Marc Perkel wrote:
> Getting a lot of these:
>
> spamd: bad protocol: header error: (closed before headers) at
> /usr/bin/spamd line 2001.
>
> Not sure what this means. Thanks in advance for your help.
That implies that something opened up a network socket to spamd, then closed
the socket before
Yes, spammers use every MTA available. As well as webmail services, SMTP
capable scripts, and hijacked accounts using legitimate mail servers. It's
likely impossible to get a statistically significant correlation between an
MTA and spamminess of the mail the comes through it. When you add to
Jason Bertoch wrote:
> I think it's safe to say I'm not in the minority when I receive SPF-Compliant
> spam. I'm looking for opinions on what we can honestly derive from such
> messages regarding the sending server's IP and the sending address' domain
> name.
> Is it wise to blacklist both, or is