Page 62 of 65 FirstFirst ... 12526061626364 ... LastLast
Results 611 to 620 of 650

Thread: General MoBlock thread

  1. #611
    Join Date
    Dec 2006
    Beans
    161
    Distro
    Kubuntu Development Release

    Re: General MoBlock thread

    Unfortunately I still can't get it to work.
    PeerGuardian Linux 2.2.0~pre23

    After starting pgl as normal:

    Code:
    gavin@kubuntu:~$ sudo pglcmd status
    Current IPv4 iptables rules (this may take a while):
    
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_in     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_fwd    all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_out    all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain pgl_fwd (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       192.168.2.0/24       192.168.2.0/24      
        0     0 RETURN     all  --  *      *       0.0.0.0/0            127.0.0.1           
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Chain pgl_in (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       192.168.2.0/24       0.0.0.0/0           
        0     0 RETURN     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Chain pgl_out (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.2.0/24      
        0     0 RETURN     all  --  *      *       0.0.0.0/0            127.0.0.1           
        0     0 RETURN     all  --  *      lo      0.0.0.0/0            0.0.0.0/0           
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa reject-with icmp-port-unreachable
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Please check if the above printed iptables rules are correct!
    
     * pgld is running
    PID: 32378    CMD: /usr/sbin/pgld -s -l /var/log/pgl/pgld.log -d -p /var/run/pgld.pid -q 92 -r 10 -a 20 /var/lib/pgl/master_blocklist.p2p
    
     * pglcmd.wd is running
    PID: 32385    CMD: /bin/sh /usr/sbin/pglcmd.wd

    After clicking on Reload in pglgui:

    Code:
    gavin@kubuntu:~$ sudo pglcmd status
    Current IPv4 iptables rules (this may take a while):
    
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_in     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_fwd    all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 pgl_out    all  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW mark match ! 0x14
    
    Chain pgl_fwd (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       192.168.2.0/24       192.168.2.0/24      
        0     0 RETURN     all  --  *      *       0.0.0.0/0            127.0.0.1           
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Chain pgl_in (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       192.168.2.0/24       0.0.0.0/0           
        0     0 RETURN     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Chain pgl_out (1 references)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.2.0/24      
        0     0 RETURN     all  --  *      *       0.0.0.0/0            127.0.0.1           
        0     0 RETURN     all  --  *      lo      0.0.0.0/0            0.0.0.0/0           
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xa reject-with icmp-port-unreachable
        0     0 NFQUEUE    all  --  *      *       0.0.0.0/0            0.0.0.0/0            NFQUEUE num 92
    
    Please check if the above printed iptables rules are correct!
    
     * pgld is not running
     * pglcmd.wd is running
    PID: 32385    CMD: /bin/sh /usr/sbin/pglcmd.wd

    And then clicking on Start in the gui I get the following popup (image attached).


    Contents of pglcmd.log

    Code:
    2012-06-11 01:45:17 BST Begin: pglcmd update
    Updating blocklists ...
    Updating atma_atma... . No update available.
    Extracting atma_atma, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/atma_atma/downloaded/atma_atma
    
    Extracting  tzmtqbbsgbtfxainogvm.txt
    
    Everything is Ok
    
    Size:       10273329
    Compressed: 740830
    done.
    Updating bluetack_dshield... . No update available.
    Extracting bluetack_dshield, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_dshield/downloaded/bluetack_dshield
    
    Extracting  bt_dshield.txt
    
    Everything is Ok
    
    Size:       6979
    Compressed: 1781
    done.
    Updating bluetack_proxy... . No update available.
    Extracting bluetack_proxy, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_proxy/downloaded/bluetack_proxy
    
    Extracting  bt_proxy.txt
    
    Everything is Ok
    
    Size:       108756
    Compressed: 19798
    done.
    Updating tbg_bogon... . No update available.
    Extracting tbg_bogon, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_bogon/downloaded/tbg_bogon
    
    Extracting  ewqglwibdgjttwttrinl.txt
    
    Everything is Ok
    
    Size:       34716
    Compressed: 5771
    done.
    Updating tbg_business-isps... . No update available.
    Extracting tbg_business-isps, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_business-isps/downloaded/tbg_business-isps
    
    Extracting  jcjfaxgyyshvdbceroxf.txt
    
    Everything is Ok
    
    Size:       1882357
    Compressed: 263981
    done.
    Updating tbg_general-corporate-ranges... . No update available.
    Extracting tbg_general-corporate-ranges, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_general-corporate-ranges/downloaded/tbg_general-corporate-ranges
    
    Extracting  ecqbsykllnadihkdirsh.txt
    
    Everything is Ok
    
    Size:       18116930
    Compressed: 3435142
    done.
    Updating tbg_hijacked... . No update available.
    Extracting tbg_hijacked, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_hijacked/downloaded/tbg_hijacked
    
    Extracting  tbnuqfclfkemqivekikv.txt
    
    Everything is Ok
    
    Size:       13719
    Compressed: 2427
    done.
    Updating tbg_primary-threats... . No update available.
    Extracting tbg_primary-threats, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_primary-threats/downloaded/tbg_primary-threats
    
    Extracting  ijfqtofzixtwayqovmxn.txt
    
    Everything is Ok
    
    Size:       16719416
    Compressed: 3603635
    done.
    Updating tbg_search-engines... . No update available.
    Extracting tbg_search-engines, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_search-engines/downloaded/tbg_search-engines
    
    Extracting  pfefqteoxlfzopecdtyw.txt
    
    Everything is Ok
    
    Size:       58218
    Compressed: 15311
    done.
    Blocklists updated.
    pgld is not running, doing nothing.
    2012-06-11 01:46:22 BST End: pglcmd update
    2012-06-11 04:16:45 BST Begin: pglcmd stop
    Stopping pglcmd.wd * Stopping PeerGuardian Linux pgld
    [%i%p1%dG[ OK ]
    Deleting iptables ...
    Iptables deleted.
    Stopping pgld   ...done.
    2012-06-11 04:16:45 BST End: pglcmd stop
    2012-06-12 00:11:30 BST Begin: pglcmd stop
    Stopping pglcmd.wd[ OK ]
    Deleting iptables ...
    Iptables deleted.
    Stopping pgld[ OK ]
    2012-06-12 00:11:30 BST End: pglcmd stop
    2012-06-12 00:13:33 BST Begin: pglcmd start
    Building blocklist ...
    WARN: Invalid ASCII line:
    INFO: ASCII: 837324 entries loaded from "STDIN"
    INFO: Merged 596142 of 837324 entries.
    INFO: Blocking 241182 IP ranges (2771731784 IPs).
    Blocklist built.
    Inserting iptables ...
    ..Setting up iptables for INPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for OUTPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting ports   ...done.
    ....Whitelisting IPs   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for FORWARD:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Inserting block rule   ...done.
    ..Allowing loopback traffic: INPUT OUTPUT   ...done.
    ..Allowing OUTPUT traffic to DNS server 127.0.0.1   ...done.
    ..Allowing FORWARD traffic to DNS server 127.0.0.1   ...done.
    ..Allowing LAN traffic ...
    ....INPUT from 192.168.2.0/24   ...done.
    ....OUTPUT to 192.168.2.0/24   ...done.
    ....FORWARD from 192.168.2.0/24 to 192.168.2.0/24   ...done.
    ..LAN traffic allowed.
    ..Activating chains:
    ....INPUT
    ....OUTPUT
    ....FORWARD
    ..Chains activated.
    Iptables inserted.
    Starting pgld   ...done.
    Starting pglcmd.wd   ...done.
    2012-06-12 00:13:36 BST End: pglcmd start
    2012-06-12 00:13:41 BST Begin: pglcmd update
    Updating blocklists ...
    Updating atma_atma... . No update available.
    Extracting atma_atma, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/atma_atma/downloaded/atma_atma
    
    Extracting  tzmtqbbsgbtfxainogvm.txt
    
    Everything is Ok
    
    Size:       10273329
    Compressed: 740830
    done.
    Updating bluetack_dshield... done.
    Extracting bluetack_dshield, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_dshield/downloaded/bluetack_dshield
    
    Extracting  bt_dshield.txt
    
    Everything is Ok
    
    Size:       6950
    Compressed: 1737
    done.
    Updating bluetack_proxy... done.
    Extracting bluetack_proxy, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_proxy/downloaded/bluetack_proxy
    
    Extracting  bt_proxy.txt
    
    Everything is Ok
    
    Size:       113918
    Compressed: 20109
    done.
    Updating tbg_bogon... . No update available.
    Extracting tbg_bogon, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_bogon/downloaded/tbg_bogon
    
    Extracting  ewqglwibdgjttwttrinl.txt
    
    Everything is Ok
    
    Size:       34716
    Compressed: 5771
    done.
    Updating tbg_business-isps... done.
    Extracting tbg_business-isps, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_business-isps/downloaded/tbg_business-isps
    
    Extracting  jcjfaxgyyshvdbceroxf.txt
    
    Everything is Ok
    
    Size:       1882488
    Compressed: 263872
    done.
    Updating tbg_general-corporate-ranges... done.
    Extracting tbg_general-corporate-ranges, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_general-corporate-ranges/downloaded/tbg_general-corporate-ranges
    
    Extracting  ecqbsykllnadihkdirsh.txt
    
    Everything is Ok
    
    Size:       18119071
    Compressed: 3436060
    done.
    Updating tbg_hijacked... . No update available.
    Extracting tbg_hijacked, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_hijacked/downloaded/tbg_hijacked
    
    Extracting  tbnuqfclfkemqivekikv.txt
    
    Everything is Ok
    
    Size:       13719
    Compressed: 2427
    done.
    Updating tbg_primary-threats... 2012-06-12 00:15:10 BST Begin: pglcmd reload
    Building blocklist ...
    WARN: Invalid ASCII line:
    INFO: ASCII: 837532 entries loaded from "STDIN"
    INFO: Merged 596261 of 837532 entries.
    INFO: Blocking 241271 IP ranges (2771734722 IPs).
    Blocklist built.
    Reloading pgld   ...done.
    2012-06-12 00:15:12 BST End: pglcmd reload
    done.
    Extracting tbg_primary-threats, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_primary-threats/downloaded/tbg_primary-threats
    
    Extracting  ijfqtofzixtwayqovmxn.txt
    
    Everything is Ok
    
    Size:       16718961
    Compressed: 3604082
    done.
    Updating tbg_search-engines... . No update available.
    Extracting tbg_search-engines, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_search-engines/downloaded/tbg_search-engines
    
    Extracting  pfefqteoxlfzopecdtyw.txt
    
    Everything is Ok
    
    Size:       58218
    Compressed: 15311
    done.
    Blocklists updated.
    Problematic daemon status: 1
    * pgld is not running
    2012-06-12 00:16:21 BST Begin: pglcmd stop_quick
    Stopping pglcmd.wd[ OK ]
    Deleting iptables ...
    ..Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh[ OK ]
    ..Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh[ OK ]
    Iptables deleted.
    Stopping pgld/sbin/start-stop-daemon: warning: failed to kill 29337: No such process
    [ OK ]
    2012-06-12 00:16:21 BST End: pglcmd stop_quick
    2012-06-12 00:17:17 BST Begin: pglcmd start
    Building blocklist ...
    Updating atma_atma... done.
    Extracting atma_atma, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/atma_atma/downloaded/atma_atma
    
    Extracting  tzmtqbbsgbtfxainogvm.txt
    
    Everything is Ok
    
    Size:       10273329
    Compressed: 740830
    done.
    Updating bluetack_dshield... done.
    Extracting bluetack_dshield, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_dshield/downloaded/bluetack_dshield
    
    Extracting  bt_dshield.txt
    
    Everything is Ok
    
    Size:       6950
    Compressed: 1737
    done.
    Updating bluetack_proxy... done.
    Extracting bluetack_proxy, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/bluetack_proxy/downloaded/bluetack_proxy
    
    Extracting  bt_proxy.txt
    
    Everything is Ok
    
    Size:       113918
    Compressed: 20109
    done.
    Updating tbg_bogon... done.
    Extracting tbg_bogon, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_bogon/downloaded/tbg_bogon
    
    Extracting  ewqglwibdgjttwttrinl.txt
    
    Everything is Ok
    
    Size:       34716
    Compressed: 5771
    done.
    Updating tbg_business-isps... done.
    Extracting tbg_business-isps, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_business-isps/downloaded/tbg_business-isps
    
    Extracting  jcjfaxgyyshvdbceroxf.txt
    
    Everything is Ok
    
    Size:       1882488
    Compressed: 263872
    done.
    Updating tbg_general-corporate-ranges... done.
    Extracting tbg_general-corporate-ranges, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_general-corporate-ranges/downloaded/tbg_general-corporate-ranges
    
    Extracting  ecqbsykllnadihkdirsh.txt
    
    Everything is Ok
    
    Size:       18119071
    Compressed: 3436060
    done.
    Updating tbg_hijacked... done.
    Extracting tbg_hijacked, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_hijacked/downloaded/tbg_hijacked
    
    Extracting  tbnuqfclfkemqivekikv.txt
    
    Everything is Ok
    
    Size:       13719
    Compressed: 2427
    done.
    Updating tbg_primary-threats... done.
    Extracting tbg_primary-threats, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_primary-threats/downloaded/tbg_primary-threats
    
    Extracting  ijfqtofzixtwayqovmxn.txt
    
    Everything is Ok
    
    Size:       16718961
    Compressed: 3604082
    done.
    Updating tbg_search-engines... done.
    Extracting tbg_search-engines, detected 7z...
    7-Zip (A) 9.20  Copyright (c) 1999-2010 Igor Pavlov  2010-11-18
    p7zip Version 9.20 (locale=C,Utf16=off,HugeFiles=on,2 CPUs)
    
    Processing archive: /var/spool/pgl/tbg_search-engines/downloaded/tbg_search-engines
    
    Extracting  pfefqteoxlfzopecdtyw.txt
    
    Everything is Ok
    
    Size:       58218
    Compressed: 15311
    done.
    WARN: Invalid ASCII line:
    INFO: ASCII: 837519 entries loaded from "STDIN"
    INFO: Merged 596241 of 837519 entries.
    INFO: Blocking 241278 IP ranges (2771734729 IPs).
    Blocklist built.
    Inserting iptables ...
    ..Setting up iptables for INPUT:
    ....Creating chain and inserting NFQUEUE rule[ OK ]
    ....Whitelisting IP ranges[ OK ]
    ....Inserting block rule[ OK ]
    ..Setting up iptables for OUTPUT:
    ....Creating chain and inserting NFQUEUE rule[ OK ]
    ....Whitelisting IP ranges[ OK ]
    ....Inserting block rule[ OK ]
    ..Setting up iptables for FORWARD:
    ....Creating chain and inserting NFQUEUE rule[ OK ]
    ....Inserting block rule[ OK ]
    ..Allowing loopback traffic: INPUT OUTPUT[ OK ]
    ..Allowing OUTPUT traffic to DNS server 127.0.0.1[ OK ]
    ..Allowing FORWARD traffic to DNS server 127.0.0.1[ OK ]
    ..Allowing LAN traffic ...
    ....INPUT from 192.168.2.0/24[ OK ]
    ....OUTPUT to 192.168.2.0/24[ OK ]
    ....FORWARD from 192.168.2.0/24 to 192.168.2.0/24[ OK ]
    ..LAN traffic allowed.
    ..Activating chains:
    ....INPUT
    ....OUTPUT
    ....FORWARD
    ..Chains activated.
    Iptables inserted.
    Starting pgld[ OK ]
    Starting pglcmd.wd[ OK ]
    2012-06-12 00:18:42 BST End: pglcmd start
    2012-06-12 00:21:00 BST Begin: pglcmd reload
    Reloading pgld   ...done.
    2012-06-12 00:21:01 BST End: pglcmd reload
    2012-06-12 00:22:50 BST Begin: pglcmd start
    Problematic daemon status: 1
    * pgld is not running
    2012-06-12 00:23:18 BST Begin: pglcmd start
    Problematic daemon status: 1
    * pgld is not running
    pglcmd.wd: pgld is not running!
    The watchdog detected that the daemon is not running.
    To disable the watchdog set WATCHDOG="0" in /etc/pgl/pglcmd.conf.
    Now doing a restart:
    * Restarting only PeerGuardian Linux pgld
    
    2012-06-12 00:23:42 BST Begin: pglcmd restart_not_wd
    Deleting iptables ...
    ..Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    ..Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    Iptables deleted.
    Stopping pgld/sbin/start-stop-daemon: warning: failed to kill 31448: No such process
    ...done.
    Inserting iptables ...
    ..Setting up iptables for INPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for OUTPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for FORWARD:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Inserting block rule   ...done.
    ..Allowing OUTPUT traffic to DNS server 127.0.0.1   ...done.
    ..Allowing FORWARD traffic to DNS server 127.0.0.1   ...done.
    ..Allowing LAN traffic ...
    ....INPUT from 192.168.2.0/24   ...done.
    ....OUTPUT to 192.168.2.0/24   ...done.
    ....FORWARD from 192.168.2.0/24 to 192.168.2.0/24   ...done.
    ..LAN traffic allowed.
    ..Activating chains:
    ....INPUT
    ....OUTPUT
    ....FORWARD
    ..Chains activated.
    Iptables inserted.
    Starting pgld   ...done.
    Starting pglcmd.wd   ...done.
    2012-06-12 00:23:43 BST End: pglcmd restart_not_wd
    ...done.
    Warning: sendmail not found.
    Check the SENDMAIL setting.
    * /var/run/pglcmd.wd.pid already exists, not starting pglcmd.wd again
    2012-06-12 00:24:16 BST Begin: pglcmd stop
    Stopping pglcmd.wd   ...done.
    Warning: sendmail not found.
    Check the SENDMAIL setting.
    Deleting iptables ...
    ..Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    ..Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    Iptables deleted.
    Stopping pgld   ...done.
    2012-06-12 00:24:17 BST End: pglcmd stop
    2012-06-12 00:24:22 BST Begin: pglcmd reload
    pgld is not running, doing nothing.
    2012-06-12 00:24:22 BST End: pglcmd reload
    2012-06-12 00:24:29 BST Begin: pglcmd restart
    Stopping pglcmd.wd   ...done.
    Deleting iptables ...
    Iptables deleted.
    Stopping pgld   ...done.
    Inserting iptables ...
    ..Setting up iptables for INPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for OUTPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for FORWARD:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Inserting block rule   ...done.
    ..Allowing loopback traffic: INPUT OUTPUT   ...done.
    ..Allowing OUTPUT traffic to DNS server 127.0.0.1   ...done.
    ..Allowing FORWARD traffic to DNS server 127.0.0.1   ...done.
    ..Allowing LAN traffic ...
    ....INPUT from 192.168.2.0/24   ...done.
    ....OUTPUT to 192.168.2.0/24   ...done.
    ....FORWARD from 192.168.2.0/24 to 192.168.2.0/24   ...done.
    ..LAN traffic allowed.
    ..Activating chains:
    ....INPUT
    ....OUTPUT
    ....FORWARD
    ..Chains activated.
    Iptables inserted.
    Starting pgld   ...done.
    Starting pglcmd.wd   ...done.
    2012-06-12 00:24:29 BST End: pglcmd restart
    2012-06-12 00:24:37 BST Begin: pglcmd reload
    Reloading pgld   ...done.
    2012-06-12 00:24:37 BST End: pglcmd reload
    2012-06-12 00:26:20 BST Begin: pglcmd start
    Problematic daemon status: 1
    * pgld is not running
    2012-06-12 00:27:34 BST Begin: pglcmd restart
    Stopping pglcmd.wd   ...done.
    Deleting iptables ...
    ..Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    ..Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    Iptables deleted.
    Stopping pgld/sbin/start-stop-daemon: warning: failed to kill 32023: No such process
    ...done.
    Inserting iptables ...
    ..Setting up iptables for INPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for OUTPUT:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Whitelisting IP ranges   ...done.
    ....Inserting block rule   ...done.
    ..Setting up iptables for FORWARD:
    ....Creating chain and inserting NFQUEUE rule   ...done.
    ....Inserting block rule   ...done.
    ..Allowing loopback traffic: INPUT OUTPUT   ...done.
    ..Allowing OUTPUT traffic to DNS server 127.0.0.1   ...done.
    ..Allowing FORWARD traffic to DNS server 127.0.0.1   ...done.
    ..Allowing LAN traffic ...
    ....INPUT from 192.168.2.0/24   ...done.
    ....OUTPUT to 192.168.2.0/24   ...done.
    ....FORWARD from 192.168.2.0/24 to 192.168.2.0/24   ...done.
    ..LAN traffic allowed.
    ..Activating chains:
    ....INPUT
    ....OUTPUT
    ....FORWARD
    ..Chains activated.
    Iptables inserted.
    Starting pgld   ...done.
    Starting pglcmd.wd   ...done.
    2012-06-12 00:27:34 BST End: pglcmd restart
    2012-06-12 00:28:01 BST Begin: pglcmd reload
    Reloading pgld   ...done.
    2012-06-12 00:28:01 BST End: pglcmd reload
    2012-06-12 00:28:19 BST Begin: pglcmd start
    Problematic daemon status: 1
    * pgld is not running
    2012-06-12 00:30:15 BST Begin: pglcmd stop
    Stopping pglcmd.wd   ...done.
    Deleting iptables ...
    ..Executing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    ..Removing iptables remove script /var/lib/pgl/.pglcmd.iptables.remove.sh   ...done.
    Iptables deleted.
    Stopping pgld/sbin/start-stop-daemon: warning: failed to kill 32378: No such process
    ...done.
    2012-06-12 00:30:15 BST End: pglcmd stop

    Content of pgld.log

    Code:
    Jun 12 00:13:36 INFO: Connected to dbus system bus.
    Jun 12 00:13:36 INFO: Started.
    Jun 12 00:13:37 INFO: ASCII: 241182 entries loaded from "/var/lib/pgl/master_blocklist.p2p"
    Jun 12 00:13:37 INFO: Blocking 241182 IP ranges (2771731784 IPs).
    Jun 12 00:13:37 INFO: NFQUEUE: binding to queue 92
    Jun 12 00:13:37 INFO: ACCEPT mark: 20
    Jun 12 00:13:37 INFO: REJECT mark: 10
    Jun 12 00:15:00 OUT: 192.168.2.2            173.194.67.103         ICMP || SoftLayer Technologies Inc. | FBI dont ask me why | Apollo | MCA
    Jun 12 00:15:01 OUT: 192.168.2.2            173.194.67.103         ICMP || SoftLayer Technologies Inc. | FBI dont ask me why | Apollo | MCA
    Jun 12 00:15:12 INFO: Closing logfile: /var/log/pgl/pgld.log
    Jun 12 00:15:12 INFO: Reopened logfile: /var/log/pgl/pgld.log
    Jun 12 00:15:12 WARN: pgld dbus is already initialized.
    
    Jun 12 00:15:12 ERROR: Cannot initialize D-Bus
    Jun 12 00:18:42 INFO: Connected to dbus system bus.
    Jun 12 00:18:42 INFO: Started.
    Jun 12 00:18:43 INFO: ASCII: 241278 entries loaded from "/var/lib/pgl/master_blocklist.p2p"
    Jun 12 00:18:43 INFO: Blocking 241278 IP ranges (2771734729 IPs).
    Jun 12 00:18:43 INFO: NFQUEUE: binding to queue 92
    Jun 12 00:18:43 INFO: ACCEPT mark: 20
    Jun 12 00:18:43 INFO: REJECT mark: 10
    Jun 12 00:21:01 INFO: Closing logfile: /var/log/pgl/pgld.log
    Jun 12 00:21:01 INFO: Reopened logfile: /var/log/pgl/pgld.log
    Jun 12 00:21:01 WARN: pgld dbus is already initialized.
    
    Jun 12 00:21:01 ERROR: Cannot initialize D-Bus
    Jun 12 00:23:43 INFO: Connected to dbus system bus.
    Jun 12 00:23:43 INFO: Started.
    Jun 12 00:23:43 INFO: ASCII: 241278 entries loaded from "/var/lib/pgl/master_blocklist.p2p"
    Jun 12 00:23:43 INFO: Blocking 241278 IP ranges (2771734729 IPs).
    Jun 12 00:23:43 INFO: NFQUEUE: binding to queue 92
    Jun 12 00:23:43 INFO: ACCEPT mark: 20
    Jun 12 00:23:43 INFO: REJECT mark: 10
    Jun 12 00:24:16 INFO: Unbinding from nfqueue.
    Jun 12 00:24:16 STATS: Blocked hit statistics:
    Jun 12 00:24:16 STATS: 0 hits total
    Jun 12 00:24:29 INFO: Connected to dbus system bus.
    Jun 12 00:24:29 INFO: Started.
    Jun 12 00:24:29 INFO: ASCII: 241278 entries loaded from "/var/lib/pgl/master_blocklist.p2p"
    Jun 12 00:24:29 INFO: Blocking 241278 IP ranges (2771734729 IPs).
    Jun 12 00:24:29 INFO: NFQUEUE: binding to queue 92
    Jun 12 00:24:29 INFO: ACCEPT mark: 20
    Jun 12 00:24:29 INFO: REJECT mark: 10
    Jun 12 00:24:37 INFO: Closing logfile: /var/log/pgl/pgld.log
    Jun 12 00:24:37 INFO: Reopened logfile: /var/log/pgl/pgld.log
    Jun 12 00:24:37 WARN: pgld dbus is already initialized.
    
    Jun 12 00:24:37 ERROR: Cannot initialize D-Bus
    Jun 12 00:27:34 INFO: Connected to dbus system bus.
    Jun 12 00:27:34 INFO: Started.
    Jun 12 00:27:34 INFO: ASCII: 241278 entries loaded from "/var/lib/pgl/master_blocklist.p2p"
    Jun 12 00:27:34 INFO: Blocking 241278 IP ranges (2771734729 IPs).
    Jun 12 00:27:34 INFO: NFQUEUE: binding to queue 92
    Jun 12 00:27:34 INFO: ACCEPT mark: 20
    Jun 12 00:27:34 INFO: REJECT mark: 10
    Jun 12 00:28:01 INFO: Closing logfile: /var/log/pgl/pgld.log
    Jun 12 00:28:01 INFO: Reopened logfile: /var/log/pgl/pgld.log
    Jun 12 00:28:01 WARN: pgld dbus is already initialized.
    
    Jun 12 00:28:01 ERROR: Cannot initialize D-Bus
    Attached Images Attached Images

  2. #612
    Join Date
    May 2008
    Location
    /dev/null
    Beans
    216
    Distro
    Ubuntu

    Question Re: General MoBlock thread

    @masuch: I'm not familiar with tor in detail. But I doubt that there is an module for iptables. Perhaps there is a port that you could whitelist. Instead I guess you should use this list as an allow list in pgl (ask if you don't know how to configure that).[/QUOTE]

    Thanks for that list - should it be managed by /etc/pgl/iptables-custom-insert.sh ?

    Because Tor has many different ports and IPs (as I have noticed) -
    Is it possible to allow in iptables everything for specific application ?
    Something like following I have found in iptables-custom-insert.sh:
    iptables -I pgl_out -p tcp --dport 80 -m owner --cmd-owner firefox -j RETURN

    but without -dport and owner and --cmd-owner - which I did not find in man iptables anyway what does it mean ?

    thank you for help.

  3. #613
    Join Date
    Jan 2007
    Beans
    770

    Re: General MoBlock thread

    We released "pgl 2.2.0 The autotools release"
    • our new Gentoo maintainer hasufell added a real buildsystem (GNU autotools)
    • renamed pgl-gui to pglgui
    • various fixes and for pglgui new features


    Because the oneiric and precise problems (pgld crashes on reload) still exist with the packages that were built in these distributions, I copied the natty binary packages to the oneiric and precise dists in the PPA.
    So you don't have to use the workaround (use natty entry in the apt sources.list) anymore, because I implemented that workaround on the server side.
    Of course the root of this problem still needs to be diagnosed and fixed.

    Quote Originally Posted by masuch View Post
    Thanks for that list - should it be managed by /etc/pgl/iptables-custom-insert.sh ?
    Copy it to /etc/pgl/blocklists.local/


    Quote Originally Posted by masuch View Post
    Because Tor has many different ports and IPs (as I have noticed) -
    Is it possible to allow in iptables everything for specific application ?
    Something like following I have found in iptables-custom-insert.sh:
    iptables -I pgl_out -p tcp --dport 80 -m owner --cmd-owner firefox -j RETURN

    but without -dport and owner and --cmd-owner - which I did not find in man iptables anyway what does it mean ?
    You may try
    Code:
    iptables -I pgl_out -m owner --cmd-owner firefox -j RETURN
    cmd-owner is a submodule of owner. But if it is not in "man", then your system probably doesn't support it either because it is just an netfilter extension (which I think needs special kernel support).
    Please post your logfiles and output of commands wrapped in code tags:
    Code:
    [code]output[/code]
    Co-author of PeerGuardian Linux (pgl). Maintainer of the pgl package repositories for Debian and Ubuntu.

  4. #614
    Join Date
    Dec 2006
    Beans
    161
    Distro
    Kubuntu Development Release

    Re: General MoBlock thread

    Because the oneiric and precise problems (pgld crashes on reload) still exist with the packages that were built in these distributions, I copied the natty binary packages to the oneiric and precise dists in the PPA.
    So you don't have to use the workaround (use natty entry in the apt sources.list) anymore, because I implemented that workaround on the server side.
    Of course the root of this problem still needs to be diagnosed and fixed.

    Thanks, this version works.

  5. #615
    Join Date
    Jan 2007
    Beans
    770

    Re: General MoBlock thread

    I just created a new PPA pgl-experimental: https://launchpad.net/~jre-phoenix/+...l-experimental
    I'll add preview releases there from time to time in order to get tester's feedback without breaking the whole repository. Please use this PPA only additionally to the old one - the new one does NOT necessarily always contain the newest release.

    I hope to have fixed the Oneiric/Precise bug there. Someone please test.

    EDIT: the packages are still building and might just be available in a few hours.
    Please post your logfiles and output of commands wrapped in code tags:
    Code:
    [code]output[/code]
    Co-author of PeerGuardian Linux (pgl). Maintainer of the pgl package repositories for Debian and Ubuntu.

  6. #616
    Join Date
    Dec 2006
    Beans
    161
    Distro
    Kubuntu Development Release

    Re: General MoBlock thread

    I just tried out the new version from experimental ppa performing my usual tests both from gui and the terminal and I'm happy to say it worked perfectly so far.

    Congrats on fixing the reload bug

    A strange oddity I've noticed for a while now is in the blocklists the atma/atma entry always shows a yellow icon as if I've just enabled or disabled it even though I've never touched it. It's no big deal but just weird that it does that.
    Attached Images Attached Images

  7. #617
    Join Date
    Jan 2007
    Beans
    770

    Re: General MoBlock thread

    Thanks Gavin77, your fast feedback really helps!

    About the new problem: this happens here, too. I just told it to our GUI developer.
    Please post your logfiles and output of commands wrapped in code tags:
    Code:
    [code]output[/code]
    Co-author of PeerGuardian Linux (pgl). Maintainer of the pgl package repositories for Debian and Ubuntu.

  8. #618
    Join Date
    Oct 2009
    Beans
    5

    Question Re: General MoBlock thread

    I'm not a iptables, pgl expert so I'm sure that my comment below contains understanding failures....

    Be that as it may....

    Is there a way to have the ipp2p iptables module redirect traffic to pgl to check? Right now I have pgl only looking at common p2p ports. What I want is to have it inspect any traffic (on any port) that the ipp2p module identifies as p2p traffic.

    Note: I'm using shorewall to manage my iptables.

    Thanks in advance,

    Sean

  9. #619
    Join Date
    Jan 2007
    Beans
    770

    "PeerGuardian Linux 2.2.1" released

    Please welcome "PeerGuardian Linux 2.2.1"!

    This version adds the last feature only present in mobloquer, but not in
    pglgui: "whois information about blocked IPs".

    Since I also fixed or workarounded all issues with older Debian and
    Ubuntu versions I added transitional packages for the old
    moblock/blockcontrol/mobloquer packages. This means the Debian/Ubuntu
    world now moves to pgl automatically. (Except the 2008 Ubuntu Long Term
    Release Hardy which I think is ok to be left behind forever ;P )

    The packages are in the usual PPA at https://launchpad.net/~jre-phoenix/+archive/ppa and will find their way to you automatically if you enabled it.

    The development code is in the git repository at sourceforge, see
    https://sourceforge.net/scm/?type=git&group_id=131687


    Complete 2.2.1 ChangeLog:

    Code:
    [jre]
    * Disabled dbus closing and reopening on reload.
      Fixes bug "pgld binaries built under Ubuntu Oneiric, Precise
      and Mint 12 crash on reload" (Closes: SF Bug #3495654)
    * fixed Makefile clean target
    
    [freemind]
    * Fixed log viewer dialog to not close on key press.
    * Added whois action.
    * Minor tweaks.
    * Fixed (random) unapplied changes at start-up bug.
    * Added sortable columns in whitelist view.
    * Added automatic saving and restoring of window's state.

    @Gavin77: fixed

    @Sean Whitney:
    Quote Originally Posted by Sean Whitney View Post
    Is there a way to have the ipp2p iptables module redirect traffic to pgl to check? Right now I have pgl only looking at common p2p ports. What I want is to have it inspect any traffic (on any port) that the ipp2p module identifies as p2p traffic.
    First off:
    per default pgl checks all NEW traffic. Ports that you add to WHITE_[TCP|UDP]_... (or whitelist in pglgui) are NOT handled by pglgui. So adding the P2P ports to the whitelisting normally is the completely wrong thing to do - just in case there was a misunderstanding.

    Now about ipp2p - I don't use it, just read something about it. If you want to check all new ipp2p identified traffic you should do the following steps [I haven't tested it, please report your "sudo iptables -L -nv" before starting pgl with the new configuration and after:
    1. Stop pgl
    2. Disable the normal activation, where all NEW traffic is sent to pgl:
      Set in /etc/pgl/pglcmd.conf:
      Code:
      IPTABLES_ACTIVATION="0"
      Refer to /usr/lib/[YOUR ARCHITECTURE, e.g. x86_64-linux-gnu]/pgl/pglcmd.defaults to learn about the varaible meanings. This means pglcmd does NOT execute the following commands (this is the simplest case where pgl works on all network interfaces. I hope I made the variable substituion correctly):
      Code:
      iptables -I INPUT -m state --state NEW -m mark ! --mark 20 -j pgl_in
      iptables -I OUTPUT -m state --state NEW -m mark ! --mark 20 -j pgl_out
      iptables -I FORWARD -m state --state NEW -m mark ! --mark 20 -j pgl_fwd
    3. Instead activate by sending all ipp2p traffic to pgl:
      Add to a new file /etc/pgl/ipp2p.iptables.insert.sh
      Code:
      iptables -I INPUT -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_in
      iptables -I OUTPUT -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_out
      iptables -I FORWARD -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_fwd
    4. To remove these iptables rules ater pgl stops you then need in /etc/pgl/ipp2p.iptables.remove.sh
      Code:
      iptables -D INPUT -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_in
      iptables -D OUTPUT -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_out
      iptables -D FORWARD -m state --state NEW -m ipp2p --ipp2p -m mark ! --mark 20 -j pgl_fwd
    5. Start pgl
    Please post your logfiles and output of commands wrapped in code tags:
    Code:
    [code]output[/code]
    Co-author of PeerGuardian Linux (pgl). Maintainer of the pgl package repositories for Debian and Ubuntu.

  10. #620
    Join Date
    Oct 2009
    Beans
    5

    Re: "PeerGuardian Linux 2.2.1" released

    Quote Originally Posted by jre View Post
    First off:
    per default pgl checks all NEW traffic. Ports that you add to WHITE_[TCP|UDP]_... (or whitelist in pglgui) are NOT handled by pglgui. So adding the P2P ports to the whitelisting normally is the completely wrong thing to do - just in case there was a misunderstanding.
    You are of course correct. I have whitelisted all port EXCEPT, the common P2P ports. I'm only really interested in apply pgl to P2P traffic. Thanks, I'll try it out and let you know.

    Sean

Page 62 of 65 FirstFirst ... 12526061626364 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •