Welcome to Delicate template
Header
Welcome to Delicate template
Header
Welcome to Delicate template
Header
Just another WordPress site
Header
Just another WordPress site
Header
Just another WordPress site
Header
Just another WordPress site
Header
Welcome to Delicate template
Header
Just another WordPress site
Header
Just another WordPress site
Header
Just another WordPress site
Header
Just another WordPress site
Header

PeerBlock Alternatives for Mac and Linux

October 24th, 2012 | Posted by KarlX in News

PeerBlock Alternatives for Mac and Linux

nexus23 labs

>PeerBlock Alternatives for Mac Users :

mac

-Peerguardian OSX

-WaterRoof

-Little Snitch 3

Little Snitch used also by Hacking Team for their purposes

SEARCH LITTLE SNITCH

-Icefloor

updateipx

DETAILS:

WATEROOF:

http://www.hanynet.com/waterroof/
http://www.hanynet.com/img/screenshots/waterroof/mini/shot1.jpg

See at right corner IPFW Rule , option to import rules.

——————————————————————

LITTLESNITCH:
Also Littlesnitch got a rule like that :

https://www.obdev.at/Images//littlesnitch/index/more_features_multiple_destinations.png

Rules can cover a list of multiple hostnames, domains or arbitrary IP address ranges, helping you to simplify your ruleset.

——————————————————————

ICEFLOOR:
Positive comments on www.hanynet.com/icefloor/

Icefloor is a current alternative to the outdated (yet still functionable) PeerGuardian if you are using OS X.

It is a frontend for the pf firewall/packet filter, which is meant replace ipfw (which PG uses) in newer versions of OS X.

The programmer of Icefloor is working on a new software that also supports OS x 10.10 and superior.

However, in Icefloor, ip lists can only be loaded from files, not via the web.

http://www.techrepublic.com/article/configure-apples-built-in-network-firewall-with-icefloor/

FIGURE L and FIGURE O

A similar grid exists for listing connections established by applications, connected hosts, or sockets actively listening for communications. Grid lists information for each connection made by an app, protocol, source, and target IPs, plus the ports they’re connected to/from, and current status (Figure O). For additional security, you can terminate connections at will from the list or ban IP addresses to prevent future connections from taking place.

Figure P.

Such information, available at a glance, includes packet loss bandwidth — both incoming and outgoing. Whitelisted or blacklisted IPs, with relevant details in transmission rates for those connections, is also included. Lastly, the Network Services List button details many common and not so common services for both UNIX and OS X. This information is quite helpful when troubleshooting an issue with a rule that needs to be modified due to incorrect port assignments or to prevent clashing with another offered service.


MURUSFIREWALL:
http://murusfirewall.com/

They own an option to import blacklists.


PEERGUARDIAN OSX:
At last Peerguardian for MAC is still working :

https://sourceforge.net/projects/peerguardian/


Alternative Methods:
Apple PF Control :

-T command [address …]
Specify the command (may be abbreviated) to apply to the table. Commands include:

-T kill Kill a table.
-T flush Flush all addresses of a table.
-T add Add one or more addresses in a table. Automatically create a nonexisting table.
-T delete Delete one or more addresses from a table.
-T expire number
Delete addresses which had their statistics cleared more than number seconds ago.
For entries which have never had their statistics cleared, number refers to the
time they were added to the table.
-T replace Replace the addresses of the table. Automatically create a nonexisting table.
-T show Show the content (addresses) of a table.
-T test Test if the given addresses match a table.
-T zero Clear all the statistics of a table.
-T load Load only the table definitions from pf.conf(5). This is used in conjunction
with the -f flag, as in:
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man8/pfctl.8.html
——————————————————————-

Here another way :

Create a file called :

/Library/Server/Mail/Config/postfix/client_access

Add your IPs to client_access in the following format:

123.123.123.123 REJECT

Add as many single IPs or IP blocks as needed.

Save and issue:

sudo /Applications/Server.app/Contents/ServerRoot/usr/sbin/postmap /Library/Server/Mail/Config/postfix/client_access

Edit

/Library/Server/Mail/Config/postfix/main.cf

and add:

check_client_access hash:/Library/Server/Mail/Config/postfix/client_access

to the parameters present in smtpd_client_restrictions

For example:

smtpd_client_restrictions = permit_mynetworks permit_sasl_authenticated check_client_access hash:/Library/Server/Mail/Config/postfix/client_access reject_rbl_client zen.spamhaus.org reject_rhsbl_client dbl.spamhaus.org permit

When done, issue:

sudo /Applications/Server.app/Contents/ServerRoot/usr/sbin/postfix reload

See also here: http://www.postfix.org/postconf.5.html#check_client_access

Regarding Postfix Paths in Server 5, see here: https://topicdesk.com/faqs/why-do-postconf-n-and-postfix-reload-produce-unexpect ed-output-on-os-x-server-5/


updateipx

>Peerblock Alternatives for Linux Users :

linuX

-PeerGuardian 2

-IPBlock aka IPList

-IPBLOCK Instructions

-IPBLOCK DOCUMENTATION

-Peerguardian and MoBlock Debian

-MoBloquer

>Remember that’s not the IP Blocker Program that you choose to make the difference

but the ipfilter loaded that will make it .

§§

§§§

You can follow any responses to this entry through the RSS 2.0 Both comments and pings are currently closed.

%d bloggers like this: