Bytemark Symbiosis

Patrick J. Cherry

Steve Kemp

David Edwards

James Carter

Legal Notice

2018

Revision History

Table of Contents

1. What’s new since the last release
2. Installing and administering Symbiosis
2.1. Installing Symbiosis running on Debian 9.0 (Stretch)
2.2. Installing Symbiosis Stretch using the Cloud Server control panel
2.3. Upgrading from Symbiosis 8 (Jessie) to Symbiosis 9 (Stretch)
2.4. Release notes
2.5. Packages installed by Symbiosis
2.6. Systems administration and Symbiosis
3. Website Configuration
3.1. Getting started
3.2. CGI scripts
3.3. Statistics
3.4. Testing new websites
3.5. Displaying the same content under two domains
3.6. Redirecting to the preferred website domain
3.7. Custom Apache configuration
3.8. Logging
3.9. Web configuration layout
4. SSL configuration
4.1. SSL providers
4.2. SSL provider configuration
4.3. Generating certificates with symbiosis-ssl
4.4. Generating certificate signing requests
4.5. SSL Configuration layout
5. Email Configuration
5.1. Port Configuration
5.2. Accepting email for a domain
5.3. Email for Unix users.
5.4. Password files
5.5. Allowing users to change their own password
5.6. Suffixes
5.7. Enforcing mailbox size with quotas
5.8. Server-side filtering using Sieve
5.9. Forward files
5.10. Vacation messages
5.11. Email alias lists
5.12. Spam and virus scanning
5.13. Customising SpamAssassin
5.14. Filtering mail using headers
5.15. Using real-time blacklists from Spamhaus
5.16. Manually blocking incoming mail from specific sources
5.17. Rate limiting outbound email
5.18. Setting an outbound IP for all email from a domain
5.19. Blocking email
5.20. Configuration layout
6. XMPP Reference
6.1. Adjusting the XMPP configuration
7. FTP configuration
7.1. Per-domain authentication
7.2. Multi-user authentication
7.3. Other forms of authentication
7.4. Quotas
7.5. FTP configuration layout
8. Firewall Reference
8.1. Allowing and denying access to services
8.2. Predefined special rules
8.3. An example firewall
8.4. Making custom additions to your firewall
8.5. Blocking abusive remote hosts
8.6. Whitelisting "known-good" IP addresses
8.7. SYN-ACK/ACK flood protection
8.8. Disabling the firewall
8.9. Configuration layout
9. DNS Hosting
9.1. Example DNS records
9.2. Adding a wild-card hostname record
9.3. Adding a custom TTL per domain
9.4. Adding a DMARC policy per domain
9.5. Moving domains between machines using the Bytemark content DNS service
9.6. Configuring SPF and DKIM records
10. Scheduled tasks
10.1. Testing the crontab
10.2. System scheduled tasks
11. Database configuration
11.1. Adding a user with remote privileges
12. Backup Reference
12.1. Configuration
12.2. Advanced Configuration
12.3. Listing Backup Contents
12.4. Restoring From Backup
12.5. Recovery From Earlier Backups
12.6. Offsite backup storage
12.7. Recovering from the offsite backup storage
12.8. Trimming the size of the local backups.
12.9. Making changes to the backup2l configuration
13. Service Monitoring
A. GNU Free Documentation License
Glossary
Bibliography
Index