• Advisory services
  • Consultations
  • Network and technology policies
  • Network and technology service docs
  • Using Jisc community
  • Network and technology service docs
  • Domain name registration
  • How to sign up
  • Janet Support Manual
  • Janet CSIRT
  • Back-up services
  • eduroam
  • Backup Web Hosting
  • Certificate Service
  • Connection timeline
  • Eligibility
  • Janet 3G Buyer's Guide
  • Janet 3G eduroam interoperablity authentication methods
  • Janet Mail Services
  • Janet Network Charges
  • Janet Reach
  • Janet Videoconferencing Feedback results
  • Primary connections
  • Supporting Business Continuity
  • Business and Community Engagement (BCE) using Janet
  • Cost
  • Interconnect connections
  • Connecting student accommodation
  • Customer-owned routing equipment
  • Obtaining a Janet IP Address Range
  • Terms for the Provision of the Janet Service
  • Upgrading your existing bandwidth and Janet router
  • Fault reporting
  • IP address assignment
  • Janet Aurora
  • Janet Netsight
  • Janet txt
  • Routers
  • Network set-up
  • Guest access
  • Network time service
  • Training
  • Contact
  • Primary Nameserver Service
  • Secondary Nameserver Service
  • Vscene
  • Janet Mail Services
  • Advice on delivering email to remote services
  • Janet Site E-mail Requirements
  • Spam-relay Tester And Notification system
  • Allow and deny lists
  • Allow and deny lists
  • What to do if your mail is being blocked
  • The Spamhaus Zen lists in Janet
  • The URIBL List in Janet
  • DNSWL.org in Janet

Allow and deny lists

Download as PDFDownload as PDF

Janet has its own copies of the following leading allow and deny lists:

DNS deny lists are a well-established technique. They identify sources of e-mail abuse as lists of IP address blocks, enabling Janet organisations to quickly and easily reject a high proportion of unwanted e-mail.

Allow lists contain all currently known good email servers, and are the opposite of deny lists, mail from the allow listed e-mail addresses, domains, and/or IP address should generally be allowed. Using Allow lists and deny lists assists in blocking unwanted messages while allowing wanted messages to get through. E-mail allow lists are used to reduce the incidence of false positives and to speed up the filtering process, as they are often based on the assumption that most legitimate mail will be from a relatively small and fixed set of senders.

Unlike most deny lists, URIBLs are not lists of message senders but URLs (Web addresses, some but not all representing undesirable sites) which have been seen in e mail messages identified as spam or phishing, or are otherwise dangerous. Links seen in such messages tend to be more stable than the rapidly changing botnet IP addresses used to send the vast majority of them. The Spamhaus sender lists can be used in a first stage filter and the URIBL lists can help in a second stage filter to find many of the otherwise difficult, remaining unwanted messages.

If you think that a Janet DNSBL is affecting the delivery of your e-mail messages, please read this page: