<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://hackerbruecke.net/</link>
        <lastBuildDate>Sun, 05 Apr 2026 21:14:53 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://hackerbruecke.net/</link>
        </image>
        <item>
            <title>hardware</title>
            <link>https://hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://hackerbruecke.net/linux/commserv/egroupware/config?rev=1293466841&amp;do=diff</link>
            <description>eGroupWare Version 1.4.001

pre-requisites:

	*  required PHP version 4.3+ (recommended 5+)
	*  php.ini: safe_mode = Off
	*  php.ini: magic_quotes_runtime = Off
	*  php.ini: register_globals = Off
	*  php.ini: memory_limit &gt;= 16M
	*  php.ini: max_execution_time &gt;= 30</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>syntax</title>
            <link>https://hackerbruecke.net/wiki/syntax?rev=1712421931&amp;do=diff</link>
            <description>Formatting Syntax

DokuWiki supports some simple markup language, which tries to make the datafiles to be as readable as possible. This page contains all possible syntax you may use when editing the pages. Simply have a look at the source of this page by pressing</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:45:31 +0000</pubDate>
        </item>
        <item>
            <title>all</title>
            <link>https://hackerbruecke.net/linux/debian/all?rev=1493131598&amp;do=diff</link>
            <description>2014-08-08



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

auf allen Server-Instanzen („Blech“, Linux VServer, LXC):



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=„&lt;http://proxy01.ukbw.de:3128/&gt;“

### LiHAS GPG-Key importieren:
wget -O -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:38 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>avast-ssl</title>
            <link>https://hackerbruecke.net/thunderbird/avast-ssl?rev=1293466844&amp;do=diff</link>
            <description>Thunderbird - SpamPal - Avast with SSL

1. Installing and preparing STUNNEL:

Download OPENSSL for Windows from: &lt;http://www.slproweb.com/products/Win32OpenSSL.html&gt; 

Download STUNNEL for WIndows from: &lt;http://www.stunnel.org/download/binaries.html&gt; 

and install both. 


In the folder where you have installed stunnel (e.g. C:\Programme\stunnel), you will create its configuration file.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>welcome</title>
            <link>https://hackerbruecke.net/wiki/welcome?rev=1684170792&amp;do=diff</link>
            <description>Welcome to your new DokuWiki

Congratulations, your wiki is now up and running. Here are a few more tips to get you started.

Enjoy your work with DokuWiki,

-- the developers

Create your first pages

Your wiki needs to have a start page. As long as it doesn&#039;t exist, this link will be red:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>sarg</title>
            <link>https://hackerbruecke.net/linux/commserv/squid/sarg?rev=1408135580&amp;do=diff</link>
            <description>SARG

/etc/crontab:
### SQUID-Monitoring via Sarg:
00 06-19/1 * * *        root    /usr/local/chhaas-skripts/sarg-reports.sh today &gt; /dev/nul
00 00 * * *     root    /usr/local/chhaas-skripts/sarg-reports.sh daily &gt; /dev/nul
00 01 * * 1     root    /usr/local/chhaas-skripts/sarg-reports.sh weekly &gt; /dev/nul
30 02 1 * *     root    /usr/local/chhaas-skripts/sarg-reports.sh monthly &gt; /dev/nul</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:46:20 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>sieve</title>
            <link>https://hackerbruecke.net/linux/email/cyrus/sieve?rev=1493131976&amp;do=diff</link>
            <description>Sieve

	*  &lt;http://sieve.info/&gt;
	*  &lt;http://en.wikipedia.org/wiki/Sieve_%28mail_filtering_language%29&gt;
	*  &lt;http://de.wikipedia.org/wiki/Sieve&gt;
	*  &lt;http://www.uni-koeln.de/rrzk/mail/software/sieve/sieve.html&gt;

Sieve and SSL / TLS

timsieved allows for SSL on connect (like https, imaps, or pop3s), only STARTTLS.

So you have to wrap it in an stunnel (www.stunnel.org), which is a another story ...

Have a look at this: &lt;http://lists.horde.org/archives/ingo/Week-of-Mon-20050704/000872.html&gt;

Testi…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:56 +0000</pubDate>
        </item>
        <item>
            <title>postgrey</title>
            <link>https://hackerbruecke.net/linux/email/greylisting/postgrey?rev=1493136147&amp;do=diff</link>
            <description>Greylisting

For a overview what greylisting does, have a look at www.greylisting.org/ 



There are several greylisting daemons for Postfix available. I stick to David Schweikert&#039;s Postgrey or to Lionel Bouton&#039;s SQLgrey in combination with it&#039;s web-interface http://www.vanheusden.com/sgwi/



Postgrey

Postgrey greylisting daemon</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:02:27 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>vmware</title>
            <link>https://hackerbruecke.net/endian/vmware?rev=1293466840&amp;do=diff</link>
            <description>Endian Firewall 2.12 Community Edition VMware-image

Thanks to Peter Warasin and Raphael Vallazza from endian, I put together some minimal docu for the VMware-image.


Standard users and passwords:

	*  Web-interface: admin, pwd.: endian
	*  Console: root, pwd: endian</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:40 +0000</pubDate>
        </item>
        <item>
            <title>credits</title>
            <link>https://hackerbruecke.net/linux/commserv/credits?rev=1293466841&amp;do=diff</link>
            <description>Credits

Credits go to the following persons (in alphabetical order), without their help my commserv would probably never have been working. If I forgot somebody by accident, please drop me a email:

	*  Markus Winkler, Chemnitz / Germany
		*  Manuel Zach, Vienna / Austria</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>todo</title>
            <link>https://hackerbruecke.net/linux/commserv/todo?rev=1293466842&amp;do=diff</link>
            <description>ToDo

Things, that have to be documented:

	*  generating the decrypted SSL-key with OpenSSL-CA
	*  use of TinyCA and phpki-CA
	*  Postfix: main.cf and master.cf
	*  implement &lt;http://www.contentschmiede.de/archiv/2005/08/26/postfix_fuer_typo3_und_gmx_fit_machen/&gt; in email -&gt; Postfix -&gt; SMTPd- / SMTP-Authentication</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:42 +0000</pubDate>
        </item>
        <item>
            <title>gnarwl</title>
            <link>https://hackerbruecke.net/linux/email/gnarwl?rev=1493131823&amp;do=diff</link>
            <description>Gnarwl

Download GNARWL software from &lt;http://www.home.unix-ag.org/patrick/index.php?gnarwl&gt; and download package named gnarwl-3.3.tgz 




Compile GNARWL for LDAP vacations
# tar xzvf gnarwl-3.3.tgz
# cd gnarwl-3.3
# ./configure
# make
# make install
# make perm
Adjust File /usr/local/etc/gnarwl.conf
map_sender $sender
map_receiver $recepient
map_subject $subject
map_field $fullname cn
map_field $deputy mail
server localhost
port 389
scope sub
login cn=admin,dc=example,dc=org
password IveGotASe…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:50:23 +0000</pubDate>
        </item>
        <item>
            <title>ca</title>
            <link>https://hackerbruecke.net/linux/commserv/ca/ca?rev=1293466844&amp;do=diff</link>
            <description>Certificate Authority

generate certificate and key-files using e.g. one of the follwing

	*  simple OpenSSL CA
	*  Tiny CA
	*  phpki CA




trusting your Certificate Authority

Ensure there&#039;s only one CA certificate in the file from your CA. Normally there is, but ocassionally several are stored in the same file. To list the number of certificates in a file, use the command below. If you get an answer of more than one, then see the section on multiple certificates in one file. The command to ch…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>slapd_conf</title>
            <link>https://hackerbruecke.net/linux/commserv/ldap/slapd_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/slapd.conf

&lt;http://www.stanford.edu/services/directory/openldap/configuration/bdb-config.html&gt;




# The database configuration parameters must appear *after* the &quot;database&quot;
# directive, as DB_CONFIG files are &#039;per backend&#039;.
dbconfig set_cachesize  4 0 1
dbconfig set_lg_regionmax 262144
dbconfig set_lg_bsize 2097152
dbconfig set_lg_dir /var/log
# Automatically remove log files that are no longer needed.
dbconfig set_flags DB_LOG_AUTOREMOVE
# 
# Setting set_tas_spins reduces resour…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>cpan2rpm</title>
            <link>https://hackerbruecke.net/linux/commserv/other/cpan2rpm?rev=1293466841&amp;do=diff</link>
            <description>cpan2rpm

At &lt;http://sourceforge.net/project/showfiles.php?group_id=74018&gt; you can download a RPM-builder for CPAN-Perl-modules.


The man-page stats: 

cpan2rpm [options] &lt;distribution&gt;

The syntax for cpan2rpm requires a single distribution name, which can take one of four different forms:

	*  a CPAN module name (e.g. XML::Simple) - When a module name is passed, the script will ``walk&#039;&#039; search.cpan.org to     determine the latest distribution. If an exact match is not found, the CPAN module i…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>pear_makerpm</title>
            <link>https://hackerbruecke.net/linux/commserv/other/pear_makerpm?rev=1293466841&amp;do=diff</link>
            <description>PEAR and PECL

What is PECL?


PECL is a repository for PHP Extensions, providing a directory of all known extensions and hosting facilities for downloading and development of PHP extensions.



The packaging and distribution system used by PECL is shared with its sister, PEAR.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://hackerbruecke.net/linux/commserv/php/config?rev=1293466843&amp;do=diff</link>
            <description>PHP5 configuration for GOsa and eGroupWare

eGroupWare

When I added about 250 users to a group in GOsa or in eGroupWare, I encountered the following problem with (open)SUSE 10.2, which I did not encounter with SUSE 10.0: 

station7: suhosin[373]: ALERT - configured request variable limit exceeded - dropped variable \
&#039;account_user[]&#039; (attacker &#039;172.16.130.9&#039;, file &#039;/srv/www/htdocs/egroupware/index.php&#039;)</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>lightsquid</title>
            <link>https://hackerbruecke.net/linux/commserv/squid/lightsquid?rev=1408135540&amp;do=diff</link>
            <description>Lightsquid-Tool

your access.log look slightly different from standart. may be you use CUSTOM log record. at and of standart record in you log you has addition field  look like:

[User-Agent: TMhtload/1.32.00.1008\r\nAccept: */*\r\nHost: cm-t.activeupdate.trendmi</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:45:40 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
        <item>
            <title>ssh-smtp-tunnel</title>
            <link>https://hackerbruecke.net/linux/email/postfix/ssh-smtp-tunnel?rev=1493132228&amp;do=diff</link>
            <description>SMTP-over-SSH-Tunnel

Um zwei SMTP-Server (z.B. Mailserver im Heim-Netz zu Mailgateway bei Provider/Hoster) sicher miteinander zu verbinden, gibt es verschiedene Möglichkeiten.




OpenVPN-Tunnel

Eine Möglichkeit ist, ein OpenVPN-Tunnel zwischen beiden Servern.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:08 +0000</pubDate>
        </item>
        <item>
            <title>spamreport</title>
            <link>https://hackerbruecke.net/linux/email/spamassassin/spamreport?rev=1493132098&amp;do=diff</link>
            <description>Spamreport




spamcheck.sh


#!/bin/bash

#########################################################
# UKBW-Spam-Report, 2007-05-01, chhaas, IuK / Netzwerke #
#########################################################

#set -o verbose

########
# ToDo #
########
# - printvariablen bei &quot;grep X-Spam-Status:&quot; korrigieren
# - Mail an antispam@uk-bw.de zusammenfassen: 1 Mail die alle Spammails inkl. Empfaenger beinhaltet
# - Variablen fuer FROM: und RETURN-PATH einrichten
# - evtl. SpamAssassin Spam-T…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:54:58 +0000</pubDate>
        </item>
    </channel>
</rss>
