Sistema De Correo Con Postfix, Openldap, Courier

Total Page:16

File Type:pdf, Size:1020Kb

Sistema De Correo Con Postfix, Openldap, Courier Sistema de correo con Postfix, OpenLDAP, Courier ((POP3&&IMAP) + SSL), SASL, Spamassassin, Amavis-new y SquirrelMail Sergio González González Instituto Politécnico de Bragrança (http://www.ipb.pt/), Portugal [email protected] Sistema de correo con Postfix, OpenLDAP, Courier ((POP3&&IMAP) + SSL), SASL, Spamassassin, Amavis-new y SquirrelMail por Sergio González González Copyright © 2004 Sergio González González Trabajo realizado para la asignatura Comunicações por Computador 2 perteneciente a la carrera Ingeniería Informática impartida en la Escola Superior de Tecnologia e de Gestão de Bragança (http://www.estig.ipb.pt/) del Instituto Politécnico de Bragrança (http://www.ipb.pt/), Portugal. Esta documentación muestra la forma de montar un sistema de correo con las siguientes características: servidor SMTP con autentificación para el envío de correos; servidor POP3 e IMAP para la recepción de correos; así como servicio de webmail, antivirus y control de SPAM. Este conjunto de herramientas ha de funcionar sobre LDAP. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled Apéndice J. Historial de revisiones Revisión 0.1 3-06-2004 Revisado por: sgg Tabla de contenidos I. Introducción.....................................................................................................................................................viii Introducción ..................................................................................................................................................ix II. Postfix.................................................................................................................................................................x 1. Instalación ..................................................................................................................................................1 Introducción.......................................................................................................................................... 1 Selección e instalación de paquetes...................................................................................................... 1 Forzando la configuración preliminar de Postfix ........................................................................3 2. Configuración del soporte LDAP en Postfix............................................................................................11 Introducción........................................................................................................................................11 Esquema para el directorio LDAP......................................................................................................11 Añadiendo las ramas “postfix” y “alias”...................................................................................11 Plantilla LDIF para las unidades organizacionales...................................................................21 Directorio para el almacén de correos................................................................................................22 Preparando OpenLDAP para el soporte de correo..............................................................................23 Adición de un usuario de correo.........................................................................................................26 Creación del directorio HOME para los nuevos usuarios...................................................................29 Creación de un alias de correo............................................................................................................31 Modificación de la configuración de Postfix ......................................................................................32 Introducción ..............................................................................................................................33 Configuración de los alias de correo.........................................................................................33 Configuración de Postfix para la entrega local..........................................................................34 Configuración preliminar para Postfix................................................................................................34 III. Courier ...........................................................................................................................................................36 3. Instalación y configuración de Courier ....................................................................................................37 Introducción........................................................................................................................................37 Configuración del servicio de autentificación.....................................................................................37 Configuración de la autentificación por LDAP.........................................................................37 Instalación del servicio POP3.............................................................................................................38 Instalación del servicio IMAP ............................................................................................................39 Uso del frontend webadmin de Courier..............................................................................................40 Instalación del paquete courier-webadmin ...............................................................................40 Uso del frontend........................................................................................................................42 Módulos de autentificación..............................................................................................42 Configuración del soporte de LDAP ...............................................................................46 Opciones POP3................................................................................................................49 Opciones IMAP...............................................................................................................50 4. Pruebas de funcionamiento ......................................................................................................................53 Servidor POP3 ....................................................................................................................................53 Servidor IMAP....................................................................................................................................54 IV. Squirrelmail ...................................................................................................................................................58 5. Instalación y configuración de squirrelmail.............................................................................................59 Instalación...........................................................................................................................................59 Acceso a la herramienta......................................................................................................................59 Lectura y envío de correos........................................................................................................60 Características de Squirrelmail .................................................................................................63 Saliendo de la aplicación...........................................................................................................67 iii V. Filtrado de mensajes con Clamav y Spamassassin ......................................................................................68 6. Instalación ................................................................................................................................................69 Introducción........................................................................................................................................69 Instalación del software necesario......................................................................................................69 Instalación del paquete amavisd-new........................................................................................69 Instalación del paquete spamassassin.......................................................................................70 Instalación de Clamav...............................................................................................................71 Instalación de paquetes sugeridos y recomendados..................................................................75 7. Configuración...........................................................................................................................................76 Introducción........................................................................................................................................76 Configuración de amavis-new.............................................................................................................76 Configuración de Postfix .....................................................................................................................76 8. Pruebas de funcionamiento ......................................................................................................................78
Recommended publications
  • Estudio De Factibilidad Para La Creación De Una Empresa De Soluciones Tecnológicas Desarrolladas Con Software Libre Cristina Balaguera
    Universidad de La Salle Ciencia Unisalle Especialización en Gerencia de Proyectos en Facultad de Ingeniería Ingeniería 1-1-2007 Estudio de factibilidad para la creación de una empresa de soluciones tecnológicas desarrolladas con software libre Cristina Balaguera Follow this and additional works at: https://ciencia.lasalle.edu.co/esp_gerencia_proyectos Citación recomendada Balaguera, C. (2007). Estudio de factibilidad para la creación de una empresa de soluciones tecnológicas desarrolladas con software libre. Retrieved from https://ciencia.lasalle.edu.co/esp_gerencia_proyectos/44 This Trabajo de grado - Pregrado is brought to you for free and open access by the Facultad de Ingeniería at Ciencia Unisalle. It has been accepted for inclusion in Especialización en Gerencia de Proyectos en Ingeniería by an authorized administrator of Ciencia Unisalle. For more information, please contact [email protected]. UNIVERSIDAD DE LA SALLE DIVISION DE FORMACION AVANZADA ESPECIALIZACION EN GERENCIA DE PROYECTOS DE INGENIERIA. Cristina Balaguera JUNIO 2007 PROYECTO LINEA DE INVESTIGACION: Innovación tecnológica. 1.TITULO: Estudio de factibilidad para la creación de una empresa de soluciones tecnológicas desarrolladas con software libre. INDICE 1. NECESIDAD GENERAL 1.1. MARCO CONCEPTUAL 1.2. MARCO TEORICO 1.3. JUSTIFICACIÓN 1.4. ANTECEDENTES 1.5. OBJETIVO GENERAL 2.IDENTIFICACION DE LA PROPUESTA 2.1 INTRODUCCION 2.1.1. Como surge la idea 2.1.2. Elección del producto o servicio 2.1.3. Definición del proyecto 2.2. ESTUDIO SOCIAL 2.3. ESTUDIOAMBIENTAL 2.4.ESTUDIO LEGAL 2.5. EL ESTUDIO DE MERCADO 2.5.1. Producto o servicio 2.5.2. Mercado 2.5.2.1 Demanda 2.5.3.
    [Show full text]
  • CYRUS: BUILD YOUR TUTORIAL OWN EMAIL SERVER Don’T Trust Google? We’Ll Help You Navigate the Sea of JOHN LANE Acronyms to Build Your Own Mailserver
    TUTORIAL MAILSERVER CYRUS: BUILD YOUR TUTORIAL OWN EMAIL SERVER Don’t trust Google? We’ll help you navigate the sea of JOHN LANE acronyms to build your own mailserver. ou can’t beat the convenience and ease of use access their mail by connecting to the server using WHY DO THIS? offered by Gmail. But unfortunately, all that any IMAP-capable email client application. • Take control of your Yfree storage comes at a price: your privacy. You will need a, preferably new, server for this email provision. Spam, intrusive adverts and snooping from unnamed project and you’ll need root access to it. Our examples • Stop outside agencies government agencies are the inevitable downside of use Arch Linux, and we created a new virtual server. from scanning the using someone else’s service for free. So why not Begin by installing Cyrus (build the Arch User content of your emails. build your own email server including anti-spam, Repository package first – see the boxout below-right): • Get webmail without advertising. anti-virus and webmail? $ pacman -U ~build/cyrus-imapd/cyrus-imapd-2.4.17-5-x86_64. You can use your own server to retrieve messages pkg.tar.xz from other mailservers, such as those provided by The default configuration writes data to /var/imap internet service providers, or other services like those and user mailboxes to /var/spool/imap. You can from Google and Yahoo. But you don’t need to rely on change this if you prefer another location; we’ll others if you have your own server. If you have a configure our server to use /srv/mail/cyrus to domain name that you control, and if you can give your illustrate this.
    [Show full text]
  • Email Issues
    EMAIL ISSUES - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - TABLE OF CONTENTS NEW POLICY WITH RESPECT TO EMAIL ADDRESSES A NECESSARY EMAIL SETTING WHY OUR EMAILS POSSIBLY ARRIVED LATE OR NOT AT ALL STOP USING YAHOO, NETZERO, AND JUNO EMAIL PROVIDERS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - NEW POLICY WITH RESPECT TO EMAIL ADDRESSES: There are two important issues here. FIRST, members must not supply CFIC with their company email addresses. That is, companies that they work for. (If you own the company, that's different.) All email on a company's server can be read by any supervisor. All it takes is one pro vaccine activist to get hold of our mobilization alerts to throw a monkey wrench in all of our efforts. Thus, do not supply me with a company email address. We can help you get an alternative to that if necesary. SECONDLY, CFIC needs members' email addresses to supply important information to mobilize parents to do things that advances our goal to enact our legislative reforms of the exemptions from vaccination. That has always been CFIC's sole agenda. CFIC has been able to keep the membership fee to zero because we don't communicate via snail mail. But people change their addresses frequently and forget to update CFIC. When this happens over the years, that member is essentually blind and deaf to us, and is no longer of any value to the coalition---your fellow parents. Therefore, it warrants me to require that members supply CFIC with their most permanent email account. That means the email address of the company in which you are paying a monthly fee for internet access, be it broadband or dialup service.
    [Show full text]
  • Cyrus Mail Server 2 Table of Contents
    Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction ........................................................................................................................ 4 2. Installation ......................................................................................................................... 5 3. Management of the mail server data ....................................................................................... 6 3.1. Management of mail domains ..................................................................................... 6 3.2. Assignment of e-mail addresses to users ........................................................................ 6 3.3. Management of mailing lists ....................................................................................... 7 3.4. Management of mail groups ........................................................................................ 7 3.5. Management of shared IMAP folders ........................................................................... 8 3.6. Mail quota ............................................................................................................... 9 4. Spam detection and filtering ................................................................................................ 10 5. Identification of viruses and malware .................................................................................... 11 6. Identification of Spam sources with DNS-based Blackhole Lists (DNSBL) ...................................
    [Show full text]
  • Migrationsleitfaden
    Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 – Juli 2003 Schriftenreihe der KBSt ISSN 0179-7263 Band 57 Juli 2003 Schriftenreihe der KBSt Band 57 ISSN 0179 - 7263 Nachdruck, auch auszugsweise, ist genehmigungspflichtig Dieser Band wurde erstellt von der KBSt im Bundesministeri- um des Innern in Zusammenarbeit mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI), dem Bundesver- waltungsamt (BVA) und der C_sar Consulting, solutions and results AG Redaktion: C_sar AG, Berlin Interessenten erhalten die derzeit lieferbaren Veröffentlichungen der KBSt und weiterführende Informationen zu den Dokumenten bei Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 Homepage der KBSt: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 Juli 2003 Herausgegeben vom Bundesministerium des Innern INHALTSVERZEICHNIS 1 Einleitung ........................................................................ 8 1.1 Über das Vorhaben 8 1.2 Über diesen Leitfaden 9 1.3 Hinweise zur Benutzung des Leitfadens 10 1.4 Hinweise an die Entscheider 12 1.4.1 Grundsätzliche Empfehlungen 12 1.4.2 Fortführende und ablösende Migration 13 1.4.3 Migrationswege 14 1.4.4 Vergleichbarkeit von Alternativen 14 1.4.5 Künftige Schwerpunte 15 1.4.6 Wirtschaftlichkeit 16
    [Show full text]
  • Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University
    Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University ABSTRACT The attack surface concept provides a means of discussing the susceptibility of software to as-yet-unknown attacks. A system’s attack surface encompasses the methods the system makes available to an attacker, and the system resources which can be used to further an attack. A measurement of the size of the attack surface could be used to compare the security of multiple systems which perform the same function. The Internet Message Access Protocol (IMAP) has been in existence for over a decade. Relative to HTTP or SMTP, IMAP is a niche protocol, but IMAP servers are widely deployed nonetheless. There are three popular open source UNIX IMAP servers – UW-IMAP, Cyrus, and Courier-IMAP – and there has not been a formal security comparison between them. In this paper, I use attack surfaces to compare the relative security risks posed by these three products. I undertake this evaluation in service of two complementary goals: to provide an honest examination of the security postures and risks of the three servers, and to advance the study of attack surfaces by performing an automated attack surface measurement using a methodology based on counting entry and exit points in the code. Introduction Contributions and Roadmap System administrators frequently confront the The paper makes two major contributions. First, problem of selecting a software package to perform a I undertake an in-depth discussion of the relative secu- desired function. Many considerations affect this deci- rity postures of the three major open source IMAP sion, including functionality, ease of installation, soft- servers in use today.
