Suse Server. Hard to Figure out How to Make It Work
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Postfix Catch All and Mutt
Postfix Catch All and Mutt End goal: having postfix saving all of the emails for a domain to a single “mailbox” in maildir format, and being able to send email using mutt (or similar). Specifics to my setup I'm not going to open port 25 on my server, I'm going through Net7's spam filter, which will then forward to my server on port 8025. So I need to open port 8025. The rule was already there for port 25, I just need to edit the thing. Make Postfix listen to another port There is always the plan of using iptables to redirect the traffic. You can do it in Postfix as well. Open master.cf and find this line: smtp inet n - - - - smtpd The smtp word up front is actually a port. You can replace it with this line: 8025 inet n - - - - smtpd If you restart Postfix and check with netstat it should be listening to another port. Setting up Maildir delivery By default Postfix will output emails to a single file in /var/mail/. I'd rather have the Maildir format which separates emails into different files that I can individually move and/or delete. I'm going off the rails here trying out things. Looks like we're going to need these configuration options in main.cf: home_mailbox = Maildir/ mailbox_command = Make sure mailbox_command isn't set somewhere else in the file. Reload Postfix. We should be able to test that this is working using a known user on the system. You can telnet-test like so: EHLO test MAIL FROM:<[email protected]> RCPT TO:<william> DATA Test. -
Snuffleupagus Documentation
Snuffleupagus Documentation Release stable Sebastien Blot & Julien Voisin Aug 29, 2021 Contents 1 Documentation 3 1.1 Features..................................................3 1.2 Installation................................................ 11 1.3 Configuration............................................... 14 1.4 Download................................................. 22 1.5 Changelog................................................ 23 1.6 FAQ.................................................... 29 1.7 Propaganda................................................ 33 1.8 Cookies.................................................. 35 2 Greetings 39 i ii Snuffleupagus Documentation, Release stable Snuffleupagus is a PHP7+ and PHP8+ module designed to drastically raise the cost of attacks against websites. This is achieved by killing entire bug classes and providing a powerful virtual-patching system, allowing the administrator to fix specific vulnerabilities without having to touch the PHP code. Contents 1 Snuffleupagus Documentation, Release stable 2 Contents CHAPTER 1 Documentation 1.1 Features Snuffleupagus has a lot of features that can be divided in two main categories: bug-classes killers and virtual-patching. The first category provides primitives to kill various bug families (like arbitrary code execution via unserialize for example) or raise the cost of exploitation. The second category is a highly configurable system to patch functions in php itself. 1.1.1 Bug classes killed or mitigated system injections The system function executes an external -
Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian -
Lonetree Convicted Cargo Given 30 Year Imprisonment
Vol. 16. No. 35 Serving MCAS Kaneohe Bay.. 1st NIAB C um) II. NI Smith 11;1 Marine liarrin II:mail August 27, 19147 Doi) Lonetree convicted cargo Given 30 year imprisonment. `hostage' Sergeant. Clayton Lonetree becanni the $5,000, reduced to private and rind did first Marine ever convicted of espionage dishonorable discharge The conviction Washington, - The as a result of his Aug. 24 general court - carried a possible life sentence. Military Sea lift Command martial at (r)uantico, VA. MSC) is will-king with the A jury of eight Marine officers delibel n of Justice to According to a M(II)EC, Qua nticii ated for nearly three hours before set-den' on nla am a court order requiring spokesman, Lonetree was convicted I3 ing Lonetree. ' S lines to release DoD specifications of espionage and conspir- argo destined for Hawaii acy h. commit espionage. These allega- Lieutenant General Frank Petersen Jr., and Guam. Both agencies tions -rimmed from his involvement with commanding general, Mt '11E1' Quantico, have been in negotiation foreign nationals in Moscow. Va., is currently reviewing the case. Alter with U.S. Lines bankruptcy IA( len Peterson eon deervuse attorneys for release of the A termer Marine security guard at the his review but he cannot carlja. dale. these negoti S holuissy in Moscow, Lonetree was the sentence if he elviose,, idioms have not been success- sem (-need to 30 years in prison, fined increase it. ful for this cargo, some of which is already in the ports of Honolulu, Guam and on the U.S. -
Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae -
New CS Email Server and Clients Tutorials
New CS Email Server and Clients Tutorials Revision 1.2 Yung-Chuan Lee Computer Information Specialist Department of Computer Science January 2010 2.Background Several improvements have been incorporated when constructing the new mail server. First of all, the new email server provides secure SMTP/POP3/IMAP services. A free and legit certificate was obtained from ipsCA (Certificate Authority) to enable SSL/TLS connections. The new Webmail also uses SSL connections to enhance the security and privacy. Secondly, spam filter and mail scanner are setup to reduce spams and possible virus/trojan/worms infections. This active filtering and scanning are designed at STMP server level to prevent malicious emails before accepting them. With such configuration, the new email server only consumes a fraction of CPU resource and is very prompt. Furthermore, because of this improvement, CS emails is not rerouted to SIU server for spam filtering anymore. This eliminates the dependency to external server as well simplify troubleshooting process. The email format has been switched to MailDir. This renders each email in a single file instead of all emails in one big spool file, and it further improves both mail server and webmail performance. Instead of centralized email spool on the server, each userʼs emails are now stored under MailDir folder in their Linux home directory to enhance user accounts and files management as well improve file security. Webmail system is switched from OpenWebmail to Squirrelmail. Squirrelmail provides plug-able modules to enable more functionalities while keeping its core system simple and fast. To prevent malicious attacks, our webmail has configured to temporary block an user and an IP when too many login attempts failed. -
Calcium Vulnerability Scanner (CVS): a Deeper Look
1 Calcium Vulnerability Scanner (CVS): A Deeper Look Sari Sultan and Ayed Salman F Abstract—Traditional vulnerability scanning methods are time-consuming several minutes to several hours per host. For example, an and indecisive, and they negatively affect network performance by generating exhaustive scanning policy, which provides the highest level high network traffic. In this paper, we present a novel vulnerability scanner that of assurance, tries to discover open ports for each connected is time-efficient, simple, accurate, and safe. We call it a Calcium Vulnerability device. Subsequently, discovered open ports are tested to Scanner (CVS). Our contribution to vulnerability scanning are the follow- identify running services. Afterwards, the scanner tries to ing: (i) minimize its required time and network traffic: compared to current technologies, we reduced the former by an average of 79% and the latter discover vulnerabilities associated with each service. This by 99.9%, (ii) increase its accuracy: compared to current technologies, we is a protracted process that suffers from numerous issues improved this by an average of 2600%, and (iii) enable the scanner to learn such as (1) generating high network traffic that might con- from previous scans in order to reduce future scanning time and enhance gest or even disrupt network operations, (2) indecisiveness accuracy: compared to current technologies, CVS reduced scanning time by because other network devices (e.g., a firewall) might drop an average of 97%. CVS enables a new frontier in vulnerability scanning scanning packets without being detected, and (3) different and allow for scalable and efficient deployment of such tools in large-scale scanning software providing different results due to lack of networks, containers, edge computing, and cloud computing. -
On the Security of Practical Mail User Agents Against Cache Side-Channel Attacks †
applied sciences Article On the Security of Practical Mail User Agents against Cache Side-Channel Attacks † Hodong Kim 1 , Hyundo Yoon 1, Youngjoo Shin 2 and Junbeom Hur 1,* 1 Department of Computer Science and Engineering, Korea University, Seoul 02841, Korea; [email protected] (H.K.); [email protected] (H.Y.) 2 School of Computer and Information Engineering, Kwangwoon University, Seoul 01897, Korea; [email protected] * Correspondence: [email protected] † This paper is an extended version of our paper published in the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7–10 January 2020. Received: 30 April 2020; Accepted: 26 May 2020; Published: 29 May 2020 Abstract: Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. -
BACHELOR THESIS Jan Kundrát IMAP E-Mail Client
Charles University in Prague Faculty of Mathematics and Physics BACHELOR THESIS Jan Kundr´at IMAP E-mail Client Department of Software Engineering Supervisor: Mgr. Vlastimil Babka Study Program: Computer Science, Programming 2009 I’d like to thank my supervisor, Mgr. Vlastimil Babka, for his numerous advices during the writing of this thesis, Ms. Anna Adamcov´a for her great patience and support, and my parents for supporting my studies. I hereby declare that I wrote this thesis myself using the referenced sources only. I also agree with lending and publishing of this thesis. Prague, May 29, 2009 Jan Kundr´at 2 Contents 1 Introduction 7 1.1 Motivation............................ 7 1.2 Structureofthethesis ..................... 8 2 IMAP and Related Technologies 9 2.1 BasicConcepts ......................... 9 2.2 IMAP-specificAttributes. 10 2.3 MIME .............................. 12 2.3.1 MessageasaContainer. 12 2.3.2 International Characters in Messages . 13 2.3.3 MIMESupportinIMAP. 13 2.4 IMAPProtocolFlow ...................... 14 2.4.1 Commandsandresponses . 14 2.4.2 Mailbox Synchronization . 15 2.4.3 ChangestoMailbox . 16 2.4.4 Fetching and Manipulating Messages . 17 2.4.5 Queries Against Other Mailboxes . 18 2.4.6 Searching, Sorting and Threading . 18 2.4.7 Manipulating Mailboxes . 18 2.4.8 Sessiontermination. 19 2.4.9 IMAPExtensions. 19 2.5 OtherMethodsofMailStoreAccess . 20 2.5.1 POP3 .......................... 20 2.5.2 MAPI .......................... 20 2.5.3 Webmail......................... 20 2.5.4 IMAPCriticism..................... 21 3 3 Trojita Design 23 3.1 Overview............................. 23 3.2 Model-ViewArchitecture. 25 3.3 Parser .............................. 26 3.3.1 Low-levelParser . .. .. 26 3.3.2 Parser ......................... -
Using UF Exchange with Microsoft Outlook
V4 Outlook Guide 10/16/2011 Using UF Exchange with Microsoft Outlook 1. Using the UF Exchange email server with one of several email clients The UF Exchange email server, which currently has 15,000 users, can be used in three different ways: 1. Outlook Web Access (OWA). Use any browser and access the webmail client at http://www.ufl.edu. This client has the full capabilities of Outlook with the flexibility that it can be accessed from any computer with a browser on it. There is no setup required and you do not have to perform any configuration steps on that computer. 2. IMAP web client. Use any IMAP capable email client, such as Mozilla Thunderbird, Mac OS X Mail, Opera, Mozilla Seamonkey, Alpine (successor of Pine), Microsoft Office 2010 Outlook, etc. This requires setup similar to any IMAP client setup. For example, configuring Thunderbird as an IMAP client is simple: The important choices are to use IMAP server imap.mail.ufl.edu with “SSL/TLS”, port 993, and “normal password”, and to set the SMTP server to smtp.ufl.edu with “STARTTLS”, port 587. Under “Account Settings…” ‐> “Synchronization & Storage” uncheck the default “keep messages for this computer on this computer”; that will help you be in compliance with UF policies about data security. 3. Outlook 2010 client using Exchange Server protocol. This way uses the Microsoft Office 2010 Outlook client program to access the full capabilities of the Exchange Server and requires some setup described in section 6.2.1 below. If the native connection mode is configured, it also requires that the computer is part of the UF network, either by being on campus or through the VPN client. -
The Ultimate Guide to the Linux Operating System & Linux
Linux for Beginners The Ultimate Guide To The Linux Operating System & Linux Commands 1st Edition Adam Vardy Contents Introduction Chapter 1: What is Linux? Distributions Open Source The Linux Shell Root Capitalization Server vs. Desktop Why Use Linux? Chapter 2: Installing Linux Server Edition Chapter 3: Installing Linux Desktop Version Chapter 4: Basic Linux Tasks/Commands Sudo Man Pages Tasksel Apt-get Services Top Chapter 5: Basic Linux Navigation Chapter 6: Editing Linux Files with Vim Starting Vim Changing File Ownership Editing and Navigating Exiting and Saving Chapter 7: Advanced Linux Navigation Changing Directories and Finding Files Listing/Displaying Files Making, Deleting, Moving, Copying, Renaming Mounting Drives Conclusion Copyright 2016 - All rights reserved. This document is geared towards providing exact and reliable information in regards to the topic and issue covered. The publication is sold with the idea that the publisher is not required to render accounting, officially permitted, or otherwise, qualified services. If advice is necessary, legal or professional, a practiced individual in the profession should be ordered. - From a Declaration of Principles which was accepted and approved equally by a Committee of the American Bar Association and a Committee of Publishers and Associations. In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic means or in printed format. Recording of this publication is strictly prohibited and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved. The information provided herein is stated to be truthful and consistent, in that any liability, in terms of inattention or otherwise, by any usage or abuse of any policies, processes, or directions contained within is the solitary and utter responsibility of the recipient reader. -
Sending and Reading Email
Sending and Reading Email Get familiar with mailx, alpine, mutt, and mail. Creating a Signature file Automatically forwarding incoming messages Announcing an absence with vocation Configuring and managing email with procmail Using the Email An email message is identified by a sender and a receipt, both of which appear as headers in the message. mailx is a mail user agent for moving mails between users on the same host. Depending upon whether both sender and receipt are on the same host, an email address can take the following forms: 1. henry – user henry is on the same host 2. henry@saturn – henry is on a different host 3. [email protected] –henryis on the internet Internet Email Handling (1/3) Internet mail handling requires the works of at least three agencies: 1. Mail user agent –for reading the mailbox and sending mail, like mailx and pine. 2. Mail transport agent –for transporting mail between machines 3. Mail delivery agent –for delivering mail to the recipients’ mailboxes. MUA reads incoming mail from the mailbox and hands over outgoing mail to the MTA. MTA sends and receives mail. At the sending end, it identifies the recipient’s address and delivers the message directly to the MTA at the other end. At the receiving end, the MTA passes on mail to MDA. Internet Email Handling (2/3) MTA’s sending and receiving functions are handled universally by the simple mail transfer protocol (SMTP). The MTA doesn’t deliver mail. MDA does the delivery, like procmail. If the user’s host connects to the mail server intermittently, the user typically uses his ISP’s facilities to handle his mail.