Postfix电子邮局的配置步骤

      My Works 2007-10-29 20:36
环境:RedHat Linux+Postfix+Cyrus-sasl+Dovecot+Stunnel
在安装Linux时,如果选择全部安装的话,Postfix与Dovecot以及Stunnel将会自动给予安装上去,查看是否已安装,可以执行如下命令:

rpm –qa | grep postfix或dovecot或stunnel

如果没有的话,请直接在光盘里找出来,并给予安装。这里以RPM包安装为列,安装命令如下:

rpm –ivh postfix-*.rpm  或

rpm –ivh cyrus-sasl-*.rpm 或

rpm –ivh dovecot-*.rpm 或

rpm-ivh stunnel-*.rpm

这里的*代表的是相关的版本号。

在确认这些安装包已安装到系统里后,现在开始配置Mail服务。

首先,请停止系统内自带的Mail服务-Sendmail,执行如下命令:

/etc/init.d/sendmail stop      //先停止sendmail进程

chkconfig sendmail off       //再把自启动服务去掉

一:配置Cyrus-sasl

确定已安装完Cyrus-sasl后,启动该服务:

/etc/init.d/saslauthd start     //启动Cyrus-sasl服务。

chkconfig saslauthd on      //把Cyrus-sasl设置为开机自启动。

测试一下是否成功:
testsaslauthd –u 系统用户名 –p ‘对应的密码’或

/usr/sbin/testsaslauthd –u 系统用户名 –p ‘对应的密码’

如果提示:

0: OK “Success.”

则说明已安装成功!

注:Cyrus-sasl的功能就是实现密码验证机制。

二:配置SMTP

现在,开始配置Postfix,Postfix的功能就是实现SMTP服务,也即信件发送服务。Postfix的主要配置文档是/etc/postfix/main.cf,如果没看到mail.cf文档则请执行:

cp /etc/postfix/main.cf.default /etc/postfix/main.cf

然后修改main.cf的相关内容。具体内容如下:
alias_database = hash:/etc/aliases

alias_maps = hash:/etc/aliases

command_directory = /usr/sbin

config_directory = /etc/postfix

daemon_directory = /usr/libexec/postfix

debug_peer_level = 2

header_checks = regexp:/etc/postfix/header_checks

html_directory = no

mailbox_size_limit = 102400000

mailq_path = /usr/bin/mailq.postfix

manpage_directory = /usr/share/man

mydestination = $ myhostname, localhost.$ mydomain, localhost, $ mydomain

mydomain = 域名

myhostname = mail.域名

mynetworks = 192.168.1.0/24, 127.0.0.0/8, 192.168.1.100/32

myorigin = $ mydomain

newaliases_path = /usr/bin/newaliases.postfix

readme_directory = /usr/share/doc/postfix-1.1.11/README_FILES

relay_domains = nanoconcept.net

sample_directory = /usr/share/doc/postfix-1.1.11/samples

sendmail_path = /usr/sbin/sendmail.postfix

setgid_group = postdrop

smtpd_sasl_auth_enable = yes

smtpd_sasl_local_domain= ''

smtpd_recipient_restrictions =

permit_sasl_authenticated

permit_auth_destination

permit_mynetworks

check_relay_domain

reject_rbl_client yahoo.com.tw

reject_rbl_client cbl.anti-spam.org.cn

reject_rbl_client cdl.anti-spam.org.cn

reject_rbl_client cblplus.anti-spam.org.cn

reject_non_fqdn_sender

reject_non_fqdn_recipient

reject_unknown_sender_domain

reject_unknown_recipient_domain

reject

broken_sasl_auth_clients = yes

smtpd_client_restrictions = permit_sasl_authenticated

smtpd_recipient_restrictions = permit_sasl_authenticated

smtpd_sasl_security_options=noanonymous

unknown_local_recipient_reject_code = 550

Postfix配置文件默认情况下,没有启用SMTP认证机制,所以,需要修改postfix的主配置main.cf文件,也即上面以smtpd开头的,这些就是实现SMTP功能的配置内容!

现在可以启动postfix服务:

/etc/init.d/postfix start       //启动postfix服务

chkconfig postfix on//设置postfix开机自启动。

可以通过netstat –ntl进行查看SMTP的端口(25)是否起来。

然后就可以进行测试是否能发信,如果不行的话,请查看一下:

/usr/lib/sasl2下是否存在着smtpd.conf与Sendmail.conf两个文件,其内容为:

[root@xtmail sasl2]# cat Sendmail.conf

pwcheck_method:saslauthd

与:

[root@xtmail sasl2]# cat smtpd.conf

pwcheck_method: saslauthd

但有时候,Postfix无法自动找到saslauthd的路径,所以需要在smtpd.conf里添加一条:

saslauthd_path:/var/run/saslauthd/mux

三:配置POP3

Dovecot的功能就是实现收信功能,即POP3功能。在安装Dovecot的RPM包后,Dovecot的配置文件是在/etc/下的dovecot.conf

为了能让Dovecot正常使用,需要修改一下dovecot.conf的些配置。具体如下:

protocols = pop3

pop3_listen = [::]

login = imap

login = pop3

mbox_locks = fcntl

auth = default

auth_mechanisms = plain

auth_userdb = passwd

auth_user = root

完后,请运行以下命令:

/etc/init.d/dovecot start           //启动Dovecot服务

chkconfig dovecot on            //设置开机自启动

四:端口加密现在就把一台具有SMTP与POP3功能的邮局配置完毕。当然了,这台只具备简单的SMTP与POP3功能的邮局,现在要对其进行端口加密。也就是提到的 Stunnel。Stunnel的配置文件是在/etc/stunnel/stunnel.conf,里面已有SMTP与POP3的进行端口加密。一般只要直接启动起来就可以了。具体形式如下:

/etc/init.d/stunnel      //启动stunnel

如果是用tar.gz进行编译的话,有时在启动stunnel时,需要带上stunnel.conf的绝对路径!

五:检查端口是否正常开启现在一套完整的Postfix邮局已配置完毕,可以投入正常使用。可以通过 netstat –ntl进行查看到25、110、465、995这几个端口的存在。其中25端口加密后就是465,110加密后就是995,110端口只是一个与客户端连接的,可以禁止掉。25端口不可以屏蔽掉,因为Mail服务器之间在互相传输时,还是使用25端口的。

zt: http://sysapp.51cto.com/art/200610/32944.htm

1/19/2007

Snort安装与使用

Filed under: 网络相关 — pat dong @ 7:43 pm

Snort安装与使用

pat.dong
2007-01-18

donghuaip@gmail.com

系统环境:rh as3+apache+php+snort+base
所需snort相关软件包:
adodb462.tgz
base-1.2.6.tar.gz
Image_Canvas-0.3.0.tar.gz
//Image_Color-1.0.2.tar.gz
Image_Graph-0.7.2.tar.gz
libpcap-0.9.5.tar.gz
pcre-6.7.tar.gz
snort-2.6.0.tar.gz
snortrules-pr-2.4.tar.gz

下载软件:
wget http://download.sso.cn/security/ids/snort_base/adodb462.tgz
wget http://download.sso.cn/security/ids/snort_base/base-1.2.6.tar.gz
wget http://download.sso.cn/security/ids/snort_base/Image_Canvas-0.3.0.tar.gz
wget http://download.sso.cn/security/ids/snort_base/Image_Color-1.0.2.tar.gz
wget http://download.sso.cn/security/ids/snort_base/Image_Graph-0.7.2.tar.gz
wget http://download.sso.cn/security/ids/snort_base/install.txt
wget http://download.sso.cn/security/ids/snort_base/libpcap-0.9.5.tar.gz
wget http://download.sso.cn/security/ids/snort_base/pcre-6.7.tar.gz
wget http://download.sso.cn/security/ids/snort_base/snort-2.6.0.tar.gz
wget http://download.sso.cn/security/ids/snort_base/snortrules-pr-2.4.tar.gz

