mirror of
https://github.com/modoboa/modoboa.git
synced 2026-04-25 00:46:03 +03:00
[GH-ISSUE #1496] Private DNSBL listed in DNSBL check: dnsbl.cyberlogic.net #1176
Labels
No labels
bug
bug
dependencies
design
documentation
duplicate
enhancement
enhancement
enhancement
feedback-needed
help-needed
help-needed
installer
invalid
looking-for-sponsors
modoboa-contacts
new-ui
new-ui
pr
pull-request
pyconfr
python
question
security
stale
webmail
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/modoboa-modoboa#1176
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @whyscream on GitHub (May 26, 2018).
Original GitHub issue: https://github.com/modoboa/modoboa/issues/1496
Impacted versions
Steps to reproduce
Look at email box, see that I have received various emails from the Modoboa MX checks about a DNSBL that is broken, badly maintained , irrelevant, and I never knew existed.
Current behavior
The list of DNSBLs defined at
modoboa/admin/constants.pyincludes"dnsbl.cyberlogic.net", which is currently broken (see: https://www.dnsbl.com/2018/05/status-of-dnsblcyberlogicnet-broken.html). I never heard of this DNSBL, and the author of referenced article hasn't either. Based on his findings I'm assuming that this DNSBL was actually private.Expected behavior
settings.py, but this should be available for anyone reading documentation.@oconshaw commented on GitHub (May 27, 2018):
Great find and thanks for posting a fix. I am having the same issue. Can you elaborate a bit more on how to apply the fix you detailed above? Where/how do you add that snippet to your "settings". --Thanks.
@whyscream commented on GitHub (May 28, 2018):
After installing, the Modoboa installation created a few files. One of them is named
settings.py. you can append the lines to that file.@almereyda commented on GitHub (May 29, 2018):
In our instance, provisioned by the
modoboa-installer, the file is living in/srv/modoboa/instance/instance/settings.py.A
service uwsgi restartusually helps picking up those changes.@TacoScheltema commented on GitHub (May 30, 2018):
following up on this; bl.spamcannibal.org recently had it's domain name hijacked and is now serving up advertisements and malicious content. This blacklist should also be removed from modoboa.
@tonioo commented on GitHub (May 30, 2018):
You can indeed modify the DNSBL provider list as mentioned in the original description, or you can just add
DNSBL_PROVIDERSvariable to the config file, without the import statement (in this mode, you can only override the whole list).Anyway, do you think an online panel to control the provider list would be useful? I could propose it through the sponsoring system.
@TacoScheltema commented on GitHub (May 30, 2018):
@tonioo That would have my vote for sure!
@PatTheMav commented on GitHub (Oct 17, 2018):
I'm not too sure, but looks like the same issue with sectoor.de, which according to the same page had been broken since June and is offline anyway: https://www.dnsbl.com/2018/06/status-of-exitnodestordnsblsectoorde.html
@tonioo commented on GitHub (Oct 18, 2018):
@PatTheMav Looks like only exitnodes.tor.dnsbl.sectoor.de is concerned. Modoboa does not use this list by default. Have you encountered issues?
@PatTheMav commented on GitHub (Oct 18, 2018):
@tonioo Well, the "issue" would be that the IP of my brand new mail server was more or less immediately recognized as "listed" by sectoor.de (probably because they list whole IP ranges) and their website is offline, so there is no way to check or dispute.
In general I'd prefer to have a solid list of vendors be the default (mainly the big names that have earned their trust) and an optional list of the more obscure block list providers (that either go offline all of a sudden, get hacked, etc.).
@tonioo commented on GitHub (Oct 18, 2018):
@PatTheMav Good point but I'm really surprised you're the only one to report this issue. The list seems dead since June and I've never encountered any issue on my own server... Anyway, I'll drop the corresponding entries from the default providers.
@whyscream commented on GitHub (Oct 25, 2018):
I did a quick scan through the list of DNSBL_PROVIDERS in the master branch, but out of the first 10 or so entries, 3 lists are already dead (but cause no problems):
bl.deadbeef.combl.emailbasura.orgblackholes.five-ten-sg.comAlso
cbl.abuseat.orgis listed which is deprecated for a long time (since it's contained in Spamhaus Zen).The commit that added the current list of domains is over 2 years old. In my opinion this is bitrot waiting to happen. So could we discuss the proposal again to limit the default list to a short list of known and respected big players?
@tonioo commented on GitHub (Oct 29, 2018):
@whyscream Sure. Do you already have a list in mind?
@whyscream commented on GitHub (Oct 30, 2018):
My stance on DNSBLs is that you should only use those DNSBLs that have a clear listing policy (which is public), and getting removed from that list is also possible when you play by the rules of the DNSBL (meaning that those removal guide lines should also be public), as long as the DNSBL doesn't requires payment to be removed. Parties I trust on these are:
Many other DNSBLs fail to document why a server are listed, or how you can get it removed. This means in general that when your server is on such a list, you're not in a position to fix the problem. It has no use for Modoboa users to be notified of such a listing, because they can't overcome the issue anyway.
@whyscream commented on GitHub (Oct 30, 2018):
BTW it would be nice if proper documentation would eb in place on how to add DNSBLs to your setup that you do care about but is not in the default list. For instance lists that only target a specific country, or spam in a specific language.
@PatTheMav commented on GitHub (Jun 14, 2019):
I noticed the psky.me false positive today as well. At this point I fully agree with @whyscream: By default modoboa should not tap into obscure, anonymous or otherwise sketchy DNSBL services and focus on the well-established providers that have active policies and removal processes.
@ghost commented on GitHub (Oct 30, 2019):
bl.emailbasura.orgstarted triggering false positives@jquiros2 commented on GitHub (Nov 7, 2019):
Just found this thread after realizeing this too. emailbasura.org looks pretty darn basura itself by the way.
@ghost commented on GitHub (Nov 7, 2019):
i found https://poste.io/doc/getting-started (or https://github.com/dirtsimple/poste.io ) to be more actively developed, and less tiresome