shooter40sw
Senior Member
I have some time to test so if you need help testing let me know
I have uploaded the updated script in github. Can you download and test?I have some time to test so if you need help testing let me know
I have uploaded the updated script in github. Can you download and test?
Chain PREROUTING (policy ACCEPT 41492 packets, 5635K bytes)
pkts bytes target prot opt in out source destination
3 303 DROP all -- any any anywhere anywhere set I-BlocklistTheOnionRouter src,dst
0 0 DROP all -- any any anywhere anywhere set BluetackProxy src
115 7821 DROP all -- any any anywhere anywhere set YAMalwareBlock1IP src
227 9983 DROP all -- any any anywhere anywhere set YAMalwareBlock2IP src
82 12054 DROP all -- any any anywhere anywhere set YAMalwareBlockCIDR src
You'd want to delete the old rules from both the INPUT and FORWARD chain on the filter table.can tell me the command to delete them from this chain
You'd want to delete teh old rules from both the INPUT and FORWARD chain on the filter table.
Do a iptables-save -t filter (or just iptables-save), find the offending rules, and then copy the while line, and change -A to -D
so:
fine the line with -A FORWARD <blah> <blah> and run iptables -D FORWARD <blah> <blah>
Also same for INPUT
I think it's this one, I since reimplemented ya-malware via service-start in place of firewall-start and it's up and running. Haven't tried the new version of this again just yet@Jack Yaz Are you referring to this script or the ya-malware-block. Which one is causing the UI issues for you?
@Xentrk See post #90, you can whitelist the sites that you visit. It is very easy to add the sites on the local file. Just add the domain and rerun this script manually. You can test immediately afterwards.
Script updated and all OK. Seems to work a lot better in service start. I have this in firewall-start, is it now redundant? I notice it applies to forward chain rather than prerouting which this script now uses?@Jack Yaz Check your UI IP with the shell function I provided in the other thread and see which set is the culprit
# Reinstate the ipset rules if they have been created already
[ "$(uname -m)" = "mips" ] && MATCH_SET='--set' || MATCH_SET='--match-set'
for ipSet in $(ipset -L | sed -n '/^Name:/s/^.* //p'); do
case $ipSet in
AcceptList) iptables-save | grep -q "$ipSet" || iptables -I INPUT -m set $MATCH_SET $ipSet src -j ACCEPT;;
TorNodes|BlockedCountries|CustomBlock) iptables-save | grep -q "$ipSet" || iptables -I INPUT -m set $MATCH_SET $ipSet src -j DROP;;
MicrosoftSpyServers) iptables-save | grep -q "$ipSet" || iptables -I FORWARD -m set $MATCH_SET $ipSet dst -j DROP;;
*) iptables-save | grep -q "$ipSet" || iptables -I FORWARD -m set $MATCH_SET $ipSet src,dst -j DROP;;
esac
done
Try lookup of the your news sites's IP with the shell function in the other thread..Do you know which list could be blocking the news sites?
Quickly thrown it in here: https://github.com/RMerl/asuswrt-me...ion-instructions#search-ipset-lists-for-an-ipTry lookup of the your news sites's IP with the shell function in the other thread..
@Jack Yaz Can you put the function (both v4 and v6 versions) in the wiki?
Thanks for the wiki entry write-upQuickly thrown it in here: https://github.com/RMerl/asuswrt-me...ion-instructions#search-ipset-lists-for-an-ip
Will work on formatting and better explanation in a bit
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!