Hi!
 

>>> Despite this - messages sent by this sender are scored by DNSBL anyway.
>>>
>>> X-Assp-DNSBL: failed,
>>> 65.254.253.144 listed in (dnsbl-1.uceprotect.net<-127.0.0.2; )

About 65.254.253.144 as example _aggressive_ ( and non-productive) behavior RBL 
service uceprotect.net see in P.P.S


> sender is already on the white list.

 IMHO, need check settitings a-la "Apply to Whitelisted"
( but when RBLWL is already unset , strange . . . )
In any case see later _worked_ rbl-service.txt

>> On 4/23/2013 11:36 PM, Thomas Eckardt wrote:
>> Unset 'RBLWL' or use any other exception parameter in the 'DNSBL' section.

> I'm sorry I wasn't clear about that.
> RBLWL is already unset,
> but DNSBL scores it anyway.
> The only other option is noRBL,
> but I can't possibly enter all of the IPs that this person can send from.

 
Try this settings:

RBLServiceProvider:=file:files/rbl-service.txt
rbl-service.txt
==
#
bl.spamcop.net=>1
#
#    [
#  See http://www.sorbs.net/using.shtml
#
#
#        dnsbl.sorbs.net - Aggregate zone (contains all the following DNS zones)
#   http.dnsbl.sorbs.net - List of Open HTTP Proxy Servers.
#  socks.dnsbl.sorbs.net - List of Open SOCKS Proxy Servers.
#   misc.dnsbl.sorbs.net - List of open Proxy Servers not listed in
#                          the SOCKS or HTTP lists.
#   smtp.dnsbl.sorbs.net - List of Open SMTP relay servers.
#    web.dnsbl.sorbs.net - List of web (WWW) servers which have spammer
#                          abusable vulnerabilities (e.g. FormMail scripts)
#                          Note: This zone now includes non-webserver
#                          IP addresses that have abusable vulnerabilities.
#   spam.dnsbl.sorbs.net - List of hosts that have been noted as sending
#                          spam/UCE/UBE to the administrators of SORBS.  This
#                          zone also contains net blocks of spam supporting
#                          service providers, including those who provide
#                          web sites, DNS or drop boxes for a spammer.  Spam
#                          supporters are added on a 'third strike and you are
#                          out' basis, where the third spam will cause the
#                          supporter to be added to the list.
#  block.dnsbl.sorbs.net - List of hosts demanding that they never be tested
#                          by SORBS.
# zombie.dnsbl.sorbs.net - List of networks hijacked from their original
#                          owners, some of which have already used for spamming.
#    dul.dnsbl.sorbs.net - Dynamic IP Address ranges (NOT a Dial Up list!)
#
#
#Return codes are:
#
#          http.dnsbl.sorbs.net    127.0.0.2
#         socks.dnsbl.sorbs.net    127.0.0.3
#          misc.dnsbl.sorbs.net    127.0.0.4
#          smtp.dnsbl.sorbs.net    127.0.0.5
#          spam.dnsbl.sorbs.net    127.0.0.6
#           web.dnsbl.sorbs.net    127.0.0.7
#         block.dnsbl.sorbs.net    127.0.0.8
#        zombie.dnsbl.sorbs.net    127.0.0.9
#           dul.dnsbl.sorbs.net    127.0.0.10
#
#  [
# http://www.zytrax.com/books/dns/ch9/dnsbl.html
#
# 127.0.0.2  - Open HTTP Proxy Server (http.dnsbl.sorbs.net)
# 127.0.0.3  - Open SOCKS Proxy Server (socks.dnsbl.sorbs.net)
# 127.0.0.4  - Open Proxy Server not listed in the SOCKS or
#              HTTP lists. (misc.dnsbl.sorbs.net)
# 127.0.0.5  - Open SMTP relay server (smtp.dnsbl.sorbs.net)
# 127.0.0.6  - Hosts sending spam/UCE/UBE to SORBS, netblocks
#              of spam supporting service providers
#              (list.spam.dnsbl.sorbs.net)
# 127.0.0.7  - Web servers email vulnerabilities (e.g. FormMail scripts)
#              (web.dnsbl.sorbs.net)
# 127.0.0.8  - Hosts demanding not to be tested by SORBS (block.dnsbl.sorbs.net)
# 127.0.0.9  - Networks hijacked from original owners (zombie.dnsbl.sorbs.net)
# 127.0.0.10 - Dynamic IP Address ranges (dul.dnsbl.sorbs.net)
#
# ]
#
dnsbl.sorbs.net=>127.0.0.2=>1    ##
dnsbl.sorbs.net=>127.0.0.3=>1    ##
dnsbl.sorbs.net=>127.0.0.4=>1    ##
dnsbl.sorbs.net=>127.0.0.5=>1    ##
dnsbl.sorbs.net=>127.0.0.7=>1    ##
#                                ##
dnsbl.sorbs.net=>127.0.0.6=>2    ##
dnsbl.sorbs.net=>127.0.0.9=>35   ##
dnsbl.sorbs.net=>127.0.0.10=>35  ##
#                                ##
dnsbl.sorbs.net=>127.0.0.8=>3    ##
#
# ]
#     [
#  zen.spamhaus.org   ex. sbl-xbl.spamhaus.org=>1
#
#  See http://www.spamhaus.org/zen/
#
#127.0.0.2     SBL   Direct UBE sources, spam operations & spam services
#127.0.0.3     CSS   Direct snowshoe spam sources detected via automation
#127.0.0.4-8   XBL   CBL + customised NJABL.   3rd party exploits (proxies, 
trojans, etc.)
#127.0.0.10-11 PBL    End-user Non-MTA IP addresses set by ISP outbound mail 
policy
#
#  SBL + XBL
#
zen.spamhaus.org=>127.0.0.2=>1
zen.spamhaus.org=>127.0.0.4=>1
zen.spamhaus.org=>127.0.0.5=>1
zen.spamhaus.org=>127.0.0.6=>1
zen.spamhaus.org=>127.0.0.7=>1
zen.spamhaus.org=>127.0.0.8=>1
#
# PBL + CSS
#
zen.spamhaus.org=>127.0.0.3=>2
zen.spamhaus.org=>127.0.0.10=>35
zen.spamhaus.org=>127.0.0.11=>35
#
# ] [
#
combined.njabl.org=>1
list.dsbl.org=>1
cbl.abuseat.org=>1
#
# ] [
#
# See http://www.five-ten-sg.com/blackhole.php
#
blackholes.five-ten-sg.com=>127.0.0.2=>3
blackholes.five-ten-sg.com=>127.0.0.5=>4
blackholes.five-ten-sg.com=>127.0.?.*=>5
#
# ]
#
==

 This allow
Use aggressive DNSBL in scoring mode


 Example results of settting "zen.spamhaus.org=>127.0.0.10=>35" ( see [scoring] 
):
==
2013-04-24 13:17:13 ZZZZ-ZZZZZZZZ [Worker_2] [DNSBL] 1.162.1ZZZ8.2ZZZZ6 
<y...@yyyy.yyy> to: zzzz...@zzzzzzz.zzz 
[scoring] (DNSBL: neutral, 1.162.1ZZZ8.2ZZZZ6 listed in 
(dnsbl.sorbs.net<-127.0.0.10; ))
===


 Example block spam e-mail by Totalscore ( mainly by  15 (Message-ID) + 35 
(DNSBL: neutral) ) :
===
X-Assp-Message-Score: 15 (Message-ID not valid: 
'A73BDBA12FBA4F1E83C887F64E2D5EE6@vobhmj')
X-Assp-Received-SPF: neutral ip=999.9999.999.153 
mailfrom=09...@zzzzzzzzzzz.co.nz
X-Assp-Message-Score: 5 (SPF neutral)
X-Assp-Message-Score: -5 (Home Country Bonus ZZ (ZZZ ZZZZZZ Telekom Servis))
X-Assp-Message-Score: 35 (DNSBL: neutral, 999.9999.999.153 listed in 
dnsbl.sorbs.net)
X-Assp-DNSBL: neutral, 999.9999.999.153 listed in (dnsbl.sorbs.net<-127.0.0.10; 
)
 . . .
X-Spam-Status:yes
X-Assp-Spam-Reason: MessageScore 50, limit 50
X-Assp-Message-Totalscore: 50
===


 Example exist IP in RBL, but pass e-mail ( really non-spam ) by "low limit":
==
Sender: "JavaOne" <zzzzz...@oraclezzzzzzz.com>
X-Assp-DNSBL: neutral, 9999.999.999.61 listed in (dnsbl.sorbs.net<-127.0.0.6; )
X-Assp-Message-Score: 20 (blacklisted HELO 'ZZZZZZZZZZZZZZZZZ' - weigth 1)
X-Assp-Spam-Reason: MessageScore passed low limit
X-Assp-Message-Totalscore: 45
==


>I have ValidateRBL set for score.

"set for score" itself -- not principial :-)

 Usual if IP found in DNSBL , as result "added 50" to score of e-mail

If no -5 or -10 for other reason then
==
X-Assp-Message-Totalscore: 50
X-Assp-Spam-Reason: MessageScore 50, limit 50
X-Spam-Status:yes
==



Best regards, Victor Miasnikov
Blog:  http://vvm.blog.tut.by/

P.S.

 IMHO, uceprotect.net as RBL is _optional_

But You can use it a-la "zen.spamhaus.org=>127.0.0.11=>35" Or 
"blackholes.five-ten-sg.com=>127.0.0.5=>4"


P.P.S.

In my collection of *.bmaillog.txt ( since 2012-05-16 ) 65.254.253.144 -- not 
found

Substing "65.254.253." found _only_ in
2012-07-04.bmaillog.txt
2012-08-08.bmaillog.txt


In 2012-07-04.bmaillog.txt :

2012-07-02 99:99:99 . . . [Collect] 65.254.253.147 
<ZZZZ=TTTTTTTTTTTTTTT.com=hh...@yourhostingaccount.com> to: 
z...@zzz.zzz [spam found] (Collect Address: z...@zzz.zzz
2012-07-02 06:21:28 . . . [MessageLimit] 65.254.253.235 
<ZZZZZ=ZZ=TTTTTTTTTTT=x...@yourhostingaccount.com> to: 
y...@zzz.zzz [spam found] (MessageScore 97, limit 50)


In 2012-08-08.bmaillog.txt :

2012-08-08 14:49:58 . . . [MessageLimit] 65.254.253.42 
<SRS0=ZZZZ=ZZZ=XXXXXXXX=o...@yourhostingaccount.com> to: 
n...@zzz.zzz [spam found] (MessageScore 163, limit 50)


( About yourhostingaccount.com :

dig -x  65.254.253.144
==
;; ANSWER SECTION:
144.253.254.65.in-addr.arpa. 43196 IN PTR mailout18.yourhostingaccount.com.
==
)

 Total:
Look like, what 65.254.253.144 is example _agressive_ behavior RBL service 
uceprotect.net


------------------------------------------------------------------------------
Try New Relic Now & We'll Send You this Cool Shirt
New Relic is the only SaaS-based application performance monitoring service 
that delivers powerful full stack analytics. Optimize and monitor your
browser, app, & servers with just a few lines of code. Try New Relic
and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_apr
_______________________________________________
Assp-user mailing list
Assp-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-user

Reply via email to