Hi.
I just recieved a viagra spam again. From my own email address.

Dec 16 14:11:12 web01 /var/qmail/bin/relaylock[28512]: 
/var/qmail/bin/relaylock: mail from 125.178.185.144:3512 (not defined)
Dec 16 14:11:13 web01 spamdyke[28509]: TLS_ENCRYPTED from: (unknown) to: 
(unknown) origin_ip: 125.178.185.144 origin_rdns: (unknown) auth: (unknown)
Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: Handlers Filter 
before-queue for qmail started ...
Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: 
[email protected]
Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: [email protected]
Dec 16 14:11:15 web01 spf filter[28538]: Starting spf filter...
Dec 16 14:11:15 web01 spf filter[28538]: Error code: (2) Could not find 
a valid SPF record
Dec 16 14:11:15 web01 spf filter[28538]: Failed to query MAIL-FROM: No 
DNS data for 'domain.tld'.
Dec 16 14:11:15 web01 spf filter[28538]: SPF result: none
Dec 16 14:11:15 web01 spf filter[28538]: SPF status: PASS
Dec 16 14:11:15 web01 qmail-queue[28539]: scan: the 
message(drweb.tmp.MdrGAT) sent by [email protected] to 
[email protected] is passed
Dec 16 14:11:15 web01 qmail: 1260969075.825046 new msg 4254303
Dec 16 14:11:15 web01 qmail: 1260969075.825046 info msg 4254303: bytes 
2349 from <[email protected]> qp 28540 uid 2020
Dec 16 14:11:15 web01 qmail-local-handlers[28541]: Handlers Filter 
before-local for qmail started ...
Dec 16 14:11:15 web01 qmail-local-handlers[28541]: 
[email protected]
Dec 16 14:11:15 web01 qmail-local-handlers[28541]: [email protected]
Dec 16 14:11:15 web01 qmail-local-handlers[28541]: mailbox: 
/var/qmail/mailnames/domain.tld/kundtjanst
Dec 16 14:11:15 web01 qmail: 1260969075.845046 starting delivery 3717: 
msg 4254303 to local [email protected]
Dec 16 14:11:15 web01 qmail: 1260969075.845046 status: local 1/10 remote 
0/20
Dec 16 14:11:15 web01 qmail: 1260969075.853046 delivery 3717: success: 
did_0+0+2/
Dec 16 14:11:15 web01 qmail: 1260969075.853046 status: local 0/10 remote 
0/20
Dec 16 14:11:15 web01 qmail: 1260969075.853046 end msg 4254303

This is the header of the mail:

Received: (qmail 28540 invoked from network); 16 Dec 2009 14:11:15 +0100
Received-SPF: none (no valid SPF record)
Received: from unknown (HELO ?125.178.185.144?) (125.178.185.144)
  by 1.2.3.4 with (RC4-MD5 encrypted) SMTP; 16 Dec 2009 14:11:15 +0100
From: Pfizer ® Customer Service <[email protected]>
To: [email protected]
Subject: Special offer [email protected] receive 70% OFF on Pfizer.

Where 1.2.3.4 is the ip of my pleskserver. Don't know what it means, but 
the server is not open for relay.

Kind Regards.
M

And i have @domain.tld in blacklisted_senders file. So why the hell does 
these keep coming?

Ulrich C. Manns skrev:
> If your users will use authentification there is no problem by 
> blocking subdomains also. ?¿?
>
> You could add /reject-ip-in-cc-rdns/ to your /spamdyke.conf/ also.
>
> Regards,
> Ulrich
>
> Am 16.12.2009 um 07:27 schrieb Magnus Ringdahl:
>
>> Believe me, have hav been reading that documentation many times.
>> This is what i read:
>> "One form of wildcard address is supported. All usernames within a
>> domain (and its subdomains) may be blocked by a line starting with |@|.
>> For example, if the file contained the following entry:| @example.com|
>> spamdyke will block mail to |[email protected]|, |[email protected]|,
>> |[email protected]|, etc."
>>
>> Kind Regards
>> M
>>
>> Ulrich C. Manns skrev:
>>> Look at the documentation
>>> here: 
>>> http://www.spamdyke.org/documentation/README.html#REJECTING_ADDRESSES
>>>
>>>
>>> Spam comes from /[email protected] 
>>> <mailto:/[email protected]>
>>> <mailto:[email protected]>/
>>>
>>> Add: /sender-blacklist-entry=.artgarfunkel.com/
>>> or: /[email protected] 
>>> <mailto:/[email protected]>
>>> <mailto:[email protected]>/
>>> to your /spamdyke.conf/
>>>
>>> Be shure that your user uses authentification!
>>>
>>> Regards,
>>> Ulrich
>>>
>>> Am 15.12.2009 um 22:36 schrieb Magnus Ringdahl:
>>>
>>>> Hi, and thanks for your reply.
>>>> Should i use a "." instead of a "@" as a wildcard?
>>>>
>>>> Kind Regards
>>>> M
>>>>
>>>>
>>>> Ulrich C. Manns skrev:
>>>>> Just add your domain to the senders blacklist with a . as wildchard.
>>>>> Example: [email protected] <mailto:[email protected]> 
>>>>> <mailto:[email protected]> -> .spam.com
>>>>>
>>>>> Your Users should use authentification. So they can send e-mail
>>>>> through spamdyke.
>>>>>
>>>>> Regards,
>>>>> Ulrich
>>>>>
>>>>> Am 15.12.2009 um 21:54 schrieb Magnus Ringdahl:
>>>>>
>>>>>
>>>>>> Hi.
>>>>>> I have been using spamdyke for quite some time now, and it reduces my
>>>>>> spammails alot.
>>>>>> But it have a hell of a problem with spammers (often viagra) the 
>>>>>> spoof
>>>>>> the localdomains.
>>>>>> I often get spammails where the sending address is the same as my
>>>>>> receiving address.
>>>>>> And i dint know how to block them.
>>>>>>
>>>>>> I have pasted my configurationfiles so you coould see if there is 
>>>>>> some
>>>>>> issues. Using Debian and Plesk 9.2.
>>>>>>
>>>>>> spamdyke.conf
>>>>>> ------------------------------------
>>>>>> log-level=verbose
>>>>>> filter-level=normal
>>>>>> local-domains-file=/var/qmail/control/rcpthosts
>>>>>> max-recipients=20
>>>>>> idle-timeout-secs=60
>>>>>> graylist-level=only
>>>>>> graylist-dir=/var/qmail/spamdyke/greylist
>>>>>> graylist-min-secs=300
>>>>>> graylist-max-secs=1814400
>>>>>>
>>>>>> sender-whitelist-file=/var/qmail/spamdyke/whitelisted_senders
>>>>>> rdns-whitelist-file=/var/qmail/spamdyke/whitelisted_rdns
>>>>>> ip-whitelist-file=/var/qmail/spamdyke/whitelisted_ip
>>>>>>
>>>>>> sender-blacklist-file=/var/qmail/spamdyke/blacklisted_senders
>>>>>> recipient-blacklist-file=/var/qmail/spamdyke/blacklisted_recipients
>>>>>> ip-blacklist-file=/var/qmail/spamdyke/blacklisted_ip
>>>>>> dns-blacklist-entry=zen.spamhaus.org
>>>>>>
>>>>>> reject-empty-rdns
>>>>>> reject-unresolvable-rdns
>>>>>> greeting-delay-secs=5
>>>>>> reject-missing-sender-mx
>>>>>>
>>>>>> policy-url=http://www.your-domain-here.com/spam_policy
>>>>>> --------------------------------------------------------------------
>>>>>>
>>>>>> smtp_psa
>>>>>> --------------------------------------------------
>>>>>> service smtp
>>>>>> {
>>>>>>      socket_type     = stream
>>>>>>      protocol        = tcp
>>>>>>      wait            = no
>>>>>>      disable         = no
>>>>>>      user            = root
>>>>>>      instances       = UNLIMITED
>>>>>>      env             = SMTPAUTH=1
>>>>>>      server          = /var/qmail/bin/tcp-env
>>>>>>      server_args     = -Rt0 /usr/local/bin/spamdyke -f
>>>>>> /etc/spamdyke.conf /var/qmail/bin/relaylock 
>>>>>> /var/qmail/bin/qmail-smtpd
>>>>>> /var/qmail/bin/smtp_auth /var/qmail/bin/true 
>>>>>> /var/qmail/bin/cmd5checkpw
>>>>>> /var/qmail/bin/true
>>>>>> }
>>>>>> ---------------------------------------------------------
>>>>>>
>>>>>> The whitelisted_ip file contains the mailservers ip-addresses.
>>>>>> The blacklisted_senders file contains the localdomains (@domain.tld).
>>>>>> The blacklisted_words contains alot of words like .t-dialin.net,
>>>>>> .t-ipconnect.de, .in-addr.arpa, .dhcp, .net, in-addr.arpa, dhcp,
>>>>>> dynamic, and so on.
>>>>>>
>>>>>> I understand the spamdyke filters that they work something like
>>>>>> this. If
>>>>>> the sending server is listed in whitelisted_ip the mail passes the
>>>>>> filter. If its not listed in whitelisted_ip it then checks the
>>>>>> blabklisted_senders if the sending address is listed it drops the 
>>>>>> mail.
>>>>>> Is that correct?
>>>>>>
>>>>>> Here is a sample of the mail.log of a spammail that in my opinion
>>>>>> should
>>>>>> have been dropped but passes all filters.
>>>>>>
>>>>>> Dec 15 17:52:55 web01 spamdyke[24928]: TLS_ENCRYPTED from:
>>>>>> (unknown) to:
>>>>>> (unknown) origin_ip: 80.179.197.221 origin_rdns:
>>>>>> 80.179.197.221.cable.012.net.il auth: (unknown)
>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: Handlers Filter
>>>>>> before-queue for qmail started ...
>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>> [email protected] 
>>>>>> <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: Starting spf filter...
>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF result: neutral
>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF status: PASS
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 new msg 4252544
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 info msg 4252544: 
>>>>>> bytes
>>>>>> 2246 from <[email protected] <mailto:[email protected]>
>>>>>> <mailto:[email protected]>> qp 24948 uid 2020
>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: Handlers Filter
>>>>>> before-local for qmail started ...
>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>> [email protected] 
>>>>>> <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: mailbox:
>>>>>> /var/qmail/mailnames/domain.tld/info
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 starting delivery 
>>>>>> 2744:
>>>>>> msg 4252544 to local [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 status: local 1/10
>>>>>> remote
>>>>>> 0/20
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 delivery 2744: 
>>>>>> success:
>>>>>> did_0+0+2/
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 status: local 0/10
>>>>>> remote
>>>>>> 0/20
>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 end msg 4252544
>>>>>>
>>>>>> Dec 15 21:22:57 web01 /var/qmail/bin/relaylock[6350]:
>>>>>> /var/qmail/bin/relaylock: mail from 125.25.15.31:52521
>>>>>> (125.25.15.31.adsl.dynamic.totbb.net)
>>>>>> Dec 15 21:22:59 web01 spamdyke[6349]: TLS_ENCRYPTED from: 
>>>>>> (unknown) to:
>>>>>> (unknown) origin_ip: 125.25.15.31 origin_rdns:
>>>>>> 125.25.15.31.adsl.dynamic.totbb.net auth: (unknown)
>>>>>> Dec 15 21:23:01 web01 qmail-queue-handlers[6354]: Handlers Filter
>>>>>> before-queue for qmail started ...
>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Starting spf filter...
>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Error code: (2) Could not
>>>>>> find a
>>>>>> valid SPF record
>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Failed to query MAIL-FROM: No
>>>>>> DNS data for 'domain.tld'.
>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF result: none
>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF status: PASS
>>>>>> Dec 15 21:23:02 web01 qmail-queue[6356]: scan: the
>>>>>> message(drweb.tmp.Wu6OR3) sent by [email protected] 
>>>>>> <mailto:[email protected]>
>>>>>> <mailto:[email protected]> to
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]> is passed
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 new msg 4253887
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 info msg 4253887: 
>>>>>> bytes
>>>>>> 2469 from <[email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>> qp
>>>>>> 6357 uid 2020
>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: Handlers Filter
>>>>>> before-local for qmail started ...
>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: mailbox:
>>>>>> /var/qmail/mailnames/domain.tld/kundtjanst
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 starting delivery 
>>>>>> 2998:
>>>>>> msg 4253887 to local [email protected] 
>>>>>> <mailto:[email protected]>
>>>>>> <mailto:[email protected]>
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 status: local 1/10
>>>>>> remote
>>>>>> 0/20
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 delivery 2998: 
>>>>>> success:
>>>>>> did_0+0+2/
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 status: local 0/10
>>>>>> remote
>>>>>> 0/20
>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 end msg 4253887
>>>>>>
>>>>>> How can i check that smtp_auth is working? Im starting to wonder that
>>>>>> it's not.
>>>>>> I hope someone have the time to answer. I have been struggling with
>>>>>> this
>>>>>> for a long time withput getting rid of those annoying mails.
>>>>>>
>>>>>> Kind Regards
>>>>>> M
>>>>>>
>>>>>>
>>>>>> Eduard Svarc skrev:
>>>>>>
>>>>>>> Hello,
>>>>>>>
>>>>>>> these keywords .net and .com are used just for testing if IP is in
>>>>>>> reverse DNS listed. Is not done against normal reverse DNS 
>>>>>>> records for
>>>>>>> servers like mail.somedomain.net <http://mail.somedomain.net> 
>>>>>>> <http://mail.somedomain.net>. So
>>>>>>> in combination with keyword
>>>>>>> reject-ip-in-cc-rdns and .net in file
>>>>>>> /etc/spamdyke/ip-in-rdns-keyword-blacklist-file it will reject mail
>>>>>>> from 242-29-179-94.pool.ukrtel.net 
>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>> <http://242-29-179-94.pool.ukrtel.net> because that sender will be
>>>>>>> positively tested as not valid reverse DNS.
>>>>>>>
>>>>>>> use just net without that '.' is not suficient because SPAMDYKE use
>>>>>>> this '.' as flag for testing end of string only. So listing .com and
>>>>>>> .net does magic for SPAMDYKE when it testing IP in reverse DNS for
>>>>>>> country code DNS, like .it,, .uk etc it does same for .com and .net.
>>>>>>> Personally I did add into that file other ones special domains like
>>>>>>> .eu, .org, .info, .biz. These should not be used by ISP 
>>>>>>> providers for
>>>>>>> assigning reverse names, but who knows. Anyway it doesn't hurt my
>>>>>>> configuration and I'm preparded.
>>>>>>>
>>>>>>> Eduard Švarc
>>>>>>>
>>>>>>> DATA Intertech s.r.o.
>>>>>>> Kladenská 46
>>>>>>> 160 00 Praha 6
>>>>>>> Czech Republic
>>>>>>> tel. +420-235365267, fax +420-235361446
>>>>>>>
>>>>>>> [email protected] 
>>>>>>> <mailto:[email protected]>
>>>>>>> <mailto:[email protected]> wrote on 14.12.2009
>>>>>>> 09:55:45:
>>>>>>>
>>>>>>>
>>>>>>>> thanks Eduard Švarc
>>>>>>>>
>>>>>>>> Same query as david stiller raised, .com, .net are valid domain
>>>>>>>> right?
>>>>>>>>
>>>>>>>> also
>>>>>>>>
>>>>>>>> @400000004b25fa572bd181a4 CHKUSER accepted rcpt: from 
>>>>>>>> <fx...@bmelaw.
>>>>>>>> com::> remote <microsof-7b1919:unknown:94.179.29.242> rcpt
>>>>>>>> <[email protected] <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>> : found existing recipient
>>>>>>>> @400000004b25fa572bd2316c spamdyke[27021]: ALLOWED from:
>>>>>>>> [email protected] <mailto:[email protected]> 
>>>>>>>> <mailto:[email protected]> to:
>>>>>>>> [email protected] <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]> origin_ip: 94.179.
>>>>>>>> 29.242 origin_rdns: 242-29-179-94.pool.ukrtel.net 
>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>>> <http://242-29-179-94.pool.ukrtel.net> auth: (unknown)
>>>>>>>>
>>>>>>>> the above ip is listed in rbl ,
>>>>>>>>
>>>>>>>> IP Address Lookup
>>>>>>>>
>>>>>>>> [image removed]
>>>>>>>>
>>>>>>>> 94.179.29.242 is not listed in the SBL
>>>>>>>> 94.179.29.242 is listed in the PBL, in the following records:
>>>>>>>> PBL239543
>>>>>>>> 94.179.29.242 is not listed in the XBL
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> this doesnt look like false positive
>>>>>>>>
>>>>>>>> From: Eduard Svarc <[email protected] 
>>>>>>>> <mailto:[email protected]> <mailto:[email protected]>>
>>>>>>>> To: spamdyke users <[email protected] 
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>>
>>>>>>>> Sent: Mon, December 14, 2009 12:48:07 PM
>>>>>>>> Subject: Re: [spamdyke-users] spamdyke configuration finetuneing
>>>>>>>>
>>>>>>>>
>>>>>>>> Hello,
>>>>>>>>
>>>>>>>> I see you have two things out. 1st you using RBLS, that could give
>>>>>>>> you a lot positive false spam. 2nd you completely have 
>>>>>>>> commented out
>>>>>>>> best thing in SPAMDYKE. Is sniffing IPs in reverse DNS. Most of 
>>>>>>>> bots
>>>>>>>> and spams comming from Internet zombies. Here are my advices:
>>>>>>>>
>>>>>>>> 1 - comment out dns-blacklist-entry=zen.spamhaus.org
>>>>>>>> 2 - uncoment reject-empty-rdns, reject-ip-in-cc-rdns, reject-
>>>>>>>> missing-sender-mx and reject-unresolvable-rdns
>>>>>>>> 3- into /etc/spamdyke/blacklist_recipients add your domain in 
>>>>>>>> format
>>>>>>>> @your-domain (it will block all mails like to: n...@your-domain 
>>>>>>>> from:
>>>>>>>> n...@your-domain)
>>>>>>>> 4- into /etc/spamdyke/ip-in-rdns-keyword-blacklist-file put these
>>>>>>>>
>>>>>>> words :
>>>>>>>
>>>>>>>> dsl
>>>>>>>> .com
>>>>>>>> .net
>>>>>>>> broadband
>>>>>>>> dynamic
>>>>>>>>
>>>>>>>> I could guarantee you will fall bellow 1% of SPAM with nearly zero
>>>>>>>> false positives. Of course someone who can't follow certain
>>>>>>>> guidelines for theirs servers will not be able to send you e-mails
>>>>>>>> at all. But you can easily handle it by adding IP's in
>>>>>>>> /etc/spamdyke/whitelist_ip or adding senders into
>>>>>>>> /etc/spamdyke/whitelist_senders
>>>>>>>>
>>>>>>>> I stop using any RBLS services ages ago, they are way unreliable.
>>>>>>>>
>>>>>>>> Good luck,
>>>>>>>> Eduard Švarc
>>>>>>>>
>>>>>>>> DATA Intertech s.r.o.
>>>>>>>> Kladenská 46
>>>>>>>> 160 00 Praha 6
>>>>>>>> Czech Republic
>>>>>>>> tel. +420-235365267, fax +420-235361446
>>>>>>>>
>>>>>>>> [email protected] 
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]> wrote on 14.12.2009
>>>>>>>> 07:24:03:
>>>>>>>>
>>>>>>>> New Windows 7: Find the right PC for you. Learn more.
>>>>>>>> _______________________________________________
>>>>>>>> spamdyke-users mailing list
>>>>>>>> [email protected] 
>>>>>>>> <mailto:[email protected]> 
>>>>>>>> <mailto:[email protected]>
>>>>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>>>>
>>>>>>> ------------------------------------------------------------------------
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> spamdyke-users mailing list
>>>>>>> [email protected] <mailto:[email protected]> 
>>>>>>> <mailto:[email protected]>
>>>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>>>
>>>>>>>
>>>>>> _______________________________________________
>>>>>> spamdyke-users mailing list
>>>>>> [email protected] <mailto:[email protected]> 
>>>>>> <mailto:[email protected]>
>>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------
>>>>>
>>>>> _______________________________________________
>>>>> spamdyke-users mailing list
>>>>> [email protected] <mailto:[email protected]> 
>>>>> <mailto:[email protected]>
>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>
>>>>
>>>> _______________________________________________
>>>> spamdyke-users mailing list
>>>> [email protected] <mailto:[email protected]> 
>>>> <mailto:[email protected]>
>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected] <mailto:[email protected]>
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>
>> _______________________________________________
>> spamdyke-users mailing list
>> [email protected] <mailto:[email protected]>
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to