add Linux script
This commit is contained in:
		
							
								
								
									
										52
									
								
								blacklist.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										52
									
								
								blacklist.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,52 @@
 | 
				
			|||||||
 | 
					#!/bin/sh
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# IP blacklisting script for Linux servers
 | 
				
			||||||
 | 
					# Pawel Krawczyk https://keybase.io/kravietz
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# This script should be *only* used on OpenWRT as it relies on uci configuration framework
 | 
				
			||||||
 | 
					# specific to these routers. 
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# This script should be installed as /etc/cron.daily/blacklist
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Emerging Threats lists offensive IPs such as botnet command servers
 | 
				
			||||||
 | 
					urls="http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt"
 | 
				
			||||||
 | 
					# Blocklist.de collects reports from fail2ban probes, listing password brute-forces, scanners and other offenders
 | 
				
			||||||
 | 
					urls="$urls https://www.blocklist.de/downloads/export-ips_all.txt"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					blocklist_chain_name=blocklists
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if [ ! -x /usr/sbin/ipset ]; then
 | 
				
			||||||
 | 
					    echo "Cannot find ipset"
 | 
				
			||||||
 | 
					    echo "Run \"apt-get install ipset\" or \"yum install ipset\""
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# create main blocklists chain
 | 
				
			||||||
 | 
					if ! iptables -L ${blocklist_chain_name}; then iptables -N ${blocklist_chain_name}; fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# inject references to blocklist in the beginning of input and forward chains
 | 
				
			||||||
 | 
					if ! iptables -L INPUT|grep -q ${blocklist_chain_name}; then
 | 
				
			||||||
 | 
					  iptables -I INPUT 1 -m state --state NEW,RELATED -j ${blocklist_chain_name}
 | 
				
			||||||
 | 
					fi
 | 
				
			||||||
 | 
					if ! iptables -L FORWARD|grep -q ${blocklist_chain_name}; then
 | 
				
			||||||
 | 
					  iptables -I FORWARD 1 -m state --state NEW,RELATED -j ${blocklist_chain_name}
 | 
				
			||||||
 | 
					fi                                                                 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					iptables -F ${blocklist_chain_name}
 | 
				
			||||||
 | 
					                                                                      
 | 
				
			||||||
 | 
					for url in $urls; do
 | 
				
			||||||
 | 
					    tmp=$(mktemp)
 | 
				
			||||||
 | 
					    tmp2=$(mktemp)
 | 
				
			||||||
 | 
					    set_name=$(basename $url)
 | 
				
			||||||
 | 
					    curl --compressed -k "$url" >"$tmp"
 | 
				
			||||||
 | 
					    sort -u <"$tmp" | egrep "^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$" >"$tmp2"
 | 
				
			||||||
 | 
					    ipset -! create ${set_name} hash:net
 | 
				
			||||||
 | 
					    while read line; do
 | 
				
			||||||
 | 
					        ipset add ${set_name} "$line"
 | 
				
			||||||
 | 
					    done <"$tmp2"
 | 
				
			||||||
 | 
					    iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -m limit --limit 10/minute -j LOG --log-prefix "BLOCK ${set_name} "
 | 
				
			||||||
 | 
					    iptables -A ${blocklist_chain_name} -m set --match-set "${set_name}" src,dst -j DROP
 | 
				
			||||||
 | 
					    echo ${set_name} $(ipset list ${set_name} | wc -l)
 | 
				
			||||||
 | 
					done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		Reference in New Issue
	
	Block a user