This is a read-only archive. Find the latest Linux articles, documentation, and answers at the new Linux.com!

Linux.com

Feature: Enterprise Applications

Implementing a Postfix mail server with spam and antivirus protection

By Anže Vidmar on March 09, 2006 (8:00:00 AM)

Share    Print    Comments   

Building a complete email system with spam and antivirus protection is not as hard as you might think. This guide will walk you through installing and configuring everything you need for sending and receiving email, filtering spam, and scanning for viruses in email.

For our system, we'll use the Postfix mail transport agent (MTA); Dovecot, a secure, open source IMAP and POP3 server for Linux/Unix-like systems; SquirrelMail, a standards-based Webmail package written in PHP 4; SpamAssassin, a powerful open source spam filter; and ClamAV, a GPLed virus scanner. To tie everything together we'll use amavisd-new, a high-performance interface between MTAs and content checkers such as virus scanners and spam filters.

The system will be configured so that users will have POP, secure POP, IMAP, and secure IMAP (IMAPS) access, and will also be able to access their email from the Web using SquirrelMail. Every email sent or received will be scanned for viruses and checked for possible spam content.

The email applications will run on Fedora Core 4 and Red Hat Enterprise Linux Advanced Server 4.

To install the packages for this project we will use the Yellow Dog Updater, Modified (Yum). In order to get all the packages that you need, make sure you have the Fedora Extras repository (/etc/yum.repos.d/fedora-extras.repo; it's included in the distribution and enabled by default) and Dries repository enabled and configured. You will need both repositories in order to install all the packages needed.

Installation

To begin, you'll want to make sure your system is up-to-date. Run yum update if you haven't already.

Now configure the Dries repository for use by creating a file called /etc/yum.repos.d/dries.repo, with the following entries:

[dries]
name=Extra Fedora rpms dries - $releasever - $basearch
baseurl=http://ftp.belnet.be/packages/dries.ulyssis.org/fedora/linux/$releasever/$basearch/dries/RPMS/
enabled=1
gpgcheck=1

Next, install the GPG key for this repository:

rpm --import http://dries.ulyssis.org/rpm/RPM-GPG-KEY.dries.txt

Now that you have the repositories ready, you can install the packages that we need:

yum install postfix dovecot spamassassin squirrelmail clamav clamav-server clamav-update clamav-lib clamav-data amavisd-new

Wait until all the packages and dependencies are installed.

By default, Fedora and Red Hat distributions come with sendmail set as the MTA for the system. You can check or change the default MTA with the system-switch-mail utility. If you don't have it installed yet, install it now:

yum install system-switch-mail system-switch-mail-gnome

Simply run the system-switch-mail tool and select Postfix as your default MTA.

Now that you have all the necessary applications and tools installed, it's time to configure them to work together.

Setting up Postfix

To configure Postfix, edit the main Postfix configuration file /etc/postfix/main.cf and change these entries as follows:

#This is your fully qualified domain name (FQDN):
myhostname = mail.srv.dyndns.org

#myorigin specifies the default domain name that is appended
myorigin = $mydomain

#By the parameter "all" we allow the connections to our server
# from anywhere, not only from localhost
inet_interfaces = all

#The mydestination parameter specifies the list of domains that
#this machine considers itself the final destination for.
mydestination = $mydomain, $myhostname, localhost.$mydomain, localhost

#Reject the unknown users
local_recipient_maps = unix:passwd.byname $alias_maps

#With this parameter we make sure that our server won't be an open relay server
mynetworks_style = host

The configuration file is well commented, so if you need more info about the configuration, dig into it. For even more information on Postfix, see the Postfix.org documentation.

Next, start the Postfix service with the command service postfix start. Also make sure the service is automatically started at boot time:

chkconfig postfix on

Setting up Dovecot

Now it's time to set up Dovecot. Edit the Dovecot config file, /etc/dovecot.conf, to suit your needs. In this case we want to enable POP3, secure POP3, IMAP, and secure IMAP services as shown:

protocols = imap imaps pop3 pop3s
imap_listen = *
pop3_listen = *
imaps_listen = *
pop3s_listen = *

After that's done, start the Dovecot service and make sure that it's started at boot time:

service dovecot start
chkconfig dovecot on

Setting up Squirrelmail

In order to be able to use webmail, you need to have Apache's httpd service up and running. It shouldn't be necessary to do any extra configuring of httpd config file for this task, so you can just use it as is. Start the service and make sure it's started at boot time:

service httpd start
chkconfig httpd on

The installation of Squirrelmail will not change your httpd.conf file. Instead, Squirrelmail creates the file squirrelmail.conf in /etc/httpd/conf.d. This file links the /webmail/ virtual folder to the actual Squirrelmail folder installation located at /usr/share/squirrelmail.

Edit the /usr/share/squirrelmail/config/config.php file and change the domain$ variable to match your domain name, in order to make the from-domain setting (when sending email from Web) correct. For our server, it looks like this:

$domain = 'srv.dyndns.org';

To test webmail, go to http://localhost/webmail/ or http://your_domain_name/webmail/ and log in to check your email and send a few test messages.

Blocking spam and viruses

SpamAssassin is configured right out of the box when you install it, so you shouldn't need to change anything here. However, to reduce the chance that a false positive will tag known addresses, you can whitelist addresses. The file /etc/mail/spammassassin/local.cf should list known email addresses, in a format similar to:

whitelist_from anzevi@some-strange-domain.com
whitelist_from anze@out-there-somewhere.net

Spamassassin will be called by amavisd-new, so we don't need to configure the SpamAssassin daemon to start at boot time.

To block viruses, we need to configure ClamAV to connect daily to an Internet-based antivirus database and fetch new virus definitions. You need to have a cron daemon running in order for ClamAV to fetch the virus definitions.

First, edit /etc/sysconfig/freshclam and comment out the following line:

#FRESHCLAM_DELAY=disabled-warn  # REMOVE ME

Next, edit /etc/freshclam.conf and change the antivirus database to the closest mirror to your location:

#Example
DatabaseMirror db.de.clamav.net

You can see a list of available mirrors here.

To test ClamAV, run the clamscan command in your home folder. The AV client should check your home directory and subdirectories for viruses. Since you are running this check on a Linux box for local files, I'm pretty sure ClamAV won't find any viruses on your machine.

To test updating the virus definitions, run freshclam.

Setting up amavisd-new

Now we'll set up amavisd-new. The user amavis is automatically created at amavisd-new install time, but we still need to create the following directories and make sure the owner is amavis, as shown below:

mkdir /var/run/amavis
mkdir /var/run/clamav
chown amavis /var/run/amavis
chown amavis /var/run/clamav

You may leave the group permissions of the folders set to root. Copy the sample config file to /etc:

cp /usr/share/doc/clamav-server-X.XX.X/clamd.conf
/etc/clamd.conf

Replace the X.XX.X with the version you're using. Then, make the following changes to your /etc/clamd.conf file:

#Example
User amavis
#TCPSocket 3310
#PidFile /var/run/clamd.<SERVICE>/clamd.pid
#LocalSocket /var/run/clamd.<SERVICE>/clamd.sock

After making the changes, start the service with service amavisd start, and set it to start at boot with chkconfig amavisd on.

Now, test your configuration to see that everything works. Telnet to port 10024 and you should see something like this:

[root@mail ~]# telnet localhost 10024
Trying 127.0.0.1...
Connected to localhost.localdomain (127.0.0.1).
Escape character is '^]'.
220 [127.0.0.1] ESMTP amavisd-new service ready
quit
221 2.0.0 [127.0.0.1] amavisd-new closing transmission channel
Connection closed by foreign host.

If you are able to telnet to port 10024 and you are greeted by amavisd-new, you've done a good job and you may continue with the configuration. If you're unable to connect to that port, make sure the amavisd service is running, and look for errors in /var/log/messages.

Additional Postfix configuration

Once amavisd is configured and working correctly, you need to configure Postfix so it knows how to communicate with amavisd-new. Copy the following lines to the bottom of your existing /etc/postfix/master.cf file:

smtp-amavis unix -      -       y     -       2  smtp
    -o smtp_data_done_timeout=1200
    -o smtp_send_xforward_command=yes
    -o disable_dns_lookups=yes
    -o max_use=20

127.0.0.1:10025 inet n  -       y     -       -  smtpd
    -o content_filter=
    -o local_recipient_maps=
    -o relay_recipient_maps=
    -o smtpd_restriction_classes=
    -o smtpd_delay_reject=no
    -o smtpd_client_restrictions=permit_mynetworks,reject
    -o smtpd_helo_restrictions=
    -o smtpd_sender_restrictions=
    -o smtpd_recipient_restrictions=permit_mynetworks,reject
    -o mynetworks_style=host
    -o mynetworks=127.0.0.0/8
    -o strict_rfc821_envelopes=yes
    -o smtpd_error_sleep_time=0
    -o smtpd_soft_error_limit=1001
    -o smtpd_hard_error_limit=1000
    -o smtpd_client_connection_count_limit=0
    -o smtpd_client_connection_rate_limit=0
    -o receive_override_options=no_header_body_checks,no_unknown_recipient_checks

You can find more information how this work in the amavisd documentation in your /usr/share/doc folder. For example, since we're running amavisd 2.3.3, we would check the /usr/share/doc/amavisd-new-2.3.3/README.postfix file.

Save the file and reload the Postfix service, then test it by using telnet to connect to port 10025:

[root@mail ~]# telnet localhost 10025
Trying 127.0.0.1...
Connected to localhost.localdomain (127.0.0.1).
Escape character is '^]'.
220 mail.srv.dyndns.org ESMTP Postfix
quit
221 Bye
Connection closed by foreign host.

If this works for you, you have a working configuration, and you are ready to make the final changes to Postfix.

Add this line to the end of /etc/postfix/main.cf:

content_filter = smtp-amavis:[127.0.0.1]:10024

Once you've done this, Postfix will send all incoming and outgoing mail directly through the content filter that you configured earlier.

Conclusion

All you have to do now is send yourself some clean email messages and some spam, junk, and viruses, and see what's happening on your mail server. You can find sample messages with spam and virus content in /usr/share/doc/amavisd-new-X.X.X/test-messages folder. The best way to see in real time what is going on your mail server is to watch /var/log/maillog for entries using tail -f /var/log/maillog.

That's all you need to do to configure Postfix and the helper applications to provide antivirus, spam filtering, webmail, POP, and IMAP access. Enjoy your new mail server!

Share    Print    Comments   

Comments

on Implementing a Postfix mail server with spam and antivirus protection

Note: Comments are owned by the poster. We are not responsible for their content.

misleading title

Posted by: Anonymous Coward on March 10, 2006 03:24 AM
With all the different package management systems out there, it pays to be more specific in the title. Sure most distros have a way of 'handling' other types of packages they do not always work. I was hopeing this was a 'source' walk through, as I have been wanting to try postfix for a while, but havent been able to find a how-to(from source) that includes spam, and virus checking.

#

Re:misleading title

Posted by: Anonymous Coward on March 10, 2006 03:45 AM
This looks suspiciously like the "Fairly-Secure Anti-SPAM Gateway Using OpenBSD, Postfix, Amavisd-new, SpamAssassin, Razor and DCC" written by Scott Vintinner. That write-up has be available for (literally) years. Sure it's written with OpenBSD in mind, but anyone should be able to follow it and figure it out. The link is <a href="http://flakshack.com/anti-spam/wiki/index.php" title="flakshack.com">http://flakshack.com/anti-spam/wiki/index.php</a flakshack.com>.

Now go, burn your afternoon building one, and have your users thank you tomorrow.

#

Re:misleading title

Posted by: Anonymous Coward on March 11, 2006 07:26 AM
Didn't have any problem to set it up on Debian.

#

For Ubuntu?

Posted by: Anonymous Coward on March 10, 2006 05:49 AM
I've been trying to get a mailserver up on my Ubuntu box for some time, but gave up due to the apparent complexity. This guide helps somewhat, but can anyone point me to an Ubuntu-specific guide? Much obliged!

#

Re:For Ubuntu?

Posted by: Anonymous Coward on March 10, 2006 06:03 AM
this should get you started: <a href="http://www.howtoforge.com/perfect_setup_ubuntu_5.10" title="howtoforge.com">http://www.howtoforge.com/perfect_setup_ubuntu_5.<nobr>1<wbr></nobr> 0</a howtoforge.com>

#

Re:For Ubuntu?

Posted by: Anonymous Coward on March 11, 2006 07:29 AM
You don't need one. Setting it up on Ubuntu is as easy. I've just set it up on Debian.

#

Re:For Ubuntu?

Posted by: Anonymous Coward on March 13, 2006 06:02 PM
<a href="http://flurdy.com/docs/postfix/" title="flurdy.com">http://flurdy.com/docs/postfix/</a flurdy.com>

#

you really need another tutorial on RBL

Posted by: Anonymous Coward on March 11, 2006 07:48 AM
Good tutorial, well done. I'm doing something similar soon, but with LDAP and jamm.

If you run any kind of public mail server, it will be innundated from day one with spam from Owned Windoze machines on dynamic addresses. It only takes a few lines in the Postfix config to add a few blacklist databases to query to reject such connections. There are blog entries and some web pages that cover this, but if you are teaching this Postfix thing, it's needed for completeness.

#

Re:you really need another tutorial on RBL

Posted by: Anonymous Coward on March 11, 2006 05:42 PM
It makes no sense to use blacklists on Postfix level when you have recent SpamAssassin on place. It uses RBLs on its own. Anyway, my opinion is that blocking mail based purely on RBLs should be done only when you really know what you are doing - and can afford loss of valid mail. RBLs should be in general a factor of SA scoring, nothing more.

#

Re:you really need another tutorial on RBL

Posted by: Anonymous Coward on March 14, 2006 03:21 PM
You haven't looked at recent spam then. Some are quite slick and fly in under the spamassassin radar. They are text files, promote stocks and don't contain LOUD WORDS, naughty words or other things that trigger spamassassin. There are others that are JPEGs and look like your brother-in-law's photo for you.

RBLs also save processing time. Why bother to collect email to try to identify it when you can reject it right after the envelope headers?

The RBLs I use block dynamic ranges. I have not seem a single connection to use from a dynamic range that was legit email. If a small business wants to send out email via their dynamic address DSL connection, they should be relaying via their ISP's mailserver.

#

Re:you really need another tutorial on RBL

Posted by: Anonymous Coward on March 19, 2006 05:22 PM
Of course you can do anything with your mail - unless it is not your mail. I work for a quite large ISP and I cannot just throw away our customers' mail because somebody THINKS it comes from dynamic ranges or because some insane RBL THINKS that too many spams passed from certain ISPs mailserver. If you don't care about losing legitimate mail, do as you wish. BTW, we've got hunderds of thousands spams each day - I think I have an idea how today's spam look like<nobr> <wbr></nobr>;-)

#

Pain relief

Posted by: Anonymous Coward on May 28, 2006 01:55 PM
[URL=http://painrelief.fanspace.com/index.htm] Pain relief [/URL]

  [URL=http://lowerbackpain.0pi.com/backpain.htm] Back Pain [/URL]

  [URL=http://painreliefproduct.guildspace.com] Pain relief [/URL]
[URL=http://painreliefmedic.friendpages.com] Pain relief [/URL]
[URL=http://nervepainrelief.jeeran.com/painrelief<nobr>.<wbr></nobr> htm] Nerve pain relief [/URL]

#

I would add BitDefender

Posted by: Anonymous Coward on March 13, 2006 05:58 PM
What I did was to add BitDefender 7 to this solution. It's not free software, but it can be downloaded at no cost. Installation is a breeze and it's only necessary to uncomment a few lines in the Amavisd config file to make it work. Then you set up a way to fetch updates a few times a day and you're all set.

What I also did in the Postfix configuration is to add some checks to refuse mail from zombies (infected Windows computers) as I found it described in this article: <a href="http://www.freesoftwaremagazine.com/free_issues/issue_02/focus_spam_postfix/index_p1.html" title="freesoftwaremagazine.com">http://www.freesoftwaremagazine.com/free_issues/i<nobr>s<wbr></nobr> sue_02/focus_spam_postfix/index_p1.html</a freesoftwaremagazine.com>.

This works great for us and means quite a relief for the SA engine behind it.

On top of that we also only accept mail for known users. All the rest is immediately refused.

The idea is to reject unwanted mail as early as possible in the mail process.

Enjoy,

Jo

#

Re:Just in time

Posted by: Anonymous Coward on March 14, 2006 06:08 PM
Not to be rude, but if a company gets a mail server with someone who gets information from reading some random article on the net about how to set it up, it may not be too good of a system, especially when servers aren't about being cool.

#

Re:Few things missing..

Posted by: Anonymous Coward on April 05, 2006 01:42 AM
Turn off selinux (/etc/selinux/config)

#

Re:Installation problem

Posted by: Anonymous Coward on April 09, 2006 03:38 AM
Hi,
you should disable the atrpms repository so that all clamav dependencies are installed from the fc extras repository.

#

Add Virtual Domain/User?

Posted by: Anonymous Coward on April 14, 2006 01:00 AM
The time you took is appreciated. I got it all to install, but how do you add a domain/user?

Thanks again.

#

No Understanding

Posted by: Anonymous Coward on May 02, 2006 07:12 PM
Great article, just what I wanted; but this is just a 'recipe'. It gives no insight nor understanding. For some reason my set-up no longer works, and I'm completely lost, because I don't understand any of it. Could anyone offer a simple newbie overview of what's going where?

Can I get emails from an ordinary ISP POP3 mailbox into this server? I've tried fetchmail, and it looks like it half works.

I can't even telnet 127.0.0.1 143 now! How can that be?

#

Re:clamd configuration

Posted by: Anonymous Coward on September 12, 2006 10:11 PM
service clamd.amavisd start

        chkconfig clamd.amavisd on
This works over fedora (maybe, i don't use that distro, so i don't really know) but, what if you are using a debian-based distro?

#

dovecot configuration

Posted by: Anonymous Coward on October 25, 2006 03:50 AM
I had probelms to set this system up on my fedora5.

Seems that dovecot configuration has been changed.
Example configuration in article was:

protocols = imap imaps pop3 pop3s
imap_listen = *
pop3_listen = *
imaps_listen = *
pop3s_listen = *

And it should be:

protocols = imap imaps pop3 pop3s
listen = *

-cheers, at6

#

How about TLS for remote SMTP using SSL

Posted by: Administrator on May 18, 2006 05:21 AM
A great addition to the article would be the steps required to:
a) force all POP3, IMAP and SMTP connections to use encryption
b) configure the system such that remote users (on a different network) can send emails through your server by authenticating first (encrypted) (much like the way you configure your mail client to work with Gmail)

This would be a good mod for companies with employees who are on the road a lot (a company without a VPN solution).

#

dyndns

Posted by: Administrator on March 11, 2006 01:09 AM
Don't use dynamic IPs for a regular mailserver which receive the mail for a domain, or you and others will run in several trouble.

#

Just in time

Posted by: Administrator on March 13, 2006 04:20 PM
Great article was just in time since I was about to do the same thing for a new comapny I just got hired on to do there mail servers. Very cool stuff!

#

clamd configuration

Posted by: Administrator on March 17, 2006 09:05 AM
Hi, Are you sure about commenting out the clamd.pid file location in the config file? I am getting the following errors:

Mar 16 20:03:21 aqui amavis[2860]: (02860-04) ClamAV-clamd av-scanner FAILED: Too many retries to talk to<nobr> <wbr></nobr>/var/spool/amavisd/clamd.sock (Can't connect to UNIX socket<nobr> <wbr></nobr>/var/spool/amavisd/clamd.sock: No such file or directory) at (eval 40) line 266.

Mar 16 20:03:21 aqui amavis[2860]: (02860-04) WARN: all primary virus scanners failed, considering backups

#

Re:clamd configuration

Posted by: Administrator on March 18, 2006 01:01 AM
Actually I discovered that the problem wasn't due to the config file. The service isn't started unless you tell it to. I had to run:
<tt>service clamd.amavisd start
chkconfig clamd.amavisd on</tt>
I don't know why that isn't mentioned in the howto...

#

Installation problem

Posted by: Administrator on March 21, 2006 11:24 PM
When I run the first yum command I got this:
Running Transaction Test
Finished Transaction Test
Transaction Check Error: file<nobr> <wbr></nobr>/usr/lib/libclamav.so.1.0.17 conflicts between attempted installs of clamav-0.88-1.2.fc4.rf and clamav-lib-0.88-1.fc4
file<nobr> <wbr></nobr>/etc/freshclam.conf conflicts between attempted installs of clamav-update-0.88-1.fc4 and clamav-0.88-1.2.fc4.rf
file<nobr> <wbr></nobr>/usr/bin/freshclam conflicts between attempted installs of clamav-update-0.88-1.fc4 and clamav-0.88-1.2.fc4.rf.

How can I fix the problem?

#

Few things missing..

Posted by: Administrator on March 30, 2006 01:49 AM
Thank you for writing a thorough and detailed tutorial for newbies like me. I followed the tutorial but had a few problems. I was able to resolve them after a lot of searching around. Just wanted to share the resolutions with the rest of the community.
1. I was able to telnet to port 10024 successfully but not 10025. had to change the y to n in both places:
smtp-amavis unix - - y - 2 smtp
to
smtp-amavis unix - - n - 2 smtp
and
127.0.0.1:10025 inet n - y - - smtpd
to
127.0.0.1:10025 inet n - n - - smtpd
after that I was able to telnet to port 10025.

2. Was not able to login with Squirrelmail. Was getting an error message "Error connecting to IMAP server: localhost. 13 : Permission denied" had to run this command as root to allow httpd to talk to the network:<nobr> <wbr></nobr>/usr/sbin/setsebool -P httpd_can_network_connect=1

Apart from these two glitches, which I think is because I had latest versions of everything (Fedora 5 etc.) this tutorial helped me (a newbie who started working on Linux 3 days ago) configure a mail server myself. Thanks again.:-)

#

Amavisd

Posted by: Administrator on May 23, 2006 08:41 AM
Why doesn't Amavisd, clamd, or spamassassin have a log file in<nobr> <wbr></nobr>/var/log/?
I'm looking to make my configuration more secure and more interactive so I know how much spam the server is dealing with in a day, and if it is filtering correctly, or how many viruses are coming in, and what is being done with those? Any ideas how I could accomplish this?
I feel like right now the server is not blocking the virus mails/spam but rather just listing that it found some in the logwatch file. How do I know all of these things are working correctly?
Thanks

#

Re:Amavisd

Posted by: Administrator on June 21, 2006 09:25 PM
The log is at<nobr> <wbr></nobr>/var/log/maillogfor all those services.

Cheers,

Pedro.

#

Re:Amavisd

Posted by: Administrator on June 21, 2006 09:30 PM
The log is at<nobr> <wbr></nobr>/var/log/maillog for all those services.

Cheers,

Pedro.

#

Question--Can I set up multiple domains with this set up?

Posted by: Anonymous [ip: 216.114.6.70] on July 26, 2007 06:30 PM
I have a small web server with 5 domains and need to run email for more than one domain is that possible?

#

Implementing a Postfix mail server with spam and antivirus protection

Posted by: Anonymous [ip: 213.42.181.10] on October 31, 2007 09:26 AM
fine

#

How to redirect email bounce messages to one particular email?

Posted by: Anonymous [ip: 125.22.172.216] on November 06, 2007 07:25 AM
I am using postfix in our main server, I want to configure postfix so that all email bounce messages should be redirect to 1@yahoo.com & 2@gmail.com. Please reply me at babu98488@gmail.com .

#

Implementing a Postfix mail server..... Cannot pickup mail on LAN

Posted by: SeaHawkJa on March 05, 2008 04:44 PM
Setup on Fedora 8 _64

The server is online and behind a firewall/router with the neccessary ports open.

I can retrieve webmail and MUA mail from the internet, but trying to MUA (Eudora 7.1) from a windows xp pc on the internal LAN times out.

I can ping the server from the xp m/c no problem.

From the xp m/c telnet 192.168.0.128 110 times out waiting on connection.
I can telnet localhost 110 & telnet 192.168.0.128 110 on the server ok.

All of the above are working - just can't MUA inside LAN.

Results of netstat:

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:993 0.0.0.0:* LISTEN 2217/dovecot
tcp 0 0 0.0.0.0:995 0.0.0.0:* LISTEN 2217/dovecot
tcp 0 0 127.0.0.1:10024 0.0.0.0:* LISTEN 2242/amavisd (maste
tcp 0 0 127.0.0.1:10025 0.0.0.0:* LISTEN 2298/master
tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN 2189/mysqld
tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 2217/dovecot
tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 2217/dovecot
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1873/rpcbind
tcp 0 0 192.168.0.128:80 0.0.0.0:* LISTEN 2309/httpd
tcp 0 0 0.0.0.0:57937 0.0.0.0:* LISTEN 1892/rpc.statd
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 2103/vsftpd
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 2432/cupsd
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 2298/master
tcp 0 0 :::22 :::* LISTEN 2077/sshd
tcp 0 0 :::443 :::* LISTEN 2309/httpd

Any suggestions appreciated.

SeaHawkJa

#

This story has been archived. Comments can no longer be posted.



 
Tableless layout Validate XHTML 1.0 Strict Validate CSS Powered by Xaraya