Skip to content

A curated mirror/cache of firehol-blocklist (due to unmaintainence issues)

Notifications You must be signed in to change notification settings

borestad/firehol-ipsets-curated

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

firehol-ipsets-curated

GitHub Workflow Status GitHub Workflow Status GitHub repo size LICENSE

Motivation

Since firehol/blocklist-ipsets seems unmaintained - there's a number of issues with not-so-updated blocklists. This is an attempt to reuse as much as possible of the fantastic firehol with as little maintainence as possible

Disclaimer #1

  • Do not use blocklists blindly on OUTGOING (DST) <=> LAN/WAN
  • Do not use blocklists blindly on OUTGOING (DST) <=> LAN/WAN
  • Do not use blocklists blindly on OUTGOING (DST) <=> LAN/WAN
  • ...
  • This automatically solves issues like this or this or this

Disclaimer #2

  • Rules are supposed to be applied on INCOMING (SRC) => WAN
  • Use a DNS-blocker if you want to block outgoing traffic instead of ips.
  • If you block OUTGOING (DST) => WAN/LAN - you WILL have trouble when false positives mistakenly slips through. Shit happens ¯\ _ (ツ) _ /¯
  • If you find any false-positives, please contact the maintainer of the actual blocklist.
  • All credits goes to firehol and all the maintainers of blocklists.

Differences

  • This repo is for my private purpose.
  • Automatic removal of ipranges from legitimate sources like github.
  • Automatic removal of private ipranges (this is a job for the router instead)
  • Removal of unused blocklists
  • Removal of non maintained blocklists
  • Only reuse the most common lists with as few false-positive as possible.

About

A curated mirror/cache of firehol-blocklist (due to unmaintainence issues)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published