mirror of
https://github.com/ntop/ntopng.git
synced 2026-05-03 09:20:10 +00:00
1010 lines
38 KiB
C++
1010 lines
38 KiB
C++
/*
|
|
*
|
|
* (C) 2013-23 - ntop.org
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software Foundation,
|
|
* Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*
|
|
*/
|
|
|
|
#ifndef _HOST_H_
|
|
#define _HOST_H_
|
|
|
|
#include "ntop_includes.h"
|
|
|
|
class HostAlert;
|
|
|
|
class Host : public GenericHashEntry,
|
|
public HostAlertableEntity,
|
|
public Score,
|
|
public HostChecksStatus {
|
|
protected:
|
|
IpAddress ip;
|
|
Mac *mac;
|
|
char *asname, *blacklist_name;
|
|
|
|
struct {
|
|
Fingerprint ja3;
|
|
Fingerprint hassh;
|
|
} fingerprints;
|
|
|
|
u_int16_t host_pool_id, host_services_bitmap;
|
|
u_int16_t vlan_id;
|
|
u_int16_t observationPointId;
|
|
u_int8_t num_remote_access;
|
|
HostStats *stats, *stats_shadow;
|
|
time_t last_stats_reset;
|
|
std::atomic<u_int32_t> active_alerted_flows;
|
|
u_int8_t view_interface_mac[6];
|
|
|
|
/*
|
|
The check below makes sense for TCP as with UDP unidirectional flows
|
|
(e.g. RTP or syslog) could be legitimate. However in general UDP flows
|
|
have to be bidirectional too and thus setting a higher (than TCP) threshold
|
|
should also spot scanners
|
|
*/
|
|
struct ndpi_hll outgoing_hosts_tcp_udp_port_with_no_tx_hll,
|
|
incoming_hosts_tcp_udp_port_with_no_tx_hll;
|
|
|
|
/* Host data: update Host::deleteHostData when adding new fields */
|
|
struct {
|
|
char *mdns /* name from a MDNS reply of any type */,
|
|
*mdns_txt /* name from a TXT MDNS reply after "nm=" field (most
|
|
accurate) */
|
|
,
|
|
*mdns_info /* name from a TXT MDNS reply */;
|
|
char *resolved; /* The name as resolved by ntopng DNS requests */
|
|
char *netbios; /* The NetBIOS name */
|
|
char *tls; /* The TLS SNI or the name as dissected from other
|
|
TLS-transported protocols */
|
|
char *http; /* The HTTP Host: name */
|
|
char *server_name; /* TLS/HTTP or other protocols requesting the host with a
|
|
specific server name */
|
|
} names;
|
|
|
|
char *ssdpLocation;
|
|
|
|
/* END Host data: */
|
|
|
|
/* Counters used by host alerts */
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} syn_flood;
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} flow_flood;
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} icmp_flood;
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} dns_flood;
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} snmp_flood;
|
|
|
|
struct {
|
|
u_int32_t syn_sent_last_min, synack_recvd_last_min; /* (attacker) */
|
|
u_int32_t syn_recvd_last_min, synack_sent_last_min; /* (victim) */
|
|
} syn_scan;
|
|
|
|
struct {
|
|
u_int32_t fin_sent_last_min, finack_recvd_last_min; /* (attacker) */
|
|
u_int32_t fin_recvd_last_min, finack_sent_last_min; /* (victim) */
|
|
} fin_scan;
|
|
|
|
struct {
|
|
AlertCounter *attacker_counter, *victim_counter;
|
|
} rst_scan;
|
|
|
|
std::atomic<u_int32_t> num_active_flows_as_client,
|
|
num_active_flows_as_server; /* Need atomic as inc/dec done on different
|
|
threads */
|
|
u_int32_t asn;
|
|
|
|
struct {
|
|
u_int32_t as_client /* this host contacted a blacklisted host */,
|
|
as_server /* a blacklisted host contacted me */;
|
|
u_int32_t checkpoint_as_client, checkpoint_as_server;
|
|
} num_blacklisted_flows;
|
|
|
|
AutonomousSystem *as;
|
|
Country *country;
|
|
VLAN *vlan;
|
|
ObservationPoint *obs_point;
|
|
ndpi_bitmap *tcp_udp_contacted_ports_no_tx; /* Ports of this host that have
|
|
been contacted by peers */
|
|
OperatingSystem *os; /* Pointer to an instance of operating system, used
|
|
internally to handle operating system statistics */
|
|
OSType os_type; /* Operating system type, equivalent to os->get_os_type(),
|
|
used by operating system setters and getters */
|
|
|
|
struct {
|
|
u_int32_t numIngressFlows, numEgressFlows;
|
|
} unidirectionalTCPUDPFlows;
|
|
|
|
/*
|
|
TCP flows with SYN only, resets or unidirectional UDP flows not sent to
|
|
broad/multicast addresees Counter reset every minute
|
|
*/
|
|
u_int32_t num_incomplete_flows;
|
|
|
|
struct {
|
|
u_int8_t alertTriggered : 1, hostAlreadyEvaluated : 1,
|
|
checkAlreadyExecutedOnce : 1, _not_used : 7;
|
|
u_int8_t score;
|
|
u_int32_t skip_until_epoch;
|
|
char *msg;
|
|
} customHostAlert;
|
|
|
|
Mutex m;
|
|
u_int32_t mac_last_seen;
|
|
u_int8_t num_resolve_attempts;
|
|
time_t nextResolveAttempt;
|
|
|
|
u_int32_t device_ip;
|
|
|
|
#ifdef NTOPNG_PRO
|
|
TrafficShaper **host_traffic_shapers;
|
|
bool has_blocking_quota, has_blocking_shaper;
|
|
#endif
|
|
u_int16_t hidden_from_top : 1, is_in_broadcast_domain : 1, is_dhcp_host : 1,
|
|
is_crawler_bot_scanner : 1, is_blacklisted : 1, is_rx_only : 1,
|
|
more_then_one_device : 1, stats_reset_requested : 1,
|
|
name_reset_requested : 1, data_delete_requested : 1, prefs_loaded : 1,
|
|
deferred_init : 1, _notused : 5;
|
|
|
|
/* Alert exclusion handling */
|
|
#ifdef NTOPNG_PRO
|
|
AlertExclusionsInfo alert_exclusions;
|
|
#endif
|
|
time_t disabled_alerts_tstamp;
|
|
|
|
#ifndef HAVE_NEDGE
|
|
ListeningPorts *listening_ports, *listening_ports_shadow;
|
|
#endif
|
|
|
|
void initialize(Mac *_mac, u_int16_t _vlan_id,
|
|
u_int16_t observation_point_id);
|
|
void inlineSetOS(OSType _os);
|
|
bool statsResetRequested();
|
|
void checkStatsReset();
|
|
#ifdef HAVE_NEDGE
|
|
TrafficShaper *get_shaper(ndpi_protocol ndpiProtocol, bool isIngress);
|
|
#endif
|
|
#ifdef NTOPNG_PRO
|
|
void get_quota(u_int16_t protocol, u_int64_t *bytes_quota,
|
|
u_int32_t *secs_quota, u_int32_t *schedule_bitmap,
|
|
bool *is_category);
|
|
#endif
|
|
void lua_get_names(lua_State *const vm, char *const buf, ssize_t buf_size);
|
|
void luaStrTableEntryLocked(lua_State *const vm, const char *entry_name,
|
|
const char *entry);
|
|
void freeHostNames();
|
|
void resetHostNames();
|
|
virtual void deleteHostData();
|
|
char *get_mac_based_tskey(Mac *mac, char *buf, size_t bufsize,
|
|
bool skip_prefix = false);
|
|
bool isValidHostName(const char *name);
|
|
virtual void deferredInitialization();
|
|
|
|
public:
|
|
Host(NetworkInterface *_iface, char *ipAddress, u_int16_t _u_int16_t,
|
|
u_int16_t observation_point_id);
|
|
Host(NetworkInterface *_iface, Mac *_mac, u_int16_t _u_int16_t,
|
|
u_int16_t observation_point_id, IpAddress *_ip);
|
|
|
|
virtual ~Host();
|
|
|
|
virtual bool isLocalHost() const { return (false); };
|
|
virtual bool isLocalUnicastHost() const { return (false); };
|
|
virtual bool isSystemHost() const { return (false); };
|
|
inline bool isBroadcastDomainHost() const {
|
|
return (is_in_broadcast_domain ? true : false);
|
|
};
|
|
inline bool serializeByMac() const {
|
|
return (isLocalHost() && iface->serializeLbdHostsAsMacs());
|
|
}
|
|
inline bool isDHCPHost() const { return (is_dhcp_host ? true : false); };
|
|
inline bool isCrawlerBotScannerHost() const {
|
|
return (is_crawler_bot_scanner ? true : false);
|
|
};
|
|
inline void setCrawlerBotScannerHost() { is_crawler_bot_scanner = 1; };
|
|
inline void setBroadcastDomainHost() { is_in_broadcast_domain = 1; };
|
|
|
|
inline void setLastDeviceIp(u_int32_t ip) {
|
|
if (ip && ip != device_ip) {
|
|
if (device_ip) more_then_one_device = true;
|
|
device_ip = ip;
|
|
}
|
|
};
|
|
inline u_int32_t getLastDeviceIp() { return (device_ip); };
|
|
void blacklistedStatsResetRequested();
|
|
inline u_int32_t getCheckpointBlacklistedAsCli() const {
|
|
return (num_blacklisted_flows.checkpoint_as_client);
|
|
}
|
|
inline u_int32_t getCheckpointBlacklistedAsSrv() const {
|
|
return (num_blacklisted_flows.checkpoint_as_server);
|
|
}
|
|
inline u_int32_t getNumBlacklistedAsCli() const {
|
|
return (num_blacklisted_flows.as_client);
|
|
}
|
|
inline u_int32_t getNumBlacklistedAsSrv() const {
|
|
return (num_blacklisted_flows.as_server);
|
|
}
|
|
inline u_int32_t getNumBlacklistedAsCliReset() const {
|
|
return getNumBlacklistedAsCli() - getCheckpointBlacklistedAsCli();
|
|
}
|
|
inline u_int32_t getNumBlacklistedAsSrvReset() const {
|
|
return getNumBlacklistedAsSrv() - getCheckpointBlacklistedAsSrv();
|
|
}
|
|
|
|
inline bool isDhcpServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_DHCP_SERVER));
|
|
}
|
|
void setDhcpServer(char *name);
|
|
|
|
inline bool isDnsServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_DNS_SERVER));
|
|
}
|
|
void setDnsServer(char *name);
|
|
|
|
inline bool isSmtpServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_SMTP_SERVER));
|
|
}
|
|
void setSmtpServer(char *name);
|
|
|
|
inline bool isImapServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_IMAP_SERVER));
|
|
}
|
|
void setImapServer(char *name);
|
|
|
|
inline bool isPopServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_POP_SERVER));
|
|
}
|
|
void setPopServer(char *name);
|
|
|
|
inline bool isNtpServer() const {
|
|
return (host_services_bitmap & (1 << HOST_IS_NTP_SERVER));
|
|
}
|
|
inline bool isHiddenFromTop() const {
|
|
return (hidden_from_top == 1);
|
|
}
|
|
void setNtpServer(char *name);
|
|
|
|
inline u_int16_t getServicesMap() { return (host_services_bitmap); }
|
|
/*
|
|
NOTE: update the fucntion below when a new isXXXServer is added
|
|
Return true if this host is a server for known protocols
|
|
*/
|
|
inline bool isProtocolServer() const {
|
|
return (isDhcpServer() || isDnsServer() || isSmtpServer() || isNtpServer());
|
|
}
|
|
inline void incrRemoteAccess() {
|
|
if (num_remote_access == 255)
|
|
num_remote_access = 0;
|
|
else
|
|
num_remote_access++;
|
|
};
|
|
inline void decrRemoteAccess() {
|
|
if (num_remote_access == 0)
|
|
num_remote_access = 0;
|
|
else
|
