Hi all, After a fair bit of effort I have managed to implement graylisting / whitelisting using mimedefang (with sqlite) - it works fantastically so I'm very proud. *blush* A couple of spam, however, are getting through by sending to our secondary mail server, which we have no control over and which is then forwarding the emails to us (in an smtp compliant manner... respecting out TEMPFAILs and sending again when it can...). Has anyone implemented some form of parsing of the received headers to determine who the previous relay was? When is the earliest time that these headers are available? filter_begin? Are these easily accessible through mimedefang's variables or will we need to build some kind of script that will parse the actual mail files? Any help / thoughts / suggestions are much appreciated!! Mark
Mark van Proctor Information Systems Analyst acQuire Technology Solutions Pty Ltd Australia Chile Canada United Kingdom ============================================================================== This email (including all attachments) is the sole property of acQuire Technology Solutions Pty Ltd and may be confidential. If you are not the intended recipient, you must not use or forward the information contained in it. This message may not be reproduced or otherwise republished without the written consent of the sender. If you have received this message in error, please delete the email and notify the sender. _______________________________________________ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list [email protected] http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

