--On Friday, June 23, 2006 6:59 PM -0500 [EMAIL PROTECTED] wrote:

even `mutt -f mbox_file' would be an easy way
to see what exactly is being shipped out the door.

Except that that only displays what a user sees. When I'm doing forensics, I want to see the raw file and all the protocol, like the relay that sent it and the envelope. (I added code to log the relay to a separate file in my quarantine.)

I have a script that lists all files in my quarantine periodically and emails the list to me. I then look at the list, take appropriate action on each message, and move all the directories to an archive directory (/var/spool/MD-Quarantine-OLD). I can then grep the archive directory to analyze trends (eg. relays to add to my firewall, or a misconfigured MX that's forwarding too much spam to my primary.)


_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to