On Mon, 27 Nov 2006 13:06:58 -0800, Quinn Comendant <[EMAIL PROTECTED]> wrote:
>I'm using the following with qmail's rblsmtpd: > >-r zen.spamhaus.org >-r bl.spamcop.net >-r relays.ordb.org >-r cbl.abuseat.org > >I do find it very hard to determine if a list is "malfunctioning" and honest >emails are blocked until clients start complaining. It has happened before >with me using other blocklists. > >One idea just popped into my head: you can grep your logs for all IP addresses >you trust (mail from the IPs of trusted users and their recipients) and run >that list of IPs against an DNSRBL you are considering using. > >You can test a DNSRBL by reversing an IP and appending the RBL domain, so for >111.122.133.144, you might execute: > > dig 144.133.122.111.zen.spamhaus.org A | grep -v '^;' > >And if there is anything returned, the IP is on the list. > >Quinn > > > >On Mon, 27 Nov 2006 12:42:40 -0800, R Lists06 wrote: >> Hopefully this hasn't been rehashed to death on this list yet has there ever >> been a general consensus as to which rbl's and similar lists are best to use >> if you are going to engineer your mail systems with such? >> >> Anyone care to share their implementations as well as current best and worst >> practices please? >> >> Thanks >> >> - rh >> >> -- >> Robert - Abba Communications >> Computer & Internet Services >> (509) 624-7159 - www.abbacomm.net Did you know that zen uses cbl anyway? Nigel