2022-02-02 11:37:12 +01:00
|
|
|
Mails are stored compressed (lz4) and encrypted. The key pair can be found in crypt-vol-1.
|
|
|
|
|
|
|
|
If you want to decode/encode existing maildir files, you can use the following script at your own risk:
|
|
|
|
|
2022-06-01 15:39:27 +02:00
|
|
|
Enter Dovecot by running `docker-compose exec dovecot-mailcow /bin/bash` in the mailcow-dockerized location.
|
2022-02-02 11:37:12 +01:00
|
|
|
|
|
|
|
```
|
|
|
|
# Decrypt /var/vmail
|
|
|
|
find /var/vmail/ -type f -regextype egrep -regex '.*S=.*W=.*' | while read -r file; do
|
|
|
|
if [[ $(head -c7 "$file") == "CRYPTED" ]]; then
|
|
|
|
doveadm fs get compress lz4:0:crypt:private_key_path=/mail_crypt/ecprivkey.pem:public_key_path=/mail_crypt/ecpubkey.pem:posix:prefix=/ \
|
|
|
|
"$file" > "/tmp/$(basename "$file")"
|
|
|
|
if [[ -s "/tmp/$(basename "$file")" ]]; then
|
|
|
|
chmod 600 "/tmp/$(basename "$file")"
|
|
|
|
chown 5000:5000 "/tmp/$(basename "$file")"
|
|
|
|
mv "/tmp/$(basename "$file")" "$file"
|
|
|
|
else
|
|
|
|
rm "/tmp/$(basename "$file")"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# Encrypt /var/vmail
|
|
|
|
find /var/vmail/ -type f -regextype egrep -regex '.*S=.*W=.*' | while read -r file; do
|
|
|
|
if [[ $(head -c7 "$file") != "CRYPTED" ]]; then
|
|
|
|
doveadm fs put crypt private_key_path=/mail_crypt/ecprivkey.pem:public_key_path=/mail_crypt/ecpubkey.pem:posix:prefix=/ \
|
|
|
|
"$file" "$file"
|
|
|
|
chmod 600 "$file"
|
|
|
|
chown 5000:5000 "$file"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
```
|