Re: [Dshield] fingerprinting servers before accepting

2004-12-02 Thread John Hardin
On Thu, 2004-12-02 at 11:53, Joe Emenaker wrote: > Christopher X. Candreva wrote: > > >On Wed, 1 Dec 2004, Robert LeBlanc wrote: > > > >This actually sounds like it would be a good public DNSBL. Rather than have > >everyone fingerprint, the central DNSBL would perform fingerprinting of IPs > >th

Re: [Dshield] fingerprinting servers before accepting

2004-12-02 Thread Joe Emenaker
Christopher X. Candreva wrote: On Wed, 1 Dec 2004, Robert LeBlanc wrote: This actually sounds like it would be a good public DNSBL. Rather than have everyone fingerprint, the central DNSBL would perform fingerprinting of IPs that are requested and not in the cache, then cache the results. Otherw

Re: [Dshield] fingerprinting servers before accepting

2004-12-02 Thread Christopher X. Candreva
On Wed, 1 Dec 2004, Robert LeBlanc wrote: > One workaround might be to use a local DNSBL (e.g. rbldnsd), and create > a new IP address entry in the DNSBL based on the p0f results. A script This actually sounds like it would be a good public DNSBL. Rather than have everyone fingerprint, the cent

Re: [Dshield] fingerprinting servers before accepting

2004-12-02 Thread SM
Hi Joe, At 15:51 01-12-2004, Joe Emenaker wrote: That was the first thought through my mind when I read the original post. No need for a full-blown fingerprint... just see if they look "server-ish" or not. Try connecting to 25... and then maybe telnet, ssh, http, and imap. You cannot assume that

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread Joe Emenaker
SM wrote: At 08:54 01-12-2004, John Hardin wrote: However, this sounds like it might be useful in Spamassassin: attempt to contact the sender on port 25, and add a little to the spamminess score if the connection is refused or times out. That was the first thought through my mind when I read the o

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread Robert LeBlanc
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John Hardin wrote: | On Wed, 2004-12-01 at 03:30, Paul L Daniels wrote: | |>An interesting idea was floated by my eyeballs recently for combatting |>invalid email (especially since zombie machines are now rather |>prevailant), what if you could fingerpr

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread SM
Hi John, At 08:54 01-12-2004, John Hardin wrote: Interesting idea. It sounds a little heavy to be doing for every inbound message, though, and it assumes that you're letting fingerprinting traffic out of your network - I, for example, block all NetBIOS and similar ports at my boundary, so fingerpri

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread John Hardin
On Wed, 2004-12-01 at 09:05, Jason Philbrook wrote: > On Wed, Dec 01, 2004 at 08:54:00AM -0800, John Hardin wrote: > > However, this sounds like it might be useful in Spamassassin: attempt to > > contact the sender on port 25, and add a little to the spamminess score > > if the connection is refuse

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread Jason Philbrook
On Wed, Dec 01, 2004 at 08:54:00AM -0800, John Hardin wrote: > On Wed, 2004-12-01 at 03:30, Paul L Daniels wrote: > > An interesting idea was floated by my eyeballs recently for combatting > > invalid email (especially since zombie machines are now rather > > prevailant), what if you could fingerpr

Re: [Dshield] fingerprinting servers before accepting

2004-12-01 Thread John Hardin
On Wed, 2004-12-01 at 03:30, Paul L Daniels wrote: > An interesting idea was floated by my eyeballs recently for combatting > invalid email (especially since zombie machines are now rather > prevailant), what if you could fingerprint the sending server and > (say) deny all Win XP/95/98 machines fro