Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

MTA Configuration


All of the MTAs featured here are highly configurable. If possible, test changes on a test server and not on a live MTA, and always make a backup of your configuration before making changes. It is possible that you may end up altering the configuration of the MTA in such a way that it does not operate correctly.

Sendmail

Sendmail is the grandfather of all MTAs. Its long heritage implies that it inherits some of the friendliness of the pre-commercial Internet. This means that older installations might relay email. Additionally, installations that were first configured with an old version but have been upgraded may also retain some configuration settings that allow them to relay email.

Sendmail is packaged by most Linux distributions, as well as HP/UX, AIX, Solaris, and other commercial UNIX-based products. Each supplier may place the configuration files in different directories. In this chapter, the default locations and file names are used when discussing configuration files...