Hello Jonas and *,

Am 2009-03-02 23:57:34, schrieb Jonas Eckerman:
> That seems like a way to get false positives when someone with a listed 
> dynamic IP sends through the smarthost of their ISP or ESP.
>
> By extendinmg trust to the ESP/ISP smarthost, SA will do RBL checks on 
> the system that sent the mail to the smarthost. That system may well be a 
> SOHO or private user with a dynamic IP address. Possibly even a dynamic 
> IP address that has previously been used by someone else to send spam.

This is what actualy happen to me...

The network in my  enterprise  is  <*.private.tamay-dogan.net>  and  the
outgoing mailserver <mail.private.tamay-dogan.net>  which  is  correctly
configured and of course, not accessibel from outside the world.  Hence,
I am sending messages over the relay  <server7.pinguin-hosting.de>  from
my hosting provider.

Now, nearly each 6th E-Mail from me comes back as bounce since they  all
tell me, spamassassin is thinking I have a trojan/bot in my network.

This spamassassin setup is definitively crap, because if yo look in  the
header of any of my messages, you see, I am an  legitimat  authenticated
sender.

I can not even reach some of my customers, coworkers or manufacturers.

Thanks, Greetings and nice Day/Evening
    Michelle Konzack
    Systemadministrator
    24V Electronic Engineer
    Tamay Dogan Network
    Debian GNU/Linux Consultant


-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
##################### Debian GNU/Linux Consultant #####################
<http://www.tamay-dogan.net/>               <http://www.can4linux.org/>
Michelle Konzack   Apt. 917                  ICQ #328449886
+49/177/9351947    50, rue de Soultz         MSN LinuxMichi
+33/6/61925193     67100 Strasbourg/France   IRC #Debian (irc.icq.com)

Attachment: signature.pgp
Description: Digital signature

Reply via email to