DNSBL stands for Domain Name System Block List. Most DNSBL systems list IP addresses, often those that have been observed by the list operator to be sending spam, hosting spammers, or by policy not allowed to deliver email directly to servers using that particular DNSBL. These lists are used by applications to decrease the delivery of spam email. Some DNSBLs have other listing criteria, for example geographic lists of IPs by country, or other categories, too, and they may be used for a variety of purposes.
DNSBLs which list domain names are called URIBLs.
It is important to note that a DNSBL cannot stop anyone from sending mail, it only prevents delivery at the receiving end, by the receiver's instruction. DNSBLs are strictly defensive tools, they cannot do any offensive damage such as denial of service attacks.
In most cases, zen.spamhaus.org replaces sbl-xbl.spamhaus.org. If you are currently using sbl-xbl.spamhaus.org you should now replace 'sbl-xbl.spamhaus.org' with 'zen.spamhaus.org'.
zen.spamhaus.org should now be the only spamhaus.org DNSBL in your configuration. You should not use ZEN together with other Spamhaus blocklists, or with blocklists already included in our zones (such as the CBL) or you will simply be wasting DNS queries and slowing your mail queue.
Caution: Because ZEN includes the XBL and PBL lists, do not use ZEN on smarthosts or SMTP AUTH outbound servers for your own customers (or you risk blocking your own customers). Do not use ZEN in filters that do any ‘deep parsing’ of Received headers, or for other than checking IP addresses that hand off to your mailservers.
zen.spamhaus.org's Block Lists
SBL (Spamhaus Block List)
The Spamhaus Block List (SBL) is a realtime database of IP addresses of verified spam sources and spam operations (including spammers, spam gangs and spam support services), maintained by the Spamhaus Project team and supplied as a free service to help email administrators better manage incoming email streams.
XBL (Exploits Block List)
The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies (HTTP, socks, AnalogX, wingate, etc), worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
PBL (Policy Block List)
The Spamhaus PBL is a DNSBL database of end-user IP address ranges which should not be delivering unauthenticated SMTP email to any Internet mail server except those provided for specifically by an ISP for that customer's use. The PBL helps networks enforce their Acceptable Use Policy for dynamic and non-MTA customer IP ranges.
PBL IP address ranges are added and maintained by each network participating in the PBL project, working in conjunction with the Spamhaus PBL team, to help apply their outbound email policies.
Additional IP address ranges are added and maintained by the Spamhaus PBL Team, particularly for networks which are not participating themselves (either because the ISP/block owner does not know about, is proving difficult to contact, or because of language difficulties), and where spam received from those ranges, rDNS and server patterns are consistent with end-user IP space which typically contain high concentrations of "botnet zombies", a major source of spam. Once aware of them, the ISP/block owner can take over such records at any time to manage them further.
The PBL lists both dynamic and static IPs, any IP which by policy (whether the block owner's or -interim in its absence- Spamhaus' policy) should not be sending email directly to the MX servers of third parties.
Using zen.spamhaus.org with Postfix
In /etc/postfix/main.cf add reject_rbl_client zen.spamhaus.org to the smtpd_recipient_restrictions section. This entry should be near the bottom of the list since DNSBL's use more resources then most other tests.
smtpd_recipient_restrictions = ... reject_rbl_client zen.spamhaus.org
To troubleshoot an address, you need to query the spamhaus DNS servers. So if you were trying troubleshooting the domain mattrude.com, first you need to find the name of the domain's mail server.
# host mattrude.com mattrude.com mail is handled by 10 mail.mattrude.com.
So since we now know what the mail server's name is we need to find it's IP address.
# host mail.mattrude.com mail.mattrude.com has address 126.96.36.199
Now lets query spamhaus. Spamhaus uses the inverse IP address as a subdomain of the DNSBL zone. So for IP address 188.8.131.52 you would query spamhaus by running.
# host 184.108.40.206.zen.spamhaus.org 220.127.116.11.zen.spamhaus.org has address 127.0.0.10
As you can see by the table below, this address is being blocked by the PBL list.
|127.0.0.3||---||reserved for future use|
|127.0.0.4||XBL||CBL Detected Address|
|127.0.0.5||XBL||NJABL Proxies (customized)|
|127.0.0.6||XBL||reserved for future use|
|127.0.0.7||XBL||reserved for future use|
|127.0.0.8||XBL||reserved for future use|
|127.0.0.9||---||reserved for future use|
|dnsbl.sorbs.net||Aggregate zone (contains all the following DNS zones except spam.dnsbl.sorbs.net)|
|http.dnsbl.sorbs.net||List of Open HTTP Proxy Servers.|
|socks.dnsbl.sorbs.net||List of Open SOCKS Proxy Servers.|
|misc.dnsbl.sorbs.net||List of open Proxy Servers not listed in the SOCKS or HTTP lists.|
|smtp.dnsbl.sorbs.net||List of Open SMTP relay servers.|
|web.dnsbl.sorbs.net||List of web (WWW) servers which have spammer abusable vulnerabilities (e.g. FormMail scripts) Note: This zone now includes non-webserver IP addresses that have abusable vulnerabilities.|
|new.spam.dnsbl.sorbs.net||List of hosts that have been noted as sending spam/UCE/UBE to the admins of SORBS within the last 48 hours.|
|recent.spam.dnsbl.sorbs.net||List of hosts that have been noted as sending spam/UCE/UBE to the admins of SORBS within the last 28 days (includes new.spam.dnsbl.sorbs.net).|
|old.spam.dnsbl.sorbs.net||List of hosts that have been noted as sending spam/UCE/UBE to the admins of SORBS within the last year. (includes recent.spam.dnsbl.sorbs.net).|
|spam.dnsbl.sorbs.net||List of hosts that have been noted as sending spam/UCE/UBE to the admins of SORBS at any time, and not subsequently resolving the matter and/or requesting a delisting. (Includes both old.spam.dnsbl.sorbs.net and escalations.dnsbl.sorbs.net).|
|escalations.dnsbl.sorbs.net||This zone contains netblocks of spam supporting service providers, including those who provide websites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.|
|block.dnsbl.sorbs.net||List of hosts demanding that they never be tested by SORBS.|
|zombie.dnsbl.sorbs.net||List of networks hijacked from their original owners, some of which have already used for spamming.|
|dul.dnsbl.sorbs.net||Dynamic IP Address ranges (NOT a Dial Up list!)|
|rhsbl.sorbs.net||Aggregate zone (contains all RHS zones)|
|badconf.rhsbl.sorbs.net||List of domain names where the A or MX records point to bad address space.|
|nomail.rhsbl.sorbs.net||List of domain names where the owners have indicated no email should ever originate from these domains.|