linux下sendmail的简单搭建和安全配置

一:sendmail概述

          Sendmail是目前使用最为广泛的一种E-mail服务器。当前其最新的稳定版本为8.14.3。 sendmail是最重要的邮件传输代理程序。因此理解电子邮件的工作模式是非常重要的。一般情况下,我们把电子邮件程序分解成传输代理,用户代理和投递代理三大部分。

1、电子邮件系统的专业术语

(1)邮件传输代理(Mail Transfer Agent):服务器执行的软件,用于在服务器之间传输邮件,一般每个系统只有一个MTA保持运行状态。

(2)邮件用户代理(Mail User Agent):客户端运行的软件,提供用户读、写、修改及处理邮件的功能,一个系统中可以有多个MUA在运行。

(3)邮件传递代理(Mail Delivery Agent):通常与MTA一同运行,将MTA接收的邮件按照目的位置作出相应处理,发往本机帐户下的邮箱或转发到另外的MTA。

(4)邮局协议(Post Office Protocol):是邮件系统接收电子邮件的通信协议,可以以“拉”的形式从服务器将邮件下载到本地进行阅读。

(5)Internet信息访问协议(Internet Message access Protocol):与POP一样是用来读取服务器上的邮件,但客户端必须登录服务器,属于在服务器上直接读取。

(6)简单邮件传输协议(Simple Mail Transfer Protocol):负责邮件传递的协议。

2、sendmail主要配置文件

(1)/etc/mail/sendmail.cf:sendmail的主要配置文件,管理所有参数。由于sendmail.cf中的语法很复杂,所以不要建议手工修改。由于我们可以以sendmail.mc文档配合sendmail-cf目录下的宏通过m4预处理器自动生成。

(2)/etc/mail/access.db:sendmail服务器的数据库,要转成这个数据库需要makemap命令和/etc/mail/access的配合

(3)/etc/mail/access:设置哪些地址的主机能够经过本地sendmail服务器进行收发邮件。

3、sendmail主要执行文件

(1)/usr/sbin/makemap:主要将access转成access.db的执行文件。

(2)/usr/sbin/mailstats:将/etc/mail/statistics配置文件读出来的执行文件,可以查看到目前为止sendmail共传送接受了多少邮件。

(3)/usr/bin/newaliases:使snedmail重新读取/etc/aliases的内容。

(4)/usr/bin/mailq:查看/var/spool/mqueue邮件暂存目录还有多少邮件没有发送。

4、邮件相关目录

(1)/var/spool/mail:每个使用者邮件存放目录,每个用户名为一个子目录。

(2)/var/spool/mqueue:没有发送出去的邮件暂存目录。

5:sendmail下载地址

sendmail.8.14.2.tar.gz http://www.sendmail.org/releases

二: sendmail的安全问题

随着Internet的爆炸性增长,像sendmail这样接受用户所提供的任意输入并把它投递给本地用户、文件或shell的应用常常会为黑客们提供一条实施攻击的坦途。sendmail和DNS甚至IP,正在尝试把身份验证和加密作为内建的解决方案以解决一些基本的安全性问题。

最近美国关于加密技术的出口法规开始松动,这使得sendmail在发布时可以内建对加密功能的挂接接口。版本8.11及其后继版本都支持用SSL(Secure Socket Layer,安全套接口协议层)进行SMTP身份验证和加密,SSL也称为TLS(Transport Layer Security,传输层加密)。sendmail在这里使用术语TLS,并且已经把它作为对SMTP协议的一种扩展―STARTTLS―实现了。TLS给它带来了6个用于鉴定文件和给文件上锁的新配置选项。对访问数据库进行匹配的新操作要求身份验证必须先取得成功。

三:各协议开放的端口

发送 Smtp :25 smtp+ssl(starttls) smtps: 465

接收 pop3 :110 pop3s: 995

Imap: 143 imap: 993

 

必要的实验环境:

1:操作系统:linux red hat enterprise server 内核版本 2.6.18-164.el5

2:本地的yum 服务器(在次不再演示如何搭建)

案例一:

需求分析:

某公司的总部位于北京,在其公司内部架设有一天dns服务器(192.168.10.100)负责bj.com的区域,而他的分公司上海也架设有一台dns服务器(192.168.10.101)负责sh.com,为了实现两个地方的邮件用户可以互发邮件,并且对所发的邮件进行加密。北京和上海也分别有自己的邮件服务器。

网络拓扑图:

clip_image002

步骤:

一:总部北京的配置

1:安装sendmail服务器的包

[root@mail ~]# rpm -qa|grep sendmail

sendmail-8.13.8-2.el5

sendmail-cf-8.13.8-2.el5

[root@mail ~]# rpm -qa|grep m4

m4-1.4.5-3.el5.1

2:编辑access文件

[root@mail ~]# cd /etc/mail

[root@mail mail]# vim access

Connect:localhost.localdomain RELAY

Connect:localhost RELAY

Connect:127.0.0.1 RELAY

Connect:192.168.10 RELAY  允许192.168.10.0 网段的主机通过本电子邮件服务器转发邮件

bj.com OK

sh.com RELAY

3:编辑local-host-names文件

[root@mail mail]# vim local-host-names

# local-host-names - include all aliases for your machine here.

bj.com  该sendmail服务器所管理的区域

4:配置北京的dns服务器

[root@mail Server]# rpm -ivh bind-9.3.6-4.P1.el5.i386.rpm

[root@mail Server]# rpm -ivh bind-chroot-9.3.6-4.P1.el5.i386.rpm

[root@mail Server]# rpm -ivh caching-nameserver-9.3.6-4.P1.el5.i386.rpm

5:编辑named.conf的配置文件

[root@mail Server]# cd /var/named/chroot/

[root@mail chroot]# ll

total 12

drwxr-x--- 2 root named 4096 Mar 4 22:21 dev

drwxr-x--- 2 root named 4096 Mar 4 22:26 etc

dr-xr-xr-x 135 root root 0 Mar 4 23:19 proc

drwxr-x--- 6 root named 4096 Mar 4 22:21 var

[root@mail chroot]# cd etc/

[root@mail etc]# cp -p named.caching-nameserver.conf named.conf

clip_image004

6:编辑区域声明文件

[root@mail etc]# vim named.rfc1912.zones

clip_image006

7:创建该区域的数据库文件bj.com.db

[root@mail etc]# cd ../var/named/

[root@mail named]# cp -p localhost.zone bj.com.db

[root@mail named]# ll

-rw-r----- 1 root named 355 Mar 4 22:38 bj.com.db

-rw-r----- 1 root named 198 Jul 30 2009 localdomain.zone

-rw-r----- 1 root named 195 Jul 30 2009 localhost.zone

8:编辑该文件

clip_image008

9:修改主机的dns指向

[root@mail named]# vim /etc/resolv.conf

search xyh.com

nameserver 192.168.10.100

10:修改主机的名字

[root@mail named]# vim /etc/sysconfig/network

NETWORKING=yes

NETWORKING_IPV6=no

HOSTNAME=mail.bj.com

[root@mail named]# vim /etc/hosts

# Do not remove the following line, or various programs

# that require network functionality will fail.

127.0.0.1 mail.bj.com

::1 localhost6.localdomain6 localhost6

11:将sendmail和named设置为自动启动

[root@mail named]# chkconfig sendmail on

[root@mail named]# chkconfig named on

12:在本机上建立两个用户

[root@mail named]# useradd user1

[root@mail named]# echo "123' |passwd --stdin user1

[root@mail named]# useradd user2

[root@mail named]# echo "123' |passwd --stdin user2

13:安装邮件接收服务器dovecat,并将其设置为自动服务

[root@mail ~]# yum install dovecot

[root@mail ~]# chkconfig dovecot on

[root@mail ~]# service dovecot restart

Stopping Dovecot Imap: [FAILED]

Starting Dovecot Imap: [ OK ]

[root@mail ~]#

14:重新启动机器

[root@mail named]# init 6

15:测试北京本地的两个用户是否可以互发邮件

clip_image010

clip_image012

clip_image014

clip_image016

这样的话我们就实现了本地的两个用户之间的互发邮件

clip_image018

clip_image020

 

二:上海分公司的配置

我们再次对以上的虚拟机进行克隆,并对相关的文件进行修改。

并在上海的邮件服务器创建user3,user4.

[root@mail named]# useradd user3

useradd: user user3 exists

[root@mail named]# echo "123"|passwd --stdin user3

Changing password for user user3.

passwd: all authentication tokens updated successfully.

[root@mail named]# useradd user4

useradd: user user4 exists

[root@mail named]# echo "123"|passwd --stdin user4

Changing password for user user4.

passwd: all authentication tokens updated successfully.

clip_image022

clip_image024

clip_image026

clip_image028

clip_image030

clip_image032

User3和user4之间发邮件

clip_image034

三:由于dns的工作原理,我们没有连接互联网,所以我们在这里开启dns的转发功能

1:北京的dns服务器

[root@mail ~]# vim /var/named/chroot/etc/named.conf

clip_image036

2:上海的dns服务器

[root@mail named]# vim /var/named/chroot/etc/named.conf

clip_image038

四:测试

使用上海的user3的账户给北京的user1用户发一份邮件

[root@mail ~]# dig -t mx bj.com

; <&lt;>&gt; DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5 <&lt;>&gt; -t mx bj.com

;; global options: printcmd

;; Got answer:

;; -&gt;&gt;HEADER<&lt;- opcode: QUERY, status: NOERROR, id: 36535

;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2

;; QUESTION SECTION:

;bj.com. IN MX

;; ANSWER SECTION:

bj.com. 86400 IN MX 10 mail.bj.com.

;; AUTHORITY SECTION:

bj.com. 86400 IN NS ns.bj.com.

;; ADDITIONAL SECTION:

mail.bj.com. 86400 IN A 192.168.10.100

ns.bj.com. 86400 IN A 192.168.10.100

;; Query time: 11 msec

;; SERVER: 192.168.10.100#53(192.168.10.100)

;; WHEN: Mon Mar 5 03:19:56 2012

;; MSG SIZE rcvd: 94

[root@mail ~]# dig -t mx sh.com

; &lt;&lt;>&gt; DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5 <&lt;>&gt; -t mx sh.com

;; global options: printcmd

;; Got answer:

;; -&gt;&gt;HEADER<&lt;- opcode: QUERY, status: NOERROR, id: 1025

;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2

;; QUESTION SECTION:

;sh.com. IN MX

;; ANSWER SECTION:

sh.com. 85138 IN MX 10 mail.sh.com.

;; AUTHORITY SECTION:

sh.com. 85138 IN NS ns.sh.com.

;; ADDITIONAL SECTION:

mail.sh.com. 85138 IN A 192.168.10.101

ns.sh.com. 85138 IN A 192.168.10.101

;; Query time: 2 msec

;; SERVER: 192.168.10.100#53(192.168.10.100)

;; WHEN: Mon Mar 5 03:20:06 2012

;; MSG SIZE rcvd: 94

clip_image040

在北京的user1上查看自己的邮件

clip_image042

这样的话我们的总公司和分公司之间就能够互相的发送和接收电子邮件啦。

       优化:在北京的dns上面配置dns反向解析,增加邮件的收发速度。

image

image

四:接下来我们就需要对服务器颁发证书,对数据进行加密

在北京那边搭建自己的CA服务器(我们使用openssl来进行搭建)

1:安装各个包,并修改配置文件

[root@mail Server]# cd /etc/pki/

[root@mail pki]# LL

-bash: LL: command not found

[root@mail pki]# ll

total 36

drwx------ 3 root root 4096 Feb 8 01:41 CA

drwxr-xr-x 4 root root 4096 Mar 4 22:48 dovecot

drwxr-xr-x 2 root root 4096 Feb 8 01:40 nssdb

drwxr-xr-x 2 root root 4096 Feb 8 01:41 rpm-gpg

drwxr-xr-x 5 root root 4096 Feb 8 01:41 tls

[root@mail pki]# vim tls/openssl.cnf

clip_image044

clip_image046

2:切换到CA 目录下面,建立相应的目录和文件

[root@mail pki]# cd CA/

[root@mail CA]# ll

total 8

drwx------ 2 root root 4096 Jun 30 2009 private

[root@mail CA]# mkdir certs newcerts crl 证书目录 ,证书的吊销列表目录

[root@mail CA]# touch index.txt index.txt文件

[root@mail CA]# echo "01" >serial serial文件

3:为ca服务器建立自己的钥匙和证书文件

[root@mail CA]# openssl genrsa 1024 &gt;private/cakey.pem产生钥匙文件

Generating RSA private key, 1024 bit long modulus

.......++++++

............................++++++

e is 65537 (0x10001)

[root@mail CA]# chmod 600 private/cakey.pem 改变私钥的相应的权限,增加安全性

[root@mail CA]# openssl req -new -x509 -key private/cakey.pem -out cacert.pem -days 3650

##这里我们可以指明证书的格式为-x509,有效日期10年

Country Name (2 letter code) [GB]:CN

State or Province Name (full name) [Berkshire]:BEIJING

Locality Name (eg, city) [Newbury]:BEIJING

Organization Name (eg, company) [My Company Ltd]:TECCENTRE

Organizational Unit Name (eg, section) []:TEC

Common Name (eg, your name or your server's hostname) []:root.net.net

Email Address []:

[root@mail CA]# ll

-rw-r--r-- 1 root root 1147 Mar 5 03:41 cacert.pem

drwxr-xr-x 2 root root 4096 Mar 5 03:38 certs

drwxr-xr-x 2 root root 4096 Mar 5 03:38 crl

-rw-r--r-- 1 root root 0 Mar 5 03:38 index.txt

drwxr-xr-x 2 root root 4096 Mar 5 03:38 newcerts

drwx------ 2 root root 4096 Mar 5 03:39 private

-rw-r--r-- 1 root root 3 Mar 5 03:38 serial

五:在北京的服务器上请求自己的证书

1:请求证书

[root@mail mail]# cd /etc/mail

[root@mail mail]# mkdir certs

[root@mail mail]# cd certs/

[root@mail certs]# openssl genrsa 1024 &gt; sendmail.key

Generating RSA private key, 1024 bit long modulus

....++++++

.............................................++++++

e is 65537 (0x10001)

[root@mail certs]# openssl req -new -key sendmail.key -out sendmail.csr

You are about to be asked to enter information that will be incorporated

into your certificate request.

What you are about to enter is what is called a Distinguished Name or a DN.

There are quite a few fields but you can leave some blank

For some fields there will be a default value,

If you enter '.', the field will be left blank.

-----

Country Name (2 letter code) [GB]:CN

State or Province Name (full name) [Berkshire]:BEIJING

Locality Name (eg, city) [Newbury]:BEIJING

Organization Name (eg, company) [My Company Ltd]:bjdx

Organizational Unit Name (eg, section) []:student

Common Name (eg, your name or your server's hostname) []:mail.bj.com

Email Address []:

Please enter the following 'extra' attributes

to be sent with your certificate request

A challenge password []:

An optional company name []:

[root@mail certs]# openssl ca -in sendmail.csr -out sendmail.cert

Using configuration from /etc/pki/tls/openssl.cnf

Check that the request matches the signature

Signature ok

Certificate Details:

Serial Number: 1 (0x1)

Validity

Not Before: Mar 4 19:50:34 2012 GMT

Not After : Mar 4 19:50:34 2013 GMT

Subject:

countryName = CN

stateOrProvinceName = BEIJING

organizationName = bjdx

organizationalUnitName = student

commonName = mail.bj.com

X509v3 extensions:

X509v3 Basic Constraints:

CA:FALSE

Netscape Comment:

OpenSSL Generated Certificate

X509v3 Subject Key Identifier:

0F:9D:CE:88:E6:94:F2:C4:89:C9:E6:FA:C3:DA:A6:7F:AB:5B:8D:03

X509v3 Authority Key Identifier:

keyid:97:3E:00:0C:F4:BF:06:46:63:E5:87:BC:45:14:5C:1E:62:54:FA:39

Certificate is to be certified until Mar 4 19:50:34 2013 GMT (365 days)

Sign the certificate? [y/n]:y

1 out of 1 certificate requests certified, commit? [y/n]y

Write out database with 1 new entries

Data Base Updated

2:修改钥匙和证书的权限

[root@mail certs]# chmod 600 *

[root@mail certs]# ll

total 12

-rw------- 1 root root 3082 Mar 5 03:50 sendmail.cert

-rw------- 1 root root 651 Mar 5 03:49 sendmail.csr

-rw------- 1 root root 887 Mar 5 03:47 sendmail.key

3:将证书和sendmail服务器捆绑

将服务器的证书考到sendmail的certs目录下

[root@mail certs]# cp /etc/pki/CA/cacert.pem .

[root@mail certs]# ll

total 16

-rw-r--r-- 1 root root 1147 Mar 5 03:54 cacert.pem

-rw------- 1 root root 3082 Mar 5 03:50 sendmail.cert

-rw------- 1 root root 651 Mar 5 03:49 sendmail.csr

-rw------- 1 root root 887 Mar 5 03:47 sendmail.key

[root@mail certs]# vim /etc/mail/sendmail.mc

clip_image048

4:开启tls的验证功能

clip_image050

5:重新启动sendmail的服务,验证starttls服务是否已经开启

[root@mail ~]# service sendmail restart

Shutting down sm-client: [ OK ]

Shutting down sendmail: [ OK ]

Starting sendmail: [ OK ]

Starting sm-client: [ OK ]

[root@mail ~]# telnet 127.0.0.1 25

Trying 127.0.0.1...

Connected to mail.bj.com (127.0.0.1).

Escape character is '^]'.

220 mail.bj.com ESMTP Sendmail 8.13.8/8.13.8; Mon, 5 Mar 2012 04:29:51 +0800

ehlo 127.0.0.1

250-mail.bj.com Hello mail.bj.com [127.0.0.1], pleased to meet you

250-ENHANCEDSTATUSCODES

250-PIPELINING

250-8BITMIME

250-SIZE

250-DSN

250-ETRN

250-STARTTLS 这里我们看到我们的smtp协议已经增加了ssl的功能

250-DELIVERBY

250 HELP

6:对接收服务器dovecot同样的颁发证书文件

[root@mail ~]# mkdir -p /etc/dovecot/certs

[root@mail ~]#

[root@mail ~]#

[root@mail ~]# cd /etc/dovecot/certs/

[root@mail certs]# mkdir certs newcerts crl

[root@mail certs]# touch index.txt

[root@mail certs]# echo "01" &gt;serial

[root@mail certs]# ll

total 16

drwxr-xr-x 2 root root 4096 Mar 5 04:35 certs

drwxr-xr-x 2 root root 4096 Mar 5 04:35 crl

-rw-r--r-- 1 root root 0 Mar 5 04:35 index.txt

drwxr-xr-x 2 root root 4096 Mar 5 04:35 newcerts

-rw-r--r-- 1 root root 3 Mar 5 04:35 serial

[root@mail certs]# openssl genrsa 1024 &gt;dovecot.key

Generating RSA private key, 1024 bit long modulus

.......++++++

.................................++++++

e is 65537 (0x10001)

[root@mail certs]# openssl req -new -key dovecot.key -out dovecot.csr

You are about to be asked to enter information that will be incorporated

into your certificate request.

What you are about to enter is what is called a Distinguished Name or a DN.

There are quite a few fields but you can leave some blank

For some fields there will be a default value,

If you enter '.', the field will be left blank.

-----

Country Name (2 letter code) [GB]:CN

State or Province Name (full name) [Berkshire]:BEIJING

Locality Name (eg, city) [Newbury]:BEIJING

Organization Name (eg, company) [My Company Ltd]:BJDX

Organizational Unit Name (eg, section) []:SEC

Common Name (eg, your name or your server's hostname) []:mail.bj.com

Email Address []:

Please enter the following 'extra' attributes

to be sent with your certificate request

A challenge password []:

An optional company name []:

[root@mail certs]# openssl ca -in dovecot.csr -out dovecot.cert

Using configuration from /etc/pki/tls/openssl.cnf

Check that the request matches the signature

Signature ok

Certificate Details:

Serial Number: 2 (0x2)

Validity

Not Before: Mar 4 20:39:09 2012 GMT

Not After : Mar 4 20:39:09 2013 GMT

Subject:

countryName = CN

stateOrProvinceName = BEIJING

organizationName = BJDX

organizationalUnitName = SEC

commonName = mail.bj.com

X509v3 extensions:

X509v3 Basic Constraints:

CA:FALSE

Netscape Comment:

OpenSSL Generated Certificate

X509v3 Subject Key Identifier:

75:37:BA:7A:1C:7D:FA:96:B6:0E:33:BF:C0:A9:85:21:FD:41:DC:BC

X509v3 Authority Key Identifier:

keyid:97:3E:00:0C:F4:BF:06:46:63:E5:87:BC:45:14:5C:1E:62:54:FA:39

Certificate is to be certified until Mar 4 20:39:09 2013 GMT (365 days)

Sign the certificate? [y/n]:y

1 out of 1 certificate requests certified, commit? [y/n]y

Write out database with 1 new entries

Data Base Updated

对证书进行绑定

[root@mail certs]# vim /etc/dovecot.conf

clip_image052

clip_image054

7:查看相应的加密的端口是否已经开放

Smtps 发送的加密

[root@mail certs]# netstat -tupln|grep sendmail

tcp 0 0 0.0.0.0:465 0.0.0.0:* LISTEN 3614/sendmail: acce

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 3614/sendm

[root@mail certs]# grep 465 /etc/services

smtps 465/tcp # SMTP over SSL (TLS)

pop3s ,imaps接收的加密

root@mail certs]# netstat -tupln|grep dovecot

tcp 0 0 :::993 :::* LISTEN 2847/dovecot

tcp 0 0 :::995 :::* LISTEN 2847/dovecot

tcp 0 0 :::110 :::* LISTEN 2847/dovecot

tcp 0 0 :::143 :::* LISTEN 2847/dovec

[root@mail certs]# grep 995 /etc/services

pop3s 995/tcp # POP-3 over SSL

[root@mail certs]# grep 993 /etc/services

imaps 993/tcp # IMAP over SSL

8:安装wireshark的抓包工具,进行发送和接收的验证

[root@mail ~]# yum install wireshark*

clip_image056

验证明文的pop3协议

[root@mail ~]# tshark -ni eth0 -R "tcp.dstport eq 110"

clip_image058

3:smtps发送的加密验证

clip_image060

clip_image062

查看日志

clip_image064

在客户端软件上进行认证的设置

clip_image066

clip_image068

用tshark进行抓包,分析结果

[root@mail ~]# tshark -ni eth0 -R "tcp.dstport eq 993" imaps协议

clip_image070

Pop3s 协议

clip_image072

这样我们已经看到我们的电子邮件服务器已经启用了发送的和接收的加密功能。

六:在服务器上启用SASL功能 SASL (简单认证安全层)服务名为:saslauthd

默认已经进行了安装

1:[root@mail Server]# rpm -qa|grep sasl

cyrus-sasl-lib-2.1.22-5.el5

cyrus-sasl-2.1.22-5.el5

cyrus-sasl-devel-2.1.22-5.el5

cyrus-sasl-plain-2.1.22-5.el5:

2:[root@mail Server]# chkconfig saslauthd on 设置该服务为自动的启动

[root@mail Server]# chkconfig --list saslauthd

saslauthd 0:off 1:off 2:on 3:on 4:on 5:on 6:off

[root@mail Server]# service saslauthd start

Starting saslauthd: [ OK ]

3:[root@mail Server]# vim /etc/mail/sendmail.mc 修改sendmail的主配置文档

39 define(`confAUTH_OPTIONS', `A y')dnl

52 TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl

53define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl

116 DAEMON_OPTIONS(`Port=smtp,Addr=0.0.0.0, Name=MTA,M=Ea')dnl

[root@mail Server]# service sendmail restart

Shutting down sm-client: [ OK ]

Shutting down sendmail: [ OK ]

Starting sendmail: [ OK ]

Starting sm-client: [ OK ]

4:在北京的服务器上进行验证

clip_image074

mail from [email protected] 非注册的用户

530 5.7.0 Authentication required

mail from [email protected] 注册的用户

530 5.7.0 Authentication required

5:接下来我们对注册的用户的账号和密码进行base64的验证

image

6:再次验证

image

7:在服务器上查看邮件是否已经发送

image

8:[root@mail ~]# tail -f /var/log/maillog 查看服务器上的日志文件

image

 

小结:邮件服务器我们已经搭建成功了,并且实现了一定的安全功能。

你可能感兴趣的:(代理,color,target,blank,160)