King0770-Notes: Difference between revisions

(33 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Additional Articles by King0770==
==Articles by King0770==<br><br><br><br>
Line 16: Line 17:<br><br><br><br><br><br><br><br><br><br>
Line 38: Line 41:<br><br><br><br><br><br><br><br><br>
Line 45: Line 48:<br><br><br><br><br>
==Handy Commands==<br>
===LDAP - DB Status===<br>
<code><pre>/opt/zimbra/sleepycat/bin/db_stat -c -h /opt/zimbra/openldap-data</pre></code><br>
===LDAP - DB Recover===<br>
<code><pre>/opt/zimbra/sleepycat/bin/db_recover **make sure you are doing this as the zimbra user, and that slapd is not running**</pre></code><br>
===LDAP - Slapindex===<br>
<code><pre>/opt/zimbra/openldap/sbin/slapindex -f /opt/zimbra/conf/slapd.conf</pre></code><br>
===LDAP - Export & Reimport===<br>
1) su - zimbra<br>
2) libexec/zmslapcat /tmp<br>
3) mv /tmp/ldap.bak /tmp/ldap.ldif<br>
4) zmcontrol stop<br>
5) ps -aux | grep slapd **If ldap is still running, kill it**<br>
6) su - root<br>
7) mv /opt/zimbra/openldap-data /opt/zimbra/openldap-data.OLD<br>
8) mkdir -p /opt/zimbra/openldap-data/logs && mkdir -p /opt/zimbra/openldap-data/accesslog/db
9) chown -R zimbra:zimbra /opt/zimbra/openldap-data/
10) su - zimbra
11) /opt/zimbra/openldap/sbin/slapadd -f /opt/zimbra/conf/slapd.conf -b "" -l /tmp/ldap.ldif
12) zmcontrol start
===Clear SA DB===
This would be handy if you are getting a lot of false positives
/opt/zimbra/libexec/sa-learn -p /opt/zimbra/conf/ --dbpath /opt/zimbra/amavisd/.spamassassin/ --siteconfigpath /opt/zimbra/conf/spamassassin --clear
/opt/zimbra/libexec/sa-learn -p /opt/zimbra/conf/ --dbpath /opt/zimbra/amavisd/.spamassassin --siteconfigpath \ /opt/zimbra/conf/spamassassin --force -expire –sync
===KeyTool Commands===
keytool -list -keystore /opt/zimbra/mailboxd/etc/keystore -storepass `zmlocalconfig -s -m nokey mailboxd_keystore_password`
keytool -delete -alias jetty or tomcat -keystore /opt/zimbra/mailboxd/etc/keystore -storepass `zmlocalconfig -s -m nokey mailboxd_keystore_password`
==Enable Away Messages (Vacation)==
1) Access your account using the web interface, <nowiki></nowiki><br>
2) Once you have accessed your account, go to Preferences => Mail<br>
3) If you scroll down in the Mail section, look for "Send auto-reply message:". You should then type your away message, and pick the start date and finish date.<br>
4) Don't forget to click "Save" in the upper left hand.<br>
===Auto-Reply Not Working===
Organizations using the Split-Domain configuration *may* encounter problems with the auto-replies not working.<br>
Mail that is arriving to and the zimbra server only knows about So the code that tries not to send vacation message if the mail was not directly sent to the account kicks in. This is as intended. The "was it sent directly to this acct" check only checks To: and Cc: headers and not envelope RCPT TO address (as it should).<br>
zmprov ma +zimbraPrefOutOfOfficeDirectAddress
zmprov ma zimbraPrefOutOfOfficeReplyEnabled TRUE
==Apple's .Mac Mail Service==
It was recently discovered Apple's .Mac Mail Service removes messages in the Trash from their server after one week. This is not configurable.
==Directory Permissions on /tmp==
It is possible that during ZCS install, if the /tmp directory does not have the correct permissions, it could hinder your efforts to install ZCS.
Make sure the /tmp directory has the following permissions.<br>
drwxrwxrwt  17 root root  4096 2008-07-07 08:33 tmp
If your /tmp permissions do not match the above, run the following commands as root:
# chmod 777 /tmp
# chmod +t /tmp
The "t" in the end of the permissions is called the "sticky bit". It replaces the "x" and indicates that in this directory, files can only be deleted by their owners, the owner of the directory or the root superuser. This way, it is not enough for a user to have write permission on /tmp, he also needs to be the owner of the file to be able to delete it.
[[Category:Community Sandbox]]
==Columns are MisMatch in the GAL using ZCO==
1) Remove ZCO profile(s) from Outlook - Start ==> Control Panel ==> Mail<br>
2) Once the ZCO profile is removed, go into the following directories and remove everything in the specified directories:<br>
c:\documents and settings\<user>\local settings\application data\microsoft\outlook<br>
c:\documents and settings\<user>\application data\microsoft\outlook<br>
3) Recreate ZCO profile for Outlook - Start ==> Control Panel ==> Mail<br>
Once you have recreated the zco profile, open Outlook, then have a look again at the GAL.<br>
==Upper Case Letters in the hostname in /etc/hosts will prevent the install from continuing==
Make sure the hostname in the /etc/hosts do not contain upper case letters. Or else the install will not continue.<br><br>
Main menu
  1) Common Configuration:                                                 
        +Ldap master host:          
        +Ldap port:                            389                         
        +Ldap Admin password:                  set                         
        +Require secure interprocess communications: yes                         
        +TimeZone:                            (GMT-08.00) Pacific Time (US & Canada)
  2) zimbra-ldap:                            Enabled                     
  3) zimbra-store:                            Enabled                     
  4) zimbra-mta:                              Enabled                     
  5) zimbra-snmp:                            Enabled                     
  6) zimbra-logger:                          Enabled                     
  7) zimbra-spell:                            Enabled                     
  8) Default Class of Service Configuration:                               
  9) Enable default backup schedule:          yes                         
  r) Start servers after configuration        yes                         
  s) Save config to file                                                   
  x) Expand menu                                                           
  q) Quit                                   
Address unconfigured (**) items or correct ldap configuration  (? - help)
==External Authentication with LDAP==
Requires one of the following:  
1) set<br>
Set domain attribute zimbraAuthMech to ldap.<br>
<strong>zimbraAuthLdapSearchBindPassword</strong> => bind DN of the admin user of the external directory<br>
<strong>zimbraAuthLdapSearchBindDn</strong> => password of the admin user of the external directory<br>
<strong>zimbraAuthLdapSearchBase</strong> (optional, if not set "" will be used).<br>
Three things are needed for auth to the external LDAP server:<br>
- URL of the LDAP server: zimbraAuthLdapURL<br>
- password entered by user<br>
- the bind DN for the user, this can be setup using one of the following 3 ways. <strong>(A)</strong> is preferred over <strong>(B)</strong> because <strong>(C)</strong> does an extra LDAP search.<br>
<strong>(A)</strong> zimbraAuthLdapBindDn<br>
This is the bind DN template<br>     
<strong>(B)</strong> zimbraAuthLdapSearchFilter<br>
If set, then zimbraAuthLdapSearchBindPassword, zimbraAuthLdapSearchBindDn, and zimbraAuthLdapSearchBase also need to be set. <br> 
Server uses the four attrs to get the bind DN for the user.<br> 
Server first does a LDAP search  using the zimbraAuthLdapSearchBindDn/zimbraAuthLdapSearchBindPassword credential by zimbraAuthLdapSearchFilter under zimbraAuthLdapSearchBase.  The search would return the bind DN for the user, if found.<br>  
example for zimbraAuthLdapSearchFilter: (&(mail=%u@%d)(objectclass=person))  (whatever object class they are using)<br>
<strong>(C)</strong> Account attribute zimbraAuthLdapExternalDn<br>
Unlike (A) and (B), which are domain settings, this is an account level setting.  This overrides the bind template and/or search setting, and directly contains the DN for the user in the external ldap server.<br>
2) set<br>
Set domain attribute zimbraAuthMech to ldap.<br>
<strong>zimbraAuthLdapBindDn</strong> to the template filter for the user in the external directory.<br>
For example, if the user exists at uid=jsmith,cn=users,dc=zimbra,dc=com , set zimbraAuthLdapBindDn on the domain to: uid=%u,cn=users,dc=zimbra,dc=com<br>
Another example uid=%u,ou=people,%D  (whatever LDAP DIT structure they are using)<br>
zimbraAuthLdapBindDn and zimbraAuthLdapSearchFilter can contain expansion variables that are to be substituted by components in the account name:<br>
%n = username with @ (or without, if no @ was specified)<br>
%u = username with @ removed<br>
%d = domain as<br>
%D = domain as dc=foo,dc=com<br>
e.g. for user<br>
%n =><br>
%u => rking<br>
%d =><br>
%D => dc=zimbra,dc=com<br>
example for zimbraAuthLdapBindDn: uid=%u,ou=people,%D  (whatever LDAP DIT structure they are using)<br>
===External Authentication Errors===
525 - user not found<br>
52e - invalid credentials<br>
530 - not permitted to logon at this time<br>
532 - password expired<br>
533 - account disabled<br>
701 - account expired<br>
773 - user must reset password<br>
775 - user account locked<br>
Example in the /opt/zimbra/log/mailbox.log file:<br>
Caused by: javax.naming.AuthenticationException: [LDAP: error code 49 - 80090308: LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece^@]
        at com.sun.jndi.ldap.LdapCtx.mapErrorCode(
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(
        at com.sun.jndi.ldap.LdapCtx.connect(
        at com.sun.jndi.ldap.LdapCtx.<init>(
        at com.sun.jndi.ldap.LdapCtxFactory.getUsingURL(
        at com.sun.jndi.ldap.LdapCtxFactory.getUsingURLs(
<strong>Notable bugs:</strong><br><br>
===Mix external authentication users with local users===
Lets say, you are using external authentication; however, you would like to create a few users locally on the Zimbra system without provisioning users on the external authentication system (openldap, AD etc etc).<br>
This should be possible with setting the following domain attribute.
zmprov md zimbraAuthFallbackToLocal TRUE
==Sending Attachments==
If you are having trouble sending attachments, and you *think* you've set the zimbraFileUploadMaxSize & zimbraMtaMaxMessageSize, correctly, then find out how much larger a MIME version of a file will be after base-64 encode. <br>
If you want to find out just how much larger a MIME version of a given file will be, run the file through UUDeview (windows app) - try 'base 64' in the encode settings. Won't wreck your current file, it creates a converted duplicate. This should give you an idea of what values to use if you don't want to use an arbitrary value. <br>
==Removing older version inside /opt/zimbra==
Can I delete older versions of software that is in the /opt/zimbra directory? I have older version of amavisd, clamav, cyrus-sasl, etc.
I am not sure *why* the prior versions are still around after an upgrade. The answer I received was, we (Zimbra), shouldn't remove things during an upgrade. My impression was this was a policy decision. I'd say move those older versions out of the way into another directory. And if there are no problems, I'd say you are good to go. To be honest, I am paranoid - I never suggest remove anything on a system. :)
The relevant docs are in /opt/zimbra/doc. The /opt/zimbra/doc directory has most (if not all) our docs for soap.<br>
Regarding the URL using the admin soap stuff you need to talk to the admin server (by default port 7071).<br>
Example for the admin url for soap:
Another point of interest:  /opt/zimbra/conf/attrs/zimbra-attrs.xml
==Hardware Support==
In the server, one of the hard disks is showing  a red light. It is Raid 5 configured. Not sure where to look.
Zimbra Support can't help very much here.  We support the Zimbra software, not the server hardware or the OS RAID infrastructure.  If it's a standard Linux RAID, you can remove it from the RAID group with mdadm, replace the device, and add a new device to replace it.  If it's a separate array or something, you'll have to go to the manufacturer instructions to find the procedure for replacing the device.  You'll probably find more information with a web search than you can get from us on this topic.
==Zimbra Mobile and BIS==
Customers using utilizing AT&T and Verizon for their Blackberry Internet Services (BIS) will need to make sure port 993 is accessible. Apparently, BIS services will authenticate using port 993. I had a case where the admin was using AT&T to setup an account; however, he was getting the "connection timed out" message, or "cannot authenticate" from the AT&T app. On a hunch I suggested opening port 993 through his firewall (because it wasn't accessible to the outside world) . After that was done, AT&T was able to authenticate.
==Distribution Lists and Duplicates==
The scenario is that you are a member of a distribution list, and also was CC'd separately, and you have noticed you have received two messages instead of one; send to:,<br>
Have a look at the following global setting:<br>
<code><pre>zmprov gacf | grep zimbraMessageIdDedupeCacheSize</pre></code>
If this setting was set to zero, that would probably explain the duplicates you may see.<br>
If you need to suppress the duplicates, run this command:<br>
zmprov mcf zimbraMessageIdDedupeCacheSize 3000
**3000 is the default**
This would require to restart Jetty services.<br>
zmmailboxdctl restart
**be advised this would be a slight disruption of services. you may need to restart jetty during low-peak times, or after business hours.**

Latest revision as of 16:49, 24 March 2021

Articles by King0770

Jump to: navigation, search