Scam-protect 1.0.0

Scam-protect is a milter which restricts the use of your domain address in emails.
Scam-protect is a milter which restricts the use of your domain address in emails. The aim is to protect your users from phishing by rejecting mail purporting to be from your domain. It is not meant as a replacement for SPF or SenderID.

Here are some key features of "Scam protect":

· Reject mail with your domain name in the mail from envelope
· Reject mail with your domain name in the From header

Performance

Scam-protect milter was designed to be light-weight and use minimal resources.

Whitelist

Scam-protect has a configurable whitelist of IP addresses or a range of IP addresses (CIDR). This feature can be used to allow which hosts can use your domain name in email addresses..

Accept mail from users

Users should configure their mail clients (MS Outlook, Eudora, Mozilla Thunderbird) to use the port 587 (MSA) instead of the SMTP port to send mail through the mail server running Scam-protect.

Scam-protect will accept mail if the connection was authenticated through SMTP AUTH.

Requirements:

· sendmail version 8.12.x or higher. Sendmail should have been built with MILTER support enabled.
· milter library and development kit

Build

1. Extract the scam-protect tarball
2. Change the current directory to the one where the scam-protect source code was extracted.
3. If you are using FreeBSD, OpenBSD or NetBSD, rename the Makefile.bsd file to Makefile. If you are using a Linux distribution, rename the Makefile.linux file to Makefile
4. Type make and press Enter to compile scam-protect

Install

1. Copy the scam-protect file created above to the appropriate location (/usr/local/sbin for example)
2. Generate a new sendmail configuration (sendmail.cf) with the following additional settings:

INPUT_MAIL_FILTER(`scam-protect', `S=unix:/var/spool/scam/scam-protect.sock, F=T, T=S:240s;R:240s;E:5m')dnl

3. Add the list of hosts allowed to use your domain name to the scam.conf file and copy it to the /etc/mail directory
4. Create a user (scamprot for example) which will be used to run the milter
5. Create the /var/spool/scam directory
6. Verify that the user created in step 4 has read-write access to the /var/spool/scam directory

Using Scam-grey

Startup

1. Start scam-protect milter as a daemon scam-protect -p unix:/var/spool/scam/scam-protect.sock -u scamprot -D
4. Restart sendmail if you have generated a new sendmail configuration when installing scam-protect

Shutdown

Type the following command to stop scam-protect kill -USR1 `cat /var/spool/scam/scam-protect.pid`

Configuration

The following syntax defines the domain to be protected. Multiple domains can be specified.

ProtectDomain:example.com
ProtectDomain:example.net

Define the IP address and/or subnet allowed to send mail from your domain as follows:

ProtectAllow:192.0.2.1
ProtectAllow:192.168.0.0/24

last updated on:
August 10th, 2007, 8:05 GMT
price:
FREE!
developed by:
Eland Systems
homepage:
www.elandsys.com
license type:
BSD License 
category:
ROOT \ Communications \ Email Filters

FREE!

In a hurry? Add it to your Download Basket!

user rating 20

3.5/5
 

0/5

Rate it!

Add your review!

SUBMIT