Josh Trutwin wrote:
On Fri, 26 Jan 2007 16:43:17 -0800
John Rudd <[EMAIL PROTECTED]> wrote:

X-Envelope-From: [EMAIL PROTECTED]
Received: from netbits.us ([209.18.107.89])
  by 0 ([192.168.0.3])
  with SMTP via SSL; 25 Jan 2007 23:47:53 -0000
That would seem to be your problem.  I bet SA thinks that means
the machine has no reverse DNS.  And netbits.us has a completely
different IP address than that.
SA or Botnet?
SA. SA is the one that interprets the headers. Botnet reads the interpreted headers.

This is only scoring a 5.1 though - I posted the SA report in a
previous message, my only bad hit is from Botnet:

Content analysis details:   (5.1 points, 5.0 required)


 0.0 DK_POLICY_SIGNSOME     Domain Keys: policy says domain signs
some mails 5.0 BOTNET Relay might be a spambot or
virusbot
[botnet0.7,ip=209.18.107.89,hostname=netbits.us,maildomain=davidtrutwin.com,baddns]
1.5 RCVD_NUMERIC_HELO      Received: contains an IP address used
for HELO -0.2 BAYES_40 BODY: Bayesian spam probability is 20 to 40% [score: 0.3696] -1.2 AWL AWL: From: address is in the auto
white-list


I'm curious to see if changing the PTR records will help.

Josh
Yeah, this is the problem with the Botnet ruleset. I had to stop using it. It assumes that one IP, one domain with regards to mail. If your mail server handles multiple domains, whichever domain the rDNS points to will be fine. Any others will fire off. There is an exception list built into the plugin but I am philosophically opposed to manually managing lists like that on a per machine basis. If you want to stop the bot net mails heading into your inbox, make sure your RBL lookups are working. Those are much better than the botnet plugin.

Reply via email to