O.T. milter-link - reject phishing & spam

Ken A ka at pacific.net
Thu Jun 29 01:02:31 IST 2006

Ken A wrote:
> Steve Freegard wrote:
>> Hi Ken,
>> Ken A wrote:
>>> Is the URIBL in your graph just a generic term here, or are you using 
>>> milter-link with URIBL rather than SURBL, or both? I was just testing 
>>> using SURBL, but might drop a couple more in and see how it goes...
>> It's a generic term -- I use all three URI lists (in the following 
>> order):
>> sbl-xbl.spamhaus.org
>> multi.surbl.org
>> black.uribl.com
>> The spamhaus test is slightly different from the other two lists -- it 
>> lists the IP addresses of spamvertised web servers and seems to work 
>> the best of all three lists.
> Seems like that could be risky when considering a shared hosting 
> environment, where there are hundreds of sites on a single IP. Wouldn't 
> you be punishing them all?

for example..

# host humboldt.edu
humboldt.edu has address
# host has address

That's Humboldt State University in Northern California.
I wonder if they host student sites, or have an open relay script..

Another one..
#host alumni.net
alumni.net has address
# host has address

This is a alumni networking site claiming 4 million members..
They aren't on any other lists, probably another site on the same ip is 
being exploited to send spam. I think maybe just the sbl might be safer, 
at least for an ISP environment.

Ken A.

> Thanks,
> Ken A.
> Pacific.Net
>> Kind regards,
>> Steve.

More information about the MailScanner mailing list