linux – The Blacklist – follow-up

Follow-up from this question using @Toby Speight’s answer:

The primary concern is jq improvement/optimization, but please detail any others.

#!/bin/sh

set -eu

sources=$(mktemp)
trap 'rm "$sources"' EXIT

curl -s -o "$sources" https://raw.githubusercontent.com/T145/packages/master/net/adblock/files/adblock.sources

for key in $(jq -r 'keys()' "$sources")
do
    case $key in
        gaming | osid_basic )
        # Ignore these lists
        ;;
        * )
            url=$(jq -r ".$key.url" "$sources")
            rule=$(jq -r ".$key.rule" "$sources")

            curl -s "$url" |
                case $url in
                    *.tar.gz) tar -xOzf - ;;
                    *) cat ;;
                esac |
                gawk --sandbox -- "$rule"
    esac
done |
    sed -e 's/r//g' -e 's/^/0.0.0.0 /' | sort -u > the_blacklist.txt
# use sort over gawk to merge sort multiple temp files instead of using up limited memory

json – The Blacklist: Blocking Malicious domains using Bash

I’ve made this script to automate blocking some deviant hosts on my router, and was curious if there’s anything much else that can be done to make it quicker and more efficient.

Presently I’m restricted to using packages available on the Entware repository and the latest Busybox/ash shell environment. So, for example, I can’t use commands like sort -S 25% --parallel=4 -u adblock.sources (though found awk/gawk to be faster and more memory efficient anyway).

Any help is greatly appreciated!

curl -GOs https://raw.githubusercontent.com/T145/packages/master/net/adblock/files/adblock.sources

for key in $(jq -r 'keys()' adblock.sources); do
        case $key in
        gaming | osid_basic )
                # Ignore these lists
                ;;
        * )
                url=$(jq -r ".$key.url" adblock.sources)
                rule=$(jq -r ".$key.rule" adblock.sources)

                case $url in
                *.tar.gz )
                        curl -s $url | 
                        tar -xOzf - | 
                        gawk "$rule" | 
                        sed "s/r//g" | 
                        sed 's/^/0.0.0.0 /' >> the_blacklist.temp.txt
                        ;;
                * )
                        curl -s $url | 
                        gawk "$rule" | 
                        sed "s/r//g" | 
                        sed 's/^/0.0.0.0 /' >> the_blacklist.temp.txt
                esac

                unset url
                unset rule
        esac
done

# Filter duplicate hosts
gawk '!a($0)++' the_blacklist.temp.txt > the_blacklist.txt

rm the_blacklist.temp.txt
rm adblock.sources

[FREE] Geo Spy: Proxy Geo Location and Blacklist Checker | NewProxyLists

[FREE] Geo Spy: Proxy Geo Location and Blacklist Checker

I’m on the Mobile Renegade list and I got this in an email, last night. I don’t see it in the War Room yet on WF, but here’s the bucket for it.

Looks like this would be really good for Craigslist/Scrapebox/ZennoPoster-type stuff. Tells you if the proxies you’re using are blacklisted and some other things.

Sales Page:

https://s3.amazonaws.com/Geo-Spy-Free-WarRoom/

[​IMG]

[​IMG]

[​IMG]

[​IMG]

Download:

Hidden Content:

You must reply before you can see the hidden data contained here.

 

ASN Blacklist

My Data Center’s ASN is black-listed. It affected my all servers. Any reason to get blacklist ASN? BUt my all IP addresses are clean. Any r… | Read the rest of https://www.webhostingtalk.com/showthread.php?t=1844676&goto=newpost

ubuntu – Does Unattended-Upgrade Blacklist Block Dependencies?

On Ubuntu 20.04, we run unattended-upgrades. If we put a package on the blacklist, for example, a package named “mariadb”, is Ubuntu’s unattended upgrade smart enough to BLOCK all dependencies of the mariadb package? Or is it a dumb block only on the package?
Thanks.

Using Windows Firewall to Blacklist IPs combined with alternative rules

We currently have a windows firewall rule in place to ALLOW RDP connections only on specific ports (non-defualt). This does not contain a whitelist of IP addresses and currently allows all IP’s to connect.

In an attempt to reduce the number of overseas attacks (I know a hardware solution would be more robust but have not received approval for this), I would like to put a secondary “block” rule in to blacklist IP ranges from suspicious countries.

How do rules interact with each other? If one rule is allowing connections without an IP list, would that override the “block” rule? Or will the “block” rule override (i.e. if I leave local IP addresses set to Any IP Address will this automatically block all local IPs?

Basically I’m looking to keep all local IPs accessible and only manage a blacklist rather than a whitelist.

What’s the best way to achieve this while still only allowing the specific custom port I have setup?

add blacklist moderation list inside pre_comment_approved filter plugin

i am using Comment Whitelist plugin to create a whitelist of email domains for autoapporing comments. It seems that the plugin overrides wordpress : Settings->Discussion options->moderation blacklist. My settings are here .

The plugin works as expected,autoapproving comments from a whitelist of domains. But i would like to include also to it the protection from spam that WordPress offers with wp_check_comment_disallowed_list()

The main idea inside the plugin is

function comment_whitelist__pre_comment_approved( $approved ) {
    global $wpdb, $current_user;
    
    // Si esta aprobado ...
    if ( $approved == '1' ) {
        
        // Pues sigue aprobado!! ;-))
        return $approved;
    }else{
        
        $mod_keys = trim( get_option('whitelist_keys') );
        
        // Si no tengo lista blanca ...
        if ( empty($mod_keys) ) {
            // Devuelvo lo que tenia!!
            return $approved;
        }else{
            
            // Continuo probando...
            $words = explode("n", $mod_keys );
            // Si no tenemos elementos ...
            if ( !sizeof($words) ) {
                // Devolvemos lo que nos habia llegado de origen
                return $approved;
            }else{
                
                // Revisamos cada entrada de la lista blanca
                foreach ( (array) $words as $word ) {
                    $word = trim($word);
                    
                    // Skip empty lines
                    if ( empty($word) ) { continue; }
                    
                    // Do some escaping magic so that "https://wordpress.stackexchange.com/#" chars in the
                    // spam words don't break things:
                    $word = preg_quote($word, "https://wordpress.stackexchange.com/#");
                    
                    $pattern = "#$word#i";
                    if ( preg_match($pattern, $_REQUEST('email')) ) {
                        // Esta incluido en la lista blanca, nos da igual, le aprobamos.
                        return '1';
                    }
                }
                
                // NO Esta incluido en la lista blanca, le moderamos si no lo estaba, si es SPAM le dejamos.
                return ( $approved == '1' ) ? '0' : $approved;
                
            }
        }
    }
    
    die('fin');
    return $approved;
}
add_filter('pre_comment_approved', 'comment_whitelist__pre_comment_approved');

How could i also include the wp_check_comment_disallowed_list() hook so that i can still keep comments in moderation if spam words are included in the comment?

I have tried to set to the plugins filter priority 11 , but this didn’t work.

blacklist – Should I pay to have an IP address removed from UCEPROTECT’s backlist?

I’m working with a group that switched their TLD a year ago. I checked their old and new IP’s on MXToolbox. The last search showed their old IP address was blacklisted by UCEPROTECT L3.

I looked further and they noted it was because of a DO Droplet.
I’m decent at working with groups like Spamhaus. This site didn’t provide much info, but did say I could get the blacklist removed if I pay for it.

Should I pay to have this IP address removed from UCEPROTECT?

UCEPROTECT level 3 blacklist for a DO Droplet. Has anyone heard of this site before?

I’m working with a group that switched their TLD a year ago. I check their old and new IP’s on MXToolbox. The last search showed their old IP Address was blacklisted by UCEPROTECT L3. I looked further and they noted it was because of a DO Droplet.
I’m decent at working with groups like Spamhaus. This site didn’t provide much info, but did say I could get the blacklist removed if I pay for it. That seems not cool. Anyone run in to this issue before?

seo – Remove domain from Google’s copyright infringement blacklist

My website lets people share subtitles, and sometimes users upload copyrighted material. Therefore, I wasn’t surprised to find that google blacklisted the pages which contain copyrighted material, and I am removing those.

However, the domain example.com is now also blacklisted. How can I get it off the list, and let users find it via Google?

I’ve downloaded the copyright removals data from Google’s transparency report, scanned through, and found that many of the removal requests aren’t to pages like example.com/disney_movie.html, but the domain example.com. I also got the report from the lumen database, same problem. I found a relevant question here, but it mentions emails where Google notifies me of a DMCA removal, but I don’t have any such emails.