Table of Contents
- Introduction
- 1. Background
- 2. Techniques
- 3. Considerations
- 4. Questions & Answers
- A. Exim Implementation
- 1. Prerequisites
- 2. The Exim Configuration File
- 3. Options and Settings
- 4. Building the ACLs - First Pass
- 5. Adding SMTP transaction delays
- 6. Adding Greylisting Support
- 7. Adding SPF Checks
- 8. Adding MIME and Filetype Checks
- 9. Adding Anti-Virus Software
- 10. Adding SpamAssassin
- 11. Adding Envelope Sender Signatures
- 12. Accept Bounces Only for Real Users
- 13. Exempting Forwarded Mail
- 14. Final ACLs
- Glossary
- B. GNU General Public License
List of Tables