IBM AH0QXML User Guide - Page 35

Router, 3.3 Domino 6 anti-spam configuration, Router

Page 35 highlights

7. Originating SMTP server sends the DATA command to initiate the transfer of the message contents. 8. Domino SMTP Listener acknowledges start of DATA. 9. Originating SMTP server sends END OF DATA to indicate data transfer is complete. Domino SMTP Listener checks any inbound file size restrictions. Server mail rules are run, but only "Don't accept message" action is applied here. 10.Domino SMTP acknowledges END OF DATA and awaits disconnect or next message. (Note: Steps 3 through 10 are repeated for additional messages.) 11.Originating SMTP server sends QUIT, initiating close session sequence. 12.Domino SMTP acknowledges QUIT and closes connection. The earlier in this sequence that you can detect and reject a spam message, the fewer server resources are wasted by the spam. 3.2.2 Router Once a message has been received by the SMTP Listener, it is analyzed against the Server mail rules. The Server mail rules are evaluated against any incoming message as it is placed into the server MAIL.BOX. Server Mail rules are your second line of defense. Inbound controls can and should be used to block all mail to or from specific users and domains. The Server mail rules allow more flexibility and control by allowing you to specify additional conditions to be tested. You can also specify additional actions to be taken on the message other than just denying the delivery of it. If a message passes all testing in the server rules, it is then processed by the router for forwarding to another Domino server (which might have a different set of rules), or for placement into an end-user mail file. The mail file rules are typically established by the end-user of the mail file. Mail file rules are evaluated for any incoming messages on the server, before delivering the message to the user's mail file. Every Domino installation is different, and your particular circumstances will dictate where and how stringently you control incoming spam. 3.3 Domino 6 anti-spam configuration The best defense against spam is knowing the options available to you as the administrator. Being able to identify what messages are considered spam, versus those that were unsolicited, will help in eliminating it. Spam comes in many forms, from Web hoaxes, chain letters, and unsolicited sales and marketing material for a product you'd never buy, to the most common, offensive adult-rated Chapter 3. Domino 6 anti-spam architecture 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 3. Domino 6 anti-spam architecture
23
7.
Originating SMTP server sends the DATA command to initiate the transfer of
the message contents.
8.
Domino SMTP Listener acknowledges start of DATA.
9.
Originating SMTP server sends END OF DATA to indicate data transfer is
complete. Domino SMTP Listener checks any inbound file size restrictions.
Server mail rules are run, but only
Don
t accept message
action is applied
here.
10.Domino SMTP acknowledges END OF DATA and awaits disconnect or next
message. (Note: Steps 3 through 10 are repeated for additional messages.)
11.Originating SMTP server sends QUIT, initiating close session sequence.
12.Domino SMTP acknowledges QUIT and closes connection.
The earlier in this sequence that you can detect and reject a spam message, the
fewer server resources are wasted by the spam.
3.2.2
Router
Once a message has been received by the SMTP Listener, it is analyzed against
the Server mail rules. The Server mail rules are evaluated against any incoming
message as it is placed into the server MAIL.BOX. Server Mail rules are your
second line of defense. Inbound controls can and should be used to block all mail
to or from specific users and domains. The Server mail rules allow more flexibility
and control by allowing you to specify additional conditions to be tested. You can
also specify additional actions to be taken on the message other than just
denying the delivery of it.
If a message passes all testing in the server rules, it is then processed by the
router for forwarding to another Domino server (which might have a different set
of rules), or for placement into an end-user mail file. The mail file rules are
typically established by the end-user of the mail file. Mail file rules are evaluated
for any incoming messages on the server, before delivering the message to the
user
s mail file. Every Domino installation is different, and your particular
circumstances will dictate where and how stringently you control incoming spam.
3.3
Domino 6 anti-spam configuration
The best defense against spam is knowing the options available to you as the
administrator. Being able to identify what messages are considered spam, versus
those that were unsolicited, will help in eliminating it. Spam comes in many
forms, from Web hoaxes, chain letters, and unsolicited sales and marketing
material for a product you
d never buy, to the most common, offensive adult-rated