How to : Adding stability to CC&am

There is 1 reply in this Thread which was already clicked 3,310 times. The last Post () by multipack.

  • If you have unwanted users on your cccam server. Some users can cause cccam to crash.


    If you have /tmp/warnings.txt file you can see users that are trying to log in to your server without your permission.


    There are two solutions:


    1. Block IP directly in your router. If you have router where you can use Tomato firmware, find this section ?> Administration/Scripts/Firewall. Then add this line:
    iptables -I FORWARD -d IP of user that is attacking you -j DROP


    This only works if user has static IP. If user doesnt have static IP there is another solution. BUT you need to be using Linux PC as cccam server. The Solution is called Fail2Ban!


    If you have Fedora linux install Fail2Ban with this command: yum install fail2ban
    If you have Ubuntu/Debian use: apt-get install fail2ban


    Next command is (use telnet):
    nano /etc/fail2ban/jail.conf


    You need to look for this lines:


    # ?ignoreip? can be an IP address, a CIDR mask or a DNS host
    ignoreip = 127.0.0.1 192.168.1.72 ?> here you need to put addresses that will be ignored by fail2ban!
    maxretry = 3


    [cccam-12000]


    enabled = true
    port = 12000 ?> port of your cccam server. I have 12333 for example.
    filter = cccam
    action = iptables[name=CCcam0, port=12000, protocol=tcp] ?> here you only need to change port to 12333 for example.
    logpath = /tmp/warnings.txt
    maxretry = 10
    bantime = 6000 ?-> this is in seconds. User will be banned 6000 seconds.


    Next command (use telnet):
    nano /etc/fail2ban/filter.d/cccam.conf


    Add this into cccam.conf file:


    # Fail2Ban configuration file
    #
    # Author: Cyril Jaquier
    #
    # $Revision: 510 $
    #


    [Definition]


    # Option: failregex
    # Notes.: regex to match the password failures messages in the logfile. The
    # host must be matched by a group named ?host?. The tag ?? can
    # be used for standard IP/hostname matching and is only an alias for
    # (?:::f{4,6}:)?(?P\S+)
    # Values: TEXT
    #
    failregex = Connection from IP: Login Failed!


    # Option: ignoreregex
    # Notes.: regex to ignore. If this regex matches, the line is ignored.
    # Values: TEXT
    #
    ignoreregex =


    Next command is:
    /etc/init.d/fail2ban restart


    Last command is:
    chkconfig ?levels 235 fail2ban on


    With this command fail2ban will start automatically.


    Now all cccam crash problems should be gone by them dodgy users trying to log into your server


    Thanks to a friend for this


    t

    Dont forget to hit the thanks button!!!!!!!!!!!!!



    :41_002:



    Some articles may discuss topics that are illegal, so this information is provided for educational purposes only, your use of the content, downloads and files, or any part thereof, is made solely at your own risk and responsibility. Viewing Pay TV without a valid subscription is illegal. !! Linuxsat-Support.com cannot be held responsible for the content of any information stored or posted on this forum.

  • Thanks for this
    I use the iptables that were installed with the auto script on a Debian server, on the most part this works well but can block out good peers at times too. How can i disable iptables to try failtoban and if i dont like it enable them back without much hassle?
    Cheers

    110cm Triax Dish multi arm 13,16,19, 23, 28 east fixed 90cm thor

Participate now!

Don’t have an account yet? Register yourself now and be a part of our community!