diff options
author | Dirk Brenken <dev@brenken.org> | 2019-01-05 16:28:44 +0100 |
---|---|---|
committer | Dirk Brenken <dev@brenken.org> | 2019-01-05 16:28:44 +0100 |
commit | 72df8e4c66d5ac6cb3777d93d10763b30edb1d60 (patch) | |
tree | 8eb88a2006d4ff7b734190acbba8ba2b62aec5a1 /net/banip/files/README.md | |
parent | f56d4878979bd0e03d2c77915cffd77943e37791 (diff) |
banIP: release 0.1.0
* add automatic blocklist backup & restore, they will be used
in case of download errors or during startup in backup mode
* add a 'backup mode' to re-use blocklist backups during startup,
get fresh lists via reload or restart action
* procd interface trigger now supports multiple WAN interfaces
* change URL for abuse.ch/feodo list source in default config
* small fixes
* update readme
Signed-off-by: Dirk Brenken <dev@brenken.org>
Diffstat (limited to 'net/banip/files/README.md')
-rw-r--r-- | net/banip/files/README.md | 30 |
1 files changed, 25 insertions, 5 deletions
diff --git a/net/banip/files/README.md b/net/banip/files/README.md index 982a713c7..1df1f7cdc 100644 --- a/net/banip/files/README.md +++ b/net/banip/files/README.md @@ -23,6 +23,8 @@ IP address blocking is commonly used to protect against brute force attacks, pre * minimal status & error logging to syslog, enable debug logging to receive more output * procd based init system support (start/stop/restart/reload/status) * procd network interface trigger support +* automatic blocklist backup & restore, they will be used in case of download errors or during startup in backup mode +* 'backup mode' to re-use blocklist backups during startup, get fresh lists via reload or restart action * output comprehensive runtime information via LuCI or via 'status' init command * strong LuCI support * optional: add new banIP sources on your own @@ -43,6 +45,24 @@ IP address blocking is commonly used to protect against brute force attacks, pre * install 'luci-app-banip' (_opkg install luci-app-banip_) * the application is located in LuCI under 'Services' menu +## banIP config options +* usually the pre-configured banIP setup works quite well and no manual overrides are needed +* the following options apply to the 'global' config section: + * ban\_enabled => main switch to enable/disable banIP service (bool/default: '0', disabled) + * ban\_automatic => determine the L2/L3 WAN network device automatically (bool/default: '1', enabled) + * ban\_fetchutil => name of the used download utility: 'uclient-fetch', 'wget', 'curl', 'aria2c', 'wget-nossl'. 'busybox' (default: 'uclient-fetch') + * ban\_iface => space separated list of WAN network interface(s)/device(s) used by banIP (default: automatically set by banIP ('ban_automatic')) + +* the following options apply to the 'extra' config section: + * ban\_debug => enable/disable banIP debug output (default: '0', disabled) + * ban\_nice => set the nice level of the banIP process and all sub-processes (int/default: '0', standard priority) + * ban\_triggerdelay => additional trigger delay in seconds before banIP processing begins (int/default: '2') + * ban\_backup => create compressed blocklist backups, they will be used in case of download errors or during startup in 'backup mode' (bool/default: '0', disabled) + * ban\_backupdir => target directory for adblock backups (default: not set) + * ban\_backupboot => do not automatically update blocklists during startup, use their backups instead (bool/default: '0', disabled) + * ban\_maxqueue => size of the download queue to handle downloads & IPSet processing in parallel (int/default: '8') + * ban\_fetchparm => special config options for the download utility (default: not set) + ## Examples **receive banIP runtime information:** @@ -50,11 +70,11 @@ IP address blocking is commonly used to protect against brute force attacks, pre /etc/init.d/banip status ::: banIP runtime information + status : enabled - + version : 0.0.5 + + version : 0.1.0 + fetch_info : /bin/uclient-fetch (libustream-ssl) - + ipset_info : 3 IPSets with overall 29510 IPs/Prefixes - + last_run : 08.11.2018 15:03:50 - + system : GL-AR750S, OpenWrt SNAPSHOT r8419-860de2e1aa + + ipset_info : 1 IPSets with overall 516 IPs/Prefixes (backup mode) + + last_run : 05.01.2019 14:48:18 + + system : TP-LINK RE450, OpenWrt SNAPSHOT r8910+72-25d8aa7d02 </code></pre> **cronjob for a regular block list update (/etc/crontabs/root):** @@ -65,7 +85,7 @@ IP address blocking is commonly used to protect against brute force attacks, pre ## Support -Please join the banIP discussion in this [forum thread](https://forum.openwrt.org/t/banip-new-project-needs-testers-feedback/16985) or contact me by mail <dev@brenken.org> +Please join the banIP discussion in this [forum thread](https://forum.openwrt.org/t/banip-support-thread/16985) or contact me by mail <dev@brenken.org> ## Removal * stop all banIP related services with _/etc/init.d/banip stop_ |