From 2d1b3d601b8d8f92e6623c49f18958c199fd2739 Mon Sep 17 00:00:00 2001 From: Jez Caudle Date: Wed, 9 Jul 2025 13:41:05 +0000 Subject: [PATCH] Update README.md --- README.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 81e1dec..629405d 100644 --- a/README.md +++ b/README.md @@ -9,4 +9,7 @@ The idea is to block traffic before it gets to your servers. PF-Badhost does a g The Python script reads each log entry and gets the domain name of the site request and looks to see if the request is trying to retrieve file types that are allowed for that website - if it is, the request passes; otherwise it is blocked. -So, for example, if you use a static site using only html and css and a php page is requested, that IP address will be blocked. Same for cgi-bin etc. \ No newline at end of file +So, for example, if you use a static site using only html and css and a php page is requested, that IP address will be blocked. Same for cgi-bin etc. + +## Fail to ban does this ... +It does and it is a massive code base that I could try to get working with relayd and that would leave a whole load of code that I don't require sitting on my firewall. This project is aimed soley at OpenBSD so doesn't need abstractions for different operating systems and different firewalls and their native rule sets. Less code means less errors and less to maintain. \ No newline at end of file