On Mon, 22 Mar 2010, micah anderson wrote:
Many users are complaining and when I finally get some useful messages
with headers to analyze I am finding something like the following:
X-Spam-Report:
* 3.3 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
* [213.6.61.151 listed in zen.dnsbl]
* 1.0 RCVD_IN_BRBL RBL: Received via relay listed in Barracuda RBL
* [213.6.61.151 listed in b.barracudacentral.org]
* 1.4 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT
* [213.6.61.151 listed in bb.barracudacentral.org]
* 0.0 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP
address
* [213.6.61.151 listed in dnsbl.sorbs.net]
* 0.8 SPF_NEUTRAL SPF: sender does not match SPF record (neutral)
* 5.0 BOTNET Relay might be a spambot or virusbot
*
[botnet0.8,ip=213.6.61.151,rdns=a61-151.adsl.paltel.net,maildomain=palnet.com,client,ipinhostname,clientwords]
* 1.0 RDNS_DYNAMIC Delivered to internal network by host with
* dynamic-looking rDNS
This brings it over the 8 threshold, although it is a legitimate email
From a user who has unfortunately been saddled with a dynamic IP that
previously was used by a spammer.
If your users are connecting from random public Internet dynamic-IP hosts,
are you using SMTP authentication? If so, there should be data about that
authentication in the Received: headers that you can use within SA to
whitelist them and offset legitimate results like those above.
--
John Hardin KA7OHZ http://www.impsec.org/~jhardin/
jhar...@impsec.org FALaholic #11174 pgpk -a jhar...@impsec.org
key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
Mine eyes have seen the horror of the voting of the horde;
They've looted the fromagerie where guv'ment cheese is stored;
If war's not won before the break they grow so quickly bored;
Their vote counts as much as yours. -- Tam
-----------------------------------------------------------------------
164 days since President Obama won the Nobel "Not George W. Bush" prize