Thanks for the tips...there is a reason I am the new guy here, the old
guy was a perl hacker, and obviously didn't cut it, so here I am, with
this problem, and no idea how to code my way out of it. I am thinking
of going back to the default
suggested-minimum-filter-for-windows-clients, filling
On Tue, 2 May 2006, Paul Murphy wrote:
Question 2: to what extent is your incoming spam volume generated by dynamic
addresses, dial-up systems, broadband hosts, and other end-user systems which
either have their IP address in their hostname (e.g.
220x218x25x21.ap220.ftth.ucom.ne.jp) or which
David F. Skoll wrote:
Well, if you can *get* a core file, I can help you out off-list.
Thank you very much for you offer, David. I really appreciate it!
I will try my best to figure out how to make the program generate a core
file. This is unknown territory, so I will have to dig around in
On May 3, 2006, at 12:13 AM, Steffen Kaiser wrote:
I hate this banning of dynamic addresses right away. Sure, there is no
(at least not known to me) way to know, whether the host with a
dynamic address is an badly or well configured end-user system,
That's actually not the issue for me.
I hate this banning of dynamic addresses right away. Sure,
there is no (at
least not known to me) way to know, whether the host with a dynamic
address is an badly or well configured end-user system
If it has no reverse DNS and no MX records, it is a badly configured end-user
system.
From: Paul Murphy [EMAIL PROTECTED]
Subject: RE: [Mimedefang] Another silly idea
Date: Wed, 3 May 2006 10:19:31 +0100
pjm ...
pjm if ( $hostname =~ /dsl./i )
pjm {
pjm md_syslog(info,$MsgID - Host $hostname is a DSL broadband client);
pjm return (0);
pjm }
pjm ...
So, you are
pjm ...
pjm if ( $hostname =~ /dsl./i )
pjm {
pjm md_syslog(info,$MsgID - Host $hostname is a DSL
broadband client);
pjm return (0);
pjm }
pjm ...
So, you are rejecting messages from eg. mail.redslab.com that may be a
perfectly legitimate and well behaving mail
For what it's worth, this is my code to detect a likely-looking dynamic
IP address, based on the PTR record.
I won't explain how it works; I'll leave that up to the readers. :-)
It catches all host names that have either the IP address or
reversed IP address somehow embedded in them. For
[EMAIL PROTECTED] wrote on 05/03/2006 02:56:40
AM:
Well, there is yet another possibility:
The AV software the ISP is running did simply not detected that
particular
malware.
Granted. Perhaps detecting when they first send that virus and allowing
them 2 hours to get new defs before
[EMAIL PROTECTED] wrote on 05/03/2006 05:19:31
AM:
Effectively, a certificate system would be the same as a whitelist - the
owner of the system has to take action to have it recognised as a valid
mail
server.
Sounds like SPF... Owner taking action... to register SPF record. Some
now
David, with all due respect, you are living in a utopia because your
suggestion is not feasible where I live and work. I must agree with WBrown.
I live in the Metropolitan D.C. area within a few miles of MAE East, MCI and
AOL's HQ's. I've got a wide choice of Tier 1 companies and technologies
On Tuesday 02 May 2006 15:51, Bjarte Husebø wrote:
David F. Skoll wrote:
Doh... that's a segfault. You'll need to convince your system to
generate a core file to have any hope of diagnosing this.
Thanks for your fast response. Unfortunately, analyzing core dumps is
probably far beyond my
Note that the original topic was regarding dynamic IP addresses, and
it was in the context of a small home or hobbyist user that I
recommended voting with your wallet. Obviously, for major
connections, the hassle is extreme.
Also for major connections, I would expect them to provide a
Adelphia cable doesn't. In fact, half of them didn't know what
I was talking about, but the others came back with a We've never
done that for customers.
So, based on the code flying around, you'd never get my email.
So what would your response be (I usually try to reject with a telephone
number,
The one thing that comes to mind with us in the US needing to enter the
age of technology:
Don't tell us that - we know. The problem is the ISP's want the
dumbest people they can find to maximize their investment of their company.
That means 99% of the folks of the engineering staff typically
Ben Kamen wrote:
Don't tell us that - we know. The problem is the ISP's want the
dumbest people they can find to maximize their investment of their company.
That means 99% of the folks of the engineering staff typically
can't even SPELL D-N-S, let alone use a program like 'vi'.
Holy
Larry Starr wrote:
Signal 11 (Segfault) is nearly always a Program bug (Accessing
memory that is not allocated to the current process, frequently
address zero, usually related to a pointer being used that has not
been set correctly). It is, nearly, impossible that it points to a
hardware
[EMAIL PROTECTED] wrote on 05/03/2006 11:48:16
AM:
You guys in the States need to embrace the world of technology ;-)
But if you listen to our politicians, we're leading the world when it
comes to technology. Hell, even China has better penetration of high
speed internet than the US does in
(this is going a little off topic ... but ... )
On May 3, 2006, at 9:19 AM, Ben Kamen wrote:
I had a problem with my DSL line from SBC
When I moved from Santa Cruz to San Jose, I found out my new house
wasn't going to be within the Covad area of coverage ... so I'd have to
leave
You know, you don't necessarily have to switch ISP's. There are quite
a few virtual hosting companies out there (I don't have any off the top
of my head). For just a few $/mo, you get a self-managed virtual host
where you can set up and run whatever web or mail service you want.
I've
Matthew Schumacher wrote:
Anyway, some ISPs have good people on staff, I think the bigger problem
is management limiting the authority of people that really know how to
get the job done.
My $.02
In Fairness, I would agree that there's probably an ISP or two out there with
some people on
Hi,
Do you mean something like:
http://antispam.imp.ch/03-wormlist.html?lng=1
Martin
___
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID. You may ignore it.
Visit http://www.mimedefang.org and
Hi,
To get a mimedefang corefile you may have to execute:
# sysctl kern.sugid_coredump=1
Martin
___
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID. You may ignore it.
Visit
Martin Blapp wrote:
Hi,
Do you mean something like:
http://antispam.imp.ch/03-wormlist.html?lng=1
Is anyone using this list with success?
I'd like to know..
Also their config line for sendmail has an error...
FEATURE(`enhdnsbl', `wormrbl.imp.ch', `451 tempfail - see
On 3 May 2006 at 10:33, David F. Skoll wrote:
Congratulations. You have an ISP that will configure that for you. Not
all will for any amount of money.
In most places, you can switch ISPs if the one you're using is not giving
good service. I realize there are some places with virtual
On 3 May 2006 at 17:26, Paul Murphy wrote:
So, based on the code flying around, you'd never get my email.
So what would your response be (I usually try to reject with a telephone
number, so real clients can phone and bitch about the SMTP failure)?
Change ISP... That's not quite the
Hi,
Is anyone using this list with success?
Yes, some ISPs in europe do. As you can see, the listed IPs belong
to europe ISPs mostly. The problem is that the data sources aren't
mixed with global players. Virus and worm statistics seem always
to be local based - in contrary to spam
Martin Blapp wrote:
To get a mimedefang corefile you may have to execute:
# sysctl kern.sugid_coredump=1
Thank you, Martin. That seems to be exactly what I need. :-)
Waiting for the next segfault,
Bart
___
NOTE: If there is a disclaimer or other
28 matches
Mail list logo