[rbldnsd] how to make public (DNS)RBL?

Chris. cth at fastmail.ca
Sun May 17 04:03:54 MSD 2009


On Sat, 16 May 2009 20:42:31 +0000 (UTC), Chris. wrote...

> On Sat, 16 May 2009 12:31:31 -0400, Steven Champeon wrote...
> 
>> on Sat, May 16, 2009 at 10:16:18AM +0000, Chris. wrote:
>> 
>> <snip completely unrelated but nevertheless bizarre Javascript story>
>> 
>>> So if I understand you correctly, if any "admins" attempt to use
>>> my system, they'll have no idea whether the lists are good, or bad.
>> 
>> No, if you expect anyone to use it, you need to publish a set of
>> criteria by which you list IPs. Nothing to do with hype - if
>> anything, Jon and Dave and the rest have been trying to point out to
>> you that blocking 1/4 of the Internet isn't a bold claim, it's
>> probably a sensible course to take given million-host botnets, but
>> it's *irrelevant* in the context of this discussion. I could provide
>> you with a DNSBL that lists five hundred thousand IPs, but if they're
>> all legit mail hosts, you'll end up with a high FP rate should you
>> use that list to block inbound mail. Go, now, and read the BCP I
>> sent.
> 
> LOL. Sorry. I'm afraid I've been a bit overburdened lately, and as a
> consequence, I'm a bit detached, and /reactive/ - see; "knee jerk".
> Henceforth, I do solemnly swear to read the responses in these
> threads. Then walk away from the console, and wait no less than 1hr.
> before responding. Gah! Now, in retrospect it all seems so clear. I
> feel terrible, and am very grateful for all the thoughtful responses -
> even tho I didn't recognize all of them.
> 
> ...and now, a direct response to the response(s), as they were
> intended. :) Steven, thank you for the pointer (article) - I
> /actually/ understood that, and I /was/ looking for it. - /really/
> 
> I have read all of it (again) and actually /do/ have a layout - just
> not yet in print. I'll post them (or a link) here today, or early
> tomorrow. Actually, it occurs to me just now, that I'd rather provide
> a bit more /articulated/ version here in response. It'll be a bit
> more terse, as the readers have a better understanding, so I can
> use a different language. Those were "props" to the subscribers here,
> in case it wasn't noticed. :)
> I'm in the middle of a "build session/marathon" as I write this.
> So since it hasn't yet been an hour, I'm going to break it off here,
> and honor my oath, and report back with a /direct/ response to
> the yours (and some of the others like it). Consider this one
> a well deserved apology. :)
> 
> Back in about an hour...

I'm back. Here's a rough outline on filtering practices employed:

DATA is filtered/categorized in the (roughly) following fashion:

I should preface this by saying that I have a /highly/ sophisticated
system that has been in constant development for some 25yrs. That said...

Audit trails are maintained, I possess/maintained a /painfully/ detailed
account regarding all listings - in other words, if I've been under attack
I /always/ know the origin, as well as the /complete/ trail to the final
destination (me/my network)

If attacked, I add the entire trail in the following fashion:
o origin - nabuse
o trail: (those deflected from, or used to proxy the attack) - unmantaind,
  or hacked

o hacked: IP's belonging to computers that have been hacked, or are easily
  compromised - hacked

o unmaintained: addresses (typically blocks) that are registered but unused,
  or those those that are registered but still belong in bogon - unmaintained

o never: addresses that were "scarfed up" from failed companies that never
  returned their blocks (most of which came from the days when IP's were free -
  I miss those days) - never

o dynamic: dynamic blocks used by ISP/providers, typically for dialup, or short
  term leases/dhcp - dynamic

o spammer: IP's lodging dictionary attacks against my MX's, IP's from which I
  receive actual UCE - spammer

o test: the lights are on, and nobodys home - test

The names chosen are all tentative. I used them for R&D for the past 1+ years
of testing rbldnsd, and development of my system

How do you define "attack"?
o These are defined by actions such as pinging for the sake of developing time
  tables/strategies for launching smurf, of spoofs.

o ssh attempts, which can/do include brute force/dictionary attacks, or otherwise.

o sweeps; port scans, or incessant attempts against known services.

This is not /yet/ an "all inclusive" list, but covers the bulk of criteria that
one would most probably be interested.
I should also note that I keep current with the bogon, and the list(s) always
reflect the current state.

Feel free to inquire further. :)

If you would care to contact me off list regarding this - please feel free.

On that subject:
@mjt
It has always been my intention to limit thread to subjects specific to rbldnsd.
But it appears because of the ultimate goal of my use of rbldnsd, some /deviation/ is
required. I promise to do my best to keep it "on track", but will be happy to start
my own mailing list against one of my own @ address. Point being, I don't want you
to think that I'm attempting to abuse your list.

Thank you, and everyone else involved.

Sincerely,
 Chris

> 
> --Chris
> 
>> 
>> /me resists urge to also school you on DHTML, which is not the same
>> as Javascript, and certainly wasn't around in 1994. ;)
>> 
>> At any rate, I think this troll is full to bursting, and we should
>> all just let him go off and sit under another bridge.
>> 
>> Steve
>> 
>> --
>> hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w:
>> http://hesketh.com/ antispam news, solutions for sendmail, exim,
>> postfix: http://enemieslist.com/
>> _______________________________________________ rbldnsd mailing list
>> rbldnsd at corpit.ru
>> http://www.corpit.ru/mailman/listinfo/rbldnsd
> _________________________________________________________________
> http://fastmail.ca/ - Fast Secure Web Email for Canadians
> _______________________________________________
> rbldnsd mailing list
> rbldnsd at corpit.ru
> http://www.corpit.ru/mailman/listinfo/rbldnsd
_________________________________________________________________
    http://fastmail.ca/ - Fast Secure Web Email for Canadians


More information about the rbldnsd mailing list