Don Levey wrote:
> Rick Macdougall wrote:
>> Daniel Quinlan wrote:
>>> Raymond Dijkxhoorn <[EMAIL PROTECTED]> writes:
>>>
>>>
>>>> Ohw well, lists.surbl.org also. At some point they hopefully
>>>> understand that list will completely useless, and indeed insain for
>>>> people to actually use it. Sadly, people still do.
>>>
>>>
>>> Whatever your unstated reasons are, I beg to differ.  Weekly
>>> mass-check results for SURBL:
>>
>> Perhaps he means spews lists lists.surbl.org.  I can't see anyone
>> having issues with any of the SURBL RBL's.
>>
> I must not have things set up correctly then.
> I get many MANY false positives from the SURBL lists, in the case
> where the server that actually sent me the message records the IP
> from which they received it.
>
> For example, [EMAIL PROTECTED] sends me email.  It goes from his PC to
> the MTA of fubar.isp, and from there to my server.  Fubar.isp records
> the PC's IP address in the headers, and passes the message; on my
> server, Spamassassin sees that the original IP is listed, and tags
> it.  Never mind that it came to me via a reputable server, the
> original IP is "bad".
>
> How, then, do I fix this so that the lists are more useful: so that
> they check the most recent hop, and not (necessarily) all hops in the
>  chain? -Don

It was pointed out to me that SURBL lists only check URLs - I apologise for
that.  I *am* getting the problem described above with hits on Spamcop and
SORBS.  Additionally, apparently even the mere text mention of a .biz
address triggers that flag - even though it talks about a URL.  For example,
on one mailing list there is a poster who posts from a .biz address.  Any
thread to which he posts is automatically contaminated, because his address
is included in the text of the message - even though these are NOT URLs.

 -Don

Reply via email to