2018-03-12 New Server

I migrated my sites to a new server! Hopefully this means that the next dist-upgrade will work without a hitch.

Debian 9 “Stretch” it is!

If you notice any of my sites misbehaving, let me know. For now I’m proud of the A+ rating by SSL Labs.

Related: 2018-03-09 OpenVZ Pains, Sibirocobombus Setup.

2018-03-09 OpenVZ Pains

Sibirocobombus Setup

Bonus: I just realized how much simpler my setup has become now that I’m no longer self-hosting an email server!

To remind myself and others of the giant pain email has become, I’m copying the relevant stuff I deleted from my *Sibirocobombus Setup* page and the comments on that page.

You need to add reverse DNS entry on the web site.

“Mailing to remote domains not supported.”

I guess this means we need to fix exim?

First, comment the crontab on my Raspberry Pi such that it will no longer update my zonefile.

Setting up Exim using these rules:

1. https://debian-administration.org/article/718/DKIM-signing_outgoing_mail_with_exim4

2. note that the selector is something in your zone file, ie. dkim._domainkey for me DKIM_CANON=relaxed DKIM_SELECTOR=dkim DKIM_DOMAIN=alexschroeder.ch DKIM_PRIVATE_KEY=/etc/exim4/dkim/dkim.private

-X From:
-X Subject:
-X Message-Id:
-X Date:
-X To:
-X Content-Type:
-I "To: kensanata@gmail.com"
-s /usr/sbin/sendmail -t -f kensanata@gmail.com

https://wiki.debian.org/Exim​#Things\ you\ might\ want\ to\ configure

https://debian-administration.org/article/718/DKIM-signing_outgoing_mail_with_exim4

Debian documentation

in the Exim documentation

https://wiki.debian.org/Exim#Spam_scanning

http://www.exim.org/exim-html-current/doc/html/spec_html/ch-content_scanning_at_acl_time.html#SECID206

http://www.spamhaus.org/lookup/

https://senderscore.org/blacklistlookup/

magic string

resend mails

I’m trying to improve SpamAssassin and found the wiki page Improve Accuracy. `spamassassin -D --lint 2>&1 | grep -i failed` produces a few Perl modules:

Improve Accuracy

*Watch out!* Perhaps you’ll be getting daily mail with the following:

On ServerFault, I found the suggestion that some of the files in `/var/lib/spamassassin` had the wrong owner. It should be `debian-spamd`. And they were right!

On ServerFault

This listed `/var/lib/spamassassin/3.004000` and all its files belonging to root:

To fix it:

I’m not sure why those files ended being there, owned by root. Perhaps I had run `sudo sa-update` just to “test” it?

Time to get tough on spam! This is not funny.

I usually just run `p root` to see if I got anything from root. The Tiger reports, for example.

But really, pages and pages of spam is not good. What can I do?

I edited `/etc/exim4/exim4.conf.localmacros` and added the following:

Reload the config file using `sudo service exim4 reload`, perhaps? I wasn’t sure and did the following, instead:

My plan is to now lean back and watch `/var/log/exim4/rejectlog`.

Actually, there’s a test you can do according to DNS Blacklist with Exim: send a mail to nelson-pbl-test@crynwr.com from your mail server; the reply should get blocked.

DNS Blacklist with Exim

OK, checking my log file... `/var/log/exim4/mainlog` now says:

Oops, my server is itself listed! 😢

I followed the instructions:

instructions

And I did get back the following:

OK, following their instructions on naming issues.

naming issues

This makes me sad.

I changed the `127.0.0.1` line to say the following:

I’m not sure what I expect the names to be.

It seems to have done the thing, however. When I send another email to `helocheck@abuseat.org`, I get a positive reply:

So now, I’ll remove myself from the CBL and wait an hour or two before testing again.

Also note: those test results seem to take ages to get back. It’s far easier to simply check `/var/log/exim4/mainlog` and look for entries like the following:

​#Web ​#Administration