<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 16:59:25 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>email</title>
            <link>https://www.hackerbruecke.net/linux/email/email?rev=1493137617&amp;do=diff</link>
            <description>email

Mailserver, Mailgateway, Anti-Spam [AMaVISd-new, SpamAssassin, dSpam, rspamd], SPF, DKIM, PFS etc.
\\}}


Postfix smtpd

Postfix ist ein sehr mächtiger Mail Transport Agent, entwickelt von Wietse Venema.


	*  Postfix Konfiguration für einen Mailserver
	*  use of LDAP lookup maps
	*  Postfix&#039; Postscreen Modul anstatt policyd-weight oder postfwd
	*  Postfix Anti-SPAM/UCE settings
	*  Postfix SASL Konfiguraton
	*  SMTP-authentication
	*  TLS and SSL configuration (smtps)
	*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:26:57 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/config?rev=1493131953&amp;do=diff</link>
            <description>Cyrus imapd / popd



&lt;http://www.opensuse.org&gt;Modify /etc/cyrus.conf to:


START {
  recover       cmd=&quot;ctl_cyrusdb -r&quot;
  deliver       cmd=&quot;ctl_deliver -r&quot;
}

SERVICES {
  imap          cmd=&quot;imapd&quot; listen=&quot;imap&quot; prefork=0
  #  imaps                cmd=&quot;imapd -s&quot; listen=&quot;imaps&quot; prefork=0
  pop3          cmd=&quot;pop3d&quot; listen=&quot;pop3&quot; prefork=0
  #  pop3s                cmd=&quot;pop3d -s&quot; listen=&quot;pop3s&quot; prefork=0
  sieve         cmd=&quot;timsieved&quot; listen=&quot;sieve&quot; prefork=2
  # entry must be the same as in th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:33 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>cyrus</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus?rev=1493131782&amp;do=diff</link>
            <description>Cyrus imapd

	*  Cyrus configuration (IMAP4/POP3)
		*  TLS and SSL configuration (imaps)
		*  Cyrus SIEVE configuration



&lt;- zurück</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:49:42 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>pflogsum</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/pflogsum?rev=1493132162&amp;do=diff</link>
            <description>Postfix-Reporting mit Pflogsum


apt-get install pflogsum


/usr/local/bin/postfix_report.sh


#!/bin/bash 

/usr/sbin/pflogsumm -d yesterday --problems_first /var/log/mail.log.1 &gt; /tmp/pflogsumm
/usr/bin/mailx -s &quot;Automatischer Postfix-Report von $(hostname)&quot; -r postfix-admin@station7.example.de postfix-admin@station7.example.de &lt; /tmp/pflogsumm</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:02 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>postfix_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/postfix_secure?rev=1493132183&amp;do=diff</link>
            <description>Postfix with TLS and SSL (smtps)

Use a portscanner like „nmap“:
station7:/etc/init.d # nmap localhost | grep smtp
25/tcp   open  smtp


-&gt; smtp is only running at port 25!



TLS

Modify the TLS-settings in /etc/postfix/main.cf
#--- SSL/TLS setting ---#
smtpd_client_restrictions= permit_tls_clientcerts, permit_sasl_authenticated
smtpd_recipient_restrictions =
  permit_mynetworks,
  permit_sasl_authenticated,
  permit_tls_clientcerts,
  reject_unauth_destination,
  check_sender_access hash:/etc/…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:23 +0000</pubDate>
        </item>
        <item>
            <title>relayhost</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/relayhost?rev=1493132193&amp;do=diff</link>
            <description>Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


 used Ports:
  10023/tcp: postgrey
10024/tcp: amavisd-new
10025/tcp: policyd-weight</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:33 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>sign</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/sign?rev=1493132019&amp;do=diff</link>
            <description>Domain Key Identified Mail outbound - ORIGINATING - signieren

DKIM basiert auf asymetrischer Verschlüsselung mit public- und private-Key.

Das Key-Paar wird mit folgender Syntax erzeugt: 



amavisd genrsa &lt;Dateiname&gt; [Anzahl der Bits für den Schlüssel]</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:39 +0000</pubDate>
        </item>
        <item>
            <title>verify</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/verify?rev=1493132031&amp;do=diff</link>
            <description>Domain Key Identified Mail inbound verifizieren


vim /etc/amavis/conf.d/50-user



# DKIM-Ueberpruefung:
$enable_dkim_verification = 1;
$allowed_added_header_fields{lc(&#039;Authentication-Results&#039;)} = 1;



service amavis restart


AMaViS kann nun mit Hilfe des Public-Keys der in der</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:51 +0000</pubDate>
        </item>
    </channel>
</rss>
