protocols = imap pop3 sieve
disable_plaintext_auth = yes
ssl = yes
-ssl_cert = /etc/letsencrypt/live/moellein.homeip.net/fullchain.pem
-ssl_key = /etc/letsencrypt/live/moellein.homeip.net/privkey.pem
+ssl_cert = /etc/letsencrypt/live/tine.hoellein.online/fullchain.pem
+ssl_key = /etc/letsencrypt/live/tine.hoellein.online/privkey.pem
#ssl_cert = /etc/ssl/certs/ssl-mail.pem
#ssl_key = /etc/ssl/private/ssl-mail.key
ssl_cipher_list = ALL:!LOW:!SSLv2:ALL:!aNULL:!ADH:!eNULL:!EXP:RC4+RSA:+HIGH:+MEDIUM
# certificate, just make sure to update the domains in dovecot-openssl.cnf
#ssl_cert = </etc/dovecot/dovecot.pem
#ssl_key = </etc/dovecot/private/dovecot.pem
-ssl_cert = </etc/letsencrypt/live/moellein.homeip.net/fullchain.pem
-ssl_key = </etc/letsencrypt/live/moellein.homeip.net/privkey.pem
+ssl_cert = </etc/letsencrypt/live/tine.hoellein.online/fullchain.pem
+ssl_key = </etc/letsencrypt/live/tine.hoellein.online/privkey.pem
# If key file is password protected, give the password here. Alternatively
# give it when starting dovecot with -p parameter. Since this file is often
protocols = imap pop3 sieve
disable_plaintext_auth = yes
ssl = yes
-ssl_cert = </etc/letsencrypt/live/moellein.homeip.net/fullchain.pem
-ssl_key = </etc/letsencrypt/live/moellein.homeip.net/privkey.pem
+ssl_cert = </etc/letsencrypt/live/tine.hoellein.online/fullchain.pem
+ssl_key = </etc/letsencrypt/live/tine.hoellein.online/privkey.pem
#ssl_cert = </etc/dovecot/dovecot.pem
#ssl_key = </etc/dovecot/private/dovecot.pem
# TLS parameters
# Pfade zu den Keys
-smtpd_tls_cert_file = /etc/letsencrypt/live/moellein.homeip.net/fullchain.pem
-smtpd_tls_key_file= /etc/letsencrypt/live/moellein.homeip.net/privkey.pem
+smtpd_tls_cert_file = /etc/letsencrypt/live/tine.hoellein.online/fullchain.pem
+smtpd_tls_key_file= /etc/letsencrypt/live/tine.hoellein.online/privkey.pem
smtpd_use_tls = yes
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache