relaytest man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

relaytest(1)							  relaytest(1)

NAME
       relaytest - attempt to use SMTP to relay to a DSBL-compliant host

SYNOPSIS
       relaytest [-v] <ip address[:port]>

DESCRIPTION
       relaytest  attempts  to	connect	 to  the specified <ip address> on the
       specified port (default is port 25) and uses  a	variety	 of  tests  to
       attempt to relay through the host.

       In  the	tests below, source.com is sender_domain from dsbl.conf(5) and
       sender is sender_user.

       Non-domain-specific tests:

	      MAIL FROM:<sender@source.com>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<sender@source.com>
	      RCPT TO:<"listme@dsbl.org">

	      MAIL FROM:<sender@source.com>
	      RCPT TO:listme@dsbl.org

	      MAIL FROM:<sender@source.com>
	      RCPT TO:<dsbl.org!listme>

	      MAIL FROM:<nobody>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<nobody>
	      RCPT TO:<"listme@dsbl.org">

	      MAIL FROM:<nobody>
	      RCPT TO:listme@dsbl.org

	      MAIL FROM:<nobody>
	      RCPT TO:<dsbl.org!listme>

	      MAIL FROM:<source.com!sender>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<source.com!sender>
	      RCPT TO:<"listme@dsbl.org">

	      MAIL FROM:<source.com!sender>
	      RCPT TO:listme@dsbl.org

	      MAIL FROM:<source.com!sender>
	      RCPT TO:<dsbl.org!listme>

	      MAIL FROM:<>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<>
	      RCPT TO:<"listme@dsbl.org">

	      MAIL FROM:<>
	      RCPT TO:listme@dsbl.org

	      MAIL FROM:<>
	      RCPT TO:<dsbl.org!listme>

       relaytest  then	builds	a  list	  of   possible	  domains,   including
       "[127.0.0.1]",  "localhost", [<ip address>], and any other domains that
       can be derived from reverse DNS of the IP or the SMTP greeting.

       Domain specific tests:

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<"listme@dsbl.org">

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:listme@dsbl.org

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<listme%dsbl.org@DOMAIN>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<listme%dsbl.org>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<"listme%dsbl.org">

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<listme@dsbl.org@DOMAIN>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<"listme@dsbl.org"@DOMAIN>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<@DOMAIN:listme@dsbl.org>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<dsbl.org!listme>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<dsbl.org!listme@DOMAIN>

	      MAIL FROM:<DOMAIN!nobody>
	      RCPT TO:<dsbl.org!listme>

	      MAIL FROM:<DOMAIN!nobody>
	      RCPT TO:<dsbl.org!listme@DOMAIN>

	      MAIL FROM:<nobody@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<postmaster@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<administrator@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<sales@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<info@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<webmaster@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

	      MAIL FROM:<listserv@DOMAIN>
	      RCPT TO:<listme@dsbl.org>

       relaytest then tries a variety of SMTP AUTH methods to try to  relay  a
       message through the target server.

       The envelopes used for these tests are always:

	      MAIL FROM:<sender@source.com>
	      RCPT TO:<listme@dsbl.org>

       The SMTP AUTH methods tried are as follows:

	      AUTH LOGIN, user=/webmaster, password=(null)
	      AUTH LOGIN, user=admin, password=admin
	      AUTH LOGIN, user=administrator, password=(null)
	      AUTH LOGIN, user=test, password=test
	      AUTH NTLM (anonymous)

OPTIONS
       -v     Verbose  mode.  Details  of  the SMTP transaction are written to
	      standard output.

AUTHOR
       Ian Gulliver <ian@penguinhosting.net>

SEE ALSO
       dsbl.conf(5), spamtrap(1)

				  2002-04-03			  relaytest(1)
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net