<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 16:54:20 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/egroupware/config?rev=1293466841&amp;do=diff</link>
            <description>eGroupWare Version 1.4.001

pre-requisites:

	*  required PHP version 4.3+ (recommended 5+)
	*  php.ini: safe_mode = Off
	*  php.ini: magic_quotes_runtime = Off
	*  php.ini: register_globals = Off
	*  php.ini: memory_limit &gt;= 16M
	*  php.ini: max_execution_time &gt;= 30</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>hardware</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>syntax</title>
            <link>https://www.hackerbruecke.net/wiki/syntax?rev=1712421931&amp;do=diff</link>
            <description>Formatting Syntax

DokuWiki supports some simple markup language, which tries to make the datafiles to be as readable as possible. This page contains all possible syntax you may use when editing the pages. Simply have a look at the source of this page by pressing</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:45:31 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/config?rev=1293466843&amp;do=diff</link>
            <description>GOsa

GOsa is a GPL&#039;ed PHP based administration tool for managing accounts and systems in LDAP databases. It administers users and groups, mail distribution lists, thin clients, applications, phones and faxes. 

Get GOsa from: &lt;http://oss.gonicus.de/pub/gosa/&gt; 

Project homepage: &lt;http://www.gosa-project.org/&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>gosa2egw</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/gosa2egw?rev=1293466843&amp;do=diff</link>
            <description>patching GOsa for seamless eGroupWare integration
&quot;-------- Original-Nachricht --------&quot;
Betreff: Re: [GOsa] gosa+samba3.schema conflicts with evolutionPerson.schema
Datum: Tue, 5 Jun 2007 15:23:31 +0200
Von: Cajus Pollmeier &lt;pollmeier@gonicus.de&gt;
An: GONICUS site administration project &lt;gosa@oss.gonicus.de&gt;

These are from two different RFCs, I guess. Bad luck. GOsa uses dateOfBirth 
internally. So, the simpliest way would be to remove the definition from the 
gosa+samba3.schema and add the ali…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>relayhost</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/relayhost?rev=1493132193&amp;do=diff</link>
            <description>Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


 used Ports:
  10023/tcp: postgrey
10024/tcp: amavisd-new
10025/tcp: policyd-weight</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:33 +0000</pubDate>
        </item>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://www.hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>avast-ssl</title>
            <link>https://www.hackerbruecke.net/thunderbird/avast-ssl?rev=1293466844&amp;do=diff</link>
            <description>Thunderbird - SpamPal - Avast with SSL

1. Installing and preparing STUNNEL:

Download OPENSSL for Windows from: &lt;http://www.slproweb.com/products/Win32OpenSSL.html&gt; 

Download STUNNEL for WIndows from: &lt;http://www.stunnel.org/download/binaries.html&gt; 

and install both. 


In the folder where you have installed stunnel (e.g. C:\Programme\stunnel), you will create its configuration file.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>installation</title>
            <link>https://www.hackerbruecke.net/linux/commserv/installation?rev=1408110705&amp;do=diff</link>
            <description>Installation of the Linux OS



SuSE 10.0 Professional

Because of problems with the 64-bit-version of the CAPI-driver for the AVM B1-Cards used in my commserv, only the 32-bit-version of SUSE 10.0 can be used. Maybe with later versions of openSUSE this changes</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 13:51:45 +0000</pubDate>
        </item>
        <item>
            <title>ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/ca?rev=1293466844&amp;do=diff</link>
            <description>Certificate Authority

generate certificate and key-files using e.g. one of the follwing

	*  simple OpenSSL CA
	*  Tiny CA
	*  phpki CA




trusting your Certificate Authority

Ensure there&#039;s only one CA certificate in the file from your CA. Normally there is, but ocassionally several are stored in the same file. To list the number of certificates in a file, use the command below. If you get an answer of more than one, then see the section on multiple certificates in one file. The command to ch…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>postfix_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/postfix_secure?rev=1493132183&amp;do=diff</link>
            <description>Postfix with TLS and SSL (smtps)

Use a portscanner like „nmap“:
station7:/etc/init.d # nmap localhost | grep smtp
25/tcp   open  smtp


-&gt; smtp is only running at port 25!



TLS

Modify the TLS-settings in /etc/postfix/main.cf
#--- SSL/TLS setting ---#
smtpd_client_restrictions= permit_tls_clientcerts, permit_sasl_authenticated
smtpd_recipient_restrictions =
  permit_mynetworks,
  permit_sasl_authenticated,
  permit_tls_clientcerts,
  reject_unauth_destination,
  check_sender_access hash:/etc/…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:23 +0000</pubDate>
        </item>
        <item>
            <title>packliste</title>
            <link>https://www.hackerbruecke.net/packliste?rev=1712491047&amp;do=diff</link>
            <description>Packliste

Liste der zu erledigenden Dinge, zum Packen und Tipps für die Teilnahme an einem Kongress, einer Konferenz oder einer anderen Veranstaltung, wie den Chemnitzer Linux Tagen (CLT), oder der Gulasch Programmiernacht (GPN) in Karlsruhe.

❤️ Danke ✨

Diese Packliste basiert ursprünglich auf der Liste von CongressChecklist von MacLemon, Vienna/Austria</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 07 Apr 2024 11:57:27 +0000</pubDate>
        </item>
        <item>
            <title>dokuwiki</title>
            <link>https://www.hackerbruecke.net/wiki/dokuwiki?rev=1684170792&amp;do=diff</link>
            <description>DokuWiki

wiki:dokuwiki DokuWiki is a simple to use and highly versatile Open Source wiki software that doesn&#039;t require a database. It is loved by users for its clean and readable syntax. The ease of maintenance, backup and integration makes it an administrator&#039;s favorite. Built in</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>all</title>
            <link>https://www.hackerbruecke.net/linux/debian/all?rev=1493131598&amp;do=diff</link>
            <description>2014-08-08



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

auf allen Server-Instanzen („Blech“, Linux VServer, LXC):



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=„&lt;http://proxy01.ukbw.de:3128/&gt;“

### LiHAS GPG-Key importieren:
wget -O -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:38 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/config?rev=1493131953&amp;do=diff</link>
            <description>Cyrus imapd / popd



&lt;http://www.opensuse.org&gt;Modify /etc/cyrus.conf to:


START {
  recover       cmd=&quot;ctl_cyrusdb -r&quot;
  deliver       cmd=&quot;ctl_deliver -r&quot;
}

SERVICES {
  imap          cmd=&quot;imapd&quot; listen=&quot;imap&quot; prefork=0
  #  imaps                cmd=&quot;imapd -s&quot; listen=&quot;imaps&quot; prefork=0
  pop3          cmd=&quot;pop3d&quot; listen=&quot;pop3&quot; prefork=0
  #  pop3s                cmd=&quot;pop3d -s&quot; listen=&quot;pop3s&quot; prefork=0
  sieve         cmd=&quot;timsieved&quot; listen=&quot;sieve&quot; prefork=2
  # entry must be the same as in th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:33 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>commserv</title>
            <link>https://www.hackerbruecke.net/linux/commserv?rev=1493132445&amp;do=diff</link>
            <description>This documentation is work in progress, no liability for correctness can be given!  




Communications-Server

Motivation

Because I had to look for a log time around the Internet, asking a lot of questions on mailing-lists, reading books and talking to friends for configuring my commserv, thus having quite a bit of hassle getting things working, I&#039;d like give my experiences back to the comunity.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:45 +0000</pubDate>
        </item>
        <item>
            <title>desktop</title>
            <link>https://www.hackerbruecke.net/linux/debian/desktop?rev=1493131583&amp;do=diff</link>
            <description>2013-12-27




fuer Desktops zusaetzlich:



kde-full
lightdm-kde-greeter
alsamixergui
amarok
audacity
audacity-data
bc
chromium-browser / chromium
chromium-browser-l10n / chromium-l10n
chromium-codecs-ffmpeg-extra 
cifs-utils
clusterssh
cryptsetup
cryptsetup-bin
cups
cups-browsed
cups-bsd
cups-client
cups-common
cups-daemon
cups-filters
cups-ppdc
dnsmasq
duplicity
ethtool
fuse
gnupg
gnupg-agent
gnupg2
gpgsm
gpgv
hplip
hplip-data
hplip-gui
htop
ifupdown / ifupdown-scripts-zg2
keepassx
kgpg
libre…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:23 +0000</pubDate>
        </item>
        <item>
            <title>slapd_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/slapd_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/slapd.conf

&lt;http://www.stanford.edu/services/directory/openldap/configuration/bdb-config.html&gt;




# The database configuration parameters must appear *after* the &quot;database&quot;
# directive, as DB_CONFIG files are &#039;per backend&#039;.
dbconfig set_cachesize  4 0 1
dbconfig set_lg_regionmax 262144
dbconfig set_lg_bsize 2097152
dbconfig set_lg_dir /var/log
# Automatically remove log files that are no longer needed.
dbconfig set_flags DB_LOG_AUTOREMOVE
# 
# Setting set_tas_spins reduces resour…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>pear_makerpm</title>
            <link>https://www.hackerbruecke.net/linux/commserv/other/pear_makerpm?rev=1293466841&amp;do=diff</link>
            <description>PEAR and PECL

What is PECL?


PECL is a repository for PHP Extensions, providing a directory of all known extensions and hosting facilities for downloading and development of PHP extensions.



The packaging and distribution system used by PECL is shared with its sister, PEAR.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/php/config?rev=1293466843&amp;do=diff</link>
            <description>PHP5 configuration for GOsa and eGroupWare

eGroupWare

When I added about 250 users to a group in GOsa or in eGroupWare, I encountered the following problem with (open)SUSE 10.2, which I did not encounter with SUSE 10.0: 

station7: suhosin[373]: ALERT - configured request variable limit exceeded - dropped variable \
&#039;account_user[]&#039; (attacker &#039;172.16.130.9&#039;, file &#039;/srv/www/htdocs/egroupware/index.php&#039;)</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>sarg</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/sarg?rev=1408135580&amp;do=diff</link>
            <description>SARG

/etc/crontab:
### SQUID-Monitoring via Sarg:
00 06-19/1 * * *        root    /usr/local/chhaas-skripts/sarg-reports.sh today &gt; /dev/nul
00 00 * * *     root    /usr/local/chhaas-skripts/sarg-reports.sh daily &gt; /dev/nul
00 01 * * 1     root    /usr/local/chhaas-skripts/sarg-reports.sh weekly &gt; /dev/nul
30 02 1 * *     root    /usr/local/chhaas-skripts/sarg-reports.sh monthly &gt; /dev/nul</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:46:20 +0000</pubDate>
        </item>
        <item>
            <title>basis</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware/basis?rev=1493131661&amp;do=diff</link>
            <description>2014-04-11



Debian OS-Basis-Installation auf Blech



1. bei Partitionierung:
 &lt;Go back&gt;
2. dann muss die
 &quot;debconf priority&quot; auf &quot;low&quot;
 gesetzt werden!!!
3. Partitionierung:
 auf _jeder_ HDD eine leere Partition anlegen
 Typ: &quot;gpt&quot;
4. zusaetzlich auf jeder HDD eine</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:47:41 +0000</pubDate>
        </item>
        <item>
            <title>postgrey</title>
            <link>https://www.hackerbruecke.net/linux/email/greylisting/postgrey?rev=1493136147&amp;do=diff</link>
            <description>Greylisting

For a overview what greylisting does, have a look at www.greylisting.org/ 



There are several greylisting daemons for Postfix available. I stick to David Schweikert&#039;s Postgrey or to Lionel Bouton&#039;s SQLgrey in combination with it&#039;s web-interface http://www.vanheusden.com/sgwi/



Postgrey

Postgrey greylisting daemon</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:02:27 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>linux</title>
            <link>https://www.hackerbruecke.net/linux/linux?rev=1715428233&amp;do=diff</link>
            <description>Debian-Installation

	*  Installation von GNU/Debian auf Hardware oder virtueller Instanz
	*  zweite Netzwerkkarte mit wechselnder Konfiguration






securing DNS and Mail

	*  Domain Name System Security Extensions (DNSSEC) mit Bind9
	*  DNS-based Authentication of Named Entities (DANE) und TLS Authentication record (TLSA)
	*  Sender Policy Framework (SPF)
	*  DomainKeys Identified Mail (DKIM)
	*  Domain-based Message Authentication, Reporting and Conformance (DMARC)
	*  Authenticated Received…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 11 May 2024 11:50:33 +0000</pubDate>
        </item>
        <item>
            <title>pam</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/pam?rev=1293466843&amp;do=diff</link>
            <description>/etc/ldap.conf (for PAM)
#
# This is the configuration file for the LDAP nameservice
# switch library, the LDAP PAM module and the shadow package.
#

# Your LDAP server. Must be resolvable without using LDAP.
host	127.0.0.1

# The distinguished name of the search base.
base	dc=example,dc=com

# The LDAP version to use (defaults to 3
# if supported by client library)
ldap_version	3

# Hash password locally; required for University of
# Michigan LDAP server, and works with Netscape
# Directory Ser…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>lightsquid</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/lightsquid?rev=1408135540&amp;do=diff</link>
            <description>Lightsquid-Tool

your access.log look slightly different from standart. may be you use CUSTOM log record. at and of standart record in you log you has addition field  look like:

[User-Agent: TMhtload/1.32.00.1008\r\nAccept: */*\r\nHost: cm-t.activeupdate.trendmi</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:45:40 +0000</pubDate>
        </item>
        <item>
            <title>temper1</title>
            <link>https://www.hackerbruecke.net/linux/monitoring/icinga/hardware/temper1?rev=1493132385&amp;do=diff</link>
            <description>Temperaturmessungen mit dem TEMPer1 USB sensor

Vor einiger Zeit begann ich zuhause mir einen kleinen Serverraum einzurichten - mein Datenklo ;-).

In diesem Serverraum sollte natürlich auch die Raumtemperatur mit Icinga oder Nagios überwacht werden. - Natürlich gibt es verschiedene quasi out-of-the-box Lösungen, wie z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:59:45 +0000</pubDate>
        </item>
        <item>
            <title>datenschutzerklaerung</title>
            <link>https://www.hackerbruecke.net/datenschutzerklaerung?rev=1577911335&amp;do=diff</link>
            <description>Datenschutzerklärung

1. Einleitung

Vielen Dank für den Besuch auf unseren Internetseiten.

Diese Datenschutzerklärung informiert Sie über den Schutz Ihrer personenbezogenen Daten. Wir nehmen den Schutz Ihrer Daten ernst und möchten, dass Sie sich beim Besuch unserer Internetseiten sicher fühlen. Grundsätzlich gilt, dass alle von uns erhobenen personenbezogenen Daten den Bestimmungen der Europäischen Datenschutzgrundverordnung (DSGVO) unterliegen.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 01 Jan 2020 20:42:15 +0000</pubDate>
        </item>
        <item>
            <title>start</title>
            <link>https://www.hackerbruecke.net/start?rev=1712424404&amp;do=diff</link>
            <description>hackerbruecke.net

[Hackerbrücke mit Christoph]

Warum Hackerbücke?

Die Hackerbrücke ist für mich Symbol und Inbegriff meines Einstiegs in die Computerwelt. Schon 1984 faszinierten mich Erhard Thomas&#039; (a.k.a. n0by) Glossen „Die Hackerbrücke“ in der Zeitschrift „DOS International</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 17:26:44 +0000</pubDate>
        </item>
        <item>
            <title>cookie-banner</title>
            <link>https://www.hackerbruecke.net/datenschutz/cookie-banner?rev=1578085923&amp;do=diff</link>
            <description>Rechtskonforme Cookie-Banner zu implementieren ist nicht einfach. Denn nach Ansicht des LfDI-BW benötigen Cookies, die ein Nutzertracking über Seiten- und Gerätegrenzen hinweg ermöglichen die:

	*  aktive,
	*  ausdrückliche,
	*  informierte,
	*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 03 Jan 2020 21:12:03 +0000</pubDate>
        </item>
        <item>
            <title>brandmelder</title>
            <link>https://www.hackerbruecke.net/homeautomation/brandmelder?rev=1420307195&amp;do=diff</link>
            <description>Brandmelder pimpen

	*  &lt;http://ccblog.de/tag/cs2105go-m12/&gt;
	*  &lt;http://www.wikidorf.de/reintechnisch/Inhalt/RauchmelderExperimente&gt;
	*  &lt;http://www.instructables.com/id/Modify-a-6-EUR-smoke-detector-for-use-with-microco/all/?lang=de&gt;
	*  &lt;http://complexit.se/publications/Network.based.smoke.alarm-using.Arduino.and.iPhone.pdf&gt;





&lt;- zurück</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 03 Jan 2015 17:46:35 +0000</pubDate>
        </item>
        <item>
            <title>index</title>
            <link>https://www.hackerbruecke.net/uvnc/index?rev=1293466840&amp;do=diff</link>
            <description>UltraVNC




&lt;ALT&gt;+&lt;TAB&gt; on remote machine

one thing that annoyed me quite often, when usin uvnc was, that I could not make use of &lt;ALT&gt;+&lt;TAB&gt; for cycling through the open windows on the remote machine.



By searching in the unvc-forum, I found the solution:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:40 +0000</pubDate>
        </item>
        <item>
            <title>welcome</title>
            <link>https://www.hackerbruecke.net/wiki/welcome?rev=1684170792&amp;do=diff</link>
            <description>Welcome to your new DokuWiki

Congratulations, your wiki is now up and running. Here are a few more tips to get you started.

Enjoy your work with DokuWiki,

-- the developers

Create your first pages

Your wiki needs to have a start page. As long as it doesn&#039;t exist, this link will be red:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>todo</title>
            <link>https://www.hackerbruecke.net/linux/commserv/todo?rev=1293466842&amp;do=diff</link>
            <description>ToDo

Things, that have to be documented:

	*  generating the decrypted SSL-key with OpenSSL-CA
	*  use of TinyCA and phpki-CA
	*  Postfix: main.cf and master.cf
	*  implement &lt;http://www.contentschmiede.de/archiv/2005/08/26/postfix_fuer_typo3_und_gmx_fit_machen/&gt; in email -&gt; Postfix -&gt; SMTPd- / SMTP-Authentication</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:42 +0000</pubDate>
        </item>
        <item>
            <title>email</title>
            <link>https://www.hackerbruecke.net/linux/email/email?rev=1493137617&amp;do=diff</link>
            <description>email

Mailserver, Mailgateway, Anti-Spam [AMaVISd-new, SpamAssassin, dSpam, rspamd], SPF, DKIM, PFS etc.
\\}}


Postfix smtpd

Postfix ist ein sehr mächtiger Mail Transport Agent, entwickelt von Wietse Venema.


	*  Postfix Konfiguration für einen Mailserver
	*  use of LDAP lookup maps
	*  Postfix&#039; Postscreen Modul anstatt policyd-weight oder postfwd
	*  Postfix Anti-SPAM/UCE settings
	*  Postfix SASL Konfiguraton
	*  SMTP-authentication
	*  TLS and SSL configuration (smtps)
	*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:26:57 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/apache2/config?rev=1293466841&amp;do=diff</link>
            <description>Apache

SSL (https)

A special thing for getting Apache2 starting withaut user-interaction is also to store a decrypted key, since without Apache will ask at every start for the password...

mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem
openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apache2/private/station7_decrypted-key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>gosa_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/gosa_secure?rev=1293466843&amp;do=diff</link>
            <description>force GOsa using ldaps

Change the server-configuration in the „location“-section of /etc/gosa.conf from:
server=&quot;ldap://localhost:389&quot;
to:
server=&quot;ldaps://localhost:636&quot;
tls=&quot;true&quot;
&lt;referral url=&quot;ldaps://localhost:636/dc=example,dc=com&quot;
 admin=&quot;cn=ldapadmin,dc=example,dc=com&quot;
 password=&quot;verysecretpassword&quot;
/&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>ldap_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_secure?rev=1293466843&amp;do=diff</link>
            <description>TLS and LDAP over SSL (ldaps)

Modifying /etc/openldap/ldap.conf

Modify / append the TLS-settings:
#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /etc/ssl/private/station7_key.pem
TLS_REQCERT demand</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>cpan2rpm</title>
            <link>https://www.hackerbruecke.net/linux/commserv/other/cpan2rpm?rev=1293466841&amp;do=diff</link>
            <description>cpan2rpm

At &lt;http://sourceforge.net/project/showfiles.php?group_id=74018&gt; you can download a RPM-builder for CPAN-Perl-modules.


The man-page stats: 

cpan2rpm [options] &lt;distribution&gt;

The syntax for cpan2rpm requires a single distribution name, which can take one of four different forms:

	*  a CPAN module name (e.g. XML::Simple) - When a module name is passed, the script will ``walk&#039;&#039; search.cpan.org to     determine the latest distribution. If an exact match is not found, the CPAN module i…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
    </channel>
</rss>
