DNS Block Listing (DNSBL)
What is it?
There are a lot of viruses, trojans, and mis-configured computers on the Internet these days. Attackers use them to get to AfterNET for spamming, flooding, and evading bans. Because of this, AfterNET implements RBL, or Realtime Black List checking, and requires users from suspicious IP's to login before using AfterNET.
How does it work?
Every person connecting to AfterNET is checked against our list of DNS blacklists. These lists are maintained by different groups to help stop spam and IRC abuse. They have various mechanisms for finding and reporting hosts which have insecure proxies, trojan horses, or are otherwise allowing abuse.
It's OK, we know; it probably wasn't you. It was probably someone at your Internet address before you. There is an easy way to solve it, keep reading.
For many people, addresses are dynamically allocated every time they connect to the Internet, so sometimes listings are wrong and out-dated. Most RBLs allow you or your ISP to request a retest and removal from their list, but don't worry about that, you should just Login on Connect to bypass the scan. The use of these lists has drastically decreased the ability of miscreants to spam and flood on AfterNET; however, some people with dynamic IP addresses will get frequent false positives as spammers use their IP before them, so they need to log in to use AfterNET reliably.
What to do if you are listed
If you are prompted for your AuthServ password because your host is listed in an RBL, don't fear. You can still get on AfterNET by following these directions:
- ) Login-on-connect - Setup Login-on-Connect to be automatically exempt from any RBL scanning in the future. Get an account and Click here for instructions setting up login-on-connect.
- ) You could also complain to your Internet service provider. Refer them to the RBL your IP is in (it says in the message you get when trying to connect) and inform them of the problem. We realize you may be stuck with a provider who, due to lazy business practices, cannot be removed from an RBL, but you should complain anyway, maybe some day they will “get it”.
- ) If the above doesn't work for you, use the 'Contact Us' link in the menu. Please include a copy of the Gline message, your IP address, your e-mail address, and a detailed description of the problem.
We apologize for the inconvenience, we understand that the use of the RBLs will cause some people a little bit of extra work connecting to AfterNET, but we hope that the trade off of less spam and abuse makes it worth while. Please don't be discouraged, we will make every effort to allow legitimate users access to AfterNET. If the above doesn't work for you for some reason, let us know why and we'll work with you to find a solution.
You can check the http://OpenRBL.Org site to query all major RBLs at once for your host.
We are currently blocking based on the following RBLs, and list types. We DO NOT block based only on “DUL” (dialup) records.
- Blitzed OPM info - Wingates, Socks, HTTP, Router, and HTTP Post proxies.
- Sorbs RBL - HTTP Proxy, SOCKS Proxy, MISC Proxy, SMTP Proxy, SPAM Proxy, Web Proxy, Zombies
- Njabl Info - Open Proxy, Compromised System (DDOS), Compromised System (Relay), Compromised System (autorooter/scanner), Compromised System (worm or mass mailing virus), Compromised System (other), Open Proxy