EMail Server Relay Check: Difference between revisions
m (→Usage) |
m (→Usage) |
||
Line 39: | Line 39: | ||
== Usage == | == Usage == | ||
Using the tool is designed to be very easy. Type the hostname or IP address of the target server into the box and hit enter. You should see diagnostic information on the output page. If the target server is accepting connections on port 25 (SMTP) you will see output of three SMTP transactions. If the IP address is blacklisted on public Internet blacklists, you will see that as well. If you choose to check for open relay | Using the tool is designed to be very easy. Type the hostname or IP address of the target server into the box and hit enter. You should see diagnostic information on the output page. If the target server is accepting connections on port 25 (SMTP) you will see output of three SMTP transactions. If the IP address is blacklisted on public Internet blacklists, you will see that as well. If you choose to check for open relay plus portscan, the server will be tested for public-facing open NETBIOS ports. | ||
'''(this documentation is currently under development)''' | '''(this documentation is currently under development)''' |
Revision as of 18:33, 21 March 2011
Overview
The eMail Server Relay Check Tool is a simple security tool designed for testing email servers for signs of misconfiguration.
You can gain access to the eMail Server Relay Check page by selecting
NSTWUI > Network > email > eMail Server Relay Check
The tool checks for the following:
- SMTP banner - reverse DNS mismatch
- Open Relay
- Bounce Messages or Non-Delivery Reports (NRS's)
- Listings on DNS-based Realtime Blacklists
- Optional NETBIOS ports scan
Configuration
The config file for Relay Check is /usr/share/relaycheck/cgi-bin/relaycheck.conf. Values need to stay in single quotes.
In order for the tool to work correctly, you will need to change the default email to your own email address.
my email address = 'change-me@some.domain.com'
Change this to your actual email address, it is where test messages will be sent.
You can also change server timeout values.
Enter your preferred timeout value in seconds for an initial connection to the target server. Default value is 5 seconds.
initial timeout = '5'
Enter your preferred timeout value for individual SMTP commands EHLO, MAIL FROM, RCPT TO, etc. Default value is 3 seconds.
individual smtp command timeouts = '3'
Usage
Using the tool is designed to be very easy. Type the hostname or IP address of the target server into the box and hit enter. You should see diagnostic information on the output page. If the target server is accepting connections on port 25 (SMTP) you will see output of three SMTP transactions. If the IP address is blacklisted on public Internet blacklists, you will see that as well. If you choose to check for open relay plus portscan, the server will be tested for public-facing open NETBIOS ports.
(this documentation is currently under development)