[Dxspider-support] R: badspotter badwords
iz6fxs@cisarmajella.org
iz6fxs at cisarabruzzo.org
Wed Sep 14 15:22:10 BST 2022
Is it me or I can’t see the script anywhere in this message? :(
Da: Dxspider-support <dxspider-support-bounces at tobit.co.uk> Per conto di Joaquin via Dxspider-support
Inviato: mercoledì 14 settembre 2022 15:16
A: David Spoelstra <davids at mediamachine.com>; The DXSpider Support list <dxspider-support at tobit.co.uk>
Cc: Joaquin <joaquin at cronux.net>
Oggetto: Re: [Dxspider-support] badspotter badwords
Hi all,
For those who want to do tests, and I'm sure it can be improved a lot.
* bad_spotter.pl beta testing procedure
1. Download TOR and Proxies IP list, first time:
curl -o /spider/local_data/tor-proxies.txt https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt
curl -o /spider/local_data/proxies-exits.txt https://lists.fissionrelays.net/tor/relays-ipv4.txt
cat /spider/local_data/proxies-exits.txt > /spider/local_data/tor-proxies.txt
sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt
2. Copy the bad_spotter.pl script to: /spider/local_cmd/bad_spotter.pl
3. Run chmod +x /spider/local_cmd/bad_spotter.pl
4. Add in /spider/local_cmd/crontab:
# Bad spotter
0 0 * * * spawn('pkill -f "/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl"')
1 0 * * * spawn("/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl")
30 * * * * spawn('curl -o /spider/local_data/tor-proxies.txt https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt')
31 * * * * spawn('curl -o /spider/local_data/proxies-exits.txt https://lists.fissionrelays.net/tor/relays-ipv4.txt')
32 * * * * spawn('cat /spider/local_data/proxies-exits.txt > /spider/local_data/tor-proxies.txt')
33 * * * * spawn('sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt')
4. Make sure the directory is created: /spider/cmd_import , if not:
mkdir /spider/cmd_import
5. Make log directory:
mkdir /spider local_data/bad_spotter
6. The first time you want to run it, from the prompt:
/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl &
# End
Example tail -f /spider local_data/bad_spotter/log.txt
2022-09-12T14:01:53 [N9KT-2, RA1AL, 185.220.101.79, Politics and HAMSPIRIT no mix!]
2022-09-12T14:54:41 [N9KT-2, RA3ATX, 185.129.61.129, RU will liberate the world!]
2022-09-13T17:52:58 [PI4CC, PA2A, 77.171.80.188, ]
Do not forget that it is a development version.
73 de Kin
Sysop EA3CV-2 & EA4URE-2,3,5
El 14/09/2022 a las 14:54, David Spoelstra escribió:
Joaquin-
Yes, please, send me the script.
-David, N9KT
On Wed, Sep 14, 2022 at 8:51 AM Joaquin via Dxspider-support <dxspider-support at tobit.co.uk <mailto:dxspider-support at tobit.co.uk> > wrote:
Hi David,
You have two more options:
1. Enable for everyone:
set/register
set/password
2. If you want I can send you a small script that will automatically
block any callsign that comes from the TOR network or is using a PROXY.
The script runs the set/bad/spotter command and logs the callsign that
has been blocked.
It is a help, but it is not the definitive solution.
Regards.
Kin EA3CV
El 14/09/2022 a las 14:35, David Spoelstra via Dxspider-support escribió:
> Seems like my cluster is being used for propaganda. I've spent the
> morning running "set/badspotter" and "set/badword" commands. Is there
> anything else I should be doing?
_______________________________________________
Dxspider-support mailing list
Dxspider-support at tobit.co.uk <mailto:Dxspider-support at tobit.co.uk>
https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20220914/c21a2e74/attachment.htm>
More information about the Dxspider-support
mailing list