.\" (C) 2002 Ian Gulliver .TH formmailtest 1 2002-04-03 .SH NAME formmailtest \- attempt to use formmail to relay to a DSBL-complaint host .SH SYNOPSIS .BI "formmailtest <" "url" "> [<" "spoof recipient" ">]" .SH DESCRIPTION formmailtest attempts to connect to the specified host and uses several different to attempt to relay through the FormMail script located at .RI < url >. It can do more tests if the normal recipient for that FormMail script is provided as .RI < "spoof recipient" >, but it can quite often relay without. Tests are done with both GET and POST to attempt to bypass any firewall/httpd.conf/.htaccess pseudo-security. In the tests described below, .I DOMAIN is the section of .RI < "spoof recipient" > after the @ sign, .I USER is the section before, and .I DASHDOMAIN is .I DOMAIN after all periods have been replaced by dashes. .HP Tests: .br recipient=listme@dsbl.org .br recipient=dsbl.org!listme .br realname=&email=\\nCc: listme@dsbl.org&recipient=() .br realname=)\\nCc: listme@dsbl.org (&recipient=() .br .RI recipient=listme%dsbl.org@ DOMAIN .br .RI recipient=dsbl.org!listme@ DOMAIN .br .RI recipient=listme@dsbl.org( DOMAIN .br .RI recipient= DOMAIN .br .RI "realname=&email=\\nCc: listme@dsbl.org&recipient=" DOMAIN .br .RI "realname=)\\nCc: listme@dsbl.org (&email=&recipient=" DOMAIN .br .RI recipient=listme@dsbl.org( USER @ DASHDOMAIN .br .RI recipient= USER @ DASHDOMAIN .br .SH AUTHOR Ian Gulliver .SH SEE ALSO .BR dsbl.conf (5), .BR spamtrap (1)