mirror of
https://github.com/ntop/ntopng.git
synced 2026-04-29 15:39:33 +00:00
Scaffolding code of the host scripts
Scaffolding code for host alerts
Adds host_callbacks/ for .cpp files
Implements all classes for host callbacks
Removes pro/enterprise host callbacks
Adds typedefs with callback deltas
Compilation fix
Creates instances of host callbacks in loader
Link fix
Removes redundant/non-necessary host alerts
Merges Scan and Flood callbacks together
Removes outdated API files
Refactors alert keys into entity|id
Refactors all flow alert_{...} into flow_alert_{...}
Refactors C++ flow alert_{...} into flow_alert_{...}
Reworks alert ids to include an entity type
Cleanup and merge alertTypeRaw with getAlertType
Minor fix
Refactors alert definitions and keys into sub directories
Implement host alert callback execution and trigger/release logic
Update callbacks API
Adds base CallbacksLoader for {Host,Flow}CallbacksLoader
Implements load of host user scripts with periodicities
Implements runtime reload of host callbacks
Add logic for periodic callbacks
Add 'expired' flag to host alerts
Implements execution of host callbacks and SYN flood checks
Adds triggerAlertAsync calls to SYNFlood
Implements JSON host alert generation info
Handle callback getPeriod. Optimize callback lookup.
Implements host recipients in C++
Add callback status
Define destructor
Iterator fixes
Cleanup host Lua calls (now performed in C++)
Changes to show new host alerts in SQLite
Adds release/engage action on alert JSON
Move AlertableEntity to OtherAlertableEntity, inheriting from a new AlertableEntity. Add HostAlertableEntity.
Implements SYN Flood Attacker with params
Uses parametrized thresholds to trigger syn flood alerts
Implements build alert of both attacker and victim
Implement HostAlertableEntity
Implements SYN scan attacker/victim alerts
Implements flow flood attacker/victim alerts
Removes a debug flag
Add virtual allocStatus
Add HostAlert disableAutoRelease()
Add Ãexplicit releaseAlert()
Implements SYNFloodHostCallbackStatus
Implements SYNScanHostCallbackStatus
Implements FlowFloodHostCallbackStatus
Change trigger API to handle cli/src score
Implements {DNS,SMTP,NTP}ServerContactsAlert
Reworks ServerContacts host alerts
Implement exclusion bitmaps for host alerts
Implements {SMTP,DNS,NTP}ServerContactsAlert
Adds host_info to the generated alert JSON
Minor cleanup
Optimize access to callback status
Move RepliesRequestsRatio to pro
Rework triggerAlert on host to avoid multiple call and unneeded status data
Compilation fix
Reworked host alerts API (wip)
Cleanup unused host callbacks
Compilation fixes
Finishes backend implementation of host alerts exclusions
Rework host callbacks executor
Implements disable of host alerts
Port SYNFlood to the new api
Cleanup
Reduce duplicated code
Comments
Port ServerContacts to the new api
Clenaup
Adds parsing of configuration for host callbacks
Port SYNScanAlert to the new API
Port FlowFlood to the new API
Cleanup unused HostAlert getName
Reworks DNSRequestsErrorsRatioAlert
Adds JSON for DNSTrafficAlert
Adds FlowsAlert
Adds P2PTrafficAlert
Add RepliesRequestsRatioAlert
Adds ScoreAlert
Adds ThroughputAlert
Adds TrafficAlert
Fixes for scan/flood alerts
DNS ratio alert support
Add HTTP stats getters
Implements deltas for many host callbacks
Host score inc
Adds missing Alert params to host alerts
Release all host alerts on idle
Refactors score classes
Implements class Score to contain scores for hosts, flows, etc
Adds scores to VLANs, Networks, ASes and Countries
Host callbacks can trigger a single alert now
FlowFlood, SYNFloo, SYNScan now inherit from FlowHits
Move severity and score to constructor
Add else branch to hits callbacks
Alert definition update for flows_flood, syn_flood, syn_scan
Update field name
Engaged alert init
Adds score incs/decs for AS, VLAN, country, os and network
Restore network scripts
Restored other alert definitions for floods
Handle decreasing alert score
Removes include
Rename flows_flood to flow_flood for consistency
Restored alert_tcp_syn_flood_victim alert_tcp_syn_scan_victim definitions
Fixes for non-host engaged/release alerts
Cleanup LuaEngineFlow and LuaEngineHost classes
Fixes old calls to host lua during shutdown
Removes AlertCheckLuaEngine instance
Fixes purging of flows
Fixes alerts release upon shutdown causing wrong uses
Removes a debug flag
Fix getNumEngagedAlerts
Cleanup unnecessary host callbacks
Removes array of callback statuses inside host
Bitmap fixes
Refactors Bitmap into Bitmap128
Implements 16-bits bitmaps for host alerts
Adds class HostCallbacksStatus
Moves callback status p2p and DNS inside HostCallbacksStatus
Removes unused callbacks in typedefs
Minor cleanup
Adds trigger/release for DNS/p2p alerts
Reworks UI of hosts user scripts
Rename HostCallbackType to HostCallbackID, getType to getID, others
231 lines
7.4 KiB
Lua
231 lines
7.4 KiB
Lua
--
|
|
-- (C) 2017-21 - ntop.org
|
|
--
|
|
-- Module to keep things in common across alert_exclusions of various type
|
|
|
|
local dirs = ntop.getDirs()
|
|
package.path = dirs.installdir .. "/scripts/lua/modules/?.lua;" .. package.path
|
|
|
|
require "lua_utils"
|
|
local alert_consts = require "alert_consts"
|
|
local alert_entities = require "alert_entities"
|
|
local json = require "dkjson"
|
|
|
|
-- ##############################################
|
|
|
|
local alert_exclusions = {}
|
|
|
|
-- ##############################################
|
|
|
|
local function _get_alert_exclusions_prefix_key()
|
|
local key = string.format("ntopng.prefs.alert_exclusions")
|
|
|
|
return key
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _get_alert_exclusions_lock_key()
|
|
local key = string.format("ntopng.cache.alert_exclusions.alert_exclusions_lock")
|
|
|
|
return key
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _lock()
|
|
local max_lock_duration = 5 -- seconds
|
|
local max_lock_attempts = 5 -- give up after at most this number of attempts
|
|
local lock_key = _get_alert_exclusions_lock_key()
|
|
|
|
for i = 1, max_lock_attempts do
|
|
local value_set = ntop.setnxCache(lock_key, "1", max_lock_duration)
|
|
|
|
if value_set then
|
|
return true -- lock acquired
|
|
end
|
|
|
|
ntop.msleep(1000)
|
|
end
|
|
|
|
return false -- lock not acquired
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _unlock()
|
|
ntop.delCache(_get_alert_exclusions_lock_key())
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _check_host_ip_alert_key(host_ip, alert_key)
|
|
if not isIPv4(host_ip) and not isIPv6(host_ip) then
|
|
-- Invalid host submitted
|
|
return false
|
|
end
|
|
|
|
if not alert_consts.getAlertType(tonumber(alert_key)) then
|
|
-- Invalid alert key submitted
|
|
return false
|
|
end
|
|
|
|
return true
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _get_configured_alert_exclusions()
|
|
local excl_key = _get_alert_exclusions_prefix_key()
|
|
local configured_excl_str = ntop.getPref(excl_key)
|
|
local configured_excl = json.decode(configured_excl_str) or {}
|
|
|
|
return configured_excl
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
local function _set_configured_alert_exclusions(exclusions)
|
|
local excl_key = _get_alert_exclusions_prefix_key()
|
|
|
|
ntop.setPref(excl_key, json.encode(exclusions)) -- Add the preference
|
|
ntop.reloadAlertExclusions() -- Tell ntopng to reload
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
--@brief Enables or disables an alert for an `host_ip`
|
|
local function _toggle_alert(alert_entity, host_ip, alert_key, disable)
|
|
local ret = false
|
|
|
|
if not _check_host_ip_alert_key(host_ip, alert_key) then
|
|
-- Invalid params submitted
|
|
return false
|
|
end
|
|
|
|
local locked = _lock()
|
|
|
|
if locked then
|
|
-- In JSON, keys are always strings
|
|
alert_key = tostring(alert_key) -- The key of the alert
|
|
local entity_id = tostring(alert_entity.entity_id) -- The entity of the alert that is being disabled, e.g., "host", or "flow"
|
|
|
|
local do_persist = false
|
|
local exclusions = _get_configured_alert_exclusions()
|
|
|
|
-- Add an entry for the current alert entity, if currently exising exclusions don't already have it
|
|
if not exclusions[entity_id] then
|
|
exclusions[entity_id] = {}
|
|
end
|
|
|
|
-- Add an entry for the current alert key, if currently existing exclusions don't already have it
|
|
if not exclusions[entity_id][alert_key] then
|
|
exclusions[entity_id][alert_key] = {excluded_hosts = {}}
|
|
end
|
|
|
|
-- Add an entry for excluded_hosts, if the currently existing exclusions don't already have it
|
|
if not exclusions[entity_id][alert_key]["excluded_hosts"] then
|
|
exclusions[entity_id][alert_key]["excluded_hosts"] = {}
|
|
end
|
|
|
|
-- Now check if there is actually some work to do
|
|
if not disable and exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] then
|
|
-- Enable an host_ip that was disabled
|
|
exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] = nil
|
|
do_persist = true
|
|
elseif disable and not exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] then
|
|
-- Disable an host_ip that was not already disabled
|
|
exclusions[entity_id][alert_key]["excluded_hosts"][host_ip] = { --[[ Currently empty, will possibly contain values in the future, e.g., as_cli, as_srv--]]}
|
|
do_persist = true
|
|
end
|
|
|
|
if do_persist then
|
|
_set_configured_alert_exclusions(exclusions)
|
|
end
|
|
|
|
ret = true
|
|
_unlock()
|
|
end
|
|
|
|
return ret
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
-- @brief Returns true if `host_ip` has the alert identified with `alert_key` disabled
|
|
function _has_disabled_alert(alert_entity, host_ip, alert_key)
|
|
local exclusions = _get_configured_alert_exclusions()
|
|
alert_key = tostring(alert_key)
|
|
local entity_id = tostring(alert_entity.entity_id)
|
|
|
|
return not not (exclusions[entity_id]
|
|
and exclusions[entity_id][alert_key]
|
|
and exclusions[entity_id][alert_key]["excluded_hosts"]
|
|
and exclusions[entity_id][alert_key]["excluded_hosts"][host_ip])
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
--@brief Marks a flow alert as disabled for a given `host_ip`, considered either as client or server
|
|
--@return True, if alert is disabled with success, false otherwise
|
|
function alert_exclusions.disable_flow_alert(host_ip, alert_key)
|
|
return _toggle_alert(alert_entities.flow, host_ip, alert_key, true --[[ disable --]])
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
--@brief Marks a flow alert as enabled for a given `host_ip`, considered either as client or server
|
|
--@return True, if alert is enabled with success, false otherwise
|
|
function alert_exclusions.enable_flow_alert(host_ip, alert_key)
|
|
return _toggle_alert(alert_entities.flow, host_ip, alert_key, false --[[ enable --]])
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
-- @brief Returns true if `host_ip` has the flow alert identified with `alert_key` disabled
|
|
function alert_exclusions.has_disabled_flow_alert(host_ip, alert_key)
|
|
return _has_disabled_alert(alert_entities.flow, host_ip, alert_key)
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
--@brief Marks a host alert as disabled for a given `host_ip`
|
|
--@return True, if alert is disabled with success, false otherwise
|
|
function alert_exclusions.disable_host_alert(host_ip, alert_key)
|
|
return _toggle_alert(alert_entities.host, host_ip, alert_key, true --[[ disable --]])
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
--@brief Marks a host alert as enabled for a given `host_ip`
|
|
--@return True, if alert is enabled with success, false otherwise
|
|
function alert_exclusions.enable_host_alert(host_ip, alert_key)
|
|
return _toggle_alert(alert_entities.host, host_ip, alert_key, false --[[ enable --]])
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
-- @brief Returns true if `host_ip` has the host alert identified with `alert_key` disabled
|
|
function alert_exclusions.has_disabled_host_alert(host_ip, alert_key)
|
|
return _has_disabled_alert(alert_entities.host, host_ip, alert_key)
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
-- @brief Delete all alert_exclusions
|
|
function alert_exclusions.cleanup()
|
|
local locked = _lock()
|
|
|
|
if locked then
|
|
local excl_key = _get_alert_exclusions_prefix_key()
|
|
|
|
ntop.delCache(excl_key)
|
|
ntop.reloadAlertExclusions() -- Tell ntopng to reload
|
|
|
|
_unlock()
|
|
end
|
|
end
|
|
|
|
-- ##############################################
|
|
|
|
return alert_exclusions
|