defender_test.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "crypto/rand"
  17. "encoding/hex"
  18. "encoding/json"
  19. "fmt"
  20. "net"
  21. "os"
  22. "path/filepath"
  23. "runtime"
  24. "testing"
  25. "time"
  26. "github.com/stretchr/testify/assert"
  27. "github.com/stretchr/testify/require"
  28. "github.com/yl2chen/cidranger"
  29. )
  30. func TestBasicDefender(t *testing.T) {
  31. bl := HostListFile{
  32. IPAddresses: []string{"172.16.1.1", "172.16.1.2"},
  33. CIDRNetworks: []string{"10.8.0.0/24"},
  34. }
  35. sl := HostListFile{
  36. IPAddresses: []string{"172.16.1.3", "172.16.1.4"},
  37. CIDRNetworks: []string{"192.168.8.0/24"},
  38. }
  39. blFile := filepath.Join(os.TempDir(), "bl.json")
  40. slFile := filepath.Join(os.TempDir(), "sl.json")
  41. data, err := json.Marshal(bl)
  42. assert.NoError(t, err)
  43. err = os.WriteFile(blFile, data, os.ModePerm)
  44. assert.NoError(t, err)
  45. data, err = json.Marshal(sl)
  46. assert.NoError(t, err)
  47. err = os.WriteFile(slFile, data, os.ModePerm)
  48. assert.NoError(t, err)
  49. config := &DefenderConfig{
  50. Enabled: true,
  51. BanTime: 10,
  52. BanTimeIncrement: 2,
  53. Threshold: 5,
  54. ScoreInvalid: 2,
  55. ScoreValid: 1,
  56. ScoreNoAuth: 2,
  57. ScoreLimitExceeded: 3,
  58. ObservationTime: 15,
  59. EntriesSoftLimit: 1,
  60. EntriesHardLimit: 2,
  61. SafeListFile: "slFile",
  62. BlockListFile: "blFile",
  63. SafeList: []string{"192.168.1.3", "192.168.1.4", "192.168.9.0/24"},
  64. BlockList: []string{"192.168.1.1", "192.168.1.2", "10.8.9.0/24"},
  65. }
  66. _, err = newInMemoryDefender(config)
  67. assert.Error(t, err)
  68. config.BlockListFile = blFile
  69. _, err = newInMemoryDefender(config)
  70. assert.Error(t, err)
  71. config.SafeListFile = slFile
  72. d, err := newInMemoryDefender(config)
  73. assert.NoError(t, err)
  74. defender := d.(*memoryDefender)
  75. assert.True(t, defender.IsBanned("172.16.1.1"))
  76. assert.True(t, defender.IsBanned("192.168.1.1"))
  77. assert.False(t, defender.IsBanned("172.16.1.10"))
  78. assert.False(t, defender.IsBanned("192.168.1.10"))
  79. assert.False(t, defender.IsBanned("10.8.2.3"))
  80. assert.False(t, defender.IsBanned("10.9.2.3"))
  81. assert.True(t, defender.IsBanned("10.8.0.3"))
  82. assert.True(t, defender.IsBanned("10.8.9.3"))
  83. assert.False(t, defender.IsBanned("invalid ip"))
  84. assert.Equal(t, 0, defender.countBanned())
  85. assert.Equal(t, 0, defender.countHosts())
  86. hosts, err := defender.GetHosts()
  87. assert.NoError(t, err)
  88. assert.Len(t, hosts, 0)
  89. _, err = defender.GetHost("10.8.0.4")
  90. assert.Error(t, err)
  91. defender.AddEvent("172.16.1.4", HostEventLoginFailed)
  92. defender.AddEvent("192.168.1.4", HostEventLoginFailed)
  93. defender.AddEvent("192.168.8.4", HostEventUserNotFound)
  94. defender.AddEvent("172.16.1.3", HostEventLimitExceeded)
  95. defender.AddEvent("192.168.1.3", HostEventLimitExceeded)
  96. assert.Equal(t, 0, defender.countHosts())
  97. testIP := "12.34.56.78"
  98. defender.AddEvent(testIP, HostEventLoginFailed)
  99. assert.Equal(t, 1, defender.countHosts())
  100. assert.Equal(t, 0, defender.countBanned())
  101. score, err := defender.GetScore(testIP)
  102. assert.NoError(t, err)
  103. assert.Equal(t, 1, score)
  104. hosts, err = defender.GetHosts()
  105. assert.NoError(t, err)
  106. if assert.Len(t, hosts, 1) {
  107. assert.Equal(t, 1, hosts[0].Score)
  108. assert.True(t, hosts[0].BanTime.IsZero())
  109. assert.Empty(t, hosts[0].GetBanTime())
  110. }
  111. host, err := defender.GetHost(testIP)
  112. assert.NoError(t, err)
  113. assert.Equal(t, 1, host.Score)
  114. assert.Empty(t, host.GetBanTime())
  115. banTime, err := defender.GetBanTime(testIP)
  116. assert.NoError(t, err)
  117. assert.Nil(t, banTime)
  118. defender.AddEvent(testIP, HostEventLimitExceeded)
  119. assert.Equal(t, 1, defender.countHosts())
  120. assert.Equal(t, 0, defender.countBanned())
  121. score, err = defender.GetScore(testIP)
  122. assert.NoError(t, err)
  123. assert.Equal(t, 4, score)
  124. hosts, err = defender.GetHosts()
  125. assert.NoError(t, err)
  126. if assert.Len(t, hosts, 1) {
  127. assert.Equal(t, 4, hosts[0].Score)
  128. assert.True(t, hosts[0].BanTime.IsZero())
  129. assert.Empty(t, hosts[0].GetBanTime())
  130. }
  131. defender.AddEvent(testIP, HostEventUserNotFound)
  132. defender.AddEvent(testIP, HostEventNoLoginTried)
  133. assert.Equal(t, 0, defender.countHosts())
  134. assert.Equal(t, 1, defender.countBanned())
  135. score, err = defender.GetScore(testIP)
  136. assert.NoError(t, err)
  137. assert.Equal(t, 0, score)
  138. banTime, err = defender.GetBanTime(testIP)
  139. assert.NoError(t, err)
  140. assert.NotNil(t, banTime)
  141. hosts, err = defender.GetHosts()
  142. assert.NoError(t, err)
  143. if assert.Len(t, hosts, 1) {
  144. assert.Equal(t, 0, hosts[0].Score)
  145. assert.False(t, hosts[0].BanTime.IsZero())
  146. assert.NotEmpty(t, hosts[0].GetBanTime())
  147. assert.Equal(t, hex.EncodeToString([]byte(testIP)), hosts[0].GetID())
  148. }
  149. host, err = defender.GetHost(testIP)
  150. assert.NoError(t, err)
  151. assert.Equal(t, 0, host.Score)
  152. assert.NotEmpty(t, host.GetBanTime())
  153. // now test cleanup, testIP is already banned
  154. testIP1 := "12.34.56.79"
  155. testIP2 := "12.34.56.80"
  156. testIP3 := "12.34.56.81"
  157. defender.AddEvent(testIP1, HostEventNoLoginTried)
  158. defender.AddEvent(testIP2, HostEventNoLoginTried)
  159. assert.Equal(t, 2, defender.countHosts())
  160. time.Sleep(20 * time.Millisecond)
  161. defender.AddEvent(testIP3, HostEventNoLoginTried)
  162. assert.Equal(t, defender.config.EntriesSoftLimit, defender.countHosts())
  163. // testIP1 and testIP2 should be removed
  164. assert.Equal(t, defender.config.EntriesSoftLimit, defender.countHosts())
  165. score, err = defender.GetScore(testIP1)
  166. assert.NoError(t, err)
  167. assert.Equal(t, 0, score)
  168. score, err = defender.GetScore(testIP2)
  169. assert.NoError(t, err)
  170. assert.Equal(t, 0, score)
  171. score, err = defender.GetScore(testIP3)
  172. assert.NoError(t, err)
  173. assert.Equal(t, 2, score)
  174. defender.AddEvent(testIP3, HostEventNoLoginTried)
  175. defender.AddEvent(testIP3, HostEventNoLoginTried)
  176. // IP3 is now banned
  177. banTime, err = defender.GetBanTime(testIP3)
  178. assert.NoError(t, err)
  179. assert.NotNil(t, banTime)
  180. assert.Equal(t, 0, defender.countHosts())
  181. time.Sleep(20 * time.Millisecond)
  182. for i := 0; i < 3; i++ {
  183. defender.AddEvent(testIP1, HostEventNoLoginTried)
  184. }
  185. assert.Equal(t, 0, defender.countHosts())
  186. assert.Equal(t, config.EntriesSoftLimit, defender.countBanned())
  187. banTime, err = defender.GetBanTime(testIP)
  188. assert.NoError(t, err)
  189. assert.Nil(t, banTime)
  190. banTime, err = defender.GetBanTime(testIP3)
  191. assert.NoError(t, err)
  192. assert.Nil(t, banTime)
  193. banTime, err = defender.GetBanTime(testIP1)
  194. assert.NoError(t, err)
  195. assert.NotNil(t, banTime)
  196. for i := 0; i < 3; i++ {
  197. defender.AddEvent(testIP, HostEventNoLoginTried)
  198. time.Sleep(10 * time.Millisecond)
  199. defender.AddEvent(testIP3, HostEventNoLoginTried)
  200. }
  201. assert.Equal(t, 0, defender.countHosts())
  202. assert.Equal(t, defender.config.EntriesSoftLimit, defender.countBanned())
  203. banTime, err = defender.GetBanTime(testIP3)
  204. assert.NoError(t, err)
  205. if assert.NotNil(t, banTime) {
  206. assert.True(t, defender.IsBanned(testIP3))
  207. // ban time should increase
  208. newBanTime, err := defender.GetBanTime(testIP3)
  209. assert.NoError(t, err)
  210. assert.True(t, newBanTime.After(*banTime))
  211. }
  212. assert.True(t, defender.DeleteHost(testIP3))
  213. assert.False(t, defender.DeleteHost(testIP3))
  214. err = os.Remove(slFile)
  215. assert.NoError(t, err)
  216. err = os.Remove(blFile)
  217. assert.NoError(t, err)
  218. }
  219. func TestExpiredHostBans(t *testing.T) {
  220. config := &DefenderConfig{
  221. Enabled: true,
  222. BanTime: 10,
  223. BanTimeIncrement: 2,
  224. Threshold: 5,
  225. ScoreInvalid: 2,
  226. ScoreValid: 1,
  227. ScoreLimitExceeded: 3,
  228. ObservationTime: 15,
  229. EntriesSoftLimit: 1,
  230. EntriesHardLimit: 2,
  231. }
  232. d, err := newInMemoryDefender(config)
  233. assert.NoError(t, err)
  234. defender := d.(*memoryDefender)
  235. testIP := "1.2.3.4"
  236. defender.banned[testIP] = time.Now().Add(-24 * time.Hour)
  237. // the ban is expired testIP should not be listed
  238. res, err := defender.GetHosts()
  239. assert.NoError(t, err)
  240. assert.Len(t, res, 0)
  241. assert.False(t, defender.IsBanned(testIP))
  242. _, err = defender.GetHost(testIP)
  243. assert.Error(t, err)
  244. _, ok := defender.banned[testIP]
  245. assert.True(t, ok)
  246. // now add an event for an expired banned ip, it should be removed
  247. defender.AddEvent(testIP, HostEventLoginFailed)
  248. assert.False(t, defender.IsBanned(testIP))
  249. entry, err := defender.GetHost(testIP)
  250. assert.NoError(t, err)
  251. assert.Equal(t, testIP, entry.IP)
  252. assert.Empty(t, entry.GetBanTime())
  253. assert.Equal(t, 1, entry.Score)
  254. res, err = defender.GetHosts()
  255. assert.NoError(t, err)
  256. if assert.Len(t, res, 1) {
  257. assert.Equal(t, testIP, res[0].IP)
  258. assert.Empty(t, res[0].GetBanTime())
  259. assert.Equal(t, 1, res[0].Score)
  260. }
  261. events := []hostEvent{
  262. {
  263. dateTime: time.Now().Add(-24 * time.Hour),
  264. score: 2,
  265. },
  266. {
  267. dateTime: time.Now().Add(-24 * time.Hour),
  268. score: 3,
  269. },
  270. }
  271. hs := hostScore{
  272. Events: events,
  273. TotalScore: 5,
  274. }
  275. defender.hosts[testIP] = hs
  276. // the recorded scored are too old
  277. res, err = defender.GetHosts()
  278. assert.NoError(t, err)
  279. assert.Len(t, res, 0)
  280. _, err = defender.GetHost(testIP)
  281. assert.Error(t, err)
  282. _, ok = defender.hosts[testIP]
  283. assert.True(t, ok)
  284. }
  285. func TestLoadHostListFromFile(t *testing.T) {
  286. _, err := loadHostListFromFile(".")
  287. assert.Error(t, err)
  288. hostsFilePath := filepath.Join(os.TempDir(), "hostfile")
  289. content := make([]byte, 1048576*6)
  290. _, err = rand.Read(content)
  291. assert.NoError(t, err)
  292. err = os.WriteFile(hostsFilePath, content, os.ModePerm)
  293. assert.NoError(t, err)
  294. _, err = loadHostListFromFile(hostsFilePath)
  295. assert.Error(t, err)
  296. hl := HostListFile{
  297. IPAddresses: []string{},
  298. CIDRNetworks: []string{},
  299. }
  300. asJSON, err := json.Marshal(hl)
  301. assert.NoError(t, err)
  302. err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
  303. assert.NoError(t, err)
  304. hostList, err := loadHostListFromFile(hostsFilePath)
  305. assert.NoError(t, err)
  306. assert.Nil(t, hostList)
  307. hl.IPAddresses = append(hl.IPAddresses, "invalidip")
  308. asJSON, err = json.Marshal(hl)
  309. assert.NoError(t, err)
  310. err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
  311. assert.NoError(t, err)
  312. hostList, err = loadHostListFromFile(hostsFilePath)
  313. assert.NoError(t, err)
  314. assert.Len(t, hostList.IPAddresses, 0)
  315. hl.IPAddresses = nil
  316. hl.CIDRNetworks = append(hl.CIDRNetworks, "invalid net")
  317. asJSON, err = json.Marshal(hl)
  318. assert.NoError(t, err)
  319. err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
  320. assert.NoError(t, err)
  321. hostList, err = loadHostListFromFile(hostsFilePath)
  322. assert.NoError(t, err)
  323. assert.NotNil(t, hostList)
  324. assert.Len(t, hostList.IPAddresses, 0)
  325. assert.Equal(t, 0, hostList.Ranges.Len())
  326. if runtime.GOOS != osWindows {
  327. err = os.Chmod(hostsFilePath, 0111)
  328. assert.NoError(t, err)
  329. _, err = loadHostListFromFile(hostsFilePath)
  330. assert.Error(t, err)
  331. err = os.Chmod(hostsFilePath, 0644)
  332. assert.NoError(t, err)
  333. }
  334. err = os.WriteFile(hostsFilePath, []byte("non json content"), os.ModePerm)
  335. assert.NoError(t, err)
  336. _, err = loadHostListFromFile(hostsFilePath)
  337. assert.Error(t, err)
  338. err = os.Remove(hostsFilePath)
  339. assert.NoError(t, err)
  340. }
  341. func TestAddEntriesToHostList(t *testing.T) {
  342. name := "testList"
  343. hostlist := addEntriesToList([]string{"192.168.6.1", "10.7.0.0/25"}, nil, name)
  344. require.NotNil(t, hostlist)
  345. assert.True(t, hostlist.isListed("192.168.6.1"))
  346. assert.False(t, hostlist.isListed("192.168.6.2"))
  347. assert.True(t, hostlist.isListed("10.7.0.28"))
  348. assert.False(t, hostlist.isListed("10.7.0.129"))
  349. // load invalid values
  350. hostlist = addEntriesToList([]string{"invalidip", "invalidnet/24"}, nil, name)
  351. require.NotNil(t, hostlist)
  352. assert.Len(t, hostlist.IPAddresses, 0)
  353. assert.Equal(t, 0, hostlist.Ranges.Len())
  354. }
  355. func TestDefenderCleanup(t *testing.T) {
  356. d := memoryDefender{
  357. baseDefender: baseDefender{
  358. config: &DefenderConfig{
  359. ObservationTime: 1,
  360. EntriesSoftLimit: 2,
  361. EntriesHardLimit: 3,
  362. },
  363. },
  364. banned: make(map[string]time.Time),
  365. hosts: make(map[string]hostScore),
  366. }
  367. d.banned["1.1.1.1"] = time.Now().Add(-24 * time.Hour)
  368. d.banned["1.1.1.2"] = time.Now().Add(-24 * time.Hour)
  369. d.banned["1.1.1.3"] = time.Now().Add(-24 * time.Hour)
  370. d.banned["1.1.1.4"] = time.Now().Add(-24 * time.Hour)
  371. d.cleanupBanned()
  372. assert.Equal(t, 0, d.countBanned())
  373. d.banned["2.2.2.2"] = time.Now().Add(2 * time.Minute)
  374. d.banned["2.2.2.3"] = time.Now().Add(1 * time.Minute)
  375. d.banned["2.2.2.4"] = time.Now().Add(3 * time.Minute)
  376. d.banned["2.2.2.5"] = time.Now().Add(4 * time.Minute)
  377. d.cleanupBanned()
  378. assert.Equal(t, d.config.EntriesSoftLimit, d.countBanned())
  379. banTime, err := d.GetBanTime("2.2.2.3")
  380. assert.NoError(t, err)
  381. assert.Nil(t, banTime)
  382. d.hosts["3.3.3.3"] = hostScore{
  383. TotalScore: 0,
  384. Events: []hostEvent{
  385. {
  386. dateTime: time.Now().Add(-5 * time.Minute),
  387. score: 1,
  388. },
  389. {
  390. dateTime: time.Now().Add(-3 * time.Minute),
  391. score: 1,
  392. },
  393. {
  394. dateTime: time.Now(),
  395. score: 1,
  396. },
  397. },
  398. }
  399. d.hosts["3.3.3.4"] = hostScore{
  400. TotalScore: 1,
  401. Events: []hostEvent{
  402. {
  403. dateTime: time.Now().Add(-3 * time.Minute),
  404. score: 1,
  405. },
  406. },
  407. }
  408. d.hosts["3.3.3.5"] = hostScore{
  409. TotalScore: 1,
  410. Events: []hostEvent{
  411. {
  412. dateTime: time.Now().Add(-2 * time.Minute),
  413. score: 1,
  414. },
  415. },
  416. }
  417. d.hosts["3.3.3.6"] = hostScore{
  418. TotalScore: 1,
  419. Events: []hostEvent{
  420. {
  421. dateTime: time.Now().Add(-1 * time.Minute),
  422. score: 1,
  423. },
  424. },
  425. }
  426. score, err := d.GetScore("3.3.3.3")
  427. assert.NoError(t, err)
  428. assert.Equal(t, 1, score)
  429. d.cleanupHosts()
  430. assert.Equal(t, d.config.EntriesSoftLimit, d.countHosts())
  431. score, err = d.GetScore("3.3.3.4")
  432. assert.NoError(t, err)
  433. assert.Equal(t, 0, score)
  434. }
  435. func TestDefenderConfig(t *testing.T) {
  436. c := DefenderConfig{}
  437. err := c.validate()
  438. require.NoError(t, err)
  439. c.Enabled = true
  440. c.Threshold = 10
  441. c.ScoreInvalid = 10
  442. err = c.validate()
  443. require.Error(t, err)
  444. c.ScoreInvalid = 2
  445. c.ScoreLimitExceeded = 10
  446. err = c.validate()
  447. require.Error(t, err)
  448. c.ScoreLimitExceeded = 2
  449. c.ScoreValid = 10
  450. err = c.validate()
  451. require.Error(t, err)
  452. c.ScoreValid = 1
  453. c.ScoreNoAuth = 10
  454. err = c.validate()
  455. require.Error(t, err)
  456. c.ScoreNoAuth = 2
  457. c.BanTime = 0
  458. err = c.validate()
  459. require.Error(t, err)
  460. c.BanTime = 30
  461. c.BanTimeIncrement = 0
  462. err = c.validate()
  463. require.Error(t, err)
  464. c.BanTimeIncrement = 50
  465. c.ObservationTime = 0
  466. err = c.validate()
  467. require.Error(t, err)
  468. c.ObservationTime = 30
  469. err = c.validate()
  470. require.Error(t, err)
  471. c.EntriesSoftLimit = 10
  472. err = c.validate()
  473. require.Error(t, err)
  474. c.EntriesHardLimit = 10
  475. err = c.validate()
  476. require.Error(t, err)
  477. c.EntriesHardLimit = 20
  478. err = c.validate()
  479. require.NoError(t, err)
  480. c = DefenderConfig{
  481. Enabled: true,
  482. ScoreInvalid: -1,
  483. ScoreLimitExceeded: -1,
  484. ScoreNoAuth: -1,
  485. ScoreValid: -1,
  486. }
  487. err = c.validate()
  488. require.Error(t, err)
  489. assert.Equal(t, 0, c.ScoreInvalid)
  490. assert.Equal(t, 0, c.ScoreValid)
  491. assert.Equal(t, 0, c.ScoreLimitExceeded)
  492. assert.Equal(t, 0, c.ScoreNoAuth)
  493. }
  494. func BenchmarkDefenderBannedSearch(b *testing.B) {
  495. d := getDefenderForBench()
  496. ip, ipnet, err := net.ParseCIDR("10.8.0.0/12") // 1048574 ip addresses
  497. if err != nil {
  498. panic(err)
  499. }
  500. for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
  501. d.banned[ip.String()] = time.Now().Add(10 * time.Minute)
  502. }
  503. b.ResetTimer()
  504. for i := 0; i < b.N; i++ {
  505. d.IsBanned("192.168.1.1")
  506. }
  507. }
  508. func BenchmarkCleanup(b *testing.B) {
  509. d := getDefenderForBench()
  510. ip, ipnet, err := net.ParseCIDR("192.168.4.0/24")
  511. if err != nil {
  512. panic(err)
  513. }
  514. b.ResetTimer()
  515. for i := 0; i < b.N; i++ {
  516. for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
  517. d.AddEvent(ip.String(), HostEventLoginFailed)
  518. if d.countHosts() > d.config.EntriesHardLimit {
  519. panic("too many hosts")
  520. }
  521. if d.countBanned() > d.config.EntriesSoftLimit {
  522. panic("too many ip banned")
  523. }
  524. }
  525. }
  526. }
  527. func BenchmarkDefenderBannedSearchWithBlockList(b *testing.B) {
  528. d := getDefenderForBench()
  529. d.blockList = &HostList{
  530. IPAddresses: make(map[string]bool),
  531. Ranges: cidranger.NewPCTrieRanger(),
  532. }
  533. ip, ipnet, err := net.ParseCIDR("129.8.0.0/12") // 1048574 ip addresses
  534. if err != nil {
  535. panic(err)
  536. }
  537. for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
  538. d.banned[ip.String()] = time.Now().Add(10 * time.Minute)
  539. d.blockList.IPAddresses[ip.String()] = true
  540. }
  541. for i := 0; i < 255; i++ {
  542. cidr := fmt.Sprintf("10.8.%v.1/24", i)
  543. _, network, _ := net.ParseCIDR(cidr)
  544. if err := d.blockList.Ranges.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
  545. panic(err)
  546. }
  547. }
  548. b.ResetTimer()
  549. for i := 0; i < b.N; i++ {
  550. d.IsBanned("192.168.1.1")
  551. }
  552. }
  553. func BenchmarkHostListSearch(b *testing.B) {
  554. hostlist := &HostList{
  555. IPAddresses: make(map[string]bool),
  556. Ranges: cidranger.NewPCTrieRanger(),
  557. }
  558. ip, ipnet, _ := net.ParseCIDR("172.16.0.0/16")
  559. for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
  560. hostlist.IPAddresses[ip.String()] = true
  561. }
  562. for i := 0; i < 255; i++ {
  563. cidr := fmt.Sprintf("10.8.%v.1/24", i)
  564. _, network, _ := net.ParseCIDR(cidr)
  565. if err := hostlist.Ranges.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
  566. panic(err)
  567. }
  568. }
  569. b.ResetTimer()
  570. for i := 0; i < b.N; i++ {
  571. if hostlist.isListed("192.167.1.2") {
  572. panic("should not be listed")
  573. }
  574. }
  575. }
  576. func BenchmarkCIDRanger(b *testing.B) {
  577. ranger := cidranger.NewPCTrieRanger()
  578. for i := 0; i < 255; i++ {
  579. cidr := fmt.Sprintf("192.168.%v.1/24", i)
  580. _, network, _ := net.ParseCIDR(cidr)
  581. if err := ranger.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
  582. panic(err)
  583. }
  584. }
  585. ipToMatch := net.ParseIP("192.167.1.2")
  586. b.ResetTimer()
  587. for i := 0; i < b.N; i++ {
  588. if _, err := ranger.Contains(ipToMatch); err != nil {
  589. panic(err)
  590. }
  591. }
  592. }
  593. func BenchmarkNetContains(b *testing.B) {
  594. var nets []*net.IPNet
  595. for i := 0; i < 255; i++ {
  596. cidr := fmt.Sprintf("192.168.%v.1/24", i)
  597. _, network, _ := net.ParseCIDR(cidr)
  598. nets = append(nets, network)
  599. }
  600. ipToMatch := net.ParseIP("192.167.1.1")
  601. b.ResetTimer()
  602. for i := 0; i < b.N; i++ {
  603. for _, n := range nets {
  604. n.Contains(ipToMatch)
  605. }
  606. }
  607. }
  608. func getDefenderForBench() *memoryDefender {
  609. config := &DefenderConfig{
  610. Enabled: true,
  611. BanTime: 30,
  612. BanTimeIncrement: 50,
  613. Threshold: 10,
  614. ScoreInvalid: 2,
  615. ScoreValid: 2,
  616. ObservationTime: 30,
  617. EntriesSoftLimit: 50,
  618. EntriesHardLimit: 100,
  619. }
  620. return &memoryDefender{
  621. baseDefender: baseDefender{
  622. config: config,
  623. },
  624. hosts: make(map[string]hostScore),
  625. banned: make(map[string]time.Time),
  626. }
  627. }
  628. func inc(ip net.IP) {
  629. for j := len(ip) - 1; j >= 0; j-- {
  630. ip[j]++
  631. if ip[j] > 0 {
  632. break
  633. }
  634. }
  635. }