1
0
mirror of https://github.com/mail-in-a-box/mailinabox.git synced 2025-04-21 03:02:09 +00:00
This commit is contained in:
ChiefGyk 2016-06-29 09:18:24 -04:00
parent ed8881afc9
commit 022752d0bb
2 changed files with 3 additions and 1 deletions

View File

@ -4,6 +4,7 @@ This will install a cron to run daily and pull lists from https://blocklist.de t
Script is pretty self explanatory it prepares IPTables persistence, and the cron tab. Simply run as root and it will do the work for you. Script is pretty self explanatory it prepares IPTables persistence, and the cron tab. Simply run as root and it will do the work for you.
2.0 has been rewritten with help from some research to use IPset and far more tables and lists resourced. Please do not run this more than once per day, per server. 2.0 has been rewritten with help from some research to use IPset and far more tables and lists resourced. Please do not run this more than once per day, per server.
It also pulls lists from wizcraft which may or may not work for everyone. But this is fine, as it's only a small portion of the list. Seems to only effect VPS for me.
Tested on Ubuntu 14.04LTS Tested on Ubuntu 14.04LTS
alon@ganon.me alon@ganon.me
https://alonganon.info https://alonganon.info

View File

@ -9,7 +9,6 @@ BLACKLISTS=(
"http://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.1.1.1" # TOR Exit Nodes "http://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.1.1.1" # TOR Exit Nodes
"http://www.maxmind.com/en/anonymous_proxies" # MaxMind GeoIP Anonymous Proxies "http://www.maxmind.com/en/anonymous_proxies" # MaxMind GeoIP Anonymous Proxies
"http://danger.rulez.sk/projects/bruteforceblocker/blist.php" # BruteForceBlocker IP List "http://danger.rulez.sk/projects/bruteforceblocker/blist.php" # BruteForceBlocker IP List
#"http://rules.emergingthreats.net/blockrules/rbn-ips.txt" # Emerging Threats - Russian Business Networks List
"http://www.spamhaus.org/drop/drop.lasso" # Spamhaus Don't Route Or Peer List (DROP) "http://www.spamhaus.org/drop/drop.lasso" # Spamhaus Don't Route Or Peer List (DROP)
"http://cinsscore.com/list/ci-badguys.txt" # C.I. Army Malicious IP List "http://cinsscore.com/list/ci-badguys.txt" # C.I. Army Malicious IP List
"http://www.openbl.org/lists/base.txt" # OpenBL.org 30 day List "http://www.openbl.org/lists/base.txt" # OpenBL.org 30 day List
@ -21,6 +20,8 @@ do
curl "$i" > $IP_TMP curl "$i" > $IP_TMP
grep -Po '(?:\d{1,3}\.){3}\d{1,3}(?:/\d{1,2})?' $IP_TMP >> $IP_BLACKLIST_TMP grep -Po '(?:\d{1,3}\.){3}\d{1,3}(?:/\d{1,2})?' $IP_TMP >> $IP_BLACKLIST_TMP
done done
# This part may not work for everyone, it seems wizcraft doesn't allow all VPS wget access, but I am looking into it
for i in `echo $list`; do for i in `echo $list`; do
# Download # Download
wget --quiet http://www.wizcrafts.net/$i-iptables-blocklist.html wget --quiet http://www.wizcrafts.net/$i-iptables-blocklist.html