Online Book Reader

Home Category

UNIX System Administration Handbook - Evi Nemeth [5]

By Root 2640 0
Network Information Service

Netgroups

Prioritizing sources of administrative information

Advantages and disadvantages of NIS

How NIS works

Setting up an NIS domain

Vendor specifics

NIS+: son of NIS

LDAP: the Lightweight Directory Access Protocol

LDAP documentation and specifications

Hands-on LDAP

CHAPTER 19 ELECTRONIC MAIL

Mail systems

User agents

Transport agents

Delivery agents

Message stores

Access agents

Mail submission agents

The anatomy of a mail message

Mail addressing

Reading mail headers

Mail philosophy

Using mail servers

Using mail homes

Using IMAP or POP

Mail aliases

Getting mailing lists from files

Mailing to files

Mailing to programs

Examples of aliases

Mail forwarding

The hashed alias database

Mailing lists and list wrangling software

LDAP: the Lightweight Directory Access Protocol

sendmail: ringmaster of the electronic mail circus

The history of sendmail

Vendor-supplied versions of sendmail

sendmail installation

The switch file

Modes of operation

The mail queue

sendmail configuration

Using the m4 preprocessor

The sendmail configuration pieces

Building a configuration file from a sample .mc file

Basic sendmail configuration primitives

The VERSIONID macro

The OSTYPE macro

The DOMAIN macro

The MAILER macro

Fancier sendmail configuration primitives

The FEATURE macro

The use_cw_file feature

The redirect feature

The always_add_domain feature

The nocanonify feature

Tables and databases

The mailertable feature

The genericstable feature

The virtusertable feature

The ldap_routing feature

Masquerading and the MASQUERADE_AS macro

The MAIL_HUB and SMART_HOST macros

Masquerading and routing

The nullclient feature

The local_lmtp and smrsh features

The local_procmail feature

The LOCAL_* macros

Configuration options

Configuration file examples

A computer science student’s home machine

A small but sendmail-clueful company

Another master/client example

Spam-related features in sendmail

Relaying

The access database

Blacklisting users or sites

Header checking

Handling spam

Spam examples

Security and sendmail

Ownerships

Permissions

Safe mail to files and programs

Privacy options

Running a chrooted sendmail (for the truly paranoid)

Denial of service attacks

Forgeries

Message privacy

SASL: the Simple Authentication and Security Layer

sendmail statistics, testing, and debugging

Testing and debugging

Verbose delivery

Talking in SMTP

Logging

The Postfix mail system

Postfix architecture

Configuring Postfix

Spam control

Postfix examples

Recommended reading

CHAPTER 20 NETWORK MANAGEMENT AND DEBUGGING

Troubleshooting a network

ping: check to see if a host is alive

traceroute: trace IP packets

netstat: get tons o’ network statistics

Monitoring the status of network connections

Inspecting interface configuration information

Examining the routing table

Viewing operational statistics for various network protocols

Packet sniffers

snoop: Solaris’s packet sniffer

nettl: HP-UX’s packet sniffer

tcpdump: king of sniffers

Network management protocols

SNMP: the Simple Network Management Protocol

SNMP organization

SNMP protocol operations

RMON: remote monitoring MIB

SNMP agents

SNMP on Solaris

SNMP on HP-UX

The UCD SNMP agent

Network management applications

The UCD SNMP tools

MRTG: the Multi-Router Traffic Grapher

NOCOL: Network Operation Center On-Line

Commercial management platforms

Recommended reading

CHAPTER 21 SECURITY

Seven common-sense rules of security

How security is compromised

Security problems in the /etc/passwd file

Password checking and selection

Shadow passwords

Group logins and shared logins

Password aging

User shells

Rootly entries

Setuid programs

Important file permissions

Miscellaneous security issues

Remote event logging

Return Main Page Previous Page Next Page

®Online Book Reader