New: PeerBlock Plus Portable 1.2.0.1 (firewall based on IP block/allow lists) Released 2q141p

John T. Haller's picture
Submitted by John T. Haller on December 4, 2023 - 7:09pm

logoportableapps.sitesunblocked.org Platform. And it's open source and completely free.

portableapps.sitesunblocked.org Platform.

Features 5m3f1z

ScreenshotPeerBlock is an IP-based block and allowlist that lets you block communication with advertising, spyware, p2p monitoring, and other servers online. The included blocklist provider, iBlockList, allows s to update their lists once per week for free. Daily updates are available with a paid subscription. PeerBlock Plus Portable adds a freely sourced combined blocklist that is automatically updated daily when starting the app using a custom updater we created. The list provider accepts donations to fund their efforts. Both the 32-bit and 64-bit versions or the modern and legacy versions are included for maximum performance and compatibility.

Learn more about PeerBlock...

portableapps.sitesunblocked.org Installer / portableapps.sitesunblocked.org Format 1y1x1j

PeerBlock Plus Portable is packaged in a portableapps.sitesunblocked.org Installer so it will automatically detect an existing portableapps.sitesunblocked.org installation when your drive is plugged in. It s upgrades by installing right over an existing copy, preserving all settings. And it's in portableapps.sitesunblocked.org Format, so it automatically works with the portableapps.sitesunblocked.org Platform including the Menu and Backup Utility.

3j2c6h

PeerBlock Plus Portable is available for immediate from the PeerBlock Plus Portable homepage. Get it today!

Story Topic: 6q3g2y

Comments 19c1v

John T. Haller's picture

What's New? 3x5a1e

I've updated PeerBlock with a custom updater to do daily updates of a freely available combined blocklist. This should make PeerBlock more useful to a wider arrary of folks.

Sometimes, the impossible can become possible, if you're awesome!

ANTICHRISTUS REX's picture

Great, Thanks! 2p2n70

Better than manually deleting the lists.
PS. It was not updating (weekly) since a long time, not updating at all for free s.

'Joy is ephemeral, live it before realizing the truth'
― Neo Buddha ―

Update lists 4f691i

Hi John,
What is this "custom updater" exactly? A malicious IP list? Where do you get it from?
Thanks in advance for your help!

Best regards,

Jean-Luc,

John T. Haller's picture

Detailed and Linked b603y

It's detailed and linked above as well as on the app's homepage. You'll find a sources.txt that details all the sources the developer pulls from linked as well as a donation link to them.

Sometimes, the impossible can become possible, if you're awesome!

Links? 2s3u4u

There was a great (huge) and free list curated by John at Bitsurge but his site has been down and he warned everyone that eventually he won't be providing it. Anyone has a link or suggestion on an alternative?

Hello John! 36k

Hey John! Just wanted to let you know that my PeerGuardian / PeerBlock / IPFilter lists are now regularly compiled from the same frequently updated sources that my CIDR lists use. It took me a bit longer than it should have to ditch those iBlockList sources, but I did, and it feels good.

Relevant lists are here:
https://github.com/bongochong/CombinedPrivacyBlockLists/blob/master/comb...
https://github.com/bongochong/CombinedPrivacyBlockLists/blob/master/comb...

P.S. Though most of my computing happens on Linux, I've used portable applications from your site quite frequently over the years in Windows environments. I find them to be immensely valuable when bulk-deploying Windows images to computer labs in schools and such (e.g. It makes managing third party software installations much easier when configuring base images). Thank you for your hard work!

John T. Haller's picture

Thanks, Differences? 2i506x

Thanks for the heads up, John. And you're welcome for the portable apps.

What are the differences between your list and the divadsn list I'm currently bundling? https://mirror.codebucket.de/transmission/

One thing I like about that list is that it includes what the original list is in the P2P file (spamhaus_drop, alienvault_reputation, blocklist_de, etc). Would it make sense for your list to do the same? Have you thought about having it automatically GZipped to make s faster for s that update regularly?

Thanks!

Sometimes, the impossible can become possible, if you're awesome!

Sources 3t1n2l

I could probably make my documentation on github less dense, and I'm in the process of updating my rees and such, but the current sources are as follows: Blocklist DE Brute Force; Blocklist DE FTP; Blocklist DE SSH; Cymru Full Bogons; DShield 30-day; DShield 7-day; DShield Top 20; Daniel Gerzo's Brute Force Blocker; Emerging Threats Botnet CC; NormShield High Brute Force; NormShield High Spam; NormShield High Worm Scan; PGL@Yoyo IP List; Spamhaus Drop; Spamhaus EDrop; BL Personal (my own small list hosted at the same github repo, which is mostly comprised of bruteforce attempts while running Shoutcast and Icecast servers for extended periods of time).

Also, each source list -- save for bogons, along with the ones from DShield and Spamhaus -- is individually piped through the command line aggregate utility, to help with reducing size. The final compiled list has overlapping ranges resolved (thanks to the output of IPConflict, in conjunction with a bunch of regex). They will continue to be updated again with at least the same frequency as all my other lists, and many of my backend scripts are shared as more -friendly (I hope) variants on github as well.

P.S. These sources are also the basis of my CIDR lists for firewalls (though those have some traditional bogon ranges stripped, so s that run any kinds of server-client setups at home don't run into issues).

P.P.S. I will look into providing the lists gunzipped, and if I make any changes to the sources in the future, it will be mentioned in the docs at my repo. I suppose I could modify my scripts to insert the source name next to each line, so I will likely do that in the near future.

Edited for clarity and to take up less space on the screen.

John T. Haller's picture

Makes Sense 2p5i2z

That all makes sense. I'm guessing that resolving the overlaps would make crediting specific lists in the P2P file pretty difficult. I don't think divadsn resolves the overlaps, so they can have entries like this in the file:

spamhaus_drop:223.254.0.0-223.254.255.255
alienvault_reputation:49.143.32.6-49.143.32.6

Do you know how much overlap vs unique there is in your list vs divadsn? I could release an update with both included with the updater.

Sometimes, the impossible can become possible, if you're awesome!

Thank You 6g3o3q

I always try to communicate coherently, but sometimes it's a bit difficult! I started resolving overlapping ranges because there was a bug a couple of years ago under Fedora (and probably some other Red Hat-related distributions) with firewalld, where it would either hang or crash when attempting to import entries that contained overlapping ranges. Now that I've synced up the p2p and dat lists with my CIDR list, they will benefit from those efforts. In regard to asg the source name to entries, it may still be possible, because I'm piping each list into the aggregate utility individually, and I usually don't get a whole lot of overlapping ranges. It would certainly necessitate a bit of retooling and breaking some pipes (I'd also have to rethink how entries are sorted), so I'll only start attempting to implement that when I get a big wave of energy / drink too much caffeine.

I left my initial comment mainly to let you know that the list is no longer outdated / reliant on outdated sources, so can be safely included as an option, and in regard to shared entries between the two lists, I could do a diff and quickly run over it a little later then get back to you.

John T. Haller's picture

Please 9r5f

Don't push it for the individual lines crediting. I think it'd only serve a handful of people for troubleshooting purposes.

For my own purposes, I'm more interested in whether there are uniques in both sufficient to include both in an updated version.

Sometimes, the impossible can become possible, if you're awesome!

Unique Entries 4s1453

As of the most recent update, according to the comm utility, my list has 4915 unique entries -- a good chunk of which are ranges -- when compared to the list on codebucket. I should note that mine is significantly smaller than the other list (by roughly 75%).

Source Refresh 4q2m2o

I just did a source refresh (I did not notice how long the normshield lists had not been updated for until moments ago). The current list of sources is here: https://gist.github.com/bongochong/46a6b7ac6450d8df4b447432ee4159ad

After this update, the unique entry count for my list relative to the one on codebucket, now stands at 5,047. Have a good night!