Difference between revisions of "IPFilter"
(→IP Filter - URLs for Auto-update at startup) |
Vollstrecker (Talk | contribs) m (Adjusted Links, Added Version-Tag) |
||
Line 2: | Line 2: | ||
== Description == | == Description == | ||
+ | The [[IP address|IP]] Filter blocks traffic from/to IPs and ranges of [[IP address|IP]]s with our [[client]]. This means that those [[IP address|IP][IP address|IP]]s which get blocked will not be able neither to upload to us nor to download from us. | ||
− | + | This filter is read from [[ipfilter.dat_file|''~/.aMule/ipfilter.dat'']] and ~/.aMule/ipfilter_static.dat. The content of these files describes the valid and blocked [[IP address|IP]] ranges. | |
− | + | ||
− | This filter is read from [[ipfilter.dat_file|''~/.aMule/ipfilter.dat'']] and ~/.aMule/ipfilter_static.dat. The content of these files describes the valid and blocked [[IP]] ranges. | + | |
== [[ipfilter.dat file]] == | == [[ipfilter.dat file]] == | ||
− | |||
The information and details about the [[ipfilter.dat file]] can be found [[ipfilter.dat file|here]]. | The information and details about the [[ipfilter.dat file]] can be found [[ipfilter.dat file|here]]. | ||
− | == Using the [[IP]] Filter in [[aMule]] == | + | == Using the [[IP address|IP][IP address|IP]] Filter in [[aMule]] == |
− | + | The ''Access level'' of the [[IP address|IP]] filter is selected in [[aMule]] through "Preferences" -> "Security" -> "IP Filtering" -> "Filtering level" (in [[aMule]] versions up to 2.0.0-rc8 it is under "Server", instead of "Security"). | |
− | The ''Access level'' of the [[IP]] filter is selected in [[aMule]] through "Preferences" -> "Security" -> "IP Filtering" -> "Filtering level" (in [[aMule]] versions up to 2.0.0-rc8 it is under "Server", instead of "Security"). | + | |
'''NOTE:''' [[aMule]]'s ''ipfilter.dat'' file is 100% compatible with [[eMule]]'s. | '''NOTE:''' [[aMule]]'s ''ipfilter.dat'' file is 100% compatible with [[eMule]]'s. | ||
− | == [[IP]] Filter sources == | + | == [[IP address|IP]] Filter sources == |
− | + | ||
=== IP Filter - URLs for Auto-update at startup === | === IP Filter - URLs for Auto-update at startup === | ||
− | |||
Insert the URL under "Preferences" -> "Security" -> "IP filtering" -> "URL:" | Insert the URL under "Preferences" -> "Security" -> "IP filtering" -> "URL:" | ||
Line 30: | Line 25: | ||
=== IP Filter sites === | === IP Filter sites === | ||
− | + | You can insert the lists from these sites either manually or with a script. Or you can use seperate [[IP address|IP]]-blocking software like Protowall from [http://bluetack.co.uk Bluetack], PeerGuardian from [http://phoenixlabs.org Phoenixlabs] or [http://moblock.berlios.de moblock]. | |
− | You can insert the lists from these sites either manually or with a script. Or you can use seperate [[IP]]-blocking software like Protowall from [http://bluetack.co.uk Bluetack], PeerGuardian from [http://phoenixlabs.org Phoenixlabs] or [http://moblock.berlios.de moblock]. | + | |
The [http://test.blocklist.org lists] from [http://phoenixlabs.org Phoenixlabs] (formerly known as Methlabs) are still under development. They use the lists from [http://bluetack.co.uk Bluetack] instead. | The [http://test.blocklist.org lists] from [http://phoenixlabs.org Phoenixlabs] (formerly known as Methlabs) are still under development. They use the lists from [http://bluetack.co.uk Bluetack] instead. | ||
Line 41: | Line 35: | ||
http://www.openmedia.info/p27.html (Last update: 6 January 2007) | http://www.openmedia.info/p27.html (Last update: 6 January 2007) | ||
− | == Hard coded [[IP]] filter in [[aMule]] == | + | == Hard coded [[IP address|IP]] filter in [[aMule]] == |
+ | [[aMule]] has some ranges of [[IP address|IP]]s which it filters by default following the [http://www.rfc-editor.org/rfc/rfc3330.txt RFC 3330] document. These ranges are: | ||
− | + | Address Block Present Use Reference | |
− | + | ---------------------------------------------------------------------- | |
− | + | "0.0.0.0/8", // "This" Network [RFC1700, page 4] | |
− | + | "10.0.0.0/8", // Private-Use Networks [RFC1918] | |
− | + | "14.0.0.0/8", // Public-Data Networks [RFC1700, page 181] | |
− | + | "24.0.0.0/8", // Cable Television Networks -- | |
− | + | "39.0.0.0/8", // Reserved but subject | |
− | + | // to allocation [RFC1797] | |
− | + | "127.0.0.0/8", // Loopback [RFC1700, page 5] | |
− | + | "128.0.0.0/16", // Reserved but subject | |
− | + | // to allocation -- | |
− | + | "169.254.0.0/16", // Link Local -- | |
− | + | "172.16.0.0/12", // Private-Use Networks [RFC1918] | |
− | + | "191.255.0.0/16", // Reserved but subject | |
− | + | // to allocation -- | |
− | + | "192.0.0.0/24", // Reserved but subject | |
− | + | // to allocation -- | |
− | + | "192.0.2.0/24", // Test-Net | |
− | + | "192.88.99.0/24", // 6to4 Relay Anycast [RFC3068] | |
− | + | "192.168.0.0/16", // Private-Use Networks [RFC1918] | |
− | + | "198.18.0.0/15", // Network Interconnect | |
− | + | // Device Benchmark Testing [RFC2544] | |
− | + | "223.255.255.0/24",// Reserved but subject | |
− | + | // to allocation -- | |
− | + | "224.0.0.0/4", // Multicast [RFC3171] | |
− | + | "240.0.0.0/4" // Reserved for Future Use [RFC1700, page 4] | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
However, you can un-filter these ranges of [http://www.faqs.org/rfcs/rfc791.html IP]s by unchecking "Preferences"->"Security"->"IP-filtering"->"Always filter bad IPs" (on [[aMule]] versions up to 2.0.0-rc8, this option can be found in "Preferences"->"Server"->"Always filter bad IPs"). | However, you can un-filter these ranges of [http://www.faqs.org/rfcs/rfc791.html IP]s by unchecking "Preferences"->"Security"->"IP-filtering"->"Always filter bad IPs" (on [[aMule]] versions up to 2.0.0-rc8, this option can be found in "Preferences"->"Server"->"Always filter bad IPs"). | ||
+ | |||
+ | == Version == | ||
+ | Created by Jacobo221 on 03.10.04 at 03:57<br> | ||
+ | Updated by Vollstrecker on 18.01.08 at 14.41 |
Revision as of 14:40, 23 January 2008
Contents
Description
The IP Filter blocks traffic from/to IPs and ranges of IPs with our client. This means that those IP][IP address|IPs which get blocked will not be able neither to upload to us nor to download from us.
This filter is read from ~/.aMule/ipfilter.dat and ~/.aMule/ipfilter_static.dat. The content of these files describes the valid and blocked IP ranges.
ipfilter.dat file
The information and details about the ipfilter.dat file can be found here.
Using the IP][IP address|IP Filter in aMule
The Access level of the IP filter is selected in aMule through "Preferences" -> "Security" -> "IP Filtering" -> "Filtering level" (in aMule versions up to 2.0.0-rc8 it is under "Server", instead of "Security").
NOTE: aMule's ipfilter.dat file is 100% compatible with eMule's.
IP Filter sources
IP Filter - URLs for Auto-update at startup
Insert the URL under "Preferences" -> "Security" -> "IP filtering" -> "URL:"
http://emulepawcio.sourceforge.net/ipfilter.dat (updated monthly)
http://www.bluetack.co.uk/config/nipfilter.dat.gz (Bluetack´s normal ipfilter.dat)
http://www.bluetack.co.uk/config/pipfilter.dat.gz (Bluetack´s paranoid ipfilter.dat)
IP Filter sites
You can insert the lists from these sites either manually or with a script. Or you can use seperate IP-blocking software like Protowall from Bluetack, PeerGuardian from Phoenixlabs or moblock.
The lists from Phoenixlabs (formerly known as Methlabs) are still under development. They use the lists from Bluetack instead.
http://bluetack.co.uk/config/sources.txt (If you follow this link then download the lists as *.gz or *.zip instead of *.txt in order to save Bluetack´s bandwith!)
http://emulepawcio.sourceforge.net/nieuwe_site/ipfilter_fake_list.html
http://www.openmedia.info/p27.html (Last update: 6 January 2007)
Hard coded IP filter in aMule
aMule has some ranges of IPs which it filters by default following the RFC 3330 document. These ranges are:
Address Block Present Use Reference ---------------------------------------------------------------------- "0.0.0.0/8", // "This" Network [RFC1700, page 4] "10.0.0.0/8", // Private-Use Networks [RFC1918] "14.0.0.0/8", // Public-Data Networks [RFC1700, page 181] "24.0.0.0/8", // Cable Television Networks -- "39.0.0.0/8", // Reserved but subject // to allocation [RFC1797] "127.0.0.0/8", // Loopback [RFC1700, page 5] "128.0.0.0/16", // Reserved but subject // to allocation -- "169.254.0.0/16", // Link Local -- "172.16.0.0/12", // Private-Use Networks [RFC1918] "191.255.0.0/16", // Reserved but subject // to allocation -- "192.0.0.0/24", // Reserved but subject // to allocation -- "192.0.2.0/24", // Test-Net "192.88.99.0/24", // 6to4 Relay Anycast [RFC3068] "192.168.0.0/16", // Private-Use Networks [RFC1918] "198.18.0.0/15", // Network Interconnect // Device Benchmark Testing [RFC2544] "223.255.255.0/24",// Reserved but subject // to allocation -- "224.0.0.0/4", // Multicast [RFC3171] "240.0.0.0/4" // Reserved for Future Use [RFC1700, page 4]
However, you can un-filter these ranges of IPs by unchecking "Preferences"->"Security"->"IP-filtering"->"Always filter bad IPs" (on aMule versions up to 2.0.0-rc8, this option can be found in "Preferences"->"Server"->"Always filter bad IPs").
Version
Created by Jacobo221 on 03.10.04 at 03:57
Updated by Vollstrecker on 18.01.08 at 14.41