Download List

專案描述

Synspam uses Netfilter NFQUEUE to catch the source IP address of any machine connecting to your mail server, running multiple tests against it (RBL check, regexp on the reverse name, etc.) before forwarding the connection to the MTA. In order to have as few false positives as possible, a scoring system is used. If the source IP address is believed to be a spammer IP address, the connection can be dropped. There is a dry run mode if you just want to test it, which is the default.

System Requirements

System requirement is not defined
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2010-02-01 21:18 Back to release list
0.3.6

The connections filtering code was refactored; further targets may be added in the future. New functions were added to the synspam-report script for average reject score and average accept score, and it no longer makes correlation between spamassassin and synspam. An extra check was added at startup to prevent success messages from being printed when synspam segfaults.
標籤: enhancement, bugfix

Project Resources