Attention
Check out the lightweight on-premises email archiving software developed by iRedMail team: Spider Email Archiver.
Paid Remote Upgrade Support
We offer remote upgrade support if you don't want to get your hands dirty, check the details and contact us.
/etc/iredmail-release
with new iRedMail version numberiRedMail stores the release version in /etc/iredmail-release
after
installation, it's recommended to update this file after you upgraded iRedMail,
so that you can know which version of iRedMail you're running. For example:
1.5.0
Please follow below tutorial to upgrade iRedAPD to the latest stable release: Upgrade iRedAPD to the latest stable release
Please follow below tutorial to upgrade iRedAdmin to the latest stable release: Upgrade iRedAdmin to the latest stable release.
Please follow below tutorial to upgrade mlmmjadmin to the latest stable release: Upgrade mlmmjadmin to the latest stable release
MySQL and MariaDB server tunning
On CentOS 7, Debian 10 and Ubuntu 18.04, you must add 2 parameters in
MySQL or MariaDB config file to avoid error
Specified key was too long; max key length is 767 bytes
:
/etc/my.cnf
/etc/mysql/my.cnf
[mysqld]
innodb_large_prefix=ON
innodb_file_format=Barracuda
Please follow Roundcube official tutorial to upgrade Roundcube webmail to the latest stable release:
If you have netdata installed, you can upgrade it by following this tutorial: Upgrade netdata.
Attention
All credit goes to GitHub user @ludovicandrieux, thanks for the contributions. See also: #136, #137, #138.
ssl_session_cache
parameter. See also:
EECDH+CHACHA20
. It requires openssl 1.1.0, which is
available on:AES256+EDH
.To apply these changes, please open file /etc/nginx/templates/ssl.tmpl
with
your favourite text editor, then:
TLSv1.3
in parameter ssl_protocols
. For example:ssl_protocols TLSv1.2 TLSv1.3;
EECDH+CHACHA20
in parameter ssl_ciphers
, also remove AES256+EDH
.
For example:ssl_ciphers EECDH+CHACHA20:EECDH+AESGCM:EDH+AESGCM:AES256+EECDH;
ssl_session_cache
and optional comment lines:# Greatly improve the performance of keep-alive connections over SSL.
# With this enabled, client is not necessary to do a full SSL-handshake for
# every request, thus saving time and cpu-resources.
ssl_session_cache shared:SSL:10m;
Restarting Nginx service is required.
Please open file /etc/dovecot/dovecot.conf
(Linux/OpenBSD) or
/usr/local/etc/dovecot/dovecot.conf
(FreeBSD), update parameter
ssl_cipher_list
to below value, it adds new cipher EECDH+CHACHA20
and
removes the weak one AES256+EDH
:
ssl_cipher_list = EECDH+CHACHA20:EECDH+AESGCM:EDH+AESGCM:AES256+EECDH
Restarting Dovecot service is required.