Download List

Project Description

Synspam uses Netfilter NFQUEUE to catch the source IP address of any machine connecting to your mail server, running multiple tests against it (RBL check, regexp on the reverse name, etc.) before forwarding the connection to the MTA. In order to have as few false positives as possible, a scoring system is used. If the source IP address is believed to be a spammer IP address, the connection can be dropped. There is a dry run mode if you just want to test it, which is the default.

System Requirements

System requirement is not defined
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2010-01-14 06:55
0.3.2

This release detects reverses with "ip in hostname" independently from "dialup" words.
Tags: Minor, Bugfixes

2010-01-07 18:31
0.3.1

A new client word in the botnet regexp and better detection of public IP addresses with a localhost reverse.
Tags: Minor feature enhancements

2010-01-05 07:18
0.3.0

A blacklist/whitelist mechanism has been added. You can easily filter hosts to improve synspam treatments. Examples are given in synspam.conf comments. A Perl library, NetAddr::Lite, is needed. The README has been updated with NFQUEUE-related information.
Tags: Major, feature, improvment

2009-12-28 03:40
0.2.6

A new way to bind to nfqueue should prevent errors on start or restart.
Tags: Minor, Bugfixes

2009-12-24 10:05
0.2.5

This release uses NFQUEUE instead of QUEUE, enabling users to have more than one queue on their system.

Project Resources