<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.htw.stura-dresden.de/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=193.158.112.210</id>
	<title>Wiki StuRa HTW Dresden - Benutzerbeiträge [de]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.htw.stura-dresden.de/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=193.158.112.210"/>
	<link rel="alternate" type="text/html" href="https://wiki.htw.stura-dresden.de/index.php?title=Spezial:Beitr%C3%A4ge/193.158.112.210"/>
	<updated>2026-04-15T23:36:38Z</updated>
	<subtitle>Benutzerbeiträge</subtitle>
	<generator>MediaWiki 1.44.3</generator>
	<entry>
		<id>https://wiki.htw.stura-dresden.de/index.php?title=StuRa:Server/FreeBSD&amp;diff=22482</id>
		<title>StuRa:Server/FreeBSD</title>
		<link rel="alternate" type="text/html" href="https://wiki.htw.stura-dresden.de/index.php?title=StuRa:Server/FreeBSD&amp;diff=22482"/>
		<updated>2012-12-18T15:12:14Z</updated>

		<summary type="html">&lt;p&gt;193.158.112.210: /* MDA: maildrop */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dies ist die [[Server/Dokumentation | Dokumentation für den Betrieb der]] [[Server]] mit [[FreeBSD]].&lt;br /&gt;
&lt;br /&gt;
== Sicherheit ==&lt;br /&gt;
* ports aktuell halten:&lt;br /&gt;
** portsnap /var/db/portsnap/INDEX&lt;br /&gt;
** edit /etc/crontab:&lt;br /&gt;
 &amp;lt;code&amp;gt;0 13 * * * root portsnap -I cron fetch &amp;amp;&amp;amp; portsnap update &amp;amp;&amp;amp; pkg_version -vIL=&amp;lt;/code&amp;gt;&lt;br /&gt;
* tägliches Audit der (installierten) Ports:&lt;br /&gt;
** portaudit /var/db/portaudit/auditfile.tbz&lt;br /&gt;
** edit /etc/crontab:&lt;br /&gt;
 &amp;lt;code&amp;gt;0 14 * * * root portaudit -Fda&amp;lt;/code&amp;gt;&lt;br /&gt;
* [http://www.vuxml.org/freebsd/ VuXML] abonnieren&lt;br /&gt;
* [http://security.freebsd.org/ http://security.freebsd.org/] mal durchlesen&lt;br /&gt;
* [http://nvd.nist.gov/ National Vulnerability Database] [http://nvd.nist.gov/download/nvd-rss.xml (NVD RSS)] abonnieren&lt;br /&gt;
&lt;br /&gt;
=== Paketfilter ===&lt;br /&gt;
* [http://www.openbsd.org/faq/pf/ OpenBSD pf]&lt;br /&gt;
* in /etc/rc.conf:&lt;br /&gt;
 pf_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
 pf_rules=&amp;quot;/etc/pf.conf&amp;quot;&lt;br /&gt;
 pflog_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
 # host system is gateway for jails&lt;br /&gt;
 gateway_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
* syslogd an Hauptmaschine binden&lt;br /&gt;
** in /etc/rc.conf: (evtl. -ss flag?)&lt;br /&gt;
 &amp;lt;code&amp;gt;syslogd_flags=&amp;quot;-b $MAIN_IP&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
* Paketfilter starten:&lt;br /&gt;
 &amp;lt;code&amp;gt;# /etc/rc.d/pf start&lt;br /&gt;
 # /etc/rc.d/pflog start&amp;lt;/code&amp;gt;&lt;br /&gt;
* pf.config: (check via &amp;lt;code&amp;gt;pfctl -vnf /etc/pf.conf&amp;lt;/code&amp;gt;) (inzwischen veraltet)&lt;br /&gt;
 ### MAKROS&lt;br /&gt;
 thishost = &amp;quot;$MAIN_IP&amp;quot;&lt;br /&gt;
 # portsnap5 204.9.55.80&lt;br /&gt;
 portsnap_freebsd = &amp;quot;{ 204.109.56.116 204.9.55.80 }&amp;quot;&lt;br /&gt;
 # auditfile.tbz is beeing fetched from portaudit.freebsd.org&lt;br /&gt;
 portaudit_freebsd = &amp;quot;69.147.83.36&amp;quot;&lt;br /&gt;
 # dnsserver from resolv.conf&lt;br /&gt;
 dnsserver = &amp;quot;{ 85.214.73.63 217.79.186.148 27.110.120.30 204.152.184.76 194.150$&lt;br /&gt;
 ### RULES&lt;br /&gt;
 # default deny&lt;br /&gt;
 block in all&lt;br /&gt;
 block out all&lt;br /&gt;
 # lokales interface darf ohne einschränkungen&lt;br /&gt;
 pass in quick on lo0 all&lt;br /&gt;
 pass out quick on lo0 all&lt;br /&gt;
 ## HOST&lt;br /&gt;
 # allow ssh&lt;br /&gt;
 pass in on bce0 proto tcp from any to $thishost port $SSH_PORT&lt;br /&gt;
 pass out on bce0 proto tcp from $thishost port $SSH_PORT to any&lt;br /&gt;
 ## allow outbound icmp&lt;br /&gt;
 # echo request&lt;br /&gt;
 pass out inet proto icmp icmp-type 8 code 0 keep state&lt;br /&gt;
 # echo reply&lt;br /&gt;
 pass in inet proto icmp icmp-type 0 code 0 keep state&lt;br /&gt;
 # destination unreachable&lt;br /&gt;
 pass in inet proto icmp icmp-type 3 keep state&lt;br /&gt;
 # allow DNS lookups {also via tcp?} port 53&lt;br /&gt;
 # what about traversal???&lt;br /&gt;
 pass out on bce0 proto udp from $thishost to $dnsserver port 53 keep state&lt;br /&gt;
 # allow portsnap to fetch from freebsd.org (ports?)&lt;br /&gt;
 pass in on bce0 proto tcp from $portsnap_freebsd to $thishost&lt;br /&gt;
 pass out on bce0 proto tcp from $thishost to $portsnap_freebsd&lt;br /&gt;
 # allow portaudit to fetch auditfile.tbz via http&lt;br /&gt;
 pass in on bce0 proto tcp from $portaudit_freebsd port 80 to $thishost&lt;br /&gt;
 pass out on bce0 proto tcp from $thishost to $portaudit_freebsd port 80&lt;br /&gt;
 ## JAIL Beispiel (uneingeschränkt -&amp;gt; &#039;&#039;&#039;dumme Idee&#039;&#039;&#039;, ports dienstabhänging freigeben&lt;br /&gt;
 pass in on bce0 proto { tcp udp icmp } from any to $jail_srs14&lt;br /&gt;
 pass out on bce0 proto { tcp udp icmp } from $jail_srs14 to any&lt;br /&gt;
&lt;br /&gt;
* regeln überprüfen: &amp;lt;code&amp;gt;pfctl -vnf /etc/pf.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Paketfilter bedienen ====&lt;br /&gt;
* anschalten: &amp;lt;code&amp;gt;pfctl -e&amp;lt;/code&amp;gt;&lt;br /&gt;
* ausschalten: &amp;lt;code&amp;gt;pfctl -d&amp;lt;/code&amp;gt;&lt;br /&gt;
* sanity check: &amp;lt;code&amp;gt;pfctl -vnf /etc/pf.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
* alte Regeln ins Klo und neue in die Auslage: &amp;lt;code&amp;gt;pfctl -Fa -f /etc/pf.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Verweise ====&lt;br /&gt;
* [http://openbsd.org/faq/pf/de/index.html PF: Der OpenBSD Packet Filter]&lt;br /&gt;
* [http://www.amazon.com/Building-Firewalls-OpenBSD-PF-2nd/dp/8391665119 Jacek Artymiak - Building Firewalls with OpenBSD and PF, 2nd edition]&lt;br /&gt;
* [http://www.nostarch.com/pf2.htm Peter N. M. Hansteen: The Book of PF, 2nd Edition - A No-Nonsense Guide to the OpenBSD Firewall]&lt;br /&gt;
&lt;br /&gt;
=== FreeBSD audit ===&lt;br /&gt;
* faschistoides Logging von Systemcalls&lt;br /&gt;
* präventiv wirkungslos, aber in der post-mortem Analyse extrem hilfreich&lt;br /&gt;
* [http://www.freebsd.org/doc/de_DE.ISO8859-1/books/handbook/audit.html FreeBSD Kapitel 17. Security Event Auditing]&lt;br /&gt;
* in /etc/rc.conf&lt;br /&gt;
 &amp;lt;code&amp;gt; auditd_enable=&amp;quot;YES&amp;quot; &amp;lt;/code&amp;gt;&lt;br /&gt;
* start auditd:&lt;br /&gt;
** &amp;lt;code&amp;gt;# /etc/rc.d/auditd start&amp;lt;/code&amp;gt;&lt;br /&gt;
* in /etc/security/audit_control:&lt;br /&gt;
 flags:lo,aa,ex&lt;br /&gt;
 policy:cnt,argv&lt;br /&gt;
 synchronize config: audit -s&lt;br /&gt;
* cronjob für die logs: /etc/crontab&lt;br /&gt;
 &amp;lt;code&amp;gt;0     */12       *       *       *       root    /usr/sbin/audit -n&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Jails ==&lt;br /&gt;
Jails dienen der Virtualisierung von Betriebssysteminstanzen. Näheres dazu im [http://www.freebsd.org/doc/de_DE.ISO8859-1/books/handbook/jails.html FreeBSD Handbuch Kapitel 15 - Jails].&lt;br /&gt;
&lt;br /&gt;
=== Jail Verzeichnis mit ZFS anlegen ===&lt;br /&gt;
* beim ersten Mal&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;code&amp;gt;&lt;br /&gt;
 # zfs create zpool/jails&lt;br /&gt;
 # zfs set mountpoint=/usr/home/jails zpool/jails&lt;br /&gt;
 &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* ansonsten reicht es&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;code&amp;gt;&lt;br /&gt;
 # zfs create zpool/jails/$JAILNAME&lt;br /&gt;
 &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Anlegen eines Jails ===&lt;br /&gt;
* &amp;lt;code&amp;gt;# cd /usr/src&amp;lt;/code&amp;gt;&lt;br /&gt;
* evtl. erst Sourcen installieren: sysinstall-&amp;gt; configure -&amp;gt; distributions&lt;br /&gt;
* evtl. &amp;lt;code&amp;gt;# make buildworld&amp;lt;/code&amp;gt;&lt;br /&gt;
* Jails liegen unter /home/jails/$JAILNAME&lt;br /&gt;
* System für jail bauen:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 # make installworld DESTDIR=/home/jails/$JAILNAME&lt;br /&gt;
 # make distribution DESTDIR=/home/jails/$JAILNAME&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* device nodes ins jail packen&lt;br /&gt;
** &amp;lt;code&amp;gt;# mount -t devfs devfs /home/jails/$JAILNAME/dev&amp;lt;/code&amp;gt;&lt;br /&gt;
* resolv.conf vom Host kopieren&lt;br /&gt;
** &amp;lt;code&amp;gt;# cp /etc/resolv.conf /home/jails/$JAILNAME/etc/resolv.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
* rc.conf editieren:&lt;br /&gt;
 jail_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
 jail_list=&amp;quot;$JAILNAME&amp;quot;&lt;br /&gt;
 ifconfig_bce0_alias0=&amp;quot;$JAIL_IP netmask 255.255.255.0&amp;quot;&lt;br /&gt;
 jail_$JAILNAME_rootdir=&amp;quot;/path/to/jails/$JAILNAME&amp;quot;&lt;br /&gt;
 jail_$JAILNAME_hostname=&amp;quot;$JAILNAME.domain.tld&amp;quot;&lt;br /&gt;
 jail_$JAILNAME_ip=&amp;quot;$JAIL_IP&amp;quot;&lt;br /&gt;
 jail_$JAILNAME_devfs_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
 jail_$JAILNAME_devfs_ruleset=&amp;quot;devfsrules_jail&amp;quot;&lt;br /&gt;
* jail starten &lt;br /&gt;
** &amp;lt;code&amp;gt;# /etc/rc.d/jail start&amp;lt;/code&amp;gt;&lt;br /&gt;
* Prozess im jail starten &lt;br /&gt;
** &amp;lt;code&amp;gt;# jexec $JAIL_ID tcsh&amp;lt;/code&amp;gt;&lt;br /&gt;
** $JAIL_ID ermitteln mit &lt;br /&gt;
*** &amp;lt;code&amp;gt;# jls&amp;lt;/code&amp;gt;&lt;br /&gt;
* Defaultrouting einstellen&lt;br /&gt;
** etc/rc.conf&lt;br /&gt;
*** defaultrouting=&amp;quot;&amp;lt;&#039;&#039;&#039;IP&#039;&#039;&#039; oder &#039;&#039;&#039;interfacename&#039;&#039;&#039;:network&amp;gt;&amp;quot;&lt;br /&gt;
* portscollection installieren&lt;br /&gt;
** &amp;lt;code&amp;gt;# portsnap fetch extract &amp;lt;/code&amp;gt;&lt;br /&gt;
* portscollection updaten&lt;br /&gt;
** &amp;lt;code&amp;gt;# portsnap fetch update &amp;lt;/code&amp;gt;&lt;br /&gt;
* evtl. ssh anschalten (in rc.conf)&lt;br /&gt;
 &amp;lt;code&amp;gt;sshd_enable=&amp;quot;YES&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
* /etc/host&lt;br /&gt;
 &amp;lt;code&amp;gt; #.#.#.#  JAILNAME.stura.htw-dresden.de &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Löschen eines Jails ===&lt;br /&gt;
* ins jailroot wechseln (/home/jails/$JAILNAME)&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 # chflags -R noschg *&lt;br /&gt;
 # rm -rf *&lt;br /&gt;
 # cd .. &amp;amp;&amp;amp; rm -r $JAILNAME (ohne ZFS)&lt;br /&gt;
 # cd .. &amp;amp;&amp;amp; zfs destroy tank/PATH/$JAILNAME (mit ZFS)&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tricks, Probleme etc. ===&lt;br /&gt;
* sich evtl. ezjail mal anschauen (war damals kaputt)&lt;br /&gt;
* ping aus jails heraus erlauben&lt;br /&gt;
** host: allow_raw_socket=1 via&lt;br /&gt;
*** &amp;lt;code&amp;gt;# sysctl security.jail.allow_raw_sockets=1&amp;lt;/code&amp;gt;&lt;br /&gt;
*** bzw. in /etc/sysctl.conf setzen&lt;br /&gt;
*** [http://www.cyberciti.biz/faq/freebsd-jail-allow-ping-tracerouter-commands/ Quelle]&lt;br /&gt;
* ssh:&lt;br /&gt;
** etc/ssh/sshd_config: &lt;br /&gt;
 &amp;lt;code&amp;gt;ListenAddress 0.0.0.0&amp;lt;/code&amp;gt;&lt;br /&gt;
* [http://www.freebsd.org/cgi/url.cgi?ports/ports-mgmt/jailaudit/pkg-descr jailaudit]&lt;br /&gt;
* Apache [http://www.freebsd.org/cgi/url.cgi?ports/www/mod_jail/pkg-descr mod_jail] als Alternative zu mod_chroot&lt;br /&gt;
* Linux in den jails&lt;br /&gt;
** [http://blog.vx.sk/archives/22-Updated-Tutorial-Debian-GNUkFreeBSD-in-a-FreeBSD-jail.html Debian im FreeBSD jail]&lt;br /&gt;
** [http://wiki.freebsd.org/Image/Linux/CentOS55 CentOS]&lt;br /&gt;
&lt;br /&gt;
== ssh ==&lt;br /&gt;
* [http://openssh.com/ openssh]&lt;br /&gt;
* ssh auf anderen port legen&lt;br /&gt;
* Vorschläge für /etc/ssh/sshd_config:&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
 VersionAddendum&lt;br /&gt;
 Port $SSH_PORTNUMMER&lt;br /&gt;
 ListenAddress $JAIL_IP&lt;br /&gt;
 Protocol 2&lt;br /&gt;
 SyslogFacility AUTH&lt;br /&gt;
 LogLevel INFO&lt;br /&gt;
 LoginGraceTime 1m&lt;br /&gt;
 PermitRootLogin no&lt;br /&gt;
 StrictModes yes&lt;br /&gt;
 MaxAuthTries 4&lt;br /&gt;
 MaxSessions 5&lt;br /&gt;
 AllowUsers $DER_COOLE_LEUTE_CLUB #einzelne user nur mit leerzeichen trennen&lt;br /&gt;
 PermitEmptyPasswords no&lt;br /&gt;
 X11Forwarding no&lt;br /&gt;
 Banner none&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* immer schön manpage lesen und mit dem Feinkamm durchgehen&lt;br /&gt;
* keys + passwörter zur Authentifizierung&lt;br /&gt;
* in jails:&amp;lt;code&amp;gt;&#039;&#039;&#039;ListenAddress 0.0.0.0&#039;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Email ==&lt;br /&gt;
* MTA: [http://www.postfix.org/ postfix]&lt;br /&gt;
* MDA: [http://www.courier-mta.org/maildrop/ maildrop]&lt;br /&gt;
* IMAP server: [http://www.dovecot.org/ dovecot]&lt;br /&gt;
* MUA (clientseitig) empfohlen:&lt;br /&gt;
** [https://www.mozilla.org/de/thunderbird/ Mozilla Thunderbird]&lt;br /&gt;
** [http://sup.rubyforge.org/ sup]&lt;br /&gt;
*** [https://rubygems.org/ rubygems installieren]&lt;br /&gt;
*** archiv [https://rubygems.org/pages/download#formats runterladen] und entpacken&lt;br /&gt;
*** z.B. &amp;lt;code&amp;gt;wget http://production.cf.rubygems.org/rubygems/rubygems-1.8.10.tgz&amp;lt;/code&amp;gt;&lt;br /&gt;
*** in den entpackten ordner wechseln&lt;br /&gt;
*** als root: &amp;lt;code&amp;gt;ruby setup.rb&amp;lt;/code&amp;gt;&lt;br /&gt;
*** rubygems updaten: &amp;lt;code&amp;gt;gem18 update --system&amp;lt;/code&amp;gt;&lt;br /&gt;
*** &amp;lt;code&amp;gt;gem18 install rake&amp;lt;/code&amp;gt;&lt;br /&gt;
*** &amp;lt;code&amp;gt;gem18 install ncursesw&amp;lt;/code&amp;gt; ... &#039;&#039;broken?&#039;&#039;&lt;br /&gt;
*** sup aus den gems installieren: &amp;lt;code&amp;gt;gem18 install sup&amp;lt;/code&amp;gt;&lt;br /&gt;
*** als user im home verzeichnis: &amp;lt;code&amp;gt;sup-config&amp;lt;/code&amp;gt;&lt;br /&gt;
*** aufruf: &amp;lt;code&amp;gt;sup-mail&amp;lt;/code&amp;gt; ... und schön durch die emails pflügen&lt;br /&gt;
** [http://www.mutt.org/ mutt]&lt;br /&gt;
*** config file &amp;quot;~/.muttrc&amp;quot;&lt;br /&gt;
 set mbox_type=Maildir&lt;br /&gt;
 set folder=&amp;quot;~/Mail&amp;quot;&lt;br /&gt;
 set mask=&amp;quot;!^\\.[^.]&amp;quot;&lt;br /&gt;
 set mbox=&amp;quot;~/Mail&amp;quot;&lt;br /&gt;
 set spoolfile=&amp;quot;~/Mail&amp;quot;&lt;br /&gt;
 set editor=&amp;quot;mg&amp;quot;&lt;br /&gt;
 set charset=&amp;quot;utf-8&amp;quot;&lt;br /&gt;
 set realname=&amp;quot;XXX (StuRa HTW Dresden)&amp;quot;&lt;br /&gt;
 set from=&amp;quot;XXX@stura.htw-dresden.de&amp;quot;&lt;br /&gt;
 set use_from=yes&lt;br /&gt;
 set mime_forward=yes&lt;br /&gt;
 set mime_forward_rest=yes&lt;br /&gt;
&lt;br /&gt;
=== MTA: postfix ===&lt;br /&gt;
* in the email jail&lt;br /&gt;
* &amp;lt;code&amp;gt;# cd /usr/ports/mail/postfix&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;# make install clean&amp;lt;/code&amp;gt;&lt;br /&gt;
** postfix added to group mail -&amp;gt; y&lt;br /&gt;
** Would you like to activate Postfix in /etc/mail/mailer.conf -&amp;gt; y&lt;br /&gt;
* Einstellungen (Auszug + aliases)&lt;br /&gt;
** edit /usr/local/etc/postfix/main.cf:&lt;br /&gt;
 local_recipient_maps = $alias_maps&lt;br /&gt;
 unknown_local_recipient_reject_code = 550&lt;br /&gt;
 mynetworks = 127.0.0.0/8&lt;br /&gt;
 myhostname = mail.stura.htw-dresden.de&lt;br /&gt;
 mydomain = stura.htw-dresden.de&lt;br /&gt;
 myorigin = $mydomain&lt;br /&gt;
 mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain&lt;br /&gt;
 inet_interfaces = all&lt;br /&gt;
 alias_maps = hash:/etc/aliases&lt;br /&gt;
 alias_database = hash:/etc/aliases&lt;br /&gt;
 home_mailbox = Maildir/&lt;br /&gt;
 mail_spool_directory = /var/spool/mail&lt;br /&gt;
 relay_domains = stura.htw-dresden.de&lt;br /&gt;
 smtpd_sender_restrictions = reject_unknown_sender_domain,&lt;br /&gt;
        reject_non_fqdn_sender&lt;br /&gt;
 smtpd_recipient_restrictions = reject_invalid_hostname,&lt;br /&gt;
        reject_unknown_recipient_domain,&lt;br /&gt;
        reject_unauth_destination,&lt;br /&gt;
        reject_rbl_client sbl.spamhaus.org,&lt;br /&gt;
        permit&lt;br /&gt;
 smtpd_helo_restrictions = reject_invalid_helo_hostname,&lt;br /&gt;
        reject_non_fqdn_helo_hostname,&lt;br /&gt;
        reject_unknown_helo_hostname&lt;br /&gt;
 smtpd_client_restrictions = reject_rbl_client dnsbl.sorbs.net&lt;br /&gt;
&lt;br /&gt;
==== Links ====&lt;br /&gt;
* [http://www.postfix.org/ The Postfix Home Page]&lt;br /&gt;
* [http://chains.ch/docs/postfix-UCE-HOWTO-de.html Postfix UCE HOWTO] (Spamkontrolle)&lt;br /&gt;
&lt;br /&gt;
=== IMAP-Server dovecot ===&lt;br /&gt;
* dovecot&lt;br /&gt;
** optionen: kqueue, ssl, managesieve, mysql&lt;br /&gt;
 &amp;lt;code&amp;gt;# echo &#039;dovecot_enable=&amp;quot;YES&amp;quot;&#039; &amp;gt;&amp;gt; /etc/rc.conf&lt;br /&gt;
 # cp /usr/local/share/examples/dovecot/dovecot.conf /usr/local/etc/dovecot/dovecot.conf&lt;br /&gt;
 # cp /usr/local/share/examples/dovecot/dovecot-sql.conf /usr/local/etc/dovecot/dovecot-sql.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
* dovecot2&lt;br /&gt;
** optionen: kqueue, ssl, mysql&lt;br /&gt;
 &amp;lt;code&amp;gt;&lt;br /&gt;
 # cp /usr/local/share/doc/dovecot/example-config/dovecot.conf /usr/local/etc/dovecot/dovecot.conf&lt;br /&gt;
 # cp /usr/local/share/doc/dovecot/example-config/dovecot-sql.conf /usr/local/etc/dovecot/dovecot-sql.conf&lt;br /&gt;
 &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* in /usr/local/etc/dovecot.conf: (vorerst zum testen)&lt;br /&gt;
 &amp;lt;code&amp;gt; &lt;br /&gt;
 protocols = imap pop3&lt;br /&gt;
 disable_plaintext_auth = no&lt;br /&gt;
 ssl = no&lt;br /&gt;
 mail_location = mbox:~/mail/:INBOX=/var/mail/%u&lt;br /&gt;
 mail_privileged_group = mail&lt;br /&gt;
 protocol imap {&lt;br /&gt;
   imap_client_workarounds = delay-newmail outlook-idle netscape-eoh tb-extra-mailbox-sep&lt;br /&gt;
 }&amp;lt;/code&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Krypto drankleben (imap -&amp;gt; imaps, pop3 -&amp;gt; pop3s)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== MDA: maildrop ===&lt;br /&gt;
* maildir in users homeverzeichnis anlegen&lt;br /&gt;
 maildirmake Mail&lt;br /&gt;
* im homeverzeichnis die Datei .mailfilter anlegen:&lt;br /&gt;
 MAILBOX=&amp;quot;$HOME/Mail&amp;quot;&lt;br /&gt;
