sohaib
Verified User
DNS based blocklists
Edit your exim.conf file and add the following to
Look for LINE # 505 in exim.conf and do the changes below.
# Deny stuff from insecure hosts & spammers. No exceptions for known users.
# but do bypass all checking for whitelisted host names
deny message = to unblock $sender_host_name see http://www.EXAMPLE.COM/
# only for domains that do want to be tested against RBLs
domains = +use_rbl_domains
# only smtp.dnsbl.sorbs.net = 127.0.0.5
dnslists = sbl.spamhaus.org : \
relays.ordb.org : \
opm.blitzed.org : \
dnsbl.njabl.org : \
list.dsbl.org : \
relays.visi.com : \
multihop.dsbl.org : \
dul.dnsbl.sorbs.net : \
dul.dnsbl.sorbs.net : \
l1.spews.dnsbl.sorbs.net : \
l2.spews.dnsbl.sorbs.net : \
dnsbl.sorbs.net=127.0.0.5
Its usefull to add the above but I dont take any gurantee I am using the above in my server and its working 100% perfect.
Check the following also.
# Relays
relays.ordb.org # all usable
opm.blitzed.org
dnsbl.njabl.org
list.dsbl.org
relays.visi.com
# Multihops
multihop.dsbl.org # only use for accounts with LOTS of spam
# Dialups
dul.dnsbl.sorbs.net # stops most worms
# Spam-in-progress
client.dnsbl.docsnyder.de
xbl.spamhaus.org # "no false positives yet"
bl.spamcop.net # only use for accounts with LOTS of spam
# SPEWS
l1.spews.dnsbl.sorbs.net # hardcore spammers
l2.spews.dnsbl.sorbs.net # their assistants
# Hardcore spammers
sbl.spamhaus.org # Spamhaus Block List
blacklist.spambag.org
spamfriendly.dnsbl.docsnyder.de # manually maintained
# RHSBL
sender.rhsbl.docsnyder.de # manually maintained
helo.rhsbl.docsnyder.de # manually maintained
rhsbl.sorbs.net # experimental
# RFC-ignorant (DNSBL)
ipwhois.rfc-ignorant.org # experimental
# RFC-ignorant (RHSBL)
whois.rfc-ignorant.org # experimental
postmaster.rfc-ignorant.org # experimental
abuse.rfc-ignorant.org # experimental
dsn.rfc-ignorant.org # experimental
Edit your exim.conf file and add the following to
Look for LINE # 505 in exim.conf and do the changes below.
# Deny stuff from insecure hosts & spammers. No exceptions for known users.
# but do bypass all checking for whitelisted host names
deny message = to unblock $sender_host_name see http://www.EXAMPLE.COM/
# only for domains that do want to be tested against RBLs
domains = +use_rbl_domains
# only smtp.dnsbl.sorbs.net = 127.0.0.5
dnslists = sbl.spamhaus.org : \
relays.ordb.org : \
opm.blitzed.org : \
dnsbl.njabl.org : \
list.dsbl.org : \
relays.visi.com : \
multihop.dsbl.org : \
dul.dnsbl.sorbs.net : \
dul.dnsbl.sorbs.net : \
l1.spews.dnsbl.sorbs.net : \
l2.spews.dnsbl.sorbs.net : \
dnsbl.sorbs.net=127.0.0.5
Its usefull to add the above but I dont take any gurantee I am using the above in my server and its working 100% perfect.
Check the following also.
# Relays
relays.ordb.org # all usable
opm.blitzed.org
dnsbl.njabl.org
list.dsbl.org
relays.visi.com
# Multihops
multihop.dsbl.org # only use for accounts with LOTS of spam
# Dialups
dul.dnsbl.sorbs.net # stops most worms
# Spam-in-progress
client.dnsbl.docsnyder.de
xbl.spamhaus.org # "no false positives yet"
bl.spamcop.net # only use for accounts with LOTS of spam
# SPEWS
l1.spews.dnsbl.sorbs.net # hardcore spammers
l2.spews.dnsbl.sorbs.net # their assistants
# Hardcore spammers
sbl.spamhaus.org # Spamhaus Block List
blacklist.spambag.org
spamfriendly.dnsbl.docsnyder.de # manually maintained
# RHSBL
sender.rhsbl.docsnyder.de # manually maintained
helo.rhsbl.docsnyder.de # manually maintained
rhsbl.sorbs.net # experimental
# RFC-ignorant (DNSBL)
ipwhois.rfc-ignorant.org # experimental
# RFC-ignorant (RHSBL)
whois.rfc-ignorant.org # experimental
postmaster.rfc-ignorant.org # experimental
abuse.rfc-ignorant.org # experimental
dsn.rfc-ignorant.org # experimental
Last edited: