Joined: 16 Nov 2015 Posts: 6445 Location: UK, London, just across the river..
Posted: Sun Jul 16, 2017 9:42 Post subject:
Cheers Guys...
In order to avoid USB build malfunctioning i was wondering
is it possible to save this script in save start up under GUI and use it without USB mounted?
Do i have to re-edit it and how its going to look like??
So far i read all the pages and nobody mentioned anything
about running this script from GUI what would be the downside of it??
i tested 2 scripts from page 1 and page 8 and i can see there are results under
iptables -vNL INPUT, but i cannot run the others list commands...
Is there any new modified script yet ?
Thanks in advance!! _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Posted: Fri Oct 27, 2017 12:52 Post subject: Unable to make this script work
Hi everyone,
Currently on a R7000 with Kong Build 33525M, I've been unable to make this amazing script work and wonder if you could please give me some help.
My USB tab looks like this in the setup. The drive is inserted in the back USB port:
I haven't modified the ipblock.sh file and just put it in this path: "/opt/ipblock/ipblock.sh" and gave it permissions 0755.
I used the firewall and cron commands from the first page except with ppp0 instead of vlan2 and it doesn't seem to work.
Whenever I try to run the script with Putty I obtain this:
Code:
root@R7000:~# sh /opt/ipblock/ipblock.sh
: not foundk/ipblock.sh: line 2:
: not foundk/ipblock.sh: line 4:
: not foundk/ipblock.sh: line 6:
: not foundk/ipblock.sh: line 7:
: not foundk/ipblock.sh: line 10:
: not foundk/ipblock.sh: line 12:
: not foundk/ipblock.sh: line 13:
: not foundk/ipblock.sh: line 14:
: not foundk/ipblock.sh: line 15:
: not foundk/ipblock.sh: line 16:
: not foundk/ipblock.sh: line 18:
: not foundk/ipblock.sh: line 19:
: not foundk/ipblock.sh: line 20:
: not foundk/ipblock.sh: line 21:
: not foundk/ipblock.sh: line 22:
: not foundk/ipblock.sh: line 23:
: not foundk/ipblock.sh: line 24:
/opt/ipblock/ipblock.sh: line 28: syntax error: unexpected word
I had used Notepad++ in the first space but all lines were ending with an extra space that I just manually deleted thanks to your advice.
The script can be launched now.
Thanks a lot for the help ! You saved my day !
Posted: Thu Feb 01, 2018 17:52 Post subject: blocking countries code
using DD-WRT v3.0-r34320M kongac (01/03/1
I found this script during a firewall search and just want to make sure it is still usable and if it is a drop in and work script? also that I havent missed a better script to use that is more current.
I am sure there are other users that would like a script like this to use
I run similar geo & TOR blocking scripts and you can significantly reduce processing time and router cpu utilization by simply using iptables restore for your block chain(s). In my case I whitelist countries and blacklist tor exit nodes and it literally takes only a few seconds to process and load some 25K IPv4 and IPv6 rules. Also running on an R7000.
I am highly interested in this and would love to know if this would still be needed if using a VPN ? I am very much interested in learning to expand my knowledge.
I am running a Netgear R6400v2 with kong firmware. I am a "total newb" and would like if i can get some step-by-step instructions to accomplish this and i have seen that a flash drive was used in some fashion. Any help would be greatly appreciated.
Thanks for this script! I heavily modified it for my own uses but it was a great starting point!
I created a specific block inbound for tor exit nodes, but otherwise allowed only US IPs & an array for manually added IPs. outbound blocks are the same with the exception of another array for manually added IPs.
tor exit nodes are downloaded and updated like the aggregated lists are.