spam and viruses can be defeated simply by deploying MailScanner. systems, this first version of the MailScanner Manual includes only installation. MailScanner Guide. Contents. Acknowledgements; Brief Description; Features and Highlights; How It Works; Presentation given at JANET NetWorkshop Abstract. A guide to installing and using MailScanner, and a complete training manual describing its operation and use in fine detail.

Author: Kazragrel Fauzshura
Country: Azerbaijan
Language: English (Spanish)
Genre: Music
Published (Last): 20 March 2007
Pages: 125
PDF File Size: 13.27 Mb
ePub File Size: 2.43 Mb
ISBN: 506-2-18691-269-6
Downloads: 80531
Price: Free* [*Free Regsitration Required]
Uploader: Nidal

The ongoing development of MailScanner has been greatly helped by the donation or loan of equipment from transtec ComputersNetergy and The Jackson Family Ltd.

I must also thank Nick Philips kailscanner all his contributions and tireless work mai,scanner the Exim support. Last but by no means least, my thanks to numerous other people who have contributed translations, ideas for new features, support for more virus scanners, MailScanner is a complete e-mail security system designed for use on e-mail gateways.

It protects against viruses, and detects attacks against e-mail client packages such as Outlook, Outlook Express, Eudora. It can also detect almost all unsolicited commercial e-mail spam passing through it and respond to vuide incidents in a wide variety of ways.

Not only can it scan for known viruses, but it can also protect against unknown viruses hidden inside e-mail attachments by refusing entry to attachments whose filenames match any given pattern.

This can include generic patterns that trap filenames attempting to hide the true filename extension e. Attachments containing viruses that can be disinfected e. It is superior to many commercial packages in its ability mailscanndr handle attacks against itself, such as Denial Of Service attacks caused by messages containing the “Zip of Death”.

It is easy to install into an existing e-mail gateway, requiring very little knowledge of sendmail and no change to an existing sendmail configuration.

Configuration Index – MailScanner v5.1.x

MailScanner itself is entirely open source, but it uses widely known commercial virus scanning packages at its core. The other software it uses is all high quality open source software, leading to a system that can be trusted for performance and reliability. In its most common use, sendmail provides both SMTP service and delivery service at the same time.

  ARCHIVO FOTOGRAFICO CASASOLA PDF

It listens for incoming e-mail messages on the SMTP port, places them into a queue, and delivers them to their destination at the earliest opportunity. When using MailScanner, this is split into two separate jobs, each handled by a different sendmail process and a different queue.

The first sendmail process listens for messages on the SMTP port and places them into an incoming queue.

MailScanner is responsible for collecting messages from the incoming queue, checking and filtering them, then placing them in an outgoing queue and triggering the second sendmail process to deliver them. Due to the design and structure of sendmail, this split is extremely simple to achieve and requires no recompiling or configuration file changes. All the required changes can be easily done by editing the commands used to start sendmail.

Almost every aspect of the process above can be configured, from the maximum size of the batch of messages to scan on each iteration, to the e-mail address of the local postmaster.

To minimise any chance of message corruption, any messages that are found to be entirely clean and uninfected are moved directly between the two queues; no attempt is made to rebuild them from their constituent MIME entities. A message is only rebuilt from its MIME entities if an infection or dangerous filename was found, causing the replacement of the attachment with a text message. To eliminate any chance of delivering a message containing an infection that failed to be disinfected, the disinfection process scans, then disinfects, then scans again.

Only attachments that passed the virus scanner in the last scan are forwarded to the original recipient. Every incoming message is checked to see if it was sent by either an open mail relay, a known spam source, or was sent directly from a known dial-up line without passing through a proper mail server.

This is all done using publicly available on-line databases, and therefore requires no maintenance by the administrator of this package. If, as a result of these checks, a message looks suspicious, it is marked by the addition of an extra header listing the databases where it was found.

The message is then delivered as normal after virus-checking, of course. The SpamAssassin system is also supported as an optional extra, which if installed will greatly improve the ability to be able to identify spam.

This is a very clever heuristics-based engine that identifies spam using a wide range of dozens of tests on both the headers and body of the message.

  AIRHEAD BEING NIKKI MEG CABOT PDF

MailScanner Guide

In the case of a regular correspondent whose mail server is marked as a source of spam, their address can be added to a “spam white list” of addresses mailzcanner networks whose email will not be marked as spam. This approach of marking but still delivering suspicious messages allows the end-user to take full control over their e-mail. Many e-mail packages and delivery agents, such as Eudora, Microsoft Outlook, pine or procmail, can be configured to check incoming mail against rules and save or even delete messages appropriately.

Some users who are very anti-spam may choose to automatically delete any marked messages. However, most users configure their e-mail package mailecanner automatically save marked messages in an “Auto-Spam” folder.

Considerable lengths have been taken in the design of this software to ensure that there is no chance of e-mail messages being lost due to failure of any part of MailScanner or its supporting software packages.

It is well appreciated that robustness and reliability are of great importance in the choice or use of any software system which handles e-mail.

As can be seen from the above order of operation, even if gujde fails e. If at any time the process is interrupted by, for example, MailScanner being killed or the entire computer crashingno mail will be lost.

The worst possibility is that there mailscannr a very small chance of a few messages being delivered twice, but this has not been reported in practice. To avoid operating system resource leaks, MailScanner periodically kills and restarts itself.

There have, in the past, been a few Perl modules which mmailscanner managed to leak memory, and this simply avoids this ever causing problems by giving the operating system regular opportunities to clear up from the application.

There has never been any indication that this application does indeed leak resources, but it is a prudent design step which may improve the reliability of the program, and certainly does no harm.

Medical