No worry.

I tried the exact senders address instead the domain but apparently did not work, I will give a try on @domain and the dnswl.org whitelist.


Em 24/07/2023 10:49, Eric Broch escreveu:

Sorry,

This is what I meant (below). You can use a domain name instead of IP to white list. If I remember correctly and entry would be @somedomain.com.


    Whitelisting Senders and Recipients


      |recipient-whitelist-entry|
      |recipient-whitelist-file|
      |sender-whitelist-entry|
      |sender-whitelist-file|

Sometimes, adding IP addresses and reverse DNS names to whitelist files is not enough to satisfy some users. Either they continue to receive mail from unexpected places or they just think spamdyke is blocking their email. In those cases, a last resort can be to whitelist the sender or recipient address.

*NOTE: Using these features is a bad idea!*Sender addresses are_very_easy to forge; this is why spam is so hard to block. Recipient addresses are obviously already known to the spammers; this is why spam is delivered. Whitelisting any addresses this way_will_allow spam to get through.

To whitelist a sender or recipient address, the|sender-whitelist-entry|or|recipient-whitelist-entry|option should be used, respectively. The entries can use the same formats as those for|sender-blacklist-entry|and|recipient-blacklist-entry|; seeRejecting Recipients <https://www.spamdyke.org/documentation/README.html#REJECTING_RECIPIENTS>for details.

Whitelist entries can be placed in files and referenced with|sender-whitelist-file|or|recipient-whitelist-file|. This is more efficient for more than a few entries.



On 7/24/2023 7:39 AM, Leonardo Porto wrote:

Hi Eric,

Here is my spamdyke.conf:

dns-blacklist-entry=b.barracudacentral.org
dns-blacklist-entry=bl.spamcop.net
dns-blacklist-entry=dnsbl.spfbl.net
graylist-dir=/var/spamdyke/graylist
graylist-level=none
graylist-max-secs=2678400
graylist-min-secs=180
greeting-delay-secs=6
header-blacklist-entry=From:*>,*<*
idle-timeout-secs=60
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
qmail-rcpthosts-file=/var/qmail/control/rcpthosts
log-level=info
max-recipients=50
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
reject-empty-rdns
reject-sender=no-mx
reject-unresolvable-rdns
sender-blacklist-file=/etc/spamdyke/blacklist_senders
sender-whitelist-file=/etc/spamdyke/whitelist_senders
tls-certificate-file=/var/qmail/control/servercert.pem
tls-level=smtp

Despite that configuration I don't use graylists, black/white-keywords, black/white-rdns, black/white-recipients or black/white-senders files, I only use whitelist_ip file and those three blacklists at the top (barracuda, spamcop and spfbl).

I may try this dns-whitelist, do you know and recommend any list?



Em 24/07/2023 10:10, Eric Broch escreveu:

Leonardo,

Did you see the option to block DNS? Or did you try this?


    DNS Whitelists


      |dns-whitelist-entry|
      |dns-whitelist-file|
      |rhs-whitelist-entry|
      |rhs-whitelist-file|

spamdyke has the ability to consult DNS whitelists and allow connections from hosts or senders who match entries on them. DNS whitelists are essentially DNS RBLs and DNS RHSBLs that list allowed IP addresses and domain names instead of blocked ones. All of the same cautionary statements apply to DNS whitelists as to DNS blacklists. SeeDNS RBLs <https://www.spamdyke.org/documentation/README.html#DNSRBL>andDNS RHSBLs <https://www.spamdyke.org/documentation/README.html#DNSRHSBL>for details.

To use a DNS Realtime Whitelist (the opposite of a DNS RBL), the option|dns-whitelist-entry|should be given. To use a DNS Righthand-side Whitelist, the option|rhs-whitelist-entry|should be given. By default, spamdyke does not use a DNS whitelist. If either option is given multiple times, each list will be consulted before the connection is blocked.

If more than a few lists are given, the|dns-whitelist-file|or|rhs-whitelist-file|options may be used to provide the lists in files.

*NOTE: Checking DNS whitelists can impose a serious performance penalty. Using more than three DNS whitelists is not recommended.*

*
*

*
*

On 7/24/2023 6:23 AM, Leonardo Porto wrote:

Hello there,

My Toaster is blocking a customer domain because they are sending messages from a Google server that is not allowed in their SPF policy:

Jul 21 10:28:45 app1 spamdyke[24853]: DENIED_OTHER from: per...@jeduca.org.br to: user@mydomain origin_ip: 209.85.215.172 origin_rdns: mail-pg1-f172.google.com auth: (unknown) encryption: TLS reason: 550_See_http://spf.pobox.com/why.html?sender=person%40jeduca.org.br&ip=209.85.215.172&receiver=myserver_(#5.7.1)

As you can see at their SPF checking:

https://www.spf-record.com/spf-lookup/jeduca.org.br?ip=209.85.215.172

Everytime they send a messagem it comes from a diverse IP so I tried to whitelist them at /etc/spamdyke/whitelist_senders putting one sender per line but it did not work.

Do you guys have any adivise?

qmail-1.03-3.1.qt.el7.x86_64
spamdyke 5.0.1+TLS+CONFIGTEST+DEBUG
Centos 7

Reply via email to