Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Beehive

#1
Hi meyergru,

I've been looking into this too. Have you seen this unbound pull request?

Unbound QUIC build https://github.com/NLnetLabs/unbound/pull/871
Unbound GH branch: https://github.com/NLnetLabs/unbound/tree/dnsoverquic and
Openssl QUIC FAQ's: https://github.com/openssl/openssl/blob/master/README-QUIC.md.

Some ref's
https://github.com/quicwg/base-drafts/wiki/Implementations
https://github.com/aiortc/aioquic

I've got some time off coming up, i'll try with a vm and see if I can't get some sort on QUIC gateway working with some port forwarding rules.


#2
Spamhaus.org are also publishing the files as json data.
Bash script to convert the json to text. You can then host this on a web server and update your alias content links.

(Modify the variables to suit your needs)


#!/usr/bin/env bash

#
# Script to download Spamhaus IPv4 and IPv6 DROP list
# This script converts the json to a text file.
#

main() {
    local url="https://www.spamhaus.org/drop/drop_v4.json"
    local urlv6="https://www.spamhaus.org/drop/drop_v6.json"
    local output_file="/www/opnsense/spamhaus-drop_v4.txt"
    local output_filev6="/www/opnsense/spamhaus-drop_v6.txt"

    curl -s $url | jq -r 'select(.cidr != null) | .cidr' >$output_file
    curl -s $urlv6 | jq -r 'select(.cidr != null) | .cidr' >$output_filev6
}

main

# Optional
# echo -e "IP addresses have been extracted:\nIPv4: $output_file\nIPv6: $output_filev6"


Hopefully, someone will find this useful.


Cheers!