sendmail Milters - Bryan Costales, Marcia Flynt

sendmail Milters

A Guide for Fighting Spam
Buch | Softcover
352 Seiten
2005
Addison-Wesley Educational Publishers Inc (Verlag)
978-0-321-21333-4 (ISBN)
36,30 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Helps you start writing your own special-purpose mail filters quickly and easily.
"Bryan and Marcia have not only provided tips and tricks for detecting and blocking spam and email fraud but have also written the first of its kind Milter reference guide. This book will help you start writing your own special-purpose mail filters quickly and easily."

--Gregory Neil Shapiro, coauthor of the Milter interface

As a Mail Administrator You Need to Understand How to Successfully Monitor and Fight Spam.

Milters are among the most powerful antispamming tools available. Until now, there has been no clear and helpful resource for you to learn how to set up and use Milters. sendmail Milters: A Guide for Fighting Spam is the first in-depth guide to writing powerful Milters to block even the most clever spammers.

Inside this definitive new reference, you will find



An exhaustive description of the Milter interface



Insightful details on what spam is, its harmful effects, and the diverse techniques used by spammers



A step-by-step guide to luring spammers using a honeypot network



Ways to decode the common encoding methods used in spam email



A reference on the Milter library and its use



Techniques for expanding software to deal with future spamming methods

This book is an indispensable aid to combating spam, now and in the future. If you administer a sendmail server, you need to own a copy.

All of the program code described in the book is available for download at http://spambook.bcx.org.

Bryan Costales has been involved with sendmail for more than fifteen years. He is the author ofsendmail, Third Edition, (O'Reilly, 2003) and books on C programming and UNIX communications. Marcia Flynt has twenty-five years of experience in software engineering, including managing e-mail development for opt-in custom e-mail businesses.

Preface xiiiPart I The Nefarious Spam Problem 1Chapter 1 Gorilla Versus Guerrilla 31.1 When a Gorilla Sneezes 4

1.2 When a Guerrilla Masquerades as You 5

1.3 The Major Proposals for Standards 6

1.4 Email Fraud 7

1.5 The Cost of Spam Suppression 9

1.6 Vikings 10

Chapter 2 The Characteristics of Spam Email 112.1 Connection Behavior 12

2.2 Relaying through MX Servers 13

2.3 Falsifying the Envelope Sender Address 15

2.4 Disguising the Subject: Header 16

2.5 Camouflaging the HTML Body 18

2.6 Attempting to Fool Signature Detectors 23

2.7 Unnecessary Encoding 24

2.8 Grokking the Site 26

2.9 Loose Ends 38

2.10 Think Like a Spammer 38

Part II Creating a Test Environment 41Chapter 3 Setting Up a Bait Machine 433.1 Choose Your Platform 44

3.2 Set Up DNS Records 47

3.3 Configure sendmail 50

3.4 Set Up Logging 54

3.5 Excluding Non-email Ports 56

3.6 Make Sure the Machine Reboots 58

Chapter 4 Baiting the Hook 614.1 Create Fake Recipients 61

4.2 Protect Good Email 64

4.3 Run a Web Server 65

4.4 Post to a Usenet Group 67

Chapter 5 Preventive Measures 755.1 Tell Users about Plus Addressing 75

5.2 Turn Off EXPN and VRFY 77

5.3 Mask Web Addresses 78

5.4 Watch Out for finger 81

Part III The Parts of a sendmail Milter 83Chapter 6 The Roles and Flow of a Milter 856.1 A Milter's Role in the Middle 85

6.2 A Milter from the Point of View of sendmail 86

6.3 The Milter Flow 87

Chapter 7 The Milter-Library 977.1 Overview 97

7.2 main() 99

7.3 The smfi Data Access Routines 113

7.4 The smfi Modifier Routines 127

Chapter 8 The xxfi Handler Milter Functions 1518.1 Overview 153

8.2 The xxfi Orientations 154

8.3 Abort Logic 155

8.4 xxfi_connect() Reviews the Connection 156

8.5 xxfi_helo() Reviews SMTP HELO/EHLO 161

8.6 xxfi_envfrom() Reviews SMTP MAIL FROM 165

8.7 xxfi_envrcpt() Reviews SMTP RCPT TO 171

8.8 xxfi_header() Reviews Headers 176

8.9 xxfi_eoh Reviews at End of Headers 182

8.10 xxfi_body Reviews Each Body Chunk 186

8.11 xxfi_eom Reviews at End of Envelope 190

8.12 xxfi_abort Handles Envelope Abort 197

8.13 xxfi_close Handles Connection Cleanup 200

Part IV Nuts and Bolts 205Chapter 9 Milters and the Environment 207

9.1 Where to Run Your Milter 208

9.2 Your Milter's User ID 210

9.3 How to Start and Stop Your Milter 213

9.4 Put Your Milter into the Background 217

9.5 Handle Signals 219

9.6 Anticipate MX Servers 221

9.7 Status and Logging 225

9.8 Consider Portability Early 226

9.9 Avoid Memory Leaks 227

9.10 Final Words 229

Chapter 10 User and Temporal Feedback 23110.1 Consider Architecture 231

10.2 Model the End User 233

10.3 Maintain a History 234

10.4 Possible Feedback Mechanisms 237

10.5 Whitelisting 241

10.6 Graylisting 242

10.7 Archive, Reject, or Pass Through Spam 244

10.8 Dynamic Configurations 246

10.9 In Summary 253

Chapter 11 Handy Routines for the Message Body 25511.1 Parsing MIME-Encoded Boundaries 256

11.2 Decoding Base64 Encoding 258

11.3 Decoding Quoted-Printable Encoding 265

11.4 Decoding Character-Entity Encoding 269

11.5 Decoding URL-Encoding 277

11.6 Stripping HTML Comments 279

11.7 How to Use /etc/magic 284

11.8 How to Use /usr/share/dict/words 288

11.9 More 293

Appendix A Useful Source Code 295Bibliography 297Index 307

Erscheint lt. Verlag 3.2.2005
Verlagsort New Jersey
Sprache englisch
Maße 235 x 178 mm
Gewicht 662 g
Themenwelt Informatik Betriebssysteme / Server Unix / Linux
Informatik Netzwerke Mail Server
Mathematik / Informatik Informatik Web / Internet
ISBN-10 0-321-21333-5 / 0321213335
ISBN-13 978-0-321-21333-4 / 9780321213334
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Die wichtigen Befehle

von Daniel J. Barrett

Buch | Softcover (2024)
O'Reilly (Verlag)
16,90
das umfassende Handbuch

von Dirk Deimeke; Daniel van Soest; Stefan Kania

Buch | Hardcover (2023)
Rheinwerk (Verlag)
69,90
das umfassende Handbuch

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
49,90