aboutsummaryrefslogtreecommitdiff
path: root/utils/ipaddr2list.py
diff options
context:
space:
mode:
authorIvan Nardi <12729895+IvanNardi@users.noreply.github.com>2023-07-27 09:05:22 +0200
committerGitHub <noreply@github.com>2023-07-27 09:05:22 +0200
commitbc91192acadda102169adacfed967f57f395f1bd (patch)
treecc2fb723b533c8dbfd86dc5b4e659841f1a2ce4e /utils/ipaddr2list.py
parent3326fa258ec92e553e39fc8a1bfa3921dc81f15c (diff)
ProtonVPN: split the ip list (#2060)
Use two separate lists: * one for the ingress nodes, which triggers a ProtonVPN classification * one for the egress nodes, which triggers the `NDPI_ANONYMOUS_SUBSCRIBER` risk Add a command line option (to `ndpiReader`) to easily test IP/port matching. Add another example of custom rule.
Diffstat (limited to 'utils/ipaddr2list.py')
-rwxr-xr-xutils/ipaddr2list.py10
1 files changed, 7 insertions, 3 deletions
diff --git a/utils/ipaddr2list.py b/utils/ipaddr2list.py
index bc7114bd4..1f610c88e 100755
--- a/utils/ipaddr2list.py
+++ b/utils/ipaddr2list.py
@@ -6,13 +6,17 @@ import socket, struct
# This scripts is mainly used to create "ip -> protocols" lists.
# However it is also used to create "ip -> risk" lists
proto = "NDPI_PROTOCOL_XYX"
+append_name = ""
if len (sys.argv) < 2 :
- print("Usage: ipaddr2list.py <file> <protocol>")
+ print("Usage: ipaddr2list.py <file> <protocol> [<append_name>]")
sys.exit (1)
-if len (sys.argv) == 3:
+if len (sys.argv) >= 3:
proto = sys.argv[2]
+if len (sys.argv) >= 4:
+ append_name = sys.argv[3]
+
print("""/*
@@ -38,7 +42,7 @@ print("""/*
""")
-print("static ndpi_network "+proto.lower()+"_protocol_list[] = {")
+print("static ndpi_network "+proto.lower()+append_name+"_protocol_list[] = {")
lines = 0
with open(sys.argv[1]) as fp: