]> git.proxmox.com Git - pmg-docs.git/blame - pmgconfig.adoc
bump version to 5.0-16
[pmg-docs.git] / pmgconfig.adoc
CommitLineData
e62ceaf0
DM
1[[chapter_pmgconfig]]
2ifdef::manvolnum[]
3pmgconfig(1)
4============
5:pmg-toplevel:
6
7NAME
8----
9
10pmgconfig - Proxmox Mail Gateway Configuration Management Toolkit
11
12
13SYNOPSIS
14--------
15
16include::pmgconfig.1-synopsis.adoc[]
17
18
19DESCRIPTION
20-----------
21endif::manvolnum[]
22ifndef::manvolnum[]
66e9c719
DM
23Configuration Management
24========================
e62ceaf0
DM
25:pmg-toplevel:
26endif::manvolnum[]
27
685576c2
DM
28{pmg} is usually configured using the web-based Graphical User
29Interface (GUI), but it is also possible to directly edit the
30configuration files, use the REST API over 'https'
66e9c719 31or the command line tool `pmgsh`.
685576c2 32
66e9c719 33The command line tool `pmgconfig` is used to simplify some common
685576c2
DM
34configuration tasks, i.e. to generate cerificates and to rewrite
35service configuration files.
36
66e9c719
DM
37NOTE: We use a Postgres database to store mail filter rules and
38statistic data. See chapter xref:chapter_pmgdb[Database Management]
39for more information.
40
41
42Configuration files overview
43----------------------------
44
45`/etc/network/interfaces`::
46
47Network setup. We never modify this files directly. Instead, we write
48changes to `/etc/network/interfaces.new`. When you reboot, we rename
49the file to `/etc/network/interfaces`, so any changes gets activated
50on the next reboot.
51
9bfe27f3
DM
52`/etc/resolv.conf`::
53
54DNS search domain and nameserver setup.
55
56`/etc/hostname`::
57
58The system's host name.
59
60`/etc/hosts`::
61
62Static table lookup for hostnames.
63
66e9c719
DM
64`/etc/pmg/pmg.conf`::
65
66Stores common administration options, i.e. the spam and mail proxy setup.
67
68`/etc/pmg/cluster.conf`::
69
70The cluster setup.
71
72`/etc/pmg/domains`::
73
74The list of relay domains.
75
76`/etc/pmg/fetchmailrc`::
77
78Fetchmail configuration (POP3 and IMAP setup).
79
80`/etc/pmg/ldap.conf`::
81
82LDAP configuration.
83
84`/etc/pmg/mynetworks`::
85
86List of local (trusted) networks.
87
88`/etc/pmg/subscription`::
89
90Stores your subscription key and status.
91
92`/etc/pmg/transports`::
93
94Message delivery transport setup.
95
96`/etc/pmg/user.conf`::
97
98GUI user configuration.
99
797db11d
DM
100`/etc/mail/spamassassin/custom.cf`::
101
102Custom {spamassassin} setup.
103
66e9c719
DM
104
105Keys and Certificates
106---------------------
107
108`/etc/pmg/pmg-api.pem`::
109
110Key and certificate (combined) used be the HTTPs server (API).
111
112`/etc/pmg/pmg-authkey.key`::
113
114Privat key use to generate authentication tickets.
115
116`/etc/pmg/pmg-authkey.pub`::
117
118Public key use to verify authentication tickets.
119
120`/etc/pmg/pmg-csrf.key`::
121
122Internally used to generate CSRF tokens.
123
124`/etc/pmg/pmg-tls.pem`::
125
126Key and certificate (combined) to encrypt mail traffic (TLS).
127
128
129Service Configuration Templates
130-------------------------------
131
9c85cc80
DM
132{pmg} uses various services to implement mail filtering, for example
133the {postfix} Mail Transport Agent (MTA), the {clamav} antivirus
134engine and the Apache {spamassassin} project. Those services use
135separate configuration files, so we need to rewrite those files when
136configuration is changed.
137
138We use a template based approach to generate those files. The {tts} is
139a well known, fast and flexible template processing system. You can
140find the default templates in `/var/lib/pmg/templates/`. Please do not
141modify them directly, because your modification would get lost on the
142next update. Instead, copy them to `/etc/pmg/templates/`, then apply
143your changes there.
144
145Templates can access any configuration setting, and you can use the
146`pmgconfig dump` command to get a list of all variable names:
147
148----
149# pmgconfig dump
150...
151dns.domain = yourdomain.tld
152dns.hostname = pmg
153ipconfig.int_ip = 192.168.2.127
154pmg.admin.advfilter = 1
155...
156----
157
158The same tool is used to force regeneration of all template based
159configuration files. You need to run that after modifying a template,
160or when you directly edit configuration files
161
162----
163# pmgconfig sync --restart 1
164----
165
166Above commands also restarts services if underlying configuration
167files are changed. Please note that this is automatically done when
168you change the configuration using the GUI or API.
169
170NOTE: Modified templates from `/etc/pmg/templates/` are automatically
171synced from the master node to all cluster members.
66e9c719
DM
172
173
685576c2
DM
174System Configuration
175--------------------
176
177Network and Time
178~~~~~~~~~~~~~~~~
179
180ifndef::manvolnum[]
181image::images/screenshot/pmg-gui-network-config.png[]
182endif::manvolnum[]
183
45de5bf5
DM
184Normally the network and time is already configured when you visit the
185GUI. The installer asks for those setting and sets up the correct
186values.
187
188The default setup uses a single Ethernet adapter and static IP
189assignment. The configuration is stored at '/etc/network/interfaces',
190and the actual network setup is done the standard Debian way using
191package 'ifupdown'.
192
193.Example network setup '/etc/network/interfaces'
194----
195source /etc/network/interfaces.d/*
196
197auto lo
198iface lo inet loopback
199
200auto ens18
201iface ens18 inet static
202 address 192.168.2.127
203 netmask 255.255.240.0
204 gateway 192.168.2.1
205----
206
207.DNS recommendations
208
209Many tests to detect SPAM mails use DNS queries, so it is important to
210have a fast and reliable DNS server. We also query some public
211available DNS Blacklists. Most of them apply rate limits for clients,
212so they simply will not work if you use a public DNS server (because
213they are usually blocked). We recommend to use your own DNS server,
214which need to be configured in 'recursive' mode.
685576c2
DM
215
216
217Options
218~~~~~~~
219
220ifndef::manvolnum[]
221image::images/screenshot/pmg-gui-system-options.png[]
222endif::manvolnum[]
223
e09057ab
DM
224
225Those settings are saved to subsection 'admin' in `/etc/pmg/pmg.conf`,
226using the following configuration keys:
227
685576c2
DM
228include::pmg.admin-conf-opts.adoc[]
229
c331641e
DM
230
231Mail Proxy Configuration
232------------------------
233
234Relaying
235~~~~~~~~
236
c331641e
DM
237ifndef::manvolnum[]
238image::images/screenshot/pmg-gui-mailproxy-relaying.png[]
239endif::manvolnum[]
240
e09057ab
DM
241Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
242using the following configuration keys:
243
244include::pmg.mail-relaying-conf-opts.adoc[]
c331641e
DM
245
246Relay Domains
247~~~~~~~~~~~~~
248
c331641e
DM
249ifndef::manvolnum[]
250image::images/screenshot/pmg-gui-mailproxy-relaydomains.png[]
251endif::manvolnum[]
252
6822b369
DM
253List of relayed mail domains, i.e. what destination domains this
254system will relay mail to. The system will reject incoming mails to
255other domains.
c331641e 256
d9c56b22 257
c331641e
DM
258Ports
259~~~~~
260
c331641e
DM
261ifndef::manvolnum[]
262image::images/screenshot/pmg-gui-mailproxy-ports.png[]
263endif::manvolnum[]
264
d9c56b22
DM
265Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
266using the following configuration keys:
267
268include::pmg.mail-ports-conf-opts.adoc[]
269
c331641e
DM
270
271Options
272~~~~~~~
273
c331641e
DM
274ifndef::manvolnum[]
275image::images/screenshot/pmg-gui-mailproxy-options.png[]
276endif::manvolnum[]
277
e3d778e0
DM
278Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
279using the following configuration keys:
280
281include::pmg.mail-options-conf-opts.adoc[]
c331641e
DM
282
283
284Transports
285~~~~~~~~~~
286
287ifndef::manvolnum[]
288image::images/screenshot/pmg-gui-mailproxy-transports.png[]
289endif::manvolnum[]
290
b335e06b
DM
291You can use {pmg} to send e-mails to different internal
292e-mail servers. For example you can send e-mails addressed to
293domain.com to your first e-mail server, and e-mails addressed to
294subdomain.domain.com to a second one.
295
296You can add the IP addresses, hostname and SMTP ports and mail domains (or
297just single email addresses) of your additional e-mail servers.
c331641e
DM
298
299
300Networks
301~~~~~~~~
302
303ifndef::manvolnum[]
304image::images/screenshot/pmg-gui-mailproxy-networks.png[]
305endif::manvolnum[]
306
20e879ad
DM
307You can add additional internal (trusted) IP networks or hosts.
308All hosts in this list are allowed to relay.
309
310NOTE: Hosts in the same subnet with Proxmox can relay by default and
311it’s not needed to add them in this list.
c331641e
DM
312
313
314TLS
315~~~
316
317ifndef::manvolnum[]
318image::images/screenshot/pmg-gui-mailproxy-tls.png[]
319endif::manvolnum[]
320
20e879ad
DM
321Transport Layer Security (TLS) provides certificate-based
322authentication and encrypted sessions. An encrypted session protects
323the information that is transmitted with SMTP mail. When you activate
324TLS, {pmg} automatically generates a new self signed
325certificate for you (`/etc/pmg/pmg-tls.pem`).
326
327{pmg} uses opportunistic TLS encryption. The SMTP transaction is
328encrypted if the 'STARTTLS' ESMTP feature is supported by the remote
329server. Otherwise, messages are sent in the clear.
330
331Enable TLS logging::
332
333To get additional information about SMTP TLS activity you can enable
334TLS logging. That way information about TLS sessions and used
335certificate’s is logged via syslog.
336
337Add TLS received header::
338
339Set this option to include information about the protocol and cipher
340used as well as the client and issuer CommonName into the "Received:"
341message header.
342
a649b38f
DM
343Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
344using the following configuration keys:
345
346include::pmg.mail-tls-conf-opts.adoc[]
347
c331641e
DM
348
349Whitelist
350~~~~~~~~~
351
352ifndef::manvolnum[]
353image::images/screenshot/pmg-gui-mailproxy-whitelist.png[]
354endif::manvolnum[]
355
6822b369
DM
356All SMTP checks are disabled for those entries (e. g. Greylisting,
357SPF, RBL, ...)
358
359NOTE: If you use a backup MX server (e.g. your ISP offers this service
360for you) you should always add those servers here.
c331641e
DM
361
362
363Spam Detector Configuration
364---------------------------
365
2d672352
DM
366Options
367~~~~~~~
368
74bfe8ba
DM
369ifndef::manvolnum[]
370image::images/screenshot/pmg-gui-spam-options.png[]
371endif::manvolnum[]
372
3371c521
DM
373{pmg} uses a wide variety of local and network tests to identify spam
374signatures. This makes it harder for spammers to identify one aspect
375which they can craft their messages to work around the spam filter.
376
377Every single e-mail will be analyzed and gets a spam score
378assigned. The system attempts to optimize the efficiency of the rules
379that are run in terms of minimizing the number of false positives and
380false negatives.
381
382include::pmg.spam-conf-opts.adoc[]
383
384
2d672352
DM
385Quarantine
386~~~~~~~~~~
3371c521 387
74bfe8ba
DM
388ifndef::manvolnum[]
389image::images/screenshot/pmg-gui-spamquar-options.png[]
390endif::manvolnum[]
391
3371c521
DM
392Proxmox analyses all incoming e-mail messages and decides for each
393e-mail if its ham or spam (or virus). Good e-mails are delivered to
394the inbox and spam messages can be moved into the spam quarantine.
395
396The system can be configured to send daily reports to inform users
397about the personal spam messages received the last day. That report is
398only sent if there are new messages in the quarantine.
399
ee34edb0
DC
400Some options are only available in the config file `/etc/pmg/pmg.conf`,
401and not in the webinterface.
402
3371c521 403include::pmg.spamquar-conf-opts.adoc[]
c331641e
DM
404
405
406Virus Detector Configuration
407----------------------------
408
2d672352
DM
409Options
410~~~~~~~
411
e7c18c7c
DM
412ifndef::manvolnum[]
413image::images/screenshot/pmg-gui-virus-options.png[]
414endif::manvolnum[]
415
0bfbbf88
DM
416All mails are automatically passed to the included virus detector
417({clamav}). The default setting are considered safe, so it is usually
418not required to change them.
419
420{clamav} related settings are saved to subsection 'clamav' in `/etc/pmg/pmg.conf`,
421using the following configuration keys:
422
423include::pmg.clamav-conf-opts.adoc[]
424
e7c18c7c
DM
425ifndef::manvolnum[]
426image::images/screenshot/pmg-gui-clamav-database.png[]
427endif::manvolnum[]
428
429Please note that the virus signature database it automatically
430updated. But you can see the database status on the GUI, and you can
431trigger manual updates there.
432
0bfbbf88 433
2d672352
DM
434Quarantine
435~~~~~~~~~~
0bfbbf88 436
e7c18c7c
DM
437ifndef::manvolnum[]
438image::images/screenshot/pmg-gui-virusquar-options.png[]
439endif::manvolnum[]
440
0bfbbf88
DM
441Indentified virus mails are automatically moved to the virus
442quarantine. The administartor can view those mails using the GUI, or
443deliver them in case of false positives. {pmg} does not notify
444individual users about received virus mails.
445
446Virus quarantine related settings are saved to subsection 'virusquar'
447in `/etc/pmg/pmg.conf`, using the following configuration keys:
448
449include::pmg.virusquar-conf-opts.adoc[]
c331641e
DM
450
451
7eff8815
DM
452Custom SpamAssassin configuration
453---------------------------------
454
455This is only for advanced users. To add or change the Proxmox
456{spamassassin} configuration please login to the console via SSH. Go
457to directory `/etc/mail/spamassasin/`. In this directory there are several
458files (`init.pre`, `local.cf`, ...) – do not change them.
459
460To add your special configuration, you have to create a new file and
461name it `custom.cf` (in this directory), then add your
462configuration there. Be aware to use the {spamassassin}
463syntax, and test with
464
465----
466# spamassassin -D --lint
467----
468
469If you run a cluster, the `custom.cf` file is synchronized from the
470master node to all cluster members.
471
472
c331641e
DM
473User Management
474---------------
475
05336835
DC
476User management in {pmg} consists of three types of users/accounts:
477
478
479Local Users
480~~~~~~~~~~~
481
f02d2b90
DM
482image::images/screenshot/pmg-gui-local-user-config.png[]
483
05336835
DC
484Local users are used to manage and audit {pmg}. Those users can login on the
485management web interface.
486
487There are three roles:
488
489* Administrator
490+
491Is allowed to manage settings of {pmg}, except some tasks like
492network configuration and upgrading.
493
494* Quarantine manager
495+
496Is allowed to manage quarantines, blacklists and whitelists, but not other
497settings. Has no right to view any other data.
498
499* Auditor
500+
501With this role, the user is only allowed to view data and configuration, but
502not to edit it.
503
504In addition there is always the 'root' user, which is used to perform special
505system administrator tasks, such as updgrading a host or changing the
506network configuration.
507
508NOTE: Only pam users are able to login via the webconsole and ssh, which the
509users created with the web interface are not. Those users are created for
510{pmg} administration only.
511
512Local user related settings are saved in `/etc/pmg/user.conf`.
513
514For details of the fields see xref:pmg_user_configuration_file[user.conf]
515
516LDAP/Active Directory
517~~~~~~~~~~~~~~~~~~~~~
518
f02d2b90
DM
519image::images/screenshot/pmg-gui-ldap-user-config.png[]
520
05336835
DC
521You can specify multiple LDAP/Active Directory profiles, so that you can
522create rules matching those users and groups.
523
524Creating a profile requires (at least) the following:
525
526* profile name
527* protocol (LDAP or LDAPS; LDAPS is recommended)
528* at least one server
529* a user and password (if your server does not support anonymous binds)
530
531All other fields should work with the defaults for most setups, but can be
532used to customize the queries.
533
534The settings are saved to `/etc/pmg/ldap.conf`. Details for the options
535can be found here: xref:pmg_ldap_configuration_file[ldap.conf]
536
537Bind user
538^^^^^^^^^
539
540It is highly recommended that the user which you use for connecting to the
541LDAP server only has the permission to query the server. For LDAP servers
542(for example OpenLDAP or FreeIPA), the username has to be of a format like
543'uid=username,cn=users,cn=accounts,dc=domain' , where the specific fields are
544depending on your setup. For Active Directory servers, the format should be
545like 'username@domain' or 'domain\username'.
546
547Sync
548^^^^
549
550{pmg} synchronizes the relevant user and group info periodically, so that
551that information is available in a fast manner, even when the LDAP/AD server
552is temporarily not accessible.
553
554After a successfull sync, the groups and users should be visible on the web
555interface. After that, you can create rules targeting LDAP users and groups.
c331641e
DM
556
557
8538d9a2 558Fetchmail
05336835
DC
559~~~~~~~~~
560
f02d2b90
DM
561image::images/screenshot/pmg-gui-fetchmail-config.png[]
562
05336835
DC
563Fetchmail is utility for polling and forwarding e-mails. You can define
564e-mail accounts, which will then be fetched and forwarded to the e-mail
565address you defined.
566
567You have to add an entry for each account/target combination you want to
568fetch and forward. Those will then be regularly polled and forwarded,
569according to your configuration.
570
571The API and web interface offer following configuration options:
8538d9a2
DM
572
573include::fetchmail.conf.5-opts.adoc[]
574
575
e62ceaf0
DM
576ifdef::manvolnum[]
577include::pmg-copyright.adoc[]
578endif::manvolnum[]
579