Hide thumbs Also See for LINUX 7.2:
Table of Contents

Advertisement

280
Any messages sent from the tux-lug@domain.com mailing list will be placed in the tuxlug
mailbox automatically for your MUA. Note that the condition in this example will match the message
if it has the mailing list's email address on the From, CC, or To lines.
Procmail can also be used to block spam, although this is not a good long-term solution for junk mail.
Consider the following temporary spam filtering solution in Figure 16–13, Example of a basic spam
filter, where multiple recipes are set to use a common mailbox to store the junk.
Figure 16–13 Example of a basic spam filter
SPAM=junk
:0:
* To??^$
$SPAM
:0:
* ^(To|CC):.*,.*,.*,.*,.*,.*,.*,.*,.*,.*,.*,
$SPAM
:0:
* ^Message-Id:.*<[^@]*>
$SPAM
In this example, the junk mailbox is associated with the SPAM variable, so that you can change the
mailbox that holds your spam in one place. Then, three recipes look for messages to send to the junk
mailbox.
The first recipe looks for messages that have no recipient in the To line. The second recipe matches
any messages with 12 or more recipients. The third recipe looks for messages with a bad message ID.
These simple examples are provided to help get you started creating recipes. Consult the many Proc-
mail online resources available from Section 16.7, Additional Resources to see more detailed and
powerful recipes.

16.6 Security

Like any other service that flows over a network unencrypted, important email information, such as
usernames, passwords, and entire messages, may be intercepted and viewed, all without the knowl-
edge of the email server or client. When using standard POP and IMAP protocols, all authentication
information is sent "in the clear," meaning that someone on a network between the client and the re-
mote server can easily view it.
Chapter 16:Email

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux 7.2

Table of Contents