Postfix and MS-Exchange Mail Server Affected by ORDB.org Spam Service

by on March 27, 2008 · 2 comments· LAST UPDATED March 27, 2008

in , ,

Since y'day I noticed one of our article related to ORDB.org spam blocker receiving lots of traffic. I received couple of calls from our clients because most emails was getting bounced via Exchange or Postfix mail server.

ORDB is now configured to return each IP as spam source

ORDB was a database of open relay email servers, provided until 2006 as a voluntary service to block spam. Now ORDB.org service has been re-activated and it is returning every IP address queried as being on its blacklist. I guess this was done to punish lazy sys admin / mail administrators ;)

If you or your mail server / gateway / firewall querying relays.ordb.org; please stop it immediately. If you query relays.ordb.org - mail server will rejecting all incoming mails from that server.

Symantec Mail Security for MS-Exchange Server - Spam Filter

Symantec Mail Security for Microsoft Exchange configuration in the list of Anti-spam blacklist servers including relays.ordb.org. Immediately remove the entry.

Remove ORDB.ORG from MS-Exchange Server Spam Filter

In Exchange Server 2003 you can find the feature for blacklist support within the global settings of your organization. Visit MS-Exchange System Manager > Global Settings > Message Delivery Properties -> Connection Filtering tab > Remove relays.ordb.org

Remove Linux / UNIX - Postfix Mail Server - Spam Filter

Open postfix configuration file and remove the following line:
reject_rbl_client relays.ordb.org,
Restart postfix mail server:
# service postfix restart

TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 2 comments… read them below or add one }

1 mastrboy March 28, 2008 at 8:37 am

they should have waited for sysadmin day :p

Reply

2 spam June 3, 2008 at 1:30 pm

This effected alot people . RBL list are law unto themselves

Reply

Leave a Comment

Tagged as: , , , , , , , , , , , , , , , , , , ,

Previous post:

Next post: