Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/crunch-io/requests-safe
Provides an HTTPAdapter for the requests library that disallows connections to unsafe networks
https://github.com/crunch-io/requests-safe
Last synced: about 1 month ago
JSON representation
Provides an HTTPAdapter for the requests library that disallows connections to unsafe networks
- Host: GitHub
- URL: https://github.com/crunch-io/requests-safe
- Owner: Crunch-io
- License: isc
- Created: 2019-04-18T04:28:32.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-07-15T23:15:39.000Z (over 5 years ago)
- Last Synced: 2024-11-11T22:44:08.265Z (about 2 months ago)
- Language: Python
- Size: 48.8 KB
- Stars: 3
- Watchers: 35
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.rst
- Changelog: CHANGELOG.rst
- License: LICENSE
Awesome Lists containing this project
README
requests-safe
-------------This project provides an ``HTTPAdapter`` for the Requests_ library that will
disallow connections to networks that are considered unsafe to connect to.The primary use case is to safely be able to retrieve items from a user
provided URL without potentially requesting internal or secret resources within
ones own network.Usage
~~~~~It's very simple to use this library, install it as part of your project and
then the following code will protect all requests against accidentally
retrieving something from an IP address in the ranges listed below!.. code:: python
import requests_safe
from requests import Sessionwith Session() as s:
requests_safe.apply(s)s.get("https://google.com/")
There is unfortunately no global way to apply this, so using ``requests.get()``
and friends directly will not be protected by default.IPv4 unsafe networks
~~~~~~~~~~~~~~~~~~~~These are the IPv4 networks that are blocked from being conneted to:
========================= ==================
Name Network (CIDR)
------------------------- ------------------
RFC1918 (private network) 10.0.0.0/8
RFC1918 172.16.0.0/12
RFC1918 192.168.0.0/16
Link-Local 169.254.0.0/16
CG-NAT address space 100.64.0.0/10
Localhost/loopback 127.0.0.0/8
Wildcard IP 0.0.0.0/32
IETF Protocol Assignments 192.0.0.0/24
TEST-NET-1 192.0.2.0/24
RESERVED 192.88.99.0/24
Benchmark testing 198.18.0.0/15
TEST-NET-2 198.51.100.0/24
TEST-NET-3 203.0.113.0/24
IP Multicast 224.0.0.0/4
RESERVED 240.0.0.0/4
Limited broadcast 255.255.255.255/32
========================= ==================IPv6 unsafe networks
~~~~~~~~~~~~~~~~~~~~These are the IPv6 networks that are blocked from being connected to:
============================= ==================
Name Network (CIDR)
----------------------------- ------------------
Localhost/unspecified address ::/128
Loopback ::1/128
IPv4 mapped address ::ffff:0:0/96
IPv4 translated addresses ::ffff:0:0:0/96
IPv4/IPv6 translation 64:ff9b::/96
Discard prefix 100::/64
Teredo tunneling 2001::/32
Orchid v2 (abandoned) 2001:20::/28
Documentation 2001:db8::/32
6to4 addressing scheme 2002::/16
ULA address space fc00::/7
Link-local address space fe80::/10
Global multicast ff00::/8
============================= ==================.. _Requests: http://docs.python-requests.org/en/master/