Mail filtering at the relay, revisited
Two weeks of post-ILOVEYOU operational shifts. Time to write down the mail-filtering architecture I now think every operator should be running, with worked examples.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged mail security — 2 results.
Two weeks of post-ILOVEYOU operational shifts. Time to write down the mail-filtering architecture I now think every operator should be running, with worked examples.
Sendmail's reputation for opacity is earned. The relay configuration is, in practice, the part that matters most for security. Here is how I have learned to read it without going mad.