]>
Commit | Line | Data |
---|---|---|
301d0b92 AM |
1 | diff -urN dovecot-2.0.0.org/doc/example-config/conf.d/10-master.conf dovecot-2.0.0/doc/example-config/conf.d/10-master.conf |
2 | --- dovecot-2.0.0.org/doc/example-config/conf.d/10-master.conf 2010-06-16 20:56:26.000000000 +0200 | |
3 | +++ dovecot-2.0.0/doc/example-config/conf.d/10-master.conf 2010-08-21 09:37:39.567272532 +0200 | |
4 | @@ -4,7 +4,7 @@ | |
5 | ||
6 | # Login user is internally used by login processes. This is the most untrusted | |
7 | # user in Dovecot system. It shouldn't have access to anything at all. | |
8 | -#default_login_user = dovenull | |
9 | +default_login_user = dovecot | |
10 | ||
11 | # Internal user is used by unprivileged processes. It should be separate from | |
12 | # login user, so that login processes can't disturb other processes. | |
13 | diff -urN dovecot-2.0.0.org/doc/example-config/conf.d/10-ssl.conf dovecot-2.0.0/doc/example-config/conf.d/10-ssl.conf | |
14 | --- dovecot-2.0.0.org/doc/example-config/conf.d/10-ssl.conf 2010-05-24 16:35:40.000000000 +0200 | |
15 | +++ dovecot-2.0.0/doc/example-config/conf.d/10-ssl.conf 2010-08-21 09:36:31.513101379 +0200 | |
16 | @@ -9,8 +9,8 @@ | |
3eaa3100 TO |
17 | # dropping root privileges, so keep the key file unreadable by anyone but |
18 | # root. Included doc/mkcert.sh can be used to easily generate self-signed | |
19 | # certificate, just make sure to update the domains in dovecot-openssl.cnf | |
301d0b92 AM |
20 | -ssl_cert = </etc/ssl/certs/dovecot.pem |
21 | -ssl_key = </etc/ssl/private/dovecot.pem | |
22 | +ssl_cert = </var/lib/openssl/certs/imap.pem | |
23 | +ssl_key = </var/lib/openssl/private/imap.pem | |
3eaa3100 | 24 | |
cd30e346 | 25 | # If key file is password protected, give the password here. Alternatively |
301d0b92 | 26 | # give it when starting dovecot with -p parameter. Since this file is often |