https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7757

            Bug ID: 7757
           Summary: Spamhaus zones and new return codes
           Product: Spamassassin
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Rules
          Assignee: dev@spamassassin.apache.org
          Reporter: riccardo.alfi...@spamteq.com
  Target Milestone: Undefined

Hello everyone,

I'd like to bring to your attention that we are planning to start using new
return codes in our zones detailing possible errors or wrong usage.

In particular, the important codes to care about are:

127.255.255.254: This means that the query is coming through a public/open
resolver, and we do not support that (please use your own recursive resolver).
Details: https://www.spamhaus.org/returnc/pub/

127.255.255.255: Excessive number of queries, meaning that your are either
exceeding the number of DNS queries for free usage of our data or using them in
violation of our TOS[1]: Details: https://www.spamhaus.org/returnc/vol/

Please note that those return codes should never be interpreted as a "ip/domain
is listed" ; they are purely informative.

I then propose adding the following rules to SA ruleset:

header    RCVD_IN_ZEN_OPENDNS    eval:check_rbl('zen', 'zen.spamhaus.org.',
'^127\.255\.255\.254$')
describe  RCVD_IN_ZEN_OPENDNS    ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked due to usage of an open resolver. See
https://www.spamhaus.org/returnc/pub/
tflags    RCVD_IN_ZEN_OPENDNS    net
score     RCVD_IN_ZEN_OPENDNS    0.001

header    RCVD_IN_ZEN_BLOCKED    eval:check_rbl('zen', 'zen.spamhaus.org.',
'^127\.255\.255\.255$')
describe  RCVD_IN_ZEN_BLOCKED    ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/
tflags    RCVD_IN_ZEN_BLOCKED    net
score     RCVD_IN_ZEN_BLOCKED    0.001

uridnssub URIBL_ZEN_OPENDNS      zen.spamhaus.org.       A   127.255.255.254
describe  URIBL_ZEN_OPENDNS      ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked due to usage of an open resolver. See
https://www.spamhaus.org/returnc/pub/
tflags    URIBL_ZEN_OPENDNS      net
score     URIBL_ZEN_OPENDNS      0.001

uridnssub URIBL_ZEN_BLOCKED      zen.spamhaus.org.       A   127.255.255.255
describe  URIBL_ZEN_BLOCKED      ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/
tflags    URIBL_ZEN_BLOCKED      net
score     URIBL_ZEN_BLOCKED      0.001

urirhssub URIBL_DBL_OPENDNS      dbl.spamhaus.org.       A   127.255.255.254
describe  URIBL_DBL_OPENDNS      ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked due to usage of an open resolver. See
https://www.spamhaus.org/returnc/pub/
tflags    URIBL_DBL_OPENDNS      net
score     URIBL_DBL_OPENDNS      0.001

urirhssub URIBL_DBL_BLOCKED      dbl.spamhaus.org.       A   127.255.255.255
describe  URIBL_DBL_BLOCKED      ADMINISTRATOR NOTICE: The query to
zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/
tflags    URIBL_DBL_BLOCKED      net
score     URIBL_DBL_BLOCKED      0.001

This is just my initial proposal, I'm sure that maybe there is a more elegant
way to write those, and if you have suggestions please let's discuss.

[1] https://www.spamhaus.org/organization/dnsblusage/

-- 
Best regards,
Riccardo Alfieri

Spamhaus Technology
https://www.spamhaustech.com/

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to