<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 15:04:18 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://www.hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>dnssec</title>
            <link>https://www.hackerbruecke.net/linux/dnssec?rev=1713236436&amp;do=diff</link>
            <description>DNSsec mit Bind9

Standards für die „Domain Name System Security Extensions (DNSSEC)“: RFC 4033, RFC 4034, RFC 4035, RFC 5011 und RFC 5155.





Entropie zur Schlüsselgenerierung

Um genügend Entropie für die Erzeugung der Schlüssel zur Verfügung zu haben, sollte z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:00:36 +0000</pubDate>
        </item>
        <item>
            <title>sign</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/sign?rev=1493132019&amp;do=diff</link>
            <description>Domain Key Identified Mail outbound - ORIGINATING - signieren

DKIM basiert auf asymetrischer Verschlüsselung mit public- und private-Key.

Das Key-Paar wird mit folgender Syntax erzeugt: 



amavisd genrsa &lt;Dateiname&gt; [Anzahl der Bits für den Schlüssel]</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:39 +0000</pubDate>
        </item>
        <item>
            <title>hardware</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>all</title>
            <link>https://www.hackerbruecke.net/linux/debian/all?rev=1493131598&amp;do=diff</link>
            <description>2014-08-08



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

auf allen Server-Instanzen („Blech“, Linux VServer, LXC):



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=„&lt;http://proxy01.ukbw.de:3128/&gt;“

### LiHAS GPG-Key importieren:
wget -O -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:38 +0000</pubDate>
        </item>
        <item>
            <title>openssl_ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/openssl_ca?rev=1293466844&amp;do=diff</link>
            <description>simple OpenSSL Certficate Authority

Create Certificate Authority
station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca
CA certificate filename (or enter to create)

Making CA certificate ...
Generating a 1024 bit RSA private key
.....++++++
.....................................++++++
writing new private key to &#039;./demoCA/private/./cakey.pem&#039;
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
You are about to be asked to enter information that will be incorporated
into your c…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>ldap_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_secure?rev=1293466843&amp;do=diff</link>
            <description>TLS and LDAP over SSL (ldaps)

Modifying /etc/openldap/ldap.conf

Modify / append the TLS-settings:
#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /etc/ssl/private/station7_key.pem
TLS_REQCERT demand</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>tipps</title>
            <link>https://www.hackerbruecke.net/linux/ssh/tipps?rev=1493132416&amp;do=diff</link>
            <description>SSH Tipps

SSH-Key auf entferntem Server einspielen


ssh-copy-id root@HOSTNAME
root@HOSTNAME&#039;s password: 
Now try logging into the machine, with &quot;ssh &#039;root@HOSTNAME&#039;&quot;, and check in:

  ~/.ssh/authorized_keys

to make sure we haven&#039;t added extra keys that you weren&#039;t expecting.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:16 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/apache2/config?rev=1293466841&amp;do=diff</link>
            <description>Apache

SSL (https)

A special thing for getting Apache2 starting withaut user-interaction is also to store a decrypted key, since without Apache will ask at every start for the password...

mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem
openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apache2/private/station7_decrypted-key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>door-access</title>
            <link>https://www.hackerbruecke.net/homeautomation/door-access?rev=1420660646&amp;do=diff</link>
            <description>Tür-Zutrittskontrolle

Am Anfang stand der Wunsch unserer grossen Tochter einen sicheren Zutritt ins Haus nach der Schule zu ermmöglichen. Sollte Sie den „Schlüssel“ verlieren, sollte dieser mit einfachen Mittel sperrbar und durch ein kostengünstiges Nachfolge-Exemplar ersetzt werden können.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 07 Jan 2015 19:57:26 +0000</pubDate>
        </item>
        <item>
            <title>linux</title>
            <link>https://www.hackerbruecke.net/linux/linux?rev=1715428233&amp;do=diff</link>
            <description>Debian-Installation

	*  Installation von GNU/Debian auf Hardware oder virtueller Instanz
	*  zweite Netzwerkkarte mit wechselnder Konfiguration






securing DNS and Mail

	*  Domain Name System Security Extensions (DNSSEC) mit Bind9
	*  DNS-based Authentication of Named Entities (DANE) und TLS Authentication record (TLSA)
	*  Sender Policy Framework (SPF)
	*  DomainKeys Identified Mail (DKIM)
	*  Domain-based Message Authentication, Reporting and Conformance (DMARC)
	*  Authenticated Received…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 11 May 2024 11:50:33 +0000</pubDate>
        </item>
        <item>
            <title>neues_certificate</title>
            <link>https://www.hackerbruecke.net/linux/ejabberd/neues_certificate?rev=1493131703&amp;do=diff</link>
            <description>Neues Zertifikat für ejabberd installieren

neues PEM-File erzeugen:


