A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam.[1] Most mail server software can be configured to check such lists, typically rejecting or flagging messages from such sites.
A DNSBL is a software mechanism, rather than a specific list or policy. Dozens of DNSBLs exist.[2] They use a wide array of criteria for listing and delisting addresses. These may include listing the addresses of zombie computers or other machines being used to send spam, Internet service providers (ISPs) who willingly host spammers, or those which have sent spam to a honeypot system.
Since the creation of the first DNSBL in 1998, the operation and policies of these lists have frequently been controversial,[3][4] both in Internet advocacy circles and occasionally in lawsuits. Many email systems operators and users[5] consider DNSBLs a valuable tool to share information about sources of spam, but others including some prominent Internet activists have objected to them as a form of censorship.[6][7][8][9] In addition, a small number of DNSBL operators have been the target of lawsuits filed by spammers seeking to have the lists shut down.[10]
The first DNSBL was the Real-time Blackhole List (RBL), created in 1997, at first as a Border Gateway Protocol (BGP) feed by Paul Vixie, and then as a DNSBL by Eric Ziegast as part of Vixie's Mail Abuse Prevention System (MAPS); Dave Rand at Abovenet was its first subscriber.[11] The very first version of the RBL was not published as a DNSBL, but rather a list of networks transmitted via BGP to routers owned by subscribers so that network operators could drop all TCP/IP traffic for machines used to send spam or host spam supporting services, such as a website. The inventor of the technique later commonly called a DNSBL was Eric Ziegast while employed at Vixie Enterprises.
The term "blackhole" refers to a networking black hole, an expression for a link on a network that drops incoming traffic instead of forwarding it normally. The intent of the RBL was that sites using it would refuse traffic from sites which supported spam — whether by actively sending spam, or in other ways. Before an address would be listed on the RBL, volunteers and MAPS staff would attempt repeatedly to contact the persons responsible for it and get its problems corrected. Such effort was considered very important before black-holing all network traffic, but it also meant that spammers and spam supporting ISPs could delay being put on the RBL for long periods while such discussions went on.
Later, the RBL was also released in a DNSBL form and Paul Vixie encouraged the authors of sendmail and other mail software to implement RBL support in their clients. These allowed the mail software to query the RBL and reject mail from listed sites on a per-mail-server basis instead of black-holing all traffic.
Soon after the advent of the RBL, others started developing their own lists with different policies. One of the first was Alan Brown's Open Relay Behavior-modification System (ORBS). This used automated testing to discover and list mail servers running as open mail relays—exploitable by spammers to carry their spam. ORBS was controversial at the time because many people felt running an open relay was acceptable, and that scanning the Internet for open mail servers could be abusive.
In 2003, a number of DNSBLs came under denial-of-service attacks (DOS). Since no party has admitted to these attacks nor been discovered responsible, their purpose is a matter of speculation. However, many observers believe the attacks are perpetrated by spammers in order to interfere with the DNSBLs' operation or hound them into shutting down. In August 2003, the firm Osirusoft, an operator of several DNSBLs including one based on the SPEWS data set, shut down its lists after suffering weeks of near-continuous attack.
Technical specifications for DNSBLs came relatively late in RFC5782.[12]
A Uniform Resource Identifier (URI) DNSBL is a DNSBL that lists the domain names and sometimes also IP addresses which are found in the "clickable" links contained in the body of spams, but generally not found inside legitimate messages.
URI DNSBLs were created when it was determined that much spam made it past spam filters during that short time frame between the first use of a spam-sending IP address and the point where that sending IP address was first listed on major sending-IP-based DNSBLs.
In many cases, such elusive spam contains in their links domain names or IP addresses (collectively referred to as a URIs) where that URI was already spotted in previously caught spam and where that URI is not found in non-spam e-mail.
Therefore, when a spam filter extracts all URIs from a message and checks them against a URI DNSBL, then the spam can be blocked even if the sending IP for that spam has not yet been listed on any sending IP DNSBL.
Of the three major URI DNSBLs, the oldest and most popular is SURBL.[13] After SURBL was created, some of the volunteers for SURBL started the second major URI DNSBL, URIBL.[14] In 2008, another long-time SURBL volunteer started another URI DNSBL, ivmURI.[15] The Spamhaus Project provides the Spamhaus Domain Block List (DBL) which they describe as domains "found in spam messages".[16] The DBL is intended as both a URIBL and RHSBL, to be checked against both domains in a message's envelope and headers and domains in URLs in message bodies. Unlike other URIBLs, the DBL only lists domain names, not IP addresses, since Spamhaus provides other lists of IP addresses.
URI DNSBLs are often confused with RHSBLs (Right Hand Side BLs). But they are different. A URI DNSBL lists domain names and IPs found in the body of the message. An RHSBL lists the domain names used in the "from" or "reply-to" e-mail address. RHSBLs are of debatable effectiveness since many spams either use forged "from" addresses or use "from" addresses containing popular freemail domain names, such as @gmail.com, @yahoo.com, or @hotmail.com URI DNSBLs are more widely used than RHSBLs, are very effective, and are used by the majority of spam filters.
To operate a DNSBL requires three things: a domain to host it under, a nameserver for that domain, and a list of addresses to publish.
It is possible to serve a DNSBL using any general-purpose DNS server software. However this is typically inefficient for zones containing large numbers of addresses, particularly DNSBLs which list entire Classless Inter-Domain Routing netblocks. For the large resource consumption when using software designed as the role of a Domain Name Server, there are role-specific software applications designed specifically for servers with a role of a DNS blacklist.
The hard part of operating a DNSBL is populating it with addresses. DNSBLs intended for public use usually have specific, published policies as to what a listing means, and must be operated accordingly to attain or sustain public confidence.
When a mail server receives a connection from a client, and wishes to check that client against a DNSBL (let's say, dnsbl.example.net), it does more or less the following:
Looking up an address in a DNSBL is thus similar to looking it up in reverse-DNS. The differences are that a DNSBL lookup uses the "A" rather than "PTR" record type, and uses a forward domain (such as dnsbl.example.net above) rather than the special reverse domain in-addr.arpa.
There is an informal protocol for the addresses returned by DNSBL queries which match. Most DNSBLs return an address in the 127.0.0.0/8 IP loopback network. The address 127.0.0.2 indicates a generic listing. Other addresses in this block may indicate something specific about the listing—that it indicates an open relay, proxy, spammer-owned host, etc. For details see RFC 5782.
A URI DNSBL query (and an RHSBL query) is fairly straightforward. The domain name to query is prepended to the DNS list host as follows:
example.net.dnslist.example.com
where dnslist.example.com is the DNS list host and example.net is the queried domain. Generally if an A record is returned the name is listed.
Different DNSBLs have different policies. DNSBL policies differ from one another on three fronts:
In addition to the different types of listed entities (IP addresses for traditional DNSBLs, host and domain names for RHSBLs, URIs for URIBLs) there is a wide range of semantic variations between lists as to what a listing means. List maintainers themselves have been divided on the issues of whether their listings should be seen as statements of objective fact or subjective opinion and on how their lists should best be used. As a result, there is no definitive taxonomy for DNSBLs. Some names defined here (e.g. "Yellow" and "NoBL"[17]) are varieties that are not in widespread use and so the names themselves are not in widespread use, but should be recognized by many spam control specialists.
Some end-users and organizations have concerns regarding the concept of DNSBLs or the specifics of how they are created and used. Some of the criticisms include:
Despite the criticisms, few people object to the principle that mail-receiving sites should be able to reject undesired mail systematically. One person who does is John Gilmore, who deliberately operates an open mail relay. Gilmore accuses DNSBL operators of violating antitrust law.
For Joe Blow to refuse emails is legal (though it's bad policy, akin to "shooting the messenger"). But if Joe and ten million friends all gang up to make a blacklist, they are exercising illegal monopoly power.[24]
A number of parties, such as the Electronic Frontier Foundation and Peacefire, have raised concerns about some use of DNSBLs by ISPs. One joint statement issued by a group including EFF and Peacefire addressed "stealth blocking", in which ISPs use DNSBLs or other spam-blocking techniques without informing their clients.[25]
Spammers have pursued lawsuits against DNSBL operators on similar grounds:
{{cite journal}}
|journal=
Ріка Пістинька з прибережною смугою(гідрологічний заказник) 48°27′42″ пн. ш. 25°01′32″ сх. д. / 48.46194400002777769° пн. ш. 25.02569400002778011° сх. д. / 48.46194400002777769; 25.02569400002778011Координати: 48°27′42″ пн. ш. 25°01′32″ сх. д. / 48.46194400002777769° пн. ш. 25.025694…
Microjet 200 adalah jet pelatih Prancis dirancang dan dibangun oleh Microturbo, produsen mesin turbojet. Dirancang oleh Microturbo, sebagai kendaraan untuk mesin turbin gas kecil, sebagai jet pelatih ringan dua-kursi. Prototipe pertama kali terbang pada tanggal 24 Juni 1980. Dua pesawat 200B pra-produksi yang ditunjuk dibangun konstruksi campuran dan pertama terbang pada tanggal 19 Mei 1983. Proyek ini gagal dan tidak ada pesawat produksi dibangun. Referensi Artikel bertopik pesawat terbang dan …
Алькоркон Повна назва Agrupación Deportiva Alcorcón Засновано 1971 Населений пункт Алькоркон, Іспанія Стадіон «Санто Домінго» Вміщує 6 000 Головний тренер Хуліо Веласкес Ліга Сегунда Дивізіон 2018–19 13-e Домашня Виїзна У Вікіпедії є статті про інші значення цього терміна: Алькоркон (знач…
Riesenmammutbaum Riesenmammutbaum (Sequoiadendron giganteum): der „General Grant Tree“ im Kings Canyon National Park Systematik Klasse: Coniferopsida Ordnung: Koniferen (Coniferales) Familie: Zypressengewächse (Cupressaceae) Unterfamilie: Mammutbäume (Sequoioideae) Gattung: Sequoiadendron Art: Riesenmammutbaum Wissenschaftlicher Name der Gattung Sequoiadendron J.Buchholz Wissenschaftlicher Name der Art Sequoiadendron giganteum (Lindl.) J.Buchholz Der Riesenmammutbaum (Sequoiadend…
Вільсе-сюр-МадVillecey-sur-Mad Країна Франція Регіон Гранд-Ест Департамент Мерт і Мозель Округ Туль Кантон Шамбле-Бюсьєр Код INSEE 54570 Поштові індекси 54890 Координати 49°00′27″ пн. ш. 5°57′35″ сх. д.H G O Висота 188 - 361 м.н.р.м. Площа 7,41 км² Населення 340 (01-2020[1]) Густот
Station of the Busan Metro Not to be confused with Gyeongbokgung station, Government Complex Daejeon station, Government Complex Gwacheon station, Administration Complex station, or Sports Complex station (Seoul). This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Sports Complex station Busan Metro – news · newspapers · books · scho…
软件开发中的主幹(trunk),是指在版本控制系統中一個沒有命名的分支。主幹多半是專案開發過程中軟體的基礎,若開發者只在主幹上進行開發,主幹上會有專案最新版本的軟體版本,不過不一定是最穩定的軟體版本。另一種開發方式是由主幹上的某版本衍生出分支,在確認分支穩定,可以正常工作之後,再將分支合併到主幹。依開發模式以及交付政策的不同,主幹中可能會…
Species of bird Red-shouldered hawk A red-shouldered hawk near Blue Cypress Lake, Florida Conservation status Least Concern (IUCN 3.1)[1] Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Chordata Class: Aves Order: Accipitriformes Family: Accipitridae Genus: Buteo Species: B. lineatus Binomial name Buteo lineatus(Gmelin, 1788) Range of B. lineatus Breeding range Year-round range Wintering range The red-shouldered hawk (Bute…
Via ferrata nel Gruppo del Brenta Lista (incompleta) di vie ferrate presenti in Italia. Indice 1 Vie ferrate nelle Dolomiti 1.1 Dolomiti occidentali 1.2 Dolomiti orientali 1.3 Dolomiti di Brenta 2 Vie ferrate nelle Alpi 2.1 Alpi occidentali (Piemonte) 2.2 Alpi occidentali (Valle d'Aosta) 2.3 Alpi Orobie e Prealpi Bergamasche 2.4 Gruppo dell'Adamello / Ortles 2.5 Prealpi Bresciane 2.6 Alpi Carniche e Alpi Giulie 3 Altre vie ferrate in Italia 3.1 Alpi Apuane 3.2 Appennino 3.3 Monti del Garda, Prea…
Kawasan dimana tembikar Lapita ditemukan Rekonstruksi wajah seorang wanita Lapita. Museum Etnologi Nasional, Osaka Kebudayaan Lapita adalah kebudayaan prasejarah yang berkembang di Kepulauan Pasifik dari sekitar tahun 1600 SM sampai sekitar 500 SM. Para arkeolog meyakini bahwa Lapita adalah leluhur orang-orang di Polinesia, Mikronesia, dan beberapa kawasan pesisir Melanesia. Karakteristik budaya Lapia adalah keberadaan permukiman manusia di kepulauan yang sebelumnya tak berpenghuni yang meliputi…
Policy on permits required to enter Japan This article is part of a series onPolitics of Japan Constitution and Laws Constitution of Japan (1947-present) Meiji Constitution (1890-1947) Laws The Monarchy The Emperor (List) Naruhito Crown Prince Fumihito Imperial House Chrysanthemum Throne Imperial Succession Imperial Household Agency Executive Government Prime Minister (List) Fumio Kishida (LDP) Cabinet (List) Second Kishida Cabinet (Second Reshuffle)(LDP-Komeito coalition) Ministries Administrat…
Psettodes Tahap larva dari Psettodes erumei Psettodes erumei Klasifikasi ilmiah Domain: Eukaryota Kerajaan: Animalia Filum: Chordata Kelas: Actinopterygii Ordo: Pleuronectiformes Famili: PsettodidaeBonaparte, 1846 Genus: PsettodesE. T. Bennett, 1831 Spesies tipe Psettodes belcheriBennett, 1831 Spesies[1] Psettodes belcheri E. T. Bennett, 1831 Psettodes bennetti Steindachner, 1870 Psettodes erumei (Bloch & J. G. Schneider, 1801) Psettodidae atau Turbot berduri adalah famili ikan pipih…
Wappen der kurpfälzischen Freiherrn von Hacke am Trippstadter Schloss Gemeindewappen Trippstadt; im unteren Bereich das Wappen der Familie von Hacke (2 blau-gelb-rote Regenbögen) Gedenkstein am Riesenberger Weg (Ritterstein Nr. 122) Ludwig Anton Paul von Hacke, auch Haacke bzw. Hacke auf Schweinspoint (* 17. Dezember 1682 in Marxheim, Bayerisch-Schwaben, Schloss Schweinspoint; † 6. Dezember 1752 in Mannheim) war ein Freiherr, kurpfälzer Oberstforst- und Oberstjägermeister, sowie Inhaber de…
Die Kathedrale Saint-Étienne Die Kathedrale in Metz, von der Place st. Etienne aus gesehen Innenansicht der Kathedrale Vierung und Chor Metz: Grundriss Blick in die Krypta Die große Fensterrose Die Kathedrale Saint-Étienne (deutsch: Stephansdom) im lothringischen Metz wurde in den Jahren 1220 bis 1520 errichtet und gilt als eines der schönsten und größten gotischen Kirchengebäude in Frankreich. Mit mehr als 41 Meter Gewölbehöhe hat sie nach den Domkirchen von Amiens und Beauvais de…
Specimen of a Red Seal Endorsement (Red Seal number goes where the word canoe is) Red Seal Program, specifically known as The Interprovincial Standards Red Seal Program is a program that sets common standards for tradespeople in Canada. It is a partnership between the Canadian federal government, the provinces and the territories. The Red Seal program is under the jurisdiction of the Canadian Council of Directors of Apprenticeship (CCDA) It was created in 1959 as a result of the first National C…
Ilya PonomarevPonomarev di Pertemuan Bisnis Rusia Global Horasis tahun 2012Anggota Duma NegaraMasa jabatan24 Desember 2011 – 10 Juni 2016 Informasi pribadiLahir06 Agustus 1975 (umur 48)Moskwa, SFSR Rusia, Uni Soviet (sekarang Moskwa, Rusia)KebangsaanRusiaPartai politikLeft Front, Partai Komunis Rusia, A Just RussiaPekerjaanPengusaha, politikusSunting kotak info • L • B Ilya Vladimirovich Ponomarev (bahasa Rusia: Илья́ Влади́мирович Понома…
American actor This biography of a living person needs additional citations for verification. Please help by adding reliable sources. Contentious material about living persons that is unsourced or poorly sourced must be removed immediately from the article and its talk page, especially if potentially libelous.Find sources: Jack DeSena – news · newspapers · books · scholar · JSTOR (January 2021) (Learn how and when to remove this template message) Jack DeS…
Protein-coding gene in the species Homo sapiens MSI2 redirects here. For MSi2, see Binary compounds of silicon. MSI2IdentifiersAliasesMSI2, MSI2H, musashi RNA binding protein 2, Musashi2, Musashi-2External IDsOMIM: 607897 MGI: 1923876 HomoloGene: 62199 GeneCards: MSI2 Gene location (Human)Chr.Chromosome 17 (human)[1]Band17q22Start57,255,851 bp[1]End57,684,689 bp[1]Gene location (Mouse)Chr.Chromosome 11 (mouse)[2]Band11|11 CStart88,230,208 bp[2]End88,6…
Adopt Me!Informasi produksiPengembangUplift GamesPenerbitRoblox CorporationPengarahBethinkPemrogramNewFissy Data permainanMesinRoblox StudioPlatform Windows MacOS Xbox One Android iOS Genre MMOG Hewan peliharaan digital ModeMultipemain PerilisanTanggal rilis14 Juli 2017Portal permainan videoL • B • PWBantuan penggunaan templat ini Adopt Me! adalah permainan online multipemain masif yang dikembangkan oleh Uplift Games di platform pengembangan game dan game Roblox.[1] Fokus a…
Wakil Bupati KerinciPetahanaIr. H. Ami Tahersejak 4 Maret 2019Masa jabatan5 tahunDibentuk2004Pejabat pertamaH. Hasani HamidSitus webkerincikab.go.id/public/ Berikut ini adalah daftar Wakil Bupati Kerinci dari masa ke masa. No Wakil Bupati Mulai Jabatan Akhir Jabatan Prd. Ket. Bupati 1 H.Hasani Hamid 2004 2009 1 Letkol Czi (Purn.) H.Fauzi Siin 2 H.Muhammad Rahman 2009 2014 2 H.MurasmanS.Pd., M.M. 3 H.Zainal AbidinS.H., M.H. 4 Maret 2014 15 Februari 2018 3 [Ket. 1] Dr. D…
Lokasi Pengunjung: 3.144.41.48