Page 1 of 1

[REQUEST] add a dnsbl check

Posted: Wed Aug 01, 2018 6:53 am
by CrazyCat
Hi,

Is it possible to create a module which will add an equivalent of the check command existing in bopm/hopm ?

Thanks by advance for your answer (even if it's "NO" :D)

Regards

Re: [REQUEST] add a dnsbl check

Posted: Wed Aug 01, 2018 11:08 am
by Gottem
Have you even tried to search the wiki?

Re: [REQUEST] add a dnsbl check

Posted: Wed Aug 01, 2018 11:43 am
by CrazyCat
Yes I have, but I didn't find any command allowing to test an ip like hopm have (BlitzServ is the nick of my hopm) :
CrazyCat BlitzServ check 127.0.0.1
BlitzServ CHECK -> Checking '127.0.0.1' for open proxies on all scanners
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone dnsbl.sorbs.net
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone tor.dnsbl.sectoor.de
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone dnsbl.swiftbl.net
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone dnsbl.dronebl.org
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone rbl.efnetrbl.org
BlitzServ CHECK -> DNSBL -> 127.0.0.1 does not appear in BL zone rbl.dnsbl.im
BlitzServ CHECK -> All tests on 127.0.0.1 completed.
I'd like to have a similar one accessing directly unreal (/quote dnsbl 127.0.0.1)

Re: [REQUEST] add a dnsbl check

Posted: Wed Aug 01, 2018 7:27 pm
by Gottem
My bad, for some reason I thought you asked for a way to "check dnsbl like hopm". :>

This request is probably better off on the bug tracker. The blacklist module written by Syzop already contains a little note:

Code: Select all

#ifdef DEBUGMODE
        else {
                abort(); /* hmmm. unless we add some /Blacklist CHECK command. then this needs to be removed */
        }
#endif
It would involve too much hackery to write a separate module for it. =] If you can't create an account on the bug tracker I can post the request on your behalf.

Re: [REQUEST] add a dnsbl check

Posted: Thu Aug 02, 2018 6:51 am
by CrazyCat
Thanks for your answer.
The request is now submitted on the bug tracker :)