MaxMind ACL Plugin¶
This remap plugin provides allow and deny functionality based on the libmaxminddb library and GeoIP2 databases (mmdb format). It requires libmaxminddb to run and the associated development headers in order to build. You can find a sample mmdb-lite database on the maxmind website or provide your own. You must provide a database for any usages and specify it in the configuration file as shown below.
Configuration¶
The plugin takes a single pparam which is the location of the configuration yaml file. This can either be relative to the ATS configuration directory or an absolute path
map http://example.com/music http://music.example.com @plugin=maxmind_acl.so @pparam=maxmind.yaml
An example configuration
maxmind:
database: GeoIP2-City.mmdb
html: deny.html
allow:
country:
- US
ip:
- 127.0.0.1
- 192.168.10.0/20
deny:
country:
- DE
ip:
- 127.0.0.1
regex:
- [US, ".*\\.txt"] # Because these get parsed you must escape the escape of the ``.`` in order to have it be escaped in the regex, resulting in ".*\.txt"
- [US, ".*\\.mp3"]
In order to load an updated configuration while ATS is running you will have to touch or modify the remap.config file in order to initiate a plugin reload to pull in any changes.
Rules¶
You can mix and match the allow rules and deny rules, however deny rules will always take precedence so in the above case 127.0.0.1
would be denied.
The IP rules can take either single IPs or cidr formatted rules. It will also accept IPv6 IP and ranges.
The regex portion can be added to both the allow and deny sections for creating allowable or deniable regexes. Each regex takes a country code first and a regex second. The regex
operates on the entire original request URL, the pre-remapped fqdn and path.
In the above example all requests from the US would be allowed except for those on txt
and mp3
files. More rules should be added as pairs, not as additions to existing lists.
Currently the only rules available are country
, ip
, and regex
, though more can easily be added if needed. Each config file does require a top level
maxmind
entry as well as a database
entry for the IP lookups. You can supply a separate database for each remap used in case you use custom
ones and have specific needs per remap.
One other thing to note. You can reverse the logic of the plugin, so that it will default to always allowing if you do not supply any allow
rules.
In the case you supply no allow rules all connections will be allowed through except those that fall in to any of the deny rule lists. In the above example
the rule of denying DE
would be a noop because there are allow rules set, so by default everything is blocked unless it is explicitly in an allow rule.
However in this case the regexes would still apply since they are based on an allowable country.
Optional¶
There is an optional html
field which takes a html file that will be used as the body of the response for any denied requests if you wish to use a custom one.
Anonymous¶
There is also an optional anonymous
field. This allows you to use the MaxMind GeoIP2 Anonymous IP database and reference it’s optional fields. These are ip
, vpn
,
hosting
, public
, tor
, and residential
. Currently anonymous blocking cannot be combined with GeoIP blocking since it is considered a separate database.
However if you custom generate your own database that includes anonymous data then you could use them at the same time. Another solution is to have two instances
of the maxmind_acl plugin on a remap, one to handle geo blocking and another for anonymous blocking. A setting of true
will cause that type to be blocked, false
will not block and is effectively a no-op.
An example configuration
maxmind:
database: GeoIP2-Anonymous-IP.mmdb
anonymous:
hosting: false
ip: true
vpn: true
tor: false
allow:
ip:
- 127.0.0.1 # Can insert known anonymous IP you wish to allow here
This would block anonymous IPs and VPNs while allowing hosting and tor IPs. However if an IP has multiple designations then having a false
set will not stop a true
entry from being blocked.
For example in the above if an IP had both vpn and hosting true in the database then it would still be blocked due to the vpn designation.
The allow IP and deny IP fields also will work while using the anonymous blocking if you wish to allow specific known IPs or block specific IPs. Keep in mind that the same rule about reversing the logic applies, so that even if you are only doing anonymous IP blocking, and then set allowable IPs to allow certain anonymous IP through (if desired), this will reverse the logic and default to blocking all IPs unless they fall into a range in the allow list.
The plugin also supports optional fields from GeoGuard databases which includes:
vpn_datacenter
relay_proxy
proxy_over_vpn
smart_dns_proxy