On Tue, May 26, 2009 20:55, Linda Walsh wrote:
Where is this local net being 'included', and how can I suppress
the duplicate inclusion message?
remove 127.0.0.0/8 in your config
--
http://localhost/ 100% uptime and 100% mirrored :)
On Tue, May 26, 2009 17:37, Jonas Eckerman wrote:
I just threw together a plugin that can check URLs for redirections, and
add whatever they redirect to to the message meta-data so that the true
destinations are checked by URIBLs etc.
http://wiki.apache.org/spamassassin/WebRedirectPlugin
add enter www net org to fuzzyocr wordlist do catch more image spam here
url like http://www.random.net/ is very clear after ocrad the png image
and fuzzyocr also catch the wroung mime types
--
http://localhost/ 100% uptime and 100% mirrored :)
On Wed, May 27, 2009 21:48, Linda Walsh wrote:
http://wiki.apache.org/spamassassin/AutoWhitelist
At face value, this seems very counter productive.
read the docs one more time
If I get spam from 1000 senders, they all end up in my
AWL???
yes
WTF?
not here please
AWL should only be
On Wed, May 27, 2009 23:43, decoder wrote:
I am planning a new release, but my time schedule is though.
super, i posted a new thread with subject FuzzyOcr wordlist
new words to be added for latest spams
--
http://localhost/ 100% uptime and 100% mirrored :)
On Thu, May 28, 2009 13:31, hateSpam wrote:
Dear All, I am getting email from myself to my self all Pills adverts
and it is spam. Is there any way to solve the problem. I get about
6 every day.
add spf to your own domain, and test spf on your mta, begin with
softfails, and when its stable go
On Thu, May 28, 2009 16:11, hateSpam wrote:
I got it thanks.
Yes i am not whitelisted but in spamassassin I put the domain of all spams
to be marked as spam like (*...@brabble.com) to mark all
but spams are keep coming with different domain name.
used block sender in outlock express ?
did
On Fri, May 29, 2009 22:04, mouss wrote:
configure mailman to resubmit mail to a port that is unfiltered. no
point to filter mail twice.
$ cat mm_cfg.py
...
SMTPHOST = '127.0.0.1'
SMTPPORT = 10025
doing so here disables dkim sign in my amavisd, have not found a way
around this here
--
On Fri, June 5, 2009 19:58, Jeremy Morton wrote:
http://pastebin.com/m586e296c
http://cbl.abuseat.org/lookup.cgi?ip=93.5.36.134
do you use zen.spamhaus.org in exim ?
http://www.wpbl.info/cgi-bin/detail.cgi?ip=93.5.36.134
if the ip is not sending ham to you block the ip localy
--
On Fri, June 5, 2009 20:05, Rob McEwen wrote:
I highly recommend scoring RDNS_NONE at much higher than 0.1, and
scoring RCVD_IN_PBL at much higher than 0.9
meta SPAM_LOCAL (RDNS_NONE RCVD_IN_PBL)
describe SPAM_LOCAL Meta: it hits both RDNS_NONE and RCVD_IN_PBL
score SPAM_LOCAL 5.0
--
On Fri, June 5, 2009 23:55, mouss wrote:
why bother yourself with SPF since nobody remote should call himself
localhost. localhost is a reserved domain.
will you wake up one day and beat me in my foot ? :)))
localhost check does not rule out that spf check can be usefull
--
On Sat, June 6, 2009 11:55, chauhananshul wrote:
How can i make spamassassin catch these mails.
you can do this better in your mta
2 ways to solve it:
1 use postfwd with a rule that check sender equal to recipient
2 add spf to your domain, and test spf in your mta
3 take a ice :)
--
On Mon, June 8, 2009 08:41, Anshul Chauhan wrote:
can i do this in sendmail SMTP auth session without RBL rest with RBL.
http://www.sendmail.org/~ca/email/auth.html
--
http://localhost/ 100% uptime and 100% mirrored :)
On Mon, June 8, 2009 11:56, Karsten Bräckelmann wrote:
On Mon, 2009-06-08 at 10:14 +0530, Anshul Chauhan wrote:
I can't use RBL because most of my users use datacards their ip
addresses are listed in RBL in SBL XBL SPAMCOP.
As has been suggested by various others, just do not scan outgoing
On Mon, June 8, 2009 12:55, Nigel Frankcom wrote:
It may also be worth running spamassassin --lint -D to see if you
are missing any other packages.
you have currently 2 perl versions installed
this is the problem, if not all modules exists in 5.8.8, but some only
does in 5.8.6
--
On Mon, June 8, 2009 14:27, snowweb wrote:
Sorry for my ignorance. I'm very new to Linux. Which missing perl module
is that please?
there is non missing, you just have another perl version that miss it, how
to resolve problem with 2 versions of perl with yum i dont know, but solve
this and the
On Mon, June 8, 2009 14:30, snowweb wrote:
When I do which perl it only returns,
/usr/bin/perl
unsure if thats relayted
doesn't this mean that I only have one installed? (I'm not arguing.. just
trying to understand, since I'm new to Linux).
spamassassin 21 -D --lint
grep 5.8 on it
if
On Mon, June 8, 2009 14:41, snowweb wrote:
Then I tried again with sa-update and got the following:
[r...@s1 spamassassin]# sa-update
Can't locate Archive/Tar.pm in @INC (@INC contains:
/usr/lib/perl5/site_perl/5.8.8/i386-linux-thread-multi /usr/lib/per
l5/site_perl/5.8.8
On Mon, June 8, 2009 15:04, snowweb wrote:
so I guess it's fixed.
until next time there is a new perl version yes :/
newer mix CPAN with a RPM system !
--
http://localhost/ 100% uptime and 100% mirrored :)
On Mon, June 8, 2009 15:26, The Doctor wrote:
You can either use cpan or http://search.cpan.org .
bad advise !
--
http://localhost/ 100% uptime and 100% mirrored :)
On Mon, June 8, 2009 15:41, Arvid Picciani wrote:
is there anything i can do about that?
report to dnswl at there site ?
http://www.dnswl.org/
--
http://localhost/ 100% uptime and 100% mirrored :)
On Tue, June 9, 2009 00:59, Martin Gregorie wrote:
On Tue, 2009-06-09 at 00:39 +0200, Benny Pedersen wrote:
does there exists a perl-cleanup in you distro ?
There's not a general one. On the assumption (true for Fedora) that both
Perl and SA are distro supported packages, if I was tackling
On Tue, June 9, 2009 03:48, LuKreme wrote:
Second off, there is absolutely nothing wrong with using CPAN.
OP problem is mix of CPAN and RPM, he dont need both to solve it
CPAN is usefull if one makes RPM with it, but most belive its better just
to follow guides and use CPAN shells, when distro
On Tue, June 9, 2009 09:40, Anshul Chauhan wrote:
*trusted_networks 10.* for all my networks
by this it is scanning mails marking them as non spam which i don't
want.
you ask for advice on how to get spamassassin malfunction ?
see reports from spamassassin and remove the spam, is imho much
On Tue, June 9, 2009 17:33, Bowie Bailey wrote:
I have a CentOS 5.3 system with everything installed from the repos and
my @INC looks exactly the same, so I don't necessarily see a problem
with the versions here.
problem is that some users of yum, rpm, and friends forget to make
reinstall of
On Wed, June 10, 2009 21:05, Jake Maul wrote:
The last couple days I've been seeing a lot of Botnet-related
timeouts. Obviously the Botnet plugin itself hasn't changed...
http://bugs.gentoo.org/show_bug.cgi?id=217261
DNS problems maybe? Anyone else seen this? It's causing my SA children
to
On Fri, June 12, 2009 14:37, Matt Kettler wrote:
If you look at the message headers, there's a header explaining where to
send unsubscribe messages to (this is the RFC standard header for doing
this, so look for it in other mailing lists):
google webmail does not support it :/
On Sat, June 13, 2009 03:42, LuKreme wrote:
On 12-Jun-2009, at 07:25, Benny Pedersen wrote:
google webmail does not support it :/
Yes it does. Look under something like Original Message
it was a leading q a from my side and i am not using it :)
--
http://localhost/ 100% uptime and 100
On Sat, June 13, 2009 14:31, Bill Landry wrote:
However, if
you are willing to release something to the open source community, you
should also be willing to take on the responsibility of providing
ongoing support for it.
who says that ?, i have maybe missunderstod gpl licenses ?, its far
On Søn, Juni 14, 2009 03:10, MySQL Student wrote:
Home | Contact Us | Privacy Policy | Terms of Use | Unsubscribe |
this is spammy line, with often faked domains (content looks like
micro$oft) but url is not there domain
Where can I go from here?
sa-learn --spam msg
and or make a rule for
On Man, Juni 15, 2009 02:59, Chip M. wrote:
You might want to make some meta rules for those two cases (China
TLD in a URL, Sender == Recipient).
http://www.nabble.com/postfwd-stop-equal-sender-recipient-spams-td21164908.html
dont waste resources in mta :)
--
http://localhost/ 100% uptime
On Tirs, Juni 16, 2009 03:13, David Gibbs wrote:
Since Mailman adds it's own headers to the messages it processes, any
existing signatures in the message are invalidated. Thus, Mailman has to
remove any existing signatures and let the MTA resign the message after
it's been processed.
i am
On Tors, Juni 18, 2009 20:26, Jeff Drury wrote:
sa-learn, yet they still come through. I know this is a generic outline of
the problem, but it¹s a start, if you need more info I can send it.
http://old.openspf.org/wizard.html?mydomain=impactps.comsubmit=Go!
next do a spf test in mta level,
On Tors, Juni 18, 2009 20:36, Rick Macdougall wrote:
I'd recommend upgrading to the latest version (3.2.5) and running and
sa-update to get the latest rules.
how will this help on spoofed mail problem ?
--
xpoint
On Thu, June 18, 2009 22:33, Jeff Drury wrote:
They don¹t appear to be scored at all (see attached header)
test:
spamassassin 21 -D --lint
any errors here ?
spamassassin 21 -D -t msgtotest | less
press s in the less output and post on pastebin
i belive you miss envelope_sender_header in
On Thu, June 18, 2009 23:33, Jeff Drury wrote:
No errors... The only error I ever received had to do with rewriting the
subject which was unimportant to me so I commented it out, other then that
no errors
stop sending me mail in private for things you ask public about
still like to see the
On Thu, June 18, 2009 23:53, fchan wrote:
http://pastebin.ca/1465411
make a meta rule for line 24 25 35
solved
i would like to hold your credit card for a moment, and you would like to
download phising report in a exe file ? :)
--
xpoint
On Fri, June 19, 2009 00:22, Yet Another Ninja wrote:
w-crook.com.ar.multi.uribl.com has address 127.0.0.2
w-crook.com.ar.multi.surbl.org has address 127.0.0.46
it now make sense with ttl in 300 sec :)
but if i get time, i would make meta rules to spot the phish sometime
is the exe even
On Fri, June 19, 2009 01:22, Jeff Drury wrote:
http://pastebin.ca/1465504
#
[49973] dbg: spf: cannot get Envelope-From, cannot use SPF
#
[49973] dbg: spf: def_spf_whitelist_from: could not find useable envelope
sender
#
[49973] dbg: spf: already checked for Received-SPF headers, proceeding
with
On Fri, June 19, 2009 04:09, David B Funk wrote:
The last 3 you can install using CPAN, Razor2 has to be explcitly fetched
installed and configured (but is worth it).
newer use CPAN direct on a host that uses RPM/DEB/PORTAGE/BSD
make a native RPM/DEP/PORTAGE/BSD from CPAN is the way to go, if
On Fri, June 19, 2009 07:59, Chip M. wrote:
Always VERY good advice, particularly given the age difference. :)
it should be noted that sa-update does not just fetch all new rules in
newer sa versions, but it can be backported to have most rules if one want
to make the work with it
--
xpoint
On Fri, June 19, 2009 11:24, Pawe? T?cza wrote:
Hello People,
http://pastebin.com/m5988eed
are you sure you want email To: r...@uw.edu.pl from outside world ?
assume its the envelope recipient, if not just ignore me :)
check your aliases in mta
http://pastebin.com/m5835257
same here To:
On Fri, June 19, 2009 13:32, Arvid Picciani wrote:
Maybe a backscatter list wants them?
set MX to 127.0.0.1 problem resolved :)
atleast for you, wonder how many host doing things thay are not aware of
in terms of spam problems created (we dont scan mails outgoing from our
host is the worst
On Fri, June 19, 2009 18:18, Jeff Drury wrote:
I guess many would find this acceptable, but to me no spam is my target
no it wont stop users sending html and images to maillists, but it would
be nice if it did :)
--
xpoint
On Sat, June 20, 2009 03:27, RW wrote:
It would be nice to automate this and keep track of real statistics, so
spammy routes could be auto-discovered.
AWL plugin already does this pr /16
can be changed to track /24 /32 if one wants a bigger database :)
--
xpoint
On Sat, June 20, 2009 23:01, Jeremy Morton wrote:
'Your message to Gatewayav-discuss awaits moderator approval'
you have verified that the above maillist does check spf ?, or other
sensitive forged rejections ?
if thats the problem thay do not do this, then problem comes back to you
as
On Sun, June 21, 2009 12:04, Jeremy Morton wrote:
http://pastebin.com/m3b9629b6
http://cbl.abuseat.org/lookup.cgi?ip=190.244.172.161
--
xpoint
On Sun, June 21, 2009 13:23, Jeremy Morton wrote:
My SpamAssassin apparently isn't checking this blocklist; how do I get
it to?
cbl is part of zen.spamhaus.org, but some ips is not in sync that fast, so
check cbl in mta level, this can be done in exim to
http://cbl.abuseat.org/faq.html
--
On Mon, June 22, 2009 05:46, rich...@buzzhost.co.uk wrote:
Is it possible to ask local.cf to include external files/dir for custom
rules at all?
any file that ends in cf just like local.cf does, will be read if places
in the same dir as local.cf no magic includes is needed :)
--
xpoint
On Tue, June 23, 2009 10:04, Henrik K wrote:
Thanks for testing. If you have bad memory, you might as well disable it
already. :)
thanks for the code of this plugin and dns data, to know more what will
happend i like to ask:
will you update this plugin again ?
will some results from the
On Tue, June 23, 2009 14:23, Jeff Koch wrote:
We have a mailserver that's been blocked by Comcast. After correcting the
problem (user got hacked) we need to get Comcast to lift the block. Has
anyone got the new URL for this? Comcast seems to have revised their
website and the link provided
On Wed, June 24, 2009 13:59, Per Jessen wrote:
Blacklisting a large and serious hosting provider is just not serious
and very bad for business.
http://rfc-ignorant.org/tools/lookup.php?domain=yahoo.com
http://rfc-ignorant.org/tools/lookup.php?domain=hotmail.com
X-Amavis-PenPals: age 0 0:00:53
Received: from localhost.junc.org ([127.0.0.1])
by localhost.junc.org (localhost.junc.org [127.0.0.1]) (amavisd-new,
port 10024)
with ESMTP id dBpCCcpNuO0O for m...@junc.org;
Wed, 24 Jun 2009 14:15:08 +0200 (CEST)
Received: from wash1.inkorgen.com
X-crabtree-dweezil-us-MailScanner-SpamCheck: spam, SpamAssassin (not cached,
score=30.667, required 5, autolearn=spam, AWL -1.67, BAYES_50 0.00,
CRM114_PROB_SPAM 0.50, CTYME_IXHASH 2.50, FH_RELAY_NODNS 1.45,
GENERIC_IXHASH 2.50, KAM_STOCKGEN 1.50, KARMA_CONNECT_NEGATIVE 2.00,
On Wed, June 24, 2009 14:48, Matus UHLAR - fantomas wrote:
On 24.06.09 14:39, Benny Pedersen wrote:
X-crabtree-dweezil-us-MailScanner-SpamCheck: spam, SpamAssassin (not
cached,
score=30.667, required 5, autolearn=spam, AWL -1.67, BAYES_50 0.00,
CRM114_PROB_SPAM 0.50, CTYME_IXHASH
On Thu, June 25, 2009 10:35, rich...@buzzhost.co.uk wrote:
A routine look in the logs shows me a steady warn in the logs.
It's probably harmless - but I would like to solve it for tidiness:
Thu Jun 18 16:45:21 2009 [12663] warn: config: created user preferences
file:
On Thu, June 25, 2009 11:08, LuKreme wrote:
On 24-Jun-2009, at 08:20, Roger Marquis wrote:
PLUGPostConf http://www.postconf.com for example./PLUG
Looks interesting, but not FreBSD demo :/
yes freebsd does not have the above problem :)
--
xpoint
On Thu, June 25, 2009 11:22, rich...@buzzhost.co.uk wrote:
On Thu, 2009-06-25 at 03:08 -0600, LuKreme wrote:
On 24-Jun-2009, at 08:20, Roger Marquis wrote:
PLUGPostConf http://www.postconf.com for example./PLUG
Looks interesting, but not FreBSD demo :/
Webmin?
http://www.webmin.com/
i
On Thu, June 25, 2009 12:14, LuKreme wrote:
I've used webmin, and have it installed. It is not luser friendly
though.
http://www.webmin.com/index6.html usermin is for you then :)
--
xpoint
On Thu, June 25, 2009 15:08, Res wrote:
On Thu, 25 Jun 2009, rich...@buzzhost.co.uk wrote:
Actually, you were first blocked by a milter because your SPF record
contains junk get someone with a clue to set it up for you
http://old.openspf.org/wizard.html?mydomain=buzzhost.co.uksubmit=Go!
On Thu, June 25, 2009 14:56, Henrik K wrote:
I'm just not sure why ask in the first place. Perl 5.6.1 is old. Anyone
using such system most likely has no support. Anyone using such perl most
likely shouldn't be allowed to use it. You could be already fixing the
code and not waiting. ;)
old
On Thu, June 25, 2009 18:14, Isabel Billings wrote:
stopwatch sussex trait
warmup sporadic
Resent-From: Steven W. Orr ste...@syslang.net
Resent-To: spamassassin-users users@spamassassin.apache.org
Resent-Date: Thu, 25 Jun 2009 10:43:41 -0400
Resent-Message-Id: 4a438d1d.3070...@syslang.net
On Thu, June 25, 2009 17:10, Jeremy Morton wrote:
Looks like it was received from mail.apache.org which is in the
DNSWL.org DB, unsurprisingly. Why would mail.apache.org send out this
obvious spam?
blame mozilla thunderbird for the resent headers, the problem is that one user
release
On Thu, June 25, 2009 17:20, Jeremy Morton wrote:
I guess that was sent to the spamassassin.apache.org list and the list
was BCC'd so it didn't get put into my list folder. Ah well.
with sieve:
if header :contains List-Id users.spamassassin.apache.org
{
fileinto maillists.spamassassin;
stop;
On Thu, June 25, 2009 17:56, SM wrote:
What rules would you recommend to catch it?
something as this on apache.org:
header __RESENT1 exists:Resent-From
header __RESENT2 exists:Resent-To
header __RESENT3 exists:Resent-Date
header __RESENT4 exists:Resent-Message-Id
meta NO_RESENT_MAIL
On Thu, June 25, 2009 19:09, John Hardin wrote:
Is anybody else getting bounces on mail they send to the list from
cas...@snigelpost.org?
If so, can we get him unsubscribed?
here i have seen 25 of this bouncers, i have added his sender ip into postfwd
client_address until its resolved, i
On Thu, June 25, 2009 19:34, John Hardin wrote:
Sure, but that doesn't help anybody else that posts to the list.
it will if admins at remote read there logs, but yes we can only wait now
--
xpoint
On Thu, June 25, 2009 19:48, Karsten Bräckelmann wrote:
On Thu, 2009-06-25 at 19:32 +0200, Karsten Bräckelmann wrote:
Taking care of that, already poked the almighty admins.
FYI, they took care about this issue. Quite speedy. :)
so now thay using postfix ?, fixing valid recipient maps is
On Thu, June 25, 2009 19:48, John Hardin wrote:
I point out that I've had legitimate reason in the past to resend messages
to the SA list.
test my rules better, will it hit a resend from you ? :)
well repost is not a resend, so it might still not hit
--
xpoint
On Sat, June 27, 2009 16:02, RobertH wrote:
just trying to get up on the curve now.
it all turns downto do you trust the sender ?, whether you verify this with gpg
or not is not the point
Mail::SpamAssassin::Plugin::Konfidi
Mail::SpamAssassin::Plugin::OpenPGP
both can use gpg as a verify on
On Sun, June 28, 2009 01:57, Jason Haar wrote:
All this talk about trying to catch urls that contain spaces/etc got me
thinking: why isn't this a standard SA feature? i.e if SA sees
www(whitespace|comma|period)-combo(therest), then rewrite it as the
url and process.
spammers need to rewrite
On Sun, June 28, 2009 05:38, Cory Hawkless wrote:
I agree, wouldn't it be easier to uniformly feed all of these type of URL's
though the already existing SA filters. As Jason suggested maybe by
collapsing whitespaces?
lets redefine how a url is in the first place ?
www localhost localdomain
On Sun, June 28, 2009 10:08, Jason Haar wrote:
On 06/28/2009 12:18 PM, Benny Pedersen wrote:
spammers need to rewrite webbrowsers also :=)
will you click on a url that is not click bare ?
Are you saying that this kind of spam doesn't work, as it requires the
user to actually edit the link
On Sun, June 28, 2009 20:47, Raymond Dijkxhoorn wrote:
If you have to press the 'SPAM' link you allready have gotten the spam,
right? So thats too late if you see this black/white.
bayes also learn from sender ip and more, so its not that big problem if one
gets to enduser here, if to high
On Tue, June 30, 2009 00:46, Michelle Konzack wrote:
For some seconds I have goten this spam, which has passed my spmassassin
but was hit by a seperated ZEN rule in procmail:
what ip ?
imho ipv6 is still not stable in any sa versions, and this might be your problem
--
xpoint
On Wed, July 1, 2009 01:23, Mike Cardwell wrote:
From: Compare and Cover Life i...@3009943.webguide103.com
X-Mailer: webguide103.com
How would I construct a spamassassin rule to check for this?
impossible without a pluging, would be faster to reject sender in mta
--
xpoint
On Wed, July 1, 2009 07:44, rich...@buzzhost.co.uk wrote:
In particular
# Enable or disable network checks
skip_rbl_checks 0
0 = off 1 = on
wroung
0 = use rbl
1 = skib rbl test
--
xpoint
On Wed, July 1, 2009 08:50, rich...@buzzhost.co.uk wrote:
I'm going to need to disable some of these lists as the MTA has already
blocked stuff on them Kind of pointless making repeat lookups for stuff
already tested. Thanks for pointing that out Benny.
pleasde do your home work again !,
On Wed, July 1, 2009 19:04, rich...@buzzhost.co.uk wrote:
You may want to fix that backscatter problem you have too :-)
just stop sending cc to me, then its fixed
--
xpoint
On Wed, July 1, 2009 21:51, Jonas Eckerman wrote:
http://whatever.frukt.org/graphdefang/ExtractText.zip).
i had to use wget --continue to get it downloaded, is this a firewall limit ?
stalls in 8k here, so multiple wget try to get the full zip down :(
--
xpoint
just tested this plugin here, all i can say it rooks viagra out of docs rtf
files :)
well done, only problem i had was that unrtf nedd to have ${file} in the
example cf to work all else works
--
xpoint
On Thu, July 2, 2009 06:32, rich...@buzzhost.co.uk wrote:
Will it result in a nuclear war?
yes, and burn down all googles servers aswell :)
--
xpoint
On Thu, July 2, 2009 08:43, Trushin Igor wrote:
We see that with -98.7 points and option
bayes_auto_learn_threshold_nonspam -10,
but autolearn=no. Why?
why learn anything from trusted ip ?
--
xpoint
On Thu, July 2, 2009 15:50, Jonas Eckerman wrote:
Benny Pedersen wrote:
just tested this plugin here, all i can say it rooks viagra out of docs rtf
files :)
I just saw it extract a 419 from a word doc so that it was catched by
bayes and a bunch of rules (it would actually have slipped past
On Thu, July 2, 2009 23:54, Michelle Konzack wrote:
Coming home for some minutes I saw, I am hit by 23.000 spams in my inbox
from today...
use postfwd ?
RCVD_IN_NJABL_PROXY hits and can be tested in mta
23000 spams in home mailbox/mta is to much to just say i dont care :)
--
xpoint
On Fri, July 3, 2009 10:14, rich...@buzzhost.co.uk wrote:
Constant contact will tell you they are opt-in. That is B/S.
The are using a honeypot address used only in usenet post from around 2
years ago. It is always bounced with a 550, but still they keep
knocking.
v=spf1 ptr
On Fri, July 3, 2009 12:26, Mike Cardwell wrote:
m...@haven:~$ host constantcontact.com.multi.uribl.com
constantcontact.com.multi.uribl.com A 127.0.0.4
m...@haven:~$
skib in sa forbid it to hit, silly :)
--
xpoint
Original Message
Subject: Re: constantcontact.com
From:rich...@buzzhost.co.uk rich...@buzzhost.co.uk
Date:Fri, July 3, 2009 15:04
To: Benny Pedersen m...@junc.org
On Fri, July 3, 2009 15:13, rich...@buzzhost.co.uk wrote:
folowup:
v=spf1 ip4:62.233.82.168 ip4:82.70.24.238 mx ~all
in dns
v=spf1 ip4:62.233.82.168 ip4:82.70.24.238 mx ~all
localhost. IN TXT v=spf1 a -all
mail1.buzzhost.co.uk. IN TXT v=spf1 a -all
mail2.buzzhost.co.uk. IN TXT v=spf1 a -all
On Fri, July 3, 2009 16:31, rich...@buzzhost.co.uk wrote:
On Fri, 2009-07-03 at 15:53 +0200, Benny Pedersen wrote:
On Fri, July 3, 2009 15:13, rich...@buzzhost.co.uk wrote:
folowup:
v=spf1 ip4:62.233.82.168 ip4:82.70.24.238 mx ~all
in dns
v=spf1 ip4:62.233.82.168 ip4:82.70.24.238 mx
On Fri, July 3, 2009 17:23, rich...@buzzhost.co.uk wrote:
On Fri, 2009-07-03 at 16:54 +0200, Benny Pedersen wrote:
On Fri, July 3, 2009 16:31, rich...@buzzhost.co.uk wrote:
On Fri, 2009-07-03 at 15:53 +0200, Benny Pedersen wrote:
On Fri, July 3, 2009 15:13, rich...@buzzhost.co.uk wrote
On Sun, July 5, 2009 02:50, MySQL Student wrote:
The X-MailCleaner headers were there when I received the email. I've
obfuscated our customers domain for security.
Any ideas greatly appreciated. Where can I start? Am I doing something wrong
or is there something in the header that is
On Fri, July 3, 2009 23:29, Res wrote:
Why are people still using the outdated and no longer recommended
domain TXT method?
2 problems:
1: sa uses default mail::spf::query
2: dns hosters use txt for anything even there bind support spf record
3: what about dkim then ? :)
The RR type SPF
On Sat, July 4, 2009 01:31, Michelle Konzack wrote:
Hello,
In a maill which hit the score I see this:
report the ip to dnswl
-1.0 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low
trust
[70.103.162.29 listed in
On Sat, July 4, 2009 07:16, rich...@buzzhost.co.uk wrote:
. Even Benny's
You don't have SPF so I'm blocking you was clearly b/s when I tried it
with other MX's with no SPF. Nothing more than a kiddy rule set-up
FWICS.
thanks for 170 spam mails, your /29 is now perm blocked in my postfwd,
On Sat, July 4, 2009 10:20, Michelle Konzack wrote:
...because the Spamer From: is in the auto_whitelist.
aRG :/
from and SENDER IP is in the awl table, where is the problem ?
if you match the sender ip very well (/16 fuzzy) then i see the problem
and btw awl is NOT a whitelist !
--
On Sat, July 4, 2009 20:50, Michelle Konzack wrote:
Goog evening Jari,
Am 2009-07-04 13:46:45, schrieb Jari Fredriksson:
http://wiki.apache.org/spamassassin/BetterDocumentation/SqlReadmeAwl
Thankyou for the link, but if I understand it right, spamassassin is
then using ONE
On Sat, July 4, 2009 20:55, Michelle Konzack wrote:
To prevent manualy learning of the MEDS spams I have set my MEDS-Score
to 8.00 and do not get any spams except caNN and genNN.
perldoc Mail::SpamAssassin::Plugin::AWL
see the awl factor setting, default its 0.5, so if you dont like this,
X-Asn: AS5656
X-AsnCidr: 209.145.128.0/18/18
others seen this ? double cidr ?
amavisd 2.6.1
sa 3.2.5
--
xpoint
On Mon, July 6, 2009 00:57, MySQL Student wrote:
spamassassin 21 -D --lint
search here for missing perl modules
How effective are razor/pyzor and SPF/DKIM? I've always been a bit hesitant
to use any of those.
well it helps, if used properly, how thay works is depending on your need and
1 - 100 of 3169 matches
Mail list logo