-
-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add option and/or fallback code for "127.255.255.254 Any Query via public/open resolver" (found on zen.spamhaus.org) #46
Comments
Dear Peter, Just to be sure. In the case of
and then use Seems a good way to always avoid the problem. |
NS server in SOA record not reliable and only 1 entry, better to retrieve NS records:
and run the query through the list. Best on all NS entries, because one can be out-of-sync or unreachable. (note: the correct domain is |
Hello, |
I'm currently using this here:
|
Hello,
I'll be out of office until the 1st of May.
I'll reply on my return.
Kind Regards,
TT
|
Unfortunatley this is not working for me. I also tried b.gns.spamhaus.org, c.gns.spamhaus.org, etc. Using my ISPs DNS Server or setting up conditional forwarding in windows dns on my domain controllers doesn't work either. I always get the return code 127.255.255.254 from zen.spamhaus.org. Any ideas? |
In this case the |
@audiocoach : with option Example from here
and please also retrieve output using
if you receive also valid A records, then your server IP itself is blacklisted... |
Can you give an estimate when it will be implemented? |
No I cannot. It's an open source project and anybody can contribute. At the moment I don't have the time ... |
Hi,
I'm sure not the only one who got hit by the
zen.spamhaus.org
limitation related query through open resolver...Thank you for adding
-n
option already to upstream (version 1.7.0)!A further improvement would be having capability to query authorative NS directly by option (e.g. "always use authorative NS") or at least in fallback case if
127.255.255.254
was returned (can be that other services will turn on such "friendly" feature in the future).This would require some code extension running NS query on each
-s <server>
domain and use returned NS records for further lookups per-s <server>
....not that easy to implement imho...For now I have carved out the
zen.spamhaus.org
check into a dedicated check.Related problem is how to tell
postfix
(postscreen_dnsbl_sites
feature) and/or local resolver not using public resolvers for a specific domain...for now the use ofzen.spanhaus.org
turns useless in case of system uses public resolvers instead of a local installed caching DNS server.Best Regards!
The text was updated successfully, but these errors were encountered: