On 21/05/2010 16:15, b.hinzer wrote: > Strange thing here now. I blacklisted my complete domain by setting > wildcard in whitelist_senders: > > @web-vision.de > > > > But still a spam email with a faked email address came through. > > Is it possible that it just skipped spamdykes tests by using a TLS > connection somehow? > > > > What I see from logs is this: > > > > May 21 05:07:14 vps106 spamdyke[6043]: TLS_ENCRYPTED from: (unknown) to: > (unknown) origin_ip: 190.255.81.46 origin_rdns: (unknown) auth: (unknown)
This happens when your spamdyke has no TLS options set, so when it gets a connection trying to use TLS (via STARTTLS), it passes it straight off to qmail and a lot of the filters won't work. If you set: tls-level=smtp tls-certificate-file=/var/qmail/control/servercert.pem then spamdyke will handle the TLS decryption itself instead. Cheers, Dave _______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users