forked from felixonmars/dnsmasq-china-list
280 lines
9.2 KiB
Python
Executable File
280 lines
9.2 KiB
Python
Executable File
#!/usr/bin/env python
|
|
|
|
import dns.resolver, dns.rdataclass, dns.rdatatype, dns.name
|
|
from termcolor import colored
|
|
import random
|
|
import ipaddress
|
|
import tldextract
|
|
from io import StringIO
|
|
|
|
|
|
class ChnroutesNotAvailable(Exception):
|
|
pass
|
|
|
|
class NSNotAvailable(Exception):
|
|
pass
|
|
|
|
# OK
|
|
class OK(Exception):
|
|
pass
|
|
|
|
class WhitelistMatched(OK):
|
|
pass
|
|
|
|
class CDNListVerified(OK):
|
|
pass
|
|
|
|
class NSVerified(OK):
|
|
pass
|
|
|
|
# Not OK
|
|
class NotOK(Exception):
|
|
pass
|
|
|
|
class NXDOMAIN(NotOK):
|
|
pass
|
|
|
|
class BlacklistMatched(NotOK):
|
|
pass
|
|
|
|
class CDNListNotVerified(NotOK):
|
|
pass
|
|
|
|
class NSNotVerified(NotOK):
|
|
pass
|
|
|
|
|
|
class ChinaListVerify(object):
|
|
whitelist_file = "ns-whitelist.txt"
|
|
blacklist_file = "ns-blacklist.txt"
|
|
cdnlist_file = "cdn-testlist.txt"
|
|
chnroutes_file = "/usr/share/chnroutes2/chnroutes.txt"
|
|
tld_ns = {}
|
|
|
|
def __init__(self):
|
|
self.whitelist = self.load_list(self.whitelist_file)
|
|
self.blacklist = self.load_list(self.blacklist_file)
|
|
self.cdnlist = self.load_list(self.cdnlist_file)
|
|
|
|
try:
|
|
self.chnroutes = self.load_list(self.chnroutes_file)
|
|
except FileNotFoundError:
|
|
print(colored("Failed to load chnroutes, CDN check disabled", "red"))
|
|
self.chnroutes = None
|
|
|
|
def load_list(self, filename):
|
|
with open(filename) as f:
|
|
return list([l.rstrip('\n') for l in f if l and not l.startswith("#")])
|
|
|
|
def test_cn_ip(self, domain, response=None):
|
|
if self.chnroutes is None:
|
|
raise ChnroutesNotAvailable
|
|
|
|
answers = None
|
|
if response:
|
|
try:
|
|
answers = response.find_rrset(response.additional, dns.name.from_text(domain), dns.rdataclass.IN, dns.rdatatype.A)
|
|
except KeyError:
|
|
pass
|
|
|
|
if not answers:
|
|
answers = self.resolve(domain, 'A')
|
|
|
|
for answer in answers:
|
|
answer = answer.to_text()
|
|
if any(ipaddress.IPv4Address(answer) in ipaddress.IPv4Network(n) for n in self.chnroutes):
|
|
return True
|
|
|
|
return False
|
|
|
|
def resolve(self, domain, rdtype="A", server=None, authority=False):
|
|
# Compatibility between dnspython 1.16 and 2.0
|
|
if hasattr(dns.resolver, "resolve"):
|
|
action = "resolve"
|
|
else:
|
|
action = "query"
|
|
|
|
if not server:
|
|
return getattr(dns.resolver, action)(domain, rdtype)
|
|
elif not authority:
|
|
return getattr(dns.resolver.Resolver(filename=StringIO("nameserver " + server)), action)(domain, rdtype)
|
|
else:
|
|
answer = getattr(dns.resolver.Resolver(filename=StringIO("nameserver " + server)), action)(domain, rdtype, raise_on_no_answer=False)
|
|
return answer.response
|
|
|
|
def get_ns_for_tld(self, tld):
|
|
if tld not in self.tld_ns:
|
|
answers = self.resolve(tld + ".", "NS")
|
|
for answer in answers:
|
|
try:
|
|
ips = self.resolve(answer.to_text())
|
|
self.tld_ns[tld] = ips[0].to_text()
|
|
break
|
|
except dns.resolver.NXDOMAIN:
|
|
pass
|
|
else:
|
|
raise
|
|
|
|
return self.tld_ns[tld]
|
|
|
|
def check_whitelist(self, nameservers):
|
|
if any(i in " ".join(nameservers) for i in self.whitelist):
|
|
raise WhitelistMatched
|
|
|
|
def check_blacklist(self, nameservers):
|
|
if any((rule := i) in " ".join(nameservers) for i in self.blacklist):
|
|
raise BlacklistMatched(rule)
|
|
|
|
def check_cdnlist(self, domain):
|
|
if self.test_cn_ip(domain):
|
|
raise CDNListVerified
|
|
else:
|
|
raise CDNListNotVerified
|
|
|
|
def check_domain(self, domain, enable_cdnlist=True):
|
|
nameservers = []
|
|
nxdomain = False
|
|
try:
|
|
response = self.resolve(domain + ".", 'NS', self.get_ns_for_tld(tldextract.extract(domain).suffix), authority=True)
|
|
except dns.resolver.NXDOMAIN:
|
|
nxdomain = True
|
|
except:
|
|
raise
|
|
pass
|
|
else:
|
|
for rdata in response.authority[0]:
|
|
nameserver = rdata.to_text()
|
|
if tldextract.extract(nameserver).registered_domain:
|
|
nameservers.append(nameserver)
|
|
|
|
self.check_whitelist(nameservers)
|
|
|
|
if enable_cdnlist:
|
|
for testdomain in self.cdnlist:
|
|
if testdomain == domain or testdomain.endswith("." + domain):
|
|
try:
|
|
self.check_cdnlist(testdomain)
|
|
except dns.resolver.NXDOMAIN:
|
|
raise NXDOMAIN
|
|
|
|
# Assuming CDNList for non-TLDs
|
|
if domain.count(".") > 1 and tldextract.extract(domain).registered_domain != domain:
|
|
try:
|
|
self.check_cdnlist(domain)
|
|
except (dns.resolver.NoAnswer, dns.resolver.NXDOMAIN, dns.resolver.NoNameservers, dns.exception.Timeout):
|
|
pass
|
|
|
|
if nxdomain:
|
|
# Double check due to false positives
|
|
try:
|
|
self.resolve("www." + domain, 'A')
|
|
except dns.resolver.NXDOMAIN:
|
|
raise NXDOMAIN
|
|
|
|
self.check_blacklist(nameservers)
|
|
|
|
for nameserver in nameservers:
|
|
try:
|
|
if self.test_cn_ip(nameserver, response):
|
|
raise NSVerified
|
|
except (dns.resolver.NoAnswer, dns.resolver.NXDOMAIN, dns.resolver.NoNameservers, dns.exception.Timeout):
|
|
pass
|
|
|
|
if nameservers:
|
|
raise NSNotVerified(nameserver)
|
|
else:
|
|
raise NSNotAvailable
|
|
|
|
def check_domain_quiet(self, domain, **kwargs):
|
|
try:
|
|
self.check_domain(domain, **kwargs)
|
|
except OK:
|
|
return True
|
|
except NotOK:
|
|
return False
|
|
except:
|
|
return None
|
|
else:
|
|
return None
|
|
|
|
def check_domain_verbose(self, domain, show_green=False, **kwargs):
|
|
try:
|
|
try:
|
|
self.check_domain(domain, **kwargs)
|
|
except NXDOMAIN:
|
|
print(colored("NXDOMAIN found in (cdnlist or) domain: " + domain, "white", "on_red"))
|
|
raise
|
|
except WhitelistMatched:
|
|
if show_green:
|
|
print(colored("NS Whitelist matched for domain: " + domain, "green"))
|
|
raise
|
|
except CDNListVerified:
|
|
if show_green:
|
|
print(colored("CDNList matched and verified for domain: " + domain, "green"))
|
|
raise
|
|
except CDNListNotVerified:
|
|
print(colored("CDNList matched but failed to verify for domain: " + domain, "red"))
|
|
raise
|
|
except BlacklistMatched as rule:
|
|
print(colored(f"NS Blacklist matched for domain: {domain} ({rule})", "red"))
|
|
raise
|
|
except NSVerified:
|
|
if show_green:
|
|
print(colored("NS verified for domain: " + domain, "green"))
|
|
raise
|
|
except NSNotVerified as nameserver:
|
|
print(colored(f"NS failed to verify for domain: {domain} ({nameserver})", "red"))
|
|
raise
|
|
except ChnroutesNotAvailable:
|
|
print("Additional Check disabled due to missing chnroutes. domain:", domain)
|
|
raise
|
|
except NSNotAvailable:
|
|
print("Failed to get correct name server for domain:", domain)
|
|
raise
|
|
else:
|
|
raise NotImplementedError
|
|
except OK:
|
|
return True
|
|
except NotOK:
|
|
return False
|
|
except:
|
|
return None
|
|
else:
|
|
return None
|
|
|
|
def check_domain_list(self, domain_list, sample=30, show_green=False):
|
|
domains = self.load_list(domain_list)
|
|
if sample:
|
|
domains = random.sample(domains, sample)
|
|
else:
|
|
random.shuffle(domains)
|
|
for domain in domains:
|
|
self.check_domain_verbose(domain, show_green=show_green)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
import argparse
|
|
description = 'A simple verify library for dnsmasq-china-list'
|
|
parser = argparse.ArgumentParser(description=description)
|
|
parser.add_argument('-f', '--file', nargs='?', default="accelerated-domains.china.raw.txt",
|
|
help='File to examine')
|
|
parser.add_argument('-s', '--sample', nargs='?', default=0,
|
|
help='Verify only a limited sample. Pass 0 to example all entries.')
|
|
parser.add_argument('-v', '--verbose', action="store_true",
|
|
help='Show green results.')
|
|
parser.add_argument('-d', '--domain', nargs='?',
|
|
help='Verify a domain instead of checking a list. Will ignore the other options.')
|
|
parser.add_argument('-D', '--dns', nargs='?',
|
|
help='Specify a DNS server to use instead of the system default one.')
|
|
|
|
config = parser.parse_args()
|
|
v = ChinaListVerify()
|
|
|
|
if config.dns:
|
|
dns.resolver.get_default_resolver().nameservers=[config.dns]
|
|
|
|
if config.domain:
|
|
v.check_domain_verbose(config.domain, show_green=config.verbose)
|
|
else:
|
|
v.check_domain_list(config.file, show_green=config.verbose, sample=int(config.sample))
|