also sprach Karsten M. Self <kmself@ix.netcom.com> [2002.01.07.2215 +0100]:
>     $ nmap -sL 216.242.0-255.0-255

i think i'd prefer 216.242.0.0/16 ...

> ...how would one do this via procmail, filtering on 'Recieved' lines?
> Anything from this domain should be forwarded to a spam complain
> addresses and shitcanned.

well, the best way (and the most complicated) is to set up your own rbl
domain and then use your MTA's features, the little proggie rbltest, or
something like spamassassin to do the rbl tests. i don't think you want
to parse received headers, and if, then Perl::Mail::Audit!

> Better:  how would one make an easy-to-use & update system to block
> mails touching souch domains?

again, RBL. the problem is that you have n:m relations, n IPs in the
header, m to block. unless you want to overload procmail with O(nm), you
really want to employ other methods.

why can't you block with exim system-wide? and dman said that exim can
incorporate your own filters on a user basis... i don't know if it can
do that for IP ranges, but it's worth a try.

dman, any hints?

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
  
stay the patient course.
of little worth is your ire.
the network is down.

Attachment: pgpf85rCxVmVK.pgp
Description: PGP signature

Reply via email to