On Fri, 2009-11-20 at 12:29 -0800, Mark Hedges wrote:
> On Fri, 20 Nov 2009, Mark Hedges wrote:
> >
> > Hi.  I've set up my own rbldnsd server.  It's responding
> > to queries correctly, for example, I am trying to block
> > the server that this message comes from, 64.22.103.163.
> >
> 
> I forgot to say, I'm using 3.2.5 on CentOS 5.3 which runs
> Perl 5.8.8.
> 
> I also tried clear_trusted_networks and
> clear_internal_networks but the test still does not run.
> 
> It doesn't matter about pyzor, I tried turning off pyzor and
> dcc and the RBL test still doesn't fire.
> 
> Help?  Thanks.  --mark--
> 
> 
Hi Mark, I'm no expert, but I have my own bind DNSBL's running with SA.

Checks that may help you:

1. In local.cf, confirm skip_rbl_checks is set to 0

2. Add a rule for your custom dnsbl (either in local.cf or your own
custom rules.cf file);

header CUSTOM_BLOCKLIST        eval:check_rbl('rbl.dmz',
'spammers.rbl.dmz.')
describe CUSTOM_BLOCKLIST         Relay in Local DNS Blocklist
tflags CUSTOM_BLOCKLIST           net
score   CUSTOM_BLOCKLIST          2.5

3. Test the rule: spamassassin --debug --lint
(grep or look for DNS tests) and if clear reload/restart SA

4. Check your system is set to use your DNS server (or that the DNS
server it used by default resolve queries for spammers.rbl.dmz.)
Depending on how you have system logging set up, I would tail the syslog
or dns log whilst sending test messages in, or feed SA with a test
message to check:  spamassassin -D
< /usr/share/spamassassin/doc/spamassassin-3.0.3/sample-spam.txt

I hope this is of some use to you, but I'm sure one of the resident
experts will spot your issue in moments and post. I apologise if my
answer is of little use.


Reply via email to