From owner-freebsd-hackers@freebsd.org Thu Apr 14 01:56:56 2016 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EC73AB0FE59 for ; Thu, 14 Apr 2016 01:56:56 +0000 (UTC) (envelope-from lidl@FreeBSD.org) Received: from hydra.pix.net (hydra.pix.net [IPv6:2001:470:e254::4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.pix.net", Issuer "Pix.Com Technologies, LLC CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id BCB591D04; Thu, 14 Apr 2016 01:56:56 +0000 (UTC) (envelope-from lidl@FreeBSD.org) Received: from dhcp136.pix.net ([IPv6:2001:470:e254:11:3e15:c2ff:fedc:3606]) (authenticated bits=0) by hydra.pix.net (8.15.2/8.15.2) with ESMTPSA id u3E1umCw080555 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 13 Apr 2016 21:56:55 -0400 (EDT) (envelope-from lidl@FreeBSD.org) X-Authentication-Warning: hydra.pix.net: Host [IPv6:2001:470:e254:11:3e15:c2ff:fedc:3606] claimed to be dhcp136.pix.net To: freebsd-hackers@freebsd.org Reply-To: lidl@FreeBSD.org From: Kurt Lidl Subject: Importing NetBSD's blacklist project into FreeBSD Message-ID: <570EF8DF.3020408@FreeBSD.org> Date: Wed, 13 Apr 2016 21:56:47 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 14 Apr 2016 01:56:57 -0000 Greetings all - This is just a quick note to alert the FreeBSD development community that I've posted a review for the import of the NetBSD "blacklist" project into FreeBSD. The reviews for the basic import and hookup of the blacklist system into the build process are here: https://reviews.freebsd.org/D5912 https://reviews.freebsd.org/D5913 The rational behind the system is given in the first referenced review, which is Christos Zoulas' presentation at vBSDcon 2015. I think the system is a very reasonable framework to allow for real-time notification of attacks, feeding to a single daemon process, which maintains a persistent on-disk database. The daemon can then invoke a helper script to affect packet filtering changes as needed. It's driven from a text configuration file, and it is pretty easy to add support to more programs in the future. Thanks for your interest, and I look forward to any discussion about the merits of the system and the patches to implement it in FreeBSD. Thanks. -Kurt