Free Essay

Postfix Mailserver

In: Science

Submitted By arnoh
Words 461
Pages 2
POSTFIX

CONFIGURATIE
Nameserver ook instellen als mailserver

$ sudo vi /etc/bind/db.jonas.lan

MX-record toevoegen

@ IN SOA jonas.lan. root.jonas.lan. ( 2011120103 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL
;
@ IN NS ns.jonas.lan.
@ IN A 127.0.0.1
@ IN MX 5 mail.jonas.lan ns IN A 192.168.1.5 (eigen ip-adres) mail IN A 192.168.1.5

INSTALLEREN
$ sudo apt-get install postfix

Volgend venster verschijnt:

Selecteer en vul volgende zaken in:

Internet Site jonas Dit is de naam van waaruit mails zullen verstuurd worden
( jonas@mail.jonas.lan )

poortstatus controleren
$ sudo netstat –ntlp

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN

Configuratie MAILS
$ sudo vi /etc/postfix/main.cf

Onderaan de file staat het volgende:

hostname = jonas

* Als je tijdens de installatie een verkeerde naam hebt opgegeven, kan je die hier veranderen * * maildirectory Om je mails in een directory te plaatsen moet je onderaan de file nog een lijn toevoegen:

home_mailbox = maildir/ ( willekeurige mapnaam )

mails van netwerk ontvangen
Om mails van anderen in je netwerk te kunnen ontvangen moet je volgende lijn aanvullen met je eigen netwerkadres:

mynetworks = 127.0.0.1/8 [::ffff:127.0.0.0]/104 [::1]/128 192.168.1.0/24

controles
Controleer eerst of je mailserver bereikbaar is
$ dig mail.jonas.lan

;; ANSWER SECTION: mail.jonas.lan 604800 IN A 192.168.1.5

Eventueel kan je ook op een andere pc controleren of de mailserver bereikbaar is
$ dig mail.jonas.lan @192.168.1.5

mails verzenden
Kan vanaf elke pc die verbinding kan maken met server

$ telnet 192.168.1.5 25

Trying 192.168.1.5...
Connected to 192.168.1.5
Escape character is ‘^]’.
220 ubuntu ESMTP Postfix (Ubuntu) mail from: Jonas ( willekeurige naam, als deze niet bestaat, zal de afzender
250 2.1.0 Ok unknown zijn ) rcpt to: Jonas ( moet een bestaande naam zijn )
250 2.1.5 Ok data 354 End data with <CR><LF>.<CR><LF>
Hier komt de tekst van het emailbericht
.
250 2.0.0 Ok: queued as OB66BE20D7 quit Mails lezen
$ cd maildir/new

In deze directory komen alle nieuwe mails terecht, afhankelijk van de mapnaam die je hebt opgegeven bij de installatie

$ ls
$ cat (bestand)

Return-Path: jonas@mail.jonas.lan
X-Original-To: jonas
Delivered-To: jonas@mail.jonas.lan
Received: from ns.jonas.lan (ns.jonas.lan [192.168.1.5]) by Ubuntu (Postfix) with SMTP id B01B2E20D7 for <jonas>; Sun, 4 Dec 2011 20:38:15 +0100 (CET)
Message-ID: 20111204193819.B01B2E20D7@ubuntu
Date: Sun, 4 Dec 2011 20:38:15 +0100 (CET)
From: jonas@mail.jonas.lan

Een test emailbericht…...

Similar Documents

Free Essay

Linux Admin Sendmail.Docx

...is the organization, OU is organizational unit, common name is the reverse DNS name of the server clients get there mail from, emailAddress is the address of the person responsible for the server. Now run the mkcert.sh script: # /usr/local/share/dovecot/mkcert.sh Enable dovecot in /etc/rc.conf/ with dovecot_enable=”YES” Then run /usr/local/etc/rc.d/dovecot start /var/log/maillog will show dovecot starting and initializing SSL THAT’S ALL FOLKS!!!! Sendmail is implemented as a large program doing everything. One large program makes it easy to share mail, and easy to make a major error. Postfix is based on semi resident, mutually cooperating processes performing specific tasks without a preordained parent/child relationship. (www.akadia.com/services/postfix_mta.html) Postfix is implemented as a resident master server running the postfix daemon processes on demand. Postfix has four different queues. The maildrop queus is where localy posted mail is deposited and copied to the incoming queue after being cleaned up. The incoming queue is for still arriving mail or mail the queue manager is yet to look at. The active queue is a limited size queue for mail the queue manager has opened for delivery. The deferred queue is for mail unable to be delivered so it does not get in the way of deliverable mail. The queue manager, qmgr, keeps information in memory about the active queue. The active queue size is limited on purpose. The queue manager should never run......

Words: 11213 - Pages: 45

Premium Essay

Key Computer Terms Checkpoint

...Telecommunications Transmission of signals over longdistances http://www.techterms.com/definition/telecommunications Analog and digital communications. Technology services Services that involve technology http://www.techterms.com/definition/technologyservices It services, and technical support Personal digital assistants Handheld electronic devices that work as a calender dayplanner, note pad and many other things http://www.techterms.com/definition/pda Sharp mobillon, sont cli Personal computers A computer used for work or personal use on a daily basis http://www.techterms.com/definition/pc Dell, mac, hp emachines Servers A computer that provides data to other computers http://www.techterms.com/definition/server Web servers, mailservers, file servers. Microsoftlls. Supercomputers A high performance computing machine designed to have extremely fast processing speeds. http://www.techterms.com/definition/supersomputer Ibm’s system x roadrunner system. Secondary storage technology Storage devices and storage media that are not always directly acessible by a comeuter http://www.techterms.com/definition/secondarystorage External harddrives, usb flash drives, tape drives. Input devices Any device that provides input to a computer http://www.techterms.com/definition/inputdevice Keyboard and mouse, joystick microphone. Output devices Any device that outputs information from a computer http://www.techterms.com/definition/outputdevice Monitor,speekers,......

Words: 384 - Pages: 2

Premium Essay

Articles

...Question 1 Change the following infix expression postfix expression.  (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK.......

Words: 357 - Pages: 2

Premium Essay

Essay

...hosts: files nisplus dns Check the /etc/resolv.conf file to make sure that the IP address 127.0.0.1 of your localhost is listed as a name server Check that your /etc/host.conf contains the word bind Restart the named daemon->Type rndc start, then at the prompt type dig – – – Configuring DNS Client ● Entries in /etc/resolv.conf file are as follows: searchdomainname nameserverIP-address ● where domainname is the default domain name to search, and IP-address is the IP address of your DNS server. Eg: a sample /etc/resolv.conf file: search example.org nameserver 192.168.1.15 ● Configuring Mail Services ● ● ● ● ● ● ● Tracing Email Delivery Process Mail User Agent (MUA) Introducing SMTP Configuring Sendmail Using Postfix Mail Server Serving Email with POP and IMAP Maintaining Email Security Tracing Email Delivery Process Mail User Agent (MUA) Her MUA formats the message in e-mail format and uses the Simple Mail Transfer Protocol (SMTP) to send the message to the local mail transfer agent (MTA), in this case smtp.a.org, run by Alice's Internet Service Provider (ISP). Mail User Agent (MUA) • To be able to send mail, you, or your users, need a program called a Mail User Agent (MUA) • The MUA, also called a mail client, enables users to write and read mail messages • Two types of MUAs are available: a graphical user interface (GUI), such as Netscape Messenger, and a command-line interface, such as Pine. MUA sends it to the mail transfer agent......

Words: 5132 - Pages: 21

Premium Essay

Data Structure

...Question 1 Change the following infix expression postfix expression. (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK. Write......

Words: 308 - Pages: 2

Free Essay

Tech

... | | | | | | | | 2. (18 points) ) For X = 0011 1111, show the result of the following independent operations (i.e. each instruction occurs with X starting at the value above): a) Shift-right ____ ____ b) Circular Shift-right ____ ____ c) Shift-left ____ ____ d) Circular Shift-left ____ ____ e) Arithmetic Shift-left ____ ____ f) Arithmetic Shift-right ____ ____ 3. (12 points) a) Convert the following formula from postfix (Reverse Polish Notation) to infix: AB*CD/+ b) Convert the following formula from infix to postfix (Reverse Polish Notation): A + B * C + D / E * F Note that the result of part b) can be used in problem 7 In the problems 4 through 7 write code that performs the computation: X = A + B * C + D / E * F using CPUs that have the following instruction formats. You may only use registers A through F, plus X and T. Registers A through F may not be changed, i.e. their values are fixed. Register T may be used as a temporary register, and Register X must contain the final answer. 4. (12 points) Three-operand instructions 5. (12 points) Two-operand instructions 6. (12...

Words: 457 - Pages: 2

Free Essay

Dissertation for Desk Calculator

...expression and output is obtained in a text file. Method followed to solve the expression is, the input is fetched from the input text document and converted to postfix notation using expression tree data structure, the resulted RPN expression is evaluated and the result is shown in output text file. Infix is converted to postfix because, it is easy for the compiler to execute the expression in postfix format. Commonly used data structures for evaluating expressions are stacks and expression trees, both of the above data structures are analyzed and concluded that expression trees are the best suited data structure for solving infix expression. 1.Introduction: Consider a situation where you are writing a programmable calculator. If the user types in 10 + 10, how would you compute a result of the expression? You might have a solution for this simple expression. But what if he types in 3 * 2 / (5 + 45) % 10 ? What would you do then? The expression that you see above is known as Infix Notation. It is a convention which humans are familiar with and is easier to read. But for a computer, calculating the result from an expression in this form is difficult. Hence the need arises to find another suitable system for representing arithmetic expressions which can be easily processed by computing systems. The Prefix and Postfix Notations make the evaluation procedure really simple. The calculator you will be working with uses Reverse Polish Notation (RPN),......

Words: 1838 - Pages: 8

Free Essay

C Operators

...Checks if the value of two operands is equal or not, if values are not equal then condition becomes true. Example (A == B) is not true. == != (A != B) is true. > Checks if the value of left operand is greater than the value of right operand, if yes then condition becomes true. Checks if the value of left operand is less than the value of right operand, if yes then condition becomes true. Checks if the value of left operand is greater than or equal to the value of right operand, if yes then condition becomes true. Checks if the value of left operand is less than or equal to the value of right operand, if yes then condition becomes true. (A > B) is not true. < (A < B) is true. >= (A >= B) is not true. postfix ++ and postfix –– prefix ++ and prefix –– sizeof & typecasts * + / – >> = % * +–~! Left to right Unary Right to left Unary Multiplicative Additive Bitwise shift Relational Equality Bitwise-AND Bitwiseexclusive-OR Right to left Left to right Left to right Left to right Left to right Left to right Left to right Left to right | Bitwiseinclusive-OR Left to right && || Logical-AND Logical-OR Left to right Left to right ?: Conditionalexpression Right to left = *= += ^= , /= |= %= = &= Simple and compound assignment2 Sequential evaluation Right to left –= Left to right Operators are listed in descending order of precedence. If several operators appear on the same line or in a......

Words: 462 - Pages: 2

Free Essay

Aouch; Adsf

...expressions. Notations of Expressions Let X=A+B be an expression. Then the notations of expressions are defined as: 1. Prefix notation: the operator is written before the two operands. Ex. +AB 2. Infix notation: the operator is written in between the two operands. Ex. A+B 3. Postfix notation: the operator is written after the two operands. Ex. AB+    Illustration: X=A+B/C-D Find the 3 notations of the above expression. Prefix: -+A/BCD Infix: A+B/C-D Postfix: ABC/+D-    Knowing the underlying principles on the 3 notations of expressions, we now are ready to use stacks to evaluate expressions. There are 2 possible ways to evaluate expressions 1. 2. Prefix method Postfix method Prefix Method Let there be 2 stacks X and S. Assume that X contains the prefix notation of the expression and S be initially empty. S will be used to do the evaluation. Get the top of X. If x [i] is an operand, push the element into S.  If x[i] is an operator, pop the 2 topmost element of S. Apply the operation defined by x[i] then push the result into S  4. Repeat steps 2-3 until X is empty or S is left with only one element. That element must be the result of the evaluation process. Conversion of infix to postfix notation using stacks •push only operations onto the stack •push the operator if the incoming operator has a higher precedence than the top operator in the stack. •If the incoming operator has a priority...

Words: 654 - Pages: 3

Premium Essay

Nt1430

...first-time authentication message (page 6) again as OpenSSH verifies that you are connecting to the correct system. Ch 20 end of chapter questions/exercises #6, #9 6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system. One possible answer of many: a. Max’s MUA passes the email to sendmail. b. The sendmail daemon uses SMTP to deliver the email to the instance of sendmail on Sam’s system. c. On Sam’s system, sendmail passes the email to the local MDA (procmail). d. The MDA stores the email in Sam’s file in the spool directory. e. Sam’s MDA retrieves the email from the spool directory 9. Give a simple way of reading your email that does not involve the use of an MUA. Postfix is an alternative MTA. Postfix is fas and easy to administer but is compatible enough with sendmail to not upset sendmail users....

Words: 464 - Pages: 2

Premium Essay

Mobility of Factors of Production

...Providing support, including procedural documentation and relevant reports; Following diagrams and written instructions to repair a fault or set up a system; Responding within agreed time limits to call-outs; Set-up & Configuration of Linux Server ; -mail server, graph server, and proxy servers. Technical Environment i. ii. Windows server ,window xp , Linux servers ( Postfix ,Squid ,Iptables ,Proxy) ,network Graphing servers ,Bind Dns Server ,Apache Web servers ,what up gold ,cacti graphing ,nagios . AS a support engineer am Responsible for: i. ii. Day-to-day support on Network Devices for more than one hundred client Fulfill client support need optimally. Professional Experience Professional Skills Extensive experience in installation, administration and networking in various environments. well working acquaintance in Linux environment operate FTP SSH Samba Server in Linux Environment Linux Shell Scripting Security administration port security on switch and IP security on Router via Access list Thorough knowledge of Windows Vista; Windows XP; Centos server, apache web server ,Mysql server Postfix Mail server using Ired OS System development using PHP and Mysql Operating Systems: Windows9X, Windows2000, Windows ME, Windows XP, Windows, Vista, Linux, Unix, MS DOS Software: MS Office 2007; MS Office 2003/XP; Norton Utilities; WinFax; PC Anywhere; Hardware: Intel, 3COM, HP Proliant DL380, HP ML570, and others. Computer assembly and i. ii. Maintenance,......

Words: 697 - Pages: 3

Premium Essay

Lab #4 – Assessment Worksheet

...compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses Zenmap? Reconnaissance 4. What step in the hacking attack process identifies known vulnerabilities? Enumeration 5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service? I believe that this is the telnet service. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 2 | Lab #4 Using Ethical Hacking Techniques to Exploit a Vulnerable Microsoft Workstation 6. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits,......

Words: 285 - Pages: 2

Premium Essay

1s3110

...select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability. Risk – Threat – Vulnerability | Primary Domain Impacted | Unauthorized access from pubic Internet | LAN/WAN Domain | User destroys data in application and deletesall files | User Domain | Hacker penetrates your IT infrastructureand gains access to your internal network | LAN/WAN Domain | Fire destroys primary data center | System/Application Domain | Communication circuit outages | Remote Access Domain | Workstation OS has a known software vulnerability | Workstation Domain | Unauthorized access to organization owned Workstations | Workstation Domain | Denial of service attack on organization e-mailServer | System/Application Domain | Remote communications from home office | Remote Access Domain | LAN server OS has a known software vulnerability | LAN Domain | User downloads an unknown e –mail attachment | User Domain | Workstation browser has software vulnerability | Workstation Domain | Service provider has a major network outage | WAN Domain | User inserts CDs and USB hard driveswith personal photos, music, and videos onorganization owned computers | User Domain | VPN tunneling between remote computer and ingress/egress router | Remote Access Domain | WLAN access points are needed for LAN connectivity within a warehouse | LAN/WAN Domain | Given the scenario of a healthcare organization, answer the following......

Words: 546 - Pages: 3

Free Essay

Bible

...count the repetitions •       Sentinel-controlled repetition •       Indefinite repetition •       Used when the number of repetitions is not known Sentinel value indicates "end-of-data * Two types of conversions: * Widening conversion: * Convert from one type to another type with larger number of bits * From int to double * Narrowing conversion: * Converting from a data type to a smaller type * From double to int * Some information may be lost * Increment (++): * Adds 1 to its operand * Prefix increment: ++a * Postfix increment: a++ * ++a; is the same as a++; is the same as a = a+1; * Decrement (--): * Subtracts 1 from its operand * Prefix decrement: --a; * Postfix decrement: a- -; --a; is the same as a--; is the same as a = a- * The postfix and prefix are different only when they are used in an assignment statement * x = a++; is not the same as x = ++a; * x = ++a increments a before its value is assigned to x * x = a++ increments a after its value is assigned to x Generating Random Numbers * Math.random() is used to generate a random double value between 0.0 and 1.0 excluding 1.0 * To generate an integer between 0 and 9 int num = (int) (Math.random() * 10) * To generate an integer between 0 and 100 int num = (int) (Math.random Random Question * Given the following declaration, how would you get: Random......

Words: 1905 - Pages: 8

Free Essay

Smart Networks

...standard that defined PoE is IEEE 802.3af. The standard was enhanced in 2009 and give the new standard name 802.3af PoE+. 5.1.3 Standard | Cabling | Maximum Length | 10BASE5 | Coaxial (thicknet) | 500m | 10BASE2 | Coaxial(thinnet) | 200m | 10BASE-T | UTP (cat3, 5, 5e, 6) | 100-150m | 100BASE-FX | Fiber optic | 400m | 100BASE-T | UTP or optical fiber | 100m | 100BASE-T4 | UTP (cat3, 5, 5e, 6) | 100m | 100BASE-TX | UTP (cat3, 5, 5e, 6) | 100m | 1000BASE-LX | MM Fiber optic | 550m | 1000BASE-SX | MM Fiber optic | 220m or 550m (depends upon fiber thickness) | 1000BASE-ZX | SM fiber optic | 100km | 1000BASE-T | UTP (Cat5) | 100m | 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the transmission speed. The postfix –T implies twisted pair. 5.2.1 A MAC address must be unique for every NIC produced because switches forward frames based on their destination MAC address and if more than one NIC in the same LAN were to have the same MAC address (including the last 24 bits in the MAC address) then the switches would be confused as to which NIC would get the frame. 5.2.2 Connection-specific DNS Suffix: att.net Description: Dell Wireless 1705 802.11b/g/n (2.4GHZ) Physical Address: ‎64-5A-04-CE-E2-44 DHCP Enabled: Yes IPv4 Address: 192.168.1.73 IPv4 Subnet Mask: 255.255.255.0 Lease Obtained: Wednesday, July 23, 2014 1:59:29 AM Lease Expires: Thursday, July 24, 2014 10:47:21 AM IPv4 Default Gateway: 192.168.1.254 IPv4 DHCP Server:......

Words: 349 - Pages: 2