Anti Spam test: send an email …

Anti Spam test: send an email with the following string of characters:
XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X

Posted in Tweets | Comments Off on Anti Spam test: send an email …

Installing ClamAV & SpamAssassin to CentOS 5 with Sendmail

Installing these Mail Server open-source software sets to CentOS 5 with Sendmail on a 64-bit CentOS 5.4 (or higher) Linux host.

1. Install RPMForge Repo to get access to more Software Packages for CentOS5

Install (using rpm -Uvh) http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el5.rf.x86_64.rpm

2. Use yum to install from the previously installed RPMForge Repo the necessary software packages

yum -y install spamass-milter clamav-milter
yum -y install perl-Mail-SPF
yum -y install sendmail-cf

Restart spamd after installing the new SPF package with
/etc/init.d/spamassassin restart

Install DKIM for Message Signing with
yum -y install perl-Mail-DKIM

Check DKIM use by sending yourself an email from GMail and saving that message (headers and all) to a local text file, processing that file with
spamassassin -D < /tmp/gmail-msg.txt 2>&1 |grep -i dk

Install GeoIP for regional/geographic message filtering
yum -y install geoip

Check that all of ClamAV is installed with
yum -y install clamav clamav-db clamav-milter clamd

Check then on the settings in /etc/sysconfig/clamav-milter & then set/check on the following in /etc/clamav-milter.conf
MilterSocket unix:/var/clamav/clmilter.socket
User clamav
AllowSupplementaryGroups yes
ClamdSocket unix:/var/run/clamav/clamd.sock
LogFile /var/log/clamav/clamav-milter.log
LogFileMaxSize 0
LogTime yes
LogSyslog yes

Set/check the following in /etc/clamd.conf
LogFile /var/log/clamav/clamd.log
LogFileMaxSize 0
LogTime yes
LogSyslog yes
PidFile /var/run/clamav/clamd.pid
TemporaryDirectory /var/tmp
DatabaseDirectory /var/clamav
LocalSocket /var/run/clamav/clamd.sock
FixStaleSocket yes
TCPSocket 3310
TCPAddr 127.0.0.1
MaxConnectionQueueLength 30
MaxThreads 50
ReadTimeout 300
User clamav
AllowSupplementaryGroups yes
ScanPE yes
ScanELF yes
DetectBrokenExecutables yes
ScanOLE2 yes
ScanMail yes
ScanArchive yes
ArchiveBlockEncrypted no

Install SPF capabilities with
yum -y install smf-spf

3. Start Configuring main software servers

3a. Sendmail for ClamAV & SpamAssassin

Load the following to /etc/mail/sendmail.mc, placed above any MAILER definition and I place it after the line “FEATURE(use_ct_file)dnl”

dnl # LOCAL ADDITIONS before Mailers
dnl # clamav-milter - z README ... dnl
INPUT_MAIL_FILTER(`clamav-milter',`S=local:/var/clamav/clmilter.socket, F=,T=S:4m;R:4m;E:10m')dnl
dnl #
dnl # SPAMASSASSIN dnl
dnl **
dnl ** enable spamassassin-milter to scan for spam using spamassassin **
dnl **
INPUT_MAIL_FILTER(`spamassassin', `S=unix:/var/run/spamass.sock, F=, T=C:15m;S:4m;R:4m;E:10m')dnl
define(`confMILTER_MACROS_CONNECT',`t, b, j, _, {daemon_name}, {if_name}, {if_addr}')dnl
define(`confMILTER_MACROS_HELO',`s, {tls_version}, {cipher}, {cipher_bits}, {cert_subject}, {cert_issuer}')dnl
dnl # END LOCAL ADDITIONS
dnl #

You can test / check the newly installed & configured SpamAssassin with the command:
spamassassin -D < /usr/share/doc/spamassassin-3.2.5/sample-spam.txt 2>&1 |grep -i spf
Looking for lines like:
[1290] dbg: spf: using Mail::SPF for SPF checks
&
[1290] dbg: spf: def_spf_whitelist_from: already checked spf and didn’t get pass, skipping whitelist check
[1290] dbg: spf: whitelist_from_spf: already checked spf and didn’t get pass, skipping whitelist check

3b. Now rebuild the sendmail.cf from your updated sendmail.mc in /etc as root with

make

3c. Ensure all the dependent & requisite servers are running for Clam & SA with

chkconfig clamd on
chkconfig clamav-milter on
chkconfig spamass-milter on
chkconfig sendmail on
chkconfig dovecot on

3d. Then start everything in the same order as per their init.d files, with

service clamd start
service clamav-milter start
service spamass-milter start

3e. Then restart Sendmail with

service sendmail restart

3z. SPF config & enabling <- OPTIONAL, NOT YET WORKING! Configure for the SMF-SPF support in /etc/mail/sendmail.mc and remake sendmail.cf with cd /etc/mail
cat >> sendmail.mc < END dnl ** dnl ** enable smf-spf (Sender Policy Framework) ** dnl ** define(`confMILTER_MACROS_HELO', confMILTER_MACROS_HELO`, {verify}')dnl INPUT_MAIL_FILTER(`smf-spf', `S=unix:/var/run/smfs/smf-spf.sock, T=S:30s;R:1m')dnl END make

In /etc/mail as root run make to generate the new sendmail.cf & submit.cf Sendmail config files.

Start SPF and restart Sendmail with
/etc/init.d/smf-spf restart
/etc/init.d/sendmail restart

4. Testing / Verifying Setup

4a. Check /var/log/maillog

4b. Test with a manual SMTP dialog using the telnet command to the server from another remote host on the Internet (ie: NOT from the server itself) to port 25 on your Sendmail host.

Posted in Network Presence | Tagged , , , | Comments Off on Installing ClamAV & SpamAssassin to CentOS 5 with Sendmail

Weekly Tweets for 2011-06-12

Powered by Twitter Tools

Posted in Tweets | Comments Off on Weekly Tweets for 2011-06-12

N+1 Routers & route mesh in Sydney

We’ve completed an important phase of upgrading our connectivity in Sydney, which now has 3 live / production links to the Internet in Sydney, as well as a ‘back-channel’ link.

The crucial part here is that we’ve now enabled the full internal redistribution of known routes between our 3 x Border Routers, meaning that all Network Presence customers are now able to utilise peering connectivity for both incoming & outgoing data flows from their Network Presence service.

This means that customers can now push data out to networks that we ‘peer’ with, using the same gateway router from within our network which receives data from that peered network (symmetric data flows) and this maximises our customers’ use of the various Peering connections that Network Presence has, as well as provides multiple & redundant Internet connectivity for Network Presence, and is the “route mesh” that I refer to.

The best example of this ‘better’ routing is the outgoing data path from Network Presence to the AARNet national network, in that this “all routers have full knowledge of the paths available” means that we now use our gigabit path through to AARNet in Sydney and thus all Australian Universities and other academic or research institutions nationwide, providing a faster & ‘better’ route for Network Presence customers to deliver data to this network as an example.

The “N + 1 Routers” is the physical aspect of our routing redundancy, in that Network Presence always provisions an extra router chassis at its own built POPs (currently Sydney and Canberra in Australia). The aim here is that a physical router can fail and Network Presence will still be online, providing an internal layer of routing redundancy above & beyond the link/path redundancy achieved through a full mesh of our available routes across all routers.

The whole aim here is two-fold then, to provide fantastic Routing QoS, through having a number of different paths to the Internet and to maximise our ability to hand-off data to & from Australians by a high level of domestic national Peering connectivity, while also being able to automatically & quickly recover and survive any physical router failure too.

All to provide very high uptime & quality of networking for Network Presence customers.

Posted in Network Presence | Tagged , , , , | Comments Off on N+1 Routers & route mesh in Sydney

Tweets for 2011-06-11

  • Using our multiple Internet & Australian Peering links, we've delivered better Australian connectivity for a large AU client #NetPres #bgp #

Powered by Twitter Tools

Posted in Tweets | Comments Off on Tweets for 2011-06-11

Using our multiple Internet & …

Using our multiple Internet & Australian Peering links, we’ve delivered better Australian connectivity for a large AU client #NetPres #bgp

Posted in Tweets | Tagged | Comments Off on Using our multiple Internet & …

Tweets for 2011-06-10

Powered by Twitter Tools

Posted in Tweets | Comments Off on Tweets for 2011-06-10

Dedicated Minecraft VPS! RT @g…

Dedicated Minecraft VPS! RT @gamingau: Like #minecraft Can’t get on a server with friends? Contact us! http://tinyurl.com/5r8pjg2

Posted in Tweets | Comments Off on Dedicated Minecraft VPS! RT @g…

All our VPS Plans include IPv6…

All our VPS Plans include IPv6 addresses & native Internet IPv6 routing and connectivity! http://netpr.es/ipv6vps2 http://is.gd/DstbFh

Posted in Tweets | Comments Off on All our VPS Plans include IPv6…

Tweets for 2011-06-09

  • Got an early morning call from old corporate client looking for some return business, so I'm off to listen to #twist & "Don't burn bridges!" #

Powered by Twitter Tools

Posted in Tweets | Comments Off on Tweets for 2011-06-09