1. This can be done really effectively using SPF.  I believe spamassassin
can use spf, and most MTA's can too.  I highly recommend it.  You would
not believe the number of viruses that get turned away by using SPF.  It
seems that many of the recent ones send mails to a target domain with a
from address of the target domain.
2. Sounds pretty involved, and for many domains where all addresses are
routed to a single address, it can't work.  If you are using ldap or
active directory or something like that, you may be able to get your MTA
to check the destination address as the mail is coming in, and reject
those to invalid addresses.  Even if you aren't using AD, it sounds like
you may be willing to set up something like a database or ldap directory.
3. I think this one may cause you more trouble than you anticipate. 
Internally, you set up all of your display names to adhere to some sort of
policy, but someone externally who adds you as a contact in outlook with
"My friend Mabry" as the name will potentially be picked up as spam
because the display name on the email is going to be "My Friend Mabry".

Just my thoughts.

Jerry
http://www.syslog.org

> (We use SA (currently 2.64) called from procmail-delivered sendmail on
> Solaris systems.  We get something over 100K msgs/day.  Most of our mail
> is addressed using @ our local domain.)
>
> Three suggested rules:
>    1)  Detect mail allegedly from a local address that is invalid
> (should get a high score)
>    2)  Detect mail that has multiple invalid local addresses in the To:
> and CC: fields  (should get a medium score for 2 or more)
>    3)  Detect mail for which the From:, To:, and CC: fields contain
> known or unknown display-names corresponding to local addresses.
>


Reply via email to