CheckAuthLog: Difference between revisions

From voipsupport
Jump to navigation Jump to search
Line 5: Line 5:
==What could I use it for?==
==What could I use it for?==


If you are running a Postfix or Exim email server, you can use this script to enhance security of your server. Stolen email credentials are now often used to send spam. A spam outflow from your email server could cause you reputation problems particularly with large email providers and RBL users. While there are many other things you can do as a first line of prevention, if you have a large or variegated group of users, ultimately you may not be able to stop email credentials being stolen.
If you are running a Postfix or Exim email server, you can use this script to enhance security of your server. Stolen email credentials are now often used to send spam. A spam outflow from your email server could cause you reputation problems particularly with large email providers and RBL users. While there are many other things you can do as a first line of prevention, if you have a large or variegated group of users, you may not be able to avoid the risk of email credentials being stolen.


==How do I get it?==
==How do I get it?==

Revision as of 16:58, 13 June 2016

What is it?

CheckAuthLog is a security feature for email servers. It can check the log files for suspicious email sending behaviour which may be indicative of a compromised email account and block that account.

What could I use it for?

If you are running a Postfix or Exim email server, you can use this script to enhance security of your server. Stolen email credentials are now often used to send spam. A spam outflow from your email server could cause you reputation problems particularly with large email providers and RBL users. While there are many other things you can do as a first line of prevention, if you have a large or variegated group of users, you may not be able to avoid the risk of email credentials being stolen.

How do I get it?

The code for the project is available from

CheckAuthLog 3.0.0

CheckAuthLog Change Log

Previous versions are archived for historical reference but are no longer maintained and should not be used: CheckAuthLog previous versions

GPG signatures for the latest version is available here CheckAuthLog gpg signatures

Where can I get more information?