Active Topics

 


Reply
Thread Tools
peterleinchen's Avatar
Posts: 4,118 | Thanked: 8,901 times | Joined on Aug 2010 @ Ruhrgebiet, Germany
#31
Yes.
Of course if that net is used by spammers...
__________________
SIM-Switcher, automated SIM switching with a Double (Dual) SIM adapter
--
Thank you all for voting me into the Community Council 2014-2016!

Please consider your membership / supporting Maemo e.V. and help to spread this by following/copying this link to your TMO signature:
[MC eV] Maemo Community eV membership application, http://talk.maemo.org/showthread.php?t=94257

editsignature, http://talk.maemo.org/profile.php?do=editsignature
 

The Following User Says Thank You to peterleinchen For This Useful Post:
Feathers McGraw's Avatar
Posts: 654 | Thanked: 2,368 times | Joined on Jul 2014 @ UK
#32
What do we actually use to fight spam here, is it something at the webserver level (like ModSecurity) or is it a vBulletin plugin?

For tools like ModSecurity it's possible to make the RBL lookups just one part of the decision on whether to block or not by calculating an anomaly score for each transaction.

My configuration turns on some extra rules for fighting spam (keyword blocking) when the IP address matches a RBL lookup for spam source.

Something like that might make the blocking less likely to affect legitimate posts. Lots of cool things are possible with ModSecurity, many of them have already been written into the Core Rule Set (CRS):

https://github.com/SpiderLabs/owasp-modsecurity-crs

The Denial of Service rules automatically set and expire blocks without manual intervention, which also ticks the "few human moderator hours" requirement.

modsecurity_crs_11_dos_protection.conf

And there's some protection for slowloris attacks:

modsecurity_crs_11_slow_dos_protection.conf
 

The Following 4 Users Say Thank You to Feathers McGraw For This Useful Post:
Posts: 1,293 | Thanked: 4,319 times | Joined on Oct 2014
#33
Good input.
clearly not working as intended atm

But. Be aware. That using RBL will also give false positives.
pretty positive my ip would at some point join RBL by my experiments with eg mailservers (and possibly tor)
 
Feathers McGraw's Avatar
Posts: 654 | Thanked: 2,368 times | Joined on Jul 2014 @ UK
#34
Originally Posted by nieldk View Post
using RBL will also give false positives. pretty positive my ip would at some point join RBL
True, a lot of people using dynamic IP addresses might already be on a RBL, since it only takes one computer to have been infected with spammy malware at some point in the IP's lifetime for it to be on the list.

But that's why you don't block straight away if you get a RBL match - by default in the CRS a RBL match gives an anomaly score of 3, and transactions are blocked at 5, so you'd need something else to push it over the edge (suspected XSS attack, SQLi, protocol violations or anomalies, known bad user agent string etc.)
 

The Following User Says Thank You to Feathers McGraw For This Useful Post:
Posts: 1,293 | Thanked: 4,319 times | Joined on Oct 2014
#35
Or, incorrect ehlo reply. Etc, etc, etc.
 

The Following User Says Thank You to nieldk For This Useful Post:
Feathers McGraw's Avatar
Posts: 654 | Thanked: 2,368 times | Joined on Jul 2014 @ UK
#36
Originally Posted by nieldk View Post
Or, incorrect ehlo reply. Etc, etc, etc.
You mean when EHLO doesn't match the PTR?
 
Posts: 1,293 | Thanked: 4,319 times | Joined on Oct 2014
#37
Originally Posted by Feathers McGraw View Post
You mean when EHLO doesn't match the PTR?
Yes. That will put you on the blacklist in a jiffy.
 

The Following 3 Users Say Thank You to nieldk For This Useful Post:
Feathers McGraw's Avatar
Posts: 654 | Thanked: 2,368 times | Joined on Jul 2014 @ UK
#38
Originally Posted by nieldk View Post
Yes. That will put you on the blacklist in a jiffy.
I didn't know that, thanks. I figured you'd get put on the list for EHLO'ing with a domain name that doesn't have a DNS A or MX record pointing to that IP address (or one that doesn't have a DNS record at all), but didn't think the lists were that strict.

Luckily my ISP ( https://www.plus.net/ ) is one of the best for technical support - when I built my server I asked them to change my PTR record and they did it within 12h - many ISPs won't let you do it at all.

EHLO based blocking is really useful for mail servers - mine received 30 messages yesterday, 11 were rejected because the client didn't EHLO with a FQDN, a further 10 were rejected because the hostname couldn't be resolved.
 
Posts: 1,293 | Thanked: 4,319 times | Joined on Oct 2014
#39
Originally Posted by Feathers McGraw View Post
I didn't know that, thanks. I figured you'd get put on the list for EHLO'ing with a domain name that doesn't have a DNS A or MX record pointing to that IP address (or one that doesn't have a DNS record at all), but didn't think the lists were that strict.

Luckily my ISP ( https://www.plus.net/ ) is one of the best for technical support - when I built my server I asked them to change my PTR record and they did it within 12h - many ISPs won't let you do it at all.

EHLO based blocking is really useful for mail servers - mine received 30 messages yesterday, 11 were rejected because the client didn't EHLO with a FQDN, a further 10 were rejected because the hostname couldn't be resolved.
I think it all depends. For example MS outlook 365 service will report any such mismatchs.
 

The Following User Says Thank You to nieldk For This Useful Post:
Posts: 175 | Thanked: 210 times | Joined on Mar 2013
#40
I don't know if this is possible but what would be interesting for the forum is to let anybody access it and read the posts (even when they use a spammer's ip) but block them from signing in or creating an account.

I for example use a proxy at work to just read the posts (I don't sign in), but just to stay up to date, and because of this restriction I can't any more (or I use a php proxy in addition to the web proxy to get access) and it's annoying. I have to use a proxy at work, otherwise a lot of accesses to the Internet are blocked by the company I work at (but strangely the access to some open proxys are not).
 
Reply

Tags
https, legal hell


 
Forum Jump


All times are GMT. The time now is 10:48.