- Spam and Open Relay Blocking System
SORBS (Spam and Open Relay Blocking System) is a list of e-mail servers suspected of sending or relaying spam (a DNS blacklist). It has been augmented with complementary lists that include various other classes of hosts, allowing for customized email rejection by its users.
The SORBS DNSbl project was created November 2002. It was maintained as a private list until January 6, 2003 when DNSbl was officially launched to the public. The list consisted of 78,000 proxy relays and has grown to over 3,000,000 alleged compromised spam relays.
SORBS adds IP ranges that belong to dialup modem pools, dynamically allocated wireless, and DSL connections as well as DHCP LAN ranges by using reverse DNS PTR records, WHOIS records, and sometimes by submission from the ISPs themselves. This is called the DUHL or Dynamic User and Host List. SORBS does not automatically rescan DUHL listed hosts for updated rDNS so to remove an IP address from the DUHL the user or ISP has to request a delisting or rescan. If other blocks are scanned in the region of listings and the scan includes listed netspace, SORBS automatically removes the netspace marked as static.
Matthew Sullivan of SORBS proposed in an Internet Draft that generic reverse DNS addresses include purposing tokens such as static or dynamic, abbreviations thereof, and more. That naming scheme would have allowed end users to classify IP addresses without the need to rely on third party lists, such as the SORBS DUHL. The Internet Draft has since expired. Generally it is considered more appropriate for ISPs to simply block outgoing traffic to port 25 if they wish to prevent users from sending email directly, rather than specifying it in the reverse DNS record for the IP.
IP addresses that send spam to SORBS spamtraps are added to their spam database automatically or manually. In order to prevent being blacklisted, major free email services such as Gmail, Yahoo, and Hotmail, as well as major ISPs now implement strong[says who?] outgoing anti-spam countermeasures. However, smaller networks may still unwittingly be blocked. Because spammers use viruses, malware, and rootkits to force compromised computers to send spam, SORBS lists the IP addresses of servers that the infected system uses to send its spam. Because of this, larger ISPs and corporate networks have started blocking port 25 in order to prevent these compromised computers from being able to send email except through designated email servers.
SORBS maintains a list of networks and addresses that it believes are assigned dynamically to end users/machines, it refers to this list as the DUHL (Dynamic User/Host List)  which includes wide networks of computers sharing the same IP address using network address translation which are also affected (If one computer behind the NAT is allowed to send spam, the whole network will be blacklisted if the NAT IP is ever blacklisted.) This is a common method of pre-emptive blocking as most legitimate mail servers are hosted in data centers designed and provisioned for such services, the legitimate mail servers that are affected by such listings are most commonly home hobbyists running their own mail servers.
SORBS has been accused of deliberately targeting innocent users through escalated listings. Its website describes the process as follows: "An escalated listing on the other hand is where a whole network of IP addresses is listed in SORBS and all hosts and IPs (whether assigned to a single customer or multiple) are listed and therefore blocked or result in spam folder issues. Why does SORBS create escalated listings? The simple answer is to stop spam. You ask, 'How does listing innocent IPs help stop spam?' Simple, some providers don’t care about spam." There have been many heated discussions on this practice as often it would appear Email users caught in this trap have no resource, because the listing applies to a block of IP addresses, and they are unable to release their own IP address. For these reasons, many[who?] believe that blacklists should be used cautiously and if false positives are a concern, should only be included as one component in wider anti-spam measures, such as SpamAssassin.
Since the acquisition by Proofpoint, Inc. full time support staff have been employed to answer delisting queries, however the first round of answers to support requests are answered automatically by robot systems. Users rejected by the robots may respond to support tickets to speak with a human being, but as it is documented in the auto-response by the robot, and not on the SORBS website many have reported that it is impossible to get a human response to their issue(s).
- ^ "Introduction and a bit of history". SORBS. June 2004. http://www.au.sorbs.net/. Retrieved 27 June 2009.
- ^ John Leyden (2009-11-06). "Controversial email blocklist SORBS sold". http://www.theregister.co.uk/2009/11/06/sorbs_sold/. Retrieved 2009-12-05.
- ^ "Proofpoint buys SORBS anti-spam assets". http://www.bizjournals.com/sanjose/news/2011/08/16/proofpoint-buys-sorbs-anti-spam-assets.html.
- ^ "SORBS Dyname User/Host List FAQ". http://www.sorbs.net/faq/dul.shtml.
- ^ Sullivan, Matthew (April 2006). "Suggested Generic DNS Naming Schemes for Large Networks and Unassigned hosts". IETF. http://tools.ietf.org/html/draft-msullivan-dnsop-generic-naming-schemes.
- ^ "MAAWG Recommendation". maawg.org. http://www.maawg.org/port25/MAAWG_Port25rec0511.pdf.
- ^ Matthew Sullivan (24 November 2003). "Notice SORBS DNSbl users, regarding the easynet blacklists being discontinued Dec 1 2003". news.admin.net-abuse.email. (Web link).
- ^ "Port 25 (Sonic.net)". http://sonic.net/support/faq/advanced/port_25.shtml.
- ^ "DUHL (Dynamic User/Host List) FAQ". http://www.sorbs.net/faq/dul.shtml.
- ^ talkback.sorbs.net
Spamming ProtocolsOther Anti-spam Spamdexing Internet fraud
Wikimedia Foundation. 2010.