|
|
Scam-protect milterOverviewScam-protect is a milter which restricts the use of your domain address in emails. The aim is to protect your users from phishing by rejecting mail purporting to be from your domain. It is not meant as a replacement for SPF or SenderID. FeaturesScam-protect milter is easy to configure. It includes features such as:
PerformanceScam-protect milter was designed to be light-weight and use minimal resources. WhitelistScam-protect has a configurable whitelist of IP addresses or a range of IP addresses (CIDR). This feature can be used to allow which hosts can use your domain name in email addresses.. Accept mail from usersUsers should configure their mail clients (MS Outlook, Eudora, Mozilla Thunderbird) to use the port 587 (MSA) instead of the SMTP port to send mail through the mail server running Scam-protect. Scam-protect will accept mail if the connection was authenticated through SMTP AUTH. InstallationPlease read the INSTALL and README files for more information. PrerequisitesYou should have sendmail version 8.12.x or higher installed. Sendmail should You should have the milter library and development kit installed Build1. Extract the scam-protect tarball 2. Change the current directory to the one where the scam-protect source code 3. If you are using FreeBSD, OpenBSD or NetBSD, rename the Makefile.bsd file If you are using a Linux distribution, rename the Makefile.linux file to Makefile 4. Type make and press Enter to compile scam-protect Install1. Copy the scam-protect file created above to the appropriate location 2. Generate a new sendmail configuration (sendmail.cf) with the following 3. Add the list of hosts allowed to use your domain name to the scam.conf file and copy it to the /etc/mail directory 4. Create a user (scamprot for example) which will be used to run the milter 5. Create the /var/spool/scam directory 6. Verify that the user created in step 4 has read-write access to the Using Scam-greyStartup1. Start scam-protect milter as a daemon scam-protect -p unix:/var/spool/scam/scam-protect.sock -u scamprot -D 4. Restart sendmail if you have generated a new sendmail configuration when ShutdownType the following command to stop scam-protect kill -USR1 `cat /var/spool/scam/scam-protect.pid` ConfigurationThe following syntax defines the domain to be protected. Multiple domains can be specified. ProtectDomain:example.com Define the IP address and/or subnet allowed to send mail from your domain as follows: ProtectAllow:192.0.2.1 LicenseCopyright © 2007 Eland Systems All Rights Reserved.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. DownloadThe download is provided free of charge subject to our license agreement. Scam-protect source code version 1.0 (13 KB) MD5 e9b1e45d04ff52cafd68bb18bd08e25c ContactPlease send your comments and bug reports to scam+protect@elandsys.com. |
|