>> On Thu, 2016-06-02 at 12:28 +0200, Matus UHLAR - fantomas wrote:
>> > > Therefore I agree that there could be better way of noticing admins
>> > > of a [URIBL_BLOCKED] issue.
>>
>> create and install a logwatch service that scans /var/log/maillog
>> for lines containing "URIBL_BLOCKED" - this involves a two line config
>> file and a scanner (a few lines of Perl).
>
> The problem I see with this, though, is that you have to know that
> URIBL_BLOCKED is something sinister, and needs to be flagged as a problem,
> to
> bother doing this.
>
> It's probably less effort to actually set up a recursive local name
> server, so
> anyone who knows about URIBL_BLOCKED will simply do this instead.

I agree, if you have not seen this problem before, then URIBL_BLOCKED just
looks like some disabled URIBL hitting the message. At some point I would
google it, but probably not as the first thing, because it looks like a
normal rule hit, and with low points (so disarmed). So only if I would see
it again and again I might get suspicious.


Reply via email to