| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
| |
modified: config/ipblocklist/convert-execute.sh
modified: config/ipblocklist/ipblocklist.inc
modified: config/ipblocklist/ipblocklist.tmp
modified: config/ipblocklist/ipblocklist.xml
new file: config/ipblocklist/p5-Net-CIDR-0.13.tbz
new file: config/ipblocklist/perl-5.8.9_2.tbz
modified: pkg_config.7.xml
modified: pkg_config.8.xml
modified: pkg_config.8.xml.amd64
|
|
|
|
| |
fixed bug for 2.0 beta x86 and x64
|
| |
|
|
addresses. For each IP range or list added a pf table is made and applied to the firewall to prevent traffic from being sent to and traffic from being received from the target. You can either enter an IP range manually (experimental) or add a list from sites like iblocklist.com. Tested on 1.2.2 and 1.2.3 with FF and IE.
|