useless now

This commit is contained in:
Thibault bui Koechlin 2020-07-20 12:39:47 +02:00
parent 515172dc69
commit d656c6b3d5
6 changed files with 0 additions and 96 deletions

View file

@ -1,18 +0,0 @@
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">
<center><a href="https://github.com/crowdsecurity/cs-netfilter-blocker/"><i class="fa fa-github" style="font-size:36px"></i>Netfilter {{plugins.name}}</a></center>
The configuration file is located in `/etc/crowdsec/netfilter-blocker/netfilter-blocker.yaml` :
```
mode: ipset # The mode you want : ipset or TC
dbpath: /var/lib/crowdsec/data/crowdsec.db # Path to the crowdsec database
piddir: /var/run/ # PID file, don't touch
update_frequency: 10s #
daemonize: true # Run as a service if true
log_mode: file # Output log to file or stdout
log_dir: /var/log/ # Folder to write log
```
The log file created by `netfilter-blocker` is called `netfilter-blocker.log`.

View file

@ -1,25 +0,0 @@
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">
<center><a href="https://github.com/crowdsecurity/cs-netfilter-blocker/"><i class="fa fa-github" style="font-size:36px"></i>Netfilter {{plugins.name}}</a></center>
First, please [download the latest release](https://github.com/crowdsecurity/cs-netfilter-blocker/releases/latest) of our netfilter {{plugins.name}}.
Then run the following commands:
```bash
tar xzvf cs-netfilter-blocker.tgz
```
```bash
cd cs-netfilter-blocker/
```
```bash
sudo ./install.sh
```
When an IP is referenced in the database, it will be put in an ipset blacklist to ban that IP.
&#9432; IPv4 and IPv6 are supported.

View file

@ -1,10 +0,0 @@
The blocker configuration is in `/usr/local/lua/crowdsec/crowdsec.conf` :
```
DB_PATH=/var/lib/crowdsec/data/crowdsec.db # The path of the crowdsec SQlite3 database.
LOG_FILE=/tmp/lua_mod.log # Path to file to log
CACHE_EXPIRATION=1 # Cache expiration in seconds
CACHE_SIZE=1000 # Max cache size
```
The nginx configuration file used by nginx to run the module is `/etc/nginx/conf.d/crowdsec_nginx.conf`.

View file

@ -1,22 +0,0 @@
<center>[nginx {{plugins.name}} github](https://github.com/crowdsecurity/cs-nginx-plugin/)</center>
First, please [download the latest version](https://github.com/crowdsecurity/cs-nginx-plugin/releases/latest) of our nginx blocker.
And run the following commands:
```bash
tar xzvf cs-nginx-plugin-release.tgz
```
```bash
cd cs-nginx-plugin-vX.Y.Z/
```
```bash
sudo ./install.sh
```
```bash
sudo systemctl restart nginx
```
When an IP is referenced in the database, any request from this IP will lead to a `403` reply.

View file

@ -1,15 +0,0 @@
The {{crowdsec.name}} wordress plugins configuration is located under "Crowdsec" => "Settings".
### {{crowdsec.name}} configuration
- `Activate Crowdsec PULL` : Ban IP addresses from crowdsec API
- `Crowdsec API Token` : Crowdsec API Token from crowdsec backoffice subscription
### {{crowdsec.name}} configuration
- `Activate {{crowdsec.name}} decision pull` : Ban IP addresses from {{crowdsec.name}} decision
- `{{crowdsec.name}} db file` : Path to {{crowdsec.name}} database file
## General configuration
- `Activate on backend` : Activate the plugin on the wordpress backend or not

View file

@ -1,6 +0,0 @@
First, please [download the latest release](https://github.com/crowdsecurity/cs-wordpress-plugin/releases/latest) of our wordpress blocker.
Then upload the zip file into your Wordpress backoffice in "Plugins" => "Add new" => "Upload Plugin"
When the plugin is installed, activate it.