O'Reilly logo

Slamming Spam: A Guide for System Administrators by Robert Haskins, Dale Nielsen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. SMTP AUTH and STARTTLS

To prevent a system from being a source of spam while still enabling legitimate users to send outbound messages, a secure mechanism must be provided to relay messages that are destined for email recipients located on remote hosts. In the past, relay restrictions were usually based upon IP addresses, which work fine for certain classes of users such as enterprise networks located on high-speed networks. However, the advent of roaming users created a need for dial-in users to send email from remote networks. As a result, a method of authenticating these mobile users had to be developed.

There several ways users can be authenticated prior to allowing them to send email to arbitrary email boxes:

  • POP/IMAP-before-SMTP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required