Bob Mottram 8 lat temu
rodzic
commit
3a248c3eb7
2 zmienionych plików z 19 dodań i 7 usunięć
  1. 4
    0
      doc/EN/app_mailpile.org
  2. 15
    7
      website/EN/app_mailpile.html

+ 4
- 0
doc/EN/app_mailpile.org Wyświetl plik

60
 
60
 
61
 Under *Sending Mail* select *local* or if you need to proxy outgoing email through your ISP's server select *SMTP/TLS* and enter the details, then click *Next*.
61
 Under *Sending Mail* select *local* or if you need to proxy outgoing email through your ISP's server select *SMTP/TLS* and enter the details, then click *Next*.
62
 
62
 
63
+#+BEGIN_CENTER
64
+[[file:images/mailpile_setup.jpg]]
65
+#+END_CENTER
66
+
63
 Under *Receiving files* select *IMAP*, the domain as *localhost*, port *143*, your username and password, then click *Next*. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
67
 Under *Receiving files* select *IMAP*, the domain as *localhost*, port *143*, your username and password, then click *Next*. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
64
 
68
 
65
 Under *Security and Privacy* either select your existing encryption key or if you only get the option to create a new one then do so, then click *Add* or *Save*.
69
 Under *Security and Privacy* either select your existing encryption key or if you only get the option to create a new one then do so, then click *Add* or *Save*.

+ 15
- 7
website/EN/app_mailpile.html Wyświetl plik

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-11-14 Mon 13:10 -->
6
+<!-- 2016-11-14 Mon 13:35 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
259
 One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.
259
 One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.
260
 </p>
260
 </p>
261
 
261
 
262
-<div id="outline-container-orgda9d6ac" class="outline-2">
263
-<h2 id="orgda9d6ac">Installation</h2>
264
-<div class="outline-text-2" id="text-orgda9d6ac">
262
+<div id="outline-container-orgb258225" class="outline-2">
263
+<h2 id="orgb258225">Installation</h2>
264
+<div class="outline-text-2" id="text-orgb258225">
265
 <p>
265
 <p>
266
 Log into your system with:
266
 Log into your system with:
267
 </p>
267
 </p>
285
 </div>
285
 </div>
286
 </div>
286
 </div>
287
 
287
 
288
-<div id="outline-container-orgc08365b" class="outline-2">
289
-<h2 id="orgc08365b">Initial setup</h2>
290
-<div class="outline-text-2" id="text-orgc08365b">
288
+<div id="outline-container-orge68fae6" class="outline-2">
289
+<h2 id="orge68fae6">Initial setup</h2>
290
+<div class="outline-text-2" id="text-orge68fae6">
291
 <p>
291
 <p>
292
 If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
292
 If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
293
 </p>
293
 </p>
333
 Under <b>Sending Mail</b> select <b>local</b> or if you need to proxy outgoing email through your ISP's server select <b>SMTP/TLS</b> and enter the details, then click <b>Next</b>.
333
 Under <b>Sending Mail</b> select <b>local</b> or if you need to proxy outgoing email through your ISP's server select <b>SMTP/TLS</b> and enter the details, then click <b>Next</b>.
334
 </p>
334
 </p>
335
 
335
 
336
+<div class="org-center">
337
+
338
+<div class="figure">
339
+<p><img src="images/mailpile_setup.jpg" alt="mailpile_setup.jpg" />
340
+</p>
341
+</div>
342
+</div>
343
+
336
 <p>
344
 <p>
337
 Under <b>Receiving files</b> select <b>IMAP</b>, the domain as <b>localhost</b>, port <b>143</b>, your username and password, then click <b>Next</b>. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
345
 Under <b>Receiving files</b> select <b>IMAP</b>, the domain as <b>localhost</b>, port <b>143</b>, your username and password, then click <b>Next</b>. Astute readers may well be concerned that IMAP over port 143 is not encrypted, but since this is only via localhost communication between the Mail Transport Agent and Mailpile doesn't travel over the internet and port 143 is not opened on the firewall so it's not possible to accidentally connect an external mail client insecurely.
338
 </p>
346
 </p>