[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [vps-mail] VPS Sendmail Blackhole Check
- Subject: Re: [vps-mail] VPS Sendmail Blackhole Check
- From: Abigail Marshall <abigail@xxxxxxxxxxxx>
- Date: Mon, 14 Jun 2004 12:53:22 -0700
EG> I'm trying to implement blackhole checking, so I placed this in my
EG> sendmail.mc and properly promoted it to sendmail.cf.
EG> FEATURE(`enhdnsbl', `bl.spamcop.net', `"Spam blocked see:
EG> http://spamcop.net/bl.shtml?"$&{client_addr}', `t')
EG> (This is all on one line, of course).
EG> I don't think this is working, since I still get spam that I can manually
EG> get a positive from bl.spamcop.net.
One of the strengths of spamcop is that it is very
responsive to internet traffic, so it is common for IPs to
be listed for only a short time - a matter of hours -- &
also the listings change frequently. So the fact that you
have a positive doesn't mean there was a positive at the
time the initial email went through.
You can check to see whether messages have been blocked by
doing a grep for the word "spamcop" in your
~/var/log/messages file (VPS1) or /var/log/maillog (VPS2) -
(The full text of your "Spam blocked" message is included in
the logs, so you can grep on any word in the sequence).
Also, I'm not sure the enhdnsbl option works on the VPS
version of Sendmail - you might try the dnsbl option
instead.
-Abigail
======================================================================
This is <vps-mail@xxxxxxxxxxxx> <http://www.perlcode.org/lists/>
Before posting a question, please search the archives (see above URL).
Main Index |
Thread Index