i have a new server. i have a spam problem…
this is my setup - dns
GNU nano 5.6.1 /etc/resolv.conf
# Generated by NetworkManager
search xxxxxxxxxxx.com
nameserver 127.0.0.1
nameserver 1.1.1.1
nameserver 8.8.8.8
# NOTE: the libc resolver may not support more than 3 nameservers.
# The nameservers listed below may not be recognized.
nameserver 9.9.9.9
but i receive a lot of spam. i check header and found
X-Spam-Report:
* 0.0 URIBL_DBL_BLOCKED_OPENDNS ADMINISTRATOR NOTICE: The query to
* dbl.spamhaus.org was blocked due to usage of an open resolver.
* See https://www.spamhaus.org/returnc/pub/
* [URIs: tedswoodwor.shop]
* 0.0 RCVD_IN_ZEN_BLOCKED_OPENDNS RBL: ADMINISTRATOR NOTICE: The
* query to zen.spamhaus.org was blocked due to usage of an open
* resolver. See https://www.spamhaus.org/returnc/pub/
* [193.36.60.134 listed in zen.spamhaus.org]
how is possible with dns 127.0.0.1 ?
i wrong something but can’t see how…
thank you.
i check named.conf but i don’t have forwarders…
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
options {
listen-on port 53 {
any;
};
listen-on-v6 port 53 {
any;
};
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
secroots-file "/var/named/data/named.secroots";
recursing-file "/var/named/data/named.recursing";
/*
- If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
- If you are building a RECURSIVE (caching) DNS server, you need to enable
recursion.
- If your recursive DNS server has a public IP address, you MUST enable access
control to limit queries to your legitimate users. Failing to do so will
cause your server to become part of large scale DNS amplification
attacks. Implementing BCP38 within your network would greatly
reduce such attack surface
*/
recursion yes;
dnssec-validation yes;
managed-keys-directory "/var/named/dynamic";
geoip-directory "/usr/share/GeoIP";
pid-file "/run/named/named.pid";
session-keyfile "/run/named/session.key";
/* https://fedoraproject.org/wiki/Changes/CryptoPolicy */
include "/etc/crypto-policies/back-ends/bind.config";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
Just remove nameserver 127.0.0.1, I run rocky 9.7 and I don’t have that entry.
I do use external NS, maybe its added when you use virtualmin server to handle dns.
thank you for reply.
no is VM installed (by me) on hypervisor…
so i have installed rocky linux from iso.
and provider don’t block port 53 (i can telnet 8.8.8.8 53)
for now i’m able to solve with
on nmtui change dns with dns4eu
86.54.11.100 / 86.54.11.200
and remove from spamassasin/local.cf #dns_server 127.0.0.1
now if i try
dig +short 2.0.0.127.zen.spamhaus.org
i receive
127.0.0.10
127.0.0.4
127.0.0.2
so it’s correct. and when open header of a email i see sbl etc…
now seems works …