spamtrap(1) General Commands Manual spamtrap(1)NAME
spamtrap - read mail from stdin and test
SYNOPSIS
In /etc/aliases:
spamtrap:|/usr/local/bin/spamtrap
In .qmail:
|/usr/local/bin/spamtrap
DESCRIPTION
spamtrap reads spam from stdin. It locates any IP addresses in the spam and tests them using relaytest(1), httptest(1), socks4test(1),
socks5test(1), and formmailtest(1). If any of these IP addresses are open to relaying, they will be added to the DSBL-compliant server
that these programs are configured to use.
AUTHOR
Rik van Riel <riel@surriel.com> Ian Gulliver <ian@penguinhosting.net>
SEE ALSO dsbl.conf(5)
2002-04-03 spamtrap(1)
Check Out this Related Man Page
relaytest(1) General Commands Manual relaytest(1)NAME
relaytest - attempt to use SMTP to relay to a DSBL-compliant host
SYNOPSIS
relaytest [-v] <ip address[:port]>
DESCRIPTION
relaytest attempts to connect to the specified <ip address> on the specified port (default is port 25) and uses a variety of tests to
attempt to relay through the host.
In the tests below, source.com is sender_domain from dsbl.conf(5) and sender is sender_user.
Non-domain-specific tests:
MAIL FROM:<sender@source.com>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<sender@source.com>
RCPT TO:<"listme@dsbl.org">
MAIL FROM:<sender@source.com>
RCPT TO:listme@dsbl.org
MAIL FROM:<sender@source.com>
RCPT TO:<dsbl.org!listme>
MAIL FROM:<nobody>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<nobody>
RCPT TO:<"listme@dsbl.org">
MAIL FROM:<nobody>
RCPT TO:listme@dsbl.org
MAIL FROM:<nobody>
RCPT TO:<dsbl.org!listme>
MAIL FROM:<source.com!sender>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<source.com!sender>
RCPT TO:<"listme@dsbl.org">
MAIL FROM:<source.com!sender>
RCPT TO:listme@dsbl.org
MAIL FROM:<source.com!sender>
RCPT TO:<dsbl.org!listme>
MAIL FROM:<>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<>
RCPT TO:<"listme@dsbl.org">
MAIL FROM:<>
RCPT TO:listme@dsbl.org
MAIL FROM:<>
RCPT TO:<dsbl.org!listme>
relaytest then builds a list of possible domains, including "[127.0.0.1]", "localhost", [<ip address>], and any other domains that can be
derived from reverse DNS of the IP or the SMTP greeting.
Domain specific tests:
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<"listme@dsbl.org">
MAIL FROM:<nobody@DOMAIN>
RCPT TO:listme@dsbl.org
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<listme%dsbl.org@DOMAIN>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<listme%dsbl.org>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<"listme%dsbl.org">
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<listme@dsbl.org@DOMAIN>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<"listme@dsbl.org"@DOMAIN>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<@DOMAIN:listme@dsbl.org>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<dsbl.org!listme>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<dsbl.org!listme@DOMAIN>
MAIL FROM:<DOMAIN!nobody>
RCPT TO:<dsbl.org!listme>
MAIL FROM:<DOMAIN!nobody>
RCPT TO:<dsbl.org!listme@DOMAIN>
MAIL FROM:<nobody@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<postmaster@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<administrator@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<sales@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<info@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<webmaster@DOMAIN>
RCPT TO:<listme@dsbl.org>
MAIL FROM:<listserv@DOMAIN>
RCPT TO:<listme@dsbl.org>
relaytest then tries a variety of SMTP AUTH methods to try to relay a message through the target server.
The envelopes used for these tests are always:
MAIL FROM:<sender@source.com>
RCPT TO:<listme@dsbl.org>
The SMTP AUTH methods tried are as follows:
AUTH LOGIN, user=/webmaster, password=(null)
AUTH LOGIN, user=admin, password=admin
AUTH LOGIN, user=administrator, password=(null)
AUTH LOGIN, user=test, password=test
AUTH NTLM (anonymous)
OPTIONS -v Verbose mode. Details of the SMTP transaction are written to standard output.
AUTHOR
Ian Gulliver <ian@penguinhosting.net>
SEE ALSO dsbl.conf(5), spamtrap(1)
2002-04-03 relaytest(1)