On 5-Mar-09, at 3:59 PM, Eric Shubert wrote:

I believe that spamdyke does this, and a lot more, including graylisting.

Are you using spamdyke yet? If so, what's your configuration?

P.V.Anthony wrote:
Hi,
There is just too much spam. Especially the ones that forge email addresses.
I am thinking of setting up a reverse dns checking.
An alternative to spamdyke is by setting the following in the run file. -p: Paranoid. After looking up the remote host name in DNS, look up the IP addresses in DNS for that host name, and remove the environment variable $TCPREMOTEHOST if none of the addresses match the client's IP address.
and the following in the tcprules file.
=:allow
:allow,RBLSMTPD="-bad reverse dns"
Currently are there anyone on this list that have sent the servers to check reverse dns? If so, any problems?
Please share your thoughts on this.
P.V.Anthony


--
-Eric 'shubes'


Throwing on Spamdyke and using a combination of RBL's, DNS checks and graylisting have helped IMMENSELY at my primary employment.


I would just cut to the chase and install spamdyke - it is easy to do with the qtp-menu option, and you can enable and disable options real easy in the spamdyke.conf. You can start out with just the DNS checks and implement the other things later if you are still not happy with the results.

d



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to