build-reject-ip-list.ts 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. // @ts-check
  2. import path from 'path';
  3. import { createRuleset } from './lib/create-file';
  4. import { fetchRemoteTextByLine, readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  5. import { task } from './trace';
  6. import { SHARED_DESCRIPTION } from './lib/constants';
  7. import { isProbablyIpv4, isProbablyIpv6 } from './lib/is-fast-ip';
  8. import { TTL, deserializeArray, fsFetchCache, serializeArray, createCacheKey } from './lib/cache-filesystem';
  9. import { fetchAssets } from './lib/fetch-assets';
  10. import { processLine } from './lib/process-line';
  11. import { appendArrayInPlace } from './lib/append-array-in-place';
  12. import { output } from './lib/misc';
  13. const cacheKey = createCacheKey(__filename);
  14. const BOGUS_NXDOMAIN_URL = 'https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf';
  15. const getBogusNxDomainIPsPromise = fsFetchCache.apply(
  16. cacheKey(BOGUS_NXDOMAIN_URL),
  17. async () => {
  18. const result: string[] = [];
  19. for await (const line of await fetchRemoteTextByLine(BOGUS_NXDOMAIN_URL)) {
  20. if (line.startsWith('bogus-nxdomain=')) {
  21. const ip = line.slice(15).trim();
  22. if (isProbablyIpv4(ip)) {
  23. result.push(`IP-CIDR,${ip}/32,no-resolve`);
  24. } else if (isProbablyIpv6(ip)) {
  25. result.push(`IP-CIDR6,${ip}/128,no-resolve`);
  26. }
  27. }
  28. }
  29. return result;
  30. },
  31. {
  32. ttl: TTL.ONE_WEEK(),
  33. serializer: serializeArray,
  34. deserializer: deserializeArray
  35. }
  36. );
  37. const BOTNET_FILTER_URL = 'https://curbengh.github.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt';
  38. const BOTNET_FILTER_MIRROR_URL = [
  39. 'https://curbengh.github.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  40. 'https://malware-filter.gitlab.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  41. 'https://malware-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt'
  42. ];
  43. const getBotNetFilterIPsPromise = fsFetchCache.apply(
  44. cacheKey(BOTNET_FILTER_URL),
  45. async () => {
  46. const text = await fetchAssets(BOTNET_FILTER_URL, BOTNET_FILTER_MIRROR_URL);
  47. return text.split('\n').reduce<string[]>((acc, cur) => {
  48. const ip = processLine(cur);
  49. if (ip) {
  50. if (isProbablyIpv4(ip)) {
  51. acc.push(`IP-CIDR,${ip}/32,no-resolve`);
  52. } else if (isProbablyIpv6(ip)) {
  53. acc.push(`IP-CIDR6,${ip}/128,no-resolve`);
  54. }
  55. }
  56. return acc;
  57. }, []);
  58. },
  59. {
  60. ttl: TTL.TWLVE_HOURS(),
  61. serializer: serializeArray,
  62. deserializer: deserializeArray
  63. }
  64. );
  65. const localRejectIPSourcesPromise = readFileIntoProcessedArray(path.resolve(__dirname, '../Source/ip/reject.conf'));
  66. export const buildRejectIPList = task(require.main === module, __filename)(async (span) => {
  67. const result = await localRejectIPSourcesPromise;
  68. const results = await Promise.all([
  69. span.traceChildPromise('get bogus nxdomain ips', getBogusNxDomainIPsPromise),
  70. span.traceChildPromise('get botnet ips', getBotNetFilterIPsPromise)
  71. ]);
  72. const bogusNxDomainIPs = results[0];
  73. const botNetIPs = results[1];
  74. appendArrayInPlace(result, bogusNxDomainIPs);
  75. appendArrayInPlace(result, botNetIPs);
  76. const description = [
  77. ...SHARED_DESCRIPTION,
  78. '',
  79. 'This file contains known addresses that are hijacking NXDOMAIN results returned by DNS servers, and botnet controller IPs.',
  80. '',
  81. 'Data from:',
  82. ' - https://github.com/felixonmars/dnsmasq-china-list',
  83. ' - https://github.com/curbengh/botnet-filter'
  84. ];
  85. return createRuleset(
  86. span,
  87. 'Sukka\'s Ruleset - Anti Bogus Domain',
  88. description,
  89. new Date(),
  90. result,
  91. 'ruleset',
  92. ...output('reject', 'ip')
  93. );
  94. });