Exemple #1
0
def blklst_Main(bstate):
    """ Read and process the IP blocklists.
    
    bstate              ptr to global container object
    
    This is the main driver fn for the IP blocklist downloads.
    
    This fn first does a sanity check of IP lookups using the binary tree.
    
    If the sanity check doesn't work, then the fn goes into a wait loop and
    bumps a retry counter. Usually sanity check failure is due to a partially
    constructed binary lookup tree.
    
    If the retry count is exceeded, then the fn calls the routeserver object to
    reinitialize / rebuild the binary tree using another routeserver.
    
    Once the sanity check works, then this fn initializes the Hostile IP
    dictionary and starts doing the IP blocklist downloads.
    """

    # Do a sanity check of IP lookups. This involves doing a lookup of a known
    # stable IP address to ensure that the lookup fn says that it truly is in
    # one of the ASNs being monitored.
    chk_as = blk_check_ip(cfg.sanity_ip, bstate.get_tree())

    # If the tree sanity check is ok, then reset the problem counter and start
    # doing the IP blocklist downloads.

    if chk_as == cfg.sanity_as:
        log.msg("Sanity check of IP address lookup OK")
        bstate.reset_ip_prob_cnt()

        # initialize the hostile IP dictionary
        my_dict = bstate.init_dict()

        # Now start reading the blocklists
        read_blklsts(bstate)
    else:
        # Have a sanity check error situation
        #
        # Note that at startup, this check will fail since the IP binary tree
        # hasn't been built yet. So the fn goes into a waiting loop, and bumps a
        # retry counter.
        #
        # If things are still not working after the max # retries, then we
        # will go on to another routeserver to reinitialize / rebuild the binary
        # tree. Hopefully this new attempt to build the tree will be more
        # successful.

        log.err(("Sanity check of IP address lookup "
                 "failed. IP: {0}, AS:{1}").format(cfg.sanity_ip, chk_as))

        # if have had too many consecutive sanity check errors for ip lookup
        if bstate.bump_ip_prob_cnt():

            # then go rebuild the IP binary tree using another routeserver
            blk_rteserv_read(bstate)
        else:
            # otherwise reschedule ourselves to check again in a few minutes
            reactor.callLater(cfg.ip_prob_retry, blklst_Main, bstate)
Exemple #2
0
def blklst_Main(bstate):
    """ Read and process the IP blocklists.
    
    bstate              ptr to global container object
    
    This is the main driver fn for the IP blocklist downloads.
    
    This fn first does a sanity check of IP lookups using the binary tree.
    
    If the sanity check doesn't work, then the fn goes into a wait loop and
    bumps a retry counter. Usually sanity check failure is due to a partially
    constructed binary lookup tree.
    
    If the retry count is exceeded, then the fn calls the routeserver object to
    reinitialize / rebuild the binary tree using another routeserver.
    
    Once the sanity check works, then this fn initializes the Hostile IP
    dictionary and starts doing the IP blocklist downloads.
    """

    # Do a sanity check of IP lookups. This involves doing a lookup of a known
    # stable IP address to ensure that the lookup fn says that it truly is in
    # one of the ASNs being monitored.
    chk_as = blk_check_ip(cfg.sanity_ip, bstate.get_tree())

    # If the tree sanity check is ok, then reset the problem counter and start
    # doing the IP blocklist downloads.

    if chk_as == cfg.sanity_as:
        log.msg("Sanity check of IP address lookup OK")
        bstate.reset_ip_prob_cnt()

        # initialize the hostile IP dictionary
        my_dict = bstate.init_dict()

        # Now start reading the blocklists
        read_blklsts(bstate)
    else:
        # Have a sanity check error situation
        #
        # Note that at startup, this check will fail since the IP binary tree
        # hasn't been built yet. So the fn goes into a waiting loop, and bumps a
        # retry counter.
        #
        # If things are still not working after the max # retries, then we
        # will go on to another routeserver to reinitialize / rebuild the binary
        # tree. Hopefully this new attempt to build the tree will be more
        # successful.

        log.err(("Sanity check of IP address lookup " "failed. IP: {0}, AS:{1}").format(cfg.sanity_ip, chk_as))

        # if have had too many consecutive sanity check errors for ip lookup
        if bstate.bump_ip_prob_cnt():

            # then go rebuild the IP binary tree using another routeserver
            blk_rteserv_read(bstate)
        else:
            # otherwise reschedule ourselves to check again in a few minutes
            reactor.callLater(cfg.ip_prob_retry, blklst_Main, bstate)
Exemple #3
0
def cymru_chk(bstate):
    """Submit the hostile IPs to a bulk lookup whois server in order to be sure
    we have the correct IP - ASN mapping.
    
    bstate      ptr to global data container object
    
    If there are dns lookups still being done, then this fn reschedules itself
    to check again in a while.
    
    Once all the dns lookups resutling from the blklist downloads have finished,
    then this fn enumerates the entire Hostile IP dictionary.  Each hostile IP
    is checked using the binary tree to determine if the IP is in a target ASN
    being monitored.
    
    A list is built of all these IPs for submission to the bulk whois lookup
    server. Attn is paid to ensure that the # of elts to be submitted does not
    exceed the daily maximum for this service.
    
    If there any hostile IPs found, the fn schedules the actual submission to
    the whois lookup service.
    """

    # if no dns lookups are in progress, then start the bulk whois lookup.
    # otherwise enter a wait loop until the dns lookups finally complete

    wk_serv = bstate.get_wrk_serv()

    # if dns lookups still being done
    if wk_serv.lkps_in_progress():

        # then wait for a bit
        reactor.callLater(cfg.cymru_delay, cymru_chk, bstate)
        return

    log.msg("\nbulk whois lookup is starting now")

    # loop thru the dictionary to find all the hostile IPs in the target ASNs
    # being monitored

    n = 0
    my_dict = bstate.get_dict()
    my_tree = bstate.get_tree()

    data = cfg.CYMRU_CMD_FIRST

    # loop through the entire Hostile IPs dictionary, IP by IP
    for myip in my_dict.list_all():
        xx1, xx2, org_tmp, desc_tmp = my_dict.list_elt(myip)

        # For each IP, check the binary tree to see if this IP is probably
        # in one of the ASNs being monitored.

        myas = blk_check_ip(myip, my_tree)

        if cfg.debug >= cfg.DEBUG_ON_LIST:
            log.msg("cymru_chk: dict: {0} {1} {2} {3}".format(myip, myas, org_tmp, desc_tmp))

        # if have a candidate hostile IP
        if myas != None:
            # and total # of IPs found does not exceed the daily max limit for
            # the whois server
            if n > cfg.cyrmu_max:
                break
            else:
                n += 1

            if cfg.debug == cfg.DEBUG_VERBOSE:
                log.msg("cymru_chk: {0} hostile ip: {1}".format(n, myip))

            # Then add this IP to the list for submission to cymru bulk whois
            # lookup.
            data = "".join([data, myip, " \n"])

    # if have found at least one hostile IP in the target ASNs being monitored,
    # then submit the file to the bulk whois to validate the IP - ASN mapping.
    # This will purify the data by ensuring that the IP - ASN mappings are as
    # accurate as possible.

    if n > 0:
        data = "".join([data, cfg.CYMRU_CMD_LAST])

        if cfg.debug == cfg.DEBUG_VERBOSE:
            log.msg("cymru_chk: cymru cmd file: \n{0}".format(data))

        # Schedule the tcp socket transmission to send the data to cymru.org

        d = cymru_get_whois(cfg.CYMRU_IP, cfg.CYMRU_PORT, data, bstate)
        d.addBoth(cymru_done, bstate)

    # otherwise no hostile IPs were found this time through
    else:
        wrk_serv = bstate.get_wrk_serv()
        wrk_serv.set_status("No hostile IPs found in ASNs of interest")
Exemple #4
0
def cymru_chk(bstate):
    """Submit the hostile IPs to a bulk lookup whois server in order to be sure
    we have the correct IP - ASN mapping.
    
    bstate      ptr to global data container object
    
    If there are dns lookups still being done, then this fn reschedules itself
    to check again in a while.
    
    Once all the dns lookups resutling from the blklist downloads have finished,
    then this fn enumerates the entire Hostile IP dictionary.  Each hostile IP
    is checked using the binary tree to determine if the IP is in a target ASN
    being monitored.
    
    A list is built of all these IPs for submission to the bulk whois lookup
    server. Attn is paid to ensure that the # of elts to be submitted does not
    exceed the daily maximum for this service.
    
    If there any hostile IPs found, the fn schedules the actual submission to
    the whois lookup service.
    """

    # if no dns lookups are in progress, then start the bulk whois lookup.
    # otherwise enter a wait loop until the dns lookups finally complete

    wk_serv = bstate.get_wrk_serv()

    # if dns lookups still being done
    if wk_serv.lkps_in_progress():

        # then wait for a bit
        reactor.callLater(cfg.cymru_delay, cymru_chk, bstate)
        return

    log.msg("\nbulk whois lookup is starting now")

    # loop thru the dictionary to find all the hostile IPs in the target ASNs
    # being monitored

    n = 0
    my_dict = bstate.get_dict()
    my_tree = bstate.get_tree()

    data = cfg.CYMRU_CMD_FIRST

    # loop through the entire Hostile IPs dictionary, IP by IP
    for myip in my_dict.list_all():
        xx1, xx2, org_tmp, desc_tmp = my_dict.list_elt(myip)

        # For each IP, check the binary tree to see if this IP is probably
        # in one of the ASNs being monitored.

        myas = blk_check_ip(myip, my_tree)

        if cfg.debug >= cfg.DEBUG_ON_LIST:
            log.msg("cymru_chk: dict: {0} {1} {2} {3}".format(
                myip, myas, org_tmp, desc_tmp))

        # if have a candidate hostile IP
        if myas != None:
            # and total # of IPs found does not exceed the daily max limit for
            # the whois server
            if n > cfg.cyrmu_max:
                break
            else:
                n += 1

            if cfg.debug == cfg.DEBUG_VERBOSE:
                log.msg("cymru_chk: {0} hostile ip: {1}".format(n, myip))

            # Then add this IP to the list for submission to cymru bulk whois
            # lookup.
            data = "".join([data, myip, " \n"])

    # if have found at least one hostile IP in the target ASNs being monitored,
    # then submit the file to the bulk whois to validate the IP - ASN mapping.
    # This will purify the data by ensuring that the IP - ASN mappings are as
    # accurate as possible.

    if n > 0:
        data = "".join([data, cfg.CYMRU_CMD_LAST])

        if cfg.debug == cfg.DEBUG_VERBOSE:
            log.msg("cymru_chk: cymru cmd file: \n{0}".format(data))

        # Schedule the tcp socket transmission to send the data to cymru.org

        d = cymru_get_whois(cfg.CYMRU_IP, cfg.CYMRU_PORT, data, bstate)
        d.addBoth(cymru_done, bstate)

    # otherwise no hostile IPs were found this time through
    else:
        wrk_serv = bstate.get_wrk_serv()
        wrk_serv.set_status("No hostile IPs found in ASNs of interest")