Terry, what mail server are you using? If it's Imail, there are 3rd part utilities listed on the IPSwitch website to extract e-mail accounts into a text file. http://www.ipswitch.com/Support/utilities.html
If you are using a back-end database, you can write a script to get that information from it or I'm sure someone already has one they would be willing let you have. I have some for MySQL if you need them. Steven > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Terry Mac Millan > Sent: Friday, February 21, 2003 4:11 PM > To: [EMAIL PROTECTED] > Subject: [IMGate] Re: check_recipient_maps > > > > With respect to the new map, has anyone come up with a script to > get a list > of valid email addresses from your mail servers? Including a method on the > script to handle the nice [EMAIL PROTECTED] --> [EMAIL PROTECTED] > mappings. > I am thinking of doing a scan of recieved email addresses in the logs to > generate the domain email addresses, the other could be obtained > via a quick > perl script grabbing the userid from the passwd file and tag the domain on > to it. > > Terry > > ----- Original Message ----- > From: "Len Conrad" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Tuesday, February 18, 2003 8:12 PM > Subject: [IMGate] Re: check_recipient_maps > > > > > > So, how's everybody getting along with check_recipient_maps? > > > > > > Here's spam-stats.pl for an IMGate I admin and I turned on > > check_recipient_maps which the first real filter in the > restrictions list, > > at 11 AM this morning: > > > > 1 ETRN Mail theft attempt > > 3 ACL mta_clients_onedict > > 3 ACL to_recipients_white > > 4 SMTP invalid [EMAIL PROTECTED] > > 4 ACL from_senders_clueless > > 8 ACL mta_clients_relay > > 13 ACL to_local_recipients unknown recipient > > 26 SMTP invalid [EMAIL PROTECTED] > > 34 SMTP Exceeded Hard Error Limit after MAIL > > 59 ACL mta_clients_pipel (pipelining) > > 84 ACL body checks > > 87 ACL helo_hostnames > > 136 ACL mta_clients_senders_regexp > > 145 ACL unauthorized relay > > 234 ACL header checks > > 248 ACL from_senders_nxdomain > > 464 ACL mta_clients_bogus > > 583 SMTP Exceeded Hard Error Limit after DATA > > 843 ACL from_senders_black > > 959 ACL mta_clients_slet > > 1036 SMTP sender address verification in progress > > 1213 SMTP unauthorized pipelining > > 1252 ACL mta_clients_blaksender > > 1646 RBL rbl-plus.mail-abuse.org > > 2030 ACL from_senders_regexp > > 5546 ACL to_recipients_dead > > 5710 SMTP sender address undeliverable > > 6157 SMTP Exceeded Hard Error Limit after RCPT > > 6573 DNS no A/MX for @sender.domain > > 6907 ACL mta_clients_dead > > 7667 ACL from_senders_slet > > 7668 DNS timeout for MTA PTR hostname (forged @sender.domain) > > 7674 ACL from_senders_black_regexp > > 12348 ACL mta_clients_bw > > 13516 ACL [EMAIL PROTECTED] > > 13837 DNS nxdomain for MTA PTR hostname (forged @sender.domain) > > 16609 SMTP sender address unverifiable > > 23535 ACL to_relay_recipients unknown recipient <<<<< > > 39053 ACL to_recipients_repexp ( will now goto to_relay_recipients) > > ========================================= > > 183915 TOTAL > > > > > > so, it's another important feature for postfix and IMGate. and > harvesting > > the ip's and sender.domains of the to_relay_recipients will be, > as before, > > a very good source of new rules. > > > > And here's a 2 new lines for spam-stats.pl to catch the new > > check_recipient_maps log lines wraps: > > > > elsif (/unknown in relay recipient/i) { $count{"ACL to_relay_recipients > > unknown recipient"}++ } > > > > elsif (/unknown in local recipient/i) { $count{"ACL to_local_recipients > > unknown recipient"}++ } > > > > Len > > > > > > > > >
