geneva/censors/censor6.py

64 lines
2.3 KiB
Python

"""
Censor 6 is a IP dropping TCB Teardown censor. It tears down the TCB on any
FIN or RST packet.
Does not check if the ports are correct for the FIN/RST.
"""
import layers.packet
import logging
logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
from scapy.all import IP, TCP
from censors.censor import Censor
class Censor6(Censor):
def __init__(self, environment_id, forbidden, log_dir, log_level, port, queue_num):
Censor.__init__(self, environment_id, log_dir, log_level, port, queue_num)
self.forbidden = forbidden
self.tcb = 0
self.drop_all_from = None
def check_censor(self, packet, verbose=False):
"""
Check if the censor should run against this packet. Returns true or false.
"""
try:
self.logger.debug("Inbound packet to censor: " + layers.packet.Packet._str_packet(packet))
if self.drop_all_from == packet["IP"].src:
self.logger.debug("Dropping all from this IP %s..." % self.drop_all_from)
return True
# Only censor TCP packets for now
if "TCP" not in packet:
return False
# Some stacks send RA to tear down a connection
if packet["TCP"].sprintf('%TCP.flags%') in ["R", "RA", "F"]:
self.tcb = None
self.logger.debug(("Tearing down TCB on packet " + layers.packet.Packet._str_packet(packet)))
return False
if self.tcb is None:
self.logger.debug("Ignoring packet: " + layers.packet.Packet._str_packet(packet))
return False
# Check if any forbidden words appear in the packet payload
for keyword in self.forbidden:
if keyword in self.get_payload(packet):
self.logger.debug("Packet triggered censor: " + layers.packet.Packet._str_packet(packet))
return True
return False
except Exception:
self.logger.exception("Exception caught by Censor 6")
return False
def censor(self, scapy_packet):
"""
Marks this IP to be dropped in the future and drops this packet.
"""
self.drop_all_from = scapy_packet["IP"].src
self.logger.debug("Marking IP %s for dropping..." % self.drop_all_from)
return "drop"