From 9ed4952474c225b99a43f0304acdc18491077533 Mon Sep 17 00:00:00 2001 From: ChiefGyk Date: Wed, 29 Jun 2016 11:31:08 -0400 Subject: [PATCH] updated readme --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e145f950..eaa0a42b 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,10 @@ # blocklist blocklist-installer -This will install a cron to run daily and pull lists from https://blocklist.de to block malicious IP addresses. Adding around ~20,000 or more IP addresses per day, all voluntarily and freely contributed through people with Fail2Ban accounts. If setting up Fail2Ban I suggest you help contribute to blocklist.de. +This will install a cron to run daily and pull lists from https://blocklist.de to block malicious IP addresses. Adding around ~40,000 or more IP addresses per day, all voluntarily and freely contributed through people with Fail2Ban accounts. If setting up Fail2Ban I suggest you help contribute to blocklist.de. Script is pretty self explanatory it prepares IPTables persistence, and the cron tab. Simply run as root and it will do the work for you. 2.0 has been rewritten with help from some research to use IPset and far more tables and lists resourced. Please do not run this more than once per day, per server. -It also pulls lists from wizcraft which may or may not work for everyone. But this is fine, as it's only a small portion of the list. Seems to only effect VPS for me. +This also adds persistence, and removes iptables-persistent from 1.0 as a requirement. In fact you won't need it at all. I average thousands of more malicious IP addresses now ~48,000 as of testing. Maximum ipset can handle is 65535 from what I have read. Tested on Ubuntu 14.04LTS alon@ganon.me https://alonganon.info \ No newline at end of file