-
-
Notifications
You must be signed in to change notification settings - Fork 623
Open
Description
Problem/Use Case
Currently in the Drop Requests App, we can configure whether to allow or drop requests from specific networks.
{
"enableBlocking": true,
"dropMalformedRequests": false,
"allowedNetworks": [
"127.0.0.1",
"::1",
"10.0.0.0/8",
"172.16.0.0/12"
],
"blockedNetworks": [
"192.168.0.0/16"
]
}However, it lacks the ability to allow or drop requests based on client identifiers, similar to the localEndPointGroupMap option in the Advanced Blocking App.
I believe adding this feature would be helpful for use cases involving DoT, DoH, and DoQ, especially in publicly exposed scenarios.
Proposed Solution/Feature
Support domain names in allowed/blocked networks
{
"enableBlocking": true,
"dropMalformedRequests": false,
"allowedNetworks": [
"secret-client-id.example.com",
"127.0.0.1",
"::1",
"10.0.0.0/8",
"172.16.0.0/12"
],
"blockedNetworks": [
"192.168.0.0/16"
]
}Or perhaps adding new fields for domain names
{
"enableBlocking": true,
"dropMalformedRequests": false,
"allowedLocalEndpoints": [
"secret-client-id.example.com"
],
"allowedNetworks": [
"127.0.0.1",
"::1",
"10.0.0.0/8",
"172.16.0.0/12"
],
"blockedNetworks": [
"192.168.0.0/16"
]
}Thank you very much!
Metadata
Metadata
Assignees
Labels
No labels