Zarafa 7.2.5 Is Available

I’m glad to announce the availability of zarafa-7.2.5 for Arch Linux ARMv7/x64/i686.

zarafa-server-7.2.5.106-2
sabre-zarafa-0.23-200
zarafa-spamhandler-0.1-3
zarafa-postfixadmin-0.45.3
zarafa-service-overview-1.0.2-1
zarafa-webapp-2.2.0.414-100
zarafa-webapp-browsercompatibility-2.2.0.414-100
zarafa-webapp-clockwidget-2.2.0.414-100
zarafa-webapp-contactfax-2.2.0.414-100
zarafa-webapp-delayeddelivery-1.0.22.70-95
zarafa-webapp-desktopnotifications-1.0.31.28-95
zarafa-webapp-filepreviewer-1.0.30.59-95
zarafa-webapp-files-2.2.0.414-100
zarafa-webapp-folderwidgets-2.2.0.414-100
zarafa-webapp-gmaps-2.2.0.414-100
zarafa-webapp-mdm-1.1.0.49-97
zarafa-webapp-passwd-1.2-165
zarafa-webapp-pimfolder-2.2.0.414-100
zarafa-webapp-smime-1.0.31-95
zarafa-webapp-spellchecker-1.0.22.32-95
zarafa-webapp-titlecounter-2.2.0.414-100
zarafa-webapp-webappmanual-2.2.0.414-100
zarafa-webapp-xmpp-2.2.0.414-100
zarafa-webapp-zdeveloper-2.2.0.414-100
z-push-2.3.3-1

Read how to install, run and access the server.

Links

3 thoughts on “Zarafa 7.2.5 Is Available

  1. This is awesome!! I will soon be snap-shoting my mail server and upgrading, fingers crossed 🙂

    On another note, I had a question. How can I go about setting up and configuring DKIM for my domain/accounts on our set? I can’t seem to find any documentation specific to our setup that covers this. Could you point me in the right direction?

    Thanks!
    Mike Smith

    Reply

    1. admin

      Hey Mike,

      this can be done on the smarthost or on your mail server. You can use Opendkim on your server for this.

      Signing headers is done to proof that mails come from permitted servers and haven’t been manipulated meanwhile. So I belive the right place is to do this on the first server that’s emitting mails. In this case Postfix which is handed mails from Zarafa.

      As I’ve done with the smarthost I want to manage the opendkim private keys in ZPA. Opendkim is supposed to be able to read from mysql. However I couldn’t find time to bring up a setup.

      If you’re very impatient, then you could install the opendkim package and set it up yourself. The private keys are placed in the filesystem then.

      $> vi /etc/postfix/main.cf
      smtpd_milters = unix:/var/spool/postfix/opendkim/opendkim.sock

      $> vi /etc/opendkim/opendkim.conf
      Syslog yes
      SyslogSuccess yes
      LogWhy yes
      UMask 0111
      OversignHeaders From
      Socket local:/var/spool/postfix/opendkim/opendkim.sock
      Mode sv
      AlwaysAddARHeader true
      SendReports true

      Here you’ll find a script which will help you creating private keys (please find it halfway down the page)
      https://matoski.com/article/spf-dk-dkim-plesk-debian/

      Marti

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *