=================================================================== RCS file: /home/cvsd/home/cvs/scripts/shell/firewall/fw-universal.sh,v retrieving revision 2.21 retrieving revision 2.22 diff -u -p -r2.21 -r2.22 --- scripts/shell/firewall/fw-universal.sh 2005/03/06 19:18:04 2.21 +++ scripts/shell/firewall/fw-universal.sh 2005/03/16 13:53:36 2.22 @@ -9,7 +9,7 @@ # Licensed under terms of GNU General Public License. # All rights reserved. # -# $Platon: scripts/shell/firewall/fw-universal.sh,v 2.20 2005/03/04 23:53:14 rajo Exp $ +# $Platon: scripts/shell/firewall/fw-universal.sh,v 2.21 2005/03/06 19:18:04 rajo Exp $ # # Changelog: # 2003-10-24 - created @@ -408,6 +408,29 @@ drop_output() } # }}} +bann_ip_adresses() +{ # {{{ + # + # This feature has been developed for following reason: + # UbiCrawler spam our website with many requests (they are duplicit requests of the same page!) + # And this web robot doesn't accept HTTP META tags (http://www.robotstxt.org/wc/faq.html#extension) + # + # Bann them too! + # + #IP address is: 146.48.97.11 146.48.97.13 + # User Agent: "UbiCrawler/v0.4beta (http://ubi.iit.cnr.it/projects/ubicrawler/)" + # + if [ ! -z "$BANNED_IP" ]; then + echo -en "Dropping ALL packets from IP:" + for banned_ip in $BANNED_IP; do + echo -en " $banned_ip" + $IPTABLES -A INPUT -s $banned_ip -j DROP + $IPTABLES -A FORWARD -s $banned_ip -j DROP + done + echo " done." + fi +} # }}} + allow_accept_all() { # {{{ if [ ! -z "$IFACE_ACCEPT_ALL" ]; then @@ -712,6 +735,7 @@ case "$1" in # # (un)commnet next lines as needed # + bann_ip_adresses allow_accept_all nmap_scan_filter invalid_packet_filter