#!/usr/bin/env python import copy import logging import os import re import select import socket import ssl import struct import time from nettacker.core.lib.base import BaseEngine, BaseLibrary from nettacker.core.utils.common import reverse_and_regex_condition log = logging.getLogger(__name__) def create_tcp_socket(host, port, timeout): try: socket_connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM) socket_connection.settimeout(timeout) socket_connection.connect((host, port)) ssl_flag = False except ConnectionRefusedError: return None try: socket_connection = ssl.wrap_socket(socket_connection) ssl_flag = True except Exception: socket_connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM) socket_connection.settimeout(timeout) socket_connection.connect((host, port)) # finally: # socket_connection.shutdown() return socket_connection, ssl_flag class SocketLibrary(BaseLibrary): def tcp_connect_only(self, host, port, timeout): tcp_socket = create_tcp_socket(host, port, timeout) if tcp_socket is None: return None socket_connection, ssl_flag = tcp_socket peer_name = socket_connection.getpeername() socket_connection.close() return { "peer_name": peer_name, "service": socket.getservbyport(int(port)), "ssl_flag": ssl_flag, } def tcp_connect_send_and_receive(self, host, port, timeout): tcp_socket = create_tcp_socket(host, port, timeout) if tcp_socket is None: return None socket_connection, ssl_flag = tcp_socket peer_name = socket_connection.getpeername() try: socket_connection.send(b"ABC\x00\r\n\r\n\r\n" * 10) response = socket_connection.recv(1024 * 1024 * 10) socket_connection.close() # except ConnectionRefusedError: # return None except Exception: try: socket_connection.close() response = b"" except Exception: response = b"" return { "peer_name": peer_name, "service": socket.getservbyport(port), "response": response.decode(errors="ignore"), "ssl_flag": ssl_flag, } def socket_icmp(self, host, timeout): """ A pure python ping implementation using raw socket. Note that ICMP messages can only be sent from processes running as root. Derived from ping.c distributed in Linux's netkit. That code is copyright (c) 1989 by The Regents of the University of California. That code is in turn derived from code written by Mike Muuss of the US Army Ballistic Research Laboratory in December, 1983 and placed in the public domain. They have my thanks. Bugs are naturally mine. I'd be glad to hear about them. There are certainly word - size dependenceies here. Copyright (c) Matthew Dixon Cowles, . Distributable under the terms of the GNU General Public License version 2. Provided with no warranties of any sort. Original Version from Matthew Dixon Cowles: -> ftp://ftp.visi.com/users/mdc/ping.py Rewrite by Jens Diemer: -> http://www.python-forum.de/post-69122.html#69122 Rewrite by George Notaras: -> http://www.g-loaded.eu/2009/10/30/python-ping/ Fork by Pierre Bourdon: -> http://bitbucket.org/delroth/python-ping/ Revision history ~~~~~~~~~~~~~~~~ November 22, 1997 ----------------- Initial hack. Doesn't do much, but rather than try to guess what features I (or others) will want in the future, I've only put in what I need now. December 16, 1997 ----------------- For some reason, the checksum bytes are in the wrong order when this is run under Solaris 2.X for SPARC but it works right under Linux x86. Since I don't know just what's wrong, I'll swap the bytes always and then do an htons(). December 4, 2000 ---------------- Changed the struct.pack() calls to pack the checksum and ID as unsigned. My thanks to Jerome Poincheval for the fix. May 30, 2007 ------------ little rewrite by Jens Diemer: - change socket asterisk import to a normal import - replace time.time() with time.clock() - delete "return None" (or change to "return" only) - in checksum() rename "str" to "source_string" November 8, 2009 ---------------- Improved compatibility with GNU/Linux systems. Fixes by: * George Notaras -- http://www.g-loaded.eu Reported by: * Chris Hallman -- http://cdhallman.blogspot.com Changes in this release: - Re-use time.time() instead of time.clock(). The 2007 implementation worked only under Microsoft Windows. Failed on