On 21/05/2010 16:15, b.hinzer wrote:
> Strange thing here now. I blacklisted my complete domain by setting
> wildcard in whitelist_senders:
> 
> @web-vision.de
> 
>  
> 
> But still a spam email with a faked email address came through.
> 
> Is it possible that it just skipped spamdykes tests by using a TLS
> connection somehow?
> 
>  
> 
> What I see from logs is this:
> 
>  
> 
> May 21 05:07:14 vps106 spamdyke[6043]: TLS_ENCRYPTED from: (unknown) to:
> (unknown) origin_ip: 190.255.81.46 origin_rdns: (unknown) auth: (unknown)

This happens when your spamdyke has no TLS options set, so when it gets
a connection trying to use TLS (via STARTTLS), it passes it straight off
to qmail and a lot of the filters won't work.

If you set:
tls-level=smtp
tls-certificate-file=/var/qmail/control/servercert.pem

then spamdyke will handle the TLS decryption itself instead.

Cheers,
Dave
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to