This is still wasted busy work. There are much simpler ways to stop ssh false login attempts and garbage to website guest books.
In ipfw use rule limit option or change port number ssh uses and only give your ssh port number to your user group. And for all websites add a noise image to stop robots from auto entering garbage. You should use the correct tools instead of some over kill method. 3 million ip table entry's is plain stupid. I fired my system admin when I caught him trying to do the same stupid thing. -----Original Message----- From: Dan Mahoney, System Admin [mailto:[EMAIL PROTECTED] Sent: Sunday, June 11, 2006 10:43 AM To: fbsd Cc: [EMAIL PROTECTED] Subject: RE: Deny large number of IPs via ipfw On Sun, 11 Jun 2006, fbsd wrote: > Using such an list of ip address from a major rbl is flawed at the > core of the idea. > Over 85% of those 3 million ip address are spoofed in the first > place. > Most are what would be called false positives. > > Reread the info at the source cbl.abuseat.org it says the data is > not intended to be used the way you are trying to use it. All it says is: "We're getting a lot of reports of spurious blocking caused by sites using the CBL to block authenticated access to smarthosts / outgoing mail servers. THE CBL is only designed to be used on INCOMING mail, i.e. on the hosts that your MX records point to." Which I take to mean, yeah, if you're using it on sendmail, you allow SMTP AUTH to override blacklists (this is the case by default.) Whereas my intention would be to use it to block ports such as 80 and 22. Every system I've found trying to brute-force SSH on my box has already been in this database, and by using mod_access_rbl for apache I was able to catch and block a dozen or so attempts to post spammish content to guestbooks and the like (but I'd like to do this without the overhead of apache DNS lookups). Thanks for your input, though. -Dan > > You really need to rethink what you are doing. > > > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Dan > Mahoney, > System Admin > Sent: Sunday, June 11, 2006 8:36 AM > To: [EMAIL PROTECTED] > Subject: Deny large number of IPs via ipfw > > > Hey all, > > I've got a file that I just synced from a major RBL, and I'd like to > just > use it to globally deny access to my system. Is there an easy way > to do > this within ipfw -- the file is about 3 *million* lines, and is from > cbl.abuseat.org. > > -Dan > > -- > > "SOY BOMB!" > > -The Chest of the nameless streaker of the 1998 Grammy Awards' Bob > Dylan > Performance. > > --------Dan Mahoney-------- > Techie, Sysadmin, WebGeek > Gushi on efnet/undernet IRC > ICQ: 13735144 AIM: LarpGM > Site: http://www.gushi.org > --------------------------- > > _______________________________________________ > email@example.com mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "[EMAIL PROTECTED]" > -- "I am a professional drinker, and I know that that was NOT Jose Cuervo!" "Well, what was it then?" "I think it was some mixture of Rubbing Alcohol, and Desenex(TM) Foot Powder, because my feet feel okay, and my back doesn't hurt, but my stomach is killing me!" -Dan Mahoney, Costa Rica, August 12th, 1994 --------Dan Mahoney-------- Techie, Sysadmin, WebGeek Gushi on efnet/undernet IRC ICQ: 13735144 AIM: LarpGM Site: http://www.gushi.org --------------------------- _______________________________________________ firstname.lastname@example.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"