Patrick Sneyers wrote:
Op 21-feb-06, om 16:08 heeft Matt Kettler het volgende geschreven:
Patrick Sneyers wrote:
These don't hit very much in my setup. They get caught with the new
Reverse-Check feature in CommuniGate.
Do you know what this test does?
I've been getting wuite a few of these plain text spams lately.
If you had SPF support, this would have caught SPF_NEUTRAL (gmail does
publish a SPF record).
Also, Do you use regular RBL's? This should have hit the XBL check
(although there's a chance it wasn't listed at the time you got it)
This test connects to the return-path domain's primary mx, and expects a
250 response. If not, it retries/rejects (4xx/5xx) or adds a header.
Kind of link this:
http://www.dnsreport.com/tools/mail.ch?domain=mkettler_sa%40comcast.net
Basicly, a "mail you cannot reply to is suspicious" thingy.
Just for the record: I once added such a test to spamassassin doing
exactly such a callout using Mail::Checkuser. It was quite easy, but my
suggestion to add such a test to spamassassin received little positive
response, so it was never published.
Meanwhile I have exim perform such a callout to the envelope-from and
add a header to each mail if this callout fails. Much more efficient,
espacially since exim caches callout-results and I using that
information in spamassassin is just a simple header-check.