Hi.
I have zen.spamhaus.org as sbl blacklist. Perhaps i should add some more.
I already have log-level=verbose so thats the same thing as |full-log-dir.|

Your relaytest failed to relay mails from my server.
<<< 554 Refused. Your sender address has been blacklisted. See: 
http://www.your-domain-here.com/spam_policy#DENIED_SENDER_BLACKLISTED
Can't relay

Kind Regards
M

Arne Metzger skrev:
> Hi,
>
> at least 10 blacklists would have stopped this spam before accepting it 
> (see http://www.kloth.net/services/dnsbl.php)
>
> For a smtp mail relay test of your own mail server open a telnet session 
> from your server's shell to rt.njabl.org on port 2500:
> telnet rt.njabl.org 2500
>
> But i am sorry i have no idea, why this email wasn't blocked by 
> spamdyke. perhaps enabling full-log-dir for some time could help to see 
> what happens
> http://www.spamdyke.org/documentation/README.html#FULL_LOGGING
>
> Regards,
> Arne
>
> Magnus Ringdahl schrieb am 16.12.2009 15:07:
>   
>> Hi.
>> I just recieved a viagra spam again. From my own email address.
>>
>> Dec 16 14:11:12 web01 /var/qmail/bin/relaylock[28512]:
>> /var/qmail/bin/relaylock: mail from 125.178.185.144:3512 (not defined)
>> Dec 16 14:11:13 web01 spamdyke[28509]: TLS_ENCRYPTED from: (unknown) to:
>> (unknown) origin_ip: 125.178.185.144 origin_rdns: (unknown) auth: (unknown)
>> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: Handlers Filter
>> before-queue for qmail started ...
>> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]:
>> [email protected]
>> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: [email protected]
>> Dec 16 14:11:15 web01 spf filter[28538]: Starting spf filter...
>> Dec 16 14:11:15 web01 spf filter[28538]: Error code: (2) Could not find
>> a valid SPF record
>> Dec 16 14:11:15 web01 spf filter[28538]: Failed to query MAIL-FROM: No
>> DNS data for 'domain.tld'.
>> Dec 16 14:11:15 web01 spf filter[28538]: SPF result: none
>> Dec 16 14:11:15 web01 spf filter[28538]: SPF status: PASS
>> Dec 16 14:11:15 web01 qmail-queue[28539]: scan: the
>> message(drweb.tmp.MdrGAT) sent by [email protected] to
>> [email protected] is passed
>> Dec 16 14:11:15 web01 qmail: 1260969075.825046 new msg 4254303
>> Dec 16 14:11:15 web01 qmail: 1260969075.825046 info msg 4254303: bytes
>> 2349 from<[email protected]>  qp 28540 uid 2020
>> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: Handlers Filter
>> before-local for qmail started ...
>> Dec 16 14:11:15 web01 qmail-local-handlers[28541]:
>> [email protected]
>> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: [email protected]
>> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: mailbox:
>> /var/qmail/mailnames/domain.tld/kundtjanst
>> Dec 16 14:11:15 web01 qmail: 1260969075.845046 starting delivery 3717:
>> msg 4254303 to local [email protected]
>> Dec 16 14:11:15 web01 qmail: 1260969075.845046 status: local 1/10 remote
>> 0/20
>> Dec 16 14:11:15 web01 qmail: 1260969075.853046 delivery 3717: success:
>> did_0+0+2/
>> Dec 16 14:11:15 web01 qmail: 1260969075.853046 status: local 0/10 remote
>> 0/20
>> Dec 16 14:11:15 web01 qmail: 1260969075.853046 end msg 4254303
>>
>> This is the header of the mail:
>>
>> Received: (qmail 28540 invoked from network); 16 Dec 2009 14:11:15 +0100
>> Received-SPF: none (no valid SPF record)
>> Received: from unknown (HELO ?125.178.185.144?) (125.178.185.144)
>>    by 1.2.3.4 with (RC4-MD5 encrypted) SMTP; 16 Dec 2009 14:11:15 +0100
>> From: Pfizer ® Customer Service<[email protected]>
>> To: [email protected]
>> Subject: Special offer [email protected] receive 70% OFF on Pfizer.
>>
>> Where 1.2.3.4 is the ip of my pleskserver. Don't know what it means, but
>> the server is not open for relay.
>>
>> Kind Regards.
>> M
>>
>> And i have @domain.tld in blacklisted_senders file. So why the hell does
>> these keep coming?
>>
>> Ulrich C. Manns skrev:
>>     
>>> If your users will use authentification there is no problem by
>>> blocking subdomains also. ?¿?
>>>
>>> You could add /reject-ip-in-cc-rdns/ to your /spamdyke.conf/ also.
>>>
>>> Regards,
>>> Ulrich
>>>
>>> Am 16.12.2009 um 07:27 schrieb Magnus Ringdahl:
>>>
>>>       
>>>> Believe me, have hav been reading that documentation many times.
>>>> This is what i read:
>>>> "One form of wildcard address is supported. All usernames within a
>>>> domain (and its subdomains) may be blocked by a line starting with |@|.
>>>> For example, if the file contained the following entry:| @example.com|
>>>> spamdyke will block mail to |[email protected]|, |[email protected]|,
>>>> |[email protected]|, etc."
>>>>
>>>> Kind Regards
>>>> M
>>>>
>>>> Ulrich C. Manns skrev:
>>>>         
>>>>> Look at the documentation
>>>>> here:
>>>>> http://www.spamdyke.org/documentation/README.html#REJECTING_ADDRESSES
>>>>>
>>>>>
>>>>> Spam comes from /[email protected]
>>>>> <mailto:/[email protected]>
>>>>> <mailto:[email protected]>/
>>>>>
>>>>> Add: /sender-blacklist-entry=.artgarfunkel.com/
>>>>> or: /[email protected]
>>>>> <mailto:/[email protected]>
>>>>> <mailto:[email protected]>/
>>>>> to your /spamdyke.conf/
>>>>>
>>>>> Be shure that your user uses authentification!
>>>>>
>>>>> Regards,
>>>>> Ulrich
>>>>>
>>>>> Am 15.12.2009 um 22:36 schrieb Magnus Ringdahl:
>>>>>
>>>>>           
>>>>>> Hi, and thanks for your reply.
>>>>>> Should i use a "." instead of a "@" as a wildcard?
>>>>>>
>>>>>> Kind Regards
>>>>>> M
>>>>>>
>>>>>>
>>>>>> Ulrich C. Manns skrev:
>>>>>>             
>>>>>>> Just add your domain to the senders blacklist with a . as wildchard.
>>>>>>> Example: [email protected]<mailto:[email protected]>
>>>>>>> <mailto:[email protected]>  ->  .spam.com
>>>>>>>
>>>>>>> Your Users should use authentification. So they can send e-mail
>>>>>>> through spamdyke.
>>>>>>>
>>>>>>> Regards,
>>>>>>> Ulrich
>>>>>>>
>>>>>>> Am 15.12.2009 um 21:54 schrieb Magnus Ringdahl:
>>>>>>>
>>>>>>>
>>>>>>>               
>>>>>>>> Hi.
>>>>>>>> I have been using spamdyke for quite some time now, and it reduces my
>>>>>>>> spammails alot.
>>>>>>>> But it have a hell of a problem with spammers (often viagra) the
>>>>>>>> spoof
>>>>>>>> the localdomains.
>>>>>>>> I often get spammails where the sending address is the same as my
>>>>>>>> receiving address.
>>>>>>>> And i dint know how to block them.
>>>>>>>>
>>>>>>>> I have pasted my configurationfiles so you coould see if there is
>>>>>>>> some
>>>>>>>> issues. Using Debian and Plesk 9.2.
