You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Improve valid signal documentation structure and wording
- Move 'What Counts as a Valid Signal?' section above Community Blocklist
- Update wording to 'do not regularly contribute valid signals' for clarity
- Change 'sending signal' to 'sending valid signals' in Community Blocklist description
- Improve document flow by explaining valid signals before describing blocklist tiers
- Maintain consistency across both main docs and v1.7 versioned docs
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/central_api/blocklist.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,44 +15,44 @@ The Community Blocklist is **only** available when using the Security Engine. To
15
15
:::
16
16
17
17
The rules are different for free and paying users:
18
-
- Free users that **do not regularly** contribute get the `Community Blocklist (Lite)`
19
-
- Free users that **do regularly** contribute get access to the `Community Blocklist`
18
+
- Free users that **do not regularly contribute valid signals** get the `Community Blocklist (Lite)`
19
+
- Free users that **do regularly contribute valid signals** get access to the `Community Blocklist`
20
20
- Paying users get access to the `Community Blocklist (Premium)`, even if they don't contribute
21
21
22
22
Regardless of the blocklist "tier" you have access to (`Lite`, `Community`, `Premium`), each Security Engine gets a tailored blocklist based on the kind of behavior you're trying to detect.
23
23
24
-
## Community Blocklist
25
-
26
-
Free users that are actively contributing to the network (sending signal on a regular basis) have their Security Engines automatically subscribed to the *Community Blocklist*.
27
-
28
-
The content of the blocklist is unique to each Security Engine, as it mirrors the behaviours they report. For example, suppose you're running the Security Engine on a web server with WordPress. In that case, you will receive IPs performing generic attacks against web servers *and* IPs engaging in wordpress-specific attacks.
29
-
30
-
The *Community Blocklist* contains 15 thousand malicious IP's based on your reported scenarios.
31
-
32
-
### What Counts as a Valid Signal?
24
+
## What Counts as a Valid Signal?
33
25
34
26
For your signals to be counted toward community contribution, they must meet specific criteria:
35
27
36
-
####What We Count
28
+
### What We Count
37
29
38
30
-**Signals generated by official CrowdSec scenarios from the Hub, unmodified**
39
31
- We verify this by comparing the scenario's content hash we publish with the hash your engine reports
40
32
41
-
####What We Do Not Count
33
+
### What We Do Not Count
42
34
43
35
-**Custom scenarios you write yourself**
44
36
-**Tainted or modified scenarios** (even small edits). We cannot reliably vet behavior once a scenario is changed, so the consensus engine ignores those signals
45
37
46
-
####Example
38
+
### Example
47
39
48
40
If you only run a honeypot with a scenario you have modified, your local alerts will still fire, but the consensus engine will not use those signals. You can then show up as "not actively contributing," even though you see activity locally.
49
41
50
-
####How to Make Sure Your Signals Count
42
+
### How to Make Sure Your Signals Count
51
43
52
44
-**Use the scenario straight from the Hub without edits**
53
45
-**Keep auto-updates on** so hashes stay in sync
54
46
-**If you need custom behavior**, copy to a local scenario and use it, but understand those signals will be excluded from consensus
55
47
48
+
## Community Blocklist
49
+
50
+
Free users that are actively contributing to the network (sending valid signals on a regular basis) have their Security Engines automatically subscribed to the *Community Blocklist*.
51
+
52
+
The content of the blocklist is unique to each Security Engine, as it mirrors the behaviours they report. For example, suppose you're running the Security Engine on a web server with WordPress. In that case, you will receive IPs performing generic attacks against web servers *and* IPs engaging in wordpress-specific attacks.
53
+
54
+
The *Community Blocklist* contains 15 thousand malicious IP's based on your reported scenarios.
55
+
56
56
## Community Blocklist (Premium)
57
57
58
58
Paying users' Security Engine are automatically subscribed to the *Community Blocklist (Premium)*, which contains IPs that mirror their installed scenarios.
Copy file name to clipboardExpand all lines: crowdsec-docs/versioned_docs/version-v1.7/central_api/blocklist.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,44 +15,44 @@ The Community Blocklist is **only** available when using the Security Engine. To
15
15
:::
16
16
17
17
The rules are different for free and paying users:
18
-
- Free users that **do not regularly** contribute get the `Community Blocklist (Lite)`
19
-
- Free users that **do regularly** contribute get access to the `Community Blocklist`
18
+
- Free users that **do not regularly contribute valid signals** get the `Community Blocklist (Lite)`
19
+
- Free users that **do regularly contribute valid signals** get access to the `Community Blocklist`
20
20
- Paying users get access to the `Community Blocklist (Premium)`, even if they don't contribute
21
21
22
22
Regardless of the blocklist "tier" you have access to (`Lite`, `Community`, `Premium`), each Security Engine gets a tailored blocklist based on the kind of behavior you're trying to detect.
23
23
24
-
## Community Blocklist
25
-
26
-
Free users that are actively contributing to the network (sending signal on a regular basis) have their Security Engines automatically subscribed to the *Community Blocklist*.
27
-
28
-
The content of the blocklist is unique to each Security Engine, as it mirrors the behaviours they report. For example, suppose you're running the Security Engine on a web server with WordPress. In that case, you will receive IPs performing generic attacks against web servers *and* IPs engaging in wordpress-specific attacks.
29
-
30
-
The *Community Blocklist* contains 15 thousand malicious IP's based on your reported scenarios.
31
-
32
-
### What Counts as a Valid Signal?
24
+
## What Counts as a Valid Signal?
33
25
34
26
For your signals to be counted toward community contribution, they must meet specific criteria:
35
27
36
-
####What We Count
28
+
### What We Count
37
29
38
30
-**Signals generated by official CrowdSec scenarios from the Hub, unmodified**
39
31
- We verify this by comparing the scenario's content hash we publish with the hash your engine reports
40
32
41
-
####What We Do Not Count
33
+
### What We Do Not Count
42
34
43
35
-**Custom scenarios you write yourself**
44
36
-**Tainted or modified scenarios** (even small edits). We cannot reliably vet behavior once a scenario is changed, so the consensus engine ignores those signals
45
37
46
-
####Example
38
+
### Example
47
39
48
40
If you only run a honeypot with a scenario you have modified, your local alerts will still fire, but the consensus engine will not use those signals. You can then show up as "not actively contributing," even though you see activity locally.
49
41
50
-
####How to Make Sure Your Signals Count
42
+
### How to Make Sure Your Signals Count
51
43
52
44
-**Use the scenario straight from the Hub without edits**
53
45
-**Keep auto-updates on** so hashes stay in sync
54
46
-**If you need custom behavior**, copy to a local scenario and use it, but understand those signals will be excluded from consensus
55
47
48
+
## Community Blocklist
49
+
50
+
Free users that are actively contributing to the network (sending valid signals on a regular basis) have their Security Engines automatically subscribed to the *Community Blocklist*.
51
+
52
+
The content of the blocklist is unique to each Security Engine, as it mirrors the behaviours they report. For example, suppose you're running the Security Engine on a web server with WordPress. In that case, you will receive IPs performing generic attacks against web servers *and* IPs engaging in wordpress-specific attacks.
53
+
54
+
The *Community Blocklist* contains 15 thousand malicious IP's based on your reported scenarios.
55
+
56
56
## Community Blocklist (Premium)
57
57
58
58
Paying users' Security Engine are automatically subscribed to the *Community Blocklist (Premium)*, which contains IPs that mirror their installed scenarios.
0 commit comments