Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
PROXY protocol library with asyncio server implementation.
$ pip install proxy-protocol
Integration with an asyncio.start_server
based server is intended to be
extremely simple. Here is an example, which will detect PROXY protocol v1 or
v2.
from proxyprotocol import ProxyProtocol
from proxyprotocol.detect import ProxyProtocolDetect
from proxyprotocol.reader import ProxyProtocolReader
from proxyprotocol.sock import SocketInfo
async def run(host: str, port: int) -> None:
pp_detect = ProxyProtocolDetect()
callback = ProxyProtocolReader(pp_detect).get_callback(on_connection)
server = await asyncio.start_server(callback, host, port)
async with server:
await server.serve_forever()
async def on_connection(reader: StreamReader, writer: StreamWriter,
info: SocketInfo) -> None:
print(info.family, info.peername)
# ... continue using connection
To simplify PROXY protocol use based on configuration, the version can also be read from a string.
from proxyprotocol.version import ProxyProtocolVersion
pp_noop = ProxyProtocolVersion.get(None)
pp_detect = ProxyProtocolVersion.get('detect')
pp_v1 = ProxyProtocolVersion.get('v1')
pp_v2 = ProxyProtocolVersion.get('v2')
The pp_noop
object in this example is a special case implementation that does
not read a PROXY protocol header from the stream at all. It may be used to
disable PROXY protocol use without complicating your server code.
You can also check out the proxyprotocol-echo
reference implementation.
If you configure your proxy to send PROXY protocol to localhost:10007
, you
can see it in action:
$ proxyprotocol-echo --help
$ proxyprotocol-echo detect
$ proxyprotocol-echo noop
Two basic server implementations are included for reference. Using the two
together can demonstrate the process end-to-end: use proxyprotocol-server
to proxy connections with a PROXY protocol header to proxyprotocol-echo
,
which then displays the original connection information.
The hostname:port
arguments used by both types of servers are parsed by the
Address
class, which allows for customization of SSL/TLS and PROXY
protocol versions.
The proxyprotocol-echo
server expects inbound connections to provide a PROXY
protocol header indicating the original source of the connection. After the
header, all received data will be echoed back to the client.
proxyprotocol-echo --help
proxyprotocol-echo # run the server
The proxyprotocol-server
server proxies inbound connections to another
host/port endoint, prefixing the outbound connection with a PROXY protocol
header to indicate the original connection information.
proxyprotocol-server --help
proxyprotocol-server --service localhost:10000 localhost:10007
You will need to do some additional setup to develop and test plugins. Install Hatch to use the CLI examples below.
Run all tests and linters:
$ hatch run check
Because this project supports several versions of Python, you can use the following to run the checks on all versions:
$ hatch run all:check
This project makes heavy use of Python's type hinting system, with the intention of a clean run of mypy in strict mode:
mypy proxyprotocol test
No code contribution will be accepted unless it makes every effort to use type hinting to the extent possible and common in the rest of the codebase.
FAQs
PROXY protocol library with asyncio server implementation
We found that proxy-protocol demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.