OXIESEC PANEL
- Current Dir:
/
/
opt
/
alt
/
python37
/
lib
/
python3.7
/
site-packages
/
exabgp
/
configuration
/
flow
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/16/2023 12:55:54 PM
rwxr-xr-x
📄
__init__.py
2.35 KB
03/13/2021 04:30:48 PM
rw-r--r--
📁
__pycache__
-
03/16/2023 12:55:54 PM
rwxr-xr-x
📄
match.py
3.43 KB
03/13/2021 04:30:48 PM
rw-r--r--
📄
parser.py
12.84 KB
03/13/2021 04:30:48 PM
rw-r--r--
📄
route.py
2.07 KB
03/13/2021 04:30:48 PM
rw-r--r--
📄
scope.py
778 bytes
03/13/2021 04:30:48 PM
rw-r--r--
📄
then.py
2.51 KB
03/13/2021 04:30:48 PM
rw-r--r--
Editing: match.py
Close
# encoding: utf-8 """ match.py Created by Thomas Mangin on 2015-06-22. Copyright (c) 2009-2017 Exa Networks. All rights reserved. License: 3-clause BSD. (See the COPYRIGHT file) """ from exabgp.configuration.core import Section from exabgp.configuration.flow.parser import source from exabgp.configuration.flow.parser import destination from exabgp.configuration.flow.parser import any_port from exabgp.configuration.flow.parser import source_port from exabgp.configuration.flow.parser import destination_port from exabgp.configuration.flow.parser import tcp_flags from exabgp.configuration.flow.parser import protocol from exabgp.configuration.flow.parser import next_header from exabgp.configuration.flow.parser import fragment from exabgp.configuration.flow.parser import packet_length from exabgp.configuration.flow.parser import icmp_code from exabgp.configuration.flow.parser import icmp_type from exabgp.configuration.flow.parser import dscp from exabgp.configuration.flow.parser import traffic_class from exabgp.configuration.flow.parser import flow_label class ParseFlowMatch(Section): definition = [ 'source 10.0.0.0/24', 'source ::1/128/0', 'destination 10.0.1.0/24', 'port 25', 'source-port >1024', 'destination-port [ =80 =3128 >8080&<8088 ]', 'packet-length [ >200&<300 >400&<500 ]', 'tcp-flags [ 0x20+0x8+0x1 #name-here ] # to check', '(ipv4 only) protocol [ udp tcp ]', '(ipv4 only) fragment [ not-a-fragment dont-fragment is-fragment first-fragment last-fragment ]', '(ipv6 only) next-header [ udp tcp ]', '(ipv6 only) flow-label >100&<2000', '(ipv6 only) icmp-type 35 # to check', '(ipv6 only) icmp-code 55 # to check', ] syntax = 'match {\n' ' %s;\n' '}' % ';\n '.join(definition) known = { 'source': source, 'source-ipv4': source, 'source-ipv6': source, 'destination': destination, 'destination-ipv4': destination, 'destination-ipv6': destination, 'protocol': protocol, 'next-header': next_header, 'port': any_port, 'destination-port': destination_port, 'source-port': source_port, 'icmp-type': icmp_type, 'icmp-code': icmp_code, 'tcp-flags': tcp_flags, 'packet-length': packet_length, 'dscp': dscp, 'traffic-class': traffic_class, 'fragment': fragment, 'flow-label': flow_label, } # 'source-ipv4','destination-ipv4', action = { 'source': 'nlri-add', 'source-ipv4': 'nlri-add', 'source-ipv6': 'nlri-add', 'destination': 'nlri-add', 'destination-ipv4': 'nlri-add', 'destination-ipv6': 'nlri-add', 'port': 'nlri-add', 'source-port': 'nlri-add', 'destination-port': 'nlri-add', 'protocol': 'nlri-add', 'packet-length': 'nlri-add', 'tcp-flags': 'nlri-add', 'next-header': 'nlri-add', 'fragment': 'nlri-add', 'icmp-code': 'nlri-add', 'icmp-type': 'nlri-add', 'packet-length': 'nlri-add', 'dscp': 'nlri-add', 'traffic-class': 'nlri-add', 'flow-label': 'nlri-add', } name = 'flow/match' def __init__(self, tokeniser, scope, error, logger): Section.__init__(self, tokeniser, scope, error, logger) def clear(self): pass def pre(self): return True def post(self): return True