 DEFAULT=&amp;quot;$MAILBOX&amp;quot;&lt;br /&gt;
* chmod 600 .mailfilter&lt;br /&gt;
* maildrop in postfix main.cf einarbeiten&lt;br /&gt;
 mailbox_command = /usr/local/bin/maildrop -d ${USER}&lt;br /&gt;
&lt;br /&gt;
=== Tricks etc. ===&lt;br /&gt;
* alias-Adressen anlegen&lt;br /&gt;
** edit: /usr/local/etc/postfix/main.cf:&lt;br /&gt;
 alias_maps = hash:/etc/aliases, hash:/etc/aliases.stura&lt;br /&gt;
 alias_database = hash:/etc/aliases,hash:/etc/aliases.stura&lt;br /&gt;
* edit /etc/aliases.stura&lt;br /&gt;
* in das Postfix laden:&lt;br /&gt;
 &amp;lt;code&amp;gt;# newaliases&lt;br /&gt;
 # postfix reload&lt;br /&gt;
 # usr/local/etc/rc.d/postfix restart&amp;lt;/code&amp;gt;&lt;br /&gt;
* SMTP testen:&lt;br /&gt;
 &amp;lt;code&amp;gt;# nc $JAIL_IP 25&lt;br /&gt;
 # HELO microsoft.com&lt;br /&gt;
 # MAIL FROM:&amp;lt;bill@microsoft.com&amp;gt;&lt;br /&gt;
 # RCPT TO:&amp;lt;test@stura.htw-dresden.de&amp;gt;&lt;br /&gt;
 # DATA&lt;br /&gt;
 # From: &amp;lt;bill@microsoft.com&amp;gt;&lt;br /&gt;
 # To: &amp;lt;stest@stura.htw-dresden.de&amp;gt;&lt;br /&gt;
 # Subject: hui&lt;br /&gt;
 # das hätte nicht passieren sollen&lt;br /&gt;
 # .&lt;br /&gt;
 # QUIT&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Plone ==&lt;br /&gt;
* JoSch damals gebaut, zwischenzeitlich grundsaniert&lt;br /&gt;
* [http://www.freebsdforums.org/how-to-install-apache-for-freebsd/ Apache] installiert&lt;br /&gt;
* apache 22 optionen:&lt;br /&gt;
** mod_ssl&lt;br /&gt;
** mod_rewrite&lt;br /&gt;
** mod_deflate&lt;br /&gt;
** ipv6&lt;br /&gt;
* apr ohne berkeley db und gnu db&lt;br /&gt;
* [http://plone.org/documentation/kb/freebsdploneapache/preparefreebsd http://plone.org/documentation/kb/freebsdploneapache/preparefreebsd]&lt;br /&gt;
* [http://plone.org/products/plone/releases http://plone.org/documentation/kb/freebsdploneapache/preparefreebsd]&lt;br /&gt;
&lt;br /&gt;
== DNS ==&lt;br /&gt;
* genutzt werden DNS Server des [https://www.foebud.org/ FoeBuD] und des CCC&lt;br /&gt;
* zusätzlich (für [http://www.opennicproject.org/ OpenNIC])&lt;br /&gt;
** DE,NRW 217.79.186.148 ns1.nrw.de.dns.opennic.glue Günter Grodotzki yes (no logs kept)&lt;br /&gt;
** NZ 27.110.120.30 ns1.nz.dns.opennic.glue Dean Gardiner yes (24 hrs)&lt;br /&gt;
&lt;br /&gt;
== Tipps, Tricks etc. ==&lt;br /&gt;
* die Änderungen an Konfigurationsdateien (z.b. in /etc) via [http://git-scm.com/ git] tracken&lt;br /&gt;
* disk quotas für jails einrichten&lt;br /&gt;
* systemweite make.conf bauen&lt;br /&gt;
* rc.conf bzw. /etc/rc neu laden ohne reboot&lt;br /&gt;
** Achtung: über Konsole direkt am Gerät (single user mode verliert Netzwerkzugriff!)&lt;br /&gt;
 # shutdown now&lt;br /&gt;
 (Note: without -r or -h)&lt;br /&gt;
 # return&lt;br /&gt;
 # exit&lt;br /&gt;
* netzwerk (services) über ssh neu starten:&lt;br /&gt;
 # /etc/rc.d/netif restart &amp;amp;&amp;amp; /etc/rc.d/routing restart&lt;br /&gt;
&lt;br /&gt;
=== Eigene Scripte ===&lt;br /&gt;
Wo:&lt;br /&gt;
* /root/scripte&lt;br /&gt;
Welche:&lt;br /&gt;
* Netzwerk neustart&lt;br /&gt;
** networkrestart.sh&lt;br /&gt;
* Startup script&lt;br /&gt;
** startsetup.sh&lt;br /&gt;
* ports Updaten&lt;br /&gt;
** portsup.sh&lt;br /&gt;
* jails bauen&lt;br /&gt;
** jailbuilder.sh&lt;br /&gt;
*** Anwenden&lt;br /&gt;
 # ./jailbuilder.sh $JAILNAME&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== USB-Stick bauen ===&lt;br /&gt;
* auf einem FreeBSD&lt;br /&gt;
* Image runterladen:&lt;br /&gt;
 wget ftp://ftp.de.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/8.2/FreeBSD-8.2-RELEASE-amd64-memstick.img&lt;br /&gt;
* Image auf Stick dumpen&lt;br /&gt;
 dd if=FreeBSD-8.2-RELEASE-amd64-memstick.img of=/dev/da0 bs=64k&lt;br /&gt;
&lt;br /&gt;
== Server Setup Beschreibung ==&lt;br /&gt;
* /boot UFS, der Rest ZFS&lt;br /&gt;
* irgendwas zum booten nehmen (USB, DVD) und ab in die Fixit shell&lt;br /&gt;
* MBR Geometrie baun&lt;br /&gt;
 gpart create -s mbr ad4&lt;br /&gt;
* nachschauen, ob es geklappt hat&lt;br /&gt;
 gpart show ad4&lt;br /&gt;
* den Rest der Platte mit FreeBSD belegen&lt;br /&gt;
 gpart add -s (aus gpart show Größe -1 )GB -t freebsd ad4&lt;br /&gt;
* riesigen BSD-slice anlegen&lt;br /&gt;
 gpart create -s BSD ad4s1&lt;br /&gt;
* partitionen anlegen&lt;br /&gt;
 gpart add -s 1G -t freebsd-ufs ad4s1&lt;br /&gt;
 gpart add -s 4G -t freebsd-swap ad4s1&lt;br /&gt;
 gpart add -t freebsd-zfs ad4s1&lt;br /&gt;
* Partition als aktiv markieren (falls andere schon drauf sind und von denen gebootet werden soll)&lt;br /&gt;
 gpart set -a active -i 1 ad0&lt;br /&gt;
&lt;br /&gt;
== Verweise etc. ==&lt;br /&gt;
* [http://www.freebsd.org FreeBSD.org] - [http://www.freebsd.org/doc/de_DE.ISO8859-1/books/handbook/ Handbuch]&lt;br /&gt;
* [http://www.freebsdwiki.net/ FreeBSD-wiki]&lt;br /&gt;
* [http://cb.vu/unixtoolbox.xhtml Unix Toolbox]&lt;br /&gt;
* [http://openbsd.org/faq/pf/de/index.html PF: Der OpenBSD Packet Filter]&lt;br /&gt;
&lt;br /&gt;
=== Intern ===&lt;br /&gt;
* [[Server/Hauptsystem]]&lt;br /&gt;
&lt;br /&gt;
=== Bücher ===&lt;br /&gt;
* [http://nostarch.com/abs_bsd2.htm Absolute FreeBSD, 2nd Edition]&lt;br /&gt;
* [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470376031.html BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD]&lt;br /&gt;
* [http://nostarch.com/freebsdserver.htm Building a Server with FreeBSD 7]&lt;br /&gt;
* [http://nostarch.com/pf2.htm Book of PF, 2nd Edition]&lt;br /&gt;
* [http://www.amazon.com/Building-Firewalls-OpenBSD-PF-2nd/dp/8391665119 Jacek Artymiak - Building Firewalls with OpenBSD and PF, 2nd edition]&lt;br /&gt;
* [http://nostarch.com/endingspam.htm Ending Spam]&lt;br /&gt;
* [http://nostarch.com/networks.htm Network Know-How - An Essential Guide for the Accidental Admin]&lt;br /&gt;
* [http://nostarch.com/tcpip.htm Charles M. Kozierok: TCP/IP Guide - A Comprehensive, Illustrated Internet Protocols Reference]&lt;br /&gt;
* [http://nostarch.com/wcss.htm Dave Taylor: Wicked Cool Shell Scripts - 101 Scripts for Linux, Mac OS X, and UNIX Systems]&lt;br /&gt;
&lt;br /&gt;
[[Kategorie:Rechentechnik]]&lt;/div&gt;</summary>
		<author><name>193.158.112.210</name></author>
	</entry>
</feed>