Automatically detects and blocks open mail relays
'Smtpblock' parses a *nix mail log. When new mail messages are detected, it performs DNSBL/SMTP relay tests. If the host is listed in a DNSBL or relays third-party mail, Smtpblock creates a firewall rule to block access to the localhost's SMTP port and/or creates a hash that can be referenced by sendmail's RFC-822 pattern matching feature. It keeps track of each host's test status and time when it will need to be rechecked, reducing the need to constantly check every host sending mail to the local system. Smtpblock can be run as a daemon continuously checking the mail log or as a standalone program parsing the entire log file. Hosts can be manually checked, blocked, or unblocked from the command line.
DocumentationUser manpage available in HTML format from http://web.archive.org/web/20050914060146/http://www.angmar.com/smtpblock/smtpblock_2.8_man_page.html
released on 26 December 2002
22 August 2002
Leaders and contributors
Resources and communication
|Required to use||Perl 5.002 or later|
|Required to use||NMAP|
|Required to use||sendmail|
|Required to use||Net_Netmask|
This entry (in part or in whole) was last reviewed on 1 March 2017.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.