123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715 |
- // Copyright (C) 2019-2023 Nicola Murino
- //
- // This program is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Affero General Public License as published
- // by the Free Software Foundation, version 3.
- //
- // This program is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Affero General Public License for more details.
- //
- // You should have received a copy of the GNU Affero General Public License
- // along with this program. If not, see <https://www.gnu.org/licenses/>.
- package common
- import (
- "crypto/rand"
- "encoding/hex"
- "encoding/json"
- "fmt"
- "net"
- "os"
- "path/filepath"
- "runtime"
- "testing"
- "time"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "github.com/yl2chen/cidranger"
- )
- func TestBasicDefender(t *testing.T) {
- bl := HostListFile{
- IPAddresses: []string{"172.16.1.1", "172.16.1.2"},
- CIDRNetworks: []string{"10.8.0.0/24"},
- }
- sl := HostListFile{
- IPAddresses: []string{"172.16.1.3", "172.16.1.4"},
- CIDRNetworks: []string{"192.168.8.0/24"},
- }
- blFile := filepath.Join(os.TempDir(), "bl.json")
- slFile := filepath.Join(os.TempDir(), "sl.json")
- data, err := json.Marshal(bl)
- assert.NoError(t, err)
- err = os.WriteFile(blFile, data, os.ModePerm)
- assert.NoError(t, err)
- data, err = json.Marshal(sl)
- assert.NoError(t, err)
- err = os.WriteFile(slFile, data, os.ModePerm)
- assert.NoError(t, err)
- config := &DefenderConfig{
- Enabled: true,
- BanTime: 10,
- BanTimeIncrement: 2,
- Threshold: 5,
- ScoreInvalid: 2,
- ScoreValid: 1,
- ScoreLimitExceeded: 3,
- ObservationTime: 15,
- EntriesSoftLimit: 1,
- EntriesHardLimit: 2,
- SafeListFile: "slFile",
- BlockListFile: "blFile",
- SafeList: []string{"192.168.1.3", "192.168.1.4", "192.168.9.0/24"},
- BlockList: []string{"192.168.1.1", "192.168.1.2", "10.8.9.0/24"},
- }
- _, err = newInMemoryDefender(config)
- assert.Error(t, err)
- config.BlockListFile = blFile
- _, err = newInMemoryDefender(config)
- assert.Error(t, err)
- config.SafeListFile = slFile
- d, err := newInMemoryDefender(config)
- assert.NoError(t, err)
- defender := d.(*memoryDefender)
- assert.True(t, defender.IsBanned("172.16.1.1"))
- assert.True(t, defender.IsBanned("192.168.1.1"))
- assert.False(t, defender.IsBanned("172.16.1.10"))
- assert.False(t, defender.IsBanned("192.168.1.10"))
- assert.False(t, defender.IsBanned("10.8.2.3"))
- assert.False(t, defender.IsBanned("10.9.2.3"))
- assert.True(t, defender.IsBanned("10.8.0.3"))
- assert.True(t, defender.IsBanned("10.8.9.3"))
- assert.False(t, defender.IsBanned("invalid ip"))
- assert.Equal(t, 0, defender.countBanned())
- assert.Equal(t, 0, defender.countHosts())
- hosts, err := defender.GetHosts()
- assert.NoError(t, err)
- assert.Len(t, hosts, 0)
- _, err = defender.GetHost("10.8.0.4")
- assert.Error(t, err)
- defender.AddEvent("172.16.1.4", HostEventLoginFailed)
- defender.AddEvent("192.168.1.4", HostEventLoginFailed)
- defender.AddEvent("192.168.8.4", HostEventUserNotFound)
- defender.AddEvent("172.16.1.3", HostEventLimitExceeded)
- defender.AddEvent("192.168.1.3", HostEventLimitExceeded)
- assert.Equal(t, 0, defender.countHosts())
- testIP := "12.34.56.78"
- defender.AddEvent(testIP, HostEventLoginFailed)
- assert.Equal(t, 1, defender.countHosts())
- assert.Equal(t, 0, defender.countBanned())
- score, err := defender.GetScore(testIP)
- assert.NoError(t, err)
- assert.Equal(t, 1, score)
- hosts, err = defender.GetHosts()
- assert.NoError(t, err)
- if assert.Len(t, hosts, 1) {
- assert.Equal(t, 1, hosts[0].Score)
- assert.True(t, hosts[0].BanTime.IsZero())
- assert.Empty(t, hosts[0].GetBanTime())
- }
- host, err := defender.GetHost(testIP)
- assert.NoError(t, err)
- assert.Equal(t, 1, host.Score)
- assert.Empty(t, host.GetBanTime())
- banTime, err := defender.GetBanTime(testIP)
- assert.NoError(t, err)
- assert.Nil(t, banTime)
- defender.AddEvent(testIP, HostEventLimitExceeded)
- assert.Equal(t, 1, defender.countHosts())
- assert.Equal(t, 0, defender.countBanned())
- score, err = defender.GetScore(testIP)
- assert.NoError(t, err)
- assert.Equal(t, 4, score)
- hosts, err = defender.GetHosts()
- assert.NoError(t, err)
- if assert.Len(t, hosts, 1) {
- assert.Equal(t, 4, hosts[0].Score)
- assert.True(t, hosts[0].BanTime.IsZero())
- assert.Empty(t, hosts[0].GetBanTime())
- }
- defender.AddEvent(testIP, HostEventNoLoginTried)
- defender.AddEvent(testIP, HostEventNoLoginTried)
- assert.Equal(t, 0, defender.countHosts())
- assert.Equal(t, 1, defender.countBanned())
- score, err = defender.GetScore(testIP)
- assert.NoError(t, err)
- assert.Equal(t, 0, score)
- banTime, err = defender.GetBanTime(testIP)
- assert.NoError(t, err)
- assert.NotNil(t, banTime)
- hosts, err = defender.GetHosts()
- assert.NoError(t, err)
- if assert.Len(t, hosts, 1) {
- assert.Equal(t, 0, hosts[0].Score)
- assert.False(t, hosts[0].BanTime.IsZero())
- assert.NotEmpty(t, hosts[0].GetBanTime())
- assert.Equal(t, hex.EncodeToString([]byte(testIP)), hosts[0].GetID())
- }
- host, err = defender.GetHost(testIP)
- assert.NoError(t, err)
- assert.Equal(t, 0, host.Score)
- assert.NotEmpty(t, host.GetBanTime())
- // now test cleanup, testIP is already banned
- testIP1 := "12.34.56.79"
- testIP2 := "12.34.56.80"
- testIP3 := "12.34.56.81"
- defender.AddEvent(testIP1, HostEventNoLoginTried)
- defender.AddEvent(testIP2, HostEventNoLoginTried)
- assert.Equal(t, 2, defender.countHosts())
- time.Sleep(20 * time.Millisecond)
- defender.AddEvent(testIP3, HostEventNoLoginTried)
- assert.Equal(t, defender.config.EntriesSoftLimit, defender.countHosts())
- // testIP1 and testIP2 should be removed
- assert.Equal(t, defender.config.EntriesSoftLimit, defender.countHosts())
- score, err = defender.GetScore(testIP1)
- assert.NoError(t, err)
- assert.Equal(t, 0, score)
- score, err = defender.GetScore(testIP2)
- assert.NoError(t, err)
- assert.Equal(t, 0, score)
- score, err = defender.GetScore(testIP3)
- assert.NoError(t, err)
- assert.Equal(t, 2, score)
- defender.AddEvent(testIP3, HostEventNoLoginTried)
- defender.AddEvent(testIP3, HostEventNoLoginTried)
- // IP3 is now banned
- banTime, err = defender.GetBanTime(testIP3)
- assert.NoError(t, err)
- assert.NotNil(t, banTime)
- assert.Equal(t, 0, defender.countHosts())
- time.Sleep(20 * time.Millisecond)
- for i := 0; i < 3; i++ {
- defender.AddEvent(testIP1, HostEventNoLoginTried)
- }
- assert.Equal(t, 0, defender.countHosts())
- assert.Equal(t, config.EntriesSoftLimit, defender.countBanned())
- banTime, err = defender.GetBanTime(testIP)
- assert.NoError(t, err)
- assert.Nil(t, banTime)
- banTime, err = defender.GetBanTime(testIP3)
- assert.NoError(t, err)
- assert.Nil(t, banTime)
- banTime, err = defender.GetBanTime(testIP1)
- assert.NoError(t, err)
- assert.NotNil(t, banTime)
- for i := 0; i < 3; i++ {
- defender.AddEvent(testIP, HostEventNoLoginTried)
- time.Sleep(10 * time.Millisecond)
- defender.AddEvent(testIP3, HostEventNoLoginTried)
- }
- assert.Equal(t, 0, defender.countHosts())
- assert.Equal(t, defender.config.EntriesSoftLimit, defender.countBanned())
- banTime, err = defender.GetBanTime(testIP3)
- assert.NoError(t, err)
- if assert.NotNil(t, banTime) {
- assert.True(t, defender.IsBanned(testIP3))
- // ban time should increase
- newBanTime, err := defender.GetBanTime(testIP3)
- assert.NoError(t, err)
- assert.True(t, newBanTime.After(*banTime))
- }
- assert.True(t, defender.DeleteHost(testIP3))
- assert.False(t, defender.DeleteHost(testIP3))
- err = os.Remove(slFile)
- assert.NoError(t, err)
- err = os.Remove(blFile)
- assert.NoError(t, err)
- }
- func TestExpiredHostBans(t *testing.T) {
- config := &DefenderConfig{
- Enabled: true,
- BanTime: 10,
- BanTimeIncrement: 2,
- Threshold: 5,
- ScoreInvalid: 2,
- ScoreValid: 1,
- ScoreLimitExceeded: 3,
- ObservationTime: 15,
- EntriesSoftLimit: 1,
- EntriesHardLimit: 2,
- }
- d, err := newInMemoryDefender(config)
- assert.NoError(t, err)
- defender := d.(*memoryDefender)
- testIP := "1.2.3.4"
- defender.banned[testIP] = time.Now().Add(-24 * time.Hour)
- // the ban is expired testIP should not be listed
- res, err := defender.GetHosts()
- assert.NoError(t, err)
- assert.Len(t, res, 0)
- assert.False(t, defender.IsBanned(testIP))
- _, err = defender.GetHost(testIP)
- assert.Error(t, err)
- _, ok := defender.banned[testIP]
- assert.True(t, ok)
- // now add an event for an expired banned ip, it should be removed
- defender.AddEvent(testIP, HostEventLoginFailed)
- assert.False(t, defender.IsBanned(testIP))
- entry, err := defender.GetHost(testIP)
- assert.NoError(t, err)
- assert.Equal(t, testIP, entry.IP)
- assert.Empty(t, entry.GetBanTime())
- assert.Equal(t, 1, entry.Score)
- res, err = defender.GetHosts()
- assert.NoError(t, err)
- if assert.Len(t, res, 1) {
- assert.Equal(t, testIP, res[0].IP)
- assert.Empty(t, res[0].GetBanTime())
- assert.Equal(t, 1, res[0].Score)
- }
- events := []hostEvent{
- {
- dateTime: time.Now().Add(-24 * time.Hour),
- score: 2,
- },
- {
- dateTime: time.Now().Add(-24 * time.Hour),
- score: 3,
- },
- }
- hs := hostScore{
- Events: events,
- TotalScore: 5,
- }
- defender.hosts[testIP] = hs
- // the recorded scored are too old
- res, err = defender.GetHosts()
- assert.NoError(t, err)
- assert.Len(t, res, 0)
- _, err = defender.GetHost(testIP)
- assert.Error(t, err)
- _, ok = defender.hosts[testIP]
- assert.True(t, ok)
- }
- func TestLoadHostListFromFile(t *testing.T) {
- _, err := loadHostListFromFile(".")
- assert.Error(t, err)
- hostsFilePath := filepath.Join(os.TempDir(), "hostfile")
- content := make([]byte, 1048576*6)
- _, err = rand.Read(content)
- assert.NoError(t, err)
- err = os.WriteFile(hostsFilePath, content, os.ModePerm)
- assert.NoError(t, err)
- _, err = loadHostListFromFile(hostsFilePath)
- assert.Error(t, err)
- hl := HostListFile{
- IPAddresses: []string{},
- CIDRNetworks: []string{},
- }
- asJSON, err := json.Marshal(hl)
- assert.NoError(t, err)
- err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
- assert.NoError(t, err)
- hostList, err := loadHostListFromFile(hostsFilePath)
- assert.NoError(t, err)
- assert.Nil(t, hostList)
- hl.IPAddresses = append(hl.IPAddresses, "invalidip")
- asJSON, err = json.Marshal(hl)
- assert.NoError(t, err)
- err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
- assert.NoError(t, err)
- hostList, err = loadHostListFromFile(hostsFilePath)
- assert.NoError(t, err)
- assert.Len(t, hostList.IPAddresses, 0)
- hl.IPAddresses = nil
- hl.CIDRNetworks = append(hl.CIDRNetworks, "invalid net")
- asJSON, err = json.Marshal(hl)
- assert.NoError(t, err)
- err = os.WriteFile(hostsFilePath, asJSON, os.ModePerm)
- assert.NoError(t, err)
- hostList, err = loadHostListFromFile(hostsFilePath)
- assert.NoError(t, err)
- assert.NotNil(t, hostList)
- assert.Len(t, hostList.IPAddresses, 0)
- assert.Equal(t, 0, hostList.Ranges.Len())
- if runtime.GOOS != osWindows {
- err = os.Chmod(hostsFilePath, 0111)
- assert.NoError(t, err)
- _, err = loadHostListFromFile(hostsFilePath)
- assert.Error(t, err)
- err = os.Chmod(hostsFilePath, 0644)
- assert.NoError(t, err)
- }
- err = os.WriteFile(hostsFilePath, []byte("non json content"), os.ModePerm)
- assert.NoError(t, err)
- _, err = loadHostListFromFile(hostsFilePath)
- assert.Error(t, err)
- err = os.Remove(hostsFilePath)
- assert.NoError(t, err)
- }
- func TestAddEntriesToHostList(t *testing.T) {
- name := "testList"
- hostlist := addEntriesToList([]string{"192.168.6.1", "10.7.0.0/25"}, nil, name)
- require.NotNil(t, hostlist)
- assert.True(t, hostlist.isListed("192.168.6.1"))
- assert.False(t, hostlist.isListed("192.168.6.2"))
- assert.True(t, hostlist.isListed("10.7.0.28"))
- assert.False(t, hostlist.isListed("10.7.0.129"))
- // load invalid values
- hostlist = addEntriesToList([]string{"invalidip", "invalidnet/24"}, nil, name)
- require.NotNil(t, hostlist)
- assert.Len(t, hostlist.IPAddresses, 0)
- assert.Equal(t, 0, hostlist.Ranges.Len())
- }
- func TestDefenderCleanup(t *testing.T) {
- d := memoryDefender{
- baseDefender: baseDefender{
- config: &DefenderConfig{
- ObservationTime: 1,
- EntriesSoftLimit: 2,
- EntriesHardLimit: 3,
- },
- },
- banned: make(map[string]time.Time),
- hosts: make(map[string]hostScore),
- }
- d.banned["1.1.1.1"] = time.Now().Add(-24 * time.Hour)
- d.banned["1.1.1.2"] = time.Now().Add(-24 * time.Hour)
- d.banned["1.1.1.3"] = time.Now().Add(-24 * time.Hour)
- d.banned["1.1.1.4"] = time.Now().Add(-24 * time.Hour)
- d.cleanupBanned()
- assert.Equal(t, 0, d.countBanned())
- d.banned["2.2.2.2"] = time.Now().Add(2 * time.Minute)
- d.banned["2.2.2.3"] = time.Now().Add(1 * time.Minute)
- d.banned["2.2.2.4"] = time.Now().Add(3 * time.Minute)
- d.banned["2.2.2.5"] = time.Now().Add(4 * time.Minute)
- d.cleanupBanned()
- assert.Equal(t, d.config.EntriesSoftLimit, d.countBanned())
- banTime, err := d.GetBanTime("2.2.2.3")
- assert.NoError(t, err)
- assert.Nil(t, banTime)
- d.hosts["3.3.3.3"] = hostScore{
- TotalScore: 0,
- Events: []hostEvent{
- {
- dateTime: time.Now().Add(-5 * time.Minute),
- score: 1,
- },
- {
- dateTime: time.Now().Add(-3 * time.Minute),
- score: 1,
- },
- {
- dateTime: time.Now(),
- score: 1,
- },
- },
- }
- d.hosts["3.3.3.4"] = hostScore{
- TotalScore: 1,
- Events: []hostEvent{
- {
- dateTime: time.Now().Add(-3 * time.Minute),
- score: 1,
- },
- },
- }
- d.hosts["3.3.3.5"] = hostScore{
- TotalScore: 1,
- Events: []hostEvent{
- {
- dateTime: time.Now().Add(-2 * time.Minute),
- score: 1,
- },
- },
- }
- d.hosts["3.3.3.6"] = hostScore{
- TotalScore: 1,
- Events: []hostEvent{
- {
- dateTime: time.Now().Add(-1 * time.Minute),
- score: 1,
- },
- },
- }
- score, err := d.GetScore("3.3.3.3")
- assert.NoError(t, err)
- assert.Equal(t, 1, score)
- d.cleanupHosts()
- assert.Equal(t, d.config.EntriesSoftLimit, d.countHosts())
- score, err = d.GetScore("3.3.3.4")
- assert.NoError(t, err)
- assert.Equal(t, 0, score)
- }
- func TestDefenderConfig(t *testing.T) {
- c := DefenderConfig{}
- err := c.validate()
- require.NoError(t, err)
- c.Enabled = true
- c.Threshold = 10
- c.ScoreInvalid = 10
- err = c.validate()
- require.Error(t, err)
- c.ScoreInvalid = 2
- c.ScoreLimitExceeded = 10
- err = c.validate()
- require.Error(t, err)
- c.ScoreLimitExceeded = 2
- c.ScoreValid = 10
- err = c.validate()
- require.Error(t, err)
- c.ScoreValid = 1
- c.BanTime = 0
- err = c.validate()
- require.Error(t, err)
- c.BanTime = 30
- c.BanTimeIncrement = 0
- err = c.validate()
- require.Error(t, err)
- c.BanTimeIncrement = 50
- c.ObservationTime = 0
- err = c.validate()
- require.Error(t, err)
- c.ObservationTime = 30
- err = c.validate()
- require.Error(t, err)
- c.EntriesSoftLimit = 10
- err = c.validate()
- require.Error(t, err)
- c.EntriesHardLimit = 10
- err = c.validate()
- require.Error(t, err)
- c.EntriesHardLimit = 20
- err = c.validate()
- require.NoError(t, err)
- }
- func BenchmarkDefenderBannedSearch(b *testing.B) {
- d := getDefenderForBench()
- ip, ipnet, err := net.ParseCIDR("10.8.0.0/12") // 1048574 ip addresses
- if err != nil {
- panic(err)
- }
- for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
- d.banned[ip.String()] = time.Now().Add(10 * time.Minute)
- }
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- d.IsBanned("192.168.1.1")
- }
- }
- func BenchmarkCleanup(b *testing.B) {
- d := getDefenderForBench()
- ip, ipnet, err := net.ParseCIDR("192.168.4.0/24")
- if err != nil {
- panic(err)
- }
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
- d.AddEvent(ip.String(), HostEventLoginFailed)
- if d.countHosts() > d.config.EntriesHardLimit {
- panic("too many hosts")
- }
- if d.countBanned() > d.config.EntriesSoftLimit {
- panic("too many ip banned")
- }
- }
- }
- }
- func BenchmarkDefenderBannedSearchWithBlockList(b *testing.B) {
- d := getDefenderForBench()
- d.blockList = &HostList{
- IPAddresses: make(map[string]bool),
- Ranges: cidranger.NewPCTrieRanger(),
- }
- ip, ipnet, err := net.ParseCIDR("129.8.0.0/12") // 1048574 ip addresses
- if err != nil {
- panic(err)
- }
- for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
- d.banned[ip.String()] = time.Now().Add(10 * time.Minute)
- d.blockList.IPAddresses[ip.String()] = true
- }
- for i := 0; i < 255; i++ {
- cidr := fmt.Sprintf("10.8.%v.1/24", i)
- _, network, _ := net.ParseCIDR(cidr)
- if err := d.blockList.Ranges.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
- panic(err)
- }
- }
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- d.IsBanned("192.168.1.1")
- }
- }
- func BenchmarkHostListSearch(b *testing.B) {
- hostlist := &HostList{
- IPAddresses: make(map[string]bool),
- Ranges: cidranger.NewPCTrieRanger(),
- }
- ip, ipnet, _ := net.ParseCIDR("172.16.0.0/16")
- for ip := ip.Mask(ipnet.Mask); ipnet.Contains(ip); inc(ip) {
- hostlist.IPAddresses[ip.String()] = true
- }
- for i := 0; i < 255; i++ {
- cidr := fmt.Sprintf("10.8.%v.1/24", i)
- _, network, _ := net.ParseCIDR(cidr)
- if err := hostlist.Ranges.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
- panic(err)
- }
- }
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- if hostlist.isListed("192.167.1.2") {
- panic("should not be listed")
- }
- }
- }
- func BenchmarkCIDRanger(b *testing.B) {
- ranger := cidranger.NewPCTrieRanger()
- for i := 0; i < 255; i++ {
- cidr := fmt.Sprintf("192.168.%v.1/24", i)
- _, network, _ := net.ParseCIDR(cidr)
- if err := ranger.Insert(cidranger.NewBasicRangerEntry(*network)); err != nil {
- panic(err)
- }
- }
- ipToMatch := net.ParseIP("192.167.1.2")
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- if _, err := ranger.Contains(ipToMatch); err != nil {
- panic(err)
- }
- }
- }
- func BenchmarkNetContains(b *testing.B) {
- var nets []*net.IPNet
- for i := 0; i < 255; i++ {
- cidr := fmt.Sprintf("192.168.%v.1/24", i)
- _, network, _ := net.ParseCIDR(cidr)
- nets = append(nets, network)
- }
- ipToMatch := net.ParseIP("192.167.1.1")
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- for _, n := range nets {
- n.Contains(ipToMatch)
- }
- }
- }
- func getDefenderForBench() *memoryDefender {
- config := &DefenderConfig{
- Enabled: true,
- BanTime: 30,
- BanTimeIncrement: 50,
- Threshold: 10,
- ScoreInvalid: 2,
- ScoreValid: 2,
- ObservationTime: 30,
- EntriesSoftLimit: 50,
- EntriesHardLimit: 100,
- }
- return &memoryDefender{
- baseDefender: baseDefender{
- config: config,
- },
- hosts: make(map[string]hostScore),
- banned: make(map[string]time.Time),
- }
- }
- func inc(ip net.IP) {
- for j := len(ip) - 1; j >= 0; j-- {
- ip[j]++
- if ip[j] > 0 {
- break
- }
- }
- }
|