Hi. I have zen.spamhaus.org as sbl blacklist. Perhaps i should add some more. I already have log-level=verbose so thats the same thing as |full-log-dir.|
Your relaytest failed to relay mails from my server. <<< 554 Refused. Your sender address has been blacklisted. See: http://www.your-domain-here.com/spam_policy#DENIED_SENDER_BLACKLISTED Can't relay Kind Regards M Arne Metzger skrev: > Hi, > > at least 10 blacklists would have stopped this spam before accepting it > (see http://www.kloth.net/services/dnsbl.php) > > For a smtp mail relay test of your own mail server open a telnet session > from your server's shell to rt.njabl.org on port 2500: > telnet rt.njabl.org 2500 > > But i am sorry i have no idea, why this email wasn't blocked by > spamdyke. perhaps enabling full-log-dir for some time could help to see > what happens > http://www.spamdyke.org/documentation/README.html#FULL_LOGGING > > Regards, > Arne > > Magnus Ringdahl schrieb am 16.12.2009 15:07: > >> Hi. >> I just recieved a viagra spam again. From my own email address. >> >> Dec 16 14:11:12 web01 /var/qmail/bin/relaylock[28512]: >> /var/qmail/bin/relaylock: mail from 125.178.185.144:3512 (not defined) >> Dec 16 14:11:13 web01 spamdyke[28509]: TLS_ENCRYPTED from: (unknown) to: >> (unknown) origin_ip: 125.178.185.144 origin_rdns: (unknown) auth: (unknown) >> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: Handlers Filter >> before-queue for qmail started ... >> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: >> [email protected] >> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: [email protected] >> Dec 16 14:11:15 web01 spf filter[28538]: Starting spf filter... >> Dec 16 14:11:15 web01 spf filter[28538]: Error code: (2) Could not find >> a valid SPF record >> Dec 16 14:11:15 web01 spf filter[28538]: Failed to query MAIL-FROM: No >> DNS data for 'domain.tld'. >> Dec 16 14:11:15 web01 spf filter[28538]: SPF result: none >> Dec 16 14:11:15 web01 spf filter[28538]: SPF status: PASS >> Dec 16 14:11:15 web01 qmail-queue[28539]: scan: the >> message(drweb.tmp.MdrGAT) sent by [email protected] to >> [email protected] is passed >> Dec 16 14:11:15 web01 qmail: 1260969075.825046 new msg 4254303 >> Dec 16 14:11:15 web01 qmail: 1260969075.825046 info msg 4254303: bytes >> 2349 from<[email protected]> qp 28540 uid 2020 >> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: Handlers Filter >> before-local for qmail started ... >> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: >> [email protected] >> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: [email protected] >> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: mailbox: >> /var/qmail/mailnames/domain.tld/kundtjanst >> Dec 16 14:11:15 web01 qmail: 1260969075.845046 starting delivery 3717: >> msg 4254303 to local [email protected] >> Dec 16 14:11:15 web01 qmail: 1260969075.845046 status: local 1/10 remote >> 0/20 >> Dec 16 14:11:15 web01 qmail: 1260969075.853046 delivery 3717: success: >> did_0+0+2/ >> Dec 16 14:11:15 web01 qmail: 1260969075.853046 status: local 0/10 remote >> 0/20 >> Dec 16 14:11:15 web01 qmail: 1260969075.853046 end msg 4254303 >> >> This is the header of the mail: >> >> Received: (qmail 28540 invoked from network); 16 Dec 2009 14:11:15 +0100 >> Received-SPF: none (no valid SPF record) >> Received: from unknown (HELO ?125.178.185.144?) (125.178.185.144) >> by 1.2.3.4 with (RC4-MD5 encrypted) SMTP; 16 Dec 2009 14:11:15 +0100 >> From: Pfizer ® Customer Service<[email protected]> >> To: [email protected] >> Subject: Special offer [email protected] receive 70% OFF on Pfizer. >> >> Where 1.2.3.4 is the ip of my pleskserver. Don't know what it means, but >> the server is not open for relay. >> >> Kind Regards. >> M >> >> And i have @domain.tld in blacklisted_senders file. So why the hell does >> these keep coming? >> >> Ulrich C. Manns skrev: >> >>> If your users will use authentification there is no problem by >>> blocking subdomains also. ?¿? >>> >>> You could add /reject-ip-in-cc-rdns/ to your /spamdyke.conf/ also. >>> >>> Regards, >>> Ulrich >>> >>> Am 16.12.2009 um 07:27 schrieb Magnus Ringdahl: >>> >>> >>>> Believe me, have hav been reading that documentation many times. >>>> This is what i read: >>>> "One form of wildcard address is supported. All usernames within a >>>> domain (and its subdomains) may be blocked by a line starting with |@|. >>>> For example, if the file contained the following entry:| @example.com| >>>> spamdyke will block mail to |[email protected]|, |[email protected]|, >>>> |[email protected]|, etc." >>>> >>>> Kind Regards >>>> M >>>> >>>> Ulrich C. Manns skrev: >>>> >>>>> Look at the documentation >>>>> here: >>>>> http://www.spamdyke.org/documentation/README.html#REJECTING_ADDRESSES >>>>> >>>>> >>>>> Spam comes from /[email protected] >>>>> <mailto:/[email protected]> >>>>> <mailto:[email protected]>/ >>>>> >>>>> Add: /sender-blacklist-entry=.artgarfunkel.com/ >>>>> or: /[email protected] >>>>> <mailto:/[email protected]> >>>>> <mailto:[email protected]>/ >>>>> to your /spamdyke.conf/ >>>>> >>>>> Be shure that your user uses authentification! >>>>> >>>>> Regards, >>>>> Ulrich >>>>> >>>>> Am 15.12.2009 um 22:36 schrieb Magnus Ringdahl: >>>>> >>>>> >>>>>> Hi, and thanks for your reply. >>>>>> Should i use a "." instead of a "@" as a wildcard? >>>>>> >>>>>> Kind Regards >>>>>> M >>>>>> >>>>>> >>>>>> Ulrich C. Manns skrev: >>>>>> >>>>>>> Just add your domain to the senders blacklist with a . as wildchard. >>>>>>> Example: [email protected]<mailto:[email protected]> >>>>>>> <mailto:[email protected]> -> .spam.com >>>>>>> >>>>>>> Your Users should use authentification. So they can send e-mail >>>>>>> through spamdyke. >>>>>>> >>>>>>> Regards, >>>>>>> Ulrich >>>>>>> >>>>>>> Am 15.12.2009 um 21:54 schrieb Magnus Ringdahl: >>>>>>> >>>>>>> >>>>>>> >>>>>>>> Hi. >>>>>>>> I have been using spamdyke for quite some time now, and it reduces my >>>>>>>> spammails alot. >>>>>>>> But it have a hell of a problem with spammers (often viagra) the >>>>>>>> spoof >>>>>>>> the localdomains. >>>>>>>> I often get spammails where the sending address is the same as my >>>>>>>> receiving address. >>>>>>>> And i dint know how to block them. >>>>>>>> >>>>>>>> I have pasted my configurationfiles so you coould see if there is >>>>>>>> some >>>>>>>> issues. Using Debian and Plesk 9.2. >>>>>>>> >>>>>>>> spamdyke.conf >>>>>>>> ------------------------------------ >>>>>>>> log-level=verbose >>>>>>>> filter-level=normal >>>>>>>> local-domains-file=/var/qmail/control/rcpthosts >>>>>>>> max-recipients=20 >>>>>>>> idle-timeout-secs=60 >>>>>>>> graylist-level=only >>>>>>>> graylist-dir=/var/qmail/spamdyke/greylist >>>>>>>> graylist-min-secs=300 >>>>>>>> graylist-max-secs=1814400 >>>>>>>> >>>>>>>> sender-whitelist-file=/var/qmail/spamdyke/whitelisted_senders >>>>>>>> rdns-whitelist-file=/var/qmail/spamdyke/whitelisted_rdns >>>>>>>> ip-whitelist-file=/var/qmail/spamdyke/whitelisted_ip >>>>>>>> >>>>>>>> sender-blacklist-file=/var/qmail/spamdyke/blacklisted_senders >>>>>>>> recipient-blacklist-file=/var/qmail/spamdyke/blacklisted_recipients >>>>>>>> ip-blacklist-file=/var/qmail/spamdyke/blacklisted_ip >>>>>>>> dns-blacklist-entry=zen.spamhaus.org >>>>>>>> >>>>>>>> reject-empty-rdns >>>>>>>> reject-unresolvable-rdns >>>>>>>> greeting-delay-secs=5 >>>>>>>> reject-missing-sender-mx >>>>>>>> >>>>>>>> policy-url=http://www.your-domain-here.com/spam_policy >>>>>>>> -------------------------------------------------------------------- >>>>>>>> >>>>>>>> smtp_psa >>>>>>>> -------------------------------------------------- >>>>>>>> service smtp >>>>>>>> { >>>>>>>> socket_type = stream >>>>>>>> protocol = tcp >>>>>>>> wait = no >>>>>>>> disable = no >>>>>>>> user = root >>>>>>>> instances = UNLIMITED >>>>>>>> env = SMTPAUTH=1 >>>>>>>> server = /var/qmail/bin/tcp-env >>>>>>>> server_args = -Rt0 /usr/local/bin/spamdyke -f >>>>>>>> /etc/spamdyke.conf /var/qmail/bin/relaylock >>>>>>>> /var/qmail/bin/qmail-smtpd >>>>>>>> /var/qmail/bin/smtp_auth /var/qmail/bin/true >>>>>>>> /var/qmail/bin/cmd5checkpw >>>>>>>> /var/qmail/bin/true >>>>>>>> } >>>>>>>> --------------------------------------------------------- >>>>>>>> >>>>>>>> The whitelisted_ip file contains the mailservers ip-addresses. >>>>>>>> The blacklisted_senders file contains the localdomains (@domain.tld). >>>>>>>> The blacklisted_words contains alot of words like .t-dialin.net, >>>>>>>> .t-ipconnect.de, .in-addr.arpa, .dhcp, .net, in-addr.arpa, dhcp, >>>>>>>> dynamic, and so on. >>>>>>>> >>>>>>>> I understand the spamdyke filters that they work something like >>>>>>>> this. If >>>>>>>> the sending server is listed in whitelisted_ip the mail passes the >>>>>>>> filter. If its not listed in whitelisted_ip it then checks the >>>>>>>> blabklisted_senders if the sending address is listed it drops the >>>>>>>> mail. >>>>>>>> Is that correct? >>>>>>>> >>>>>>>> Here is a sample of the mail.log of a spammail that in my opinion >>>>>>>> should >>>>>>>> have been dropped but passes all filters. >>>>>>>> >>>>>>>> Dec 15 17:52:55 web01 spamdyke[24928]: TLS_ENCRYPTED from: >>>>>>>> (unknown) to: >>>>>>>> (unknown) origin_ip: 80.179.197.221 origin_rdns: >>>>>>>> 80.179.197.221.cable.012.net.il auth: (unknown) >>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: Handlers Filter >>>>>>>> before-queue for qmail started ... >>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: >>>>>>>> [email protected] >>>>>>>> <mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: Starting spf filter... >>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF result: neutral >>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF status: PASS >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 new msg 4252544 >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 info msg 4252544: >>>>>>>> bytes >>>>>>>> 2246 from<[email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]>> qp 24948 uid 2020 >>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: Handlers Filter >>>>>>>> before-local for qmail started ... >>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: >>>>>>>> [email protected] >>>>>>>> <mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: mailbox: >>>>>>>> /var/qmail/mailnames/domain.tld/info >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 starting delivery >>>>>>>> 2744: >>>>>>>> msg 4252544 to local [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 status: local 1/10 >>>>>>>> remote >>>>>>>> 0/20 >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 delivery 2744: >>>>>>>> success: >>>>>>>> did_0+0+2/ >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 status: local 0/10 >>>>>>>> remote >>>>>>>> 0/20 >>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 end msg 4252544 >>>>>>>> >>>>>>>> Dec 15 21:22:57 web01 /var/qmail/bin/relaylock[6350]: >>>>>>>> /var/qmail/bin/relaylock: mail from 125.25.15.31:52521 >>>>>>>> (125.25.15.31.adsl.dynamic.totbb.net) >>>>>>>> Dec 15 21:22:59 web01 spamdyke[6349]: TLS_ENCRYPTED from: >>>>>>>> (unknown) to: >>>>>>>> (unknown) origin_ip: 125.25.15.31 origin_rdns: >>>>>>>> 125.25.15.31.adsl.dynamic.totbb.net auth: (unknown) >>>>>>>> Dec 15 21:23:01 web01 qmail-queue-handlers[6354]: Handlers Filter >>>>>>>> before-queue for qmail started ... >>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Starting spf filter... >>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Error code: (2) Could not >>>>>>>> find a >>>>>>>> valid SPF record >>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Failed to query MAIL-FROM: No >>>>>>>> DNS data for 'domain.tld'. >>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF result: none >>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF status: PASS >>>>>>>> Dec 15 21:23:02 web01 qmail-queue[6356]: scan: the >>>>>>>> message(drweb.tmp.Wu6OR3) sent by [email protected] >>>>>>>> <mailto:[email protected]> >>>>>>>> <mailto:[email protected]> to >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> is passed >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 new msg 4253887 >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 info msg 4253887: >>>>>>>> bytes >>>>>>>> 2469 from<[email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]>> qp >>>>>>>> 6357 uid 2020 >>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: Handlers Filter >>>>>>>> before-local for qmail started ... >>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: >>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: mailbox: >>>>>>>> /var/qmail/mailnames/domain.tld/kundtjanst >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 starting delivery >>>>>>>> 2998: >>>>>>>> msg 4253887 to local [email protected] >>>>>>>> <mailto:[email protected]> >>>>>>>> <mailto:[email protected]> >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 status: local 1/10 >>>>>>>> remote >>>>>>>> 0/20 >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 delivery 2998: >>>>>>>> success: >>>>>>>> did_0+0+2/ >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 status: local 0/10 >>>>>>>> remote >>>>>>>> 0/20 >>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 end msg 4253887 >>>>>>>> >>>>>>>> How can i check that smtp_auth is working? Im starting to wonder that >>>>>>>> it's not. >>>>>>>> I hope someone have the time to answer. I have been struggling with >>>>>>>> this >>>>>>>> for a long time withput getting rid of those annoying mails. >>>>>>>> >>>>>>>> Kind Regards >>>>>>>> M >>>>>>>> >>>>>>>> >>>>>>>> Eduard Svarc skrev: >>>>>>>> >>>>>>>> >>>>>>>>> Hello, >>>>>>>>> >>>>>>>>> these keywords .net and .com are used just for testing if IP is in >>>>>>>>> reverse DNS listed. Is not done against normal reverse DNS >>>>>>>>> records for >>>>>>>>> servers like mail.somedomain.net<http://mail.somedomain.net> >>>>>>>>> <http://mail.somedomain.net>. So >>>>>>>>> in combination with keyword >>>>>>>>> reject-ip-in-cc-rdns and .net in file >>>>>>>>> /etc/spamdyke/ip-in-rdns-keyword-blacklist-file it will reject mail >>>>>>>>> from 242-29-179-94.pool.ukrtel.net >>>>>>>>> <http://242-29-179-94.pool.ukrtel.net> >>>>>>>>> <http://242-29-179-94.pool.ukrtel.net> because that sender will be >>>>>>>>> positively tested as not valid reverse DNS. >>>>>>>>> >>>>>>>>> use just net without that '.' is not suficient because SPAMDYKE use >>>>>>>>> this '.' as flag for testing end of string only. So listing .com and >>>>>>>>> .net does magic for SPAMDYKE when it testing IP in reverse DNS for >>>>>>>>> country code DNS, like .it,, .uk etc it does same for .com and .net. >>>>>>>>> Personally I did add into that file other ones special domains like >>>>>>>>> .eu, .org, .info, .biz. These should not be used by ISP >>>>>>>>> providers for >>>>>>>>> assigning reverse names, but who knows. Anyway it doesn't hurt my >>>>>>>>> configuration and I'm preparded. >>>>>>>>> >>>>>>>>> Eduard Švarc >>>>>>>>> >>>>>>>>> DATA Intertech s.r.o. >>>>>>>>> Kladenská 46 >>>>>>>>> 160 00 Praha 6 >>>>>>>>> Czech Republic >>>>>>>>> tel. +420-235365267, fax +420-235361446 >>>>>>>>> >>>>>>>>> [email protected] >>>>>>>>> <mailto:[email protected]> >>>>>>>>> <mailto:[email protected]> wrote on 14.12.2009 >>>>>>>>> 09:55:45: >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> thanks Eduard Švarc >>>>>>>>>> >>>>>>>>>> Same query as david stiller raised, .com, .net are valid domain >>>>>>>>>> right? >>>>>>>>>> >>>>>>>>>> also >>>>>>>>>> >>>>>>>>>> @400000004b25fa572bd181a4 CHKUSER accepted rcpt: from >>>>>>>>>> <fx...@bmelaw. >>>>>>>>>> com::> remote<microsof-7b1919:unknown:94.179.29.242> rcpt >>>>>>>>>> <[email protected]<mailto:[email protected]> >>>>>>>>>> <mailto:[email protected]>> : found existing recipient >>>>>>>>>> @400000004b25fa572bd2316c spamdyke[27021]: ALLOWED from: >>>>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>>>> <mailto:[email protected]> to: >>>>>>>>>> [email protected]<mailto:[email protected]> >>>>>>>>>> <mailto:[email protected]> origin_ip: 94.179. >>>>>>>>>> 29.242 origin_rdns: 242-29-179-94.pool.ukrtel.net >>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net> >>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net> auth: (unknown) >>>>>>>>>> >>>>>>>>>> the above ip is listed in rbl , >>>>>>>>>> >>>>>>>>>> IP Address Lookup >>>>>>>>>> >>>>>>>>>> [image removed] >>>>>>>>>> >>>>>>>>>> 94.179.29.242 is not listed in the SBL >>>>>>>>>> 94.179.29.242 is listed in the PBL, in the following records: >>>>>>>>>> PBL239543 >>>>>>>>>> 94.179.29.242 is not listed in the XBL >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> this doesnt look like false positive >>>>>>>>>> >>>>>>>>>> From: Eduard Svarc<[email protected] >>>>>>>>>> <mailto:[email protected]> <mailto:[email protected]>> >>>>>>>>>> To: spamdyke users<[email protected] >>>>>>>>>> <mailto:[email protected]> >>>>>>>>>> <mailto:[email protected]>> >>>>>>>>>> Sent: Mon, December 14, 2009 12:48:07 PM >>>>>>>>>> Subject: Re: [spamdyke-users] spamdyke configuration finetuneing >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Hello, >>>>>>>>>> >>>>>>>>>> I see you have two things out. 1st you using RBLS, that could give >>>>>>>>>> you a lot positive false spam. 2nd you completely have >>>>>>>>>> commented out >>>>>>>>>> best thing in SPAMDYKE. Is sniffing IPs in reverse DNS. Most of >>>>>>>>>> bots >>>>>>>>>> and spams comming from Internet zombies. Here are my advices: >>>>>>>>>> >>>>>>>>>> 1 - comment out dns-blacklist-entry=zen.spamhaus.org >>>>>>>>>> 2 - uncoment reject-empty-rdns, reject-ip-in-cc-rdns, reject- >>>>>>>>>> missing-sender-mx and reject-unresolvable-rdns >>>>>>>>>> 3- into /etc/spamdyke/blacklist_recipients add your domain in >>>>>>>>>> format >>>>>>>>>> @your-domain (it will block all mails like to: n...@your-domain >>>>>>>>>> from: >>>>>>>>>> n...@your-domain) >>>>>>>>>> 4- into /etc/spamdyke/ip-in-rdns-keyword-blacklist-file put these >>>>>>>>>> >>>>>>>>>> >>>>>>>>> words : >>>>>>>>> >>>>>>>>> >>>>>>>>>> dsl >>>>>>>>>> .com >>>>>>>>>> .net >>>>>>>>>> broadband >>>>>>>>>> dynamic >>>>>>>>>> >>>>>>>>>> I could guarantee you will fall bellow 1% of SPAM with nearly zero >>>>>>>>>> false positives. Of course someone who can't follow certain >>>>>>>>>> guidelines for theirs servers will not be able to send you e-mails >>>>>>>>>> at all. But you can easily handle it by adding IP's in >>>>>>>>>> /etc/spamdyke/whitelist_ip or adding senders into >>>>>>>>>> /etc/spamdyke/whitelist_senders >>>>>>>>>> >>>>>>>>>> I stop using any RBLS services ages ago, they are way unreliable. >>>>>>>>>> >>>>>>>>>> Good luck, >>>>>>>>>> Eduard Švarc >>>>>>>>>> >>>>>>>>>> DATA Intertech s.r.o. >>>>>>>>>> Kladenská 46 >>>>>>>>>> 160 00 Praha 6 >>>>>>>>>> Czech Republic >>>>>>>>>> tel. +420-235365267, fax +420-235361446 >>>>>>>>>> > _______________________________________________ > spamdyke-users mailing list > [email protected] > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > > _______________________________________________ spamdyke-users mailing list [email protected] http://www.spamdyke.org/mailman/listinfo/spamdyke-users
