On Fri, 2021-06-04 at 18:08 -0500, Scott Mutter via mailop wrote:
> On Fri, Jun 4, 2021 at 1:24 PM Michael Peddemors via mailop
> <mailop@mailop.org> wrote:
> > With apache, you can use modsecurity quite easily, and you can block all 
> > azure (and other cloud providers ranges) from certain services like 
> > wordpress, or contact forms etc.. (you can even do dns based checks or 
> > rbldnsd) ..
> > 
> > 
> 
> 
> Are there any links for this? AFAIK mod_security is just a module - to
> actually do anything it requires a ruleset.  Further from that, how does it
> determine what is Azure and what is not?  Is it just blocking IP addresses? 
> Seems you'd need a list of all of the Azure IP address space.  And from what
> I have seen the offending IPs are all over the place:
> 
> 157.55.39.138
> 207.46.13.5
> 20.83.33.136
> 20.94.247.9
> 40.124.141.27
> 40.124.141.27
> 40.124.193.244
> 40.76.220.206
> 
> Are just a few.
> 
> But if there's a way to block Azure and other cloud based services, I'd be
> interested in that.  But I'd suspect you'd need a list of all of their IP
> address spaces - is that information available some where?

These should give everything routed to AS8075 (Microsoft) as of yesterday.
It's a good start.

V4URL=`curl -s
https://publicdata.caida.org/datasets/routing/routeviews-prefix2as/pfx2as-creation.log
-o -  | tail --lines=1 | awk '{print
"https://publicdata.caida.org/datasets/routing/routeviews-prefix2as/"$3}'` ;
curl -s "${V4URL}" -o - | zegrep "\s8075$" | awk '{print $1"/"$2}'

V6URL=`curl -s
https://publicdata.caida.org/datasets/routing/routeviews6-prefix2as/pfx2as-creation.log
-o -  | tail --lines=1 | awk '{print
"https://publicdata.caida.org/datasets/routing/routeviews6-prefix2as/"$3}'` ;
curl -s "${V6URL}" -o - | zegrep "\s8075$" | awk '{print $1"/"$2}'


_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to