[spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Christoph Kuhle (Expat Email Ltd)
I have spamdyke, with Atomic Secured Linux as well, protecting a server, and
it works well generally, stopping about 50% of emails (I note that some
people have reported 90+% Spam statistics).  I have just run a DNSStuff
Anti-Spam Filtering Test.  It got through:

"This is a test message that was sent to you because you or someone you know
visited the DNSstuff Mail Server Test Center and ran an anti-spam test
against this email address.
This email message contains a forged received header with with a blacklisted
IP Address.
If you received this message without a spam warning or notification, we
recommend you perform the following steps:
1.  Contact your email administrator.
2.  If you are the email administrator, review your current anti-spam
settings, and insure that the latest updates are applied and that your spam
filtering software is enabled."

Because it has a forged received header and a blacklisted IP address, I
would like it to be rejected, naturally.  maillog said:
Aug 26 08:09:29 plesk2 spamdyke[20992]: ALLOWED from:
emailavt...@dnsstuff.com to: m...@mydomain.com origin_ip: 75.125.82.251
origin_rdns: gold.dnsstuff.com auth: (unknown)

and the email header says:

X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
plesk2.ourdomain.co.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.0 required=4.0 tests=BAYES_00,HTML_MESSAGE,
HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,MISSING_MID autolearn=no
version=3.2.5
Received: (qmail 21000 invoked from network); 26 Aug 2009 08:09:30 +0100
Received: from gold.dnsstuff.com (HELO main) (75.125.82.251)
  by plesk2.ourdomain.co.uk with SMTP; 26 Aug 2009 08:09:29 +0100
Received-SPF: pass (plesk2.ourdomain.co.uk: SPF record at dnsstuff.com
designates 75.125.82.251 as permitted sender)
Received: from forgedsnd.example.com ([127.0.0.2]) by forgedrcv.example.com
 with fakesvc; Thu, 13 Aug 2009 07:30:02
To: m...@mydomain.com
From: "DNSstuff Mail Server Test Center" 
Subject: DNSstuff Mail Server Test Center - Anti-Spam Test Message
Date: Wed, 26 Aug 2009 07:09:14 +
MIME-Version: 1.0
Content-Type: text/html; charset="US-ASCII"
Content-Disposition: inline


My spamdyke config file is:
[r...@plesk2 ~]# cat /etc/spamdyke.conf
#Plesk-Addon
#use log-level=verbose to see which dnsrbls triggered. use info for normal
level. use debug ## for loads of stuff.
log-level=info
#idle-timeout-secs=180
local-domains-file=/var/qmail/control/rcpthosts
tls-certificate-file=/var/qmail/control/servercert.pem
#AUTH FROM xinetd-conf
smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true
/var/qmail/bin/cmd5checkpw /bin/true
smtp-auth-level=ondemand-encrypted
## the following url gets put in all rejection messages so people who get
false positives
## know where to go for help:
policy-url=http://emailitis.com/index_files/spam_rejection.html

graylist-level=always
graylist-dir=/var/qmail/spamdyke/greylist
#GREYLIST MINIMUM = 5 Min
graylist-min-secs=300
#GREYLIST MAX = 3 Months
graylist-max-secs=1814400
sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders
recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords
ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders
greeting-delay-secs=5
#RBL BLOCKLISTS
dns-blacklist-entry=zen.spamhaus.org
dns-blacklist-entry=bl.spamcop.net
dns-blacklist-entry=bogons.cymru.com
reject-missing-sender-mx
reject-empty-rdns
reject-unresolvable-rdns
[r...@plesk2 ~]#

Listening to these posts, I guess that there are a LOT more complex settings
that I could or should have in my config.  Can anyone advise what setting(s)
might prevent similar emails from getting through next time?

Kind regards, 
 
Christoph

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Kulkarni Shantanu
* Christoph Kuhle (Expat Email Ltd)  [090826 13:27]:
> I have spamdyke, with Atomic Secured Linux as well, protecting a server, and
> it works well generally, stopping about 50% of emails (I note that some
> people have reported 90+% Spam statistics).  I have just run a DNSStuff
> Anti-Spam Filtering Test.  It got through:

Please do not start a new thread by replying to an old mail & changing
the subject line. it screws up threading. 

well, we have managed to block 92-94% spam by various filters of spamdyke.
I would recommend removing cymru dnsbl and replacing that with of
barracuda networks. also consider a local dnsbl of zones from
uceprotect, so there will not be any network overheads.

also see,
http://www.shantanukulkarni.org/rbl-compare.html
http://www.shantanukulkarni.org/spam_analysis.html  (done in feb 09)

Shantanu
www.shantanukulkarni.org
-- 
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Christoph Kuhle (Expat Email Ltd)
I apologise for replying to an original email.  I will not do that again :-(

THANK YOU Shantanu for the really quick response and the advice with links.
I have added dnsbl-1.uceprotect.net and removed cymru dnsbl.

I am registered with barracuda, but I had heard before that barracuda can
reject a fair number of genuine emails (I never remember if that is a false
negative or a false positive!).   If I include barracuda as well, is there a
way to monitor what they have rejected, or must we wait for people to tell
us that email is not getting through.

Separately, I do notice a small but sufficiently significant number of
genuine emails which get rejected with no reverse DNS.  Should we be happy
to put email addresses on the white list, or is that dangerous with Spammers
being able to get through if they purport to be that address?  Up to now, we
have just passed on the maillog entry on so that they can check it out with
their own hosting company.

Is it an easy script that we can run to see the percentages being rejected
by the various stages?  The one I have is:
cat /usr/local/psa/var/log/maillog | /etc/spamdyke-statistics.pl

Kind regards, 
 
Christoph

-Original Message-
From: spamdyke-users-boun...@spamdyke.org
[mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Kulkarni Shantanu
Sent: 26 August 2009 09:40
To: spamdyke users
Subject: Re: [spamdyke-users] newbie question - please bear with me - some
Spam getting through

* Christoph Kuhle (Expat Email Ltd)  [090826 13:27]:
> I have spamdyke, with Atomic Secured Linux as well, protecting a server,
and
> it works well generally, stopping about 50% of emails (I note that some
> people have reported 90+% Spam statistics).  I have just run a DNSStuff
> Anti-Spam Filtering Test.  It got through:

Please do not start a new thread by replying to an old mail & changing
the subject line. it screws up threading. 

well, we have managed to block 92-94% spam by various filters of spamdyke.
I would recommend removing cymru dnsbl and replacing that with of
barracuda networks. also consider a local dnsbl of zones from
uceprotect, so there will not be any network overheads.

also see,
http://www.shantanukulkarni.org/rbl-compare.html
http://www.shantanukulkarni.org/spam_analysis.html  (done in feb 09)

Shantanu
www.shantanukulkarni.org
-- 
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Eric Shubert
Christoph Kuhle (Expat Email Ltd) wrote:
> 
> Separately, I do notice a small but sufficiently significant number of
> genuine emails which get rejected with no reverse DNS.  Should we be happy
> to put email addresses on the white list, or is that dangerous with Spammers
> being able to get through if they purport to be that address?  Up to now, we
> have just passed on the maillog entry on so that they can check it out with
> their own hosting company.

This is what I do, whitelist and notify the sending server's admin.

It'd be nice if there was a spamdyke tool that would allow one to easily 
re-check an IP address to see if their server has subsequently been 
fixed, as an aid in keeping the whitelist clean. Sort of a "if a certain 
IP address were to send an email to my server, would spamdyke reject 
it?" tool. What do you think, Sam?

-- 
-Eric 'shubes'

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Christoph Kuhle (Expat Email Ltd)
Thank you Eric,

Interesting one.  I put the whole domain in
/var/qmail/spamdyke/whitelist_senders  by simply putting revivevending.com
in that file.  I seem to remember reading that this is possible.

The restarted Apache /etc/init.d/httpd restart

but it was still being rejected.  Then I put in the full email address, and
it worked.  Is it possible to put a whole domain in whitelist_senders?

Kind regards, 
 
Christoph
-Original Message-
From: spamdyke-users-boun...@spamdyke.org
[mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Eric Shubert
Sent: 26 August 2009 15:13
To: spamdyke-users@spamdyke.org
Subject: Re: [spamdyke-users] newbie question - please bear with me - some
Spam getting through

Christoph Kuhle (Expat Email Ltd) wrote:
> 
> Separately, I do notice a small but sufficiently significant number of
> genuine emails which get rejected with no reverse DNS.  Should we be happy
> to put email addresses on the white list, or is that dangerous with
Spammers
> being able to get through if they purport to be that address?  Up to now,
we
> have just passed on the maillog entry on so that they can check it out
with
> their own hosting company.

This is what I do, whitelist and notify the sending server's admin.

It'd be nice if there was a spamdyke tool that would allow one to easily 
re-check an IP address to see if their server has subsequently been 
fixed, as an aid in keeping the whitelist clean. Sort of a "if a certain 
IP address were to send an email to my server, would spamdyke reject 
it?" tool. What do you think, Sam?

-- 
-Eric 'shubes'

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Eric Shubert
I use @domain.com in whitelist_senders file and it works. I think it 
needs to have the @ sign.

Christoph Kuhle (Expat Email Ltd) wrote:
> Thank you Eric,
> 
> Interesting one.  I put the whole domain in
> /var/qmail/spamdyke/whitelist_senders  by simply putting revivevending.com
> in that file.  I seem to remember reading that this is possible.
> 
> The restarted Apache /etc/init.d/httpd restart
> 
> but it was still being rejected.  Then I put in the full email address, and
> it worked.  Is it possible to put a whole domain in whitelist_senders?
> 
> Kind regards, 
>  
> Christoph
> -Original Message-
> From: spamdyke-users-boun...@spamdyke.org
> [mailto:spamdyke-users-boun...@spamdyke.org] On Behalf Of Eric Shubert
> Sent: 26 August 2009 15:13
> To: spamdyke-users@spamdyke.org
> Subject: Re: [spamdyke-users] newbie question - please bear with me - some
> Spam getting through
> 
> Christoph Kuhle (Expat Email Ltd) wrote:
>> Separately, I do notice a small but sufficiently significant number of
>> genuine emails which get rejected with no reverse DNS.  Should we be happy
>> to put email addresses on the white list, or is that dangerous with
> Spammers
>> being able to get through if they purport to be that address?  Up to now,
> we
>> have just passed on the maillog entry on so that they can check it out
> with
>> their own hosting company.
> 
> This is what I do, whitelist and notify the sending server's admin.
> 
> It'd be nice if there was a spamdyke tool that would allow one to easily 
> re-check an IP address to see if their server has subsequently been 
> fixed, as an aid in keeping the whitelist clean. Sort of a "if a certain 
> IP address were to send an email to my server, would spamdyke reject 
> it?" tool. What do you think, Sam?
> 


-- 
-Eric 'shubes'

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread David Mitchell
Christoph Kuhle (Expat Email Ltd) wrote:
> I have spamdyke, with Atomic Secured Linux as well, protecting a server, and
> it works well generally, stopping about 50% of emails (I note that some
> people have reported 90+% Spam statistics).  I have just run a DNSStuff
> Anti-Spam Filtering Test.  It got through:
> 
> "This is a test message that was sent to you because you or someone you know
> visited the DNSstuff Mail Server Test Center and ran an anti-spam test
> against this email address.
> This email message contains a forged received header with with a blacklisted
> IP Address.
> If you received this message without a spam warning or notification, we
> recommend you perform the following steps:
> 1.Contact your email administrator.
> 2.If you are the email administrator, review your current anti-spam
> settings, and insure that the latest updates are applied and that your spam
> filtering software is enabled."
> 
> Because it has a forged received header and a blacklisted IP address, I
> would like it to be rejected, naturally.  maillog said:
> Aug 26 08:09:29 plesk2 spamdyke[20992]: ALLOWED from:
> emailavt...@dnsstuff.com to: m...@mydomain.com origin_ip: 75.125.82.251
> origin_rdns: gold.dnsstuff.com auth: (unknown)
> 
> and the email header says:
> 
> X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
>   plesk2.ourdomain.co.uk
> X-Spam-Level: 
> X-Spam-Status: No, score=-1.0 required=4.0 tests=BAYES_00,HTML_MESSAGE,
>   HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,MISSING_MID autolearn=no
> version=3.2.5
> Received: (qmail 21000 invoked from network); 26 Aug 2009 08:09:30 +0100
> Received: from gold.dnsstuff.com (HELO main) (75.125.82.251)
>   by plesk2.ourdomain.co.uk with SMTP; 26 Aug 2009 08:09:29 +0100
> Received-SPF: pass (plesk2.ourdomain.co.uk: SPF record at dnsstuff.com
> designates 75.125.82.251 as permitted sender)
> Received: from forgedsnd.example.com ([127.0.0.2]) by forgedrcv.example.com
>  with fakesvc; Thu, 13 Aug 2009 07:30:02
> To: m...@mydomain.com
> From: "DNSstuff Mail Server Test Center" 
> Subject: DNSstuff Mail Server Test Center - Anti-Spam Test Message
> Date: Wed, 26 Aug 2009 07:09:14 +
> MIME-Version: 1.0
> Content-Type: text/html; charset="US-ASCII"
> Content-Disposition: inline

Spamdyke is doing exactly what it should be doing, it's the test that's
flawed. RBL checks should only ever be done against the connecting IP,
not against any other IPs further up the Received chain. Checking
against any other IPs would result in false positives. For example, you
use zen.spamhaus.org which contains dynamic IP ranges, because you don't
want to accept mail directly from dynamic IPs, but you still do want to
receive mail legitimately sent from those users via their ISP's mail server.

Have a look a few mail headers, you'll see plenty that have private IP
space and all kinds of other stuff in the Received headers due to the
internal processing of people's mail systems. To say that a mail should
be blocked just because it has "127.0.0.2" in a Received header is just
plain wrong.

> My spamdyke config file is:
> [r...@plesk2 ~]# cat /etc/spamdyke.conf
> #Plesk-Addon
> #use log-level=verbose to see which dnsrbls triggered. use info for normal
> level. use debug ## for loads of stuff.
> log-level=info
> #idle-timeout-secs=180
> local-domains-file=/var/qmail/control/rcpthosts
> tls-certificate-file=/var/qmail/control/servercert.pem
> #AUTH FROM xinetd-conf
> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true
> /var/qmail/bin/cmd5checkpw /bin/true
> smtp-auth-level=ondemand-encrypted
> ## the following url gets put in all rejection messages so people who get
> false positives
> ## know where to go for help:
> policy-url=http://emailitis.com/index_files/spam_rejection.html
> 
> graylist-level=always
> graylist-dir=/var/qmail/spamdyke/greylist
> #GREYLIST MINIMUM = 5 Min
> graylist-min-secs=300
> #GREYLIST MAX = 3 Months
> graylist-max-secs=1814400
> sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders
> recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
> ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords
> ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
> rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
> ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
> sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders
> greeting-delay-secs=5
> #RBL BLOCKLISTS
> dns-blacklist-entry=zen.spamhaus.org
> dns-blacklist-entry=bl.spamcop.net
> dns-blacklist-entry=bogons.cymru.com
> reject-missing-sender-mx
> reject-empty-rdns
> reject-unresolvable-rdns
> [r...@plesk2 ~]#
> 
> Listening to these posts, I guess that there are a LOT more complex settings
> that I could or should have in my config.  Can anyone advise what setting(s)
> might prevent similar emails from getting through next time?

That config looks pretty tight to me, I wouldn't worry.

Cheers,
Dave
___
spam

Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Sam Clippinger
This isn't too surprising -- spamdyke doesn't check the "Received" 
headers or any part of the actual message content.  If the blacklisted 
IP address mentioned in the text only occurs in the message headers, 
spamdyke won't stop it.

If you need a filter that will examine message content, take a look at 
SpamAssassin -- it works well in conjunction with spamdyke.

-- Sam Clippinger

Christoph Kuhle (Expat Email Ltd) wrote:
> I have spamdyke, with Atomic Secured Linux as well, protecting a server, and
> it works well generally, stopping about 50% of emails (I note that some
> people have reported 90+% Spam statistics).  I have just run a DNSStuff
> Anti-Spam Filtering Test.  It got through:
>
> "This is a test message that was sent to you because you or someone you know
> visited the DNSstuff Mail Server Test Center and ran an anti-spam test
> against this email address.
> This email message contains a forged received header with with a blacklisted
> IP Address.
> If you received this message without a spam warning or notification, we
> recommend you perform the following steps:
> 1.Contact your email administrator.
> 2.If you are the email administrator, review your current anti-spam
> settings, and insure that the latest updates are applied and that your spam
> filtering software is enabled."
>
> Because it has a forged received header and a blacklisted IP address, I
> would like it to be rejected, naturally.  maillog said:
> Aug 26 08:09:29 plesk2 spamdyke[20992]: ALLOWED from:
> emailavt...@dnsstuff.com to: m...@mydomain.com origin_ip: 75.125.82.251
> origin_rdns: gold.dnsstuff.com auth: (unknown)
>
> and the email header says:
>
> X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
>   plesk2.ourdomain.co.uk
> X-Spam-Level: 
> X-Spam-Status: No, score=-1.0 required=4.0 tests=BAYES_00,HTML_MESSAGE,
>   HTML_MIME_NO_HTML_TAG,MIME_HTML_ONLY,MISSING_MID autolearn=no
> version=3.2.5
> Received: (qmail 21000 invoked from network); 26 Aug 2009 08:09:30 +0100
> Received: from gold.dnsstuff.com (HELO main) (75.125.82.251)
>   by plesk2.ourdomain.co.uk with SMTP; 26 Aug 2009 08:09:29 +0100
> Received-SPF: pass (plesk2.ourdomain.co.uk: SPF record at dnsstuff.com
> designates 75.125.82.251 as permitted sender)
> Received: from forgedsnd.example.com ([127.0.0.2]) by forgedrcv.example.com
>  with fakesvc; Thu, 13 Aug 2009 07:30:02
> To: m...@mydomain.com
> From: "DNSstuff Mail Server Test Center" 
> Subject: DNSstuff Mail Server Test Center - Anti-Spam Test Message
> Date: Wed, 26 Aug 2009 07:09:14 +
> MIME-Version: 1.0
> Content-Type: text/html; charset="US-ASCII"
> Content-Disposition: inline
>
>
> My spamdyke config file is:
> [r...@plesk2 ~]# cat /etc/spamdyke.conf
> #Plesk-Addon
> #use log-level=verbose to see which dnsrbls triggered. use info for normal
> level. use debug ## for loads of stuff.
> log-level=info
> #idle-timeout-secs=180
> local-domains-file=/var/qmail/control/rcpthosts
> tls-certificate-file=/var/qmail/control/servercert.pem
> #AUTH FROM xinetd-conf
> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true
> /var/qmail/bin/cmd5checkpw /bin/true
> smtp-auth-level=ondemand-encrypted
> ## the following url gets put in all rejection messages so people who get
> false positives
> ## know where to go for help:
> policy-url=http://emailitis.com/index_files/spam_rejection.html
>
> graylist-level=always
> graylist-dir=/var/qmail/spamdyke/greylist
> #GREYLIST MINIMUM = 5 Min
> graylist-min-secs=300
> #GREYLIST MAX = 3 Months
> graylist-max-secs=1814400
> sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders
> recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
> ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords
> ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
> rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
> ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
> sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders
> greeting-delay-secs=5
> #RBL BLOCKLISTS
> dns-blacklist-entry=zen.spamhaus.org
> dns-blacklist-entry=bl.spamcop.net
> dns-blacklist-entry=bogons.cymru.com
> reject-missing-sender-mx
> reject-empty-rdns
> reject-unresolvable-rdns
> [r...@plesk2 ~]#
>
> Listening to these posts, I guess that there are a LOT more complex settings
> that I could or should have in my config.  Can anyone advise what setting(s)
> might prevent similar emails from getting through next time?
>
> Kind regards, 
>  
> Christoph
>
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Sam Clippinger
That's not a bad idea, I'll add that to the ever-growing list. :)

With the current version (assuming you're comfortable at the command 
line), you can set the TCPREMOTEIP environment variable to the remote IP 
and run spamdyke manually to see what it says.  Something like this:
$ export TCPREMOTEIP=11.22.33.44
$ spamdyke -f /etc/spamdyke.conf /var/qmail/bin/qmail-smtpd /bin/true

-- Sam Clippinger

Eric Shubert wrote:
> Christoph Kuhle (Expat Email Ltd) wrote:
>   
>> Separately, I do notice a small but sufficiently significant number of
>> genuine emails which get rejected with no reverse DNS.  Should we be happy
>> to put email addresses on the white list, or is that dangerous with Spammers
>> being able to get through if they purport to be that address?  Up to now, we
>> have just passed on the maillog entry on so that they can check it out with
>> their own hosting company.
>> 
>
> This is what I do, whitelist and notify the sending server's admin.
>
> It'd be nice if there was a spamdyke tool that would allow one to easily 
> re-check an IP address to see if their server has subsequently been 
> fixed, as an aid in keeping the whitelist clean. Sort of a "if a certain 
> IP address were to send an email to my server, would spamdyke reject 
> it?" tool. What do you think, Sam?
>
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Kulkarni Shantanu
* Christoph Kuhle (Expat Email Ltd)  [090826 18:02]:
> I am registered with barracuda, but I had heard before that barracuda can
> reject a fair number of genuine emails (I never remember if that is a false

nope, for me the false positive rate of uceprotect was more.

> negative or a false positive!).   If I include barracuda as well, is there a
> way to monitor what they have rejected, or must we wait for people to tell
> us that email is not getting through.

i have a perl script which analyses daily logs to produce o/p like,

ALLOWED Mails = 2487
BLOCKED No RDNS entry = 11367   

Mailbox does not exists = 829   
  
Listed in RBL
zen.spamhaus.org = 1133
dyna.spamrats.com = 202 
uceprotect.local = 8489
b.barracudacentral.org = 4258

> Separately, I do notice a small but sufficiently significant number of
> genuine emails which get rejected with no reverse DNS.  Should we be happy
> to put email addresses on the white list, or is that dangerous with Spammers

every mailserver (or smarthost) *should* have an rdns entry. see above
to find how many spam are rejected with missing rdns switch.

> being able to get through if they purport to be that address?  Up to now, we
> have just passed on the maillog entry on so that they can check it out with
> their own hosting company.

we also do same thing.

> 
> Is it an easy script that we can run to see the percentages being rejected
> by the various stages?  The one I have is:
> cat /usr/local/psa/var/log/maillog | /etc/spamdyke-statistics.pl

simple it can be as easy,

cat logfile | egrep -c 'FILTER_RBL_MATCH.*zen.spamhaus.org'
cat logfile | egrep -c 'FILTER_RDNS_MISSING'

or it can be anything similar in awk/perl/python/etc.

Shantanu
-- 

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] newbie question - please bear with me - some Spam getting through

2009-08-26 Thread Kulkarni Shantanu
* Eric Shubert  [090826 21:09]:
> It'd be nice if there was a spamdyke tool that would allow one to easily 
> re-check an IP address to see if their server has subsequently been 
> fixed, as an aid in keeping the whitelist clean. Sort of a "if a certain 
> IP address were to send an email to my server, would spamdyke reject 
> it?" tool. What do you think, Sam?

no need of adding extra code. you can write a shell script to
daily parse the logs and check each ip against various tests. for
scripting dns test i recommend packages like dnsname/dnsq/dnsqr from
djbdns suite.

Shantanu
-- 

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users