I'm using the following with qmail's rblsmtpd: -r zen.spamhaus.org -r bl.spamcop.net -r relays.ordb.org -r cbl.abuseat.org
I do find it very hard to determine if a list is "malfunctioning" and honest emails are blocked until clients start complaining. It has happened before with me using other blocklists. One idea just popped into my head: you can grep your logs for all IP addresses you trust (mail from the IPs of trusted users and their recipients) and run that list of IPs against an DNSRBL you are considering using. You can test a DNSRBL by reversing an IP and appending the RBL domain, so for 111.122.133.144, you might execute: dig 144.133.122.111.zen.spamhaus.org A | grep -v '^;' And if there is anything returned, the IP is on the list. Quinn On Mon, 27 Nov 2006 12:42:40 -0800, R Lists06 wrote: > Hopefully this hasn't been rehashed to death on this list yet has there ever > been a general consensus as to which rbl's and similar lists are best to use > if you are going to engineer your mail systems with such? > > Anyone care to share their implementations as well as current best and worst > practices please? > > Thanks > > - rh > > -- > Robert - Abba Communications > Computer & Internet Services > (509) 624-7159 - www.abbacomm.net > > >