This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos UTM RBL Check broken today?

Hello,

today it seems like the RBL Pattern is broken, some E-Mails are getting blocked who are not on the Blacklist.

Anyone else

Greetings Felix



This thread was automatically locked due to age.
Parents Reply Children
  • I don't know the technical details, why SPAMHAUS don't like Public DNS Resolver. I believe, that the public Resolver don't deliver the same Information and they are not able to control the use.

    However, topic 1.1.3 from the terms of use say:

    The network originating the DNS Query must be identifiable. This means you must query the Spamhaus DNSBL Public Mirrors from a recursive resolver run on your own network or from a public resolver which supports ECS.

    Source: https://www.spamhaus.org/organization/dnsblusage/

    So i set the default DNS resolver to something like Google oder Quad9 and made an additional requesting route only for "cbl.abuseat.org" to the DNS resolver from the "Deutsche Telekom". That's already my Internet provider.

    So I believe, if your provider is someone like for example "1 & 1", you have to take their DNS resolvver.

    My solutions works for me without any problems.

  • Hi,

    this might work some time I think. The major Problem is, large customer must register with spamhaus. (https://www.spamhaus.com/faqs/) The Barracuda entry.

    This seems not to be done by UTM automatically. Using Spamhaus RBL might end in false positives.

    UTM seems not to check against the return codes:

    Return Code Zone Description
    127.255.255.252 Any Typing error in DNSBL name
    127.255.255.254 Any Query via public/open resolver
    127.255.255.255 Any Excessive number of queries

    may

    Astaro user since 2001 - Astaro/Sophos Partner since 2008

  • It's clear if you read the usage terms (https://www.spamhaus.org/organization/dnsblusage/)
    Look at 1.1.3

    • The network originating the DNS Query must be identifiable. This means you must query the Spamhaus DNSBL Public Mirrors from a recursive resolver run on your own network or from a public resolver which supports ECS.

    I think forwarders like Quad9 produce excessive load to Spamhaus so they are rate-limited or even blocked because the original source of a query can't be identified. So Spamhaus can't differentiate if the queries came from 1 or from 100000 diffrent users.

    It's possible to get a subscription. With a subscription you get a key to query the Spamhaus servers and they can clearly identify the query source.

    Looks to me like Sophos is using the free Spamhaus DNSBLs but the customer pays Sophos for E-Mail security??