From 3803d3c5248d4cb8ef5b6541a25dbb3c4272c6a5 Mon Sep 17 00:00:00 2001
From: virus2500 <virus2500@me.com>
Date: Sun, 4 May 2014 02:06:21 +0200
Subject: [PATCH] Update README.md

Added Version 1.1.1 information
---
 README.md | 46 ++++++++++++++++++++++++++--------------------
 1 file changed, 26 insertions(+), 20 deletions(-)

diff --git a/README.md b/README.md
index 4a46579..c86a114 100644
--- a/README.md
+++ b/README.md
@@ -4,14 +4,12 @@ Use at your own risk :)
 
 Written and tested on Debian Wheezy!
 
-Create an ipset based blocklist from an url to an blocklist text file e.g. blocklist.de.
-
-As of Version 1.0.3 you can use multiple Sources at once!
+Create an ipset/iptables based blocklist from an url to an blocklist text file e.g. blocklist.de.
 
 Changes
 --------
-- V1.1.1: short Help (-h) and Cleanup (-c) available. Binary should now be found automatically 
-- V1.1.0: blocklist-with-ipset is now IPV6 compatible (Yayyy :) ) 
+- V1.1.1: short Help (-h) and Cleanup (-c) available. Binary should now be found automatically.
+- V1.1.0: blocklist-with-ipset is now IPV6 compatible (Yayyy :) )
 - V1.0.4: Path to white and blacklist is now set automatically
 - V1.0.3: Now you can set multiple blocklist sources
 - V1.0.2: Added a whitelist and blacklist
@@ -19,13 +17,17 @@ Changes
 <br>
 **!!! IMPORTANT !!!!**
 
-When upgrading from a version lower than 1.1.0 you might have to manually drop duplicated INPUT Rules. 
+When upgrading from a version lower than 1.1.0 you might have to manually drop duplicated INPUT Rules.
+
+The script uses various binarys like iptables, ipset. If the script complains that it can't find an specific binary make sure it is in the ENV Path of the script. If not add the path to the binary.
 
-Also you will have to specify where your binarys are located. This settings can be made in blocklist.pl .
+	$ENV{'PATH'}= '/bin:/usr/bin:/usr/local/bin:/sbin:/usr/sbin:/usr/local/sbin';
 
 (You can find out where your binarys are with "which" e.g. "which iptables")
+<br>
 
 ## INSTALL ##
+<br>
 
 1. Make sure you have ipset and the Data::Validate::IP Perl Module installed! If not you can usually install it with your distribution software management tool. E.g. apt for Debian/Ubuntu/Mint.
 
@@ -35,40 +37,44 @@ Also you will have to specify where your binarys are located. This settings can
 
 3. Open blocklist.pl with your favorite text editor and set up your blocklist urls. Two are included as default. You can enhance or edit as you like. The destination URL should be an direct link to an Text file though.
 
-    	my @listUrl = ("http://lists.blocklist.de/lists/all.txt", "http://www.infiltrated.net/blacklisted");
+        my @listUrl = ("http://lists.blocklist.de/lists/all.txt", "http://www.infiltrated.net/blacklisted");
 
-	*You can for example add an list like this*
+        *You can for example add an list like this*
 
-		my @listUrl = ("http://lists.blocklist.de/lists/all.txt", "http://www.infiltrated.net/blacklisted", "http://www.superblocksite.org/anotherBlocklist.txt");
+        my @listUrl = ("http://lists.blocklist.de/lists/all.txt", "http://www.infiltrated.net/blacklisted", "http://www.superblocksite.org/anotherBlocklist.txt");
 
 4. Create an cronjob. I have mine in /etc/crontab
 
-		0 */1   * * *   root    /usr/bin/perl /path/to/the/script/blocklist.pl > /dev/null
+        0 */1   * * *   root    /usr/bin/perl /path/to/the/script/blocklist.pl > /dev/null
 
 5. Create an logrotate for the logfile. E.g. under /etc/logrotate.d/blocklist
 
 		/var/log/blocklist
 		{
-		    rotate 4
-		    daily
-		    missingok
-		    notifempty
-		    delaycompress
-		    compress
+			rotate 4
+        	daily
+			missingok
+			notifempty
+			delaycompress
+			compress
 		}
 
 6. If you have an ip you definitly want to block just put it in blacklist.txt. If you have an IP you definitly never want to have blocked put it in whitelist.txt. This two files are just text lists seperated by new lines. So for example
 
 		#blacklist.txt
 		2.2.2.2
-		3.3.3.3 
+		3.3.3.3
 
 		#and in whitelist.txt
 		4.4.4.4
-		5.5.5.5
+	 	5.5.5.5
 
 That's it. If you want to manually run the script just cd to the folder where the script is located and run ./blocklist.pl
 
 ## CLEANUP ##
+<br>
+If you want to remove the iptables rules and ipset lists just run
+
+
+	./blocklist.pl -c
 
-If you want to remove the iptables rules
-- 
GitLab