Mail Server AttacksOperating System Level AttacksIllegitimate Mail RelayingUnwanted MailMail ArchitectureProtect the Operating SystemAvoid Being an Open RelayStop Unwanted MailContent filtering with SpamAssassinArbitrary content filteringDNS real-time blacklists (RBLs)Mail and DNSSecurity ImplicationsSMTPEnvelope Versus HeaderSecurity ImplicationsSMTP AUTH via SASLTLSSPFMessage integrity, privacy, and non-repudiationMail Server ConfigurationsNull ClientInternal Mail ServerMail RelayExternal Mail ServerSendmailInstallation and ConfigurationRoot BackgroundThe Configuration FilesOverall Sendmail SecurityFile and directory permissionsBeware recipient programsSecurity-Related Configuration OptionsArbitrary program restrictionDon’t blame SendmailMasquerade your domainObfuscate greetingPermissions of transient filesPrivacy optionsRunning sendmail as nonprivileged usersSafe file environmentTrusted userTrusted usersLimiting Denial of Service AttacksBlocking Unwanted MailAccess databaseDNS blacklistsMiltersArbitrary content filteringVirus protectionAuthentication and EncryptionInstalling Sendmail+SASL+TLS on FreeBSDInstalling Sendmail+SASL+TLS on OpenBSDConfiguring Sendmail with SASL+TLSPostfixInstallation and Configuration: FreeBSDInstallation and Configuration: OpenBSDPostfix Security FoundationDo one thing, do it wellUnderstanding loggingChrootConfiguration filesSecurity-Related Configuration OptionsArbitrary program restrictionMasquerade your domainObfuscate smtpd bannerDisable unneeded commandsLimiting Denial of Service AttacksBlocking Unwanted MailAccess tableArbitrary content filteringDNS blacklistsVirus protectionAuthentication and EncryptionVerifying Postfix+SASL+TLS installationConfiguring Postfix with SASL+TLSqmailMail AccessGuidelines for Securing Mail Access—InternallyGuidelines for Securing Mail Access—ExternallyVirtual private networks (VPN)WebmailWrapping UpResourcesMTA SoftwareSpam Defense and AntivirusSMTP SecurityMail Access SoftwareSelected Mail-Related Request for Comments (RFCs)