Module src.bigbrother.ministry.ofcommunication
Onionr - Private P2P Communication.
Ensure sockets don't get made to non localhost
Expand source code
"""Onionr - Private P2P Communication.
Ensure sockets don't get made to non localhost
"""
import ipaddress
import logger
from onionrexceptions import NetworkLeak
"""
    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <https://www.gnu.org/licenses/>.
"""
def detect_socket_leaks(socket_event):
    """Is called by the big brother broker whenever.
    a socket connection happens.
    raises exception & logs if not to loopback
    """
    ip_address = socket_event[1][0]
    # validate is valid ip address (no hostname, etc)
    # raises NetworkLeak if not
    try:
        ipaddress.ip_address(ip_address)
    except ValueError:
        logger.warn(f'Conn made to {ip_address} outside of Tor/similar')
        raise \
            NetworkLeak('Conn to host/non local IP, this is a privacy issue!')
    # Validate that the IP is localhost ipv4
    if not ip_address.startswith('127'):
        logger.warn(f'Conn made to {ip_address} outside of Tor/similar')
        raise NetworkLeak('Conn to non local IP, this is a privacy concern!')
Functions
def detect_socket_leaks(socket_event)- 
Is called by the big brother broker whenever.
a socket connection happens. raises exception & logs if not to loopback
Expand source code
def detect_socket_leaks(socket_event): """Is called by the big brother broker whenever. a socket connection happens. raises exception & logs if not to loopback """ ip_address = socket_event[1][0] # validate is valid ip address (no hostname, etc) # raises NetworkLeak if not try: ipaddress.ip_address(ip_address) except ValueError: logger.warn(f'Conn made to {ip_address} outside of Tor/similar') raise \ NetworkLeak('Conn to host/non local IP, this is a privacy issue!') # Validate that the IP is localhost ipv4 if not ip_address.startswith('127'): logger.warn(f'Conn made to {ip_address} outside of Tor/similar') raise NetworkLeak('Conn to non local IP, this is a privacy concern!')