Slamming Spam : A Guide for System Administrators

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2005-01-01
Publisher(s): Addison-Wesley Professional
List Price: $49.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

Offers sys admins vital help in managing spam and keeping its load off their networks.

Author Biography

Dale Nielsen is a partner in Avacoda LLC, a consulting company specializing in systems administration and software development.

Table of Contents

About the Authors xv
Preface xvii
Introduction
1(18)
Email Terminology
1(1)
Inbound Versus Outbound Spam
2(1)
(Mis)Classifications and Sidelining
3(1)
Fundamental Anti-Spam Techniques
3(5)
Whitelists and Blacklists
3(1)
Header Checking
4(1)
Content Filtering
5(1)
Distributed Collaborative Filtering
6(1)
Sender Verification
7(1)
Other Anti-Spam Methods
8(2)
Reporting Spam
8(1)
Charging per Email
8(1)
Third-Party Anti-Spam Solutions
8(2)
Designing an Anti-Spam Architecture
10(4)
Gathering Data
10(1)
Questions
10(1)
Policy
11(1)
Defense in Depth
12(2)
Client
14(1)
Anti-Spam Design Notes
14(2)
General Rules
14(1)
Domino/Exchange Considerations
15(1)
Example Configurations
16(2)
Small Enterprise
16(1)
Medium/Large Enterprise
17(1)
Conclusion
18(1)
Procmail
19(10)
Installation
20(1)
Invoking procmail
21(2)
.forward File
21(1)
.qmail File
21(1)
Delivery Agent Invocation
22(1)
Configuration
23(4)
Option Flags
24(1)
Conditions
24(1)
Actions
24(1)
Examples
25(1)
Blacklisting and Filtering Example
26(1)
Conclusion
27(2)
SpamAssassin
29(30)
SpamAssassin and MTA Integration
31(1)
Installing SpamAssassin
32(12)
SpamAssassin and Sendmail
33(3)
SpamAssassin and Postfix
36(5)
SpamAssassin and qmail
41(3)
SpamAssassin Scoring
44(1)
Rules
44(1)
SpamAssassin Configuration
44(3)
The SpamAssassin Command Line Interface
45(2)
Verifying SpamAssassin Operation
47(1)
Testing a Spam Message
47(1)
Testing a Non-Spam Message
48(1)
SpamAssassin Configuration Files
48(9)
Configuration File Locations
48(1)
Configuration File Precedence
49(1)
Unprivileged or Global Keywords
50(4)
Privileged Parameters
54(3)
Administrator-Only Settings
57(1)
Conclusion
57(2)
Native MTA Anti-Spam Features
59(20)
Static Filters
60(4)
Blackhole Listing
61(2)
Other Methods
63(1)
Sendmail
64(4)
Updating the Configuration
64(1)
Static Filter Setup
65(2)
Blocking by Blackhole Listing Services
67(1)
Postfix
68(7)
Updating the Configuration
68(1)
Static Filter Setup
68(3)
Blocking via Blackhole Listing
71(1)
qmail tcpserver and rblsmtpd
72(1)
tcpserver Rules
73(1)
Blocking and Allowing Messages by IP Address
73(1)
Blocking and Allowing Messages by Email Address
74(1)
Blocking via Blackhole Listing
74(1)
Optional MTA Configuration Changes
75(3)
Sendmail
76(1)
Postfix
77(1)
qmail
78(1)
Conclusion
78(1)
SMTP Auth and Starttls
79(14)
Starttls and MTAs
81(11)
Cyrus SASL
82(2)
Sendmail
84(2)
Postfix
86(4)
qmail
90(2)
Conclusion
92(1)
Distributed Checksum Filtering
93(24)
Vipul's Razor
95(10)
Installing Vipul's Razor
95(1)
Commands
96(7)
Usage
103(2)
Distributed Checksum Clearinghouse
105(10)
Introduction
105(1)
Installing DCC
106(2)
Configuring DCC
108(3)
DCC and Procmail
111(1)
Advanced DCC Setup
112(3)
Conclusion
115(2)
Introduction to Bayesian Filtering
117(12)
The Math
118(3)
Word Analysis
121(1)
Word Choice
122(1)
Training
123(1)
Efficacy and Attacks
123(1)
Other Bayesian Filtering Packages
124(1)
Advanced Techniques: Tokenization
125(1)
Advanced Techniques: Cleverer Statistics
125(2)
Conclusion
127(1)
References
128(1)
Bayesian Filtering
129(24)
How to Choose a Bayesian Analyzer
129(1)
How We Chose the Bayesian Analyzers
130(1)
CRM114
131(1)
Installation
131(7)
Compiling
132(1)
Configuring mailfilter
132(2)
Setting Up .css Files
134(1)
Building css Files from Scratch
135(1)
Using the css Files Distributed with CRM114
135(1)
Build Your Own css Files from Spam and Non-Spam
135(1)
Checking the css Files
136(1)
Training CRM114
137(1)
Whitelisting/Blacklisting
137(1)
bogofilter
138(6)
Installation
138(1)
Configuration
138(1)
Components
139(1)
Training
140(1)
Example
140(4)
Discussion
144(1)
ASSP
144(8)
Requirements
145(1)
Installation
146(6)
Conclusion
152(1)
Email Client Filtering
153(44)
To Filter or Not to Filter
154(1)
POPFile
155(13)
Installation
155(4)
Configuration
159(9)
Operation
168(1)
Mozilla Messenger
168(10)
Bayesian Filtering
168(3)
Message Filtering
171(7)
Microsoft Outlook Express
178(7)
Filtering
179(4)
Blacklisting
183(2)
Microsoft Outlook
185(9)
Junk E-Mail Filter with Microsoft SmartScreen Technology
185(1)
Junk E-Mail Tools
186(2)
Filtering
188(6)
Conclusion
194(3)
Microsoft Exchange
197(32)
Intelligent Message Filter
199(6)
Installation
199(1)
Configuration
200(2)
Ongoing Maintenance
202(3)
Incoming Message Filtering
205(8)
Connection Filtering
205(3)
Sender Filtering
208(2)
Recipient Filtering
210(1)
Activating Filters
211(1)
Logs
212(1)
Outbound Message Control
213(5)
McAfee SpamKiller for Exchange
218(8)
Installation
220(1)
Using SpamKiller
220(2)
Anti-Spam Setup
222(3)
Anti-Spam Settings
225(1)
Conclusion
226(3)
Lotus Domino and Lotus Notes
229(28)
Lotus Domino
230(8)
Getting Started
230(1)
SMTP Inbound Controls
230(5)
Rules
235(3)
Lotus Notes
238(2)
Subject Line Filtering
238(1)
Subject Line Filtering Example
239(1)
Blacklisting From: Addresses
240(1)
McAfee SpamKiller for Lotus Domino v2.1
240(15)
Installation
241(1)
Configuration
241(9)
SMTP AUTH and STARTTLS
250(5)
Conclusion
255(2)
Sender Verification
257(30)
Sender Verification Background
258(2)
Installing Python
260(1)
Camram
260(14)
Installation
262(3)
Camram Configuration
265(4)
Using Camram
269(5)
Active Spam Killer
274(4)
Installation
274(1)
Configuration
275(1)
Integration with MTAs
276(1)
Queue Management
277(1)
Tagged Message Delivery Agent
278(8)
Installation
279(1)
Configuration
279(7)
Conclusion
286(1)
Appendix A Sender Policy Framework
287(8)
How SPF Works
287(1)
Publishing SPF Records
288(3)
Enforcing SPF Records
291(4)
Appendix B Reporting Spam
295(10)
Reading an Email Header
296(9)
Appendix C Default SpamAssassin Ruleset
305(4)
Area Tested
305(1)
Locale
306(1)
Description of Test
306(1)
Test Name
306(1)
Default Scores Assigned
306(1)
Sample Rules
307(2)
Appendix D SpamAssassin Command Line Interface Reference
309(12)
SpamAssassin Command Options
309(3)
spamd
312(4)
spamc
316(5)
Appendix E SpamAssassin Configuration File
321(26)
General Settings
323(6)
Whitelist/Blacklist Options
329(2)
Bayesian
331(4)
Network Tests
335(4)
Ruleset and Scoring
339(5)
Tags
344(3)
Appendix F DSPAM
347(16)
Installation
349(14)
Appendix G References
363(12)
Index 375

