build-reject-ip-list.ts 3.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283
  1. // @ts-check
  2. import path from 'node:path';
  3. import { createReadlineInterfaceFromResponse, readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  4. import { task } from './trace';
  5. import { SHARED_DESCRIPTION } from './constants/description';
  6. import { compareAndWriteFile } from './lib/create-file';
  7. import { OUTPUT_INTERNAL_DIR, SOURCE_DIR } from './constants/dir';
  8. import { $$fetch } from './lib/fetch-retry';
  9. import { fetchAssets } from './lib/fetch-assets';
  10. import { fastIpVersion } from './lib/misc';
  11. import { AUGUST_ASN, HUIZE_ASN } from '../Source/ip/badboy_asn';
  12. import { RulesetOutput } from './lib/rules/ruleset';
  13. const BOGUS_NXDOMAIN_URL = 'https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf';
  14. const getBogusNxDomainIPsPromise: Promise<[ipv4: string[], ipv6: string[]]> = $$fetch(BOGUS_NXDOMAIN_URL).then(async (resp) => {
  15. const ipv4: string[] = [];
  16. const ipv6: string[] = [];
  17. for await (const line of createReadlineInterfaceFromResponse(resp, true)) {
  18. if (line.startsWith('bogus-nxdomain=')) {
  19. const ip = line.slice(15).trim();
  20. const v = fastIpVersion(ip);
  21. if (v === 4) {
  22. ipv4.push(ip);
  23. } else if (v === 6) {
  24. ipv6.push(ip);
  25. }
  26. }
  27. }
  28. return [ipv4, ipv6] as const;
  29. });
  30. const BOTNET_FILTER_URL = 'https://malware-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt';
  31. const BOTNET_FILTER_MIRROR_URL = [
  32. 'https://botnet-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt',
  33. 'https://malware-filter.gitlab.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  34. 'https://malware-filter.gitlab.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt'
  35. // 'https://curbengh.github.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  36. // https://curbengh.github.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt
  37. ];
  38. const getBotNetFilterIPsPromise: Promise<[ipv4: string[], ipv6: string[]]> = fetchAssets(BOTNET_FILTER_URL, BOTNET_FILTER_MIRROR_URL, true).then(arr => arr.reduce<[ipv4: string[], ipv6: string[]]>((acc, ip) => {
  39. const v = fastIpVersion(ip);
  40. if (v === 4) {
  41. acc[0].push(ip);
  42. } else if (v === 6) {
  43. acc[1].push(ip);
  44. }
  45. return acc;
  46. }, [[], []]));
  47. const readLocalRejectIpListPromise = readFileIntoProcessedArray(path.resolve(SOURCE_DIR, 'ip/reject.conf'));
  48. export const buildRejectIPList = task(require.main === module, __filename)(async (span) => {
  49. const [bogusNxDomainIPs, botNetIPs] = await Promise.all([
  50. span.traceChildPromise('get bogus nxdomain ips', getBogusNxDomainIPsPromise),
  51. span.traceChildPromise('get botnet ips', getBotNetFilterIPsPromise)
  52. ]);
  53. return Promise.all([
  54. new RulesetOutput(span, 'reject', 'ip')
  55. .withTitle('Sukka\'s Ruleset - Anti Bogus Domain')
  56. .withDescription([
  57. ...SHARED_DESCRIPTION,
  58. '',
  59. 'This file contains known addresses that are hijacking NXDOMAIN results returned by DNS servers, and botnet controller IPs.',
  60. '',
  61. 'Data from:',
  62. ' - https://github.com/felixonmars/dnsmasq-china-list',
  63. ' - https://github.com/curbengh/botnet-filter'
  64. ])
  65. .addFromRuleset(readLocalRejectIpListPromise)
  66. .bulkAddCIDR4NoResolve(bogusNxDomainIPs[0])
  67. .bulkAddCIDR6NoResolve(bogusNxDomainIPs[1])
  68. .bulkAddCIDR4NoResolve(botNetIPs[0])
  69. .bulkAddCIDR6NoResolve(botNetIPs[1])
  70. .bulkAddIPASN(AUGUST_ASN)
  71. .bulkAddIPASN(HUIZE_ASN)
  72. .write(),
  73. compareAndWriteFile(span, [AUGUST_ASN.join(' ')], path.join(OUTPUT_INTERNAL_DIR, 'august_asn.txt')),
  74. compareAndWriteFile(span, [HUIZE_ASN.join(' ')], path.join(OUTPUT_INTERNAL_DIR, 'huize_asn.txt'))
  75. ]);
  76. });