Feature Request : BanIP

@staff would there be any interest in supporting BanIP as a built in package?

It takes feeds from threat intelligence sites like URLHaus and adds to NFTables rules.

Malware lists on AdGuard are fine, but some threats do not use DNS when phoning home, so using this augments DNS blocking.

Being able to install this package is what made me choose my mt-6000 over UniFi - the latter has a similar function but it is closed source.

I previously used NGBlocker on PFSense to do this, but their support for PPPoE is poor…hence moving to OpenWRT.

Afaik nftables isn’t used - does it work with iptables as well?

1 Like

Hmm that could be a problem. It was running on my x86 OpenWRT box that I had since switching to PPPoE…I have the package installed on my mt-6000 but haven’t got round to configuring it.

NFTables is needed I believe since it uses ipsets

I had assumed that since gl-inet base their software off OpenWRT 23 the backend would be using NFTables…is this not the case?

Yeah, it’s true; GL customizations to make key GUI functions happen still relying on iptables, even on their flagship the Flint v2 which runs OWRT 23.05. I’ve been on their case about it but most of the other devices still run OWRT 21.02 so…

The good news is that upstream OWRT has a 23.05 dev snapshot available. Related thread:

Thank you, however I’m a bit confused now.

When SSHing into my mt-6000, iptables -L doesn’t list many rules

Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ts-input   all  --  anywhere             anywhere

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination
ts-forward  all  --  anywhere             anywhere
DROP       all  --  anywhere             anywhere             match-set GL_MAC_BLOCK src

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain ts-forward (1 references)
target     prot opt source               destination
MARK       all  --  anywhere             anywhere             MARK xset 0x40000/0xff0000
ACCEPT     all  --  anywhere             anywhere             mark match 0x40000/0xff0000
ACCEPT     all  --  anywhere             anywhere

Chain ts-input (1 references)
target     prot opt source               destination

However nft list ruleset rules matches some of the rules in LuCI → Network → Firewall

For example Allow-DHCP-Renew is in both nft output and GUI, but Tailscale rules are only in the nft output

	chain input_wan {
		meta nfproto ipv4 udp dport 68 counter packets 1 bytes 28 accept comment "!fw4: Allow-DHCP-Renew"
		meta nfproto ipv4 meta l4proto igmp counter packets 2813 bytes 101268 accept comment "!fw4: Allow-IGMP"
		meta nfproto ipv6 udp dport 546 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCPv6"

The presence of !fw4 suggest that fw4 is managing these rules, and as far as I know it uses nftables - so I’m assuming iptables is not used.

Toss this in the shell; you may need bash.

if command -v iptables; then
    if iptables -V | grep -E ' \(nf_tables\) *$'; then
        echo "nft"
        echo "iptables"
elif command -v nft; then
    echo "nft";

Shamelessly stolen fr linux - Check whether iptables or nftables are in use - Unix & Linux Stack Exchange … & untested.

NFTables is definitely in use, there’s a symlink pointing iptables to it (output of that script is nft as well)

0 lrwxrwxrwx 1 root root 27 Jan 18 09:21 /usr/sbin/iptables -> /usr/sbin/xtables-nft-multi

root@GL-MT6000:~# iptables -V
iptables v1.8.8 (nf_tables)

I’m on 4.5.6, which is based off this version of OpenWrt

OpenWrt 23.05-SNAPSHOT r23001+721-38c150612c / LuCI openwrt-23.05 branch git-23.357.58018-024e7ab

Do you think something has changed since you looked at the Wireguard issue?

I will configure BanIP at some point, but need to find a good time in case it breaks connectivity.

1 Like

… and there it is!

I don’t have the issue; I run vanilla/pure OWRT 23.05’s PBR as a jump box behind a Slate AX as a WG gateway. I’m not inclined to trust ‘shim’ procs; not when there’s a chance of tunnel leakage. There’s a reason I don’t run without a kill switch on my gateway. YMMV.

Here, so you can fcvk around yet still unfcvk yourself :wink: :

So it’s still iptables but with the modern API?
Why would you do something like this? I mean … legacy software, ok … but with modern API?

1 Like

It’s a shim. I refer you back to Iran:

1 Like

Backwards compatibility - this tool allows the iptables syntax to be used with the nftables backend.

There’s a lot of stuff out there that’s still using iptables, Docker and K8s for example.

If anyone’s interested BanIP works great on my mt-6000. Had to install manually from downloads.openwrt.org to get the latest version.

Was confused for a while since it wasn’t blocking, which turned out to be Apple Private Relay working as designed.

        set urlhausv4 {
                type ipv4_addr
                policy memory
                flags interval
                elements = {,,
Sun Feb  4 11:09:47 2024 kern.warn kernel: [73048.674007] banIP/fwd-lan/reject/urlhausv4: IN=br-lan OUT=pppoe-secondwan SRC= DST= LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=26448 PROTO=ICMP TYPE=8 CODE=0 ID=38773 SEQ=0
Sun Feb  4 11:09:48 2024 kern.warn kernel: [73049.676711] banIP/fwd-lan/reject/urlhausv4: IN=br-lan OUT=pppoe-secondwan SRC= DST= LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=62386 PROTO=ICMP TYPE=8 CODE=0 ID=38773 SEQ=1
Sun Feb  4 11:10:16 2024 kern.warn kernel: [73077.985677] banIP/fwd-lan/reject/countryv4: IN=br-lan OUT=pppoe-secondwan SRC= DST= LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=65291 PROTO=ICMP TYPE=8 CODE=0 ID=41589 SEQ=0
Sun Feb  4 11:10:17 2024 kern.warn kernel: [73078.986537] banIP/fwd-lan/reject/countryv4: IN=br-lan OUT=pppoe-secondwan SRC= DST= LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=46570 PROTO=ICMP TYPE=8 CODE=0 ID=41589 SEQ=1

Would be great to see this functionality built into the gl-inet firmware, a malware blocking appliance is a great selling point.

Tbh this doesn’t work really well. Banning IPs is so 2000… since cloud computing got waaaay bigger banning IPs isn’t really useful anymore, imho.

Thank you, but respectfully disagree on that one - remember my use case is detecting IOCs going outbound not banning bad stuff in the WAN INPUT chain (the latter I think you might be referring to).

Malware commonly uses hard coded IP addresses to talk back to C2 servers, either for stealth or simplicity.

DNS blocking (e.g Adblock with Malware feed) will not stop these connections.

An ideal solution is to look for IOCs in both firewall and DNS logs.

I guess its a nice idea :wink:, but im afraid banip will not work on all routers due the hardware specifications it might need.

And sometimes banip can also become too restrictive :yum:, for example in one of my feeds it appears it blocked some ip from spotify so i had to add the offending domain names in the allow list, other times it blocked my local ranges.

Its a nice feature but im very afraid people might lack the essential skill to find the right offender in such situations :+1:


Also ip addresses can change from ownership, the sad truth is that you can never fully control it, and often a entry can become a false positive.

I think Safing’s Portmaster Plus (read: paid) subscription should be handle that for you. It’s client side though. The F/OSS/Free-beer edition is great if you’re just looking for interception, denial.

@xize11 Thanks, was that the Firehol lists - they have many AWS/Azure ranges associated with spam email, and even RFC1918 ranges in there(!). I had the same problem with NGBlocker on PFSense.

URLHaus has had the least false positives and real hits for me, I use this professionally in an enterprise setting.

@bring.fringe18 Thanks, really interesting product. Although the appeal of the mt-6000 is that it’s the exit point to the internet, provides a shell/python, runs 24x7 at 7-10 watts and through Adblock/BanIP it can block IOT/mobile threats.

Anyway, thanks for the feedback everyone - it looks like it works fine on my router and I’m very happy.

Perhaps someone from @staff could kindly consider this for a feature request, Unifi have a similar feature on their high end solutions but I’d rather use gl-inet.

1 Like

Well IDK how much this could be useful to you but dnscrypt-proxy2 can log all DNS lookups in conjunction w/ dnsmasq logging the LAN client/host. IDK about outbound IP attempts though. Still, it might be of interest to your use case. ‘More tools for the box’, if you will.

Jup this one is known for me, but it also happens on some country feeds.

Thank you, gl-inet provide this out the box with AdGuardHome though - the lists used are here