Solved

How to setup a spam filter to go along with sendmail?

Posted on 2006-10-19
3
235 Views
Last Modified: 2010-03-18
Does anyone know about an easy solution to filter spam but keep using sendmail... and if possible a solution that does no require sql databases...

0
Comment
Question by:ITMiami
  • 2
3 Comments
 
LVL 26

Accepted Solution

by:
jar3817 earned 500 total points
ID: 17769745
I have sendmail setup to talk to mimedefang (http://www.mimedefang.org/), Spamassassin (http://spamassassin.apache.org) and clam antivirus (http://www.clamav.net)

This howto is what I used to set it up initially: http://www.mickeyhill.com/mimedefang-howto/

It isn't a point a click (or even a simple ./configure && make && make install) setup but it does do a very good job of filtering/tagging. Over the past 4 days my home email server (with the above setup) has seen 1300 email connections.  Of those, 95.2% were spam and rejected. And of the 4.8% that made it to my mailbox some of those were tagged as spam by spamassassin.
0
 
LVL 14

Expert Comment

by:pablouruguay
ID: 17769751
yes use spamassassin http://spamassassin.apache.org/ 

you only need a basic append in the /etc/procmailrc file to running with sendmail

other solution is bogofilter but is more complex to setup and administer

greylisting too is difficult to setup but spamassassin is really easy and works very well
0
 
LVL 14

Expert Comment

by:pablouruguay
ID: 17769769
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question