Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.172
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
dovecot /
conf.d /
[ HOME SHELL ]
Name
Size
Permission
Action
10-auth.conf
5.17
KB
-rw-r--r--
10-director.conf
1.85
KB
-rw-r--r--
10-logging.conf
2.99
KB
-rw-r--r--
10-mail.conf
17.17
KB
-rw-r--r--
10-master.conf
3.3
KB
-rw-r--r--
10-ssl.conf
2.43
KB
-rw-r--r--
15-lda.conf
1.63
KB
-rw-r--r--
15-mailboxes.conf
2.74
KB
-rw-r--r--
20-imap.conf
4.14
KB
-rw-r--r--
20-lmtp.conf
936
B
-rw-r--r--
20-managesieve.conf
2.89
KB
-rw-r--r--
20-pop3.conf
3.97
KB
-rw-r--r--
90-acl.conf
676
B
-rw-r--r--
90-plugin.conf
292
B
-rw-r--r--
90-quota.conf
2.54
KB
-rw-r--r--
90-sieve-extprograms.conf
1.79
KB
-rw-r--r--
90-sieve.conf
10.47
KB
-rw-r--r--
auth-checkpassword.conf.ext
499
B
-rw-r--r--
auth-deny.conf.ext
489
B
-rw-r--r--
auth-dict.conf.ext
343
B
-rw-r--r--
auth-ldap.conf.ext
924
B
-rw-r--r--
auth-master.conf.ext
561
B
-rw-r--r--
auth-passwdfile.conf.ext
515
B
-rw-r--r--
auth-sql.conf.ext
788
B
-rw-r--r--
auth-static.conf.ext
611
B
-rw-r--r--
auth-system.conf.ext
2.13
KB
-rw-r--r--
auth-vpopmail.conf.ext
330
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 10-ssl.conf
## ## SSL settings ## # SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt> # disable plain pop3 and imap, allowed are only pop3+TLS, pop3s, imap+TLS and imaps # plain imap and pop3 are still allowed for local connections ssl = required # PEM encoded X.509 SSL/TLS certificate and private key. They're opened before # dropping root privileges, so keep the key file unreadable by anyone but # root. Included doc/mkcert.sh can be used to easily generate self-signed # certificate, just make sure to update the domains in dovecot-openssl.cnf ssl_cert = </etc/pki/dovecot/certs/dovecot.pem ssl_key = </etc/pki/dovecot/private/dovecot.pem # If key file is password protected, give the password here. Alternatively # give it when starting dovecot with -p parameter. Since this file is often # world-readable, you may want to place this setting instead to a different # root owned 0600 file by using ssl_key_password = <path. #ssl_key_password = # PEM encoded trusted certificate authority. Set this only if you intend to use # ssl_verify_client_cert=yes. The file should contain the CA certificate(s) # followed by the matching CRL(s). (e.g. ssl_ca = </etc/pki/dovecot/certs/ca.pem) #ssl_ca = # Require that CRL check succeeds for peer certificates. #ssl_require_crl = yes # Directory and/or file for trusted SSL CA certificates. These are used only # when Dovecot needs to act as an SSL client (e.g. imapc backend). The # directory is usually /etc/pki/dovecot/certs in Debian-based systems and the file is # /etc/pki/tls/cert.pem in RedHat-based systems. #ssl_client_ca_dir = #ssl_client_ca_file = # Request client to send a certificate. If you also want to require it, set # auth_ssl_require_client_cert=yes in auth section. #ssl_verify_client_cert = no # Which field from certificate to use for username. commonName and # x500UniqueIdentifier are the usual choices. You'll also need to set # auth_ssl_username_from_cert=yes. #ssl_cert_username_field = commonName # DH parameters length to use. #ssl_dh_parameters_length = 1024 # SSL protocols to use #ssl_protocols = !SSLv3 # SSL ciphers to use #ssl_cipher_list = ALL:!LOW:!SSLv2:!EXP:!aNULL # Prefer the server's order of ciphers over client's. #ssl_prefer_server_ciphers = no # SSL crypto device to use, for valid values run "openssl engine" #ssl_crypto_device = # SSL extra options. Currently supported options are: # no_compression - Disable compression. # no_ticket - Disable SSL session tickets. #ssl_options =
Close