Matthew Sullivan <matthew@netscape.com> patched antirelay.c against percent (%)
hack relay, and this combined with the RBL modification, this new version maybe downloaded
here: antirelay.c.
With the new plugin you can configure it as follows:
Edit the antirelay.conf file as follows:
# antirelay.conf
#
# we do not want auth capabilities to be stripped,
# so that SMTP authentication feature shall work.
# this feature is important if you want all users to
# authenticate regardless of their location.
stripauthcapability:0
# we want IP address to be resolved into hostname in
# order to use wildcards with hostnames in configuration file
resolvehostnames:0
# we will trust any authenticated user.
useauthinfo:1
# we will return the error code so that user should authenticate
# in order to send mail.
advertiseauthinfo:1
#rbl query hosts
rbldomain:dnsbl.sorbs.net
rbldomain:relays.osirusoft.com
# domains we accept delivery. enter your own domain here.
delivery:*@sorbs.net
delivery:*@netscape.com
# domain we accept relaying. enter your own domain here.
submission:212.156.*.*
submission:195.175.230.*
submission:194.54.34.7
submission:127.0.0.1
#
# The following lines are dangerous and should not be used...
submission:*.netscape.com
submission:*.sorbs.net
submission:localhost
# They are dangerous because DNS reverse lookups maybe faked
# thereby defeating the antirelay block.
We should activate this plugin. First type:
cd usr/netscape/server4/msg-yourhostname
Then type
cd /usr/netscape/server4/msg-*/
./configutil -l -o service.smtp.protplugmodules \
-v '/usr/netscape/server4/plugins/antirelay.so'