It would be useful if it were possible to ban IP ranges not just by netmask, but also by ASN number (as provided by asmap).
Suggested by @gmaxwell.
Big ACK :)
I was implementing this, but then realized that "mapped AS" might not make sense here?
I assume the main goal here is to protect against inbound Sybil conns based in certain cloud providers? Then it makes more sense to look at the actual final AS, not the "mapped" AS (a.k.a bottleneck).
Perhaps in practice final equals mapped in the majority of cases, but I don't think we want to rely on that? But then it would be unfortunate to supply 2 different files: one for mapped ("bottleneck") ASes and one for actual ASes... @gmaxwell @sipa