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Securedrop Documentation Release 0.9.0
    SecureDrop Documentation Release 0.9.0 SecureDrop Team and Contributors Sep 05, 2018 User Guides 1 Source Guide 3 1.1 Choosing the Right Location.......................................3 1.2 Get the Tor Browser...........................................3 1.3 Choose Who to Submit To........................................4 1.4 Making Your First Submission......................................4 1.5 Continuing the Conversation....................................... 10 2 Journalist Guide 15 2.1 Updating Your Workstation....................................... 15 2.2 Creating a GPG Key........................................... 16 2.3 Connecting to the Journalist Interface .................................. 16 2.4 Daily Journalist Alerts About Submissions............................... 17 2.5 Interacting With Sources......................................... 18 2.6 Moving Documents to the Secure Viewing Station ........................... 21 2.7 Decrypting on the Secure Viewing Station ................................ 26 2.8 Working with Documents........................................ 28 2.9 Encrypting and Moving Documents to the Journalist Workstation ................... 29 2.10 Decrypting and Preparing to Publish................................... 31 3 Admin Guide 33 3.1 Responsibilities.............................................. 33 3.2 Common Tasks.............................................. 35 3.3 Frequently Asked Questions....................................... 44 4 Passphrase Best Practices 47 4.1 General Best Practices.........................................
    [Show full text]
  • Persistent E-Mail Identification Is Viable!
    Proceedings of the 4th International Workshop on Semantic Digital Archives (SDA 2014) Persistent e-mail identification is viable! Stefan Haun and Andreas N¨urnberger Data and Knowledge Engineering Group, Faculty of Computer Science, Otto-von-Guericke-University Magdeburg, Germany http://www.dke.ovgu.de Abstract. Persistent identification of entities in Personal Information Management (PIM) is necessary to enable stable, long-term references in archives and semantic applications. In the case of e-mails, the standard offers Message-IDs (MID), which are widely deployed. However, stores do not use the MID but rather rely on a path, which is likely to change, to refer to e-mails and thus do not offer a stable identification. We show that MIDs are viable to identify and retrieve e-mails from an IMAP store in real-world scenarios. The presented concept can be integrated into any store, but we also offer a software solution that serves as an additional layer above the store and allows real-time access over MID. We propose a validation method to prove that the concept is working and some applications that are enabled by e-mail identification are sketched. 1 Introduction Sending e-mails has long replaced traditional letters, especially in the business and research context. Being digital, e-mails can be easily stored and accessed from different locations, building up large archives as part of the personal infor- mation managed by each user. Although a central element of communication, e-mails are still tied to special software, the Mail User Agent, instead of being integrated into the overall workflow.
