worked for me!Actually, I made a mistake too. Everyone who is using this latest version, can you delete your ya-malware-block.whites file so that the script re-downloads it? I corrected some entries there.
wget https://raw.githubusercontent.com/shounak-de/misc-scripts/master/telemetry_and_scanners.txt -O - > /tmp/ya-mal.txt
wget https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset -O - >> /tmp/ya-mal.txt
wget https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level2.netset -O - >> /tmp/ya-mal.txt
wget https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level3.netset -O - >> /tmp/ya-mal.txt
cat /tmp/ya-mal.txt | nice -n 15 sed (rest of the statement)
admin@RT-AC66R-D700:/tmp/home/root# which wget
/usr/sbin/wget
(while read -r url; do wget -qO- $url; done < $URLList) | nice -n 15 sed (rest of the statement)
If this works on other firmwares with other (limited) wget, I can make this change on the script itself, so that you'd not have to make this change on every update.I got the script to run in tomato by shibby without entware
If this script is helpful, maybe it can be mentioned in the ipset scripts wiki. I know @shooter40sw had mentioned that I put it there, but I'm not sure if I should do so: There are other ipset related scripts in the forums, and it may seem improper to list just this one. If @Adamm @Martineau @spalife (I'm certain there would be others) also mention their work there, it would make sense.Script works great with ab-solution now!! Nice update adding the whitelist. Keep up the excellent work much appreciated by all us!!
Makes sense. I do not think that page explains how to use ipsets very much now There are 3 bullet points and a link to the man page, and that's about it.I don't like the idea of having existing scripts listed under "Using ipset". It would be like listing a bunch of programs using VisualC++ under "How to use the VC++ APIs". These applications should be listed elsewhere on the wiki, not on the page explaining how to use ipset.
There's a section for 'How to block ads with pixelserv' where I added the parts how to install it.Makes sense. I do not think that page explains how to use ipsets very much now There are 3 bullet points and a link to the man page, and that's about it.
Would you like me to rename the page to something along the lines of "Firewall scripts using ipsets" or something similar?
Also, there are many scripts in this forum. Would each maintainer add their work there (if they wanted to)?
Thats a long title, How to block scanners, bots, malware, ransomware might just do for the curious minds.Could this then be an entry on the networking how-to? Something like "How to block scanners, bots, malware, ransomware, etc with published FireHOL blocking tiers" or something similar?
May 25 10:15:09 Firewall: /jffs/scripts/ya-malware-block.sh: Adding ya-malware-block rules to firewall...
May 25 10:15:11 Firewall: /jffs/scripts/ya-malware-block.sh: Loaded sets YAMalwareBlock1IP (0) and YAMalwareBlockCIDR (0) in 2 seconds
marco@RT-AC68U:/tmp/home/root# wget --no-check-certificate -O /jffs/scripts/ya-malware-block.sh https://raw.githubusercontent.com/shounak-de/misc-scripts/master/ya-malware-block.sh
Will not apply HSTS. The HSTS database must be a regular and non-world-writable file.
ERROR: could not open HSTS store at '/root/.wget-hsts'. HSTS will be disabled.
--2017-05-25 12:44:17-- https://raw.githubusercontent.com/shounak-de/misc-scripts/master/ya-malware-block.sh
Resolving raw.githubusercontent.com... 151.101.128.133, 151.101.192.133, 151.101.0.133, ...
Connecting to raw.githubusercontent.com|151.101.128.133|:443... connected.
WARNING: cannot verify raw.githubusercontent.com's certificate, issued by 'CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US':
Unable to locally verify the issuer's authority.
HTTP request sent, awaiting response... 200 OK
Length: 3101 (3.0K) [text/plain]
Saving to: '/jffs/scripts/ya-malware-block.sh'
/jffs/scr 0%[ ] 0 --.-KB/s
/jffs/scripts/ya-ma 100%[===================>] 3.03K --.-KB/s in 0.001s
2017-05-25 12:44:17 (3.38 MB/s) - '/jffs/scripts/ya-malware-block.sh' saved [3101/3101]
marco@RT-AC68U:/tmp/home/root# chmod +x /jffs/scripts/ya-malware-block.sh
marco@RT-AC68U:/tmp/home/root# /jffs/scripts/ya-malware-block.sh
/jffs/scripts/ya-malware-block.sh: Adding ya-malware-block rules to firewall...
/jffs/scripts/ya-malware-block.sh: Loaded sets YAMalwareBlock1IP (0) and YAMalwareBlockCIDR (0) in 1 seconds
marco@RT-AC68U:/tmp/home/root# nslookup 213.230.210.230
Server: 127.0.0.1
Address 1: 127.0.0.1 localhost.localdomain
Name: 213.230.210.230
Address 1: 213.230.210.230 boo.yoyo.org
marco@RT-AC68U:/tmp/home/root# nslookup 192.124.249.10
Server: 127.0.0.1
Address 1: 127.0.0.1 localhost.localdomain
Name: 192.124.249.10
Address 1: 192.124.249.10 cloudproxy10010.sucuri.net
Could this then be an entry on the networking how-to? Something like "How to block scanners, bots, malware, ransomware, etc with published FireHOL blocking tiers" or something similar?
I believe this is related to your current wget utility installed in your router.First: why, after installing, the default sets return a count of zero?
which wget
AB solution uses a hosts list provider from pgl.yoyo.org. That was being blocked on the default Level1 through Level3 blocking of FireHOL tiersAnd second, why are these two IP's whitelisted by default?
I had already added it on the networking how-to, but will make the change you mentioned.I haven't given it much thought, but at a quick glance at the current Wiki layout, I'd suggest renaming "External Software Repositories" to "External Software" or "Software add-ons", and adding a new section to it called "Scripts" or something like that.
I believe this is related to your current wget utility installed in your router.
Will not apply HSTS. The HSTS database must be a regular and non-world-writable file.
ERROR: could not open HSTS store at '/root/.wget-hsts'. HSTS will be disabled.
These are discussed here too. Even @RMerlin offers some advice there. Try using entware-ng wget if that works for you. (opkg install wget)
Can you post the output of
before you install entware wget?Code:which wget
marco@RT-AC68U:/tmp/home/root# which wget
/opt/bin/wget
May 25 18:00:00 Firewall: /jffs/scripts/ya-malware-block.sh: Adding ya-malware-block rules to firewall...
May 25 18:00:11 Firewall: /jffs/scripts/ya-malware-block.sh: Loaded sets YAMalwareBlock1IP (65536) YAMalwareBlock2IP (12004) and YAMalwareBlockCIDR (8919) in 11 seconds
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!