--- # ------------- # Mailcow.conf # ------------- mailcow__config_http_port: 80 mailcow__config_http_bind: mailcow__config_https_port: 443 mailcow__config_https_bind: # Set this to "allow" to enable the anyone pseudo user. Disabled by default. # When enabled, ACL can be created, that apply to "All authenticated users" # This should probably only be activated on mail hosts, that are used exclusivly by one organisation. # Otherwise a user might share data with too many other users. mailcow__config_acl_anyone: disallow # Garbage collector cleanup # Deleted domains and mailboxes are moved to /var/vmail/_garbage/timestamp_sanitizedstring # How long should objects remain in the garbage until they are being deleted? (value in minutes) # Check interval is hourly mailcow__config_maildir_gc_time: 1440 # Additional SAN for the certificate # # You can use wildcard records to create specific names for every domain you add to mailcow. # Example: Add domains "example.com" and "example.net" to mailcow, change ADDITIONAL_SAN to a value like: #ADDITIONAL_SAN=imap.*,smtp.* # This will expand the certificate to "imap.example.com", "smtp.example.com", "imap.example.net", "imap.example.net" # plus every domain you add in the future. # # You can also just add static names... #ADDITIONAL_SAN=srv1.example.net # ...or combine wildcard and static names: #ADDITIONAL_SAN=imap.*,srv1.example.com # mailcow__config_additional_san: [] # Additional server names for mailcow UI # # Specify alternative addresses for the mailcow UI to respond to # This is useful when you set mail.* as ADDITIONAL_SAN and want to make sure mail.maildomain.com will always point to the mailcow UI. # If the server name does not match a known site, Nginx decides by best-guess and may redirect users to the wrong web root. # You can understand this as server_name directive in Nginx. # Comma separated list without spaces! Example: ADDITIONAL_SERVER_NAMES=a.b.c,d.e.f mailcow__config_additional_server_names: [] # Skip running ACME (acme-mailcow, Let's Encrypt certs) - y/n mailcow__config_skip_lets_encrypt: n # Let's Encrypt registration contact information # Optional: Leave empty for none # This value is only used on first order! # Setting it at a later point will require the following steps: # https://mailcow.github.io/mailcow-dockerized-docs/troubleshooting/debug-reset_tls/ mailcow__config_acme_contact: "" # Create seperate certificates for all domains - y/n # this will allow adding more than 100 domains, but some email clients will not be able to connect with alternative hostnames # see https://wiki.dovecot.org/SSL/SNIClientSupport mailcow__config_enable_ssl_sni: n # Skip IPv4 check in ACME container - y/n mailcow__config_skip_ip_check: n # Skip HTTP verification in ACME container - y/n mailcow__config_skip_http_verification: n # Skip ClamAV (clamd-mailcow) anti-virus (Rspamd will auto-detect a missing ClamAV container) - y/n mailcow__config_skip_clamd: n # Skip SOGo: Will disable SOGo integration and therefore webmail, DAV protocols and ActiveSync support (experimental, unsupported, not fully implemented) - y/n mailcow__config_skip_sogo: n # Allow admins to log into SOGo as email user (without any password) mailcow__config_allow_admin_email_login: n # Enable watchdog (watchdog-mailcow) to restart unhealthy containers mailcow__config_use_watchdog: n # Send watchdog notifications by mail (sent from watchdog@MAILCOW_HOSTNAME) # CAUTION: # 1. You should use external recipients # 2. Mails are sent unsigned (no DKIM) # 3. If you use DMARC, create a separate DMARC policy ("v=DMARC1; p=none;" in _dmarc.MAILCOW_HOSTNAME) # Multiple rcpts allowed, NO quotation marks, NO spaces mailcow__config_watchdog_notify_email: # Notify about banned IP (includes whois lookup) mailcow__config_watchdog_notify_ban: y # Subject for watchdog mails. Defaults to "Watchdog ALERT" followed by the error message. mailcow__config_watchdog_subject: # Checks if mailcow is an open relay. Requires a SAL. More checks will follow. # https://www.servercow.de/mailcow?lang=en # https://www.servercow.de/mailcow?lang=de # No data is collected. Opt-in and anonymous. # Will only work with unmodified mailcow setups. mailcow__config_watchdog_external_checks: n # Max log lines per service to keep in Redis logs mailcow__config_log_lines: 9999 # SOGo session timeout in minutes mailcow__config_sogo_expire_session: 480 # Dovecot Indexing (FTS) Process maximum heap size in MB, there is no recommendation, please see Dovecot docs. # Flatcurve is used as FTS Engine. It is supposed to be pretty efficient in CPU and RAM consumption. # Please always monitor your Resource consumption! mailcow__config_fts_heap: 128 # Controls how many processes the Dovecot indexing process can spawn at max. # Too many indexing processes can use a lot of CPU and Disk I/O # Please visit: https://doc.dovecot.org/configuration_manual/service_configuration/#indexer-worker for more informations mailcow__config_fts_procs: 1 # Skip FTS (Fulltext Search) for Dovecot on low-memory, low-threaded systems or if you simply want to disable it. # Dovecot inside mailcow use Flatcurve as FTS Backend. mailcow__config_skip_fts: n # Redirect HTTP connections to HTTPS - y/n mailcow__config_http_redirect: n