-
Notifications
You must be signed in to change notification settings - Fork 589
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pfBlockerNG - version 2.1.1 #156
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Bump pfBlockerNG to version 2.1.1, Add MaxMind GeoLite2 and DNSBL TLD functionality
Priv filename changes
Second PR: #157 [ Add dnsbl_tld file, which is used by the TLD process to determine if all Sub-Domains should be blocked for each listed Domain. ] |
* Improve Alert page efficiency
s/ampersand/and/ due to escape functionality of Log Browser
* Refresh Alerts page after Suppression/Whitelisting event while maintaining savemsg notice. * Improvements for DNSBL Whitelist Icons
* Improve Whitelist text for a TLD Listed Domain.
* Refine text
netgate-git-updates
pushed a commit
that referenced
this pull request
Jul 27, 2016
* Update pfblockerng_alerts.php * Refine text * Update pfblockerng_alerts.php * Improve Whitelist text for a TLD Listed Domain. * Update pfblockerng_alerts.php * Refresh Alerts page after Suppression/Whitelisting event while maintaining savemsg notice. * Improvements for DNSBL Whitelist Icons * Update pfblockerng.inc s/ampersand/and/ due to escape functionality of Log Browser * Update pfblockerng_alerts.php * Improve Alert page efficiency * Update pfblockerng.inc * Update pfblockerng.sh * Update pkg-descr * Update pfblockerng.widget.php * Update pfblockerng_update.php * Update pfblockerng_threats.php * Update pfblockerng_log.php * Update pfblockerng_alerts.php * Update pfblockerng.php * Update index.php * Update info.xml * Update pfblockerng_v6lists.xml * Update pfblockerng_v4lists.xml * Update pfblockerng_sync.xml * Update pfblockerng_install.inc * Update pfblockerng_dnsbl_lists.xml * Update pfblockerng_dnsbl_easylist.xml * Update pfblockerng_dnsbl.xml * Update pfblockerng.sh * Update pfblockerng.inc * Update pfblockerng.xml * Update pfblockerng.priv.inc Priv filename changes * Update pkg-plist * Update pkg-descr * Bump pfBlockerNG version to 2.1.1 Bump pfBlockerNG to version 2.1.1, Add MaxMind GeoLite2 and DNSBL TLD functionality
Merged, thanks! |
netgate-git-updates
pushed a commit
that referenced
this pull request
Jul 27, 2016
* Update pfblockerng_alerts.php * Refine text * Update pfblockerng_alerts.php * Improve Whitelist text for a TLD Listed Domain. * Update pfblockerng_alerts.php * Refresh Alerts page after Suppression/Whitelisting event while maintaining savemsg notice. * Improvements for DNSBL Whitelist Icons * Update pfblockerng.inc s/ampersand/and/ due to escape functionality of Log Browser * Update pfblockerng_alerts.php * Improve Alert page efficiency * Update pfblockerng.inc * Update pfblockerng.sh * Update pkg-descr * Update pfblockerng.widget.php * Update pfblockerng_update.php * Update pfblockerng_threats.php * Update pfblockerng_log.php * Update pfblockerng_alerts.php * Update pfblockerng.php * Update index.php * Update info.xml * Update pfblockerng_v6lists.xml * Update pfblockerng_v4lists.xml * Update pfblockerng_sync.xml * Update pfblockerng_install.inc * Update pfblockerng_dnsbl_lists.xml * Update pfblockerng_dnsbl_easylist.xml * Update pfblockerng_dnsbl.xml * Update pfblockerng.sh * Update pfblockerng.inc * Update pfblockerng.xml * Update pfblockerng.priv.inc Priv filename changes * Update pkg-plist * Update pkg-descr * Bump pfBlockerNG version to 2.1.1 Bump pfBlockerNG to version 2.1.1, Add MaxMind GeoLite2 and DNSBL TLD functionality
netgate-git-updates
pushed a commit
that referenced
this pull request
Jul 29, 2016
* Update pfblockerng_alerts.php * Refine text * Update pfblockerng_alerts.php * Improve Whitelist text for a TLD Listed Domain. * Update pfblockerng_alerts.php * Refresh Alerts page after Suppression/Whitelisting event while maintaining savemsg notice. * Improvements for DNSBL Whitelist Icons * Update pfblockerng.inc s/ampersand/and/ due to escape functionality of Log Browser * Update pfblockerng_alerts.php * Improve Alert page efficiency * Update pfblockerng.inc * Update pfblockerng.sh * Update pkg-descr * Update pfblockerng.widget.php * Update pfblockerng_update.php * Update pfblockerng_threats.php * Update pfblockerng_log.php * Update pfblockerng_alerts.php * Update pfblockerng.php * Update index.php * Update info.xml * Update pfblockerng_v6lists.xml * Update pfblockerng_v4lists.xml * Update pfblockerng_sync.xml * Update pfblockerng_install.inc * Update pfblockerng_dnsbl_lists.xml * Update pfblockerng_dnsbl_easylist.xml * Update pfblockerng_dnsbl.xml * Update pfblockerng.sh * Update pfblockerng.inc * Update pfblockerng.xml * Update pfblockerng.priv.inc Priv filename changes * Update pkg-plist * Update pkg-descr * Bump pfBlockerNG version to 2.1.1 Bump pfBlockerNG to version 2.1.1, Add MaxMind GeoLite2 and DNSBL TLD functionality (cherry picked from commit 72b304f)
netgate-git-updates
pushed a commit
that referenced
this pull request
Aug 26, 2016
**Released on August 26th, 2016.** * Fixed execution of test cases as an unprivileged user, at least under NetBSD 7.0. Kyua-level failures were probably a regression introduced in Kyua 0.12, but the underlying may have existed for much longer: test cases might have previously failed for mysterious reasons when running under an unprivileged user. * Issue #134: Fixed metadata test broken on 32-bit platforms. * Issue #139: Added per-test case start/end timestamps to all reports. * Issue #156: Fixed crashes due to the invalid handling of cleanup routine data and triggered by the reuse of PIDs in long-running Kyua instances. * Issue #159: Fixed TAP parser to ignore case while matching `TODO` and `SKIP` directives, and to also recognize `Skipped`. * Fixed potential crash due to a race condition in the unprogramming of timers to control test deadlines. The above are the major changes in 0.13. Note that, however, this commit upgrades devel/kyua from 0.11 because 0.12 was rolled back. For details on the changes that went into 0.12, see the log for r402256. Reviewed by: ngie Approved by: bapt (mentor) Differential Revision: https://reviews.freebsd.org/D7642
netgate-git-updates
pushed a commit
that referenced
this pull request
Sep 13, 2017
Feature request #86: Change meaning of "RequiredHeaders" such that header validity is always checked, but messages are only rejected on that basis when the flag is set. Based on a patch from Andreas Schulze. Feature request #127: Log SPF results when rejecting. Requested by Patrick Wagner; patch from Andreas Schulze, follow-up patch from Juri Haberland. Feature request #138: Inculde policy and disposition information in an Authentication-Results comment. Based on a patch from Juri Haberland. Feature request #139: Include the client host name if known in failure reports. Suggested by Roland Turner; patch by Andreas Schulze. Fix bug #95: Assume IPv6 for SPF operations. Patch from Juri Haberland. Fix bug #120: Fix control logic around the SPF result. Reported by Christophe Wolfhugel; patch from Andreas Schulze. Fix bug #122: Don't skip the HELO milter phase when SPF is enabled. Reported by Christophe Wolfhugel. Fix bug #157: Fix logging of implicit authserv-ids. Reported by Andreas Schulze; patch from Juri Haberland. Fix bug #158: Log ignored connections. Patch from Andreas Schulze. Fix bug #160: Fix "SyslogFacility" handling. Patch from Juri Haberland. Fix bug #163: Use a larger buffer for the raw MAIL FROM value. Based on a patch from Andreas Schulze. Fix bug #174: Trim "!" suffixes from reporting addresses. Problem noted by Juri Haberland. Fix bug #186: When reloading the configuration file, the public suffix list was read in with the wrong comment indicator. Patch from Federico Omoto. LIBOPENDMARC: Fix bug #115: Fix type mismatch. Patch from Sebastian A. Siewior via Scott Kitterman. LIBOPENDMARC: Fix bug #121: Fix IPv6 CIDR matching in SPF code. Patch from Christophe Wolfhugel. LIBOPENDMARC: Fix bug #125: Compile time IPv6 fix. Reported by Christophe Wolfhugel. LIBOPENDMARC: Fix bug #131: Fix alignment bug. Patch from Andreas Schulze. LIBOPENDMARC: Fix bug #147: Fix stripping of whitespace from DMARC DNS records. Based on a patch from Job Noorman. LIBOPENDMARC: Fix bug #149: Apply "sp" setting, if present and applicable. Patch from Petr Novak. LIBOPENDMARC: Fix bug #154: Fix "rf" and "fo" processing logic. LIBOPENDMARC: Fix bug #156: Fix variable name. Patch by Andreas Schulze. LIBOPENDMARC: Fix bug #165: Fix logic in checking which SPF identifier was used. Patches from Marco Favero and Juri Haberland. LIBOPENDMARC: Fix bug #167: Don't return "fail" when we should return "none". Patch from Marco Favero. REPORTS: Fix bug #134: Handle SMTP errors correctly. Patch from Andreas Schulze. REPORTS: Fix bug #141: Set the HELO parameter correctly. Reported by Alan Smith; patch from Andreas Schulze. REPORTS: Fix bug #143: Fix logic in table truncation. Reported by Wayne Andersen; patch from Juri Haberland. REPORTS: Fix bug #162: Always report "sp" in aggregate reports. Patch from Juri Haberland. REPORTS: Fix bug #166: Fix report start/end time logic. Patch from Juri Haberland. REPORTS: Fix bug #188: Don't delete inputs too early in opendmarc-reports. Patch from Juri Haberland. TOOLS: Fix bug #161: "Forensic" reports were renamed "Failure" reports. Patch from Andreas Schulze. TOOLS: Fix bug #164: Handle IPv6 test addresses. Reported by Andreas Schulze; patch from Juri Haberland. DOCS: Patch #189: Replace the DMARC RFC with an HTML page referencing the relevant specs, since Debian doesn't consider RFCs to be "free". Patch from Scott Kitterman via Juri Haberland. PR: 220902 Submitted by: Dan Mahoney <freebsd@gushi.org> (maintainer), Lukasz Wasikowski <lukasz@wasikowski.net>
netgate-git-updates
pushed a commit
that referenced
this pull request
Apr 6, 2020
Changes since 1.5.3: Interface: * A redesigned interface that works better for smaller screens (#176) * Improved fullscreen mode with an overlaid headerbar (#4) * The headerbar and the progress bar now auto-hide, for a distraction-free reading experience * Various location information, as well as a clock, can now be displayed in the footer (#175, #233) * A new location popover (Ctrl + L) that shows reading time estimates and allows skipping to locations (#155) * E-reader style navigation: go to the previous or next page by tapping on the left or right part of the view; tap on the middle to toggle header bar and progress bar * Annotations, bookmarks, and find results now show chapter titles (#162) * When looking up words in dictionaries, the query can now be edited (#156) * New shortcut for viewing metadata (Ctrl + I) and preferences (Ctrl + ,) * A new traditional menubar, which may be displayed depending on the desktop environment * Option to use a traditional titlebar and menubar instead of a headerbar (experimental) Reading: * Continuous scrolling layout * Option to show decorative shadows that mimic the appearance of a real book * Ability to zoom in and zoom out (#117) * Improved image viewer with "save as" option * Open copies of a book in new windows (Ctrl + N) * Reload book (Ctrl + R) * New built-in themes: Gray, Solarized, Gruvbox, Nord Text selection: * Ability to select text across pages * Find selected text in book * Speak selected text or from the selected location (#141) Annotations: * Spellcheck notes (requires new optional dependency "gspell") * Export annotations to Markdown (#180) * Options to use custom colors for highlights For publishers and developers: * Support for Apple Books theme attribute, which allows books to detect themes without JavaScript (#178) * WebKit's developer tools can be enabled Breaking changes: * The settings schemas has been reorganized * The format for custom themes has changed * Locations are now 1024 characters in size Bug fixes: * Fixed not restoring exact last location * Fixed navigation not working with scrolled layout * Fixed font size not changing when the book uses absolute-size keywords (#173) * Fixed text cut off at margin edge (#177) * Fixed unable to open books with "#" or "?" in the file name
netgate-git-updates
pushed a commit
that referenced
this pull request
Jul 20, 2024
nbxmpp 5.0.2 (07 Jul 2024) Bug Fixes * Delay: Better discover server delays (#156)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
pfBlockerNG v2.1.1 - CHANGELOG
MaxMind GeoLite2
New Changes here:
https://dev.maxmind.com/geoip/geoip2/whats-new-in-geoip2/
Highlights:
DNSBL TLD (Beta Feature)
DNSBL TLD is a new feature to determine if all Sub-Domains should be blocked for each listed Domain. TLD is more memory intensive and is not recommended for low performance/Low-Memory installations. TLD will limit the number of Domains that can be processed, Once the TLD Domain limit below is exceeded, the balance of the Domains will be listed as-is. IE: Blocking only the listed Domain (Not Sub-Domains).
TLD Domain Limit Restrictions:
< 1.0GB RAM - Max 100k Domains
< 1.5GB RAM - Max 150k Domains
< 2.0GB RAM - Max 200k Domains
< 2.5GB RAM - Max 250k Domains
< 3.0GB RAM - Max 400k Domains
< 4.0GB RAM - Max 600k Domains
< 5.0GB RAM - Max 1.0M Domains
< 6.0GB RAM - Max 1.5M Domains
< 7.0GB RAM - Max 2.5M Domains
When enabled and after all downloads for DNSBL Feeds have completed; TLD will process the Domains. TLD uses a predetermined list of TLDs, to determine if the listed Domain should be configured to block all Sub-Domains. The predetermined TLD list can be found in [/usr/local/pkg/pfblockerng/dnsbl_tld]
Options to Blacklist whole TLDs with a provision to Whitelist specific Domain/Sub-Domains in these TLD Blacklists. With the TLD Whitelist option, Alerts will not populate, as the domains are in a "Static" Resolver zone and as such DNS resolution is via NXDOMAIN.
Options to exclude certain TLDs and/or Domains from the TLD Process.
Other Improvements