On Tue, 13 Apr 2004, David F. Skoll wrote:

>On Tue, 13 Apr 2004, Kelson Vibber wrote:
>
>> Then SURBL should be fine.  It's just a RHSBL, built from domains
>> advertised in spam rather than domains that (appear to) send it.  A client
>> using SURBL just parses URLs out of the message and queries the domain
>> names against the SURBL zone.
>
>It still makes me nervous.  An attacker could put hundreds of URLs
>in the message, leading to hundreds of SURBL lookups.  This kind of
>traffic-amplification just screams DoS to me.  But then, I tend to
>be more paranoid than most. :-)
>
>I think SURBL should be used for (let's say) the first 20 URLs in a
>message, and if there are more than 20 URLs in the message, it should get
>a big spam score and further SURBL lookups suppressed.
>
>Regards,

Personally I think any RBL is a DoS waiting to happen. All it takes is 
them being down/broken/etc and poof your servers are down for a bit with 
the usual management questions of why did you allow it to happen.

The only way I would use an RBL in a large production enviroment is if 
they had a DB push mechanism where I could sign up for a daily DB4 and 
source file from either a central site or some osrt of P2P cloud. 

But I am a grumpy young sysadmin.

-- 
Stephen John Smoogen            [EMAIL PROTECTED]
Los Alamos National Lab  CCN-5 Sched 5/40  PH: 4-0645
Ta-03 SM-1498 MailStop B255 DP 10S  Los Alamos, NM 87545
-- You should consider any operational computer to be a security problem --
_______________________________________________
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to