Then they can post it on the web, so that others don't need to pay.If it is really just blacklist, you can distribute it as txt/csv list of addresses
It is possible, but it is quite impractical because you need another step to transfer the information from theThe idea of a update list of blackholes is interesting!
Can I use updatable lists through an external BGP routing server?
Thanks for the excellent questions.1) Can you clear up a little bit how does user/owner of router handle security - i.e. limiting your RSC to not create new users, open ports etc? Downloading 3rd party RSC can cause unpredictable and serious issues as it can completely rule the device.
If it is really just blacklist, you can distribute it as txt/csv list of addresses. Everyone can easily create script to download and implement the list on scheduled basis. That way, every user knows exactly what the script does and there is guarantee that it will not do anything else because it is not capable of anything else.
2) I can see that you offer for example hAP ac^2 as "capable router firewall appliance". What performance impact can be expected on such device after you add those 600 million IPs into? are there some test results based on clearly defined scenario which can be replicated by everyone so we can confirm those numbers?
I was wondering who will come with this ideaThen they can post it on the web, so that others don't need to pay.
Yes I am interested -- please do send in your request based on the MOAB Prerequisite's -- I appreciate your participation.and look forward to the results of your testing.@mozerd:
2) I see. If you ever get any benchmark (simple iperf test with {transmitter}--{device under test}---{receiver} layout would be great), let us know. Or - if you want - I am willing to do this and share my findings. I understand you offered free trial for local users. I am not really interested in full-blown subscription or even prolonged trial, but if it helps, I can simply dedicate one of my testing routers and try it for couple of days and then give you the trial licence back. Let me know If this sounds interesting. If yes, I will send the request via email.
Of course it has zero functionality. Block some people because they appear to have bad intentions, and as a result block some legitimate users and still allow a lot of people with really bad intentions into your system because they happen to be not (yet) on the list.Though, i still dont think it is good idea to simply block so many IP addresses. Chance of false-positive is too high and it will end up similarly to sorbs.net - easy to get in, hard to get out, legit services blocked, nobody to blame...
Thank you for conducting the tests and providing your comments.
Couple of other things I noticed:
- Downloads are protected by HTTP-Auth, so your initial setting script contain username and password to access the data
- As I was worried earlier, the list is really distributed as RSC full of commands to add entries. This might be more optimized by distributing simple text file and parsing it directly in router. It will make downloaded file smaller and also remove possible risk from downloading malicious script
- There is some attempt to minimize downloading by firstly fetching smaller TXT files which either have some content or is empty. However, as there are no parameters submitted while downloading these "diffs" files, it simply cannot truly represent difference between already applied settings in router and current list on the server. What "diff" it really represents is pure mystery to me
- if I manually run the downloader script again and again, my lists were downloading again and again (but they should not as I already had newest version applied)
- I would expect the diff file to be dynamically generated based on last version downloaded by the specified username. That would obviously require some back-end with database to store info, which version was downloaded by each user last time
That question is answered in the prerequisites link which I will reproduce here for you with a little more detail.Stupid question, why a RAW and Filter drop rule? Can't there be 1 rule in RAW which kills everything on the list?
@effndcYou don't include any detail on how your blacklists are created or maintained, what the source sample is to determine which sites should be blacklisted, etc. So why exactly would someone decide to pay you $60/year for a service with no specifications of what the service is? Especially when there are several free options out there, so you need to provide some detail as to what makes your blacklist worth far more than the hardware that it runs on.
Some Additional info :IF you're wondering how we identify over 600 million unique IP addresses of known malicious or suspicious entities that we term as the Bad Guys? MOAB is extracted on a daily basis - 3 times each day - from All Cybercrime IP Feeds by FireHOL where that amazing number is derived from. After extraction we specifically engineer the blacklist to work in MikroTik Firewall Appliances and hosted on our web server.
That is an amazing throughput, congrats on the progress and the continuing maturity of the product/services. Have you considered expansion into other areas of use such as Layer 7 programming?A FYI update
All Free Trial slots have now all been taken up.
The MOAB server is currently consuming 2.6 GB of bandwidth daily based on 441 participants.
MOAB 1 for well provisioned Routers has grown in size to 1.8MB due to a fairly dramatic increase in criminal activity cumming out of Russia and Iran
MOAB 1 for memory constrained Routers remains at 500KB in size
Hi AnavThat is an amazing throughput, congrats on the progress and the continuing maturity of the product/services. Have you considered expansion into other areas of use such as Layer 7 programming?A FYI update
All Free Trial slots have now all been taken up.
The MOAB server is currently consuming 2.6 GB of bandwidth daily based on 441 participants.
MOAB 1 for well provisioned Routers has grown in size to 1.8MB due to a fairly dramatic increase in criminal activity cumming out of Russia and Iran
MOAB 1 for memory constrained Routers remains at 500KB in size
Specifically, the areas of concern besides trolling IPs/botnets etc are
a. bitcoin mining
b. hijacks (encrypting hard drives and extorting for cash)
c. other exploits out there that the common person like me has no clue about.
(or are much of these not preventable in that a USER on a network lets a bad guy in and then its game over??)
I have no experience with MikroTik CHR. -- I do not see why it could not be used. But if you would like to test it out I would be happy to accommodate.Can MOAB be used on CHRs?
OK, I can create a unique serial number for your CHR instance and tie that to your IP address assuming your WAN IP is static. If you are using multiple WANs per CHR then you'll need to ID the IP's [in your email] for the CHR in use and I'll tie those to the account created. Looking forward to working with you to see how MOAB works on the CHR.I'm wondering just because there's no Serial Number in CHR, so it doesn't meet your prerequisites![]()
/system license
Thank you vecernik87, for the CHR system-id would work for me.there is a "system-id" inCode: Select all/system license
Check outI'm interested in testing this for my home. Do you offer like a 30 day trial?
Yep, the HK server will be moved to Singapore within the next hour just confirmed.That would be a wise move in my estimation.
@ChupakaThx, I'll send you email a bit later. I'm wondering just because there's no Serial Number in CHR, so it doesn't meet your prerequisites![]()
Thanks, so far so good. Lists are updated on schedule, changing System ID doesn't break anything@Chupaka
How is MOAB working for your CHR implementation? Looking forward to your constructive feedback.
No New Year miracle had happened =(Free Trial Period end at midnight Monday December 31, 2018.
MiraclesNo New Year miracle had happened =(Free Trial Period end at midnight Monday December 31, 2018.
Please use the proper forum method for posts that you feel are not warranted, the triangle symbol with the question mark.Please stop using the forum..........
Place a link to your website onc............
CLARIFICATION:UPDATE FYI
Effective immediately I will no longer be providing MOAB for RB4011 devices. The RB4011 uses NAND memory == MOAB write/reads 4,300 times over a period of 365 days which may be deleterious to the RB4011 Router's life span
MOAB will only be supported on MikroTik Routers that utilize USB memory or SSD disk memory for file storage.
aimed to protect against VoIP Fraud and minimizing abuse for network that have publicly accessible PBX'sMozerd can you clarify if this functionality is for providers or for the end users? I use VoIP at home and my service is never interrupted and thus was wondering???
Buy a raspberry pi3 then install PiHole DNS server on it for free. You dont need to pay any money for MOAB
In other words, MOAB blocks more than 16% (SIXTEEN PERCENT!!!) of all ipv4 routable addressesJust a reminder in case the casual lurker is interested THAT
MOAB blocks over 600 MILLION IP Addresses of known perpetrator's [the Bad Guys] … that's over SIX HUNDRED MILLION ….
@ChupakaIn other words, MOAB blocks more than 16% (SIXTEEN PERCENT!!!) of all ipv4 routable addressesJust a reminder in case the casual lurker is interested THAT
MOAB blocks over 600 MILLION IP Addresses of known perpetrator's [the Bad Guys] … that's over SIX HUNDRED MILLION ….![]()
I'd say there are even more attackers / abusers / etc than one sixth of internet users ... personally I'd declare every youtube user as abuser and every twitter user as attacker ... not sure about facebook users, most are probably both attackers and abusersSo, every 6th address in IPv4 is attacker, abuser, etc?![]()
Remember this is a project from a guy who wants to make quick money from re-distributing other people's data.why not deliver via BGP and on site do blackhole routes with routing filters?
1 .. I do not have a great deal of experience using BGP let alone iBGPHum...
why not deliver via BGP and on site do blackhole routes with routing filters?
it would not rape the storages and cpu at all.
you could account the bgp peers with the 60 bucks and secure it with vpn and just use ibgp.
a client can secure its router by some deny rules. for example to net let you announce 0.0.0.0/0 and stuff.
updates would be immediate.
He is merely offering a service that he ALREADY provides for his clients doing what he thinks is best to keep them from getting hacked.Remember this is a project from a guy who wants to make quick money from re-distributing other people's data.why not deliver via BGP and on site do blackhole routes with routing filters?
Of course there are better ways to do it, but why would he care as long as he gets the paying customers and makes them happy?
UPDATEUPDATE
I am in the process of creating a MikroTik specific blacklist for VoIP and specifically aimed to protect against VoIP Fraud and minimizing abuse for network that have publicly accessible PBX's
I currently have one prospective client who is trialing this blacklist and providing me with very good feedback. This client is a startup cloud hosting VoIP provider [using 2 instances of the MikroTik CHR router] that is getting a lot of SIP / VoIP attacks and who initially requested MOAB to see if that could help his org -- subsequently he suggested a list [voipBL] he was familiar with and asked if I could include that list in my MOAB subscription offering. As an experiment I did generate a MikroTik specific list for him and so far he claims that all attacks on his infrastructure have stopped.
So I am looking for some additional orgs [users] who may be interested in TRIALING this VoIP specific blacklist [containing approx. 64K ip addresses whose RSC file is 2.3 MB] .. The Trial period will be for 30 days or ending on March 10, 2019 …. the list is updated every 4 hours however if the update does not receive/remove any IP addresses my system will only provide the update if an actual change has been made. The Trial is free of charges. I have not as yet determined what I will be charging for this service -- whether I will include this as part of the MOAB subscription or treat this as a niche offspring. Suggestions are welcomeIf interested send me email mozerd@itexpertoncall.com
PREREQUISITES Firstspamhaus_drop (Don't Route Or Peer) and EDROP are advisory "drop all traffic" lists, consisting of netblocks that are "hijacked" or leased by professional spam or cyber-crime operations (used for dissemination of malware, trojan downloaders, botnet controllers). The spamhaus_drop and EDROP lists are a tiny subset of the SBL, designed for use by firewalls and routing equipment to filter out the malicious traffic from these netblocks.
EDROP is an extension of the spamhaus_drop list that includes suballocated netblocks controlled by spammers or cyber criminals. EDROP is meant to be used in addition to the direct allocations on the spamhaus_drop list.
When implemented at a network or ISP's 'core routers', spamhaus_drop and EDROP will help protect the network's users from spamming, scanning, harvesting, DNS-hijacking and DDoS attacks originating on rogue netblocks.
Spamhaus strongly encourages the use of spamhaus_drop and EDROP by tier-1s and backbones.
What was the cost before the price hike? US $60 per yearWhat was the cost before the price hike? What is the percentage increase and why is the increase necessary?
65% of my business for MOAB is derived from systems my organization builds for people and sold into my local marketplace and the USA .... 5% is derived from This Forum. If you look at my sig you can very easily see that I promote MOAB heavily using my website. Word of mouth gets me the balance and 98% of that are MikroTik systems.(and I don't think you have many other costs, as the data sources you use are free and you are using this forum to get your advertising for free)
No misrepresentation ... my bandwidth costs have doubled so based on that I decided I would double the price for a subscription. Thanks for your interest in my business affairs .. to me you pe1chl sound like a Socialists/communist.But don't misrepresent the reason for your price doubling.