Patrick Sneyers wrote:

Op 21-feb-06, om 16:08 heeft Matt Kettler het volgende geschreven:

Patrick Sneyers wrote:
These don't hit very much in my setup. They get caught with the new
Reverse-Check feature in CommuniGate.
Do you know what this test does?
I've been getting wuite a few of these plain text spams lately.

If you had SPF support, this would have caught SPF_NEUTRAL (gmail does
publish a SPF record).

Also, Do you use regular RBL's? This should have hit the XBL check
(although there's a chance it wasn't listed at the time you got it)


This test connects to the return-path domain's primary mx, and expects a 250 response. If not, it retries/rejects (4xx/5xx) or adds a header.
Kind of link this:
http://www.dnsreport.com/tools/mail.ch?domain=mkettler_sa%40comcast.net

Basicly, a "mail you cannot reply to is suspicious" thingy.
Just for the record: I once added such a test to spamassassin doing exactly such a callout using Mail::Checkuser. It was quite easy, but my suggestion to add such a test to spamassassin received little positive response, so it was never published. Meanwhile I have exim perform such a callout to the envelope-from and add a header to each mail if this callout fails. Much more efficient, espacially since exim caches callout-results and I using that information in spamassassin is just a simple header-check.

Reply via email to