Hello,
today it seems like the RBL Pattern is broken, some E-Mails are getting blocked who are not on the Blacklist.
Anyone else
Greetings Felix
This thread was automatically locked due to age.
Hello,
today it seems like the RBL Pattern is broken, some E-Mails are getting blocked who are not on the Blacklist.
Anyone else
Greetings Felix
They will not solve the problem, because they dont have the problem ;-)
I opend a support case, the answer is, that the problem is at the spamhaus side and not at the UTM side. As i asked them, but that is your recommended option and spamhaus will deactived this RBL in future, so what should i do? They said, that is not a technical probelm with UTM, it is a third party problem, i should talk to my account manager. Very nice support by Sophos. A "paid" feature that is not suppported.
Grüße aus dem Sauerland und dem Ruhrgebiet
Marc
Wouldn't it be maybe also a (better) solution to use the "Request Routing" function of the UTM? Under "Network Services" -> "Request Routing" specific routes for zen.spamhaus.org could be added to have their NS servers be queried when the resolution is being tried. I think such an entry would be a beginning (there are waay more NS servers from spamhaus):


It's clear if you read the usage terms (https://www.spamhaus.org/organization/dnsblusage/)
Look at 1.1.3
I think forwarders like Quad9 produce excessive load to Spamhaus so they are rate-limited or even blocked because the original source of a query can't be identified. So Spamhaus can't differentiate if the queries came from 1 or from 100000 diffrent users.
It's possible to get a subscription. With a subscription you get a key to query the Spamhaus servers and they can clearly identify the query source.
Looks to me like Sophos is using the free Spamhaus DNSBLs but the customer pays Sophos for E-Mail security??
Problem is not solved, Sophos has to honor new return Codes from spamhaus, and has to make sure limits are not exceeded and make sure public DNS is not used for cbl.abuseat.org.
fur.global.sophosxl.com should not be affected, cause it is sophos rbl.
A System on this list might be a spammer.
may
Astaro user since 2001 - Astaro/Sophos Partner since 2008