Thanks!Hi @HELLO_wORLD ,
Let me start with thanking you for all the good work and frequent updates of aegis! That said, I need to confess I don't use aegis yet, but am following the forum closely.
The feature aegis offers differs from what is by default on the router.I'm aiming to install 1.7 on my router when it is released and I have some questions I couldn't find in the Readme / on the forum.
For the common household, what is the benefit compared to the regular r7800 protection? It need be significant looking at the popularity.
Yes, the sources list can be changed to get any IP blocklist you want from wherever you want.Is there the possibility it blocks ip addresses I need? Like work VPN etc?
Short answer: yes.Is it possible to use it with cron without endware or addon?
I totally get that.Would like to keep my R7800 as clean as possible (have rpi running dns/dhcp/vpn, R7800 running voxel firmware only does router stuff).
You are welcome!Appreciated!
Hello,
Just used your LOG & TOOLS tab to find an ip I needed to whitelist - thank you!
Aside from telling me the ip i am looking up is blocked, can this tool or another tell me from which blocklist the blocked ip came from?
root@HERMES:~$ echo '192.168.0.1' >/tmp/testedip.tmp
root@HERMES:~$ wget -qO- https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset | iprange --common - /tmp/testedip.tmp
192.168.0.1
root@HERMES:~$ echo $?
0
Thanks, I know I can check each list.The tool in aegis is not able to tell from which list it is, as they are all merged when downloaded.
You would have to use something like that to test a specific online list (192.168.0.1 being here the ip to test against https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset ) :
$? would be 0 if ip is found, 1 if not.Code:root@HERMES:~$ echo '192.168.0.1' >/tmp/testedip.tmp root@HERMES:~$ wget -qO- https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset | iprange --common - /tmp/testedip.tmp 192.168.0.1 root@HERMES:~$ echo $? 0
I try to keep aegis as simple and low impact as possible for best performance, and keeping multiple lists makes it more complicated to maintain, check if all is ok, and creates more complexity.
Exactly.Thanks, I know I can check each list.
I appreciate the command line iprange check.
So Aegis discards the original blocklist downloads it collects each night and just keeps the merged list?
The online lists are maintained pretty often, some every hour or so. So this ip was at some point in one of the lists, and removed later on (either a false positive, either was only a threat for a short period of time).I ask because I can not find the list which caused aegis to block an IP it was blocking, even using your iprange test.
I don't want to derail the thread, so I just whitelisted the ip address and everything works again.
If you're interested the ip was 23.227.38.65, or myshopify.com.
Nor would I want you to. Thanks for the system it is.Exactly.
It merges all online lists, optimize and remove comments, etc... into one cached master list.
The online lists are maintained pretty often, some every hour or so. So this ip was at some point in one of the lists, and removed later on (either a false positive, either was only a threat for a short period of time).
This is also why tracking an ip to a specific list (either in the tools or the logs) is tricky. It is doable of course, by saving each list individually, and create as many iptables rules (and ipsets) as there are lists, but it increases complexity and reduces performance, and it is not where I want to go with aegis.
aegis does not offer a way to log allowed traffic. This would be a dangerous feature as the logging could create a huge cpu load, particularly softirq as every single packet going through the router would be logged...@HELLO_wORLD Many thanks for this useful addon, have been using it for almost 2 weeks and loving it! Can't wait for 1.7.0!
One question, and apologies if it has been mentioned before:
With Aegis we can see blocked inbound/outbound traffic. Is it possible to view the allowed traffic in our R7800 ?
Particularly, I want to monitor to which specific servers my PC is connecting during FIFA21 online gameplay sessions, since i get disconnections either from the game session or from my EA Account completely.
iptables -I FORWARD -i br0 -s YOUR-PC-IP -m state --state NEW -j LOG --log-prefix "[PCOUT] "
grep -F PCOUT /var/log/log-message
Yes, that setup would be in the R7800.Thank you @HELLO_wORLD !
I have to setup this in R7800 right? Installing first iptables from Entware and then running the commands? Won't this create CPU issues in the router?
How can I disable it?
On Windows, doing a netstat -n from powershell or cmd will show the open networkconnections from and to the pc.Now, you could do that from your PC with a software that can listen to traffic (there a plenty I am sure for Windows, but I don't know any, not a Windows expert here). On Mac, there are tools like Little Snitch for that.
Many thanks! So any changes I make to iptables does not survive the router reboot?Yes, that setup would be in the R7800.
Now, you could do that from your PC with a software that can listen to traffic (there a plenty I am sure for Windows, but I don't know any, not a Windows expert here). On Mac, there are tools like Little Snitch for that.
For the R7800 way to listen:
No need to install anything with Entware. iptables is already in the firmware.
Do not add this rule in firewall-start.sh script as it would be permanent.
Just type it from the Shell (telnet).
To get rid of it, just type net-wall restart or restart the router.
Many thanks, that's another easier workaroundOn Windows, doing a netstat -n from powershell or cmd will show the open networkconnections from and to the pc.
If you open cmd / powershell via "Run as Administrator" then you can also use netstat -nb -> this als shows the process that made the connection.
Exactly. It does not even survive a firewall restart (Net-wall restart).Many thanks! So any changes I make to iptables does not survive the router reboot?
Yes, this is the way to manually delete an iptables rule entry.I also made the same command with -D instead of -I and it removes it as well.
That is great, and I would start this way.Many thanks, that's another easier workaround
All these entries are blocked connections.@HELLO_wORLD Thanks for your work.
I've installed your script to the internal memory and have some questions.
Does the script write the log file (when logging is enabled) to NAND flash memory of the router. Does it write any other data to flash when running (with logging disabled).
How should I interpret this data.
View attachment 31014
Were all of these connections blocked. Are they from attacking networks/IPs. Aren't they too many for such a short time.
You are welcome, sure@HELLO_wORLD Thanks for your work.
I've installed your script to the internal memory and have some questions.
No, I avoid writing to NAND as much as possible, and I made a great deal to make the impact on NAND as near to zero as possible (before I even wrote aegis, I lost a R7800 because of a bad NAND, so I got traumatized).Does the script write the log file (when logging is enabled) to NAND flash memory of the router. Does it write any other data to flash when running (with logging disabled).
Each line is a packet blocked by aegis (incoming in red or outgoing in blue). They all are blocked because they are in the blocklist (and not in whitelist).How should I interpret this data.
View attachment 31014
Were all of these connections blocked. Are they from attacking networks/IPs. Aren't they too many for such a short time.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!