From 660d6615519642d91005908e4dd12610dab438a8 Mon Sep 17 00:00:00 2001
From: Pawel Krawczyk
Date: Wed, 7 Jan 2015 10:57:16 +0000
Subject: [PATCH] merged with blacklist.sh
---
firewall.user | 69 ---------------------------------------------------
1 file changed, 69 deletions(-)
delete mode 100755 firewall.user
diff --git a/firewall.user b/firewall.user
deleted file mode 100755
index f67d9b4..0000000
--- a/firewall.user
+++ /dev/null
@@ -1,69 +0,0 @@
-#!/bin/sh
-
-# IP blacklisting script for OpenWRT routers
-# Pawel Krawczyk https://keybase.io/kravietz
-#
-# This script should be *only* used on OpenWRT as it relies on uci configuration framework
-# specific to these routers.
-#
-# This file should be installed as /etc/firewall.user and then updated from crontab:
-#
-# 01 01 * * * sh /etc/firewall.user
-#
-
-# Emerging Threats lists offensive IPs such as botnet command servers
-urls="http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt"
-# Bogons lists IP addresses that should never appear on public Internet
-# including RFC 1918 networks - this is why this script blocks packets only
-# on WAN interface of an OpenWRT router
-urls="$urls http://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt"
-# Blocklist.de collects reports from fail2ban probes, listing password brute-forces, scanners and other offenders
-urls="$urls https://www.blocklist.de/downloads/export-ips_all.txt"
-
-blocklist_chain_name=blocklists
-
-if [ ! -x /usr/sbin/ipset ]; then
- echo "Cannot find ipset"
- echo "Run: opkg update && opkg install ipset"
- exit 1
-fi
-if [ ! -x /usr/bin/curl ]; then
- echo "Cannot find curl"
- echo "Run: opkg update && opkg install curl"
- exit 1
-fi
-
-# create main blocklists chain
-if ! iptables -L ${blocklist_chain_name}; then iptables -N ${blocklist_chain_name}; fi
-
-# inject references to blocklist in the beginning of input and forward chains
-if ! iptables -L input_rule | grep -q ${blocklist_chain_name}; then
- iptables -I input_rule 1 -j ${blocklist_chain_name}
-fi
-if ! iptables -L forwarding_rule | grep -q ${blocklist_chain_name}; then
- iptables -I forwarding_rule 1 -j ${blocklist_chain_name}
-fi
-
-wan_iface=$(uci get network.wan.ifname)
-if [ -z "$wan_iface" ]; then
- echo "Cannot determine WAN interface"
- exit 1
-fi
-
-iptables -F ${blocklist_chain_name}
-
-for url in $urls; do
- tmp=$(mktemp)
- tmp2=$(mktemp)
- set_name=$(basename $url)
- curl -s -k "$url" >"$tmp"
- sort -u <"$tmp" | egrep "^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$" >"$tmp2"
- ipset -! create ${set_name} hash:net
- while read line; do
- ipset -! add ${set_name} "$line"
- done <"$tmp2"
- iptables -A ${blocklist_chain_name} -i "${wan_iface}" -m set --match-set "${set_name}" src,dst -m limit --limit 10/minute -j LOG --log-prefix "BLOCK ${set_name} "
- iptables -A ${blocklist_chain_name} -i "${wan_iface}" -m set --match-set "${set_name}" src,dst -j DROP
- echo ${set_name} $(ipset list ${set_name} | wc -l)
-done
-