GNU/Linux. time.clock() behaves differently under the two OSes[1]. [1] http://docs.python.org/library/time.html#time.clock September 25, 2010 ------------------ Little modifications by Georgi Kolev: - Added quiet_ping function. - returns percent lost packages, max round trip time, avrg round trip time - Added packet size to verbose_ping & quiet_ping functions. - Bump up version to 0.2 ------------------ 5 Aug 2021 - Modified by Ali Razmjoo Qalaei (Reformat the code and more human readable) """ icmp_socket = socket.getprotobyname("icmp") socket_connection = socket.socket(socket.AF_INET, socket.SOCK_RAW, icmp_socket) random_integer = os.getpid() & 0xFFFF icmp_echo_request = 8 # Make a dummy header with a 0 checksum. dummy_checksum = 0 header = struct.pack("bbHHh", icmp_echo_request, 0, dummy_checksum, random_integer, 1) data = ( struct.pack("d", time.time()) + struct.pack("d", time.time()) + str((76 - struct.calcsize("d")) * "Q").encode() ) # packet size = 76 (removed 8 bytes size of header) source_string = header + data # Calculate the checksum on the data and the dummy header. calculate_data = 0 max_size = (len(source_string) / 2) * 2 counter = 0 while counter < max_size: calculate_data += source_string[counter + 1] * 256 + source_string[counter] calculate_data = calculate_data & 0xFFFFFFFF # Necessary? counter += 2 if max_size < len(source_string): calculate_data += source_string[len(source_string) - 1] calculate_data = calculate_data & 0xFFFFFFFF # Necessary? calculate_data = (calculate_data >> 16) + (calculate_data & 0xFFFF) calculate_data = calculate_data + (calculate_data >> 16) calculated_data = ~calculate_data & 0xFFFF # Swap bytes. Bugger me if I know why. dummy_checksum = calculated_data >> 8 | (calculated_data << 8 & 0xFF00) header = struct.pack( "bbHHh", icmp_echo_request, 0, socket.htons(dummy_checksum), random_integer, 1, ) socket_connection.sendto( header + data, (socket.gethostbyname(host), 1) ) # Don't know about the 1 while True: started_select = time.time() what_ready = select.select([socket_connection], [], [], timeout) how_long_in_select = time.time() - started_select if not what_ready[0]: # Timeout break time_received = time.time() received_packet, address = socket_connection.recvfrom(1024) icmp_header = received_packet[20:28] ( packet_type, packet_code, packet_checksum, packet_id, packet_sequence, ) = struct.unpack("bbHHh", icmp_header) if packet_id == random_integer: packet_bytes = struct.calcsize("d") time_sent = struct.unpack("d", received_packet[28 : 28 + packet_bytes])[0] delay = time_received - time_sent break timeout = timeout - how_long_in_select if timeout <= 0: break socket_connection.close() return {"host": host, "response_time": delay, "ssl_flag": False} class SocketEngine(BaseEngine): library = SocketLibrary def response_conditions_matched(self, sub_step, response): conditions = sub_step["response"]["conditions"] condition_type = sub_step["response"]["condition_type"] condition_results = {} if sub_step["method"] == "tcp_connect_only": return response if sub_step["method"] == "tcp_connect_send_and_receive": if response: for condition in conditions: regex = re.findall( re.compile(conditions[condition]["regex"]), response["response"] if condition != "open_port" else str(response["peer_name"][1]), ) reverse = conditions[condition]["reverse"] condition_results[condition] = reverse_and_regex_condition(regex, reverse) for condition in copy.deepcopy(condition_results): if not condition_results[condition]: del condition_results[condition] if "open_port" in condition_results and len(condition_results) > 1: del condition_results["open_port"] del conditions["open_port"] if condition_type == "and": return condition_results if len(condition_results) == len(conditions) else [] if condition_type == "or": return condition_results if condition_results else [] return [] if sub_step["method"] == "socket_icmp": return response return [] def apply_extra_data(self, sub_step, response): sub_step["response"]["ssl_flag"] = ( response["ssl_flag"] if isinstance(response, dict) else False ) sub_step["response"]["conditions_results"] = self.response_conditions_matched( sub_step, response )