ntopng/scripts/lua/modules/alert_exclusions.lua
Luca a4047c5a1c Implements flow callbacks and alerts in C++
Scaffolding code of the host scripts

Scaffolding code for host alerts

Adds host_callbacks/ for .cpp files

Implements all classes for host callbacks

Removes pro/enterprise host callbacks

Adds typedefs with callback deltas

Compilation fix

Creates instances of host callbacks in loader

Link fix

Removes redundant/non-necessary host alerts

Merges Scan and Flood callbacks together

Removes outdated API files

Refactors alert keys into entity|id

Refactors all flow alert_{...} into flow_alert_{...}

Refactors C++ flow alert_{...} into flow_alert_{...}

Reworks alert ids to include an entity type

Cleanup and merge alertTypeRaw with getAlertType

Minor fix

Refactors alert definitions and keys into sub directories

Implement host alert callback execution and trigger/release logic

Update callbacks API

Adds base CallbacksLoader for {Host,Flow}CallbacksLoader

Implements load of host user scripts with periodicities

Implements runtime reload of host callbacks

Add logic for periodic callbacks

Add 'expired' flag to host alerts

Implements execution of host callbacks and SYN flood checks

Adds triggerAlertAsync calls to SYNFlood

Implements JSON host alert generation info

Handle callback getPeriod. Optimize callback lookup.

Implements host recipients in C++

Add callback status

Define destructor

Iterator fixes

Cleanup host Lua calls (now performed in C++)

Changes to show new host alerts in SQLite

Adds release/engage action on alert JSON

Move AlertableEntity to OtherAlertableEntity, inheriting from a new AlertableEntity. Add HostAlertableEntity.

Implements SYN Flood Attacker with params

Uses parametrized thresholds to trigger syn flood alerts

Implements build alert of both attacker and victim

Implement HostAlertableEntity

Implements SYN scan attacker/victim alerts

Implements flow flood attacker/victim alerts

Removes a debug flag

Add virtual allocStatus

Add HostAlert disableAutoRelease()

Add Ãexplicit releaseAlert()

Implements SYNFloodHostCallbackStatus

Implements SYNScanHostCallbackStatus

Implements FlowFloodHostCallbackStatus

Change trigger API to handle cli/src score

Implements {DNS,SMTP,NTP}ServerContactsAlert

Reworks ServerContacts host alerts

Implement exclusion bitmaps for host alerts

Implements {SMTP,DNS,NTP}ServerContactsAlert

Adds host_info to the generated alert JSON

Minor cleanup

Optimize access to callback status

Move RepliesRequestsRatio to pro

Rework triggerAlert on host to avoid multiple call and unneeded status data

Compilation fix

Reworked host alerts API (wip)

Cleanup unused host callbacks

Compilation fixes

Finishes backend implementation of host alerts exclusions

Rework host callbacks executor

Implements disable of host alerts

Port SYNFlood to the new api

Cleanup

Reduce duplicated code

Comments

Port ServerContacts to the new api

Clenaup

Adds parsing of configuration for host callbacks

Port SYNScanAlert to the new API

Port FlowFlood to the new API

Cleanup unused HostAlert getName

Reworks DNSRequestsErrorsRatioAlert

Adds JSON for DNSTrafficAlert

Adds FlowsAlert

Adds P2PTrafficAlert

Add RepliesRequestsRatioAlert

Adds ScoreAlert

Adds ThroughputAlert

Adds TrafficAlert

Fixes for scan/flood alerts

DNS ratio alert support

Add HTTP stats getters

Implements deltas for many host callbacks

Host score inc

Adds missing Alert params to host alerts

Release all host alerts on idle

Refactors score classes

Implements class Score to contain scores for hosts, flows, etc

Adds scores to VLANs, Networks, ASes and Countries

Host callbacks can trigger a single alert now

FlowFlood, SYNFloo, SYNScan now inherit from FlowHits

Move severity and score to constructor

Add else branch to hits callbacks

Alert definition update for flows_flood, syn_flood, syn_scan

Update field name

Engaged alert init

Adds score incs/decs for AS, VLAN, country, os and network

Restore network scripts

Restored other alert definitions for floods

Handle decreasing alert score

Removes include

Rename flows_flood to flow_flood for consistency

Restored alert_tcp_syn_flood_victim alert_tcp_syn_scan_victim definitions

Fixes for non-host engaged/release alerts

Cleanup LuaEngineFlow and LuaEngineHost classes

Fixes old calls to host lua during shutdown

Removes AlertCheckLuaEngine instance

Fixes purging of flows

Fixes alerts release upon shutdown causing wrong uses

Removes a debug flag

Fix getNumEngagedAlerts

Cleanup unnecessary host callbacks

Removes array of callback statuses inside host

Bitmap fixes

Refactors Bitmap into Bitmap128

Implements 16-bits bitmaps for host alerts

Adds class HostCallbacksStatus

Moves callback status p2p and DNS inside HostCallbacksStatus

Removes unused callbacks in typedefs

Minor cleanup

Adds trigger/release for DNS/p2p alerts

Reworks UI of hosts user scripts

Rename HostCallbackType to HostCallbackID, getType to getID, others
2021-04-03 09:53:15 +02:00

231 lines
7.4 KiB
Lua

--
-- (C) 2017-21 - ntop.org
--
-- Module to keep things in common across alert_exclusions of various type
local dirs = ntop.getDirs()
package.path = dirs.installdir .. "/scripts/lua/modules/?.lua;" .. package.path
require "lua_utils"
local alert_consts = require "alert_consts"
local alert_entities = require "alert_entities"
local json = require "dkjson"
-- ##############################################
local alert_exclusions = {}
-- ##############################################
local function _get_alert_exclusions_prefix_key()
local key = string.format("ntopng.prefs.alert_exclusions")
return key
end
-- ##############################################
local function _get_alert_exclusions_lock_key()
local key = string.format("ntopng.cache.alert_exclusions.alert_exclusions_lock")
return key
end
-- ##############################################
local function _lock()
local max_lock_duration = 5 -- seconds
local max_lock_attempts = 5 -- give up after at most this number of attempts
local lock_key = _get_alert_exclusions_lock_key()
for i = 1, max_lock_attempts do
local value_set = ntop.setnxCache(lock_key, "1", max_lock_duration)
if value_set then
return true -- lock acquired
end
ntop.msleep(1000)
end
return false -- lock not acquired
end
-- ##############################################
local function _unlock()
ntop.delCache(_get_alert_exclusions_lock_key())
end
-- ##############################################
local function _check_host_ip_alert_key(host_ip, alert_key)
if not isIPv4(host_ip) and not isIPv6(host_ip) then
-- Invalid host submitted
return false
end
if not alert_consts.getAlertType(tonumber(alert_key)) then
-- Invalid alert key submitted
return false
end
return true
end
-- ##############################################
local function _get_configured_alert_exclusions()
local excl_key = _get_alert_exclusions_prefix_key()
local configured_excl_str = ntop.getPref(excl_key)
local configured_excl = json.decode(configured_excl_str) or {}
return configured_excl
end
-- ##############################################
local function _set_configured_alert_exclusions(exclusions)
local excl_key = _get_alert_exclusions_prefix_key()
ntop.setPref(excl_key, json.encode(exclusions)) -- Add the preference
ntop.reloadAlertExclusions() -- Tell ntopng to reload
end
-- ##############################################
--@brief Enables or disables an alert for an `host_ip`
local function _toggle_alert(alert_entity, host_ip, alert_key, disable)
local ret = false
if not _check_host_ip_alert_key(host_ip, alert_key) then
-- Invalid params submitted
return false
end
local locked = _lock()
if locked then
-- In JSON, keys are always strings
alert_key = tostring(alert_key) -- The key of the alert
local entity_id = tostring(alert_entity.entity_id) -- The entity of the alert that is being disabled, e.g., "host", or "flow"
local do_persist = false
local exclusions = _get_configured_alert_exclusions()
-- Add an entry for the current alert entity, if currently exising exclusions don't already have it
if not exclusions[entity_id] then
exclusions[entity_id] = {}
end
-- Add an entry for the current alert key, if currently existing exclusions don't already have it
if not exclusions[entity_id][alert_key] then
exclusions[entity_id][alert_key] = {excluded_hosts = {}}
end
-- Add an entry for excluded_hosts, if the currently existing exclusions don't already have it
if not exclusions[entity_id][alert_key]["excluded_hosts"] then
exclusions[entity_id][alert_key]["excluded_hosts"] = {}
end
-- Now check if there is actually some work to do
if not disable and exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] then
-- Enable an host_ip that was disabled
exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] = nil
do_persist = true
elseif disable and not exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] then
-- Disable an host_ip that was not already disabled
exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] = { --[[ Currently empty, will possibly contain values in the future, e.g., as_cli, as_srv--]]}
do_persist = true
end
if do_persist then
_set_configured_alert_exclusions(exclusions)
end
ret = true
_unlock()
end
return ret
end
-- ##############################################
-- @brief Returns true if `host_ip` has the alert identified with `alert_key` disabled
function _has_disabled_alert(alert_entity, host_ip, alert_key)
local exclusions = _get_configured_alert_exclusions()
alert_key = tostring(alert_key)
local entity_id = tostring(alert_entity.entity_id)
return not not (exclusions[entity_id]
and exclusions[entity_id][alert_key]
and exclusions[entity_id][alert_key]["excluded_hosts"]
and exclusions[entity_id][alert_key]["excluded_hosts"][host_ip])
end
-- ##############################################
--@brief Marks a flow alert as disabled for a given `host_ip`, considered either as client or server
--@return True, if alert is disabled with success, false otherwise
function alert_exclusions.disable_flow_alert(host_ip, alert_key)
return _toggle_alert(alert_entities.flow, host_ip, alert_key, true --[[ disable --]])
end
-- ##############################################
--@brief Marks a flow alert as enabled for a given `host_ip`, considered either as client or server
--@return True, if alert is enabled with success, false otherwise
function alert_exclusions.enable_flow_alert(host_ip, alert_key)
return _toggle_alert(alert_entities.flow, host_ip, alert_key, false --[[ enable --]])
end
-- ##############################################
-- @brief Returns true if `host_ip` has the flow alert identified with `alert_key` disabled
function alert_exclusions.has_disabled_flow_alert(host_ip, alert_key)
return _has_disabled_alert(alert_entities.flow, host_ip, alert_key)
end
-- ##############################################
--@brief Marks a host alert as disabled for a given `host_ip`
--@return True, if alert is disabled with success, false otherwise
function alert_exclusions.disable_host_alert(host_ip, alert_key)
return _toggle_alert(alert_entities.host, host_ip, alert_key, true --[[ disable --]])
end
-- ##############################################
--@brief Marks a host alert as enabled for a given `host_ip`
--@return True, if alert is enabled with success, false otherwise
function alert_exclusions.enable_host_alert(host_ip, alert_key)
return _toggle_alert(alert_entities.host, host_ip, alert_key, false --[[ enable --]])
end
-- ##############################################
-- @brief Returns true if `host_ip` has the host alert identified with `alert_key` disabled
function alert_exclusions.has_disabled_host_alert(host_ip, alert_key)
return _has_disabled_alert(alert_entities.host, host_ip, alert_key)
end
-- ##############################################
-- @brief Delete all alert_exclusions
function alert_exclusions.cleanup()
local locked = _lock()
if locked then
local excl_key = _get_alert_exclusions_prefix_key()
ntop.delCache(excl_key)
ntop.reloadAlertExclusions() -- Tell ntopng to reload
_unlock()
end
end
-- ##############################################
return alert_exclusions