?
Does the 2nd arg to the whitelist_from_rcvd need to be
maila.microsoft.com instead?
Yes.
Regards,
-sm
domain (last parameter) is optional.
Regards,
-sm
= maila.microsoft.com.
So, if I put:
whitelist_from_rcvd [EMAIL PROTECTED] mail1.microsoft.com
Then use:
whitelist_from_rcvd [EMAIL PROTECTED] microsoft.com
Regards,
-sm
At 20:52 16-10-2006, Marc Perkel wrote:
I don't know if other MTAs support sender verification but if they
don't they should. It's a very good trick for blocking spam at connect time.
It's also a good trick to cause a denial of service.
Regards,
-sm
.
(are SERIAL keys an alias for AUTO_INCREMENT? Are SERIAL keys safe in
replication situations?)
It's an alias for BIGINT UNSIGNED NOT NULL AUTO_INCREMENT UNIQUE.
See auto_increment_increment and auto_increment_offset (MySQL 5.x).
Regards,
-sm
.
Regards,
-sm
be generating the duplicates.
Regards,
-sm
domain need to have
there own ?
The domains can have the same public and private keys.
Regards,
-sm
do not require any patch.
Regards,
-sm
[10939]: uridnsbl: bogus rr for
domain=spamhaus.org, rule=URIBL_XS_SURBL, id=8876
rr=spamhaus.org.xs.surbl.org. 1 IN A 208.67.219.40
at /usr/lib/perl5/site_perl/5.8.5/Mail/SpamAssassin/Plugin/URIDNSBL.pm line
626.
Turn off the typo correction feature of OpenDNS.
Regards,
-sm
in the wiki somewhere.
Maybe we should add a note about trusted_networks being important for
SPF in the install manual where SPF installation is explained
The concept is the same as forwarding. Maybe you shouldn't be
running any SPF tests in such a setup.
Regards,
-sm
At 10:55 30-08-2006, Michael Grey wrote:
I like Michel Vaillancourt's idea - if it has to be done.
There are milters and MTAs that can do that. It's not a good idea as
it can cause a denial of service.
Regards,
-sm
.
whitelist_from_rcvd [EMAIL PROTECTED] example.com
Regards,
-sm
and ask the
later about the user configuration details as SpamAssassin may have
been set up differently.
Regards,
-sm
in Gatewaying) mentions adding a
Received header as trace fields for messages originating from
non-SMTP environments. The above Yahoo.com Received line is correct.
Regards,
-sm
if the mail goes through mailing lists.
Regards,
-sm
that they still have the testing flag set.
Regards,
-sm
and
resultant skipping, but I have no idea how to fix the problem. I
installed the SA DBI
[snip]
postgreSQL v8.0.4
Upgrade to Postgresql 8.1.4 if you can. Turn on autovacuum. Use
BayesStore::PgSQL.
Regards,
-sm
have ssh access, you can use sa-learn.
Regards,
-sm
At 22:57 12-06-2006, Daryl C. W. O'Shea wrote:
Already changed in 3.2:
describe DK_SIGNED Domain Keys: message has a signature
[snip]
It's DomainKeys and not Domain Keys.
Regards,
-sm
gateway. Am I doing something
nslookup is broken. :-) Use dig instead.
Regards,
-sm
Regards,
-sm
Hi Aaron,
At 11:24 22-12-2005, Aaron Boyles wrote:
I assumed that typing: dig www.yahoo.com
At the command prompt should have SOMETHING result. Instead, I get the time
out.
dig @10.0.0.1 www.yahoo.com where 10.0.0.1 is the IP address of your
name server.
Regards,
-sm
all messages from Yahoo groups have to fail.
Yes, it should match the sending domain. You should verify the
Sender: header as well.
Regards,
-sm
McEwen
I chose to send you an unsolicited email instead of replying to the
thread. :-) I am posting the comment to the SA list as you suggested.
-Original Message-
From: SM
This is indeed a slippery slope. The emails are unsolicited. This
one is too as we do not have any business
. It is up to the admin of the sending domain
to determine whether the server may be blacklisted because of such
mail. The replies to this thread gives the answer as to what will
the recipients think and how they might react.
Regards,
-sm
well-known. We can add them to a file of known
outgoing-only servers and can further cut down on the call-back load.
Your users will scream while you determine which sites to whitelist. :)
Regards,
-sm
to the backdoor ports for the
better-known spam worms and add a few points if the connection succeeds.
That would be too much overhead if it is done in realtime.
Regards,
-sm
301 - 328 of 328 matches
Mail list logo