## ## SSL settings ## # -------------------------------------------------------------------- # *** Please read this section before modifying this file *** # # Several of the keys and values within this file are modified by # Apple's Server Admin application. Each key that is automatically # modified by the Server Admin app is identified with a comment # preceding the key with this note: # # Note: This key is managed by Server Admin. See above before making changes # # -------------------------------------------------------------------- # SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt> # Note: This key is managed by Server Admin. See above before making changes ssl = no # PEM encoded X.509 SSL/TLS certificate and private key. They're opened before # dropping root privileges, so keep the key file unreadable by anyone but # root. Included doc/mkcert.sh can be used to easily generate self-signed # certificate, just make sure to update the domains in dovecot-openssl.cnf # Note: This key is managed by Server Admin. See above before making changes ssl_cert = </etc/certificates/Default.crt # PEM encoded X.509 SSL/TLS certificate and private key. They're opened before # dropping root privileges, so keep the key file unreadable by anyone but # root. Included doc/mkcert.sh can be used to easily generate self-signed # certificate, just make sure to update the domains in dovecot-openssl.cnf # Note: This key is managed by Server Admin. See above before making changes ssl_key = </etc/certificates/Default.key # If key file is password protected, give the password here. Alternatively # give it when starting dovecot with -p parameter. Since this file is often # world-readable, you may want to place this setting instead to a different # root owned 0600 file by using ssl_key_password = <path. #ssl_key_password = # PEM encoded trusted certificate authority. Set this only if you intend to use # ssl_verify_client_cert=yes. The file should contain the CA certificate(s) # followed by the matching CRL(s). (e.g. ssl_ca = </etc/ssl/certs/ca.pem) # Note: This key is managed by Server Admin. See above before making changes ssl_ca = </etc/certificates/Default.csr # Request client to send a certificate. If you also want to require it, set # auth_ssl_require_client_cert=yes in auth section. #ssl_verify_client_cert = no # Which field from certificate to use for username. commonName and # x500UniqueIdentifier are the usual choices. You'll also need to set # auth_ssl_username_from_cert=yes. #ssl_cert_username_field = commonName # How often to regenerate the SSL parameters file. Generation is quite CPU # intensive operation. The value is in hours, 0 disables regeneration # entirely. #ssl_parameters_regenerate = 168 # SSL ciphers to use ssl_cipher_list = ALL:!LOW:!SSLv2:!EXP:!aNULL:!ADH:!eNULL