Anthony Peacock a écrit :
[..]
0.9 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
[62.57.252.74 listed in zen.spamhaus.org]
3.0 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
2.0 RCVD_IN_JANET_DUL RBL: Relay in JANET MAPS RBL+ DUL
[62.57.252.74 listed in
rbl-plus.mail-abuse.ja.net]
0.9 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP
address
[62.57.252.74 listed in dnsbl.sorbs.net]
2.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see
<http://www.spamcop.net/bl.shtml?62.57.252.74>]
0.1 BOTNET_CLIENTWORDS Hostname contains client-like substrings
[botnet_clientwords,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com]
1.5 BOTNET Relay might be a spambot or virusbot
[botnet0.8,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com,client,ipinhostname,clientwords]
0.1 BOTNET_IPINHOSTNAME Hostname contains its own IP address
[botnet_ipinhosntame,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com]
0.1 BOTNET_CLIENT Relay has a client-like hostname
[botnet_client,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com,ipinhostname,clientwords]
0.1 RDNS_NONE Delivered to trusted network by a host
with no rDNS
[...]
Hello,
Could you give us the line from your local.cf to enable such tests ?
Thanks in advance,
Adam.