Skip to content
ngadmini edited this page Mar 4, 2023 · 143 revisions

wellcome to unofficial wiki

  • we use passwordless for ssh so that we don't have to hit password over and over again
  • we use nano editor with the following profile in ~/.nanorc:
ngadimin@Q4OS:~/Documents/rpz_workdir$ less ~/.nanorc
set casesensitive
set tabsize 3
set titlecolor red,yellow

The Output Display

ngadimin@Q4OS:~/Documents/rpz_9.x$ ./grab_http.sh

starting grab_http.sh v9.5 at Sat 2023-03-04 07:18:35 WIB
PREPARING TASKs: check grab_http.sh is executed by non-root privileges          isOK
PREPARING TASKs: check required debian-packages in local-host: 172.30.252.251   isOK
PREPARING TASKs: check script-pack's property in local-host: 172.30.252.251     isOK
PREPARING TASKs: check availability of sources-list (as listed in grab_urls)
       url_0: dsi.ut-capitole.fr/..?../adult.tar.gz                             isUP
       url_1: dsi.ut-capitole.fr/..?../gambling.tar.gz                          isUP
       url_2: dsi.ut-capitole.fr/..?../phishing.tar.gz                          isUP
       url_3: dsi.ut-capitole.fr/..?../publicite.tar.gz                         isUP
       url_4: dsi.ut-capitole.fr/..?../redirector.tar.gz                        isUP
       url_5: dsi.ut-capitole.fr/..?../vpn.tar.gz                               isUP
       url_6: blocklistproject.github.io/..?../porn-nl.txt                      isUP
       url_7: raw.githubusercontent.com/..?../db_trustpositif.txt               isUP
       url_8: pgl.yoyo.org/..?../serverlist.php?hostformat=nohtml               isUP
       url_9: v.firebog.net/..?../Easylist.txt                                  isUP
      url_10: v.firebog.net/..?../AdguardDNS.txt                                isUP
      url_11: s3.amazonaws.com/..?../simple_ad.txt                              isUP
      url_12: raw.githubusercontent.com/..?../hostnames.txt                     isUP
      url_13: urlhaus.abuse.ch/..?../rpz                                        isUP
      url_14: v.firebog.net/..?../Prigent-Malware.txt                           isUP
      url_15: blocklistproject.github.io/..?../phishing-nl.txt                  isUP
      url_16: blocklistproject.github.io/..?../malware-nl.txt                   isUP
      url_17: blocklistproject.github.io/..?../ransomware-nl.txt                isUP
      url_18: raw.githubusercontent.com/..?../malware                           isUP
      url_19: raw.githubusercontent.com/..?../firehol_level3.netset             isUP
      url_20: raw.githubusercontent.com/..?../malware.ip                        isUP
      url_21: gist.githubusercontent.com/..?../porn.txt                         isUP
------------------------------
All URLs of remote-files isUP.

PERFORMING TASKs: initiating CATEGORY of domains
       ADULT: dsi.ut-capitole.fr/..?../adult.tar.gz                             DONE
    GAMBLING: dsi.ut-capitole.fr/..?../gambling.tar.gz                          DONE
    PHISHING: dsi.ut-capitole.fr/..?../phishing.tar.gz                          DONE
   PUBLICITE: dsi.ut-capitole.fr/..?../publicite.tar.gz                         DONE
  REDIRECTOR: dsi.ut-capitole.fr/..?../redirector.tar.gz                        DONE
         VPN: dsi.ut-capitole.fr/..?../vpn.tar.gz                               DONE
  initiating: adult ipv4 malware publicite redirector trust+ (6 CATEGORIES)

processing TRUST+ CATEGORY with (2) additional remote-files
      grab_1: dsi.ut-capitole.fr/..?../gambling.tar.gz                          DONE
      grab_7: raw.githubusercontent.com/..?../db_trustpositif.txt               DONE
    reducing: porn domains and move it's to ADULT CATEGORY                      DONE
      fixing: bads, duplicates and false entries at TRUST+                      DONE
      moving: IP-address entries into IPV4 CATEGORY                             DONE
    acquired: 847.245 entries.

processing ADULT CATEGORY with (2) additional remote-files
      grab_0: dsi.ut-capitole.fr/..?../adult.tar.gz                             DONE
      grab_6: blocklistproject.github.io/..?../porn-nl.txt                      DONE
      fixing: bads, duplicates and false entries at ADULT                       DONE
      moving: IP-address entries into IPV4 CATEGORY                             DONE
    acquired: 5.047.169 entries.

processing REDIRECTOR CATEGORY with (2) additional remote-files
      grab_4: dsi.ut-capitole.fr/..?../redirector.tar.gz                        DONE
      grab_5: dsi.ut-capitole.fr/..?../vpn.tar.gz                               DONE
      fixing: bads, duplicates and false entries at REDIRECTOR                  DONE
      moving: IP-address entries into IPV4 CATEGORY                             DONE
    acquired: 108.711 entries.

processing PUBLICITE CATEGORY with (5) additional remote-files
      grab_3: dsi.ut-capitole.fr/..?../publicite.tar.gz                         DONE
      grab_8: pgl.yoyo.org/..?../serverlist.php?hostformat=nohtml               DONE
      grab_9: v.firebog.net/..?../Easylist.txt                                  DONE
     grab_10: v.firebog.net/..?../AdguardDNS.txt                                DONE
     grab_11: s3.amazonaws.com/..?../simple_ad.txt                              DONE
      fixing: bads, duplicates and false entries at PUBLICITE                   DONE
      moving: IP-address entries into IPV4 CATEGORY                             DONE
    acquired: 53.152 entries.

processing MALWARE CATEGORY with (8) additional remote-files
      grab_2: dsi.ut-capitole.fr/..?../phishing.tar.gz                          DONE
     grab_12: raw.githubusercontent.com/..?../hostnames.txt                     DONE
     grab_13: urlhaus.abuse.ch/..?../rpz                                        DONE
     grab_14: v.firebog.net/..?../Prigent-Malware.txt                           DONE
     grab_15: blocklistproject.github.io/..?../phishing-nl.txt                  DONE
     grab_16: blocklistproject.github.io/..?../malware-nl.txt                   DONE
     grab_17: blocklistproject.github.io/..?../ransomware-nl.txt                DONE
     grab_18: raw.githubusercontent.com/..?../malware                           DONE
      fixing: bads, duplicates and false entries at MALWARE                     DONE
      moving: IP-address entries into IPV4 CATEGORY                             DONE
    acquired: 816.778 entries.

processing IPV4 CATEGORY with (2) additional remote-files
     grab_19: raw.githubusercontent.com/..?../firehol_level3.netset             DONE
     grab_20: raw.githubusercontent.com/..?../malware.ip                        DONE
      fixing: bads, duplicates and false entries at IPV4                        DONE
    acquired: 67.565 entries.

processing sources-list (6 CATEGORIES) in summary:
       adult: 5.047.169 entries
        ipv4:    67.565 entries
     malware:   816.778 entries
   publicite:    53.152 entries
  redirector:   108.711 entries
      trust+:   853.862 entries
       TOTAL: 6.947.237 entries
  disk-usage:   161,204 Megabytes

[DONE] completed IN 1m:7s:490ms
[WARN] there are still remaining :
   - duplicate entries across CATEGORIES
   - sub-domain and it's parent-domain exist across CATEGORIES
[HINT] consider continue to next TASKs
you have 4 options to proceed to the next task:
   1) pruning duplicate & sub-domain entries (if parent-domain exist) across CATEGORIES
   2) option [1] and rewriting all domains to RPZ format-entry [db.* files]
   3) options [1,2] and incrementing serial zone-files [rpz.*]
   4) options [1,2,3] and syncronizing latest [rpz.* and db.*] files to rpz.warnet-ersa.net
      WARNING: remote-host rpz.warnet-ersa.net will REBOOT due to low memory
               use 'shutdown -c' at remote-host: rpz.warnet-ersa.net to abort
  ^C) use (Ctrl+C) to quit
please hit: (1|2|3|4) to continue OR (Ctrl+C) to quit
4

[4'th] TASK options chosen
CONTINUED to :
   1) pruning duplicate & sub-domain entries (if parent-domain exist) across CATEGORIES
   2) rewriting all domains to RPZ format-entry [db.* files]
   3) incrementing serial zone-files [rpz.*]
   4) syncronizing latest [rpz.* and db.*] files to 'rpz.warnet-ersa.net'
      WARNING: remote-host rpz.warnet-ersa.net will REBOOT due to low memory
               use 'shutdown -c' at remote-host: rpz.warnet-ersa.net to abort
PERFORMING TASKs: based on 4'th options ...

