Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support protecting specific CIDRs from wide k-lines #298

Open
jesopo opened this issue Nov 18, 2021 · 5 comments
Open

support protecting specific CIDRs from wide k-lines #298

jesopo opened this issue Nov 18, 2021 · 5 comments

Comments

@jesopo
Copy link
Member

jesopo commented Nov 18, 2021

some IPv6 /64s have a lot of users in them. might be nice to have a way to say "only allow minimum <prefixlen> k-lines in this CIDR"

@Half-Shot
Copy link

Registering my full support for something like this, when a matrix bridge gets a kline across the whole range, it basically evicts all the matrix users from all the rooms which is not fun.

@jesopo
Copy link
Member Author

jesopo commented Nov 18, 2021

alternative solution could be to never accept a k-line that will kill more than n number of users, but you can't accurately calculate how many users a given k-line will kill without asking all remote servers

@codeurimpulsif
Copy link

Maybe a kind of protect_list of IP range to protect from K-lines can also be a good solution, because for example a lot of ISP provide /64 IPv6 range to each user, so disable k-line possibilities for a /64 can disable the possibility to ban a single user?

@jesopo
Copy link
Member Author

jesopo commented Nov 21, 2021

we'd also want this to somehow cover wildcards

@jesopo
Copy link
Member Author

jesopo commented Jan 6, 2022

a better way to do this would be marking an iline as immune to wildcard/cidr k-lines

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants