On 17.04.25 15:47, DEMBLANS Mathieu wrote:
Thanks for the link, I will study that. Our local nameserver DOESN’T USE shared/open nameservers, it transmit to the good nameservers (for spamhaus, their NS).
do you mean that your nameservers do iterative resolution or you have configured forwarding on them?
Why being so aggressive in your response ? You probably have a incredibly knowledge you have since you’re born, but I’m not, sorry. Instead of that have constructive responses. Clear informations are sometimes hard to find. If you don’t wan to help, don’t respond.
- If you are getting RCVD_IN_ZEN_BLOCKED_OPENDNS, it's possible that your queries are somehow forwarded through open nameservers.
- there are still URIBL_ZEN_BLOCKED rules that need to be blocked. use dns_query_restriction to disable access to spamhaus completely.
Am 16.04.25 um 10:18 schrieb DEMBLANS Mathieu: Hello everyone, I try to disable the dnsbl request done to spamhaus.org but the solutions I found doesn’t work. I put score RCVD_IN_ZEN_BLOCKED_OPENDNS 0 score RCVD_IN_ZEN_BLOCKED 0 score __RCVD_IN_ZEN 0 in local.cf but spamassassin still do dns request to spamhaus. Doing the same with spamcop (score RCVD_IN_BL_SPAMCOP_NET 0) works correctly. I forgot something or there is a bug ? Thanks for your help
-- Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Save the whales. Collect the whole set.