RHEL5.4 Postfix 邮件系统的安装

发布时间 : 星期日 文章RHEL5.4 Postfix 邮件系统的安装更新完毕开始阅读

report_safe 1 use_bayes 1

bayes_auto_learn 1 skip_rbl_checks 1 use_razor2 0 use_pyzor 0 ok_locales all

4 测试spamassassin,并查看测试结果

#spamassassin -t < sample-nonspam.txt > nonspam.out #spamassassin -t < sample-spam.txt > spam.out #less nonspam.out

#less spam.out 5 检查配置文件

#spamassassin -d --lint

6 启动 ,并将其添加至开机自动启动队列中

#/usr/bin/spamd -d

#echo “/usr/bin/spamd –d” >>/etc/rc.local

第二十二 安装amavisd-new

1 安装amavisd-new 的依赖的软件包,当然可以依照上面的形式安装下面的软件版

Archive::Zip Compress::Zlib Convert::TNEF Convert::UUlib MIME::Base64 MIME::Parser Mail::Internet Net::Server Digest::MD5 IO::Stringy Time::HiRes Unix::Syslog BerkeleyDB

2 创建运行的目录,并赋予amavis用户

#mkdir -pv /var/amavis/ {tmp,var,db,home} # chown -R amavis:amavis /var/amavis

#chmod -R 750 /var/amavis

3 安装amavisd-new

#tar xvf amavisd-new-2.7.0-pre9.tar.gz #cd amavisd-new-2.7.0-pre9

4 安装拷贝服务端至SPATH中指定的目录,推介拷贝至/usr/local/sbin

#cp amavisd /usr/local/sbin

#chown root.amavis /etc/amavisd.conf #chmod 640 /etc/amavisd.conf 5 创建amavisd 运行中所需要的隔离区域 #mkdir -v /var/virusmails

#chown amavis.amavis /var/virusmails #chmod 750 /var/virusmails 6 修改主配置文件

修改为如下内容

$daemon_user = 'amavis'; $daemon_group = 'amavis';

$mydomain = 'benet.org'; (此处可更改为您集体的域)

$virus_admin = \ $mailfrom_notify_admin = \ $mailfrom_notify_recip = \ $mailfrom_notify_spamadmin = \ $mailfrom_to_quarantine = '';

virus_admin_maps => [\ (指定报告病毒和垃圾邮件时发送系统邮件的用户身份)

spam_admin_maps => [\

启动ClamAV在373行取消下面内容的注释 ['ClamAV-clamd',

\\&ask_daemon, [\

qr/\\bOK$/m, qr/\\bFOUND$/m,

qr/^.*?: (?!Infected Archive)(.*) FOUND$/m ],

['Mail::ClamAV', \\&ask_daemon, ['{}','clamav-perl:'], [0], [1], qr/^INFECTED: (.+)/m],

并将如上行中的/var/run/clamav/clamd 修改为:/var/run/clamav/clamd.socket 7 测试启动

#/usr/local/sbin/amavisd

同样可以执行如下的命令进行调试启动: #/usr/local/sbin/amavisd debug 注意把其添加到开机启动中

#echo “/usr/local/sbin/amavisd” >>/etc/rc.d/rc.local 注:如果遇到下面的错误提示

fetch_modules: error loading optional module MIME/Decoder/BinHex.pm:

Can't locate Convert/BinHex.pm in @INC (@INC contains: /usr/lib/perl5/site_perl/5.8.8/i386-linux-thread-multi /usr/lib/perl5/site_perl/5.8.8 /usr/lib/perl5/site_perl /usr/lib/perl5/vendor_perl/5.8.8/i386-linux-thread-multi /usr/lib/perl5/vendor_perl/5.8.8 /usr/lib/perl5/vendor_perl /usr/lib/perl5/5.8.8/i386-linux-thread-multi /usr/lib/perl5/5.8.8) at /usr/lib/perl5/site_perl/5.8.8/MIME/Decoder/BinHex.pm line 43.

BEGIN failed--compilation aborted at /usr/lib/perl5/site_perl/5.8.8/MIME/Decoder/BinHex.pm line 43.

Compilation failed in require at /usr/local/sbin/amavisd line 197.

出现上面的问题是因为软件包Convert-BinHex-1.119.tar.gz #tar xvf Convert-BinHex-1.119.tar.gz

# cd Convert-BinHex-1.119

#perl Makefile.PL

# make && make install

8 修改postfix 的配置文件,并配置其能调用amavisd,用来实现病毒及其垃圾邮件的过滤

#vim /etc/postfix/master.cf

==========================================================================

# service type private unpriv chroot wakeup maxproc command + args # (yes) (yes) (yes) (never) (100) #

==========================================================================

#

amavisfeed unix - - n - 2 smtp -o smtp_data_done_timeout=1200

-o smtp_send_xforward_command=yes -o disable_dns_lookups=yes -o max_use=20 #

127.0.0.1:10025 inet n - n - - smtpd -o content_filter=

-o smtpd_delay_reject=no

-o smtpd_client_restrictions=permit_mynetworks,reject -o smtpd_helo_restrictions= -o smtpd_sender_restrictions=

-o smtpd_recipient_restrictions=permit_mynetworks,reject -o smtpd_data_restrictions=reject_unauth_pipelining -o smtpd_end_of_data_restrictions= -o smtpd_restriction_classes= -o mynetworks=127.0.0.0/8 -o smtpd_error_sleep_time=0 -o smtpd_soft_error_limit=1001 -o smtpd_hard_error_limit=1000

-o smtpd_client_connection_count_limit=0 -o smtpd_client_connection_rate_limit=0 -o

receive_override_options=no_header_body_checks,no_unknown_recipient_checks,no_milters -o local_header_rewrite_clients=

注:注意每行的“-o”前的空格

#vi /etc/postifx/main.cf 在文末添加如下行:

content_filter=amavisfeed:[127.0.0.1]:10024

9 重新加载postfix 的主配置文件,并查看启动情况

#/usr/local/postfix/sbin/postfix reload #tai /var/log/maillog –f

10 查看amavisd是否在监听10024 端口,并测试服务启动的情况

#netstat –tunlp | grep 10024

联系合同范文客服:xxxxx#qq.com(#替换为@)