<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 15:28:29 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>sieve</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/sieve?rev=1493131976&amp;do=diff</link>
            <description>Sieve

	*  &lt;http://sieve.info/&gt;
	*  &lt;http://en.wikipedia.org/wiki/Sieve_%28mail_filtering_language%29&gt;
	*  &lt;http://de.wikipedia.org/wiki/Sieve&gt;
	*  &lt;http://www.uni-koeln.de/rrzk/mail/software/sieve/sieve.html&gt;

Sieve and SSL / TLS

timsieved allows for SSL on connect (like https, imaps, or pop3s), only STARTTLS.

So you have to wrap it in an stunnel (www.stunnel.org), which is a another story ...

Have a look at this: &lt;http://lists.horde.org/archives/ingo/Week-of-Mon-20050704/000872.html&gt;

Testi…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:56 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>spf</title>
            <link>https://www.hackerbruecke.net/linux/email/spf?rev=1713236572&amp;do=diff</link>
            <description>SPF

Standards für das „Sender Policy Framework (SPF)“: RFC 7208 und RFC 7372


v	SPF-Version
	Kennzeichen das einen TXT-Eintrag als SPF-Eintrag identifiziert.
	z.B. v=spf1 

Mechanismen (immer am Ende des Eintrags aufführen!)
a:	DNS-A-Eintrag
	z.B. a:example.com

ptr:	DNS-PTR-Eintrag (reverse Zone)
	z.B. ptr:example.com

all	alle zur Domain gehörigen Hostst
	z.B. -all

mx:	abweichender Mailexchanger
	z.B. mx:mail.example-abc.com

ip4:	Angabe einer oder mehrerer IPv4-Adressen
	z.B. ip4:192.100.1…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:02:52 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>config_test</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config_test?rev=1493132127&amp;do=diff</link>
            <description>Postfix-Konfiguration testen

Die Postfix-Konfigurtation sollte auf alle fälle vor der Produktivnahme ausgiebig getestet und das Verhalten beobachtet werden!




Test von main.cf und master.cf

Test der Datei- und Verzeichnisrechte, sowie die Syntax von main.cf und master.cf von Postfix:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:55:27 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>spamreport</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamreport?rev=1493132098&amp;do=diff</link>
            <description>Spamreport




spamcheck.sh


#!/bin/bash

#########################################################
# UKBW-Spam-Report, 2007-05-01, chhaas, IuK / Netzwerke #
#########################################################

#set -o verbose

########
# ToDo #
########
# - printvariablen bei &quot;grep X-Spam-Status:&quot; korrigieren
# - Mail an antispam@uk-bw.de zusammenfassen: 1 Mail die alle Spammails inkl. Empfaenger beinhaltet
# - Variablen fuer FROM: und RETURN-PATH einrichten
# - evtl. SpamAssassin Spam-T…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:54:58 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>operation</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/operation?rev=1493132007&amp;do=diff</link>
            <description>AmaViSd-new Operation

emails aus der Quarantäne releasen:

Wenn AMaViSd emails in die Quarantäne verschiebt, erhält man emails dieser Form:


Betreff: BANNED contents (text/x-msdos-batch,.asc,bacula_after_failure.cmd) in mail FROM LOCAL 

[...]

No viruses were found.

Banned name: text/x-msdos-batch,.asc,bacula_after_failure.cmd
Content type: Banned
Internal reference code for the message is 11606-02/IJvAMUUAzNma

[...]

The message has been quarantined as: I/banned-IJvAMUUAzNma

The message W…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:27 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/config?rev=1493131953&amp;do=diff</link>
            <description>Cyrus imapd / popd



&lt;http://www.opensuse.org&gt;Modify /etc/cyrus.conf to:


START {
  recover       cmd=&quot;ctl_cyrusdb -r&quot;
  deliver       cmd=&quot;ctl_deliver -r&quot;
}

SERVICES {
  imap          cmd=&quot;imapd&quot; listen=&quot;imap&quot; prefork=0
  #  imaps                cmd=&quot;imapd -s&quot; listen=&quot;imaps&quot; prefork=0
  pop3          cmd=&quot;pop3d&quot; listen=&quot;pop3&quot; prefork=0
  #  pop3s                cmd=&quot;pop3d -s&quot; listen=&quot;pop3s&quot; prefork=0
  sieve         cmd=&quot;timsieved&quot; listen=&quot;sieve&quot; prefork=2
  # entry must be the same as in th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:33 +0000</pubDate>
        </item>
        <item>
            <title>spf</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/spf?rev=1493132219&amp;do=diff</link>
            <description>Postfix und das Sender Policy Framework (SPF)

Das Sender Policy Framework - früher auch Sender Permitted From genannt -, soll das Fälschen des email-Absenders in einer E-Mail auf SMTP-Ebene erschweren.



Mithilfe eines SPF-Generators, z.B. &lt;http://spfwizard.com/&gt; oder</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:59 +0000</pubDate>
        </item>
        <item>
            <title>pfs</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/pfs?rev=1493132175&amp;do=diff</link>
            <description>Postfix Perfect Forwarding Secrecy (PFS)


openssl gendh -out /etc/postfix/dh_512.pem -2 512
openssl gendh -out /etc/postfix/dh_1024.pem -2 1024

postconf -e &quot;smtpd_tls_dh1024_param_file = /etc/postfix/dh_1024.pem&quot;
postconf -e &quot;smtpd_tls_dh512_param_file = /etc/postfix/dh_512.pem&quot;
postconf -e &quot;smtpd_tls_eecdh_grade = strong&quot;
postconf -e &quot;tls_preempt_cipherlist = yes&quot;
postconf -e &quot;smtpd_tls_loglevel = 1&quot;
postconf -e &quot;smtp_tls_loglevel = 1&quot;

postfix reload</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:15 +0000</pubDate>
        </item>
        <item>
            <title>postfix_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/postfix_secure?rev=1493132183&amp;do=diff</link>
            <description>Postfix with TLS and SSL (smtps)

Use a portscanner like „nmap“:
station7:/etc/init.d # nmap localhost | grep smtp
25/tcp   open  smtp


-&gt; smtp is only running at port 25!



TLS

Modify the TLS-settings in /etc/postfix/main.cf
#--- SSL/TLS setting ---#
smtpd_client_restrictions= permit_tls_clientcerts, permit_sasl_authenticated
smtpd_recipient_restrictions =
  permit_mynetworks,
  permit_sasl_authenticated,
  permit_tls_clientcerts,
  reject_unauth_destination,
  check_sender_access hash:/etc/…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:23 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
    </channel>
</rss>
