Spamhaus engineers have been busy developing new data for the Spamhaus Domain Block List (DBL) during the past several months. Our efforts have produced several specialized subsets of the DBL data set which will provide Spamhaus DBL users with better protection against spam as well as against other cyber threats (bots and malware) which are targeting ordinary internet users every day. This new data makes DBL more effective and versatile yet maintains DBL's goal for near zero false positives and widespread usability in production environments.
The first addition covers domains used in relation to malware, similar to malware IP addresses which we already list in Spamhaus Botnet Controller List (BCL) but with the focus on domain names. These domains are involved in spreading malware ("droppers") or controlling botnets ("command and control" a/k/a C&C, C2). Users contacting these domains may either get infected or may already be infected with malicious software. By deploying this subset of the DBL it is possible to prevent users from becoming infected or to find users that are already infected (for example, through the use of a DNS Response Policy Zone (RPZ)).
The second new data set covers legitimate domains hosting websites that have been compromised or otherwise abused by spammers. By compromising existing websites, often through outdated versions of popular Content Management System (CMS) packages such as Joomla or Wordpress, spammers try to use the good reputation of legitimate domains and IP addresses to improve the delivery of their spam and prolong the lifespan of the spam's payload and landing sites. Once a web server or CMS is compromised, spammers place a file on that website to redirect visitor's browsers to the spammer's website. The URL to those redirection files is then sent out in spam.
Administrators can take advantage of this new DBL data by carefully using the return codes for each distinct data set. We will be adding the new return codes to all Spamhaus DNSBL mirrors beginning on July 1st, 2014. The new return codes for DBL listings are highlighted in yellow in this table:
|spammed redirector / url shortener
|(Phased out on January 7th, 2015)
|Botnet C&C domain
|abused legit spam
|abused legit redirector / url shortener
|abused legit phish
|abused legit malware
|abused legit botnet C&C
|IP queries prohibited!
A complete reference of the DBL return codes can be found in the Spamhaus DBL FAQ.
If you are using Spamhaus DBL data for spam filtering or any other purpose, please ensure that your application or software uses the new return codes correctly. Many applications will not care about the newer codes and will simply accept and act on any return code. Some applications may be sensitive to specific return codes and you should check that and configure your application appropriately for your usage of those new DBL data set return codes.
In particular, administrators using DBL return code data should note the replacement of 127.0.1.3 for spammed redirector / url shortener domains with 127.0.1.103. We are making this change so that people who prefer to treat the new "abused legit" listings differently than dedicated spam, malware and bot domains will have a single return code range to differentiate the codes easily. For instance, Postfix works with ranges; see "reject_rbl_client". While it is possible to specify a list of individual return codes, such a configuration is longer, more prone to errors and more prone to require correction if new codes are released in the future. The 127.0.1.3 return code will still be available as a legacy until January 7th, 2015. Now would be a good time to update ones checking routines.
IMPORTANT: We will begin pushing the new DBL return codes (yellow in the table above) to our DNSBL mirrors and datafeeds on July 1st, 2014.
Help and recommended contentSee below for helpful articles and recommended content
Spamhaus Blocklist (SBL) listings are moving
Any abuse desk worker or Trust and Safety team member who has received a Spamhaus Blocklist (SBL) email notification, can view the full details of the listing on www.spamhaus.org. However, change is coming soon. Please read on, otherwise, you may think you've been phished, when the URL in one of these notifications is different and directs you to a different place!
QNAME Minimization and Spamhaus DNSBLs
On October 4th the Internet Systems Consortium (ISC) issued an article highlighting a problem with Spamhaus’ RBLDNS servers incorrectly answering partial queries that are sent due to QNAME minimization. Our technical team has deployed an initial patch for this issue, and we are in open dialogue with the ISC as...
The return of the ASN-DROP
Further to requests from the community we've reinvigorated the ASN-DROP. With a new algorithm, ASN-DROP is now available in JSON format, listing Autonomous System Numbers (ASNs) associated with the worst of the worst behavior. These are ASNs that our researchers wouldn’t recommend engaging with and are highly likely to announce...