Duane Hill wrote:

 Somehow, I just don't see the kill list rejecting any of these:

     *.abo.wanadoo.fr
     *.da.qwest.net
     *-pool-*
     *.dsl-verizon.net
     *.dip.t-dialin.net
     dialpool-*
     *.client.comcast.net
     dsl-*.mx
     *.bct.bellsouth.net
     *.dyn.optonline.net
     dsl-*.br
     *-*-*-*.client.mchsi.com
     *-*-*-*.dsl.*.pacbell.net
     *-*-*-*.dsl.*.ameritech.net

I've already tried setting them into the kill list as listed above. If there is some other
special way of making it work, please, by all means, feel free to share with me the secret.



It appears to me that the data your looking for is the name of the host sending the mail. It will be available in one of two places.


1. During the initial SMTP greeting -- which cannot be trusted; spammers can spoof this six ways from Sunday
2. After the message is received and reverse DNS lookup is performed on the sending IP -- which is about the only piece of data that can't be spoofed.


So, if you want accuracy, you'll need to receive the entire message.

However, you may also want to look at http://www.blackholes.us. Many of the dynamic IP ranges you are looking to block are listed there in various forms. IIRC, the second step iMail takes is a DNSBL check on the sending IP, and it will drop the connection if a DNSBL is configured as "trusted"


-- --------------------------------------------------------------------- "Good is better than Evil because it's nicer" -- Mammy Yokum --------------------------------------------------------------------- Bud Durland, CNE Mold-Rite Plastics Network Administrator http://www.mrpcap.com ---------------------------------------------------------------------


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to