1 diff -urN dovecot-2.0.0.org/doc/example-config/conf.d/10-master.conf dovecot-2.0.0/doc/example-config/conf.d/10-master.conf
2 --- dovecot-2.0.0.org/doc/example-config/conf.d/10-master.conf 2010-06-16 20:56:26.000000000 +0200
3 +++ dovecot-2.0.0/doc/example-config/conf.d/10-master.conf 2010-08-21 09:37:39.567272532 +0200
6 # Login user is internally used by login processes. This is the most untrusted
7 # user in Dovecot system. It shouldn't have access to anything at all.
8 -#default_login_user = dovenull
9 +default_login_user = dovecot
11 # Internal user is used by unprivileged processes. It should be separate from
12 # login user, so that login processes can't disturb other processes.
13 diff -urN dovecot-2.0.0.org/doc/example-config/conf.d/10-ssl.conf dovecot-2.0.0/doc/example-config/conf.d/10-ssl.conf
14 --- dovecot-2.0.0.org/doc/example-config/conf.d/10-ssl.conf 2010-05-24 16:35:40.000000000 +0200
15 +++ dovecot-2.0.0/doc/example-config/conf.d/10-ssl.conf 2010-08-21 09:36:31.513101379 +0200
17 # dropping root privileges, so keep the key file unreadable by anyone but
18 # root. Included doc/mkcert.sh can be used to easily generate self-signed
19 # certificate, just make sure to update the domains in dovecot-openssl.cnf
20 -ssl_cert = </etc/ssl/certs/dovecot.pem
21 -ssl_key = </etc/ssl/private/dovecot.pem
22 +ssl_cert = </var/lib/openssl/certs/imap.pem
23 +ssl_key = </var/lib/openssl/private/imap.pem
25 # If key file is password protected, give the password here. Alternatively
26 # give it when starting dovecot with -p parameter. Since this file is often