Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

DNS-Based Blacklists


There are many DNS-based blacklists (DNSBLs). These are also known simply as blacklists or blocklists. They provide a service that is used by MTAs and spam filters to indicate sites that are related to spammers. An MTA or spam filter may use one or more blacklists. SpamAssassin can use blacklists to filter spam.

Blacklists can generally be placed in one or more of these categories:

  • A list of known open relays

  • A list of known sources of spam

  • A list of sites hosted by an ISP that encourages spammers in some way

Every blacklist has unique policies for adding and removing domains from the list. Some are very aggressive, and block not only sources of spam, but also any address served by the same Internet service provider. The intention of this approach is to force ISPs to stop doing business with spammers and thus force them off the net. This approach, called the Internet black hole of death has been used with success against major ISPs in the past.

Blacklists provide a spam filter...