I noticed that problem when using safe.dnsbl.sorbs.net. I removed it and added the following to solve the problem;
http.dnsbl.sorbs.net - List of Open HTTP Proxy Servers. socks.dnsbl.sorbs.net - List of Open SOCKS Proxy Servers. misc.dnsbl.sorbs.net - List of open Proxy Servers not listed in the SOCKS or HTTP lists. smtp.dnsbl.sorbs.net - List of Open SMTP relay servers. web.dnsbl.sorbs.net - List of web (WWW) servers which have spammer abusable vulnerabilities (e.g. FormMail scripts) Note: This zone now includes non-webserver IP addresses that have abusable vulnerabilities. spam.dnsbl.sorbs.net - List of hosts that have been noted as sending spam/UCE/UBE to the administrators of SORBS. This zone also contains net blocks of spam supporting service providers, including those who provide web sites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list. block.dnsbl.sorbs.net - List of hosts demanding that they never be tested by SORBS. zombie.dnsbl.sorbs.net - List of networks hijacked from their original owners, some of which have already used for spamming. <snip> I did not use; dul.dnsbl.sorbs.net - Dynamic IP Address ranges (NOT a Dial Up list!) Best, James ----- Original Message ----- From: "Rod Dorman" <r...@polylogics.com> To: postfix-users@postfix.org Sent: Thursday, October 7, 2010 9:01:41 AM GMT -08:00 US/Canada Pacific Subject: sorbs.net issues Apparently sorbs.net is having issues with accidentally adding loads of static IP addresses to their dynamic IP's list. If you use them you might want to stick a "warn_if_reject" in front of the reference until the matter is resolved. -- r...@polylogics.com "The avalanche has already started, it is too Rod Dorman late for the pebbles to vote." - Ambassador Kosh