--- Guard is an elegant IPQS plugin for Caddy. Acting as a middleware or microservice between your web server.
--- Features are built in, you can tell Guard to intercept or pass data all the way down to your web server.
--- Questions? feel free to ask by contacting me!
xcaddy build --with github.com/z3ntl3/caddyguard
:2000 {
# guard is ordered before "reverse_proxy"
# https://caddyserver.com/docs/caddyfile/directives#directive-order
guard /api* {
rotating_proxy 1.1.1.1
timeout 3s
ip_headers cf-connecting-ip {
more1
more2
more3
}
pass_thru
}
reverse_proxy http://localhost:2000
}
guard [matcher] {
rotating_proxy <arg>
timeout <arg>
ip_headers <args...> {
<arg>
<arg>
<arg>
...
}
pass_thru
}
-
rotating_proxy <arg>
Doc
-
Should comfort net.http.
-
Supported protocols are
socks
,http
andhttps
. -
If scheme is not provided,
http
is assumed.
Examples
guard /api* { rotating_proxy 1.1.1.1 }
Here
http://1.1.1.1
is assumed.
guard /api* { rotating_proxy socks5://1.1.1.1 }
Here
socks5://1.1.1.1
is assumed.NOTE
Underlying client may change. Proxifier > may be binded to this plugin. Which is our own low-level proxy client library. -
-
timeout <arg>
Doc
- Should comfort time.
Aka arg values like:
10s
,1m
etc...Examples
guard /api* { timeout 1s }
-
ip_headers <args...> {...}
Doc
- Can be arbitrary values. Tells Guard plugin to find the real ip address in one of those headers.
Values like:
cf-connecting-ip
,x-forwarded-for
and etc..., seem logicalExamples
guard /api* { ip_headers header1 { header2 } }
-
pass_thru
Doc
Accepts no args, and disallows opening a block. It acts like a turn on.Providing
pass_thru
simply means to pass data down to the next handler, aka your web server/reverse proxy instead of writing a builtin HTTP response. Provides useful data by manipulating the request headers, while it moves down to the next tree of handler(s).If
pass_thru
is provided, then there are some important headers your web server should consume:X-Guard-Success
If it is set to
1
, it means success otherwise-1
means false.X-Guard-Info
Contains explainatory description.
X-Guard-Query
The IP which got queried. Not present when
X-Guard-Rate
isUNKNOWN
.X-Guard-Rate
Either
DANGER | LEGIT | UNKNOWN
DANGER
Reports that the IP reputation is badLEGIT
Reports that the IP reputation is goodUNKNOWN
Reports that the IP reputation is unknown, aka scan failure. Typically exceededtimeout
constraints.
Guard uses InternetDB to perform scans. It's completely free, and allows high traffic throughput. You can always use rotating_proxy
sub-directive with Guard to allow a limitless quota when needed.
Determination of a bad IP happens based on logic:
- If InternetDB has information regards the queried IoT device by IP, then consider it has a bad IP reputation.
--- Programmed by z3ntl3