Hello,
May sound like a stupid question but what is the best way to use the
clamav-unofficial-sigs which we download.
So, clamav-unofficial-sigs are copied to
"clamav-unofficial-sigs/unofficial-dbs/*/*"
and
clamav are downloaded to "share/clamav"
So, do we copy clamav-unofficial-sigs to
Trying not to get too far off topic, but I wanted to add if you reject
based on the hostname of the mail server that can also drop an
overwhelming majority of the spam. The most basic test is to see if
the IP resolves to anything. Next, does the hostname contain any red
flags, like: dhcp, dynamic,
Highly configurable scripts exist to handle the third-party signatures and it is
all very well documented at the Sane Security web site (
https://sanesecurity.com ). These same scripts are available at multiple repos
as installable packages for many operating systems as well.
dp
On 2/10/19 6:
Best practice has always been least-expensive first and incrementally more
expensive to follow. This begins with iptables (essential regardless of
expense), tcpwrappers, DenyHosts, Fail2Ban, grey listing, country-code tables,
access tables (sendmail and Postfix), multilayer milters, finally, AV
Hello again,
On Sun, 10 Feb 2019, Gene Heskett wrote:
most of what gets my attention comes from local to the US servers
Well the USA _is_ the world's number one spam source. :(
, like earthlink.
In addition to DNSBL stuff I operate ten local blacklists - see my
blacklist list below. Eart
On Sunday 10 February 2019 13:08:59 G.W. Haywood wrote:
> Hello again,
>
> On Sun, 10 Feb 2019, Gene Heskett wrote:
> > most of what gets my attention comes from local to the US servers
>
> Well the USA _is_ the world's number one spam source. :(
>
> > , like earthlink.
>
> In addition to DNSBL st