Tested on mvebu espressobin board ultra and espressobin board v7 eMMC, in OpenWrt 21.02-RC3 et OpenWrt 19.07.7…
… ENJOY !
Note : feedback welcome !
Tested on mvebu espressobin board ultra and espressobin board v7 eMMC, in OpenWrt 21.02-RC3 et OpenWrt 19.07.7…
… ENJOY !
Note : feedback welcome !
packages available now for testing also for mipsel_24kc ( like Device: Xiaomi R3P (mt7621)… )
→ crowdsec-openwrt/package/custom at master · erdoukki/crowdsec-openwrt · GitHub
PR to OpenWrt Package still in progress…
May need some more work on upgrade mode !
and
I get some tweaks from the Debian packages, but it may still be enhanced…
Fill free to give feedback !
root@ULTRA-5G:~# cscli version
2021/08/25 13:46:04 version: v1.1.1-v1.1.1
2021/08/25 13:46:04 Codename: alphaga
2021/08/25 13:46:04 BuildDate: 2021-08-25_13:09:10
2021/08/25 13:46:04 GoVersion: 1.16.2
2021/08/25 13:46:04 Constraint_parser: >= 1.0, <= 2.0
2021/08/25 13:46:04 Constraint_scenario: >= 1.0, < 3.0
2021/08/25 13:46:04 Constraint_api: v1
2021/08/25 13:46:04 Constraint_acquis: >= 1.0, < 2.0
root@ULTRA-5G:~# cscli metrics
INFO[25-08-2021 01:45:37 PM] Local Api Metrics:
+----------------------+--------+------+
| ROUTE | METHOD | HITS |
+----------------------+--------+------+
| /v1/decisions/stream | GET | 34 |
| /v1/watchers/login | POST | 2 |
+----------------------+--------+------+
INFO[25-08-2021 01:45:37 PM] Local Api Bouncers Metrics:
+------------------------------+----------------------+--------+------+
| BOUNCER | ROUTE | METHOD | HITS |
+------------------------------+----------------------+--------+------+
| cs-firewall-bouncer-EJfPpO7s | /v1/decisions/stream | GET | 34 |
+------------------------------+----------------------+--------+------+
root@ULTRA-5G:~# cs-firewall-bouncer -V
version: v0.0.13-v0.0.13
BuildDate: 2021-08-25_13:37:07
GoVersion: 1.16.2
root@ULTRA-5G:~# uname -ar
Linux ULTRA-5G 5.4.137 #0 SMP Sat Jul 31 17:21:01 2021 aarch64 GNU/Linux
root@ULTRA-5G:~# cat /etc/openwrt_release
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='21.02.0-rc4'
DISTRIB_REVISION='r16256-2d5ee43dc6'
DISTRIB_TARGET='mvebu/cortexa53'
DISTRIB_ARCH='aarch64_cortex-a53'
DISTRIB_DESCRIPTION='OpenWrt 21.02.0-rc4 r16256-2d5ee43dc6'
DISTRIB_TAINTS=''
I get some questions on the OpenWrt package reviews, that I am not sure to answer correctly :
Actually I want to ask, is there a reason why the user would want crowdsec-firewall-bouncer to use iptables if they have both iptables and nftables installed? If there is no functional difference then there is no need to make it user-selectable.
Is it necessary to let the user choose between iptables/nftables, when the two are installed ?
Or is it better to get something like the wizard.sh script, and detect with a preference to nftables ?
Are all of these *.yaml files (perhaps all files in
/etc/crowdsec
) configuration files?
Is it necessary to save all the files between package upgrade ?
Or, like I am suggesting;
the essentials only are
/etc/crowdsec/config.yaml
and/etc/crowdsec/local_api_credentials.yaml
others may be modified, as far as I now.
More can be seen in the PR, but it is mainly the ones where I need advanced users feedback !
I will get more fix to the PR, depends of your feedback…
I still have to better manage API keys and cscli register between upgrade or reinstall !
I do not use cscli backup/restore and had preferred an external OpenWrt specific config file.
Anyway, all feedback is welcome.
Thanks in advance.
Hello @Gandalf
imho it sounds rather dangerous to attempt to do this, I’m afraid that we might end up breaking stuff
The plan here is to not trash any “custom” parsers and scenarios created and/or patched by the users.
Thank you very much for your work. For the latest point, hopefully we are going to improve this in the not-so-distant future to clearly split “user” configs and the ones from the hub.
Regards,
I do not understand, the wizard.sh do the detection…
Choice #1. What I mean is to do it at firewall-bouncer service restart.
Choice #2. Do a default mode detect at install (same as upper) and then use a user config mode setting.
This second choice will get more user error possibility (IMHO)
Will it be here for next release ?
If so, I can wait for it for packaging to OpenWrt ?
Regards,
Crowdsec: Initial package v1.1.1 by erdoukki · Pull Request #16244 · openwrt/packages · GitHub package approved… soon to me merged !?
Updating the OpenWrt Package to Crowdsec v1.2.0 and Crowdsec-Firewall-Bouncer v0.15.0…
This is a long time process…
Some good news about it;
The PR is now in two parts, the main Crowdsec component crowdsec: initial package v1.2.0 by erdoukki · Pull Request #16244 · openwrt/packages · GitHub and the Firewall Bouncer crowdsec-firewall-bouncer: initial package v0.0.15 by erdoukki · Pull Request #16844 · openwrt/packages · GitHub …
They both have been reviewed, both approved twice, and may be merged in few days in snapshot !
Merged today !
Will try to make it available also in 21.02.x
great work on this Gandalf, many years ago I dream’t of simple, open, and seamless distributed security for SOHO… having a build a few people use, and having this package in the OpenWrt repo’s takes this one step closer…
I’m new to crowdsec, but I will definitely be having a crack at it over the next month or two…
cheers
It’s the dream that shapes the world
(Aboriginal concept)
The PR was merged this morning and packages will be available in few days for 21.02 !
Actually discussed here at OpenWrt Forum : Crowdsec: initial packages v1.2.0 for OpenWrt - For Developers - OpenWrt Forum
Welcome to the new users from the OpenWrt community…
More to come, soon !
OpenWrt packages updated to version 1.2.1 of crowdsec.
Same, pushed also in 21.02