From a843fbd352e4c03543339d7a1047d3a46e5f7cb0 Mon Sep 17 00:00:00 2001 From: Jan Schulz-Hofen Date: Sun, 4 Feb 2018 14:39:53 +0700 Subject: [PATCH] =?UTF-8?q?Do=20not=20check=20if=20host/ip=20is=20blacklis?= =?UTF-8?q?ted=20if=20we=E2=80=99re=20running=20in=20Vagrant?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit In Vagrant, we’re likely on a development machine which in turn is likely connected via a consumer ISP dynamic IP address which are often listed. --- setup/network-checks.sh | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/setup/network-checks.sh b/setup/network-checks.sh index 428fa4ca..0f02884d 100644 --- a/setup/network-checks.sh +++ b/setup/network-checks.sh @@ -7,6 +7,7 @@ apt_get_quiet install bind9-host sed netcat-openbsd # and will not be able to reliably send mail. Do this after any automatic # choices made above. if host $PRIMARY_HOSTNAME.dbl.spamhaus.org > /dev/null; then +if [ ! -d /vagrant ]; then echo echo "The hostname you chose '$PRIMARY_HOSTNAME' is listed in the" echo "Spamhaus Domain Block List. See http://www.spamhaus.org/dbl/" @@ -17,6 +18,7 @@ if host $PRIMARY_HOSTNAME.dbl.spamhaus.org > /dev/null; then echo exit 1 fi +fi # Stop if the IPv4 address is listed in the ZEN Spamhouse Block List. # The user might have ended up on an IP address that was previously in use @@ -24,6 +26,7 @@ fi # will not be able to reliably send mail in these cases. REVERSED_IPV4=$(echo $PUBLIC_IP | sed "s/\([0-9]*\).\([0-9]*\).\([0-9]*\).\([0-9]*\)/\4.\3.\2.\1/") if host $REVERSED_IPV4.zen.spamhaus.org > /dev/null; then +if [ ! -d /vagrant ]; then echo echo "The IP address $PUBLIC_IP is listed in the Spamhaus Block List." echo "See http://www.spamhaus.org/query/ip/$PUBLIC_IP." @@ -37,6 +40,7 @@ if host $REVERSED_IPV4.zen.spamhaus.org > /dev/null; then echo exit 1 fi +fi # Stop if we cannot make an outbound connection on port 25. Many residential # networks block outbound port 25 to prevent their network from sending spam.