Excerpts

Slamming Spam: A Guide for System Administrators PrefaceThis book is meant to be a reference for the email system administrator who has been asked to implement an anti-spam solution for their organization. This is an administrator's "how to" stop spam book. It is very hands on, with none of the "why people spam" or other topics which are usually only peripherally interesting or useful to a mail administrator.Fighting spam is a complex problem, with many potential technical, legislative, and social solutions. No book could ever hope to cover them all in a reasonable amount of space. In fact, when considering only the possible technical spam-fighting solutions, it isn't possible to give them all the coverage they require. Our focus in this book is on the widely used open source anti-spam solutions available for major mail transfer agents (email servers).Be sure to check out the web site for this book at http://www.slammingspam.com . It has all the latest information on the book, including updated URLs, errata, and other useful information in the fight against spam. Who This Book Is ForThe reader is assumed to have a limited knowledge of Linux/Unix. In most cases, step-by-step instructions are provided for the covered package or approach. These "cookbook" examples are meant to work for most installations, with minimal changes and/or customizations. While some knowledge is assumed of the mail-transfer agent software used (such as Sendmail), the administrator doesn't need to be a mail server expert or Linux guru to implement the solutions outlined here.You will learn about the best current anti-spam methods and software available. Most of the methods are open source and freely available (as in free beer). These open source solutions offer the "best of breed" anti-spam solutions available today. Implementing open source solutions requires more work than commercial solutions, but often the administrator ends up with a more flexible, better solution than is otherwise available.We initially thought we would discuss anti-spam services such as Postini and Symantec's Brightmail in the book. However, we found that most of the commercial anti-spam solutions (such as anti-spam firewalls) and services were documented quite well and didn't require additional coverage. As a result, most commercial solutions are only mentioned in the Introduction. The only non-open source anti-spam solution covered here (McAfee SpamKiller) is directly related to the commercial mail servers covered--IBM/Lotus Notes/Domino and Microsoft Exchange.The IBM Lotus Domino and Microsoft Exchange administrator has a choice. An anti-spam solution can be implemented directly as part of the mail server, since both IBM Lotus and Microsoft Exchange support plug-ins. To supplement or as an alternative to a tightly integrated solution (like McAfee SpamKiller), additional open source email servers can be deployed specifically to perform spam filtering or virus checking. These anti-spam/virus servers would process the message before sending it on to the Domino/Exchange server for delivery to the recipient.While adding to the "box count" an administrator needs to manage, this approach does enable an open source best-of-breed solution to these otherwise "closed" commercial email servers. A hybrid approach can reduce the out-of-pocket cost while giving the administrator much flexibility in tweaking the anti-spam solution. What You Will NeedThe solutions in this book focus on Linux, on the server side. There is some coverage of the client side, but primarily the client coverage is meant to complement the server implementations we examine. Although the solutions

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.