Hello Jonas and *,
Am 2009-03-02 23:57:34, schrieb Jonas Eckerman:
That seems like a way to get false positives when someone with a listed
dynamic IP sends through the smarthost of their ISP or ESP.
By extendinmg trust to the ESP/ISP smarthost, SA will do RBL checks on
the system that sent
On Tue, 3 Mar 2009, Michelle Konzack wrote:
The network in my enterprise is *.private.tamay-dogan.net and the
outgoing mailserver mail.private.tamay-dogan.net which is correctly
configured and of course, not accessibel from outside the world.
Hence, I am sending messages over the relay
At 04:25 03-03-2009, Michelle Konzack wrote:
The network in my enterprise is *.private.tamay-dogan.net and the
outgoing mailserver mail.private.tamay-dogan.net which is correctly
configured and of course, not accessibel from outside the world. Hence,
I am sending messages over the relay
Matthias Leisi wrote:
Speaking of which, it may actually make sense to use all of dnswl.org's
entries as trusted_networks-entries...
That seems like a way to get false positives when someone with a
listed dynamic IP sends through the smarthost of their ISP or ESP.
By extendinmg trust to
Am 2009-02-28 00:48:44, schrieb Martin Gregorie:
Have you tried editing
score RCVD_IN_DNSWL_LOW 0
into /etc/mail.spamassassin/local.cf ?
I have had it in
${HOME}/.spamassassin/local.cf
(as written in the manpage) and it was not working. Since yesterday it
is in
Am 2009-02-27 22:36:24, schrieb rafa:
Contacting dnswl.org can help all of us. They can downgrade those
servers from low to none.
How should I do this?
In the meantime I have checked ALL spams manualy from a bash script and
it seems, there are more then 300 IP's listet on DNSWL.
Should I
Am 2009-02-28 02:22:32, schrieb Karsten Bräckelmann:
Uhm, wait -- let me re-phrase my hasty suggestion to report to dnswl.org
for removal.
OK, gotten...
IP address 70.103.162.29 is listed at dnswl.org with the following
details:
Domain: debian.org; [...]
Maybe you should tell Debian
Am 2009-02-28 09:20:02, schrieb Matthias Leisi:
You should add the debian mailservers to your trust path
(trusted_networks/internal_networks depending on circumstances) so that
RBL checks are applied to the correct IP addresses.
OK, but I have never untrusted *.debian.org
Is there a way, to
On Sun, March 1, 2009 14:48, Michelle Konzack wrote:
Am 2009-02-27 22:36:24, schrieb rafa:
Contacting dnswl.org can help all of us. They can downgrade those
servers from low to none.
How should I do this?
http://www.dnswl.org/ se the webpage first
In the meantime I have checked ALL spams
Hello Benny,
Am 2009-03-01 15:12:16, schrieb Benny Pedersen:
http://www.dnswl.org/ se the webpage first
Already checked, but
can you make them into levels of NONE, LOW, MEDIUM, HI
and then start with the LOW,MEDIUM,HI until all is listed where you
get spam from is changed to NONE, you can
Michelle Konzack schrieb:
OK, but I have never untrusted *.debian.org
This is not about untrusting. It's about telling SpamAssassin which
relays are trustworthy to begin with. Adding these hints greatly
improves the accuracy of SpamAssassin.
Is there a way, to les spamassassin look
In addition to what Karsten wrote about debian:
Michelle Konzack schrieb:
Received: from localhost (server7.pinguin-hosting.de [127.0.0.1])
by server7.pinguin-hosting.de (Postfix) with SMTP id D1EFC613E6
for .bts4miche...@tamay-dogan.net; Thu, 26 Feb 2009
22:19:21
Matthias Leisi matth...@leisi.net wrote:
[...]
Speaking of which, it may actually make sense to use all of
dnswl.org's entries as trusted_networks-entries...
Do you want it even for DNSWL trust levels of none and low?
It would be a brave suggestion :-)
URL(s):
http://www.dnswl.org/
--
On 2/28/2009 9:20 AM, Matthias Leisi wrote:
In addition to what Karsten wrote about debian:
Michelle Konzack schrieb:
Received: from localhost (server7.pinguin-hosting.de [127.0.0.1])
by server7.pinguin-hosting.de (Postfix) with SMTP id D1EFC613E6
for
On Saturday, February 28, 2009, 1:00:58 AM, Yet Ninja wrote:
On 2/28/2009 9:20 AM, Matthias Leisi wrote:
In addition to what Karsten wrote about debian:
You should add the debian mailservers to your trust path
(trusted_networks/internal_networks depending on circumstances) so that
RBL checks
it and how to disable?
DNSWL Id1791 - debian.org
IP range70.103.162.29/32
Domain/Hostname master.debian.org
Score low
ask ab...@debian.org, if no help from them, one can unsubscribe
since maillist spam being more normal these days
--
http://localhost/ 100% uptime and 100% mirrored :)
Jeff Chan schrieb:
Was wondering if the trusted_networks could be pluginized to use
DNSEval so that one could query a dnswl (local or remote) - for bigger
setups it would probably make management simpler.
One counterargument is that if the data are relatively static,
i.e., not updated
Hello,
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore, since I was not able to
disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
Can someone tell me where I find it and how to disable?
[ 'STDIN'
Michelle Konzack wrote:
Hello,
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore, since I was not able to
disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
Contacting dnswl.org can help all of us. They can
On Fri, 2009-02-27 at 11:56 +0100, Michelle Konzack wrote:
Hello,
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore, since I was not able to
disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
Have you tried
Subscribing to a mailing-list decreases response time drastically. No
moderation. But I guess you should know that... ;)
On Fri, 2009-02-27 at 11:56 +0100, Michelle Konzack wrote:
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore,
Uhm, wait -- let me re-phrase my hasty suggestion to report to dnswl.org
for removal.
-1.0 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low
trust
[70.103.162.29 listed in list.dnswl.org]
IP address 70.103.162.29 is listed at dnswl.org with
22 matches
Mail list logo