@swetoast
Not sure if I did the installation of the malware filter correctly. I copied the code from github and saved it in /jffs/scripts/malware-filter. When I ran the script, I got the following error message which I see is probably normal from prior posts:
insmod: can't insert '/lib/modules/2.6.36.4brcmarm/kernel/net/netfilter/ipset/ip_set.ko': File exists
The next step I did was to create the malware-filter.list file in /opt/var/cache/malware-filter
I am able to get ping responses from some of the IP addresses in the malware-filter.list but not all, which makes me believe I did something wrong in the install or it is taking the router awhile to build the chain rules. Do I need to have an entry in my firewall-start file perhaps? Here are commands for help in debugging. Thanks in advance for the help!
admin@RT-AC88U-5248:/jffs/scripts# ipset --l
Name: malware-filter
Type: hash:ip
Revision: 0
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 8248
References: 1
Members:
admin@RT-AC88U-5248:/jffs/scripts# iptables -L | grep malware
REJECT all -- anywhere anywhere match-set malware-filter src,dst reject-with icmp-port-unreachable
admin@RT-AC88U-5248:/jffs/scripts# iptables –L
Chain FORWARD (policy DROP)
target prot opt source destination
REJECT all -- anywhere anywhere match-set malware-filter src,dst reject-with icmp-port-unreachable
TCPMSS tcp -- anywhere anywhere tcpflags: SYN,RST/SYN TCPMSS clamp to PMTU
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
SECURITY all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
ACCEPT all -- anywhere anywhere
admin@RT-AC88U-5248:/jffs/scripts# /usr/sbin/iptables -L FORWARD -v –n
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 match-set malware-filter src,dst reject-with icmp-port-unreachable
19036 1112K TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x02 TCPMSS clamp to PMTU
12M 16G ACCEPT all -- tun11 * 0.0.0.0/0 0.0.0.0/0
7302K 941M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- !br0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- !br0 eth0 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- eth0 * 0.0.0.0/0 0.0.0.0/0 state INVALID
2 104 ACCEPT all -- br0 br0 0.0.0.0/0 0.0.0.0/0
0 0 SECURITY all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT
14270 919K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
Here is the output of ipset script in firewall-start:
admin@RT-AC88U-5248:/jffs/scripts# . ./firewall-start
insmod: can't insert '/lib/modules/2.6.36.4brcmarm/kernel/net/netfilter/ipset/ip_set.ko': File exists
insmod: 'ip_set_nethash.ko': module not found
insmod: 'ip_set_iphash.ko': module not found
insmod: 'ipt_set.ko': module not found
iptables v1.4.14: Set TorNodes doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.4.14: Set BlockedCountries doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.4.14: Set MicrosoftSpyServers doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.