Are there any rules for DNS forgeries in SA 2.53? I had a message pass through whose
forged From: line was from a domain that has a whitelist entry, but the sender
basically set up a PTR record to resolve back to that domain. Is there any way to
prevent this?
--
ct it.
-Original Message-
From: Matt Kettler [mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 03, 2002 10:42 PM
To: Rice, Kevin; [EMAIL PROTECTED]
Subject: Re: [SAtalk] RBL question
Yes, each RBL has it's own scores and rules. Setting the score of a given
RBL rule disables it,
It looks like all of the different pages/posts I've seen on recommended SA setup talk
about turning off RBL lookups. I can understand this in that it could cause things to
timeout waiting on a response from a remote service. I have a subscription to MAPS
though and keep a local copy of their zo
I'm using v0.1.2 of spamass-milter with SA 2.4.1/sendmail 8.12.6 on Debian woody and
seeing messages similar to the following in my logs:
Oct 1 21:12:02 miltshield spamd[2751]: identified spam (5.0/4.0) for root:65534 in
12 seconds, 1168 bytes.
Oct 1 21:12:02 miltshield sm-mta[2748]: g922Bk
Title: RE: [SAtalk] Is there an HOWTO for SA and SendMail
Check out spamass-milter. Its built specifically for this purpose:
http://savannah.gnu.org/projects/spamass-milt/
-Original Message-
From: Dave Strickler [mailto:[EMAIL PROTECTED]]
Sent: Saturday, April 27, 2002 9:12 AM
To: