photo lineviral_1.png

How To Add Together Rbl On Zimbra Server?

A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an endeavour to halt e-mail spamming. It is a “blacklist” of locations on the Internet reputed to shipping e-mail spam. The locations consist of IP addresses which are most often used to lay out the addresses of computers or networks linked to spamming; most post service server software tin hold upward configured to spend upward or flag messages which accept been sent from a site listed on i or to a greater extent than such lists. The term “Blackhole List” is sometimes interchanged alongside the term “blacklist” together with “blocklist”.  of locations on the Internet reputed to shipping e-mail spam How to add together RBL on Zimbra Server?


A DNSBL is a software mechanism, rather than a specific listing or policy. There are dozens of DNSBLs inward existence, which role a broad array of criteria for listing together with delisting of addresses. These may include listing the addresses of zombie computers or other machines existence used to shipping spam, ISPs who willingly host spammers, or those which accept sent spam to a honeypot system.


Since the creation of the outset DNSBL inward 1997, the performance together with policies of these lists accept been oft controversial, both inward Internet advocacy together with occasionally inward lawsuits. Many e-mail systems operators together with users[4] consider DNSBLs a valuable tool to percentage data most sources of spam, simply others including roughly prominent Internet activists accept objected to them equally a shape of censorship. In addition, a small-scale issue of DNSBL operators accept been the target of lawsuits filed yesteryear spammers seeking to accept the lists nigh down.[Wiki]

What is Zimbra?


In illustration y'all haven’t used or heard of Zimbra,


Zimbra is an enterprise-class email, calendar together with collaboration solution built for the cloud, both world together with private. With a redesigned browser-based interface, Zimbra offers the most innovative messaging experience available today, connecting halt users to the data together with activeness inward their personal clouds.


It provides:



  1. Messaging together with Collaboration

  2. Advanced, Integrated Web Experience

  3. Simplified Administration

  4. Anywhere, Any Device


Zimbra’s Open Source Community


Since the inception, Zimbra has been a community. All of Zimbra Collaboration Open Source Edition software, documentation together with conception has been created, tested, used, together with discussed openly yesteryear people similar y'all participating inward our Open Source Community. It’s contributors diagnose bugs, cook bugs, interpret programs, submit patches, betoken out deficiencies inward documentation, respond community questions, submit killer applications, warning Zimbra to something that needs tweaking, together with write novel software. No thing how y'all contribute, Zimbra welcomes novel ideas together with contributions for the advancement of greater shared cognition together with a meliorate Zimbra Collaboration product.


See to a greater extent than here:


Add RBL cheque on Zimbra


Login to e-mail server together with su youreself to zimbra user.


# su - zimbra

Check electrical current settings


$ zmprov gacf | grep zimbraMtaRestriction

Output:


zimbraMtaRestriction: reject_non_fqdn_sender
zimbraMtaRestriction: reject_non_fqdn_sender

Currently reject_non_fqdn_sender together with reject_non_fqdn_sender is set.


Add a examination RBL server


Adding cbl.abuseat.org


$ zmprov mcf \
zimbraMtaRestriction reject_invalid_helo_hostname \
zimbraMtaRestriction reject_non_fqdn_sender \
zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org"

I used \ to intermission the lines. You tin produce it all inward i work if y'all experience like.


$ zmprov mcf zimbraMtaRestriction reject_invalid_helo_hostname zimbraMtaRestriction reject_non_fqdn_sender zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org"

Test Output:


$ zmprov gacf | grep zimbraMtaRestriction
zimbraMtaRestriction: reject_non_fqdn_sender
zimbraMtaRestriction: reject_invalid_helo_hostname
zimbraMtaRestriction: reject_rbl_client cbl.abuseat.org

Adding multiple RBL servers inward Zimbra


Going sum on retard alongside RBL check


$ zmprov mcf \
zimbraMtaRestriction reject_invalid_helo_hostname \
zimbraMtaRestriction reject_non_fqdn_sender \
zimbraMtaRestriction reject_invalid_hostname \
zimbraMtaRestriction "reject_rbl_client sbl.spamhaus.org" \
zimbraMtaRestriction "reject_rbl_client bl.spamcop.net" \
zimbraMtaRestriction "reject_rbl_client dnsbl.sorbs.net" \
zimbraMtaRestriction "reject_rbl_client cbl.abuseat.org" \
zimbraMtaRestriction "reject_rbl_client dnsbl.njabl.org"

New Output:


$ zmprov gacf | grep zimbraMtaRestriction
zimbraMtaRestriction: reject_invalid_helo_hostname
zimbraMtaRestriction: reject_non_fqdn_sender
zimbraMtaRestriction: reject_invalid_hostname
zimbraMtaRestriction: reject_rbl_client sbl.spamhaus.org
zimbraMtaRestriction: reject_rbl_client bl.spamcop.net
zimbraMtaRestriction: reject_rbl_client dnsbl.sorbs.net
zimbraMtaRestriction: reject_rbl_client cbl.abuseat.org
zimbraMtaRestriction: reject_rbl_client dnsbl.njabl.org

List of RBL servers:


Don’t larn sum retard alongside RBL inward Zimbra; quite often roughly RBL servers blacklist expert domains for absolutely no reasons (unexplained); thus test; test; examination until y'all accept the best combination. Here’s a listing of all the RBLs/DNSBls y'all tin cheque your post service servers against(mostly free):



  1. b.barracudacentral.org

  2. bl.emailbasura.org

  3. bl.spamcannibal.org

  4. bl.spamcop.net

  5. blackholes.five-ten-sg.com

  6. blacklist.woody.ch

  7. bogons.cymru.com

  8. cbl.abuseat.org

  9. cdl.anti-spam.org.cn

  10. combined.abuse.ch

  11. combined.rbl.msrbl.net

  12. db.wpbl.info

  13. dnsbl-1.uceprotect.net

  14. dnsbl-3.uceprotect.net

  15. dnsbl.ahbl.org

  16. dnsbl.inps.de

  17. dnsbl.sorbs.net

  18. drone.abuse.ch

  19. drone.abuse.ch

  20. duinv.aupads.org

  21. dul.dnsbl.sorbs.net

  22. dul.ru

  23. dyna.spamrats.com

  24. dynip.rothen.com

  25. http.dnsbl.sorbs.net

  26. images.rbl.msrbl.net

  27. ips.backscatterer.org

  28. ix.dnsbl.manitu.net

  29. korea.services.net

  30. misc.dnsbl.sorbs.net

  31. noptr.spamrats.com

  32. ohps.dnsbl.net.au

  33. omrs.dnsbl.net.au

  34. orvedb.aupads.org

  35. osps.dnsbl.net.au

  36. osrs.dnsbl.net.au

  37. owfs.dnsbl.net.au

  38. owps.dnsbl.net.au

  39. pbl.spamhaus.org

  40. phishing.rbl.msrbl.net

  41. probes.dnsbl.net.au

  42. proxy.bl.gweep.ca

  43. proxy.block.transip.nl

  44. psbl.surriel.com

  45. rbl.interserver.net

  46. rbl.megarbl.net

  47. rdts.dnsbl.net.au

  48. relays.bl.gweep.ca

  49. relays.bl.kundenserver.de

  50. relays.nether.net

  51. residential.block.transip.nl

  52. ricn.dnsbl.net.au

  53. rmst.dnsbl.net.au

  54. sbl.spamhaus.org

  55. short.rbl.jp

  56. smtp.dnsbl.sorbs.net

  57. socks.dnsbl.sorbs.net

  58. spam.abuse.ch

  59. spam.dnsbl.sorbs.net

  60. spam.rbl.msrbl.net

  61. spam.spamrats.com

  62. spamlist.or.kr

  63. spamrbl.imp.ch

  64. t3direct.dnsbl.net.au

  65. tor.ahbl.org

  66. tor.dnsbl.sectoor.de

  67. torserver.tor.dnsbl.sectoor.de

  68. ubl.lashback.com

  69. ubl.unsubscore.com

  70. virbl.bit.nl

  71. virus.rbl.jp

  72. virus.rbl.msrbl.net

  73. web.dnsbl.sorbs.net

  74. wormrbl.imp.ch

  75. xbl.spamhaus.org

  76. zen.spamhaus.org

  77. zombie.dnsbl.sorbs.net


Reference



Buat lebih berguna, kongsi:
close