Am 28.03.2016 um 20:57 schrieb RW:
On Mon, 28 Mar 2016 19:43:10 +0200
Reindl Harald wrote:

Am 28.03.2016 um 19:29 schrieb Alex:
We're seeing an increasing number of quarantined mail resulting from
compromised desktops being listed in RCVD_IN_SBLXBL. This in turn
leads to an increase in the number of calls to the helpdesk with
"where's my mail".

This is typically the first Received header in the email, so not
something that is being rejected at the SMTP level.

Is there some way to reject this mail at the SMTP level before it's
accepted, or something spamassassin/amavis can do after it's
received to notify the sender, without it becoming a backscatter
issue to make my job easier?

I'm already using postscreen with zen to block at the SMTP level

we disabled all builtin DNSBL tests (except mailspike) from the very
beginning and feeding postscreen and spamassassin from the same
database with adopted scores

The question was about deep hits on XBL and SBL that don't hit the
last-external zen lookup.

Rejecting on deep XBL hits would be risky because they can be on dynamic
IP addresses that have been reassigned

you know my strong opinion against any deep-header-tests
it's also solved by doing what i said above

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to