- The Spamhaus Project
The Spamhaus Project is an international organisation (founded by Steve Linford in 1998) to track e-mail spammers and spam-related activity. It is named for the anti-spam jargon term coined by Linford, spamhaus, a pseudo-German expression for an ISP or other firm which spams or willingly provides service to spammers.
Spamhaus DNSBLs and DNSWLs
Spamhaus is responsible for a number of very widely used anti-spam DNS-based Blocklists (DNSBLs) and Whitelists (DNSWLs). Many internet service providers and Internet networks use these services to reduce the amount of spam they take on. The Spamhaus lists collectively protect over 1.4 billion e-mail users, according to Spamhaus' web page (June 2008) and are estimated to block 80 billion spam emails per day globally on the internet (almost 1 million spams per second). Like all DNSBLs, their use is considered controversial by some.
The Spamhaus Block List (SBL) targets "verified spam sources (including spammers, spam gangs and spam support services)." Its goal is to list IP addresses belonging to known spammers, spam operations, and spam-support services The SBL's listings are partially based on the ROKSO index of "spam gangs", for which see below.
The Exploits Block List (XBL) targets "illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits." That is to say, like several other DNSBLs it is a list of known open proxies and exploited computers being used to send spam and viruses. The XBL includes listings gathered by Spamhaus as well as by two contributing DNSBL operations — the Composite Blocking List (CBL) and the Not Just Another Bogus List (NJABL) lists.
The Policy Block List (PBL) is a list that serves many of the same functions of a Dialup Users List, but really it is not a DUL. The PBL lists not only dynamic and DHCP type IP address space designated as 'not allowed to make direct SMTP connections', but static assignments that shouldn't be sending email without prior arrangement. Examples of such are an ISP's core routers, corporate users required by policy to send via their internal mail server, and unassigned IP addresses. Much of the data is provided to Spamhaus by the organizers (ISPs) of the IP address space.
The Domain Block List (DBL) was released in March 2010 and is a list of domain names, which is both a domain URI Blocklist and RHSBL. It lists spam domains including spam payload URLs, spam sources and senders ("right-hand side"), known spammers and spam gangs, and phish, virus and malware-related sites.
The Spamhaus White List (SWL) was released in October 2010 and is a whitelist of IPv4 and IPv6 addresses. The SWL is intended to allow mail servers to separate incoming email traffic into 3 categories: Good, Bad and Unknown. Only verified legitimate senders with clean reputations are approved for whitelisting and there are strict terms to keeping a Spamhaus Whitelist account.
The Domain White List (DWL) was released in October 2010 and is a whitelist of domain names. The DWL enables automatic certification of domains with DKIM signatures. Only verified legitimate senders with clean reputations are approved for whitelisting and there are strict terms to keeping a whitelist account.
Spamhaus's DNSBLs and DNSWLs are offered as a free public service to low-volume mail server operators on the Internet. Commercial spam filtering services and other large sites doing large numbers of queries must instead sign up for an rsync-based feed of these DNSBLs, which Spamhaus calls its Datafeed Service, at a moderate fee as long as they are not in Spamhaus's top ten worst spam service ISPs list.
Spamhaus also provides two combined DNSBLs. One is the SBL+XBL which allows users to query sbl-xbl.spamhaus.org once and get return codes from both lists. A newer combination is called ZEN (named after founder Linford's dog), which allows users to query zen.spamhaus.org once and get return codes from the SBL+XBL and the newer PBL.
Spamhaus outlines the way its DNSBL technology works in a document called Understanding DNSBL Filtering.
Register of Known Spam Operations
The Spamhaus Register of Known Spam Operations (ROKSO) is a database of "hard-core spam gangs" -- spammers and spam operations who have been terminated from three or more ISPs due to spamming. The ROKSO list is not a DNSBL; it is, rather, a directory of publicly-sourced information about these persons and their business and at times criminal activities.
The ROKSO database is nowadays part of the signup checking procedure of many of the major ISPs, ensuring that ROKSO-listed spammers find it difficult to get hosting. A listing on ROKSO also means that all IP addresses associated with the spammer (his other domains, sites, servers, etc.) get listed on the Spamhaus SBL as "under the control of a ROKSO-listed spammer" whether there is spam coming from them or not (as a preventative measure).
There is a special version of ROKSO available to Law Enforcement Agencies (for which LEAs need to apply for access) which gives access to data on hundreds of spam gangs, with evidence, logs and information on illegal activities of these gangs, too sensitive to publish in the public part of ROKSO.
Don't Route Or Peer List
The Spamhaus Don't Route Or Peer (DROP) List is a text file delineating so-called "zombie" (stolen) CIDR blocks and netblocks which are "totally controlled by spammers or 100% spam hosting operations", as shown by SBL listings, with the numbers of the underlying listings as comments. It is intended not to include netblocks registered to ISPs and sublet to spammers, but only those blocks wholly used by spammers. It is intended to be incorporated in firewalls and routing equipment to block network traffic from and to those blocks.
The Spamhaus 'Group' (although there is no group identity) consists of a number of independent companies which focus on different aspects of Spamhaus anti-spam technology or provide services based around it. At the core is The Spamhaus Project Ltd., a UK-registered non-profit which tracks spam sources and publishes free DNSBLs. Further 'Spamhaus' companies include Spamhaus Logistics Corp., a Seychelles-registered corporation which owns the large server infrastructure used by Spamhaus and employs engineering staff to maintain it. Spamhaus Technology Ltd., a UK-registered commercial 'data delivery' company which "manages data distribution and synchronization services". Spamhaus Research Corp., a company which "develops anti-spam technologies". The Spamhaus Whitelist Co. Ltd., a Jersey-registered company which manages the Spamhaus Whitelist. Also there are several references on the Spamhaus website to The Spamhaus Foundation, a private interest foundation (believed to be a Liechtenstein Foundation) whose charter is "to assure the long-term security of The Spamhaus Project and its work".
- National Cyber Forensics Training Alliance 2008 Cyber Crime Fighter Award 
- Internet Service Providers Association's Internet hero of 2003 award
In September 2006 an American spammer named David Linhardt, operating as "e360 Insight LLC", filed suit against Spamhaus in Illinois for blacklisting his junk mailings. Spamhaus initially hired an American law firm, which had the case moved from the state court to the U.S. Federal District Court for the Northern District of Illinois, but then (on the advice of its British lawyers) objected to the lawsuit altogether on the grounds that Spamhaus, being based in the United Kingdom, was outside the jurisdiction of United States courts. The court, presided over by Judge Charles Kocoras, proceeded with the case against Spamhaus without considering the international jurisdiction issue, prompting British MP Derek Wyatt to call for the judge to be suspended from office. Not having had its objection to jurisdiction examined, Spamhaus refused to participate in the U.S. case any further and withdrew its counsel. However, Spamhaus was deemed by the court to have "technically accepted jurisdiction" by having initially responded at all, and the judge, angry at Spamhaus having walked out of his court, awarded e360 a default judgement totaling $11,715,000 in damages. Spamhaus subsequently announced that it would ignore the judgement because default judgements issued by U.S. courts without a trial "have no validity in the U.K. and cannot be enforced under the British legal system".
Following the ruling in its favour, e360 filed a motion in Federal court to attempt to force ICANN to remove the domain records of Spamhaus until the default judgement had been satisfied. This raised international issues regarding ICANN's unusual position as an American organization with worldwide responsibility for domain names, and ICANN protested that they had neither the ability nor the authority to remove the domain records of Spamhaus, which is a UK-based company. On 20 October 2006, Judge Korcoras issued a ruling denying e360's motion against ICANN, stating in his opinion that "there has been no indication that ICANN [is] not [an] independent entit[y] [from Spamhaus], thus preventing a conclusion that [it] is acting in concert" with Spamhaus and that the court had no authority over ICANN in this matter. The court further ruled that removing Spamhaus's domain name registration was a remedy that was "too broad to be warranted in this case," because it would "cut off all lawful online activities of Spamhaus via its existing domain name, not just those that are in contravention" of the default judgment. Kocoras concluded, "[w]hile we will not condone or tolerate noncompliance with a valid order of this court [i.e., Spamhaus' refusal to satisfy the default judgement] neither will we impose a sanction that does not correspond to the gravity of the offending conduct."
In 2007, Chicago law firm Jenner & Block LLP took up Spamhaus's case pro bono publico and appealed the ruling. The U.S. federal Court of Appeals for the Seventh Circuit vacated the damages award and remanded the matter back to the district court to find a more extensive inquiry to determine damages. In January 2008, e360 Insight LLC filed for bankruptcy and closed down, citing astronomical legal bills associated with this court case as the reason for its demise.
In 2010, the $11.7–million–dollar damages award was reduced to $27,002 — $1 for tortious interference with prospective economic advantage, $1 for claims of defamation, and $27,000 for "existing contracts".
Spamhaus lawyers however went back to the US Court of Appeals for a second time and appealed even the lower $27,002 amount. The US Court of Appeals found in favour of Spamhaus and on the 2nd September 2011, issued a new ruling reducing the entire judgment to just $3 total and ordering the Plaintiff e360 to pay the costs of the appeal for the defence.
Spamhaus versus nic.at
In June 2007 Spamhaus requested the national Domain registry of Austria, nic.at, to suspend a number of domains, claiming they were registered anonymously by phishing gangs for illegal bank phishing purposes. The registry nic.at rejected the request and argued that they would break Austrian law by suspending domains, even though the domains were used for criminal purposes, and demanded proof that the domains were registered under false identities. For some time the domains continued to phish European banks, including German and Austrian banks. Finally, Spamhaus put the mail server of nic.at on their SBL spam blacklist under the SBL's policy "Knowingly Providing a Spam Support Service for Profit" for several days which caused interference of mail traffic at nic.at. All of the criminal phishing domains have since been deleted/suspended by the respective DNS providers.
Blocking of Google Docs IPs
In August 2010 Spamhaus added some Google-controlled IP addresses used by Google Docs to its SBL spam list, due to Google Docs being a large source of uncontrolled spam. Google quickly cleaned the problem up and Spamhaus removed the listing. Though initially wrongly reported by some press to be IPs used by Gmail, later it was clarified that only Google Docs was blocked.
- Anti-spam techniques (e-mail)
- Comparison of DNS blacklists
- E-mail spam
- ^ "Spamhaus Block List (SBL)". spamhaus.org. http://www.spamhaus.org/sbl/index.lasso.
- ^ Linford, Steve. "SBL Policy & Listing Criteria". The Spamhaus Project website. http://www.spamhaus.org/sbl/policy.html. Retrieved 2007-02-04.
- ^ "Spamhaus Exploits Block List (XBL)". spamhaus.org. http://www.spamhaus.org/xbl/index.lasso.
- ^ "Spamhaus Policy Block List (PBL)". spamhaus.org. http://www.spamhaus.org/pbl/index.lasso.
- ^ "Spamhaus Domain Block List (DBL)". spamhaus.org. http://www.spamhaus.org/dbl/index.lasso.
- ^ a b "Spamhaus White List (SWL)". spamhaus.org. http://www.spamhaus.org/whitelist/index.lasso.
- ^ Spamhaus DNSBL Usage
- ^ "Spamhaus Datafeed,". spamhaus.org. http://www.spamhaus.org/datafeed/index.html.
- ^ "Spamhaus's top ten worst spam service ISPs list". spamhaus.org. http://www.spamhaus.org/statistics/networks.lasso.
- ^ Linford, Steve. "How do I use the SBL?". The Spamhaus Project website. http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL#11. Retrieved 2007-02-04.
- ^ "Spamhaus ZEN". spamhaus.org. http://www.spamhaus.org/zen/index.lasso.
- ^ "Understanding DNSBL Filtering". spamhaus.org. http://www.spamhaus.org/whitepapers/dnsbl_function.html.
- ^ "Spamhaus Register of Known Spam Operations (ROKSO)". spamhaus.org. http://www.spamhaus.org/rokso/index.lasso.
- ^ "The Spamhaus Don't Route Or Peer List (DROP)". spamhaus.org. http://www.spamhaus.org/drop/index.lasso.
- ^ "Spamhaus Logistics Corp.". spamhaus.org. http://www.spamhaus.org/organization/strategicpartners.html.
- ^ "Spamhaus Technology Ltd.". spamhaus.org. http://www.spamhaus.org/organization/strategicpartners.html.
- ^ "The Spamhaus Whitelist Company Ltd.". spamhaus.org. http://www.spamhaus.org/organization/strategicpartners.html.
- ^ "The Spamhaus Foundation". spamhaus.org. http://www.spamhaus.org/organization/index.lasso.
- ^ spamhaus.org
- ^ theregister.co.uk
- ^ John Leyden |Leyden, John]] (2006-10-10). TheRegister.co.uk "Spamhaus fights US court domain threat". The Register. http://www.theregister.co.uk/2006/10/10/spamhaus_domain_threat/ TheRegister.co.uk. Retrieved 2007-02-04.
- ^ Linford, Steve. "TRO Answer: e360Insight vs. The Spamhaus Project". The Spamhaus Project website. http://www.spamhaus.org/legal/answer.lasso?ref=1. Retrieved 2007-02-04.
- ^ computeractive.co.uk "MP calls for suspension of judge in Spamhaus case". Computeractive. 2006-10-10. http://www.computeractive.co.uk/ca/news/1917491/apig-chief-calls-suspension-spam-judge/ computeractive.co.uk. Retrieved 2011-03-23.
- ^ Evers, Joris (2006-09-14.). "Spam fighter hit with $11.7 million judgment". http://news.com.com/Spam+fighter+hit+with+11+million+judgment/2100-7350_3-6116009.html. Retrieved 2007-02-04.
- ^ "Case 1:06-cv-03958 - Document 29-1 - Filed 10/06/2006 (PDF version of Proposed Order)". The Spamhaus Project website. 2006-10-06. http://www.spamhaus.org/archive/legal/e360/kocoras_order_6_10.pdf. Retrieved 2007-02-04.
- ^ Steve Linford, Steve. "Court Answer: e360Insight vs. The Spamhaus Project". The Spamhaus Project website. http://www.spamhaus.org/legal/answer.lasso?ref=3. Retrieved 2007-02-04.
- ^ Linford. "Responds here". The Spamhaus Project website. http://www.spamhaus.org/legal/answer.lasso?ref=4. (No longer available, but partially archived at U.S. Court Order Could Boost Spam By 50 Billion Daily, Spammer Cajoles ICANN To Ban Spamhaus, Groups.google.com, highspeed and Groups.google.com, abuse.email as of 2007-02-04.)
- ^ Carvajal, Doreen (2006-10-16). "Defending a Blurred Line: Is It Spam or Just a Company Marketing by E-Mail?". The New York Times. http://www.nytimes.com/2006/10/16/technology/16spam.html?ex=1318651200&en=cd20af3993bc7480&ei=5090&partner=rssuserland&emc=rss. Retrieved 2007-02-04.
- ^ "Spamhaus Litigation Update". ICANN. 2006-10-10. http://www.icann.org/announcements/announcement-10oct06.htm. Retrieved 2007-02-04.
- ^ "Case 1:06-cv-03958 - Document 36 - Filed 10/19/2006 (signed version of denial without prejudice of Plaintiffs’ motion [26 for a rule to show cause)"]. ICANN. 2006-10-20. http://www.icann.org/legal/spamhaus/denial-proposed_order-19oct06.pdf. Retrieved 2007-02-04.
- ^ "Domain Firm, Tucows, and ICANN, Win Spamhaus Litigation". Cheaphostingdirectory.com. 2006-10-30. http://www.cheaphostingdirectory.com/news-domain-firm-tucows-and-icann-win-spamhaus-litigation-2513.html. Retrieved 2006-02-04.
- ^ "e360 Has Gone Bust". groups.google.com. http://groups.google.com/group/news.admin.net-abuse.email/browse_frm/thread/7b4e7adf63575399/d45713f3a018df76?hl=en&ie=UTF-8&q=e360+gone+bust.
- ^ Masnick, Mike (16 June 2010). "Spammer's $11 Million Win Against Anti-Spammer Spamhaus, Reduced To $27,000". techdirt.com. http://www.techdirt.com/articles/20100616/0137529843.shtml. Retrieved 23 November 2010.
- ^ "Case 1:06-cv-03958 - Document 242 - Filed 06/11/10". archive.org. http://www.archive.org/download/gov.uscourts.ilnd.200330/gov.uscourts.ilnd.200330.242.0.pdf.
- ^ "US Court of Appeals - Final Judgment". spamhaus.org. 2010-07-29. http://www.spamhaus.org/archive/legal/e360-v-Spamhaus_7thCir_Judgment.pdf.
- ^ a b c "Spamhaus statement on Report on the criminal 'Rock Phish' domains registered at Nic.at". spamhaus.org. http://www.spamhaus.org/organization/statement.lasso?ref=7.
- ^ a b "Spamhaus.org setzt Österreichs Domainverwaltung unter Druck" (in German). heise.de. 19 June 2007. http://www.heise.de/newsticker/meldung/91417.
- ^ "Quote NIC.at CEO Wein: “Die DNS-Provider der Domains haben die Einträge gelöscht.” (“The DNS providers of the domains deleted the domain entries.”)". heise.de. http://www.heise.de/ix/meldung/Nic-at-weist-Spamhaus-Darstellung-zurueck-142687.html.
- ^ "Spamhaus: We Blocked Google Docs Not Gmail". Softpedia. 20 August 2010. http://news.softpedia.com/news/Spamhaus-We-Blocked-Google-Docs-Not-Gmail-153093.shtml. Retrieved 21 August 2010.
- ^ "Hormel OKs Spamhaus' Trademark [ClickZ Internet Marketing Solutions for Marketers]". blog.clickz.com. http://blog.clickz.com/070417-212734.html.
Spamming ProtocolsOther Anti-spam Spamdexing Internet fraud
Wikimedia Foundation. 2010.
Look at other dictionaries:
The Spamhaus Project — est une organisation internationale fondée par Steve Linford(en) en 1998, dont l objet est de traquer les spameurs et les activités relatives aux spams. Son nom est inspiré du jargon spamhaus, mot pseudo allemand inventé par Linford pour désigner … Wikipédia en Français
Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… … Wikipedia
E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… … Wikipedia
Email spam — An email box folder filled with spam messages. Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually… … Wikipedia
Speedyclick.com — was an entertainment based website operating out of Glendale, CA circa 1998 – 2001. The site featured contests, original content, and free web style games such as blackjack, bingo, and virtual slot machines. By spending time on the site,… … Wikipedia
Steve Linford — is a British anti spam campaigner best known for founding The Spamhaus Project. [http://www.spamhaus.org/organization/ About Spamhaus] ] Linford was born in England. His parents moved to Rome where his father ran an industrial platinum… … Wikipedia
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
.mail — Infobox Top level domain name=.mail background=#D2B48C introduced=Not officially introduced; proposed in 2004 type=Proposed top level domain status=Unapproved application registry=None yet established sponsor= [http://www.ascregistry.org Anti… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
WikiLeaks — Logo de WikiLeaks URL Noms de domaine[note 1] … Wikipédia en Français