As I haven't heard anything about this I scratched up some code together to generate rules, it's based on another script that I found that generated iptables firewall rules. The scripts were tested on FreeBSD but should also work just fine on just about any linux distro. Only requirements are perl and wget.
All that is needed is to ftp upload the output file droproutes.rsc and then import drouproutes.rsc, every time that the script is imported it will remove the previous list and add the new list in case there was any changes.
It could be done manually or done through a scheduled script to do it on it's own.
The last part is to create your firewall rules to drop the traffic or what ever you want it to do with it.
/ ip firewall filter
add chain=forward src-address-list=droproutes action=drop comment="Drop Hijacked \
networks" disabled=no
add chain=input src-address-list=droproutes action=drop comment="Drop Hijacked networks" \
disabled=no
getdrop.sh
#!/bin/sh
wget -O sbl-drop.txt http://www.spamhaus.org/drop/drop.lasso
cat sbl-drop.txt | ./sbl-drop.pl > droproutes.rsc
sbl-drop.pl
#!/usr/bin/perl -w
use strict;
use vars qw{$n $m};
print "/ ip firewall address-list\n";
print ":foreach subnet in [/ip firewall address-list find list=droproutes] do { /ip firewall address-list remove \$subnet }\n";
while(<>) {
next if m{^;};
if(($n, $m) = m{(\d+\.\d+\.\d+\.\d+)/(\d+)}) {
# local sanity check
die "local network $n" if $n =~ /^127./;
print "add list=droproutes address=$n/$m disabled=no\n";
} else {
print "#??? $_\n";
}
}
[/code]