[Dxspider-support] R: badspotter badwords

iz6fxs@cisarmajella.org iz6fxs at cisarabruzzo.org
Wed Sep 14 15:22:10 BST 2022


Is it me or I can’t see the script anywhere in this message? :(

 

 

 

Da: Dxspider-support <dxspider-support-bounces at tobit.co.uk> Per conto di Joaquin via Dxspider-support
Inviato: mercoledì 14 settembre 2022 15:16
A: David Spoelstra <davids at mediamachine.com>; The DXSpider Support list <dxspider-support at tobit.co.uk>
Cc: Joaquin <joaquin at cronux.net>
Oggetto: Re: [Dxspider-support] badspotter badwords

 

Hi all,

For those who want to do tests, and I'm sure it can be improved a lot.

* bad_spotter.pl beta testing procedure

1. Download TOR and Proxies IP list, first time:

curl -o /spider/local_data/tor-proxies.txt https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt
curl -o /spider/local_data/proxies-exits.txt https://lists.fissionrelays.net/tor/relays-ipv4.txt 
cat /spider/local_data/proxies-exits.txt > /spider/local_data/tor-proxies.txt
sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt

2. Copy the bad_spotter.pl script to: /spider/local_cmd/bad_spotter.pl
3. Run chmod +x /spider/local_cmd/bad_spotter.pl
4. Add in /spider/local_cmd/crontab:

# Bad spotter
0 0 * * *  spawn('pkill -f "/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl"')
1 0 * * *  spawn("/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl")
30 * * * * spawn('curl -o /spider/local_data/tor-proxies.txt https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt')
31 * * * * spawn('curl -o /spider/local_data/proxies-exits.txt https://lists.fissionrelays.net/tor/relays-ipv4.txt')
32 * * * * spawn('cat /spider/local_data/proxies-exits.txt > /spider/local_data/tor-proxies.txt')
33 * * * * spawn('sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt')


4. Make sure the directory is created: /spider/cmd_import , if not:
mkdir /spider/cmd_import

5. Make log directory:
mkdir /spider local_data/bad_spotter 

6. The first time you want to run it, from the prompt:

/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl &

# End

Example tail -f /spider local_data/bad_spotter/log.txt

2022-09-12T14:01:53 [N9KT-2, RA1AL, 185.220.101.79, Politics and HAMSPIRIT no mix!]
2022-09-12T14:54:41 [N9KT-2, RA3ATX, 185.129.61.129, RU will liberate the world!]
2022-09-13T17:52:58 [PI4CC, PA2A, 77.171.80.188, ]

Do not forget that it is a development version.

73 de Kin

Sysop EA3CV-2 & EA4URE-2,3,5

El 14/09/2022 a las 14:54, David Spoelstra escribió:

Joaquin- 

Yes, please, send me the script.

-David, N9KT

 

On Wed, Sep 14, 2022 at 8:51 AM Joaquin via Dxspider-support <dxspider-support at tobit.co.uk <mailto:dxspider-support at tobit.co.uk> > wrote:

Hi David,

You have two more options:

1. Enable for everyone:
set/register
set/password

2. If you want I can send you a small script that will automatically 
block any callsign that comes from the TOR network or is using a PROXY.
The script runs the set/bad/spotter command and logs the callsign that 
has been blocked.
It is a help, but it is not the definitive solution.

Regards.

Kin EA3CV

El 14/09/2022 a las 14:35, David Spoelstra via Dxspider-support escribió:
> Seems like my cluster is being used for propaganda. I've spent the 
> morning running "set/badspotter" and "set/badword" commands. Is there 
> anything else I should be doing?

_______________________________________________
Dxspider-support mailing list
Dxspider-support at tobit.co.uk <mailto:Dxspider-support at tobit.co.uk> 
https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20220914/c21a2e74/attachment.htm>


More information about the Dxspider-support mailing list