Hi there,

On Thu, 27 Oct 2011 Michelle Konzack wrote:

> Am 2011-10-17 13:28:43, hacktest Du folgendes herunter:
>
> > ... I found that setting up iptables to do drops for known bad
> > IPs/ranges was slightly better as the traffic never gets to BIND
> > ...
> > Example rules for various IPs that have annoyed me in the past:
> > -A RH-Firewall-1-INPUT -s 68.222.240.22 -j DROP
> > -A RH-Firewall-1-INPUT -s 203.142.82.222 -j DROP
> > -A RH-Firewall-1-INPUT -s 217.54.97.137 -j DROP
> > -A RH-Firewall-1-INPUT -s 217.219.20.226 -j DROP
> > -A RH-Firewall-1-INPUT -s 218.212.248.7 -j DROP
>
> ...and you get the hell on you ass if you have several 1000 of them!
> In this case, bind9 with RPZ is cheaper.

Maybe look at ipsets.  Currently we firewall almost 76,000 networks.

[root@mail3 ~]# ipset -L | grep -v BLOCK | wc -l
  75845

--

73,
Ged.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to