redhat27
Very Senior Member
It is expected unless you enable Level4. See my earlier postI got 0 for YAMalwareBlock3IP though.
It is expected unless you enable Level4. See my earlier postI got 0 for YAMalwareBlock3IP though.
I think it may be redundant to have both src,dst since the block is on the PREROUTING chain of the raw table.Out of curiousity, what would happen if I amended the script to drop on src and dst, rather than just src?
That is dst on the FORWARD chain of filter tableAh, I asked since I noticed the MS Telemetry only blocked on dst, for example
The default is Level1 thru Level3 blocking. Level4 is disabled by default as it has a lot of false positives. You can choose to block even less. Just remove what you want blocked or not blocked from theQuick questions.
How do you select which level you are wanting to use ? Also I wanted to add the updater script to my Init-start but I have no Init-Start file in my JFFS/Scripts location do I first need to creat a Init-Start File and add the updater script to it ?
Cheers.
All of the FireHOL lists are already aggregated. See their site for details as to what each of their Levels block. The OP has a link to each levelI reinstall the script since i was on previous version, delete the .url_list before all was smooth :
Loaded sets YAMalwareBlock1IP (65535), YAMalwareBlock2IP (65536), YAMalwareBlock3IP (30978) and YAMalwareBlockCIDR (8731) in 30 seconds
Problem is i added some extra set of ipsets and even if i reload the script the result is as above as it doesn't work properly.
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/hphosts_emd.ipset
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/hphosts_ats.ipset
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/hphosts_exp.ipset
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/hphosts_fsa.ipset
etc
The default is Level1 thru Level3 blocking. Level4 is disabled by default as it has a lot of false positives. You can choose to block even less. Just remove what you want blocked or not blocked from the
/jffs/ipset_lists/ya-malware-block.url_list file. This file is not redownloaded on each run of the script, and allows for manual editing. If you want the default sources, then just delete this file, and the script will download the default one from github.
Also, I would advise to run this at the end of services-start (for a one time run) or better yet, schedule this in cron as the sources are dynamic. See OP for details.
Note: I forgot to mention that you can do both too (both in services-start and in cron) That way you are covered in the time interval your router has booted and cron has not run yet. A lot of us here keep rebooting our routers often as they try new stuff , so it may be more appropriate for them, actually.That is great thanks, all set up now and I have this as a cron job in Init-start for the future Here is to better security
Out of curiousity, what would happen if I amended the script to drop on src and dst, rather than just src?
I think it may be redundant to have both src,dst since the block is on the PREROUTING chain of the raw table.
It really does.I don't see how your script blocks outgoing traffic as you advertised in post #1. In your tests, it actually blocks?
It really does.
admin@RT-AC66R-D700:/tmp/home/root# ping 8.8.8.8I don't see it but I guess you've to twist the meaning of "block" a bit...
I see what you mean. It blocks on the echo receive bitMy verdict still holds
That's correct, it blocks pgl.yoyo.org, for example, one of the hosts file providers.If redhat27 read your mind correctly, your intended change will be redundant. lol
Jack Yaz raises a good point though. I don't see how your script blocks outgoing traffic as you advertised in post #1. In your tests, it actually blocks? I think you need one more line in the for loop with "--match-set ... dst"
Oops, sorry about that . Need to add a note to AB users to whitelist that domainThat's correct, it blocks pgl.yoyo.org, for example, one of the hosts file providers.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!