State of the art spam control?

G. Matthew Rice matt-s/rLXaiAEBtBDgjK7y7TUQ at public.gmane.org
Fri Jan 13 16:43:21 UTC 2006


Ivan Avery Frey <ivan.frey-H217xnMUJC0sA/PxXw9srA at public.gmane.org> writes:
> When I receive mail on my imap inbox at the University of Toronto, I am
> trasparently authenticated to use the smtp server assigned to me because they
> remember the ip that accessed the imap server.
> 
> The only annoyance is that it times out every now and then which is usually
> avoided by doing a get mail before I send mail.
> 
> But of course this would be subject to a man in the middle attack, but for
> now it doesn't appear to be a problem.
> 
> Is such a solution feasible in Linux?

Yes but not recommended.  For example, there's smtp-after-pop and
smtp-after-imap.  They just watch log files for successful imap/pop
connections and then adjust the MTA's configuation.

It's better to just use authenticated SMTP.

HTH,
-- 
g. matthew rice <matt-s/rLXaiAEBtBDgjK7y7TUQ at public.gmane.org>           starnix, toronto, ontario, ca
phone: 647.722.5301 x242                                  gpg id: EF9AAD20
http://www.starnix.com              professional linux services & products
--
The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml





More information about the Legacy mailing list