summaryrefslogtreecommitdiffstats
path: root/config-default/dnsbl.xml
diff options
context:
space:
mode:
authorLibravatarJanik Kleinhoff <ilbelkyr@shalture.org>2016-09-05 01:09:49 +0000
committerLibravatarJanik Kleinhoff <ilbelkyr@shalture.org>2016-10-07 22:42:33 +0000
commite29b1456c06576b607fd255f5da34a3cc3e97ca2 (patch)
treefeeb5925dd9f0b6e9e692e34b7b8dca1ecbd8275 /config-default/dnsbl.xml
parente3e5402155786931fffd78e71bb2a7324a677ff0 (diff)
Extirpate traces of XML
Summary: Resolve T6 and use the opportunity to get rid of our dependency on `XML::Simple` once and for all. Test Plan: Run the bot with JSON config files. Reviewers: Unit193 Reviewed By: Unit193 Tags: #antispammeta Maniphest Tasks: T6 Differential Revision: https://asm.shalture.org/D1
Diffstat (limited to 'config-default/dnsbl.xml')
-rw-r--r--config-default/dnsbl.xml37
1 files changed, 0 insertions, 37 deletions
diff --git a/config-default/dnsbl.xml b/config-default/dnsbl.xml
deleted file mode 100644
index 01f72b4..0000000
--- a/config-default/dnsbl.xml
+++ /dev/null
@@ -1,37 +0,0 @@
-<dnsbl>
- <query id="rbl.efnetrbl.org.">
- <response id="127.0.0.1">Open proxy</response>
- <response id="127.0.0.2">Trojan spreader</response>
- <response id="127.0.0.3">Trojan infected client</response>
- <response id="127.0.0.4">TOR exit server</response>
- <response id="127.0.0.5">Drones / Flooding</response>
- </query>
- <query id="dnsbl.dronebl.org.">
- <response id="127.0.0.1">Testing data</response>
- <response id="127.0.0.2">Sample</response>
- <response id="127.0.0.3">IRC Drone</response>
- <response id="127.0.0.5">Bottler</response>
- <response id="127.0.0.6">Unknown spambot or drone</response>
- <response id="127.0.0.7">DDOS drone</response>
- <response id="127.0.0.8">SOCKS proxy</response>
- <response id="127.0.0.9">HTTP proxy</response>
- <response id="127.0.0.10">ProxyChain</response>
-<!-- <response id="127.0.0.13">Brute force attackers</response> -->
- <response id="127.0.0.14">Open Wingate Proxy</response>
- <response id="127.0.0.15">Compromised router / gateway</response>
-<!-- <response id="127.0.0.17">Automatically determined botnet IPs (experimental)</response> -->
- <response id="127.0.0.255">Unknown</response>
- </query>
- <query id="dnsbl.sorbs.net.">
- <response id="127.0.0.2">HTTP Proxy</response>
- <response id="127.0.0.3">SOCKS Proxy</response>
- <response id="127.0.0.4">Misc. proxy</response>
- </query>
- <query id="dnsbl.incredibl.org.">
- <response id="127.0.0.2">SOCKS Proxy</response>
- <response id="127.0.0.3">IRC Proxy</response>
- <response id="127.0.0.4">HTTP Proxy</response>
- <response id="127.0.0.5">IRC Drone</response>
- <response id="127.0.0.6">TOR</response>
- </query>
-</dnsbl>