Scam-protect is a milter which restricts the use of your domain address in emails.
Version: 1.0.0Scam-protect is a milter which restricts the use of your domain address in emails. The aim is to protect your users from phishing by rejecting mail purporting to be from your domain. It is not meant as a replacement for SPF or SenderID.
License: BSD License
Operating System: Linux
Here are some key features of "Scam protect":
Â· Reject mail with your domain name in the mail from envelope
Â· Reject mail with your domain name in the From header
Scam-protect milter was designed to be light-weight and use minimal resources.
Scam-protect has a configurable whitelist of IP addresses or a range of IP addresses (CIDR). This feature can be used to allow which hosts can use your domain name in email addresses..
Accept mail from users
Users should configure their mail clients (MS Outlook, Eudora, Mozilla Thunderbird) to use the port 587 (MSA) instead of the SMTP port to send mail through the mail server running Scam-protect.
Scam-protect will accept mail if the connection was authenticated through SMTP AUTH.
Â· sendmail version 8.12.x or higher. Sendmail should have been built with MILTER support enabled.
Â· milter library and development kit
1. Extract the scam-protect tarball
2. Change the current directory to the one where the scam-protect source code was extracted.
3. If you are using FreeBSD, OpenBSD or NetBSD, rename the Makefile.bsd file to Makefile. If you are using a Linux distribution, rename the Makefile.linux file to Makefile
4. Type make and press Enter to compile scam-protect
1. Copy the scam-protect file created above to the appropriate location (/usr/local/sbin for example)
2. Generate a new sendmail configuration (sendmail.cf) with the following additional settings:
INPUT_MAIL_FILTER(`scam-protect', `S=unix:/var/spool/scam/scam-protect.sock, F=T, T=S:240s;R:240s;E:5m')dnl
3. Add the list of hosts allowed to use your domain name to the scam.conf file and copy it to the /etc/mail directory
4. Create a user (scamprot for example) which will be used to run the milter
5. Create the /var/spool/scam directory
6. Verify that the user created in step 4 has read-write access to the /var/spool/scam directory
1. Start scam-protect milter as a daemon scam-protect -p unix:/var/spool/scam/scam-protect.sock -u scamprot -D
4. Restart sendmail if you have generated a new sendmail configuration when installing scam-protect
Type the following command to stop scam-protect kill -USR1 `cat /var/spool/scam/scam-protect.pid`
The following syntax defines the domain to be protected. Multiple domains can be specified.
Define the IP address and/or subnet allowed to send mail from your domain as follows: