Skip to content

Commit 627ea1c

Browse files
committed
Disable Threat Intelligence feeds and processing
Temporarily disable TI blocklist checking while preserving GeoIP and other correlation features. This affects feed downloads, initialization, and runtime processing.
1 parent 5586375 commit 627ea1c

File tree

5 files changed

+169
-170
lines changed

5 files changed

+169
-170
lines changed

correlation/Dockerfile

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ RUN wget -O /app/asn-blocks-v6.csv https://cdn.utmstack.com/geoip/asn-blocks-v6.
1414
RUN wget -O /app/blocks-v4.csv https://cdn.utmstack.com/geoip/blocks-v4.csv
1515
RUN wget -O /app/blocks-v6.csv https://cdn.utmstack.com/geoip/blocks-v6.csv
1616
RUN wget -O /app/locations-en.csv https://cdn.utmstack.com/geoip/locations-en.csv
17-
RUN wget -O /app/ip_level1.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level1/accumulative/ip && cd /app && tar -xf ip_level1.list.tar.gz
18-
RUN wget -O /app/ip_level2.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level2/accumulative/ip && cd /app && tar -xf ip_level2.list.tar.gz
19-
RUN wget -O /app/ip_level3.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level3/accumulative/ip && cd /app && tar -xf ip_level3.list.tar.gz
17+
# RUN wget -O /app/ip_level1.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level1/accumulative/ip && cd /app && tar -xf ip_level1.list.tar.gz
18+
# RUN wget -O /app/ip_level2.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level2/accumulative/ip && cd /app && tar -xf ip_level2.list.tar.gz
19+
# RUN wget -O /app/ip_level3.list.tar.gz https://intelligence.threatwinds.com/api/feeds/v1/download/list/level3/accumulative/ip && cd /app && tar -xf ip_level3.list.tar.gz
2020
RUN mkdir -p /app/rulesets && git clone --depth 1 https://github.com/utmstack/rules.git /app/rulesets/system
2121
ENTRYPOINT [ "/run.sh" ]

correlation/api/newLogHandler.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import (
88
"time"
99

1010
"github.com/threatwinds/go-sdk/catcher"
11-
"github.com/utmstack/UTMStack/correlation/ti"
11+
// "github.com/utmstack/UTMStack/correlation/ti"
1212

1313
"github.com/gin-gonic/gin"
1414
"github.com/google/uuid"
@@ -79,7 +79,7 @@ func NewLog(c *gin.Context) {
7979
}
8080

8181
cache.AddToCache(l)
82-
ti.Enqueue(l)
82+
// ti.Enqueue(l)
8383
search.AddToQueue(l)
8484
response["status"] = "queued"
8585
c.JSON(http.StatusOK, response)

correlation/main.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
package main
22

33
import (
4-
"github.com/utmstack/UTMStack/correlation/ti"
4+
// "github.com/utmstack/UTMStack/correlation/ti"
55
"os"
66
"os/signal"
77
"syscall"
@@ -33,7 +33,7 @@ import (
3333
func main() {
3434
sqldb.Connect()
3535
geo.Load()
36-
ti.Load()
36+
// ti.Load()
3737

3838
rulesL := rules.GetRules()
3939
for _, rule := range rulesL {
@@ -46,7 +46,7 @@ func main() {
4646
go cache.ProcessQueue()
4747
go search.ProcessQueue()
4848
go statistics.Update()
49-
go ti.IsBlocklisted()
49+
// go ti.IsBlocklisted()
5050

5151
go func() {
5252
gin.SetMode(gin.ReleaseMode)

correlation/ti/bases.go

Lines changed: 52 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,54 @@
11
package ti
22

3-
import (
4-
"bufio"
5-
"os"
6-
"path/filepath"
7-
8-
"github.com/threatwinds/go-sdk/catcher"
9-
)
10-
11-
func Load() {
12-
catcher.Info("Loading Threat Intelligence Feeds", nil)
13-
14-
var files = []string{
15-
"ip_level1.list",
16-
"ip_level2.list",
17-
"ip_level3.list",
18-
}
19-
20-
for _, file := range files {
21-
var t string
22-
23-
switch file {
24-
case "ip_level1.list":
25-
t = "Low"
26-
case "ip_level2.list":
27-
t = "Medium"
28-
case "ip_level3.list":
29-
t = "High"
30-
default:
31-
}
32-
33-
f, err := os.Open(filepath.Join("/app", file))
34-
if err != nil {
35-
catcher.Error("Could not open file", err, nil)
36-
continue
37-
}
38-
39-
scanner := bufio.NewScanner(f)
40-
41-
for scanner.Scan() {
42-
element := scanner.Text()
43-
if element == "" {
44-
continue
45-
}
46-
47-
blockList[element] = t
48-
}
49-
50-
_ = f.Close()
51-
}
52-
53-
catcher.Info("Threat Intelligence feeds loaded", nil)
54-
}
3+
// import (
4+
// "bufio"
5+
// "os"
6+
// "path/filepath"
7+
8+
// "github.com/threatwinds/go-sdk/catcher"
9+
// )
10+
11+
// func Load() {
12+
// catcher.Info("Loading Threat Intelligence Feeds", nil)
13+
14+
// var files = []string{
15+
// "ip_level1.list",
16+
// "ip_level2.list",
17+
// "ip_level3.list",
18+
// }
19+
20+
// for _, file := range files {
21+
// var t string
22+
23+
// switch file {
24+
// case "ip_level1.list":
25+
// t = "Low"
26+
// case "ip_level2.list":
27+
// t = "Medium"
28+
// case "ip_level3.list":
29+
// t = "High"
30+
// default:
31+
// }
32+
33+
// f, err := os.Open(filepath.Join("/app", file))
34+
// if err != nil {
35+
// catcher.Error("Could not open file", err, nil)
36+
// continue
37+
// }
38+
39+
// scanner := bufio.NewScanner(f)
40+
41+
// for scanner.Scan() {
42+
// element := scanner.Text()
43+
// if element == "" {
44+
// continue
45+
// }
46+
47+
// blockList[element] = t
48+
// }
49+
50+
// _ = f.Close()
51+
// }
52+
53+
// catcher.Info("Threat Intelligence feeds loaded", nil)
54+
// }

0 commit comments

Comments
 (0)