> >
>
> Actually in some ways this leads to an interesting idea. In our wiki
> here perhaps we should write some guidelines for banks and everyone else
> running legitimate email servers as to what is the correct way to
> configure their servers. The first thig that come to mind is getting
On Wednesday, June 4, 2008, 7:04:50 AM, Jack Gostl wrote:
> I'm not sure if this can even be handled, but I thought I'd put it out there.
> Someone is using our email address to originate spam. We are
> getting bombed with "Mail undeliverable" etc. messages from
> failed spam delivery attempts. Th
On Wed, 4 Jun 2008, Obantec Support wrote:
i looked over the above and my server seems to conform but it still scores
low on an example email.
X-Spam-Checker-Version: SpamAssassin 3.2.4 (2008-01-01) on my.mailserver.net
X-Spam-Level: ***
X-Spam-Status: No, score=3.6 required=4.5 tests=ANY_BOUN
On Wed, June 4, 2008 17:11, mouss wrote:
> If they can't configure their system to reject invalid recipients at
> smtp time, there is no hope that they will setup SPF checking correctly!
it was olso my conclusion after i have writed it :-)
Benny Pedersen
Need more webspace ? http://www.servage
- Original Message -
From: "Benny Pedersen" <[EMAIL PROTECTED]>
To:
Sent: Wednesday, June 04, 2008 3:17 PM
Subject: Re: Undeliverable mails
On Wed, June 4, 2008 16:04, Jack Gostl wrote:
Does anyone have any suggestions?
http://old.openspf.org/wizard.html?mydomain=argoscomp.com&
> On Tue, June 3, 2008 19:18, Jari Fredriksson wrote:
>
> > Ya, it moves email having 8 bit characters in headers to quarantine.
>
> true, but please start a new thread not just reply
>
> > That's bad.. While it's againts RFC's to put 8 bit characters to
> > headers, many do so. So I have set am
Benny Pedersen wrote:
On Wed, June 4, 2008 16:45, Dan Barker wrote:
Trying to educate the sysadmins producing the backscatter is a hopeless
cause (imo).
first problem to solve is bounce and not reject
you mean the opposite.
if sysadmins wonder why there server bounces alot of ma
On Tuesday, June 3, 2008, 10:31:43 AM, Joseph Brennan wrote:
> --On Tuesday, June 3, 2008 9:32 -0700 Kelson <[EMAIL PROTECTED]> wrote:
>> Marc Perkel wrote:
>>> If the FCrDNS matches one of these domains it is ham.
>>> If the sender or from address matches one of these domains and the
>>> domain
Marc Perkel wrote:
Actually in some ways this leads to an interesting idea. In our wiki
here perhaps we should write some guidelines for banks and everyone
else running legitimate email servers as to what is the correct way to
configure their servers. The first thig that come to mind is get
On Wed, June 4, 2008 16:45, Dan Barker wrote:
> Trying to educate the sysadmins producing the backscatter is a hopeless
> cause (imo).
first problem to solve is bounce and not reject
if sysadmins wonder why there server bounces alot of mail we could reduce the
problem there
maybe i am ignorant
That's exactly what VBounce is for. If a bounce message does not contain
your MTA, it's either backscatter (safe to delete) or useless (from AOHell,
for example). If you can't track the source, you don't need to see it. I get
about 10 legitimate bounces a day, and VBounce takes care of about 200
ba
Randal, Phil wrote:
We should be marking ALL such behaviour as phishing and hope that the
banks (etc) finally get a clue.
I certainly wouldn't trust my money with an outfit that was that
clueless about security.
Cheers,
Phil
Actually in some ways this leads to an interesting idea. In
On Wed, June 4, 2008 16:04, Jack Gostl wrote:
> Does anyone have any suggestions?
http://old.openspf.org/wizard.html?mydomain=argoscomp.com&submit=Go%21
could be a start
and use pypolicyd-spf for testing
and if you get mails from remote [EMAIL PROTECTED] then contackt them if
recived path mat
I'm not sure if this can even be handled, but I thought I'd put it out there.
Someone is using our email address to originate spam. We are getting bombed
with "Mail undeliverable" etc. messages from failed spam delivery attempts.
This morning I check my inbox and found almost 100 of these since
On Wed, June 4, 2008 09:30, Randal, Phil wrote:
> We should be marking ALL such behaviour as phishing and hope that the
> banks (etc) finally get a clue.
i hope banks using ssl, but this does not help if phishers sends phising mails
to there "custommers" pretending its there banks webpages, this
On Wed, June 4, 2008 05:41, [EMAIL PROTECTED] wrote:
> I am getting dozens of Spam email pass thru spamassassin with the header:
>
> X-Lennon.Postino-Lennon_June_2008_MailScanner-SpamAssassinCheckv3.2.4: not
> spam (whitelisted),
> SpamAssassin (not cached, score=15.769, required 4.1, autol
On Tue, June 3, 2008 19:18, Jari Fredriksson wrote:
> Ya, it moves email having 8 bit characters in headers to quarantine.
true, but please start a new thread not just reply
> That's bad.. While it's againts RFC's to put 8 bit characters to headers, many
> do so. So I have set amavis to pass th
Joseph Brennan said:
> Many banks also send mail from third-party servers. Bank of America
sends from
> customercenter.com and par3.com. American Express sends from aexp.com
(which is
> theirs) and cheetahmail.com. Some send from bigfoot. It's only
personal bank
> account information-- why kee
18 matches
Mail list logo