2014-11-24 21:37:37 +01:00
|
|
|
import socket
|
|
|
|
|
2014-11-21 16:57:37 +01:00
|
|
|
from iwla import IWLA
|
2014-11-24 17:13:59 +01:00
|
|
|
from iplugin import IPlugin
|
2014-11-21 16:57:37 +01:00
|
|
|
|
2014-11-24 17:13:59 +01:00
|
|
|
class IWLAPostAnalysisReverseDNS(IPlugin):
|
2014-11-24 21:42:57 +01:00
|
|
|
def __init__(self, iwla):
|
|
|
|
super(IWLAPostAnalysisReverseDNS, self).__init__(iwla)
|
2014-11-24 17:13:59 +01:00
|
|
|
self.API_VERSION = 1
|
2014-11-21 16:57:37 +01:00
|
|
|
|
2014-11-24 21:37:37 +01:00
|
|
|
def load(self):
|
2014-11-24 21:42:57 +01:00
|
|
|
timeout = self.iwla.getConfValue('reverse_dns_timeout', 0.5)
|
2014-11-24 21:37:37 +01:00
|
|
|
socket.setdefaulttimeout(timeout)
|
|
|
|
return True
|
|
|
|
|
2014-11-24 17:13:59 +01:00
|
|
|
def hook(self, iwla):
|
|
|
|
hits = iwla.getValidVisitors()
|
|
|
|
for (k, hit) in hits.items():
|
|
|
|
if hit.get('dns_analysed', False): continue
|
|
|
|
try:
|
|
|
|
name, _, _ = socket.gethostbyaddr(k)
|
|
|
|
hit['remote_addr'] = name
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
finally:
|
|
|
|
hit['dns_analysed'] = True
|
2014-11-21 16:57:37 +01:00
|
|
|
|