	*  in CA Certificate und private-Key erzeugen und nach /etc/ejabberd auf jabber-Server kopieren
	*  auf ejabberd-Server in 


cat jabber@ukbw.de-key.pem &gt; ejabberd.pem
cat jabber@ukbw.de-cert.pem &gt;&gt; ejabberd.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:48:23 +0000</pubDate>
        </item>
        <item>
            <title>ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/ca?rev=1293466844&amp;do=diff</link>
            <description>Certificate Authority

generate certificate and key-files using e.g. one of the follwing

	*  simple OpenSSL CA
	*  Tiny CA
	*  phpki CA




trusting your Certificate Authority

Ensure there&#039;s only one CA certificate in the file from your CA. Normally there is, but ocassionally several are stored in the same file. To list the number of certificates in a file, use the command below. If you get an answer of more than one, then see the section on multiple certificates in one file. The command to ch…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>pam</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/pam?rev=1293466843&amp;do=diff</link>
            <description>/etc/ldap.conf (for PAM)
#
# This is the configuration file for the LDAP nameservice
# switch library, the LDAP PAM module and the shadow package.
#

# Your LDAP server. Must be resolvable without using LDAP.
host	127.0.0.1

# The distinguished name of the search base.
base	dc=example,dc=com

# The LDAP version to use (defaults to 3
# if supported by client library)
ldap_version	3

# Hash password locally; required for University of
# Michigan LDAP server, and works with Netscape
# Directory Ser…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>postfix_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/postfix_secure?rev=1493132183&amp;do=diff</link>
            <description>Postfix with TLS and SSL (smtps)

Use a portscanner like „nmap“:
station7:/etc/init.d # nmap localhost | grep smtp
25/tcp   open  smtp


-&gt; smtp is only running at port 25!



TLS

Modify the TLS-settings in /etc/postfix/main.cf
#--- SSL/TLS setting ---#
smtpd_client_restrictions= permit_tls_clientcerts, permit_sasl_authenticated
smtpd_recipient_restrictions =
  permit_mynetworks,
  permit_sasl_authenticated,
  permit_tls_clientcerts,
  reject_unauth_destination,
  check_sender_access hash:/etc/…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:23 +0000</pubDate>
        </item>
        <item>
            <title>avast-ssl</title>
            <link>https://www.hackerbruecke.net/thunderbird/avast-ssl?rev=1293466844&amp;do=diff</link>
            <description>Thunderbird - SpamPal - Avast with SSL

1. Installing and preparing STUNNEL:

Download OPENSSL for Windows from: &lt;http://www.slproweb.com/products/Win32OpenSSL.html&gt; 

Download STUNNEL for WIndows from: &lt;http://www.stunnel.org/download/binaries.html&gt; 

and install both. 


In the folder where you have installed stunnel (e.g. C:\Programme\stunnel), you will create its configuration file.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>ldap_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/ldap.conf
#
# LDAP Defaults
#

# See ldap.conf(5) for details
# This file should be world readable but not world writable.

# 21.07.2006, chhaas
BASE	dc=example,dc=com
URI	ldap://127.0.0.1
###
#SIZELIMIT	12
#TIMELIMIT	15
#DEREF		never

#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP
#TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /e…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>slapd_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/slapd_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/slapd.conf

&lt;http://www.stanford.edu/services/directory/openldap/configuration/bdb-config.html&gt;




# The database configuration parameters must appear *after* the &quot;database&quot;
# directive, as DB_CONFIG files are &#039;per backend&#039;.
dbconfig set_cachesize  4 0 1
dbconfig set_lg_regionmax 262144
dbconfig set_lg_bsize 2097152
dbconfig set_lg_dir /var/log
# Automatically remove log files that are no longer needed.
dbconfig set_flags DB_LOG_AUTOREMOVE
# 
# Setting set_tas_spins reduces resour…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>sieve</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/sieve?rev=1493131976&amp;do=diff</link>
            <description>Sieve

	*  &lt;http://sieve.info/&gt;
	*  &lt;http://en.wikipedia.org/wiki/Sieve_%28mail_filtering_language%29&gt;
	*  &lt;http://de.wikipedia.org/wiki/Sieve&gt;
	*  &lt;http://www.uni-koeln.de/rrzk/mail/software/sieve/sieve.html&gt;

Sieve and SSL / TLS

timsieved allows for SSL on connect (like https, imaps, or pop3s), only STARTTLS.

So you have to wrap it in an stunnel (www.stunnel.org), which is a another story ...

Have a look at this: &lt;http://lists.horde.org/archives/ingo/Week-of-Mon-20050704/000872.html&gt;

Testi…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:56 +0000</pubDate>
        </item>
        <item>
            <title>ldap</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/ldap?rev=1493132150&amp;do=diff</link>
            <description>using LDAP

/etc/postfix/ldap-aliases.cf:
server_host= ldaps://localhost:636
server_port= 636
start_tls = no
tls_ca_cert_file = /etc/ssl/postfix/certs/ca_cert.pem
tls_ca_cert_dir = /etc/ssl/postfix/certs/
tls_cert = /etc/ssl/postfix/certs/station7_cert.pem
tls_key = /etc/ssl/postfix/private/station7_key.pem
#tls_random_file = dev:/dev/urandom
tls_cipher_suite = ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
version= 3
bind= no
timeout= 120
search_base= dc=example,dc=com
query_filter = (&amp;(object…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:55:50 +0000</pubDate>
        </item>
        <item>
            <title>verify</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/verify?rev=1493132031&amp;do=diff</link>
            <description>Domain Key Identified Mail inbound verifizieren


vim /etc/amavis/conf.d/50-user



# DKIM-Ueberpruefung:
$enable_dkim_verification = 1;
$allowed_added_header_fields{lc(&#039;Authentication-Results&#039;)} = 1;



service amavis restart


AMaViS kann nun mit Hilfe des Public-Keys der in der</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:51 +0000</pubDate>
        </item>
        <item>
            <title>vmware</title>
            <link>https://www.hackerbruecke.net/endian/vmware?rev=1293466840&amp;do=diff</link>
            <description>Endian Firewall 2.12 Community Edition VMware-image

Thanks to Peter Warasin and Raphael Vallazza from endian, I put together some minimal docu for the VMware-image.


Standard users and passwords:

	*  Web-interface: admin, pwd.: endian
	*  Console: root, pwd: endian</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:40 +0000</pubDate>
        </item>
        <item>
            <title>syntax</title>
            <link>https://www.hackerbruecke.net/wiki/syntax?rev=1712421931&amp;do=diff</link>
            <description>Formatting Syntax

DokuWiki supports some simple markup language, which tries to make the datafiles to be as readable as possible. This page contains all possible syntax you may use when editing the pages. Simply have a look at the source of this page by pressing</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:45:31 +0000</pubDate>
        </item>
        <item>
            <title>todo</title>
            <link>https://www.hackerbruecke.net/linux/commserv/todo?rev=1293466842&amp;do=diff</link>
            <description>ToDo

Things, that have to be documented:

	*  generating the decrypted SSL-key with OpenSSL-CA
	*  use of TinyCA and phpki-CA
	*  Postfix: main.cf and master.cf
	*  implement &lt;http://www.contentschmiede.de/archiv/2005/08/26/postfix_fuer_typo3_und_gmx_fit_machen/&gt; in email -&gt; Postfix -&gt; SMTPd- / SMTP-Authentication</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:42 +0000</pubDate>
        </item>
        <item>
            <title>dkim</title>
            <link>https://www.hackerbruecke.net/linux/email/dkim?rev=1713236621&amp;do=diff</link>
            <description>DKIM

Standards für die „DomainKeys Identified Mail (DKIM)“: RFC 6376, RFC 8301, RFC 8463, RFC 8553 und RFC 8616




&lt;- zurück</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:03:41 +0000</pubDate>
        </item>
        <item>
            <title>email</title>
            <link>https://www.hackerbruecke.net/linux/email/email?rev=1493137617&amp;do=diff</link>
            <description>email

Mailserver, Mailgateway, Anti-Spam [AMaVISd-new, SpamAssassin, dSpam, rspamd], SPF, DKIM, PFS etc.
\\}}


Postfix smtpd

Postfix ist ein sehr mächtiger Mail Transport Agent, entwickelt von Wietse Venema.


	*  Postfix Konfiguration für einen Mailserver
	*  use of LDAP lookup maps
	*  Postfix&#039; Postscreen Modul anstatt policyd-weight oder postfwd
	*  Postfix Anti-SPAM/UCE settings
	*  Postfix SASL Konfiguraton
	*  SMTP-authentication
	*  TLS and SSL configuration (smtps)
	*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:26:57 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>dkim</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim?rev=1493135342&amp;do=diff</link>
            <description>Postfix mit Domain Key Identifified Mail (DKIM)

Vorausssetzung für DKIM ist ein installiertes -&gt; AMaVIS.

Auch bei DKIM wird, wie bei allen anderen Signaturen, in zwei Richtngen unterschieden:


	*  eingehende emails (inbound): Überprüfung von DKIM-Signaturen in emails</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:49:02 +0000</pubDate>
        </item>
    </channel>
</rss>
