Update README.md
This commit is contained in:
parent
b854e9d661
commit
2d1b3d601b
@ -10,3 +10,6 @@ The idea is to block traffic before it gets to your servers. PF-Badhost does a g
|
|||||||
The Python script reads each log entry and gets the domain name of the site request and looks to see if the request is trying to retrieve file types that are allowed for that website - if it is, the request passes; otherwise it is blocked.
|
The Python script reads each log entry and gets the domain name of the site request and looks to see if the request is trying to retrieve file types that are allowed for that website - if it is, the request passes; otherwise it is blocked.
|
||||||
|
|
||||||
So, for example, if you use a static site using only html and css and a php page is requested, that IP address will be blocked. Same for cgi-bin etc.
|
So, for example, if you use a static site using only html and css and a php page is requested, that IP address will be blocked. Same for cgi-bin etc.
|
||||||
|
|
||||||
|
## Fail to ban does this ...
|
||||||
|
It does and it is a massive code base that I could try to get working with relayd and that would leave a whole load of code that I don't require sitting on my firewall. This project is aimed soley at OpenBSD so doesn't need abstractions for different operating systems and different firewalls and their native rule sets. Less code means less errors and less to maintain.
|
||||||
Loading…
x
Reference in New Issue
Block a user