Do the stats generated by the command survive between router boots?i know i get questions from time to time on how to see if this filter is working or not and i finally took the time to make a simple line that shows it easily for the user.
Code:iptables -L -v | grep "malware-filter" | awk '{print "Malware Filter Blocked: " $1 " packets", $2 " is the size of the transmission"}'
it will print something like this
Code:Malware Filter Blocked: 0 packets 0 is the size of the transmission
one could make an alias on this and have it as a easy command
That is what I thought based on a test I just did. But wanted to confirm.no why would it, the firmware resets all temporary settings including firewall etc
did the command work for you ?
/tmp/malware-filter-raw.part 100%[============================================================>] 161.80K 195KB/s in 0.8s
/tmp/malware-filter-raw.part [ <=> ] 2.10K --.-KB/s in 0s
/tmp/malware-filter-raw.part [ <=> ] 11.38K 31.1KB/s in 0.4s
/tmp/malware-filter-raw.part 100%[============================================================>] 15.21K 54.4KB/s in 0.3s
/tmp/malware-filter-raw.part 100%[============================================================>] 27.60K 104KB/s in 0.3s
/tmp/malware-filter-raw.part [ <=> ] 0 --.-KB/s in 0s
/tmp/malware-filter-raw.part 100%[============================================================>] 438 --.-KB/s in 0s
Do the stats generated by the command survive between router boots?
get_source () {
wget -q --tries=$retries --show-progress -i $blocklist -O /tmp/malware-filter-raw.part
awk '!/(^127\.)|(^10\.)|(^172\.1[6-9]\.)|(^172\.2[0-9]\.)|(^172\.3[0-1]\.)|(^192\.168\.)/' /tmp/malware-filter-raw.part &>/dev/null
cat /tmp/malware-filter-raw.part | grep -oE "([0-9]{1,3}\.){3}[0-9]{1,3}\/[0-9]{1,2}" | sort -u > /tmp/malware-filter-range-sorted.part
awk '!/([0-9]{1,3}\.){3}[0-9]{1,3}\/[0-9]{1,2}/' /tmp/malware-filter-raw.part &>/dev/null
cat /tmp/malware-filter-raw.part | grep -oE "$regexp" | sort -u > /tmp/malware-filter-sorted.part
}
Router Model:
ASUSWRT-Merlin RT-AC56U 380.66-alpha2 Mon Mar 6 18:13:45 UTC 2017
Entware requierment for uBlockr
/opt/bin/opkg
wget - 1.18-2
grep - 2.26-1
pixelserv-tls - V35.HZ12.Ki-1
ca-certificates - 20161130
coreutils-stat - 8.23-2
Locating uBlockr Paths
/tmp/mnt/Main/entware/etc/ublockr.cfg
/tmp/mnt/Main/entware/bin/ublockr
/tmp/mnt/Main/entware/var/cache/ublockr
/tmp/mnt/Main/entware/var/cache/ublockr/no.list
/tmp/mnt/Main/entware/var/cache/ublockr/whitelist.filter
/tmp/mnt/Main/entware/var/cache/ublockr/ipv4_hosts
/tmp/mnt/Main/entware/var/cache/ublockr/ip.list
Locating Malware-Filter Paths
/jffs/malware-filter.list
/tmp/mnt/Main/entware/bin/malware-filter
Detecting Ipset version on router
ipset v6.29, protocol version: 6
Locating Malware-Filter Paths
/jffs/privacy-filter.list
/tmp/mnt/Main/entware/bin/privacy-filter
Detecting Ipset version on router
ipset v6.29, protocol version: 6
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!