blacklist feature & IP addresses

Ask for help about NoScript, no registration needed to post
nakedteadrinker

blacklist feature & IP addresses

Post by nakedteadrinker »

Can the blacklist feature or the ABE feature be used to block scripts from selected IP addresses? If so, how? If not, would the addition of such feature be possible, i.e., does noscript have access to the IP information used by firefox for a url?

For example, I would like to consider blocking scripts from the top 50 IP addresses on the stopbadware IP list-- http://www.stopbadware.org/reports/ip

(No doubt some may agree and some may disagree with blocking based on the stopbadware IP list, my question is whether it can be done, not whether it is a good or bad idea)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 (.NET CLR 3.5.30729)
dhouwn
Bug Buster
Posts: 968
Joined: Thu Mar 19, 2009 12:51 pm

Re: blacklist feature & IP addresses

Post by dhouwn »

You mean blocking of hosts whose domain name resolves to an IP address on a blacklist?
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.9 Safari/533.4
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: blacklist feature & IP addresses

Post by Giorgio Maone »

Code: Select all

Site 1.1.1.1 2.2.2.2 3.3.3.3 4.4.4.4
Deny
You can also specify subnets, like

Code: Select all

Site 192.168
or

Code: Select all

Site 192.168.0.0/24
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
nakedteadrinker

Re: blacklist feature & IP addresses

Post by nakedteadrinker »

@ Giorgio Maone

thank you for the info. given such method, here is the source of what may be an excellent blacklist for noscript--

Top 20 Malicious Autonomous Systems for [current date] http://maliciousnetworks.org/index.php
Malicious Host Information for [asn example] http://maliciousnetworks.org/ipinfo.php?as=21844
The "exploit server" IP addresses listed are the servers of the actual driveby downloads, not mere compromised webpage victims http://maliciousnetworks.org/info.php
Here is what security researcher Krebs has to say about the above system (see "PLAYING WITH FIRE" section) http://krebsonsecurity.com/2010/03/nami ... -bad-isps/

Above not a full malware solution surely, but could lower the attack surface, even if only the (~400) exploit servers of the 20 worst ASNs are blocked. (A bypass option for ABE could allow people to proceed, if people are worried about false positives.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 (.NET CLR 3.5.30729)
Post Reply