allowing others with dynamic IPs to use your email service.


 
Thread Tools Search this Thread
Top Forums UNIX for Beginners Questions & Answers Answers to Frequently Asked Questions Email Antispam Techniques and Email Filtering allowing others with dynamic IPs to use your email service.
# 1  
Old 02-17-2003
allowing others with dynamic IPs to use your email service.

if you are running pop3 and smtp and wish to allow others to have an email address using your service out side of your local network you may run into a problem; relaying should be disallowed for others out side of your private network, so how do you allow someone with an account that you gave them to use your mail service, without opening your server to be an open relay for anyone who wants to abuse it? this website: http://popbsmtp.sourceforge.net/

provides a great perl utility that will look at successful pop3 logins and then create a temporary database with that users ipaddress and user name. with that you can set your mail server, (postfix, sendmail...) to look at the database and will allow mail relaying for those that have successful pop3 logins. this utility works with various pop3 servers, and the website includes detailed instructions on just exactly how to set it up. all youll hav eto do i tell your users to CHECK their mail first before they try to send it.
# 2  
Old 02-17-2003
Thanks Norsk!

That is a great tip! Just the kind of great antispam technique this special topic forum needs. I have never heard of 'POP before SMTP'...

My mother (a grandmother and savvy net user) has been on the net (doing email) since 1992 and now says, for her, the Internet is "not fun anymore' because of the mountains of spam she receives.

I think spam is the number one problem on the net today...... recently I was overseas in an Internet kiosk and spent most of my 'on-line' time deleting a thousand junk message that accumlated over a day in airports and planes.....

Thanks! Neo
# 3  
Old 02-17-2003
dont mention it Smilie
i forgot where i found that , i think it might have been on here. anyway it really is a great utility, and the instructions on the website are really very easy to follow. aside from making sure your email server isnt an open relay, other steps to prevent gettting spam is to just not give our your email address. i recieve minimal spam, maybe one or 2 every 3 weeks. a big thing i think is that people really dont think twice about giving out their email address. people sign up for contests to win $1000000 and dont realize that they are selling your address to ad. companies. another preventative tip is whenever you post your email on message boards, or irc channels, or on website is to NOT include the '@' sign, instead just use the word 'at' eg: nobody at example.com
also, whenever i recieve spam that i am positive i didnt give the senders my address, if i have the time ill send them a polite email requesting that they take my address of of their send list and that sometimes helps. anyway , hope all that helps!
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Allowing External Scans

Hello! I run an HP Unix system which I host oracle databases on, as well as oracle based apps used by my company. My IA department needs to scan my files to ensure I am following IA procedures and check for vulnerabilities in scripts etc. The scan is coming from corporate, and they asked for... (2 Replies)
Discussion started by: hpuxguy
2 Replies

2. Cybersecurity

IP Tables not allowing ports

Hi guys, I'm trying to configure iptables to only allow certain ports access. I set the first set of rules to block everything and then subsequently open ports as needed, but everything still seems to be blocked. I have read that the order matters (new to iptables), perhaps this is an issue.... (6 Replies)
Discussion started by: 3therk1ll
6 Replies

3. Homework & Coursework Questions

Need help in allowing symmetric cryptography[2]

The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. 4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies

4. Red Hat

Need help in allowing symmetric cryptography[2]

I have encountered some problems in my school work. Here is the question: The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies

5. Shell Programming and Scripting

Dynamic email attachments

Hi all, I am quite new to Unix shell scripting and I am trying to create a common function to send mail that is capable of adding multiple attachments. The script works if there is only one attachment. But when there is more than one, it just won't work. It gives a syntax message "Usage:... (3 Replies)
Discussion started by: dongzky
3 Replies

6. UNIX for Advanced & Expert Users

Sql dynamic table / dynamic inserts

I have a file that reads File (X.txt) Contents of record 1: rdrDESTINATION_ADDRESS (String) "91 971502573813" rdrDESTINATION_IMSI (String) "000000000000000" rdrORIGINATING_ADDRESS (String) "d0 movies" rdrORIGINATING_IMSI (String) "000000000000000" rdrTRAFFIC_EVENT_TIME... (0 Replies)
Discussion started by: magedfawzy
0 Replies
Login or Register to Ask a Question