Télécharger la liste

Description du projet

Synspam uses Netfilter NFQUEUE to catch the source IP address of any machine connecting to your mail server, running multiple tests against it (RBL check, regexp on the reverse name, etc.) before forwarding the connection to the MTA. In order to have as few false positives as possible, a scoring system is used. If the source IP address is believed to be a spammer IP address, the connection can be dropped. There is a dry run mode if you just want to test it, which is the default.

Système requise

System requirement is not defined
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2010-02-01 21:18 Retour à la liste release
0.3.6

Le code de filtrage des connexions a été refait; d'autres objectifs mai être ajoutés dans le futur. De nouvelles fonctions ont été ajoutées au script synspam rapport pour rejeter Évaluation moyenne et la moyenne accepter score, et il ne fait plus de corrélation entre SpamAssassin et synspam. Une vérification supplémentaire a été ajouté au démarrage pour éviter que des messages de réussite de cours d'impression lorsque des erreurs de segmentation synspam.
Tags: enhancement, bugfix
The connections filtering code was refactored; further targets may be added in the future. New functions were added to the synspam-report script for average reject score and average accept score, and it no longer makes correlation between spamassassin and synspam. An extra check was added at startup to prevent success messages from being printed when synspam segfaults.

Project Resources