At 04:25 03-03-2009, Michelle Konzack wrote:
The network in my enterprise is <*.private.tamay-dogan.net> and the
outgoing mailserver which is correctly
configured and of course, not accessibel from outside the world. Hence,
I am sending messages over the relayfrom
my hosting provide
On Tue, 3 Mar 2009, Michelle Konzack wrote:
The network in my enterprise is <*.private.tamay-dogan.net> and the
outgoing mailserver which is correctly
configured and of course, not accessibel from outside the world.
Hence, I am sending messages over the relay
from my hosting provider.
Mic
Hello Jonas and *,
Am 2009-03-02 23:57:34, schrieb Jonas Eckerman:
> That seems like a way to get false positives when someone with a listed
> dynamic IP sends through the smarthost of their ISP or ESP.
>
> By extendinmg trust to the ESP/ISP smarthost, SA will do RBL checks on
> the system that
Matthias Leisi wrote:
Speaking of which, it may actually make sense to use all of dnswl.org's
entries as trusted_networks-entries...
That seems like a way to get false positives when someone with a
listed dynamic IP sends through the smarthost of their ISP or ESP.
By extendinmg trust to the
Michelle Konzack schrieb:
> OK, but I have never untrusted <*.debian.org>
This is not about "untrusting". It's about telling SpamAssassin which
relays are trustworthy to begin with. Adding these hints greatly
improves the accuracy of SpamAssassin.
> Is there a way, to les spamassassin look re
Hello Benny,
Am 2009-03-01 15:12:16, schrieb Benny Pedersen:
> http://www.dnswl.org/ se the webpage first
Already checked, but
> can you make them into levels of NONE, LOW, MEDIUM, HI
>
> and then start with the LOW,MEDIUM,HI until all is listed where you
> get spam from is changed to NONE, you
On Sun, March 1, 2009 14:48, Michelle Konzack wrote:
> Am 2009-02-27 22:36:24, schrieb rafa:
>> Contacting dnswl.org can help all of us. They can downgrade those
>> servers from low to none.
> How should I do this?
http://www.dnswl.org/ se the webpage first
> In the meantime I have checked ALL s
Am 2009-02-28 09:20:02, schrieb Matthias Leisi:
> You should add the debian mailservers to your trust path
> (trusted_networks/internal_networks depending on circumstances) so that
> RBL checks are applied to the correct IP addresses.
OK, but I have never untrusted <*.debian.org>
Is there a way,
Am 2009-02-28 02:22:32, schrieb Karsten Bräckelmann:
> Uhm, wait -- let me re-phrase my hasty suggestion to report to dnswl.org
> for removal.
OK, gotten...
> IP address 70.103.162.29 is listed at dnswl.org with the following
> details:
> Domain: debian.org; [...]
> Maybe you should tell Debian
Am 2009-02-27 22:36:24, schrieb rafa:
> Contacting dnswl.org can help all of us. They can downgrade those
> servers from low to none.
How should I do this?
In the meantime I have checked ALL spams manualy from a bash script and
it seems, there are more then 300 IP's listet on DNSWL.
Should I f
Am 2009-02-28 00:48:44, schrieb Martin Gregorie:
> Have you tried editing
> score RCVD_IN_DNSWL_LOW 0
> into /etc/mail.spamassassin/local.cf ?
I have had it in
${HOME}/.spamassassin/local.cf
(as written in the manpage) and it was not working. Since yesterday it
is in
${HOME}/.spamassa
Jeff Chan schrieb:
>> Was wondering if the trusted_networks could be "pluginized" to use
>> DNSEval so that one could query a dnswl (local or remote) - for bigger
>> setups it would probably make management simpler.
>
> One counterargument is that if the data are relatively static,
> i.e., not u
where I find it and how to disable?
DNSWL Id1791 - debian.org
IP range70.103.162.29/32
Domain/Hostname master.debian.org
Score low
ask ab...@debian.org, if no help from them, one can unsubscribe
since maillist spam being more "normal" these days
--
http://localhos
On Saturday, February 28, 2009, 1:00:58 AM, Yet Ninja wrote:
> On 2/28/2009 9:20 AM, Matthias Leisi wrote:
>> In addition to what Karsten wrote about debian:
>> You should add the debian mailservers to your trust path
>> (trusted_networks/internal_networks depending on circumstances) so that
>> RB
On 2/28/2009 9:20 AM, Matthias Leisi wrote:
In addition to what Karsten wrote about debian:
Michelle Konzack schrieb:
Received: from localhost (server7.pinguin-hosting.de [127.0.0.1])
by server7.pinguin-hosting.de (Postfix) with SMTP id D1EFC613E6
for ; Thu, 26 Feb 2009 22:19:2
Matthias Leisi wrote:
> [...]
> Speaking of which, it may actually make sense to use all of
> dnswl.org's entries as trusted_networks-entries...
Do you want it even for DNSWL trust levels of "none" and "low"?
It would be a "brave" suggestion :-)
URL(s):
http://www.dnswl.org/
--
[pl>en: Andrew
In addition to what Karsten wrote about debian:
Michelle Konzack schrieb:
> Received: from localhost (server7.pinguin-hosting.de [127.0.0.1])
> by server7.pinguin-hosting.de (Postfix) with SMTP id D1EFC613E6
> for ; Thu, 26 Feb 2009
> 22:19:21 +0100 (CET)
> Received: from master.
Uhm, wait -- let me re-phrase my hasty suggestion to report to dnswl.org
for removal.
> -1.0 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low
> trust
> [70.103.162.29 listed in list.dnswl.org]
IP address 70.103.162.29 is listed at dnswl.org with
Subscribing to a mailing-list decreases response time drastically. No
moderation. But I guess you should know that... ;)
On Fri, 2009-02-27 at 11:56 +0100, Michelle Konzack wrote:
> since 2009-02-25 I become bombed by arround 430.000 spams like the one
> below and I had to decrease my spamscore
On Fri, 2009-02-27 at 11:56 +0100, Michelle Konzack wrote:
> Hello,
>
> since 2009-02-25 I become bombed by arround 430.000 spams like the one
> below and I had to decrease my spamscore, since I was not able to
> disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
>
Have you tr
Michelle Konzack wrote:
Hello,
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore, since I was not able to
disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
Contacting dnswl.org can help all of us. They can down
Hello,
since 2009-02-25 I become bombed by arround 430.000 spams like the one
below and I had to decrease my spamscore, since I was not able to
disable this crappy test of RCVD_IN_DNSWL_LOW which persists.
Can someone tell me where I find it and how to disable?
[ 'STDIN' ]--
22 matches
Mail list logo