State of the art spam control?
G. Matthew Rice
matt-s/rLXaiAEBtBDgjK7y7TUQ at public.gmane.org
Fri Jan 13 16:43:21 UTC 2006
Ivan Avery Frey <ivan.frey-H217xnMUJC0sA/PxXw9srA at public.gmane.org> writes:
> When I receive mail on my imap inbox at the University of Toronto, I am
> trasparently authenticated to use the smtp server assigned to me because they
> remember the ip that accessed the imap server.
>
> The only annoyance is that it times out every now and then which is usually
> avoided by doing a get mail before I send mail.
>
> But of course this would be subject to a man in the middle attack, but for
> now it doesn't appear to be a problem.
>
> Is such a solution feasible in Linux?
Yes but not recommended. For example, there's smtp-after-pop and
smtp-after-imap. They just watch log files for successful imap/pop
connections and then adjust the MTA's configuation.
It's better to just use authenticated SMTP.
HTH,
--
g. matthew rice <matt-s/rLXaiAEBtBDgjK7y7TUQ at public.gmane.org> starnix, toronto, ontario, ca
phone: 647.722.5301 x242 gpg id: EF9AAD20
http://www.starnix.com professional linux services & products
--
The Toronto Linux Users Group. Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml
More information about the Legacy
mailing list