Use a real RBL

I, for one, am tired of blacklists being run by people with a god complex. They’re obviously useful and desirable, and they’re not going away. Most recently I discovered the depths of the worst of the worst: A company that sells spam filtering software, seems to have a preference for listing small companies that don’t purchase their software in their in-house blacklist, and refuses to remove them. A good old fashioned shakedown. But enough about MagicSpam and MIPSPACE (the RBL they say they don’t control and yet run in-house).

One thing MXroute has become is a collection of the rest of us, making us all a force to be reckoned with. While others want to try to gatekeep the email protocol and covertly attack their competitors by making it hard to get emails delivered everywhere without purchasing from one of the big names, we’ve all been rising up as a bunch of web designers, hosting providers, and sysadmins and using the brand as our sledgehammer to the market.

It only makes sense that we should continue to work on taking power away from some of these gatekeepers by being better than they are at what they do. I submit that we have better data anyway.

So I’d like to introduce you to the MXroute public RBL: https://mxrbl.com

We’ll be eating our own dogfood and using MXRBL as the exclusive RBL of MXroute, giving our customers the first place in line to influence it. If you’d like to use it on your servers, just add “bl.mxrbl.com” to your RBL list :slight_smile:

27 Likes

good service

2 Likes

Next you will be making a 1984 Apple commercial.

Thanks for making it available, we’ll explore it. Do you have a process for proposing additions/removals?

2 Likes

For now just an email link for removal request, and just me adding them from MXroute data. I’d like to put up a queue system that people can submit to and I can review for addition/removal. Nothing too difficult, just next steps :slight_smile:

1 Like

Ah, MagicSpam. Told them to talk a long walk off a short pier when approached last year. Glad to see my gut didn’t belie me :slight_smile:

Consider adding a drop-in ruleset for rspamd. SpamHaus has a DQS service that provides similarly scoped features. Also, since you run a network of trusted MTA relays, wouldn’t hurt to filter problematic SMTP connections or leveraging something like Postscreen and feeding those bots to the list, adding a new classification such as known spammer, known brute-force, or known irregular client to let users apply arbitrary weights to these classifications.

It’s a good start with a unique network that can set it apart from other RBLs. I’ll tie it back into ApisCP once it stabilizes.

3 Likes

Just added it to my mail gateway, let’s see! :smiley:

2 Likes

Great initiative, although if I might add a few suggestions:

  • the 127.0.0.1 should not be used, as it’s the return code that should never be returned as a way of checking whether or not the RBL is functioning properly
  • the 127.0.0.2 is the default ‘blacklisted’ return code, and should always be returned if the IP is blacklisted
  • if you wish to have degrees of ‘blacklisting’ (ie: minor offender, strong offender, career spammer) then I’d suggest having different RBLs for each of these as opposed to having them all in one RBL with different return codes. You could have for instance: grey.mxrbl.com, red.mxrbl.com, and red.mxrbl.com. This would be ideal as not all anti-spam or RBL filtering systems allow the users to select return codes as the “degree of filter”, so this way it’d be easier for users to select what they’d like to block.

Just a few ideas on how to improve it early on.

Cheers.

16 Likes

Interesting, thanks! I was basing my idea off of this: The Spamhaus Project - Frequently Asked Questions (FAQ)

Will look into it more.

2 Likes

Oh really nice, do you have any place where I can raw download this list to also block ip’s using other services than RBL?

2 Likes

Not yet but willing to consider it

1 Like

+1 this would be cool. Just a json dump or something.

3 Likes

4 Likes

I’m becoming convinced that most of the others were made for evil purposes. Mine might be interpreted as evil but only so far as to try to reduce their impact.

To kill a king and take his sword may look like the same action taken by the last king, but if the intent is to take the sword and destroy it, returning control to the people, that’s a cause I can get behind :wink:

5 Likes

Gray, brown and red?

1 Like

Or black, not sure why I typed red twice.

Good idea indeed.

1 Like

What possible return values are there? I see 127.0.0.3 for the example IP shown on the page, but are there any others?

1 Like

It’s all just 127.0.0.2 for now.

1 Like

Your example one on the site (177.140.130.170.bl.mxrbl.com) returns 127.0.0.3 though :smiley:

1 Like

Probably a leftover, shouldn’t be many of those left though. I had more elaborate plans and may pick up on them later.

1 Like

First, sorry about my poor english. I working on it.

I just have a spam problem from a subnet and your RBL works when other no…

I use RSpamd. If I understand well, this can be a valid configuration?

/etc/rspamd/local.d/rbl.conf

rbls {
    brbl {
        symbol = JARLAND_RBL;
        rbl = "bl.mxrbl.com";
        received = true;
        returncodes {
             JARLAND_RBL_BAN = "127.0.0.2";
             JARLAND_RBL_WTF = "127.0.0.3";
       }
    }
}

/etc/rspamd/local.d/groups.conf (add)

symbols = {
  "JARLAND_RBL_BAN" {
    weight = 2.0; # For example
    description = "Resolver blocked due to mx_route rbl";
   }
}

Thanks for your work!

2 Likes