Skip Navigation

Login

If you have an account on this web site you may login.

If you have an account on this site but have forgotten your user name and / or your password then you can request an account reminder email.

helo email checking

This bug was reported to the dev list on 5th June 2006: https://lists.webarch.co.uk/pipermail/mkdoc-dev/2006-June/000327.html

One MKDoc server keeps getting listed on the CBL email spam list, http://cbl.abuseat.org/

This is down to the use of Mail::CheckUser http://search.cpan.org/~ilyam/Mail-CheckUser-1.21/CheckUser.pm in flo/plugin/Account/Subscribe.pm — this is what the CBL says:

The Perl CheckUser module defaults to improper “HELO” and “MAIL FROM” strings: “localhost.localdomain” and “check at user.com” respectively. The former is illegal, the latter impersonates user.com – they probably don't like that. [Besides, by not using your own domain, some spam filters will lie to your RCPT TO.]

You will need to change $Helo_Domain = to be “<DNS name of your server>” and change $Sender_Addr to be something in your domain (eg: “check@<mydomain>”)

http://cbl.abuseat.org/linuxnonserver.html

If you run ethereal and capture the helo MKDoc does indeed use the default of localhost.localdomain and the default email address of check at user.com.

Subscribe.pm needs to be fixed so that it uses the MKDoc public domain for the helo and the admin email address for the check.

See the attached screenshots for the ethereal results.

helo check
email address

Up

This document was last modified by Chris Croome on 2006-06-05 06:29:27
MKDoc Ltd., 31 Psalter Lane, Sheffield, S11 8YL, UK.
Copyright © 2001-2005 MKDoc Ltd.