>From  updates_spamassassin_org/20_dnsbl_tests.cf, using this as a model for a 
>multi-valued DNS blacklist query:

header   __RCVD_IN_SORBS       eval:check_rbl('sorbs', 'dnsbl.sorbs.net.')
describe __RCVD_IN_SORBS       SORBS: sender is listed in SORBS
tflags   __RCVD_IN_SORBS       net

header   RCVD_IN_SORBS_HTTP    eval:check_rbl_sub('sorbs', '127.0.0.2')
describe RCVD_IN_SORBS_HTTP    SORBS: sender is open HTTP proxy server
tflags   RCVD_IN_SORBS_HTTP    net

"sysadmin see, sysadmin do", we tried this:

header   __RCVD_IN_RBLX        eval:check_rbl('domain', 'rblx.domain.tld.')
describe __RCVD_IN_RBLX        DOMAIN: sender IP is listed in DOMAIN
tflags   __RCVD_IN_RBLX        net

header   RCVD_IN_RBLX_BADREP   eval:check_rbl_sub('domain', '127.0.0.2')
describe RCVD_IN_RBLX_BADREP   DOMAIN: sender IP has bad reputation
tflags   RCVD_IN_RBLX_BADREP   net
score                          3.5 3.5 3.5 3.5 

We don't get any  127.0.0.2 hits on 2 SA machines, while we get plenty of hits 
with SA queries to single-valued DNSBLs.

Attempts at other syntaxes have failed.

suggestions?

Len




______________________________________________
IMGate OpenSource Mail Firewall www.IMGate.net

Reply via email to