.3.4 Escape character is '^'. 220 host.tld ESMTP Postfix ehlo parallels.com 250-host.tld 250-PIPELINING 250-SIZE 20480000 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN Cause Postfix misconfiguration. Resolution Check Postfix configuration file at /etc/postfix/main.cf.
Comment thee following lines which are responsible for preventing plain text passwords and forcing SMTP connection over SSL or TLS #smtpdsaslsecurityoptions = noplaintext #smtpdtlsauthonly = yes.
With Plesk there is no agreement to sign and you can upgrade or downgrade between different editions at any time. In case you want to go big with Plesk, you can also check out our options to become a hosting partner to resell and/or use Plesk for larger installations and platforms. If you are an agency, a cloud or hosting provider or even indepedent developer or designer – Plesk can help you growing your business faster. We offer strong discounts between 15 and 45% on our retail licenses. The minimum commitment starts at 250$/month and includes a premium support SLA, a dedicated account manager and access to many partner-only resources.
Visit our page for more details. With Plesk, you don’t have to worry about server management anymore, as most of it is automated through Plesk from all aspects. Using a VPS with Plesk, you have everything convered from building a professional website, security on all levels and even operations such as staging/production for WordPress or automated backups.
Consider Plesk to be your tool to “automanage” your server and help you focusing building great websites and applications. And if required, scale big on larger machines, also for medium and large scale website and app projects. In addition, Plesk’s support for modern tools like Docker, NodeJS or Git enables you to run it all on Plesk – and never think about server management again.
Postfix Basic Configuration Postfix Basic Configuration Introduction Postfix has several hundred configuration parameters that are controlled via the file. Fortunately, all parameters have sensible default values. In many cases, you need to configure only two or three parameters before you can start to play with the mail system. Here's a quick introduction to the syntax:. The text below assumes that you already have Postfix installed on the system, either by compiling the source code yourself (as described in the file) or by installing an already compiled version.
This document covers basic Postfix configuration. Information about how to configure Postfix for specific applications such as mailhub, firewall or dial-up client can be found in the file. But don't go there until you already have covered the material presented below.
The first parameters of interest specify the machine's identity and role in the network. The default values for many other configuration parameters are derived from just these. The next parameter of interest controls the amount of mail sent to the local postmaster:. Be sure to set the following correctly if you're behind a proxy or network address translator, and you are running a backup MX host for some other domain:. Postfix daemon processes run in the background, and log problems and normal activity to the syslog daemon. Here are a few things that you need to be aware of:.
If your machine has unusual security requirements you may want to run Postfix daemon processes inside a chroot environment. If you run Postfix on a virtual network interface, or if your machine runs other mailers on virtual interfaces, you'll have to look at the other parameters listed here as well:.
By default, Postfix configuration files are in /etc/postfix. The two most important files are and; these files must be owned by root. Giving someone else write permission to or (or to their parent directories) means giving root privileges to that person. In /etc/postfix/ you will have to set up a minimal number of configuration parameters. Postfix configuration parameters resemble shell variables, with two important differences: the first one is that Postfix does not know about quotes like the UNIX shell does.
You specify a configuration parameter as: /etc/postfix/: parameter = value and you use it by putting a '$' character in front of its name: /etc/postfix/: otherparameter = $parameter You can use $parameter before it is given a value (that is the second main difference with UNIX shell variables). The Postfix configuration language uses lazy evaluation, and does not look at a parameter value until it is needed at runtime.
Postfix uses database files for access control, address rewriting and other purposes. The file gives an introduction to how Postfix works with Berkeley DB, LDAP or SQL and other types. Here is a common example of how Postfix invokes a database: /etc/postfix/: =:/etc/postfix/virtual Whenever you make a change to the or file, execute the following command as root in order to refresh a running mail system: # postfix reload The parameter specifies the domain that appears in mail that is posted on this machine. The default is to use the local machine name, $, which defaults to the name of the machine. Unless you are running a really small site, you probably want to change that into $, which defaults to the parent domain of the machine name.
For the sake of consistency between sender and recipient addresses, also specifies the domain name that is appended to an unqualified recipient address. Examples (specify only one of the following): /etc/postfix/: = $ (default: send mail as 'user@$') = $ (probably desirable: 'user@$') The parameter specifies what domains this machine will deliver locally, instead of forwarding to another machine. The default is to receive mail for the machine itself. See the file for how to configure Postfix for. You can specify zero or more domain names, '/file/name' patterns and/or ' lookup tables (such as:,:, nis:,:, or:), separated by whitespace and/or commas. A '/file/name' pattern is replaced by its contents; ' requests that a table lookup is done and merely tests for existence: the lookup result is ignored. IMPORTANT: If your machine is a mail server for its entire domain, you must list $ as well.
Example 1: default setting. /etc/postfix/: = $ localhost.$ localhost Example 2: domain-wide mail server. /etc/postfix/: = $ localhost.$ localhost $ Example 3: host with multiple DNS A records. /etc/postfix/: = $ localhost.$ localhost www.$ ftp.$ Caution: in order to avoid mail delivery loops, you must list all hostnames of the machine, including $, and localhost.$. By default, Postfix will forward mail from clients in authorized network blocks to any destination. Authorized networks are defined with the configuration parameter. The current default is to authorize the local machine only.
Prior to Postfix 3.0, the default was to authorize all clients in the IP subnetworks that the local machine is attached to. Postfix can also be configured to relay mail from 'mobile' clients that send mail from outside an authorized network block. This is explained in the and documents. IMPORTANT: If your machine is connected to a wide area network then your default setting may be too friendly. Examples (specify only one of the following): /etc/postfix/: = subnet (default: authorize subnetworks) = host (safe: authorize local machine only) = 127.0.0.0/8 (safe: authorize local machine only) = 127.0.0.0/8 168.100.189.2/32 (authorize local machine) You can specify the trusted networks in the file, or you can let Postfix do the work for you. The default is to let Postfix do the work. The result depends on the parameter value.
Specify ' = host' when Postfix should forward mail from only the local machine. Specify ' = subnet' (the default) when Postfix should forward mail from SMTP clients in the same IP subnetworks as the local machine. On Linux, this works correctly only with interfaces specified with the 'ifconfig' command. Specify ' = class' when Postfix should forward mail from SMTP clients in the same IP class A/B/C networks as the local machine. Don't do this with a dialup site - it would cause Postfix to 'trust' your entire provider's network. Instead, specify an explicit list by hand, as described below. Alternatively, you can specify the list by hand, in which case Postfix ignores the setting.
To specify the list of trusted networks by hand, specify network blocks in CIDR (network/mask) notation, for example: /etc/postfix/: = 168.100.189.0/28, 127.0.0.0/8 You can also specify the absolute pathname of a pattern file instead of listing the patterns in the file. By default, Postfix will forward mail from strangers (clients outside authorized networks) to authorized remote destinations only. Authorized remote destinations are defined with the configuration parameter. The default is to authorize all domains (and subdomains) of the domains listed with the parameter. Examples (specify only one of the following): /etc/postfix/: = $ (default) = (safe: never forward mail from strangers) = $ (forward mail to my domain and subdomains) By default, Postfix tries to deliver mail directly to the Internet. Depending on your local conditions this may not be possible or desirable. For example, your system may be turned off outside office hours, it may be behind a firewall, or it may be connected via a provider who does not allow direct mail to the Internet.
In those cases you need to configure Postfix to deliver mail indirectly via a. Examples (specify only one of the following): /etc/postfix/: = (default: direct delivery to Internet) = $ (deliver via local mailhub) = mail.$ (deliver via local mailhub) = mail.isp.tld (deliver via provider mailhub) The form enclosed with eliminates DNS MX lookups. Don't worry if you don't know what that means. Just be sure to specify the around the mailhub hostname that your ISP gave to you, otherwise mail may be mis-delivered. The file has more hints and tips for firewalled and/or dial-up networks.
You should set up a postmaster alias in the table that directs mail to a human person. The postmaster address is required to exist, so that people can report mail delivery problems. While you're updating the table, be sure to direct mail for the super-user to a human person too. /etc/aliases: postmaster: you root: you Execute the command 'newaliases' after changing the aliases file. Instead of /etc/aliases, your alias file may be located elsewhere. Use the command 'postconf ' to find out.
The Postfix system reports problems to the postmaster alias. You may not be interested in all types of trouble reports, so this reporting mechanism is configurable. The default is to report only serious problems (resource, software) to postmaster: Default setting: /etc/postfix/: = resource, software The meaning of the classes is as follows: bounce Inform the postmaster of undeliverable mail. Either send the postmaster a copy of undeliverable mail that is returned to the sender, or send a transcript of the SMTP session when Postfix rejected mail. For privacy reasons, the postmaster copy of undeliverable mail is truncated after the original message headers.
This implies '2bounce' (see below). See also the feature.
The notification is sent to the address specified with the configuration parameter (default: postmaster). 2bounce When Postfix is unable to return undeliverable mail to the sender, send it to the postmaster instead (without truncating the message after the primary headers). The notification is sent to the address specified with the configuration parameter (default: postmaster). Delay Inform the postmaster of delayed mail. In this case, the postmaster receives message headers only. The notification is sent to the address specified with the configuration parameter (default: postmaster). Policy Inform the postmaster of client requests that were rejected because of (UCE) policy restrictions.
The postmaster receives a transcript of the SMTP session. The notification is sent to the address specified with the configuration parameter (default: postmaster). Protocol Inform the postmaster of protocol errors (client or server side) or attempts by a client to execute unimplemented commands. The postmaster receives a transcript of the SMTP session. The notification is sent to the address specified with the configuration parameter (default: postmaster). Resource Inform the postmaster of mail not delivered due to resource problems (for example, queue file write errors).
![Postfix Configuration File Plesk Demo Postfix Configuration File Plesk Demo](/uploads/1/2/3/7/123751908/563412490.png)
The notification is sent to the address specified with the configuration parameter (default: postmaster). Software Inform the postmaster of mail not delivered due to software problems. The notification is sent to the address specified with the configuration parameter (default: postmaster). Some mail servers are connected to the Internet via a network address translator (NAT) or proxy. This means that systems on the Internet connect to the address of the NAT or proxy, instead of connecting to the network address of the mail server. The NAT or proxy forwards the connection to the network address of the mail server, but Postfix does not know this. If you run a Postfix server behind a proxy or NAT, you need to configure the parameter and specify all the external proxy or NAT addresses that Postfix receives mail on.
You may specify symbolic hostnames instead of network addresses. IMPORTANT: You must specify your proxy/NAT external addresses when your system is a backup MX host for other domains, otherwise mail delivery loops will happen when the primary MX host is down. Example: host behind NAT box running a backup MX host. /etc/postfix/: = 1.2.3.4 (the proxy/NAT external network address) Postfix daemon processes run in the background, and log problems and normal activity to the syslog daemon. The syslogd process sorts events by class and severity, and appends them to logfiles. The logging classes, levels and logfile names are usually specified in /etc/syslog.conf. At the very least you need something like: /etc/syslog.conf: mail.err /dev/console mail.debug /var/log/maillog After changing the syslog.conf file, send a 'HUP' signal to the syslogd process.
IMPORTANT: many syslogd implementations will not create files. You must create files before (re)starting syslogd. IMPORTANT: on Linux you need to put a '-' character before the pathname, e.g., -/var/log/maillog, otherwise the syslogd process will use more system resources than Postfix.
Hopefully, the number of problems will be small, but it is a good idea to run every night before the syslog files are rotated: # postfix check # egrep '(reject warning error fatal panic):' /some/log/file. The first line (postfix check) causes Postfix to report file permission/ownership discrepancies.
The second line looks for problem reports from the mail software, and reports how effective the relay and junk mail access blocks are. This may produce a lot of output. An introduction to solar radiation iqbal. You will want to apply some postprocessing to eliminate uninteresting information.
![Configuration Configuration](https://cloudishvps.com/wp-content/uploads/2014/03/Plesk-Server-settings.jpg)
The document describes the meaning of the 'warning' etc. Labels in Postfix logging. Postfix daemon processes can be configured (via the file) to run in a chroot jail. The processes run at a fixed low privilege and with file system access limited to the Postfix queue directories (/var/spool/postfix). This provides a significant barrier against intrusion.
The barrier is not impenetrable (chroot limits file system access only), but every little bit helps. With the exception of Postfix daemons that deliver mail locally and/or that execute non-Postfix commands, every Postfix daemon can run chrooted. Sites with high security requirements should consider to chroot all daemons that talk to the network: the and processes, and perhaps also the client. The author's own porcupine.org mail server runs all daemons chrooted that can be chrooted.
The default /etc/postfix/ file specifies that no Postfix daemon runs chrooted. In order to enable chroot operation, edit the file /etc/postfix/, and follow instructions in the file.
When you're finished, execute 'postfix reload' to make the change effective. Note that a chrooted daemon resolves all filenames relative to the Postfix queue directory (/var/spool/postfix). For successful use of a chroot jail, most UNIX systems require you to bring in some files or device nodes.
The examples/chroot-setup directory in the source code distribution has a collection of scripts that help you set up Postfix chroot environments on different operating systems. Additionally, you almost certainly need to configure syslogd so that it listens on a socket inside the Postfix queue directory. Examples of syslogd command line options that achieve this for specific systems: FreeBSD: syslogd -l /var/spool/postfix/var/run/log Linux, OpenBSD: syslogd -a /var/spool/postfix/dev/log The parameter specifies the fully-qualified domain name of the machine running the Postfix system.
$ appears as the default value in many other Postfix configuration parameters. By default, is set to the local machine name. If your local machine name is not in fully-qualified domain name form, or if you run Postfix on a virtual interface, you will have to specify the fully-qualified domain name that the mail system should use. Alternatively, if you specify in, then Postfix will use its value to generate a fully-qualified default value for the parameter. Examples (specify only one of the following): /etc/postfix/: = host.local.domain (machine name is not FQDN) = host.virtual.domain (virtual interface) = virtual.domain (virtual interface) The parameter specifies the parent domain of $. By default, it is derived from $ by stripping off the first part (unless the result would be a top-level domain). Conversely, if you specify in, then Postfix will use its value to generate a fully-qualified default value for the parameter.
Examples (specify only one of the following): /etc/postfix/: = local.domain = virtual.domain (virtual interface) The parameter specifies all network interface addresses that the Postfix system should listen on; mail addressed to 'user@network address' will be delivered locally, as if it is addressed to a domain listed in $. You can override the setting in the Postfix file by prepending an IP address to a server name. The default is to listen on all active interfaces. If you run mailers on virtual interfaces, you will have to specify what interfaces to listen on. IMPORTANT: If you run MTAs on virtual interfaces you must specify explicit values for the MTA that receives mail for the machine itself: this MTA should never listen on the virtual interfaces or you would have a mailer loop when a virtual MTA is down. Example: default setting.
/etc/postfix/: = all Example: host running one or more virtual mailers. For each Postfix instance, specify only one of the following.
/etc/postfix/: = virtual.host.tld (virtual Postfix) = $ localhost. (non-virtual Postfix) Note: you need to stop and start Postfix after changing this parameter.