On 5-Mar-09, at 3:59 PM, Eric Shubert wrote:
I believe that spamdyke does this, and a lot more, including
graylisting.
Are you using spamdyke yet? If so, what's your configuration?
P.V.Anthony wrote:
Hi,
There is just too much spam. Especially the ones that forge email
addresses.
I am thinking of setting up a reverse dns checking.
An alternative to spamdyke is by setting the following in the run
file.
-p: Paranoid. After looking up the remote host name in DNS, look up
the IP addresses in DNS for that host name, and remove the
environment variable $TCPREMOTEHOST if none of the addresses match
the client's IP address.
and the following in the tcprules file.
=:allow
:allow,RBLSMTPD="-bad reverse dns"
Currently are there anyone on this list that have sent the servers
to check reverse dns? If so, any problems?
Please share your thoughts on this.
P.V.Anthony
--
-Eric 'shubes'
Throwing on Spamdyke and using a combination of RBL's, DNS checks and
graylisting have helped IMMENSELY at my primary employment.
I would just cut to the chase and install spamdyke - it is easy to do
with the qtp-menu option, and you can enable and disable options real
easy in the spamdyke.conf. You can start out with just the DNS checks
and implement the other things later if you are still not happy with
the results.
d
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]