-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdeepspam3.py
executable file
·248 lines (206 loc) · 7.35 KB
/
deepspam3.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
#! /usr/bin/python3
###
### DeepSpam milter filter
###
### Uj verzio, ami a ppymilter-re epul (pure python milter), ehhez nem kell a libmilter, nem hasznal C kodot, jobb a memoriakezelese ( = nem leakel :))
### Csak a ppymilterbase.py file szukseges hozza: https://raw.githubusercontent.com/agaridata/ppymilter/master/lib/ppymilter/ppymilterbase.py
### Az egesz 1 threadban fut, async modu halozatkezelessel. 64k meretu emailekkel tesztelve kb 40 email/masodperc sebesseget tudott!
### Valoszinuleg csak python3-al mukodik, bar talan atirhato py2-re is, ha van ra igeny.
###
import asyncio
import ppymilterbase
import logging
import struct
import time
import traceback
try:
from io import BytesIO
except:
from StringIO import StringIO as BytesIO
############################################################################################################################################
import email
from eml2token import eml2str,tokenize,eprint
from ds_model import deepspam_load,deepspam_test
wordmap=deepspam_load()
def do_eml(msg,addr):
# # jobb ha bytes-ban kapja meg a raw levelet, mert az utf8 karakterek kulonben elcseszodhetnek! pl. sql_0000022480.eml ahol keverve van htmlentity es utf8 text/plain-ben!
# if type(eml)==bytes:
# msg = email.message_from_bytes(eml)
# else:
# msg = email.message_from_string(eml)
# try:
# print len(eml)
vtokens=[]
tokens=[]
for text in eml2str(msg):
if text.find('pam detection software, running on the system')>=0:
continue
t=" ".join(text.replace('"',' ').split())
# print(t.encode("utf-8"))
if(len(t)>10):
# print(str(label)+" "+t.encode("utf-8"))
try:
vtok,tok=tokenize(t,wordmap)
if len(vtok)>len(vtokens):
vtokens=vtok
tokens=tok
except:
eprint(traceback.format_exc())
# print('%3d %22s Connect'%(thread_cnt, self.addrs) )
print("--- %22s tokens: %d / %d"%(addr,len(vtokens),len(tokens)))
if len(vtokens)<10:
return "toosmall"
# print(" ".join(vtokens))
res=deepspam_test(vtokens)
res+=0.1
print("--- %22s result: %8.5f"%(addr,res))
# print(res)
# print("%d%%"%(res))
try:
f=open("deepspam.res","at")
f.write("%3d%%:"%(res)+" ".join(tokens)+"\n")
f.close()
except:
pass
if res<2:
return "ham %d%%"%(res)
if res<10:
return "maybeham %d%%"%(res)
if res<20:
return "20ham %d%%"%(res)
if res>98:
return "spam %d%%"%(res)
if res>90:
return "maybespam %d%%"%(res)
if res>80:
return "80spam %d%%"%(res)
return "dunno %d%%"%(res)
############################################################################################################################################
class MyHandler(ppymilterbase.PpyMilter):
# def __init__(self):
# print("MyHandler.init!")
# ppymilterbase.PpyMilter.__init__(self)
# super().__init__()
# CanChangeHeaders(self)
def __init__(self,context=None):
self.addr=context
# print("MyHandler.init! ip="+str(context))
super().__init__()
def OnOptNeg(self, cmd, ver, actions, protocol):
self.CanAddHeaders()
self.emlcount=0
self.t=0
# self.mailfrom = ""
return super().OnOptNeg(cmd, ver, actions, protocol)
def OnConnect(self, cmd, hostname, family, port, address):
# print(hostname)
# print(address)
print("--- %22s address: %s"%(self.addr,str(address)))
self.mailfrom = address
return self.Continue()
def OnHelo(self, cmd, data):
# print(data)
return self.Continue()
def OnResetState(self):
# print("ResetState called!!!")
self.fp = None
self.bodysize = 0
self.reject=0
def OnMailFrom(self, cmd, addr, esmtp_info):
self.OnResetState()
self.mailfrom = addr
print("--- %22s sender: %s"%(self.addr,str(addr)))
# print(addr)
# print(esmtp_info)
return self.Continue()
def OnRcptTo(self, cmd, addr, esmtp_info):
# print(addr)
# print(esmtp_info)
return self.Continue()
def OnHeader(self, cmd, hdr, data):
if hdr==b'X-Grey-ng' or hdr==b'From':
print("--- %22s %s: %s"%(self.addr,hdr.decode(),str(data)))
if hdr==b'X-Grey-ng' and data[0:6]==b'REJECT':
self.reject=1
# if self.fp:
if not self.fp:
self.fp = BytesIO()
self.emlcount+=1
self.fp.write(hdr+b': '+data+b'\n')
# print(hdr)
# print(data)
return self.Continue()
def OnEndHeaders(self, cmd):
self.fp.write(b'\n')
return self.Continue()
def OnBody(self, cmd, data):
# print(len(data))
# print(type(data))
self.fp.write(data)
self.bodysize += len(data)
return self.Continue()
def OnEndBody(self, cmd):
if not self.fp:
return self.ReturnOnEndBodyActions([self.Accept()])
t=time.time()
self.fp.seek(0)
msg = email.message_from_binary_file(self.fp) # python 3.2+
res=do_eml(msg,self.addr)
self.t=time.time()-t
h=[]
h.append(self.AddHeader('X-deepspam', res))
h.append(self.Accept())
return self.ReturnOnEndBodyActions(h)
## def __del__(self):
# print("__del__ called!")
# global thread_cnt
# thread_cnt-=1
## print("__del__ called! processed: %d (%5.3f) from: %s"%(self.emlcount,self.t,self.mailfrom))
thread_cnt=0
async def handle_milter(reader, writer):
global thread_cnt
thread_cnt+=1
t0=time.time()
addr = writer.get_extra_info('peername')
addrs=str(addr[0])+":"+str(addr[1])
print('%3d %22s Connect'%(thread_cnt, addrs) )
milter_dispatcher = ppymilterbase.PpyMilterDispatcher(MyHandler,context=addrs)
while True:
try:
# print("# waiting...")
data = await reader.readexactly(4)
packetlen = int(struct.unpack('!I', data)[0])
# print("# pktlen=",packetlen)
data = await reader.readexactly(packetlen)
# print("# len(data)=",len(data))
response = milter_dispatcher.Dispatch(data)
if response:
if type(response) != list: response=[response]
for r in response:
if isinstance(r, str): r=r.encode()
# print("# len(response)=",len(r))
writer.write(struct.pack('!I', len(r))+r)
await writer.drain()
# except ppymilterbase.PpyMilterCloseConnection as e:
# print("ppymilterbase.PpyMilterCloseConnection!!!")
# break # close
except Exception as ex:
# print("Exception!!!",traceback.format_exc())
print("Exception!!!",repr(ex))
break
# print("# Close the connection")
writer.close()
await writer.wait_closed()
t=time.time()-t0
thread_cnt-=1
print('%3d %22s Done %6.3fs'%(thread_cnt+1, addrs, t ))
async def main():
server = await asyncio.start_server(handle_milter, '127.0.0.1', 1080)
addrs = ', '.join(str(sock.getsockname()) for sock in server.sockets)
print(f'Serving on {addrs}')
async with server:
await server.serve_forever()
logging.basicConfig(level=logging.DEBUG,
format='%(asctime)s %(levelname)s %(message)s',
datefmt='%Y-%m-%d@%H:%M:%S')
asyncio.run(main())