Banip auto enable and start after sysupgrade

Hi,

I try to keep my banip enable and working after sysupgrade, I always keep my setting but banip after sysupgrade, is always deactiavted, still there in etc/config/ but in etc/init.d banip is not there anymore.

I tried some things in rc local like;

opkg update
opkg install banip_0.8.0pre5-1_all.ipk --force-reinstall --force-maintainer
/etc/init.d/banip enable
/etc/init.d/banip start

but in the log I see ;

Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Updated list of available packages in /var/opkg-lists/openwrt_packages
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Downloading https://downloads.openwrt.org/releases/22.03-SNAPSHOT/packages/arm_cortex-a15_neon-vfpv4/packages/Packages.sig
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Signature check passed.
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Downloading https://downloads.openwrt.org/releases/22.03-SNAPSHOT/packages/arm_cortex-a15_neon-vfpv4/routing/Packages.gz
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Updated list of available packages in /var/opkg-lists/openwrt_routing
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Downloading https://downloads.openwrt.org/releases/22.03-SNAPSHOT/packages/arm_cortex-a15_neon-vfpv4/routing/Packages.sig
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Signature check passed.
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: Collected errors:
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done:  * wfopen: banip_0.8.0pre5-1_all.ipk: No such file or directory.
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done:  * pkg_init_from_file: Failed to extract control file from banip_0.8.0pre5-1_all.ipk.
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: /etc/rc.local: line 9: /etc/init.d/banip: not found
Tue Feb 14 11:58:05 2023 daemon.notice procd: /etc/rc.d/S95done: /etc/rc.local: line 10: /etc/init.d/banip: not found

So I don't really know what to do?
thanks

install it over internet, instead of local file ?

1 Like

I should use a script so?

depends on what you want...

but it fails because the file you're trying to install doesn't exist.

but the file is in root

root@OpenWrt:~# ls
banip_0.8.0pre5-1_all.ipk
backupOpenWrt-2023-01-30.tar.gz

root@OpenWrt:~# 


then you need to use abolute paths.

2 Likes

you mean opkg /root/ install banip_0.8.0pre5-1_all.ipk

no

opkg install /root/banip_0.8.0pre5-1_all.ipk

2 Likes

That seems wrong... but regardless this seems inane, also there is now a PR. Should be able to just bake that into what you are flashing I think.

1 Like

the patch does not work or what? I tried to use it in my buildroot

$ patch -p1 < banip.patch
can't find file to patch at input line 72
Perhaps you used the wrong -p or --strip option?
The text leading up to this was:
--------------------------
|From 23db7fbb456356e007fe4c55ff9b0dfc0481e00b Mon Sep 17 00:00:00 2001
|From: Dirk Brenken <dev@brenken.org>
|Date: Mon, 13 Feb 2023 17:56:57 +0100
|Subject: [PATCH] banip: release 0.8.0 (nft rewrite)
|
|- complete rewrite of banIP to support nftables
|- all sets are handled in a separate nft table/namespace 'banIP'
|- for incoming blocking it uses the inet input hook, for outgoing blocking it uses the inet forward hook
|- full IPv4 and IPv6 support
|- supports nft atomic set loading
|- supports blocking by ASN numbers and by iso country codes
|- 42 preconfigured external feeds are available, plus local allow- and blocklist
|- supports local allow- and blocklist (IPv4, IPv6, CIDR notation or domain names)
|- auto-add the uplink subnet to the local allowlist
|- provides a small background log monitor to ban unsuccessful login attempts in real-time
|- the logterms for the log monitor service can be freely defined via regex
|- auto-add unsuccessful LuCI, nginx, Asterisk or ssh login attempts to the local blocklist
|- fast feed processing as they are handled in parallel as background jobs
|- per feed it can be defined whether the input chain or the forward chain should be blocked (default: both chains)
|- automatic blocklist backup & restore, the backups will be used in case of download errors or during startup
|- automatically selects one of the following download utilities with ssl support: aria2c, curl, uclient-fetch or wget
|- supports a 'allowlist only' mode, this option restricts internet access from/to a small number of secure websites/IPs
|- provides comprehensive runtime information
|- provides a detailed set report
|- provides a set search engine for certain IPs
|- feed parsing by fast & flexible regex rulesets
|- minimal status & error logging to syslog, enable debug logging to receive more output
|- procd based init system support (start/stop/restart/reload/status/report/search)
|- procd network interface trigger support
|- ability to add new banIP feeds on your own
|- add a readme with all available options/feeds to customize your installation to your needs
|- a new LuCI frontend will be available in due course
|
|Signed-off-by: Dirk Brenken <dev@brenken.org>
|---
| net/banip/Makefile                            |   42 +-
| net/banip/files/README.md                     |  550 +++---
| net/banip/files/banip-functions.sh            | 1156 ++++++++++++
| net/banip/files/banip-service.sh              |  193 ++
| .../{banip.blacklist => banip.allowlist}      |    0
| .../files/{banip.maclist => banip.blocklist}  |    0
| net/banip/files/banip.conf                    |   17 +-
| net/banip/files/banip.dns                     |   64 -
| net/banip/files/banip.feeds                   |  295 +++
| net/banip/files/banip.hotplug                 |   10 -
| net/banip/files/banip.init                    |  282 +--
| net/banip/files/banip.mail                    |   62 -
| net/banip/files/banip.service                 |   28 -
| net/banip/files/banip.sh                      | 1595 -----------------
| net/banip/files/banip.sources                 |  191 --
| net/banip/files/banip.tpl                     |   24 +
| net/banip/files/banip.whitelist               |    0
| 17 files changed, 1962 insertions(+), 2547 deletions(-)
| create mode 100644 net/banip/files/banip-functions.sh
| create mode 100755 net/banip/files/banip-service.sh
| rename net/banip/files/{banip.blacklist => banip.allowlist} (100%)
| rename net/banip/files/{banip.maclist => banip.blocklist} (100%)
| delete mode 100755 net/banip/files/banip.dns
| create mode 100644 net/banip/files/banip.feeds
| delete mode 100644 net/banip/files/banip.hotplug
| delete mode 100755 net/banip/files/banip.mail
| delete mode 100755 net/banip/files/banip.service
| delete mode 100755 net/banip/files/banip.sh
| delete mode 100644 net/banip/files/banip.sources
| create mode 100644 net/banip/files/banip.tpl
| delete mode 100644 net/banip/files/banip.whitelist
|
|diff --git a/net/banip/Makefile b/net/banip/Makefile
|index 7da810862418..a816ec858d13 100644
|--- a/net/banip/Makefile
|+++ b/net/banip/Makefile
--------------------------
File to patch: 


It is a package patch, ./feeds/packages, so adjust in some fashion I assume?

1 Like