Anthony Peacock a écrit :

[..]
 0.9 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                            [62.57.252.74 listed in zen.spamhaus.org]
 3.0 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
 2.0 RCVD_IN_JANET_DUL      RBL: Relay in JANET MAPS RBL+ DUL
[62.57.252.74 listed in rbl-plus.mail-abuse.ja.net] 0.9 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address
                            [62.57.252.74 listed in dnsbl.sorbs.net]
 2.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?62.57.252.74>]
 0.1 BOTNET_CLIENTWORDS     Hostname contains client-like substrings

[botnet_clientwords,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com]
 1.5 BOTNET                 Relay might be a spambot or virusbot
[botnet0.8,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com,client,ipinhostname,clientwords]
 0.1 BOTNET_IPINHOSTNAME    Hostname contains its own IP address

[botnet_ipinhosntame,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com]
 0.1 BOTNET_CLIENT          Relay has a client-like hostname
[botnet_client,ip=62.57.252.74,rdns=62.57.252.74.dyn.user.ono.com,ipinhostname,clientwords] 0.1 RDNS_NONE Delivered to trusted network by a host with no rDNS
[...]

Hello,

Could you give us the line from your local.cf to enable such tests ?

Thanks in advance,

Adam.

Reply via email to