Skip to Main Content
Linux Server Security, Second Edition
book

Linux Server Security, Second Edition

by Michael D. Bauer
January 2005
Intermediate to advanced content levelIntermediate to advanced
544 pages
23h 44m
English
O'Reilly Media, Inc.
Content preview from Linux Server Security, Second Edition
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
294
|
Chapter 9: Securing Internet Email
which is both newer and more powerful than POP3. (Much of what follows, how-
ever, should to some extent apply to POP3.)
An IMAP-based MDA system has two parts: an IMAP server, which houses user
mailboxes and receives mail from some MTA; and a group of users running IMAP
client software. The three most popular open source IMAP servers are University of
Washington IMAP (UW IMAP), Cyrus IMAPD from Carnegie Mellon University,
and Courier IMAP from Inter7 Internet Techologies. Popular IMAP client applica-
tions include Netscape/Mozilla Communicator, Microsoft Outlook, Mutt, Pine, and
Apple Mac OS X Mail.
IMAP clients are out of the scope of our purposes here, but they’re relatively easy to
configure and use. Furthermore, most IMAP clients easily interoperate with most
IMAP servers, so there isn’t much to explain.
Principles of MDA Security
In practice, good MDA security requires two things: meaningful authentication, to
keep strangers out, and encryption, to protect both the integrity of authentication
transactions and the confidentiality of your users’ email sessions. In addition, your
MDA software needs to be configured in a way that takes full advantage of whatever
other security features it supports, including running as a nonpriviliged user, run- ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux: Powerful Server Administration

Linux: Powerful Server Administration

Uday Sawant, Oliver Pelz, Jonathan Hobson, William Leemans
Linux Server Hacks

Linux Server Hacks

Rob Flickenger
Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two

William von Hagen, Brian K. Jones

Publisher Resources

ISBN: 0596006705Supplemental ContentCatalog PageErrata