Spam and Open Relay Blocking System

(Redirected from SORBS)

SORBS ("Spam and Open Relay Blocking System") was a list of e-mail servers suspected of sending or relaying spam (a DNS Blackhole List). It had been augmented with complementary lists that include various other classes of hosts, allowing for customized email rejection by its users.

The Spam and Open Relay Blocking System
Company typePublic
FoundedQueensland, Australia 2001 (2001)
FounderMichelle Sullivan
HeadquartersSunnyvale CA, United States of America
Area served
Worldwide
Key people
Michelle Sullivan
OwnerProofpoint, Inc.
Websitewww.sorbs.net
Footnotes / references
SORBS is owned by Proofpoint, Inc.

History

edit

The SORBS DNSbl project was created in November 2001. It was maintained as a private list until 6 January 2002 when the DNSbl was officially launched to the public. The list consisted of 78,000 proxy relays and rapidly grew to over 3,000,000 alleged compromised spam relays.[1]

In November 2009 SORBS was acquired by GFI Software, to enhance their mail filtering solutions.[2]

In July 2011 SORBS was re-sold to Proofpoint, Inc.[3]

On June 5, 2024 SORBS was shut down and no longer available. [4]

DUHL

edit

SORBS adds IP ranges that belong to dialup modem pools, dynamically allocated wireless, and DSL connections as well as DHCP LAN ranges by using reverse DNS PTR records, WHOIS records, and sometimes by submission from the ISPs themselves. This is called the DUHL or Dynamic User and Host List.[5] SORBS does not automatically rescan DUHL listed hosts for updated rDNS so to remove an IP address from the DUHL the user or ISP has to request a delisting or rescan. If other blocks are scanned in the region of listings and the scan includes listed netspace, SORBS automatically removes the netspace marked as static.

Matthew Sullivan of SORBS proposed in an Internet Draft that generic reverse DNS addresses include purposing tokens such as static or dynamic, abbreviations thereof, and more.[6] That naming scheme would have allowed end users to classify IP addresses without the need to rely on third party lists, such as the SORBS DUHL. The Internet Draft has since expired. Generally it is considered more appropriate for ISPs to simply block outgoing traffic to port 25 if they wish to prevent users from sending email directly, rather than specifying it in the reverse DNS record for the IP.[7]

SORBS' dynamic IP list originally came from Dynablock but has been developed independently since Dynablock stopped updating in December 2003.[8]

Spam traps

edit

IP addresses that send spam to SORBS spamtraps are added to their spam database automatically or manually. In order to prevent being blacklisted, major free email services such as Gmail, Yahoo, and Hotmail, as well as major ISPs now implement outgoing anti-spam countermeasures. Gmail, for example, continues to get listed and delisted[9][10] because they refuse abuse reports.[11] However, smaller networks may still be unwittingly blocked. Because spammers use viruses, malware, and rootkits to force compromised computers to send spam, SORBS lists the IP addresses of servers that the infected system uses to send its spam. Because of this, larger ISPs and corporate networks have started blocking port 25 in order to prevent these compromised computers from being able to send email except through designated email servers.[12]

Preemptive listings

edit

SORBS maintains a list of networks and addresses that it believes are assigned dynamically to end users/machines, it refers to this list as the DUHL (Dynamic User/Host List).[13] The list includes wide networks of computers sharing the same IP address using network address translation which are also affected (If one computer behind the NAT is allowed to send spam, the whole network will be blacklisted if the NAT IP is ever blacklisted.) This is a common method of pre-emptive blocking as most legitimate mail servers are hosted in data centers designed and provisioned for such services, the legitimate mail servers that are affected by such listings are most commonly home hobbyists running their own mail servers. The Spamhaus Policy Block List (PBL) is another such pre-emptive list which does not just list dynamic hosts, but also blocks hosts it believes[14] should not be sending email directly to third-party servers. SORBS also operate another list which is similar to the Spamhaus PBL called the NoServers list, which is wholly maintained by the network administrators of the respective networks and is therefore theoretically False Positive free.[citation needed]

Escalated listings

edit

SORBS has been accused of deliberately targeting innocent users through escalated listings. Its website describes the process as follows: "An escalated listing on the other hand is where a whole network of IP addresses is listed in SORBS and all hosts and IPs (whether assigned to a single customer or multiple) are listed and therefore blocked or result in spam folder issues. Why does SORBS create escalated listings? The simple answer is to stop spam. You ask, 'How does listing innocent IPs help stop spam?' Simple, some providers don’t care about spam."[15] There have been many heated discussions on this practice as often it would appear that email users who are caught in this trap have no recourse, because the listing applies to a block of IP addresses, and they are unable to release their own IP address.

False positives

edit

Due to the automation of SORBS listings it is possible for the addresses of legitimate mail servers to be listed from time to time. Therefore, users of the SORBS Spam list in particular should consider carefully any such implications and may wish to use the service as part of a larger spam blocking system. The SORBS 'No Servers' list is reported to be wholly administered by the network administrators of the networks concerned therefore it should be false positive free.

Statistics

edit

SORBS produces and publishes daily statistics about its list to the otherwise defunct usenet newsgroup news.admin.net-abuse.bulletins (NANAB). As of 7 April 2021 statistics published show the following listing totals:

Unique IPs in Proxy entries:             613259
Unique IPs in Relay entries:             7824
Unique IPs in Spam entries:              48515896
Unique IPs in Hacked entries:            7337019
Unique IPs in DUHL entries:              381194921
Unique IPs in exDUHL entries:            1072776
Unique IPs in Cable entries:             3877257
Unique IPs in Zombie entries:            1772805
Unique IPs in AdminRequested entries:    1
Unique IPs in UnAllocated entries:       139101
Unique IPs in CoLo entries:              136259
Unique IPs in MailServer entries:        31
Unique IPs in Spammer entries:           1
Unique IPs in Escalated entries:         2305
Unique IPs in Phishing entries:          110995
Unique IPs in Virus entries:             5630114
Unique IPs in BackScatter entries:       36
Unique IPs in Business entries:          5693190
Unique IPs in Static entries:            8906441
Unique IPs in WhiteHat entries:          1
Unique IPs in NoServers entries:         46844194
Unique IPs in CoreNetwork entries:       42588
Unique IPs in InstantReport entries:     31
Unique IPs in EmailReport entries:       1
Unique IPs in Permission entries:        81
Unique IPs in Botnet entries:            379527
Total IPs listed in the database         512276654

References

edit
  1. ^ "Introduction and a bit of history". SORBS. June 2004. Retrieved 27 June 2009.
  2. ^ John Leyden (6 November 2009). "Controversial email blocklist SORBS sold". The Register. Retrieved 5 December 2009.
  3. ^ "Proofpoint buys SORBS anti-spam assets". 16 August 2011.
  4. ^ Sharwood, Simon. "Spam blocklist SORBS closed by its owner, Proofpoint". www.theregister.com. Retrieved 7 June 2024.
  5. ^ "SORBS Dyname User/Host List FAQ".
  6. ^ Sullivan, Matthew (April 2006). "Suggested Generic DNS Naming Schemes for Large Networks and Unassigned hosts". Ietf Datatracker. IETF.
  7. ^ "MAAWG Recommendation" (PDF). maawg.org.
  8. ^ Matthew Sullivan (24 November 2003). "Notice SORBS DNSbl users, regarding the easynet blacklists being discontinued Dec 1 2003". Newsgroupnews.admin.net-abuse.email. Usenet: [email protected].
  9. ^ "Mark or unmark Spam in Gmail - iPhone & iPad - Gmail Help". support.google.com. Retrieved 6 April 2021.
  10. ^ "Network Tools: DNS,IP,Email". MxToolbox. Retrieved 6 April 2021.
  11. ^ "Google Product Forums". productforums.google.com. Retrieved 6 April 2021.
  12. ^ "Port 25 (Sonic.net)". Archived from the original on 11 February 2005.
  13. ^ "DUHL (Dynamic User/Host List) FAQ".
  14. ^ "PBL Advisory".
  15. ^ talkback.sorbs.net. talkback.sorbs.net (21 June 2010). Retrieved on 28 November 2011.
edit