>>>>>>>>
>>>>>>>> spamdyke.conf
>>>>>>>> ------------------------------------
>>>>>>>> log-level=verbose
>>>>>>>> filter-level=normal
>>>>>>>> local-domains-file=/var/qmail/control/rcpthosts
>>>>>>>> max-recipients=20
>>>>>>>> idle-timeout-secs=60
>>>>>>>> graylist-level=only
>>>>>>>> graylist-dir=/var/qmail/spamdyke/greylist
>>>>>>>> graylist-min-secs=300
>>>>>>>> graylist-max-secs=1814400
>>>>>>>>
>>>>>>>> sender-whitelist-file=/var/qmail/spamdyke/whitelisted_senders
>>>>>>>> rdns-whitelist-file=/var/qmail/spamdyke/whitelisted_rdns
>>>>>>>> ip-whitelist-file=/var/qmail/spamdyke/whitelisted_ip
>>>>>>>>
>>>>>>>> sender-blacklist-file=/var/qmail/spamdyke/blacklisted_senders
>>>>>>>> recipient-blacklist-file=/var/qmail/spamdyke/blacklisted_recipients
>>>>>>>> ip-blacklist-file=/var/qmail/spamdyke/blacklisted_ip
>>>>>>>> dns-blacklist-entry=zen.spamhaus.org
>>>>>>>>
>>>>>>>> reject-empty-rdns
>>>>>>>> reject-unresolvable-rdns
>>>>>>>> greeting-delay-secs=5
>>>>>>>> reject-missing-sender-mx
>>>>>>>>
>>>>>>>> policy-url=http://www.your-domain-here.com/spam_policy
>>>>>>>> --------------------------------------------------------------------
>>>>>>>>
>>>>>>>> smtp_psa
>>>>>>>> --------------------------------------------------
>>>>>>>> service smtp
>>>>>>>> {
>>>>>>>>       socket_type     = stream
>>>>>>>>       protocol        = tcp
>>>>>>>>       wait            = no
>>>>>>>>       disable         = no
>>>>>>>>       user            = root
>>>>>>>>       instances       = UNLIMITED
>>>>>>>>       env             = SMTPAUTH=1
>>>>>>>>       server          = /var/qmail/bin/tcp-env
>>>>>>>>       server_args     = -Rt0 /usr/local/bin/spamdyke -f
>>>>>>>> /etc/spamdyke.conf /var/qmail/bin/relaylock
>>>>>>>> /var/qmail/bin/qmail-smtpd
>>>>>>>> /var/qmail/bin/smtp_auth /var/qmail/bin/true
>>>>>>>> /var/qmail/bin/cmd5checkpw
>>>>>>>> /var/qmail/bin/true
>>>>>>>> }
>>>>>>>> ---------------------------------------------------------
>>>>>>>>
>>>>>>>> The whitelisted_ip file contains the mailservers ip-addresses.
>>>>>>>> The blacklisted_senders file contains the localdomains (@domain.tld).
>>>>>>>> The blacklisted_words contains alot of words like .t-dialin.net,
>>>>>>>> .t-ipconnect.de, .in-addr.arpa, .dhcp, .net, in-addr.arpa, dhcp,
>>>>>>>> dynamic, and so on.
>>>>>>>>
>>>>>>>> I understand the spamdyke filters that they work something like
>>>>>>>> this. If
>>>>>>>> the sending server is listed in whitelisted_ip the mail passes the
>>>>>>>> filter. If its not listed in whitelisted_ip it then checks the
>>>>>>>> blabklisted_senders if the sending address is listed it drops the
>>>>>>>> mail.
>>>>>>>> Is that correct?
>>>>>>>>
>>>>>>>> Here is a sample of the mail.log of a spammail that in my opinion
>>>>>>>> should
>>>>>>>> have been dropped but passes all filters.
>>>>>>>>
>>>>>>>> Dec 15 17:52:55 web01 spamdyke[24928]: TLS_ENCRYPTED from:
>>>>>>>> (unknown) to:
>>>>>>>> (unknown) origin_ip: 80.179.197.221 origin_rdns:
>>>>>>>> 80.179.197.221.cable.012.net.il auth: (unknown)
>>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: Handlers Filter
>>>>>>>> before-queue for qmail started ...
>>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>>>> [email protected]
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: Starting spf filter...
>>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF result: neutral
>>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF status: PASS
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 new msg 4252544
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 info msg 4252544:
>>>>>>>> bytes
>>>>>>>> 2246 from<[email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>>  qp 24948 uid 2020
>>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: Handlers Filter
>>>>>>>> before-local for qmail started ...
>>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>>>> [email protected]
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: mailbox:
>>>>>>>> /var/qmail/mailnames/domain.tld/info
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 starting delivery
>>>>>>>> 2744:
>>>>>>>> msg 4252544 to local [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 status: local 1/10
>>>>>>>> remote
>>>>>>>> 0/20
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 delivery 2744:
>>>>>>>> success:
>>>>>>>> did_0+0+2/
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 status: local 0/10
>>>>>>>> remote
>>>>>>>> 0/20
>>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 end msg 4252544
>>>>>>>>
>>>>>>>> Dec 15 21:22:57 web01 /var/qmail/bin/relaylock[6350]:
>>>>>>>> /var/qmail/bin/relaylock: mail from 125.25.15.31:52521
>>>>>>>> (125.25.15.31.adsl.dynamic.totbb.net)
>>>>>>>> Dec 15 21:22:59 web01 spamdyke[6349]: TLS_ENCRYPTED from:
>>>>>>>> (unknown) to:
>>>>>>>> (unknown) origin_ip: 125.25.15.31 origin_rdns:
>>>>>>>> 125.25.15.31.adsl.dynamic.totbb.net auth: (unknown)
>>>>>>>> Dec 15 21:23:01 web01 qmail-queue-handlers[6354]: Handlers Filter
>>>>>>>> before-queue for qmail started ...
>>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Starting spf filter...
>>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Error code: (2) Could not
>>>>>>>> find a
>>>>>>>> valid SPF record
>>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Failed to query MAIL-FROM: No
>>>>>>>> DNS data for 'domain.tld'.
>>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF result: none
>>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF status: PASS
>>>>>>>> Dec 15 21:23:02 web01 qmail-queue[6356]: scan: the
>>>>>>>> message(drweb.tmp.Wu6OR3) sent by [email protected]
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>  to
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>  is passed
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 new msg 4253887
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 info msg 4253887:
>>>>>>>> bytes
>>>>>>>> 2469 from<[email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>>  qp
>>>>>>>> 6357 uid 2020
>>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: Handlers Filter
>>>>>>>> before-local for qmail started ...
>>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: mailbox:
>>>>>>>> /var/qmail/mailnames/domain.tld/kundtjanst
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 starting delivery
>>>>>>>> 2998:
>>>>>>>> msg 4253887 to local [email protected]
>>>>>>>> <mailto:[email protected]>
>>>>>>>> <mailto:[email protected]>
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 status: local 1/10
>>>>>>>> remote
>>>>>>>> 0/20
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 delivery 2998:
>>>>>>>> success:
>>>>>>>> did_0+0+2/
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 status: local 0/10
>>>>>>>> remote
>>>>>>>> 0/20
>>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 end msg 4253887
>>>>>>>>
>>>>>>>> How can i check that smtp_auth is working? Im starting to wonder that
>>>>>>>> it's not.
>>>>>>>> I hope someone have the time to answer. I have been struggling with
>>>>>>>> this
>>>>>>>> for a long time withput getting rid of those annoying mails.
>>>>>>>>
>>>>>>>> Kind Regards
>>>>>>>> M
>>>>>>>>
>>>>>>>>
>>>>>>>> Eduard Svarc skrev:
>>>>>>>>
>>>>>>>>                 
>>>>>>>>> Hello,
>>>>>>>>>
>>>>>>>>> these keywords .net and .com are used just for testing if IP is in
>>>>>>>>> reverse DNS listed. Is not done against normal reverse DNS
>>>>>>>>> records for
>>>>>>>>> servers like mail.somedomain.net<http://mail.somedomain.net>
>>>>>>>>> <http://mail.somedomain.net>. So
>>>>>>>>> in combination with keyword
>>>>>>>>> reject-ip-in-cc-rdns and .net in file
>>>>>>>>> /etc/spamdyke/ip-in-rdns-keyword-blacklist-file it will reject mail
>>>>>>>>> from 242-29-179-94.pool.ukrtel.net
>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>  because that sender will be
>>>>>>>>> positively tested as not valid reverse DNS.
>>>>>>>>>
>>>>>>>>> use just net without that '.' is not suficient because SPAMDYKE use
>>>>>>>>> this '.' as flag for testing end of string only. So listing .com and
>>>>>>>>> .net does magic for SPAMDYKE when it testing IP in reverse DNS for
>>>>>>>>> country code DNS, like .it,, .uk etc it does same for .com and .net.
>>>>>>>>> Personally I did add into that file other ones special domains like
>>>>>>>>> .eu, .org, .info, .biz. These should not be used by ISP
>>>>>>>>> providers for
>>>>>>>>> assigning reverse names, but who knows. Anyway it doesn't hurt my
>>>>>>>>> configuration and I'm preparded.
>>>>>>>>>
>>>>>>>>> Eduard Švarc
>>>>>>>>>
>>>>>>>>> DATA Intertech s.r.o.
>>>>>>>>> Kladenská 46
>>>>>>>>> 160 00 Praha 6
>>>>>>>>> Czech Republic
>>>>>>>>> tel. +420-235365267, fax +420-235361446
>>>>>>>>>
>>>>>>>>> [email protected]
>>>>>>>>> <mailto:[email protected]>
>>>>>>>>> <mailto:[email protected]>  wrote on 14.12.2009
>>>>>>>>> 09:55:45:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                   
>>>>>>>>>> thanks Eduard Švarc
>>>>>>>>>>
>>>>>>>>>> Same query as david stiller raised, .com, .net are valid domain
>>>>>>>>>> right?
>>>>>>>>>>
>>>>>>>>>> also
>>>>>>>>>>
>>>>>>>>>> @400000004b25fa572bd181a4 CHKUSER accepted rcpt: from
>>>>>>>>>> <fx...@bmelaw.
>>>>>>>>>> com::>  remote<microsof-7b1919:unknown:94.179.29.242>  rcpt
>>>>>>>>>> <[email protected]<mailto:[email protected]>
>>>>>>>>>> <mailto:[email protected]>>  : found existing recipient
>>>>>>>>>> @400000004b25fa572bd2316c spamdyke[27021]: ALLOWED from:
>>>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>>>> <mailto:[email protected]>  to:
>>>>>>>>>> [email protected]<mailto:[email protected]>
>>>>>>>>>> <mailto:[email protected]>  origin_ip: 94.179.
>>>>>>>>>> 29.242 origin_rdns: 242-29-179-94.pool.ukrtel.net
>>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>  auth: (unknown)
>>>>>>>>>>
>>>>>>>>>> the above ip is listed in rbl ,
>>>>>>>>>>
>>>>>>>>>> IP Address Lookup
>>>>>>>>>>
>>>>>>>>>> [image removed]
>>>>>>>>>>
>>>>>>>>>> 94.179.29.242 is not listed in the SBL
>>>>>>>>>> 94.179.29.242 is listed in the PBL, in the following records:
>>>>>>>>>> PBL239543
>>>>>>>>>> 94.179.29.242 is not listed in the XBL
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> this doesnt look like false positive
>>>>>>>>>>
>>>>>>>>>> From: Eduard Svarc<[email protected]
>>>>>>>>>> <mailto:[email protected]>  <mailto:[email protected]>>
>>>>>>>>>> To: spamdyke users<[email protected]
>>>>>>>>>> <mailto:[email protected]>
>>>>>>>>>> <mailto:[email protected]>>
>>>>>>>>>> Sent: Mon, December 14, 2009 12:48:07 PM
>>>>>>>>>> Subject: Re: [spamdyke-users] spamdyke configuration finetuneing
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Hello,
>>>>>>>>>>
>>>>>>>>>> I see you have two things out. 1st you using RBLS, that could give
>>>>>>>>>> you a lot positive false spam. 2nd you completely have
>>>>>>>>>> commented out
>>>>>>>>>> best thing in SPAMDYKE. Is sniffing IPs in reverse DNS. Most of
>>>>>>>>>> bots
>>>>>>>>>> and spams comming from Internet zombies. Here are my advices:
>>>>>>>>>>
>>>>>>>>>> 1 - comment out dns-blacklist-entry=zen.spamhaus.org
>>>>>>>>>> 2 - uncoment reject-empty-rdns, reject-ip-in-cc-rdns, reject-
>>>>>>>>>> missing-sender-mx and reject-unresolvable-rdns
>>>>>>>>>> 3- into /etc/spamdyke/blacklist_recipients add your domain in
>>>>>>>>>> format
>>>>>>>>>> @your-domain (it will block all mails like to: n...@your-domain
>>>>>>>>>> from:
>>>>>>>>>> n...@your-domain)
>>>>>>>>>> 4- into /etc/spamdyke/ip-in-rdns-keyword-blacklist-file put these
>>>>>>>>>>
>>>>>>>>>>                     
>>>>>>>>> words :
>>>>>>>>>
>>>>>>>>>                   
>>>>>>>>>> dsl
>>>>>>>>>> .com
>>>>>>>>>> .net
>>>>>>>>>> broadband
>>>>>>>>>> dynamic
>>>>>>>>>>
>>>>>>>>>> I could guarantee you will fall bellow 1% of SPAM with nearly zero
>>>>>>>>>> false positives. Of course someone who can't follow certain
>>>>>>>>>> guidelines for theirs servers will not be able to send you e-mails
>>>>>>>>>> at all. But you can easily handle it by adding IP's in
>>>>>>>>>> /etc/spamdyke/whitelist_ip or adding senders into
>>>>>>>>>> /etc/spamdyke/whitelist_senders
>>>>>>>>>>
>>>>>>>>>> I stop using any RBLS services ages ago, they are way unreliable.
>>>>>>>>>>
>>>>>>>>>> Good luck,
>>>>>>>>>> Eduard Švarc
>>>>>>>>>>
>>>>>>>>>> DATA Intertech s.r.o.
>>>>>>>>>> Kladenská 46
>>>>>>>>>> 160 00 Praha 6
>>>>>>>>>> Czech Republic
>>>>>>>>>> tel. +420-235365267, fax +420-235361446
>>>>>>>>>>                     
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
>   

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to