fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.7K
active users

#whitelist

0 posts0 participants0 posts today

Christinien

Wenn auch Du auf meinem #Minecraft #Server spielen möchtest, kontaktiere mich.

Wir spielen #Vanilla #Freebuild #Survival, ohne extra Farmwelt. Man kann den eigenen Bereich mit einer Goldschaufel claimen und sichern. Ansonsten gibt es noch einen Bahnhof auf der Netherdecke. Teleports oder /home gibt es nicht. Wie gesagt, wir spielen Vanilla. 🙂

Wir spielen bereits auf der 1.21.4 (#Java Edition). Es gibt also alles, was das (Creaking-) Herz begehrt. 🙂

Wenn Du mit uns zusammen spielen möchtest, kontaktiere mich. Ich muss Dich dann freischalten. Aus Sicherheitsgründen, ist de Server nur auf #whitelist.

How can one retro-fit a port to a 10 year old when the internal USB port card device (see link below) is not on the e.g. of a
BTW the port is for then fitting a or inside the case. This video shows the problem.
youtube.com/watch?v=aRrUMra7it0

This is the device in question:
reichelt.de/de/de/shop/produkt
Thanks for an help on this!

Доступ к эндпоинтам Java Spring Reactive WebFlux со списка разрешенных IP адресов/подсетей

Пример настройки безопасности по разрешенному списку IP адресов/подсетей в Java Spring Reactive Security (WebFlux). Посмотреть полностью

habr.com/ru/articles/793300/

ХабрДоступ к эндпоинтам Java Spring Reactive WebFlux со списка разрешенных IP адресов/подсетейОчевидный пример состоит в использовании метода hasIpAddress(), однако данный метод в параметрах принимает всего лишь один IP адрес/подсеть: @Configuration @EnableWebFluxSecurity...

Are there any ModSecurity experts here?

I've been trying to whitelist a bunch of subnets for a while now. I've found several different variants of the rule online.

This is the latest version I've placed in REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf, but none of the other variants I've found work either.

SecRule REMOTE_ADDR "@ipMatch 192.175.111.224/27,70.38.27.240/28,184.107.184.0/26" "id:1000,phase:1,log,allow"

Replied in thread

@kupac on the off chance you might know: how can I in set up a kid's (one particular user account, not whole system) internet connection to be limited to certain domains only e.g. school website. Problem is many of these sites need/call html code from other sites and the number of domains one needs to is large and complex to find out completely. I want the kids to have access to essential online info on one user account but nothing else while parents are out of the house.

What kind of #Moderation would you wish a #SocialMedia service like #Mastodon or #FireFish to have?

If you're familiar with
#ActivityPub, can it be implemented with it?

I'm specifically looking for user moderation tools for
#PeerToPeer #P2P solutions where service data can't be manually moderated by a central actor. The service data would exist until it is forgotten (no one is sharing it).

Profile and post data would be saved in browser database (
#IndexedDB) and peer discovery would be handled by #HyperSwarm or similar. The whole service would be a #PWA, requiring zero server resources beyond loading the PWA, if possible.

Currently I have this:
- honor thread starter
#blocklist (by hiding and not sharing those comments - individual clients could still show these and share, resulting in less effective moderation)
- allow thread starter to moderate their threads (don't know how to implement this, yet)
- allow post and comment editing (implement post version checking and automatic updates - again, a client might ignore updates or collect history, resulting in less effective moderation)
- profile reputation, automatic blocking based on reputation and shared blocklists,
#whitelist and shared whitelists, blocklist and shared blocklists (see above); essentially a #WebOfTrust implementation
- visibility controls
- sharing controls (for service data; by default interactions and own data would be saved locally and shared to network; data that is offline isn't reachable)

docs.holepunch.toHyperswarm
Replied in thread

@roboneko @MischievousuTomatosu @dcc @paulo Here if you are interested lol

#!/bin/bash
##hostblock.sh

blockip="0.0.0.0"

umask 0077 && echo "Changed umask (0077)"
if [ -d /tmp/adblock ]; then
  rm -r /tmp/adblock && echo "Removed /tmp/adblock"
fi

mkdir /tmp/adblock && echo "created /tmp/adblock"
cd /tmp/adblock

list="final_iplist.txt"
templist="$list.tmp"
final="hosts.txt"

# Add lists using lists+=( "" )

lists=( "https://v.firebog.net/hosts/Easylist.txt" )
lists+=( "https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts.txt" )
lists+=( "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts" )
lists+=( "https://v.firebog.net/hosts/static/w3kbl.txt" )
lists+=( "https://adaway.org/hosts.txt" )
lists+=( "https://v.firebog.net/hosts/AdguardDNS.txt" )
lists+=( "https://v.firebog.net/hosts/Admiral.txt" )
lists+=( "https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt" )
lists+=( "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext" )
lists+=( "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts" )
lists+=( "https://v.firebog.net/hosts/Prigent-Ads.txt" )
lists+=( "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareHosts.txt" )
lists+=( "https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt" )
lists+=( "https://v.firebog.net/hosts/Prigent-Crypto.txt" )
lists+=( "https://v.firebog.net/hosts/RPiList-Malware.txt" )
lists+=( "https://v.firebog.net/hosts/RPiList-Phishing.txt" )
lists+=( "https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser" )
lists+=( "https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt" )
lists+=( "https://urlhaus.abuse.ch/downloads/hostfile" )
lists+=( "https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt" )
lists+=( "https://phishing.army/download/phishing_army_blocklist_extended.txt" )
lists+=( "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt" )
lists+=( "https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt" )
lists+=( "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" )
lists+=( "https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/gambling/hosts" )
lists+=( "https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt" )
lists+=( "https://www.github.developerdan.com/hosts/lists/amp-hosts-extended.txt" )
lists+=( "https://www.github.developerdan.com/hosts/lists/dating-services-extended.txt" )
lists+=( "https://blocklistproject.github.io/Lists/ads.txt" )
lists+=( "https://blocklistproject.github.io/Lists/alt-version/fraud-nl.txt" )
lists+=( "https://blocklistproject.github.io/Lists/gambling.txt" )
lists+=( "https://blocklistproject.github.io/Lists/malware.txt" )
lists+=( "https://blocklistproject.github.io/Lists/ransomware.txt" )
lists+=( "https://blocklistproject.github.io/Lists/phishing.txt" )
lists+=( "https://big.oisd.nl/" )

echo "Starting download of all lists..."
curl -O "${lists[@]}" | grep -v "#" | grep -v "! " | grep -v "*." | sed 's/0.0.0.0//' | sed 's/127.0.0.1//' | sed -e 's/^[ \t]*//' >> $templist
echo "Done downloading lists..."

# Sort the aggregated results and remove any duplicates
# Remove entries from the whitelist file if it exists at the root of the current user's home folder
echo "Removing duplicates and formatting the list of domains..."
cat $templist | sed $'s/\r$//' | sort | uniq | sed '/^$/d' | awk -v "IP=$blockip" '{sub(/\r$/,""); print IP" "$0}' > $list

echo "Creating Finalized hosts file (/tmp/hosts.txt)"
echo "by running 'cat /etc/hosts.sav $list > $final'"
cat /etc/hosts.sav $list > $final

# Count how many domains/whitelists were added so it can be displayed to the user
blocked=$(cat $list | wc -l | sed 's/^[ \t]*//')
echo "$blocked ad domains blocked."

#Whitelist specified domains with sed -i '/example.com/d' /tmp/adblock/hosts.txt or hosts.deny
sed -i '/ewr1.vultrobjects.com/d' /tmp/adblock/hosts.txt

# Apply hosts
cp -v /tmp/adblock/hosts.txt /etc/hosts

# Below is duplicating all work but for hosts.deny
hosts="ALL:"
hostsdeny="hosts.deny"
tempdeny="$hostsdeny.tmp"
cat $templist | sed $'s/\r$//' | sort | uniq | sed '/^$/d' | awk -v "IP=$hosts" '{sub(/\r$/,""); print IP" "$0}' > $tempdeny
echo "Creating Finalized hosts.deny file (/tmp/hosts.deny)"
cat $tempdeny > $hostsdeny

#Apply hosts.deny
cp -v /tmp/adblock/hosts.deny /etc/hosts.deny