diff xml/dnsbl.in @ 13:2752e512fd32 stable-2-1

finish documentation
author carl
date Sun, 25 Apr 2004 11:36:08 -0700
parents 6ac6d6b822ce
children 443aa0e8c6fa
line wrap: on
line diff
--- a/xml/dnsbl.in	Fri Apr 23 22:45:10 2004 -0700
+++ b/xml/dnsbl.in	Sun Apr 25 11:36:08 2004 -0700
@@ -41,8 +41,8 @@
 <p>You may want to blacklist some specific senders or sending domains.
 This could be done thru either the DCC (on a global basis, or for a
 specific single recipient).  We prefer to do such blacklisting via the
-DNSBL milter config, since it can be done for an entire recipient mail
-domain.  The DCC approach has the feature that you can capture the
+DNSBL milter config, since it can be done for a collection of recipient
+mail domains.  The DCC approach has the feature that you can capture the
 entire message in the DCC log files.  The DNSBL milter approach has the
 feature that the mail is rejected earlier (at RCPT TO time), and the
 sending machine just gets a generic "550 5.7.1 no such user" message.
@@ -51,7 +51,9 @@
 include_dcc line) in the DNSBL milter config.  This will import the
 (env_to, env_from, and substitute mail_host) entries from the DCC config
 into the DNSBL config.  This allows using the DCC config as the single
-point for white/blacklisting.
+point for white/blacklisting.  When used in this manner, the whitelist
+env_to entries from the DCC config become global whitelist entries in
+the DNSBL config.
 
 <p>Consider the case where you have multiple clients, each with their
 own mail servers, and each running their own DCC milters.  Each client
@@ -126,20 +128,22 @@
 </pre>
 
 <p>to allow those clients to smarthost thru your mail server.  Now if
-one of those clients happens get infected with a virus that turns into
-an open proxy, and their 192.168.4.45 lands on the SBL-XBL, you will
-still wind up allowing that infected machine to smarthost thru your mail
-servers.
+one of those clients happens get infected with a virus that turns a
+machine into an open proxy, and their 192.168.4.45 lands on the SBL-XBL,
+you will still wind up allowing that infected machine to smarthost thru
+your mail servers.
 
 <p>With this DNSBL milter, the sendmail access database cannot override
 the dnsbl checks, so that machine won't be able to send mail to or thru
-your smarthost machine.
+your smarthost mail server.
 
-<hr>
-<center>Installation and configuration</center>
-<p>Usage:  Note that this has ONLY been tested on Linux, specifically
-RedHat Linux.  Your mileage will vary. In particular, this milter makes no
-attempt to understand IPv6.
+<hr> <center>Installation and configuration</center> <p>Usage:  Note
+that this has ONLY been tested on Linux, specifically RedHat Linux.  In
+particular, this milter makes no attempt to understand IPv6.  Your
+mileage will vary.  You will need at a minimum a C++ compiler with a
+minimally thread safe STL implementation.  The distribution includes a
+test.cpp program.  If it fails this milter won't work.  If it passes,
+this milter might work.
 
 Fetch <a href="http://www.five-ten-sg.com/util/dnsbl.tar.gz">dnsbl.tar.gz</a>
 and
@@ -161,7 +165,7 @@
 Read the sample <a
 href="http://www.five-ten-sg.com/dnsbl.conf">var/dnsbl/dnsbl.conf</a>
 file and modify it to fit your configuration.  You can test your
-configuration files, and see a readable internal dump of them on stderr
+configuration files, and see a readable internal dump of them on stdout
 with
 
 <pre>