You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

226 lines
11 KiB

  1. config banip 'global'
  2. option ban_enabled '0'
  3. option ban_basever '0.3'
  4. option ban_automatic '1'
  5. option ban_realtime 'false'
  6. option ban_log_src '0'
  7. option ban_log_dst '0'
  8. config banip 'extra'
  9. option ban_debug '0'
  10. option ban_maxqueue '4'
  11. config source 'whitelist'
  12. option ban_src '/etc/banip/banip.whitelist'
  13. option ban_src_6 '/etc/banip/banip.whitelist'
  14. option ban_src_desc 'Always allow these IPs (IPv4/IPv6)'
  15. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add whitelist \"\$1}'
  16. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add whitelist_6 \"\$1}'
  17. option ban_src_settype 'net'
  18. option ban_src_ruletype 'src+dst'
  19. option ban_src_on '1'
  20. option ban_src_on_6 '0'
  21. config source 'blacklist'
  22. option ban_src '/etc/banip/banip.blacklist'
  23. option ban_src_6 '/etc/banip/banip.blacklist'
  24. option ban_src_desc 'Always deny these IPs (IPv4/IPv6)'
  25. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add blacklist \"\$1}'
  26. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add blacklist_6 \"\$1}'
  27. option ban_src_settype 'net'
  28. option ban_src_ruletype 'src+dst'
  29. option ban_src_on '0'
  30. option ban_src_on_6 '0'
  31. config source 'bogon'
  32. option ban_src 'https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt'
  33. option ban_src_6 'https://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt'
  34. option ban_src_desc 'Bogon prefixes, plus prefixes that have been allocated to RIRs but not yet assigned to ISPs (IPv4/IPv6)'
  35. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add bogon \"\$1}'
  36. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add bogon_6 \"\$1}'
  37. option ban_src_settype 'net'
  38. option ban_src_ruletype 'src+dst'
  39. option ban_src_on '0'
  40. option ban_src_on_6 '0'
  41. config source 'DoH'
  42. option ban_src 'https://raw.githubusercontent.com/dibdot/DoH-IP-blocklists/master/doh-ipv4.txt'
  43. option ban_src_6 'https://raw.githubusercontent.com/dibdot/DoH-IP-blocklists/master/doh-ipv6.txt'
  44. option ban_src_desc 'List of public DoH providers (DNS over HTTPS) (IPv4/IPv6)'
  45. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add DoH \"\$1}'
  46. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add DoH_6 \"\$1}'
  47. option ban_src_settype 'net'
  48. option ban_src_ruletype 'src+dst'
  49. option ban_src_on '0'
  50. option ban_src_on_6 '0'
  51. config source 'tor'
  52. option ban_src 'https://check.torproject.org/exit-addresses'
  53. option ban_src_desc 'List of Tor Exit Nodes (IPv4)'
  54. option ban_src_rset '/^(ExitAddress ([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add tor \"\$2}'
  55. option ban_src_settype 'ip'
  56. option ban_src_ruletype 'src'
  57. option ban_src_on '0'
  58. option ban_src_on_6 '0'
  59. config source 'threat'
  60. option ban_src 'https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt'
  61. option ban_src_desc 'Emerging Threats (IPv4)'
  62. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add threat \"\$1}'
  63. option ban_src_settype 'net'
  64. option ban_src_ruletype 'src'
  65. option ban_src_on '0'
  66. config source 'debl'
  67. option ban_src 'https://www.blocklist.de/downloads/export-ips_all.txt'
  68. option ban_src_6 'https://www.blocklist.de/downloads/export-ips_all.txt'
  69. option ban_src_desc 'Fail2ban reporting service (IPv4/IPv6)'
  70. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add debl \"\$1}'
  71. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add debl_6 \"\$1}'
  72. option ban_src_settype 'ip'
  73. option ban_src_ruletype 'src'
  74. option ban_src_on '0'
  75. option ban_src_on_6 '0'
  76. config source 'myip'
  77. option ban_src 'https://www.myip.ms/files/blacklist/general/latest_blacklist.txt'
  78. option ban_src_6 'https://www.myip.ms/files/blacklist/general/latest_blacklist.txt'
  79. option ban_src_desc 'IP blacklist provided by myip.ms (IPv4/IPv6)'
  80. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add myip \"\$1}'
  81. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add myip_6 \"\$1}'
  82. option ban_src_settype 'ip'
  83. option ban_src_ruletype 'src'
  84. option ban_src_on '0'
  85. option ban_src_on_6 '0'
  86. config source 'yoyo'
  87. option ban_src 'https://pgl.yoyo.org/adservers/iplist.php?ipformat=plain&showintro=0&mimetype=plaintext'
  88. option ban_src_desc 'IP blocklist provided by Peter Lowe (IPv4)'
  89. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add yoyo \"\$1}'
  90. option ban_src_settype 'ip'
  91. option ban_src_ruletype 'src'
  92. option ban_src_on '0'
  93. config source 'sslbl'
  94. option ban_src 'https://sslbl.abuse.ch/blacklist/sslipblacklist.csv'
  95. option ban_src_desc 'SSL Blacklist by abuse.ch (IPv4)'
  96. option ban_src_rset 'BEGIN{FS=\",\"}/(([0-9]{1,3}\.){3}[0-9]{1,3},).*/{print \"add sslbl \"\$2}'
  97. option ban_src_settype 'ip'
  98. option ban_src_ruletype 'src'
  99. option ban_src_on '0'
  100. config source 'ransomware'
  101. option ban_src 'https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt'
  102. option ban_src_desc 'Ransomware Tracker by abuse.ch (IPv4)'
  103. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add ransomware \"\$1}'
  104. option ban_src_settype 'ip'
  105. option ban_src_ruletype 'src'
  106. option ban_src_on '0'
  107. config source 'feodo'
  108. option ban_src 'https://feodotracker.abuse.ch/downloads/ipblocklist.txt'
  109. option ban_src_desc 'Feodo Tracker by abuse.ch (IPv4)'
  110. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add feodo \"\$1}'
  111. option ban_src_settype 'ip'
  112. option ban_src_ruletype 'src'
  113. option ban_src_on '0'
  114. config source 'dshield'
  115. option ban_src 'https://feeds.dshield.org/block.txt'
  116. option ban_src_desc 'Dshield recommended IP blocklist. Contains top 20 attacking class C subnets (IPv4)'
  117. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add dshield \"\$1 \"/\"\$3}'
  118. option ban_src_settype 'net'
  119. option ban_src_ruletype 'src'
  120. option ban_src_on '0'
  121. config source 'proxy'
  122. option ban_src 'https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/proxylists.ipset'
  123. option ban_src_desc 'List of Open Proxies (IPv4)'
  124. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3})([[:space:]]|$)/{print \"add proxy \"\$1}'
  125. option ban_src_settype 'ip'
  126. option ban_src_ruletype 'src'
  127. option ban_src_on '0'
  128. config source 'iblocklist'
  129. option ban_src 'https://list.iblocklist.com/?list=dgxtneitpuvgqqcpfulq&fileformat=cidr&archiveformat=gz'
  130. option ban_src_desc 'Contains advertising trackers and a short list of bad/intrusive porn sites (IPv4)'
  131. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add iblocklist \"\$1}'
  132. option ban_src_settype 'net'
  133. option ban_src_ruletype 'src'
  134. option ban_src_on '0'
  135. config source 'drop'
  136. option ban_src 'https://www.spamhaus.org/drop/drop.txt'
  137. option ban_src_6 'https://www.spamhaus.org/drop/dropv6.txt'
  138. option ban_src_desc 'Spamhaus drop compilation (IPv4/IPv6)'
  139. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add drop \"\$1}'
  140. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add drop_6 \"\$1}'
  141. option ban_src_settype 'net'
  142. option ban_src_ruletype 'src'
  143. option ban_src_on '0'
  144. option ban_src_on_6 '0'
  145. config source 'edrop'
  146. option ban_src 'https://www.spamhaus.org/drop/edrop.txt'
  147. option ban_src_desc 'Spamhaus edrop compilation (IPv4)'
  148. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add edrop \"\$1}'
  149. option ban_src_settype 'net'
  150. option ban_src_ruletype 'src'
  151. option ban_src_on '0'
  152. config source 'firehol1'
  153. option ban_src 'https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset'
  154. option ban_src_desc 'Firehol Level 1 compilation. Contains bogons, spamhaus drop and edrop, dshield and malware lists (IPv4)'
  155. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add firehol1 \"\$1}'
  156. option ban_src_settype 'net'
  157. option ban_src_ruletype 'src'
  158. option ban_src_on '0'
  159. config source 'firehol2'
  160. option ban_src 'https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level2.netset'
  161. option ban_src_desc 'Firehol Level 2 compilation. Contains blocklists that track attacks, during the last 48 hours (IPv4)'
  162. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add firehol2 \"\$1}'
  163. option ban_src_settype 'net'
  164. option ban_src_ruletype 'src'
  165. option ban_src_on '0'
  166. config source 'firehol3'
  167. option ban_src 'https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level3.netset'
  168. option ban_src_desc 'Firehol Level 3 compilation. Contains blocklists that track attacks, spyware and viruses (IPv4)'
  169. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add firehol3 \"\$1}'
  170. option ban_src_settype 'net'
  171. option ban_src_ruletype 'src'
  172. option ban_src_on '0'
  173. config source 'firehol4'
  174. option ban_src 'https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level4.netset'
  175. option ban_src_desc 'Firehol Level 4 compilation. May include a large number of false positives (IPv4)'
  176. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add firehol4 \"\$1}'
  177. option ban_src_settype 'net'
  178. option ban_src_ruletype 'src'
  179. option ban_src_on '0'
  180. config source 'country'
  181. option ban_src 'https://stat.ripe.net/data/country-resource-list/data.json?resource='
  182. option ban_src_6 'https://stat.ripe.net/data/country-resource-list/data.json?resource='
  183. option ban_src_desc 'Build a dynamic IPSet by country iso codes based on RIPE data (IPv4/IPv6)'
  184. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add country \"\$1}'
  185. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add country_6 \"\$1}'
  186. list ban_src_cat 'de'
  187. option ban_src_settype 'net'
  188. option ban_src_ruletype 'src'
  189. option ban_src_on '0'
  190. option ban_src_on_6 '0'
  191. config source 'asn'
  192. option ban_src 'https://stat.ripe.net/data/announced-prefixes/data.json?resource='
  193. option ban_src_6 'https://stat.ripe.net/data/announced-prefixes/data.json?resource='
  194. option ban_src_desc 'Build a dynamic IPSet by ASN numbers based on RIPE data (IPv4/IPv6)'
  195. option ban_src_rset '/^(([0-9]{1,3}\.){3}[0-9]{1,3}(\/[0-9]{1,2})?)([[:space:]]|$)/{print \"add asn \"\$1}'
  196. option ban_src_rset_6 '/^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(:\/[0-9]{1,2})?([[:space:]]|$)/{print \"add asn_6 \"\$1}'
  197. list ban_src_cat '32934'
  198. option ban_src_settype 'net'
  199. option ban_src_ruletype 'src'
  200. option ban_src_on '0'
  201. option ban_src_on_6 '0'