[FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
Locked 240 messages Options
1 ... 45678910 ... 12
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
Sorry gents, first thing in the morning over here now.. Yep, different base images will explain things. 

I will add some checks for pre-existing snort.rules and L2.blacklist files before trying to rename them *.bak

Also, if I've based paths on suricata ones and there are better vanilla snort ones to use, let me know! 

On Sun, 18 Aug. 2019, 4:18 am Grommish [via Itus Networks Owners Forum], <[hidden email]> wrote:
Ok.. Road/Gnomad, try this image.

https://drive.google.com/open?id=1Q_j-WTYhwqab9SOi4oPWQazvL6jst5w4

Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1855.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
I've already corrected the image to fit your script, so nothing should need to be changed on your end.

That snort.tgz file was creating some of the directory structure when it built out first boot. With that gone, it stopped creating them 😀

Anyway, it's fixed now if you want to check out the new image, and double check that it works.  Just copy the image over to /dev/mmcblk1p1 and remove /.norwits then reboot and it'll clear out the old partition and rebuild from the image

On Sat, Aug 17, 2019, 9:14 PM Gnomad [via Itus Networks Owners Forum] <[hidden email]> wrote:
Sorry gents, first thing in the morning over here now.. Yep, different base images will explain things. 

I will add some checks for pre-existing snort.rules and L2.blacklist files before trying to rename them *.bak

Also, if I've based paths on suricata ones and there are better vanilla snort ones to use, let me know! 

On Sun, 18 Aug. 2019, 4:18 am Grommish [via Itus Networks Owners Forum], <[hidden email]> wrote:
Ok.. Road/Gnomad, try this image.

https://drive.google.com/open?id=1Q_j-WTYhwqab9SOi4oPWQazvL6jst5w4

Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1855.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
OpenWrt SNAPSHOT, r10391-3d8d528939



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1856.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
The advantage to me being Eastern US time is that I have time while you sleep to get things done..  Besides, it takes almost no time to compile this on my laptop, unless I'm doing a kernel change or removing a dependency and have to do a make clean.  Otherwise, it literally takes about a minute and a half.

As far as Suricata goes, Suricata 5 will REQUIRE Rust and Cargo to compile and run.  Unfortunately, Rust does not have a mips compatible source code (at least, not yet).  I was able to get Suricata 4.1.4 to build once I finagled it, but abandoned the task once I started looking into the requirements for the current Beta.  If they ever update it, then I'll go back to it.

So, for now, we can put them where-ever we want.. Even if Suracata comes back to the Shield down the line, we can make the structure however.

Itus used the "profiles" directly to hold the Suricata AND Snort configs, and I wasn't even aware Suricata was an option.. You can see tags for it in the LUA page for IDS on the original Shield files.  I don't know if they ever included Suricata or not, but it's the whole reason we have a profile directory at all.  I didn't understand at the beginning what they were using profiles for, so I just dropped it to profile and stored my config files for Snort in there so they could be cat'ed when the service starts into snort.conf (and edited in pieces from luCi)
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
In reply to this post by Grommish
Whoah - new theme!  :)

Yes I can confirm that works nicely.  
Apologies for the mixup deleting snort.tar.gz.  I figured files under /files would be unpacked to track changes, so had assumed the .tar was a leftover.

On the console updaterules.sh will complain about no initial snort.rules and L2.blacklist files on first run only, but that doesn't stop it doing its thing.  Subsequent runs it doesn't complain.

Shield v2 alpha lives!

PS: don't see any 404s but the serif font looks a little funny - might be missing a font replacement?
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
No worries on the tgz.  The original plan was to house complete snort configurations, and other configs, in one of three tgz files and unpack it at first boot depending on which mode the Shield was in (by reading the switch GPIOs)

That way, we only really have to maintain a single image and put things like network configs, snort configs, e2guardian configs in the tgz files where they differ from router to bridge to Gateway.

And I included 3 additional luCi themes in the image, besides the default

On Sat, Aug 17, 2019, 9:51 PM Gnomad [via Itus Networks Owners Forum] <[hidden email]> wrote:
Whoah - new theme!  :)

Yes I can confirm that works nicely.  
Apologies for the mixup deleting snort.tar.gz.  I figured files under /files would be unpacked to track changes, so had assumed the .tar was a leftover.

On the console updaterules.sh will complain about no initial snort.rules and L2.blacklist files on first run only, but that doesn't stop it doing its thing.  Subsequent runs it doesn't complain.

Shield v2 alpha lives!

PS: don't see any 404s but the serif font looks a little funny - might be missing a font replacement?
OpenWrt SNAPSHOT, r10391-3d8d528939



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1859.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
In reply to this post by Roadrunnere42
Btw cheers for the compliment @Roadrunner, but you (& Hans, user8446 etc) did all the heavy lifting!
I just based it all from your fw_upgrade and got the benefit of slapping Grommish's v2 label on it ;)
Roadrunnere42 wrote
Gnomad
Great work on the updated scripts.

I'm have trouble running updaterules.sh, which is on a fresh image
installed yesterday, had a look through and I must admit it's better code
than what i did, nice a clean.
Note, I'm not having any problems with heat or throughput with the case on - all seems pretty solid so far..
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Roadrunnere42
In reply to this post by Grommish
All working fine
Been playing around and maybe you want to change this file in /etc/config/hhttpd to prevent uhttpd listing on the wan port, they also say unbind ipv6 but couldn't fine any reference in uhttpd.
I will make suggestion as i play and let you full time computer guys decide what to include, Im just a guy who likes computers with no programming knowledge, just picking things up as i go

Securing uHTTPd

By default, uHTTPd is bind to 0.0.0.0 which also includes the WAN port of your router. To bind uHTTPd to the LAN port only you have to change the listen_http and listen_https options to your LAN IP address.

To get your current LAN IP address run this command:

root@OpenWrt:~# uci get network.lan.ipaddr
10.10.10.10

Then edit /etc/config/uhttpd and bind listen_http to specific 10.10.10.10 IP instead of 0.0.0.0

config uhttpd main
        # HTTP listen addresses, multiple allowed
        list listen_http        10.10.10.10:80
#       list listen_http        [::]:80
 
        # HTTPS listen addresses, multiple allowed
        list listen_https       10.10.10.10:443
#       list listen_https       [::]:443

On Sat, 17 Aug 2019 at 16:34, Grommish [via Itus Networks Owners Forum] <[hidden email]> wrote:
Road,

Here is the link to the commit if you just want to grab the files locally.  Anything under the files/ directory get injected into the image file tree as laid out (files/etc get put into /etc for example)



On Sat, Aug 17, 2019, 11:27 AM Grommish [via Itus Networks Owners Forum] <[hidden email]> wrote:
Let me check to see if I actually included this updated script in the image you have. I haven't synced in a few days and just did the pull request merge.

I'll sync up and build out here in a bit, then link up the updated image

On Sat, Aug 17, 2019, 11:23 AM Roadrunnere42 [via Itus Networks Owners Forum] <[hidden email]> wrote:
Gnomad

Great work on the updated scripts.

I'm have trouble running updaterules.sh, which is on a fresh image installed yesterday, had a look through and I must admit it's better code than what i did, nice a clean.

1. Ll2blacklist file is not present so script need to check if present if not create folder and files.
                     Replacing /etc/snort/rules/iplists/L2.blacklist
                     mv: can't rename '/etc/snort/rules/iplists/L2.blacklist': No such file or directory
                     mv: can't rename 'L2.blacklist': No such file or directory

2. ./updaterules.sh: line 66: file: not found. Again I think this is to do with folder / files not present on fresh install

                   Downloading community-rules
                     https://www.snort.org/downloads/community/community-rules.tar.gz
                      % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
                     100   467    0   467    0     0    812      0 --:--:-- --:--:-- --:--:--  1212
                     100  321k  100  321k    0     0   190k      0  0:00:01  0:00:01 --:--:--  400k
                    . /updaterules.sh: line 66: file: not found
 
                   Downloading abuse-sslbl.rules
                    https://sslbl.abuse.ch/blacklist/sslipblacklist.rules
                     % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
                    100 21127  100 21127    0     0  36425      0 --:--:-- --:--:-- --:--:-- 88768
                    ./updaterules.sh: line 66: file: not found

3. Don't thing this is anything to do with your script but anyidea. I don't have the profile directory present, has this been added lately.

Restarting SNORT service
cat: can't open '/etc/snort/profile/config1_advanced.conf': No such file or directory
cat: can't open '/etc/snort/profile/config2_engine.conf': No such file or directory
cat: can't open '/etc/snort/profile/config3_preprocessors.conf': No such file or directory
cat: can't open '/etc/snort/profile/config4_other.conf': No such file or directory





On Tue, 13 Aug 2019 at 17:47, Gnomad [via Itus Networks Owners Forum] <[hidden email]> wrote:
Updated the script with some improvements - parameterised downloads which now continue if one fails, excluded sids out to a separate (optional) file.  
I also tried `service snort restart` but my shell complained it didn't recognise `service`.  Let me know if I got that syntax wrong.

https://gist.github.com/DaveA-W/e3e9e95a21d418e9c83a3a3a0731e3cc
OpenWrt SNAPSHOT, r10391-3d8d528939



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1823.html
To start a new topic under Technical Discussion, email [hidden email]
To unsubscribe from Itus Networks Owners Forum, click here.
NAML



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1849.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1850.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1851.html
To start a new topic under Technical Discussion, email [hidden email]
To unsubscribe from Itus Networks Owners Forum, click here.
NAML
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
Added..  I can't see a downside except for potentially not being able to access luCi from the outside for those who need it.. But, You'd expect someone needing to do that would have VPN, so I'm good with the change.

Roadrunnere42 wrote
All working fine
Been playing around and maybe you want to change this file in
/etc/config/hhttpd to prevent uhttpd listing on the wan port, they also say
unbind ipv6 but couldn't fine any reference in uhttpd.
I will make suggestion as i play and let you full time computer guys decide
what to include, Im just a guy who likes computers with no programming
knowledge, just picking things up as i go
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
As a small update, I've put in a script that automates the process of black-listing URLs (rather than IP addresses).  Ideally, it is used as an ad-hoc ad-blocker.

Anyone feel like creating a luCi page for it?    Let me know and I can give you details since I've not pushed it to GH yet.
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
Can do, flick me the deets.

Domains blocked via snort or e2guardian?
We could maybe add the ability to update via published ad lists like those at https://filterlists.com..
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
Even better and more reliable.  I used the local /etc/hosts file to void out specific urls.  The lists are maintained, but any URL list should work. I'll put a commit up shortly I hope 

On Mon, Sep 2, 2019, 6:15 AM Gnomad [via Itus Networks Owners Forum] <[hidden email]> wrote:
Can do, flick me the deets.

Domains blocked via snort or e2guardian?
We could maybe add the ability to update via published ad lists like those at https://filterlists.com..
OpenWrt SNAPSHOT, r10391-3d8d528939



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1872.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
I have this as /etc/snort/updateblacklist.sh


#!/bin/bash
#
# Script designed to automate the updating of blocklists for DNS

# Create the temp directory
TEMP_DIR="/var/blacklist"

if [ ! -d /var/${TEMP_DIR} ]
then
   mkdir -p ${TEMP_DIR}
fi

cd ${TEMP_DIR}

# Create a new host file
cat << EOF > hosts
# This host file is automatically generated
# Please see /etc/snort/updateblacklist.sh for more information
127.0.0.1 localhost

::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

# YouTube ads
# TODO: Make sure these actually do anything - Untested at the moment
127.0.0.1 r1---sn-vgqsen7z.googlevideo.com
127.0.0.1 r1.sn-vgqsen7z.googlevideo.com
127.0.0.1 r17---sn-vgqsenes.googlevideo.com
127.0.0.1 r2---sn-vgqs7n7k.googlevideo.com
127.0.0.1 r20---sn-vgqs7ne7.googlevideo.com
127.0.0.1 r20.sn-vgqs7ne7.googlevideo.com
127.0.0.1 r4---sn-vgqs7nez.googlevideo.com
127.0.0.1 r4.sn-vgqs7nez.googlevideo.com
127.0.0.1 www.youtube-nocookie.com
EOF

########
# Grab the lists into one place

wget -O badhosts.list https://v.firebog.net/hosts/lists.php?type=tick
IFS=$'\n' read -d '' -r badhosts < badhosts.list
NUM_LINES=$(wc -l badhosts.list)
DL_LINES=${badhosts[@]}
for url in ${badhosts[@]}; do
   wget -O badurls $url
   cat badurls >> hosts
done

# Copy the new hosts files over
echo "Copying new host list"
mv ${TEMP_DIR}/hosts /etc/hosts
/etc/init.d/network restart


This updates /etc/hosts to null out bad URLs at the host level.  None of the URLs listed will go in or out of the Shield from either side.
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
I have a concern that I need help addressing with the update script.

1) We are pulling these from external sources
2) The update lists can contain anything

We need to see if there is a way to ENSURE anything added via the update script points to 0.0.0.0 or 127.0.0.1 so if the external source gets poisoned, we aren't effected by a DNS attack.

So, we gotta figure out a way to do it.   Suggestions? Gnomad, you might be able to to come up with something script wise?
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
That script doesn't quite work on my Shield as-is - not sure if you had to make any edits?
sh /etc/snort/updateblacklist.sh
Downloading 'https://v.firebog.net/hosts/lists.php?type=tick'
Connecting to 104.27.157.131:443
Writing to 'badhosts.list'

Download completed (2396 bytes)
/etc/snort/updateblacklist.sh: line 45: syntax error: bad substitution
I guess we're after a lua page with an on/off switch, plus potential replacement of the master list URL.  Will have a bit of a play, also see if I can swing some `sed` filtering to strip any invalid localhost IPs.
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
Hmm.

This is my output, and I'll repost the script.  What is line 45 on you end?  Mine is a for loop.

root@OpenWrt:/etc/snort# ./updateblacklist.sh
Downloading 'https://v.firebog.net/hosts/lists.php?type=tick'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badhosts.list'

Download completed (2396 bytes)
Downloading 'https://hosts-file.net/grm.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************| 15987   0:00:00 ETA
Download completed (15987 bytes)
Downloading 'https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts'
Connecting to 185.199.109.153:443
Writing to 'badurls'
badurls              100% |*******************************| 14484   0:00:00 ETA
Download completed (14484 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 95517   0:00:00 ETA
Download completed (95517 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|  2087   0:00:00 ETA
Download completed (2087 bytes)
Downloading 'https://v.firebog.net/hosts/static/w3kbl.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (15674 bytes)
Downloading 'https://adaway.org/hosts.txt'
Connecting to 2606:4700:30::6818:6959:443
Writing to 'badurls'

Download completed (13722 bytes)
Downloading 'https://v.firebog.net/hosts/AdguardDNS.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (470937 bytes)
Downloading 'https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|  1126k  0:00:00 ETA
Download completed (1153948 bytes)
Downloading 'https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt'
Connecting to 52.216.21.125:443
Writing to 'badurls'
badurls              100% |*******************************| 43642   0:00:00 ETA
Download completed (43642 bytes)
Downloading 'https://hosts-file.net/ad_servers.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  1730k  0:00:00 ETA
Download completed (1772405 bytes)
Downloading 'https://v.firebog.net/hosts/Easylist.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (29295 bytes)
Downloading 'https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts;showintro=0'
Connecting to 213.230.210.230:443
Writing to 'badurls'

Download completed (80999 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/UncheckyAds/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|   310   0:00:00 ETA
Download completed (310 bytes)
Downloading 'https://www.squidblacklist.org/downloads/dg-ads.acl'
Connecting to 2606:4700:30::6818:6e29:443
Writing to 'badurls'
badurls              100% |*******************************| 68648   0:00:00 ETA
Download completed (68648 bytes)
Downloading 'https://v.firebog.net/hosts/Easyprivacy.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (55357 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Ads.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (58749 bytes)
Downloading 'https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt'
Connecting to 35.231.145.151:443
Writing to 'badurls'
badurls              100% |*******************************|   363k  0:00:00 ETA
Download completed (372286 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 41949   0:00:00 ETA
Download completed (41949 bytes)
Downloading 'https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 12932   0:00:00 ETA
Download completed (12932 bytes)
Downloading 'https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt'
Connecting to 52.216.239.189:443
Writing to 'badurls'
badurls              100% |*******************************| 44181   0:00:00 ETA
Download completed (44181 bytes)
Downloading 'https://mirror1.malwaredomains.com/files/justdomains'
Connecting to 216.245.214.30:443
Writing to 'badurls'
badurls              100% |*******************************|   581k  0:00:00 ETA
Download completed (595746 bytes)
Downloading 'https://hosts-file.net/exp.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************| 44640   0:00:00 ETA
Download completed (44640 bytes)
Downloading 'https://hosts-file.net/emd.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  9333k  0:00:00 ETA
Download completed (9557291 bytes)
Downloading 'https://hosts-file.net/psh.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  6080k  0:00:00 ETA
Download completed (6226756 bytes)
Downloading 'https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt'
Connecting to 2800:68:0:bebe::3:443
Writing to 'badurls'
badurls              100% |*******************************| 50674   0:00:00 ETA
Download completed (50674 bytes)
Downloading 'https://www.malwaredomainlist.com/hostslist/hosts.txt'
Connecting to 143.215.130.61:443
Writing to 'badurls'
badurls              100% |*******************************| 35619   0:00:00 ETA
Download completed (35619 bytes)
Downloading 'https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Repor'
Connecting to 2406:da00:ff00::6b17:d1f5:443
Writing to 'badurls'
badurls              100% |*******************************| 43844   0:00:00 ETA
Download completed (43844 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Malware.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (155691 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Phishing.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (155691 bytes)
Downloading 'https://phishing.army/download/phishing_army_blocklist_extended.txt'
Connecting to 2606:4700:30::6818:73fc:443
Writing to 'badurls'
badurls              100% |*******************************| 86056   0:00:00 ETA
Download completed (86056 bytes)
Downloading 'https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt'
Connecting to 35.231.145.151:443
Writing to 'badurls'
badurls              100% |*******************************|  4776   0:00:00 ETA
Download completed (4776 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************| 51699   0:00:00 ETA
Download completed (51699 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/CW_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  4467   0:00:00 ETA
Download completed (4467 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/LY_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  3957   0:00:00 ETA
Download completed (3957 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/TC_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  3103   0:00:00 ETA
Download completed (3103 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/TL_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|   969   0:00:00 ETA
Download completed (969 bytes)
Downloading 'https://v.firebog.net/hosts/Shalla-mal.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (337629 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts'
Connecting to 151.101.200.133:443
Writing to 'badurls'
badurls              100% |*******************************| 68892   0:00:00 ETA
Download completed (68892 bytes)
Downloading 'https://www.squidblacklist.org/downloads/dg-malicious.acl'
Connecting to 2606:4700:30::6818:6f29:443
Writing to 'badurls'
badurls              100% |*******************************|  3085k  0:00:00 ETA
Download completed (3159641 bytes)
Downloading 'https://zerodot1.gitlab.io/CoinBlockerLists/hosts'
Connecting to 35.185.44.232:443
Writing to 'badurls'
badurls              100% |*******************************|   728k  0:00:00 ETA
Download completed (745794 bytes)
Copying new host list
[784984.398142] br-lan: port 2(eth2) entered disabled state
[784984.411213] device eth1 left promiscuous mode
[784984.415787] br-lan: port 1(eth1) entered disabled state
[784984.437206] device eth0 left promiscuous mode
[784984.442008] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[784984.448039] device eth2 left promiscuous mode
[784984.452631] br-lan: port 2(eth2) entered disabled state
[784984.483802] eth2: Link down
[784984.493904] device br-lan left promiscuous mode
[784984.498917] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[784984.612660] eth0: Link down
root@OpenWrt:/etc/snort# [784986.188041] br-lan: port 1(eth1) entered blocking state
[784986.193414] br-lan: port 1(eth1) entered disabled state
[784986.198943] device eth1 entered promiscuous mode
[784986.211981] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[784986.224593] br-lan: port 2(eth2) entered blocking state
[784986.229948] br-lan: port 2(eth2) entered disabled state
[784986.235506] device eth2 entered promiscuous mode
[784986.240331] br-lan: port 2(eth2) entered blocking state
[784986.245672] br-lan: port 2(eth2) entered forwarding state
[784986.251316] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[784986.274534] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[784987.243339] br-lan: port 2(eth2) entered disabled state
[784989.299837] eth2: 100 Mbps Full duplex, port 2, queue 2
[784989.305343] br-lan: port 2(eth2) entered blocking state
[784989.310677] br-lan: port 2(eth2) entered forwarding state
[784990.388801] eth0: 1000 Mbps Full duplex, port 0, queue 0
[784990.394270] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready

root@OpenWrt:/etc/snort#

/etc/snort/updateblacklist.sh

#!/bin/bash
#
# Script designed to automate the updating of blocklists for DNS

# Create the temp directory
TEMP_DIR="/var/blacklist"

if [ ! -d /var/${TEMP_DIR} ]
then
   mkdir -p ${TEMP_DIR}
fi

cd ${TEMP_DIR}

# Create a new host file
cat << EOF > hosts
# This host file is automatically generated
# Please see /etc/snort/updateblacklist.sh for more information
127.0.0.1 localhost

::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

# YouTube ads
# TODO: Make sure these actually do anything - Untested at the moment
127.0.0.1 r1---sn-vgqsen7z.googlevideo.com
127.0.0.1 r1.sn-vgqsen7z.googlevideo.com
127.0.0.1 r17---sn-vgqsenes.googlevideo.com
127.0.0.1 r2---sn-vgqs7n7k.googlevideo.com
127.0.0.1 r20---sn-vgqs7ne7.googlevideo.com
127.0.0.1 r20.sn-vgqs7ne7.googlevideo.com
127.0.0.1 r4---sn-vgqs7nez.googlevideo.com
127.0.0.1 r4.sn-vgqs7nez.googlevideo.com
127.0.0.1 www.youtube-nocookie.com
EOF

########
# Grab the lists into one place

wget -O badhosts.list https://v.firebog.net/hosts/lists.php?type=tick
IFS=$'\n' read -d '' -r badhosts < badhosts.list
NUM_LINES=$(wc -l badhosts.list)
DL_LINES=${badhosts[@]}
for url in ${badhosts[@]}; do
   wget -O badurls $url
   cat badurls >> hosts
done

# Copy the new hosts files over
echo "Copying new host list"
mv ${TEMP_DIR}/hosts /etc/hosts
/etc/init.d/network restart
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
All good once I `chmod`ed it to execute via `./updateblacklist.sh` as you did - not sure why it made a difference, but hey.

On Sun, 8 Sep 2019 at 14:16, Grommish [via Itus Networks Owners Forum] <[hidden email]> wrote:
Hmm.

This is my output, and I'll repost the script.  What is line 45 on you end?  Mine is a for loop.

root@OpenWrt:/etc/snort# ./updateblacklist.sh
Downloading 'https://v.firebog.net/hosts/lists.php?type=tick'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badhosts.list'

Download completed (2396 bytes)
Downloading 'https://hosts-file.net/grm.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************| 15987   0:00:00 ETA
Download completed (15987 bytes)
Downloading 'https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts'
Connecting to 185.199.109.153:443
Writing to 'badurls'
badurls              100% |*******************************| 14484   0:00:00 ETA
Download completed (14484 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 95517   0:00:00 ETA
Download completed (95517 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|  2087   0:00:00 ETA
Download completed (2087 bytes)
Downloading 'https://v.firebog.net/hosts/static/w3kbl.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (15674 bytes)
Downloading 'https://adaway.org/hosts.txt'
Connecting to 2606:4700:30::6818:6959:443
Writing to 'badurls'

Download completed (13722 bytes)
Downloading 'https://v.firebog.net/hosts/AdguardDNS.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (470937 bytes)
Downloading 'https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|  1126k  0:00:00 ETA
Download completed (1153948 bytes)
Downloading 'https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt'
Connecting to 52.216.21.125:443
Writing to 'badurls'
badurls              100% |*******************************| 43642   0:00:00 ETA
Download completed (43642 bytes)
Downloading 'https://hosts-file.net/ad_servers.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  1730k  0:00:00 ETA
Download completed (1772405 bytes)
Downloading 'https://v.firebog.net/hosts/Easylist.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (29295 bytes)
Downloading 'https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts;showintro=0'
Connecting to 213.230.210.230:443
Writing to 'badurls'

Download completed (80999 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/UncheckyAds/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************|   310   0:00:00 ETA
Download completed (310 bytes)
Downloading 'https://www.squidblacklist.org/downloads/dg-ads.acl'
Connecting to 2606:4700:30::6818:6e29:443
Writing to 'badurls'
badurls              100% |*******************************| 68648   0:00:00 ETA
Download completed (68648 bytes)
Downloading 'https://v.firebog.net/hosts/Easyprivacy.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (55357 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Ads.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (58749 bytes)
Downloading 'https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt'
Connecting to 35.231.145.151:443
Writing to 'badurls'
badurls              100% |*******************************|   363k  0:00:00 ETA
Download completed (372286 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 41949   0:00:00 ETA
Download completed (41949 bytes)
Downloading 'https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt'
Connecting to 151.101.184.133:443
Writing to 'badurls'
badurls              100% |*******************************| 12932   0:00:00 ETA
Download completed (12932 bytes)
Downloading 'https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt'
Connecting to 52.216.239.189:443
Writing to 'badurls'
badurls              100% |*******************************| 44181   0:00:00 ETA
Download completed (44181 bytes)
Downloading 'https://mirror1.malwaredomains.com/files/justdomains'
Connecting to 216.245.214.30:443
Writing to 'badurls'
badurls              100% |*******************************|   581k  0:00:00 ETA
Download completed (595746 bytes)
Downloading 'https://hosts-file.net/exp.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************| 44640   0:00:00 ETA
Download completed (44640 bytes)
Downloading 'https://hosts-file.net/emd.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  9333k  0:00:00 ETA
Download completed (9557291 bytes)
Downloading 'https://hosts-file.net/psh.txt'
Connecting to 107.22.171.143:443
Writing to 'badurls'
badurls              100% |*******************************|  6080k  0:00:00 ETA
Download completed (6226756 bytes)
Downloading 'https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt'
Connecting to 2800:68:0:bebe::3:443
Writing to 'badurls'
badurls              100% |*******************************| 50674   0:00:00 ETA
Download completed (50674 bytes)
Downloading 'https://www.malwaredomainlist.com/hostslist/hosts.txt'
Connecting to 143.215.130.61:443
Writing to 'badurls'
badurls              100% |*******************************| 35619   0:00:00 ETA
Download completed (35619 bytes)
Downloading 'https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Repor'
Connecting to 2406:da00:ff00::6b17:d1f5:443
Writing to 'badurls'
badurls              100% |*******************************| 43844   0:00:00 ETA
Download completed (43844 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Malware.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (155691 bytes)
Downloading 'https://v.firebog.net/hosts/Prigent-Phishing.txt'
Connecting to 2606:4700:30::681b:9c83:443
Writing to 'badurls'

Download completed (155691 bytes)
Downloading 'https://phishing.army/download/phishing_army_blocklist_extended.txt'
Connecting to 2606:4700:30::6818:73fc:443
Writing to 'badurls'
badurls              100% |*******************************| 86056   0:00:00 ETA
Download completed (86056 bytes)
Downloading 'https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt'
Connecting to 35.231.145.151:443
Writing to 'badurls'
badurls              100% |*******************************|  4776   0:00:00 ETA
Download completed (4776 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************| 51699   0:00:00 ETA
Download completed (51699 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/CW_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  4467   0:00:00 ETA
Download completed (4467 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/LY_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  3957   0:00:00 ETA
Download completed (3957 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/TC_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|  3103   0:00:00 ETA
Download completed (3103 bytes)
Downloading 'https://ransomwaretracker.abuse.ch/downloads/TL_C2_DOMBL.txt'
Connecting to 151.101.202.49:443
Writing to 'badurls'
badurls              100% |*******************************|   969   0:00:00 ETA
Download completed (969 bytes)
Downloading 'https://v.firebog.net/hosts/Shalla-mal.txt'
Connecting to 2606:4700:30::681b:9d83:443
Writing to 'badurls'

Download completed (337629 bytes)
Downloading 'https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts'
Connecting to 151.101.200.133:443
Writing to 'badurls'
badurls              100% |*******************************| 68892   0:00:00 ETA
Download completed (68892 bytes)
Downloading 'https://www.squidblacklist.org/downloads/dg-malicious.acl'
Connecting to 2606:4700:30::6818:6f29:443
Writing to 'badurls'
badurls              100% |*******************************|  3085k  0:00:00 ETA
Download completed (3159641 bytes)
Downloading 'https://zerodot1.gitlab.io/CoinBlockerLists/hosts'
Connecting to 35.185.44.232:443
Writing to 'badurls'
badurls              100% |*******************************|   728k  0:00:00 ETA
Download completed (745794 bytes)
Copying new host list
[784984.398142] br-lan: port 2(eth2) entered disabled state
[784984.411213] device eth1 left promiscuous mode
[784984.415787] br-lan: port 1(eth1) entered disabled state
[784984.437206] device eth0 left promiscuous mode
[784984.442008] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[784984.448039] device eth2 left promiscuous mode
[784984.452631] br-lan: port 2(eth2) entered disabled state
[784984.483802] eth2: Link down
[784984.493904] device br-lan left promiscuous mode
[784984.498917] IPv6: ADDRCONF(NETDEV_UP): eth2: link is not ready
[784984.612660] eth0: Link down
root@OpenWrt:/etc/snort# [784986.188041] br-lan: port 1(eth1) entered blocking state
[784986.193414] br-lan: port 1(eth1) entered disabled state
[784986.198943] device eth1 entered promiscuous mode
[784986.211981] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
[784986.224593] br-lan: port 2(eth2) entered blocking state
[784986.229948] br-lan: port 2(eth2) entered disabled state
[784986.235506] device eth2 entered promiscuous mode
[784986.240331] br-lan: port 2(eth2) entered blocking state
[784986.245672] br-lan: port 2(eth2) entered forwarding state
[784986.251316] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[784986.274534] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[784987.243339] br-lan: port 2(eth2) entered disabled state
[784989.299837] eth2: 100 Mbps Full duplex, port 2, queue 2
[784989.305343] br-lan: port 2(eth2) entered blocking state
[784989.310677] br-lan: port 2(eth2) entered forwarding state
[784990.388801] eth0: 1000 Mbps Full duplex, port 0, queue 0
[784990.394270] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready

root@OpenWrt:/etc/snort#

/etc/snort/updateblacklist.sh

#!/bin/bash
#
# Script designed to automate the updating of blocklists for DNS

# Create the temp directory
TEMP_DIR="/var/blacklist"

if [ ! -d /var/${TEMP_DIR} ]
then
   mkdir -p ${TEMP_DIR}
fi

cd ${TEMP_DIR}

# Create a new host file
cat << EOF > hosts
# This host file is automatically generated
# Please see /etc/snort/updateblacklist.sh for more information
127.0.0.1 localhost

::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

# YouTube ads
# TODO: Make sure these actually do anything - Untested at the moment
127.0.0.1 r1---sn-vgqsen7z.googlevideo.com
127.0.0.1 r1.sn-vgqsen7z.googlevideo.com
127.0.0.1 r17---sn-vgqsenes.googlevideo.com
127.0.0.1 r2---sn-vgqs7n7k.googlevideo.com
127.0.0.1 r20---sn-vgqs7ne7.googlevideo.com
127.0.0.1 r20.sn-vgqs7ne7.googlevideo.com
127.0.0.1 r4---sn-vgqs7nez.googlevideo.com
127.0.0.1 r4.sn-vgqs7nez.googlevideo.com
127.0.0.1 www.youtube-nocookie.com
EOF

########
# Grab the lists into one place

wget -O badhosts.list https://v.firebog.net/hosts/lists.php?type=tick
IFS=$'\n' read -d '' -r badhosts < badhosts.list
NUM_LINES=$(wc -l badhosts.list)
DL_LINES=${badhosts[@]}
for url in ${badhosts[@]}; do
   wget -O badurls $url
   cat badurls >> hosts
done

# Copy the new hosts files over
echo "Copying new host list"
mv ${TEMP_DIR}/hosts /etc/hosts
/etc/init.d/network restart
Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1877.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
In reply to this post by Gnomad
PR up for a "safe" /etc/snort/hosts/updatehosts.sh
https://github.com/Grommish/Itus_Shield_v2/pull/2/files#diff-f363d9f8c5abce896b52b3f2a5df9b3e

But
1. although pinging from the Shield directly resolves to 127.0.0.1 as expected, browsing to these domains from a downstream client is not blocked.
I guess we need to change client DNS to the Shield?

2. local speedtest was then 60% slower than before.
I brought this back up to reasonable speeds by commenting out the larger https://hosts-file.net/emd.txt and psh.txt downloads.

I wonder if e2guardian might perform better, obviate the need to change client DNS entries?

root@OpenWrt:/# /etc/snort/hosts/updatehosts.sh

Preparing working directory for host list download and ingestion
/tmp/hosts
Downloading bad host list urls from https://v.firebog.net/hosts/lists.php?type=tick
...
908683 badhosts.all

Sorting bad hosts and removing duplicates
Cleaning up working files

Displaying host_counter.log

# Hosts  Url processed by etc/snort/hosts/updatehosts.sh
-------- -----------------------------------------------
    526 https://hosts-file.net/grm.txt
    713 https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
   3619 https://raw.githubusercontent.com/StevenBlack/hosts/master/data/KADhosts/hosts
     73 https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Spam/hosts
    753 https://v.firebog.net/hosts/static/w3kbl.txt
    411 https://adaway.org/hosts.txt
  29855 https://v.firebog.net/hosts/AdguardDNS.txt
  34374 https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
   2703 https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
  45739 https://hosts-file.net/ad_servers.txt
   1609 https://v.firebog.net/hosts/Easylist.txt
   3039 https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts;showintro=0
     10 https://raw.githubusercontent.com/StevenBlack/hosts/master/data/UncheckyAds/hosts
   4315 https://www.squidblacklist.org/downloads/dg-ads.acl
   2766 https://v.firebog.net/hosts/Easyprivacy.txt
   3634 https://v.firebog.net/hosts/Prigent-Ads.txt
  14467 https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt
   1286 https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.2o7Net/hosts
    367 https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt
   2738 https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
  26886 https://mirror1.malwaredomains.com/files/justdomains
   1158 https://hosts-file.net/exp.txt
 300351 https://hosts-file.net/emd.txt
 189142 https://hosts-file.net/psh.txt
   3202 https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
   1106 https://www.malwaredomainlist.com/hostslist/hosts.txt
   2046 https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
   6785 https://v.firebog.net/hosts/Prigent-Malware.txt
   6785 https://v.firebog.net/hosts/Prigent-Phishing.txt
   1533 https://phishing.army/download/phishing_army_blocklist_extended.txt
    155 https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt
   1902 https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
    219 https://ransomwaretracker.abuse.ch/downloads/CW_C2_DOMBL.txt
    214 https://ransomwaretracker.abuse.ch/downloads/LY_C2_DOMBL.txt
    144 https://ransomwaretracker.abuse.ch/downloads/TC_C2_DOMBL.txt
     33 https://ransomwaretracker.abuse.ch/downloads/TL_C2_DOMBL.txt
  19570 https://v.firebog.net/hosts/Shalla-mal.txt
   2580 https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
 165519 https://www.squidblacklist.org/downloads/dg-malicious.acl
  26364 https://zerodot1.gitlab.io/CoinBlockerLists/hosts
-------- -----------------------------------------------
 745135 unique bad hosts

Using host template defined at /etc/snort/hosts/hosts
Appending badhosts
Replacing /etc/hosts
Restarting network
OpenWrt SNAPSHOT, r10391-3d8d528939
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
I've not noticed a performance hit, but I've been tearing my network up here recently, so it wouldn't surprise me.

Does e2Guardian handle URL blacklisting or just content type blacklisting?  I've not used it.

Interesting about the clients being able to connect, because when I originally had the YouTube stuff in there (since removed), YouTube would freak out and tell me I'm offline when it tried (and failed) to load an ad..  Dunno.

I say we call this is a serious work in progress, and look into the e2 suggestion..  If nothing else, we could probably modify the fixed script to update e2.

The original concept for this was from a project called PiHole, which used a Raspberry Pi as a DNS server to blacklist.  Think of it as a poor-man's Shield.  They didn't have mips support for the program itself, so I pulled the update streams to see if it could be adapted.
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Grommish
Administrator
I wonder if we could get dnsmasq to do what we need it to do.  Maybe it should be in there and the /etc/hosts?
Running Itus Shield v2 Firmware
Reply | Threaded
Open this post in threaded view
|

Re: [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*

Gnomad
You're probably right re: dnsmasq, but my experience doesn't extend to much network admin..
If we can get these redirecting to the 10.10.10.11 "badhost" http server that the other images have, we also might be able to prevent Youtube thinking that the adservers are disconnected?

On Mon, 16 Sep 2019 at 13:19, Grommish [via Itus Networks Owners Forum] <[hidden email]> wrote:
I wonder if we could get dnsmasq to do what we need it to do.  Maybe it should be in there and the /etc/hosts?
Running Itus Shield v2 Firmware



If you reply to this email, your message will be added to the discussion below:
http://itus.accessinnov.com/FIRMWARE-Itus-Networks-Shield-Firmware-Upgrade-WIP-tp1726p1883.html
To unsubscribe from [FIRMWARE] Itus Networks Shield Firmware Upgrade *WIP*, click here.
NAML
OpenWrt SNAPSHOT, r10391-3d8d528939
1 ... 45678910 ... 12