-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support protecting specific CIDRs from wide k-lines #298
Comments
Registering my full support for something like this, when a matrix bridge gets a kline across the whole range, it basically evicts all the matrix users from all the rooms which is not fun. |
alternative solution could be to never accept a k-line that will kill more than n number of users, but you can't accurately calculate how many users a given k-line will kill without asking all remote servers |
Maybe a kind of |
we'd also want this to somehow cover wildcards |
a better way to do this would be marking an iline as immune to wildcard/cidr k-lines |
some IPv6
/64
s have a lot of users in them. might be nice to have a way to say "only allow minimum<prefixlen>
k-lines in this CIDR"The text was updated successfully, but these errors were encountered: