The recommend OS for the Raspberry Pi devices is typically Raspbian.
By default a Raspbian install starts with the nework configured via DHCP. Raspbian is based on Debian, and does things a little differently than their cousins Fedora/RedHat. Instead of configuring resolv.conf directly, it needs to be included with the interfaces configuration file.
After my recent post about "How to Parse DMARC Reports", I decided to find a way to directly query an IMAP folder to parse reports. I have started with John Levine's rddmarc script, and modified it to connect to an IMAP server.
In the process of working on this, I also discovered that some receivers are sending their DMARC reports as multipart attachments. The original rddmarc script did not seem to handle this condition well, so I added this capability as well.
The current buzz in the e-mail industry, is around Domain-based Message Authentication, Reporting & Conformance, commonly referred to as: DMARC. DMARC pulls together SPF and DKIM, into a method to try to stop spam and keep people from abusing your brand/domain. One of the added benefits of DMARC, is that receivers are able to report back to the domain owner, the disposition of messages being sent into their environment. Gmail is currently one of the few receivers providing these reports back, but hopefully adoption will be growing soon.
After parsing your DMARC results, you will need an easy way to review the results. I've put together a VERY basic PHP script that can be used for display DMARC report results.
In an effort to be a good "net-citizen", I decided to configure my domains with DMARC record. It was great, because within 24hrs, I started to receive reports from Google/Gmail with DKIM and SPF related information for my domains. Now I needed to figure out how to actually process these XML reports into something useful and readable.
I decided that it was time to learn about DKIM and deploy on my servers. As a habit, I typically run CentOS 5 and Sendmail since it is the default MTA.
To install the DKIM-milter, I would recommend using the packages provided by the "Extra Packages for Enterprise Linux (EPEL)"; a Fedora Project. Once you have the EPEL Repo setup on your system, you can:
Today a friend of mine had his site hacked, and when browsing to the site with Google Chrome it warned me that the site was infected with malicious code. Awhile back I provided an article regarding Monitor MythTV with Nagios. I figured I could write a Nagios check to see if a given site was listed on the Google Safe Browsing list.
Drupal theme by Kiwi Themes.