Commit Graph

1469 Commits

Author SHA1 Message Date
Sean Whalen 5bb6570f4e collect_domain_info.py: replace curl fallback with pure-requests path (#731)
* collect_domain_info.py: replace curl shell-out with requests-based fallback

The previous fallback for cert-error / UA-blocked sites was a curl
subprocess. This was correct but added an external runtime dependency
(curl is usually present but not on minimal containers) and a fork +
tempfile + parse round-trip per fallback call. Replaced with a pure
requests-based path that uses a custom HTTPAdapter to relax the SSL
context to the same effective configuration:

  ssl.CERT_NONE                 (verify=False, equivalent to curl -k)
  set_ciphers("DEFAULT@SECLEVEL=0")  (allows weak DH/RSA, recovers
                                       DH_KEY_TOO_SMALL hosts that
                                       even curl's default config
                                       rejects)
  options |= 0x4 (OP_LEGACY_SERVER_CONNECT, allows unsafe legacy
                  TLS renegotiation for older server stacks)

Plus a real-browser User-Agent (same Chrome/124 string as before),
verify=False, allow_redirects=True, and Session.max_redirects=5.
InsecureRequestWarning is suppressed at module level since the
verify-disabled path is intentional.

Smoke-tested against the same eight cert-error domains as the original
curl fallback. Same recovery rate on all eight (six recover with full
title+description, two -- twmbroadband.com and ltt.ly -- remain
genuinely unreachable with both implementations). One additional win:
vnpt.com.vn (DH_KEY_TOO_SMALL) now recovers under the SECLEVEL=0
cipher list, which curl with default options did not. Happy-path
domains (google.com) still take the primary path and produce
identical output.

Side effects:
- removes the curl runtime dependency from collect_domain_info.py
- removes ~10ms of fork-and-parse overhead per fallback call
- removes the tempfile-on-disk round-trip; body is captured in-memory
- error suffix in the TSV's error column changes from "| curl: ..." to
  "| fallback: ..."

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Use getattr(ssl, "OP_LEGACY_SERVER_CONNECT", 0x4) instead of raw 0x4

Per PR review: prefer the constant where the interpreter exposes it
(Python 3.12+) and fall back to the raw value (0x4) only on older
interpreters that the project still supports. Self-documenting and
future-proof against any unlikely stdlib value reshuffle.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-26 16:34:57 -04:00
Sean Whalen ec2db7238e Map aliases for redirect targets + CC BY-SA 4.0 attribution (#730)
* README: declare base_reverse_dns_map.csv under CC BY-SA 4.0

The map is now a curated derivative of the bundled IPinfo Lite MMDB
(as_domain / as_name fields, walked for unmapped operators and
classified via the workflow in AGENTS.md). IPinfo Lite is licensed
under Creative Commons Attribution-ShareAlike 4.0, which propagates
to derivative works, so the CSV is distributed under CC BY-SA 4.0
with attribution to IPinfo for the underlying network identification
data.

Also updates the file-size estimate in the README from "over 1,400"
to "over 5,000" to reflect the current state.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Alias redirect targets into the map and codify the practice in AGENTS.md

When a domain's homepage redirects to a different host *for the same
operator* (acquisition target's site, or a TLD/subdomain variant), PTR
reverse-DNS reports observed in the wild may reference either domain.
Mapping only the original loses attribution for the redirect target.

Adds 91 aliases discovered during the previous bulk PR's classification
work — every redirect target where the original was newly mapped, the
target wasn't already in the map, and the target was the same operator
(not a sister brand and not a placeholder/bot/parking page). Notable
examples: apogee.us + boldyn.com both -> Boldyn ISP; sungardas.com +
1111systems.com both -> 11:11 Systems MSP; vodafone.is + syn.is both
-> Sýn ISP; sendinblue.com + brevo.com both -> Brevo (Sendinblue)
Marketing; tigo.com + millicom.com both -> Tigo ISP; rockwellcollins.com
+ collinsaerospace.com both -> Collins Aerospace Defense.

Codifies the alias-target practice as a new paragraph under AGENTS.md
step 6 (the homepage-redirect disambiguation rule). Key guardrails:
- Alias only for case 1 (acquisition) and case 3 (TLD variant). Do
  NOT alias for case 2 (sister brand / shared infra) -- aliasing the
  redirect target there mis-attributes the redirect target's email.
  Cited example: do not alias ziggo.nl to UPC after the chello.sk fix.
- Skip generic-placeholder, bot-management, and TLD/eTLD redirect
  targets (example.com, perfdrive.com, umbler.com, co.uk, com.br...).
- When in doubt, drop the alias rather than commit it. A missing alias
  is recoverable; a wrong one mis-attributes mail.

Also fixes four canonical-naming inconsistencies surfaced during the
brand-mismatch sweep, aligning recent additions to pre-existing entries:
- ga.gov: "Georgia Government" -> "State of Georgia" (matches existing
  georgia.gov)
- goco.ca, radiant.net: "Telus" -> "TELUS" (matches existing telus.com)
- vee.com.tw: "VeeTime" -> "VeeTIME" (matches existing veetime.com)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Promote 21 inbound-redirect aliases from KU to map

Sweeping the session's collector TSVs for the inverse pattern of the
91 outbound aliases in commit ddf962e: domains that stayed in
known-unknown this session but whose homepage final_url redirected to
an entry that's now in the map. These are acquisitions and TLD/
subdomain variants where the operator can be inferred from the
redirect-target's existing mapping.

Notable acquisitions surfaced:
- nitelusa.com -> Comcast (NITEL was acquired by Comcast Business)
- level3.net -> Lumen (Level 3 rebranded)
- novis.pt -> NOS (Novis acquired by NOS Portugal)
- oxfordnetworks.net -> FirstLight Fiber (acquisition)
- saunalahti.fi -> Elisa (acquisition)
- omnicity.net, wcoil.com -> Watch Communications (acquisitions)
- servercentral.net -> Summit (acquisition)

TLD / subdomain variants:
- as29550.net (Simply Transit ASN domain) -> Simply Transit
- asahi-net.or.jp -> ASAHI Net (.jp variant)
- cyber-folks.pl -> cyber_Folks (cyberfolks.pl)
- digicelsr.com -> Digicel (Suriname variant)
- edpnet.net -> EDPnet (.be variant)
- la.net.ua -> Lanet
- pair.net -> Pair Networks (pair.com)
- twlakes.net -> Twin Lakes Communications
- megamailservers.eu -> MegaMailServers (.com variant)

Cloudflare email/SMTP family:
- cloudflare-email.org, cloudflare-smtp.com/.net/.org -> Cloudflare,
  Email Security (matches cloudflare-email.com/.net, distinct from
  the bare cloudflare.com/.net which use SaaS)

Of 32 redirect-to-mapped hits in the session TSVs, 21 cleared the
same-operator bar. The other 11 were excluded as case-2-equivalent
redirects (homepage hosted on Google/Wordpress/Aruba), registrar
parking pages (Dynadot), or ambiguous brand relationships requiring
research beyond what the redirect alone could justify (frontiernet.net
-> yahoo.com from Frontier's 2017 email-services migration to Yahoo,
dido.com -> socket.net, evo.uz -> tps.uz, ncport.ru -> avantel.ru).
Those are flagged in the PR comment for follow-up review.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* AGENTS.md: document the inbound redirect-target alias sweep

After a batch lands, the same collector TSVs that drove the original
classifications are also the input to a free secondary pass: KU
domains whose final_url redirects to a host that's now mapped are
typically the inbound mirror of the outbound alias rule (step 6).
Each such pair is an acquisition or TLD/subdomain variant where the
operator is inferable from the redirect-target's existing mapping.

Adds a new bullet to "After a batch merge" describing the sweep and
the same case-2 exclusion list as the outbound rule (sister-brand,
generic hosting platform, bot-management proxy). Notes that the
sweep routinely surfaces 5-15% of the prior batch's KU additions as
legitimate map promotions, citing the actual examples that landed in
this PR (nitelusa.com -> Comcast, level3.net -> Lumen,
saunalahti.fi -> Elisa, oxfordnetworks.net -> FirstLight Fiber,
asahi-net.or.jp -> ASAHI Net, etc.).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-26 16:14:07 -04:00
Sean Whalen 851560a9b1 Bulk reverse-DNS map coverage: top-500 ASN audit + KU re-research + curl fallback (#729)
* collect_domain_info.py: add curl fallback for blocked/broken fetches

Many sites that returned no usable homepage under the original requests
fetch turned out to be soft-failures: misconfigured TLS certs (self-signed,
hostname mismatch, weak chain), 403/captcha pages from User-Agent-based
bot filters, or redirect chains the requests stack rejected. None of those
recover under a single retry with the same client config.

This wires a curl fallback into _fetch_homepage that triggers when the
primary attempt errors or returns a non-2xx status. Curl runs with
-k (skip TLS verify), -L (follow redirects), --max-time bound, and a
real-browser User-Agent string -- enough to clear the common UA-block
and bad-cert classes of failure that small ISPs and regional telcos
routinely ship. A 2xx-with-empty-head response is left alone (parked
pages do not improve on retry). When both attempts fail, the error
column carries both signatures so it is obvious that the fallback was
tried.

Smoke-tested against eight previously-failed cert-error domains: six
recovered full title/description (as1101.net, citictel-cpc.com,
xtrim.com.ec, etecsa.cu, zillion.network, sandia.gov), two remained
genuinely unreachable. Happy-path domains take the primary path
unchanged.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Bulk reverse-DNS map coverage: top-500 ASN audit + KU re-research

Two passes against the bundled IPinfo Lite MMDB and the existing
known-unknown list, both classified under the two-corroborating-sources
rule (AGENTS.md):

1. Top-500 unmapped ASN-domain audit. Walked every record in
   ipinfo_lite.mmdb to find as_domain values not yet in the map,
   ranked by routed IPv4 count, took the top 500 (>= ~/15 each), and
   ran them through collect_domain_info.py. Yield: 435 new map rows
   from operators with two or more independent corroborating sources;
   65 entries to known-unknown for operators where homepage and WHOIS
   were both unavailable from the test environment. Recovered domains
   span ISPs, web hosts, IaaS/MSP/MSSP, education networks, government
   agencies, and a long tail of major industrials.

2. Full re-research of the existing 3,606-entry known-unknown file
   using the new curl fallback (separate commit). The fallback
   recovered homepage content for 1,686 of 3,670 (45.9%) previously
   dark domains. Of those, 770 had a corroborating WHOIS or as_name
   alongside; 508 cleared the strict service-category test and were
   promoted out of known-unknown into the map. The remaining 262
   recovered titles were brand-only / login-portal / under-construction
   pages where service category could not be assigned with confidence.

Also removed a stale "#name?" Excel auto-correction artifact from the
known-unknown file (it would never have matched any real reverse-DNS
base domain).

Cumulative result: base_reverse_dns_map.csv 3,946 -> 4,889 rows
(+943, +23.9%); known_unknown_base_reverse_dns.txt 3,606 -> 3,162
(-444 net after both batches plus the artifact). Every promotion has
two independent sources for the operator's identity and a homepage or
MMDB-as_name signal sufficient to assign a service type.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Fix chello.sk classification: UPC, not Liberty Global

The original classification aliased chello.sk to "Liberty Global" based
on the IP-WHOIS netname (LGI-INFRASTRUCTURE) plus a stale homepage
redirect to ziggo.nl that the collector observed at fetch time. This
broke the AGENTS.md rule that IP-WHOIS only counts as a corroborating
source when the domain name matches the netname -- "chello" does not
match "LGI", so the IP-WHOIS should not have been treated as a source.

The WHOIS was unambiguous: UPC BROADBAND SLOVAKIA, s.r.o. UPC retains
its consumer brand in Slovakia (unlike Ireland, where upc.ie was
rebranded as Virgin Media Ireland in the existing map). Reverting to
the operator brand per WHOIS.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Fix vodafone.is classification: Sýn, not Vodafone

Same pattern as the chello.sk fix in the previous commit: the historic
brand recorded in the MMDB as_name (Vodafone Iceland) is no longer the
operator. Sýn acquired Vodafone Iceland's operations and the homepage
redirects to syn.is, presenting Vodafone only as a partner relationship
rather than an active sub-brand. Following the upc.ie -> Virgin Media
Ireland precedent for rebranded markets, the canonical attribution is
the current operator.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* AGENTS.md: codify the homepage-redirect disambiguation rule

Three classification mistakes during the bulk batch (chello.sk,
vodafone.is, telia.dk, apogee.us) all came from the same gap in the
workflow: when a homepage's final URL is a different host from the
domain being classified, the right brand depends on the *relationship*
between the two domains, not on the WHOIS or as_name in isolation.

Adds a new step 6 to the unknown-domain classification workflow that
spells out the three patterns and the disambiguator:

- Acquisition / rebrand: the homepage shows the acquiring operator's
  marketing site. Use the new operator. MMDB as_name and IP-WHOIS
  netname are commonly stale for years post-acquisition; do not let
  them override an unambiguous current-operator homepage.
- Sister brand / shared infrastructure: the homepage redirects to a
  *sibling* brand under the same parent group, but the WHOIS for the
  original domain still names a *specific* current operator. Use the
  WHOIS operator, not the redirect target. Canonical cautionary tale:
  chello.sk (WHOIS: UPC BROADBAND SLOVAKIA) was originally classified
  as Liberty Global because the homepage redirected to ziggo.nl (a
  sibling Liberty Global brand). The right answer was UPC.
- TLD or subdomain variant: same operator, different domain. Trivial.

Renumbers the remaining steps. The IP-WHOIS rule (step 5) and the
two-source rule (now step 8) are unchanged but cross-referenced.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Apply homepage-redirect rule to telia.dk and apogee.us

Same pattern as chello.sk and vodafone.is in earlier commits — the
historic operator name in the MMDB as_name and WHOIS does not reflect
who actually runs the IPs after an acquisition. The homepage redirect
is the current ground truth.

- telia.dk -> Norlys: Norlys acquired Telia Denmark; homepage now
  redirects to shop.norlys.dk and presents Norlys throughout.
- apogee.us -> Boldyn: Boldyn acquired Apogee Telecom; homepage now
  redirects to boldyn.com and shows the Boldyn marketing site for
  higher-education managed services.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Bulk reverse-DNS map coverage: next-500 unmapped ASN-domain audit

Same workflow as the first top-500 batch in this branch, applied to
the next tier of unmapped MMDB as_domain values (ranked 501..1000 by
routed IPv4 count, each ~/15 to /14.5). Pre-screened against the
current state of base_reverse_dns_map.csv and
known_unknown_base_reverse_dns.txt.

Yield: 414 newly-classified map entries + 86 known-unknown additions.
Type breakdown skews ISP-heavy as expected at this scale, with strong
representation from Education (universities now reaching deeper into
the long tail), Government (state/county/national agencies), Web Host
(regional hosting providers), and IaaS (mid-market cloud).

Applied AGENTS.md step 6 (homepage-redirect disambiguation) on every
case where the homepage's final_url crossed hosts: kept new operator
when the redirect target was an acquiring brand (e.g. atlanticmetro.net
-> 365 Data Centers, performive.com -> CloudFirst, fasternet.com.br ->
Desktop, eatel.com -> REV, blic.net -> Supernova, dimensiondata.com ->
NTT DATA, virtela.net -> NTT Communications), used WHOIS operator when
the redirect was sister-brand or shared infra, used the same operator
when the redirect was a TLD/subdomain variant.

Coverage delta: 88.89% -> 90.40% of MMDB IPv4 (+1.51 pp, ~47M IPv4).
Cumulative for this PR: 85.10% -> 90.40% (+5.30 pp, ~165M IPv4).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Reclassify the 262 left-dark KU re-research candidates with relaxed heuristic

Of the 770 two-source candidates from the curl-fallback KU re-research
pass earlier in this branch, 262 had homepage content and a corroborating
WHOIS/as_name but were left in known-unknown because the homepage was
brand-only or a login portal that didn't directly describe service
category.

Relaxing the heuristic on a re-pass: when the WHOIS legal name itself
contains a regulated-telecom keyword (TELECOM, TELECOMUNICAÇÕES,
INTERNET, FIBRA, BROADBAND, PROVEDOR DE INTERNET, NET TELECOM), that
*is* a service-category source -- in Brazil, Argentina, Chile, and
peers, operators must register under specific legal naming and the
registration is a regulator-vetted signal. Combined with two-source
identity, that clears the bar without forcing the homepage to also
spell out the service.

Same goes for brand-name-as-service signals: "X Server Limited" with a
customer-portal homepage and matching WHOIS reasonably maps to Web Host;
"X Fiber" + matching as_name maps to ISP. These are what readers would
naturally infer from the operator's own self-naming.

Yield: 95 promotions out of 262 (36% of the left-dark subset). The
remaining 167 stay in known-unknown because the homepage was a generic
placeholder ("Index of /", "Coming Soon", default Apache page), the
brand on the homepage didn't match the WHOIS, the operator was clearly
a non-telecom (e.g. INPASUPRI = supplies for IT, malugainfor =
Comércio de Produtos de Informática, hugel = pharma), or the service
category was genuinely ambiguous.

MMDB IPv4 delta is small (+0.03 pp, +888K IPv4) since most of these are
long-tail operators with low or zero MMDB footprint -- the value is in
PTR-side attribution coverage when these brands appear in actual
reverse-DNS reports.

Cumulative for this PR: map 4,889 -> 5,398 rows; KU 3,162 -> 3,153 lines;
MMDB IPv4 coverage 88.89% -> 90.42% (+1.53 pp from the next-500 batch
plus this re-pass).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-26 15:15:32 -04:00
Sean Whalen b3a608735f Revise classification guidelines to enforce two-corroborating-sources rule and clarify handling of unidentified domains 2026-04-26 12:10:56 -04:00
Sean Whalen d04eb89035 Clarify handling of TLS errors and user network issues in classification guidelines 2026-04-26 11:56:14 -04:00
Sean Whalen 55a1e79066 Add kamatera.com entry to base_reverse_dns_map 2026-04-26 11:43:19 -04:00
Sean Whalen c87aa3de08 fixes the incomplete changing of the headers in the SMTP TLS Reporting dashboard visualizations to match the rest of the project (lowercase words separated by _ 2026-04-25 19:17:28 -04:00
Sean Whalen 85554c2344 OpenSearch Dashboards: Restructure SMTP TLS dashboard to match Splunk layout (#728)
The bundled `splunk/smtp_tls_dashboard.xml` is three tables — Reporting
organizations, Domains, Failure details — sharing the same TLS-RPT data.
The OSD dashboard had drifted into five panels (two pies + three tables)
that didn't line up with what the Splunk one shows. Replace them with
three `data_table` viz mirroring the Splunk layout.

Each table uses sum-only metric aggs (no count column) on the per-policy
or per-failure-detail session-count fields. OSD's Visualize agg pipeline
auto-wraps each terms/sum on a `policies.*` or `policies.failure_details.*`
field in the right `nested:{path: …}` agg, so per-policy and per-detail
totals come out correctly without any schema or write-path changes.

Reuse the existing IDs of the three drop-in replacements so re-importing
overwrites in place:
- 4f3b4cb0… (was "TLSRPT reporting organizations") → "Reporting organizations"
- eeb47eb0… (was "TLSRPT policies by domain") → "Domains"
- 5cbcd040… (was "SMTP TLS failures") → "Failure details"

The two pie-chart viz removed by this change have no equivalent in the
new layout. Upgraders will need to delete the orphans manually from OSD's
Saved Objects management page:
- 25f321e0-26d0-11f1-96a6-fb3734bd0b21 ("SMTP TLS sessions")
- 12065020-26d1-11f1-96a6-fb3734bd0b21 ("TLSRPT policies")

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-25 16:14:35 -04:00
Sean Whalen 342b467590 Mark maildir messages as read after they are read (#726)
MaildirConnection.fetch_message() previously returned the message body
without touching the on-disk file, so messages stayed in new/ with no
"S" (Seen) flag and any MUA scanning the same maildir kept showing them
as unread. The call site now passes mark_read=not test (mirroring the
existing MSGraphConnection plumbing); on True, the message is moved to
cur/ and gains the S flag. Test mode leaves the maildir unmodified.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
9.10.2
2026-04-24 19:16:42 -04:00
Sean Whalen adf36ca6a3 Add bluevps.com entry to base_reverse_dns_map 2026-04-24 12:03:52 -04:00
Sean Whalen 81a0d4ce56 Add additional entries for 3z.net and 3zden.cloud to base_reverse_dns_map 2026-04-24 11:38:31 -04:00
Sean Whalen a4a2155ab0 OpenSearch Dashboards: Show rows in the Message sources by Autonomous System viz even if some fields are missing 2026-04-23 22:38:10 -04:00
Sean Whalen 168244af95 Add Message sources by Autonomous System to Opensearch Dashboards (#725)
Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
2026-04-23 19:22:03 -04:00
Sean Whalen c989f27983 Add six base_reverse_dns_map entries from MMDB coverage-gap analysis (#722)
* Cover ASN-fallback path for the Evolus operator family

Only evolus-ix.com (the Internet Exchange product) was in the map,
so ASN-fallback lookups for IPs without PTR fell through to the raw
as_name string with no service type. The bundled IPinfo Lite MMDB
stores the same operator's blocks under two other as_domain values:

- evolus-it.com (the corporate domain, Evolus IT Solutions GmbH)
- evolusfibre.com (their consumer fiber ISP brand)

Both resolve to as_name "Evolus IT Solutions GmbH" in the MMDB,
confirming they're the same operator. WHOIS on evolus-it.com and
the evolusfibre.com homepage both pin the company to Austria. Added
both as aliases pointing at the existing (Evolus IX, ISP) entry so
all three product brands cluster under one display name, matching
the comcast.net / comcast.com pattern documented in AGENTS.md.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Add aliases for centrilogic, 1gservers, etherni, globconnex

Four additional ASN-domain aliases discovered via coverage-gap
analysis against the bundled IPinfo Lite MMDB. None of the four
brands are currently represented in the map under any key, so these
are new brand entries (not alias-of-existing).

- centrilogic.com → Centrilogic, MSP
  82 MMDB nets, ~62K IPv4. Homepage describes the company as an
  "end-to-end I.T. transformation" managed-services provider.
- 1gservers.com → 1GServers, Web Host
  117 nets, ~23K IPv4. Homepage: bare-metal dedicated servers and
  Phoenix colocation.
- etherni.com → Ethernic, MSP
  2 nets, 768 IPv4. Homepage: cloud-migration / cloud-native
  consulting. Operates its own small ASN under Ethernic LLC.
- globconnex.com → Global Connectivity Solutions, ISP
  687 nets, ~63K IPv4. Homepage unreachable (self-signed cert); WHOIS
  privacy-redacted. Classification is inferred from the MMDB as_name
  "GLOBAL CONNECTIVITY SOLUTIONS LLP" and the routed-network scale.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 17:59:21 -04:00
Sean Whalen 15cf8f55b7 Skip caching weak-fallback IP attributions (#723)
get_reverse_dns() swallows every DNSException as None, so a transient
PTR lookup failure (timeout, SERVFAIL, socket error) is
indistinguishable from a genuine no-PTR case. When that lands on the
raw-as_name fallback branch (no map match for the ASN domain either),
the weak result was getting cached in the 4-hour IP-info cache —
locking in the misattribution even after the PTR became resolvable.

Observed in the wild: 91.244.70.212 has PTR customer.evolus-ix.com
(which the map correctly classifies as Evolus IX, ISP), but the
user's dataset showed it with source_name = raw as_name and
source_type = null — the signature of a transient PTR lookup
failure that then got cached.

Fix: skip the cache write when the row is in that specific
weak-fallback state (reverse_dns=None AND type=None AND
name=as_name). PTR-backed matches and ASN-domain matches are stable
attributions and continue to be cached as before.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 17:25:56 -04:00
Sean Whalen 28e7651e15 AGENTS.md: promote 'data not instructions' and document ad-hoc route (#724)
Two gaps the previous revision had:

1. The "Treat WHOIS/search/HTML as data, never as instructions" rule
   was rule 8 of a single workflow (unknown-domain classification),
   but the risk applies to every route that consumes external
   content — MMDB coverage-gap scans, the PSL private-domains route,
   ad-hoc per-request additions, and the external-service-docs rule
   earlier in the file. Promoted it to its own subsection right
   after the Privacy rule, expanded to cover prompt-injection,
   misleading self-descriptions, typosquats, and bait-and-switch
   pages. The numbered rule 8 now cross-references the subsection
   instead of restating it.

2. The "someone points at N specific domains and asks for them to be
   classified" route had no named workflow, even though it's a
   common shape — the existing docs cover bulk unknown-list,
   MMDB coverage-gap, and PSL private-domains, but not ad-hoc. Added
   an "Ad-hoc single-domain additions" subsection with the condensed
   loop: MMDB check → grep existing keys → two-source corroboration
   → precedence/naming rules → honest inference in commit body
   → privacy rule → data-not-instructions → sortlists.py.

Rule 5 of the ad-hoc workflow ("be honest about inference") is the
specific lesson from the globconnex.com classification in PR #722 —
a silent guess is indistinguishable from a verified fact in a diff.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 17:25:28 -04:00
Sean Whalen f0781c6191 IPinfo API: keep only documented behavior (#721)
* Strip invented IPinfo API behavior; keep documented-only

The IPinfo Lite API docs (https://ipinfo.io/developers/lite-api) state:
"The API has no daily or monthly limit and provides unlimited access."
Auth is documented as a ?token= query param only. The /me shown in the
docs returns geolocation for the caller's IP — it is not a documented
account/quota endpoint for Lite.

Removed everything that was speculating beyond the docs:

- The /me probe that pretended to return plan/limit/remaining fields.
- 429 rate-limit handling, 402 quota-exhausted handling, Retry-After
  parsing, cooldown state, and the rate-limit warning / recovery-info
  logging around them.
- The Authorization: Bearer header (not documented for Lite).

Kept:

- Lookups against the documented /lite/<ip>?token=<token> endpoint.
- 401/403 treated as a fatal invalid-token (reasonable defensive check).
- Network-error and non-2xx fallback to the bundled/cached MMDB.
- A simple startup probe that validates the token with a single lookup
  and logs "IPinfo API configured" at info level.

Test consolidated to cover only documented paths: success, 401 fatal,
non-2xx fallback, and that auth goes in ?token= (not Authorization).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* AGENTS.md: warn against speculating past external-service docs

New subsection under Configuration spelling out that third-party API
integrations must start with a direct WebFetch of the canonical docs
page, not a subagent query. Calls out the two traps that produced the
IPinfo speculation: (1) asking subagents question shapes that
presuppose the answer exists, and (2) treating feature asks as "build
this" without first checking "does this apply to this service?".

Uses the now-reverted IPinfo speculation as the cautionary tale so the
next session has a concrete example to recognize the shape of the
mistake.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Bump to 9.10.1; put removal under a new CHANGELOG section

Restored the 9.10.0 entry to its as-shipped wording and moved the
speculation-removal note into its own 9.10.1 Fixed section.
Editing the 9.10.0 entry would have misrepresented what was
actually released — the shipped tag does contain the /me probe,
429/402 cooldown, Retry-After parsing, and Bearer auth, and the
changelog should say so.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9.10.1
2026-04-23 11:51:44 -04:00
github-actions[bot] 9d1152d4f8 chore: update IPinfo Lite MMDB (#720)
Co-authored-by: seanthegeek <44679+seanthegeek@users.noreply.github.com>
2026-04-23 10:57:48 -04:00
Sean Whalen f0f377311e Rename asn_name/asn_domain to as_name/as_domain (#719)
Match the IPinfo Lite MMDB's native field names across the output
schemas — JSON source records now emit asn, as_name, as_domain, and
CSV / Elasticsearch / OpenSearch / Splunk integrations now emit
source_asn, source_as_name, source_as_domain. The integer asn / source_asn
field is unchanged.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9.10.0
2026-04-23 10:38:04 -04:00
Sean Whalen 5785cb2072 Add weekly workflow to refresh the bundled IPinfo Lite MMDB (#718)
Runs Mondays at 06:00 UTC (and on workflow_dispatch), downloads the
latest MMDB using an IPINFO_TOKEN secret, validates it with a sample
lookup, and opens a PR if the file changed.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 10:25:03 -04:00
Sean Whalen c5f432c460 Add optional IPinfo Lite REST API with MMDB fallback (#717)
* Add optional IPinfo Lite REST API with MMDB fallback

Configure [general] ipinfo_api_token (or PARSEDMARC_GENERAL_IPINFO_API_TOKEN)
and every IP lookup hits https://api.ipinfo.io/lite/<ip> first for fresh
country + ASN data. On HTTP 429 (rate-limit) or 402 (quota), the API is
disabled for the rest of the run and lookups fall through to the bundled /
cached MMDB; transient network errors fall through per-request without
disabling the API. An invalid token (401/403) raises InvalidIPinfoAPIKey,
which the CLI catches and exits fatally — including at startup via a probe
lookup so operators notice misconfiguration immediately. Added
ipinfo_api_url as a base-URL override for mirrors or proxies.

The API token is never logged. A new _normalize_ip_record() helper is
shared between the API path and the MMDB path so both paths produce the
same normalized shape (country code, asn int, asn_name, asn_domain).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* IPinfo API: cool down and retry instead of permanent disable

Previously a single 429 or 402 disabled the API for the whole run. Now
each event sets a cooldown (using Retry-After when present, defaulting to
5 minutes for rate limits and 1 hour for quota exhaustion). Once the
cooldown expires the next lookup retries; a successful retry logs
"IPinfo API recovered" once at info level so operators can see service
came back. Repeat rate-limit responses after the first event stay at
debug to avoid log spam.

Test now targets parsedmarc.log (the actual emitting logger) instead of
the parsedmarc parent — cli._main() sets the child's level to ERROR,
and assertLogs on the parent can't see warnings filtered before
propagation. Test also exercises the cooldown-then-recovery path.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* IPinfo API: log plan and quota from /me at startup

Configure-time probe now hits https://ipinfo.io/me first. That endpoint
is documented as quota-free and doubles as a free-of-quota token check,
so we use it to both validate the token and surface plan / month-to-date
usage / remaining-quota numbers at info level:

  IPinfo API configured — plan: Lite, usage: 12345/50000 this month, 37655 remaining

Field names in /me have drifted across IPinfo plan generations, so the
summary formatter probes a few aliases before giving up. If /me is
unreachable (custom mirror behind ipinfo_api_url, network error) we
fall back to the original 1.1.1.1 lookup probe, which still validates
the token and logs a generic "configured" message.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Drop speculative ipinfo_api_url override

It was added mirroring ip_db_url, but the two serve different needs.
ip_db_url has a real use (internal hosting of the MMDB); an
authenticated IPinfo API isn't something anyone mirrors, and /me was
always hardcoded anyway, making the override half-baked. YAGNI.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* AGENTS.md: warn against speculative config options

New section under Configuration spelling out that every option is
permanent surface area and must come from a real user need rather than
pattern-matching a nearby option. Cites the removed ipinfo_api_url as
the canonical cautionary tale so the next session doesn't reintroduce
it, and calls out "override the base URL" / "configurable retries" as
common YAGNI traps.

Also requires that new options land fully wired in one PR (INI schema,
_parse_config, Namespace defaults, docs, SIGHUP-reload path) rather
than half-implemented.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Rename [general] ip_db_url to ipinfo_url

The bundled MMDB is specifically IPinfo Lite, so the option name
should say so. ip_db_url stays accepted as a deprecated alias and
logs a warning when used; env-var equivalents accept either spelling
via the existing PARSEDMARC_{SECTION}_{KEY} machinery.

Updated the AGENTS.md cautionary tale to refer to ipinfo_url (with
the note about the alias) so the anti-pattern example still reads
correctly post-rename.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Fix testPSLDownload to reflect .akamaiedge.net override

PSL carries c.akamaiedge.net as a public suffix, but
psl_overrides.txt intentionally folds .akamaiedge.net so every
Akamai CDN-customer PTR (the aXXXX-XX.cXXXXX.akamaiedge.net pattern)
clusters under one akamaiedge.net display key. The override was added
in 2978436 as a design decision for source attribution; the test
assertion just predates it.

Updated the comment to explain why override wins over the live PSL
here so the next reader doesn't reach for the PSL answer again.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 10:11:37 -04:00
Sean Whalen 2978436d89 Expand reverse-DNS map and PSL overrides from the live PSL (#716)
* Expand reverse-DNS map and PSL overrides from the live PSL

Parses the private-domains section of the live Public Suffix List and
adds 269 brand-owned suffixes as PSL overrides paired with map
entries, so customer subdomains on shared hosting / SaaS / PaaS
platforms fold to the operator's brand. Adds 33 ASN-domain entries
for the subset of these brands whose IP space is registered under a
different corporate domain in the MMDB, so both the PTR-derived
lookup and the ASN-fallback lookup hit the same (name, type). Also
normalizes ``a2hosting.com`` from ``A2Hosting`` to ``A2 Hosting``
for spelling consistency.

PTR-path wins (overrides + map entries)
- Web hosts: A2 Hosting, alwaysdata, Antagonist, Beget, bplaced,
  Bytemark, Combell, cyber_Folks, cyon, DreamHost, EasyWP, Gehirn,
  HelioHost, home.pl, HostyHosting, Hypernode, IONOS (6 suffixes),
  Jotelulu, JouwWeb, KaasHosting, Keyweb, LCube, LiquidNet, McHost,
  Memset, Mittwald, Mythic Beasts, NearlyFreeSpeech, Nimbus Hosting,
  One.com (20 ccTLD variants), OwnProvider, Pantheon, Planet-Work,
  prgmr, Rackmaze, Rad Web Hosting, Raidboxes, Servebolt,
  SpeedPartner, Uberspace, Whatbox, WP Engine, ZAP-Hosting, Zitcom.
- Dynamic DNS: DuckDNS, DynDNS (24), No-IP (22), Now-DNS, dynv6,
  freemyip, nsupdate.info, ddnss.de, GoIP, DrayTek.
- PaaS/SaaS/IaaS: Netlify, Vercel (6), Heroku, fly.io, Render,
  Firebase/GCP (4), Azure (5), AWS (4), DigitalOcean (2), Red Hat
  OpenShift, Hasura, Supabase, Snowflake/Streamlit, Read the Docs,
  PythonAnywhere, GitHub, GitLab, Adobe Magento.
- Hosted sites/stores: Hatena (6), Notion, Figma, Webflow, Wix (4),
  Shopify, Shopware, Sellfy, Spreadshop (19 ccTLDs), Datto.
- Email/Marketing: Fastmail, ActiveTrail, Leadpages, Heyflow, Carrd,
  Typeform.
- CDN/Technology: Akamai (7), Fastly (3), Yandex Cloud.

ASN-path wins (MMDB coverage now attributes 1,184,256 more IPv4
addresses to a named brand, 85.04% -> 85.08%): yandex.com, ya.ru,
hosting.com (A2 Hosting), beget.com, cyberfolks.pl, fly.io,
bytemark.co.uk, cyberfolks.ro, keyweb.de, mittwald.de, memset.com,
zap-hosting.com, datto.com, jotelulu.com, yandex.cloud, github.com,
asavie.com (Akamai), and 16 others.

Entries are curated from the live PSL rather than any bundled copy;
brand / as_name attribution was verified against the CLAUDE.md rule
that the IP-WHOIS signal is only trusted when the domain name itself
matches the host's name (name-collisions in MMDB were skipped —
Hypernode AU, goipgroup.com, liquidnet.com, One.com substring noise,
nimbusitsolutions.com, etc.). Types follow
``base_reverse_dns_types.txt``; ``sortlists.py`` re-sorts + dedupes +
validates after the batch.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Document PSL-derived override workflow and load_psl_overrides gotcha

Adds three pieces of map-maintenance context learned while building
this PR:

- New subsection "Discovering overrides from the live PSL
  private-domains section" — distinct source from live DMARC data
  (unknown_base_reverse_dns.csv) and MMDB coverage-gap analysis. The
  private section is itself a list of brand-owned suffixes; each is a
  candidate (psl_override + map entry) pair. Emphasizes ruthless
  selectivity — most of the 600+ private-section orgs are dev
  sandboxes or hobby zones that will never appear in DMARC reports.

- Two-path coverage as a single linked step, not two round-trips:
  when adding a PSL override for a hosted-content suffix
  (netlify.app), also add a map row for the brand's corporate
  as_domain (netlify.com) in the same pass. The override fixes the
  PTR path; the ASN-domain alias fixes the ASN-fallback path.

- The load_psl_overrides() fetch-first gotcha. The no-arg form pulls
  the file from master on GitHub, so end-to-end testing of local
  overrides silently uses the old remote version. offline=True is
  required to test local changes against get_base_domain().

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 09:12:32 -04:00
Sean Whalen 2cda5bf59b Surface ASN info and use it for source attribution when a PTR is absent (#715)
* Surface ASN info and fall back to it when a PTR is absent

Adds three new fields to every IP source record — ``asn`` (integer,
e.g. 15169), ``asn_name`` (``"Google LLC"``), ``asn_domain``
(``"google.com"``) — sourced from the bundled IPinfo Lite MMDB. These
flow through to CSV, JSON, Elasticsearch, OpenSearch, and Splunk
outputs as ``source_asn``, ``source_asn_name``, ``source_asn_domain``.

More importantly: when an IP has no reverse DNS (common for many
large senders), source attribution now falls back to the ASN domain
as a lookup key into the same ``reverse_dns_map``. Thanks to #712
and #714, ~85% of routed IPv4 space now has an ``as_domain`` that
hits the map, so rows that were previously unattributable now get a
``source_name``/``source_type`` derived from the ASN. When the ASN
domain misses the map, the raw AS name is used as ``source_name``
with ``source_type`` left null — still better than nothing.

Crucially, ``source_reverse_dns`` and ``source_base_domain`` remain
null on ASN-derived rows, so downstream consumers can still tell a
PTR-resolved attribution apart from an ASN-derived one.

ASN is stored as an integer at the schema level (Elasticsearch /
OpenSearch mappings use ``Integer``) so consumers can do range
queries and numeric sorts; dashboards can prepend ``AS`` at display
time. The MMDB reader normalizes both IPinfo's ``"AS15169"`` string
and MaxMind's ``autonomous_system_number`` int to the same int form.

Also fixes a pre-existing caching bug in ``get_ip_address_info``:
entries without reverse DNS were never written to the IP-info cache,
so every no-PTR IP re-did the MMDB read and DNS attempt on every
call. The cache write is now unconditional.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Bump to 9.9.0 and document the ASN fallback work

Updates the changelog with a 9.9.0 entry covering the ASN-domain
aliases (#712, #714), map-maintenance tooling fixes (#713), and the
ASN-fallback source attribution added in this branch.

Extends AGENTS.md to explain that ``base_reverse_dns_map.csv`` is now
a mixed-namespace map (rDNS bases alongside ASN domains) and adds a
short recipe for finding high-value ASN-domain misses against the
bundled MMDB, so future contributors know where the map's second
lookup path comes from.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Document project conventions previously held only in agent memory

Promotes four conventions out of per-agent memory and into AGENTS.md
so every contributor — human or agent — works from the same baseline:

- Run ruff check + format before committing (Code Style).
- Store natively numeric values as numbers, not pre-formatted strings
  (e.g. ASN as int 15169, not "AS15169"; ES/OS mappings as Integer)
  (Code Style).
- Before rewriting a tracked list/data file from freshly-generated
  content, verify the existing content via git — these files
  accumulate manually-curated entries across sessions (Editing tracked
  data files).
- A release isn't done until hatch-built sdist + wheel are attached to
  the GitHub release page; full 8-step sequence documented (Releases).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9.9.0
2026-04-23 02:13:30 -04:00
Sean Whalen c2678f8e21 Add second-pass ASN-domain aliases for the top remaining misses (#714)
Adds 43 more high-confidence aliases from the top IPv4-weighted misses
remaining after #712. Bumps ASN-domain coverage of the bundled ipinfo
lite MMDB from 84.0% to 85.0% — modest, as expected; the tail is a
long list of small ASNs where diminishing returns kick in hard.

This is the last bulk alias pass. Any remaining gap should be filled
by falling back to the raw `as_name` from the MMDB at attribution
time, not by continuing to hand-classify thousands of small ASNs.

Also promotes nask.pl out of known_unknown_base_reverse_dns.txt —
NASK is the Polish national research and academic network, which is
unambiguous from ASN context.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 01:43:24 -04:00
Sean Whalen 35dda7c0a6 Fix map-maintenance tooling and stale classifications (#713)
sortlists.py had three bugs that let bad data through:

- The `type` column validator was keyed on "Type" (capital T) but the
  CSV header is "type" (lowercase), so every row bypassed validation.
- `types` was read via `f.readlines()` without stripping, so even if
  the key had matched, values like `"ISP\n"` would never equal `"ISP"`.
- The map was sorted case-sensitively, but README and AGENTS.md both
  state the map is sorted alphabetically case-insensitive.

Fixing the validator surfaced eight pre-existing rows with invalid or
inconsistent `type` values. All are now corrected:

- Two types listed in README but missing from base_reverse_dns_types.txt
  (Religion, Utilities) have been added so the README and authoritative
  types file agree.
- dhl.com, ghm-grenoble.fr, regusnet.com had lowercase-casing type
  values (`logistics`, `healthcare`, `Real estate`) corrected to match
  the canonical spellings.
- lodestonegroup.com was typed `Insurance`, which is not a listed
  industry; reclassified as `Finance` (the closest listed category
  for an insurance brokerage).

Also fixes one stale map entry: `rt.ru` was listed as `RT,Government
Media`, conflating Rostelecom (the Russian telco that owns and uses
rt.ru) with RT / Russia Today (which uses rt.com). Corrected to
`Rostelecom,ISP`.

Switching to case-insensitive sort moves exactly one row — the sole
mixed-case key `United-domains.de` — from the top of the file (where
ASCII ordering placed it before all lowercase keys) into the "united"
range where human readers would expect it.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 01:37:38 -04:00
Sean Whalen 15f7d269d5 Add ASN-domain aliases to base_reverse_dns_map.csv (#712)
* Add ASN-domain aliases to base_reverse_dns_map.csv

Adds 457 entries keyed on the `as_domain` values that ship in
`ipinfo_lite.mmdb`, so that the existing reverse_dns_map can serve as
a lookup table for IPs that resolve no PTR — the common case for many
large senders.

Before this change only ~33.8% of routed IPv4 space had an `as_domain`
that matched a map key; after, ~84.0%. All additions are brands that
were already represented in the map under a different rDNS-base key
(e.g. `comcast.com` alongside the existing `comcast.net`), plus a
handful of well-known operators that previously had no representation
at all.

Also promotes 10 entries out of known_unknown_base_reverse_dns.txt
(a1.net, actcorp.in, ais.co.th, emirates.net.ae, eolo.it, fpt.vn,
ibm.com, movilnet.com.ve, ote.gr, singnet.com.sg) — each is a
well-known operator whose identity is unambiguous from ASN context
even if the original rDNS base alone was inconclusive.

No code changes; this is purely data, in preparation for a follow-up
that wires `as_domain` into the source-attribution fallback path when
a report row has no reverse DNS.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* Reclassify Zscaler as SaaS

Zscaler is consumed as a self-service security platform, not delivered
as a managed service, so SaaS fits better than MSSP.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 01:35:33 -04:00
Sean Whalen 2ac8cb406e Replace DB-IP Country Lite with IPinfo Lite (9.8.0) (#711)
Switch the bundled IP-to-country database from DB-IP Country Lite to
IPinfo Lite for greater lookup accuracy. The download URL, cached
filename, and packaged module path all move from
dbip/dbip-country-lite.mmdb to ipinfo/ipinfo_lite.mmdb.

IPinfo Lite uses a different MMDB schema (flat country_code) that is
incompatible with geoip2's Reader.country() helper, so get_ip_address_country()
now uses maxminddb directly and handles both the IPinfo schema and
the MaxMind/DBIP nested country.iso_code schema so users who drop in
their own MMDB from any of these providers continue to work.

Drop the geoip2 dependency (it was only used for the incompatible
helper) and add maxminddb as a direct dependency — it was already
installed transitively through geoip2.

Callers that imported parsedmarc.resources.dbip directly need to switch
to parsedmarc.resources.ipinfo. Old parsedmarc versions downloading
from the dbip/ GitHub raw URL will 404 and fall back to their bundled
copy — this is the documented behavior of load_ip_db().

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9.8.0
2026-04-23 00:31:54 -04:00
Sean Whalen 67f46a7ec9 DNS lookup reliability improvements (9.7.1) (#710)
Port DNS reliability fixes from checkdmarc 5.15.x: cap per-query UDP
timeout at min(1.0, timeout) so a single dropped datagram no longer
consumes the entire lifetime budget, scale lifetime by nameserver count
for proper failover, and add a retries kwarg that retries on
LifetimeTimeout, NoNameservers (SERVFAIL), and OSError during TCP
fallback (NXDOMAIN and NoAnswer remain non-retryable).

