[172641] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Team Cymru / Spamhaus

daemon@ATHENA.MIT.EDU (SysIT)
Fri Jun 27 13:05:06 2014

X-Original-To: nanog@nanog.org
From: SysIT <IT@SysAccess.net>
To: Adam Greene <maillist@webjogger.net>, 'NANOG list' <nanog@nanog.org>
Date: Fri, 27 Jun 2014 15:22:47 +0000
In-Reply-To: <01c301cf921a$f1d61d60$d5825820$@webjogger.net>
Errors-To: nanog-bounces@nanog.org

That wont stop a DoS.

A DoS or DDoS is pure bandwidth wars for the most part, if someone is to Do=
S you, they already have your IP's and urls they need to attack you, thus a=
 spam list won't stop an attack.

If you want to minimize actual spam, sure.

-----Original Message-----
From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Adam Greene
Sent: Friday, June 27, 2014 9:18 AM
To: 'NANOG list'
Subject: Team Cymru / Spamhaus

Hi all,

=20

We're evaluating whether to add BGP feeds from these two sources in attempt=
 to minimize exposure to DoS.

=20

The Team Cymru BOGON list (

http://www.team-cymru.org/Services/Bogons/bogon-bn-nonagg.txt or

http://www.team-cymru.org/Services/Bogons/bogon-bn-agg.txt

)

looks promising and common-sense.=20

=20

We already filter RFC1918 inbound at our edge, and are interested to see if=
 adding the rest of the blocks will have a significant positive effect.

=20

If it does, we're planning to try the IPv4 FULLBOGON list:

=20

http://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt

=20

We're a little more leery about trying Spamhaus's BGPf service (DROP, EDROP=
 and BCL,=20

=20

http://www.spamhaus.org/bgpf/

)

=20

because we really want to avoid false positives.=20

=20

Just wondering if anyone has any words of caution ("False positives! Avoid =
FULLBOGONS and Spamhaus!"), or words of praise ("Do it all! These services =
are wonderful!") before we take the plunge.

=20

Thanks,

Adam


home help back first fref pref prev next nref lref last post