TAILIEUCHUNG - Securing Linux step-by-step

Several other mail transfer agents are available to replace sendmail. Two popular aternatives are Qmail () by David Bernstein, and Postfix () by Wietse Venema. Both of these MTAs were designed and written from the ground up with security and performance in mind. It is beyond the scope of this guide to give details on installing and configuring either of these alternatives, but a wealth of information is available on the Internet. | Securing Server Network Configurations Step . Install an alternative MTA Several other mail transfer agents are available to replace sendmail. Two popular aternatives are Qmail by David Bernstein and Postfix by Wietse Venema. Both of these MTAs were designed and written from the ground up with security and performance in mind. It is beyond the scope of this guide to give details on installing and configuring either of these alternatives but a wealth of information is available on the Internet. Step . Secure the POP and IMAP daemons For mail servers that collect all incoming mail for an organization a common means to deliver the mail to clients is for them to retrieve the mail using the Post Office Protocol POP or the Internet Message Access Protocol IMAP . POP is the older and simpler of the two protocols providing basic commands for authentication retrieval and deletion of mail messages from the mail server. IMAP is more flexible and supports creating deleting and renaming mail folders mailboxes searching selective retrieval of message attributes and more. Step . Get the latest version of POP and IMAP daemons Unfortunately many POP and IMAP daemon implementations have been plagued with vulnerabilities that lead to remote root compromises of mail servers on many platforms. There are several well-known exploit programs available for cracking vulnerable Linux POP and IMAP daemons. Hopefully most of the problems have been found and fixed but it is very important to have the absolute latest version of the daemon program installed on the server. Step . Control access to POP and IMAP with TCP wrappers POP IMAP is traditionally run out of inetd so access control through TCP wrappers is easy and very important. Limit access to only those hosts that have a legitimate need for the service. For a mail hub that holds mail for the entire domain and network and delivers it to clients with POP version 3 or

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.