<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 14:02:44 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>all</title>
            <link>https://www.hackerbruecke.net/linux/debian/all?rev=1493131598&amp;do=diff</link>
            <description>2014-08-08



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

auf allen Server-Instanzen („Blech“, Linux VServer, LXC):



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=„&lt;http://proxy01.ukbw.de:3128/&gt;“

### LiHAS GPG-Key importieren:
wget -O -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:38 +0000</pubDate>
        </item>
        <item>
            <title>hardware</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/config?rev=1293466843&amp;do=diff</link>
            <description>GOsa

GOsa is a GPL&#039;ed PHP based administration tool for managing accounts and systems in LDAP databases. It administers users and groups, mail distribution lists, thin clients, applications, phones and faxes. 

Get GOsa from: &lt;http://oss.gonicus.de/pub/gosa/&gt; 

Project homepage: &lt;http://www.gosa-project.org/&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>spamreport</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamreport?rev=1493132098&amp;do=diff</link>
            <description>Spamreport




spamcheck.sh


#!/bin/bash

#########################################################
# UKBW-Spam-Report, 2007-05-01, chhaas, IuK / Netzwerke #
#########################################################

#set -o verbose

########
# ToDo #
########
# - printvariablen bei &quot;grep X-Spam-Status:&quot; korrigieren
# - Mail an antispam@uk-bw.de zusammenfassen: 1 Mail die alle Spammails inkl. Empfaenger beinhaltet
# - Variablen fuer FROM: und RETURN-PATH einrichten
# - evtl. SpamAssassin Spam-T…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:54:58 +0000</pubDate>
        </item>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://www.hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>sieve</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/sieve?rev=1493131976&amp;do=diff</link>
            <description>Sieve

	*  &lt;http://sieve.info/&gt;
	*  &lt;http://en.wikipedia.org/wiki/Sieve_%28mail_filtering_language%29&gt;
	*  &lt;http://de.wikipedia.org/wiki/Sieve&gt;
	*  &lt;http://www.uni-koeln.de/rrzk/mail/software/sieve/sieve.html&gt;

Sieve and SSL / TLS

timsieved allows for SSL on connect (like https, imaps, or pop3s), only STARTTLS.

So you have to wrap it in an stunnel (www.stunnel.org), which is a another story ...

Have a look at this: &lt;http://lists.horde.org/archives/ingo/Week-of-Mon-20050704/000872.html&gt;

Testi…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:56 +0000</pubDate>
        </item>
        <item>
            <title>openssl_ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/openssl_ca?rev=1293466844&amp;do=diff</link>
            <description>simple OpenSSL Certficate Authority

Create Certificate Authority
station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca
CA certificate filename (or enter to create)

Making CA certificate ...
Generating a 1024 bit RSA private key
.....++++++
.....................................++++++
writing new private key to &#039;./demoCA/private/./cakey.pem&#039;
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
You are about to be asked to enter information that will be incorporated
into your c…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>tipps</title>
            <link>https://www.hackerbruecke.net/linux/sed/tipps?rev=1493132406&amp;do=diff</link>
            <description>SED-Tipps

Kommentare mit # und Leerzeilen herausfiltern:

sed -e &#039;/^#/d&#039; -e &#039;/^$/d&#039;



Kommentar entfernen, bei dem ausschliesslich Leerzeichen oder Tabulatoren vor der Raute stehen:

sed -e &#039;/^*#/d&#039; -e &#039;/^$/d&#039; Eingabe-Datei &gt; Ausgabedatei



Löschen aller Zeilen, die höchstens Leerzeichen beinhalten:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:06 +0000</pubDate>
        </item>
        <item>
            <title>relayhost</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/relayhost?rev=1493132193&amp;do=diff</link>
            <description>Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


 used Ports:
  10023/tcp: postgrey
10024/tcp: amavisd-new
10025/tcp: policyd-weight</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:33 +0000</pubDate>
        </item>
        <item>
            <title>paketverwaltung</title>
            <link>https://www.hackerbruecke.net/linux/debian/paketverwaltung?rev=1493131639&amp;do=diff</link>
            <description>Debian-Paketverwaltung:



Debian-Paket selbst bauen:

----------

&lt;http://www.martin-bock.de/pc/pc-0101.html&gt;

&lt;http://antbear.org/debpkg-intro.html&gt;

&lt;http://debiananwenderhandbuch.de/debianpaketeerstellen.html&gt;

&lt;http://www.linuxdelta.de/uploads/media/debian_workshop.pdf&gt;

&lt;https://www.luga.de/Angebote/Vortraege/DPKG/DPKG.pdf&gt;\ß
&lt;https://webseiten.hs-weingarten.de/winkelmh/zopecms/hrwcms/installation/debian-paket-manager&gt;


Anzeige aller installierten Pakete

----------

(&lt;http://wiki.debianf…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:47:19 +0000</pubDate>
        </item>
        <item>
            <title>ldap_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_secure?rev=1293466843&amp;do=diff</link>
            <description>TLS and LDAP over SSL (ldaps)

Modifying /etc/openldap/ldap.conf

Modify / append the TLS-settings:
#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /etc/ssl/private/station7_key.pem
TLS_REQCERT demand</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>gosa2egw</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/gosa2egw?rev=1293466843&amp;do=diff</link>
            <description>patching GOsa for seamless eGroupWare integration
&quot;-------- Original-Nachricht --------&quot;
Betreff: Re: [GOsa] gosa+samba3.schema conflicts with evolutionPerson.schema
Datum: Tue, 5 Jun 2007 15:23:31 +0200
Von: Cajus Pollmeier &lt;pollmeier@gonicus.de&gt;
An: GONICUS site administration project &lt;gosa@oss.gonicus.de&gt;

These are from two different RFCs, I guess. Bad luck. GOsa uses dateOfBirth 
internally. So, the simpliest way would be to remove the definition from the 
gosa+samba3.schema and add the ali…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>desktop</title>
            <link>https://www.hackerbruecke.net/linux/debian/desktop?rev=1493131583&amp;do=diff</link>
            <description>2013-12-27




fuer Desktops zusaetzlich:



kde-full
lightdm-kde-greeter
alsamixergui
amarok
audacity
audacity-data
bc
chromium-browser / chromium
chromium-browser-l10n / chromium-l10n
chromium-codecs-ffmpeg-extra 
cifs-utils
clusterssh
cryptsetup
cryptsetup-bin
cups
cups-browsed
cups-bsd
cups-client
cups-common
cups-daemon
cups-filters
cups-ppdc
dnsmasq
duplicity
ethtool
fuse
gnupg
gnupg-agent
gnupg2
gpgsm
gpgv
hplip
hplip-data
hplip-gui
htop
ifupdown / ifupdown-scripts-zg2
keepassx
kgpg
libre…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:23 +0000</pubDate>
        </item>
        <item>
            <title>pfs</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/pfs?rev=1493132175&amp;do=diff</link>
            <description>Postfix Perfect Forwarding Secrecy (PFS)


openssl gendh -out /etc/postfix/dh_512.pem -2 512
openssl gendh -out /etc/postfix/dh_1024.pem -2 1024

postconf -e &quot;smtpd_tls_dh1024_param_file = /etc/postfix/dh_1024.pem&quot;
postconf -e &quot;smtpd_tls_dh512_param_file = /etc/postfix/dh_512.pem&quot;
postconf -e &quot;smtpd_tls_eecdh_grade = strong&quot;
postconf -e &quot;tls_preempt_cipherlist = yes&quot;
postconf -e &quot;smtpd_tls_loglevel = 1&quot;
postconf -e &quot;smtp_tls_loglevel = 1&quot;

postfix reload</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:15 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>sign</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/sign?rev=1493132019&amp;do=diff</link>
            <description>Domain Key Identified Mail outbound - ORIGINATING - signieren

DKIM basiert auf asymetrischer Verschlüsselung mit public- und private-Key.

Das Key-Paar wird mit folgender Syntax erzeugt: 



amavisd genrsa &lt;Dateiname&gt; [Anzahl der Bits für den Schlüssel]</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:39 +0000</pubDate>
        </item>
        <item>
            <title>neues_certificate</title>
            <link>https://www.hackerbruecke.net/linux/ejabberd/neues_certificate?rev=1493131703&amp;do=diff</link>
            <description>Neues Zertifikat für ejabberd installieren

neues PEM-File erzeugen:


	*  in CA Certificate und private-Key erzeugen und nach /etc/ejabberd auf jabber-Server kopieren
	*  auf ejabberd-Server in 


cat jabber@ukbw.de-key.pem &gt; ejabberd.pem
cat jabber@ukbw.de-cert.pem &gt;&gt; ejabberd.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:48:23 +0000</pubDate>
        </item>
        <item>
            <title>sarg</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/sarg?rev=1408135580&amp;do=diff</link>
            <description>SARG

/etc/crontab:
### SQUID-Monitoring via Sarg:
00 06-19/1 * * *        root    /usr/local/chhaas-skripts/sarg-reports.sh today &gt; /dev/nul
00 00 * * *     root    /usr/local/chhaas-skripts/sarg-reports.sh daily &gt; /dev/nul
00 01 * * 1     root    /usr/local/chhaas-skripts/sarg-reports.sh weekly &gt; /dev/nul
30 02 1 * *     root    /usr/local/chhaas-skripts/sarg-reports.sh monthly &gt; /dev/nul</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:46:20 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>pflogsum</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/pflogsum?rev=1493132162&amp;do=diff</link>
            <description>Postfix-Reporting mit Pflogsum


apt-get install pflogsum


/usr/local/bin/postfix_report.sh


#!/bin/bash 

/usr/sbin/pflogsumm -d yesterday --problems_first /var/log/mail.log.1 &gt; /tmp/pflogsumm
/usr/bin/mailx -s &quot;Automatischer Postfix-Report von $(hostname)&quot; -r postfix-admin@station7.example.de postfix-admin@station7.example.de &lt; /tmp/pflogsumm</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:02 +0000</pubDate>
        </item>
        <item>
            <title>config_test</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config_test?rev=1493132127&amp;do=diff</link>
            <description>Postfix-Konfiguration testen

Die Postfix-Konfigurtation sollte auf alle fälle vor der Produktivnahme ausgiebig getestet und das Verhalten beobachtet werden!




Test von main.cf und master.cf

Test der Datei- und Verzeichnisrechte, sowie die Syntax von main.cf und master.cf von Postfix:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:55:27 +0000</pubDate>
        </item>
        <item>
            <title>temper1</title>
            <link>https://www.hackerbruecke.net/linux/monitoring/icinga/hardware/temper1?rev=1493132385&amp;do=diff</link>
            <description>Temperaturmessungen mit dem TEMPer1 USB sensor

Vor einiger Zeit begann ich zuhause mir einen kleinen Serverraum einzurichten - mein Datenklo ;-).

In diesem Serverraum sollte natürlich auch die Raumtemperatur mit Icinga oder Nagios überwacht werden. - Natürlich gibt es verschiedene quasi out-of-the-box Lösungen, wie z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:59:45 +0000</pubDate>
        </item>
        <item>
            <title>hotkeys</title>
            <link>https://www.hackerbruecke.net/linux/bash/hotkeys?rev=1409767966&amp;do=diff</link>
            <description>Liste der Tastenkürzel, die einem in der Bash zur Verfügung stehen:

Die folgende Auflistung fasst die wichtigsten in der Bash verfügbaren Tastenkombinationen zusammen.



- Curser oben und Cursor unten : Durch die zuletzt eingegebenen Kommandos scrollen</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 03 Sep 2014 18:12:46 +0000</pubDate>
        </item>
        <item>
            <title>todo</title>
            <link>https://www.hackerbruecke.net/linux/commserv/todo?rev=1293466842&amp;do=diff</link>
            <description>ToDo

Things, that have to be documented:

	*  generating the decrypted SSL-key with OpenSSL-CA
	*  use of TinyCA and phpki-CA
	*  Postfix: main.cf and master.cf
	*  implement &lt;http://www.contentschmiede.de/archiv/2005/08/26/postfix_fuer_typo3_und_gmx_fit_machen/&gt; in email -&gt; Postfix -&gt; SMTPd- / SMTP-Authentication</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:42 +0000</pubDate>
        </item>
        <item>
            <title>root-alarm</title>
            <link>https://www.hackerbruecke.net/linux/debian/root-alarm?rev=1493131648&amp;do=diff</link>
            <description>email-Alarm bei ROOT-Login:

# apt-get install mailx

# cat &lt;&lt; EOF &gt; /root/.bashrc

echo &#039;ALARM - Root-Login auf Maschine&#039; $(hostname) &#039;am:&#039; $(date) $(who) | mail -s „ALARM: Root-Login auf Maschine $(hostname) von $(who | grep root | cut -d&#039;(&#039; -f2 | cut -d&#039;)&#039; -f1)</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:47:28 +0000</pubDate>
        </item>
        <item>
            <title>operation</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/operation?rev=1493132007&amp;do=diff</link>
            <description>AmaViSd-new Operation

emails aus der Quarantäne releasen:

Wenn AMaViSd emails in die Quarantäne verschiebt, erhält man emails dieser Form:


Betreff: BANNED contents (text/x-msdos-batch,.asc,bacula_after_failure.cmd) in mail FROM LOCAL 

[...]

No viruses were found.

Banned name: text/x-msdos-batch,.asc,bacula_after_failure.cmd
Content type: Banned
Internal reference code for the message is 11606-02/IJvAMUUAzNma

[...]

The message has been quarantined as: I/banned-IJvAMUUAzNma

The message W…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:27 +0000</pubDate>
        </item>
        <item>
            <title>spf</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/spf?rev=1493132219&amp;do=diff</link>
            <description>Postfix und das Sender Policy Framework (SPF)

Das Sender Policy Framework - früher auch Sender Permitted From genannt -, soll das Fälschen des email-Absenders in einer E-Mail auf SMTP-Ebene erschweren.



Mithilfe eines SPF-Generators, z.B. &lt;http://spfwizard.com/&gt; oder</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:59 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
    </channel>
</rss>
