Posts Tagged citadel groupware

Backup and Restore Citadel Groupware

Posted by Filed Under Citadel with Comments Off

Backup and Restore
There are two different ways to backup Citadel.  This is the safest and most reliable.  The one disadvantage is that Citadel must be off to make this happen.

Offline Backup

The offline backup is used when you have set the Citadel server to automatically delete committed database logs. The setting to check to verify that you have this set is the Tuning Tab under Site Configuration.  You can see by default th e”Automatically delete committed database logs” is checked.

The citadel server must be stopped in order to complete this backup.

sudo  /etc/init.d/citadel stop

You will need to designate where to make the backup.  In the example script the backup is placed in the /home directory with a timestamp but certainly it should be placed in a directory on a separate partition in case you have drive problems.  This backup will backup everything that has to do with Citadel so it should restore and save you regardless of any issues.

Create a file in the /root directory called citadel.sh
vim citadel.sh

Now copy this script into that file and save it.

chmod 755 citadel.sh

Then execute the file with:
sh citadel.sh

#!/bin/sh
# Complete Backup for Citadel

TIMESTAMP=`date +%Y%m%d_%H%M%S`;
echo $TIMESTAMP
tar -cvf /home/citadel_$TIMESTAMP.tar /etc/citadel /usr/lib/citadel-server/ /var/lib/citadel/ /var/spool/citadel/ /var/run/citadel/ /usr/sbin/citserver /usr/sbin/sendcommand /usr/sbin/sendmail /usr/bin/citadel/ /etc/init.d/citadel /etc/init.d/webcit /usr/share/doc/citadel-server/ /usr/share/locale /usr/share/citadel-server/

Here you can see what the timestamped backup looks like.
-rw-r–r–  1 root root    10240 2009-01-24 13:23 citadel_20090124_142509.tar

Be sure to start the server once it is complete.

Offline Restore
The offline restore will also require you to have the server turned off.

sudo  /etc/init.d/citadel stop

Move to the location of the backup tar file so that when you do ls you can see the tar file.

tar xvf  citadel_20090124_142509.tar -C /

The -C / at the end will restore all of the directories in relationship to the / or root of the filesystem.

You could create a tar on one server and move to a second server with the same distro and restore on the new box, thus replicate the whole system on a second box.

Citadel Features

Posted by Filed Under Citadel with Comments Off

One of the most important features for many people is the ease of use and installation.  Citadel tries to eliminate all of the hassel in setting up a Mail server with groupware.  This example uses Postfix for the install.

The website has a lot of valuable information and there is adequate documentation for the set up and management of the mail server.

  • Email, calendaring, address books, bulletin boards, instant messaging, and more … all in one tightly integrated server package.
  • High-performance, multiprotocol, multithreaded server engine
  • Web browser, telnet/SSH, local client software accessible
  • Standards-compliant e-mail built in: IMAP, POP3, ESMTP
  • Group calendaring and scheduling (GroupDAV and Kolab-1 compatible)
  • Built-in listserv (mailing list server)
  • Integrated server-side mail sorting and filtering. Users can choose between an easy-to-use web based rules editor, or the power of writing complex scripts using the industry standard Sieve language.
  • Support for push e-mail and mobile devices
  • Database-driven, single-instance message store
  • Built-in full text index for fast searching
  • Authenticated SMTP for remote email submission
  • Multiple domain support
  • Built-in integration with perimiter email filtering technologies such as Realtime Blackhole Lists (RBL’s) and SpamAssassin
  • Server-to-server replication. Users in any number of domains can be spread out across any number of Citadel servers, allowing you to put data where you need it, and enabling infinite horizontal scalability.
  • Web-based access to email, calendars, and everything else through a powerful AJAX-style front end
  • Very strong support for “public folders” and message forums.
  • Built-in instant messenger service
  • SSL/TLS encryption for all protocols
  • LDAP integration capabilities. Citadel can populate your existing directory server, or it can configure a standalone directory server if you don’t already have one.
  • Citadel is true open source software.

Easy Mail Groupware with Citadel

Posted by Filed Under Citadel with Comments Off

The biggest advantage if Citadel is ease of installation and ease of configuration.  Both of these can be a serious hassle when you are building a Postfix mail server from scratch.  So the focus of this documentation is clear easy configuration.  The goal also requires a mail server that has an easy interface to make changes with and that is intuitive.  That goal is provided by the web interface that you can use to make modifications to the server.  The final goal is to create a system that will effectively clean Spam and virus email.  Spam will be cleaned using Spamassassin and virus problems will be cleaned by ClamAv.

