Hi there

I have a toaster that hosts a domain that receives email regularly from another. The client noticed that they were not getting the emails anymore. Below are the log samples:

simscan:[28419]:VIRUS: 1.0962s:Phishing.Heuristics.Email.SpoofedDomain:xxx.xxx.xxx.xxx:[email protected] :[email protected]:

qmail-smtpd: qq hard reject (Your email was rejected because it contains the Phishing.Heuristics.Email.SpoofedDomain virus): MAILFROM:<[email protected] > RCPTTO:[email protected]

They have assured me 100% that they still want to get this kind of email from this user.

When it comes to this kind of blocking - what is the best way to allow it through?

I have included some verbose output below as to my system config (in case it is needed - ignore below if not needed).

(((((((((( System Info ))))))))))

# qtp-whatami

qtp-whatami v0.3.2
DISTRO=CentOS
OSVER=5.3
QTARCH=i686
QTKERN=2.6.18-128.1.6.el5
BUILD_DIST=cnt50
BUILD_DIR=/usr/src/redhat
This machine's OS is supported, but this version/arch has not been tested.

----------

# rpm -qa | grep toaster | sort

autorespond-toaster-2.0.4-1.3.4
clamav-toaster-0.95.0-1.3.26
control-panel-toaster-0.5-1.3.5
courier-authlib-toaster-0.59.2-1.3.7
courier-imap-toaster-4.1.2-1.3.8
daemontools-toaster-0.76-1.3.4
ezmlm-cgi-toaster-0.53.324-1.3.4
ezmlm-toaster-0.53.324-1.3.4
isoqlog-toaster-2.1-1.3.5
libdomainkeys-toaster-0.68-1.3.4
libsrs2-toaster-1.0.18-1.3.4
maildrop-toaster-2.0.3-1.3.6
maildrop-toaster-devel-2.0.3-1.3.6
qmailadmin-toaster-1.2.11-1.3.5
qmailmrtg-toaster-4.2-1.3.4
qmail-pop3d-toaster-1.03-1.3.16
qmail-toaster-1.03-1.3.16
qmailtoaster-plus-0.3.1-1.4.9
qmailtoaster-plus.repo-0.1-1
ripmime-toaster-1.4.0.6-1.3.4
send-emails-toaster-0.5-1.3.5
simscan-toaster-1.3.1-1.3.7
spamassassin-toaster-3.2.5-1.3.15
squirrelmail-toaster-1.4.17-1.3.12
ucspi-tcp-toaster-0.88-1.3.6
vpopmail-toaster-5.4.17-1.3.5
vqadmin-toaster-2.3.4-1.3.4

----------

# spamdyke -v

spamdyke 3.1.8+TLS

----------

# cat /etc/spamdyke/spamdyke.conf | grep -v "#"

check-dnsrbl=zen.spamhaus.org
check-dnsrbl=bl.spamcop.net
check-dnsrbl=list.dsbl.org
graylist-dir=/var/spamdyke/graylist
graylist-max-secs=2678400
graylist-min-secs=180
greeting-delay-secs=5
idle-timeout-secs=60
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-file=/etc/spamdyke/blacklist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
local-domains-file=/var/qmail/control/rcpthosts
log-level=2
log-target=0
max-recipients=5
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
reject-missing-sender-mx
sender-blacklist-file=/etc/spamdyke/blacklist_senders
tls-certificate-file=/var/qmail/control/servercert.pem

----------

# cat /var/qmail/supervise/smtp/run | grep -v "#"

QMAILDUID=`id -u vpopmail`
NOFILESGID=`id -g vpopmail`
MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
BLACKLIST=`cat /var/qmail/control/blacklists`
SMTPD="/var/qmail/bin/qmail-smtpd"
TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb"
RBLSMTPD="/usr/bin/rblsmtpd"
HOSTNAME=`hostname`
VCHKPW="/home/vpopmail/bin/vchkpw"
REQUIRE_AUTH=0

exec /usr/bin/softlimit -m 20000000 \
/usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c "$MAXSMTPD" \
     -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp \
     $RBLSMTPD $BLACKLIST $SMTPD $VCHKPW /bin/true 2>&1

----------

---------------------------------------------------------------------------------
                Managed Qmailtoaster servers are now available
      Visit http://qmailtoaster.com/QMTManaged.html to order yours today!

Qmailtoaster is sponsored by Vickers Consulting Group 
(www.vickersconsulting.com)

    Please visit qmailtoaster.com for the latest news, updates, and packages.


         To unsubscribe, e-mail: [email protected]
        For additional commands, e-mail: [email protected]


Reply via email to