Hey Jake,
thanks for getting back so soon. I actually composed the message yesterday but didn't send it until today. I see now that there are others having the same issue. Sorry. I tried just removing -r cbl.abuseat.org from the list, but mail failed yesterday. I must have forgotton to reload cdb's. I tried again today to just remove -r cbl.abuseat.org and email is going through. Thanks for the answers to all my questions. I will make the changes you suggested below to question 2. Curious, if a set RBLSMTPD="" will that stop all rbl checking? Incoming and Outgoing? Think I better have another look at the wiki just for good measure. Also thanks for the script. I read about it yesterday and thought that it would be an excellent way to prevent this from happening in the future.

I have used qmail-toaster for about 5 years now and always thought it worked great. The only issue I had was with upgrading. Now with QTP that issue has been removed. I think QTP ROCKS!

Dave

Jake Vickers wrote:
[email protected] wrote:
Hello. I have searched this list and have found several issues like the
one I am experiencing. I am running qtp with very good success for
several months. For some reason, this morning, no emails could be sent
out. I tracked it down to the blacklist file. I am using qtp-menu to set
the level. If I use anything, but the default setting (-r
zen.spamhaus.org) I  get the error message on my client that I failed to
connect to my smtp server - it was down or refusing smtp connections. I
also saw the status 256 error message in smtp current log file.


People started experiencing issues with dnsbl.org starting yesterday. Check to see if they're in your list and remove them for at least the time being.

This is my tcp.smtp file:
127.:allow,RELAYCLIENT="",DKSIGN="/var/qmail/control/domainkeys/%/private",RBLSMTPD="",NOP0FCHECK="1"
192.168.105.:allow,SENDER_NOCHECK="NONE"
:allow,BADMIMETYPE="",BADLOADERTYPE="M",CHKUSER_RCPTLIMIT="50",CHKUSER_WRONGRCPTLIMIT="10",QMAILQUEUE="/var/qmail/bin/simscan",DKSIGN="/var/qmail/control/domainkeys/%/private",NO
P0FCHECK="1"


My questions:
1. Is anyone else experiencing this problem? Is this just my server having issues?

Depends if you're using dnsbl.org or not. If you are, then yes, there's actually another thread on this currently being posted to.

2. It seems emails originating on my LAN 192.168.105 get checked against the rbl servers I have selected? Is this correct? If so, why?

Yes they are. Why? Because that's what the system does by default unless you turn that feature off. (use
RBLSMTPD=""
to turn it off). Also might want to fix your file; SENDER_NOCHECK should be SENDER_NOCHECK="1"


3. Maybe I am missing something here, but if the emails are not being checked, why is smtp hanging and giving me the 256 error? As soon as I set the rbl setting back to default (check only zen.spamhaus.org), stmp does not hang and email goes out as expected?

They're being checked.

4. I can't seem to get Jake's rbl-check.sh file downloaded (reports a myql error on his site). Does anyone have it available?
Or isn't this used any longer?

<kicks-rocks> Sorry. With everything going on I've never gotten around to fixing the v2gnu.com website.
Here is the script (I'll include it with the next QTP as well):

# Script by Jake Vickers ([email protected]) to test the response times of
# blacklists used by mailers, and remove ones that have a high latency
# www.v2gnu.com
# Initial release - December 19, 2006 - Version 0.1
# The file that gets changed is PURPOSELY not set to your real blacklists file; # you can set it for that once you feel comfortable that it will work for you.

#!/bin/sh

BLS="zen.spamhaus.org list.dsbl.org" # Blacklists we want to use
CEILING=5       # Number of seconds to set as our max before we dump a BL
BLFILENAME=/root/blacklists # name of the blacklists file

# You shouldn't need to change anything below this line

LOEND=1         # lowest IP number to use
HIEND=253       # highest IP number to use
RANDMAX=32767   # for random number generator
TIMEFORMAT="%R" # needed for time to output a whole number we can use

# Generate our IP octets
ANUMBER=$(( $LOEND + ($HIEND * $RANDOM) / ($RANDMAX + 1) ))
BNUMBER=$(( $LOEND + ($HIEND * $RANDOM) / ($RANDMAX + 1) ))
CNUMBER=$(( $LOEND + ($HIEND * $RANDOM) / ($RANDMAX + 1) ))
DNUMBER=$(( $LOEND + ($HIEND * $RANDOM) / ($RANDMAX + 1) ))

#Test the BLs, and change our list
if [ "$BLS" != "" ] ; then
   rm -f $BLFILENAME # Remove old blacklist file
   for blcheck in ${BLS} ; do
NBR=$(time dig +time=$CEILING +short $ANUMBER.$BNUMBER.$CNUMBER.$DNUMBER.$blcheck)
       if [ `expr '$NBR' \<= '$CEILING'` ] ; then
            echo -n "-r "$blcheck" " >> $BLFILENAME
       fi
   done
fi
/usr/bin/qmailctl reload


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to