-----Original Message----- From: Nicolas Riendeau [mailto:knightr@istop.com] Sent: Tuesday, July 13, 2004 12:21 AM To: SURBL Discussion list Subject: Re: [SURBL-Discuss] Re: Using (SU)RBL with a browser, any way to do it? (was <snip> )
Chris Santerre wrote:
Or one could take the sa-blacklist file and turn it into a
quick hosts file.
I have a host file on the server that is copied to everyones machine everytime they log in. Full of spyware domains that simply point to 127.0.0.1 and It is easy for me to change.
However squid also rocks. I have had a test server running
for 1.5 years. I
haven't had time to tweak it yet to go production yet.
Hi Chris!
I *assume* (I know what happens when you assume... (-; ) that the host file is not loaded in memory and is processed sequentially so wouldn't having a big host file make its parsing be very very slow?
That's an assumption though...
Somewhat, but not too bad. Some people have had web completely turned off for failing to listen to me. 2 whole deparments have no web access now. Muahahahhahaha....I'm drunk with power!
But yeah, I guess if you had 35k listings in host file it could be pretty slow :) Another reason to use squid.
--Chris
Hi Chris!
I *assume* (I know what happens when you assume... (-; ) that the host file is not loaded in memory and is processed sequentially so wouldn't having a big host file make its parsing be very very slow?
That's an assumption though...
Somewhat, but not too bad. Some people have had web completely turned off for failing to listen to me. 2 whole deparments have no web access now. Muahahahhahaha....I'm drunk with power!
bofh? (-;
But yeah, I guess if you had 35k listings in host file it could be pretty slow :) Another reason to use squid.
It would be nice if squid could use (SU)RBL though... (-;
Have a nice day!
Nick
Nicolas Riendeau wrote:
It would be nice if squid could use (SU)RBL though... (-;
Native SURBL support for Squid would be a GoodThing(TM) indeed. Until then, if the SURBL team provided lists of blacklisted domains, one could pipe the data into a script along the lines of
#!/usr/bin/perl my $acl_name = 'known_spammer_domains'; while (<>) { print "acl $acl_name dstdomain $_" unless /^[#\s]{0,}$/; } print "http_access deny $acl_name\n";
to generate local Squid rules...