Merge #16999: net: 0.19 seeds update
0218171a24
contrib: Remove invalid nodes from seeds list (Wladimir J. van der Laan)3b09f2b9d9
net: 0.19 hardcoded seeds update (Wladimir J. van der Laan)801d341f3a
contrib: makeseeds: More fancy output (Wladimir J. van der Laan)ed76299bea
contrib: makeseeds: Limit per network, instead of total (Wladimir J. van der Laan)c254a9ef69
contrib: makeseeds: dedup by ip,port (Wladimir J. van der Laan)3314d87966
contrib: makeseeds: Factor out ASN lookup (Wladimir J. van der Laan)301c2b1ab5
contrib: makeseeds: Improve logging and filtering (Wladimir J. van der Laan) Pull request description: - contrib: Improve makeseeds script - net: 0.19 hardcoded seeds update Sources: - http://bitcoin.sipa.be/seeds.txt.gz (Sipa) - https://github.com/bitcoin/bitcoin/files/3671913/dnsseed.dump.tar.gz (Sjors) Output: ``` Initial: IPv4 418690, IPv6 55861, Onion 2747 Skip entries with invalid address: IPv4 418690, IPv6 55861, Onion 2747 After removing duplicates: IPv4 409220, IPv6 54028, Onion 2717 Skip entries from suspicious hosts: IPv4 409219, IPv6 54028, Onion 2717 Enforce minimal number of blocks: IPv4 106719, IPv6 46342, Onion 2621 Require service bit 1: IPv4 106384, IPv6 46241, Onion 2542 Require minimum uptime: IPv4 5300, IPv6 1153, Onion 201 Require a known and recent user agent: IPv4 4642, IPv6 1060, Onion 141 Filter out hosts with multiple bitcoin ports: IPv4 4642, IPv6 1060, Onion 141 Look up ASNs and limit results, both per ASN and globally: IPv4 464, IPv6 48, Onion 141 ``` ACKs for top commit: Sjors: ACK0218171
. I also checked that `chainparamsseeds.h` is generated from `nodes_main.txt`. Sounds like we should look at this script a bit more outside release moments :-) Tree-SHA512: c1f5795fe88d14800c4da918387368d51e85f4319f2ce3c0359851d041767e2883f32b1da371bba22bd5f0b442ac3e5ea7d685c233ad2cc4045c930f973b0aa2
This commit is contained in:
commit
27322cd161
3 changed files with 1518 additions and 2501 deletions
|
@ -30,7 +30,15 @@ SUSPICIOUS_HOSTS = {
|
||||||
PATTERN_IPV4 = re.compile(r"^((\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})):(\d+)$")
|
PATTERN_IPV4 = re.compile(r"^((\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})):(\d+)$")
|
||||||
PATTERN_IPV6 = re.compile(r"^\[([0-9a-z:]+)\]:(\d+)$")
|
PATTERN_IPV6 = re.compile(r"^\[([0-9a-z:]+)\]:(\d+)$")
|
||||||
PATTERN_ONION = re.compile(r"^([abcdefghijklmnopqrstuvwxyz234567]{16}\.onion):(\d+)$")
|
PATTERN_ONION = re.compile(r"^([abcdefghijklmnopqrstuvwxyz234567]{16}\.onion):(\d+)$")
|
||||||
PATTERN_AGENT = re.compile(r"^(/Satoshi:0.14.(0|1|2|99)/|/Satoshi:0.15.(0|1|2|99)|/Satoshi:0.16.(0|1|2|99)/)$")
|
PATTERN_AGENT = re.compile(
|
||||||
|
r"^/Satoshi:("
|
||||||
|
r"0.14.(0|1|2|3|99)|"
|
||||||
|
r"0.15.(0|1|2|99)|"
|
||||||
|
r"0.16.(0|1|2|3|99)|"
|
||||||
|
r"0.17.(0|0.1|1|2|99)|"
|
||||||
|
r"0.18.(0|1|99)|"
|
||||||
|
r"0.19.99"
|
||||||
|
r")")
|
||||||
|
|
||||||
def parseline(line):
|
def parseline(line):
|
||||||
sline = line.split()
|
sline = line.split()
|
||||||
|
@ -99,6 +107,13 @@ def parseline(line):
|
||||||
'sortkey': sortkey,
|
'sortkey': sortkey,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
def dedup(ips):
|
||||||
|
'''deduplicate by address,port'''
|
||||||
|
d = {}
|
||||||
|
for ip in ips:
|
||||||
|
d[ip['ip'],ip['port']] = ip
|
||||||
|
return list(d.values())
|
||||||
|
|
||||||
def filtermultiport(ips):
|
def filtermultiport(ips):
|
||||||
'''Filter out hosts with more nodes per IP'''
|
'''Filter out hosts with more nodes per IP'''
|
||||||
hist = collections.defaultdict(list)
|
hist = collections.defaultdict(list)
|
||||||
|
@ -106,71 +121,105 @@ def filtermultiport(ips):
|
||||||
hist[ip['sortkey']].append(ip)
|
hist[ip['sortkey']].append(ip)
|
||||||
return [value[0] for (key,value) in list(hist.items()) if len(value)==1]
|
return [value[0] for (key,value) in list(hist.items()) if len(value)==1]
|
||||||
|
|
||||||
|
def lookup_asn(net, ip):
|
||||||
|
'''
|
||||||
|
Look up the asn for an IP (4 or 6) address by querying cymry.com, or None
|
||||||
|
if it could not be found.
|
||||||
|
'''
|
||||||
|
try:
|
||||||
|
if net == 'ipv4':
|
||||||
|
ipaddr = ip
|
||||||
|
prefix = '.origin'
|
||||||
|
else: # http://www.team-cymru.com/IP-ASN-mapping.html
|
||||||
|
res = str() # 2001:4860:b002:23::68
|
||||||
|
for nb in ip.split(':')[:4]: # pick the first 4 nibbles
|
||||||
|
for c in nb.zfill(4): # right padded with '0'
|
||||||
|
res += c + '.' # 2001 4860 b002 0023
|
||||||
|
ipaddr = res.rstrip('.') # 2.0.0.1.4.8.6.0.b.0.0.2.0.0.2.3
|
||||||
|
prefix = '.origin6'
|
||||||
|
|
||||||
|
asn = int([x.to_text() for x in dns.resolver.query('.'.join(
|
||||||
|
reversed(ipaddr.split('.'))) + prefix + '.asn.cymru.com',
|
||||||
|
'TXT').response.answer][0].split('\"')[1].split(' ')[0])
|
||||||
|
return asn
|
||||||
|
except Exception:
|
||||||
|
sys.stderr.write('ERR: Could not resolve ASN for "' + ip + '"\n')
|
||||||
|
return None
|
||||||
|
|
||||||
# Based on Greg Maxwell's seed_filter.py
|
# Based on Greg Maxwell's seed_filter.py
|
||||||
def filterbyasn(ips, max_per_asn, max_total):
|
def filterbyasn(ips, max_per_asn, max_per_net):
|
||||||
# Sift out ips by type
|
# Sift out ips by type
|
||||||
ips_ipv46 = [ip for ip in ips if ip['net'] in ['ipv4', 'ipv6']]
|
ips_ipv46 = [ip for ip in ips if ip['net'] in ['ipv4', 'ipv6']]
|
||||||
ips_onion = [ip for ip in ips if ip['net'] == 'onion']
|
ips_onion = [ip for ip in ips if ip['net'] == 'onion']
|
||||||
|
|
||||||
# Filter IPv46 by ASN
|
# Filter IPv46 by ASN, and limit to max_per_net per network
|
||||||
result = []
|
result = []
|
||||||
asn_count = {}
|
net_count = collections.defaultdict(int)
|
||||||
|
asn_count = collections.defaultdict(int)
|
||||||
for ip in ips_ipv46:
|
for ip in ips_ipv46:
|
||||||
if len(result) == max_total:
|
if net_count[ip['net']] == max_per_net:
|
||||||
break
|
continue
|
||||||
try:
|
asn = lookup_asn(ip['net'], ip['ip'])
|
||||||
if ip['net'] == 'ipv4':
|
if asn is None or asn_count[asn] == max_per_asn:
|
||||||
ipaddr = ip['ip']
|
continue
|
||||||
prefix = '.origin'
|
asn_count[asn] += 1
|
||||||
else: # http://www.team-cymru.com/IP-ASN-mapping.html
|
net_count[ip['net']] += 1
|
||||||
res = str() # 2001:4860:b002:23::68
|
result.append(ip)
|
||||||
for nb in ip['ip'].split(':')[:4]: # pick the first 4 nibbles
|
|
||||||
for c in nb.zfill(4): # right padded with '0'
|
|
||||||
res += c + '.' # 2001 4860 b002 0023
|
|
||||||
ipaddr = res.rstrip('.') # 2.0.0.1.4.8.6.0.b.0.0.2.0.0.2.3
|
|
||||||
prefix = '.origin6'
|
|
||||||
|
|
||||||
asn = int([x.to_text() for x in dns.resolver.query('.'.join(
|
# Add back Onions (up to max_per_net)
|
||||||
reversed(ipaddr.split('.'))) + prefix + '.asn.cymru.com',
|
result.extend(ips_onion[0:max_per_net])
|
||||||
'TXT').response.answer][0].split('\"')[1].split(' ')[0])
|
|
||||||
if asn not in asn_count:
|
|
||||||
asn_count[asn] = 0
|
|
||||||
if asn_count[asn] == max_per_asn:
|
|
||||||
continue
|
|
||||||
asn_count[asn] += 1
|
|
||||||
result.append(ip)
|
|
||||||
except:
|
|
||||||
sys.stderr.write('ERR: Could not resolve ASN for "' + ip['ip'] + '"\n')
|
|
||||||
|
|
||||||
# Add back Onions
|
|
||||||
result.extend(ips_onion)
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
|
def ip_stats(ips):
|
||||||
|
hist = collections.defaultdict(int)
|
||||||
|
for ip in ips:
|
||||||
|
if ip is not None:
|
||||||
|
hist[ip['net']] += 1
|
||||||
|
|
||||||
|
return '%6d %6d %6d' % (hist['ipv4'], hist['ipv6'], hist['onion'])
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
lines = sys.stdin.readlines()
|
lines = sys.stdin.readlines()
|
||||||
ips = [parseline(line) for line in lines]
|
ips = [parseline(line) for line in lines]
|
||||||
|
|
||||||
# Skip entries with valid address.
|
print('\x1b[7m IPv4 IPv6 Onion Pass \x1b[0m', file=sys.stderr)
|
||||||
|
print('%s Initial' % (ip_stats(ips)), file=sys.stderr)
|
||||||
|
# Skip entries with invalid address.
|
||||||
ips = [ip for ip in ips if ip is not None]
|
ips = [ip for ip in ips if ip is not None]
|
||||||
|
print('%s Skip entries with invalid address' % (ip_stats(ips)), file=sys.stderr)
|
||||||
|
# Skip duplicattes (in case multiple seeds files were concatenated)
|
||||||
|
ips = dedup(ips)
|
||||||
|
print('%s After removing duplicates' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Skip entries from suspicious hosts.
|
# Skip entries from suspicious hosts.
|
||||||
ips = [ip for ip in ips if ip['ip'] not in SUSPICIOUS_HOSTS]
|
ips = [ip for ip in ips if ip['ip'] not in SUSPICIOUS_HOSTS]
|
||||||
|
print('%s Skip entries from suspicious hosts' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Enforce minimal number of blocks.
|
# Enforce minimal number of blocks.
|
||||||
ips = [ip for ip in ips if ip['blocks'] >= MIN_BLOCKS]
|
ips = [ip for ip in ips if ip['blocks'] >= MIN_BLOCKS]
|
||||||
|
print('%s Enforce minimal number of blocks' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Require service bit 1.
|
# Require service bit 1.
|
||||||
ips = [ip for ip in ips if (ip['service'] & 1) == 1]
|
ips = [ip for ip in ips if (ip['service'] & 1) == 1]
|
||||||
# Require at least 50% 30-day uptime.
|
print('%s Require service bit 1' % (ip_stats(ips)), file=sys.stderr)
|
||||||
ips = [ip for ip in ips if ip['uptime'] > 50]
|
# Require at least 50% 30-day uptime for clearnet, 10% for onion.
|
||||||
|
req_uptime = {
|
||||||
|
'ipv4': 50,
|
||||||
|
'ipv6': 50,
|
||||||
|
'onion': 10,
|
||||||
|
}
|
||||||
|
ips = [ip for ip in ips if ip['uptime'] > req_uptime[ip['net']]]
|
||||||
|
print('%s Require minimum uptime' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Require a known and recent user agent.
|
# Require a known and recent user agent.
|
||||||
ips = [ip for ip in ips if PATTERN_AGENT.match(ip['agent'])]
|
ips = [ip for ip in ips if PATTERN_AGENT.match(ip['agent'])]
|
||||||
|
print('%s Require a known and recent user agent' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Sort by availability (and use last success as tie breaker)
|
# Sort by availability (and use last success as tie breaker)
|
||||||
ips.sort(key=lambda x: (x['uptime'], x['lastsuccess'], x['ip']), reverse=True)
|
ips.sort(key=lambda x: (x['uptime'], x['lastsuccess'], x['ip']), reverse=True)
|
||||||
# Filter out hosts with multiple bitcoin ports, these are likely abusive
|
# Filter out hosts with multiple bitcoin ports, these are likely abusive
|
||||||
ips = filtermultiport(ips)
|
ips = filtermultiport(ips)
|
||||||
|
print('%s Filter out hosts with multiple bitcoin ports' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Look up ASNs and limit results, both per ASN and globally.
|
# Look up ASNs and limit results, both per ASN and globally.
|
||||||
ips = filterbyasn(ips, MAX_SEEDS_PER_ASN, NSEEDS)
|
ips = filterbyasn(ips, MAX_SEEDS_PER_ASN, NSEEDS)
|
||||||
|
print('%s Look up ASNs and limit results per ASN and per net' % (ip_stats(ips)), file=sys.stderr)
|
||||||
# Sort the results by IP address (for deterministic output).
|
# Sort the results by IP address (for deterministic output).
|
||||||
ips.sort(key=lambda x: (x['net'], x['sortkey']))
|
ips.sort(key=lambda x: (x['net'], x['sortkey']))
|
||||||
|
|
||||||
for ip in ips:
|
for ip in ips:
|
||||||
if ip['net'] == 'ipv6':
|
if ip['net'] == 'ipv6':
|
||||||
print('[%s]:%i' % (ip['ip'], ip['port']))
|
print('[%s]:%i' % (ip['ip'], ip['port']))
|
||||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
Loading…
Add table
Reference in a new issue