On Mon, 27 Nov 2006 13:06:58 -0800, Quinn Comendant
<[EMAIL PROTECTED]> wrote:

>I'm using the following with qmail's rblsmtpd:
>
>-r zen.spamhaus.org
>-r bl.spamcop.net
>-r relays.ordb.org
>-r cbl.abuseat.org
>
>I do find it very hard to determine if a list is "malfunctioning" and honest 
>emails are blocked until clients start complaining. It has happened before 
>with me using other blocklists.
>
>One idea just popped into my head: you can grep your logs for all IP addresses 
>you trust (mail from the IPs of trusted users and their recipients) and run 
>that list of IPs against an DNSRBL you are considering using.
>
>You can test a DNSRBL by reversing an IP and appending the RBL domain, so for 
>111.122.133.144, you might execute:
>
>       dig 144.133.122.111.zen.spamhaus.org A | grep -v '^;'
>
>And if there is anything returned, the IP is on the list.
>
>Quinn
>
>
>
>On Mon, 27 Nov 2006 12:42:40 -0800, R Lists06 wrote:
>> Hopefully this hasn't been rehashed to death on this list yet has there ever
>> been a general consensus as to which rbl's and similar lists are best to use
>> if you are going to engineer your mail systems with such?
>> 
>> Anyone care to share their implementations as well as current best and worst
>> practices please?
>> 
>> Thanks
>> 
>>  - rh
>> 
>> --
>> Robert - Abba Communications
>>    Computer & Internet Services
>>  (509) 624-7159 - www.abbacomm.net

Did you know that zen uses cbl anyway?

Nigel

Reply via email to