Are you using DNSCrypt?Can anyone tell me which of the blacklist IPs might stop my DNS working?I love this script but the wife isn't happy when things just stop working for no reason!
https://pastebin.com/hmc27y1M
I don't use DNSCrypt and I am not having any problems. So I suspect that is where the problem lies.Yeah to OpenDNS, but I thought I had whitelisted their anycast IP
That's my gut instinct too, but I wouldn't know where to start. Well, my attempt was whitelisting the IP that DNSCRYPT was proxying to, and that obviously isn't right! HahaI don't use DNSCrypt and I am not having any problems. So I suspect that is where the problem lies.
That's my gut instinct too, but I wouldn't know where to start. Well, my attempt was whitelisting the IP that DNSCRYPT was proxying to, and that obviously isn't right! Haha
Same, not instant, can be 10-15 minutes, or several hours, with the latest being overnight. I have TrendMicro enabled, perhaps I will disable it and see how it goesI tried whitelisting opendns ips while using dnscrypt. I also didn't find their ips in the blocklist.
I have several variables in play and am slowly working my way through the permutations to see which may be the culprit. It doesn't happen instantly, only after a couple of hours. I didn't remember the commands that were recommended to run when it happened last night (and I had not printed them out...It could be a dnscrypt/trendmicro rather than a dnscrypt/ipsetblock.
Hey, Xen!Here is a small utility script to download IPSET_Block.sh and HackerPorts.sh, format for Linux and chmod 755 on the files. Call whatever you want (e.g. get-ipblock-scripts.sh), just remember to chmod to be executable. e.g. chmod 755 get-ipblock-scripts.sh.
Code:#!/bin/sh #Get IPSET_Block.sh script from pastebin, convert to linux format and set permissions to 755 wget https://pastebin.com/raw/zQ3KEe8P -O /jffs/scripts/IPSET_Block.sh; dos2unix /jffs/scripts/IPSET_Block.sh chmod 755 /jffs/scripts/IPSET_Block.sh #Get HackerPorts.sh script from pastebin, convert to linux format and set permissions to 755 wget https://pastebin.com/raw/LRHJih8Z -O /jffs/scripts/HackerPorts.sh; dos2unix /jffs/scripts/HackerPorts.sh chmod 755 /jffs/scripts/HackerPorts.sh
Yes, if he changes the pastebin link, then the http in the script needs to change to reflect the new url. I wondered about that. The init is the key to getting it working correctly.Hey, Xen!
That script d/l version 2.05 of HackerPorts. I had to revert back to v. 2.03 to work with IPSET.
Martineau must be setting up a new version, so we need to be careful when using the wget I think!
I think I found my problem!
When you and I were discussing the firewall-start and services-start. I had changed my firewall-start and edited out the init part of the script, so it wasn't re-running the init. After running it manually. It seems to be working again!
My experience has led to using these scripts and turning ai-protection off. It uses far to much ram to be doing more than what these add on scripts do. I think it is a little Asus bloat actually.I tried whitelisting opendns ips while using dnscrypt. I also didn't find their ips in the blocklist.
I have several variables in play and am slowly working my way through the permutations to see which may be the culprit. It doesn't happen instantly, only after a couple of hours. I didn't remember the commands that were recommended to run when it happened last night (and I had not printed them out...It could be a dnscrypt/trendmicro rather than a dnscrypt/ipsetblock.
Yes!Yes, if he changes the pastebin link, then the http in the script needs to change to reflect the new url. I wondered about that. The init is the key to getting it working correctly.
This is my understanding and I could be wrong. So caveat warning applies.Yes!
I think you are right.
I have another question.
Is there a safe way to stop logging the "Block In"'s from the syslog without messing up the function of the IPSET script?
I know there is some explanation within the script, but that seems to be over my head. Could you break that down in simple idiot English?
'IPSET_Block.sh v4.xx' optionally uses an IPSET as a crude database for logging the hack attempts as well as, or in place of, Syslog messages)
@Martineau
I want to make sure AB-Solution does not block the domains used for your script's lists.
I'd like to include the url list file this script uses to whitelist them in AB-Solution.
Is there a permanent file stored on the users device with the url's?
If so, please let me know the standard path/filename to it.
Thanks
I think you are referring to the nolog option. But if this option is used, no 'Block =' messages will be generated in the system log file, which the report reads from. So, no messages in system log means no data in the report.
I see a comment in HackerPorts.sh
This leads me to believe that a version 4.xx of IPSET_Block.sh is in the works that will use the IPSET as a database to report from. Perhaps logging to the System Log will then no longer be necessary. I am sure @Martineau will be back once the weekend roles around and correct meCode:'IPSET_Block.sh v4.xx' optionally uses an IPSET as a crude database for logging the hack attempts as well as, or in place of, Syslog messages)
![]()
Yes Please! I would like to test v4.01. And thank you for clarifying the HackerPorts v2.03 functionality. I saw the comment but did not realize the feature was available. I did not see a link to the 4.01 version in the forum unless I missed it. The link on the wiki goes to version. 3.04.@Xentrk I see from your post yesterday
https://www.snbforums.com/threads/i...-for-ipset-v6-and-v4.37976/page-9#post-325388 that you appear to still be using this script?
If you want to have a copy of IPSET_Block v4.01 then let me know.
NOTE: HackerPorts v2.03 already has support for reporting the stats from the IPSET (rather than the syslog messages).
Yes Please! I would like to test v4.01.
./IPSET_Block.sh save
./IPSET_Block.sh backup
./IPSET_Block.sh init reset ipset
./IPSET_Block.sh restore
./IPSET_Block.sh status
./IPSET_Block.sh status
v4.01 © 2016-2017 Martineau, Dynamic IPSET Blocking.....
Name: Blacklist Name: Whitelist
Type: hash:ip Type: hash:net
Revision: 0 Revision: 0
Header: family inet hashsize 4096 maxelem 65536 timeout 604800 Header: family inet hashsize 1024 maxelem 65536
Size in memory: 174168 Size in memory: 8500
References: 3 References: 2
Members: Members:
(Total=11044) (Total=0)
Summary Blacklist: 157+0 Successful blocks! ( 11047 IPs currently banned - 3 expired since: May 18 20:00 ), Entries auto-expire after 168:00:00 hrs
v2.04 © 2016-2017 Martineau, Hacker Port attacks Report.....
Retrieving IPSET BlacklistTRK data for 'eth0' violations, please wait.....
4177 members retrieved from IPSET (BlacklistTRK)
18 May 20:15:49: # Unique Ports attacked via 'eth0': 177 (out of 4177 attempts) tracked via IPSET
Top 3 Ports attacked:
2488 http://www.speedguide.net/port.php?port=23 e.g. https://www.speedguide.net/ip/1.180.214.77
293 http://www.speedguide.net/port.php?port=22 e.g. https://www.speedguide.net/ip/101.69.196.100
187 http://www.speedguide.net/port.php?port=81 e.g. https://www.speedguide.net/ip/103.239.74.110
Top 3 attackers:
1 https://www.speedguide.net/ip/1.180.214.77
1 https://www.speedguide.net/ip/101.69.196.100
1 https://www.speedguide.net/ip/103.239.74.110
Last 3 most recent attackers:
https://www.speedguide.net/ip/109.236.91.106
https://www.speedguide.net/ip/94.142.139.243
https://www.speedguide.net/ip/122.114.173.66
./IPSET_Block.sh status noipset
./IPSET_Block.sh save
@Martineau I'm interested in your HackerPorts. PM me pls if you may..
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!