软件安装路径:
snort:
/usr/local/snort
rules:
/usr/local/snort/rules
snort.conf
/usr/local/snort/conf/snort.conf
adodb:
/usr/local/snort/adodb
base:
/usr/local/snort/base
libpcap:
/usr/local/snort/libpcap
pcre
/usr/local/snort/pcre

1 配置apache+php+mysql环境

2 安装snort前提组件libpcap-0.9.5.tar.gz和pcre-6.7.tar.gz

tar zxvf libpcap-0.9.5.tar.gz
cd libpcap-0.9.5
./configure –prefix=/usr/local/snort/libpcap
make
make install

tar zxvf pcre-6.7.tar.gz
cd pcre-6.7
./configure –prefix=/usr/local/snort/pcre
make
make install

3 安装snort-2.6.0.tar.gz并加载plugin
groupadd snort
useradd -g snort -s /sbin/nologin

建立日志文件目录和配置文件目录:
mkdir /var/log/snort
mkdir /usr/local/snort/conf

tar zxvf snort-2.6.0.tar.gz
cd snort-2.6.0
./configure –prefix=/usr/local/snort –with-mysql \
–with-libpcap-includes=/usr/local/snort/libpcap/include \
–with-libpcap-libraries=/usr/local/snort/libpcap/lib  \
–with-libpcre-includes=/usr/local/snort/pcre/include \
–with-libpcre-libraries=/usr/local/snort/pcre/lib \
–enable-dynamicplugin
make
make install

4 配置snort并加载rules
cp etc/classification.config /usr/local/snort/conf
cp etc/reference.config /usr/local/snort/conf
cp etc/snort.conf /usr/local/snort/conf
cp etc/unicode.map /usr/local/snort/conf
我查看过snort.conf文件,好象只用如上几个配置文件就可以了,如果有错误,可以使用:
cp etc/* /usr/local/snort/conf

创建snort数据库,并导入数据
mysql -uroot -prootpassword -e “create database snrot”
mysql -uroot -prootpassword -e “grant all on snort.* to snort@localhost identified by ’snort’”
mysql -usnort -psnort

tar zxvf snortrules-pr-2.4.tar.gz
mv rules /usr/local/snort/

启动snort
/usr/local/snort/bin/snort -c /usr/local/snort/conf/snort.conf -i eth0 -g snort -D
如果实现开机自动启动,把上面的语句添加到/etc/rc.local

5 安装adodb和base
tar zxvf base-1.2.6.tar.gz
mv base-1.2.6 /usr/local/snort/base

tar zxvf adodb462.tgz
mv adodb /usr/local/snort/

6 配置base_conf.php
cd /usr/local/base
cp base_conf.php.dist base_conf.php
修改 “base_conf.php”
$ BASE_urlpath = “/base”;
$ DBlib_path = “../adodb “;
$ DBtype = “mysql”;
$ alert_dbname   = ’snort’;
$ alert_host     = ‘localhost’;
$ alert_port     = ‘’;
$ alert_user     = ’snort’;
$ alert_password = ’snort’;

7 配置apache
在httpd.conf文件中加入如下:
    Alias /base /usr/local/snort/base
这样您就可以在http://ip/base参考文档:
http://download.sso.cn/security/ids/snort_base/snort_base_SSL.pdf
http://download.sso.cn/security/ids/snort_base/snort-barnyard.pdf
http://download.sso.cn/security/ids/snort_base/Snortman.htm
http://www.snort.org/docs/faq.html
http://www.snort.org/docs/

标签集:TAGS:
回复Comments() 点击Count()

回复Comments

{commentauthor}
{commentauthor}
{commenttime}
{commentnum}
{commentcontent}
作者:
{commentrecontent}