• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 625
  • Last Modified:

LDAP user-lookup by spam filter

We're using a Debian-based spam filter called CanIt... (http://roaringpenguin.com)

Our system has the ability to create a LDAP user-lookup, which it can then use to verify that the recipient address actually exists.  Problem is, I have not got the faintest idea how to set this up as it asks for a lot of very confusing information.  If I am not mistaken, it uses the lookup via the SMTP communication, and then simply terminates the communication if the recipient is not recognized.

Since I know that there's probably a lot of information needed, which I haven't a clue what information that will be, I'll need people to ask the right questions.

Here's what the spam filter needs for it's lookup:
LDAP Server: (I would assume this is just our AD server, which is 'Server2'
Base DN:
Bind DN:
Bind Password:
Search Filter for login authentication: (default of "(sAMAccountName=%s)")
Search Filter for streaming: (default of "(proxyAddresses=smtp:%s)")
Attribute containing stream name: (default of "sAMAccountName")

There are other fields, but I don't think they will be stuff that you'll need and I can figure those ones out on my own.

Thanks for the info... please ask if you need specific information
  • 3
1 Solution
Stacy SpearCommented:
AD server is correct. Base DN will be rootDSE. Since I doubt the filter can use that, its the name of your AD org such as DC=domain,DC=org.

Bind DN is the user you are binding as such as: CN=user1,OU=Admins,DC=domain,DC=org.

sAMAccountName seems a strange thing for a spam filter. in my opinion it should have a mail address filter (your streaming looks like it however).
lunanatAuthor Commented:
and how would a mail address filter look?  Sorry, I'm a newb at this kind of stuff.
Stacy SpearCommented:

assuming %s is the smtp of the recipient
Stacy SpearCommented:
I believe my first post is the answer.

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now