Suggestions for blocklist

I have read about the plans for an IPFire interface for DNS blocklists,

In the meantime.I have been looking to add some IP blocklists

Anyone is familiar with these blocklists?

This is an Adserver blocklist:

https://pgl.yoyo.org/as/iplist.php?format=&showintro=0
Info: https://pgl.yoyo.org/

This is a P2P blocklist

https://raw.githubusercontent.com/Naunter/BT_BlockLists/master/list_1.txt

Info: https://github.com/Naunter/BT_BlockLists

This is a threat intelligence feed

https://www.binarydefense.com/banlist.txt

Info: https://www.binarydefense.com/

@jon is working on a framework for so called RPZ lists.
These use the RPZ (Response Policy Zone) mechanism of unbound. This means a direct DNS blocking with internal updates of the lists using the SOA definition.

A good introduction is https://jpgpi250.github.io/piholemanual/doc/Unbound%20response%20policy%20zones.pdf for example.

I am not familiar with any of them but a quick search resulted in the following thoughts.

The licence for this is not a standard Open Source one.
Basically it says that if you u8se the list you must not be making any money, so it sounds like it would be a no-no for businesses.

This list was last updated in July 2022 and that was the first and last release of the blocklist. So it would depend if you think that a P2P blocklist only ever needs to be created once and will apply the same after that.

I could not find out any date for the list that is provided and the banlist.txt is not mentioned anywhere on the website.

This was a problem with the Alienvault ipblocklist which was still available for download but had not been updated for at least 2 years and maybe much longer so was removed from the IPFire IPBlocklist in CU186

Really the people providing these ip block lists should put a date of generation at the top of the list so it can be easily found out if the list has become dead or orphaned.

3 Likes

This is an argument for the RPZ approach. The lists include a SOA record, with creation date and update period.

Hi all,

i like and use also the IP lists from Firehol → https://iplists.firehol.org whereby you can get the original source, maps, evolution, histories of added and removed IPs and usable charts but also update cycles.

Best,

Erik

This is another approach. These IP lists are implemented in the firewall.
The thread opener asked about DNS blocklists.

IP lists block the access to malicious IPs.
DNS list deny the name resolution of ‘bad’ web sites. This catches also FQDNs with very frequently changing IPs.

Thank you for the useful feedback

Could you link the exact words? I think the author was just joking around with the license but the way I understood is that no one is allowed to distribute the list for money or threaten to sue users if they don’t pay. but I would be interested to see if you found something different.

Jun 28, 2024

I am looking at the history of commits on the Github page and I see

Jun 28, 2024

I could be wrong but could you let me know where do you see last updated in July 2022 ?

I agree, there was no timestamp, but I still wanted to hear some feedback and you are right the author should include a header with timestamp.

There are not a that many freely available quality lists anymore,

I could agree that RPZ is a more modern approach, but I understand the amount of effort it would take to implement it in IPFire,

I’m ok using IP blocklists, without FQDN

Thank you That is a nice compilation of of lists
Could you mention what particular lists do you find useful?

@erik I really like the filehol website

For example their tracking feature of my lists in questions looks amazing:

The link is https://pgl.yoyo.org/license/

It may well be the same place you looked.

It does have a jokey element to it but for a business I would think it makes it a bit difficult when a license is jokey.

Anyway, you can make your own decision on it.

Today I see two commits. One on June 28th 2024 and one on June 29th 2024. When I looked originally neither were there. The only thing was the release itself which has a date of Jul 2022.
https://github.com/Naunter/BT_BlockLists/releases/tag/v.1

In the title of that page it says

· 2 commits to master since this release

These are the two commits from 28th and 29th June 2024 which are the first updates to my understanding since the list was originally released.

1 Like

Hi all,

Sorry Bernhard but this is not another approach for what so ever but a simple addition of IP lists which the thread opener is looking for and my own interests. and investiagtions
Also, where are those lists → git.ipfire.org Git - ipfire-2.x.git/blob - config/ipblocklist/sources compared to this → GitHub - firehol/blocklist-ipsets: ipsets dynamically updated with firehol's update-ipsets.sh script findable ? Even if there are a few integrated, firehols list is much more extensiv.
And another one, The thread opener does not asks for DNS blocklists, he asks for knowledge of his investigated lists and as far as i can see, these are IP lists.

I sorted out lists (30 to 40) from there which are useful for my environment in my opinion and run them with an own script in combination with firehols update-ipsets.sh even i use also IPBlocklists from IPFire which may includes some doubles which is not a problem at all since IPSet is for both the tool to handle them.
The work of Costa Tsaousis (ktsaou → https://www.ipfire.org/docs/configuration/firewall/ipset/ipset_for_ipfire__forum.ipfire.pdf), which was also guest in the old IPFire forum and tried to helped at that time out (thanks again to him) and the whole community is great in my opinion and i currently does not know a platform which is open and as clear and detailed as it is there.

Best,

Erik

1 Like

@ummeegge , sorry I’ve not read very intensive. :frowning:

@trish, has read about DNS blocklist but wants to use IP blocklists meanwhile.
So I’m out of technical discussion. :wink:

1 Like

ok got it, so even if the license is not enforceable, businesses can’t use it.

Now I understand :blush:

Another Blocklist that I just stumbled upon is the Zonefiles Compromised IP list

I checked 2-3 random IP’s and the lists appears to be unique :+1:

Suspicious, malware, phishing and ransom IP tracker

494,263 IPs in this list

The one I would recommend is the Currently active list with only 22,514

https://zonefiles.io/f/compromised/ip/live/compromised_ip_live.txt

The list downloads just fine but for an unknown reason I am getting an error:

Could not download blocklist - A download error occured.

Is there something odd that IPFire can’t read the list?

This is the format of the IP blocklist:

# Compromised IPs (live list). Downloaded from Zonefiles.io
103.19.89.118
103.230.84.239
103.26.128.84
103.4.52.150
103.7.59.135
109.127.8.242
109.229.210.250