Mailpile image

This commit is contained in:
Bob Mottram 2016-11-14 13:35:24 +00:00
parent 3ba911c211
commit 3a248c3eb7
2 changed files with 19 additions and 7 deletions

View File

@ -60,6 +60,10 @@ Uncheck *Detect Settings* and click *Next*.
Under *Sending Mail* select *local* or if you need to proxy outgoing email through your ISP's server select *SMTP/TLS* and enter the details, then click *Next*.
#+BEGIN_CENTER
[[file:images/mailpile_setup.jpg]]
#+END_CENTER
Under *Receiving files* select *IMAP*, the domain as *localhost*, port *143*, your username and password, then click *Next*. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
Under *Security and Privacy* either select your existing encryption key or if you only get the option to create a new one then do so, then click *Add* or *Save*.

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:10 -->
<!-- 2016-11-14 Mon 13:35 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -259,9 +259,9 @@ An advantage of this type of webmail is that <i>it keeps your GPG keys off of an
One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.
</p>
<div id="outline-container-orgda9d6ac" class="outline-2">
<h2 id="orgda9d6ac">Installation</h2>
<div class="outline-text-2" id="text-orgda9d6ac">
<div id="outline-container-orgb258225" class="outline-2">
<h2 id="orgb258225">Installation</h2>
<div class="outline-text-2" id="text-orgb258225">
<p>
Log into your system with:
</p>
@ -285,9 +285,9 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgc08365b" class="outline-2">
<h2 id="orgc08365b">Initial setup</h2>
<div class="outline-text-2" id="text-orgc08365b">
<div id="outline-container-orge68fae6" class="outline-2">
<h2 id="orge68fae6">Initial setup</h2>
<div class="outline-text-2" id="text-orge68fae6">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
@ -333,6 +333,14 @@ Uncheck <b>Detect Settings</b> and click <b>Next</b>.
Under <b>Sending Mail</b> select <b>local</b> or if you need to proxy outgoing email through your ISP's server select <b>SMTP/TLS</b> and enter the details, then click <b>Next</b>.
</p>
<div class="org-center">
<div class="figure">
<p><img src="images/mailpile_setup.jpg" alt="mailpile_setup.jpg" />
</p>
</div>
</div>
<p>
Under <b>Receiving files</b> select <b>IMAP</b>, the domain as <b>localhost</b>, port <b>143</b>, your username and password, then click <b>Next</b>. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
</p>