Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
efw:settings [2020/08/06 23:11] Bernard Condrauefw:settings [2025/07/30 15:57] (current) – [Phishtank] Bernard Condrau
Line 20: Line 20:
 ===== Phishtank ===== ===== Phishtank =====
 You might want to disable phishtank to avoid false positives, for example on www.google.com You might want to disable phishtank to avoid false positives, for example on www.google.com
 +  - Disable //Proxy --> DNS --> Anti-Spyware// in efw settings via web interface, then clear the proxy cache if proxy was enabled in //Proxy --> HTTP --> Cache-Management//
   - Modify the script which downloads the malware definitions from phishtank, add the following before the script code:<code>vim /usr/local/bin/getblackholedns   - Modify the script which downloads the malware definitions from phishtank, add the following before the script code:<code>vim /usr/local/bin/getblackholedns
 import sys import sys
-sys.exit(0)</code>+sys.exit(0)</code>The script normally gets invoked once a day through an entry in /etc/anacron.daily. Removing that entry does not help, as it is reestablished after a reboot.
   - Delete the malware definitions file, or modify the file to avoid the false positives:<code>rm /var/signatures/dnsmasq/phishtank.csv</code>   - Delete the malware definitions file, or modify the file to avoid the false positives:<code>rm /var/signatures/dnsmasq/phishtank.csv</code>
 +  - Remove the content of the conf file for dnsmasq. This file will be overwritten at next reboot, but because of the missing phishtank.csv it will be empty, however, it's necessary for a successful start of dnsmasq:<code>vim /var/signatures/dnsmasq/blackholedns.conf
 +:d9999d
 +:wq</code>
  
-===== Firewall (iptables) =====+===== Firewall ===== 
 +==== SSH port forwarding ==== 
 +  * add hosts to be accessed from within the LAN to //Custom hosts// in menu //Network// 
 +  * port forwards from RED to GREEN work for hosts behind a fixed ip address on RED when accessed from LAN 
 +  * port forwards from RED to GREEN do not work for hosts behind a ddns ip address on RED when accessed from LAN. Make sure incoming and forward port range is the same to allow access from within the LAN. 
 +==== iptables ====
 Check whether the firewall is set and hit on a specific port with:<code>iptables -t nat -L -v -n</code> Check whether the firewall is set and hit on a specific port with:<code>iptables -t nat -L -v -n</code>