Close look at rspamd in 2022

Close look at rspamd in 2022

Introduction to rspamd rspamd The word spamassassin has been very well established in our mails for around 20 years. But it is written in perl and now owned by Apache which itself is pretty commercial, using spamassassin backend is not wise according to us. Many sites use it though and it has gotten lot of exposure. But then, it is very simple logic that a perl program cannot scale under load.

Continue reading C code samples from SpamCheetah

C code samples from SpamCheetah

How is SpamCheetah organized? The developers of SpamCheetah are old school and even in today’s world the major software engines are all powered by C and UNIX. And it is important to note that many programming languages like perl and python are coded in C. Node.js is the only exception as it is written in C++. Since email is a very powerful thing both socially and technically it needs a lot of raw power and that power can be found only in C.

Continue reading Methods of spam control inside SpamCheetah

Methods of spam control inside SpamCheetah

How can we combat spam? SpamCheetah is first of all an email security gateway product. That means that it does not only stop spam but also allows mails to flow. If the product stops spam well but mails also don’t come, then it is a failure and useless. If however it allows all mails including spam traffic, then also it is worthless. We need to hit middle ground. How SpamCheetah does this using third party plugins and tools is described in this blog article.

Continue reading Network techniques for E-mail spam mitigation

Network techniques for E-mail spam mitigation

Some definitions before we begin E-mail is a protocol. And a protocol essentially means a client talking to server and vice versa. It involves handshakes, optionally sessions,cryptography in form of SSL, some secrets, counters and so on and so forth. There is no email outside of the context of the Internet. E-mail and Internet are synonymous and there is no other way than evaluate the behavior of email systems from a networking or layer III of the networking TCP/IP stack.

Continue reading