On 16-08-30 12:43 PM, Michael Wise via mailop wrote:
We could use one to call out the location of colo servers that should never be 
connecting on port 443, for instance.

Um, I can think of a reason why that might not be perfect.. For instance cloud services which monitor your email box for you..

But we get what you mean, having just helped a client that was undergoing a 'dictionary attack' from one.. (Was actually trying POP/IMAP/POPSSL/IMAPSSL) Shoutout to VolumeDrive. <sic>

And of course, most people already have a 'local' way of blacklisting them, methods similar to fail2ban etc..

However, it is funny you mention this.. launching a new DNSBL data collection method just for these types of 'hack' sources..

But not sure if DNSBL is the way to use this data.. And the moment we do, of course they just move back to BOTs on DYNA.. and of course you can't block access to 443 from the dynamic IP Address space, because that is where the legitimate users of 443 are..

Which is why we are pushing for changes to the protocols themselves..
Pushing for demanding better public listing of the operators of colo servers (rwhois/SWIP) ..

But, sometimes.. (and back to Michelle and the early days of SORBS) sometimes, aggressive DNSBL listings do force REAL change among operators, to actually do something about their business models of allowing that type of activity on their networks..

But given the recent spike's in activity of 'cloud' providers ..

(eg, you might like to block anything from www-data@ that comes from cloudapp.net, especially if it was generated from a PHP Script)

Return-Path: <www-d...@mail.live.com>
Received: from weifuh-ff12.cloudapp.net (HELO mail.live.com) (40.74.120.249)
Received: by mail.live.com (Postfix, from userid 33)
Subject: Nota Fiscal EletrĂ´nica Nacional de serie/nĂºmero [2/709460] - [ 935453087 ]
X-PHP-Originating-Script: 0:d3jcfdmypm7hett.php

.. you can expect that another round of controversy surrounding reputation providers is coming nigh.. there is more and more talk around making the providers responsible for activity on their networks.. in that vein, DNSBL's are the least of their worries.

The Digital Ocean's and Amazon's might have started this new opportunity for spammers and hackers (eg anonymous clouds) but now everyone is building one.. $1 VPS's.. anonymous clouds..

Not surprising everyone is building a DNSBL ;)

PS, while we might thank Microsoft for making the information on AZURE space available, maybe Microsoft could do a couple of things..

* Make the information available in a DNSBL format
* SWIP the space as being used for AZURE

NetRange:       40.74.0.0 - 40.125.127.255
CIDR: 40.125.0.0/17, 40.74.0.0/15, 40.76.0.0/14, 40.124.0.0/16, 40.120.0.0/14, 40.112.0.0/13, 40.80.0.0/12, 40.96.0.0/12

Even better..
* Block traffic to Port 25 et al on Egress from the space (they can use Port 587 Submissions and relays)

Oh, yeah.. but you mentioned they were attacking Port 443 ;)
Umm... we could do that from a script on Azure I assume as well.





--
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
------------------------------------------------------------------------
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended solely for the use of the individual or entity to which they are addressed. Please note that any views or opinions presented in this email are solely those of the author and are not intended to represent those of the company.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to