Simplifying (I hope) UFW and iptables, includes a utility to get blocklists and incorporate them.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Steven Saus 72cf3c3638 GitHub Pages 4 years ago
applications.d gitlab 6 years ago
docs GitHub Pages 4 years ago
.gitignore pages 4 years ago
LICENSE Adding new definitions, cleaning up scripts for readability 8 years ago
README.md Adding new definitions, cleaning up scripts for readability 8 years ago
dangerzone.jpg Yeah, added the image. 10 years ago
ufw-iptables-archer-icon.png pages 4 years ago
ufw_setup.sh gitlab 6 years ago
ufw_setup_public.sh Adding new definitions, cleaning up scripts for readability 8 years ago
update_adblock.sh gitlab 6 years ago
update_ipblock.sh gitlab 6 years ago

README.md

ufw-iptables-archer

Simplifying (I hope) UFW and iptables for folks and serving as a reference for myself

Beware! You're entering the ....

danger zone!

Everything in /applications.d goes into /etc/ufw/applications.d. You'll need to change the owner to root.

#ufw_setup.sh

I've provided two scripts so you can easily run one depending on your location; public or not public. Comment and uncomment as needed for what you want to expose to the LAN and interwebs. You will need to run this with superuser rights.

Edit the rules in the LAN area to reflect the subnet of your LAN, obvs.

You can use something like my network control manager to configure which script is called.

#update_ipblock.sh

This is a script to automate the downloading, cleaning, and implementation of blocklists for IPTABLES to protect your computer or server from IPs associated with bad things like malware, child pornography, web exploits, and the like. I mean, if someone's gone to the bother to collect these blocklists, we might as well use them for legit purposes, right?

It can be used without my UFW script, but you'll want to uncomment the last two lines. You will need to run this with superuser rights.

Prerequisites: IPSET, which should be available for your distribution.