ukulele hero

i've just re-stringing my old, cheap ukulele yesterday :) now, i can continue reciting Jake Shimabukuro's While My Guitar Gently Weeps recital :P i used to be well memorized that song note by note, after few months not touching my ukulele.it's completely forgotten. :D 

auto remote backup with unison

First, we should create ssh auto login when remote generating dsa key you'll be asked for passphrase(twice), just press "enter" now, test ssh autologin ok, it work. now, i want to backup my local data to remote server say, my local data is in /var/data/ (local server), and i want…

DNS bailiwick

The term in-bailiwick means that nameservers for a domain is in the same domain (within the domain). ie domain.com nameserver is ns.domain.com not ns.domain.net nor ns.otherdomain.org (glued delegation) The term out-of-bailiwick means that nameservers for a domain is not in the same domain. ie domain.com nameserver is ns.domain.net or ns.otherdomain.org…

Postfix IPv6 + RBL + BIND9 as DNSBL

Here we go again :) for using ipv6 dnsbl, we need postfix version => 2.6 as the author of postfix state in postfix-users list. This site is a good reference on how to build postfix RPM under redhat based system http://postfix.wl0.org/en/ How ipv6 dnsbl keep AAAA record in their zone?…

Postfix IPv6 + SPF (sender policy framework)

Even though spammers may not have thought to do the email forgery yet, I’m publishing SPF txt record in dns.

# dig txt ipv6.kutukupret.com +short
"v=spf1 ip6:2001:470:19:13c::2 -all"

I don’t even know whose gonna validate my spf record anyway 😀 But for the sake of my curiousity, i’m continue developing SPF on my ipv6 postfix smtp. first i need to publish spf txt record

ipv6.kutukupret.com.    86400   IN      SPF     "v=spf1 ip6:2001:470:19:13c::2 -all"

for the scanner, i’m using postfix-policyd-spf-perl, can be download at http://www.openspf.org/Software The following Perl version and packages are required for running postfix-policyd-spf-perl: Perl 5.6 NetAddr-IP 4 Mail-SPF (not Mail-SPF-Query) perl-Net-DNS >= 0.65 perl-Net-IP >= 1.25 Test the postfix-policyd-spf-perl script, just make sure it works with ipv6 address.

# ./postfix-policyd-spf-perl
request=smtpd_access_policy
protocol_state=RCPT
protocol_name=SMTP
helo_name=mx.ipv6.kutukupret.com
queue_id=
instance=71b0.45e2f5f1.d4da1.0
sender=henet@ipv6.kutukupret.com
recipient=hari.h@ipv6.kutukupret.com
client_address=2001:470:19:13c::2
client_name=another.domain.tld

action=PREPEND Received-SPF: pass (ipv6.kutukupret.com: 2001:470:19:13c::2 is authorized to use 'henet@ipv6.kutukupret.com' in 'mfrom' identity (mechanism 'ip6:2001:470:19:13C::2' matched)) receiver=unknown; identity=mailfrom; envelope-from="henet@ipv6.kutukupret.com"; helo=mx.ipv6.kutukupret.com; client-ip="2001:470:19:13c::2"

Postfix IPv6 + sqlgrey

I’m not sure if it’s necessary for greylisting in ipv6 smtp right now, seems spammer haven’t move their target on ipv6 smtp server yet.After wandering around for couple of hour with google, i’ve finally found application that’s suitable for my postfix greylisting.i’m using milter-greylist previously, but seems like postfix didn’t have {if_addr} in its milter macros and i have to apply workaround.

so i decided using sqlgrey for easiness sake 🙂

Current state

SQLgrey gained the following features since the beginning:

* SQLgrey can withstand a database crash (grey-listing is automatically switched off)
* 3 grey-listing algorithms to choose from
* Support for file-based IP and FQDN whitelists
* Support for fetching up-to-date whitelists from a repository
* Can mail the admin when the database is unavailable
* Auto-whitelists now understand SRS (SPF-aware mail forwarding)
* IPv6 support
* OPTIN / OPTOUT support
* Fine log controls
* Activity reports

Howto make postfix listening on IPv6

Postfix, by default only listen on ipv4 interface. this is howto make Postfix listen on both ipv4/ipv6 This example using IPv6 address given by he.net In main.cf [text] -- others config -- -- snippet -- inet_protocols = ipv4, ipv6 inet_interfaces = 127.0.0.1, 192.168.200.18, [::1], [2001:470:19:xxxx::2] mynetworks = [2001:470:19:xxxx::/64], [::1/128], 127.0.0.1,…