[118765] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: dealing with bogon spam ?

daemon@ATHENA.MIT.EDU (Jason Bertoch)
Wed Oct 28 14:57:43 2009

Date: Wed, 28 Oct 2009 14:56:47 -0400
From: Jason Bertoch <jason@i6ix.com>
To: nanog@nanog.org
In-Reply-To: <4AE8918F.5010805@justinshore.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Justin Shore wrote:
> Michiel Klaver wrote:
>> I would suggest to report that netblock to SpamHaus to have it 
>> included at their DROP list, and also use that DROP list as extra 
>> filter in addition to your bogon filter setup at your border routers.
>>
>> The SpamHaus DROP (Don't Route Or Peer) list was specially designed 
>> for this kind of abuse of stolen 'hijacked' netblocks and netblocks 
>> controlled entirely by professional spammers.
>
> As a brief off-shoot of the original topic, has anyone scripted the 
> use of Spamhaus's DROP list in a RTBH, ACLs, null-routes, etc?  I'm 
> not asking if people think it's safe; that's up to the network wanting 
> to deploy it.  I'm wondering if anyone has any scripts for pulling 
> down the DROP list, parsing it into whatever you need (static routes 
> on a RTBH trigger router or ACLs on a border router and then deployed 
> the config change(s).  I don't want to reinvent the wheel is someone 
> else has already done this.
Downloading and parsing is easy.  I used to drop it into the config for 
a small dns server, rbldnsd I believe, that understands CIDR and used it 
as a local blacklist.  It did very little to stop spam and I was never 
brave enough to script an automatic update to BGP.


home help back first fref pref prev next nref lref last post