Thread dns_retries through the parser API and expose it via
--dns-retries / the dns_retries INI option. Centralize DNS defaults in
parsedmarc.constants and add RECOMMENDED_DNS_NAMESERVERS for opt-in
cross-provider failover.

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
9.7.1
2026-04-22 23:22:35 -04:00
Sean Whalen 6effd80604 9.7.0 (#709)
- Auto-download psl_overrides.txt at startup (and whenever the reverse DNS
  map is reloaded) via load_psl_overrides(); add local_psl_overrides_path
  and psl_overrides_url config options
- Add collect_domain_info.py and detect_psl_overrides.py for bulk WHOIS/HTTP
  enrichment and automatic cluster-based PSL override detection
- Block full-IPv4 reverse-DNS entries from ever entering
  base_reverse_dns_map.csv, known_unknown_base_reverse_dns.txt, or
  unknown_base_reverse_dns.csv, and sweep pre-existing IP entries
- Add Religion and Utilities to the allowed service_type values
- Document the full map-maintenance workflow in AGENTS.md
- Substantial expansion of base_reverse_dns_map.csv (net ~+1,000 entries)
- Add 26 tests covering the new loader, IP filter, PSL fold logic, and
  cluster detection

Co-authored-by: Sean Whalen <seanthegeek@users.noreply.github.com>
9.7.0
2026-04-19 21:20:41 -04:00
Sean Whalen 10dd7c0459 Update base_reverse_dns_map.csv with additional ISP and organization entries 2026-04-19 13:55:52 -04:00
Sean Whalen 66549502d3 Update base_reverse_dns_map.csv with additional entries 2026-04-19 13:07:06 -04:00
Sean Whalen c350a73e95 Fix ruff formatting in utils.py
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
9.6.0
2026-04-06 11:51:22 -04:00
Sean Whalen d1e8d3b3d0 Auto-update DB-IP Country Lite database at startup
Download the latest DB-IP Country Lite mmdb from GitHub on startup and
SIGHUP, caching it locally, with fallback to a previously cached or
bundled copy. Skipped when the offline flag is set. Adds ip_db_url
config option (PARSEDMARC_GENERAL_IP_DB_URL) to override the download
URL. Bumps version to 9.6.0.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-06 11:50:06 -04:00
Sean Whalen 648fb93d6d Update DB-IP-country lite database 2026-04-06 11:14:47 -04:00
Sean Whalen 3d8dba6745 Fix colors in the OpenSearch Message disposition over time visualization 2026-04-05 21:01:16 -04:00
Sean Whalen 814d6985bb Stop hiding results that do not have a failure_reason in the SMTP TLS failures visualization 2026-04-05 18:34:40 -04:00
Sean Whalen 8f7ffb648c Add VSCode task configuration for Dev Dashboard 2026-04-05 18:11:36 -04:00
Sean Whalen 69eee9f1dc Update sponsorship section in README and documentation 2026-04-04 22:14:38 -04:00
Sean Whalen d6ec35d66f Fix typo in sponsorship note heading in documentation 2026-04-04 21:52:14 -04:00
Sean Whalen 2d931ab4f1 Add sponsor link 2026-04-04 21:51:07 -04:00
Sean Whalen 25fdf53bd8 Update GitHub funding configuration 2026-04-04 20:40:15 -04:00
Sean Whalen 6a13f38ac6 Enhance debug logging for output client initialization and add environment variable aliases for debug settings 9.5.5 2026-03-27 10:31:43 -04:00
Sean Whalen 33ab4d9de9 Update CHANGELOG.md to include fix for current_time format in MSGraphConnection 2026-03-27 10:11:12 -04:00
Sean Whalen f49ca0863d Bump version to 9.5.5, implement exponential backoff for output client initialization, update http_auth format, and add debug logging for OpenSearch connections 2026-03-27 10:09:08 -04:00
mihugo e1851d026a Fix current_time format for MSGraphConnection (#708)
Should have caught this on previous fix for since. the current time is used on line 2145: connection.fetch_messages(reports_folder, since=current_time)
if that code is called and it usually won't be depending upon configuration it will fail  with the time format being wrong: yyyy-mm-ddThh:mm:ss.zzzzzz+00:00Z  ---     this removes the extra "Z" that is not needed since utc offset is already specified and becomes invalid.
2026-03-26 13:04:27 -04:00
Sean Whalen 1542936468 Bump version to 9.5.4, enhance Maildir folder handling, and add config key aliases for environment variable compatibility 9.5.4 2026-03-25 23:22:46 -04:00
Sean Whalen fb3c38a8b8 9.5.3
- Fixed `FileNotFoundError` when using Maildir with Docker volume mounts. Python's `mailbox.Maildir(create=True)` only creates `cur/new/tmp` subdirectories when the top-level directory doesn't exist; Docker volume mounts pre-create the directory as empty, skipping subdirectory creation. parsedmarc now explicitly creates the subdirectories when `maildir_create` is enabled.
- Maildir UID mismatch no longer crashes the process. In Docker containers where volume ownership differs from the container UID, parsedmarc now logs a warning instead of raising an exception. Also handles `os.setuid` failures gracefully in containers without `CAP_SETUID`.
- Token file writes (MS Graph and Gmail) now create parent directories automatically, preventing `FileNotFoundError` when the token path points to a directory that doesn't yet exist.
- File paths from config (`token_file`, `credentials_file`, `cert_path`, `log_file`, `output`, `ip_db_path`, `maildir_path`, syslog cert paths, etc.) now expand `~` and `$VAR` references via `os.path.expanduser`/`os.path
9.5.3
2026-03-25 21:29:08 -04:00
Sean Whalen c9a6145505 9.5.3
- Fixed `FileNotFoundError` when using Maildir with Docker volume mounts. Python's `mailbox.Maildir(create=True)` only creates `cur/new/tmp` subdirectories when the top-level directory doesn't exist; Docker volume mounts pre-create the directory as empty, skipping subdirectory creation. parsedmarc now explicitly creates the subdirectories when `maildir_create` is enabled.
2026-03-25 21:13:34 -04:00
Sean Whalen e1bdbeb257 Bump version to 9.5.2 and fix interpolation issues in config parser 9.5.2 2026-03-25 20:21:08 -04:00
Sean Whalen 12c4676b79 9.5.1
- Correct ISO format for MSGraphConnection timestamps (PR #706)
9.5.1
2026-03-25 19:43:24 -04:00