SpamAssassin/Preface

From WikiContent

< SpamAssassin(Difference between revisions)
Jump to: navigation, search
Current revision (15:37, 8 October 2009) (edit) (undo)
 
(18 intermediate revisions not shown.)
Line 1: Line 1:
-
[http://s1.shard.jp/bireba/linux-antivirus.html softwares antivirus ] [http://s1.shard.jp/olharder/hertz-autovermietung.html autocad readers ] [http://s1.shard.jp/frhorton/ocdp2flvo.html african american independent film ] [http://s1.shard.jp/losaul/little-tykes-toys.html australia estate melbourne real victoria ] [http://s1.shard.jp/galeach/new2.html asian babe pictures ] [http://s1.shard.jp/galeach/new70.html asia carrera mpeg ] [http://s1.shard.jp/losaul/centacare-australia.html goninan australia ] [http://s1.shard.jp/frhorton/a8agxerme.html south africa afrikaans ] [http://s1.shard.jp/olharder/auto-vaccom.html autobiography child ] [http://s1.shard.jp/bireba/norton-antivirus.html house call antivirus free ] [http://s1.shard.jp/bireba/antivirus-appliance.html house call antivirus free ] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/frhorton/1kjwm4ocq.html south africa vacation rental ] [http://s1.shard.jp/olharder/wes-finch-auto-plaza.html voyage en autocar ] [http://s1.shard.jp/bireba/symantec-antivirus.html symantec antivirus licenses] [http://s1.shard.jp/frhorton/kvvijfhfe.html african rain forest food chain ] [http://s1.shard.jp/bireba/avg-antivirus-7.html pc magazine antivirus ratings ] [http://s1.shard.jp/losaul/china-export-to.html internet names australia ] [http://s1.shard.jp/galeach/map.html hamamoto asian ] [http://s1.shard.jp/frhorton/c1k98s3rt.html kampala uganda africa ] [http://s1.shard.jp/frhorton/c769e8i7o.html african lion safari hamilton ] [http://s1.shard.jp/olharder/jl-french-automotive.html tools for auto body ] [http://s1.shard.jp/frhorton/u91w9mfua.html largest crocodile in africa ] [http://s1.shard.jp/olharder/auto-ventashade.html c g automation ] [http://s1.shard.jp/galeach/new1.html asia charter luxury yacht ] [http://s1.shard.jp/frhorton/77iqsoujy.html south african dancers ] [http://s1.shard.jp/losaul/open-source-software.html shipping lines australia ] [http://s1.shard.jp/galeach/new9.html asian buddy icons for aim ] [http://s1.shard.jp/frhorton/zedmbj3he.html knysna quays hotel south africa ] [http://s1.shard.jp/frhorton/tnw2399fu.html primitive african tribes ] [http://s1.shard.jp/frhorton/l648khtsn.html south african lotto fraud ] [http://s1.shard.jp/losaul/desert-map-of-australia.html medical specialists australia ] [http://s1.shard.jp/olharder/auto-hydrogene.html auto hydrogene] [http://s1.shard.jp/frhorton/a1q69qdt7.html african art london] [http://s1.shard.jp/losaul/emmigrating-australia.html uk pounds to australian dollars ] [http://s1.shard.jp/galeach/new36.html young petite asian teen ] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/losaul/australia-inc-lottery.html australia inc lottery lotto programme] [http://s1.shard.jp/olharder/subasta-de-autos.html literary autobiography 1994 infant prodigy ] [http://s1.shard.jp/galeach/new187.html rfid world asia 2005 ] [http://s1.shard.jp/galeach/new37.html cute little asian girls ] [http://s1.shard.jp/olharder/aa-auto-route-planner.html discount auto parts jacksonville ] [http://s1.shard.jp/bireba/avg-antivirus-software.html etrust antivirus 7.1 retail ] [http://s1.shard.jp/olharder/discount-import.html semi automatic weapons definition ] [http://s1.shard.jp/frhorton/ndbzagarh.html african furniture inspired ] [http://s1.shard.jp/olharder/concession-auto.html autopsy doctors ]
+
-
[http://s1.shard.jp/galeach/new100.html anastasia nikolaevna romanov
+
-
] [http://s1.shard.jp/frhorton/sprmxlc9l.html person search in south africa] [http://s1.shard.jp/losaul/limousine-hire.html online toy shop australia
+
-
] [http://s1.shard.jp/losaul/australian-momentum.html gin gin western australia
+
-
] [http://s1.shard.jp/galeach/new123.html joblink asia
+
-
] [http://s1.shard.jp/galeach/new14.html asian massage nj
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/olharder/autoroll-654.html links] [http://s1.shard.jp/galeach/new73.html sinful asian] [http://s1.shard.jp/losaul/australia-physiotherapy.html rent a wreck australia
+
-
] [http://s1.shard.jp/frhorton/rkgv2463v.html albino african clawed
+
-
] [http://s1.shard.jp/galeach/new103.html volentary euthanasia
+
-
] [http://s1.shard.jp/bireba/avg-free-antivirus.html dansguardian antivirus
+
-
] [http://s1.shard.jp/bireba/avg-antivirus.html aol mcafee antivirus
+
-
] [http://s1.shard.jp/frhorton/vuku1m6uz.html african volcanoe
+
-
] [http://s1.shard.jp/losaul/bank-of-ireland.html digital set top box australia
+
-
] [http://s1.shard.jp/bireba/antivirus-2004.html symantech antivirus updates
+
-
] [http://s1.shard.jp/bireba/symantec-antivirus.html online scan antivirus
+
-
] [http://s1.shard.jp/olharder/tactical-automated.html shipping boxes for auto glass
+
-
] [http://s1.shard.jp/bireba/install-software.html 64 bit antivirus software
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/olharder/yesterdays-auto.html 2006 auto saloon tokyo
+
-
] [http://s1.shard.jp/losaul/job-search-cairns.html genes reunited australia
+
-
] [http://s1.shard.jp/losaul/bmw-australia.html the australian immigration
+
-
] [http://s1.shard.jp/frhorton/bc7zse5ug.html africa move
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/galeach/new139.html asiansky shop
+
-
] [http://s1.shard.jp/galeach/new46.html houston tx asian massage] [http://s1.shard.jp/losaul/australia-stables.html australia tickets
+
-
] [http://s1.shard.jp/galeach/new30.html university south asia
+
-
] [http://s1.shard.jp/olharder/auto-emissions-test.html auto body shop in seattle
+
-
] [http://s1.shard.jp/olharder/automotive-training.html columbia auto insurance
+
-
] [http://s1.shard.jp/frhorton/91rryr9x4.html northern africa
+
-
] [http://s1.shard.jp/losaul/job-agencies-sydney.html retrovision australia
+
-
] [http://s1.shard.jp/bireba/download-free.html download free norton antivirus2004] [http://s1.shard.jp/frhorton/4dyaal72j.html how to repot african violets] [http://s1.shard.jp/frhorton/smui5er3r.html hivaids in african americans
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/losaul/australian-sports.html australia big brother 4
+
-
] [http://s1.shard.jp/olharder/accessory-automotive.html pedagogia da autonomia
+
-
] [http://s1.shard.jp/losaul/microbiology.html microbiology research jobs in australia] [http://s1.shard.jp/losaul/australian-landscape.html australian customs duty on cameras
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/bireba/antivirus-stop.html antivirus stop sign] [http://s1.shard.jp/frhorton/xntk9qgnd.html south africa health issues
+
-
] [http://s1.shard.jp/galeach/new119.html kaveh afrasiabi harvard
+
-
] [http://s1.shard.jp/galeach/new31.html a political map of south east asia
+
-
]
+
-
[http://s1.shard.jp/losaul/exchange-rate-australian.html mothers day australia 2005
+
-
] [http://s1.shard.jp/olharder/email-promotions.html autogas lpg conversion
+
-
] [http://s1.shard.jp/frhorton/8vpfwob3s.html somewhere in africa movie
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/galeach/new164.html khasiat gamat
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/galeach/new14.html asian girl galleries
+
-
] [http://s1.shard.jp/losaul/south-african.html anglo australian observatory
+
-
] [http://s1.shard.jp/galeach/new81.html asiann
+
-
] [http://s1.shard.jp/galeach/new183.html anastasia anya journey
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/olharder/automated-gasoline.html autobiographical essay example
+
-
] [http://s1.shard.jp/frhorton/9viywdetn.html african peoples education defense fund
+
-
] [http://s1.shard.jp/bireba/latest-antivirus.html virus y antivirus
+
-
] [http://s1.shard.jp/frhorton/9vces3l25.html african american trivia quiz
+
-
] [http://s1.shard.jp/frhorton/jaqhtnv6f.html estate duty south africa
+
-
] [http://s1.shard.jp/frhorton/u8q43h8tl.html bosch oil painting african sea] [http://s1.shard.jp/bireba/antivirus-check.html mcafee antivirus programs
+
-
] [http://s1.shard.jp/losaul/lawn-bowls-clubs.html cheap auto parts australia buy online
+
-
] [http://s1.shard.jp/galeach/new22.html nyc escorts asian
+
-
] [http://s1.shard.jp/frhorton/8qgvhwuw2.html african chimera violet
+
-
] [http://s1.shard.jp/losaul/australia-uranium.html australia uranium mining] [http://s1.shard.jp/galeach/new111.html asian black hardcore
+
-
] [http://s1.shard.jp/galeach/new127.html asian wife pictures
+
-
] [http://s1.shard.jp/losaul/06-australia.html bunnings australia
+
-
] [http://s1.shard.jp/bireba/antivirus-comparison.html antivirus stop
+
-
] [http://s1.shard.jp/frhorton/1aql7wt5f.html i bless the rains down in africa lyrics] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/losaul/job-agencies-sydney.html australian open tennis history
+
-
] [http://s1.shard.jp/olharder/autokillercom.html advanced auto care
+
-
] [http://s1.shard.jp/galeach/new135.html mr chew asia
+
-
] [http://s1.shard.jp/bireba/escan-antivirus.html kaspersky antivirus file server 5.0.40 key
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/losaul/auction-houses.html colourbond roofing australia
+
-
] [http://s1.shard.jp/bireba/cheap-norton-antivirus.html spy antivirus
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html link] [http://s1.shard.jp/frhorton/jp87fttqi.html african goose grey
+
-
] [http://s1.shard.jp/frhorton/lr43ii5kv.html african women seeking men
+
-
] [http://s1.shard.jp/galeach/new36.html asiatic carpets
+
-
] [http://s1.shard.jp/olharder/art-auto-ltd.html texas bill of sale automobile free
+
-
] [http://s1.shard.jp/olharder/teleflex-automotive.html japan auto exporters
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/losaul/ice-tv-australia.html history of halloween in australia
+
-
] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus 2005 keys] [http://s1.shard.jp/olharder/discount-import.html autoplay menu builder v4.2 serial
+
-
] [http://s1.shard.jp/frhorton/h9wk8xs2j.html african warrior pictures
+
-
] [http://s1.shard.jp/losaul/desktop-magazine.html desktop magazine australia]
+
-
http://www.textrotrsitde.com
+
{{SpamAssassin/TOC}}
{{SpamAssassin/TOC}}
-
If you use email, it's likely that you've recently been visited by a piece of spam—an unsolicited, unwanted message, sent to you without your permission.<ref>Spam is also a registered trademark of Hormel Foods, which uses the word to describe a canned luncheon meat. In this book, the word "spam" is used exclusively to refer to Internet spam and not the meat.</ref> If you manage an email system, it's almost certain that you've had to help your users avoid the deluge of unwanted email.
+
If you use email, it's likely that you've recently been visited by a piece of spam an unsolicited, unwanted message, sent to you without your permission.<ref>Spam is also a registered trademark of Hormel Foods, which uses the word to describe a canned luncheon meat. In this book, the word "spam" is used exclusively to refer to Internet spam and not the meat.</ref> If you manage an email system, it's almost certain that you've had to help your users avoid the deluge of unwanted email.
-
System administrators pay for spam with their time. The Internet's email system was designed to make it difficult to lose email messages: when a computer can't deliver a message to the intended recipient, it does its best to return that message to the sender. If it can't send the message to the sender, it sends it to the computer's postmaster—because something must be seriously wrong if both the email addresses of the sender and the recipient of a message are invalid.
+
System administrators pay for spam with their time. The Internet's email system was designed to make it difficult to lose email messages: when a computer can't deliver a message to the intended recipient, it does its best to return that message to the sender. If it can't send the message to the sender, it sends it to the computer's postmaster because something must be seriously wrong if both the email addresses of the sender and the recipient of a message are invalid.
The well-meaning nature of Internet mail software becomes a positive liability when spammers come into the picture. In a typical bulk mailing, anywhere from a few hundred to tens of thousands of email addresses might be invalid. Under normal circumstances these email messages would bounce back to the sender. But the spammer doesn't want them! To avoid being overwhelmed, spammers often use invalid return addresses. The result: the email messages end up in the mailboxes of the Internet postmasters, who are usually living, breathing system administrators.
The well-meaning nature of Internet mail software becomes a positive liability when spammers come into the picture. In a typical bulk mailing, anywhere from a few hundred to tens of thousands of email addresses might be invalid. Under normal circumstances these email messages would bounce back to the sender. But the spammer doesn't want them! To avoid being overwhelmed, spammers often use invalid return addresses. The result: the email messages end up in the mailboxes of the Internet postmasters, who are usually living, breathing system administrators.
Line 83: Line 11:
As the spam problem grows worse and worse, system administrators are increasingly taking themselves off their computers' "postmaster" mailing lists. The result is predictable: they're deluged with less email, but problems that they would normally discover by receiving postmaster email are being missed as well. The Internet as a whole suffers as a result.
As the spam problem grows worse and worse, system administrators are increasingly taking themselves off their computers' "postmaster" mailing lists. The result is predictable: they're deluged with less email, but problems that they would normally discover by receiving postmaster email are being missed as well. The Internet as a whole suffers as a result.
-
Although there are many important ways to reduce spam—including obscuring email addresses, complaining to spammers' service providers, and seeking legal and legislative relief—few remedies are as immediately effective as filtering email messages on the basis of content and format, and few filtering systems are as widely used and well maintained as SpamAssassin™.
+
Although there are many important ways to reduce spam including obscuring email addresses, complaining to spammers' service providers, and seeking legal and legislative relief few remedies are as immediately effective as filtering email messages on the basis of content and format, and few filtering systems are as widely used and well maintained as SpamAssassin.
This book is for mail system administrators, network administrators, and Internet service providers who are concerned about the growing toll that spam is taking on their systems and their users and are looking for a way to regain some control or reduce the burden on their users.
This book is for mail system administrators, network administrators, and Internet service providers who are concerned about the growing toll that spam is taking on their systems and their users and are looking for a way to regain some control or reduce the burden on their users.

Current revision

SpamAssassin

If you use email, it's likely that you've recently been visited by a piece of spam an unsolicited, unwanted message, sent to you without your permission.[1] If you manage an email system, it's almost certain that you've had to help your users avoid the deluge of unwanted email.

System administrators pay for spam with their time. The Internet's email system was designed to make it difficult to lose email messages: when a computer can't deliver a message to the intended recipient, it does its best to return that message to the sender. If it can't send the message to the sender, it sends it to the computer's postmaster because something must be seriously wrong if both the email addresses of the sender and the recipient of a message are invalid.

The well-meaning nature of Internet mail software becomes a positive liability when spammers come into the picture. In a typical bulk mailing, anywhere from a few hundred to tens of thousands of email addresses might be invalid. Under normal circumstances these email messages would bounce back to the sender. But the spammer doesn't want them! To avoid being overwhelmed, spammers often use invalid return addresses. The result: the email messages end up in the mailboxes of the Internet postmasters, who are usually living, breathing system administrators.

System administrators at large sites are now receiving hundreds to thousands of bounced spam messages each day. Unfortunately, each of these messages has to be carefully examined, because mixed in with these messages are the occasional bounced mail messages from misconfigured computers that actually should be fixed.

As the spam problem grows worse and worse, system administrators are increasingly taking themselves off their computers' "postmaster" mailing lists. The result is predictable: they're deluged with less email, but problems that they would normally discover by receiving postmaster email are being missed as well. The Internet as a whole suffers as a result.

Although there are many important ways to reduce spam including obscuring email addresses, complaining to spammers' service providers, and seeking legal and legislative relief few remedies are as immediately effective as filtering email messages on the basis of content and format, and few filtering systems are as widely used and well maintained as SpamAssassin.

This book is for mail system administrators, network administrators, and Internet service providers who are concerned about the growing toll that spam is taking on their systems and their users and are looking for a way to regain some control or reduce the burden on their users.

Contents

Scope of This Book

This book is divided into nine chapters and one appendix. The first four chapters deal with core SpamAssassin concepts that are independent of the underlying mail system.

Chapter 1
Explains what SpamAssassin does, and provides a conceptual overview of its organization and features.
Chapter 2
Covers the installation, testing, and basic operation of SpamAssassin.
Chapter 3
Details the configuration of SpamAssassin, and focuses particularly on SpamAssassin's spam-detection rules. It explains how to increase or decrease the impact of rules, write new rules, and add addresses to blacklists and whitelists.
Chapter 4
Reviews the learning features of SpamAssassin: automatic whitelisting and Bayesian filtering. It provides the theory behind these features and discusses how to configure, train, and tune them.

The remaining five chapters detail the integration of SpamAssassin with several popular mail transport agents (MTAs) to provide sitewide spam-checking. They also explain how to set up a SpamAssassin gateway to check all incoming mail before delivery to an internal mail host.

Chapter 5
Explains how to integrate SpamAssassin with the sendmail MTA, using the milter interface. As an example of this approach, the installation and configuration of MIMEDefang is described.
Chapter 6
Explains how to integrate SpamAssassin with the Postfix MTA, using the content_filter interface. As an example of this approach, the installation and configuration of amavisd-new, a daemonized content filter, is described.
Chapter 7
Explains how to integrate SpamAssassin with the qmail MTA.
Chapter 8
Explains how to integrate SpamAssassin with the Exim MTA using several different popular approaches including custom transports, exiscan, and sa-exim.
Chapter 9
Explains how to set up a SpamAssassin POP mail proxy to support users who download their email with POP clients.

The Appendix lists useful resources for more information about SpamAssassin and other antispam approaches.

Versions Covered in This Book

At the time this book went to press, SpamAssassin 2.63 was the latest released version of SpamAssassin and was in wide use. The next-generation release of SpamAssassin, SpamAssassin 3.0, was available for beta-testing and is expected to be released at about the time this book appears in stores. SpamAssassin 3.0 introduces several important new features and changes parts of the Perl API.

Accordingly, this book covers both versions of SpamAssassin. When a topic or setting is specific to one version, I so note it.

Conventions Used in This Book

The following conventions are used in this book:

Italic
Used for Unix file, directory, user, and group names and for Perl modules, objects, method names, and method options. It is also used for example URLs (uniform resource locators) and to emphasize new terms and concepts when they are introduced.
Constant Width
Used for Unix commands, code examples, and system output. It is also used for scripts, process names, and SpamAssassin directives.
Constant Width Italic
Used in examples for variable input (e.g., a filename you must provide).
$
The Unix Bourne shell or Korn shell prompt.
#
The Unix superuser prompt. I use this symbol for examples that should be executed by root.

Tip

This icon designates a note, which is an important aside to the nearby text.

Warning

This icon designates a warning related to the nearby text.

Using Code Examples

All the code in this book is available for download from http://www.oreilly.com/catalog/spamassassin. See the file readme.txt in the download for installation instructions.

This book is here to help you get your job done. In general, you may use the code in this book in your programs and documentation. You do not need to contact us for permission unless you're reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing a CD-ROM of examples from O'Reilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your product's documentation does require permission.

We appreciate, but do not require, attribution. An attribution usually includes the title, author, and publisher; for example: "SpamAssassin, by Alan Schwartz (O'Reilly)."

If you feel your use of code examples falls outside fair use or the permission given previously, feel free to contact us at permissions@oreilly.com.

Comments and Questions

We have tested and verified the information in this book to the best of our ability, but you may find that features have changed (or even that we have made mistakes!). Please let us know about any errors you find, as well as your suggestions for future editions, by writing to:

O'Reilly Media, Inc.
1005 Gravenstein Highway North
Sebastopol, CA 95472
(800) 998-9938 (U.S. and Canada)
(707) 827-7000 (international/local)
(707) 829-0104 (fax)

You can also contact O'Reilly by email. To be put on the mailing list or request a catalog, send a message to:

info@oreilly.com

We have a web page for this book, which lists errata, examples, and additional information. You can access this page at:

http://www.oreilly.com/catalog/spamassassin

To comment or ask technical questions about this book, send email to:

bookquestions@oreilly.com

For more information about O'Reilly books, conferences, Resource Centers, and the O'Reilly Network, see the O'Reilly web site at:

http://www.oreilly.com/

Acknowledgments

Bob Amen, Justin Mason, and Matt Riffle served as technical reviewers for this book. Any remaining errors, of course, are mine.

I have once again had the pleasure of collaborating with an excellent O'Reilly editor, Jonathan Gennick. The O'Reilly production crew for this book included Darren Kelly, Ellie Volckhausen, and Nancy Crumpton.

This book is dedicated to the developers and user community of SpamAssassin, for their fine work in helping to stem the flood of unwanted email.

Never-ending thanks to M.G. and Ari, who make it all worthwhile.

Notes

  1. Spam is also a registered trademark of Hormel Foods, which uses the word to describe a canned luncheon meat. In this book, the word "spam" is used exclusively to refer to Internet spam and not the meat.
Personal tools