    [Show full text]
  • Understanding Email Sending in Nagios XI
    The Industry Standard In Infrastructure Monitoring Nagios XI Understanding Email Sending Purpose This document describes how Nagios XI sends emails and explains how to configure your email settings. Nagios XI uses email to send notifications as well as for sending reports. Target Audience This document is intended for use by Nagios Administrators who want to understand in detail how emails are sent by Nagios XI. Navigation Email settings in Nagios XI are located in Admin > System Config > Manage Email Settings. 1295 Bandana Blvd N, St. Paul, MN 55108 [email protected] US: 1-888-624-4671 INTL: 1-651-204-9102 www.nagios.com © 2017 Nagios Enterprises, LLC. All rights reserved. Nagios, the Nagios logo, and Nagios graphics are the servicemarks, trademarks, or registered trademarks owned by Nagios Enterprises. All other servicemarks and trademarks are the property of their respective owner. Page 1 / 7 Updated – September, 2018 The Industry Standard In Infrastructure Monitoring Nagios XI Understanding Email Sending Web Browser Behavior There are some behaviors of your web browser which you need to be aware of. A lot of different web browsers will auto-complete / auto-populate fields on a web page when it loads. This usually only occurs when it sees a common field that does not have a value, it may have a saved value for that "named field" and hence it will populate that field with that saved value. If you open the Manage Email Settings page in Nagios XI you might notice that the username and password fields are already populated. You know that you didn't put a value in here, especially when this is the first time you've visited this page on a fresh install of Nagios XI.
    [Show full text]
  • Los Líderes Del Software Libre Permanecen Unidos
    Los líderes del Software Libre permanecen unidos La conferencia de Craig Mundie ya no es noticia, con suerte estas son las últimas palabras. Un número de evangelistas del software libre, en discusiones informales, sentimos que la respuesta apropiada a Microsoft es la de permanecer unidos. La conferencia de Mundie revela que la estrategia de Microsoft es mantenernos divididos y atacarnos de a uno, hasta que hayamos desaparecido. Ahora se ensañan con la licencia GPL. Aunque no intentamos representar a todos y cada uno de los grupos y proyectos, las voces más importantes del "Open Source" y "Free Software" (Software Libre) han firmado este mensaje. Nos tomó tiempo porque no estamos acostumbrados, pero lo haremos mejor la próxima vez. Fíjese en las firmas al final de este mensaje - estaremos juntos, y defenderemos a los nuestros. Bruce Perens Percibimos un nuevo triunfo para el Open Source y Software Libre: nos hemos convertido en un competidor tan serio a Microsoft que hasta sus ejecutivos divulgan públicamente sus miedos. Sin embargo, la única amenaza que representamos a Microsoft es el final de sus prácticas monopolísticas. Microsoft es bienvenido a participar como un socio igualitario, un papel que ya lo han asumido desde individuos a corporaciones transnacionales como IBM y HP. Sin embargo Microsoft no busca Igualdad, ya han anunciado Shared Source (Código Compartido), un sistema que puede ser resumido como Mira pero no toques, y nosotros controlamos todo. Microsoft compara engañosamente el modelo Open Source con el modelo de negocio de las empresas punto-com. Tal vez ellos malinterpretaron el término Software Libre. Recuerde que el término Free (NT: como en el original, en inglés no hay diferencia entre libre y gratuito, ambos se denominan free) se refiere a libertad, no a precio.
    [Show full text]
  • Mozilla: a Users Guide
    Mozilla: A Users Guide. or Using the Mozilla Application Suite Kevin T. Neely October 17, 2003 Contents 1 Installation 15 1.1 Deciding which Mozilla to Run ........................ 15 1.1.1 Platform ................................. 15 1.1.2 Version .................................. 15 1.2 Installing Mozilla ................................ 16 1.2.1 Using an Installer Package ....................... 16 1.2.2 Manual Installation ........................... 17 1.3 Upgrading .................................... 19 1.3.1 Make a Backup ............................. 19 1.3.2 Uninstall ................................. 19 1.3.3 Install Mozilla .............................. 20 1.3.4 Retrieve Missing Files ......................... 20 1.4 Running Multiple versions of Mozilla ..................... 21 2 Getting Started and Mozilla Basics 23 2.1 Starting Mozilla ................................. 23 2.2 Exiting Mozilla ................................. 23 2.2.1 QuickLaunch .............................. 23 3 CONTENTS CONTENTS 2.3 Preferences ................................... 24 2.4 Advanced Settings ............................... 24 2.4.1 prefs.js .................................. 25 2.4.2 user.js .................................. 25 2.4.3 userContent.css ............................. 26 2.5 Profiles ...................................... 27 2.6 Themes ..................................... 27 2.7 Security ..................................... 27 2.7.1 Passwords ................................ 27 2.8 Cookies ....................................
    [Show full text]