1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
$NetBSD: patch-ai,v 1.3 2003/09/03 13:08:06 atatat Exp $
--- rules/20_head_tests.cf.orig 2003-05-12 15:15:34.000000000 -0400
+++ rules/20_head_tests.cf
@@ -230,36 +230,6 @@ describe FAKED_IP_IN_RCVD Received: cont
header SMTPD_IN_RCVD Received =~ /\(SMTPD32-\d+\..+\)/
describe SMTPD_IN_RCVD Received via SMTPD32 server (SMTPD32-n.n)
-# Multizone / Multi meaning BLs first
-
-# Osirusoft, like MAPS RBL+ is a multi-meaning BL, so it is treated separately
-header RCVD_IN_OSIRUSOFT_COM rbleval:check_rbl('osirusoft', 'relays.osirusoft.com.')
-describe RCVD_IN_OSIRUSOFT_COM Received via a relay in relays.osirusoft.com
-tflags RCVD_IN_OSIRUSOFT_COM net
-
-# X prefix was used to insure that it was run at the end, but it's not needed
-# anymore since we run the rule with rblreseval -- Marc
-header X_OSIRU_OPEN_RELAY rbleval:check_rbl_results_for('osirusoft', '127.0.0.2')
-describe X_OSIRU_OPEN_RELAY DNSBL: sender is Confirmed Open Relay
-tflags X_OSIRU_OPEN_RELAY net
-
-header X_OSIRU_DUL rbleval:check_rbl_results_for('osirusoft', '127.0.0.3')
-describe X_OSIRU_DUL DNSBL: sender ip address in in a dialup block
-tflags X_OSIRU_DUL net
-
-header X_OSIRU_SPAM_SRC rbleval:check_rbl_results_for('osirusoft', '127.0.0.4')
-describe X_OSIRU_SPAM_SRC DNSBL: sender is Confirmed Spam Source
-tflags X_OSIRU_SPAM_SRC net
-
-header X_OSIRU_SPAMWARE_SITE rbleval:check_rbl_results_for('osirusoft', '127.0.0.6')
-describe X_OSIRU_SPAMWARE_SITE DNSBL: sender is a Spamware site or vendor
-tflags X_OSIRU_SPAMWARE_SITE net
-
-header X_OSIRU_DUL_FH rbleval:check_rbl('osirusoft-dul-firsthop', 'relays.osirusoft.com.')
-describe X_OSIRU_DUL_FH Received from first hop dialup listed in relays.osirusoft.com
-tflags X_OSIRU_DUL_FH net nice
-
-
# Now, single zone BLs follow:
# the new first arg for check_rbl() indicates what type of check it is;
# each type of check is stored in a separate set, and if an IP has already
|