Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Firewall Configuration Strategies
The Application Layer Chapter 7. Where are we now?
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Guide to Operating System Security Chapter 10 Security.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Mail Server Setup MAIL SERVER SETUP.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1 Web Server Administration Chapter 8 Providing Services.
Chapter 7: Using Windows Servers to Share Information.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Human-Computer Interface Course 5. ISPs and Internet connection.
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
S ystem P rogrammers' A ssociation for R esearching C omputer S ystems Popular MTAs EXIM & POSTFIX SPARCS 10 이대근 (harry)
Web Server Administration Chapter 10 Securing the Web Environment.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
SMTP/POSTFIX.
Chapter 13 – Network Security
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Mail Service Mail Service using Postfix Campus-Booster ID : **XXXXX
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Mailserver. Why Postfix ? Sendmail’s legacy Built from ground up Central queue-ing More future-proof Exim4 default of debian, but...
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
Proxy Server PROXY SERVER. What is a Web Proxy? Proxy Server A proxy is a host which relays web access requests from clients Used when clients do not.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
CHAPTER 9 Sniffing.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
1 COP 4343 Unix System Administration Unit 14: – send and receive mail – mail filtering – mail server – mailing lists.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
SMTP / MIME Florin Zidaru.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Security fundamentals Topic 9 Securing internet messaging.
INTRODUCTION Using Electronic one can send message to, can receive usages from other computer users anywhere in the world. is most common and.
1 Web Server Administration Chapter 8 Providing Services.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Understanding POP3 / IMAP Created by : Ashish Shah, J. M. Patel College of Commerce 1.
Internet Business Associate v2.0
Mail Server Basic.
Secure Software Confidentiality Integrity Data Security Authentication
LINUX ADMINISTRATION 1
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
TYPES OF SERVER. TYPES OF SERVER What is a server.
IIS.
Information Security Session October 24, 2005
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
Chapter 7 Network Applications
Presentation transcript:

Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier- to use, replacement for sendmail. easy to configure postfix as compared to sendmail. syntax of defining mail relay host: o Postfix : relay.example.com simple configuration of postfix compared to sendmail as it need not any macro processor to generate or modify configuration files.

Configuration of postfix Postfix is verified for installation as follow [root#]rpmquery –qa|grep postfix. If postfix is not installed then its installation as follows [root#]rpm -ivh postfix(name of file) Where name of the file is the version of postfix packages

Postfix primary configuration file is /etc/postfix/main.cf. in these file, there is need to make changes as follow: A) my domain variable specifies the domain name of user: mydomainname=example.com B) myhostname is a variable which identifies the local machine’s fully qual domain name myhostname=tyit.example.com C) myorigin variable identifies the domain name myorigin = $mydomain

D)My destination variable tells the postfix what addresses it should delivered My destination = $myhostname, localhost,$mydomain

User needs aliases for postfix, postmaster & root so that mail sent to are received to real person. To achieve these, the following entries /etc/aliases: #vi /etc/aliases Postfix : root Postmaster: root Root:john The alias database using postfix’s new aliases command is regenerated as /etc/aliases was modified. the common is as shown below: #newaliases.

Finally the daemon of postfix is stared as shown below: #services postfix start Starting postfix:[ok] Postfix s enabled on boot as follow: #chkconfig postfix on

To handle postfix log message user needs to modify the syslog configuration file add following entries: #vi /etc/syslog.conf Mail.*mail/var/log/maillog

Mail.err/var/log/mail.err Where /etc/syslog.conf is the file which control the system log To bring changes these change into effect, there is need to restart or start the services of syslog as follow: [root#]service syslog restart.

Running Postfix behind a firewall If system is not connected to internet on which postfix is configured or configure as a firewall or gateway, postfix will simply handover locally generated to relay host. This relay host must be configured to relay to the respective receiver. for the configuration, following 2 lines are added in /etc/postfixmain.cf relayhost =mailhost $mydomain disable_DNS_lookups = yes IP address of the relay host can also be specified as follow: relayhost = Finally the service of postfix is restarted as follow: [root#]service postfix restart Stopping postfix [ok] Starting postfix[ok]

Running postfix on a mail host User can create a mail host that handles the incoming mail for the system The configuration of mail host assumes that the relay host, named tyit.example.com is the only of entry for all traffic User need to set the following configuration variables on tyit.example.com: $myhostname $mydomain $myorigin $mydestination Tyit.example.com need to be told for which system it can relay mail. doing this involves setting 2 additional configuration variable as shown in example below. $ mynetwork= $relaydomains=example.com Mynetwork defines a list of trusted client, i.e. the list of client that postfixwill allow to relay mail. $ relaydomains defines the destination to which postfix will relay mail.

SERVING WITH POP3 AND IMAP Suppose windows system used as desktop n/w client ordinarily do not have an MTA of theirs own.Then such system requires access using IMAP & POP. A user can install both at a time i.e. IMAP & POP but can use only one at a time. Setting up IMAP server require the following :

(i) The IMAP implementation configuration is done with the help of dovecot IMAP sever. (ii) Dovecot has many features like support POP3 & IMAP which simplify initial setup & on going maintenance it mean, If user is configured IMAP server, he will get POP3 unless he disable the POP 3 services.

(iii) Dovecot also support POP3 & IMAP, which work for authentication & data exchange process. (iv) To configure any of the service it is necessary to check whether it is installed or not. Command to check whether Dovecot is installed is as follows: [root#]rpmquery -qa|grep dovecot

(v) Configuring Dovecot : If necessary package is installed,then configure the dovecot at the boot time. [root#]chkconfig dovecot ON

MAINTAINING SECURITY security is always a privacy issue even if the user is not mailing credit card number or corporate secrets. using S/MIME for security is only one of many steps to take to protect the integrity of users . There are some most comm0n vulnerabilities that can affect security :

(1) Protecting against Eavesdropping : (a) Because of store and forward Technique the users msg goes not only through one computer. (b) There are more possibilities that cracker can easily attack the users mail using a packet sniffer program to intercept passing mail messages. (2) Using encryption : (a)cryptography enables users message to be encrypted. So that sender & receiver can encrypt & transmit safely.

(b) Best way to encrypt data is to use digital signature. (3) Using Firewall: (a) User should set up a firewall to protect the network while receiving mail from people outside the network. (b) The firewall is a computer that prevent unauthorized data from reaching the n/w.

(4) Prevent being bombed, spammed or spoofed: (a) Bombing : it happen when someone continually or maliciously send data. (b) spamming : A spammer send non-reqd to many user. (c) Spoofing : it happens when someone sends from a false address.

5) SMTP should be dealt with care : (a) Use of a dedicated mail servers keep the no. of computers vulnerable to SMTP based attack to a least. (b) Network should have only or few centralized servers, depending on the size of users organization. (c) Allow only SMTP connection that come from outside user firewall to get those few central servers.