Nmap Development mailing list archives

Re: [NSE] New script dns-blacklist


From: Arne Martin Wandsvig <arnemartinw () gmail com>
Date: Sun, 8 Jan 2012 05:07:11 +0100

about this DNSBlackList thing can it like block proxy ips, from games too?


2012/1/8 David Fifield <david () bamsoftware com>

On Mon, Jan 02, 2012 at 11:31:09AM +0000, Duarte Silva wrote:
Hi Patrik,

I added two new DNSBL providers, one for TOR nodes [1]

[1] https://www.dan.me.uk/dnsbl

For Tor, let's see if we can use the Tor Project's exit list directly,
rather than some third party that is just querying them anyway.

https://www.torproject.org/projects/tordnsel.html

The main difference is whether an address can be considered an exit node
depends on the address and port you are relaying to, so those are part
of the query. Apparently TorDNSEL also does active probing to find out
if relays' behavior actually matches their stated exit policy.

Another possibly more efficient way is to download the whole relay list
once, and then compare each target address against the list. This also
has the advantage of not needing to disclose the target's address to the
exit list operator.

https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=74.207.254.18

David FIfield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: