# top level domain matching, and no, not Russia or China In 2022 I got the absolute most spam from. Header RCVD_IN_UCEPROTECT1 eval:check_rbl_txt('uceprotect1', '')ĭescribe RCVD_IN_UCEPROTECT1 Listed in # The only RBL I trust, UCEPROTECT1 (single IP, not IP-ranges or entire ISPs) We usually expect a host to have both forward and reverse DNS to point to each other, so resolves to 1.2.3.4, and 1.2.3.4 rDNS resolves to .# Put this file under /etc/spamassassin/ and run an sa-update or reload amavis etc. This is a wildcard host list, containing a remote sending server's hostname. However, this value can be spoofed, and thus would typically not be the best way to whitelist a sender. Useful if you must receive emails from a specific sender. Basically means any spam can arrive to this local domain list, which is not usually what would be desired.Īn wilcard address list of sending/From emails that should be accepted without any scanning.
It should be 0 bytes 99.999% of the time. However this is for the destination domains, meaning NO SCANNING WILL BE DONE on these recipient domains. This is also an nwildsearch, so the same format at the blacklist_domains applies. These 3 files are meant to block OUTBOUND email from leaving your server. etc/virtual/blacklist_usernames /etc/virtual/blacklist_smtp_usernames /etc/virtual/blacklist_script_usernames # Outbound DirectAdmin Username/SMTP login blocks Make sure "Use RBL Blocking" is enabled, else the blacklist files will not have any effect. Usually, you'd just go to Admin Level -> Admin Settings -> Use RBL Blocking to enable it, which replaces the use_rbl_domains file, with a symlink to the domains file (all domains on the server). NOTE: These 2 files will only be activated on domains which are enabled in the /etc/virtual/use_rbl_domains file. To enable RBL blocking for all current and future domains via the command line as root, run the following:
If you enable it, the file will be deleted and it will be replaced by a link to "domains".
So, if you are using the use_rbl_domains as a file and are manually updating it, leave the option disabled. Note: This option will show enabled if /etc/virtual/use_rbl_domains is a a link, and disabled if it's a file. To enable RBL blocking for all current and future domains via the DirectAdmin GUI, use the following:Īdmin Level -> Admin Settings -> Use RBL Blocking Only use this option if you are certain that you want very aggressive RBL blocking.
#SPAMASSASSIN RULES HOW TO#
# How to enable realtime blocklists (RBLs) with Eximīecause SpamAssassin already factors in RBLs in its spam scoring and blocking, you can leave this option disabled and still benefit from RBLs. Which tells all DNS queries that your server makes, to call your local copy of "named", instead of querying the remote DNS server for lookups.Īs RBLs are all DNS based, this means your RBL queries to the RBL servers would now be coming from your server, and not from a big DNS server, like 8.8.8.8, so it's most likely to go through.