This commit is contained in:
Zhang Huangbin 2016-01-29 17:24:36 +09:00
parent 820e79f33e
commit a88be6c6de
4 changed files with 12 additions and 12 deletions

View File

@ -7,17 +7,17 @@ that your settings will be kept after upgrading iRedAdmin.
```
# It's RECOMMEND for better performance. Samples:
# - hashed: domain.ltd/u/s/e/username-2009.09.04.12.05.33/
# - hashed: domain.ltd/u/s/e/username-2009.09.04.12.05.33/
# - non-hashed: domain.ltd/username-2009.09.04.12.05.33/
MAILDIR_HASHED = True
# Prepend domain name in path. Samples:
# - with domain name: domain.ltd/username/
# - without: username/
# - without: username/
MAILDIR_PREPEND_DOMAIN = True
# Append timestamp in path. Samples:
# - with timestamp: domain.ltd/username-2010.12.20.13.13.33/
# - without timestamp: domain.ltd/username/
# - with timestamp: domain.ltd/username-2010.12.20.13.13.33/
# - without timestamp: domain.ltd/username/
MAILDIR_APPEND_TIMESTAMP = True
```

View File

@ -340,7 +340,7 @@ and append below settings right after `SSLEngine on` line:
# Reference:
# https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
# Module mod_headers is required. 15768000 seconds = 6 months.
Header always set Strict-Transport-Security "max-age=15768000; includeSubdomains"
Header always set Strict-Transport-Security "max-age=15768000"
```
On Debian 8 and Ubuntu, run command below to make sure Apache module `headers`
@ -363,7 +363,7 @@ and append below settings right after `ssl on` line:
# Use HTTP Strict Transport Security to force client to use secure connections only.
# Reference:
# https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
add_header Strict-Transport-Security "max-age=15768000; includeSubdomains";
add_header Strict-Transport-Security "max-age=15768000"
```
### SOGo: Fix improper settings in Apache/Nginx config file

View File

@ -16,18 +16,18 @@ are stored in file <code>libs/default_settings.py</code>, if you need to change
please write your own setting in iRedAdmin main config file <code>settings.py</code>, so
that your settings will be kept after upgrading iRedAdmin.</p>
<pre><code># It's RECOMMEND for better performance. Samples:
# - hashed: domain.ltd/u/s/e/username-2009.09.04.12.05.33/
# - hashed: domain.ltd/u/s/e/username-2009.09.04.12.05.33/
# - non-hashed: domain.ltd/username-2009.09.04.12.05.33/
MAILDIR_HASHED = True
# Prepend domain name in path. Samples:
# - with domain name: domain.ltd/username/
# - without: username/
# - without: username/
MAILDIR_PREPEND_DOMAIN = True
# Append timestamp in path. Samples:
# - with timestamp: domain.ltd/username-2010.12.20.13.13.33/
# - without timestamp: domain.ltd/username/
# - with timestamp: domain.ltd/username-2010.12.20.13.13.33/
# - without timestamp: domain.ltd/username/
MAILDIR_APPEND_TIMESTAMP = True
</code></pre><p style="text-align: center; color: grey;">All documents are available in <a href="https://bitbucket.org/zhb/iredmail-docs/src">BitBucket repository</a>, and published under <a href="http://creativecommons.org/licenses/by-nd/3.0/us/" target="_blank">Creative Commons</a> license. If you found something wrong, please do <a href="http://www.iredmail.org/contact.html">contact us</a> to fix it.<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){

View File

@ -369,7 +369,7 @@ and append below settings right after <code>SSLEngine on</code> line:</p>
# Reference:
# https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
# Module mod_headers is required. 15768000 seconds = 6 months.
Header always set Strict-Transport-Security &quot;max-age=15768000; includeSubdomains&quot;
Header always set Strict-Transport-Security &quot;max-age=15768000&quot;
</code></pre>
<p>On Debian 8 and Ubuntu, run command below to make sure Apache module <code>headers</code>
@ -389,7 +389,7 @@ and append below settings right after <code>ssl on</code> line:</p>
<pre><code># Use HTTP Strict Transport Security to force client to use secure connections only.
# Reference:
# https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security
add_header Strict-Transport-Security &quot;max-age=15768000; includeSubdomains&quot;;
add_header Strict-Transport-Security &quot;max-age=15768000&quot;
</code></pre>
<h3 id="sogo-fix-improper-settings-in-apachenginx-config-file">SOGo: Fix improper settings in Apache/Nginx config file</h3>