> > I "filter" only with blacklisting and greylisting. Although they can only > > be done at a boundary mail exchanger, I find it invaluable that there's > > really no such thing as a false positive; if legitimate mail bounces then > > it, well... bounces. > > If the mail really bounces (is returned to the real sender) then the > sender can take action. But if you accept the email, filter it, and > then try to do some sort of semi bounce by looking at the header > addresses, mail will eventually be lost.
If you accept the mail and then "semi bounce" it means you are generating the bounce message, and are responsible for the inevitable backscatter. It's a bad idea, IMHO. In my experience most spam is transmitted by illegitimate hosts, and refusing to accept it has the correct result of a bounce never being generated (because the sending host knows better). > The milters used are milter-greylist, spamass-milter and clamav-milter > in that order. Greylisting stops most of the junk mail, but enough get > through to need a dedicated server to run spamassassin and clamav. Greylisting won't stop the viruses that come via the (legitimate) mail exchangers of infected machines. I'm surprised you need spamassassin though. Do you have any data on what greylisting misses that spamassassin catches? Is there really that much of it (per user)? Cheers, - Joel _______________________________________________ Imap-uw mailing list Imap-uw@u.washington.edu https://mailman1.u.washington.edu/mailman/listinfo/imap-uw