Hello Jonas and *, Am 2009-03-02 23:57:34, schrieb Jonas Eckerman: > That seems like a way to get false positives when someone with a listed > dynamic IP sends through the smarthost of their ISP or ESP. > > By extendinmg trust to the ESP/ISP smarthost, SA will do RBL checks on > the system that sent the mail to the smarthost. That system may well be a > SOHO or private user with a dynamic IP address. Possibly even a dynamic > IP address that has previously been used by someone else to send spam.
This is what actualy happen to me... The network in my enterprise is <*.private.tamay-dogan.net> and the outgoing mailserver <mail.private.tamay-dogan.net> which is correctly configured and of course, not accessibel from outside the world. Hence, I am sending messages over the relay <server7.pinguin-hosting.de> from my hosting provider. Now, nearly each 6th E-Mail from me comes back as bounce since they all tell me, spamassassin is thinking I have a trojan/bot in my network. This spamassassin setup is definitively crap, because if yo look in the header of any of my messages, you see, I am an legitimat authenticated sender. I can not even reach some of my customers, coworkers or manufacturers. Thanks, Greetings and nice Day/Evening Michelle Konzack Systemadministrator 24V Electronic Engineer Tamay Dogan Network Debian GNU/Linux Consultant -- Linux-User #280138 with the Linux Counter, http://counter.li.org/ ##################### Debian GNU/Linux Consultant ##################### <http://www.tamay-dogan.net/> <http://www.can4linux.org/> Michelle Konzack Apt. 917 ICQ #328449886 +49/177/9351947 50, rue de Soultz MSN LinuxMichi +33/6/61925193 67100 Strasbourg/France IRC #Debian (irc.icq.com)
signature.pgp
Description: Digital signature