I've been following along for a while and looking around the archives,
but I can't find an answer to a problem I've been having since
upgrading from 2.x to 3.x. Namely, none of the DNSBL or URIBL seem to
be working. I've verified a number of things from previous posts on
the subject, see below.

I've tried using the http://www.surbl-org-permanent-test-point.com/
test email, no avail.
I don't see where it's even trying to do the DNSBL tests, but niether
do I see any reason it shouldn't..  The only thing I see is the DNS
timeout?

Another oddity is that this is on Fedora Core 1, and when I redirect
from spamassassin, it goes straight to the console and ignores any
redirects (which is a pain when you're trying to compare logs). I
doubt it's related, but I'm not really concerned with that particular
oddity at the moment. It just struck me as similar to what someone
else was describing..

Any help would be greatly appreciated. 

_________________________________________________________________
--  startup options
   /usr/bin/spamd -d
_________________________________________________________________
-- local.cf
   skip_rbl_checks         0
_________________________________________________________________
--  spamassassing --lint -D (snippets)
debug: config: read file /usr/share/spamassassin/20_dnsbl_tests.cf
...
debug: config: read file /usr/share/spamassassin/25_uribl.cf
...
debug: plugin: loading Mail::SpamAssassin::Plugin::URIDNSBL from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x86ebb3c)
debug: plugin: loading Mail::SpamAssassin::Plugin::Hashcash from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::Hashcash=HASH(0x90e0978)
debug: plugin: loading Mail::SpamAssassin::Plugin::SPF from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::SPF=HASH(0x90bc604)
...
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x86ebb3c)
implements 'parsed_metadata'
debug: is Net::DNS::Resolver available? yes
debug: Net::DNS version: 0.48
debug: trying (3) mit.edu...
debug: looking up NS for 'mit.edu'
debug: NS lookup of mit.edu succeeded => Dns available (set
dns_available to hardcode)
debug: is DNS available? 1
debug: URIDNSBL: domains to query:
debug: all '*From' addrs: [EMAIL PROTECTED]
debug: Running tests for priority: 0
...
debug: RBL: success for 0 of 1 queries
debug: DNS: timeout for ahbl after 15 seconds

_________________________________________________________________
-- 20_dnsbl_tests.cf (for instance)
header __RCVD_IN_SBL_XBL        eval:check_rbl('sblxbl',
'sbl-xbl.spamhaus.org.')
describe __RCVD_IN_SBL_XBL      Received via a relay in Spamhaus SBL+XBL
tflags __RCVD_IN_SBL_XBL        net
# SBL is the Spamhaus Block List: http://www.spamhaus.org/sbl/
header RCVD_IN_SBL              eval:check_rbl_sub('sblxbl', '127.0.0.2')
describe RCVD_IN_SBL            Received via a relay in Spamhaus SBL
tflags RCVD_IN_SBL              net
# XBL is the Exploits Block List: http://www.spamhaus.org/xbl/
header RCVD_IN_XBL              eval:check_rbl('sblxbl-notfirsthop',
'sbl-xbl.spamhaus.org.', '127.0.0.[456]')
describe RCVD_IN_XBL            Received via a relay in Spamhaus XBL
tflags RCVD_IN_XBL              net
_________________________________________________________________
-- 25_uribl.cf

ifplugin Mail::SpamAssassin::Plugin::URIDNSBL

# URI-DNSBL lookups can take a *maximum* of this many seconds past the
# normal DNSBL lookups.
uridnsbl_timeout        2

uridnsbl        URIBL_SBL       sbl.spamhaus.org.       TXT
body            URIBL_SBL       eval:check_uridnsbl('URIBL_SBL')
describe        URIBL_SBL       Contains an URL listed in the SBL blocklist
tflags          URIBL_SBL       net
_________________________________________________________________

cpan> i Mail::SpamAssassin::Plugin::URIDNSBL
Strange distribution name [Mail::SpamAssassin::Plugin::URIDNSBL]
Module id = Mail::SpamAssassin::Plugin::URIDNSBL
    CPAN_USERID  FELICITY (Theo Van Dinter <[EMAIL PROTECTED]>)
    CPAN_VERSION undef
    CPAN_FILE    F/FE/FELICITY/Mail-SpamAssassin-3.0.0.tar.gz
    MANPAGE      URIDNSBL - look up URLs against DNS blocklists This
works by analysing message text and HTML for URLs, extracting the
domain names from those, querying their NS records in DNS, resolving
the hostnames used therein, and querying various DNS blocklists for
those IP addresses.  This is quite effective.
    INST_FILE   
/usr/lib/perl5/site_perl/5.8.1/Mail/SpamAssassin/Plugin/URIDNSBL.pm
    INST_VERSION undef

_________________________________________________________________

cpan> i Net::DNS
Strange distribution name [Net::DNS]
Module id = Net::DNS
    DESCRIPTION  Interface to the DNS resolver
    CPAN_USERID  CREIN (Chris Reinhardt <[EMAIL PROTECTED]>)
    CPAN_VERSION 0.48
    CPAN_FILE    C/CR/CREIN/Net-DNS-0.48.tar.gz
    DSLI_STATUS  RmhO (released,mailing-list,hybrid,object-oriented)
    MANPAGE      Net::DNS - Perl interface to the DNS resolver
    INST_FILE   
/usr/lib/perl5/site_perl/5.8.1/i386-linux-thread-multi/Net/DNS.pm
    INST_VERSION 0.48

-- 
Matthew 'Shandower' Romanek
IDS Analyst

Reply via email to