|
Posted by Billy Joe on 09/07/05 22:15
FeMaster wrote:
> "Don M." <newsreader@nospam4fineartsnospam.com> wrote in message
> news:GN6dnWT7p9ZmHoPeRVnyrQ@giganews.com...
>>
>>
>> Thanks for the heads up. Maybe we could get Tony daHat to update
>> the list on his page
>> http://www.geocities.com/anthony_beret/winmxfakefiles.html
>>
>> IP ranges to be blocked, especially by primaries:
>>
>> 63.216.0.0-63.223.255.255 //NetSentry
>>
>> (following list was compiled by db)
>> 38.113.214.0-38.113.214.255 //PSI
>> 38.119.64.0-38.119.64.255 //PSI
>> 72.35.224.0-72.35.224.255 //Fuzion
>> 204.9.116.0-204.9.119.255 //Fuzion
>> 204.193.136.48-204.193.136.63 //SmokeBlower
>> 204.193.136.96-204.193.136.127 //SmokeBlower
>> 209.10.143.64-209.10.143.95 //Macrovision
>> 209.11.134.0-209.11.134.255 //Globix
>> 209.12.22.0-209.12.22.255 //Full Scale Media
>> 212.71.224.0-212.71.255.255 //Globix SpA
>> 213.219.9.192-213.219.9.255 //Xworks
>>
> What is it that we are using to block these IP addresses? Are they
> just being tossed into a users software firewall, router, other
> program?? Would like to participate, but want to be sure that I am
> setting things up correctly...
>
> Thanks!
The ideal point would be the router, but few, if any, home user routers are
equipped to handle such tables. Next would be the firewall - several
provide for IP & Range blocks and some make it easier to administer than
others (cut & paste being a big help). The very last would be an app, such
as Peer Guardian, which reacts to connections made - tho it is among the
easiest to employ.
Rationale: Blocking at the router places no impact at all on the PC.
Blocking in the firewall adds to its burden, which already competes with
other CPU demands. Blocking in a third party app merely increases the
software burden in the PC allowing the router, firewall, and even MX to
react to the connection before it is killed by the monitor.
Bear in mind that, as has been pointed out previously, these block lists
only apply to Primary nodes and only prevent some connections to that
primary as secondary sources of fake lists. These blocks have absolutely no
effect on the DOS-like attack a primary will receive from secondary fake
lists which have managed to connect to other primary nodes.
The only effective blocking of the fakes via these lists is by 100% of the
primaries participating with 100% up-to-date lists.
If the only thing which the WPN had to cope with was filtering fake sources,
there'd be little to concern ourselves with. Much worse is the impact on
primary nodes when floods of fake responses arrive simultaneously. This is
causing secondaries to loose the link and their queue status along with it,
as well as causing primaries to discard valid traffic replies while trying
to cater to the invalid - and in some percentage of cases, crash (or at
least appear to have done so to the hapless user:-(
BJ
[Back to original message]
|