That was not set in my config but it is still not working after setting "dns-server-ip" to my DNS servers ip. Does this setting need the port added to the ip address? if so is the format xx.xx.xx.xx:port?
from the maillog it looks like qmail is able to resolve rDNS: Aug 23 10:59:38 dv2 /var/qmail/bin/relaylock[22273]: /var/qmail/bin/relaylock: mail from 201.151.76.82:36001 (static-201-151-76-82.alestra.net.mx) but spamdyke comes up empty for rDNS (along with some other empty info). Aug 23 10:59:44 dv2 spamdyke[22273]: DENIED_GRAYLISTED from: [email protected] to: [email protected] origin_ip: 201.151.76.82 origin_rdns: (unknown) auth: (unknown) encryption: (none) reason: (empty) Here is my complete /etc/spamdyke.conf file: # cat /etc/spamdyke.conf # This is an example spamdyke configuration file for spamdyke version 4.3.1. # # Without editing, this file will do nothing -- every available option is # commented out. To enable options, edit the values and remove the comment # markers at the beginning of the lines (#). # See the README.html file in spamdyke's documentation directory for a full # description of each option. The documentation is also available on spamdyke's # website: # http://www.spamdyke.org/ ################################################################################ # Sets spamdyke's overall filter behavior. # Available values: allow-all, normal, require-auth, reject-all # Default: normal filter-level=normal # Delays the SMTP greeting banner for SECS seconds. A value of 0 disables this # feature. # Default: 0 #greeting-delay-secs=SECS # Limit incoming messages to NUM recipients. A value of 0 disables this max-recipients=15 # Drop superuser privileges and run as USER instead. # Default: none #run-as-user=USER[:GROUP] # DNS TESTS # Reject connections from remote servers without rDNS names. # Default: no # Reject connections from servers with rDNS names that contain their IP address # and end in a two-character country code. # Reject messages from sender whose domain names have no MX records. # Reject connections from servers with rDNS names that do not resolve to IP # addresses. # Default:no # LOGGING # Controls the amount (and detail) of the log messages spamdyke produces. # Available values: none, error, info, verbose, debug, excessive # Default: error log-level=debug # Controls where spamdyke's log messages are sent. # Available values: syslog, stderr # Default: syslog log-target=syslog # Outputs all SMTP data into files in DIR. #full-log-dir=DIR # CONFIGURATION FILES # Configuration files can include other configuration files. #config-file=FILE # Configuration directories are very powerful but can also be very complicated; # don't use them if you don't need to. # Controls how configuration directories are searched. # Available values: first, all-ip, all-rdns, all-sender, all-recipient # Default: first # TIMEOUTS # Close the connection after SECS seconds, regardless of activity. A value of # 0 disables this feature. #connection-timeout-secs=SECS # Close the connection after SECS seconds of inactivity. A value of 0 disables # this feature. #idle-timeout-secs=SECS # SENDERS AND RECIPIENTS # Reject all recipients that exactly match the sender address. # LOCAL BLACKLISTS # Reject connections from IP addresses that match IPADDRESS. #ip-blacklist-entry=IPADDRESS # Reject connections from IP addresses that match entries in FILE. ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip # Reject connections from rDNS names that match NAME. # Reject connections from rDNS names that match entries in FILE. #rdns-blacklist-file=FILE # Reject connections from rDNS names that match files in DIR. #rdns-blacklist-dir=DIR # Reject all messages sent to recipient ADDRESS. #recipient-blacklist-entry=ADDRESS # Reject all messages sent to any recipient address listed in FILE. recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients # Reject all messages sent from sender ADDRESS. #sender-blacklist-entry=ADDRESS # Reject all messages sent from any sender address listed in FILE. sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders # Reject connections from rDNS names that contain their IP address and KEYWORD. #ip-in-rdns-keyword-blacklist-entry=KEYWORD # Reject connections from rDNS names that contain their IP address and a keyword # in FILE. ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords # Reject all messages with header lines that match VALUE. #header-blacklist-entry=VALUE # Reject all messages sent header lines that match entries in FILE. #header-blacklist-file=FILE # LOCAL WHITELISTS # Whitelist connections from IP addresses that match IPADDRESS. #ip-whitelist-entry=IPADDRESS # Whitelist connections from IP addresses that match entries in FILE. ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip # Whitelist connections from rDNS names that match NAME. # Whitelist connections from rDNS names that match entries in FILE. rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns # Whitelist connections from rDNS names that match files in DIR. #rdns-whitelist-dir=DIR # Whitelist all messages sent to recipient ADDRESS. #recipient-whitelist-entry=ADDRESS # Whitelist all messages sent to any recipient address listed in FILE. #recipient-whitelist-file=FILE # Whitelist all messages sent from sender ADDRESS. #sender-whitelist-entry=ADDRESS # Whitelist all messages sent from any sender address listed in FILE. sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders # Whitelist connections from rDNS names that contain their IP address and # KEYWORD. #ip-in-rdns-keyword-whitelist-entry=KEYWORD # Whitelist connections from rDNS names that contain their IP address and a # keyword in FILE. #ip-in-rdns-keyword-whitelist-file=FILE # DNS-BASED BLACKLISTS # Check a DNS RBL. # Check all DNS RBLs listed in FILE. #dns-blacklist-file=FILE # Check an RHSBL. # Check all RHSBLs listed in FILE. #rhs-blacklist-file=FILE # DNS-BASED WHITELISTS # Check a DNS whitelist. # Check all DNS whitelist listed in a file. #dns-whitelist-file=FILE # Check an RHS whitelist. #rhs-whitelist-entry=RHSBL # Check all RHS whitelists listed in FILE. #rhs-whitelist-file=FILE # GRAYLISTING # Controls the behavior of spamdyke's graylist filter. # Available values: none, always, always-create-dir, only, only-create-dir graylist-level=always-create-dir # Create the graylist files in DIR. graylist-dir=/var/qmail/spamdyke/greylist # Invalidate graylist entries after SECS seconds. A value of 0 deactivates this #graylist-max-secs=SECS # Graylist entries are not valid until they are SECS seconds old. A value of 0 # deactivates this feature. #graylist-min-secs=SECS # Reverse the current graylist behavior for incoming connections whose IP # addresses match IPADDRESS. #graylist-exception-ip-entry=IPADDRESS # Read a list of IP addresses from a file and reverse the current graylist # behavior for any connections from matching IP addresses. #graylist-exception-ip-file=FILE # Reverse the current graylist behavior for incoming connections whose rDNS # names match NAME. # Default: none. #graylist-exception-rdns-entry=NAME # Read a list of rDNS names from a file and reverse the current graylist # behavior for any connections from matching rDNS names. #graylist-exception-rdns-file=FILE # Search an rDNS directory and reverse the current graylist behavior for any # connections from matching rDNS names. #graylist-exception-rdns-dir=DIR # SMTP AUTHENTICATION # Controls the way spamdyke offers, supports and processes SMTP authentication. # Available values: none, observe, ondemand, ondemand-encrypted, always, # always-encrypted # Default: observe smtp-auth-level=ondemand-encrypted # Process authentication by running COMMAND, if necessary. smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw /bin/true # Use NAME as the local server's name during CRAM-MD5 authentication. # Default: unknown.server.unknown.domain #hostname=NAME # Read the local server's name from the first line of FILE for use during # CRAM-MD5 authentication. # Default: /var/qmail/control/me #hostname-file=FILE # Run COMMAND and read the local server's name from the first line of output # for use during CRAM-MD5 authentication. #hostname-command=COMMAND # TLS / SSL # Controls the way spamdyke offers and supports TLS or SMTPS. # Available values: none, smtp, smtp-no-passthrough, smtps #tls-level=VALUE # Read SSL certificate from FILE. #tls-certificate-file=/var/qmail/control/servercert.pem # Read SSL certificate private key from FILE. #tls-privatekey-file=FILE # Decrypt SSL certificate private key using PASSWORD. #tls-privatekey-password=PASSWORD # Read the password for the SSL certificate private key from the first line of # FILE. #tls-privatekey-password-file=FILE # Only use the ciphers in LIST during TLS or SMTPS. # Default: DEFAULT #tls-cipher-list=LIST # RELAYING OPTIONS # Sets spamdyke's relay protection level. # Available values: block-all, no-check, normal, allow-all #relay-level=VALUE # spamdyke's relay protection requires reading qmail's access file. # This file is usually: /etc/tcp.smtp #access-file=FILE # Several features require access to the list of locally hosted domains. # This file is usually: /var/qmail/control/rcpthosts local-domains-file=/var/qmail/control/rcpthosts # Adds a single domain to spamdyke's list of locally hosted domains. #local-domains-entry=DOMAIN # DNS OPTIONS # These options should only be used if spamdyke's default behavior is causing # problems. # Sets the aggressiveness of spamdyke's DNS resolver. # Available values: none, normal, aggressive # Default: aggressive dns-level=aggressive # Adds a nameserver to spamdyke's list of primary nameservers. # Default: none (reads nameservers from /etc/resolv.conf) dns-server-ip-primary=<REDACTED> # Adds a nameserver to spamdyke's list of secondary nameservers. dns-server-ip=<REDACTED> # Sets the number of times spamdyke queries its primary nameservers. # Default: 1 #dns-max-retries-primary=NUM # Sets the total number of times spamdyke queries nameservers. # Default: 3 #dns-max-retries-total=NUM # Sets the total number of seconds spamdyke will spend on any DNS query. # Default: 30 #dns-timeout-secs=SECS # Sets the name of the file to read for the list of default nameservers. # Default: /etc/resolv.conf #dns-resolv-conf=FILE # Controls whether TCP is used for DNS queries (when needed). # Available values: none, normal dns-tcp=normal # Controls how DNS spoofing is handled. # Available values: accept-all, accept-same-ip, accept-same-port, reject # Default: accept-all #dns-spoof=VALUE # Controls the types of queries performed when looking up an IP address. # Available values: a, cname # Default: a + cname dns-query-type-a=a # Controls the types of queries performed when looking up a mail exchanger. # Available values: a, cname, mx # Default: a + cname + mx dns-query-type-mx=mx # Controls the types of queries performed when looking up a reverse DNS record. # Available values: cname, ptr # Default: cname + ptr dns-query-type-ptr=cname # Controls the types of queries performed when looking up a records in DNS RBLs, # DNS RWLs, DNS RHSBLs and DNS RHSWLs. # Available values: a, cname, txt # Default: a + cname + txt #dns-query-type-rbl=VALUE # REJECTION MESSAGES # Append URL to the end of every rejection message sent to the remote server. #policy-url=URL # Use TEXT as the rejection message when a connection is blocked because the # remote server matches a line in an access file that denies access. # Default: Refused. #MySQL-Logging: config-mysql-database=<REDACTED> config-mysql-username=<REDACTED> config-mysql-password=<REDACTED> graylist-level=always-create-dir graylist-min-secs=15 greeting-delay-secs=5 connection-timeout-secs=5000 idle-timeout-secs=180 graylist-max-secs=1814400 config-dir=/var/qmail/spamdyke/conf.d config-dir=/var/qmail/spamdyke/conf.s dns-blacklist-entry=zen.spamhaus.org #dns-blacklist-entry=bl.spamcop.net #dns-blacklist-entry=bogons.cymru.com dns-whitelist-entry=list.dnswl.org On Aug 23, 2013, at 3:28 AM, Gary Gendel <[email protected]> wrote: > Did you set "dns-server-ip" in your spamdyke.conf file? If so, it it > pointing to the right server? > > On 08/23/2013 04:58 AM, JP Kelly wrote: >> I am using spamdyke 4.3.1+TLS+CONFIGTEST+DEBUG+MYSQL[haggybear.de] >> On Plesk 11 CentOS 5 >> All of the reverse DNS entries show up as unknown even though I can resolve >> the IP addresses to valid rDNS hosts. >> As far as I can tell I have the config file correct but obviously something >> is wrong. >> /etc/resolve.conf is fine. I can resolve the hosts from the machine spamdyke >> is running on using the command 'host <IP ADDRESS>'. >> Any ideas how to troubleshoot this? >> TIA >> JP Kelly >> >> _______________________________________________ _______________________________________________ spamdyke-users mailing list [email protected] http://www.spamdyke.org/mailman/listinfo/spamdyke-users
