Additional packages and kernel modules for ipset support.
ipset support is a somewhat challenging on DD-WRT because several key components for it are not currently built into the firmware. While DD-WRT can be extended by compiling additional userland tools and rolling your own firmware builds with the DD-WRT toolchain, this is a rather complex and overkill approach for adding additional features like
ipset. This repository is a collection of additional ipk packages and kernel modules for ipset support on DD-WRT all in one place.
Note: These packages and modules are provided as is with no warranty/support. They have been tested on a R7000 (used in my own network) running DD-WRT firmware, other router models may vary.
This explains what each directory is for and its purpose is related to ipset support.
The additional packages are mostly taken from the Entware project compiled with a compatible ARM toolchain that works on DD-WRT as well. You will need several additional packages for complete
ipset. They are:
ipset=/policies (compiled with ipset support)
Here are the compile time options for dnsmasq I build with (version will vary, noted in the ipk filename):
Note: Due to several security vulnerabilities found with dnsmasq version < 2.78. It is recommended you only use dnsmasq version 2.78 or later.
While DD-WRT comes with both
iptables already, the
dnsmasq version is compiled without
ipset support, in addition the
iptables version is v1.3.7 which is too old for some
ipset based firewall rules.
These packages can be installed with the
opkg install /path/to/package.ipk
In some cases you may also need to use the
In order for iptables to work with ipset the
xt_set.ko kernel module is needed. This is not present in any DD-WRT build currently. This is compiled using the DD-WRT kernel sources and matches the latest firmware kernel branch of the R7000 (currently
Getting the right kernel source and toolchain is important when building modules, otherwise when attempting to load them you may kernel panic and crash your router. Likewise, you cannot simply use a module compiled on the 3.10 kernel compared to the 4.4 kernel and vice versa, you'll also likely crash your router upon attempting to load the module. This project includes the required kernel for both
linux-4.4 builds. However, it is strongly recommended to use a recent build under the 4.4 kernel branch.
If you don't have
opkg installed, you can alternatively copy the entire contents of the
/opt directory to your routers JFFS partition or a seperate mounted USB device. You will need to make sure you place the contents that matches the DD-WRT $PATH variable. Typically, this is what the DD-WRT path variable looks like:
This however is not recommended unless you know what you are doing, you'll also need to make sure you copy over the /opt folder preserving symlinks and permissions. 99.9% of users should install via the .ipk packages provided, its a lot easier! If however you want to cherry pick the binaries, this is possible.
iptables you can overwrite the built in versions using a mount.
mount -o bind /opt/usr/sbin/dnsmasq /usr/sbin/dnsmasq mount -o bind /opt/usr/sbin/iptables /usr/sbin/iptables mount -o bind /opt/usr/sbin/ip6tables /usr/sbin/ip6tables
This will essentially redirect any call to the original firmware versions to the specially compiled ones. It provides a simple way of making sure your router uses the correct binaries. This can however cause problems as the firmware was not originally built with these versions.
Alternatively, if you are using Entware already, you can actually take advantage of running
dnsmasq via the init.d script included: at
ARGS to match the arguments used by DD-WRT:
-u root -g root --conf-file=/tmp/dnsmasq.conf --cache-size=1500
This allows you to essentially use the
dnsmasq binary with
ipset support while using the DD-WRT firmware
dnsmasq.conf file allowing you to still make changes to
dnsmasq normally. Finally, you'll need to stop the DD-WRT
dnsmasq server and start the Entware version. You'll want to put this in your
stopservice dnsmasq /opt/etc/init.d/S56dnsmasq start
iptables you can place additional rules within the usual
.rc_firewall but ensure you reference to the full path to the newer
iptables binary e.g.
The kernel module for
xt_set.ko can be placed within /jffs/usr/lib/modules and be loaded at boot time, using
If everything was successful, you will get no prompt returned, running the same command again should yield something similar to:
insmod: cannot insert '/jffs/usr/lib/modules/4.4/xt_set.ko': File exists
This means the module is now loaded. You can also confirm this by running
lsmod | grep "xt_set".
Ensure to change the kernel version in the
insmod command to whatever kernel source it was built from as stated in the repo. The kernel module is versioned by kernel source because its important to keep track of what Linux kernel base source its come from. You can mostly get away with using a kernel module that is from a slightly different sublevel, but in most cases not an entirely different kernel version altogether. It is recommended to compile any kernel module against the same kernel source and sublevel relative to your firmware build to avoid instability.
JFFS storage is better for kernel modules as its a storage partition available early in the boot process. Alternatively you can also use /opt but you may have to delay executing code related to this module till a bit later on in the boot process, to ensure the USB device holding the /opt mountpoint is available.
Sometimes its also good to insmod custom kernel modules manually first, rather than adding
insmod commands straight into to your
.rc_startup. The reason being is if the module doesn't load properly and causes a kernel panic, you will essentially throw your router into a boot loop as it will keep trying to load the module causing the problem on startup.
Once you've got
ipset support setup on DD-WRT, you'll now want to start using it. Here's a few tutorials on what you can do. Common examples are country blocklists and selective VPN routing using domain based rules.