Skip to main content

The whitelisting tool of the Ultimate Hosts Blacklist project.

Project description

This is the whitelisting tool provided by the Ultimate Hosts Blacklist project. It is mainly used to whitelist subject (domains, IP, URL) into our infrastructure but can also be used outside our infrastructure.

Indeed, this tool allows you:

  • to get rid of our whitelist.

  • to use your own whitelist.

  • to use your own whitelist along with our whitelist.

  • to get rid of one of the rule mentionned in our whitelist.

  • to have a whitelist tool ready to use as a Python module.

Installation

$ pip3 install --user ultimate-hosts-blacklist-whitelist

Complementary whitelist

Our tool allow us to link one or more file(s) to the system which will be used in complementary of our whitelist list.

Special markers

If you already used a whitelist list you already know that we generaly only list all domains we want to whitelist one by one.

It’s also possible to do that with our whitelisting system but we can do more.

ALL

The ALL marker will tell the system to escape and regex check againt what follows.

INVALID characters

  • $

    • As we automatically append $ to the end, you should not use this character.

  • \\

    • As we automatically escape the given expression, you should not explicitly escape your regular expression when declaring an ALL marker.

REG

The REG marker will tell the system to explicitly check for the given regex which follows the marker.

RZD

The RZD marker will tell the system to explicitly check for the given string plus all possible TDL.

Anti whitelist

Don’t like one of our rule ? Our tool allows you to specify a file which contain a list of rule you don’t want to apply.

Simply use the --anti-whitelist flag to tell us one or more anti whitelist files and we will apply!

Understanding what we actually do

If we have the following secondary whitelist list:

facebook.com
ALL .gov
REG face
RZD example

our system will actually :

  • Remove every line which match facebook.com and www.facebook.com

  • Remove everyline which match example.*

  • In complementary convert all lines with ALL ` or :code:`REG to the right format.

  • Check every line again the regular expression.

  • Print or save on screen the results.

The generated regular expression will be in this example:

(\.gov$)|(face)|(example(.*))

NOTE: The :code:`example` group is much longer as we construct the list of TDL based on the Root Zone Database of the IANA and the Public Suffix List project.

Which actually means that we whitelist:

  • all elements/lines which ends with .gov

  • all elements/lines which contain the word face

Contributors

Usage of the tool

The sript can be called as uhb-whitelist, uhb_whitelist and ultimate-hosts-blacklist-whitelist.

usage: uhb_whitelist [-h] [-a ANTI_WHITELIST [ANTI_WHITELIST ...]] [-d]
                    [-f FILE] [-o OUTPUT] [-m] [-p PROCESSES] [-v]
                    [-w WHITELIST [WHITELIST ...]] [-wc]

The tool to clean a list or a hosts file with the Ultimate Hosts Blacklist
whitelist list or your own.

optional arguments:
    -h, --help            show this help message and exit
    -a ANTI_WHITELIST [ANTI_WHITELIST ...], --anti-whitelist ANTI_WHITELIST [ANTI_WHITELIST ...]
                            Read the given file and remove the rules (its data)
                            from the whitelist list we are going to use.
    -d, --debug           Activate the debug mode. This mode will write the
                            whole processes to stdout.
    -f FILE, --file FILE  Read the given file and remove all element to
                            whitelist.
    -o OUTPUT, --output OUTPUT
                            Save the result to the given filename or path.
    -m, --multiprocessing
                            Activate the usage of multiple processes.
    -p PROCESSES, --processes PROCESSES
                            The number of (maximal) processes to use.
    -v, --version         Show the version end exist.
    -w WHITELIST [WHITELIST ...], --whitelist WHITELIST [WHITELIST ...]
                            Read the given file and append its data to the our
                            whitelist list.
    -wc, --without-core   Disable the usage of the Ultimate Hosts Blacklist
                            whitelist list.

Crafted with ♥ by Nissar Chababy (Funilrys)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

File details

Details for the file ultimate-hosts-blacklist-whitelist-3.10.2.tar.gz.

File metadata

  • Download URL: ultimate-hosts-blacklist-whitelist-3.10.2.tar.gz
  • Upload date:
  • Size: 14.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.28.1 CPython/3.7.3

File hashes

Hashes for ultimate-hosts-blacklist-whitelist-3.10.2.tar.gz
Algorithm Hash digest
SHA256 eac36803ef92d00a3776c11e03452d6338ccdad4a914f62e5f3b09f824f92405
MD5 e1536920a12ef8224fb0cfc342a29c31
BLAKE2b-256 00fd5b2f4b808312798ec7c011f9fb3363326cdb8607b307249a9c980addeddc

See more details on using hashes here.

File details

Details for the file ultimate_hosts_blacklist_whitelist-3.10.2-py3-none-any.whl.

File metadata

File hashes

Hashes for ultimate_hosts_blacklist_whitelist-3.10.2-py3-none-any.whl
Algorithm Hash digest
SHA256 7ae7d6729ae7c47867a487a10b6222bc0625aa2db1c699cb7be96d0705fb6abe
MD5 dbceb306aefb0d01a6a6efb8931a9b7d
BLAKE2b-256 026d93578705146c98c3ad9650e18d1188af599d8d7753a63487cf13b35c89b2

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page