Devdas Bhagat wrote:
> On 20/07/06 12:49 +0530, Amish Mehta wrote:
>> Three ways to do this and not at all expensive:
>> 1) Make your DNS server host blogspot.com and redirect ALL
>> port 53 traffic to it and block blockedblog.blogspot.com
>> requests.

> If you want to be authoritative for blogspot.com, then you
> have to deal with every domain under it as well. You would
> merely want to be authoritative for blockedhost.blogspot.com,
> which is trivially circumventable with /etc/hosts.

blockedblog is just an example. /etc/hosts wont work as you need
entry for each subdomain. DNS wildcards or DNS forwarders can
be setup easily.


>> 2) Use transparent proxy which also does SNAT, back to
>> original IP for outgoing packets.

> And which works at Gigabit speeds and has vendor backing.

Didnt get you, but anyway this wasn't my recommended way either.
But can work for small ISPs.

>> 3) Just like ip_conntrack_ftp module which tracks PORT commands,
>> develop ip_conntrack_http module which tracks HTTP "Host:"
>> header and blocks the blocked sites.

> And then make the system even more complex by routing stuff
> to a Linux box. Unless you think that ISPs run Linux boxes for
> their ATM and SONET circuits?

This is an idea/method (with ip_conntrack as analogy).
And doesnt generally pertain to Linux. Many routers do protocol
(VPN, Skype, MSN etc) based "packet" filtering. Writing a code
for HTTP filtering and implementing it on chip is no big deal.

I dont think it adds any kind of complexity.
a) Idea is capture packet on port 80.
b) Analyse "Host:" header.
c) Check acl
d) Block or pass.

Amish.
-- 
http://mm.glug-bom.org/mailman/listinfo/linuxers

Reply via email to