discuss AT lists.opennicproject.org
Subject: Discuss mailing list
List archive
- From: Jeff Taylor <shdwdrgn AT sourpuss.net>
- To: discuss AT lists.opennicproject.org
- Subject: Re: [opennic-discuss] [SHAME] Spam Rats
- Date: Thu, 10 Jan 2013 16:06:16 -0700
For what its worth, my servers already generate a bunch of files
daily based on the quantity of queries made to the servers each
day. Of course a business IP could generate 1000x the traffic as a
home IP, so that data is probably not a reliable source for
blacklisting on. This data can be found in the various folders at http://opennic.oss/filters/. The number specifies the minimum number of queries (daily) before an IP gets put on each list, and there are lists for averages based on certain numbers of days. On the other hand, I still receive a HUGE amount of dns query traffic directed at my old T2 IP address, which was taken out of service three or four years ago, and has not answered any queries since then. These IPs I can only assume must be bots using extremely old data. So I generate a bind9 ACL file on a daily basis and post this file in the same folder (http://opennic.oss/filters/acl.blacklist). The comments in the file give the number of queries received by that IP yesterday. I do trust the data in this file for legitimate blacklisting, but of course if I were to blacklist them myself, then I couldn't generate the daily files. Any of the lists containing the hit count will be sorted by number of hits. All other lists are sorted by IP address. These lists are IPv4-only. Let me know if they are of any use to anyone. On 01/10/2013 12:00 PM, Jamyn Shanley
wrote:
I actually think there would be some benefit to
running an ossec client on the T2 nodes that reports abusive
behavior to a controller, so we could block abusive traffic
preemptively on the other nodes. That way if they abuse node 1,
node 2 already has a dynamic filter in place when they switch
nodes after they're ratelimited.
It would not be too hard to parse spammer IPs from
the reliable RBLs and share them across the network, but I
don't know if there's any interest/demand.
On Thu, Jan 10, 2013 at 11:46 AM, Jeff
Taylor <shdwdrgn AT sourpuss.net>
wrote:
I've been using sbl-xbl.spamhaus.org
and zombie.dnsbl.sorbs.net
for the last couple years with good success, although
checking my logs just now it appears the sorbs list has
not actually had any hits recently...
I've been wondering if there's a way to correlate the abusive traffic we see on the T2 servers with spammers, but I've never taken the time to really do any digging. On 01/10/2013 08:23 AM, Jamyn Shanley wrote:
|
- [opennic-discuss] [SHAME] Spam Rats, Julian DeMarchi, 01/09/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Simon, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jamyn Shanley, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jeff Taylor, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jamyn Shanley, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Simon, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Julian DeMarchi, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jeff Taylor, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Simon, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jamyn Shanley, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jeff Taylor, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Jamyn Shanley, 01/10/2013
- Re: [opennic-discuss] [SHAME] Spam Rats, Simon, 01/10/2013
Archive powered by MHonArc 2.6.19.