update..
This commit is contained in:
22
roles/common/files/e.mx/etc/postfix/postfwd.bl-hosts
Normal file
22
roles/common/files/e.mx/etc/postfix/postfwd.bl-hosts
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# hosts blocked by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # block all hosts of domain 'oopen.de'
|
||||
# \.oopen\.de$
|
||||
#
|
||||
# # block host a.mx.oopen.de
|
||||
# ^a\.mx\.oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give hostnames to blocke here
|
||||
|
16
roles/common/files/e.mx/etc/postfix/postfwd.bl-nets
Normal file
16
roles/common/files/e.mx/etc/postfix/postfwd.bl-nets
Normal file
@ -0,0 +1,16 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Networks blocked by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # web0.warenform.de
|
||||
# #83.223.86.76
|
||||
# #2a01:30:0:505:286:96ff:fe4a:6ee
|
||||
# #2a01:30:0:13:286:96ff:fe4a:6eee
|
||||
#
|
||||
# ---
|
||||
|
||||
# give networks to block here
|
||||
|
38
roles/common/files/e.mx/etc/postfix/postfwd.bl-sender
Normal file
38
roles/common/files/e.mx/etc/postfix/postfwd.bl-sender
Normal file
@ -0,0 +1,38 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Sender addresses blocked by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# @acieu\.co\.uk$
|
||||
# ^error@mailfrom.com$
|
||||
#
|
||||
# instedt of
|
||||
#
|
||||
# @acieu.co.uk
|
||||
# error@mailfrom.com
|
||||
#
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # # annoying spammer domains
|
||||
# # block all senders of maildomaindomain 'oopen.de'
|
||||
# @acieu\.co\.uk$
|
||||
#
|
||||
# # annoying spammer addresses
|
||||
# # block sender address
|
||||
# error@mailfrom.com
|
||||
# sqek@eike\.se$
|
||||
#
|
||||
# ---
|
||||
|
||||
# annoying spammer domains
|
||||
@acieu\.co\.uk$
|
||||
|
||||
# annoying spammer addresses
|
||||
^error@mailfrom\.com$
|
||||
^sqek@eike\.se$
|
13
roles/common/files/e.mx/etc/postfix/postfwd.bl-user
Normal file
13
roles/common/files/e.mx/etc/postfix/postfwd.bl-user
Normal file
@ -0,0 +1,13 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# SASL Users blocked by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # give SASL usernames to block here
|
||||
# ckubu@oopen.de
|
||||
#
|
||||
# ---
|
||||
|
||||
# give SASL usernames to block here
|
172
roles/common/files/e.mx/etc/postfix/postfwd.cf
Normal file
172
roles/common/files/e.mx/etc/postfix/postfwd.cf
Normal file
@ -0,0 +1,172 @@
|
||||
|
||||
#======= Definitions ============
|
||||
|
||||
# Match messages with an associated SASL username
|
||||
&&SASL_AUTH {
|
||||
sasl_username!~^$
|
||||
}
|
||||
|
||||
# Trusted networks
|
||||
&&TRUSTED_NETS {
|
||||
client_address==file:/etc/postfix/postfwd.wl-nets
|
||||
}
|
||||
|
||||
# Trusted hostnames
|
||||
# client_name~=.warenform.de$
|
||||
&&TRUSTED_HOSTS {
|
||||
client_name=~file:/etc/postfix/postfwd.wl-hosts
|
||||
}
|
||||
|
||||
# Trusted users
|
||||
&&TRUSTED_USERS {
|
||||
sasl_username==file:/etc/postfix/postfwd.wl-user
|
||||
}
|
||||
|
||||
# Trusted senders
|
||||
&&TRUSTED_SENDERS {
|
||||
sender=~file:/etc/postfix/postfwd.wl-sender
|
||||
}
|
||||
|
||||
# Blacklist networks
|
||||
&&BLOCK_NETS {
|
||||
client_address==file:/etc/postfix/postfwd.bl-nets
|
||||
}
|
||||
|
||||
# Blacklist hostnames
|
||||
&&BLOCK_HOSTS {
|
||||
client_name=~file:/etc/postfix/postfwd.bl-hosts
|
||||
}
|
||||
|
||||
# Blacklist users
|
||||
&&BLOCK_USERS {
|
||||
sasl_username==file:/etc/postfix/postfwd.bl-user
|
||||
}
|
||||
|
||||
# Blacklist sender adresses
|
||||
&&BLOCK_SENDER {
|
||||
# =~
|
||||
# using '=~' allows also matching entries for domains (i.e. @acieu.co.uk)
|
||||
sender=~file:/etc/postfix/postfwd.bl-sender
|
||||
}
|
||||
|
||||
# Inbound emails only
|
||||
&&INCOMING {
|
||||
client_address!=127.0.0.1
|
||||
}
|
||||
|
||||
|
||||
#======= Rule Sets ============
|
||||
|
||||
# ---
|
||||
#
|
||||
# Processing of the Rule Sets
|
||||
#
|
||||
# The parser checks the elements of a policy delegation request against the postfwd set
|
||||
# of rules and, if necessary, triggers the configured action (action=). Similar to a
|
||||
# classic firewall, a rule is considered true if every element of the set of rules (or
|
||||
# one from every element list) applies to the comparison. I.e. the following rule:
|
||||
#
|
||||
# client_address=1.1.1.1, 1.1.1.2; client_name==unknown; action=REJECT
|
||||
#
|
||||
# triggers a REJECT if the
|
||||
#
|
||||
# Client address is equal (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
|
||||
#
|
||||
#
|
||||
# Note:
|
||||
# If an element occurs more than once, an element list is formed:
|
||||
#
|
||||
# The following rule set is equivalent to the above:
|
||||
#
|
||||
# client_address=1.1.1.1; client_address=1.1.1.2; client_name==unknown; action=REJECT
|
||||
#
|
||||
#
|
||||
# triggers a REJECT if (as above) the
|
||||
#
|
||||
# Client address (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
|
||||
#
|
||||
# ---
|
||||
|
||||
# Whitelists
|
||||
|
||||
# Whitelist trusted networks
|
||||
id=WHL_NETS
|
||||
&&TRUSTED_NETS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist trusted hostnames
|
||||
id=WHL_HOSTS
|
||||
&&TRUSTED_HOSTS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist sasl users
|
||||
id=WHL_USERS
|
||||
&&TRUSTED_USERS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist senders
|
||||
id=WHL_SENDERS
|
||||
&&INCOMING
|
||||
&&TRUSTED_SENDERS
|
||||
action=DUNNO
|
||||
|
||||
|
||||
# Blacklists
|
||||
|
||||
# Block networks
|
||||
id=BL_NETS
|
||||
&&BLOCK_NETS
|
||||
action=REJECT Network Address $$client_address blocked by Mailserver admins. Error: BL_NETS
