When I first setup SpamDyke I had to modify my QMail run file to make sure it 
passed the sending IP. You might check that.

- Denny

 

 

 

-----Original Message-----
From: JP Kelly <[email protected]>
To: spamdyke users <[email protected]>
Sent: Fri, Aug 23, 2013 1:15 pm
Subject: Re: [spamdyke-users] rDNS always shows up as unknown


That was not set in my config but it is still not working after setting 
"dns-server-ip" to my DNS servers ip.
Does this setting need the port added to the ip address? if so is the format 
xx.xx.xx.xx:port?

from the maillog it looks like qmail is able to resolve rDNS:
Aug 23 10:59:38 dv2 /var/qmail/bin/relaylock[22273]: /var/qmail/bin/relaylock: 
mail from 201.151.76.82:36001 (static-201-151-76-82.alestra.net.mx)

but spamdyke comes up empty for rDNS (along with some other empty info).
Aug 23 10:59:44 dv2 spamdyke[22273]: DENIED_GRAYLISTED from: 
[email protected] to: [email protected] origin_ip: 
201.151.76.82 origin_rdns: (unknown) auth: (unknown) encryption: (none) reason: 
(empty)

Here is my complete /etc/spamdyke.conf file:

# cat /etc/spamdyke.conf
# This is an example spamdyke configuration file for spamdyke version 4.3.1.
#
# Without editing, this file will do nothing -- every available option is
# commented out.  To enable options, edit the values and remove the comment
# markers at the beginning of the lines (#).
# See the README.html file in spamdyke's documentation directory for a full
# description of each option.  The documentation is also available on spamdyke's
# website:
#   http://www.spamdyke.org/

################################################################################
# Sets spamdyke's overall filter behavior.
# Available values: allow-all, normal, require-auth, reject-all
# Default: normal
filter-level=normal
# Delays the SMTP greeting banner for SECS seconds.  A value of 0 disables this
# feature.
# Default: 0
#greeting-delay-secs=SECS
# Limit incoming messages to NUM recipients.  A value of 0 disables this
max-recipients=15
# Drop superuser privileges and run as USER instead.
# Default: none
#run-as-user=USER[:GROUP]
# DNS TESTS
# Reject connections from remote servers without rDNS names.
# Default: no
# Reject connections from servers with rDNS names that contain their IP address
# and end in a two-character country code.
# Reject messages from sender whose domain names have no MX records.
# Reject connections from servers with rDNS names that do not resolve to IP
# addresses.
# Default:no
# LOGGING
# Controls the amount (and detail) of the log messages spamdyke produces.
# Available values: none, error, info, verbose, debug, excessive
# Default: error
log-level=debug
# Controls where spamdyke's log messages are sent.
# Available values: syslog, stderr
# Default: syslog
log-target=syslog
# Outputs all SMTP data into files in DIR.
#full-log-dir=DIR
# CONFIGURATION FILES
# Configuration files can include other configuration files.
#config-file=FILE
# Configuration directories are very powerful but can also be very complicated;
# don't use them if you don't need to.
# Controls how configuration directories are searched.
# Available values: first, all-ip, all-rdns, all-sender, all-recipient
# Default: first
# TIMEOUTS
# Close the connection after SECS seconds, regardless of activity.  A value of
# 0 disables this feature.
#connection-timeout-secs=SECS
# Close the connection after SECS seconds of inactivity.  A value of 0 disables
# this feature.
#idle-timeout-secs=SECS
# SENDERS AND RECIPIENTS
# Reject all recipients that exactly match the sender address.
# LOCAL BLACKLISTS
# Reject connections from IP addresses that match IPADDRESS.
#ip-blacklist-entry=IPADDRESS
# Reject connections from IP addresses that match entries in FILE.
ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
# Reject connections from rDNS names that match NAME.
# Reject connections from rDNS names that match entries in FILE.
#rdns-blacklist-file=FILE
# Reject connections from rDNS names that match files in DIR.
#rdns-blacklist-dir=DIR
# Reject all messages sent to recipient ADDRESS.
#recipient-blacklist-entry=ADDRESS
# Reject all messages sent to any recipient address listed in FILE.
recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
# Reject all messages sent from sender ADDRESS.
#sender-blacklist-entry=ADDRESS
# Reject all messages sent from any sender address listed in FILE.
sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders
# Reject connections from rDNS names that contain their IP address and KEYWORD.
#ip-in-rdns-keyword-blacklist-entry=KEYWORD
# Reject connections from rDNS names that contain their IP address and a keyword
# in FILE.
ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords
# Reject all messages with header lines that match VALUE.
#header-blacklist-entry=VALUE
# Reject all messages sent header lines that match entries in FILE.
#header-blacklist-file=FILE
# LOCAL WHITELISTS
# Whitelist connections from IP addresses that match IPADDRESS.
#ip-whitelist-entry=IPADDRESS
# Whitelist connections from IP addresses that match entries in FILE.
ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
# Whitelist connections from rDNS names that match NAME.
# Whitelist connections from rDNS names that match entries in FILE.
rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
# Whitelist connections from rDNS names that match files in DIR.
#rdns-whitelist-dir=DIR
# Whitelist all messages sent to recipient ADDRESS.
#recipient-whitelist-entry=ADDRESS
# Whitelist all messages sent to any recipient address listed in FILE.
#recipient-whitelist-file=FILE
# Whitelist all messages sent from sender ADDRESS.
#sender-whitelist-entry=ADDRESS
# Whitelist all messages sent from any sender address listed in FILE.
sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders
# Whitelist connections from rDNS names that contain their IP address and
# KEYWORD.
#ip-in-rdns-keyword-whitelist-entry=KEYWORD
# Whitelist connections from rDNS names that contain their IP address and a
# keyword in FILE.
#ip-in-rdns-keyword-whitelist-file=FILE
# DNS-BASED BLACKLISTS
# Check a DNS RBL.
# Check all DNS RBLs listed in FILE.
#dns-blacklist-file=FILE
# Check an RHSBL.
# Check all RHSBLs listed in FILE.
#rhs-blacklist-file=FILE
# DNS-BASED WHITELISTS
# Check a DNS whitelist.
# Check all DNS whitelist listed in a file.
#dns-whitelist-file=FILE
# Check an RHS whitelist.
#rhs-whitelist-entry=RHSBL
# Check all RHS whitelists listed in FILE.
#rhs-whitelist-file=FILE
# GRAYLISTING
# Controls the behavior of spamdyke's graylist filter.
# Available values: none, always, always-create-dir, only, only-create-dir
graylist-level=always-create-dir
# Create the graylist files in DIR.
graylist-dir=/var/qmail/spamdyke/greylist
# Invalidate graylist entries after SECS seconds.  A value of 0 deactivates this
#graylist-max-secs=SECS
# Graylist entries are not valid until they are SECS seconds old.  A value of 0
# deactivates this feature.
#graylist-min-secs=SECS
# Reverse the current graylist behavior for incoming connections whose IP
# addresses match IPADDRESS.
#graylist-exception-ip-entry=IPADDRESS
# Read a list of IP addresses from a file and reverse the current graylist
# behavior for any connections from matching IP addresses.
#graylist-exception-ip-file=FILE
# Reverse the current graylist behavior for incoming connections whose rDNS
# names match NAME.
# Default: none.
#graylist-exception-rdns-entry=NAME
# Read a list of rDNS names from a file and reverse the current graylist
# behavior for any connections from matching rDNS names.
#graylist-exception-rdns-file=FILE
# Search an rDNS directory and reverse the current graylist behavior for any
# connections from matching rDNS names.
#graylist-exception-rdns-dir=DIR
# SMTP AUTHENTICATION
# Controls the way spamdyke offers, supports and processes SMTP authentication.
# Available values: none, observe, ondemand, ondemand-encrypted, always,
# always-encrypted
# Default: observe
smtp-auth-level=ondemand-encrypted
# Process authentication by running COMMAND, if necessary.
smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true 
/var/qmail/bin/cmd5checkpw /bin/true
# Use NAME as the local server's name during CRAM-MD5 authentication.
# Default: unknown.server.unknown.domain
#hostname=NAME
# Read the local server's name from the first line of FILE for use during
# CRAM-MD5 authentication.
# Default: /var/qmail/control/me
#hostname-file=FILE
# Run COMMAND and read the local server's name from the first line of output
# for use during CRAM-MD5 authentication.
#hostname-command=COMMAND
# TLS / SSL
# Controls the way spamdyke offers and supports TLS or SMTPS.
# Available values: none, smtp, smtp-no-passthrough, smtps
#tls-level=VALUE
# Read SSL certificate from FILE.
#tls-certificate-file=/var/qmail/control/servercert.pem
# Read SSL certificate private key from FILE.
#tls-privatekey-file=FILE
# Decrypt SSL certificate private key using PASSWORD.
#tls-privatekey-password=PASSWORD
# Read the password for the SSL certificate private key from the first line of
# FILE.
#tls-privatekey-password-file=FILE
# Only use the ciphers in LIST during TLS or SMTPS.
# Default: DEFAULT
#tls-cipher-list=LIST
# RELAYING OPTIONS
# Sets spamdyke's relay protection level.
# Available values: block-all, no-check, normal, allow-all
#relay-level=VALUE
# spamdyke's relay protection requires reading qmail's access file.
# This file is usually: /etc/tcp.smtp
#access-file=FILE
# Several features require access to the list of locally hosted domains.
# This file is usually: /var/qmail/control/rcpthosts
local-domains-file=/var/qmail/control/rcpthosts
# Adds a single domain to spamdyke's list of locally hosted domains.
#local-domains-entry=DOMAIN
# DNS OPTIONS
# These options should only be used if spamdyke's default behavior is causing
# problems.
# Sets the aggressiveness of spamdyke's DNS resolver.
# Available values: none, normal, aggressive
# Default: aggressive
dns-level=aggressive
# Adds a nameserver to spamdyke's list of primary nameservers.
# Default: none (reads nameservers from /etc/resolv.conf)
dns-server-ip-primary=<REDACTED>
# Adds a nameserver to spamdyke's list of secondary nameservers.
dns-server-ip=<REDACTED>
# Sets the number of times spamdyke queries its primary nameservers.
# Default: 1
#dns-max-retries-primary=NUM
# Sets the total number of times spamdyke queries nameservers.
# Default: 3
#dns-max-retries-total=NUM
# Sets the total number of seconds spamdyke will spend on any DNS query.
# Default: 30
#dns-timeout-secs=SECS
# Sets the name of the file to read for the list of default nameservers.
# Default: /etc/resolv.conf
#dns-resolv-conf=FILE
# Controls whether TCP is used for DNS queries (when needed).
# Available values: none, normal
dns-tcp=normal
# Controls how DNS spoofing is handled.
# Available values: accept-all, accept-same-ip, accept-same-port, reject
# Default: accept-all
#dns-spoof=VALUE
# Controls the types of queries performed when looking up an IP address.
# Available values: a, cname
# Default: a + cname
dns-query-type-a=a
# Controls the types of queries performed when looking up a mail exchanger.
# Available values: a, cname, mx
# Default: a + cname + mx
dns-query-type-mx=mx
# Controls the types of queries performed when looking up a reverse DNS record.
# Available values: cname, ptr
# Default: cname + ptr
dns-query-type-ptr=cname
# Controls the types of queries performed when looking up a records in DNS RBLs,
# DNS RWLs, DNS RHSBLs and DNS RHSWLs.
# Available values: a, cname, txt
# Default: a + cname + txt
#dns-query-type-rbl=VALUE
# REJECTION MESSAGES
# Append URL to the end of every rejection message sent to the remote server.
#policy-url=URL
# Use TEXT as the rejection message when a connection is blocked because the
# remote server matches a line in an access file that denies access.
# Default: Refused.
#MySQL-Logging:
config-mysql-database=<REDACTED>
config-mysql-username=<REDACTED>
config-mysql-password=<REDACTED>
graylist-level=always-create-dir
graylist-min-secs=15
greeting-delay-secs=5
connection-timeout-secs=5000
idle-timeout-secs=180
graylist-max-secs=1814400
config-dir=/var/qmail/spamdyke/conf.d
config-dir=/var/qmail/spamdyke/conf.s
dns-blacklist-entry=zen.spamhaus.org
#dns-blacklist-entry=bl.spamcop.net
#dns-blacklist-entry=bogons.cymru.com
dns-whitelist-entry=list.dnswl.org


On Aug 23, 2013, at 3:28 AM, Gary Gendel <[email protected]> wrote:

> Did you set "dns-server-ip" in your spamdyke.conf file?  If so, it it 
> pointing to the right server?
> 
> On 08/23/2013 04:58 AM, JP Kelly wrote:
>> I am using spamdyke 4.3.1+TLS+CONFIGTEST+DEBUG+MYSQL[haggybear.de]
>> On Plesk 11 CentOS 5
>> All of the reverse DNS entries show up as unknown even though I can resolve 
the IP addresses to valid rDNS hosts.
>> As far as I can tell I have the config file correct but obviously something 
is wrong.
>> /etc/resolve.conf is fine. I can resolve the hosts from the machine spamdyke 
is running on using the command 'host <IP ADDRESS>'.
>> Any ideas how to troubleshoot this?
>> TIA
>> JP Kelly
>> 
>> _______________________________________________

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

 
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to