Avoid Phishing using DNS

Alexander Clouter alex at digriz.org.uk
Sat Jan 17 04:30:53 EST 2009


* Daniel Zilli <zilli.daniel at gmail.com> [Sat, 17 Jan 2009 09:16:57 +0700]:
>
> Did anyone find performance issue with this implementation ?  Because in
> theory, for a medium network environment this
> can become a problem. Imagine that malware list growing and
> dozens/hundreds  of user requesting the server at same time.... 
>
> I didn't do any test, so I would like to know if someone already did.
> Anyhow, for tiny and small organisation.. this is a great
> tool for security issue.
>
This is the format[1] of our blacklisting system:
----
ac56 at ipserv0:~$ head /etc/maradns/db.blacklist 
ghust.gabis.co.kr.      A 212.219.138.188 ~
*.ghust.gabis.co.kr.    A 212.219.138.188 ~
ghust.gabis.co.kr.      MX 0 ids.it.soas.ac.uk. ~
*.ghust.gabis.co.kr.    MX 0 ids.it.soas.ac.uk. ~
ghust.gabis.co.kr.      TXT 'dnshijack : malware : sandbox.bleedingthreats.net : 2008-03' ~

easweuijintungenfunsa.com.      A 212.219.138.188 ~
*.easweuijintungenfunsa.com.    A 212.219.138.188 ~
easweuijintungenfunsa.com.      MX 0 ids.it.soas.ac.uk. ~
*.easweuijintungenfunsa.com.    MX 0 ids.it.soas.ac.uk. ~

ac56 at ipserv0:~$ wc /etc/maradns/db.blacklist 
 105384  491811 4716037 /etc/maradns/db.blacklist
----

With 20k unique domains blacklisted we[1] have not seen any performance 
issues.  The servers are 2xIntel Xeon's 2.80GHz and there are two 
servers...I have never seen MaraDNS use more then 0.1% of the CPU and 
the response is always instantaneous.

You should bear in mind, it's never the users workstations knocking out 
the majority of the DNS requests, where I work 95%+ of the requests we 
make come from our SMTP servers.

Cheers

[1] I'm thinking about removing the MX entries, but so far it's not 
	given me any complaints
[2] a university with 600 staff and 3000 students

-- 
Alexander Clouter
.sigmonster says: If God is One, what is bad?
                  		-- Charles Manson



More information about the list mailing list