The recommend OS for the Raspberry Pi devices is typically Raspbian.
By default a Raspbian install starts with the nework configured via DHCP. Raspbian is based on Debian, and does things a little differently than their cousins Fedora/RedHat. Instead of configuring resolv.conf directly, it needs to be included with the interfaces configuration file.
After my recent post about "How to Parse DMARC Reports", I decided to find a way to directly query an IMAP folder to parse reports. I have started with John Levine's rddmarc script, and modified it to connect to an IMAP server.
In the process of working on this, I also discovered that some receivers are sending their DMARC reports as multipart attachments. The original rddmarc script did not seem to handle this condition well, so I added this capability as well.
The current buzz in the e-mail industry, is around Domain-based Message Authentication, Reporting & Conformance, commonly referred to as: DMARC. DMARC pulls together SPF and DKIM, into a method to try to stop spam and keep people from abusing your brand/domain. One of the added benefits of DMARC, is that receivers are able to report back to the domain owner, the disposition of messages being sent into their environment. Gmail is currently one of the few receivers providing these reports back, but hopefully adoption will be growing soon.
After parsing your DMARC results, you will need an easy way to review the results. I've put together a VERY basic PHP script that can be used for display DMARC report results.
I decided that it was time to learn about DKIM and deploy on my servers. As a habit, I typically run CentOS 5 and Sendmail since it is the default MTA.
To install the DKIM-milter, I would recommend using the packages provided by the "Extra Packages for Enterprise Linux (EPEL)"; a Fedora Project. Once you have the EPEL Repo setup on your system, you can:
Today a friend of mine had his site hacked, and when browsing to the site with Google Chrome it warned me that the site was infected with malicious code. Awhile back I provided an article regarding Monitor MythTV with Nagios. I figured I could write a Nagios check to see if a given site was listed on the Google Safe Browsing list.
It is sometimes difficult to figure out why a certain call is being call is being routed a certain way, or behaving unexpectedly. As a troubleshooting step, it can be helpful to peform call traces.
We have received a lot of emails with questions about Network Appliance (NetApp) devices and being able to use some advanced tools. We will periodically explore the standard and advanced tools, in future articles. To start with, it seemed to make sense to explore what commands were available via the advanced tools.
Recently I have been using a proprietary application which stores IP address in a hex notation. Unfortunately this hex address is far from useful when doing troubleshooting or diagnosing. Originally I was told to pull each two hex digits and convert them via the calculator of my operating system. This was very manual and annoying to say the least. I decided to write a short script with the limited tools available on the machine I had to use for this purpose. While I am sure there would be a more elegant way of doing this, it gets the job done.
It is common to setup a phone switch with multiple T1s, each purposed with a special use. An example of such a configuration might be to have one used for local calls, and one for long-distance calls. To test the route that the call will make through the switch, you can run a couple commands and get a great deal of information.
Drupal theme by Kiwi Themes.