|
num_remote_access--;
|
|
};
|
|
inline u_int8_t getRemoteAccess() { return (num_remote_access); };
|
|
|
|
bool isBroadcastHost() const {
|
|
return (ip.isBroadcastAddress() || (mac && mac->isBroadcast()));
|
|
}
|
|
bool isMulticastHost() const { return (ip.isMulticastAddress()); }
|
|
|
|
char *printMask(char *str, u_int str_len) {
|
|
return ip.printMask(str, str_len, isLocalHost());
|
|
};
|
|
inline nDPIStats *get_ndpi_stats() const { return (stats->getnDPIStats()); };
|
|
|
|
inline bool isChildSafe() const {
|
|
#ifdef NTOPNG_PRO
|
|
return (iface->getHostPools()->isChildrenSafePool(host_pool_id));
|
|
#else
|
|
return (false);
|
|
#endif
|
|
};
|
|
|
|
inline bool forgeGlobalDns() {
|
|
#ifdef NTOPNG_PRO
|
|
return (iface->getHostPools()->forgeGlobalDns(host_pool_id));
|
|
#else
|
|
return (false);
|
|
#endif
|
|
};
|
|
|
|
virtual HostStats *allocateStats() { return (new HostStats(this)); };
|
|
|
|
/* Override Score members to perform incs/decs on the host and also on its
|
|
* members, e.g., AS. VLAN, Country. */
|
|
u_int16_t incScoreValue(u_int16_t score_incr, ScoreCategory score_category,
|
|
bool as_client);
|
|
u_int16_t decScoreValue(u_int16_t score_decr, ScoreCategory score_category,
|
|
bool as_client);
|
|
|
|
inline u_int16_t get_host_pool() const { return (host_pool_id); };
|
|
inline u_int16_t get_raw_vlan_id() const {
|
|
return (vlan_id);
|
|
}; /* u_int16_t + observationPointId */
|
|
inline u_int16_t get_vlan_id() const { return (vlan_id); };
|
|
inline u_int16_t get_observation_point_id() const {
|
|
return (observationPointId);
|
|
};
|
|
|
|
char *get_name(char *buf, u_int buf_len, bool force_resolution_if_not_found);
|
|
|
|
inline void incSentTcp(u_int32_t ooo_pkts, u_int32_t retr_pkts,
|
|
u_int32_t lost_pkts, u_int32_t keep_alive_pkts) {
|
|
if (ooo_pkts) stats->incOOOSent(ooo_pkts);
|
|
if (retr_pkts) stats->incRetxSent(retr_pkts);
|
|
if (lost_pkts) stats->incLostSent(lost_pkts);
|
|
if (keep_alive_pkts) stats->incKeepAliveSent(keep_alive_pkts);
|
|
}
|
|
|
|
inline void incRcvdTcp(u_int32_t ooo_pkts, u_int32_t retr_pkts,
|
|
u_int32_t lost_pkts, u_int32_t keep_alive_pkts) {
|
|
if (ooo_pkts) stats->incOOORcvd(ooo_pkts);
|
|
if (retr_pkts) stats->incRetxRcvd(retr_pkts);
|
|
if (lost_pkts) stats->incLostRcvd(lost_pkts);
|
|
if (keep_alive_pkts) stats->incKeepAliveRcvd(keep_alive_pkts);
|
|
}
|
|
|
|
inline void incSentStats(u_int num_pkts, u_int pkt_len) {
|
|
stats->incSentStats(num_pkts, pkt_len);
|
|
};
|
|
inline void incRecvStats(u_int num_pkts, u_int pkt_len) {
|
|
stats->incRecvStats(num_pkts, pkt_len);
|
|
};
|
|
|
|
inline void incDSCPStats(u_int8_t ds, u_int64_t sent_packets,
|
|
u_int64_t sent_bytes, u_int64_t rcvd_packets,
|
|
u_int64_t rcvd_bytes) {
|
|
stats->getDSCPStats()->incStats(ds, sent_packets, sent_bytes, rcvd_packets,
|
|
rcvd_bytes);
|
|
}
|
|
|
|
virtual int16_t get_local_network_id() const = 0;
|
|
virtual HTTPstats *getHTTPstats() { return (NULL); };
|
|
virtual DnsStats *getDNSstats() { return (NULL); };
|
|
virtual ICMPstats *getICMPstats() { return (NULL); };
|
|
inline u_int8_t getConsecutiveHighScore() {
|
|
return (stats->getConsecutiveHighScore());
|
|
};
|
|
inline void resetConsecutiveHighScore() {
|
|
stats->resetConsecutiveHighScore();
|
|
};
|
|
inline void incrConsecutiveHighScore() { stats->incrConsecutiveHighScore(); };
|
|
inline void set_ipv4(u_int32_t _ipv4) { ip.set(_ipv4); };
|
|
inline void set_ipv6(struct ndpi_in6_addr *_ipv6) { ip.set(_ipv6); };
|
|
inline u_int32_t key() { return (ip.key()); };
|
|
inline IpAddress *get_ip() { return (&ip); };
|
|
inline bool isIPv4() const { return ip.isIPv4(); };
|
|
inline bool isIPv6() const { return ip.isIPv6(); };
|
|
void set_mac(Mac *m);
|
|
inline bool isBlacklisted() const { return (is_blacklisted); };
|
|
inline void blacklistHost() { is_blacklisted = true; };
|
|
void reloadHostBlacklist();
|
|
inline const u_int8_t *const get_mac() const {
|
|
return (mac ? mac->get_mac() : NULL);
|
|
}
|
|
inline Mac *getMac() const { return (mac); }
|
|
inline DeviceType getDeviceType() const {
|
|
Mac *m = mac;
|
|
return (isBroadcastDomainHost() && m ? m->getDeviceType() : device_unknown);
|
|
}
|
|
char *getResolvedName(char *const buf, ssize_t buf_len);
|
|
char *getServerName(char *const buf, ssize_t buf_len);
|
|
char *getMDNSName(char *const buf, ssize_t buf_len);
|
|
char *getMDNSTXTName(char *const buf, ssize_t buf_len);
|
|
char *getMDNSInfo(char *const buf, ssize_t buf_len);
|
|
char *getNetbiosName(char *const buf, ssize_t buf_len);
|
|
char *getTLSName(char *const buf, ssize_t buf_len);
|
|
char *getHTTPName(char *const buf, ssize_t buf_len);
|
|
#ifdef HAVE_NEDGE
|
|
inline TrafficShaper *get_ingress_shaper(ndpi_protocol ndpiProtocol) {
|
|
return (get_shaper(ndpiProtocol, true));
|
|
}
|
|
inline TrafficShaper *get_egress_shaper(ndpi_protocol ndpiProtocol) {
|
|
return (get_shaper(ndpiProtocol, false));
|
|
}
|
|
#endif
|
|
#ifdef NTOPNG_PRO
|
|
inline void resetQuotaStats() { stats->resetQuotaStats(); }
|
|
bool checkQuota(ndpi_protocol ndpiProtocol, L7PolicySource_t *quota_source,
|
|
const struct tm *now);
|
|
inline bool hasBlockedTraffic() {
|
|
return has_blocking_quota || has_blocking_shaper;
|
|
};
|
|
inline void resetBlockedTrafficStatus() {
|
|
has_blocking_quota = has_blocking_shaper = false;
|
|
};
|
|
void luaUsedQuotas(lua_State *vm);
|
|
|
|
inline void incQuotaEnforcementStats(u_int32_t when, u_int16_t ndpi_proto,
|
|
u_int64_t sent_packets,
|
|
u_int64_t sent_bytes,
|
|
u_int64_t rcvd_packets,
|
|
u_int64_t rcvd_bytes) {
|
|
stats->incQuotaEnforcementStats(when, ndpi_proto, sent_packets, sent_bytes,
|
|
rcvd_packets, rcvd_bytes);
|
|
}
|
|
|
|
inline void incQuotaEnforcementCategoryStats(
|
|
u_int32_t when, ndpi_protocol_category_t category_id,
|
|
u_int64_t sent_bytes, u_int64_t rcvd_bytes) {
|
|
stats->incQuotaEnforcementCategoryStats(when, category_id, sent_bytes,
|
|
rcvd_bytes);
|
|
}
|
|
#endif
|
|
|
|
inline u_int64_t getNumBytesSent() const {
|
|
return (stats->getNumBytesSent());
|
|
}
|
|
inline u_int64_t getNumBytesRcvd() const {
|
|
return (stats->getNumBytesRcvd());
|
|
}
|
|
|
|
inline u_int64_t getNumBytesTCPSent() const {
|
|
return (stats->getL4Stats()->getTCPSent()->getNumBytes());
|
|
}
|
|
inline u_int64_t getNumBytesTCPRcvd() const {
|
|
return (stats->getL4Stats()->getTCPRcvd()->getNumBytes());
|
|
}
|
|
inline u_int64_t getNumBytesUDPSent() const {
|
|
return (stats->getL4Stats()->getUDPSent()->getNumBytes());
|
|
}
|
|
inline u_int64_t getNumBytesUDPRcvd() const {
|
|
return (stats->getL4Stats()->getUDPRcvd()->getNumBytes());
|
|
}
|
|
|
|
inline u_int64_t getNumPktsSent() const { return (stats->getNumPktsSent()); }
|
|
inline u_int64_t getNumPktsRcvd() const { return (stats->getNumPktsRcvd()); }
|
|
inline u_int64_t getNumDroppedFlows() {
|
|
return (stats->getNumDroppedFlows());
|
|
}
|
|
inline u_int64_t getNumBytes() { return (stats->getNumBytes()); }
|
|
inline float getBytesThpt() { return (stats->getBytesThpt()); }
|
|
inline float getPacketsThpt() { return (stats->getPacketsThpt()); }
|
|
inline void incNumDroppedFlows() { stats->incNumDroppedFlows(); }
|
|
|
|
inline u_int32_t get_asn() const { return (asn); }
|
|
inline char *get_asname() const { return (asname); }
|
|
inline AutonomousSystem *get_as() const { return (as); }
|
|
|
|
inline ObservationPoint *get_obs_point() const { return (obs_point); }
|
|
|
|
inline bool isPrivateHost() const { return (ip.isPrivateAddress()); }
|
|
bool isLocalInterfaceAddress();
|
|
char *get_visual_name(char *buf, u_int buf_len);
|
|
virtual char *get_string_key(char *buf, u_int buf_len) const {
|
|
return (ip.print(buf, buf_len));
|
|
};
|
|
char *get_hostkey(char *buf, u_int buf_len, bool force_vlan = false);
|
|
char *get_tskey(char *buf, size_t bufsize);
|
|
|
|
bool is_hash_entry_state_idle_transition_ready();
|
|
void periodic_stats_update(const struct timeval *tv);
|
|
virtual void custom_periodic_stats_update(const struct timeval *tv) { ; }
|
|
|
|
virtual void lua(lua_State *vm, AddressTree *ptree, bool host_details,
|
|
bool verbose, bool returnHost, bool asListElement);
|
|
|
|
void lua_get_bins(lua_State *vm) const;
|
|
void lua_get_ip(lua_State *vm) const;
|
|
void lua_get_localhost_info(lua_State *vm) const;
|
|
void lua_get_mac(lua_State *vm) const;
|
|
void lua_get_host_pool(lua_State *vm) const;
|
|
void lua_get_as(lua_State *vm) const;
|
|
void lua_get_bytes(lua_State *vm) const;
|
|
void lua_get_app_bytes(lua_State *vm, u_int app_id) const;
|
|
void lua_get_cat_bytes(lua_State *vm,
|
|
ndpi_protocol_category_t category_id) const;
|
|
void lua_get_packets(lua_State *vm) const;
|
|
void lua_get_time(lua_State *vm) const;
|
|
void lua_get_syn_flood(lua_State *vm) const;
|
|
void lua_get_flow_flood(lua_State *vm) const;
|
|
void lua_get_services(lua_State *vm) const;
|
|
void lua_get_syn_scan(lua_State *vm) const;
|
|
void lua_get_fin_scan(lua_State *vm) const;
|
|
void lua_get_rst_scan(lua_State *vm) const;
|
|
void lua_get_anomalies(lua_State *vm) const;
|
|
void lua_get_num_alerts(lua_State *vm) const;
|
|
void lua_get_num_total_flows(lua_State *vm) const;
|
|
void lua_get_num_flows(lua_State *vm) const;
|
|
void lua_get_min_info(lua_State *vm);
|
|
void lua_get_ndpi_info(lua_State *vm);
|
|
void lua_get_num_contacts(lua_State *vm);
|
|
void lua_get_num_http_hosts(lua_State *vm);
|
|
void lua_get_os(lua_State *vm);
|
|
void lua_get_fingerprints(lua_State *vm);
|
|
void lua_get_geoloc(lua_State *vm);
|
|
void lua_blacklisted_flows(lua_State *vm) const;
|
|
void lua_unidirectional_tcp_udp_flows(lua_State *vm, bool as_subtable) const;
|
|
void lua_get_listening_ports(lua_State *vm);
|
|
|
|
void resolveHostName();
|
|
char *get_host_label(char *const buf, ssize_t buf_size);
|
|
inline int compare(Host *h) { return (ip.compare(&h->ip)); };
|
|
inline bool equal(IpAddress *_ip) { return (_ip && ip.equal(_ip)); };
|
|
void incStats(u_int32_t when, u_int8_t l4_proto, u_int ndpi_proto,
|
|
ndpi_protocol_category_t ndpi_category, custom_app_t custom_app,
|
|
u_int64_t sent_packets, u_int64_t sent_bytes,
|
|
u_int64_t sent_goodput_bytes, u_int64_t rcvd_packets,
|
|
u_int64_t rcvd_bytes, u_int64_t rcvd_goodput_bytes,
|
|
bool peer_is_unicast);
|
|
inline void checkpoint(lua_State *vm) {
|
|
if (stats) return stats->checkpoint(vm);
|
|
};
|
|
void incHitter(Host *peer, u_int64_t sent_bytes, u_int64_t rcvd_bytes);
|
|
virtual void updateHostTrafficPolicy(char *key){};
|
|
bool addIfMatching(lua_State *vm, AddressTree *ptree, char *key);
|
|
bool addIfMatching(lua_State *vm, u_int8_t *mac);
|
|
void updateSynAlertsCounter(time_t when, bool syn_sent);
|
|
void updateFinAlertsCounter(time_t when, bool fin_sent);
|
|
void updateRstAlertsCounter(time_t when, bool rst_sent);
|
|
void updateICMPAlertsCounter(time_t when, bool icmp_sent);
|
|
void updateDNSAlertsCounter(time_t when, bool dns_sent);
|
|
void updateSNMPAlertsCounter(time_t when, bool snmp_sent);
|
|
void updateSynAckAlertsCounter(time_t when, bool synack_sent);
|
|
void updateFinAckAlertsCounter(time_t when, bool finack_sent);
|
|
|
|
virtual void updateNetworkRTT(u_int32_t rtt_msecs) { return; }
|
|
inline void updateRoundTripTime(u_int32_t rtt_msecs) {
|
|
if (as) as->updateRoundTripTime(rtt_msecs);
|
|
updateNetworkRTT(rtt_msecs);
|
|
}
|
|
|
|
inline u_int16_t icmp_flood_victim_hits() const {
|
|
return icmp_flood.victim_counter ? icmp_flood.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t icmp_flood_attacker_hits() const {
|
|
return icmp_flood.attacker_counter ? icmp_flood.attacker_counter->hits()
|
|
: 0;
|
|
};
|
|
inline void reset_icmp_flood_hits() {
|
|
if (icmp_flood.victim_counter) icmp_flood.victim_counter->reset_hits();
|
|
if (icmp_flood.attacker_counter) icmp_flood.attacker_counter->reset_hits();
|
|
};
|
|
|
|
inline u_int16_t dns_flood_victim_hits() const {
|
|
return dns_flood.victim_counter ? dns_flood.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t dns_flood_attacker_hits() const {
|
|
return dns_flood.attacker_counter ? dns_flood.attacker_counter->hits() : 0;
|
|
};
|
|
inline void reset_dns_flood_hits() {
|
|
if (dns_flood.victim_counter) dns_flood.victim_counter->reset_hits();
|
|
if (dns_flood.attacker_counter) dns_flood.attacker_counter->reset_hits();
|
|
};
|
|
|
|
inline u_int16_t snmp_flood_victim_hits() const {
|
|
return snmp_flood.victim_counter ? snmp_flood.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t snmp_flood_attacker_hits() const {
|
|
return snmp_flood.attacker_counter ? snmp_flood.attacker_counter->hits()
|
|
: 0;
|
|
};
|
|
inline void reset_snmp_flood_hits() {
|
|
if (snmp_flood.victim_counter) snmp_flood.victim_counter->reset_hits();
|
|
if (snmp_flood.attacker_counter) snmp_flood.attacker_counter->reset_hits();
|
|
};
|
|
|
|
inline u_int16_t syn_flood_victim_hits() const {
|
|
return syn_flood.victim_counter ? syn_flood.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t syn_flood_attacker_hits() const {
|
|
return syn_flood.attacker_counter ? syn_flood.attacker_counter->hits() : 0;
|
|
};
|
|
inline void reset_syn_flood_hits() {
|
|
if (syn_flood.victim_counter) syn_flood.victim_counter->reset_hits();
|
|
if (syn_flood.attacker_counter) syn_flood.attacker_counter->reset_hits();
|
|
};
|
|
|
|
inline u_int16_t flow_flood_victim_hits() const {
|
|
return flow_flood.victim_counter ? flow_flood.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t flow_flood_attacker_hits() const {
|
|
return flow_flood.attacker_counter ? flow_flood.attacker_counter->hits()
|
|
: 0;
|
|
};
|
|
inline void reset_flow_flood_hits() {
|
|
if (flow_flood.victim_counter) flow_flood.victim_counter->reset_hits();
|
|
if (flow_flood.attacker_counter) flow_flood.attacker_counter->reset_hits();
|
|
};
|
|
|
|
inline u_int32_t syn_scan_victim_hits() const {
|
|
return syn_scan.syn_recvd_last_min > syn_scan.synack_sent_last_min
|
|
? syn_scan.syn_recvd_last_min - syn_scan.synack_sent_last_min
|
|
: 0;
|
|
};
|
|
inline u_int32_t syn_scan_attacker_hits() const {
|
|
return syn_scan.syn_sent_last_min > syn_scan.synack_recvd_last_min
|
|
? syn_scan.syn_sent_last_min - syn_scan.synack_recvd_last_min
|
|
: 0;
|
|
};
|
|
inline void reset_syn_scan_hits() {
|
|
syn_scan.syn_sent_last_min = syn_scan.synack_recvd_last_min =
|
|
syn_scan.syn_recvd_last_min = syn_scan.synack_sent_last_min = 0;
|
|
};
|
|
|
|
inline u_int32_t fin_scan_victim_hits() const {
|
|
return fin_scan.fin_recvd_last_min > fin_scan.finack_sent_last_min
|
|
? fin_scan.fin_recvd_last_min - fin_scan.finack_sent_last_min
|
|
: 0;
|
|
};
|
|
inline u_int32_t fin_scan_attacker_hits() const {
|
|
return fin_scan.fin_sent_last_min > fin_scan.finack_recvd_last_min
|
|
? fin_scan.fin_sent_last_min - fin_scan.finack_recvd_last_min
|
|
: 0;
|
|
};
|
|
inline void reset_fin_scan_hits() {
|
|
fin_scan.fin_sent_last_min = fin_scan.finack_recvd_last_min =
|
|
fin_scan.fin_recvd_last_min = fin_scan.finack_sent_last_min = 0;
|
|
};
|
|
|
|
inline u_int16_t rst_scan_victim_hits() const {
|
|
return rst_scan.victim_counter ? rst_scan.victim_counter->hits() : 0;
|
|
};
|
|
inline u_int16_t rst_scan_attacker_hits() const {
|
|
return rst_scan.attacker_counter ? rst_scan.attacker_counter->hits() : 0;
|
|
};
|
|
inline void reset_rst_scan_hits() {
|
|
if (rst_scan.victim_counter) rst_scan.victim_counter->reset_hits();
|
|
if (rst_scan.attacker_counter) rst_scan.attacker_counter->reset_hits();
|
|
};
|
|
|
|
void incNumFlows(time_t t, bool as_client);
|
|
void decNumFlows(time_t t, bool as_client);
|
|
inline void incNumAlertedFlows(bool as_client) {
|
|
active_alerted_flows++;
|
|
if (stats) stats->incNumAlertedFlows(as_client);
|
|
}
|
|
inline void decNumAlertedFlows(bool as_client) { active_alerted_flows--; }
|
|
|
|
inline u_int32_t getNumAlertedFlows() const { return (active_alerted_flows); }
|
|
inline void incNumUnreachableFlows(bool as_server) {
|
|
if (stats) stats->incNumUnreachableFlows(as_server);
|
|
}
|
|
inline void incNumHostUnreachableFlows(bool as_server) {
|
|
if (stats) stats->incNumHostUnreachableFlows(as_server);
|
|
};
|
|
inline void incnDPIFlows(u_int16_t l7_protocol) {
|
|
if (stats) stats->incnDPIFlows(l7_protocol);
|
|
}
|
|
inline void incFlagStats(bool as_client, u_int8_t flags,
|
|
bool cumulative_flags) {
|
|
stats->incFlagStats(as_client, flags, cumulative_flags);
|
|
};
|
|
virtual void luaHTTP(lua_State *vm){};
|
|
virtual void luaDNS(lua_State *vm, bool verbose){};
|
|
virtual void luaICMP(lua_State *vm, bool isV4, bool verbose){};
|
|
virtual void luaTCP(lua_State *vm){};
|
|
virtual u_int16_t getNumActiveContactsAsClient() { return 0; };
|
|
virtual u_int16_t getNumActiveContactsAsServer() { return 0; };
|
|
inline TcpPacketStats *getTcpPacketSentStats() {
|
|
return (stats->getTcpPacketSentStats());
|
|
}
|
|
inline TcpPacketStats *getTcpPacketRcvdStats() {
|
|
return (stats->getTcpPacketRcvdStats());
|
|
}
|
|
virtual void addContactedDomainName(char *domain_name){};
|
|
virtual u_int32_t getDomainNamesCardinality() { return 0; };
|
|
virtual void resetDomainNamesCardinality(){};
|
|
virtual NetworkStats *getNetworkStats(int16_t networkId) { return (NULL); };
|
|
inline Country *getCountryStats() { return country; };
|
|
|
|
bool match(const AddressTree *const tree) const { return ip.match(tree); };
|
|
void updateHostPool(bool isInlineCall, bool firstUpdate = false);
|
|
virtual bool dropAllTraffic() const { return (false); };
|
|
virtual bool setRemoteToRemoteAlerts() { return (false); };
|
|
virtual void incrVisitedWebSite(char *hostname){};
|
|
inline void incTotalAlerts() { stats->incTotalAlerts(); }
|
|
inline u_int32_t getTotalAlerts() { return (stats->getTotalAlerts()); }
|
|
virtual u_int32_t getActiveHTTPHosts() { return (0); };
|
|
inline u_int32_t getNumOutgoingFlows() const {
|
|
return (num_active_flows_as_client);
|
|
}
|
|
inline u_int32_t getNumIncomingFlows() const {
|
|
return (num_active_flows_as_server);
|
|
}
|
|
inline u_int32_t getNumActiveFlows() const {
|
|
return (getNumOutgoingFlows() + getNumIncomingFlows());
|
|
}
|
|
inline u_int32_t getTotalNumFlowsAsClient() const {
|
|
return (stats->getTotalNumFlowsAsClient());
|
|
};
|
|
inline u_int32_t getTotalNumFlowsAsServer() const {
|
|
return (stats->getTotalNumFlowsAsServer());
|
|
};
|
|
inline u_int32_t getTotalNumAlertedOutgoingFlows() const {
|
|
return stats->getTotalAlertedNumFlowsAsClient();
|
|
};
|
|
inline u_int32_t getTotalNumAlertedIncomingFlows() const {
|
|
return stats->getTotalAlertedNumFlowsAsServer();
|
|
};
|
|
inline u_int32_t getTotalNumUnreachableOutgoingFlows() const {
|
|
return stats->getTotalUnreachableNumFlowsAsClient();
|
|
};
|
|
inline u_int32_t getTotalNumUnreachableIncomingFlows() const {
|
|
return stats->getTotalUnreachableNumFlowsAsServer();
|
|
};
|
|
inline u_int32_t getTotalNumHostUnreachableOutgoingFlows() const {
|
|
return stats->getTotalHostUnreachableNumFlowsAsClient();
|
|
};
|
|
inline u_int32_t getTotalNumHostUnreachableIncomingFlows() const {
|
|
return stats->getTotalHostUnreachableNumFlowsAsServer();
|
|
};
|
|
void splitHostVLAN(const char *at_sign_str, char *buf, int bufsize,
|
|
u_int16_t *vlan_id);
|
|
char *get_country(char *buf, u_int buf_len);
|
|
char *get_city(char *buf, u_int buf_len);
|
|
void get_geocoordinates(float *latitude, float *longitude);
|
|
void serialize_geocoordinates(ndpi_serializer *s, const char *prefix);
|
|
inline void reloadHideFromTop() { hidden_from_top = iface->isHiddenFromTop(this) ? 1 : 0; }
|
|
inline void reloadDhcpHost() {
|
|
is_dhcp_host = iface->isInDhcpRange(get_ip()) ? 1 : 0;
|
|
}
|
|
bool isUnidirectionalTraffic() const;
|
|
bool isBidirectionalTraffic() const;
|
|
virtual void lua_get_timeseries(lua_State *vm) { lua_pushnil(vm); };
|
|
virtual void lua_peers_stats(lua_State *vm) const { lua_pushnil(vm); };
|
|
virtual void lua_contacts_stats(lua_State *vm) const { lua_pushnil(vm); };
|
|
DeviceProtoStatus getDeviceAllowedProtocolStatus(ndpi_protocol proto,
|
|
bool as_client);
|
|
|
|
virtual void serialize(json_object *obj, DetailsLevel details_level);
|
|
|
|
inline void requestStatsReset() { stats_reset_requested = 1; };
|
|
inline void requestNameReset() { name_reset_requested = 1; };
|
|
inline void requestDataReset() {
|
|
data_delete_requested = 1;
|
|
requestStatsReset();
|
|
};
|
|
void checkNameReset();
|
|
void checkDataReset();
|
|
void checkBroadcastDomain();
|
|
bool hasAnomalies() const;
|
|
void housekeep(time_t t); /* Virtual method, called in the datapath from
|
|
GenericHash::purgeIdle */
|
|
virtual void inlineSetOSDetail(const char *detail) {}
|
|
virtual const char *getOSDetail(char *const buf, ssize_t buf_len);
|
|
void offlineSetTLSName(const char *n);
|
|
void offlineSetHTTPName(const char *n);
|
|
void offlineSetNetbiosName(const char *n);
|
|
void offlineSetSSDPLocation(const char *url);
|
|
void offlineSetMDNSInfo(char *const s);
|
|
void offlineSetMDNSName(const char *n);
|
|
void offlineSetMDNSTXTName(const char *n);
|
|
void setServerName(const char *n);
|
|
void setResolvedName(const char *resolved_name);
|
|
inline Fingerprint *getJA3Fingerprint() { return (&fingerprints.ja3); }
|
|
inline Fingerprint *getHASSHFingerprint() { return (&fingerprints.hassh); }
|
|
|
|
void setPrefsChanged() { prefs_loaded = 0; }
|
|
virtual void reloadPrefs() {}
|
|
inline void checkReloadPrefs() {
|
|
if (!prefs_loaded) {
|
|
reloadPrefs();
|
|
prefs_loaded = 1;
|
|
}
|
|
}
|
|
|
|
void refreshDisabledAlerts();
|
|
bool isHostAlertDisabled(HostAlertType alert_type);
|
|
bool isFlowAlertDisabled(FlowAlertType alert_type);
|
|
|
|
void setOS(OSType _os);
|
|
OSType getOS() const;
|
|
void incOSStats(time_t when, u_int16_t proto_id, u_int64_t sent_packets,
|
|
u_int64_t sent_bytes, u_int64_t rcvd_packets,
|
|
u_int64_t rcvd_bytes);
|
|
|
|
void incCliContactedHosts(IpAddress *peer) {
|
|
stats->incCliContactedHosts(peer);
|
|
}
|
|
void incCliContactedPorts(u_int16_t port) {
|
|
stats->incCliContactedPorts(port);
|
|
}
|
|
void incSrvHostContacts(IpAddress *peer) { stats->incSrvHostContacts(peer); }
|
|
void incSrvPortsContacts(u_int16_t port) { stats->incSrvPortsContacts(port); }
|
|
void incContactedService(char *name) { stats->incContactedService(name); }
|
|
|
|
virtual void luaHostBehaviour(lua_State *vm) { lua_pushnil(vm); }
|
|
void luaCountriesBehaviour(lua_State *vm) { lua_pushnil(vm); }
|
|
virtual void incDohDoTUses(Host *srv_host) {}
|
|
|
|
virtual void incCountriesContacts(char *country) { ; }
|
|
virtual void resetCountriesContacts() { ; }
|
|
virtual u_int8_t getCountriesContactsCardinality() { return (0); }
|
|
|
|
virtual bool incNTPContactCardinality(Host *h) { return (false); }
|
|
virtual bool incDNSContactCardinality(Host *h) { return (false); }
|
|
virtual bool incSMTPContactCardinality(Host *h) { return (false); }
|
|
virtual bool incIMAPContactCardinality(Host *h) { return (false); }
|
|
virtual bool incPOPContactCardinality(Host *h) { return (false); }
|
|
|
|
virtual u_int32_t getNTPContactCardinality() { return (0); }
|
|
virtual u_int32_t getDNSContactCardinality() { return (0); }
|
|
virtual u_int32_t getSMTPContactCardinality() { return (0); }
|
|
|
|
#ifdef NTOPNG_PRO
|
|
/* Alert Exclusions */
|
|
inline AlertExclusionsInfo *getAlertExclusions() {
|
|
return (&alert_exclusions);
|
|
}
|
|
#endif
|
|
|
|
#ifndef HAVE_NEDGE
|
|
inline void setListeningPorts(ListeningPorts &lp) {
|
|
if (listening_ports_shadow) {
|
|
delete listening_ports_shadow;
|
|
listening_ports_shadow = NULL;
|
|
}
|
|
listening_ports_shadow = listening_ports;
|
|
listening_ports = new ListeningPorts(lp);
|
|
}
|
|
inline ListeningPorts *getListeningPorts() { return (listening_ports); }
|
|
#endif
|
|
|
|
/* Enqueues an alert to all available host recipients. */
|
|
bool enqueueAlertToRecipients(HostAlert *alert, bool released);
|
|
void alert2JSON(HostAlert *alert, bool released, ndpi_serializer *serializer);
|
|
|
|
/* Checks API */
|
|
bool triggerAlert(HostAlert *alert);
|
|
void releaseAlert(HostAlert *alert);
|
|
bool storeAlert(HostAlert *alert);
|
|
|
|
void releaseAllEngagedAlerts();
|
|
|
|
void visit(std::vector<ActiveHostWalkerInfo> *v, HostWalkMode mode);
|
|
|
|
u_int16_t get_country_code();
|
|
inline bool has_flows_anomaly(bool as_client) {
|
|
return (stats->has_flows_anomaly(as_client));
|
|
}
|
|
inline u_int32_t value_flows_anomaly(bool as_client) {
|
|
return (stats->value_flows_anomaly(as_client));
|
|
}
|
|
inline u_int32_t lower_bound_flows_anomaly(bool as_client) {
|
|
return (stats->lower_bound_flows_anomaly(as_client));
|
|
}
|
|
inline u_int32_t upper_bound_flows_anomaly(bool as_client) {
|
|
return (stats->upper_bound_flows_anomaly(as_client));
|
|
}
|
|
|
|
inline bool has_score_anomaly(bool as_client) {
|
|
return (stats->has_score_anomaly(as_client));
|
|
}
|
|
inline u_int32_t lower_bound_score_anomaly(bool as_client) {
|
|
return (stats->lower_bound_score_anomaly(as_client));
|
|
}
|
|
inline u_int32_t upper_bound_score_anomaly(bool as_client) {
|
|
return (stats->upper_bound_score_anomaly(as_client));
|
|
}
|
|
|
|
inline void inc_num_blacklisted_flows(bool as_client) {
|
|
if (as_client)
|
|
num_blacklisted_flows.as_client++;
|
|
else
|
|
num_blacklisted_flows.as_server++;
|
|
}
|
|
inline void setViewInterfaceMac(u_int8_t *_view_interface_mac) {
|
|
if (_view_interface_mac)
|
|
memcpy(view_interface_mac, _view_interface_mac,
|
|
sizeof(view_interface_mac));
|
|
}
|
|
|
|
inline void incIncompleteFlows() { num_incomplete_flows++; }
|
|
inline u_int32_t getAndResetNumIncompleteFlows() {
|
|
u_int32_t _num_incomplete_flows = num_incomplete_flows;
|
|
|
|
num_incomplete_flows = 0;
|
|
return (_num_incomplete_flows);
|
|
}
|
|
|
|
inline HostStats *getStats() { return (stats); }
|
|
void setBlacklistName(char *name);
|
|
inline void blacklistHost(char *blacklist_name) {
|
|
setBlacklistName(blacklist_name), is_blacklisted = 1;
|
|
}
|
|
virtual void setRxOnlyHost(bool set_it) { is_rx_only = set_it; };
|
|
inline bool resetHostTopSites() {
|
|
if (stats) {
|
|
stats->resetTopSitesData();
|
|
return (true);
|
|
} else
|
|
return (false);
|
|
}
|
|
inline bool isRxOnlyHost() {
|
|
return (is_rx_only && (!isBroadcastHost()) && (!isMulticastHost()));
|
|
}
|
|
inline void incUnidirectionalIngressTCPUDPFlows() {
|
|
unidirectionalTCPUDPFlows.numIngressFlows++;
|
|
}
|
|
inline void incUnidirectionalEgressTCPUDPFlows() {
|
|
unidirectionalTCPUDPFlows.numEgressFlows++;
|
|
}
|
|
|
|
virtual void setServerPort(bool isTCP, u_int16_t port, ndpi_protocol *proto) {
|
|
;
|
|
};
|
|
virtual void setContactedPort(bool isTCP, u_int16_t port,
|
|
ndpi_protocol *proto) {
|
|
;
|
|
};
|
|
virtual void luaUsedPorts(lua_State *vm) { ; }
|
|
virtual std::unordered_map<u_int16_t, ndpi_protocol> *getServerPorts(
|
|
bool isTCP) {
|
|
return (NULL);
|
|
}
|
|
|
|
void triggerCustomHostAlert(u_int8_t score, char *msg);
|
|
inline bool isCustomHostAlertTriggered() {
|
|
return (customHostAlert.alertTriggered ? true : false);
|
|
}
|
|
inline bool isCustomHostScriptAlreadyEvaluated(time_t when) {
|
|
return ((customHostAlert.hostAlreadyEvaluated &&
|
|
(customHostAlert.skip_until_epoch < when))
|
|
? true
|
|
: false);
|
|
}
|
|
inline bool isCustomHostScriptFirstRun() {
|
|
return (customHostAlert.checkAlreadyExecutedOnce ? false : true);
|
|
}
|
|
inline void setCustomHostScriptAlreadyEvaluated(bool s,
|
|
u_int32_t skip_until) {
|
|
customHostAlert.hostAlreadyEvaluated = s ? 1 : 0,
|
|
customHostAlert.skip_until_epoch = skip_until;
|
|
}
|
|
inline void setCustomHostScriptAlreadyRun() {
|
|
customHostAlert.checkAlreadyExecutedOnce = 1;
|
|
}
|
|
inline u_int8_t getCustomHostAlertScore() { return (customHostAlert.score); }
|
|
inline char *getCustomHostAlertMessage() { return (customHostAlert.msg); }
|
|
|
|
void setUnidirectionalTCPUDPNoTXEgressFlow(IpAddress *ip, u_int16_t port);
|
|
void setUnidirectionalTCPUDPNoTXIngressFlow(IpAddress *ip, u_int16_t port);
|
|
|
|
inline u_int32_t getNumContactedPeersAsClientTCPUDPNoTX() {
|
|
return (
|
|
(u_int32_t)ndpi_hll_count(&outgoing_hosts_tcp_udp_port_with_no_tx_hll));
|
|
};
|
|
inline u_int32_t getNumContactsFromPeersAsServerTCPUDPNoTX() {
|
|
return (
|
|
(u_int32_t)ndpi_hll_count(&incoming_hosts_tcp_udp_port_with_no_tx_hll));
|
|
};
|
|
|
|
inline u_int16_t getNumContactedTCPUDPServerPortsNoTX() {
|
|
return (tcp_udp_contacted_ports_no_tx ? (u_int16_t)ndpi_bitmap_cardinality(
|
|
tcp_udp_contacted_ports_no_tx)
|
|
: 0);
|
|
}
|
|
inline void setContactedTCPUDPServerPortNoTX(u_int16_t port) {
|
|
if (tcp_udp_contacted_ports_no_tx)
|
|
ndpi_bitmap_set(tcp_udp_contacted_ports_no_tx, port);
|
|
}
|
|
|
|
void resetHostContacts();
|
|
};
|
|
|
|
#endif /* _HOST_H_ */
|