[Note that this change was actually made about a year ago, around
November 1, 2005. I hope the delayed notification doesn't cause
any major issues.]
Previously, each SURBL zone file, including the bitmask-combined
list multi.surbl.org, had testpoints with A records resolving to
127.0.0.2. That was a design decision, and it was also convenient
to the way the zone files were generated before.
But Justin Mason or one of the other SpamAssassin developers
argued that multi should have testpoints corresponding to all
ones set for each bitmask position. So testpoints for
multi.surbl.org now have all the bits set for an A record value
of 127.0.0.126 instead of 127.0.0.2 .
(If a new list is added in future using the 128th bit, then the
new testpoint values in multi will be 127.0.0.254)
This may work better with applications that decode the bits
into individual list results, but it is a change from before and
it may break other applications' use of the testpoints.
The multi.surbl.org BIND zone file contains:
test.surbl.org 604800 IN A 127.0.0.126
604800 IN TXT "multi.surbl.org permanent test point"
test.multi.surbl.org 604800 IN A 127.0.0.126
604800 IN TXT "multi.surbl.org permanent test point"
surbl-org-permanent-test-point.com 604800 IN A 127.0.0.126
604800 IN TXT "multi.surbl.org permanent test point"
2.0.0.127 604800 IN A 127.0.0.126
604800 IN TXT "multi.surbl.org permanent test point"
The multi.surbl.org rbldnsd zone file contains:
test.surbl.org :126:multi.surbl.org permanent test point
test.multi.surbl.org :126:multi.surbl.org permanent test point
surbl-org-permanent-test-point.com :126:multi.surbl.org permanent test point
2.0.0.127 :126:multi.surbl.org permanent test point
Cheers,
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
I'm pleased to announce that we are now including PhishTank
data:
http://www.phishtank.com/
in our phishing list:
http://www.surbl.org/lists.html#ph
Be sure to report your phishes to PhishTank through their web
site. This helps get the phishing sites get blacklisted.
Thanks to PhishTank for creating their system and making the data
available to the Internet community!
Cheers,
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Erik Mugele writes:
I have released version 1.9 of my embedded Perl script for Exim. The
major change in this release is the mandatory use of a whitelist.
The script will fail if the location of the whitelist (and the ccTLD.txt
file) is not set correctly in the script. The distributed whitelist
contains the domains (as of 12 Oct 06) that will not by blacklisted.
Use of the whitelist file will prevent unnecessary queries.
Some additional efficiency tweaks were also made to the script.
See http://www.teuton.org/~ejm/exim_surbl to download the script, for
details on changes, as well as usage and installation instructions.
Erik
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Mark Jeftovic reports that they "are now checking destination
URLs against [SURBLs] and refusing to shorten them via
easyurl.net."
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Jörg Zieren mentions that "Camel's Eye, a GPL'd client-side Java
POP3/SMTP proxy, has support for SURBL. More info is available
on http://zieren.de/ce "
Cheers,
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Christian Stigen Larsen reports that his surblhost program:
http://surblhost.sourceforge.net/
is being used by the redirection site:
http://memurl.com/
to check sites submitted for redirection and to deny services to
spammers.
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Christian Stigen Larsen reports:
"I've made a simple C commandline program to query multi.surbl.org
I'd be very happy to receive comments. The program is available
from http://surblhost.sourceforge.net (source only)."
Thanks Christian!
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
Jamie Thom of Practical Useful reports that:
"We've created a page on the wiki for QmailToaster.com describing how to
setup SpamAssassin with SURBL on Qmail setup using the Qmail Toaster
system. It's at http://wiki.qmailtoaster.com/index.php/SURBL "
Thanks Jamie!
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/
I'm pleased to announce that we are now including CastleCops'
PIRT phishing data:
http://www.castlecops.com/pirt
in our phishing list, ph.surbl.org:
http://www.surbl.org/lists.html#ph
Be sure to report your phishes to PIRT via their web site or
email address:
{pirt (AT) castlecops (DOT) com}
Not only do the the phishing sites get blacklisted, but they also
get reported to the hosts, senders, phished banks, etc.
Cheers,
Jeff C.
--
Jeff Chan
mailto:jeffc@surbl.org
http://www.surbl.org/