Date: prev next · Thread: first prev next last
2021 Archives by date, by thread · List index

Hi Guilhem,

My IP lists are sourced from my pbx of malicious ip's trying to exploit the pbx. Also have 
Wordfence of ip's trying to brute force my wordpress sites and cpanel of ip's trying to brute force 
my server. I don’t think that such IP's are an issue to share.

Prior to the firewall migration wouldn’t it be better to get an IDPS system in place and move the 
rules over once such a system is in place such as snort?

-----Original Message-----
From: Guilhem Moulin <> 
Sent: 18 May 2021 18:06
To: Jonathan Aquilina <>
Subject: Re: [libreoffice-website] RE: Infra call on Tue, May 18 at 16:30 UTC

On Tue, 18 May 2021 at 15:25:28 +0000, Jonathan Aquilina wrote:
Where would you like me to start. I have through my own infrastructure 
accumulated a very nice long list which is continuously growing. Would 
you like me to see how with nftables how to implement ipset's to block 
those malicious ip's?

It's probably best to schedule another call during the coming days or weeks.  We'd need to convert 
the existing shorewall-based firewall policy rules to nftables, and come up with a smooth upgrade 

ipset replacement is trivial ‘set NAME { type ipv[46]_addr; [timeout 10m;] }’
but that's not the focus here given we don't make use of ipsets in the first place.  Also we likely 
can't exchange IP lists for privacy reasons.  I think dynamic sets populated on the fly by the IDS, 
and automatically released after some minutes, would be fine :-)


To unsubscribe e-mail to:
Posting guidelines + more:
List archive:
Privacy Policy:


Privacy Policy | Impressum (Legal Info) | Copyright information: Unless otherwise specified, all text and images on this website are licensed under the Creative Commons Attribution-Share Alike 3.0 License. This does not include the source code of LibreOffice, which is licensed under the Mozilla Public License (MPLv2). "LibreOffice" and "The Document Foundation" are registered trademarks of their corresponding registered owners or are in actual use as trademarks in one or more countries. Their respective logos and icons are also subject to international copyright laws. Use thereof is explained in our trademark policy.