HP Internet Express for Tru64 UNIX Administrator's Guide

Internet Express for Tru64 UNIX Version
6.10
Administration Guide
Abstract
This document describes how to use the Administration utility for HP Internet Express to manage a Web server and the Internet services provided with the product.
HP Part Number: 5900-1418 Published: March 2011
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. UNIX is a registered trademark of The Open Group.

Contents

About This Document...................................................................................12
Intended Audience..................................................................................................................12
Document Organization..........................................................................................................12
Typographic Conventions.........................................................................................................13
Related Information.................................................................................................................14
Reading the Documentation.....................................................................................................14
Reading Documentation Using the Administration Utility..........................................................14
Reading Documentation Using the Public Web Server.............................................................14
Reading Documentation from the Internet Express CD–ROM ...................................................15
On a Tru64 UNIX System...............................................................................................15
On a PC......................................................................................................................15
Reading Reference Pages for Internet Express Components......................................................15
Reading the Open Source Software Component Documentation...............................................16
Reader's Comments................................................................................................................16
1 Using the Administration Utility...................................................................18
Using the Administration Utility Main Menu...............................................................................19
Registering Your Internet Express Installation..........................................................................20
Navigating the Administration Utility....................................................................................20
Using Administration Utility Forms........................................................................................20
Accessing Administration Servers..............................................................................................22
Accessing the Internet Express Login Account.............................................................................23
Accessing and Managing the Internet Monitor...........................................................................23
Managing Internet Express in a TruCluster Environment................................................................23
Using Internet Express Services in a Cluster...........................................................................24
TruCluster Impact on Internet Express Administration...............................................................24
Installing and Removing Components........................................................................................24
Accessing Web-Based System Management Tools.......................................................................26
Performing Web-Based System Management.........................................................................26
Tuning Kernel Attribute Values..............................................................................................27
2 Where to Find More Information.................................................................29
Internet Express and AlphaServer Products Web Sites..................................................................29
Open Source Software Web Sites.............................................................................................29
System Security Web Sites.......................................................................................................34
Other Useful Web Sites...........................................................................................................35
Encompass............................................................................................................................36
3 User Administration..................................................................................37
Overview of User Accounts......................................................................................................38
Specifying User Names......................................................................................................39
Assigning Passwords to User Accounts..................................................................................39
Purging Obsolete Passwords................................................................................................39
Searching for User Accounts................................................................................................40
Assigning Users to Groups..................................................................................................41
Creating Captive Accounts for Named Users..............................................................................42
Creating Captive Accounts for Generic Users.............................................................................43
Creating a Noncaptive Account for a UNIX System User..............................................................44
Creating Groups....................................................................................................................46
Contents 3
Displaying User Account Information.........................................................................................47
Deleting User Accounts...........................................................................................................48
Changing Groups for User Accounts.........................................................................................49
Changing the Password for an Account.....................................................................................51
Changing Mail Services for Users.............................................................................................52
Assigning Regular Delivery Mail Service...............................................................................53
Assigning POP with Password Mail Service...........................................................................53
Assigning the Cyrus IMAP Mail Service.................................................................................54
Assigning Cyrus IMAP with Password Mail Service.................................................................54
Assigning APOP with Password Mail Service.........................................................................55
Managing the iass Account.....................................................................................................55
Changing the iass Account Forwarding Address....................................................................55
Managing the .users.list File................................................................................................55
Listing User Accounts and Passwords................................................................................56
Purging Passwords for User Accounts...............................................................................56
Removing the .users.list File.............................................................................................56
Managing the User Self-Administration Feature...........................................................................56
Enabling and Disabling the User Self-Administration Feature....................................................57
Enabling User Self-Administration When No Web Server Configuration Exists.......................58
Enabling User Self-Administration When a Current Web Server Configuration Exists..............59
Modifying the Web Server Configuration..............................................................................59
Enabling and Disabling Login Delays...................................................................................60
Managing User Self-Administration Groups...........................................................................61
Adding Groups.............................................................................................................61
Deleting and Modifying Groups......................................................................................62
Enabling and Disabling Groups......................................................................................63
Customizing the User Self-Administration Feature....................................................................63
4 User Authentication...................................................................................65
Managing the LDAP Module for System Authentication................................................................65
Default Configuration for the LDAP Module for System Authentication........................................66
Creating Branches.............................................................................................................69
Extended LDAP Schema for UNIX Account Information............................................................70
Indexing Attributes for the Directory Servers...........................................................................71
Adding Indices for OpenLDAP........................................................................................72
Configuring the LDAP Module for System Authentication..............................................................72
Modifying the LDAP Module Configuration............................................................................73
Defining LDAP System Parameters....................................................................................73
Configuring LDAP Password Attributes..............................................................................74
Configuring LDAP Group Attributes..................................................................................75
Testing the LDAP Module Configuration.................................................................................76
Enabling and Disabling the LDAP Module.............................................................................76
Importing and Exporting Users from /etc/passwd.......................................................................76
Importing Users into the Directory Server...............................................................................77
Importing Users from NIS....................................................................................................77
Exporting Users from the Directory Server..............................................................................77
Adding an LDAP User in a C2 Environment...........................................................................77
Access Control..................................................................................................................78
Utilities for Maintaining User Information in the LDAP Directory Server...........................................78
Checking the LDAP Server Configuration...............................................................................81
Extracting Users from the /etc/passwd File............................................................................81
Adding a User Entry...........................................................................................................81
Deleting a User Entry.........................................................................................................82
Retrieving a User Entry........................................................................................................82
4 Contents
Synchronizing with a Password File......................................................................................83
Adding a Group Entry........................................................................................................83
Maintaining Group Membership..........................................................................................84
Deleting a Group Entry.......................................................................................................84
Retrieving a Group Entry.....................................................................................................85
Setting a User's Password in the LDAP Directory Server...........................................................85
Starting the ldapcd Daemon................................................................................................85
Stopping the ldapcd Daemon..............................................................................................86
Maintaining the LDAP Directory Server Using LDAP Commands....................................................86
Adding Entries to an LDAP Database....................................................................................86
Modifying Entries in an LDAP Database................................................................................86
Overview of the LDAP Client....................................................................................................87
Actions Performed by the LDAP Client...................................................................................87
Authentication Actions Performed.........................................................................................87
Files Modified by theLDAP Module for System Authentication...................................................87
Files Not Modified by the LDAP Module for System Authentication............................................87
Other Important Files..........................................................................................................87
/etc/ldapusers.deny......................................................................................................87
/etc/ldapusers.allow.....................................................................................................88
Behavior of the the ldapdc Daemon.....................................................................................88
Debugging ldapdc.............................................................................................................88
Operation of login/su........................................................................................................88
5 Mail Delivery Administration......................................................................90
Sendmail Server Administration................................................................................................90
Configuring the System as a Standalone Mail System.............................................................91
Configuring the System as a Mail Client................................................................................91
Configuring the System as a Mail Server...............................................................................91
Creating and Deleting Host Aliases for a Mail Server.........................................................92
Changing the Sendmail Server Configuration........................................................................93
Configuring Mail Protocols.............................................................................................94
Creating and Deleting Pseudo Domain Aliases.............................................................94
Configuring the MTS Protocol.....................................................................................95
Configuring the DECnet Phase IV Protocol....................................................................95
Configuring the DECnet/OSI Protocol.........................................................................96
Configuring the UUCP Protocol..................................................................................97
Configuring the X.25 Protocol....................................................................................97
Configuring Masquerading............................................................................................98
Accessing the Configure Masquerading Form...............................................................98
Users Automatically Excluded from Masquerading........................................................99
Configuring Your System for Masquerading...............................................................100
Configuring Virtual Domains.........................................................................................101
Enabling Procmail as a Local Mailer..............................................................................103
Enabling Anti-Virus......................................................................................................103
Configuring Anti-Spam.................................................................................................104
Configuring Relaying..............................................................................................104
Configuring the Access Database.............................................................................105
