Solved

500 !! PTS Setup Secure Email server/Postfix Configuration/ What do i Do??

Posted on 2003-11-21
2
256 Views
Last Modified: 2013-12-15
Morning,

I have Postfix/SMTP/Pop3 and want to begin to understand what the "Model Secure" email server would be.....

I am alittle new at Admin Linux but not to new with dealing with Linux.

Config is Red hat 9.0

Use IMAP??

Can anygive me some insight on how POP3 with SSl works??? How about POPs with Red hat instead of iPOP3....Any guidance would be greatly appreciated...
0
Comment
Question by:Johnysteaks
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Assisted Solution

by:paullamhkg
paullamhkg earned 250 total points
ID: 9815498
I will recommend profix+imap+ mysql have a check here http://www.sweeney.demon.co.uk/pfix_imap_virtual.html

for pop3 + ssl have a check here http://sharkysoft.com/tutorials/linuxtips/pop3s/

hope those info can help.
0
 
LVL 7

Accepted Solution

by:
troopern earned 250 total points
ID: 10035205
Have you found a solution to your question ? if so, accept the answer and grade it.
Otherwise, take a look at http://www.gentoo.org/doc/en/virt-mail-howto.xml which is a nice guide for installing postfix.
And to secure it extra take a look at /etc/posfix/samples/* there's good documentation on how every function works and what ever option does.
Exactly in what way do you want to secure your server ?
0

Featured Post

Quiz: What Do These Organizations Have In Common?

Hint: Their teams ended up taking quizzes, too.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How many times have you wanted to quickly do the same thing to a list but found yourself typing it again and again? I first figured out a small time saver with the up arrow to recall the last command but that can only get you so far if you have a bi…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question