delist_button_for_subpage


Using SORBS with Netscape Messaging Server 6.x
Chapter 8 of the Admin Guide for Netscape Messaging Server 6.0 details the 2 ways of stopping spam with the SORBS DNS block list. The first (and the recomended way) is to add a mapping table rule such as:
PORT_ACCESS

  *|*|*|*|* $C$|INTERNAL_IP;$3|$Y$E
  TCP|*|25|*|*\
    $C$[<server_root>/bin/msg/imta/lib/dns_verify.so,\
    dns_verify_domain_port,$1,dnsbl.sorbs.net.]EXTERNAL$E

ORIG_MAIL_ACCESS

  TCP|*|25|*|*|SMTP|*|tcp_local|*@*|*|*\
    $C$[<server_root>/bin/msg/imta/lib/dns_verify.so,\
    dns_verify_domain,$1,dnsbl.sorbs.net.]$E 
This will block connections on receiving a 'RCPT TO:' request. Alternatively you can configure the dispatcher (using dispatcher.cnf) as follows:
[SERVICE=SMTP]
PORT=25
!...rest of normal options...
DNS_VERIFY_DOMAIN=spam.dnsbl.sorbs.net
DNS_VERIFY_DOMAIN=http.dnsbl.sorbs.net
!...etc... 
The latter case, the incoming connection will be rejected at the banner. This is how the SORBS SMTP proxy server works by default. It's disadvantage is some clients (incoming connections from servers are considered clients to) ignore the 554 banner as a PERMANENT fail and keep trying to resent until the message times out.

 
   
Copyright © 2002-2023 by SORBS | Terms & Conditions | Privacy Policy