[118763] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: dealing with bogon spam ?

daemon@ATHENA.MIT.EDU (Justin Shore)
Wed Oct 28 14:47:57 2009

Date: Wed, 28 Oct 2009 13:46:39 -0500
From: Justin Shore <justin@justinshore.com>
To: Michiel Klaver <michiel@klaver.it>
In-Reply-To: <4AE80553.4060602@klaver.it>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Michiel Klaver wrote:
> I would suggest to report that netblock to SpamHaus to have it included 
> at their DROP list, and also use that DROP list as extra filter in 
> addition to your bogon filter setup at your border routers.
> 
> The SpamHaus DROP (Don't Route Or Peer) list was specially designed for 
> this kind of abuse of stolen 'hijacked' netblocks and netblocks 
> controlled entirely by professional spammers.

As a brief off-shoot of the original topic, has anyone scripted the use 
of Spamhaus's DROP list in a RTBH, ACLs, null-routes, etc?  I'm not 
asking if people think it's safe; that's up to the network wanting to 
deploy it.  I'm wondering if anyone has any scripts for pulling down the 
DROP list, parsing it into whatever you need (static routes on a RTBH 
trigger router or ACLs on a border router and then deployed the config 
change(s).  I don't want to reinvent the wheel is someone else has 
already done this.

Thanks
   Justin




home help back first fref pref prev next nref lref last post