NAME¶
formmailtest - attempt to use formmail to relay to a DSBL-complaint host
SYNOPSIS¶
formmailtest <url> [<spoof
recipient>]
DESCRIPTION¶
formmailtest attempts to connect to the specified host and uses several
different to attempt to relay through the FormMail script located at
<
url>. It can do more tests if the normal recipient for that
FormMail script is provided as <
spoof recipient>, but it can
quite often relay without.
Tests are done with both GET and POST to attempt to bypass any
firewall/httpd.conf/.htaccess pseudo-security.
In the tests described below,
DOMAIN is the section of <
spoof
recipient> after the @ sign,
USER is the section before, and
DASHDOMAIN is
DOMAIN after all periods have been replaced by
dashes.
Tests:
recipient=listme@dsbl.org
recipient=dsbl.org!listme
realname=&email=\nCc: listme@dsbl.org&recipient=()
realname=)\nCc: listme@dsbl.org (&recipient=()
recipient=listme%dsbl.org@
DOMAIN
recipient=dsbl.org!listme@
DOMAIN
recipient=listme@dsbl.org(
DOMAIN
recipient=<listme@dsbl.org>
DOMAIN
realname=&email=c: listme@dsbl.org&recipient=
DOMAIN
realname=)c: listme@dsbl.org (&email=&recipient=
DOMAIN
recipient=listme@dsbl.org(
USER@
DASHDOMAIN
recipient=<listme@dsbl.org>
USER@
DASHDOMAIN
AUTHOR¶
Ian Gulliver <ian@penguinhosting.net>
SEE ALSO¶
dsbl.conf(5),
spamtrap(1)