| Andrew Cooke | Contents | Latest | RSS | Twitter | Previous | Next

C[omp]ute

Welcome to my blog, which was once a mailing list of the same name and is still generated by mail. Please reply via the "comment" links.

Always interested in offers/projects/new ideas. Eclectic experience in fields like: numerical computing; Python web; Java enterprise; functional languages; GPGPU; SQL databases; etc. Based in Santiago, Chile; telecommute worldwide. CV; email.

Personal Projects

Lepl parser for Python.

Colorless Green.

Photography around Santiago.

SVG experiment.

Professional Portfolio

Calibration of seismometers.

Data access via web services.

Cache rewrite.

Extending OpenSSH.

C-ORM: docs, API.

Last 100 entries

Your diamond is a beaten up mess; Maths Books; Good Bike Route from Providencia / Las Condes to Panul\; Iain Pears (Author of Complex Plots); Plum Jam; Excellent; More Recently; For a moment I forgot StackOverflow sucked; A Few Weeks On...; Chilean Book Recommendations; How To Write Shared Libraries; Jenny Erpenbeck (Author); Dijkstra, Coins, Tables; Python libraries error on OpenSuse; Deserving Trump; And Smugness; McCloskey Economics Trilogy; cmocka - Mocks for C; Concept Creep (Americans); Futhark - OpenCL Language; Moved / Gone; Fan and USB issues; Burgers in Santiago; The Origin of Icosahedral Symmetry in Viruses; autoenum on PyPI; Jars Explains; Tomato Chutney v3; REST; US Elections and Gender: 24 Point Swing; PPPoE on OpenSuse Leap 42.1; SuperMicro X10SDV-TLN4F/F with Opensuse Leap 42.1; Big Data AI Could Be Very Bad Indeed....; Cornering; Postcapitalism (Paul Mason); Black Science Fiction; Git is not a CDN; Mining of Massive Data Sets; Rachel Kaadzi Ghansah; How great republics meet their end; Raspberry, Strawberry and Banana Jam; Interesting Dead Areas of Math; Later Taste; For Sale; Death By Bean; It's Good!; Tomato Chutney v2; Time ATAC MX 2 Pedals - First Impressions; Online Chilean Crafts; Intellectual Variety; Taste + Texture; Time Invariance and Gauge Symmetry; Jodorowsky; Tomato Chutney; Analysis of Support for Trump; Indian SF; TP-Link TL-WR841N DNS TCP Bug; TP-Link TL-WR841N as Wireless Bridge; Sending Email On Time; Maybe run a command; Sterile Neutrinos; Strawberry and Banana Jam; The Best Of All Possible Worlds; Kenzaburo Oe: The Changeling; Peach Jam; Taste Test; Strawberry and Raspberry Jam; flac to mp3 on OpenSuse 42.1; Also, Sebald; Kenzaburo Oe Interview; Otake (Kitani Minoru) move Black 121; Is free speech in British universities under threat?; I am actually good at computers; Was This Mansplaining?; WebFaction / LetsEncrypt / General Disappointment; Sensible Philosophy of Science; George Ellis; Misplaced Intuition and Online Communities; More Reading About Japan; Visibilty / Public Comments / Domestic Violence; Ferias de Santiago; More (Clearly Deliberate); Deleted Obit Post; And then a 50 yo male posts this...; We Have Both Kinds Of Contributors; Free Springer Books; Books on Religion; Books on Linguistics; Palestinan Electronica; Books In Anthropology; Taylor Expansions of Spacetime; Info on Juniper; Efficient Stream Processing; The Moral Character of Crypto; Hearing Aid Info; Small Success With Go!; Re: Quick message - This link is broken; Adding Reverb To The Echo Chamber; Sox Audio Tools; Would This Have Been OK?; Honesty only important economically before institutions develop; Stegangraphy via PS4

© 2006-2015 Andrew Cooke (site) / post authors (content).

Blocking MAC addresses with OpenSuse Firewall

From: andrew cooke <andrew@...>

Date: Tue, 27 Apr 2010 20:00:31 -0400

OpenSuse contains a nice wrapper for iptables, accessed via Yast.
Unfortunately, it doesn't have an option for blocking specific MAC addresses
and sometimes this is useful (a MAC address can be changed, but most people
won't know how, so this is useful for blocking specific leeches while leaving
a wifi open to infrequent casual use, for example).

Although blocking MAC addresses isn't supported directly by the Yast wrapper,
you do have the ability to call an additional "custom script", and the
iptables command can be added there.

First, you must enable the custom wrapper.  The simplest way is to edit
/etc/sysconfig/SuSEfirewall2 and uncomment the line

FW_CUSTOMRULES="/etc/sysconfig/scripts/SuSEfirewall2-custom"

(alternatively you can do this via Yast in the system settings, but I find
that a bit fiddly to use).

Once that is enabled, edit that file and modify the second function as
follows:

fw_custom_after_antispoofing() {

  for target in LOG DROP; do
    for chain in input_ext input_dmz input_int forward_int forward_ext forward_dmz; do
      iptables -A $chain -m mac --mac-source 00:16:cf:2c:d4:ee -j $target
    done
  done

  true
}

(changing the MAC address as appropriate).  You can get the MAC address by
running wireshark (aka ethereal) or if it's Wifi, kismet.

Once those changes are made, restart the firewall (easiest way is from inside
Yast - there's a "save settings and restart" button).

Andrew

A Verion That Redirects To Local HTTP Server

From: andrew cooke <andrew@...>

Date: Thu, 16 Apr 2015 20:47:26 -0300

for mac in "70:f1:a1:e3:xx:xx" "00:22:5f:a7:xx:xx" "2c:81:58:f3:xx:xx" \
             "cc:52:af:98:xx:xx" "8c:3a:e3:42:xx:xx" "c4:6e:1f:14:xx:xx"; do
    iptables -t nat -A PREROUTING -p tcp -m mac --mac-source $mac \
             --dport 80 -j DNAT --to 10.1.0.9:80
    for chain in input_ext input_int forward_ext forward_int; do
      iptables -A $chain -m mac --mac-source $mac -j LOG
      iptables -A $chain -p tcp --dport 80 -m mac --mac-source $mac -j ACCEPT
      iptables -A $chain -p tcp -m mac --mac-source $mac -j DROP
      iptables -A $chain -p udp --dport 53 -m mac --mac-source $mac -j ACCEPT
      iptables -A $chain -p udp -m mac --mac-source $mac -j DROP
    done
  done

Where there's a page on 10.1.0.9:80 explaining that you've been blocked from
the network.

Andrew

Comment on this post