Quinn Comendant wrote:
I'm using the following with qmail's rblsmtpd:

-r zen.spamhaus.org
-r bl.spamcop.net
-r relays.ordb.org
-r cbl.abuseat.org

I believe the abuseat.org list is incorporated into the zen.spamhaus list. At least it was with the sbl-xbl and xbl lists.

I do find it very hard to determine if a list is "malfunctioning" and honest 
emails are blocked until clients start complaining. It has happened before with me using 
other blocklists.

One idea just popped into my head: you can grep your logs for all IP addresses 
you trust (mail from the IPs of trusted users and their recipients) and run 
that list of IPs against an DNSRBL you are considering using.

You can test a DNSRBL by reversing an IP and appending the RBL domain, so for 
111.122.133.144, you might execute:

        dig 144.133.122.111.zen.spamhaus.org A | grep -v '^;'

And if there is anything returned, the IP is on the list.

Quinn



On Mon, 27 Nov 2006 12:42:40 -0800, R Lists06 wrote:
Hopefully this hasn't been rehashed to death on this list yet has there ever
been a general consensus as to which rbl's and similar lists are best to use
if you are going to engineer your mail systems with such?

Anyone care to share their implementations as well as current best and worst
practices please?

Thanks

 - rh

--
Robert - Abba Communications
   Computer & Internet Services
 (509) 624-7159 - www.abbacomm.net





Reply via email to