Base install of required programs.

sudo apt-get install clamav clamav-milter spamassassin citadel-suite amavisd-new

Install and Start Spamassassin

vim  /etc/default/spamassassin

# Change to one to enable spamd
ENABLED=1

sudo /etc/init.d/spamassassin start

Spamassassin is listening on port 783.
tcp        0      0 127.0.0.1:783           0.0.0.0:*               LISTEN

Citadel Configuration

Make sure all of your processes are running.
ps -eaf | grep cit
root      5167     1  0 13:47 ?        00:00:00 /usr/sbin/citserver -d -x3 -lmail -t/dev/null
citadel   5168  5167  0 13:47 ?        00:00:01 /usr/sbin/citserver -d -x3 -lmail -t/dev/null
root      6052     1  0 13:47 ?        00:00:00 /usr/sbin/webcit -D/var/run/webcit/webcit.pid.8504 -p8504 127.0.0.1 504 -i0.0.0.0 -f -t/var/log/webcit//access.8504.log
root      6053  6052  0 13:47 ?        00:00:06 /usr/sbin/webcit -D/var/run/webcit/webcit.pid.8504 -p8504 127.0.0.1 504 -i0.0.0.0 -f -t/var/log/webcit//access.8504.log

Check Network Ports
# netstat -lnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:993             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:5666            0.0.0.0:*               LISTEN      5979/nrpe
tcp        0      0 0.0.0.0:995             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:2020            0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:5222            0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:587             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:110             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 127.0.0.1:783           0.0.0.0:*               LISTEN      8057/spamd.pid
tcp        0      0 0.0.0.0:143             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN      6510/apache2
tcp        0      0 0.0.0.0:465             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:21              0.0.0.0:*               LISTEN      6039/vsftpd
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      5077/sshd
tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN      5840/cupsd
tcp        0      0 0.0.0.0:8504            0.0.0.0:*               LISTEN      6053/webcit
tcp        0      0 0.0.0.0:504             0.0.0.0:*               LISTEN      5168/citserver
tcp        0      0 0.0.0.0:25              0.0.0.0:*               LISTEN      5168/citserver
tcp6       0      0 :::22                   :::*                    LISTEN      5077/sshd
udp        0      0 0.0.0.0:35499           0.0.0.0:*                           5053/avahi-daemon:
udp        0      0 0.0.0.0:68              0.0.0.0:*                           4444/dhclient3
udp        0      0 0.0.0.0:5353            0.0.0.0:*                           5053/avahi-daemon:

Once the server is installed, login to the web interface with your server IP Address and the port 8504 which is the default.

http://192.168.5.100:8504

Enter the Administrator user and no password and this interface will open.  Choose Administration and you can set up your server from this interface.  You will have four categories to work with.  Global Configuration is where you should start.  Select “Edit site-wide configuration” to set up your basic configuration.

The window opens and has a number of tabs that you can modify under General one feature you must modify is the Fully qualified domain name.  You must have a host name and a domain name to complete the FQDN.  It must look something like this:

mail.example.com

Note the name of the system administrator is listed, you can change that if you want but be sure permissions are set correctly.

The Access controls section defines how you want users to have access and what number of levels you will create access.  You do not need to modify this initially as this will work by default.

Network services will define your ports.  The SMTP port is the port you will communicate with other mail servers and so this should remain standard.  IMAP port is 143 and 993 if you run it with SSL.  If you want encrypted connection for your SMTP it will be based on port 465.  Be careful if you make changes here because other programs are expecting connections on these ports as they are standards.

Tuning allows you to set timeouts and also adjust message size. The worker threads represent the number of web connections that are available by default.  Here you see the minimum of 5 and the maximum of 256.  You can save resources by bringing the minimum down to 2 or 3 if you have a small number of users or increase it to 7 to 10 if you have a constant level of users that high.

The Pop3 tab shows you the default ports that are available, 110 for normal connections and port 995 if it is encrypted.

Install Citadel Groupware on Ubuntu

Posted by Filed Under Citadel with Comments Off

Citadel offers and easy to install and easy to configure mail server.

On an Ubuntu server you can install the suite with:

sudo apt-get install citadel-suite

During the install you will be asked several questions.   The first question you will be asked if you want to use Apache for the web interface or WebCit.  This example shows the choice of WebCit which is the easiest option.

You will need to select a port that the server will run on so you can connect to the web interface.  You can choose any port over 1024.

Once installed you can access your server at the port that you entered.  Usernames and passwords will be collected from /etc/passwd or LDAP.