Exim4-LDAP 0.0.5 initial released

Exim4-LDAP is my latest development progress. It is a Debian package that depends on exim4-heavy-daemon and slapd, which utilize Qmail-LDAP schema as backend database schema for seamless migration. Unlink Qmail-LDAP which required for manual source patching and compile, Exim4-LDAP just define additional authentication/router/transfer rules within configuration files. The ultimate goal of this research project is going to integrate with Samba-LDAP-PAM (for both Windows/Linux Single-Sign-On), RADIUS (for other services SSO) and even other services such as webmail. The project is now hosting in with .deb available, download now. Here I will draft some simple installation guideline which not yet included in source package document. I am now testing this with a newly installed Debian Lenny sandbox.

Configurate OpenLDAP in mirror mode replication

I am going to share some user account & directory with NFS among 2~3 servers. Traditionally we can use NFS+NIS solution, but I would like to try out NFS+LDAP+PAM/NSS plus OpenLDAP mirror mode replication.
For LDAP + PAM/NSS, please refer to my other article: LDAP + Samba PDC + PAM/NSS on Debian Lenny HOWTO

Add OpenLDAP mirror mode replication to existing server

Update my 3ware 9650SE firmware + driver + software

I just figure out that 3ware had a new release of firmware and tools for my 9650SE RAID controller. BTW, as Debian unofficial APT is now legacy without update, I search for package original author webiste: P.S. According to release note, need to upgrade driver and software BEFORE (prior) upgrade the firmware:

Rescuing rm-ed file from EXT3

Background: I run multiple VirtualBox client within a single server. Each VirtualBox client coming with its *.vdi file for sure. Accidentally I run rm to them during migration and backup, and so some *.vdi are lose. I need to rescue them. Most important action for rescue: unplug the server power and shut-it-down IMMEDIATELY! Try not to preform ANY write action to the target harddisk ANYMORE!

Protect your Apache from spam IP attack

Besides mod_evasive, there exists another spam deference module for Apache2 in Debian unstable - libapach2-mod-spamhaus.

Again mod-spamhaus is a configuration-free package. Just install it with apt-get:

apt-get -t unstable install libapache2-mod-spamhaus

Double check the installation with:

find /etc/apache2 -name '*spamhaus*'

Also remember to restart Apache in order to get it active:

Temperary Exim4 SASL AUTH solution with LDAP-Samba-PAM/NSS + Courier authpam module

Recall to my previous Exim4 + Courier + SSL on Debian etch mini-HOWTO, Exim4 authentication should work fine without enable plain_courier_authdaemon and login_courier_authdaemon support. But case will become a bit more complicated when using LDAP-Samba-PAM/NSS setup: LDAP user will now not able to be authenticated. Why and what's up!?

Exim4 SMTP relay though smarthost without TLS support on Debian Lenny

Similar as my previous approach with GMail SMTP smarthost relay, now I try to use my own ISP's SMTP as relay server. BTW, as HGC Broadband's SMTP server only allow port 25 with plain text authentication, with default Debian setup I get the following error message:

Using Exim4 to send Messages through GMail on Debian Lenny

NOTE: For complete and latest version please refer to


My email server seems a bit crazy on these day: both GMail and Yahoo! Mail block a direct send from my server because of following reason: SMTP error from remote mail server after end of data: host []: 550-5.7.1 [x.x.x.x] The IP you're using to send mail is not authorized to 550-5.7.1 send email directly to our servers. Please use the SMTP relay at your

Some suggested default setup for new Mailman list

All default setup for new Mailman list are located in /usr/lib/mailman/Mailman/, BUT please NEVER touch it and override by using /etc/mailman/ Here are some suggested setup for internal usage, just copy and append at the end of /etc/mailman/ DEFAULT_ARCHIVE_PRIVATE = 1 DEFAULT_GENERIC_NONMEMBER_ACTION = 3 DEFAULT_LIST_ADVERTISED = No DEFAULT_MAX_MESSAGE_SIZE = 0 DEFAULT_MSG_FOOTER = "" DEFAULT_MSG_HEADER = "" DEFAULT_REQUIRE_EXPLICIT_DESTINATION = No DEFAULT_SUBJECT_PREFIX = ""

SNMP + RRDTool + Cacti on Debian Lenny mini-HOWTO

SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. With SNMP + RRDTool + Cacti, you can generate graph for your system dynamically. As compare with other solution, e.g. SNMP + MTRG, RRDTool is more specific for information NOT only about network traffic but support both other information, plus database-like query system so you can fetch report for any time period. This mini-HOWTO will guide you though the setup for SNMP + RRDTool + Cacti on Debian Lenny.


Subscribe to Debian