https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7757
Bug ID: 7757 Summary: Spamhaus zones and new return codes Product: Spamassassin Version: unspecified Hardware: PC OS: Linux Status: NEW Severity: normal Priority: P2 Component: Rules Assignee: dev@spamassassin.apache.org Reporter: riccardo.alfi...@spamteq.com Target Milestone: Undefined Hello everyone, I'd like to bring to your attention that we are planning to start using new return codes in our zones detailing possible errors or wrong usage. In particular, the important codes to care about are: 127.255.255.254: This means that the query is coming through a public/open resolver, and we do not support that (please use your own recursive resolver). Details: https://www.spamhaus.org/returnc/pub/ 127.255.255.255: Excessive number of queries, meaning that your are either exceeding the number of DNS queries for free usage of our data or using them in violation of our TOS[1]: Details: https://www.spamhaus.org/returnc/vol/ Please note that those return codes should never be interpreted as a "ip/domain is listed" ; they are purely informative. I then propose adding the following rules to SA ruleset: header RCVD_IN_ZEN_OPENDNS eval:check_rbl('zen', 'zen.spamhaus.org.', '^127\.255\.255\.254$') describe RCVD_IN_ZEN_OPENDNS ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ tflags RCVD_IN_ZEN_OPENDNS net score RCVD_IN_ZEN_OPENDNS 0.001 header RCVD_IN_ZEN_BLOCKED eval:check_rbl('zen', 'zen.spamhaus.org.', '^127\.255\.255\.255$') describe RCVD_IN_ZEN_BLOCKED ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/ tflags RCVD_IN_ZEN_BLOCKED net score RCVD_IN_ZEN_BLOCKED 0.001 uridnssub URIBL_ZEN_OPENDNS zen.spamhaus.org. A 127.255.255.254 describe URIBL_ZEN_OPENDNS ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ tflags URIBL_ZEN_OPENDNS net score URIBL_ZEN_OPENDNS 0.001 uridnssub URIBL_ZEN_BLOCKED zen.spamhaus.org. A 127.255.255.255 describe URIBL_ZEN_BLOCKED ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/ tflags URIBL_ZEN_BLOCKED net score URIBL_ZEN_BLOCKED 0.001 urirhssub URIBL_DBL_OPENDNS dbl.spamhaus.org. A 127.255.255.254 describe URIBL_DBL_OPENDNS ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ tflags URIBL_DBL_OPENDNS net score URIBL_DBL_OPENDNS 0.001 urirhssub URIBL_DBL_BLOCKED dbl.spamhaus.org. A 127.255.255.255 describe URIBL_DBL_BLOCKED ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked. See https://www.spamhaus.org/returnc/vol/ tflags URIBL_DBL_BLOCKED net score URIBL_DBL_BLOCKED 0.001 This is just my initial proposal, I'm sure that maybe there is a more elegant way to write those, and if you have suggestions please let's discuss. [1] https://www.spamhaus.org/organization/dnsblusage/ -- Best regards, Riccardo Alfieri Spamhaus Technology https://www.spamhaustech.com/ -- You are receiving this mail because: You are the assignee for the bug.