[prev in list] [next in list] [prev in thread] [next in thread]
List: inet-access
Subject: RE: Blacklisting your own domain?
From: up () 3 ! am
Date: 2011-08-17 21:15:44
Message-ID: a1bf86b4577d674355dd9ccd96356ccf.squirrel () ssl ! pil ! net
[Download RAW message or body]
Since these are generated by localhost, or servers that already bypass it,
SpamAssassin won't be called. That is all controlled by ucspi tcp.
> Don't forget you will need to exempt all addresses coming from daemons and
> administrative applications. (Think about legitimate bounce messages)
>
> Kevin
>
>
>
>> -----Original Message-----
>> From: list-bounces@inet-access.net [mailto:list-bounces@inet-access.net]
>> On Behalf Of Frank Bulk
>> Sent: Wednesday, August 17, 2011 3:34 PM
>> To: list@inet-access.net
>> Subject: RE: Blacklisting your own domain?
>>
>> If you run your own domain with a small number of users, SPF can be an
>> effective means to accomplish what the OP is looking to do. Any larger
>> and
>> you have to start dealing with re-emailers (i.e. sending an email from
>> cnn.com and sending it to a user in your own domain).
>>
>> Frank
>>
>> -----Original Message-----
>> From: list-bounces@inet-access.net [mailto:list-bounces@inet-access.net]
>> On
>> Behalf Of Blake Pfankuch
>> Sent: Wednesday, August 17, 2011 11:41 AM
>> To: list@inet-access.net
>> Subject: RE: Blacklisting your own domain?
>>
>> I've been using strict SPF validation for this as well on my personal . I
>> ran into a single issue with a single server on the outside of my network
>> that does email alerts based on process status on that server that I
>> didn't
>> have added to SPF. As far as blocking *@fqdn, I've done that a few times
>> too however I've been trying to stick with SPF.
>>
>> Blake Pfankuch
>>
>> -----Original Message-----
>> From: list-bounces@inet-access.net [mailto:list-bounces@inet-access.net]
>> On
>> Behalf Of up@3.am
>> Sent: Wednesday, August 17, 2011 7:57 AM
>> To: list@inet-access.net
>> Subject: Blacklisting your own domain?
>>
>> After having yet another user fall for a phishing scam and giving their
>> user/pass out to spammers, and the ensuing headaches (delistings,
>> temporary
>> re-routings, etc), I'm decided to try something really simple in
>> SpamAssassin:
>>
>> blacklist_from *@pil.net
>>
>> I'm trying to think how this might cause problems, but I can't think of
>> any.
>>
>> Users that SMTP Auth or POP Before SMTP bypass SA. Is this fairly common
>> practice already? Am I that slow to the game?
>> --
>> Eat sushi frequently. - Avi
>> inet@inet-access.net is the human contact address.
>> list@inet-access.net is the list posting address.
>> See below URL for subscribe/unsubscribe and list options:
>> http://inet-access.net/mailman/listinfo/list
>> --
>> Eat sushi frequently. - Avi
>> inet@inet-access.net is the human contact address.
>> list@inet-access.net is the list posting address.
>> See below URL for subscribe/unsubscribe and list options:
>> http://inet-access.net/mailman/listinfo/list
>>
>> --
>> Eat sushi frequently. - Avi
>> inet@inet-access.net is the human contact address.
>> list@inet-access.net is the list posting address.
>> See below URL for subscribe/unsubscribe and list options:
>> http://inet-access.net/mailman/listinfo/list
> --
> Eat sushi frequently. - Avi
> inet@inet-access.net is the human contact address.
> list@inet-access.net is the list posting address.
> See below URL for subscribe/unsubscribe and list options:
> http://inet-access.net/mailman/listinfo/list
>
--
Eat sushi frequently. - Avi
inet@inet-access.net is the human contact address.
list@inet-access.net is the list posting address.
See below URL for subscribe/unsubscribe and list options:
http://inet-access.net/mailman/listinfo/list
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic