We'd like to welcome the addition of a new SURBL public name
server h5.surbl.org hosted by:
Hubris Communications Inc
The SURBL community thanks all the hosts and administrators of
the public name servers for their ongoing help and support!
We'd like to welcome the addition of a new public SURBL name server
d5.surbl.org hosted by:
Jazz Telecom
The SURBL community thanks all the hosts and administrators of the
SURBL public name servers for their continued help and support!
Jeff C.
Some ISPs including Verizon and Charter have apparently started
modifying DNS NXDOMAIN responses in such a way that may cause false
positives on SURBLs and other lists for systems using their
nameservers. They may be doing this in order to drive search traffic
for web sites that appear to not exist as indicated by an NXDOMAIN
response to a DNS query. However SURBLs and other lists use a
response of NXDOMAIN to indicate that a queried object is not on the
list. If the last octet of the modified response happens to
correspond to the bitmasked positions of blacklists (which seems
likely given that 6 of 8 possible bits are currently used), then false
positives may result.
Verizon and Charter have opt-out nameservers, but Charter's opt-out
nameservers reportedly do not correctly return a NXDOMAIN result. One
solution is to not use their nameservers. These issues won't affect
systems running their own nameservers, or using other nameservers.
These issues may affect other ISPs if they are also modifying NXDOMAIN
responses.
The situation is somewhat like OpenDNS before they changed their
behavior to not modify NXDOMAIN responses to list queries.
http://www.surbl.org/faq.html#opendns
Jeff C.
We'd like to welcome the addition of a new public SURBL name server
g5.surbl.org administered by:
Interactive Digital Publishing Group
http://www.idpg.com/
We thank the hosts and administrators of our public nameservers for
their support!
Jeff C.
We'd like to welcome and thank the addition of a new public
SURBL name server k5.surbl.org administered by:
NetEase.com, Inc.
Without our public nameservers and the help of their
administrators, SURBLs would not be possible.
Our thanks to all of them!
Jeff C.
As of December 5, 2007, we've added a moderately filtered version of
malware, spyware and phishing data from malwaredomains.com to
ph.surbl.org. Here's David Glosser's description of the data:
"*The DNS blackhole* list is an actively maintained list of domains
associated with malware and malicious software. For more information
and mirrors, please visit www.malwaredomains.com"
It appears that many of the data come from the Intrusion Detection
System community such as Snort Bleeding Threats, malware research,
etc., in addition to more recently having added phishing data. This
is a slight divergence for SURBL since traditionally we have not
focussed on malware sites, but there does seem to be some overlap
(about 20%) between this new data set and our existing data. In other
words, we had about one-fifth of them already blacklisted. Presumably
some of the malware sites appear in spams in an attempt to compromise
systems of those who visit malware loader sites, or install the hosted
malware, etc.
Cheers,
Jeff C.
We'd like to welcome and thank the addition of a new public
SURBL name server n4.surbl.org administered by:
1&1 Internet AG
Without our public nameservers and the help of their
administrators, SURBLs would not be possible.
Our thanks to all of them!
Jeff C.
SURBL would like to thank Prolexic for providing their DDOS mitigation
services to protect our web site. There have been ongoing attacks
against our web site that are now essentially invisible to us thanks
to their efforts. Prolexic has a press release from June 2007 about
it:
http://www.prolexic.com/news/20070627-surbl.php
We'd like to welcome and thank the addition of a new SURBL public name
server e1.surbl.org administered by:
spamchek.com
Without our public name servers and the help of their administrators,
SURBLs would not be possible.
Our thanks to all of them!
P.S. We could still use a few more public nameservers. More information is at:
http://www.surbl.org/public-dns.html