Configuring Checking on Sender's Information...........................................................107
Configuring LDAP........................................................................................................107
Configuring Mail Filters (MILTER)...................................................................................108
Adding a Mail Filter...............................................................................................109
Modifying a Mail Filter...........................................................................................109
Deleting a Mail Filter..............................................................................................110
Filters Included with Internet Express..........................................................................110
Contents 5
Creating a New Mail Filter......................................................................................110
Adding the Sample Filter Using the Administration Utility.............................................110
Testing the New Filter..............................................................................................110
Configuring Queues....................................................................................................111
Adding a Queue....................................................................................................111
Modifying a Queue Group......................................................................................112
Deleting a Queue Group.........................................................................................112
Configuring Queue Performance...................................................................................113
Configuring Trusted Layer Security.................................................................................114
Enabling Support Using the Access Database.................................................................116
Controlling the Sendmail Server.........................................................................................118
Configuring Mailbox Access.............................................................................................118
Viewing the Sendmail Server Log.......................................................................................119
Majordomo Mailing List Administration....................................................................................119
Creating a Majordomo Mailing List....................................................................................119
Changing a Majordomo Mailing List Configuration..............................................................120
Changing List Owner or Charter...................................................................................120
Changing Administration Parameters.............................................................................121
Changing Subscription Parameters................................................................................121
Changing Message Content Parameters.........................................................................122
Changing Digest Parameters.........................................................................................123
Changing Command Access Parameters........................................................................123
Changing Moderated List Parameters.............................................................................124
Changing List Restriction Parameters..............................................................................124
Changing Address Processing Parameters......................................................................125
Deleting a Majordomo List................................................................................................125
Mailman.............................................................................................................................125
Create a Mailing List........................................................................................................126
Creating the Initial Mailman List Using a Script....................................................................126
Deleting a Mailing List......................................................................................................126
Managing Mailman.........................................................................................................126
Managing Mailing Lists...............................................................................................126
Mailman Scripts...............................................................................................................128
Mailman Log Files............................................................................................................128
Bogofilter Spam Filter............................................................................................................128
Training Bogofilter............................................................................................................128
Filtering with Bogofilter.....................................................................................................129
Filter Integration with Other Tools.......................................................................................129
Using Bogofilter with procmail......................................................................................129
Mutt Integration with Bogofilter.....................................................................................130
Pine Integration with Bogofilter......................................................................................130
Mail Transport Agent (MTA) Integration with Bogofilter.....................................................130
6 Mail Access Administration......................................................................132
POP Mail Server Administration..............................................................................................132
Controlling the POP3 Server..............................................................................................132
Controlling the POP2 Server..............................................................................................132
Controlling the POPPASSD Server.......................................................................................132
Viewing the POP Mail Server Log.......................................................................................133
IMAP Mail Server Administration............................................................................................133
Setting Up a UNIX User Account for UW IMAP....................................................................134
Setting Up a UNIX User Account for Cyrus IMAP..................................................................134
Converting IMAP Mail Folders...........................................................................................134
Controlling the Cyrus IMAP Server......................................................................................135
6 Contents
Controlling the UW IMAP Server.......................................................................................135
Configuring SSL for UW-IMAP...........................................................................................136
Viewing the IMAP Server Log............................................................................................136
IMP Webmail Administration..................................................................................................137
Accessing the IMP Webmail Administration Menu................................................................138
Enabling and Disabling IMP Webmail................................................................................138
Managing Mail Server Settings.........................................................................................139
Modifying the Mail Server List...........................................................................................140
Adding a Mail Server..................................................................................................140
Modifying a Mail Server..............................................................................................142
Deleting a Mail Server.................................................................................................142
Managing Mailbox Settings..............................................................................................142
Managing Compose Settings............................................................................................143
Managing Message Settings.............................................................................................144
Managing Logging Settings..............................................................................................145
Managing Preference Driver Settings..................................................................................147
Managing Miscellaneous IMP Settings................................................................................148
Managing Horde Settings.................................................................................................148
Managing Turba Settings..................................................................................................150
Using IMP Upgrade Tools.................................................................................................151
Upgrading IMP Configurations......................................................................................152
Upgrading IMP Databases...........................................................................................152
Accessing IMP Webmail...................................................................................................154
Additional Webmail Documentation...................................................................................154
7 Web Services Administration...................................................................155
Secure Web Server Administration..........................................................................................155
Accessing the Secure Web Servers.....................................................................................156
Web Server Management.................................................................................................157
Changing Configuration Parameters...................................................................................157
Changing the Password for the Administration Web Server....................................................158
Allowing Remote Access to the Internet Monitor Administration Server.....................................159
ht://Dig Search Tool Administration.......................................................................................159
Creating the Search Index.................................................................................................159
Searching the Index.........................................................................................................163
Documentation................................................................................................................163
8 XML Component Administration...............................................................164
Directories and Subsets for XML Components...........................................................................164
Apache Axis Server Administration.........................................................................................165
Managing the Apache Axis Server.....................................................................................165
Enabling and Disabling the Apache Axis Server..................................................................165
Apache Cocoon Servlet Administration....................................................................................165
Managing the Apache Cocoon Servlet...............................................................................166
Enabling and Disabling the Cocoon Servlet.........................................................................166
Viewing the Cocoon Log Files............................................................................................166
9 Network Security Administration...............................................................167
TCP Wrapper Administration..................................................................................................167
Network Services Wrapped by Internet Express...................................................................167
Controlling Access to Other Network Services.....................................................................168
Modifying Access to a Wrapped Network Service...............................................................168
Testing TCP Security Modifications.....................................................................................169
Contents 7
FireScreen Administration.......................................................................................................170
Installing FireScreen..........................................................................................................171
Configuring FireScreen.....................................................................................................175
Setting Command-Line Options.....................................................................................176
Setting the Screening Mode..........................................................................................178
Adding a Screening Rule.............................................................................................178
Checking Syntax of Screening Rules...............................................................................180
Deleting a Screening Rule............................................................................................180
Starting and Stopping FireScreen.......................................................................................181
Starting FireScreen......................................................................................................181
Stopping FireScreen.....................................................................................................182
Viewing FireScreen Status..................................................................................................183
Viewing FireScreen Screening Rules...............................................................................183
Viewing the FireScreen Log...........................................................................................183
Viewing FireScreen Statistics.........................................................................................184
Snort Intrusion Detection System .............................................................................................184
Configuring Snort Decoder...............................................................................................185
Configuring Snort Preprocessor..........................................................................................185
Running Snort..................................................................................................................186
Viewing Alert Messages....................................................................................................186
FreeRADIUS Server Administration..........................................................................................186
Considerations While Installing FreeRADIUS........................................................................187
Starting and Stopping the FreeRADIUS Server......................................................................187
Understanding FreeRADIUS Configuration Files....................................................................187
Viewing FreeRADIUS Log File............................................................................................189
10 Proxy Services Administration.................................................................190
Dante SOCKS Server Administration.......................................................................................190
Controlling the Dante SOCKS Server..................................................................................190
Configuring the Dante SOCKS Server.................................................................................191
Accessing Dante SOCKS Information..................................................................................191
Squid Proxy/Caching Server Administration.............................................................................191
Configuring the Squid Proxy/Caching Server......................................................................192
Reinitializing the Disk Cache.............................................................................................192
Managing the Squid Proxy/Caching Server........................................................................192
Rotating Log Files.............................................................................................................193
Displaying Access Statistics...............................................................................................193
Controlling the Squid Proxy/Caching Server........................................................................194
11 LDAP Directory Server Administration.......................................................195
Understanding the LDAP Directory Schema..............................................................................195
Using the LDAP Browser........................................................................................................196
Installing and Running the LDAP Browser.............................................................................197
Managing Frequently Used Connections.............................................................................197
Connecting to an LDAP Server......................................................................................197
Creating or Editing Frequently Used Connections.............................................................197
Connecting to an LDAP Server using SSL........................................................................198
Disconnecting from an LDAP Server...............................................................................199
Reconnecting to an LDAP Server....................................................................................199
Using the Main Browsing Window ....................................................................................199
Opening a New Main Window....................................................................................200
Closing a Main Window.............................................................................................200
Viewing a Directory Entry in a Separate Window............................................................200
8 Contents
Refreshing an Entry.....................................................................................................200
Controlling Client-Side Schema Checking.......................................................................200
Adding a New Directory Entry......................................................................................201
Modifying a Directory Entry..........................................................................................201
Deleting a Directory Entry............................................................................................201
Copying a Directory Entry............................................................................................201
Renaming a Directory Entry..........................................................................................202
Moving a Directory Entry.............................................................................................202
Adding Attributes........................................................................................................202
Modifying Attributes....................................................................................................202
Deleting Attributes ......................................................................................................203
Managing Directory Entry Templates.............................................................................203
Creating Entry Templates..............................................................................................203
Modifying Entry Templates...........................................................................................203
Deleting Directory Entry Templates.................................................................................203
Renaming Directory Entry Templates..............................................................................203
Copying Directory Entry Templates................................................................................203
Searching the Directory....................................................................................................204
Viewing the Object Class Schema......................................................................................204
Viewing the Attribute Schema............................................................................................204
User Configuration File.....................................................................................................205
Managing and Using the OpenLDAP Directory Server...............................................................205
Managing the OpenLDAP Directory Server..........................................................................205
Controlling the OpenLDAP Directory Server....................................................................205
Configuring the OpenLDAP Directory Server...................................................................205
Configuring the OpenLDAP Directory Server Independently of the Installation Procedure.......206
12 OpenSLP Administration........................................................................207
OpenSLP Overview...............................................................................................................207
Configuration Files and Examples...........................................................................................207
Configuring OpenSLP............................................................................................................208
Using the OpenSLP Configuration and Registration Files........................................................208
Configuring Optional Security...........................................................................................208
Running the Services........................................................................................................209
Running the Example Configuration.........................................................................................210
Considerations for Using SLP APIs...........................................................................................210
Documentation.....................................................................................................................211
13 FTP Server Administration.......................................................................213
Administering Pure-FTP Server.................................................................................................213
Creating or Modifying an Anonymous Pure-FTP User Account................................................213
Enabling or Disabling Anonymous Pure-FTP Access...............................................................214
Enabling or Disabling chroot.............................................................................................214
Displaying Active Pure-FTP Users........................................................................................215
Enabling or Disabling Pure-FTP server.................................................................................215
14 Samba File and Print Server Administration..............................................216
Enabling and Disabling the Samba Server...............................................................................216
Options for Modifying the smb.conf Configuration File..............................................................216
Understanding the smb.conf Configuration File.........................................................................216
Administering the Samba Server Using the SWAT Program........................................................219
Configuring the Samba Server Using the SWAT Program......................................................219
Configuring Global Variables.......................................................................................222
Contents 9
Configuring Share Parameters.......................................................................................222
Controlling Printers......................................................................................................223
Viewing the Status of the Server....................................................................................223
Viewing the Current Configuration.................................................................................223
Administering Passwords..............................................................................................223
15 InterNetNews Server Administration........................................................225
INN Daemons......................................................................................................................226
Specifying INN Configuration Data........................................................................................226
Configuring an External Newsfeed..........................................................................................227
Displaying an External Newsfeed.......................................................................................228
Adding an External Newsfeed...........................................................................................229
Modifying an External Newsfeed.......................................................................................231
Removing an External Newsfeed........................................................................................231
Modifying Newsfeed Defaults............................................................................................231
Updating the Local Active File............................................................................................232
Managing Client Access........................................................................................................232
Displaying Client Access Groups........................................................................................233
Adding a Client Access Group..........................................................................................233
Modifying an Existing Client Access Group.........................................................................234
Removing a Client Access Group.......................................................................................234
Displaying Client Authentication Groups.............................................................................235
Managing Client Authentication Groups.............................................................................235
Adding Client Authentication Groups.............................................................................235
Modifying Client Authentication Groups.........................................................................236
Deleting Client Authentication Groups............................................................................237
Configuring Storage Options..................................................................................................237
Configuring Storage Method Entries...................................................................................237
Displaying Storage Method Entries................................................................................237
Adding a New Storage Method Class ..........................................................................238
Modifying a Storage Method Class ..............................................................................238
Deleting a Storage Method Class .................................................................................239
Configuring the CNFS Storage Method ..............................................................................239
Displaying CNFS Entries..............................................................................................239
Adding New CNFS Entries...........................................................................................239
Modifying CNFS Entries...............................................................................................240
Deleting CNFS Entries..................................................................................................241
Managing Article Expiration..................................................................................................241
Displaying Article Expiration Definitions..............................................................................241
Adding an Article Expiration Definition...............................................................................242
Modifying an Article Expiration Definition...........................................................................244
Deleting an Article Expiration Definition..............................................................................245
Modifying the Retention Period for Expired Articles...............................................................245
Managing Local Newsgroups................................................................................................245
Creating Local Newsgroups..............................................................................................246
Deleting Local Newsgroups...............................................................................................246
Viewing INN Log Files...........................................................................................................246
Controlling the INN Server....................................................................................................247
16 Internet Relay Chat Administration...........................................................248
Configuring IRC....................................................................................................................248
Controlling the IRC Server......................................................................................................248
10 Contents
17 PostgreSQL Database and MySQL Administration......................................249
Installing PostgreSQL.............................................................................................................249
Starting and Stopping PostgreSQL Server.................................................................................249
Viewing the PostgreSQL Log File.............................................................................................250
Administering PostgreSQL Accounts.........................................................................................251
Important Files and Directories...........................................................................................251
Running the Postmaster Startup Script..................................................................................252
Using Existing PostgreSQL Accounts....................................................................................252
Setting up a Crontab Entry for Vacuuming Databases................................................................252
Scaling PostgreSQL...............................................................................................................256
MySQLadministrationAdministering MySQL..............................................................................258
Directories and Files Established by MySQL Installation.........................................................258
Starting and Stopping MySQL...........................................................................................258
Starting and Stopping the MySQL Server Using a Command Line..........................................259
MySQL Configuration Files................................................................................................259
MySQL Log Files..............................................................................................................259
Viewing the MySQL Error Log............................................................................................259
Viewing the MySQL General Log.......................................................................................259
18 BIND Domain Name Server Administration..............................................260
BIND Overview....................................................................................................................260
Important BIND Files and Directories.......................................................................................260
Enabling BIND.....................................................................................................................262
Running the BIND Startup Script.............................................................................................263
BIND Documentation............................................................................................................263
19 Jabber.................................................................................................265
Controlling the Jabber Server.................................................................................................265
20 Twiki...................................................................................................266
Starting TWiki......................................................................................................................266
21 Stunnel................................................................................................267
Sample client server configuration...........................................................................................267
A Sendmail Supplemental Information..........................................................268
Creating a Certificate of Authority..........................................................................................268
Background - OpenSSL Certificate Creation..............................................................................268
Mail Filter Example...............................................................................................................269
Glossary..................................................................................................272
Index.......................................................................................................276
Contents 11

About This Document

This manual describes how to use the HP Internet Express for Tru64™ UNIX Administration utility to configure and manage Internet software components supplied with the product kit. Information on managing components that are not configured through the Administration utility is also included in this document, as well as information on managing user accounts.
For more information on configuring Internet software, see the documentation for the particular Internet component and the documentation for the UNIX shell command environment. For more
information on HP Tru64™ UNIX system management, see the Tru64 UNIX operating system documentation.

Intended Audience

This manual is intended for the system administrator who will manage an AlphaServer™ system running Internet Express for Tru64 UNIX.

Document Organization

This manual consists of the following:
Chapter 1 describes how to access and use the Administration utility.
Chapter 2 provides pointers to Web sites where you can get more information on Internet
Express, Open Source software, and Web authorities and standards organizations.
Chapter 3 explains how to manage user accounts using the Administration utility.
Chapter 4 explains how to manage user authentication with the LDAP Module for System
Authentication.
Chapter 5 describes how to manage the mail delivery components: the Sendmail server,
Majordomo, Mailman, and Bogofilter.
Chapter 6 describes how to manage the mail access components: POP, IMAP, and IMP
Webmail.
Chapter 7 explains how to configure and manage Web services, which includes the Secure
Web Server for Tru64 UNIX powered by Apache and the ht://Dig search tool.
Chapter 8 describes how to manage the XML components.
Chapter 9 explains how to manage the network security administration tools that include TCP
Wrapper security modifications, and to set up firewall protection, Snort intrusion detection, and FreeRADIUS user authentication.
Chapter 10 explains how to configure and manage the proxy services, which include the
Dante SOCKS Server and the Squid Proxy/Caching Server.
Chapter 11 describes how to set up and manage the LDAP Directory servers.
Chapter 12 describes how to configure and manage OpenSLP.
Chapter 13 describes how to configure the FTP Server.
Chapter 14 explains how to configure and manage the Samba File and Print Server.
12
Chapter 15 explains how to set up and use InterNetNews (INN).
Chapter 16 explains how to manage Internet Relay Chat (IRC).
Chapter 17 describes how to administer the PostgreSQL account and use related commands
and also how to administer MySQL.
Chapter 18 describes how to enable BIND and start the BIND server.
Chapter 19 describes how to start jabber.
Chapter 20 describes how to start twiki.
Chapter 21 describes how to set up client and server for secure sessions.
Appendix A describes how to create a certificate of authority, and also includes a sample
mail filter.
The Glossary contains a glossary of terms used in this manual.
This manual also contains an index.

Typographic Conventions

This document uses the following typographical conventions: %, $, or # A percent sign represents the C shell system prompt. A dollar sign
audit(5) A manpage. The manpage name is audit, and it is located in
Command A command name or qualified command phrase. Computer output Text displayed by the computer.
Ctrl+x A key sequence. A sequence such as Ctrl+x indicates that you
ENVIRONMENT VARIABLE The name of an environment variable, for example, PATH.
represents the system prompt for the Bourne, Korn, and POSIX shells. A number sign represents the superuser prompt.
Section 5.
must hold down the key labeled Ctrl while you press another key or mouse button.
ERROR NAME The name of an error, usually returned in the errno variable. Key The name of a keyboard key. Return and Enter both refer to the
same key. Term The defined use of an important word or phrase. User input Commands and other text that you type. Variable The name of a placeholder in a command, function, or other
syntax display that you replace with an actual value. [] The contents are optional in syntax. If the contents are a list
separated by |, you must choose one of the items. {} The contents are required in syntax. If the contents are a list
separated by |, you must choose one of the items. ... The preceding element can be repeated an arbitrary number of
times.  Indicates the continuation of a code example. | Separates items in a list of choices. WARNING A warning calls attention to important information that if not
understood or followed will result in personal injury or
nonrecoverable system problems. CAUTION A caution calls attention to important information that if not
understood or followed will result in data loss, data corruption,
or damage to hardware or software. IMPORTANT This alert provides essential information to explain a concept or
to complete a task NOTE A note contains additional information to emphasize or supplement
important points of the main text.
Typographic Conventions 13

Related Information

The Internet Express Documentation Bookshelf provides access to the following documents:
Release Notes — This manual includes release notes for Internet Express.
Read This First — This manual describes the contents of the kit.
Installation Guide — This document describes how to install the administration software and
Open Source Internet software provided on the Internet Express for Tru64 UNIX Installation and Documentation CD–ROM. When you run the installation procedure in a Web browser, the Installation Guide (in HTML format) is linked to the procedure to provide online help.
Administration Guide — This manual.
Secure Web Server Administration Guide — This manual describes how to use the Secure
Web Server Administration utility.
Internet Services User's Guide — This manual explains how to get started with e-mail, the TIN
news reader, and a Web browser using a character-cell terminal.
Internet Monitor Administrator's Guide — This manual describes how to install, configure,
and use the Internet Monitor software.
QuickSpecs — This document is a specification of the Internet Express product.
Software Description and Licensing Terms — This document describes the terms and conditions
for software packaged with the current version of Internet Express.
Best Practices documents for Internet Express — These documents provide you with
recommended methods for performing specific tasks, rather than presenting all options. Additional Best Practices are available at the Tru64 UNIX Publications Web site:
http://h30097.www3.hp.com/docs/best_practices/
Internet Express Reference Pages — These reference pages are supplied with components that
can be installed and managed using Internet Express.
See Chapter 2 for a list of Web sites and other information sources for Internet Express products and services as well as commercial and nonprofit organizations that might be of interest.

Reading the Documentation

This section describes the different methods for accessing the Internet Express documentation.

Reading Documentation Using the Administration Utility

After installation of the Secure Web Server subset (IAEAPCH), the Internet Express Documentation subset (IAEDOC), and the Internet Express Administration Utility subset (IAEADM), access the Administration utility for Internet Express main menu (see Section ) at:
http://hostname.domain:8081
where hostname.domain is the host name and domain of the system running Internet Express. Follow the documentation link from this page to read the Internet Express documentation.

Reading Documentation Using the Public Web Server

You can also read the documentation without the Administration utility by using the public Web server (if you chose to configure one) to access the documentation index page at http://hostname.domain/documents/bookshelf.html. If this URL does not work, verify that the Web server configuration file, /usr/internet/httpd/admin/conf/httpd.conf, contains the following line:
Alias /documents/ "/usr/internet/docs/IASS/"
14
The Internet Express documentation files are installed in the /usr/internet/docs/IASS directory.
You can access the Documentation Bookshelf installed on your system by entering the following
URL (substituting the name of your system for hostname) in your browser:
http://hostname/documents/bookshelf.html
You can also read the installed documentation directly from the file system using a Web
browser running on the same system by using the file URL:
file:/usr/internet/docs/IASS/bookshelf.html

Reading Documentation from the Internet Express CD–ROM

You can also access the Documentation Bookshelf on the Internet Express Installation and Documentation CD–ROM from your Tru64 UNIX System or a PC. The documentation is available in the following formats:
HTML
Portable Document Format (PDF)
On a Tru64 UNIX System
To read the documentation from the Internet Express Installation and Documentation CD–ROM on an AlphaServer system, follow these steps:
1. Log in to your system as root.
2. Insert and mount the CD–ROM, replacing drive with the name of your CD–ROM drive:
# mount /dev/drive /mnt
Usually this will be:
# mount /dev/disk/cdrom0c /mnt
3. In a Web browser, open the Documentation Bookshelf file by entering the following URL:
file:/mnt/index.htm
4. Click on the book you want to open.
On a PC
To read the documentation from the Internet Express Installation and Documentation CD–ROM on a PC, follow these steps:
1. Insert the CD–ROM into your PC's CD–ROM drive.
The Bookshelf page is automatically displayed in your browser. If the Bookshelf does not appear, open the following URL, replacing drive with the letter of
your CD–ROM drive:
file:drive:\index.htm
2. Click on the book you want to open.

Reading Reference Pages for Internet Express Components

Reference pages for Internet Express components are available in HTML format from the Internet Express Reference Pages index page. These HTML reference pages can be viewed using a Web browser.
Alternatively, you can view these reference pages from a command line in a terminal window if you modify the search path for the man command.
The man command's search path needs to include the following directories for Internet Express component reference pages:
Reading the Documentation 15
/usr/share/man /usr/local/man /usr/internet/pgsql/man /usr/internet/openldap/man /usr/news/man /usr/local/samba/man /usr/internet/httpd/man /usr/opt/hpapache2/man
You can specify an alternative search path when entering the man command by using the M or P option; for example:
# man -M /usr/news/man active.5
You can also define the man command's MANPATH environment variable on the command line or in a file, such as your .profile file or .login file.
For example, suppose your MANPATH environment variable was defined to be the following:
/usr/share/man:/usr/dt/share/man:/usr/local/man
If you are using the sh or ksh shell, you could modify the MANPATH to add to the search path by adding the following:
# set MANPATH $MANPATH:/usr/internet/pgsql/man:/usr/internet/openldap/man:/usr/news/man: \ /usr/local/samba/man:/usr/internet/httpd/man:/usr/opt/hpapache2/man
# export MANPATH
If you are using the csh shell, you would use a command line like the following:
# setenv MANPATH $MANPATH:/usr/internet/pgsql/man:/usr/internet/openldap/man: \ /usr/news/man:/usr/local/samba/man:/usr/internet/httpd/man:/usr/opt/hpapache2/man
For details about defining reference page search paths, see man(1).

Reading the Open Source Software Component Documentation

The product kit also provides documentation (in ASCII text and HTML) for software components included with Internet Express. This documentation is located in the /usr/internet/docs directory on the system where Internet Express is installed.

Reader's Comments

HP welcomes any comments and suggestions you have on this and other Tru64 UNIX manuals. You can send your comments in the following ways:
Fax: 603–884–0120. Attn: USPG Publications, ZKO3–3/Y32
Internet electronic mail: readers_comment@zk3.dec.com
A Reader's Comment form is located on your system in the following location:
/usr/doc/readers_comment.txt
Mail:
Hewlett-Packard Company USD Publications Manager ZKO3-3/Y32 110 Spit Brook Road Nashua, NH 03063-2698
16
Please include the following information along with your comments:
The full title of the document
The section numbers and page numbers of the information on which you are commenting
The version of Tru64 UNIX and Internet Express that you are using
If known, the type of processor that is running Tru64 UNIX
The Tru64 UNIX Publications Group cannot respond to system problems or technical support inquiries. Please address technical questions to your local system vendor or to the appropriate HP technical support office. Information provided with the software media explains how to send problem reports to HP.
Reader's Comments 17

1 Using the Administration Utility

The Administration utility for Internet Express helps you manage Internet services and the AlphaServer system through a Web browser. Because you use a browser to perform these tasks, you are not expected to be familiar with Tru64 UNIX.
The Administration utility is a set of CGI programs that use a configured instance of the Secure Web Server (powered by Apache) on port 8081. You access the Administration utility by entering the following URL in a Web browser running on a local system:
http://host.domain.name:8081/
The Administration utility server is password-protected. You must provide a user name (admin by default) and a password (which is set during installation).
Using the Administration utility, you can perform the following types of tasks:
Manage user accounts — You can create various types of user accounts to provide access to
Internet services. By default, an administrator can manage user accounts only from the local system (that is, the system on which Internet Express software is installed). However, you can use Web Server Administration functions to allow access from remote systems. See Chapter 3 for more information.
Administer Internet services — You configure Internet services (such as anonymous FTP, the
Squid proxy/caching server, and InterNetNews) to operate within your environment, view log files to determine how users are making use of the Internet services you provide, and link to the sysman utility to shut down and reboot the system, manage local printers, and perform other system management
Access online documentation — The Documentation Bookshelf allows you to:
Access the complete set of Internet Express documentation in HTML, and PDF formats.
The documentation includes links to third-party Web sites for the Internet components that ship with the product, as well as links to HP Web sites offering information of interest to AlphaServer administrators.
Search the reference pages included with the Internet Express software. This document
also provides links to these reference pages.
Search the Tru64 UNIX Web site. Of particular interest to AlphaServer administrators is
the Technical Information page (http://h30097.www3.hp.com/technical.html).
Display the copyrights of the third-party Internet components shipped with Internet Express.
See Section : Using the Administration Utility Main Menu for more information on using the Administration utility Main Menu and how to register your installation.
For information on the various administration servers available through the Administration utility and how to access these servers, see Section : Accessing Administration Servers.
For information on the iass login account, see Section : Accessing the Internet Express Login
Account.
For information on accessing and managing the Internet Monitor, see Section : Accessing and
Managing the Internet Monitor.
For information on managing Internet Express in a TruCluster environment, see Section : Managing
Internet Express in a TruCluster Environment.
For information on installing and removing components, see Section : Installing and Removing
Components.
For information on Web-based system administration and kernel tuning, see Section : Accessing
Web-Based System Management Tools.
18 Using the Administration Utility

Using the Administration Utility Main Menu

Figure 1 shows the Administration utility for Internet Express Main Menu.
Figure 1 Administration Utility Main Menu
Table 1 shows which selection to make From the Administration utility Main menu, depending on
the task you want to perform.
Note:
The availability of certain administration tasks depends on the Internet Express components installed on your system. For example, if the security components, FireScreen, and TCP Wrapper are not installed on your system, the Network Security category does not appear on the Manage Components menu.
Table 1 Administration Utility Menu Options and Tasks
TasksMenu Options
Manage Components
User Administration, including user account management (Chapter 3) and user authentication management (Chapter 4), which includes managing the LDAP Module for System Authentication for identifying and authenticating individual users (Section ).
Mail delivery administration, including the Sendmail Server, Majordomo, Mailman, and Bogofilter (Chapter 5)
Mail access administration, including POP, IMAP, and IMP Webmail (Chapter 6)
Web services administration, including the Secure Web Server, and the ht://Dig search tool (Chapter 7)
XML components administration (Chapter 8)
Network security administration, including TCP Wrapper, Snort intrusion detection, FireScreen, and FreeRADIUS (Chapter 9).
Proxy services administration, including the Squid Proxy/Caching Server and Dante SOCKS server (Chapter 10)
Directory services administration, which includes the Lightweight Directory Access Protocol (LDAP) server (Chapter 11)
OpenSLP administration (Chapter 12)
FTP Server administration (Chapter 13)
Samba File and Print Server administration (Chapter 14)
Using the Administration Utility Main Menu 19
Table 1 Administration Utility Menu Options and Tasks (continued)
TasksMenu Options
InterNetNews (INN) administration (Chapter 15)
Internet Relay Chat (IRC) Server administration (Chapter 16)
PostgreSQL account administration (Chapter 17)
MySQL account administration (Chapter 17)
BIND domain name server (Chapter 18)
Install or remove components (Section : Installing and Removing Components).Install/Remove Components
Documentation
Register Online
Access the Internet Express documentation (Section : Reading the
Documentation).
Register your installation online (Section : Registering Your Internet Express
Installation).

Registering Your Internet Express Installation

The Register Online option From the Administration utility Main menu allows you to register your installation of Internet Express. After you fill out the HP registration form, you will receive information on future releases. After you complete the online registration form, the Register Online option will no longer appear on the main menu.

Navigating the Administration Utility

To navigate the Administration utility, select specific menu options listed on each screen. As you proceed through the screen hierarchy, a navigation bar appears directly under the Internet Express banner at the top of the screen. These links allow you to go back one level or several levels, as follows:
Return to the Main menu
Return to the Main menu for the current menu (for example, the Manage Components menu)
Return to the menu for the current task (for example, Manage Sendmail Server)

Using Administration Utility Forms

Most of the tasks you perform using the Administration utility require you to complete a form to provide the information needed to complete the task. Figure 2 shows a sample Administration utility form.
20 Using the Administration Utility
Figure 2 Sample Administration Utility Form
Every Administration utility form has the following properties:
A navigation bar at the top of the form (Section : Navigating the Administration Utility)
The name of the form (in Figure 2, Create Generic User Accounts)
Text fields, list boxes, buttons, and other input fields for collecting data and transmitting it to
the Administration utility
Submit, Reset, or Clear buttons (separated from the data area by a short horizontal rule):
Using the Administration Utility Main Menu 21
The Submit button transmits the data you specified on the form to the Administration utility
The Reset button (not shown in Figure 2) erases the data you specified and restores the
default values (if any)
The Clear button erases the data in all fields
Some forms have additional links at the bottom of the form (for example, the form for managing the Secure Web Server provides a link to the Apache documentation on the Apache Web site).
To complete the form shown in Figure 2, follow these steps:
1. Enter a name in the Login Name field.
2. Enter a number in the Number of Users field.
3. Click on one or more of the groups in the Secondary Groups list box. (On this form, this step
is optional.) To clear a selection, click on it again. Use the scroll bar at any time to display additional groups.
4. Click on Submit.

Accessing Administration Servers

Internet Express provides the following administration servers for managing Internet services:
Administration Utility —A set of CGI programs that use a configured instance of the Secure
Web Server listening on port 8081 (and port 8089, for backward compatibility with previous releases).
Internet Monitor administration — The Internet Express installation script installs the Internet
Monitor Administration Server on port 8086.
The administration servers installed are password protected. When you attempt to access one of these servers, you must provide the user name (admin by default) and password (which is set during installation). To change the password for the Internet Express Administration utility, see
Chapter 7.
Note:
The Secure Web Server is initially configured to allow access to the Internet Express Administration utility from the local system only. To allow access from remote systems, see the Secure Web Server Administration Guide.
Table 2 summarizes the ports on which the administration accounts are installed by default, and
shows the URLs for accessing these accounts. In the URLs shown in Table 2, host.domain.name represents the fully qualified host name of the local system (the system on which Internet Express is installed).
Table 2 Internet Express Accounts and Ports
URLDescriptionPort Number
Internet Express8081
Internet Monitor8086
http://host.domain.name:8081/
http://host.domain.name:8086/
You access the administration servers from an HTML-based Web browser. Enter the appropriate URL, as shown in Table 2.
22 Using the Administration Utility
Note:
A user who accesses the Administration utility is granted the ability to access privileged files and perform system management tasks until exiting from the browser. The user retains privileges even when browsing files that are not part of Internet Express.
Do not leave an Administration session unattended. Also, limit access to the admin account to those individuals authorized to perform Internet system management tasks.

Accessing the Internet Express Login Account

The Internet Express installation procedure creates the iass login account, which you can use to view the names and passwords for Internet Express captive accounts you have created using the Administration utility (Chapter 3).
The iass account receives mail when:
You create a captive user account (named or generic).
Statistics for the InterNetNews (INN) server are generated. (A nightly report is mailed to the
iass account.)
The news server is down.
During installation, you can specify a forwarding address for the iass account to have this mail sent to a more convenient e-mail address.
You can access the iass account using two methods:
By logging in from the Tru64 UNIX command line. The password for the iass account is set
during installation.
By using the Manage iass Account menu item from the Manage Users menu (see Section :
Managing the iass Account).
Note:
If the locker account exists from a previously installed version of Internet Express, the iass account is set up as an alias for the locker account.

Accessing and Managing the Internet Monitor

The HP Internet Monitor software allows administrators to monitor Internet services running on a Tru64 UNIX system. The Internet Monitor product can be accessed directly or from the Administration utility for Internet Express.
To access the Internet Monitor from the Administration utility:
1. Choose Manage Components from the Internet Express main menu.
2. In the Manage Components table, click on Internet Monitor under Quality of Service. The
Internet Services Administration server prompts for your user ID and password, then lets you proceed.
To enable or disable the Internet Monitor from running, you use the Start/Stop the Internet Monitor menu option from the Administration utility. For details, see the Internet Monitor Administrator's Guide.
To configure the Internet Monitor components, see the Internet Monitor Administrator's Guide.

Managing Internet Express in a TruCluster Environment

TruCluster Server software provides high availability for Tru64 UNIX systems. This chapter describes the special considerations to administer Internet Express running in a cluster running TruCluster Server Version 5.0 and higher software.
Accessing the Internet Express Login Account 23

Using Internet Express Services in a Cluster

If you are running Internet Express in a cluster, be aware of the following considerations:
For all services, use the cluster alias to access the service to provide highest availability. All
services have been configured to allow the cluster alias to be used.
InterNetNews, Squid, Internet Relay Chat, OpenLDAP, and Tomcat run as single-instance
servers. Only one instance of these servers will be run within the cluster. The/sbin/init.d scripts have been modified to use Cluster Application Availability (CAA) for these services. The service names are innd, squid, ircd, and slapd respectively.
The Secure Web Servers and the sendmail daemon run on all cluster members concurrently.
Connections are distributed amongst the cluster members based on how the cluster alias has been configured. See cluamgr(8).
All other services use inetd to make connections and start server processes. Connections
are also distributed for these services among the cluster members.

TruCluster Impact on Internet Express Administration

There are some specific variations of the Administration utility user interface if you are running Internet Express in a TruCluster Server cluster environment. These variations include the following:
Depending on the type of service, the active status of the service for each member where it
may run is displayed.
Starting and stopping a service applies to the entire cluster. If more than one instance of a
service is running in the cluster, all are affected.
Some information is specific to each member in the cluster. In these cases, a listbox is displayed
at the top of the page, indicating which member is being affected. The listbox contains all cluster member names; selecting a different member will cause the display and subsequent actions to affect the selected member. The instances where this is the case include the following:
Tuning the kernel for Internet services Installing and managing FireScreen Displaying the mail log file Shutting down or rebooting the operating system

Installing and Removing Components

You can use the Administration utility to add new Internet components or remove previously installed components, as well as include your own component on the Manage Components menu.
To add or remove Internet components, follow these steps:
1. From the Administration utility Main menu, choose Install/Remove Components.
2. If the information from a recent Internet Express installation exists in the /tmp directory, the
Subset Selection form is displayed. Otherwise, the Administration utility prompts you for the mount point and the CD-ROM device name before displaying the Subset Selection Form.
The Subset Selection form lists each Internet Express subset, identifies those that are mandatory, and indicates whether each optional subset has already been installed.
3. On the Subset Selection form:
To install a component, click on Install.
To remove a component, click on Remove. (You cannot remove a mandatory subset.)
4. Scroll to the bottom of the form and click on Submit.
To include your own component on the Administration Utility Manage Components menu (Figure 3), create a file in the /usr/internet/httpd/admin/htdocs/osis/components directory,
24 Using the Administration Utility
one line per file, that includes fields with the table category name, component title and description, and URL link. Each field must be separated by a semi-colon to ensure the file is correctly parsed for display in the Manage Components table. The category name can be the same as an existing category or a completely new category.
The following example is the menu configuration file for the IMP Webmail component. (The IMP Webmail component is part of the Mail category in the Manage Components table.)
Mail;IMP Webmail;/mail/manage_imp.php
If the new component requires a URL that includes the hostname and cluster alias, the following keywords (Table 3) will be substituted with the appropriate value when the keywords appear in the URL that you provide in the menu configuration file:
Table 3 Keywords for URL Line
Substituted ValueKeyword
The current protocol (http or https).http
The current Web server (hostname or cluster alias, and port).HTTP_HOST
The hostname of the local host.HOSTNAME
The port number from the current Web server.PORT
Figure 3 shows the manage components with the major Internet Express components grouped by
category.
Installing and Removing Components 25
Figure 3 Manage Components Menu

Accessing Web-Based System Management Tools

This section describes the system management options available from the Internet Express Administration utility. From the Administration utility Manage Components menu, you can:
Link to the sysman Web-based management utility to perform Web-based system management
(Section : Performing Web-Based System Management)
From the Administration utility, tune kernel subsystem parameters to improve the performance
of Internet services (Section : Tuning Kernel Attribute Values).

Performing Web-Based System Management

From the Administration utility Manage Components menu, you can link to the sysman Web-based management utility to perform a variety of system management tasks such as shutting down and rebooting the system, and managing local printers. Follow these steps to access the sysman Web-based management utility:
1. Under System on the Manage Components menu, choose Web-Based Management.
2. From the Web-Based Management menu, click on the link for the sysman utility. From the
sysman Main menu, you can select the type of management function you want to perform.
26 Using the Administration Utility

Tuning Kernel Attribute Values

By tuning attribute values in the following kernel subsystems, you can optimize the Internet-related services running on your AlphaServer system for various process loads, system configurations, network topologies, and other conditions:
Generic subsystem (generic)
Internet subsystem (inet)
Network subsystem (net)
Process subsystem (proc)
Socket subsystem (socket)
Virtual memory subsystem (vm)
For detailed information on how each kernel subsystem attribute affects the performance of Internet services on an AlphaServer system, see Tuning Compaq Tru64 UNIX for Internet Services, available at the following URL:
http://h30097.www3.hp.com/docs/internet/TITLE.HTM
To use the Administration utility to tune Internet-related kernel subsystem attributes, follow these steps:
1. Ensure that JavaScript is enabled in your browser preferences.
2. From the Administration utility Main menu, choose Manage Components.
3. From the Manage Components menu, under System, choose Tune the Kernel for Internet
Services. The Administration utility queries the running kernel (using the sysconfig -q command)
and the system configuration file (using the sysconfigdb -l command) to obtain the values to display in the Run-Time Value and Boot-Time Value text fields, respectively.
If any messages occurred while the Administration utility was building the Tune the Kernel for Internet Services form, a link appears at the top of the form. Click on this link for details.
4. Use either of the following methods to tune the values in these text fields:
Type a value in the Run-Time Value field to change the value in the running kernel. Type a value in the Boot-Time Value field to replace the value in the /etc/sysconfigtab
file.
Click on one of the following buttons in the Suggested Values column: Recommended—Sets both the Run-Time Value and the Boot-Time Value to the
optimized value recommended for AlphaServer systems with average loads, under normal conditions, and typical server hardware and network configurations.
Note:
Because AlphaServer configurations differ, and a recommended value might not provide optimal performance for all configurations, exercise caution when modifying attribute values.
Current—Sets both the Run-Time Value and Boot-Time Value to the run-time value the
attribute had when the form was initially displayed.
Default—Sets both the Run-Time Value and the Boot-Time Value to the default setting
for the attribute.
5. To set the attribute values as shown on the form, click on Submit. To discard any changes you
made, click on Reset. Run-Time Value changes are set in the running kernel and take effect immediately.
Accessing Web-Based System Management Tools 27
Boot-Time Value changes are set in the system configuration file (/etc/sysconfigtab) and take effect the next time you boot the system.
6. After you submit the form, it is redisplayed and shows the attribute value changes that you
made. Reboot the operating system for these changes to take effect. When you reboot, the boot-time attribute values become the run-time attribute values and the run-time values you previously set are lost.
28 Using the Administration Utility

2 Where to Find More Information

This chapter contains a list of Web sites and other information sources that are relevant to the administration of Internet Express for Tru64 UNIX. The list includes links to Web sites dealing with Internet Express products and services, and system security, as well as links to commercial and nonprofit organizations on the World Wide Web that might be of interest.
Note:
The URLs and contents of sites listed here are subject to change. HP is not responsible for Web sites for third-party software provided with Internet Express for Tru64 UNIX.

Internet Express and AlphaServer Products Web Sites

Information on AlphaServers and Internet Express can be found at the following sites:
The following Tru64 UNIX Web site provides information on tuning your system to improve
the performance of your Web server, news server, and mail server:
http://h30097.www3.hp.com/technical.html
The following Web site includes specifications for various HP AlphaServer models, information
on software packages, and ordering information:
http://h18002.www1.hp.com/alphaserver/

Open Source Software Web Sites

Information on Open Source software is available from the following Web sites:
analog
http://www.analog.cx
Analog is a tool for analyzing log files, included with the Secure Web Server. This site provides a description of analog, sample reports that can be generated using analog, and access to sites to download the latest version of the software.
Apache
http://www.apache.org/
Apache Web servers let users create and manage a Web site on the Internet and Intranet. The Apache HTTP Web Server Project homepage contains versions of the Apache Web Server that you can download and documentation for each version.
BIND
http://www.isc.org/products/BIND/bind9.html
The Berkeley Internet Name Domain (BIND) implements a domain name server for a number of operating systems, including Tru64 UNIX. Internet Express provides the latest version of BIND, which contains both a name server and a resolver library.
Dante SOCKS Server
http://www.inet.no/dante/
Dante is a circuit-level firewall/proxy server that can be used to provide convenient and secure network connectivity to a wide range of hosts while requiring only the server Dante runs on to have external network connectivity. Dante also includes an extension to the SOCKS Version 4 and Version 5 protocols that provides a more generic bind(2) functionality, similar to what non-SOCKS programs expect.
Internet Express and AlphaServer Products Web Sites 29
expect
http://expect.nist.gov/
expect is a tool for automating and testing interactive applications, such as telnettelnet, FTP, passwd, fsck, rlogin, tip, and so on. Exploring Expect: A Tcl-Based Toolkit for Automating
Interactive Applications (ISBN 1-56592-090-2), written by Don Libes and published by O'Reilly & Associates, is an excellent source of information. The expect homepage provides access to FAQs, examples, contributed scripts, and software.
Firefox
http://www.mozilla.org/products/firefox/
Firefox is a free open source Web browser based on the Mozilla code base.
FreeRADIUS
http://www.freeradius.org
FreeRADIUS is a configurable, scaleable user authentication tool. For information on administering FreeRADIUS, see Section : FreeRADIUS Server Administration
GnuPG
http://www.gnupg.org
GnuPG (GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility
ht://Dig Search Tool
http://www.htdig.org
The ht://Dig search tool is a complete World Wide Web index and search system for a domain or an Intranet. It covers the search needs for a single company, campus, or subsection of a Web site. For information on administering ht://Dig, see Section : ht://Dig Search Tool Administration.
IMAP
http://www.washington.edu/imap/ http://asg.web.cmu.edu/cyrus/
The Internet Message Access Protocol (IMAP) allows a client to access and manipulate electronic mail messages on a server. The current version of the protocol is 4 and is described in RFC 1730.
The Internet Express kit includes two implementations of IMAP:
University of Washington IMAP (UW-IMAP) Server
Cyrus IMAP Server by Carnegie Mellon University
The Internet Express kit includes documentation on IMAP in the /usr/internet/docs/imap directory.
IMP Webmail
http://www.horde.org/imp
The Internet Messaging Program (IMP) is written in PHP and provides Webmail access to IMAP (and POP3) clients. For a set of FAQs (Frequently Asked Questions), visit the following URL:
http://www.horde.org/faq/
INN Server
http://www.isc.org/index.pl?/sw/inn/
30 Where to Find More Information
Loading...
+ 253 hidden pages