UNIX System Administration Handbook - Evi Nemeth [5]
Netgroups
Prioritizing sources of administrative information
Advantages and disadvantages of NIS
How NIS works
Setting up an NIS domain
Vendor specifics
NIS+: son of NIS
LDAP: the Lightweight Directory Access Protocol
LDAP documentation and specifications
Hands-on LDAP
CHAPTER 19 ELECTRONIC MAIL
Mail systems
User agents
Transport agents
Delivery agents
Message stores
Access agents
Mail submission agents
The anatomy of a mail message
Mail addressing
Reading mail headers
Mail philosophy
Using mail servers
Using mail homes
Using IMAP or POP
Mail aliases
Getting mailing lists from files
Mailing to files
Mailing to programs
Examples of aliases
Mail forwarding
The hashed alias database
Mailing lists and list wrangling software
LDAP: the Lightweight Directory Access Protocol
sendmail: ringmaster of the electronic mail circus
The history of sendmail
Vendor-supplied versions of sendmail
sendmail installation
The switch file
Modes of operation
The mail queue
sendmail configuration
Using the m4 preprocessor
The sendmail configuration pieces
Building a configuration file from a sample .mc file
Basic sendmail configuration primitives
The VERSIONID macro
The OSTYPE macro
The DOMAIN macro
The MAILER macro
Fancier sendmail configuration primitives
The FEATURE macro
The use_cw_file feature
The redirect feature
The always_add_domain feature
The nocanonify feature
Tables and databases
The mailertable feature
The genericstable feature
The virtusertable feature
The ldap_routing feature
Masquerading and the MASQUERADE_AS macro
The MAIL_HUB and SMART_HOST macros
Masquerading and routing
The nullclient feature
The local_lmtp and smrsh features
The local_procmail feature
The LOCAL_* macros
Configuration options
Configuration file examples
A computer science student’s home machine
A small but sendmail-clueful company
Another master/client example
Spam-related features in sendmail
Relaying
The access database
Blacklisting users or sites
Header checking
Handling spam
Spam examples
Security and sendmail
Ownerships
Permissions
Safe mail to files and programs
Privacy options
Running a chrooted sendmail (for the truly paranoid)
Denial of service attacks
Forgeries
Message privacy
SASL: the Simple Authentication and Security Layer
sendmail statistics, testing, and debugging
Testing and debugging
Verbose delivery
Talking in SMTP
Logging
The Postfix mail system
Postfix architecture
Configuring Postfix
Spam control
Postfix examples
Recommended reading
CHAPTER 20 NETWORK MANAGEMENT AND DEBUGGING
Troubleshooting a network
ping: check to see if a host is alive
traceroute: trace IP packets
netstat: get tons o’ network statistics
Monitoring the status of network connections
Inspecting interface configuration information
Examining the routing table
Viewing operational statistics for various network protocols
Packet sniffers
snoop: Solaris’s packet sniffer
nettl: HP-UX’s packet sniffer
tcpdump: king of sniffers
Network management protocols
SNMP: the Simple Network Management Protocol
SNMP organization
SNMP protocol operations
RMON: remote monitoring MIB
SNMP agents
SNMP on Solaris
SNMP on HP-UX
The UCD SNMP agent
Network management applications
The UCD SNMP tools
MRTG: the Multi-Router Traffic Grapher
NOCOL: Network Operation Center On-Line
Commercial management platforms
Recommended reading
CHAPTER 21 SECURITY
Seven common-sense rules of security
How security is compromised
Security problems in the /etc/passwd file
Password checking and selection
Shadow passwords
Group logins and shared logins
Password aging
User shells
Rootly entries
Setuid programs
Important file permissions
Miscellaneous security issues
Remote event logging