[1'st] TASKs:
starting grab_duplic.sh v9.5 at Sat 2023-03-04 07:19:54 WIB
[INFO] FOUND 6 CATEGORIES: adult ipv4 malware publicite redirector trust+
[PRUNE] duplicate entries across CATEGORIES
pruning duplicate entries based on ADULT
   STEP 0.1 = deduplicating ipv4 entries                SKIP
   STEP 0.2 = deduplicating malware entries             DONE
   STEP 0.3 = deduplicating publicite entries           DONE
   STEP 0.4 = deduplicating redirector entries          DONE
   STEP 0.5 = deduplicating trust+ entries              DONE
pruning duplicate entries based on IPV4                 do nothing
pruning duplicate entries based on MALWARE
   STEP 2.3 = deduplicating publicite entries           DONE
   STEP 2.4 = deduplicating redirector entries          DONE
   STEP 2.5 = deduplicating trust+ entries              DONE
pruning duplicate entries based on PUBLICITE
   STEP 3.4 = deduplicating redirector entries          DONE
   STEP 3.5 = deduplicating trust+ entries              DONE
pruning duplicate entries based on REDIRECTOR
   STEP 4.5 = deduplicating trust+ entries              DONE
pruning duplicate entries based on TRUST+               do nothing

[PRUNE] sub-domains across CATEGORIES                   DONE
   retrieve pruned sub-domains to: ADULT category       DONE
   retrieve pruned sub-domains to: IPV4 category        DONE
   retrieve pruned sub-domains to: MALWARE category     DONE
   retrieve pruned sub-domains to: PUBLICITE category   DONE
   retrieve pruned sub-domains to: REDIRECTOR category  DONE
   retrieve pruned sub-domains to: TRUST+ category      DONE

[INFO] deduplicating and pruning sub-domains in summary:
       adult: 5.000.397 entries
        ipv4:    55.680 entries
     malware:   312.377 entries
   publicite:    41.967 entries
  redirector:   107.048 entries
      trust+:   760.242 entries
       TOTAL: 6.277.711 entries
  disk-usage:   148,641 Megabytes
[DONE] completed IN 1m:1s:874ms


[2'nd] TASKs:
starting grab_build.sh v9.5 at Sat 2023-03-04 07:20:56 WIB
[INFO] splitting adult CATEGORY to 714.343 lines/sub-category:
txt.adultaa txt.adultab txt.adultac txt.adultad txt.adultae txt.adultaf txt.adultag 
[INFO] rewriting all domains to RPZ format-entry
    rewriting txt.adultaa to db.adultaa       :  1.428.686 entries
    rewriting txt.adultab to db.adultab       :  1.428.686 entries
    rewriting txt.adultac to db.adultac       :  1.428.686 entries
    rewriting txt.adultad to db.adultad       :  1.428.686 entries
    rewriting txt.adultae to db.adultae       :  1.428.686 entries
    rewriting txt.adultaf to db.adultaf       :  1.428.686 entries
    rewriting txt.adultag to db.adultag       :  1.428.678 entries
    rewriting txt.ipv4 to db.ipv4             :     55.680 entries
    rewriting txt.malware to db.malware       :    624.754 entries
    rewriting txt.publicite to db.publicite   :     83.934 entries
    rewriting txt.redirector to db.redirector :    214.096 entries
    rewriting txt.trust+ to db.trust+         :  1.520.484 entries
                                        TOTAL : 12.499.790 entries
                                   disk-usage :    404,078 Megabytes
[DONE] completed IN 0m:8s:11ms


[3'th] TASKs:
starting grab_cereal.sh v9.5 at Sat 2023-03-04 07:21:04 WIB
[INFO] check availability zone-files: FOUND 12 zone-files (complete)
[INFO] incrementing serial of zone-files:
rpz.adultaa rpz.adultab rpz.adultac rpz.adultad rpz.adultae rpz.adultaf
rpz.adultag rpz.ipv4 rpz.malware rpz.publicite rpz.redirector rpz.trust+                                                                          
[INFO] all serial of zone-files incremented to 2023030403
[DONE] completed IN 0m:0s:366ms


[4'th] TASKs:
starting grab_rsync.sh v9.5 at Sat 2023-03-04 07:21:04 WIB
[INFO] check availability: RPZ-dBase and zone-files in local-host: 172.30.252.251           isOK
[INFO] check availability remote-host: rpz.warnet-ersa.net                                  isUP
[INFO] check passwordless ssh compatibility: rpz.warnet-ersa.net                            isOK
[INFO] check availability: /etc/bind/zones-rpz in rpz.warnet-ersa.net                       isOK
[INFO] check required debian-packages in rpz.warnet-ersa.net\n                              isOK
[INFO] archiving stale RPZ-dBase in rpz.warnet-ersa.net:/home/rpz-20230304-072106.tar.gz    DONE
[INFO] find and remove old RPZ-dBase archive in rpz.warnet-ersa.net:/home                   DONE
[INFO] syncronizing the latest RPZ-dBase to rpz.warnet-ersa.net:/etc/bind/zones-rpz         DONE
[WARN] remote-host: rpz.warnet-ersa.net has scheduled to reboot at 07:26:19 AM WIB
[HINT] use 'shutdown -c' at host: rpz.warnet-ersa.net to abort
[DONE] completed IN 0m:14s:669ms

TASKs based on 4'th options: DONE
bye!