Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Neighbor filter - black list #47

Closed
ae6xe opened this issue Oct 3, 2018 · 9 comments
Closed

Neighbor filter - black list #47

ae6xe opened this issue Oct 3, 2018 · 9 comments

Comments

@ae6xe
Copy link
Contributor

ae6xe commented Oct 3, 2018

  1. prevent weak signal neighbors from constant up/down link associations
  2. prevent part 97 violations
@n2mh
Copy link

n2mh commented Oct 13, 2018

You might expand this to let the sysop create a Black or White List. The Black List would keep certain nodes out while the White List would only allow certain nodes in. I would also think that a White List would also be the same list needed for Issue 212 - Enabling only certain nodes for an event.

Enabling this feature could be dicey on a remote node. I would suggest a No List condition as the default option until specifically configured by the sysop. A confirmation question 'Are You Sure` would be in order before the configuration is applied.

The White List option harkens back to the NetRom days on packet when band openings would create short lived paths that were unusable for networking. They would disappear long before the routing algorithm knew they were gone.

@ae6xe
Copy link
Contributor Author

ae6xe commented Oct 13, 2018

Does this enhancement cover the white list functionality you are thinking of?:
https://github.com/aredn/aredn_ar71xx/issues/212

@n2mh
Copy link

n2mh commented Oct 13, 2018

I think Issue 212 is just another name for a White List. So, the answer is yes. How you want to call it would be different. I think White List/Black List would be more intuitive than Black List/Event Mode. Just my $0.02.

@K6AH K6AH closed this as completed Jan 31, 2019
@K6AH K6AH reopened this Jan 31, 2019
@K6AH
Copy link

K6AH commented Jan 31, 2019

Sorry about that...

Anyway K2EN says the black list is a standard feature in OpenWRT so its roots must be buried somewhere in AREDN.

@ae6xe
Copy link
Contributor Author

ae6xe commented Jan 31, 2019

OpenWRT has a generic iptable rule builder to create a wide range of custom firewall rules. In AREDN the rules can be added manually to the custom firewall rule table today. However, in the spirit of AREDN, we'd probably have UI sections for specific use cases, e.g. a UI place to enter a list of MAC addresses to block, so that we can ensure the mesh node continues to operate properly and not break something else.

@n2mh
Copy link

n2mh commented Feb 7, 2019

I think the best place to do this is via OLSR, not iptables. Done via olsr, the node(s) in question will never make it to the routing table. Thus, they don't have to filtered out downstream. Besides (I may be wrong here), once a node is in the OLSR table, it will still get propagated to other nodes. And, they will have to be filtered by iptables.

Some OLSR configuration statements to try:

Blacklist (per interface)
LinkQualityMult 10.1.2.3 .1
where 10.1.2.3 is the ip address to be blacklisted
.1 is a multiplication value applied to the actual LQ coming in. Thus, an incoming LQ of 80% would be dropped down to 8% and used in subsequent OLSR calculations. If you set the multiplicatoion factor to 0, you have now fully blocked that ip address.

Whitelist (per interface)
LinkQualityMult Default 0
Here you set anything coming in to 0, no quality. Then you use LinkQualityMult to enable those ip addresses you wish to accept.

Just a thought in the "more than one way to skin a cat" category.

@K6AH
Copy link

K6AH commented Feb 7, 2019 via email

@dman776
Copy link
Contributor

dman776 commented Feb 7, 2019 via email

@ae6xe
Copy link
Contributor Author

ae6xe commented Feb 7, 2019

move conversation related to white list rules to here: https://github.com/aredn/aredn_ar71xx/issues/212

@ae6xe ae6xe transferred this issue from aredn/aredn_ar71xx Dec 16, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants