Why use a public recursive DNS?
There are many reasons why people choose to employ a public DNS resolver, such as Google Public DNS. Perhaps your Internet Service Provider’s (ISPs) recursive name server suffers from high latency due to it being overloaded. Let’s be honest, given the competitive nature of this marketplace, some providers have been known to ‘skimp’ in this area to reduce operating costs.
Also, let’s not forget its ease of use. If you’re setting up an address to use as your DNS resolver, then 8.8.8.8 (one of Google’s public DNS resolver IP addresses) is one of the simplest numbers to remember.
So why don’t Spamhaus’s free DNSBLs work through some public DNS resolvers?
Regrettably, we have had to block some public DNS resolvers because some users can exploit them to get more than their fair share of a free service.
Taking a step back
Back in 1998, when both the world wide web (w.w.w.) and Spamhaus were in their infancy, 3.1% of the global population utilized the internet, according to data from the International Telecommunication Union.
Fast forward 20 years, and now 48% of the world’s population uses the internet. That takes the numbers from 188 million users in 1998 to 3,663 million users in 2017. This means that not only are the number of global internet users increasing at a phenomenal rate, but the number of those using Spamhaus’s free public mirrors is also dramatically increasing.
Yes, but why block queries from public recursive name servers?
It’s simple – public recursive name servers act as an anonymizing service and enable large-scale users to hide behind them. Given the lack of transparency and inability to identify those who are abusing the free service, a difficult decision was made to add some public domain name servers to our access control list… ultimately blocking your query.
To quantify the issue, over a 24 hour period, Spamhaus receives approximately two billion queries from what could be argued the most popular public recursive DNS. This is roughly 20% of the total number of queries made over the same period.
But I want to use both a public recursive DNS and Spamhaus’s free blocklists.
Not a problem, as long as you meet the criteria detailed above. Spamhaus can provide you with free access to our DNSBL datafeed via our Data Query Service (DQS). Sign up for a low-volume free DQS account here. It’s straightforward and can be set up in a matter of minutes, and enables you to have access to our domain name server blocklists whilst still using a public DNS.
Additional benefits of using the FREE Data Query Service (DQS)
You can increase your catch rates with two additional blocklists that are included in this service, at no additional cost:
1. Zero Reputation Domains (ZRD) – This lists newly registered domains for 24 hours. Domains that have just been registered are rarely used by legitimate organizations immediately; meanwhile, cybercriminals register and burn 100s of domains daily.
The Zero Reputation Domain (ZRD) blocklist helps to protect your users from clicking on links and visiting newly registered domains until it is established that they are not associated with zero-day attacks; phishing, bot-herding, spyware, and ransomware campaigns.
2. Auth Blocklist (Auth BL) – This is a subset of the XBL, listing IP addresses known to host bots using brute force or stolen SMTP_AUTH credentials to send email-borne threats. This blocklist is available separately, so you can use it at SMTP Auth as a score to ensure someone isn’t trying to misuse a user’s account.
For a full comparison of functionality across Spamhaus’ DNSBL offerings, take a look at this table.
Any questions? Simply contact us.
Article updated 15/03/21