-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhance rules created by the bouncer to respect conntrack #380
Comments
@ne20002: Thanks for opening an issue, it is currently awaiting triage. In the meantime, you can:
DetailsI am a bot created to help the crowdsecurity developers manage community feedback and contributions. You can check out my manifest file to understand my behavior and what I can do. If you want to use this for your project, you can check out the BirthdayResearch/oss-governance-bot repository. |
@ne20002: There are no 'kind' label on this issue. You need a 'kind' label to start the triage process.
DetailsI am a bot created to help the crowdsecurity developers manage community feedback and contributions. You can check out my manifest file to understand my behavior and what I can do. If you want to use this for your project, you can check out the BirthdayResearch/oss-governance-bot repository. |
I'm now using the new bouncer 0.0.30 in non set-only mode, the created chains and rules can be easily enhanced with the changes proposed above. I believe the missing crowdsec-blacklists-crowdsec in Ipv6 is due to not have had at least a single match on any of the rules so the set is not created? |
I have updated the OpenWrt crowdsec-firewall-bouncer package to make use of the new Crowdsec firewall bouncer. |
/kind enhancement
What would you like to be added?
First of all: I like the ability to collect metrics of the bouncer.
For OpenWrt the rules as created by the bouncer in version 0.0.30 are not ideal. Most OpenWrt devices have limited power and based on the use case, that OpwnWrt (in this case) is a routing device, additional definitions for the created rules are neccessary.
Until version 0.0.30 the OpenWrt bouncer package created the rules by itself running the bouncer in set-only mode. With the new approach this is still working (thank you) but lacks the features for the metrics.
I will only use ipv4 here but it's the same for ipv6. Now look at this:
This set of rules is suboptimal, because:
conntrack
. There is a fastpath for all accepted,related packets. But this fastpath only applies to the fw4 table. In the Crowdsec table's chain any packet (not dropped earlier in fw4) if checked again. Adding the accepted/related fastpath to the chains is a must.Even though the set lookup is fast, bypassing it if it is not neccessary is even faster.
As an example I suggest to change the rule creation for
to this:
whereas:
{ wan, wg1 }
) there should be a configuration option and in case it is not set this line should be omitted.Why is this needed?
Needed for proper function of OpenWrt devices.
The text was updated successfully, but these errors were encountered: