[qmailtoaster] simscan build options?

2006-02-21 Thread Jeff Thompson
Hi, I'm a new QT user and new to simscan as well. After reviewing the 
simscan options used when building the src rpm, it would appear that 
simscan is not configured to process attachments by default. IMHO, this 
would be a valuable thing to include in QT.


I built a ripmime src rpm and patched the simscan spec file to allow the 
build to include ripmime support for processing mime attachments. The 
inclusion of ripmime support works similar to the specification of the 
Linux distribution, for example:


rpmbuild --rebuild --with cnt4064 --with ripmime simscan*.src.rpm

If "--with ripmime" is used when building the binary rpm, the resulting 
rpm will add ripmime to the required list of packages.


I'd be happy to provide the ripmime src rpm and patched simscan spec 
file if this is something that would be considered for inclusion into 
the QT packages.


Thanks,

--
jthomps


-
QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[qmailtoaster] SquirrelMail's lower frame is blank

2006-02-21 Thread Richard Baxant
After the first email that I receive ... or the first email I send,
the frame below the navigation goes blank?

-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[qmailtoaster] alias for mailing list?

2006-02-21 Thread Steve Huff

hello folks!

i'm currently in the process of migrating accounts from one domain to  
another.  essentially, DomainA (which is currently active) is going  
to be retired and replaced by DomainB.  i've created DomainA as an  
alias domain for DomainB (using vqadmin), and mail seems to be  
flowing correctly.


the problem, however, is that there's a mailing list, [EMAIL PROTECTED],  
which needs to forward to [EMAIL PROTECTED]  unfortunately, when i set  
this up as a forward, mail gets rejected with


delivery 8: failure: ezmlm- 
reject:_fatal:_List_address_must_be_in_To:_or_Cc:_(#5.7.0)/


apparently this error is caused by ezmlm-reject being run with the -t  
option (by default).


so, how do i fix this?

* can i add DomainA to /home/vpopmail/domains/DomainC/List/outhost?
* should i edit /home/vpopmail/domain/DomainC/List/editor to add a -T  
to the ezmlm-reject invocation?  i'd rather not do that if i don't  
have to.
* can i set up an autoresponder that just silently requeues all the  
mail?

* other ideas?

thanks,
steve

---
If this were played upon a stage now, I could condemn it as an  
improbable fiction. - Fabian, Twelfth Night, III,v



-
QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] RH40 ssl

2006-02-21 Thread Jim Bassett


On Feb 16, 2006, at 1:54 PM, Nick Hemmesch wrote:


Hello All,

I have a rh40 QT server that I would have liked to configure ssl  
for, I

followed the instructions to the letter and I run the fdr40-deps.sh
script and I then followed the
http://www.qmailtoaster.com/info/EZ-QmailToaster-Install.txt  
manual to

the letter but when I needed to make the ssl certificate in
/usr/share/ssl/certs/ then I got the message that there is no such
directory, I tried ot search for the directory but to with no joy,  
where

am I going rong here? can anybody please kick my butt in the right
direction?

Regards
Per Qvindesland


Hi,

cd /etc/pki/tls/certs/
  make stunnel.pem
  Note: common name should be your FQDN server.your-domain.com
  mv stunnel.pem /var/qmail/control/servercert.pem
  chown root:qmail /var/qmail/control/servercert.pem
  chmod 644 /var/qmail/control/servercert.pem
  /ln -s /var/qmail/control/servercert.pem \
   /var/qmail/control/clientcert.pem

Regards,

Nick



I have a problem I think is similar although I am on CentOS 4.2. I  
made an ssl cert when I first set up toaster, but I used the wrong  
FQDN. I need to change that now (issue a new cert I guess.) I thought  
I could use the above commands by Nick to do this, but I don't have  
a /etc/pki/tls/certs directory.


How (where) do I do the 'make stunnel.pem'? When I try it in another  
directory it tells me (I guess obviously):


make: *** No rule to make target `stunnel.pem'.  Stop.

Thanks for any advice,

Jim

-
QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



FW: [qmailtoaster] Re: Login username without domain

2006-02-21 Thread Marco Cordeiro
 
I appreciate any help to fix this issue below

-Original Message-
From: Marco Cordeiro [mailto:[EMAIL PROTECTED] 
Sent: segunda-feira, 20 de fevereiro de 2006 11:45
To: qmailtoaster-list@qmailtoaster.com
Subject: [qmailtoaster] Re: Login username without domain

 
I did this and works fine ... But 

I need copy my prefs files from [EMAIL PROTECTED] to username on 

/var/lib/squirrelmail/prefs/

Them my filter rules it's working and address book too.

but my worse issue is :

Squirrelmail using only username without domain It's accessing Maildir on my
home ! not in ~vpopmail/domain/user ??? 
Of course I can't see any e-mails and folders that I already has in my
account ! 

Any idea to fix this ???

Thanks.
[]'s
Marco Cordeiro


On 2/20/06, sadm <[EMAIL PROTECTED]> wrote:
> Just do
>
>
>
> Echo "mydomain.com" > ~vpopmail/etc/defaultdomain
>
>
>
>
>
>   _
>
> From: Taxxolo [mailto:[EMAIL PROTECTED]
> Sent: Saturday, February 18, 2006 9:53 PM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: [qmailtoaster] Login username without domain
>
>
>
> Hello everybody,
>
> i've just installed Qmailtoaster on CentOS. Everything is working 
> fine.
>
> Is there a way to do the login with imap/pop3/webmail only using the 
> username without the domain?
>
> I use unique usernames and forwards as the real email addresses...so i

> can forward mails for an email address
>
> to different users.
>
>
>
> Example:
>
>
>
> Username: mail01
>
> Forward email: [EMAIL PROTECTED]
>
>
>
> I want to login to the server only with mail01 and password. Now i 
> have to use [EMAIL PROTECTED] as username.
>
>
>
> Thanks for any advice!
>
> Regards,
>
> Paolo
>
>
>

-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] CBL

2006-02-21 Thread Riezal Ross
Yeah that's what I thought. It's unlikely that one of my users are doing
any 'unauthorized' spamming. Since I'm quite confident that my toaster
setup is good and I've no users sending out spam mails, I think it could
be something else. That IP address actually belongs to my IPCOP firewall
and is forwarded into my toaster mail server. So I'm not really sure
what is going on.

In any case, I've requested for the IP to be removed. We'll see what
happens after. Thanks again.


Regards,

Riezal Ross



-Original Message-
From: Dairenn Lombard [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, February 21, 2006 5:12 PM
To: qmailtoaster-list@qmailtoaster.com
Subject: RE: [qmailtoaster] CBL


I would ask to be delisted and see what happens; if they turn you down,
they might offer an explanation.  If you don't get one, ask for one.

If a user is spamming through your server, they are doing it as your
direct customer, as, by default, qmail toasters aren't open relays. They
use SMTP AUTH and POP-before-SMTP authentication (courier-imap compiled
with "roaming users on") to prevent that.  If I really suspected
spamming coming from a customer of mine, I would look for large mailing
lists set up by users on my toaster and then use vqadmin to shut it
down.


> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 21, 2006 1:02 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> Thanks for the input. So you are saying that even if my
> server is used to send out spam mails, CBL wouldn't have 
> blocked me? Instead I would be blocked by a proper spam 
> detection list?
> 
> I've never had this problem for ages. And since I used
> toaster, I've never had such blacklisting problems. One 
> possible misconfiguration stated on CBL's site was that my 
> HELO would not return a fully-qualified domain name. However, 
> my email server does in fact return my actual domain name. So 
> that can't be the reason.
> 
> 
> Regards,
> 
> Riezal Ross
> Network Engineer / Project Manager
> CIS (M) Engineering Division
> 
> Clipsal Integrated Systems (M) Sdn Bhd
> Unit 3-2, CP Tower, No. 11, Jalan 16/11,
> Pusat Dagang Seksyen 16, 46350 Petaling Jaya,
> Selangor Darul Ehsan, Malaysia.
> Tel: (+603) 7665 3555   Fax: (+603) 7665 3155
> Mobile: 012-6285210
> E-mail: [EMAIL PROTECTED]
> http://www.cisasia.com.my
> http://www.clipsalportal.com
> 
> 
> -Original Message-
> From: Dairenn Lombard [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 21, 2006 5:00 PM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> It wouldn't have to be an exploit.
> 
> Anyone can configure Outlook (or whatever) to have somebody
> else's e-mail address on the From: line, so that when they 
> send e-mail to someone, it appears to be coming from someone 
> else.  Mail to unknown users would also bounce to the address 
> specified, and not themselves.
> 
> If someone is using an e-mail address at your domain to send
> out spam, spam to non-existant addresses would bounce back to you.
> 
> But RBLs like CBL don't work that way.  Spamhaus and Friends
> normally look at full SMTP headers to figure out which SMTP 
> servers actually relayed the spam received.  So, if your 
> server didn't actually do it, it is very rare that your 
> server would get implicated.
> 
> There are some overly aggressive RBLs out there that ban
> hosts based on being even mentioned in spam that never even 
> touched your mail server. Luckily, most ISPs are smart enough 
> not to use overly zealous RBLs.
> 
> I suggest that before you assume there is an exploit being,
> well, exploited--to find out why you got listed, and make 
> sure your configuration is correct.  If they can show you 
> evidence of spam coming from your server's IP (ie., a message 
> with full SMTP headers), then at least you have something to 
> investigate.  Until then, you're just guessing, and that's a 
> waste of time.
> 
> 
> > -Original Message-
> > From: Riezal Ross [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, February 21, 2006 12:48 AM
> > To: qmailtoaster-list@qmailtoaster.com
> > Subject: RE: [qmailtoaster] CBL
> > 
> > 
> > Is it possible, that someone sent a mail to my server that contains
> > some sort of known exploit. So the server bounces the 
> message and it
> > is actually that bounce message that made my server get listed into
> > CBL. They probably think my server is sending out viruses. Possible?
> > 
> > That is the only think I can think of, other than one of my users
> > sending out virus mail. I have a centralized anti-virus 
> server on my
> > network and its very unlikely that it's a virus that is
> causing this.
> > 
> > Regards,
> > 
> > Riezal Ross
> > 
> > 
> > 
> > -Original Message-
> > From: Dairenn Lombard [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, February 21, 2006 4:50 PM
> > To: qmailtoaster-list@qmailtoaster.com
> > Subject: RE: [qmailtoaster] CBL
> > 

RE: [qmailtoaster] CBL

2006-02-21 Thread Dairenn Lombard
I would ask to be delisted and see what happens; if they turn you down,
they might offer an explanation.  If you don't get one, ask for one.

If a user is spamming through your server, they are doing it as your
direct customer, as, by default, qmail toasters aren't open relays.
They use SMTP AUTH and POP-before-SMTP authentication (courier-imap
compiled with "roaming users on") to prevent that.  If I really
suspected spamming coming from a customer of mine, I would look for
large mailing lists set up by users on my toaster and then use vqadmin
to shut it down.


> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, February 21, 2006 1:02 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> Thanks for the input. So you are saying that even if my 
> server is used to send out spam mails, CBL wouldn't have 
> blocked me? Instead I would be blocked by a proper spam 
> detection list?
> 
> I've never had this problem for ages. And since I used 
> toaster, I've never had such blacklisting problems. One 
> possible misconfiguration stated on CBL's site was that my 
> HELO would not return a fully-qualified domain name. However, 
> my email server does in fact return my actual domain name. So 
> that can't be the reason.
> 
> 
> Regards,
> 
> Riezal Ross
> Network Engineer / Project Manager 
> CIS (M) Engineering Division
> 
> Clipsal Integrated Systems (M) Sdn Bhd
> Unit 3-2, CP Tower, No. 11, Jalan 16/11,
> Pusat Dagang Seksyen 16, 46350 Petaling Jaya,
> Selangor Darul Ehsan, Malaysia.
> Tel: (+603) 7665 3555   Fax: (+603) 7665 3155
> Mobile: 012-6285210
> E-mail: [EMAIL PROTECTED]
> http://www.cisasia.com.my
> http://www.clipsalportal.com
> 
> 
> -Original Message-
> From: Dairenn Lombard [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, February 21, 2006 5:00 PM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> It wouldn't have to be an exploit.
> 
> Anyone can configure Outlook (or whatever) to have somebody 
> else's e-mail address on the From: line, so that when they 
> send e-mail to someone, it appears to be coming from someone 
> else.  Mail to unknown users would also bounce to the address 
> specified, and not themselves.
> 
> If someone is using an e-mail address at your domain to send 
> out spam, spam to non-existant addresses would bounce back to you.
> 
> But RBLs like CBL don't work that way.  Spamhaus and Friends 
> normally look at full SMTP headers to figure out which SMTP 
> servers actually relayed the spam received.  So, if your 
> server didn't actually do it, it is very rare that your 
> server would get implicated.
> 
> There are some overly aggressive RBLs out there that ban 
> hosts based on being even mentioned in spam that never even 
> touched your mail server. Luckily, most ISPs are smart enough 
> not to use overly zealous RBLs.
> 
> I suggest that before you assume there is an exploit being, 
> well, exploited--to find out why you got listed, and make 
> sure your configuration is correct.  If they can show you 
> evidence of spam coming from your server's IP (ie., a message 
> with full SMTP headers), then at least you have something to 
> investigate.  Until then, you're just guessing, and that's a 
> waste of time.
> 
> 
> > -Original Message-
> > From: Riezal Ross [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, February 21, 2006 12:48 AM
> > To: qmailtoaster-list@qmailtoaster.com
> > Subject: RE: [qmailtoaster] CBL
> > 
> > 
> > Is it possible, that someone sent a mail to my server that contains 
> > some sort of known exploit. So the server bounces the 
> message and it 
> > is actually that bounce message that made my server get listed into 
> > CBL. They probably think my server is sending out viruses. Possible?
> > 
> > That is the only think I can think of, other than one of my users 
> > sending out virus mail. I have a centralized anti-virus 
> server on my 
> > network and its very unlikely that it's a virus that is 
> causing this.
> > 
> > Regards,
> > 
> > Riezal Ross
> > 
> > 
> > 
> > -Original Message-
> > From: Dairenn Lombard [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, February 21, 2006 4:50 PM
> > To: qmailtoaster-list@qmailtoaster.com
> > Subject: RE: [qmailtoaster] CBL
> > 
> > 
> > It might be because of a malformed SMTP header when sending 
> e-mail to 
> > other mail servers.  I had this problem, and GoDaddy banned our 
> > toaster.
> > 
> > Check to make sure that your /var/qmail/control/me and locals files 
> > have valid hostnames (not localhost.localdomain) and then 
> follow the 
> > directions on their website for getting delisted.
> > 
> > Otherwise, ask them why you got tagged.  They could have made a 
> > mistake.
> > 
> > 
> > -Original Message-
> > From: Riezal Ross [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, February 21, 2006 12:40 AM
> > To: qmailtoaster-list@qmailtoaster.com
> > Subject: [qmailtoaster] CBL
> > 
>

RE: [qmailtoaster] CBL

2006-02-21 Thread Riezal Ross
Thanks for the input. So you are saying that even if my server is used
to send out spam mails, CBL wouldn't have blocked me? Instead I would be
blocked by a proper spam detection list?

I've never had this problem for ages. And since I used toaster, I've
never had such blacklisting problems. One possible misconfiguration
stated on CBL's site was that my HELO would not return a fully-qualified
domain name. However, my email server does in fact return my actual
domain name. So that can't be the reason.


Regards,

Riezal Ross
Network Engineer / Project Manager 
CIS (M) Engineering Division

Clipsal Integrated Systems (M) Sdn Bhd
Unit 3-2, CP Tower, No. 11, Jalan 16/11,
Pusat Dagang Seksyen 16, 46350 Petaling Jaya,
Selangor Darul Ehsan, Malaysia.
Tel: (+603) 7665 3555   Fax: (+603) 7665 3155
Mobile: 012-6285210
E-mail: [EMAIL PROTECTED]
http://www.cisasia.com.my
http://www.clipsalportal.com


-Original Message-
From: Dairenn Lombard [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, February 21, 2006 5:00 PM
To: qmailtoaster-list@qmailtoaster.com
Subject: RE: [qmailtoaster] CBL


It wouldn't have to be an exploit.

Anyone can configure Outlook (or whatever) to have somebody else's
e-mail address on the From: line, so that when they send e-mail to
someone, it appears to be coming from someone else.  Mail to unknown
users would also bounce to the address specified, and not themselves.

If someone is using an e-mail address at your domain to send out spam,
spam to non-existant addresses would bounce back to you.

But RBLs like CBL don't work that way.  Spamhaus and Friends normally
look at full SMTP headers to figure out which SMTP servers actually
relayed the spam received.  So, if your server didn't actually do it, it
is very rare that your server would get implicated.

There are some overly aggressive RBLs out there that ban hosts based on
being even mentioned in spam that never even touched your mail server.
Luckily, most ISPs are smart enough not to use overly zealous RBLs.

I suggest that before you assume there is an exploit being, well,
exploited--to find out why you got listed, and make sure your
configuration is correct.  If they can show you evidence of spam coming
from your server's IP (ie., a message with full SMTP headers), then at
least you have something to investigate.  Until then, you're just
guessing, and that's a waste of time.


> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 21, 2006 12:48 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> Is it possible, that someone sent a mail to my server that
> contains some sort of known exploit. So the server bounces 
> the message and it is actually that bounce message that made 
> my server get listed into CBL. They probably think my server 
> is sending out viruses. Possible?
> 
> That is the only think I can think of, other than one of my
> users sending out virus mail. I have a centralized anti-virus 
> server on my network and its very unlikely that it's a virus 
> that is causing this.
> 
> Regards,
> 
> Riezal Ross
> 
> 
> 
> -Original Message-
> From: Dairenn Lombard [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 21, 2006 4:50 PM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> It might be because of a malformed SMTP header when sending
> e-mail to other mail servers.  I had this problem, and 
> GoDaddy banned our toaster.
> 
> Check to make sure that your /var/qmail/control/me and locals
> files have valid hostnames (not localhost.localdomain) and 
> then follow the directions on their website for getting delisted.
> 
> Otherwise, ask them why you got tagged.  They could have made
> a mistake.
> 
> 
> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 21, 2006 12:40 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: [qmailtoaster] CBL
> 
> 
> Hi,
> I don't know how my server managed to get listed in CBL, but 
> I'm wondering if anyone here has faced this before. Any ideas 
> in general why my mail server is getting listed?
> <[EMAIL PROTECTED]>: 
> 203.121.47.59 does not like recipient. 
> Remote host said: 553 
> http://www.spamhaus.org/query/bl?ip=202.75.186.170
> 
> Giving up on 203.121.47.59.
> 
> 
> Regards,
> Riezal Ross 
> Network Engineer / Project Manager 
> CIS (M) Engineering Division 
> Clipsal Integrated Systems (M) Sdn Bhd 
> Unit 3-2, CP Tower, No. 11, Jalan 16/11, 
> Pusat Dagang Seksyen 16, 46350 Petaling Jaya, 
> Selangor Darul Ehsan, Malaysia. 
> Tel: (+603) 7665 3555   Fax: (+603) 7665 3155 
> Mobile: 012-6285210 
> E-mail: [EMAIL PROTECTED] 
> http://www.cisasia.com.my 
> http://www.clipsalportal.com 
> 
> -
>  QmailToaster hosted by: VR Hosted 
> -
> To unsubscribe, e-mail: [EMAIL

RE: [qmailtoaster] CBL

2006-02-21 Thread Dairenn Lombard
It wouldn't have to be an exploit.

Anyone can configure Outlook (or whatever) to have somebody else's
e-mail address on the From: line, so that when they send e-mail to
someone, it appears to be coming from someone else.  Mail to unknown
users would also bounce to the address specified, and not themselves.

If someone is using an e-mail address at your domain to send out spam,
spam to non-existant addresses would bounce back to you.

But RBLs like CBL don't work that way.  Spamhaus and Friends normally
look at full SMTP headers to figure out which SMTP servers actually
relayed the spam received.  So, if your server didn't actually do it, it
is very rare that your server would get implicated.

There are some overly aggressive RBLs out there that ban hosts based on
being even mentioned in spam that never even touched your mail server.
Luckily, most ISPs are smart enough not to use overly zealous RBLs.

I suggest that before you assume there is an exploit being, well,
exploited--to find out why you got listed, and make sure your
configuration is correct.  If they can show you evidence of spam coming
from your server's IP (ie., a message with full SMTP headers), then at
least you have something to investigate.  Until then, you're just
guessing, and that's a waste of time.


> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, February 21, 2006 12:48 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> Is it possible, that someone sent a mail to my server that 
> contains some sort of known exploit. So the server bounces 
> the message and it is actually that bounce message that made 
> my server get listed into CBL. They probably think my server 
> is sending out viruses. Possible?
> 
> That is the only think I can think of, other than one of my 
> users sending out virus mail. I have a centralized anti-virus 
> server on my network and its very unlikely that it's a virus 
> that is causing this.
> 
> Regards,
> 
> Riezal Ross
> 
> 
> 
> -Original Message-
> From: Dairenn Lombard [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, February 21, 2006 4:50 PM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: RE: [qmailtoaster] CBL
> 
> 
> It might be because of a malformed SMTP header when sending 
> e-mail to other mail servers.  I had this problem, and 
> GoDaddy banned our toaster.
> 
> Check to make sure that your /var/qmail/control/me and locals 
> files have valid hostnames (not localhost.localdomain) and 
> then follow the directions on their website for getting delisted.
> 
> Otherwise, ask them why you got tagged.  They could have made 
> a mistake.
> 
> 
> -Original Message-
> From: Riezal Ross [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, February 21, 2006 12:40 AM
> To: qmailtoaster-list@qmailtoaster.com
> Subject: [qmailtoaster] CBL
> 
> 
> Hi, 
> I don't know how my server managed to get listed in CBL, but 
> I'm wondering if anyone here has faced this before. Any ideas 
> in general why my mail server is getting listed?
> <[EMAIL PROTECTED]>: 
> 203.121.47.59 does not like recipient. 
> Remote host said: 553 
> http://www.spamhaus.org/query/bl?ip=202.75.186.170
> 
> Giving up on 203.121.47.59. 
> 
> 
> Regards, 
> Riezal Ross 
> Network Engineer / Project Manager 
> CIS (M) Engineering Division 
> Clipsal Integrated Systems (M) Sdn Bhd 
> Unit 3-2, CP Tower, No. 11, Jalan 16/11, 
> Pusat Dagang Seksyen 16, 46350 Petaling Jaya, 
> Selangor Darul Ehsan, Malaysia. 
> Tel: (+603) 7665 3555   Fax: (+603) 7665 3155 
> Mobile: 012-6285210 
> E-mail: [EMAIL PROTECTED] 
> http://www.cisasia.com.my 
> http://www.clipsalportal.com 
> 
> -
>  QmailToaster hosted by: VR Hosted 
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: 
> [EMAIL PROTECTED]
> 
> 
> 
> -
>  QmailToaster hosted by: VR Hosted 
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: 
> [EMAIL PROTECTED]
> 
> 

-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] CBL

2006-02-21 Thread Riezal Ross
Is it possible, that someone sent a mail to my server that contains some
sort of known exploit. So the server bounces the message and it is
actually that bounce message that made my server get listed into CBL.
They probably think my server is sending out viruses. Possible?

That is the only think I can think of, other than one of my users
sending out virus mail. I have a centralized anti-virus server on my
network and its very unlikely that it's a virus that is causing this.

Regards,

Riezal Ross



-Original Message-
From: Dairenn Lombard [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, February 21, 2006 4:50 PM
To: qmailtoaster-list@qmailtoaster.com
Subject: RE: [qmailtoaster] CBL


It might be because of a malformed SMTP header when sending e-mail to
other mail servers.  I had this problem, and GoDaddy banned our toaster.

Check to make sure that your /var/qmail/control/me and locals files have
valid hostnames (not localhost.localdomain) and then follow the
directions on their website for getting delisted.

Otherwise, ask them why you got tagged.  They could have made a mistake.


-Original Message-
From: Riezal Ross [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, February 21, 2006 12:40 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: [qmailtoaster] CBL


Hi, 
I don't know how my server managed to get listed in CBL, but I'm
wondering if anyone here has faced this before. Any ideas in general why
my mail server is getting listed?
<[EMAIL PROTECTED]>: 
203.121.47.59 does not like recipient. 
Remote host said: 553 http://www.spamhaus.org/query/bl?ip=202.75.186.170

Giving up on 203.121.47.59. 


Regards, 
Riezal Ross 
Network Engineer / Project Manager 
CIS (M) Engineering Division 
Clipsal Integrated Systems (M) Sdn Bhd 
Unit 3-2, CP Tower, No. 11, Jalan 16/11, 
Pusat Dagang Seksyen 16, 46350 Petaling Jaya, 
Selangor Darul Ehsan, Malaysia. 
Tel: (+603) 7665 3555   Fax: (+603) 7665 3155 
Mobile: 012-6285210 
E-mail: [EMAIL PROTECTED] 
http://www.cisasia.com.my 
http://www.clipsalportal.com 

-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] CBL

2006-02-21 Thread Dairenn Lombard
It might be because of a malformed SMTP header when sending e-mail to
other mail servers.  I had this problem, and GoDaddy banned our toaster.

Check to make sure that your /var/qmail/control/me and locals files have
valid hostnames (not localhost.localdomain) and then follow the
directions on their website for getting delisted.

Otherwise, ask them why you got tagged.  They could have made a mistake.


-Original Message-
From: Riezal Ross [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, February 21, 2006 12:40 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: [qmailtoaster] CBL


Hi, 
I don't know how my server managed to get listed in CBL, but I'm
wondering if anyone here has faced this before. Any ideas in general why
my mail server is getting listed?
<[EMAIL PROTECTED]>: 
203.121.47.59 does not like recipient. 
Remote host said: 553 http://www.spamhaus.org/query/bl?ip=202.75.186.170

Giving up on 203.121.47.59. 


Regards, 
Riezal Ross 
Network Engineer / Project Manager 
CIS (M) Engineering Division 
Clipsal Integrated Systems (M) Sdn Bhd 
Unit 3-2, CP Tower, No. 11, Jalan 16/11, 
Pusat Dagang Seksyen 16, 46350 Petaling Jaya, 
Selangor Darul Ehsan, Malaysia. 
Tel: (+603) 7665 3555   Fax: (+603) 7665 3155 
Mobile: 012-6285210 
E-mail: [EMAIL PROTECTED] 
http://www.cisasia.com.my 
http://www.clipsalportal.com 

-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[qmailtoaster] CBL

2006-02-21 Thread Riezal Ross
Title: CBL






Hi,


I don't know how my server managed to get listed in CBL, but I'm wondering if anyone here has faced this before. Any ideas in general why my mail server is getting listed?

<[EMAIL PROTECTED]>:

203.121.47.59 does not like recipient.

Remote host said: 553 http://www.spamhaus.org/query/bl?ip=202.75.186.170

Giving up on 203.121.47.59.



Regards,


Riezal Ross

Network Engineer / Project Manager 

CIS (M) Engineering Division


Clipsal Integrated Systems (M) Sdn Bhd

Unit 3-2, CP Tower, No. 11, Jalan 16/11,

Pusat Dagang Seksyen 16, 46350 Petaling Jaya,

Selangor Darul Ehsan, Malaysia.

Tel: (+603) 7665 3555   Fax: (+603) 7665 3155

Mobile: 012-6285210

E-mail: [EMAIL PROTECTED]

http://www.cisasia.com.my

http://www.clipsalportal.com