Resources for “A Server (Almost) of Your Own”
Some of the code was formatted incorrectly in George Belotsky's “A Server (Almost) of Your Own” in our December 2006 issue. For the corrected version of the article, please see: /article/8337
This page contains updates to the article, as well as some important security information for running your VPS.
Thanks again to Sean Reifschneider, Evelyn Mitchell and the rest of the Tummy.com crew for their very helpful suggestions and for letting me use their equipment once more, to test the updates presented here.
While you can still get a VPS based on Fedora Core 3, the system used for the article, you may want something more recent. For example, CentOS 4.4, which derives from Red Hat Enterprise Linux, requires only minor deviations from the directions in the article text. The CentOS project home page is at www.centos.org.
The following notes update the instructions from Fedora Core 3 to CentOS 4.4. Tummy.com offers both variants, as well as several others, including Ubuntu and Debian.
When you configure the firewall with system-config-securitylevel-tui, the text-based GUI may not render correctly in your terminal. If this makes it difficult to use the application, try running the terminal program with the UTF-8 character encoding.
For example, xterm -u8 should launch a UTF-8 xterm. In gnome-terminal, select Terminal→Set Character Encoding→Unicode (UTF-8) from the menu bar in order to enable UTF-8.
You will need to update the last two lines of Listing 1, as the Postfix mail server version has changed. Here is the new code.
sample_directory = /usr/share/doc/postfix-2.2.10/samples readme_directory = /usr/share/doc/postfix-2.2.10/README_FILES
Note that the sample_directory parameter is obsolete since version 2.1 of Postfix.
When testing your mail server by telnetting to port 25, you may find it blocked by your local ISP. Many DSL and cable providers do this now.
It is quite simple to configure Postfix so it listens on a non-standard port, such as 10025, in addition to port 25. Edit the file /etc/postfix/master.cf. Note that this is not the main.cf file that you worked with in Listing 1. Near the top, you will find the following lines:
# ======================================================================= # service type private unpriv chroot wakeup maxproc command + args # (yes) (yes) (yes) (never) (100) # ======================================================================= smtp inet n - n - - smtpd
Add the following line, after the “smtp” line.
10025 inet n - n - - smtpd
Next, restart Postfix: /etc/init.d/postfix restart.
Finally, re-run the system-config-securitylevel-tui utility as described in the article. On the “Customize” screen, add 10025 to the “Other ports” text box. If there are other entries in this textbox, scroll to the last one, add a space, and make the new, additional entry. “OK” your changes and restart iptables, as discussed in the article.
From your workstation, you can now telnet to port 10025 on your VPS instead of port 25, to carry out the tests described in the article. After sending these hand-generated test messages, remember to check the Spam folder at the receiving end. Unusual formatting, such as the lack of a subject, of these e-mail messages may cause them to be flagged as junk.
While on the subject of spam, the problem is getting worse, as you probably know. Listing 1 in the article uses luser_relay to deliver mail for unknown recipients to a specific user on the system. This is very convenient, because you can just invent e-mail addresses, and they will work without any configuration changes.
Unfortunately, luser_relay may expose you to a lot more spam. If this happens, you will need to add all your legitimate addresses to /etc/aliases and comment out luser_relay. The article text describes how to work with /etc/aliases.
When setting up Dovecot to provide POP3 and IMAP service, the newer configuration file may look a little different.
In CentOS 4.4, the default configuration has the protocols line commented out. It is also changed from what appears in the article text:
#protocols = imap imaps
Do not be confused by these minor differences; just add the code as described in the article: protocols = pop3 imap in this case. Dovecot will still work correctly.
|Bitcoin on Amazon! Sort of...||Sep 28, 2016|
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- We Talk to Everybody
- High Availability Linux with Software RAID
- Linux Arpeggiators, Part 2
- Identity: Our Last Stand
- Ascensio System SIA's ONLYOFFICE
- CodeLathe FileCloud Google Chrome Extension
- Securing the Programmer
- Securing Your Network against Kazaa
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide