mailpile keys image

This commit is contained in:
Bob Mottram 2016-11-14 13:40:48 +00:00
parent 3a248c3eb7
commit c2ed06a610
4 changed files with 19 additions and 7 deletions

View File

@ -66,6 +66,10 @@ Under *Sending Mail* select *local* or if you need to proxy outgoing email throu
Under *Receiving files* select *IMAP*, the domain as *localhost*, port *143*, your username and password, then click *Next*. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
#+BEGIN_CENTER
[[file:images/mailpile_setup_keys.jpg]]
#+END_CENTER
Under *Security and Privacy* either select your existing encryption key or if you only get the option to create a new one then do so, then click *Add* or *Save*.
The process of importing your email should then occur, and can take some time.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 34 KiB

After

Width:  |  Height:  |  Size: 38 KiB

BIN
img/mailpile_setup_keys.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 31 KiB

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:35 -->
<!-- 2016-11-14 Mon 13:40 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -259,9 +259,9 @@ An advantage of this type of webmail is that <i>it keeps your GPG keys off of an
One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.
</p>
<div id="outline-container-orgb258225" class="outline-2">
<h2 id="orgb258225">Installation</h2>
<div class="outline-text-2" id="text-orgb258225">
<div id="outline-container-org87b8219" class="outline-2">
<h2 id="org87b8219">Installation</h2>
<div class="outline-text-2" id="text-org87b8219">
<p>
Log into your system with:
</p>
@ -285,9 +285,9 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orge68fae6" class="outline-2">
<h2 id="orge68fae6">Initial setup</h2>
<div class="outline-text-2" id="text-orge68fae6">
<div id="outline-container-orgcb63769" class="outline-2">
<h2 id="orgcb63769">Initial setup</h2>
<div class="outline-text-2" id="text-orgcb63769">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
@ -345,6 +345,14 @@ Under <b>Sending Mail</b> select <b>local</b> or if you need to proxy outgoing e
Under <b>Receiving files</b> select <b>IMAP</b>, the domain as <b>localhost</b>, port <b>143</b>, your username and password, then click <b>Next</b>. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
</p>
<div class="org-center">
<div class="figure">
<p><img src="images/mailpile_setup_keys.jpg" alt="mailpile_setup_keys.jpg" />
</p>
</div>
</div>
<p>
Under <b>Security and Privacy</b> either select your existing encryption key or if you only get the option to create a new one then do so, then click <b>Add</b> or <b>Save</b>.
</p>