mirror of
https://github.com/SukkaW/Surge.git
synced 2025-12-12 01:00:34 +08:00
88 lines
3.6 KiB
TypeScript
88 lines
3.6 KiB
TypeScript
// @ts-check
|
|
import path from 'node:path';
|
|
import { readFileIntoProcessedArray } from './lib/fetch-text-by-line';
|
|
import { task } from './trace';
|
|
import { SHARED_DESCRIPTION } from './constants/description';
|
|
import { compareAndWriteFile } from './lib/create-file';
|
|
import { OUTPUT_INTERNAL_DIR, SOURCE_DIR } from './constants/dir';
|
|
import { fetchAssets } from './lib/fetch-assets';
|
|
import { fastIpVersion } from './lib/misc';
|
|
import { AUGUST_ASN, HUIZE_ASN } from '../Source/ip/badboy_asn';
|
|
import { RulesetOutput } from './lib/rules/ruleset';
|
|
|
|
const getBogusNxDomainIPsPromise: Promise<[ipv4: string[], ipv6: string[]]> = fetchAssets(
|
|
'https://cdn.jsdelivr.net/gh/felixonmars/dnsmasq-china-list@master/bogus-nxdomain.china.conf',
|
|
['https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf'],
|
|
true
|
|
).then((arr) => {
|
|
const ipv4: string[] = [];
|
|
const ipv6: string[] = [];
|
|
|
|
for (let i = 0, len = arr.length; i < len; i++) {
|
|
const line = arr[i];
|
|
if (line.startsWith('bogus-nxdomain=')) {
|
|
const ip = line.slice(15).trim();
|
|
const v = fastIpVersion(ip);
|
|
if (v === 4) {
|
|
ipv4.push(ip);
|
|
} else if (v === 6) {
|
|
ipv6.push(ip);
|
|
}
|
|
}
|
|
}
|
|
|
|
return [ipv4, ipv6] as const;
|
|
});
|
|
|
|
const BOTNET_FILTER_URL = 'https://malware-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt';
|
|
const BOTNET_FILTER_MIRROR_URL = [
|
|
'https://botnet-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt',
|
|
'https://malware-filter.gitlab.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
|
|
'https://malware-filter.gitlab.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt'
|
|
// 'https://curbengh.github.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt',
|
|
// https://curbengh.github.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt
|
|
];
|
|
|
|
const getBotNetFilterIPsPromise: Promise<[ipv4: string[], ipv6: string[]]> = fetchAssets(BOTNET_FILTER_URL, BOTNET_FILTER_MIRROR_URL, true).then(arr => arr.reduce<[ipv4: string[], ipv6: string[]]>((acc, ip) => {
|
|
const v = fastIpVersion(ip);
|
|
if (v === 4) {
|
|
acc[0].push(ip);
|
|
} else if (v === 6) {
|
|
acc[1].push(ip);
|
|
}
|
|
return acc;
|
|
}, [[], []]));
|
|
|
|
const readLocalRejectIpListPromise = readFileIntoProcessedArray(path.resolve(SOURCE_DIR, 'ip/reject.conf'));
|
|
|
|
export const buildRejectIPList = task(require.main === module, __filename)(async (span) => {
|
|
const [bogusNxDomainIPs, botNetIPs] = await Promise.all([
|
|
span.traceChildPromise('get bogus nxdomain ips', getBogusNxDomainIPsPromise),
|
|
span.traceChildPromise('get botnet ips', getBotNetFilterIPsPromise)
|
|
]);
|
|
|
|
return Promise.all([
|
|
new RulesetOutput(span, 'reject', 'ip')
|
|
.withTitle('Sukka\'s Ruleset - Anti Bogus Domain')
|
|
.withDescription([
|
|
...SHARED_DESCRIPTION,
|
|
'',
|
|
'This file contains known addresses that are hijacking NXDOMAIN results returned by DNS servers, and botnet controller IPs.',
|
|
'',
|
|
'Data from:',
|
|
' - https://github.com/felixonmars/dnsmasq-china-list',
|
|
' - https://github.com/curbengh/botnet-filter'
|
|
])
|
|
.addFromRuleset(readLocalRejectIpListPromise)
|
|
.bulkAddCIDR4NoResolve(bogusNxDomainIPs[0])
|
|
.bulkAddCIDR6NoResolve(bogusNxDomainIPs[1])
|
|
.bulkAddCIDR4NoResolve(botNetIPs[0])
|
|
.bulkAddCIDR6NoResolve(botNetIPs[1])
|
|
.bulkAddIPASN(AUGUST_ASN)
|
|
.bulkAddIPASN(HUIZE_ASN)
|
|
.write(),
|
|
compareAndWriteFile(span, [AUGUST_ASN.join(' ')], path.join(OUTPUT_INTERNAL_DIR, 'august_asn.txt')),
|
|
compareAndWriteFile(span, [HUIZE_ASN.join(' ')], path.join(OUTPUT_INTERNAL_DIR, 'huize_asn.txt'))
|
|
]);
|
|
});
|