Bài đăng

Đang hiển thị bài đăng từ Tháng 4, 2014

Postfix + Centos + Policyd V2 + MySQL

Requirements for Policyd v2 MySQL Net::Server >= 0.96 Net::CIDR Config::IniFiles (Debian based: libconfig-inifiles-perl, RPM based: perl-Config-IniFiles) Cache::FastMmap (Debian based: libcache-fastmmap-perl, RPM based: perl-Cache-FastMmap) Mail::SPF (Required for SPF) Requirements for webui PHP v5+ Download policyd v2 # wget http://downloads.sourceforge.net/project/policyd/2.0.x%20%28Stable%29/v2.0.7/cluebringer-2.0.7.tar.bz2?use_mirror=biznetnetworks Build rpm from source tarball # rpmbuild -ta cluebringer-2.0.7.tar.bz2 Install the rpm # rpm -ivh /usr/src/redhat/RPMS/cluebringer-2.0.7-1.noarch.rpm In database/ run… # for i in  core.tsql access_control.tsql quotas.tsql amavis.tsql checkhelo.tsql checkspf.tsql greylisting.tsql <- press enter > do <- press enter >  . /convert-tsql mysql $i <- press enter > done > policyd.mysql <- press enter This will build policyd.mysql, be

OpenSSL CSR Creation for Apache SSL

Hình ảnh
How to generate a CSR for Apache using OpenSSL Recommended: Save yourself some time by using our new OpenSSL CSR Wizard to create your apache ssl csr. Just fill in the details, click Generate, and paste your customized openssl command into your terminal. If you will be using Apache for Mac OS X server 10.5, see our Mac OS X CSR instructions. Of course if you prefer to build your own shell commands to generate your apache csr, just follow our old instructions below: 1.       Login to your server via your terminal client (ssh). At the prompt, type: # openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr Generate with SHA-2 # openssl req -new -newkey rsa:2048 -nodes -sha256 -out server .csr -keyout server .key where server is the name of your server. Country Name (2 letter code) [GB]:VN State or Province Name (full name) [Berkshire]:VietNam Locality Name (eg, city) [Newbury]:VietNam Organization Name (eg, company) [My Company Ltd]:Viet

Apache SSL Certificate Installation

Apache Server SSL Certificate Installation If you are installing an Extended Validation SSL Certificate, use our Apache EV SSL Certificate Installation Instructions . If you are installing any other certificate, follow the instructions below. Certificate: (format: X.509) -----BEGIN CERTIFICATE----- MIIFVTCCBD2gAwIBAgIQJ2AN1l+smcC69Q2DxhZ70DANBgkqhkiG9w0BAQUFADCB tTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykxMDEvMC0GA1UEAxMm ...... -----END CERTIFICATE----- Intermediate CA -----BEGIN CERTIFICATE----- MIIF7DCCBNSgAwIBAgIQbsx6pacDIAm4zrz06VLUkTANBgkqhkiG9w0BAQUFADCB yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJp U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxW ......... -----END CERTIFICATE----- Copy the Certifica

How to Setup Zimbra Collaboration Suite 8.0.3 Mail Server on CentOS 6.4 x86_64

Hình ảnh
Zimbra Collaboration Suite (ZCS) is a groupware product created by Zimbra, Inc. Zimbra email is one of the popular open source email in the world. Before we start installing ZCS email software, please make sure that all the prerequisites has been configured and installed. This post will describe the steps to setup Zimbra Collaboration Suite (ZCS) 8.0.3 Mail Server open source edition on CentOS 6.4 64 bit. ZCS 8.0.3 only released the 64 bit version for Redhat Linux Enteprise 6 (RHEL6) or CentOS 6 operating system. 1. Disabled SELINUX : [root@centos64 ~]# vi /etc/sysconfig/selinux # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these two values: # targeted - Targeted processes are protected, # mls - Mu

Zimbra Collaboration Server 7.2 Authentication and GAL lookups against FreeIPA

Hình ảnh
This document is written as an integration document to configure IPA as an Authentication Source as well as a Directory source for an already existing Zimbra installation. This document is not intended as a walkthrough on how to install and configure Zimbra Collaboration Server. This document was written and tested using Red Hat Enterprise Linux 6.2 x86_64 running Zimbra Collaboration Server 7.2 (Network Edition) For the purpose of this document, the following information is given Servers: IPA Server = ds01.example.com Zimbra Server = zimbra03.example.com IMPORTANT Please note, that by adding FreeIPA as the external authentication backend, the username "admin" will clash as both IPA and Zimbra use an admin account. you MUST set the following so that, should LDAP authentication fail for what ever reason, you will be able to still login with the local admin account. If you do not do this and you lose LDAP authentication, you will not be able to l