|
||||
|
||||
# Block hostname
|
||||
id=BL_HOSTS
|
||||
&&BLOCK_HOSTS
|
||||
action=REJECT $$client_name blocked by Mailserver admins. Error: BL_HOSTS
|
||||
|
||||
# Block users
|
||||
id=BL_USERS
|
||||
&&BLOCK_USERS
|
||||
action=REJECT User is blocked by Mailserver admins. Error: BL_USERS
|
||||
|
||||
# Blacklist sender
|
||||
#
|
||||
# Claim successful delivery and silently discard the message.
|
||||
#
|
||||
id=BL_SENDER
|
||||
&&BLOCK_SENDER
|
||||
#action=DISCARD
|
||||
action=REJECT Sender address is blocked by Mailserver admins. Error: BL_SENDER
|
||||
|
||||
|
||||
# Rate Limits
|
||||
|
||||
# Throttle unknown clients to 5 recipients per 5 minutes:
|
||||
id=RATE_UNKNOWN_CLIENT_ADDR
|
||||
sasl_username =~ /^$/
|
||||
client_name==unknown
|
||||
action=rate(client_address/5/300/450 4.7.1 only 5 recipients per 5 minutes allowed)
|
||||
|
||||
# Block clients (ip-addresses) sending more than 50 messages per minute exceeded. Error:RATE_CLIENT)
|
||||
id=RATE_CLIENT_ADDR
|
||||
&&INCOMING
|
||||
action=rate($$client_address/50/60/421 421 4.7.0 Too many connections from $$client_address)
|
||||
|
||||
# Block messages with more than 50 recipients
|
||||
id=BLOCK_MSG_RCPT
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
recipient_count=50
|
||||
action=REJECT Too many recipients, please reduce to less than 50 or consider using a mailing list. Error: BLOCK_MSG_RCPT
|
||||
|
||||
# Block users sending more than 50 messages/hour
|
||||
id=RATE_MSG
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
action=rate($$sasl_username/50/3600/450 4.7.1 Number messages per hour exceeded. Error:RATE_MSG)
|
||||
|
||||
# Block users sending more than 250 recipients total/hour
|
||||
id=RATE_RCPT
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
action=rcpt($$sasl_username/250/3600/450 4.7.1 Number recipients per hour exceeded. Error:RATE_RCPT)
|
||||
|
22
roles/common/files/e.mx/etc/postfix/postfwd.wl-hosts
Normal file
22
roles/common/files/e.mx/etc/postfix/postfwd.wl-hosts
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted hosts whitelisted by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # all hosts of domain 'oopen.de'
|
||||
# \.oopen\.de$
|
||||
#
|
||||
# # host a.mx.oopen.de
|
||||
# ^a\.mx\.oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give truested hostnames here
|
||||
|
15
roles/common/files/e.mx/etc/postfix/postfwd.wl-nets
Normal file
15
roles/common/files/e.mx/etc/postfix/postfwd.wl-nets
Normal file
@ -0,0 +1,15 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted networks whitelisted by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # web0.warenform.de
|
||||
# #83.223.86.76
|
||||
# #2a01:30:0:505:286:96ff:fe4a:6ee
|
||||
# #2a01:30:0:13:286:96ff:fe4a:6eee
|
||||
#
|
||||
# ---
|
||||
|
||||
# give truested networrk adresses here
|
22
roles/common/files/e.mx/etc/postfix/postfwd.wl-sender
Normal file
22
roles/common/files/e.mx/etc/postfix/postfwd.wl-sender
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted senders whitelisted by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # all senders of maildomaindomain 'oopen.de'
|
||||
# @oopen\.de$
|
||||
#
|
||||
# # sender address ckubu@oopen.de
|
||||
# ^ckubu@oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give trusted sender addresses here
|
||||
|
15
roles/common/files/e.mx/etc/postfix/postfwd.wl-user
Normal file
15
roles/common/files/e.mx/etc/postfix/postfwd.wl-user
Normal file
@ -0,0 +1,15 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# SASL Users whitelisted by postfwd
|
||||
#
|
||||
# example:
|
||||
#
|
||||
# # give trusted sasl usernames here
|
||||
# ckubu@oopen.de
|
||||
# vertrieb@akweb.de
|
||||
#
|
||||
# ---
|
||||
|
||||
# give trusted sasl usernames here
|
||||
|
49
roles/common/files/e.mx/root/.ssh/e.mx-id_rsa-dehydrated
Normal file
49
roles/common/files/e.mx/root/.ssh/e.mx-id_rsa-dehydrated
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27ohFYK1yYp08oGDDB4h+Ju
|
||||
JbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhEgtnBI+96ALlywJO6Eivq
|
||||
kEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNehkOUuZWCLJq/YD1iIuRD
|
||||
rPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUjJvLBZ0MPgmRbFyIlrVz/
|
||||
pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5fYU9IrA5KF9auBTqvZCuX
|
||||
XTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MSvBBletVxaUdZ6xIw5wpq
|
||||
JzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58s67yakyaE9o5MvbqbNdj
|
||||
ZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEzwAoC79+aRNgNuo8uCJxR
|
||||
x01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgFCAbGXcNtFiSJChgMMsMx
|
||||
1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176y54cbg/f5cxR0GbfB6bl
|
||||
0AAAdA4BwyZOAcMmQAAAAHc3NoLXJzYQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27o
|
||||
hFYK1yYp08oGDDB4h+JuJbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhE
|
||||
gtnBI+96ALlywJO6EivqkEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNe
|
||||
hkOUuZWCLJq/YD1iIuRDrPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUj
|
||||
JvLBZ0MPgmRbFyIlrVz/pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5f
|
||||
YU9IrA5KF9auBTqvZCuXXTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MS
|
||||
vBBletVxaUdZ6xIw5wpqJzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58
|
||||
s67yakyaE9o5MvbqbNdjZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEz
|
||||
wAoC79+aRNgNuo8uCJxRx01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgF
|
||||
CAbGXcNtFiSJChgMMsMx1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176
|
||||
y54cbg/f5cxR0GbfB6bl0AAAADAQABAAACAQCfv1lFfjW0xGtRKzZgstfbYYzQ4aPYDyON
|
||||
UTBIMSrnwSRFvbjTP9GWjZt2aRw2hTI4pDzEhoWv5zcZrT7BBBjdcqdXqS2IzwAFvukIel
|
||||
5OzXOg9iwYjs9BXY+8ArosW/fnD8BkXaTikYYaJhnX+wZQyDpCcQ8H5L16JQh+vZ9C+Gpp
|
||||
4sgiIvXm+e6D85VRj5WOxqri1yOgKRMYqZ9SIWA25jX7AznuHBmkdYfqSAWcgG/gXBudRt
|
||||
/gQNfPzLhrJdaOEcYJLNkfM+kXShMq/pQH7lu1GyW+4qZHk+eUbjyv/hEA25eLFtIzfDxf
|
||||
njqDu7RpTnE2kIto3Hw/iLgAlrPkVI8nEoEL7GkWmpm9EyyHL+OgGjEa/PQ4VK9w+WY+Iw
|
||||
iwFORpyFA2uDpuiPYsLkNto//85o2IrBCSx/KMaGhx/INL+4CcKGLjXu/OBFok29vRm44+
|
||||
U8HwNbStN+iyGLqEdH/hbc3Gu6dre8MRRd4h+9aaCncRh5y59mEKNeGwOMmfO6mzu4G1Tq
|
||||
ywuoN6MYqGNpB1TMVN4xS0hLk9m1hfg1WHUeOTqlobRUmZT+ObqJBGIQ45valZSOoHLFLZ
|
||||
p6cw0XasEfl6MWNwHngroi209g71gLL9QzBhK8dJbYd48CtuK9sA7yT6iQ5UlLBueAkpuG
|
||||
RBnoGSVACRhHen+OuUQQAAAQAFWpaNWlPWSNZABzyHSLI76ztgYpY36tix9YfCtXz6IZS5
|
||||
3RFTTkhVgOS+9Z26K7V1jcvTGCo0sEmJPkrChPhtXQhPRJEaNqX3LWAknPDA2Aj2/LUhs4
|
||||
OtygE+todFLOxMi/Sk60BrXHG10xsgHVERN+41G3+K0X+sn7DwBzksO30CSqssRrHe2bgq
|
||||
U5ga/Jos6pPBgqhcTAZWinvgDRzoCfCSdzLXjK5l1pbpV8wlgmlgyEkFyJcXqE4XSz9tS7
|
||||
iJ9E2+L8DwR9b/QorosvEQmlFV1uRFGdZQ/qsBGYAiT5wW232r/5+X3YlaGCD2tFEr0FDL
|
||||
A+MZDe4pz/oswgNoAAABAQD21D98tn3/3B9wtC3ynatTuJnYZI6lgkyiDVbteMYZ22bK7I
|
||||
TZrkfrypc4TW8Hb+e2y/gEUTwQ6zfBHtv9f4yss2vmYfy4dKmCaD2TZg38kAYmFItQSKpI
|
||||
1dFy6+GByqQaZ5ziYXjQM1qpX35Y9EDTuLHWwZfNfuNtc0Jt/Zu5l1Nc0QqHmf8AZWFo5H
|
||||
BMqcFYkBjPfddO/+DDoCy32vBlrPFcr6/zNKESCnaTDopuWqpV9NRWcjOmF+JbNY9CdIDn
|
||||
jp1+mYRsGs26DuoLIqFt26/K2PNI7XyHUocFzHUSmiLZdRAazsK3fYOgKfsEJLkUhlYW52
|
||||
KT0REZ9MSIUHgpAAABAQD19vXtTjeDDlmIwgoX7EHyCX6bXaQL2Iz/fJUeqnsgJV7NIVLC
|
||||
6aPp2DrjBMoSly1TtDgKQDJDlU67hDExD3sqXb8kQjBb5ivfT8H/cC7quj8R3aUX5yNIdK
|
||||
tcZogt/aULr05k5nkdDnoGvExbVMVsXEX0FbtFzDIbmRKyKPlXQdwcH6KHTYgd253tbU3K
|
||||
/Oz1N2DTqsgAukZiUvq4+zcebNXogGygd2M7+bhc3Kftz6Fo/+5ud1qGXha261dxeKG3rM
|
||||
zeROefUKOqLtENRLhTX7i9ARCEPGM8Z8Hmwq6JzJVHfh1ovxF4egImW2Y9NfikKK2qLkei
|
||||
tYQtI6i7GlsVAAAACXJvb3RAZS5teAE=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@e.mx-dehydrated
|
49
roles/common/files/e.mx/root/.ssh/e.mx-id_rsa-opendkim
Normal file
49
roles/common/files/e.mx/root/.ssh/e.mx-id_rsa-opendkim
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit7cjyzfCwgiVGNTHFR/NM
|
||||
44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pTwDc1lRV+zcqi4qXY5JRT
|
||||
OQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn212l1NYD9kR5CoLHhiOy9r
|
||||
7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6cj2z36Zi+382f+IG25sS
|
||||
jeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14qEiv+IqiEucpzOOzv7FCC
|
||||
McAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7cZhL20WDqHWX5tMonQOYs
|
||||
gfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYFC7mf3fj61spYXCCInGor
|
||||
nCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWanNRfTNY99gsie3FjYDyfC
|
||||
3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu4KcwLTrm/8dNGl9LWBhF
|
||||
/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS1amv4m5wg3wA0JyxZqEW
|
||||
UAAAdA1JVcF9SVXBcAAAAHc3NoLXJzYQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit
|
||||
7cjyzfCwgiVGNTHFR/NM44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pT
|
||||
wDc1lRV+zcqi4qXY5JRTOQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn21
|
||||
2l1NYD9kR5CoLHhiOy9r7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6
|
||||
cj2z36Zi+382f+IG25sSjeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14q
|
||||
Eiv+IqiEucpzOOzv7FCCMcAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7c
|
||||
ZhL20WDqHWX5tMonQOYsgfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYF
|
||||
C7mf3fj61spYXCCInGornCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWan
|
||||
NRfTNY99gsie3FjYDyfC3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu
|
||||
4KcwLTrm/8dNGl9LWBhF/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS
|
||||
1amv4m5wg3wA0JyxZqEWUAAAADAQABAAACAQCq1mWIvg+qWY7tGAYXuGgrPrdR+Izj28Og
|
||||
bTkiT03wUkCCrZBpEO8rIoO6MB3VylBVNwS7+4R2HIRW94kgqYi8QSYWoEFAXeujNIlUUa
|
||||
zD6h9PgrZS8fk7iUKDG/d8NUnrTUuP1A3D9/Vy1VDoJqquHohZYs5OUd/lYZ56h5oRoNEP
|
||||
eo39ZGsnJpyqDwC3NiqlcoGYcTt/F3yNdxLfgtVYIn3hNvCkVgiDmPwphJXZsTZeyKoFL0
|
||||
hUDNHh7XMHi1iE5vz8IdUT9WvLmc+yrQ5jDJ2L4OgX3D4jQAE+jizLOlx+0cyqa/Xxu6cE
|
||||
RxmG+D/LgPwUcUAfuzhPKZca4Ng08fXTLQLnj+a1J6qJ4C6rig7Ky8ZCO0aJQJp+sA1w+c
|
||||
+FfKrPf7eb9E5lsj6inlsJ0pRAGOVYaF+mgE06FCJRBatrgxOFIvcU+SP6LOb6LP0FyTT/
|
||||
24AC2INPwrYr3ima7lksqiYKxGVEB283RfMjWQZsHSL+1si6k43FDVjTwhd2fQFd/Zbvvq
|
||||
IDUKGtAR5F2YcztP49p6eA6pgL4B1hXGqaNe0nPL50Qyk1i+wQv832bbQE6OvWhCb0bBLV
|
||||
KV2cqCHcTpdtMI8ehNonpttPVNiJWXewePvV/IfX3XoOaK9L6p0pDBInxgt2Lu1Q1fr7rK
|
||||
YgALetOM1l5pZfwi6WdQAAAQAbi2gto54QxM2H36AVLhGqOoozv5kjIyJ7eamDXtY2hCly
|
||||
X6HiMUNuxv0Pn3S0XkwvSk1lFLw6I6CaGZ9EXqpNheFPc40ShM4Ddy7V6GiYqE8TLkqqHn
|
||||
B1Ek3/7u5E0eA1NGLzbJF9gThZTOLaQYWrvDfpLB7t75qJey99B4cNCSPwr4xeX2itqdzU
|
||||
TX0q9NZzNjdtELQK9yYMmQsOfsMHUNRZyWGJrp0gwYTDNjSROywnXOxsevMo/k3reZWlPY
|
||||
CsaEBtXxEUh2QbfyQqS0EZ4CM8941rkEvN0aMG9IyL9bkRYI0wX4wlvZI8vpz/iUYsrPck
|
||||
0VKcgc/8LjwakPpjAAABAQDvcXdG2yYw2i5y958TvwEQFkTzfFZGnuJ01+NdJz+fYl83Qz
|
||||
liPYmKe4iJzK3udUSUzx5dNpsNV9HFCzC6wuisJMLWINqXGXieluQkeGX22LU1tUzsQgoT
|
||||
aB709dOI0HeN0ZZTT6m1uI+hCUL1ScnM8DahTJ73Q/d+GfZ8Bp2y7iKaZ3H+LYQcz+n1UD
|
||||
41zKvLx+knUnnu/ZL2VDKzYfgrt8ABwuRTm01lX8Cp0vACd51xrMOMZWrxjncfUcTPjhUh
|
||||
5quT7WCuCri9JxQ8Xa6/YLFbwr209dnQ/a3PtKXY/P7RkC8OZi6CgYqET8JFWvIwKEd6YL
|
||||
Tv8Ah9rTmqH9QLAAABAQDfmUZq9oKsN14XtaS4Ot3rOlwsNDwxheTArQsrS96FLXqIHnQW
|
||||
PhJ537XBNQQRSzSXPe0rpiaq7ITRKitJgNqDmAGzcpdnIirXw5i2P8Z2C0DJ8+/cwCWnzy
|
||||
GtKOO5kD98l94JUVQ34dlCN++7bOLZz9i5CbA7ae+7wm+bXmGGzniK0ciqcm4B/d8vh9NS
|
||||
368KmO8E0WXqV0gcjcpD3LNHq1+dsS2QEUv7HKuAUhdOnKvzoD1yX1Y41z9VvxxUQX6W+U
|
||||
JWipsaP16HEXDV4mJ3qLMV2/0bsEitrFwx40T40qI0Ws6BYH97ywgO57CaK/sf3c/w5iwz
|
||||
g9Yz3ip8GiZPAAAACXJvb3RAZS5teAE=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
@ -0,0 +1 @@
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDRIzOUFGlC9R4f2iR3NzJ4syl8hnsxmK3tyPLN8LCCJUY1McVH80zjiB8V+OADZ8rI2NczX5QNG20sayw9DJQOhuPWlKZuz+1pzP+lPANzWVFX7NyqLipdjklFM5D29go1Gq61PhAFACU8XaXZRiPvYkQQwHYPttjlCsD9R4uOfbXaXU1gP2RHkKgseGI7L2vuSxTDSbaFyJ03A6GPViti3YlqpT5H8UGyb1TbiCl/sleJq+2bpyPbPfpmL7fzZ/4gbbmxKN4GAit491/2CcApceTP98F+kv8EbIhkfngUp2KL8IEOM1SzXioSK/4iqIS5ynM47O/sUIIxwCcx4URdE8ax6Alo88ixI7dC+k0VqppASHheyy45l9zs3KjtxmEvbRYOodZfm0yidA5iyB9FW7BTr1XBSvjBL186GakwC/m7t5Z1ez9pQgPf1HclBJt69gULuZ/d+PrWylhcIIicaiucLD+xnZeefdiAVI7z04M+g8wBsQtR2YzK1SZoLb6nzPQT6lZqc1F9M1j32CyJ7cWNgPJ8Lc4IRKSqxSo9JmhfTmMkhiSopgRyk+s36PJiTtK5PgIb0P8vtS7gpzAtOub/x00aX0tYGEX89Dvl99Lps5nj4W4g92DOT27g19+EdJwyeryTISaem7T2oEB5LVqa/ibnCDfADQnLFmoRZQ== root@e.mx-opendkim
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings for script check_cert_for_dovecot.sh
|
||||
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings
|
||||
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---------------------------------------------------------
|
||||
# - Parameter Settings for script 'create_opendkim_key.sh'.
|
||||
# ---------------------------------------------------------
|
||||
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'postfix_add_mailboxes.sh'.
|
||||
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'sent_userinfo_postfix.sh'.
|
||||
|
@ -1,3 +1,5 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ======================================================
|
||||
# ---
|
||||
# Parameter Settings for Script 'whitelist_mb_sigs.conf'
|
||||
|
Reference in New Issue
Block a user