Commit Graph

261 Commits

Author SHA1 Message Date
Antoine Nguyen
b391de5937 Merge branch 'master' of github.com:modoboa/modoboa-installer 2022-09-22 10:53:25 +02:00
Antoine Nguyen
47a5d29043 Fixed opendkim dsn syntax.
fix #2602
2022-09-22 10:52:41 +02:00
Spitap
a192cbcbd0 Updated doc, default path on conf file 2022-09-19 16:40:25 +02:00
Spitap
6b096a7470 Simplified db dumps restore 2022-09-19 15:50:03 +02:00
Spitap
e30add03fd Update from master 2022-09-19 15:39:05 +02:00
Spitap
d75d83f202 more refactoring 2022-09-19 15:13:44 +02:00
Spitap
f3811b4b39 refactoring 2022-09-19 15:00:26 +02:00
Antoine Nguyen
1f8dd1b5df Merge pull request #426 from Spitfireap/mitigate-spamhaus-dns
mitigate false spamhaus reject
2022-09-16 17:11:21 +02:00
Spitap
b0d56b3989 PEP formating 2022-09-15 11:32:57 +02:00
Antoine Nguyen
915cff1ca5 Custom database port support for automx 2022-09-15 11:00:26 +02:00
Antoine Nguyen
1662b14ccc Fixed syntax error 2022-09-15 10:44:46 +02:00
Antoine Nguyen
23ac0bf172 Complete custom database port support 2022-09-15 10:43:44 +02:00
Antoine Nguyen
59c61c3b7c Merge pull request #428 from Spitfireap/Fix-missing-packages
Add missing packages
2022-09-14 16:52:54 +02:00
Spitap
2149b7703f Add missing packages 2022-08-05 15:27:20 +02:00
Spitap
53e3e3ec58 Better UX, use of os to concatenate path 2022-08-05 15:20:11 +02:00
haris
743f2b2fa2 Fix permissions for modoboa dovecot mailbox commands (modoboa/modoboa/issues/2157) 2022-08-01 14:39:55 +02:00
Spitap
199a90c9e8 Set up return codes for other spamlist 2022-07-30 18:48:51 +02:00
Spitap
1ae5061dfa mitigate false spamhaus reject 2022-07-29 16:23:32 +02:00
Antoine Nguyen
f30201d32b Fixed ipv6 issue 2022-07-28 15:17:46 +02:00
Spitap
e546d2cb23 Better UX 2022-07-27 16:32:59 +02:00
Spitap
70faa1c5cb Fixed backupdir index 2022-07-27 15:58:41 +02:00
Spitap
563979a7dd fixed mail backup/restore 2022-07-27 15:51:22 +02:00
Spitap
ee2ccf0647 Fixed postfix install, added restore to readme 2022-07-27 14:35:48 +02:00
Spitap
2077c94b52 Fix amavis config file not copied to right location 2022-07-26 17:05:00 +02:00
Spitap
4a7222bd24 Fixed nginx call to uwsgi 2022-07-26 16:53:24 +02:00
Spitap
e7b6104195 fixed install within class 2022-07-26 16:39:41 +02:00
Spitap
4a00590354 fixed restore disclamer 2022-07-26 16:20:03 +02:00
Spitap
15768c429e Restore workflow done 2022-07-26 12:07:42 +02:00
Spitap
439ffb94c4 initial commit 2022-07-26 10:37:38 +02:00
Spitap
37bc21dfd3 Backup postewhite.conf instead of custom whitelist
Postwhite.conf contains a custom host list
2022-07-26 10:36:08 +02:00
Spitap
26204143af Merge branch 'master' into backup 2022-07-25 22:10:26 +02:00
Spitap
20970557de Allow to disable mail backup 2022-07-25 22:05:35 +02:00
Antoine Nguyen
2123ccf9c3 Merge pull request #415 from saaditDE/saaditDE-PatchTLSVAndCiphers-1
Replacing old TLS versions and insecure ciphers
2022-07-22 09:49:44 +02:00
Spitap
db6457c5f5 better path handling 2022-07-21 19:07:18 +02:00
Spitap
579faccfa5 added an automatic bash option (no path provided) or a path provided bash (for cron job) 2022-07-21 19:00:32 +02:00
Spitap
5318fa279b bash option 2022-07-21 18:00:50 +02:00
Spitap
54185a7c5a Fix database backup logic issue 2022-07-21 17:26:40 +02:00
Spitap
1f9d69c37c Fix copy issue 2022-07-21 17:21:59 +02:00
Spitap
8d02d2a9fb added safe mkdir in utils, use utils.mkdir_safe() in backup 2022-07-21 17:09:23 +02:00
Spitap
6f604a5fec Fix loop logic 2022-07-21 16:53:56 +02:00
Spitap
568c4a65a0 fix none-type passed to os.path 2022-07-21 16:51:32 +02:00
Spitap
dc84a79528 Note : capitalize affects only first letter 2022-07-21 14:12:35 +02:00
Spitap
304e25fa3c Fix getattr 2022-07-21 14:10:57 +02:00
Spitap
070efd61c4 Fix import 2022-07-21 14:08:39 +02:00
Spitap
9917d8023e Edited README, fix backup run process 2022-07-21 14:02:41 +02:00
Spitap
27b9de6755 database backup 2022-07-21 13:48:44 +02:00
Spitap
56ed214fb5 Starting work on backup system 2022-07-19 19:06:53 +02:00
jfhovinne
6466a68d46 Ensure redis server is started 2022-06-05 14:40:53 +02:00
Antoine Nguyen
578fc05981 Added support for amavis 2.12.X (ubuntu 22.04)
see #413
2022-05-18 10:48:53 +02:00
Karim
85dc113fe4 Replaceing old TLS versions and insecure ciphers
NEVER use SSL / TLS in outdated versions or insecure / oudated ciphers. Current state-of-the-art TLS Versions are TLSv1.2 and TLSv1.3. TLSv1.2 is only enabled for backwards compatibility. Ciphers are taken out of the guide. 

```ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384;```

Are the recommended ciphers out of  source 4 in combination of all other sources.
 
source 1: https://www.linuxtechi.com/harden-secure-nginx-web-server-linux
source 2: https://beaglesecurity.com/blog/article/nginx-server-security.html
source 3: https://www.acunetix.com/blog/articles/tls-ssl-cipher-hardening/
source 4: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
2022-05-18 01:22:45 +02:00