lokinet/llarp/dns/server.cpp

202 lines
5.4 KiB
C++
Raw Normal View History

2018-12-12 00:58:08 +00:00
#include <dns/server.hpp>
2018-12-03 22:22:59 +00:00
#include <crypto/crypto.hpp>
#include <util/logic.hpp>
2019-02-02 23:12:42 +00:00
#include <array>
2019-07-30 23:42:13 +00:00
#include <utility>
2019-02-02 23:12:42 +00:00
2018-12-03 22:22:59 +00:00
namespace llarp
{
namespace dns
{
Proxy::Proxy(llarp_ev_loop_ptr serverLoop, Logic_ptr serverLogic,
2019-05-22 16:20:50 +00:00
llarp_ev_loop_ptr clientLoop, Logic_ptr clientLogic,
IQueryHandler* h)
2019-07-30 23:42:13 +00:00
: m_ServerLoop(std::move(serverLoop))
, m_ClientLoop(std::move(clientLoop))
, m_ServerLogic(std::move(serverLogic))
, m_ClientLogic(std::move(clientLogic))
2019-05-22 16:20:50 +00:00
, m_QueryHandler(h)
2018-12-03 22:22:59 +00:00
{
2018-12-04 16:35:25 +00:00
m_Client.user = this;
m_Server.user = this;
m_Client.tick = nullptr;
m_Server.tick = nullptr;
m_Client.recvfrom = &HandleUDPRecv_client;
m_Server.recvfrom = &HandleUDPRecv_server;
2018-12-03 22:22:59 +00:00
}
void
Proxy::Stop()
{
}
bool
Proxy::Start(const llarp::Addr addr,
2018-12-03 22:22:59 +00:00
const std::vector< llarp::Addr >& resolvers)
{
m_Resolvers.clear();
m_Resolvers = resolvers;
const llarp::Addr any("0.0.0.0", 0);
auto self = shared_from_this();
m_ClientLogic->queue_func([=]() {
llarp_ev_add_udp(self->m_ClientLoop.get(), &self->m_Client, any);
});
m_ServerLogic->queue_func([=]() {
llarp_ev_add_udp(self->m_ServerLoop.get(), &self->m_Server, addr);
});
return true;
2018-12-03 22:22:59 +00:00
}
void
2018-12-04 16:35:25 +00:00
Proxy::HandleUDPRecv_server(llarp_udp_io* u, const sockaddr* from,
2019-02-03 00:48:10 +00:00
ManagedBuffer buf)
2018-12-03 22:22:59 +00:00
{
2019-02-02 23:12:42 +00:00
static_cast< Proxy* >(u->user)->HandlePktServer(*from, &buf.underlying);
2018-12-04 16:35:25 +00:00
}
void
Proxy::HandleUDPRecv_client(llarp_udp_io* u, const sockaddr* from,
2019-02-03 00:48:10 +00:00
ManagedBuffer buf)
2018-12-04 16:35:25 +00:00
{
2019-02-02 23:12:42 +00:00
static_cast< Proxy* >(u->user)->HandlePktClient(*from, &buf.underlying);
2018-12-03 22:22:59 +00:00
}
llarp::Addr
Proxy::PickRandomResolver() const
{
const size_t sz = m_Resolvers.size();
if(sz <= 1)
2018-12-03 22:22:59 +00:00
return m_Resolvers[0];
auto itr = m_Resolvers.begin();
std::advance(itr, llarp::randint() % sz);
2018-12-03 22:22:59 +00:00
return *itr;
}
void
Proxy::HandleTick(llarp_udp_io*)
{
}
void
Proxy::SendServerMessageTo(llarp::Addr to, Message msg)
2018-12-03 22:22:59 +00:00
{
auto self = shared_from_this();
m_ServerLogic->queue_func([to, msg, self]() {
std::array< byte_t, 1500 > tmp = {{0}};
llarp_buffer_t buf(tmp);
if(msg.Encode(&buf))
{
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
llarp_ev_udp_sendto(&self->m_Server, to, buf);
}
else
llarp::LogWarn("failed to encode dns message when sending");
});
}
void
Proxy::SendClientMessageTo(llarp::Addr to, Message msg)
{
auto self = shared_from_this();
m_ClientLogic->queue_func([to, msg, self]() {
std::array< byte_t, 1500 > tmp = {{0}};
llarp_buffer_t buf(tmp);
if(msg.Encode(&buf))
{
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
llarp_ev_udp_sendto(&self->m_Client, to, buf);
}
else
llarp::LogWarn("failed to encode dns message when sending");
});
2018-12-03 22:22:59 +00:00
}
void
2018-12-04 16:35:25 +00:00
Proxy::HandlePktClient(llarp::Addr from, llarp_buffer_t* pkt)
2018-12-03 22:22:59 +00:00
{
2018-12-04 16:16:43 +00:00
MessageHeader hdr;
if(!hdr.Decode(pkt))
{
llarp::LogWarn("failed to parse dns header from ", from);
return;
}
TX tx = {hdr.id, from};
auto itr = m_Forwarded.find(tx);
if(itr == m_Forwarded.end())
return;
2019-05-22 16:20:50 +00:00
const Addr requester = itr->second;
2019-05-22 16:20:50 +00:00
std::vector< byte_t > tmp(pkt->sz);
2019-05-22 17:38:02 +00:00
std::copy_n(pkt->base, pkt->sz, tmp.begin());
auto self = shared_from_this();
m_ServerLogic->queue_func([=]() {
// forward reply to requester via server
llarp_buffer_t tmpbuf(tmp);
llarp_ev_udp_sendto(&self->m_Server, requester, tmpbuf);
2019-05-22 16:20:50 +00:00
});
// remove pending
m_Forwarded.erase(itr);
2018-12-04 16:35:25 +00:00
}
2018-12-04 16:16:43 +00:00
2018-12-04 16:35:25 +00:00
void
Proxy::HandlePktServer(llarp::Addr from, llarp_buffer_t* pkt)
{
MessageHeader hdr;
if(!hdr.Decode(pkt))
{
llarp::LogWarn("failed to parse dns header from ", from);
return;
}
TX tx = {hdr.id, from};
auto itr = m_Forwarded.find(tx);
2018-12-04 16:16:43 +00:00
Message msg(hdr);
2018-12-03 22:22:59 +00:00
if(!msg.Decode(pkt))
{
2018-12-04 16:16:43 +00:00
llarp::LogWarn("failed to parse dns message from ", from);
2018-12-03 22:22:59 +00:00
return;
}
auto self = shared_from_this();
2018-12-03 22:22:59 +00:00
if(m_QueryHandler && m_QueryHandler->ShouldHookDNSMessage(msg))
{
if(!m_QueryHandler->HandleHookedDNSMessage(
2018-12-04 16:16:43 +00:00
std::move(msg),
std::bind(&Proxy::SendServerMessageTo, self, from,
2018-12-03 22:22:59 +00:00
std::placeholders::_1)))
{
llarp::LogWarn("failed to handle hooked dns");
}
}
else if(m_Resolvers.size() == 0)
{
// no upstream resolvers
// let's serv fail it
msg.AddServFail();
2019-05-22 16:20:50 +00:00
SendServerMessageTo(from, std::move(msg));
}
2018-12-04 16:16:43 +00:00
else if(itr == m_Forwarded.end())
2018-12-03 22:22:59 +00:00
{
// new forwarded query
tx.from = PickRandomResolver();
m_Forwarded[tx] = from;
2019-05-22 16:20:50 +00:00
std::vector< byte_t > tmp(pkt->sz);
2019-05-22 17:38:02 +00:00
std::copy_n(pkt->base, pkt->sz, tmp.begin());
2019-05-22 16:20:50 +00:00
m_ClientLogic->queue_func([=] {
// do query
llarp_buffer_t buf(tmp);
2019-05-22 16:20:50 +00:00
llarp_ev_udp_sendto(&self->m_Client, tx.from, buf);
});
2018-12-03 22:22:59 +00:00
}
else
{
2018-12-04 16:16:43 +00:00
// drop (?)
2018-12-03 22:22:59 +00:00
}
}
} // namespace dns
} // namespace llarp