Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

relay test



On Sun, Mar 11, 2007 at 09:38:59AM -0400, Kristian Hermansen wrote:
> On 3/11/07, Stephen Adler <adler at stephenadler.com> wrote:
> >How do I test to make sure I haven't by accident turned on mail relay to be
> >abused by spammers?
> 
> You could just netcat to it an try to relay manually, but i figure you
> want a nice web interface to test it for you:

I've always been fond of the telnet check provided by mail-abuse.org:

 $ telnet relay-test.mail-abuse.org
Trying 168.61.4.13...
Connected to relay-test.mail-abuse.org.
Escape character is '^]'.
Connecting to 209.6.82.6 ...
<<< 220 mail.or8.net ESMTP Postfix
>>> HELO cygnus.mail-abuse.org
<<< 250 collab.or8.net
:Relay test: #Quote test
>>> mail from: <spamtest at collab.or8.net>
<<< 250 Ok
>>> rcpt to: <"nobody at mail-abuse.org">
<<< 554 <nobody at mail-abuse.org>: Relay access denied

<snip many more checks>

-b

--
nobody realizes that some people expend tremendous energy merely to 
be normal.                                           <albert camus>

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.





BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org