Sam Clippinger wrote:
> To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The
> default configuration of spamdyke (as installed by QTP) does not include
> Spamhaus, however.

I beg your pardon. ;) Here are the default RBLs as installed by QTP:
check-dnsrbl=zen.spamhaus.org
check-dnsrbl=bl.spamcop.net
check-dnsrbl=list.dsbl.org

> If you are using spamdyke version 3.1.x, edit the configuration file
> /etc/spamdyke/spamdyke.conf and add the following line:
>    check-dnsrbl=zen.spamhaus.org
> 
> If you are using spamdyke version 4.x, edit the configuration file
> /etc/spamdyke/spamdyke.conf and add the following line:
>    dns-blacklist-entry=zen.spamhaus.org
> 
> To add multiple DNS RBLs, simply repeat the line with different values.
> 
> -- Sam Clippinger

QTP only installs/upgrades spamdyke 3.1.x at this time. I hope to add 4.x
capability soon. It'll likely be a couple weeks before I get to it though.

> Anil Aliyan wrote:
>> pretty smart question John, I also would like to hear the answer for
>> it from the experts.
>>
>>
>> ----- Original Message ----- From: "Tek Support" <[EMAIL PROTECTED]>
>> To: <qmailtoaster-list@qmailtoaster.com>
>> Sent: Friday, August 08, 2008 8:37 AM
>> Subject: Re: [qmailtoaster] Authentication to bypass spam checks
>>
>>
>>> Hi all, I have a few question.  Before I learned of this port 587, my
>>> only option was to disable spamhaus.  And all I did to disable it was
>>> to remove it from my "/var/qmail/control/blacklists file.
>>>
>>> So, the other day I needed some addition reporting and I remembered
>>> the "toaster plus", so I downloaded the Repo and ran the yum install
>>> for it.  I then also decided to run the spamdyke filter.
>>>
>>> So, now that I've realized that port 587 is available for my users to
>>> send on, I went back to add the spamhaus.  However, it's no longer in
>>> the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
>>> has removed it.
>>>
>>> So I have 2 questions:
>>> 1) Are spamdyke and spamhaus compatible?  Why would or why does
>>> spamdyke remove "blacklist" from the run file.  Here are the before
>>> and after.
>>> ---Begin---
>>>
>>> ---End---
>>>
>>> 2) Since I've just found out that port 587 is available, and 587 does
>>> not run spamhaus the dynamic ip checker, then what is keeping a
>>> spammer from trying to use this 587?  I mean I'm a little confused.
>>> If my port 25 won't allow any non-authenticated users to send smtp
>>> (presuming it's not an open relay), then why would I even need port
>>> 587?  I understand the need to have 587 if I'm using spamhaus on port
>>> 25, and 25 is now blocked to my dynamic users (workers from home).  So
>>> it seems a bit unnecessary to have both ports.  And why couldn't a
>>> spammer start sending spam to my users on 587 - if it even works that
>>> way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
>>> popular thing, so someone, somewhere would certainly try port 587 in
>>> order to get around spamhaus wouldn't they?
>>>
>>> Thanks for your time on this, I'm not trying to be difficult, only
>>> trying to understand how and why.
>>>
>>> Thanks
>>> John
>>>


-- 
-Eric 'shubes'

---------------------------------------------------------------------
     QmailToaster hosted by: VR Hosted <http://www.vr.org>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to