Wednesday, May 11, 2016

Setting up the Postfix SMTP server to route all your email to an external SMTP Gateway

Standard
Suppose you want all your web servers to locally send all email (maybe from your contact forms, or whatever) to a real smtp gateway. If you're running postfix as your MTA, this is quite easy to achieve.
In your main.cf file (usually /etc/postfix/main.cf or /usr/local/etc/postfix/main.cf), specify your transport maps:

transport_maps = hash:/etc/postfix/transport


And in your transport file (usually /etc/postfix/transport or /usr/local/etc/postfix/transport), specify your gateways per domain.
This allows you to specify with regular expressions which emails go where. In this case, an asterisk specifies every domain (the transport file allows very complex setups, this is of course an extreme and trivial example):

* smtp:myotherhost.com

Then invoke postmap to regenerate the transports db, and reload postfix: 

postmap hash:/etc/postfix/transport
postfix reload

 source : http://marcelog.github.io/articles/configure_postfix_forward_all_email_smtp_gateway.html

Friday, March 11, 2016

How to Delete mailman archives from cPanel backend

Standard

Go to “/usr/local/cpanel/3rdparty/mailman/archives/private”
#cd /usr/local/cpanel/3rdparty/mailman/archives/private
You can see lots of directories in this path.
For example, If your mailing list account name is example@workonlinux.wordpress.com
then the directory name will be
example_workonlinux.wordpress.com
#cd example_workonlinux.wordpress.com
In this directory, you can see many files like
2012-January.txt.gz(year-month.txt.gz)
2012-January/(year-month)
attachments/
You can remove these files and directories.
#rm -rf file/directory name
Also one more thing, SOmetimes it will show the previous file size when you try to access it from cPanel front end. It may be due to cache. It would take around one hour to show the correct mailing list size after deletion.

Wednesday, February 19, 2014

How to change SMTP server IP (Exim IP) on WHM server

Standard
1) Login to WHM
Click Exim Configuration Editor
Check the box next to:
“Send outgoing mail from the ip that matches the domain name in /etc/mailips (*: IP can be added to the file to change the main outgoing interface)”
Save Changes
Then edit the file /etc/mailips
from shell and add:
*: #ReplacewithnewIP#
service exim restart
2) Login to Shell
Access the Exim configuration file:
nano /etc/exim.conf
Locate remote_smtp
The default setup will look like:
remote_smtp:
driver = smtp
interface = ${if exists {/etc/mailips}{${lookup{$sender_address_domain}lsearch{/etc/mailips}{$value}{}}}{}}
helo_data = ${if exists {/etc/mailhelo}{${lookup{$sender_address_domain}lsearch{/etc/mailhelo}{$value}{$primary_hostname}}}{$primary_ho stname}}
Change to:
remote_smtp:
driver = smtp
interface = 12.14.12.14 # Change to your server IP address.
Save changes and exit.
Restart Exim
If there is an exim update when you upgrade your cPanel server you will need to re-enter the interface again.

source  : https://kb.hivelocity.net/how-to-change-smtp-server-ip-exim-ip-on-whm-server/

Monday, December 16, 2013

Five best practices to improve your email delivery success rate

Standard
In the modern day world of email delivery, recipient ISPs place great amount of emphasis on verifying the legitimacy of senders email to their customers.
By Linda Musthaler, Principal Analyst with Essential Solutions Corp.
I recently helped a client conduct a marketing campaign via email. This company sent an email message to more than 2,400 people and had a dismal response rate of 14 people. Looking back, we now see that at least part of the problem could be that the message was blocked from recipients' inboxes for various technical reasons.
In the modern world of email delivery, recipient ISPs place a great amount of emphasis on verifying the legitimacy of senders attempting to send email to their customers. As email volume increases, so does the abuse of email by illegitimate senders using bots and other techniques to send spam, viruses, malware, phishing ploys, and so on. As ISPs continue to clamp down on their war against these illegitimate senders, legitimate email senders can easily get caught in the crossfire, resulting in their emails not being delivered or being delivered to the spam folder.
There are important best practices and principles that must be followed by legitimate senders to avoid the crossfire. These principles apply to anybody running an email server that delivers outgoing email messages, regardless of the volume or content of those messages. If your company does any sort of email marketing or customer communications, your email administrator needs to be cognizant of the settings listed below, which have been provided to us by Heath Morrison, vice president of technology for SMTP.com, a service provider focused on email delivery.
Each of the following gives recipient ISPs a means of evaluating the legitimacy of a mail server that is attempting to send them email:
DKIM settings
DomainKeys Identified Mail (DKIM) is a modern Internet standard for authenticating the delivery chain for email messages. It operates by signing messages with a special cryptographic signature that can be verified but not counterfeited by a third-party source. The signature, which is included in the message by a relay server in the delivery chain, proves that the message passed through that server. This helps prevent spammers and scammers from creating fraudulent messages appearing to come from that source.
DKIM does not prevent spam from passing through a network, but it gives recipient servers confidence in the source of the message. Recipient servers can then more confidently use the reputation of the delivery network in order to judge whether a message is legitimate or not.
Configuring DKIM requires the functionality to be enabled in the outgoing mail server, and it requires a small TXT record to be added to the DNS configuration of the sending server's domain. The simplest way to check whether a mail server is sending DKIM-signed messages is to deliver a message from the server to a yahoo.com or gmail.com address. Once delivered, you can check the Full Headers of the message received to determine if the message passed the DKIM checks of that recipient ISP.
Here is a Wikipedia article for further reference.
Here's a tool that SMTP.com provides for checking a domain's DKIM records in DNS.
SPF records
The Sender Policy Framework (SPF) is another Internet standard for authenticating email messages. Unlike DKIM, however, SPF allows recipient ISPs to authenticate the sender listed on the From header of an email message. It does this by giving domain owners a means of specifying which IP addresses on the Internet are allowed to send email on their behalf. Recipient ISPs check the IP of a sending server against this list of valid sending IPs to determine if the sender is legitimate or not.
To configure SPF, domain owners must create a special TXT record in their DNS configuration listing the valid IPs for relaying email. The great thing about SPF is that it is not necessary to make any changes to the outgoing mail server.
Reverse DNS
A standard, forward DNS record is the association of a hostname with an IP address on the Internet. The corollary to this is reverse DNS, which uses an IP address to look up a hostname. Despite their similarities, these two records are independent. Forward DNS is configured by the owner of the domain. Reverse DNS, however, is configured by the ISP that controls the IP address.
In the world of email it is important for everything to match. When a mail server receives a connection from a particular IP address, it performs a reverse DNS lookup for that IP address. This yields a hostname. The server then performs a forward lookup on that hostname and checks whether the resulting IP address matches the original IP address used. This is called forward- confirmed reverse DNS (FCdDNS). If these records do not match it can impact the delivery success for messages from that IP address.
Here's a Wikipedia article for further reference.
Here's a tool that SMTP.com provides for checking FCdDNS for an IP.
MX records
In the world of email, MX records are DNS records that designate the servers handling incoming email for a particular domain. This is part of the basic framework of the Internet that allows senders to successfully route email to recipients. Surprisingly, in the modern world of email, the MX record of a domain plays an important role not just in incoming email but also in outgoing email.
Recipient ISPs place a huge emphasis on the legitimacy of the sender and server attempting to deliver email to their users. To that end, when looking at the From address of a message, some recipient ISPs evaluate whether reply messages for that From domain can successfully be delivered. If an email address contains an invalid domain, or if the domain does not have the basic facilities for receiving a reply message, recipient mail servers may choose to reject or delay messages to their users.
It is important to always use a valid email address on the envelope of email messages, and to ensure that MX records for the domain are configured in a way that allows that address to successfully receive replies. Here is a Wikipedia article for further reference.
IP blacklists
An IP blacklist is a third-party service that tracks IP addresses that people may not want to receive email from. Servers receiving email can subscribe to the blacklist service to help them determine IPs that they should reject email from. Blacklists may include IP addresses that have previously sent spam or viruses, or even IPs that simply represent computers on the Internet that don't have normal reasons to be emitting email.
There are a few common ways for a normal, well- managed mail server to find itself on a blacklist: infected computers with access to send email through the server, bad behavior by users of the server, or pre- existing conditions.
It is important to always check the status of a fresh IP against all major blacklists, to ensure that previous tenants on the IP had not behaved in a way to land it on a blacklist. It is also important to periodically check the blacklist status of an IP, particularly after any incident where spam email may have been sent from the network.
Here is a Wikipedia article for further reference.

source : http://www.activecampaign.smtp.com/resources/docs/best-practices

Postfix queue file corrupted

Standard
Today, my Fedora based mail server crashed. It is has a small (160G) drive for the base file system and a RAID 5 (4x500G) for storage. Unfortunately yesterday I found that the hard drive holding the base system started to crash. Fortunately I had a copy of that drive made couple of weeks ago using dd command.
After a few fixes like a httpd conf, and some symbolic links everything started to work again.
Buuuuuuuut… Just a few e-mails arrived in my Inbox.
I observed in my /var/log/maillog some messages like this:

postfix/qmgr[9038]: fatal: 66F414D43: envelope records out of order

I searched for the files in the mail spool and I removed them. Indeed those files looked strange than others.

#cd /var/spool
#find . -name "*66F414D43*"

and I removed all all the files found:

rm -rf ./postfix/defer/6/66F414D43 ./postfix/active/66F414D43


Source : http://techie.yellowgnu.net/postfix-queue-corrupted/

Wednesday, March 3, 2010

Friday, January 15, 2010

Brainwave Attract Wealth

Standard
Setelah baca bukunya The Secret coba juga brainwave-nya. Saya sudah upload, terdiri dari 4 file, masing-masing dapat kamu download dibawah ini :

Track 1
Track 2
Track 3 : didengarkan pada saat akan tidur atau pada waktu tenang tidak ada yang mengganggu.
Track 4 : bisa didengarkan ketika sambil kerja atau melakukan kegiatan.

Ada lagi brainwave buatan Indonesia, bisa didownload dibawah ini :
Menari Uang Pop Indonesia
Menarik Uang Suara Alam
Menarik Uang Saxaphone

Coba dan lihat hasilnya...
semoga bermanfaat....