geneva/plugins/smtp/client.py

120 lines
3.5 KiB
Python

"""
Client
Run by the evaluator, tests a forbidden string from client to server
"""
import argparse
import logging
import os
import random
import socket
import sys
import time
import traceback
import urllib.request
import requests
socket.setdefaulttimeout(1)
import external_sites
import actions.utils
from plugins.plugin_client import ClientPlugin
BASEPATH = os.path.dirname(os.path.abspath(__file__))
class SMTPClient(ClientPlugin):
"""
Defines the SMTP client.
"""
name = "smtp"
def __init__(self, args):
"""
Initializes the SMTP client.
"""
ClientPlugin.__init__(self)
self.args = args
@staticmethod
def get_args(command):
"""
Defines required args for this plugin
"""
super_args = ClientPlugin.get_args(command)
parser = argparse.ArgumentParser(description='SMTP Client')
parser.add_argument('--server', action='store', help="server to connect to")
parser.add_argument('--smtp-request', action='store_true', help='Send an SMTP byte string that triggers censorship')
args, _ = parser.parse_known_args(command)
args = vars(args)
super_args.update(args)
return super_args
def run(self, args, logger, engine=None):
"""
Try to send a forbidden string
"""
fitness = 0
port = int(args["port"])
server = args["server"]
bad_word = args["bad_word"]
msg = bad_word
if args.get('smtp_request'):
msg = b'MAIL FROM: xiazai@upup.info \r\n'
if type(msg) == str:
msg = msg.encode()
try:
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
client.settimeout(10)
client.connect((server, port))
tries = args.get("tries", 1)
for idx in range(0, int(tries)):
client.sendall(msg)
server_data = client.recv(1024)
logger.debug("Data recieved: %s", server_data.decode('utf-8', 'ignore'))
if server_data == b'k':
fitness += 100
else:
fitness -= 90
break
time.sleep(1)
client.close()
# If the fitness is 0, the strategy did something to corrupt/interfere with the socket
# sending/receiving, usually by just artificially closing the connection. This behavior
# should not be rewarded with a higher fitness
if fitness == 0:
fitness -= 100
except socket.timeout:
logger.debug("Client: Timeout")
fitness -= 100
except socket.error as exc:
# If the censor we're running against tears down connects via RSTs, we can punish RSTs as
# if the strategy did not harm the underlying connection. However, if the censor only injects
# traffic, not resets, we should punish RSTs harshly, as the strategy likely caused it.
if exc.errno == 104:
if args.get("injection_censor"):
fitness -= 110
else:
fitness -= 90
logger.debug("Client: Connection RST.")
else:
fitness -= 100
logger.exception("Socket error caught in client smtp test.")
except Exception:
logger.exception("Exception caught in client smtp test.")
fitness = -120
finally:
logger.debug("Client finished smtp test.")
return fitness * 4