This is the command formmailtest that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator
PROGRAM:
NAME
formmailtest - attempt to use formmail to relay to a DSBL-complaint host
SYNOPSIS
formmailtest <url> [<spoof recipient>]
DESCRIPTION
formmailtest attempts to connect to the specified host and uses several different to
attempt to relay through the FormMail script located at <url>. It can do more tests if
the normal recipient for that FormMail script is provided as <spoof recipient>, but it can
quite often relay without.
Tests are done with both GET and POST to attempt to bypass any
firewall/httpd.conf/.htaccess pseudo-security.
In the tests described below, DOMAIN is the section of <spoof recipient> after the @ sign,
USER is the section before, and DASHDOMAIN is DOMAIN after all periods have been replaced
by dashes.
Tests:
recipient=[email protected]
recipient=dsbl.org!listme
realname=&email=\nCc: [email protected]&recipient=()
realname=)\nCc: [email protected] (&recipient=()
recipient=listme%dsbl.org@DOMAIN
recipient=dsbl.org!listme@DOMAIN
recipient=[email protected](DOMAIN
recipient=<[email protected]>DOMAIN
realname=&email=0c: [email protected]&recipient=DOMAIN
realname=)0c: [email protected] (&email=&recipient=DOMAIN
recipient=[email protected](USER@DASHDOMAIN
recipient=<[email protected]>USER@DASHDOMAIN
Use formmailtest online using onworks.net services