Filtering by the Register of Banned Websites (service 4) [Документация VAS Experts]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:dpi:faq:dpi:filtration:start [2024/08/05 13:57] elena.krasnobryzhen:dpi:faq:dpi:filtration:start [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1
Line 1: Line 1:
-====== Filtering by the Register of Banned Websites (service 4) ====== 
-{{indexmenu_n>1}} 
  
-<accordion autoclose> 
-<accordion-item title="1. The filtering management through service 4 does not deactivate the service. What is the reason?"> 
-  - Check the ''black_list_sm'' parameter in the configuration file ''/etc/dpi/fastdpi.conf''. If it is set to 1, the service is enabled and blocking is not global for all. 
-  - On a test subscriber (IP/login), ensure that the service is deactivated:<code bash>fdpi_ctrl list --service 4 --ip 192.168.1.60</code> Output options:\\ ''1/0/1'' - service removed\\ ''1/1/0'' - service available\\ \\ <code bash>Result processing ip=192.168.1.60 : 1/0/1</code> — service is deactivated 
-  - Set the IP address of the deactivated subscriber in the configuration ''/etc/dpi/fastdpi.conf'':<code bash>trace_ip=<IP></code> After setting, reload:<code bash>service fastdpi reload</code>**Make a request from a test PC to the resource metfen.com**\\ Check the log for the test site:<code bash>grep -A5 metfen fastdpi_slave_?.log</code> or <code bash>cat fastdpi_slave_?.log | grep metfen.com -A 5</code>Output: <code bash>HTTP_HOST=_metfen.com_ 
-  HTTP_REFERER(0)=_null_ 
-  HTTP_USER-AGENT=_Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)  
-  Chrome/43.0.2357.65 Safari/537.36_ 
-  HTTP_COOKIE=_null_ 
-  [TRACE   ][001693490086826396][2888570700] CHECK_HTTP : URL=_/_ 
-        HTTP_HOST=_metfen.com_ 
-        HTTP_REFERER=_null_ 
-        blocked=0 
-        new_prg_id=0</code> As seen in the output, ''blocked = 0'' (no redirection), ''new_prg_id=0'' (no service connected). SSG — does not conduct redirection/blocking. 
-  - Capture the requests dump to the banned resource on the deactivated subscriber, e.g., using ''fiddler''. If redirection remains, the issue lies on the blocking page — there is no information on its caching on the browser side, and the browser independently redirects the request without SSG involvement.\\ To prevent this, use:<code bash>Cache-Control: max-age=0, no-cache, no-store, must-revalidate 
-Pragma: no-cache</code> 
-</accordion-item> 
- 
-<accordion-item title="2. On fragmentation and setting MTU"> 
-**Request:** The auditor found the page https://vip-club-vulkan.net/ accessible, the auditor's report code — 409. The page does not load, but access is present.\\ 
-**Actions:** check MTU on the router to the SSG DPI, the problem is related to packet fragmentation and is solved as follows — setting only ''hardware mtu'' (''jumbo frame'') is not sufficient, in addition, ''ip mtu'' should be set to 1500. After this, the site will stop opening and appear in the Auditor's report. 
-</accordion-item> 
- 
-<accordion-item title="3. Checking the availability of cloud lists"> 
-To check the availability of cloud lists, use the ''curl'' utility with the following parameters: 
-<code bash>curl -A "user-agent: FastDPI_blcheck" -o /dev/nul https://www.vasexperts.ru/data/lastdump.zip</code> 
-<code bash>curl -v -o blacklist.dict https://vasexperts.ru/data/belarus/blacklist.dict</code> 
-</accordion-item> 
- 
-<accordion-item title="4. Uploading your own list"> 
-There is a possibility to force DPI to work only with your list of banned resources. Work with the cloud/custom list is managed by the ''[[en:dpi:dpi_options:opt_filtration:filtration_settings:start|federal_black_list]]'' parameter. 
-</accordion-item> 
- 
-<accordion-item title="5. Redirecting https requests"> 
-Redirect to a "stub" page is performed for http requests; for https, this action is impossible. To do this, you need to decrypt the traffic using a private key or root certificate, so only traffic blocking is performed. 
-</accordion-item> 
- 
-<accordion-item title="6. Joint use of custom and cloud lists"> 
-Custom lists are used separately, in addition to the cloud lists (if the service is enabled). More about parameters - ''[[en:dpi:dpi_options:opt_filtration:filtration_settings:start|federal_black_list]]''. 
-</accordion-item> 
- 
-<accordion-item title="7. Filtering and VLAN. Is it possible to apply a filtering policy to specific VLANs?"> 
-Yes. On setting up external channels and connecting services of allow/block lists — see the description of the [[en:dpi:dpi_options:opt_shaping:shaping_multi:start#block_list_setup_-_service_4|4 service]]. 
- 
-All tagged traffic passing through the DPI will be filtered, and there is no need to create any VLANs on the DPI server itself. There is no need to create additional VLANs. 
-</accordion-item> 
- 
-<accordion-item title="8. Get a list of addresses for filtering according to the BGP scheme"> 
-This filtering scheme is not supported "out of the box," but you can organize it yourself: since DPI does not filter by IP, you will need to convert hosts to IP addresses yourself, for example: 
-<code bash> 
-#1 
-bin2ip /var/lib/dpi/blcacheip.bin > tmp.txt 
-#2 
-dic2host /var/lib/dpi/blcache.bin|dig +short -f -|grep -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' » tmp.txt\\ 
-#3 
-sort -u tmp.txt > ip.lst 
-</code> 
-To track the loading of new lists on DPI and run the conversion scripts, you can set up ''incron'', and you can announce routes via ''exabgp''. 
-</accordion-item> 
-</accordion>