|Main Archive Page > Month Archives > postfix-users archives|
I noticed that problem when using safe.dnsbl.sorbs.net. I removed it and added the following to solve the problem;
http.dnsbl.sorbs.net - List of Open HTTP Proxy Servers.
socks.dnsbl.sorbs.net - List of Open SOCKS Proxy Servers.
misc.dnsbl.sorbs.net - List of open Proxy Servers not listed in
the SOCKS or HTTP lists.
smtp.dnsbl.sorbs.net - List of Open SMTP relay servers.
web.dnsbl.sorbs.net - List of web (WWW) servers which have spammer
abusable vulnerabilities (e.g. FormMail scripts)
Note: This zone now includes non-webserver
IP addresses that have abusable vulnerabilities.
spam.dnsbl.sorbs.net - List of hosts that have been noted as sending
spam/UCE/UBE to the administrators of SORBS. This
zone also contains net blocks of spam supporting
service providers, including those who provide
web sites, DNS or drop boxes for a spammer. Spam
supporters are added on a 'third strike and you are
out' basis, where the third spam will cause the
supporter to be added to the list.
block.dnsbl.sorbs.net - List of hosts demanding that they never be tested
zombie.dnsbl.sorbs.net - List of networks hijacked from their original
owners, some of which have already used for spamming.
I did not use; dul.dnsbl.sorbs.net - Dynamic IP Address ranges (NOT a Dial Up list!)
----- Original Message -----
From: "Rod Dorman" <firstname.lastname@example.org>
Sent: Thursday, October 7, 2010 9:01:41 AM GMT -08:00 US/Canada Pacific
Subject: sorbs.net issues
Apparently sorbs.net is having issues with accidentally adding loads of
static IP addresses to their dynamic IP's list.
If you use them you might want to stick a "warn_if_reject" in front of
the reference until the matter is resolved.
-- email@example.com "The avalanche has already started, it is too Rod Dorman late for the pebbles to vote." - Ambassador Kosh