-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crowdsec: initial package v1.2.0 #16244
Conversation
Builds tests on Ubuntu, without any errors...
|
Tests are failing because of |
744e261
to
78eebe7
Compare
Some issue because of the missing ld-gold :
but it looks like not to work ! Edit: It is a requirement for ARM builds !
Reference : |
another issue with jq host depends ?
How can I fix this ? |
ping @jefferyto |
08d80ff
to
5e7ed8a
Compare
Precompiled packages for mvebu espressobin boards are available here for testing |
@jefferyto Okay for you ? |
@aparcar |
@PolynomialDivision |
I hope this PR can be merged soon, there is not a lot of solution as this to fight efficiently against Ransomware and Mass DDOS Cyber Attack ! I do not see any better place than a Routeur to take action and ban aggressive IP. Sorry at all OpenWrt members if I still ask for your time, but I still will as recommended in the Guidelines ( https://openwrt.org/submitting-patches#don_t_get_discouraged_re-submit )...
Do I need to add a mention as "Reviewed-by:" ? Do you want that I add a “Cc:” mention ? @aparcar @ja-pa @BKPepe @neheb Thanks for your comments, is the modifications done okay for you now ? Be patient, OpenWrt users will soon enter into this great project in the Open Source Participative Security IPS... |
PING |
What can I do to help this package to be merged ? Sorry to ask again, and again, and again... |
I can have a look, but aren't enough people already reviewing it? |
You add in 1 commit 2 packages. To my knowledge, our GitHub workflows won't work correctly. Please seperate that into two commits. |
Okay, I will update this PR with the master component, and open another with the Firewall add-on... |
#16844 will contain the crowdsec-firewall-bouncer part... |
Here, also. Please don't do capital C in the commit message. So |
/net/crowdsec/ Crowdsec - An open-source, lightweight agent to detect and respond to bad behaviours. It also automatically benefits from a global community-wide IP reputation database. Signed-off-by: Kerma Gérald <gandalf@gk2.net>
@PolynomialDivision Thanks for your time and review ! |
Thanks for contributing! I gave you my approve for both PRs. However, I will not merge directly since I do not want to bypass other reviewers. Maybe @jefferyto can take care of this, since he was initial reviewer. If nothing happens and no nack happens, I will also merge in a couple of days, so your package gets upstream openwrt support. |
It is better to have separate commits to add multiple packages, but it wasn't strictly necessary to split the packages into separate PRs. (The CI checks were running fine before.) I usually help to review Go packages and leave merging to people who know more than me. I guess in this case people are waiting for me to merge 😂 Thanks for your patience @erdoukki! |
/net/crowdsec/
Crowdsec - An open-source, lightweight agent to detect
and respond to bad behaviours.
It also automatically benefits from a global community-wide
IP reputation database.
Signed-off-by: Kerma Gérald gandalf@gk2.net
Maintainer: Gérald Kerma Gandalf@Gk2.net
Compile tested:
Run tested:
Short Descritpion:
CrowdSec is an Open Source Participative Security IPS.
Description:
Crowdsec - An open-source, lightweight agent to detect and respond to bad behaviours. It also automatically benefits from our global community-wide IP reputation database.
crowdsec-firewall-bouncer will fetch new and old decisions from a CrowdSec API to add them in a blocklist used by supported firewalls.
References:
crowdsecurity/crowdsec#685
CrowdSec is the new Fail2Ban alternative...
CrowdSec is an open-source and collaborative EDR.
Analyze behaviors, respond to attacks & share signals across the community.
More @ https://crowdsec.net/
Use case (POC):
On an OpenWrt based router, you can quickly and efficiently ban a collaborative list of bad guys IP source, you can also centralize remote servers access attempts and ban on bad access attempts scenarios directly on your OpenWrt Internet access gateway...
Forum Topic :
https://forum.openwrt.org/t/crowdsec-packages-for-openwrt/102648/