Scam-protect milter

Overview

Scam-protect is a milter which restricts the use of your domain address in emails. The aim is to protect your users from phishing by rejecting mail purporting to be from your domain. It is not meant as a replacement for SPF or SenderID.

Features

Scam-protect milter is easy to configure. It includes features such as:

  • Reject mail with your domain name in the mail from envelope
  • Reject mail with your domain name in the From header

Performance

Scam-protect milter was designed to be light-weight and use minimal resources.

Whitelist

Scam-protect has a configurable whitelist of IP addresses or a range of IP addresses (CIDR). This feature can be used to allow which hosts can use your domain name in email addresses..

Accept mail from users

Users should configure their mail clients (MS Outlook, Eudora, Mozilla Thunderbird) to use the port 587 (MSA) instead of the SMTP port to send mail through the mail server running Scam-protect.

Scam-protect will accept mail if the connection was authenticated through SMTP AUTH.

Installation

Please read the INSTALL and README files for more information.

Prerequisites

You should have sendmail version 8.12.x or higher installed. Sendmail should
have been built with MILTER support enabled.

You should have the milter library and development kit installed

Build

1. Extract the scam-protect tarball

2. Change the current directory to the one where the scam-protect source code
was extracted.

3. If you are using FreeBSD, OpenBSD or NetBSD, rename the Makefile.bsd file
to Makefile

If you are using a Linux distribution, rename the Makefile.linux file to Makefile

4. Type make and press Enter to compile scam-protect

Install

1. Copy the scam-protect file created above to the appropriate location
(/usr/local/sbin for example)

2. Generate a new sendmail configuration (sendmail.cf) with the following
additional settings:
INPUT_MAIL_FILTER(`scam-protect', `S=unix:/var/spool/scam/scam-protect.sock, F=T, T=S:240s;R:240s;E:5m')dnl

3. Add the list of hosts allowed to use your domain name to the scam.conf file and copy it to the /etc/mail directory

4. Create a user (scamprot for example) which will be used to run the milter

5. Create the /var/spool/scam directory

6. Verify that the user created in step 4 has read-write access to the
/var/spool/scam directory

Using Scam-grey

Startup

1. Start scam-protect milter as a daemon

scam-protect -p unix:/var/spool/scam/scam-protect.sock -u scamprot -D

4. Restart sendmail if you have generated a new sendmail configuration when
installing scam-protect

Shutdown

Type the following command to stop scam-protect

kill -USR1 `cat /var/spool/scam/scam-protect.pid`

Configuration

The following syntax defines the domain to be protected. Multiple domains can be specified.

ProtectDomain:example.com
ProtectDomain:example.net

Define the IP address and/or subnet allowed to send mail from your domain as follows:

ProtectAllow:192.0.2.1
ProtectAllow:192.168.0.0/24

License

Copyright © 2007 Eland Systems All Rights Reserved.

  1. Redistribution and use in source and binary forms must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software
    must display the following acknowledgement:
    This product includes software developed by Eland Systems.
  4. The name of Eland Systems may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Download

The download is provided free of charge subject to our license agreement.

Scam-protect source code version 1.0 (13 KB)

MD5 e9b1e45d04ff52cafd68bb18bd08e25c

README

CHANGES

Contact

Please send your comments and bug reports to scam+protect@elandsys.com.