| .. |
|
abuseipdb.conf
|
Update abuseipdb.conf
|
2024-05-20 15:34:24 +02:00 |
|
apf.conf
|
|
|
|
apprise.conf
|
Update comments in action
|
2026-02-02 03:04:25 +01:00 |
|
blocklist_de.conf
|
|
|
|
bsd-ipfw.conf
|
[DATALAD RUNCMD] run codespell throughout fixing typo automagically
|
2023-11-18 10:04:04 -05:00 |
|
cloudflare-token.conf
|
action.d/cloudflare-token.conf: fixes actionunban retrieving of CF-ID from IP:
|
2025-03-01 20:19:35 +01:00 |
|
cloudflare.conf
|
action.d/cloudflare.conf: better IPv6 capability
|
2021-01-11 15:23:40 +01:00 |
|
complain.conf
|
Fix more typos
|
2023-11-22 16:32:05 +00:00 |
|
csf.conf
|
|
|
|
dshield.conf
|
fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence
|
2021-06-21 17:12:53 +02:00 |
|
dummy.conf
|
|
|
|
firewallcmd-allports.conf
|
|
|
|
firewallcmd-common.conf
|
|
|
|
firewallcmd-ipset.conf
|
action.d/*-ipset.conf: workaround sporadic failures by stop if destroying ipset too fast (sleep a bit in error case and repeat);
|
2024-11-07 19:28:53 +01:00 |
|
firewallcmd-multiport.conf
|
Revert "action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -;"
|
2021-11-01 11:45:40 +01:00 |
|
firewallcmd-new.conf
|
Revert "action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -;"
|
2021-11-01 11:45:40 +01:00 |
|
firewallcmd-rich-logging.conf
|
action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -;
|
2020-09-03 16:41:23 +02:00 |
|
firewallcmd-rich-rules.conf
|
action.d/firewallcmd-rich-*.conf: fixed incorrect quoting, disabling port variable expansion by substitution of rich rule; closes gh-3815
|
2024-08-07 22:43:42 +02:00 |
|
helpers-common.conf
|
|
|
|
hostsdeny.conf
|
|
|
|
ipfilter.conf
|
|
|
|
ipfw.conf
|
|
|
|
iptables-allports.conf
|
first attempt to make certain standard actions breakdown safe starting with iptables:
|
2020-02-14 12:16:25 +01:00 |
|
iptables-ipset-proto4.conf
|
[DATALAD RUNCMD] run codespell throughout fixing typo automagically
|
2023-11-18 10:04:04 -05:00 |
|
iptables-ipset-proto6-allports.conf
|
Merge branch '0.10' into 0.11
|
2020-08-04 15:40:59 +02:00 |
|
iptables-ipset-proto6.conf
|
Merge branch '0.10' into 0.11
|
2020-08-04 15:40:59 +02:00 |
|
iptables-ipset.conf
|
action.d/*-ipset.conf: workaround sporadic failures by stop if destroying ipset too fast (sleep a bit in error case and repeat);
|
2024-11-07 19:28:53 +01:00 |
|
iptables-multiport-log.conf
|
first attempt to make certain standard actions breakdown safe starting with iptables:
|
2020-02-14 12:16:25 +01:00 |
|
iptables-multiport.conf
|
first attempt to make certain standard actions breakdown safe starting with iptables:
|
2020-02-14 12:16:25 +01:00 |
|
iptables-new.conf
|
first attempt to make certain standard actions breakdown safe starting with iptables:
|
2020-02-14 12:16:25 +01:00 |
|
iptables-xt_recent-echo.conf
|
iptables.conf rewritten to affect all derivative actions (multiple chains are also supported by iptables-ipset etc);
|
2025-04-16 16:56:46 +02:00 |
|
iptables.conf
|
typo
|
2025-04-16 17:18:36 +02:00 |
|
ipthreat.conf
|
Fix more typos
|
2023-11-22 16:32:05 +00:00 |
|
mail-buffered.conf
|
fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence
|
2021-06-21 17:12:53 +02:00 |
|
mail-whois-common.conf
|
|
|
|
mail-whois-lines.conf
|
fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence
|
2021-06-21 17:12:53 +02:00 |
|
mail-whois.conf
|
fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence
|
2021-06-21 17:12:53 +02:00 |
|
mail.conf
|
fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence
|
2021-06-21 17:12:53 +02:00 |
|
mikrotik.conf
|
changed missed names
|
2023-03-08 12:16:35 +00:00 |
|
mynetwatchman.conf
|
|
|
|
netscaler.conf
|
[DATALAD RUNCMD] run codespell throughout fixing typo automagically
|
2023-11-18 10:04:04 -05:00 |
|
nftables-allports.conf
|
|
|
|
nftables-multiport.conf
|
|
|
|
nftables.conf
|
action.d/nftables.conf - fixed for SELinux without execmem permission, rewrite capturing with grep -P using grep -E or sed;
|
2026-01-23 21:23:58 +01:00 |
|
nginx-block-map.conf
|
action.d/nginx-block-map.conf: reload nginx only if it is running (also avoid error in nginx-errorlog, gh-2949) and better test coverage for the action
|
2021-02-24 18:21:42 +01:00 |
|
npf.conf
|
|
|
|
nsupdate.conf
|
|
|
|
osx-afctl.conf
|
|
|
|
osx-ipfw.conf
|
|
|
|
pf.conf
|
added pf[protocol=all] options as recommended by sebres
|
2023-12-10 11:20:39 +01:00 |
|
route.conf
|
|
|
|
sendmail-buffered.conf
|
|
|
|
sendmail-common.conf
|
|
|
|
sendmail-geoip-lines.conf
|
|
|
|
sendmail-whois-ipjailmatches.conf
|
|
|
|
sendmail-whois-ipmatches.conf
|
|
|
|
sendmail-whois-lines.conf
|
|
|
|
sendmail-whois-matches.conf
|
|
|
|
sendmail-whois.conf
|
|
|
|
sendmail.conf
|
|
|
|
shorewall-ipset-proto6.conf
|
extend ipset actions with new parameter ipsettype for the type of set (gh-3760), affected actions:
|
2024-06-09 23:38:58 +02:00 |
|
shorewall.conf
|
|
|
|
smtp.py
|
construct smtp.py email wrap long lines
|
2025-05-20 14:55:03 -04:00 |
|
symbiosis-blacklist-allports.conf
|
first attempt to make certain standard actions breakdown safe starting with iptables:
|
2020-02-14 12:16:25 +01:00 |
|
ufw.conf
|
action.d/ufw.conf: update comment:
|
2025-03-01 00:23:55 +01:00 |
|
xarf-login-attack.conf
|
lets see an error (with debug messages) in debug case
|
2025-09-10 20:04:10 +02:00 |