Skip to content
Snippets Groups Projects
Select Git revision
  • experimental default protected
  • nrb/airmax-test
  • v2023.2.4-ffs
  • nrb/ar9344-reset-sequence
  • autinerd/experimental-openwrt-24.10
  • v2023.2.3-ffs
  • v2023.2.2-ffs
  • v2023.2-ffs
  • v2023.1-ffs
  • v2022.1.4-ffs
  • feature/addMikrotikwAP
  • v2022.1.3-ffs
  • v2021.1.2-ffs
  • v2022.1.1-ffs
  • master protected
  • v2021.1.1-ffs
  • nrb/gluon-master-cpe510
  • v2021.1-ffs
  • v2020.2.3-ffs
  • nrbffs/fastd-remove-delay
  • experimental-2025-05-27
  • experimental-2025-05-27-base
  • experimental-2025-05-18
  • experimental-2025-05-18-base
  • experimental-2025-05-15
  • experimental-2025-05-15-base
  • experimental-2025-05-13
  • experimental-2025-05-13-base
  • experimental-2025-05-08
  • experimental-2025-05-08-base
  • experimental-2025-05-05
  • experimental-2025-05-05-base
  • experimental-2025-05-02
  • experimental-2025-05-02-base
  • experimental-2025-05-01
  • experimental-2025-05-01-base
  • experimental-2025-04-29
  • experimental-2025-04-29-base
  • experimental-2025-04-27
  • experimental-2025-04-27-base
40 results

Makefile

Blame
  • Makefile 1.50 KiB
    include $(TOPDIR)/rules.mk
    
    PKG_NAME:=gluon-ebtables-limit-arp
    PKG_VERSION:=1
    PKG_RELEASE:=1
    
    include ../gluon.mk
    
    define Package/gluon-ebtables-limit-arp
      SECTION:=gluon
      CATEGORY:=Gluon
      TITLE:=Ebtables limiter for ARP packets
      DEPENDS:=+gluon-core +gluon-ebtables gluon-mesh-batman-adv
    endef
    
    define Package/gluon-ebtables-limit-arp/description
    	Gluon community wifi mesh firmware framework: Ebtables rules to
    	rate-limit ARP packets.
    
    	This package adds filters to limit the amount of ARP Requests
    	devices are allowed to send into the mesh. The limits are 6 packets
    	per minute per client device, by MAC address, and 1 per second per
    	node in total.
    
    	A burst of up to 50 ARP Requests is allowed until the rate-limiting
    	takes effect (see --limit-burst in the ebtables manpage).
    
    	Furthermore, ARP Requests with a target IP already present in the
    	batman-adv DAT Cache are excluded from the rate-limiting,
    	both regarding counting and filtering, as batman-adv will respond
    	locally with no burden for the mesh. Therefore, this limiter
    	should not affect popular target IPs, like gateways.
    
    	However it should mitigate the problem of curious people or
    	smart devices scanning the whole IP range. Which could create
    	a significant amount of overhead for all participants so far.
    endef
    
    define Package/gluon-ebtables-limit-arp/install
    	$(Gluon/Build/Install)
    
    	$(INSTALL_DIR) $(1)/usr/sbin/
    	$(CP) $(PKG_BUILD_DIR)/gluon-arp-limiter $(1)/usr/sbin/gluon-arp-limiter
    endef
    
    $(eval $(call BuildPackageGluon,gluon-ebtables-limit-arp))