Comments

15 comments

  • Avatar
    Firewalla

    This is possible for MSP for sure. The limit was put there to stop people from breaking their systems, since MSPs are a lot more careful with these things, we probably can change that limit. 2000? or maybe dynamically imported from git?

    1
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    I think dynamically through GitHub is better. My GitHub threat list is about 6,000.

    See this as a practical example.
    https://raw.githubusercontent.com/C0ntr07/Pi-Hole/main/Iranian_Russian_Ukrainian_IPs.txt

    3
    Comment actions Permalink
  • Avatar
    Michael Bierman

    Agree with Chris. Github would be awesome and comments should be supported. 

    1
    Comment actions Permalink
  • Avatar
    TR

    Also can we band together and community support an MSP target list on Git that focuses on the exact thing op is targeting?  All the internet background scanning etc.

    0
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    Sure. We should also, as my list does, cite source references.

    I would also be glad to add any valid malicious URL or IP addresses reported by LE, government, or cybersecurity companies.

    2
    Comment actions Permalink
  • Avatar
    Firewalla

    let me ask our dev and see if they want to manage a firewalla list and automatically suck list from it. This likely make automated target lists much easier. MSP can pull request from it, and update can be community driven.

    2
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    Or maybe there can be a crowdsourced list with user entries. To discourage spam or invalid submissions each line should have the username of the contributor as a comment.

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    Curious if these lists you want to be public? or specific to your own MSP instances?

    0
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    My view is that we all need to look out for each other and share our knowledge with those who don’t have access to the security sources some of us have.

    We have to help protect other from ransomware, zombie networks, data theft, banking fraud … imagine if Firewalla can impede the operation of the Russian Password Stealer!

    0
    Comment actions Permalink
  • Avatar
    Auriga Legato

    This is what I was looking for lol.  I just shared a brief list yesterday.

    0
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    Where did you share your list?

    1
    Comment actions Permalink
  • Avatar
    Auriga Legato

    https://www.reddit.com/r/firewalla/comments/v29dk6/my_additional_ads_target_list/ 

     

    Not like reddit name is secret.

    0
    Comment actions Permalink
  • Avatar
    Gyztor Mizirath

    You could try also doing what Pi-Hole does and pulls the list to a local database too along with auto updating to that list so we could also use Pi-Hole lists in Firewalla and not need to run more DNS servers than needed (as I use Windows Server already)

    0
    Comment actions Permalink
  • Avatar
    iotguy

    Huge +1. Any updates on this? I've a list with 8000+ but the target list allows to add only 200 entries at max. Any workarounds on this?

    0
    Comment actions Permalink
  • Avatar
    iotguy

    I'm using https://github.com/gorhill/uBlock. It imports several other lists. As a quick workaround, it would be cool, if you can include the missing entries from this to the firewalla native ad block list or increase the 200 target list entries limit to at least 6000-10000 entries.

    0
    Comment actions Permalink

Please sign in to leave a comment.