I've been thinking about flagging certain patterns in a remote hosts's
reverse dns as spammy.  I started to write a rule, but realized I could
be doing more harm than good.

running qmail, I have Received field in the header:
Received: from 10-115-0-9.example.net (HELO host.example.net) (10.115.0.9)
  by qmail-02.example.net with SMTP; 31 May 2007 02:02:27 -0000

So i started:
header JK_SPAMMY_RDNS Received =~
/\d{1,3}[-\.]\d{1,3}[-\.]\d{1,3}[-\.]\d{1,3}/

But I realized that I need to match on only the most recent received
field so that I don't penalize a legitimate end user who relayed through
his isp.  Another option may be to check the "TCPREMOTEHOST" environment
variable.

Can someone point me in the right direction on how to do either (or
another way to do it altogether) ?



-- 

Jeremy Kister
http://jeremy.kister.net./

Reply via email to