LDAP user-lookup by spam filter

Posted on 2007-07-31
Last Modified: 2012-08-13
We're using a Debian-based spam filter called CanIt... (

Our system has the ability to create a LDAP user-lookup, which it can then use to verify that the recipient address actually exists.  Problem is, I have not got the faintest idea how to set this up as it asks for a lot of very confusing information.  If I am not mistaken, it uses the lookup via the SMTP communication, and then simply terminates the communication if the recipient is not recognized.

Since I know that there's probably a lot of information needed, which I haven't a clue what information that will be, I'll need people to ask the right questions.

Here's what the spam filter needs for it's lookup:
LDAP Server: (I would assume this is just our AD server, which is 'Server2'
Base DN:
Bind DN:
Bind Password:
Search Filter for login authentication: (default of "(sAMAccountName=%s)")
Search Filter for streaming: (default of "(proxyAddresses=smtp:%s)")
Attribute containing stream name: (default of "sAMAccountName")

There are other fields, but I don't think they will be stuff that you'll need and I can figure those ones out on my own.

Thanks for the info... please ask if you need specific information
Question by:lunanat
    LVL 23

    Accepted Solution

    AD server is correct. Base DN will be rootDSE. Since I doubt the filter can use that, its the name of your AD org such as DC=domain,DC=org.

    Bind DN is the user you are binding as such as: CN=user1,OU=Admins,DC=domain,DC=org.

    sAMAccountName seems a strange thing for a spam filter. in my opinion it should have a mail address filter (your streaming looks like it however).
    LVL 1

    Author Comment

    and how would a mail address filter look?  Sorry, I'm a newb at this kind of stuff.
    LVL 23

    Expert Comment

    by:Stacy Spear

    assuming %s is the smtp of the recipient
    LVL 23

    Expert Comment

    by:Stacy Spear
    I believe my first post is the answer.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Join & Write a Comment

    Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a …
    Operating system developers such as Microsoft ( and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    This video discusses moving either the default database or any database to a new volume.

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now