Looks like my messing with the settings for dns-query-type-X configurations broke it. I commented these out and it is working now. Thanks!
On Aug 23, 2013, at 11:12 AM, JP Kelly <listu...@jpkvideo.net> wrote: > That was not set in my config but it is still not working after setting > "dns-server-ip" to my DNS servers ip. > Does this setting need the port added to the ip address? if so is the format > xx.xx.xx.xx:port? > > from the maillog it looks like qmail is able to resolve rDNS: > Aug 23 10:59:38 dv2 /var/qmail/bin/relaylock[22273]: > /var/qmail/bin/relaylock: mail from 201.151.76.82:36001 > (static-201-151-76-82.alestra.net.mx) > > but spamdyke comes up empty for rDNS (along with some other empty info). > Aug 23 10:59:44 dv2 spamdyke[22273]: DENIED_GRAYLISTED from: > virgilap...@acengenhariase.com.br to: virgilap...@jpkvideo.com origin_ip: > 201.151.76.82 origin_rdns: (unknown) auth: (unknown) encryption: (none) > reason: (empty) > > Here is my complete /etc/spamdyke.conf file: > > # cat /etc/spamdyke.conf > # This is an example spamdyke configuration file for spamdyke version 4.3.1. > # > # Without editing, this file will do nothing -- every available option is > # commented out. To enable options, edit the values and remove the comment > # markers at the beginning of the lines (#). > # See the README.html file in spamdyke's documentation directory for a full > # description of each option. The documentation is also available on > spamdyke's > # website: > # http://www.spamdyke.org/ > > ################################################################################ > # Sets spamdyke's overall filter behavior. > # Available values: allow-all, normal, require-auth, reject-all > # Default: normal > filter-level=normal > # Delays the SMTP greeting banner for SECS seconds. A value of 0 disables > this > # feature. > # Default: 0 > #greeting-delay-secs=SECS > # Limit incoming messages to NUM recipients. A value of 0 disables this > max-recipients=15 > # Drop superuser privileges and run as USER instead. > # Default: none > #run-as-user=USER[:GROUP] > # DNS TESTS > # Reject connections from remote servers without rDNS names. > # Default: no > # Reject connections from servers with rDNS names that contain their IP > address > # and end in a two-character country code. > # Reject messages from sender whose domain names have no MX records. > # Reject connections from servers with rDNS names that do not resolve to IP > # addresses. > # Default:no > # LOGGING > # Controls the amount (and detail) of the log messages spamdyke produces. > # Available values: none, error, info, verbose, debug, excessive > # Default: error > log-level=debug > # Controls where spamdyke's log messages are sent. > # Available values: syslog, stderr > # Default: syslog > log-target=syslog > # Outputs all SMTP data into files in DIR. > #full-log-dir=DIR > # CONFIGURATION FILES > # Configuration files can include other configuration files. > #config-file=FILE > # Configuration directories are very powerful but can also be very > complicated; > # don't use them if you don't need to. > # Controls how configuration directories are searched. > # Available values: first, all-ip, all-rdns, all-sender, all-recipient > # Default: first > # TIMEOUTS > # Close the connection after SECS seconds, regardless of activity. A value of > # 0 disables this feature. > #connection-timeout-secs=SECS > # Close the connection after SECS seconds of inactivity. A value of 0 > disables > # this feature. > #idle-timeout-secs=SECS > # SENDERS AND RECIPIENTS > # Reject all recipients that exactly match the sender address. > # LOCAL BLACKLISTS > # Reject connections from IP addresses that match IPADDRESS. > #ip-blacklist-entry=IPADDRESS > # Reject connections from IP addresses that match entries in FILE. > ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip > # Reject connections from rDNS names that match NAME. > # Reject connections from rDNS names that match entries in FILE. > #rdns-blacklist-file=FILE > # Reject connections from rDNS names that match files in DIR. > #rdns-blacklist-dir=DIR > # Reject all messages sent to recipient ADDRESS. > #recipient-blacklist-entry=ADDRESS > # Reject all messages sent to any recipient address listed in FILE. > recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients > # Reject all messages sent from sender ADDRESS. > #sender-blacklist-entry=ADDRESS > # Reject all messages sent from any sender address listed in FILE. > sender-blacklist-file=/var/qmail/spamdyke/blacklist_senders > # Reject connections from rDNS names that contain their IP address and > KEYWORD. > #ip-in-rdns-keyword-blacklist-entry=KEYWORD > # Reject connections from rDNS names that contain their IP address and a > keyword > # in FILE. > ip-in-rdns-keyword-blacklist-file=/var/qmail/spamdyke/blacklist_keywords > # Reject all messages with header lines that match VALUE. > #header-blacklist-entry=VALUE > # Reject all messages sent header lines that match entries in FILE. > #header-blacklist-file=FILE > # LOCAL WHITELISTS > # Whitelist connections from IP addresses that match IPADDRESS. > #ip-whitelist-entry=IPADDRESS > # Whitelist connections from IP addresses that match entries in FILE. > ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip > # Whitelist connections from rDNS names that match NAME. > # Whitelist connections from rDNS names that match entries in FILE. > rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns > # Whitelist connections from rDNS names that match files in DIR. > #rdns-whitelist-dir=DIR > # Whitelist all messages sent to recipient ADDRESS. > #recipient-whitelist-entry=ADDRESS > # Whitelist all messages sent to any recipient address listed in FILE. > #recipient-whitelist-file=FILE > # Whitelist all messages sent from sender ADDRESS. > #sender-whitelist-entry=ADDRESS > # Whitelist all messages sent from any sender address listed in FILE. > sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders > # Whitelist connections from rDNS names that contain their IP address and > # KEYWORD. > #ip-in-rdns-keyword-whitelist-entry=KEYWORD > # Whitelist connections from rDNS names that contain their IP address and a > # keyword in FILE. > #ip-in-rdns-keyword-whitelist-file=FILE > # DNS-BASED BLACKLISTS > # Check a DNS RBL. > # Check all DNS RBLs listed in FILE. > #dns-blacklist-file=FILE > # Check an RHSBL. > # Check all RHSBLs listed in FILE. > #rhs-blacklist-file=FILE > # DNS-BASED WHITELISTS > # Check a DNS whitelist. > # Check all DNS whitelist listed in a file. > #dns-whitelist-file=FILE > # Check an RHS whitelist. > #rhs-whitelist-entry=RHSBL > # Check all RHS whitelists listed in FILE. > #rhs-whitelist-file=FILE > # GRAYLISTING > # Controls the behavior of spamdyke's graylist filter. > # Available values: none, always, always-create-dir, only, only-create-dir > graylist-level=always-create-dir > # Create the graylist files in DIR. > graylist-dir=/var/qmail/spamdyke/greylist > # Invalidate graylist entries after SECS seconds. A value of 0 deactivates > this > #graylist-max-secs=SECS > # Graylist entries are not valid until they are SECS seconds old. A value of > 0 > # deactivates this feature. > #graylist-min-secs=SECS > # Reverse the current graylist behavior for incoming connections whose IP > # addresses match IPADDRESS. > #graylist-exception-ip-entry=IPADDRESS > # Read a list of IP addresses from a file and reverse the current graylist > # behavior for any connections from matching IP addresses. > #graylist-exception-ip-file=FILE > # Reverse the current graylist behavior for incoming connections whose rDNS > # names match NAME. > # Default: none. > #graylist-exception-rdns-entry=NAME > # Read a list of rDNS names from a file and reverse the current graylist > # behavior for any connections from matching rDNS names. > #graylist-exception-rdns-file=FILE > # Search an rDNS directory and reverse the current graylist behavior for any > # connections from matching rDNS names. > #graylist-exception-rdns-dir=DIR > # SMTP AUTHENTICATION > # Controls the way spamdyke offers, supports and processes SMTP > authentication. > # Available values: none, observe, ondemand, ondemand-encrypted, always, > # always-encrypted > # Default: observe > smtp-auth-level=ondemand-encrypted > # Process authentication by running COMMAND, if necessary. > smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true > /var/qmail/bin/cmd5checkpw /bin/true > # Use NAME as the local server's name during CRAM-MD5 authentication. > # Default: unknown.server.unknown.domain > #hostname=NAME > # Read the local server's name from the first line of FILE for use during > # CRAM-MD5 authentication. > # Default: /var/qmail/control/me > #hostname-file=FILE > # Run COMMAND and read the local server's name from the first line of output > # for use during CRAM-MD5 authentication. > #hostname-command=COMMAND > # TLS / SSL > # Controls the way spamdyke offers and supports TLS or SMTPS. > # Available values: none, smtp, smtp-no-passthrough, smtps > #tls-level=VALUE > # Read SSL certificate from FILE. > #tls-certificate-file=/var/qmail/control/servercert.pem > # Read SSL certificate private key from FILE. > #tls-privatekey-file=FILE > # Decrypt SSL certificate private key using PASSWORD. > #tls-privatekey-password=PASSWORD > # Read the password for the SSL certificate private key from the first line of > # FILE. > #tls-privatekey-password-file=FILE > # Only use the ciphers in LIST during TLS or SMTPS. > # Default: DEFAULT > #tls-cipher-list=LIST > # RELAYING OPTIONS > # Sets spamdyke's relay protection level. > # Available values: block-all, no-check, normal, allow-all > #relay-level=VALUE > # spamdyke's relay protection requires reading qmail's access file. > # This file is usually: /etc/tcp.smtp > #access-file=FILE > # Several features require access to the list of locally hosted domains. > # This file is usually: /var/qmail/control/rcpthosts > local-domains-file=/var/qmail/control/rcpthosts > # Adds a single domain to spamdyke's list of locally hosted domains. > #local-domains-entry=DOMAIN > # DNS OPTIONS > # These options should only be used if spamdyke's default behavior is causing > # problems. > # Sets the aggressiveness of spamdyke's DNS resolver. > # Available values: none, normal, aggressive > # Default: aggressive > dns-level=aggressive > # Adds a nameserver to spamdyke's list of primary nameservers. > # Default: none (reads nameservers from /etc/resolv.conf) > dns-server-ip-primary=<REDACTED> > # Adds a nameserver to spamdyke's list of secondary nameservers. > dns-server-ip=<REDACTED> > # Sets the number of times spamdyke queries its primary nameservers. > # Default: 1 > #dns-max-retries-primary=NUM > # Sets the total number of times spamdyke queries nameservers. > # Default: 3 > #dns-max-retries-total=NUM > # Sets the total number of seconds spamdyke will spend on any DNS query. > # Default: 30 > #dns-timeout-secs=SECS > # Sets the name of the file to read for the list of default nameservers. > # Default: /etc/resolv.conf > #dns-resolv-conf=FILE > # Controls whether TCP is used for DNS queries (when needed). > # Available values: none, normal > dns-tcp=normal > # Controls how DNS spoofing is handled. > # Available values: accept-all, accept-same-ip, accept-same-port, reject > # Default: accept-all > #dns-spoof=VALUE > # Controls the types of queries performed when looking up an IP address. > # Available values: a, cname > # Default: a + cname > dns-query-type-a=a > # Controls the types of queries performed when looking up a mail exchanger. > # Available values: a, cname, mx > # Default: a + cname + mx > dns-query-type-mx=mx > # Controls the types of queries performed when looking up a reverse DNS > record. > # Available values: cname, ptr > # Default: cname + ptr > dns-query-type-ptr=cname > # Controls the types of queries performed when looking up a records in DNS > RBLs, > # DNS RWLs, DNS RHSBLs and DNS RHSWLs. > # Available values: a, cname, txt > # Default: a + cname + txt > #dns-query-type-rbl=VALUE > # REJECTION MESSAGES > # Append URL to the end of every rejection message sent to the remote server. > #policy-url=URL > # Use TEXT as the rejection message when a connection is blocked because the > # remote server matches a line in an access file that denies access. > # Default: Refused. > #MySQL-Logging: > config-mysql-database=<REDACTED> > config-mysql-username=<REDACTED> > config-mysql-password=<REDACTED> > graylist-level=always-create-dir > graylist-min-secs=15 > greeting-delay-secs=5 > connection-timeout-secs=5000 > idle-timeout-secs=180 > graylist-max-secs=1814400 > config-dir=/var/qmail/spamdyke/conf.d > config-dir=/var/qmail/spamdyke/conf.s > dns-blacklist-entry=zen.spamhaus.org > #dns-blacklist-entry=bl.spamcop.net > #dns-blacklist-entry=bogons.cymru.com > dns-whitelist-entry=list.dnswl.org > > > On Aug 23, 2013, at 3:28 AM, Gary Gendel <g...@genashor.com> wrote: > >> Did you set "dns-server-ip" in your spamdyke.conf file? If so, it it >> pointing to the right server? >> >> On 08/23/2013 04:58 AM, JP Kelly wrote: >>> I am using spamdyke 4.3.1+TLS+CONFIGTEST+DEBUG+MYSQL[haggybear.de] >>> On Plesk 11 CentOS 5 >>> All of the reverse DNS entries show up as unknown even though I can resolve >>> the IP addresses to valid rDNS hosts. >>> As far as I can tell I have the config file correct but obviously something >>> is wrong. >>> /etc/resolve.conf is fine. I can resolve the hosts from the machine >>> spamdyke is running on using the command 'host <IP ADDRESS>'. >>> Any ideas how to troubleshoot this? >>> TIA >>> JP Kelly >>> >>> _______________________________________________ > > _______________________________________________ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users _______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users