[117277] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Repeated Blacklisting / IP reputation

daemon@ATHENA.MIT.EDU (Justin Shore)
Tue Sep 8 16:00:23 2009

Date: Tue, 08 Sep 2009 14:57:17 -0500
From: Justin Shore <justin@justinshore.com>
To: "Wayne E. Bouchard" <web@typo.org>
In-Reply-To: <20090908184444.GA68989@typo.org>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Wayne E. Bouchard wrote:
> Best practices for the public or subscription RBLs should be to place
> a TTL on the entry of no more than, say, 90 days or thereabouts. Best
> practices for manual entry should be to either keep a list of what and
> when or periodically to simply blow the whole list away and start anew
> to get rid of stale entries. Of course, that is probably an unreal
> expectation.

I've had to implement something similar for my RTBH trigger router. 
After manually-adding nearly 20,000 static routes of hosts that scanned 
for open proxies or attacked SSH daemons on my network I had to trim the 
block list considerably because many of my older PEs couldn't handle 
that many routes without problems.  I already named each static with a 
reason for the block(SSH, Telnet, Proxy-scan, etc) but ended up 
prepending a date to that string as well:  20090908-SSH-Scan.  That way 
I can parse the config later on and create config to negate everything 
that's older than 3-4 months.  If one of those old IPs is still trying 
to get to me after 4 months then it will get readded the next time I 
process my logs entries.  If they aren't trying to hit me then they'll 
no longer be consuming space in my RIB.

Justin




home help back first fref pref prev next nref lref last post