[vchkpw] tcpserver-rblsmtpd-vpopmail issue

2010-10-22 Thread Vik Nat
Hello,

 

I just build a new qmail box and am currently using vpopmail and have set up
selective relay with pop-before-smtp and have applied the ucspi-mysql patch
to ucspi-tcp. I have also enabled rblsmtpd and am using zen.spamhaus.org.  A
remote pop session is correctly updating the relay table in the database.
But I seem to be having an issue with the tcpserver as I am unable to send
emails from a dynamic ip address even though the ipaddress has been added to
the relay table.I am immediately being blocked by the rblsmtpd.  So it
seems that tcpserver is not quering the relay table during the smtp
connection.  I am using the -V switch in the qmail startup file for
tcpserver.  I have been searching all morning for a solution, any help would
be much appreciated.

 

Thanks,

Vik  

 



!DSPAM:4cc1ef9c32711943013099!


Re: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

2010-10-22 Thread Matt Brookings
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/22/2010 03:09 PM, Vik Nat wrote:
 I just build a new qmail box and am currently using vpopmail and have
 set up selective relay with pop-before-smtp and have applied the
 ucspi-mysql patch to ucspi-tcp. I have also enabled rblsmtpd and am
 using zen.spamhaus.org.  A remote pop session is correctly updating the
 relay table in the database. But I seem to be having an issue with the
 tcpserver as I am unable to send emails from a dynamic ip address even
 though the ipaddress has been added to the relay table.I am
 immediately being blocked by the rblsmtpd.  So it seems that tcpserver
 is not quering the relay table during the smtp connection.  I am using
 the ?V switch in the qmail startup file for tcpserver.  I have been
 searching all morning for a solution, any help would be much appreciated.

The RBL check should be done post-authentication.  If you use the
rblsmtpd command, even if the IP is trusted, it will be blocked by
rblsmtpd.

The other option is to modify rblsmtpd.c to honor the RELAYCLIENT
environment variable and exit if it's set.

Hope that helps.
- -- 
/*
Matt Brookings m...@inter7.com   GnuPG Key FAE0672C
Software developer Systems technician
Inter7 Internet Technologies, Inc. (815)776-9465
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzB8FQACgkQIwet2/rgZyzq5QCePSvI/ehopDf9+uM6X+aNWECG
fzYAoIbDN1Zh1z23uJmmHszX4/U6K1H4
=wEOF
-END PGP SIGNATURE-


RE: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

2010-10-22 Thread Vik Nat
Thanks Matt.  Is there a patch available for rblsmtpd to allow selective
relaying?

Vik

-Original Message-
From: Matt Brookings [mailto:m...@inter7.com] 
Sent: Friday, October 22, 2010 4:13 PM
To: vchkpw@inter7.com
Subject: Re: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/22/2010 03:09 PM, Vik Nat wrote:
 I just build a new qmail box and am currently using vpopmail and have
 set up selective relay with pop-before-smtp and have applied the
 ucspi-mysql patch to ucspi-tcp. I have also enabled rblsmtpd and am
 using zen.spamhaus.org.  A remote pop session is correctly updating the
 relay table in the database. But I seem to be having an issue with the
 tcpserver as I am unable to send emails from a dynamic ip address even
 though the ipaddress has been added to the relay table.I am
 immediately being blocked by the rblsmtpd.  So it seems that tcpserver
 is not quering the relay table during the smtp connection.  I am using
 the ?V switch in the qmail startup file for tcpserver.  I have been
 searching all morning for a solution, any help would be much appreciated.

The RBL check should be done post-authentication.  If you use the
rblsmtpd command, even if the IP is trusted, it will be blocked by
rblsmtpd.

The other option is to modify rblsmtpd.c to honor the RELAYCLIENT
environment variable and exit if it's set.

Hope that helps.
- -- 
/*
Matt Brookings m...@inter7.com   GnuPG Key FAE0672C
Software developer Systems technician
Inter7 Internet Technologies, Inc. (815)776-9465
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzB8FQACgkQIwet2/rgZyzq5QCePSvI/ehopDf9+uM6X+aNWECG
fzYAoIbDN1Zh1z23uJmmHszX4/U6K1H4
=wEOF
-END PGP SIGNATURE-


!DSPAM:4cc1f60432712117511552!



Re: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

2010-10-22 Thread Matt Brookings
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/22/2010 03:37 PM, Vik Nat wrote:
 Thanks Matt.  Is there a patch available for rblsmtpd to allow selective
 relaying?

No, because rblsmtpd doesn't have information on how authentication is
done.  All it can do is check if an IP is on an RBL.
- -- 
/*
Matt Brookings m...@inter7.com   GnuPG Key FAE0672C
Software developer Systems technician
Inter7 Internet Technologies, Inc. (815)776-9465
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzB9lIACgkQIwet2/rgZywctgCfQAEYBVU2Df+FmlOPUHehdzx/
q2kAni1tPNuD9swc7C4PXd0c2CH1/tl/
=n0m0
-END PGP SIGNATURE-


RE: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

2010-10-22 Thread Vik Nat
Right, makes sense.  I want to keep the RBL checks at the smtp level and not
move it to post authentication.

-Original Message-
From: Matt Brookings [mailto:m...@inter7.com] 
Sent: Friday, October 22, 2010 4:39 PM
To: vchkpw@inter7.com
Subject: Re: [vchkpw] tcpserver-rblsmtpd-vpopmail issue

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/22/2010 03:37 PM, Vik Nat wrote:
 Thanks Matt.  Is there a patch available for rblsmtpd to allow selective
 relaying?

No, because rblsmtpd doesn't have information on how authentication is
done.  All it can do is check if an IP is on an RBL.
- -- 
/*
Matt Brookings m...@inter7.com   GnuPG Key FAE0672C
Software developer Systems technician
Inter7 Internet Technologies, Inc. (815)776-9465
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzB9lIACgkQIwet2/rgZywctgCfQAEYBVU2Df+FmlOPUHehdzx/
q2kAni1tPNuD9swc7C4PXd0c2CH1/tl/
=n0m0
-END PGP SIGNATURE-


!DSPAM:4cc1fce232713226617792!