Application Name Enter any name of server software to notify client. Domain Add domain or delete domain.
If "Local" is selected, Transmission and reception range of mail is restricted locally.
SMTP HELO Domain Enter domain name to notify when send mail.
Don't need to enter basically. Domain of sender is automatically selected.Port Enter port number used by server, enable / disable of STARTTLS.
Server General SMTP Port for mail transmit. 25
SSL:465
Submission:587POP3 Port for mail reception. 110
SSL:995HTTP Port for web page publishing. 80
SSL:443Management tool Port for management tool. 8880 Selected port is enabled.
DNS Server Enter IP address of DNS server. Admin Mail Address Enter administrator's mail address.
It must be deliverable.
Home URL Enter URL(http:// ~) for "Home" page of management tool.
If URL is blank, System informations are displayed.
Data Folder Enter absolute path of folder that stores mail data, etc.
e.g. Windows:"C:¥DATA" Linux:"/home/data"Send Interval Enter interval for sending mail.
If Realtime is selected, mail is delivered immediately.
Some mail is not sent realtime. (e.g. Mailing list)
Retry Count Enter max retry count when transmission fails.
If exceed this count, return to sender.
Communication between a client (mailer/browser) and Kirium Mail Server is encrypted by making SSL effective.
Keystore Enter absolute path of Keystore file and password. Truststore Enter absolute path of Truststore file and password. Create keystore, truststore by keytool. This tool is installed with Java.
■How to create keystore and truststore by self-signed server certificate.
1.Create keystore
Keystore file is created by keytool.
e.g.
#Create keystore file(kirium.jks) of certificate valid for ten years
>keytool -genkey -alias server -keyalg RSA -keysize 2048 -sigalg SHA256withRSA -validity 3650 -keystore kirium.jks
Enter keystore password: password
Re-enter new password: password
What is your first and last name?
[Unknown]: www.creamsoft.co.jp <=Enter FQDN of site where SSL encryption communication.
What is the name of your organizational unit?
[Unknown]: Creamsoft Network
What is the name of your organization?
[Unknown]: Creamsoft
What is the name of your City or Locality?
[Unknown]: Nagano
What is the name of your State or Province?
[Unknown]: Nagano
What is the two-letter country code for this unit?
[Unknown]: JP
CN=www.creamsoft.co.jp, OU=Creamsoft Network, O=Creamsoft, L=Nagano, ST=Nagano, C=JP correct?
[no]: yes
Enter key password for <server>
(RETURN if same as keystore password): <=Press enter key.
2.Create certificate
Export the server certificate from keystore by keytool.
e.g.
#Export the server certificate(server.cer) from keystore
>keytool -export -alias server -keystore kirium.jks -file server.cer
Enter keystore password: password
Certificate stored in file<server.cer>
3.Create truststore
Truststore file is created by keytool.
e.g.
#Create truststore file(kirium.jts)
>keytool -import -alias server -keystore kirium.jts -file server.cer
Enter keystore password: password
Re-enter new password: password
Owner: CN=www.creamsoft.co.jp, OU=Creamsoft Network, O=Creamsoft, L=Nagano, ST=Nagano, C=JP
Issuer: CN=www.creamsoft.co.jp, OU=Creamsoft Network, O=Creamsoft, L=Nagano, ST=Nagano, C=JP
Serial number: 49ab5d70
Valid from: Wed Sep 02 14:24:37 JST 2015 until: Sat Aug 30 14:24:37 JST 2025
Certificate fingerprints:
MD5: 81:49:EE:0E:**:**:**:omit:**:**:**:FD:EB:E4:6E
SHA1: DE:8B:61:5B:**:**:**:omit:**:**:**:66:EA:A9:03:4B:E4:79:61
Signature algorithm name: SHA256withRSA
Version: 3
Trust this certificate? [no]: yes
Certificate was added to keystore
Mailer and browser may not trust self-signed certificate.
■How to create keystore and truststore from server certificate signed by third-party certification authority
1.Create keystore
     Please refer to here
2.Create certificate signing request(CSR) file
CSR file of server is created by keytool.
e.g.
#Create CSR file(server.csr) of server
>keytool -certreq -alias server -keystore kirium.jks -file server.csr
Enter keystore password:
3.Certificate issuance request
Send CSR file (or its contents) to third-party certification authority, and request certificate.
Please contact certificate authority.
4.Import certificate
Import server certificate(server.cer) that is signed by certification authority to keystore.
e.g.
#Import server certificate(server.cer)
>keytool -import -alias server -file server.cer -keystore kirium.jks
Enter keystore password:
Certificate was added to keystore
5.Create truststore
     Please refer to here.
■How to create keystore and truststore from server certificate signed by self-certification authority.
1.Construction of self-certification authority
(Example of OpenSSL execution)
#Create private key and certificate signing request(CSR) file
>openssl req -new -newkey rsa:2048 -days 3650 -keyout ca\private\cakey.pem -out ca\careq.pem
Loading 'screen' into random state - done
Generating a 2048 bit RSA private key
..++++++
...................................++++++
writing new private key to 'ca\private\cakey.pem'
Enter PEM pass phrase: <=Enter password of private key
Verifying - Enter PEM pass phrase:
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:JP
State or Province Name (full name) [Some-State]:Nagano
Locality Name (eg, city) []:Nagano
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Creamsoft
Organizational Unit Name (eg, section) []:
Common Name (eg, YOUR name) []:Creamsoft CA
Email Address []:root@creamsoft.co.jp
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
#Sign CSR file by myself, and Create certificate of certification authority.
>openssl ca -create_serial -out ca\cacert.pem -days 3650 -batch
-keyfile ca\private\cakey.pem -selfsign -extensions v3_ca -infiles ca\careq.pem
Using configuration from C:\OpenSSL\bin\openssl.cfg
Loading 'screen' into random state - done
Enter pass phrase for ca\private\cakey.pem: <=Enter password of private key
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 1 (0x1)
Validity
Not Before: Sep 2 05:37:43 2015 GMT
Not After : Aug 30 05:37:43 2025 GMT
Subject:
countryName = JP
stateOrProvinceName = Nagano
organizationName = Creamsoft
organizationalUnitName =
commonName = Creamsoft CA
X509v3 extensions:
X509v3 Subject Key Identifier:
7E:ED:9A:25:**:**:**:omit:**:**:**:C1:64:DB:06:5E
X509v3 Authority Key Identifier:
keyid:7E:ED:9A:25:**:**:**:omit:**:**:**:64:DB:06:5E
X509v3 Basic Constraints:
CA:TRUE
Certificate is to be certified until Aug 30 05:37:43 2025 GMT (3650 days)
Write out database with 1 new entries
Data Base Updated
#Convert to DER format from PEM format certificate of certification authority.
openssl x509 -inform PEM -outform DER -in ca\cacert.pem -out ca\cacert.cer
2.Create keystore
     Please refer to here.
3.Import certificate
Import certificate(cacert.cer) of self-certification authority to keystore.
e.g.
#Import certificate(cacert.cer) of self-certification authority
>keytool -import -alias myca -file ca\cacert.cer -keystore kirium.jks
Enter keystore password:
Owner: EMAILADDRESS=root@creamsoft.co.jp, CN=Creamsoft CA, OU=, O=Creamsoft, ST=Nagano, C=JP
Issuer: EMAILADDRESS=root@creamsoft.co.jp, CN=Creamsoft CA, OU=, O=Creamsoft, ST=Nagano, C=JP
Serial number: 1
Valid from: Wed Sep 02 13:22:00 JST 2015 until: Sat Aug 30 13:22:00 JST 2025
Certificate fingerprints:
MD5: 04:17:8A:94:**:**:**:omit:**:**:**:A5:86:E5:16
SHA1: 01:DD:C0:42:**:**:**:omit:**:**:**:09:29:0C:D2
is not trusted. Install reply anyway? [no]: yes
Certificate reply was installed in keystore
4.Create certificate signing request(CSR) file
     Please refer to here.
5.Server certificate
Sign CSR file of server by self-certification authority, and create server certificate.
e.g.
#Create server certificate(server.pem)
>openssl ca -in server.csr -keyfile ca\private\cakey.pem -cert ca\cacert.pem -out server.pem -days 3650
Using configuration from C:\OpenSSL\bin\openssl.cfg
Loading 'screen' into random state - done
Enter pass phrase for ca\private\cakey.pem: <=Enter password of private key
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 2 (0x2)
Validity
Not Before: Sep 2 05:48:59 2015 GMT
Not After : Aug 30 05:48:59 2025 GMT
Subject:
countryName = JP
stateOrProvinceName = Nagano
organizationName = Creamsoft
organizationalUnitName =
commonName = www.creamsoft.co.jp
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
3D:B9:78:F2:E3:8F:7D:13:4E:50:E3:C1:F4:35:24:EF:A1:6E:52:A1
X509v3 Authority Key Identifier:
keyid:7E:ED:9A:25:61:7D:4C:0B:8D:58:C7:F7:DD:1B:94:C1:64:DB:06:5E
Certificate is to be certified until Aug 30 05:48:59 2025 GMT (3650 days)
Sign the certificate? [y/n]:y
1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
#Convert to DER format from server certificate in PEM format.
openssl x509 -inform PEM -outform DER -in server.pem -out server.cer
6.Import certificate
     Please refer to here.
7.Create truststore
     PLease refer to here.
You need not change when not understanding the settings well. However, to improve the performance
of Kirium Mail Server, the settings according to an environment is needed.
*1 If non-communication state continues over timeout, connection is closed.
Max Send Size Enter max size of mail. Max CC/BCC Enter max total count of TO, CC, and BCC. Max Article Count Enter max count of mailing list articles can be acquired by one request. Max Hop Count Enter max count of routes to reach destination.
If one router, it is two hops, and If two routers, it is three hops.
If exceeds this value, mail returns to sender.
POP3 Mail Order Select order of POP3 mail. It is usually order of arrival.
Max Keep-Alive Count Enter max count of requests that HTTP server handles while maintaining the connection. Session Timeout Enter time until the session with client and HTTP server is disconnected. HTTP Buffer Size Enter response buffer size of HTTP server. SMTP Timeout Enter timeout of SMTP server. *1 POP3 Timeout Enter timeout of POP3 server. *1 HTTP Timeout Enter timeout of HTTP server. *1 Admin Tool Timeout Enter timeout of admin tool. *1 SMTP Backlog Enter max size of connection queue of SMTP server. *2 POP3 Backlog Enter max size of connection queue of POP3 server. *2 HTTP Backlog Enter max size of connection queue of HTTP server. *2 Admin Tool Backlog Enter max size of connection queue of admin tool. *2 Max Thread Pool Enter max count of threads to keep. Min Thread Pool Enter min count of threads to keep. Max Idle Time Thread not used during this time is terminated.
*2 If queue has been filled, connection request is refused.
It is necessary to open following protocol and port.
(Please refer to manual of OS for details.)
Protocol Port TCP SMTP port (e.g. 25)
POP3 port (e.g. 110)
HTTP port (e.g. 80)
If use admin tool from remote computer, Admin tool port. (e.g. 8880)
Session sync port (e.g. 9990)UDP Heartbeat port (e.g. 11100)