1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-19 23:28:39 +02:00
openwrt-packages/net/banip/files
Dirk Brenken f3ece9653d
banip: update 0.1.1
* remove needless sort step to reduce system load
* change maxqueue default in backend and LuCI frontend
  to '4' to reduce (default) system load
* cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2019-05-16 11:16:03 +02:00
..
banip.blacklist banip: new package to block incoming & outgoing ip addresses 2018-11-10 11:01:45 +01:00
banip.conf banip: update 0.1.1 2019-05-16 11:16:03 +02:00
banip.hotplug banip: update 0.0.6 2018-11-17 16:30:52 +01:00
banip.init banIP: release 0.1.0 2019-01-05 16:28:44 +01:00
banip.sh banip: update 0.1.1 2019-05-16 11:16:03 +02:00
banip.whitelist banip: new package to block incoming & outgoing ip addresses 2018-11-10 11:01:45 +01:00
README.md banIP: release 0.1.0 2019-01-05 16:28:44 +01:00

banIP - ban incoming and/or outgoing ip adresses via ipsets

Description

IP address blocking is commonly used to protect against brute force attacks, prevent disruptive or unautherized address(es) from access or it can be used to restrict access to or from a particular geographic area — for example.

Main Features

  • support many IP blocklist sources (free for private usage, for commercial use please check their individual licenses):
  • zero-conf like automatic installation & setup, usually no manual changes needed
  • supports six different download utilities: uclient-fetch, wget, curl, aria2c, wget-nossl, busybox-wget
  • Really fast downloads & list processing as they are handled in parallel as background jobs in a configurable 'Download Queue'
  • provides 'http only' mode without installed ssl library for all non-SSL blocklist sources
  • full IPv4 and IPv6 support
  • ipsets (one per source) are used to ban a large number of IP addresses
  • supports blocking by ASN numbers
  • supports blocking by iso country codes
  • supports local white & blacklist (IPv4, IPv6 & CIDR notation), located by default in /etc/banip/banip.whitelist and /etc/banip/banip.blacklist
  • auto-add unsuccessful ssh login attempts to local blacklist
  • auto-add the uplink subnet to local whitelist
  • per source configuration of SRC (incoming) and DST (outgoing)
  • integrated IPSet-Lookup
  • integrated RIPE-Lookup
  • blocklist source parsing by fast & flexible regex rulesets
  • minimal status & error logging to syslog, enable debug logging to receive more output
  • procd based init system support (start/stop/restart/reload/status)
  • procd network interface trigger support
  • automatic blocklist backup & restore, they will be used in case of download errors or during startup in backup mode
  • 'backup mode' to re-use blocklist backups during startup, get fresh lists via reload or restart action
  • output comprehensive runtime information via LuCI or via 'status' init command
  • strong LuCI support
  • optional: add new banIP sources on your own

Prerequisites

  • OpenWrt, tested with the stable release series (18.06) and with the latest snapshot
  • a download utility:
    • to support all blocklist sources a full version (with ssl support) of 'wget', 'uclient-fetch' with one of the 'libustream-*' ssl libraries, 'aria2c' or 'curl' is required
    • for limited devices with real memory constraints, banIP provides also a 'http only' option and supports wget-nossl and uclient-fetch (without libustream-ssl) as well

Installation & Usage

  • install 'banip' (opkg install banip)
  • at minimum configure the needed IP blocklist sources, the download utility and enable the banIP service in /etc/config/banip
  • control the banip service manually with /etc/init.d/banip start/stop/restart/reload/status or use the LuCI frontend

LuCI banIP companion package

  • it's recommended to use the provided LuCI frontend to control all aspects of banIP
  • install 'luci-app-banip' (opkg install luci-app-banip)
  • the application is located in LuCI under 'Services' menu

banIP config options

  • usually the pre-configured banIP setup works quite well and no manual overrides are needed

  • the following options apply to the 'global' config section:

    • ban_enabled => main switch to enable/disable banIP service (bool/default: '0', disabled)
    • ban_automatic => determine the L2/L3 WAN network device automatically (bool/default: '1', enabled)
    • ban_fetchutil => name of the used download utility: 'uclient-fetch', 'wget', 'curl', 'aria2c', 'wget-nossl'. 'busybox' (default: 'uclient-fetch')
    • ban_iface => space separated list of WAN network interface(s)/device(s) used by banIP (default: automatically set by banIP ('ban_automatic'))
  • the following options apply to the 'extra' config section:

    • ban_debug => enable/disable banIP debug output (default: '0', disabled)
    • ban_nice => set the nice level of the banIP process and all sub-processes (int/default: '0', standard priority)
    • ban_triggerdelay => additional trigger delay in seconds before banIP processing begins (int/default: '2')
    • ban_backup => create compressed blocklist backups, they will be used in case of download errors or during startup in 'backup mode' (bool/default: '0', disabled)
    • ban_backupdir => target directory for adblock backups (default: not set)
    • ban_backupboot => do not automatically update blocklists during startup, use their backups instead (bool/default: '0', disabled)
    • ban_maxqueue => size of the download queue to handle downloads & IPSet processing in parallel (int/default: '8')
    • ban_fetchparm => special config options for the download utility (default: not set)

Examples

receive banIP runtime information:


/etc/init.d/banip status
::: banIP runtime information
  + status     : enabled
  + version    : 0.1.0
  + fetch_info : /bin/uclient-fetch (libustream-ssl)
  + ipset_info : 1 IPSets with overall 516 IPs/Prefixes (backup mode)
  + last_run   : 05.01.2019 14:48:18
  + system     : TP-LINK RE450, OpenWrt SNAPSHOT r8910+72-25d8aa7d02

cronjob for a regular block list update (/etc/crontabs/root):


0 06 * * *    /etc/init.d/banip reload

Support

Please join the banIP discussion in this forum thread or contact me by mail dev@brenken.org

Removal

  • stop all banIP related services with /etc/init.d/banip stop
  • optional: remove the banip package (opkg remove banip)

Have fun!
Dirk