Sponsored Content
The Lounge What is on Your Mind? Patreon Badges Now Available as BBCODE at UNIX.COM Post 303029734 by Neo on Thursday 31st of January 2019 10:09:33 AM
Old 01-31-2019
PS:

I am a Patreon patron of Evan You, the inventor of Vue.js and so I send him around $10 a month to Evan You on Patreon because I admire his work on Vue.js.

I think if you go to my new Patreon page you can see that I am a sponsor of Evan You.

If you create a Patreon account I will also do the same for you, Don (and others).

It is based on gifting, sharing, caring and admiration... not transactions.
This User Gave Thanks to Neo For This Post:
 

6 More Discussions You Might Find Interesting

1. Post Here to Contact Site Administrators and Moderators

Testing BBCODE URL for DragonByte

Here is the URL we will use: https://www.unix.com/post-here-contact-site-administrators-moderators/241569-doesnt-allow-me-use-code-tags.html I will put this in this text with the URL BBCODE. Now I will save the thread and test the URL. (1 Reply)
Discussion started by: Neo
1 Replies

2. What is on Your Mind?

Changes to BBCODE for CODE and QUOTE

Hey, Scrollbars still do not work in code tags (works on mobile because the mobile site does not use any table tags, only div tags), but hopefully that will change when I convert the bits for post and threads to div tags or update to Bootstrap CSS for tables. In the meantime, I have update... (0 Replies)
Discussion started by: Neo
0 Replies

3. What is on Your Mind?

New Badging System - Badges Prototype Beta 1 (Badges Only)

Today I mapped out the new badging system using FA icons, Beta 1 in no particular order except a 6 x 8 grid: https://www.unix.com/members/1-albums215-picture991.png The prototype HTML code for this layout: <style> .fa-badge-grid { font-size: 1.5em; } .row { ... (38 Replies)
Discussion started by: Neo
38 Replies

4. What is on Your Mind?

Four More UNIX.COM Achievement Award Badges to Award

Happy New Year! There are currently four UNIX.COM achievement awards up for grabs, as the say. Here they are, in no particular order: The Order of the Raven The Order of the Hippo The Order of the Spider The Order of the Dragon Don't ask me what they mean, or who who will get those... (0 Replies)
Discussion started by: Neo
0 Replies

5. What is on Your Mind?

Black Raven Patreon Tier

Dear All, We have received a number of requests in the past year from members who want to send PMs to ask questions because they prefer to ask questions confidentially. Their reasons for this confidentially have primarily been: They want to include company specific information which needs... (0 Replies)
Discussion started by: Neo
0 Replies

6. What is on Your Mind?

Thank You Patreon Sponsors - Your Patreon Dollars at Work

Thank You Patreon Sponsors! We are using your generous sponsorship dollars for software and media licensing. Your patronage is greatly appreciated! Currently, we are working on new tech videos on the YouTube YT channel, which is the new official media channel for unix.com. ... (0 Replies)
Discussion started by: Neo
0 Replies
greylistd(8)							Mail Administration						      greylistd(8)

NAME
greylistd - simple greylisting system for mail transport agents SYNOPSIS
greylistd DESCRIPTION
Greylisting This daemon provides a simple greylisting implementation for use with Exim and other mail transport agents (MTAs). For a more elaborate introduction to greylisting, please refer to Evan Harris' whitepaper at: http://projects.puremagic.com/greylisting/ Greylisting is a simple but highly effective means to weed out messages that are being delivered via spamware/ratware tools. The idea is to establish whether a prior relationship exists between the sender and the receiver of a message. Most of the time it does, and the delivery proceeds normally. On the other hand, if no prior relationship exists, the delivery is temporarily rejected, using a 451 SMTP response. Legitimate MTAs will treat this response accordingly, and retry the delivery in a while. In contrast, ratware will usually fail to retry the delivery in a nor- mal fashion. As a result, greylisting is currently more than 90% effective in blocking incoming junk mail, while nearly all legitimate mail goes through. Three pieces of information (herafter called a triplet) from the delivery attempt are cached for future reference: - The address of the host attempting the delivery - The envelope sender address (MAIL FROM:) - The envelope recipient address (RCPT TO:) If a delivery attempt was temporarily rejected, then after an initial timeout (60 minutes by default), but before a retry expiration time (8 hours by default), new delivery attempts with the same triplet are accepted, and the triplet is added to a whitelist. This allows for delivery retries, presumably from legitimate MTAs, and ensures that future mail from the same contact is not subject to greylisting. If a whitelisted triplet has not been seen for an extended duration (by default 60 days), it is expired. This prevents unlimited growth of the list. The downside to greylisting is that legitimate mail from people who have never sent you mail in the past (or, at least, within the last 60 days) are subject to a one-hour delay. The upside is that the current generation of ratware tools will not be able to deliver spam or virii to you. Even if, as a result of lots of sites incorporating the greylisting concept, ratware tools are modified such that temporarily rejected deliveries are retried, you stand an increased chance of blocking such mail. That is because within the mandatory 1-hour initial delay, chances are that the sending host's IP address has been listed in one or more DNS block lists (such as bl.spamcop.net, cbl.abuseat.org, etc..), and can be rejected by your MTA by consulting these lists directly, or via anti-spam software like SpamAssassin. greylistd greylistd is meant to be installed on a server that accepts incoming mail. The MTA on this server connects to the greylistd daemon over a UNIX domain socket (by default /var/run/greylistd/socket), or alternatively via the command greylist(1), and submits a string (triplet) that identifies a particular host/sender/recipient relationship. greylistd responds "white", "grey" or "black", depending on the current listing status of the provided triplet. Alternatively, if either of the "--white", "--grey", or "--black" options precede the data, greylistd responds "true" or "false", indicating whether the triplet is currently in the corresponding state. EXAMPLES
Exim 4 A sample greylistd statement for Exim 4 is provided with this package, and can normally be found in "/usr/share/doc/greylistd/exam- ples/exim4-acl-example.txt". Others What others? :-) A prerequisite to greylisting in general is the ability to perform custom filtering throughout the various stages in the SMTP transaction, most notably after the RCPT TO: SMTP command. In particular, greylistd(8) can be invoked either over a UNIX domain socket or via the sup- plied greylist(1) utility. Although greylistd(8) is written mainly with Exim in mind, it should be possible to use it with any MTA that: - Allows arbitrary strings to be passed on via a UNIX domain socket (/var/run/greylistd/socket) or supplied to external programs (greylist(1)). - Can defer the incoming delivery, based on the response. Some MTAs either have limited or no support for such external filters in the SMTP transaction (e.g. Sendmail), or define a very custom interface for such filters (e.g. Postifx "Policy Servers"). That said, solutions exist for these other MTAs as well. For Postfix, check into "postgrey", and for Sendmail there is "relaydelay". For other MTAs, check the links on Evan Harris' greylisting project page: http://projects.puremagic.com/greylisting/links.html FILES
/etc/greylistd/config Configuration settings. Currently, this file consists of three sections: [timeout] Lists various timeouts used to determine how long to keep a new triplet greylisted, and when to expire previosly known triplets. [socket] Specifies path and permissions of the UNIX domain socket on which greylistd will listen. [data] Specifies the paths to the data files, containing the data items and statistics, as well as an update interval specifying how often data will be written to these files. /var/lib/greylistd/states (default path, can be modified in the configuration file) Runtime data. Theare are four sections: [white], [grey], [black] and [statistics]. The first three sections consist of lines of the form: hash = lastseen firstseen count where: - hash is a 32-bit value representing a given triplet, - lastseen is a 32-bit value representing the timestamp of last delivery attempt for this triplet, - firstseen is a 32-bit value representing the timestamp of first known delivery attempt for this triplet, - count is a 32-bit value representing the number of delivery attempts that have been made for this triplet in this time period. The [statistics] section contains a counter for each of the three lists, indicating how many items that has ever made its way into these lists by way of the update protocol. /var/lib/greylistd/triplets (default path, can be modified in the configuration file) Unhashed data - i.e. the original triplets passed to greylistd. Internally, greylistd(8) hashes the provided data into a single 32-bit value for efficiency. Prior to version 0.6, the original data was not retained; as of version 0.6, data is optionally saved into this file. Data items are saved in the form: hash = data ... /var/run/greylistd/socket (default path, can be modified in the configuration file) The UNIX domain socket providing the main interface to "greylistd". The MTA can either connect to this socket directly, or use the sup- plied "greylist" utility to do so. BUGS
Because triplets and timestamps are hashed into simple 32-bit values, there is a very slim chance that deliveries that should have been greylisted are allowed through. More so for very busy sites. Commands are actually executed in the daemon, not the "greylist" client. If the user who invokes "greylist" interactively has a different time zone than the daemon process, time and date representations in the output will reflect those of the daemon. AUTHOR
This python script and manual page is written by Tor Slettnes, originally for Debian GNU/Linux. COPYRIGHT
Copyright (C) 2004-2005 Tor Slettnes. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MER- CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. On a Debian GNU/Linux system, the full text of the GPL is available in /usr/share/common-licenses/GPL. It is also available at: http://www.gnu.org/licenses/gpl.html SEE ALSO
http://projects.puremagic.com/greylisting/ Evan Harris' greylisting whitepaper greylist(1) Command-line interface to the greylist daemon. greylistd-setup-exim4(8) Utility to add/remove support for greylistd in Exim 4 configuration files. Tor Slettnes 0.8 greylistd(8)
All times are GMT -4. The time now is 04:27 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy