Obtaining good list of DNSBL sites to subscribe to

From Notes_Wiki
Revision as of 14:40, 19 March 2020 by Saurabh (talk | contribs) (Created page with "<yambe:breadcrumb self="Obtaining good list of DNSBL sites to subscribe to">Security tips|Security tips</yambe:breadcrumb> =Obtaining good list of DNSBL sites to subscribe to=...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

<yambe:breadcrumb self="Obtaining good list of DNSBL sites to subscribe to">Security tips|Security tips</yambe:breadcrumb>

Obtaining good list of DNSBL sites to subscribe to

To obtain good list of DNSBL sites to subscribe to use:

  1. (Optional) Find bad IPs for searching in various blacklists using:
    1. Open https://www.spamhaus.org/rokso/ and find out some spam IPs. Go to "Top 10 Rokso spammers" and for any of them click on "current SBL listings". Example IP 198.37.115.163
    2. If you have access to mail server already subscribing to a few blacklists search for 'blocked using' in /var/log/maillog*
      Example lines:
      Mar 6 16:52:16 mail postfix/smtpd[8996]: NOQUEUE: reject: RCPT from unknown[185.143.223.160]: 554 5.7.1 Service unavailable; Client host [185.143.223.160] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL442610 / https://www.spamhaus.org/sbl/query/SBL420772; from=<uej22j3y801ty@quadriennalediroma.org> to=<avoid@sunilsanjay.com> proto=ESMTP helo=<[185.143.223.170]>
      Feb 18 12:45:51 mail postfix/smtpd[16640]: NOQUEUE: reject: RCPT from m2.hs9.in[192.249.121.194]: 554 5.7.1 Service unavailable; Client host [192.249.121.194] blocked using ix.dnsbl.manitu.net; Your e-mail service was detected by mail.ixlab.de (NiX Spam) as spamming at Tue, 18 Feb 2020 06:51:24 +0100. Your admin should visit http://www.dnsbl.manitu.net/lookup.php?value=192.249.121.194; from=<Finance@msagarwal.com> to=<rahul@sunilsanjay.com> proto=ESMTP helo=<m2.hs9.in>
  2. (Optional) Query appropriate blacklist for the IP and see that result is 127.0.0.2
    dig 163.115.37.198.sbl-xbl.spamhaus.org
  3. Go to various blacklists and try to find above IP or your current ISP IP or other relevant IP in them
  4. Copy all the domain names to a text file.
  5. See which domain names are repeated on various sites using:
    cat domains.txt | sed $'s/[ \t]//g' | sort | uniq -c | sort
  6. Example output with sites appearing on both whatismyipaddress.com and dnsbl.info is:
    2 all.s5h.net
    2 b.barracudacentral.org
    2 bl.spamcop.net
    2 bogons.cymru.com
    2 cbl.abuseat.org
    2 dnsbl-1.uceprotect.net
    2 dnsbl-2.uceprotect.net
    2 dnsbl-3.uceprotect.net
    2 dnsbl.dronebl.org
    2 dnsbl.inps.de
    #2 dnsbl.sorbs.net - Blocks gmail
    2 dnsbl.spfbl.net
    2 duinv.aupads.org
    2 dul.dnsbl.sorbs.net
    2 http.dnsbl.sorbs.net
    2 ips.backscatterer.org
    2 korea.services.net
    2 misc.dnsbl.sorbs.net
    2 pbl.spamhaus.org
    2 proxy.bl.gweep.ca
    2 psbl.surriel.com
    2 relays.bl.gweep.ca
    2 relays.nether.net
    #2 sbl.spamhaus.org
    2 smtp.dnsbl.sorbs.net
    2 socks.dnsbl.sorbs.net
    #2 spam.dnsbl.sorbs.net - Blocks gmail
    2 spamsources.fabel.dk
    2 ubl.unsubscore.com
    2 web.dnsbl.sorbs.net
    #2 xbl.spamhaus.org
    2 zen.spamhaus.org
    2 zombie.dnsbl.sorbs.net
  7. Consider following additional lists for subscription
    • combined.rbl.msrbl.net
    • dsn.rfc-ignorant.org
    • ix.dnsbl.manitu.net,
    • sbl-xbl.spamhaus.org
  8. Start by subscribing to these blacklists on email servers
  9. Observe new configuration for next as many hours as possible for false positives using
    tail -f /var/log/maillog | grep 'blocked using'
  10. Send many test emails from gmail, yahoo etc. to the new servers to ensure that famous domains are not blocked


Refer:


<yambe:breadcrumb self="Obtaining good list of DNSBL sites to subscribe to">Security tips|Security tips</yambe:breadcrumb>