hostnamectl set-hostname mail.ywmy.xyz # 这里设置你的域名,示例参考 vim /etc/hosts # 添加主机名 192.168.10.71 mail.ywmy.xyz mail # 参考示例
更改主机名后,重启服务器。
关闭selinux
1 2 3 4 5 6 7 8 9 10 11 12 13
vim /etc/selinux/config
# This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # 配置这里 # SELINUXTYPE= can take one of three two values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted
Operations logged to /tmp/install.log.3PNassAP Checking for existing installation... zimbra-drive...NOT FOUND zimbra-imapd...NOT FOUND zimbra-patch...FOUND zimbra-patch-8.8.12.1568982480 zimbra-mta-patch...FOUND zimbra-mta-patch-8.8.12.1552427139 zimbra-proxy-patch...FOUND zimbra-proxy-patch-8.8.12.1554984827 zimbra-license-tools...NOT FOUND zimbra-license-extension...NOT FOUND zimbra-network-store...NOT FOUND zimbra-network-modules-ng...NOT FOUND zimbra-chat...FOUND zimbra-chat-2.0.3.1559648872-1 zimbra-talk...NOT FOUND zimbra-ldap...FOUND zimbra-ldap-8.8.12_GA_3794 zimbra-logger...FOUND zimbra-logger-8.8.12_GA_3794 zimbra-mta...FOUND zimbra-mta-8.8.12_GA_3794 zimbra-dnscache...FOUND zimbra-dnscache-8.8.12_GA_3794 zimbra-snmp...FOUND zimbra-snmp-8.8.12_GA_3794 zimbra-store...FOUND zimbra-store-8.8.12_GA_3794 zimbra-apache...FOUND zimbra-apache-8.8.12_GA_3794 zimbra-spell...FOUND zimbra-spell-8.8.12_GA_3794 zimbra-convertd...NOT FOUND zimbra-memcached...FOUND zimbra-memcached-1.4.37-2 zimbra-proxy...FOUND zimbra-proxy-8.8.12_GA_3794 zimbra-archiving...NOT FOUND zimbra-core...FOUND zimbra-core-8.8.12_GA_3794 ZCS upgrade from 8.8.12 to 8.8.12 will be performed. Validating ldap configuration LDAP validation succeeded. Continuing.
---------------------------------------------------------------------- PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYNACOR, INC. ("SYNACOR") WILL ONLY LICENSE THIS SOFTWARE TO YOU IF YOU FIRST ACCEPT THE TERMS OF THIS AGREEMENT. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, THEN DO NOT DOWNLOAD, INSTALL OR USE THE PRODUCT.
License Terms for this Zimbra Collaboration Suite Software: https://www.zimbra.com/license/zimbra-public-eula-2-6.html ----------------------------------------------------------------------
Do you agree with the terms of the software license agreement? [N]
DNS ERROR resolving MX for mail.ywmy.xyz It is suggested that the domain name have an MX record configured in DNS Change domain name? [Yes] Create domain: [mail.ywmy.xyz] ywmy.xyz MX: mail.ywmy.xyz
1) Common Configuration: 2) zimbra-ldap: Enabled 3) zimbra-logger: Enabled 4) zimbra-mta: Enabled 5) zimbra-dnscache: Enabled 6) zimbra-snmp: Enabled 7) zimbra-store: Enabled +Create Admin User: yes +Admin user to create: admin@ywmy.xyz ******* +Admin Password UNSET +Anti-virus quarantine user: virus-quarantine.rvwrscjel4@ywmy.xyz +Enable automated spam training: yes +Spam training user: spam.i6zgq_xfb@ywmy.xyz +Non-spam(Ham) training user: ham.kctdkkb_i@ywmy.xyz +SMTP host: mail.ywmy.xyz +Web server HTTP port: 8080 +Web server HTTPS port: 8443 +Web server mode: https +IMAP server port: 7143 +IMAP server SSL port: 7993 +POP server port: 7110 +POP server SSL port: 7995 +Use spell check server: yes +Spell server URL: https://mail.ywmy.xyz:7780/ +Enable version update checks: TRUE +Enable version update notifications: TRUE +Version update notification email: admin@ywmy.xyz +Version update source email: admin@ywmy.xyz +Install mailstore (service webapp): yes +Install UI (zimbra,zimbraAdmin webapps): yes
8) zimbra-spell: Enabled 9) zimbra-proxy: Enabled 10) zimbra-imapd: Enabled 11) Default Class of Service Configuration: s) Save config to file x) Expand menu q) Quit
1) Common Configuration: 2) zimbra-ldap: Enabled 3) zimbra-logger: Enabled 4) zimbra-mta: Enabled 5) zimbra-dnscache: Enabled 6) zimbra-snmp: Enabled 7) zimbra-store: Enabled 8) zimbra-spell: Enabled 9) zimbra-proxy: Enabled 10) zimbra-imapd: Enabled 11) Default Class of Service Configuration: s) Save config to file x) Expand menu q) Quit
*** CONFIGURATION COMPLETE - press 'a' to apply Select from menu, or press 'a' to apply config (? - help) a
完成自动配置后,即开始自动安装,大概如下:
1 2 3 4 5 6 7 8 9 10 11 12 13
Notify Zimbra of your installation? [Yes] Notifying Zimbra of installation via http://www.zimbra.com/cgi-bin/notify.cgi?VER=8.8.15_GA_3869_RHEL7_64&MAIL=admin@freedom.local
Notification complete
Checking if the NG started running...done. Setting up zimbra crontab...done.
Moving /tmp/zmsetup.20191230-135538.log to /opt/zimbra/log
[root@mail ~]# cat /etc/named.conf // // named.conf // // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS // server as a caching only nameserver (as a localhost DNS resolver only). // // See /usr/share/doc/bind*/sample/ for example named configuration files. // // See the BIND Administrator's Reference Manual (ARM) for details about the // configuration located in /usr/share/doc/bind-{version}/Bv9ARM.html
/* - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion. - If you are building a RECURSIVE (caching) DNS server, you need to enable recursion. - If your recursive DNS server has a public IP address, you MUST enable access control to limit queries to your legitimate users. Failing to do so will cause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatly reduce such attack surface */ recursion yes;
dnssec-enable yes; dnssec-validation yes;
/* Path to ISC DLV key */ bindkeys-file "/etc/named.root.key";
su - zimbra cd libexec/ # 绝对路径 /opt/zimbra/libexec/ # 查看zmdkimkeyutil有哪些相关的指令 ./zmdkimkeyutil -? # 回显如下: [zimbra@mail libexec]$ ./zmdkimkeyutil ? Usage: ./zmdkimkeyutil [-a [-b]] [-q] [-r] [-s selector] [-S] [-u [-b]] [-d domain] -a: Add new key pair and selector for domain -b: Optional parameter specifying the number of bits for the new key. Only works with -a and -u. Default when not specified is 2048 bits. -d domain: Domain to use -h: Show this usage block -q: Query DKIM information for domain -r: Remove DKIM keys for domain -s: Use custom selector string instead of random UUID -S: Generate keys with subdomain data. This must be used if you want to sign both example.com and sub.example.com separately. Only works with -a and -u. Default is not to set this flag. -u: Update keys for domain One of [a, q, r, or u] must be supplied For -q, search can be either by selector or domain For all other usage patterns, domain is required
DKIM Public signature: 9149A4A6-6A3F-11ED-ADC9-44E3D876BA8B._domainkey IN TXT ( "v=DKIM1; k=rsa; " "p=MIIB.............................lots of characters.................................................................................Vhi8p1dwBWWvkDcp" "S1.....................................lots of characters...........................QAB" ) ; ----- DKIM key 9149A4A6-6A3F-11ED-ADC9-44E3D876BA8B for ywmy.xyz