> Oliver Welter <[EMAIL PROTECTED]> wrote: > > 2.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in > > bl.spamcop.net [Blocked - see > > <http://www.spamcop.net/bl.shtml?82.113.121.16>] > > 1.1 RCVD_IN_SORBS_WEB RBL: SORBS: sender is a abuseable web > > server [82.113.121.16 listed in > > dnsbl.sorbs.net]
On 21.11.08 08:01, Cedric Knight, GreenNet wrote: > In this situation, I'd add > trusted_networks 82.113.121.16/32 > to local.cf. It looks like the O2 gateway has genuinely been abused. Which is very common for GSM/* gateways, unless companies start taking care (and blocking outgoing SMTP). > If you are POP-before-SMTP authentication, > http://wiki.apache.org/spamassassin/POPAuthPlugin can add to > trusted_networks automatically. Or, better use SMTP authentication (pop-before-smtp is not that safe), with proper headers (so SA will know it was authenticated) > > 1.3 MISSING_SUBJECT Missing Subject: header > > 0.1 RDNS_NONE Delivered to trusted network by a host > > with no rDNS > > 1.5 MSGID_FROM_MTA_HEADER Message-Id was added by a relay > > These look like some problem with the MUA. You might want to check > why the client isn't adding Message-Id and Subject headers. seconded, just the RDNS_NONE is again the business of O2... -- Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. The 3 biggets disasters: Hiroshima 45, Tschernobyl 86, Windows 95