Hello,
A new free and public RBL called the BRBL has been launched by Barracuda Networks.
To register for access to the BRBL please see the Barracuda BRBL Registration Page.
According to the BRBL instructions once you have been granted access you can test that the BRBL works with these steps:
On Unix/Linux:
On Windows:
On my personal qmail server I am testing it by adding it to my RBL lineup in my $qmail/supervise/qmail-smtpd/run file.
Here is the relevant section of that file:
I will post a more in depth product review after I have had some time to gather meaningful statistics from several high volume mail servers.
A new free and public RBL called the BRBL has been launched by Barracuda Networks.
To register for access to the BRBL please see the Barracuda BRBL Registration Page.
According to the BRBL instructions once you have been granted access you can test that the BRBL works with these steps:
On Unix/Linux:
$ host 2.0.0.127.b.barracudacentral.org
2.0.0.127.b.barracudacentral.org has address 127.0.0.2
On Windows:
C:\>nslookup 2.0.0.127.b.barracudacentral.org
Server: {Your DNS server hostname}
Address: {Your DNS server IP addresses}
Non-authoritative answer:
Name: 2.0.0.127.b.barracudacentral.org
Address: 127.0.0.3
On my personal qmail server I am testing it by adding it to my RBL lineup in my $qmail/supervise/qmail-smtpd/run file.
Here is the relevant section of that file:
To test the BRBL from within SpamAssassin add this to the end of your local.cf file:exec /usr/local/bin/softlimit -m 30000000 \
/usr/local/bin/tcpserver -v -H -R -l "$LOCAL" -x /etc/tcp.smtp.cdb -c "$MAXSMTPD" \
-u "$QMAILDUID" -g "$NOFILESGID" 0 smtp /usr/local/bin/rblsmtpd -t 5 \
-b -r b.barracudacentral.org \
-b -r zen.spamhaus.org \
/var/qmail/bin/qmail-smtpd 2>&1
If you block connections based on IP address in the qmail-smtpd example, you do not need to also do the duplicate SpamAssassin check.header IN_BCUDA_RBL rbleval:check_rbl('bcuda', 'b.barracudacentral.org')
describe IN_BCUDA_RBL Received via a relay listed by Barracuda BRBL
tflags IN_BCUDA_RBL net
header RCVD_IN_BCUDA_RELAY rbleval:check_rbl_results_for('bcuda',
'127.0.0.2')
describe RCVD_IN_BCUDA_RELAY BCUDA: relay ip is convicted spammer
tflags RCVD_IN_BCUDA_RELAY net
score RCVD_IN_BCUDA_RELAY 1.00
I will post a more in depth product review after I have had some time to gather meaningful statistics from several high volume mail servers.
Last edited: