A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam. The locations consist of IP addresses which are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists. The term “Blackhole List” is sometimes interchanged with the term “blacklist” and “blocklist”.
A DNSBL is a software mechanism, rather than a specific list or policy. There are dozens of DNSBLs in existence, which use a wide array of criteria for listing and delisting of addresses. These may include listing the addresses of zombie computers or other machines being used to send spam, ISPs who willingly host spammers, or those which have sent spam to a honeypot system.
Since the creation of the first DNSBL in 1997, the operation and policies of these lists have been frequently controversial, both in Internet advocacy and occasionally in lawsuits. Many email systems operators and users[4] consider DNSBLs a valuable tool to share information about sources of spam, but others including some prominent Internet activists have objected to them as a form of censorship. In addition, a small number of DNSBL operators have been the target of lawsuits filed by spammers seeking to have the lists shut down.[Wiki]
What is Zimbra?
In case you haven’t used or heard of Zimbra,
Zimbra is an enterprise-class email, calendar and collaboration solution built for the cloud, both public and private. With a redesigned browser-based interface, Zimbra offers the most innovative messaging experience available today, connecting end users to the information and activity in their personal clouds.
It provides:
- Messaging and Collaboration
- Advanced, Integrated Web Experience
- Simplified Administration
- Anywhere, Any Device
Zimbra’s Open Source Community
Since the inception, Zimbra has been a community. All of Zimbra Collaboration Open Source Edition software, documentation and innovation has been created, tested, used, and discussed openly by people like you participating in our Open Source Community. It’s contributors diagnose bugs, fix bugs, translate programs, submit patches, point out deficiencies in documentation, answer community questions, submit killer applications, alert Zimbra to something that needs tweaking, and write new software. No matter how you contribute, Zimbra welcomes new ideas and contributions for the advancement of greater shared knowledge and a better Zimbra Collaboration product.
See more here:
Add RBL check on Zimbra
Login to email server and su youreself to zimbra user.
# su - zimbra
Check current settings
$ zmprov gacf | grep zimbraMtaRestriction
Output:
zimbraMtaRestriction: reject_non_fqdn_sender zimbraMtaRestriction: reject_non_fqdn_sender
Currently reject_non_fqdn_sender
and reject_non_fqdn_sender
is set.
Add a test RBL server
Adding cbl.abuseat.org
$ zmprov mcf \ zimbraMtaRestriction reject_invalid_helo_hostname \ zimbraMtaRestriction reject_non_fqdn_sender \ zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org"
I used \ to break the lines. You can do it all in one line if you feel like.
$ zmprov mcf zimbraMtaRestriction reject_invalid_helo_hostname zimbraMtaRestriction reject_non_fqdn_sender zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org"
Test Output:
$ zmprov gacf | grep zimbraMtaRestriction zimbraMtaRestriction: reject_non_fqdn_sender zimbraMtaRestriction: reject_invalid_helo_hostname zimbraMtaRestriction: reject_rbl_client cbl.abuseat.org
Adding multiple RBL servers in Zimbra
Going full on retard with RBL check
$ zmprov mcf \ zimbraMtaRestriction reject_invalid_helo_hostname \ zimbraMtaRestriction reject_non_fqdn_sender \ zimbraMtaRestriction reject_invalid_hostname \ zimbraMtaRestriction "reject_rbl_client sbl.spamhaus.org" \ zimbraMtaRestriction "reject_rbl_client bl.spamcop.net" \ zimbraMtaRestriction "reject_rbl_client dnsbl.sorbs.net" \ zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org" \ zimbraMtaRestriction "reject_rbl_client dnsbl.njabl.org"
New Output:
$ zmprov gacf | grep zimbraMtaRestriction zimbraMtaRestriction: reject_invalid_helo_hostname zimbraMtaRestriction: reject_non_fqdn_sender zimbraMtaRestriction: reject_invalid_hostname zimbraMtaRestriction: reject_rbl_client sbl.spamhaus.org zimbraMtaRestriction: reject_rbl_client bl.spamcop.net zimbraMtaRestriction: reject_rbl_client dnsbl.sorbs.net zimbraMtaRestriction: reject_rbl_client cbl.abuseat.org zimbraMtaRestriction: reject_rbl_client dnsbl.njabl.org
List of RBL servers:
Don’t go full retard with RBL in Zimbra; quite often some RBL servers blacklist good domains for absolutely no reasons (unexplained); so test; test; test until you have the best combination. Here’s a list of all the RBLs/DNSBls you can check your mail servers against(mostly free):
- b.barracudacentral.org
- bl.emailbasura.org
- bl.spamcannibal.org
- bl.spamcop.net
- blackholes.five-ten-sg.com
- blacklist.woody.ch
- bogons.cymru.com
- cbl.abuseat.org
- cdl.anti-spam.org.cn
- combined.abuse.ch
- combined.rbl.msrbl.net
- db.wpbl.info
- dnsbl-1.uceprotect.net
- dnsbl-3.uceprotect.net
- dnsbl.ahbl.org
- dnsbl.inps.de
- dnsbl.sorbs.net
- drone.abuse.ch
- drone.abuse.ch
- duinv.aupads.org
- dul.dnsbl.sorbs.net
- dul.ru
- dyna.spamrats.com
- dynip.rothen.com
- http.dnsbl.sorbs.net
- images.rbl.msrbl.net
- ips.backscatterer.org
- ix.dnsbl.manitu.net
- korea.services.net
- misc.dnsbl.sorbs.net
- noptr.spamrats.com
- ohps.dnsbl.net.au
- omrs.dnsbl.net.au
- orvedb.aupads.org
- osps.dnsbl.net.au
- osrs.dnsbl.net.au
- owfs.dnsbl.net.au
- owps.dnsbl.net.au
- pbl.spamhaus.org
- phishing.rbl.msrbl.net
- probes.dnsbl.net.au
- proxy.bl.gweep.ca
- proxy.block.transip.nl
- psbl.surriel.com
- rbl.interserver.net
- rbl.megarbl.net
- rdts.dnsbl.net.au
- relays.bl.gweep.ca
- relays.bl.kundenserver.de
- relays.nether.net
- residential.block.transip.nl
- ricn.dnsbl.net.au
- rmst.dnsbl.net.au
- sbl.spamhaus.org
- short.rbl.jp
- smtp.dnsbl.sorbs.net
- socks.dnsbl.sorbs.net
- spam.abuse.ch
- spam.dnsbl.sorbs.net
- spam.rbl.msrbl.net
- spam.spamrats.com
- spamlist.or.kr
- spamrbl.imp.ch
- t3direct.dnsbl.net.au
- tor.ahbl.org
- tor.dnsbl.sectoor.de
- torserver.tor.dnsbl.sectoor.de
- ubl.lashback.com
- ubl.unsubscore.com
- virbl.bit.nl
- virus.rbl.jp
- virus.rbl.msrbl.net
- web.dnsbl.sorbs.net
- wormrbl.imp.ch
- xbl.spamhaus.org
- zen.spamhaus.org
- zombie.dnsbl.sorbs.net
Hello,
We maintain a DNSBL free: dnsbl.spfbl.net