> Oliver Welter <[EMAIL PROTECTED]> wrote:
> >   2.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
> >                 bl.spamcop.net [Blocked - see
> > <http://www.spamcop.net/bl.shtml?82.113.121.16>]
> >   1.1 RCVD_IN_SORBS_WEB      RBL: SORBS: sender is a abuseable web
> >                              server [82.113.121.16 listed in
> > dnsbl.sorbs.net]

On 21.11.08 08:01, Cedric Knight, GreenNet wrote:
> In this situation, I'd add
>   trusted_networks 82.113.121.16/32
> to local.cf.  It looks like the O2 gateway has genuinely been abused.

Which is very common for GSM/* gateways, unless companies start taking care
(and blocking outgoing SMTP).

> If you are POP-before-SMTP authentication,
> http://wiki.apache.org/spamassassin/POPAuthPlugin can add to
> trusted_networks automatically.

Or, better use SMTP authentication (pop-before-smtp is not that safe), with
proper headers (so SA will know it was authenticated)

> >   1.3 MISSING_SUBJECT        Missing Subject: header
> >   0.1 RDNS_NONE              Delivered to trusted network by a host
> > with no rDNS
> >   1.5 MSGID_FROM_MTA_HEADER  Message-Id was added by a relay
> 
> These look like some problem with the MUA.  You might want to check
> why the client isn't adding Message-Id and Subject headers.

seconded, just the RDNS_NONE is again the business of O2...

-- 
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
The 3 biggets disasters: Hiroshima 45, Tschernobyl 86, Windows 95

Reply via email to