Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # MalwareMustDie friends, for manually blocking China and Hongkong IP, this is my list for hosts.allow (deny ruleset)
- # See our video disclosure here for the reason why: http://blog.malwaremustdie.org/2014/11/china-elf-botnet-malware-infection.html
- # Last update: Mon Jun 22 02:22:08 JST 2015 from @unixfreaxjp (twitter)
- # Shared under: WTFPL License: http://en.wikipedia.org/wiki/WTFPL
- # Bound to legal disclaimer: http://blog.malwaremustdie.org/p/the-rule-to-share-malicious-codes-we.html
- # Message: Please report for any changes/exclusion IP blocks & FP report to @malwaremustdie (twitter)
- # hosts.allow and hosts.deny are used by TCP Wrappers, host-based access control, http://en.wikipedia.org/wiki/TCP_Wrapper
- # If you want to block access to a service (i.e. sshd), you need to find whether
- # that service has been compiled with TCP Wrappers.
- # in BSD:
- $ sudo ldd /usr/sbin/sshd| grep wrap
- libwrap.so.6 => /usr/lib/libwrap.so.6 (0x800cfb000)
- #in Linux:
- $ sudo ldd /usr/sbin/sshd| grep wrap
- libwrap.so.0 => /lib/i386-linux-gnu/libwrap.so.0 (0xb76df000)
- # host deny rules (generic OS, Windows server users can use this too by changing "sshd:" into "ALL:"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement