那些年我們一起開的搞笑地產公司 五都法拍屋 9月爆量-歪樓篇

早上收到了兩封信......拆開一看

看來我得繼續再去101.......





































































得要繼續去退貨不然付不出卡費

achitsai wrote:
早上收到了兩封信....(恕刪)


國巨最近又大漲樂。
ambitiously wrote:
國巨最近又大漲樂。...(恕刪)

今天忙著在研究學校科系跟約老師排時間上課....還沒看盤

要花錢多讀那麼多年....我得要想想怎麼開口持續向社會大衆募款才行

今天沒有我口頭嘉獎還是不行
對應把上次丟掉的檢回來改這樣放進去就行了.暗樁與否不重要.重要是幹不起來.PS:套用這規則.中繼AP必定會面臨嚴重的信號干擾.故對應就可放心把RTS值設為255.
簡言之採用思科的設定(128到256).暗樁出現與否就免驚.每週的這幾天是它們的放風日.
意思是說採用這規則.僅剩無線訊號的部分受到局部干擾影響.但內網仍舊保持順穩而超有安全感.
日後從紀錄就會看到永無止盡的445與22及其次的23仍舊對著ROS牆.叩~叩~叩~敲牆!
規則運行一段時間.個人在確認之後.就是中繼放心把RTS值設為128.增強功能不開啟即可.

NeverGiveUp!! wrote:
修正一下.這次把下列這兩條拆掉.紅一格確實是多餘.規則底部就已概括.紅二格由紫二格取代.
add action=reject chain=input comment="Reject invalid(Input)" \
connection-state=invalid log=yes log-prefix=invalid(Input) reject-with=\
icmp-network-unreachable
add action=reject chain=forward comment="Reject invalid(Forward)" \
connection-state=invalid log=yes log-prefix=invalid(Forward) reject-with=\
icmp-network-unreachable

然後新增這兩條.這樣暗流就幹不起來囉!幹不起來囉~幹不起來囉~幹不起來囉~
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
in-interface=bridge src-address-list=LAN
add action=reject chain=forward comment="Reject All Forward Packets" log=yes \
log-prefix="Reject All Packets(Forward)" reject-with=\
icmp-network-unreachable

剛剛才發現上次紫一格那一條忘記卸下來!修正哩.
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
src-address-list=LAN
add action=reject chain=forward comment="Reject All Forward Packets" log=yes \
log-prefix="Reject All Packets" reject-with=icmp-network-unreachabl
/ip firewall address-list
add address=192.168.88.2-192.168.88.254 list=LAN
add address=0.0.0.0/8 list=BOGONS
add address=10.0.0.0/8 list=BOGONS
add address=100.64.0.0/10 list=BOGONS
add address=127.0.0.0/8 list=BOGONS
add address=169.254.0.0/16 list=BOGONS
add address=172.16.0.0/12 list=BOGONS
add address=192.0.0.0/24 list=BOGONS
add address=192.0.2.0/24 list=BOGONS
add address=192.88.99.0/24 list=BOGONS
add address=192.168.0.0/16 list=BOGONS
add address=198.18.0.0/15 list=BOGONS
add address=198.51.100.0/24 list=BOGONS
add address=203.0.113.0/24 list=BOGONS
add address=224.0.0.0/3 list=BOGONS
add address=224.0.0.0/4 list=BOGONS
add address=224.0.0.0/24 list=BOGONS
add address=224.0.1.0/24 list=BOGONS
add address=224.0.2.0-224.0.255.255 list=BOGONS
add address=224.3.0.0-224.4.255.255 list=BOGONS
add address=232.0.0.0/8 list=BOGONS
add address=233.0.0.0/8 list=BOGONS
add address=233.252.0.0/14 list=BOGONS
add address=234.0.0.0/8 list=BOGONS
add address=239.0.0.0/8 list=BOGONS
add address=240.0.0.0/4 list=BOGONS
/ip firewall nat
add action=redirect chain=dstnat comment=DNS dst-port=53 protocol=tcp \
to-ports=53
add action=redirect chain=dstnat dst-port=53 protocol=udp to-ports=53
add action=masquerade chain=srcnat comment="IP Masquerading" \
src-address-list=LAN
/ip firewall filter
add action=reject chain=forward dst-port=53,443 log=yes protocol=udp \
reject-with=icmp-network-unreachable src-address-list=LAN log-prefix=\
Reject LAN -> UDP(53,443)
add action=accept chain=input comment=\
"Accept established and related packets" connection-state=\
established,related
add action=accept chain=input comment=udp limit=1/365d,0:packet protocol=udp
add action=accept chain=input comment="From our LAN" in-interface=bridge \
connection-nat-state=!dstnat src-address-list=LAN
add action=accept chain=input comment="Allow limited pings" icmp-options=\
!8:0-255 limit=50/5s,2:packet protocol=icmp
add action=reject chain=input comment="Reject login brute forcers 1" dst-port=\
21,22,23,8291 log=yes protocol=tcp reject-with=icmp-network-unreachable \
src-address-list=login_blacklist
add action=add-src-to-address-list address-list=login_blacklist \
address-list-timeout=4d chain=input comment="Reject login brute forcers 2" \
connection-state=new dst-port=21,22,23,8291 protocol=tcp
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment=\
"Reject port scanners\A1GPort scanners to list" log=yes protocol=tcp psd=\
21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" log=\
yes protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" log=yes \
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" log=yes \
protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" log=yes \
protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" log=yes \
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" log=yes \
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=reject chain=input comment="dropping port scanners" log=yes \
reject-with=icmp-network-unreachable src-address-list="port scanners"
add action=reject chain=input comment="Reject all packets from public internet\\
\\_which should not exist in public network" in-interface=pppoe-out1 log=\
yes reject-with=icmp-network-unreachable src-address-list=BOGONS
add action=accept chain=forward comment="Established, Related" \
connection-state=established,relatedadd
add action=log chain=forward comment=Log connection-state=new
add action=log chain=forward connection-state=related log-prefix=RELATED
add action=log chain=forward protocol=ipv6
add action=log chain=forward protocol=gre
add action=log chain=forward protocol=ipsec-esp
action=jump chain=forward comment="DDoS Detection and Blocking" \
connection-state=new jump-target=detect-ddos
add action=return chain=detect-ddos dst-limit=32,32,src-and-dst-addresses/10s
add action=return chain=detect-ddos src-address=192.168.88.1
add action=add-dst-to-address-list address-list=ddosed address-list-timeout=\
10m chain=detect-ddos
add action=add-src-to-address-list address-list=ddoser address-list-timeout=\
10m chain=detect-ddos
add action=accept chain=forward comment=\
"Accept all New Packets connections from network" connection-state=new \
connection-nat-state=!dstnat src-address-list=LAN
add action=reject chain=forward comment="Reject new TOR version" log=yes \
reject-with=icmp-network-unreachable src-address-list="New Tor-Users"
add action=reject chain=forward comment="Block TOR browser" log=yes \
reject-with=icmp-network-unreachable src-address-list=Tor-Users
add action=reject chain=forward comment=\
"Reject tries to reach not BOGONS addresses from LAN" dst-address-list=\
BOGONS in-interface=bridge log=yes log-prefix=!public_from_LAN \
out-interface=!bridge reject-with=icmp-network-unreachable
add action=reject chain=forward comment=\
"Reject new connections from internet which are not dst-natted" \
connection-nat-state=!dstnat connection-state=new in-interface=pppoe-out1 \
log=yes reject-with=icmp-network-unreachable
add action=reject chain=forward comment="Reject all packets from BOGONS inter\\
net which should not exist in BOGONS network" in-interface=pppoe-out1 log=\
yes reject-with=icmp-network-unreachable src-address-list=BOGONS
add action=reject chain=forward comment="Reject all packets from local network\\
\\_to internet which should not exist in BOGONS network" dst-address-list=\
BOGONS in-interface=bridge log=yes reject-with=\
icmp-network-unreachable
add action=reject chain=forward comment="Reject all packets in local network w\\
hich does not have local network address" in-interface=bridge log=yes \
reject-with=icmp-network-unreachable src-address=!192.168.88.0/24
add action=reject chain=forward comment="Reject All Forward Packets" log=yes \
log-prefix="Reject All Packets" reject-with=icmp-network-unreachabl
add action=log chain=input comment="Log everything else" log-prefix=\
"REJECT INPUT"
add action=reject chain=input comment="Reject everything else" reject-with=\
icmp-network-unreachable
/ip firewall mangle
add action=mark-routing chain=prerouting dst-address-list=ddosed \
new-routing-mark=ddoser-route-mark passthrough=no src-address-list=ddoser
add action=add-src-to-address-list address-list="New Tor-Users" \
address-list-timeout=5m chain=prerouting comment="New Tor Version" \
dst-port=22 log=yes protocol=tcp
add action=add-src-to-address-list address-list=Tor-Users \
address-list-timeout=5m chain=prerouting comment="Tor Users" \
dst-address-list=TOR-SERVERS dst-port=443 protocol=tcp
/ip route
add distance=1 routing-mark=ddoser-route-mark type=blackhole
/system scheduler
add comment="Check and set NTP servers" interval=6h name=SetNtpServers \
on-event="# SetNtpServers - Check and set NTP servers from NTP pool\\

# v1.2 Tested and Developed on ROS v5.7\\

#\\

# Change the following line as needed as progName should match script na\\
me \\

:local progName \\"SetNtpServers\";\

\

# Array of NTP pools to use (check time.windows.com) one or a maximum of\
\_two, a primary & secondary\

# Modify the following line and array variable based on your locale (def\
ault is north america).\

:local arrNtpSystems (\"time.windows.com\", \"time.nist.gov\");\

# Alternatively the US related pool below can be used. \

#:local arrNtpSystems (\"time.windows.com\", \"time.nist.gov\");\

#\

# No modification is necessary beyond this line.\

:put \"\$progName: Running...\";\

:log info \"\$progName: Running...\";\

:set arrNtpSystems [ :toarray \$arrNtpSystems ];\

:if (( [ :len \$arrNtpSystems ] < 1 ) or ( [ :len \$arrNtpSystems ] > 2 \
)) do={ \

:put \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) must \
be either one or two DNS names.\";\

:log info \"\$progName: ERROR NTP Systems array (\\\$arrNtpSystems) \
must be either one or two DNS names.\";\

} else={\

:local arrRosNtpSetting (\"primary-ntp\", \"secondary-ntp\");\

:local i 0;\

:foreach strNtpSystem in (\$arrNtpSystems) do={\

:local ipAddrNtpSystem [ :resolve \$strNtpSystem ];\

:local strRosNtpSetting [ :pick \$arrRosNtpSetting \$i ];\

:local strCurrentNtpIp [ /system ntp client get \$strRosNtpSetti\
ng ];\

:put \"\$progName: NTP server DNS name \$strNtpSystem resolves t\
o \$ipAddrNtpSystem.\";\

:log info \"\$progName: NTP server DNS name \$strNtpSystem resol\
ves to \$ipAddrNtpSystem.\";\

:put \"\$progName: Current \$strRosNtpSetting setting is \$strCu\
rrentNtpIp.\";\

:log info \"\$progName: Current \$strRosNtpSetting setting is \$\
strCurrentNtpIp.\";\

:if ( [ :toip \$ipAddrNtpSystem ] != [ :toip \$strCurrentNtpIp ]\
\_) do={\

:put \"\$progName: Changing \$strRosNtpSetting setting to \$\
ipAddrNtpSystem.\";\

:log info \"\$progName: Changing \$strRosNtpSetting setting \
to \$ipAddrNtpSystem.\";\

:local strCommand [ :parse \"/system ntp client set \$strRos\
NtpSetting=\\\"\$ipAddrNtpSystem\\\"\" ];\

\$strCommand;\

} else={\

:put \"\$progName: No changes were made for the \$strRosNtpS\
etting NTP setting.\";\

:log info \"\$progName: No changes were made for the \$strRo\
sNtpSetting NTP setting.\";\

}\

:set i (\$i + 1);\

}\

}\

:put \"\$progName: Done.\";\

:log info \"\$progName: Done.\";" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add comment=Download_Ads_List interval=24h name=DownloadAdsList \
on-event="/system script run Blocklister_download_Ads" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=25h name=DownloadHijackedList on-event=\
"/system script run \

Blocklister_download_Hijacked" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
add interval=26h name=DownloadMalwaredomainlistList on-event=\
"/system script run Blocklister_download_Malwaredomainlist" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/system script
add name=Blocklister_download_Ads owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/ads\" dst-path=\"ads.rsc\";\
\_/import file-name=\"ads.rsc\";"
add name=Blocklister_download_Hijacked owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/hijacked\" dst-path=\"hijac\
ked.rsc\"; /import file-name=\"hijacked.rsc\";"
add name=Blocklister_download_Malwaredomainlist owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\\
tool fetch url=\\"https://blocklister.gefoo.org/malwaredomainlist\" dst-pat\
h=\"malwaredomainlist.rsc\"; /import file-name=\"malwaredomainlist.rsc\";"
/ip firewall raw
add action=drop chain=prerouting dst-address-list=ads_list log=yes
add action=drop chain=prerouting dst-address-list=hijacked_list log=yes
add action=drop chain=prerouting dst-address-list=malwaredomainlist_list \
log=yes
add action=drop chain=prerouting src-address-list=port scanners log=yes
add action=drop chain=prerouting src-address-list=login_blacklist log=yes
add action=drop chain=prerouting comment="Block Teredo IPv6-tunnel" dst-port=\
3544,3545 protocol=udp src-port=1024-65535

--
New Year Resolutions - Simon's Cat | GUIDE TO
人品是做人最好的底牌.

achitsai wrote:
今天忙著在研究學校...(恕刪)



聽說我的投資跑得快~~~

你別開金口~~
讓他跌深點我再去接!!
蜜小雪 wrote:
聽說我的投資跑得快...(恕刪)

為了不擾亂世界的和平......為了不破壞宇宙的和諧.......不了不讓人類貪小便宜

現在沒有付費的本公司不提供服務

今天我已經拒絕了兩個女人......妳是第三個

溜!!!

蜜小雪 wrote:
聽說我的投資跑得快...(恕刪)


蜜姐先炒上三萬等我來空
一雙玉臂千人枕、半點朱唇萬客嚐,還君明珠雙淚垂、恨不相逢未嫁時

achitsai wrote:
今天忙著在研究學校...要花錢多讀那麼多年淚淚淚....我得要想想怎麼開口持續向社會大衆募款才行(恕刪)


恭喜A大!醫學系隨便挑隨便唸,家生一株搖錢樹,以後終於不必再出來募款了!
恭喜A大.我看樓上亮哥說的.
achitsai wrote:
今天忙著在研究學校...(恕刪)
--
寶貝:)好噢!休息記得噢~上篇增修規則.證實有效嚇阻暗流.未來干擾是常態.
23分送出時整個很漫長.失誤雖是事實但實質並不會算在我這裡.祂知道的.證實增修規則有效.
RTS值最終我還是設折衷的數字255.不開增強.無線採用頻帶寬20Mhz頻道避用5~7.
上篇增修的規則我是非常喜歡.就因為這樣子.從採用後至今牆外試探仍然未終止.包括信號干擾.
通常每周五六七及偶然的週三都會是暗流放風日.過去潛規是這樣.現在是五六七居多.輪交替制.
不負責之推測就是祂若調查知情確實有人在搞我的話.有很大的可能不讓很多人對到準.搞不好噢!
還蠻期待混沌.就是剛好遭遇那漫長.才會很確定RTS折衷值在255.更深信增修規則很成功.
--
Paws & Chores - Simon's Cat | STORYTIME
人品是做人最好的底牌.
文章分享
評分
評分
複製連結
請輸入您要前往的頁數(1 ~ 9357)

今日熱門文章 網友點擊推薦!