Hi,

at least 10 blacklists would have stopped this spam before accepting it 
(see http://www.kloth.net/services/dnsbl.php)

For a smtp mail relay test of your own mail server open a telnet session 
from your server's shell to rt.njabl.org on port 2500:
telnet rt.njabl.org 2500

But i am sorry i have no idea, why this email wasn't blocked by 
spamdyke. perhaps enabling full-log-dir for some time could help to see 
what happens
http://www.spamdyke.org/documentation/README.html#FULL_LOGGING

Regards,
Arne

Magnus Ringdahl schrieb am 16.12.2009 15:07:
> Hi.
> I just recieved a viagra spam again. From my own email address.
>
> Dec 16 14:11:12 web01 /var/qmail/bin/relaylock[28512]:
> /var/qmail/bin/relaylock: mail from 125.178.185.144:3512 (not defined)
> Dec 16 14:11:13 web01 spamdyke[28509]: TLS_ENCRYPTED from: (unknown) to:
> (unknown) origin_ip: 125.178.185.144 origin_rdns: (unknown) auth: (unknown)
> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: Handlers Filter
> before-queue for qmail started ...
> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]:
> from=kundtja...@domain.tld
> Dec 16 14:11:15 web01 qmail-queue-handlers[28532]: to=kundtja...@domain.tld
> Dec 16 14:11:15 web01 spf filter[28538]: Starting spf filter...
> Dec 16 14:11:15 web01 spf filter[28538]: Error code: (2) Could not find
> a valid SPF record
> Dec 16 14:11:15 web01 spf filter[28538]: Failed to query MAIL-FROM: No
> DNS data for 'domain.tld'.
> Dec 16 14:11:15 web01 spf filter[28538]: SPF result: none
> Dec 16 14:11:15 web01 spf filter[28538]: SPF status: PASS
> Dec 16 14:11:15 web01 qmail-queue[28539]: scan: the
> message(drweb.tmp.MdrGAT) sent by kundtja...@domain.tld to
> kundtja...@domain.tld is passed
> Dec 16 14:11:15 web01 qmail: 1260969075.825046 new msg 4254303
> Dec 16 14:11:15 web01 qmail: 1260969075.825046 info msg 4254303: bytes
> 2349 from<kundtja...@domain.tld>  qp 28540 uid 2020
> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: Handlers Filter
> before-local for qmail started ...
> Dec 16 14:11:15 web01 qmail-local-handlers[28541]:
> from=kundtja...@domain.tld
> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: to=kundtja...@domain.tld
> Dec 16 14:11:15 web01 qmail-local-handlers[28541]: mailbox:
> /var/qmail/mailnames/domain.tld/kundtjanst
> Dec 16 14:11:15 web01 qmail: 1260969075.845046 starting delivery 3717:
> msg 4254303 to local 98-kundtja...@domain.tld
> Dec 16 14:11:15 web01 qmail: 1260969075.845046 status: local 1/10 remote
> 0/20
> Dec 16 14:11:15 web01 qmail: 1260969075.853046 delivery 3717: success:
> did_0+0+2/
> Dec 16 14:11:15 web01 qmail: 1260969075.853046 status: local 0/10 remote
> 0/20
> Dec 16 14:11:15 web01 qmail: 1260969075.853046 end msg 4254303
>
> This is the header of the mail:
>
> Received: (qmail 28540 invoked from network); 16 Dec 2009 14:11:15 +0100
> Received-SPF: none (no valid SPF record)
> Received: from unknown (HELO ?125.178.185.144?) (125.178.185.144)
>    by 1.2.3.4 with (RC4-MD5 encrypted) SMTP; 16 Dec 2009 14:11:15 +0100
> From: Pfizer ® Customer Service<kundtja...@domain.tld>
> To: kundtja...@domain.tld
> Subject: Special offer kundtja...@e-s.se receive 70% OFF on Pfizer.
>
> Where 1.2.3.4 is the ip of my pleskserver. Don't know what it means, but
> the server is not open for relay.
>
> Kind Regards.
> M
>
> And i have @domain.tld in blacklisted_senders file. So why the hell does
> these keep coming?
>
> Ulrich C. Manns skrev:
>> If your users will use authentification there is no problem by
>> blocking subdomains also. ?¿?
>>
>> You could add /reject-ip-in-cc-rdns/ to your /spamdyke.conf/ also.
>>
>> Regards,
>> Ulrich
>>
>> Am 16.12.2009 um 07:27 schrieb Magnus Ringdahl:
>>
>>> Believe me, have hav been reading that documentation many times.
>>> This is what i read:
>>> "One form of wildcard address is supported. All usernames within a
>>> domain (and its subdomains) may be blocked by a line starting with |@|.
>>> For example, if the file contained the following entry:| @example.com|
>>> spamdyke will block mail to |f...@example.com|, |f...@mail.example.com|,
>>> |bar...@mail.internal.example.com|, etc."
>>>
>>> Kind Regards
>>> M
>>>
>>> Ulrich C. Manns skrev:
>>>> Look at the documentation
>>>> here:
>>>> http://www.spamdyke.org/documentation/README.html#REJECTING_ADDRESSES
>>>>
>>>>
>>>> Spam comes from /paul.si...@artgarfunkel.com
>>>> <mailto:/paul.si...@artgarfunkel.com>
>>>> <mailto:paul.si...@artgarfunkel.com>/
>>>>
>>>> Add: /sender-blacklist-entry=.artgarfunkel.com/
>>>> or: /sender-blacklist-ent...@artgarfunkel.com
>>>> <mailto:/sender-blacklist-ent...@artgarfunkel.com>
>>>> <mailto:sender-blacklist-ent...@artgarfunkel.com>/
>>>> to your /spamdyke.conf/
>>>>
>>>> Be shure that your user uses authentification!
>>>>
>>>> Regards,
>>>> Ulrich
>>>>
>>>> Am 15.12.2009 um 22:36 schrieb Magnus Ringdahl:
>>>>
>>>>> Hi, and thanks for your reply.
>>>>> Should i use a "." instead of a "@" as a wildcard?
>>>>>
>>>>> Kind Regards
>>>>> M
>>>>>
>>>>>
>>>>> Ulrich C. Manns skrev:
>>>>>> Just add your domain to the senders blacklist with a . as wildchard.
>>>>>> Example: u...@spam.com<mailto:u...@spam.com>
>>>>>> <mailto:u...@spam.com>  ->  .spam.com
>>>>>>
>>>>>> Your Users should use authentification. So they can send e-mail
>>>>>> through spamdyke.
>>>>>>
>>>>>> Regards,
>>>>>> Ulrich
>>>>>>
>>>>>> Am 15.12.2009 um 21:54 schrieb Magnus Ringdahl:
>>>>>>
>>>>>>
>>>>>>> Hi.
>>>>>>> I have been using spamdyke for quite some time now, and it reduces my
>>>>>>> spammails alot.
>>>>>>> But it have a hell of a problem with spammers (often viagra) the
>>>>>>> spoof
>>>>>>> the localdomains.
>>>>>>> I often get spammails where the sending address is the same as my
>>>>>>> receiving address.
>>>>>>> And i dint know how to block them.
>>>>>>>
>>>>>>> I have pasted my configurationfiles so you coould see if there is
>>>>>>> some
>>>>>>> issues. Using Debian and Plesk 9.2.
>>>>>>>
>>>>>>> spamdyke.conf
>>>>>>> ------------------------------------
>>>>>>> log-level=verbose
>>>>>>> filter-level=normal
>>>>>>> local-domains-file=/var/qmail/control/rcpthosts
>>>>>>> max-recipients=20
>>>>>>> idle-timeout-secs=60
>>>>>>> graylist-level=only
>>>>>>> graylist-dir=/var/qmail/spamdyke/greylist
>>>>>>> graylist-min-secs=300
>>>>>>> graylist-max-secs=1814400
>>>>>>>
>>>>>>> sender-whitelist-file=/var/qmail/spamdyke/whitelisted_senders
>>>>>>> rdns-whitelist-file=/var/qmail/spamdyke/whitelisted_rdns
>>>>>>> ip-whitelist-file=/var/qmail/spamdyke/whitelisted_ip
>>>>>>>
>>>>>>> sender-blacklist-file=/var/qmail/spamdyke/blacklisted_senders
>>>>>>> recipient-blacklist-file=/var/qmail/spamdyke/blacklisted_recipients
>>>>>>> ip-blacklist-file=/var/qmail/spamdyke/blacklisted_ip
>>>>>>> dns-blacklist-entry=zen.spamhaus.org
>>>>>>>
>>>>>>> reject-empty-rdns
>>>>>>> reject-unresolvable-rdns
>>>>>>> greeting-delay-secs=5
>>>>>>> reject-missing-sender-mx
>>>>>>>
>>>>>>> policy-url=http://www.your-domain-here.com/spam_policy
>>>>>>> --------------------------------------------------------------------
>>>>>>>
>>>>>>> smtp_psa
>>>>>>> --------------------------------------------------
>>>>>>> service smtp
>>>>>>> {
>>>>>>>       socket_type     = stream
>>>>>>>       protocol        = tcp
>>>>>>>       wait            = no
>>>>>>>       disable         = no
>>>>>>>       user            = root
>>>>>>>       instances       = UNLIMITED
>>>>>>>       env             = SMTPAUTH=1
>>>>>>>       server          = /var/qmail/bin/tcp-env
>>>>>>>       server_args     = -Rt0 /usr/local/bin/spamdyke -f
>>>>>>> /etc/spamdyke.conf /var/qmail/bin/relaylock
>>>>>>> /var/qmail/bin/qmail-smtpd
>>>>>>> /var/qmail/bin/smtp_auth /var/qmail/bin/true
>>>>>>> /var/qmail/bin/cmd5checkpw
>>>>>>> /var/qmail/bin/true
>>>>>>> }
>>>>>>> ---------------------------------------------------------
>>>>>>>
>>>>>>> The whitelisted_ip file contains the mailservers ip-addresses.
>>>>>>> The blacklisted_senders file contains the localdomains (@domain.tld).
>>>>>>> The blacklisted_words contains alot of words like .t-dialin.net,
>>>>>>> .t-ipconnect.de, .in-addr.arpa, .dhcp, .net, in-addr.arpa, dhcp,
>>>>>>> dynamic, and so on.
>>>>>>>
>>>>>>> I understand the spamdyke filters that they work something like
>>>>>>> this. If
>>>>>>> the sending server is listed in whitelisted_ip the mail passes the
>>>>>>> filter. If its not listed in whitelisted_ip it then checks the
>>>>>>> blabklisted_senders if the sending address is listed it drops the
>>>>>>> mail.
>>>>>>> Is that correct?
>>>>>>>
>>>>>>> Here is a sample of the mail.log of a spammail that in my opinion
>>>>>>> should
>>>>>>> have been dropped but passes all filters.
>>>>>>>
>>>>>>> Dec 15 17:52:55 web01 spamdyke[24928]: TLS_ENCRYPTED from:
>>>>>>> (unknown) to:
>>>>>>> (unknown) origin_ip: 80.179.197.221 origin_rdns:
>>>>>>> 80.179.197.221.cable.012.net.il auth: (unknown)
>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]: Handlers Filter
>>>>>>> before-queue for qmail started ...
>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>>> from=vioirecyf8...@012.net.il
>>>>>>> <mailto:from=vioirecyf8...@012.net.il>
>>>>>>> <mailto:from=vioirecyf8...@012.net.il>
>>>>>>> Dec 15 17:52:56 web01 qmail-queue-handlers[24946]:
>>>>>>> to=i...@domain.tld<mailto:to=i...@domain.tld>
>>>>>>> <mailto:to=i...@domain.tld>
>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: Starting spf filter...
>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF result: neutral
>>>>>>> Dec 15 17:52:56 web01 spf filter[24947]: SPF status: PASS
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 new msg 4252544
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.491935 info msg 4252544:
>>>>>>> bytes
>>>>>>> 2246 from<vioirecyf8...@012.net.il<mailto:vioirecyf8...@012.net.il>
>>>>>>> <mailto:vioirecyf8...@012.net.il>>  qp 24948 uid 2020
>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: Handlers Filter
>>>>>>> before-local for qmail started ...
>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>>> from=vioirecyf8...@012.net.il
>>>>>>> <mailto:from=vioirecyf8...@012.net.il>
>>>>>>> <mailto:from=vioirecyf8...@012.net.il>
>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]:
>>>>>>> to=i...@domain.tld<mailto:to=i...@domain.tld>
>>>>>>> <mailto:to=i...@domain.tld>
>>>>>>> Dec 15 17:52:56 web01 qmail-local-handlers[24949]: mailbox:
>>>>>>> /var/qmail/mailnames/domain.tld/info
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 starting delivery
>>>>>>> 2744:
>>>>>>> msg 4252544 to local 9-i...@domain.tld<mailto:9-i...@domain.tld>
>>>>>>> <mailto:9-i...@domain.tld>
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.515935 status: local 1/10
>>>>>>> remote
>>>>>>> 0/20
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 delivery 2744:
>>>>>>> success:
>>>>>>> did_0+0+2/
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 status: local 0/10
>>>>>>> remote
>>>>>>> 0/20
>>>>>>> Dec 15 17:52:56 web01 qmail: 1260895976.523935 end msg 4252544
>>>>>>>
>>>>>>> Dec 15 21:22:57 web01 /var/qmail/bin/relaylock[6350]:
>>>>>>> /var/qmail/bin/relaylock: mail from 125.25.15.31:52521
>>>>>>> (125.25.15.31.adsl.dynamic.totbb.net)
>>>>>>> Dec 15 21:22:59 web01 spamdyke[6349]: TLS_ENCRYPTED from:
>>>>>>> (unknown) to:
>>>>>>> (unknown) origin_ip: 125.25.15.31 origin_rdns:
>>>>>>> 125.25.15.31.adsl.dynamic.totbb.net auth: (unknown)
>>>>>>> Dec 15 21:23:01 web01 qmail-queue-handlers[6354]: Handlers Filter
>>>>>>> before-queue for qmail started ...
>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>>> from=kundtja...@domain.tld<mailto:from=kundtja...@domain.tld>
>>>>>>> <mailto:from=kundtja...@domain.tld>
>>>>>>> Dec 15 21:23:02 web01 qmail-queue-handlers[6354]:
>>>>>>> to=kundtja...@domain.tld<mailto:to=kundtja...@domain.tld>
>>>>>>> <mailto:to=kundtja...@domain.tld>
>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Starting spf filter...
>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Error code: (2) Could not
>>>>>>> find a
>>>>>>> valid SPF record
>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: Failed to query MAIL-FROM: No
>>>>>>> DNS data for 'domain.tld'.
>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF result: none
>>>>>>> Dec 15 21:23:02 web01 spf filter[6355]: SPF status: PASS
>>>>>>> Dec 15 21:23:02 web01 qmail-queue[6356]: scan: the
>>>>>>> message(drweb.tmp.Wu6OR3) sent by kundtja...@domain.tld
>>>>>>> <mailto:kundtja...@domain.tld>
>>>>>>> <mailto:kundtja...@domain.tld>  to
>>>>>>> kundtja...@domain.tld<mailto:kundtja...@domain.tld>
>>>>>>> <mailto:kundtja...@domain.tld>  is passed
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 new msg 4253887
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.819935 info msg 4253887:
>>>>>>> bytes
>>>>>>> 2469 from<kundtja...@domain.tld<mailto:kundtja...@domain.tld>
>>>>>>> <mailto:kundtja...@domain.tld>>  qp
>>>>>>> 6357 uid 2020
>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: Handlers Filter
>>>>>>> before-local for qmail started ...
>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>>> from=kundtja...@domain.tld<mailto:from=kundtja...@domain.tld>
>>>>>>> <mailto:from=kundtja...@domain.tld>
>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]:
>>>>>>> to=kundtja...@domain.tld<mailto:to=kundtja...@domain.tld>
>>>>>>> <mailto:to=kundtja...@domain.tld>
>>>>>>> Dec 15 21:23:02 web01 qmail-local-handlers[6358]: mailbox:
>>>>>>> /var/qmail/mailnames/domain.tld/kundtjanst
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 starting delivery
>>>>>>> 2998:
>>>>>>> msg 4253887 to local 98-kundtja...@domain.tld
>>>>>>> <mailto:98-kundtja...@domain.tld>
>>>>>>> <mailto:98-kundtja...@domain.tld>
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.855935 status: local 1/10
>>>>>>> remote
>>>>>>> 0/20
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 delivery 2998:
>>>>>>> success:
>>>>>>> did_0+0+2/
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 status: local 0/10
>>>>>>> remote
>>>>>>> 0/20
>>>>>>> Dec 15 21:23:02 web01 qmail: 1260908582.859935 end msg 4253887
>>>>>>>
>>>>>>> How can i check that smtp_auth is working? Im starting to wonder that
>>>>>>> it's not.
>>>>>>> I hope someone have the time to answer. I have been struggling with
>>>>>>> this
>>>>>>> for a long time withput getting rid of those annoying mails.
>>>>>>>
>>>>>>> Kind Regards
>>>>>>> M
>>>>>>>
>>>>>>>
>>>>>>> Eduard Svarc skrev:
>>>>>>>
>>>>>>>> Hello,
>>>>>>>>
>>>>>>>> these keywords .net and .com are used just for testing if IP is in
>>>>>>>> reverse DNS listed. Is not done against normal reverse DNS
>>>>>>>> records for
>>>>>>>> servers like mail.somedomain.net<http://mail.somedomain.net>
>>>>>>>> <http://mail.somedomain.net>. So
>>>>>>>> in combination with keyword
>>>>>>>> reject-ip-in-cc-rdns and .net in file
>>>>>>>> /etc/spamdyke/ip-in-rdns-keyword-blacklist-file it will reject mail
>>>>>>>> from 242-29-179-94.pool.ukrtel.net
>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>  because that sender will be
>>>>>>>> positively tested as not valid reverse DNS.
>>>>>>>>
>>>>>>>> use just net without that '.' is not suficient because SPAMDYKE use
>>>>>>>> this '.' as flag for testing end of string only. So listing .com and
>>>>>>>> .net does magic for SPAMDYKE when it testing IP in reverse DNS for
>>>>>>>> country code DNS, like .it,, .uk etc it does same for .com and .net.
>>>>>>>> Personally I did add into that file other ones special domains like
>>>>>>>> .eu, .org, .info, .biz. These should not be used by ISP
>>>>>>>> providers for
>>>>>>>> assigning reverse names, but who knows. Anyway it doesn't hurt my
>>>>>>>> configuration and I'm preparded.
>>>>>>>>
>>>>>>>> Eduard Švarc
>>>>>>>>
>>>>>>>> DATA Intertech s.r.o.
>>>>>>>> Kladenská 46
>>>>>>>> 160 00 Praha 6
>>>>>>>> Czech Republic
>>>>>>>> tel. +420-235365267, fax +420-235361446
>>>>>>>>
>>>>>>>> spamdyke-users-boun...@spamdyke.org
>>>>>>>> <mailto:spamdyke-users-boun...@spamdyke.org>
>>>>>>>> <mailto:spamdyke-users-boun...@spamdyke.org>  wrote on 14.12.2009
>>>>>>>> 09:55:45:
>>>>>>>>
>>>>>>>>
>>>>>>>>> thanks Eduard Švarc
>>>>>>>>>
>>>>>>>>> Same query as david stiller raised, .com, .net are valid domain
>>>>>>>>> right?
>>>>>>>>>
>>>>>>>>> also
>>>>>>>>>
>>>>>>>>> @400000004b25fa572bd181a4 CHKUSER accepted rcpt: from
>>>>>>>>> <fx...@bmelaw.
>>>>>>>>> com::>  remote<microsof-7b1919:unknown:94.179.29.242>  rcpt
>>>>>>>>> <validdomainu...@mydomain.com<mailto:validdomainu...@mydomain.com>
>>>>>>>>> <mailto:validdomainu...@mydomain.com>>  : found existing recipient
>>>>>>>>> @400000004b25fa572bd2316c spamdyke[27021]: ALLOWED from:
>>>>>>>>> fx...@bmelaw.com<mailto:fx...@bmelaw.com>
>>>>>>>>> <mailto:fx...@bmelaw.com>  to:
>>>>>>>>> validdomainu...@mydomain.com<mailto:validdomainu...@mydomain.com>
>>>>>>>>> <mailto:validdomainu...@mydomain.com>  origin_ip: 94.179.
>>>>>>>>> 29.242 origin_rdns: 242-29-179-94.pool.ukrtel.net
>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>
>>>>>>>>> <http://242-29-179-94.pool.ukrtel.net>  auth: (unknown)
>>>>>>>>>
>>>>>>>>> the above ip is listed in rbl ,
>>>>>>>>>
>>>>>>>>> IP Address Lookup
>>>>>>>>>
>>>>>>>>> [image removed]
>>>>>>>>>
>>>>>>>>> 94.179.29.242 is not listed in the SBL
>>>>>>>>> 94.179.29.242 is listed in the PBL, in the following records:
>>>>>>>>> PBL239543
>>>>>>>>> 94.179.29.242 is not listed in the XBL
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> this doesnt look like false positive
>>>>>>>>>
>>>>>>>>> From: Eduard Svarc<esv...@intertech.cz
>>>>>>>>> <mailto:esv...@intertech.cz>  <mailto:esv...@intertech.cz>>
>>>>>>>>> To: spamdyke users<spamdyke-users@spamdyke.org
>>>>>>>>> <mailto:spamdyke-users@spamdyke.org>
>>>>>>>>> <mailto:spamdyke-users@spamdyke.org>>
>>>>>>>>> Sent: Mon, December 14, 2009 12:48:07 PM
>>>>>>>>> Subject: Re: [spamdyke-users] spamdyke configuration finetuneing
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Hello,
>>>>>>>>>
>>>>>>>>> I see you have two things out. 1st you using RBLS, that could give
>>>>>>>>> you a lot positive false spam. 2nd you completely have
>>>>>>>>> commented out
>>>>>>>>> best thing in SPAMDYKE. Is sniffing IPs in reverse DNS. Most of
>>>>>>>>> bots
>>>>>>>>> and spams comming from Internet zombies. Here are my advices:
>>>>>>>>>
>>>>>>>>> 1 - comment out dns-blacklist-entry=zen.spamhaus.org
>>>>>>>>> 2 - uncoment reject-empty-rdns, reject-ip-in-cc-rdns, reject-
>>>>>>>>> missing-sender-mx and reject-unresolvable-rdns
>>>>>>>>> 3- into /etc/spamdyke/blacklist_recipients add your domain in
>>>>>>>>> format
>>>>>>>>> @your-domain (it will block all mails like to: n...@your-domain
>>>>>>>>> from:
>>>>>>>>> n...@your-domain)
>>>>>>>>> 4- into /etc/spamdyke/ip-in-rdns-keyword-blacklist-file put these
>>>>>>>>>
>>>>>>>> words :
>>>>>>>>
>>>>>>>>> dsl
>>>>>>>>> .com
>>>>>>>>> .net
>>>>>>>>> broadband
>>>>>>>>> dynamic
>>>>>>>>>
>>>>>>>>> I could guarantee you will fall bellow 1% of SPAM with nearly zero
>>>>>>>>> false positives. Of course someone who can't follow certain
>>>>>>>>> guidelines for theirs servers will not be able to send you e-mails
>>>>>>>>> at all. But you can easily handle it by adding IP's in
>>>>>>>>> /etc/spamdyke/whitelist_ip or adding senders into
>>>>>>>>> /etc/spamdyke/whitelist_senders
>>>>>>>>>
>>>>>>>>> I stop using any RBLS services ages ago, they are way unreliable.
>>>>>>>>>
>>>>>>>>> Good luck,
>>>>>>>>> Eduard Švarc
>>>>>>>>>
>>>>>>>>> DATA Intertech s.r.o.
>>>>>>>>> Kladenská 46
>>>>>>>>> 160 00 Praha 6
>>>>>>>>> Czech Republic
>>>>>>>>> tel. +420-235365267, fax +420-235361446
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to