[63001] in North American Network Operators' Group
Re: Any way to P-T-P Distribute the RBL lists?
daemon@ATHENA.MIT.EDU (william@elan.net)
Wed Sep 24 22:21:16 2003
Date: Wed, 24 Sep 2003 16:44:58 -0700 (PDT)
From: william@elan.net
To: nanog@nanog.org
Cc: Drew Weaver <drew.weaver@thenap.com>
In-Reply-To: <75634F04BFCFD511BF69009027DC86495C6660@mailman.thenap.com>
Errors-To: owner-nanog-outgoing@merit.edu
Send RBL lists & updates by email :)
I'm mostly serious - rbl lists can be easily incorporated as special filter
for email or it can run internal rbl (rbldns is very small code), emails
sent with specific characteristics can be filtered to trigger the update
(all such emails would need to be signed and signature can be verified by
recepient mail server to be one on its allowed rbl list). Any attempts to
DoS origin of such email updates would be useless as origin can be changes
very easily and the updates do not depend on working dns. Blacklist's
websites would still be subject to DoS attacks, but that is separate
issue and would not stop with blacklist actual use.
On Wed, 24 Sep 2003, Drew Weaver wrote:
> I know you all have probably already thought of this, but can
> anyone think of a feasible way to run a RBL list that does not have a single
> point of failure? Or any attackable entry?
>
>
>
> Disregard this if im totally out of line, but it would seem to me that this
> would be possible.
>
>
>
> Thanks,
>
> -Drew
--
William Leibzon
Elan Networks
william@elan.net