Luci-app-nft-qos should be removed from Openwrt

luci-app-nft-qos does not work anymore and should be removed from Openwrt 24.10 repositories. I wanted to limit the Internet speed by devices and it was plugin that could do that but it is not working since 2021.

1 Like

It certainly does not work with offloads.
(ill check myself if it hooks in proper fw4 places)

Whats in your
ubus call system board

Confirm, it introduces no nftables rules at all, only 4 hooks.
I have some reservations on what package is supposed to do.
Mind to report against nft-qos in github openwrt/packages ?

Let’s agree to disagree.

root@MikroTik:~# ubus call system board
{
        "kernel": "6.6.73",
        "hostname": "MikroTik",
        "system": "MediaTek MT7621 ver:1 eco:3",
        "model": "MikroTik RouterBOARD 750Gr3",
        "board_name": "mikrotik,routerboard-750gr3",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.0",
                "revision": "r28427-6df0e3d02a",
                "target": "ramips/mt7621",
                "description": "OpenWrt 24.10.0 r28427-6df0e3d02a",
                "builddate": "1738624177"
        }
}
root@MikroTik:~# nft list table inet nft-qos-static
table inet nft-qos-static {
        chain upload {
                type filter hook postrouting priority filter; policy accept;
                ip saddr 192.168.92.92 limit rate over 1 mbytes/second drop
        }

        chain download {
                type filter hook prerouting priority filter; policy accept;
                ip daddr 192.168.92.92 limit rate over 1 mbytes/second drop
        }
}

i tried dynamic.... Probably well intended but incomplete.

root@MikroTik:~# nft list table inet nft-qos-dynamic
table inet nft-qos-dynamic {
        chain upload {
                type filter hook postrouting priority filter; policy accept;
                ip saddr 192.168.92.0/24 limit rate over 12500 kbytes/second drop
        }

        chain download {
                type filter hook prerouting priority filter; policy accept;
                ip daddr 192.168.92.0/24 limit rate over 12500 kbytes/second drop
        }
}

There is only a problem with limiting by MAC.
A workaround here.

1 Like

Dynamic is also I want. Lower speed limit for every one.

I think the request then is to remove unimplemented functionality