swetoast
Guest
Hi Everyone, I'm back with another IPSET for your firewall this time around its for blocking Telemetry and some Android Rootkit along with Shodan.io Scanners. For official installatins instructions and more information please consult the wiki about the information.
NOTE: for all users running iblocklist-loader.sh will be ineligible for support since redhat has incorporated telemetry block along with shodan.io block this makes privacy-filter incompatible so either run his script or my script dont run both will add incompatible check to debugtool.
To see if the firewall rule is working use the following command:
ipv4
ipv6
How to test if an ip is on the list before reporting that this filter is blocking unwanted sources.
and to investigate what entry is causing it, well that takes time but remove 10 sources at the time and re-run the script then narrow it down to the offending source.
NOTE: for all users running iblocklist-loader.sh will be ineligible for support since redhat has incorporated telemetry block along with shodan.io block this makes privacy-filter incompatible so either run his script or my script dont run both will add incompatible check to debugtool.
To see if the firewall rule is working use the following command:
ipv4
Code:
iptables -L -v | grep "privacy-filter_ipv4" | awk '{print "Privacy Filter (ipv4) Blocked: " $1 " packets", $2 " is the size of the transmission"}'
ipv6
Code:
ip6tables -L -v | grep "privacy-filter_ipv6" | awk '{print "Privacy Filter (ipv6) Blocked: " $1 " packets", $2 " is the size of the transmission"}'
How to test if an ip is on the list before reporting that this filter is blocking unwanted sources.
Code:
ipset test [set] [ip]
example:
ipset test privacy-filter_ipv4 43.2.5.45
and to investigate what entry is causing it, well that takes time but remove 10 sources at the time and re-run the script then narrow it down to the offending source.
Last edited: