From: Nigel Metheringham Date: Wed, 24 Feb 2016 16:44:59 +0000 (+0000) Subject: Removed doc references to relay-test.mail-abuse.org X-Git-Tag: exim-4_87_RC6~16^2 X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=86d5230bb79219ec69786ff5b9add4306d31e986;p=exim.git Removed doc references to relay-test.mail-abuse.org As per github ticket #37 - https://github.com/Exim/exim/issues/37 relay-test.mail-abuse.org is no longer available so references to it have been removed from the documentation. --- diff --git a/doc/doc-docbook/spec.xfpt b/doc/doc-docbook/spec.xfpt index 758a0cf39..673cdf250 100644 --- a/doc/doc-docbook/spec.xfpt +++ b/doc/doc-docbook/spec.xfpt @@ -27460,9 +27460,6 @@ a realistic ACL for checking RCPT commands. This is discussed in chapter .section "Testing ACLs" "SECID188" The &%-bh%& command line option provides a way of testing your ACL configuration locally by running a fake SMTP session with which you interact. -The host &'relay-test.mail-abuse.org'& provides a service for checking your -relaying configuration (see section &<>& for more details). - .section "Specifying when ACLs are used" "SECID189" @@ -30913,14 +30910,6 @@ in chapter &<>&. You can check the relay characteristics of your configuration in the same way that you can test any ACL behaviour for an incoming SMTP connection, by using the &%-bh%& option to run a fake SMTP session with which you interact. - -For specifically testing for unwanted relaying, the host -&'relay-test.mail-abuse.org'& provides a useful service. If you telnet to this -host from the host on which Exim is running, using the normal telnet port, you -will see a normal telnet connection message and then quite a long delay. Be -patient. The remote host is making an SMTP connection back to your host, and -trying a number of common probes to test for open relay vulnerability. The -results of the tests will eventually appear on your terminal. .ecindex IIDacl