On 4/12/2013 12:58 AM, /dev/rob0 wrote:
...
> So here's my idea (I think the parameter names are lousy, but it's 
> the best I could come up with this late at night):
...

Or....

Maybe you could bash script this:

dig +short txt _netblocks.google.com|sed s/ip4://g \
|mawk '{for(i=2; i<=(NF-1); i++){print($i)}}'

which yields this formatted list of Google outbound CIDRs:

216.239.32.0/19
64.233.160.0/19
66.249.80.0/20
72.14.192.0/18
209.85.128.0/17
66.102.0.0/20
74.125.0.0/16
64.18.0.0/20
207.126.144.0/20
173.194.0.0/16

then diff this against your postscreen whitelist and append any new
entries.  You'd cron this to a $suitable_interval, say nightly.  If/when
Google adds any new outbound networks you're covered.

This seems quite a bit less effort than Wietse adding the feature you
requested.  The end result is nearly identical, at least for the Google
case, and can easily be extended to cover other domains.  And with this
method the Google outbounds skip all Postscreen processing entirely, not
just the after 220 tests.

-- 
Stan

Reply via email to