Displaying 13 results from an estimated 13 matches for "ipblock".
Did you mean:
inblock
2006 Jan 05
6
InPlaceEditor and textarea
Hi to all.
First of all exchuse for my bad english
I try to use Ajax.InPlaceEditor with a textarea:
##################
new Ajax.InPlaceEditor($(''ipblock''), ''tools/admin_save.php'',
{ ajaxOptions: {method: ''get''},
rows:10,
cols:20,
callback: function(form, value) { return ''op=ipblock&value='' + value},
onBlur: function(request) {Element.show(''indica...
2019 Jan 14
3
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
Hi
Specs in subject line: CentOS 6.X all latest patches), iptables 1.47, Apache2.2
I use the Geolite legacy databases together with iptables 1.47 to filter traffic for a variety of ports and only allow .AU traffic to have access.
Maxmind (https://dev.maxmind.com/geoip/geoip2/geolite2/) changed the default DB to the latest version which is GeoLite2, this leaves all users in need of the old
2013 May 17
2
[Bug 699] please add new options to iptables-restore to continue on error and suppress error output
https://bugzilla.netfilter.org/show_bug.cgi?id=699
Pablo Neira Ayuso <pablo at netfilter.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |pablo at netfilter.org
Resolution|
2020 Feb 04
3
Switching from lokkit (iptables) to firewalld
...:
2.244.112.0/24
So using the OLD iptables I would run through my file build the
iptables.txt file and start that with DROP for the IP address. iptables ran
through the big list in no time.
I was trying to run a script to go through each line and run:
firewall-cmd --zone=drop --add-source="$ipblock" --permanent
but this takes a long time.
What is a "better" way or more efficient way to keep my long list of bad
addresses and apply them? Thanks,
Jerry
2019 Jan 15
2
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
On Mon, Jan 14, 2019 at 07:29:45AM +0000, Phil Perry (pperry at elrepo.org) wrote:
> On 14/01/2019 07:09, Jobst Schmalenbach wrote:
> > Hi
> I use ipdeny's aggregated country lists to do the same thing:
>
> http://www.ipdeny.com/ipblocks/data/aggregated/
>
> I just feed this data directly into ipset/iptables via a script running on
> my firewall (not a C6 box). ipset is a really efficient way of doing this.
Do you create a separate table, then feed every IP address (via ipset) into this chain?
Would you mind sharing th...
2019 Jan 15
0
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
...chmalenbach wrote:
>
> On Mon, Jan 14, 2019 at 07:29:45AM +0000, Phil Perry (pperry at elrepo.org) wrote:
>> On 14/01/2019 07:09, Jobst Schmalenbach wrote:
>>> Hi
>> I use ipdeny's aggregated country lists to do the same thing:
>>
>> http://www.ipdeny.com/ipblocks/data/aggregated/
>>
>> I just feed this data directly into ipset/iptables via a script running on
>> my firewall (not a C6 box). ipset is a really efficient way of doing this.
>
>
> Do you create a separate table, then feed every IP address (via ipset) into this chain?...
2020 Feb 04
2
Switching from lokkit (iptables) to firewalld
...n through my file build the
> > iptables.txt file and start that with DROP for the IP address. iptables
> ran
> > through the big list in no time.
> >
> > I was trying to run a script to go through each line and run:
> > firewall-cmd --zone=drop --add-source="$ipblock" --permanent
> > but this takes a long time.
> >
> > What is a "better" way or more efficient way to keep my long list of bad
> > addresses and apply them? Thanks,
> >
>
> To some extent you need to ask yourself if a 20 year old blacklist is
>...
2019 Jan 14
0
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
...all latest patches), iptables 1.47, Apache2.2
>
> I use the Geolite legacy databases together with iptables 1.47 to filter traffic for a variety of ports and only allow .AU traffic to have access.
>
I use ipdeny's aggregated country lists to do the same thing:
http://www.ipdeny.com/ipblocks/data/aggregated/
I just feed this data directly into ipset/iptables via a script running
on my firewall (not a C6 box). ipset is a really efficient way of doing
this.
> Maxmind (https://dev.maxmind.com/geoip/geoip2/geolite2/) changed the default DB to the latest version which is GeoLite2, t...
2020 Feb 04
0
Switching from lokkit (iptables) to firewalld
...g the OLD iptables I would run through my file build the
> iptables.txt file and start that with DROP for the IP address. iptables ran
> through the big list in no time.
>
> I was trying to run a script to go through each line and run:
> firewall-cmd --zone=drop --add-source="$ipblock" --permanent
> but this takes a long time.
>
> What is a "better" way or more efficient way to keep my long list of bad
> addresses and apply them? Thanks,
>
To some extent you need to ask yourself if a 20 year old blacklist is
really effective these days. Lots wil...
2015 Jun 08
4
Am I cracked?
Kevin Larsen <kevin.larsen at pioneerballoon.com> schrieb:
> Based on SIP packets coming in from IP addresses you don't recognize,
> while you may not be hacked, you would seem to have people probing your
I think, too, it's someone probing my IP...
> system. One thing you can do at the firewall level is restrict inbound sip
> communications to only those from your
2007 Jan 06
1
Re: [nut-commits] svn commit r710 - in trunk: . clients server
...const struct sockaddr_in *addr);
> +int access_check(const struct sockaddr_in *addr);
> +#else
> int acl_check(const char *aclname, const struct sockaddr_storage *addr);
> int access_check(const struct sockaddr_storage *addr);
> +#endif
> void acl_add(const char *aclname, char *ipblock);
> void access_add(int type, int numargs, const char **arg);
> void acl_free(void);
>
> Modified: trunk/server/ctype.h
> ==============================================================================
> --- trunk/server/ctype.h (original)
> +++ trunk/server/ctype.h Sat Jan...
2017 Jan 09
2
NUT Client shuts down when performing runtime calibration on APC UPS
...psd configuration file
#
# This file contains access control data, you should keep it secure.
#
# It should only be readable by the user that upsd becomes. See the FAQ.
# =======================================================================
# Access Control Lists (ACLs)
#
# ACL <name> <ipblock>
# ACL myhost 10.0.0.1/32
#
# ACCEPT <aclname> [<aclname>...]
# REJECT <aclname> [<aclname>...]
#
# Define lists of hosts or networks with ACL definitions.
#
# ACCEPT and REJECT use ACL definitions to control whether a host is
# allowed to connect to upsd.
#
# This defaul...
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
...eck(const char *aclname, const struct sockaddr_in *addr);
> -int access_check(const struct sockaddr_in *addr);
> +int acl_check(const char *aclname, const struct sockaddr_storage *addr);
> +int access_check(const struct sockaddr_storage *addr);
> void acl_add(const char *aclname, char *ipblock);
> void access_add(int type, int numargs, const char **arg);
> void acl_free(void);
>
> Modified: trunk/server/ctype.h
> ==============================================================================
> --- trunk/server/ctype.h (original)
> +++ trunk/server/ctype.h Fri Jan...