晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
|
Server : Apache System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64 User : rainic ( 1014) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /opt/imunify360/venv/lib64/python3.11/site-packages/defence360agent/model/ |
Upload File : |
import itertools
import logging
import time
from peewee import (
CharField,
FloatField,
IntegerField,
TextField,
)
from defence360agent.model import instance, Model
logger = logging.getLogger(__name__)
class InfectedDomainList(Model):
"""Domains with bad reputation, used for Reputation Management feature."""
id = IntegerField(primary_key=True)
#: Username associated with the domain in hosting panel.
username = CharField(null=True)
#: Domain name.
name = CharField(null=False)
#: The kind of threat reported by reputation engine,
#: e.g. "SOCIAL_ENGINEERING".
threat_type = CharField(null=False)
#: The time when Imunify first detected that the domain has bad reputation.
timestamp = FloatField()
#: The name of the reputation engine, e.g. "google-safe-browsing".
vendor = TextField(null=True)
class Meta:
database = instance.db
db_table = "infected_domain_list"
@classmethod
def get_by_user(cls, existing_users, offset=0, limit=50):
# to be able to filter query results using existing_users,
# limit/offset os applied on python side
query = cls.select().order_by(
cls.username, cls.name, cls.timestamp.desc()
)
filtered_by_user = (
row for row in query.dicts() if row["username"] in existing_users
)
grouped = itertools.groupby(
filtered_by_user, key=lambda row: (row["username"], row["name"])
)
max_count = 0
result = []
for i, value in enumerate(grouped):
max_count += 1
if (len(result) < limit) and (i >= offset):
group, threats = value
username, name = group
result.append(
{
"username": username,
"domain": name,
"threats": [
{
"type": t["threat_type"],
"vendor": t["vendor"],
"timestamp": t["timestamp"],
}
for t in threats
],
}
)
return result, max_count
@classmethod
def refresh_domains(cls, domains, domains_to_users):
"""
Update domain reputatuion info. If threat info already exists, do not
update timestamp
:param domains: reputation data from server
:param domains_to_users: domain -> users mapping from hosting panel
:return:
"""
existing = {
(r["name"], r["threat_type"], r["vendor"]): r["timestamp"]
for r in cls.select().dicts()
}
with instance.db.atomic():
cls.delete().execute()
now = time.time()
for domain_info in domains:
domain = domain_info["query"]
if domain not in domains_to_users:
logger.warning("Users for domain %s not found.", domain)
continue
for user in domains_to_users[domain]:
vendor = domain_info["vendor"]
if vendor in (
"google-safe-browsing",
"yandex-safe-browsing",
):
threat_type = domain_info["details"]["threat_type"]
elif vendor == "spamhaus":
threat_type = domain_info["details"]
elif vendor in ("phishtank", "openphish"):
# https://cloudlinux.atlassian.net/wiki/spaces/IPT/pages/929759302/4.1+Multiple+vendors+in+Reputation+Management+ver.4.2 # noqa: E501
threat_type = "spam domain"
else:
threat_type = "THREAT_TYPE_UNSPECIFIED"
timestamp = existing.get(
(domain, threat_type, vendor), now
)
cls.create(
username=user,
name=domain,
threat_type=threat_type,
vendor=vendor,
timestamp=timestamp,
)