On Wed, 25 Feb 2004 16:43:36 +0100, Sebastian Krohn
<seb(_at_)gaia(_dot_)sunn(_dot_)de>
wrote:
David Stone <dstone(_at_)chem(_dot_)utoronto(_dot_)ca> wrote:
You CAN do these queries within procmail, but if you're intending to
refuse mail based on the listing, better to do it in the mail software.
I personally like to feed the spam captured with RBLs into my bayesian
filters. Even if i get more traffic on my machine...
For this i can recommend the small perl-script 'blq'. I can't remember
where i found it but everyone who is interested can get it here:
ftp://ftp.darksystem.net/user/seb/tools/blq
Of course the best way is to block it at the SMTP level, but if you're
like me stuck with a pre-compiled, pre-configured sendmail installation,
using your /etc/mail/access is a good idea, but I do not see a away of
automating that with my current ISP.
After extensively reading this list for a while, along with Procmail
documentation, and testing several RBL packages out there, I have
compiled this small recipe.
I am not a Procmail expert, so it may not be the most efficient way to
do it, but it works for me.
Hope it helps someone.
Download and install notespam from
http://www.xisp.net/notespam/
Add the recipe to your procmailrc or .procmailrc after defining
RBL-Blocked
Something like
RBL-Blocked='/$HOM$/RBL-Blocked'
### RBL SPAM
## Test against RBLs...
## Uses /usr/local/bin/notespam
## Ignores whitelisted IP addresses /etc/notespam.whitelist
## RBL Services are listed in /etc/notespam.blacklist
:0 fw
| /usr/local/bin/notespam
### X-RBL-Check: header exists?
### Example X-RBL-Check: Marked 64.253.207.29 as spam via bl.spamcop.net
### Adds [RBL SPAM] at the start of the Subject Header.
### Filters out the spam
:0
* ^X-RBL-Check:\/.*
{
LOG="Open Relay-SPAMHaus: $MATCH$NL"
:0 fwH
|sed -e 's/^Subject:[ ]*/Subject: [RBL SPAM] /'
:0:
$RBL-Blocked
}
_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail