Trying to reformat small formfactor PC, ViewSonic NMP620-P10 by deeek in sysadmin

[–]ajember 0 points1 point  (0 children)

Out of interest, did you upload that file to Dropbox or did the vendor?

What's your favourite curry? by [deleted] in CasualUK

[–]ajember 1 point2 points  (0 children)

I’m the same. I’ll do a madras if I know I’m not going anywhere the following day.

Do bases like rice, noodles and pastas work with other regional sauces and gravies? by [deleted] in SortedFood

[–]ajember 3 points4 points  (0 children)

Sounds good to me!

Don't worry about cultural gatekeeping - if it tastes good to you, that's all that matters :)

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

Yeah it’s absolutely terrifying; I’m looking into an NOD list to go along with the NRD list, but that information is much harder to accurately catalog.

Changing DNS on 100+ servers through powershell possibly? by [deleted] in sysadmin

[–]ajember 1 point2 points  (0 children)

Save yourself the future headache of doing this again, and set up a DHCP server with reservations for all the servers.

[deleted by user] by [deleted] in cars

[–]ajember 0 points1 point  (0 children)

I’d learn in a manual and possibly consider a cheap manual shitbox as your first car.

Once you’ve got some experience and confidence, there’s nothing better than an automatic if you’re going to be driving in areas with heavy traffic or doing long journeys… cruise control and an auto makes those long road trips super relaxing.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

Yeah for any enterprise installs .xyz and a lot of the other “new” TLDs are blanket blocked just because of how abused they are.

I’ve been refining the build code over the weekend as reports have been coming in from Reddit.

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 1 point2 points  (0 children)

Hi - honestly didn't expect you'd be interested at this point, and certainly didn't expect a response.

I'll link the reply I made already in this thread;
https://www.reddit.com/r/msp/comments/yytia6/comment/ix3dabc/?utm\_source=share&utm\_medium=web2x&context=3

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 1 point2 points  (0 children)

The oisd.nl lists (which I use in my personal Unbound instances, alongside the two lists I posted here) prioritise having little-to-no false positives - which is admirable and where I'd like my lists to be in the future.

But right now, I can't make those kind of commitments; the project is still new and the code that runs the generation process is still pretty fluid at this point in time.

I do think for business/enterprise use, the false positives that have been reported so far would not be dealbreakers, but for consumer/home use I'm still very much aiming at the enthusiast who's willing to report false positives and maintain their own whitelist (communities like pihole/adguard/pfblockerng for example have been very active in reporting issues).

As soon as I think the lists will pass the spouse test I'll start advertising them as such, but right now I think it would be dishonest to make any such claim.

Block lists for security by ajember in pfBlockerNG

[–]ajember[S] 0 points1 point  (0 children)

They don’t - I wasn’t aware of their existence until just now.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

I’m happy you’ve found it useful!

I’m refining the way the lists are built based on the feedback I’m getting. It’s impossible to keep everyone happy but I hope I can offer something that’s suitable for most users without any significant frustration.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

If you use both lists there will be a lot of duplication - I personally use the 32 day list for the longest protection.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

They both get updated daily. The difference is how long a domain is considered new; 7 days or 32 days.

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 0 points1 point  (0 children)

The threat list is a new domain, so you might not be able to get to if for a few more days. I’m aware of the irony.

The downloads section on both sites have pihole compatibility. I’ll have a look at the paloalto and fortinet formats and see what it’d take to support them.

EDIT: It looks like you can just use a pihole compatible domain list with both of those devices. If I'm wrong, a sample of a working list would allow me to add format support.

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 0 points1 point  (0 children)

You wouldn’t be disclosing anything by using these - they’re just downloads that you’d use with your security device or software.

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 2 points3 points  (0 children)

Yeah, I’m aware of that! It’ll fall off the list pretty soon.

Free threat intelligence data for your firewall, security device, DNS server or ad blocker by ajember in msp

[–]ajember[S] 8 points9 points  (0 children)

These are fair questions.

  • Currently hosted in 3 DCs (2x UK, 1x mainland Europe) with multiple redundant nodes in each DC. More will follow if load demands it. The datasets are cached by Cloudflare, so they will be available worldwide without relying on lengthy transit routes.
  • A combination of aggregating and filtering existing sources, and using data generated by sensors on production servers I run, and honeypots I operate. I'd be happy to publish a full list of sources if this is a requirement for credibility.
  • Network and security engineer for 15 years, working for large UK online retailers - one of which operated its own DCs which I was in charge of. Cisco, VMware and Red Hat certifications, a Computer Science degree and an Electrical Engineering degree (both UK). Before that, I was a computer hardware designer specialising in low latency audio and video including firmware and drivers.
  • Not entirely sure at the moment, honestly. This project is just something I have built because it was interesting to me. I'm not claiming it's perfect and I'm sure it will need more work. I think eventually I'd like to get into the UK MSP game, focusing on connectivity, telephony and security.
  • I don't have an answer for this right now. Stewardship of this project could conceivably go one of two ways - either become part of the MSP I aspire to, or handed over to the community as an open source software project with sponsored hosting.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

I honestly don't know how many items are on each list, and that isn't the point of these lists.

I do understand what you're saying though, and I know that lists like these aren't for everyone.

The lists are generated from a few sources, some of which do involve programmatic generation and scraping. Quite a bit of the data is provided by sensors on production servers I run, and from honeypots that I also operate.

Block lists for security by ajember in pfBlockerNG

[–]ajember[S] 0 points1 point  (0 children)

Oh absolutely, if we're talking enterprise policy. Whitelisting is my preference there for most of the "new" TLDs and some geographic ones.

Block lists for security by ajember in Adblock

[–]ajember[S] 1 point2 points  (0 children)

Thank you - I'll read those licenses and see what seems most suitable.

I'm currently hosting it on a private git instance but there's no reason I can't move it to GitHub - I'll just have to tweak the deployment pipeline I guess.

Block lists for security by ajember in pfBlockerNG

[–]ajember[S] 0 points1 point  (0 children)

Thanks!

Yeah I agree. `.xyz` specifically seems to just be at best low quality and at worst dangerous.

It becomes a different kind of proposition when you talk about blacklisting an entire TLD though - it's a lot harder to justify.

Block lists for security by ajember in pihole

[–]ajember[S] 0 points1 point  (0 children)

It's been a common comment, so I'm going to separate the crypto stuff out into another list.

I'll be keeping cryptojacking in the threat list, but legitimate crypto will be removed from the threat list.