mirror of
https://github.com/Kkevsterrr/geneva
synced 2024-11-11 13:20:32 +01:00
120 lines
3.5 KiB
Python
120 lines
3.5 KiB
Python
|
"""
|
||
|
Client
|
||
|
Run by the evaluator, tests a forbidden string from client to server
|
||
|
"""
|
||
|
|
||
|
import argparse
|
||
|
import logging
|
||
|
import os
|
||
|
import random
|
||
|
import socket
|
||
|
import sys
|
||
|
import time
|
||
|
import traceback
|
||
|
import urllib.request
|
||
|
|
||
|
import requests
|
||
|
|
||
|
socket.setdefaulttimeout(1)
|
||
|
|
||
|
import external_sites
|
||
|
import actions.utils
|
||
|
|
||
|
from plugins.plugin_client import ClientPlugin
|
||
|
|
||
|
BASEPATH = os.path.dirname(os.path.abspath(__file__))
|
||
|
|
||
|
|
||
|
class SMTPClient(ClientPlugin):
|
||
|
"""
|
||
|
Defines the SMTP client.
|
||
|
"""
|
||
|
name = "smtp"
|
||
|
|
||
|
def __init__(self, args):
|
||
|
"""
|
||
|
Initializes the SMTP client.
|
||
|
"""
|
||
|
ClientPlugin.__init__(self)
|
||
|
self.args = args
|
||
|
|
||
|
@staticmethod
|
||
|
def get_args(command):
|
||
|
"""
|
||
|
Defines required args for this plugin
|
||
|
"""
|
||
|
super_args = ClientPlugin.get_args(command)
|
||
|
parser = argparse.ArgumentParser(description='SMTP Client')
|
||
|
|
||
|
parser.add_argument('--server', action='store', help="server to connect to")
|
||
|
parser.add_argument('--smtp-request', action='store_true', help='Send an SMTP byte string that triggers censorship')
|
||
|
|
||
|
args, _ = parser.parse_known_args(command)
|
||
|
args = vars(args)
|
||
|
|
||
|
super_args.update(args)
|
||
|
return super_args
|
||
|
|
||
|
def run(self, args, logger, engine=None):
|
||
|
"""
|
||
|
Try to send a forbidden string
|
||
|
"""
|
||
|
fitness = 0
|
||
|
port = int(args["port"])
|
||
|
server = args["server"]
|
||
|
bad_word = args["bad_word"]
|
||
|
msg = bad_word
|
||
|
|
||
|
if args.get('smtp_request'):
|
||
|
msg = b'MAIL FROM: xiazai@upup.info \r\n'
|
||
|
|
||
|
if type(msg) == str:
|
||
|
msg = msg.encode()
|
||
|
|
||
|
try:
|
||
|
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||
|
client.settimeout(10)
|
||
|
client.connect((server, port))
|
||
|
|
||
|
tries = args.get("tries", 1)
|
||
|
for idx in range(0, int(tries)):
|
||
|
client.sendall(msg)
|
||
|
server_data = client.recv(1024)
|
||
|
logger.debug("Data recieved: %s", server_data.decode('utf-8', 'ignore'))
|
||
|
if server_data == b'k':
|
||
|
fitness += 100
|
||
|
else:
|
||
|
fitness -= 90
|
||
|
break
|
||
|
|
||
|
time.sleep(1)
|
||
|
client.close()
|
||
|
# If the fitness is 0, the strategy did something to corrupt/interfere with the socket
|
||
|
# sending/receiving, usually by just artificially closing the connection. This behavior
|
||
|
# should not be rewarded with a higher fitness
|
||
|
if fitness == 0:
|
||
|
fitness -= 100
|
||
|
except socket.timeout:
|
||
|
logger.debug("Client: Timeout")
|
||
|
fitness -= 100
|
||
|
except socket.error as exc:
|
||
|
# If the censor we're running against tears down connects via RSTs, we can punish RSTs as
|
||
|
# if the strategy did not harm the underlying connection. However, if the censor only injects
|
||
|
# traffic, not resets, we should punish RSTs harshly, as the strategy likely caused it.
|
||
|
|
||
|
if exc.errno == 104:
|
||
|
if args.get("injection_censor"):
|
||
|
fitness -= 110
|
||
|
else:
|
||
|
fitness -= 90
|
||
|
logger.debug("Client: Connection RST.")
|
||
|
else:
|
||
|
fitness -= 100
|
||
|
logger.exception("Socket error caught in client smtp test.")
|
||
|
except Exception:
|
||
|
logger.exception("Exception caught in client smtp test.")
|
||
|
fitness = -120
|
||
|
finally:
|
||
|
logger.debug("Client finished smtp test.")
|
||
|
return fitness * 4
|