[Dxspider-support] Responder: badspotter badwords

joaquin joaquin at cronux.net
Wed Sep 14 16:31:00 BST 2022


  
  
  
Erwin,   
  
Have you done point 1 completely?
  
You can do a "head" to the file /spider/local_data/tor-proxies.txt and see if the list of IPs has the mask: /32 for example.
  

  
Kin
  

  
  
  
  
  
>   
> El 14 sept. 2022 en 17:23, Erwin Fiten via Dxspider-support  <dxspider-support at tobit.co.uk>  escribió:
>   
>   
> Still have an issue running the script, maybe it's just me ? :)  
>
>   
> root at debian-2gb-:/spider# /usr/bin/perl -w /spider/local_cmd/bad_spotter.pl
>  Use of uninitialized value in subroutine entry at /usr/lib/x86_64-linux-gnu/perl5/5.28/NetAddr/IP/Lite.pm line 1364,  <TOR>  line 6059.
>  Bad arg length for NetAddr::IP::Util::hasbits, length is 0, should be 128 at /usr/lib/x86_64-linux-gnu/perl5/5.28/NetAddr/IP/Lite.pm line 1364,  <TOR>  line 6059.
>     
>   
>   
> Op wo 14 sep. 2022 om 15:16 schreef Joaquin via Dxspider-support  <dxspider-support at tobit.co.uk>:
>     
> >   
> >   
> >
> > Hi all,
> >   
> >  For those who want to do tests, and I'm sure it can be improved a lot.
> >   
> >  *  bad_spotter.pl  beta testing procedure
> >   
> >  1. Download TOR and Proxies IP list, first time:
> >   
> >  curl -o /spider/local_data/tor-proxies.txt  https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt
> >  curl -o /spider/local_data/proxies-exits.txt  https://lists.fissionrelays.net/tor/relays-ipv4.txt
> >  cat /spider/local_data/proxies-exits.txt  >  /spider/local_data/tor-proxies.txt
> >  sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt
> >   
> >  2. Copy the  bad_spotter.pl  script to: /spider/local_cmd/bad_spotter.pl
> >  3. Run chmod +x /spider/local_cmd/bad_spotter.pl
> >  4. Add in /spider/local_cmd/crontab:
> >   
> >  # Bad spotter
> >  0 0 * * *    spawn('pkill -f "/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl"')
> >  1 0 * * *    spawn("/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl")
> >  30 * * * * spawn('curl -o /spider/local_data/tor-proxies.txt  https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt')
> >  31 * * * * spawn('curl -o /spider/local_data/proxies-exits.txt  https://lists.fissionrelays.net/tor/relays-ipv4.txt')
> >  32 * * * * spawn('cat /spider/local_data/proxies-exits.txt  >  /spider/local_data/tor-proxies.txt')
> >  33 * * * * spawn('sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt')
> >   
> >   
> >  4. Make sure the directory is created: /spider/cmd_import , if not:
> >  mkdir /spider/cmd_import
> >   
> >  5. Make log directory:
> >  mkdir /spider local_data/bad_spotter
> >   
> >  6. The first time you want to run it, from the prompt:
> >   
> >  /usr/bin/perl -w /spider/local_cmd/bad_spotter.pl   &
> >   
> >  # End
> >   
> >  Example tail -f /spider local_data/bad_spotter/log.txt
> >   
> >  2022-09-12T14:01:53 [N9KT-2, RA1AL, 185.220.101.79, Politics and HAMSPIRIT no mix!]
> >  2022-09-12T14:54:41 [N9KT-2, RA3ATX, 185.129.61.129, RU will liberate the world!]
> >  2022-09-13T17:52:58 [PI4CC, PA2A, 77.171.80.188, ]
> >   
> >  Do not forget that it is a development version.
> >   
> >  73 de Kin
> >   
> >  Sysop EA3CV-2  &  EA4URE-2,3,5
> >   
> >
> >
> >   
> > El 14/09/2022 a las 14:54, David Spoelstra escribió:
> >   
> > >   
> > > Joaquin-  
> > > Yes, please, send me the script.
> > >   
> > > -David, N9KT
> > >   
> > >   
> > >   
> > >   
> > > On Wed, Sep 14, 2022 at 8:51 AM Joaquin via Dxspider-support  <dxspider-support at tobit.co.uk>  wrote:
> > >   
> > > >  Hi David,
> > > >   
> > > >  You have two more options:
> > > >   
> > > >  1. Enable for everyone:
> > > >  set/register
> > > >  set/password
> > > >   
> > > >  2. If you want I can send you a small script that will automatically
> > > >  block any callsign that comes from the TOR network or is using a PROXY.
> > > >  The script runs the set/bad/spotter command and logs the callsign that
> > > >  has been blocked.
> > > >  It is a help, but it is not the definitive solution.
> > > >   
> > > >  Regards.
> > > >   
> > > >  Kin EA3CV
> > > >   
> > > >  El 14/09/2022 a las 14:35, David Spoelstra via Dxspider-support escribió:
> > > >   >  Seems like my cluster is being used for propaganda. I've spent the
> > > >   >  morning running "set/badspotter" and "set/badword" commands. Is there
> > > >   >  anything else I should be doing?
> > > >   
> > > >  _______________________________________________
> > > >  Dxspider-support mailing list
> > > >   Dxspider-support at tobit.co.uk
> > > >   https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
> > > >          _______________________________________________
> >  Dxspider-support mailing list
> >   Dxspider-support at tobit.co.uk
> >   https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
> >       
>   
>  _______________________________________________  
> Dxspider-support mailing list  
> Dxspider-support at tobit.co.uk   
> https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support   
>     
     
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20220914/d44f674a/attachment.htm>


More information about the Dxspider-support mailing list