lokinet/llarp/dnsd.cpp

424 lines
14 KiB
C++
Raw Normal View History

#include <llarp/logic.h>
2018-07-22 03:34:28 +00:00
#include <llarp/dns.h>
2018-07-21 13:24:47 +00:00
#include <string>
2018-08-08 12:40:54 +00:00
#include "dnsd.hpp"
2018-07-21 13:24:47 +00:00
#include "ev.hpp"
#include "llarp/net.hpp"
2018-07-16 12:48:04 +00:00
#include "logger.hpp"
2018-08-01 09:04:40 +00:00
extern dns_tracker dns_udp_tracker;
#ifdef _WIN32
#define wmin(x, y) (((x) < (y)) ? (x) : (y))
#define MIN wmin
#endif
2018-07-16 12:48:04 +00:00
ssize_t
2018-07-21 13:24:47 +00:00
raw_sendto_dns_hook_func(void *sock, const struct sockaddr *from,
const void *buffer, size_t length)
2018-07-16 12:48:04 +00:00
{
int *fd = (int *)sock;
// how do we get to these??
2018-07-21 13:24:47 +00:00
socklen_t addrLen = sizeof(struct sockaddr_in);
#ifdef _WIN32
return sendto(*fd, (const char *)buffer, length, 0, from, addrLen);
#else
return sendto(*fd, (const char *)buffer, length, 0, from, addrLen);
#endif
2018-07-16 12:48:04 +00:00
}
ssize_t
2018-07-21 13:24:47 +00:00
llarp_sendto_dns_hook_func(void *sock, const struct sockaddr *from,
const void *buffer, size_t length)
2018-07-16 12:48:04 +00:00
{
struct llarp_udp_io *udp = (struct llarp_udp_io *)sock;
2018-07-21 13:24:47 +00:00
if(!udp)
2018-07-16 12:48:04 +00:00
{
llarp::LogWarn("couldnt cast to udp");
2018-07-16 12:48:04 +00:00
return 0;
}
2018-07-21 13:24:47 +00:00
// llarp::LogInfo("hook sending ", udp, " bytes: ", length);
// udp seems ok
// this call isn't calling the function...
2018-07-21 13:24:47 +00:00
// llarp::ev_io * evio = static_cast< llarp::ev_io * >(udp->impl);
// printf("ev_io[%x]\n", evio);
2018-07-16 12:48:04 +00:00
return llarp_ev_udp_sendto(udp, from, buffer, length);
}
void
2018-08-08 12:40:54 +00:00
write404_dnss_response(const struct sockaddr *from,
dnsd_question_request *request)
{
const size_t BUFFER_SIZE = 1024 + (request->question.name.size() * 2);
char buf[BUFFER_SIZE];
memset(buf, 0, BUFFER_SIZE);
char *write_buffer = buf;
char *bufferBegin = buf;
// build header
put16bits(write_buffer, request->id);
int fields = (1 << 15); // QR => message type, 1 = response
fields += (0 << 14); // I think opcode is always 0
fields += 3; // response code (3 => not found, 0 = Ok)
put16bits(write_buffer, fields);
put16bits(write_buffer, 1); // QD (number of questions)
put16bits(write_buffer, 1); // AN (number of answers)
put16bits(write_buffer, 0); // NS (number of auth RRs)
put16bits(write_buffer, 0); // AR (number of Additional RRs)
// code question
code_domain(write_buffer, request->question.name);
put16bits(write_buffer, request->question.type);
put16bits(write_buffer, request->question.qClass);
// code answer
code_domain(write_buffer, ""); // com, type=6, ttl=0
put16bits(write_buffer, request->question.type);
put16bits(write_buffer, request->question.qClass);
put32bits(write_buffer, 1); // ttl
put16bits(write_buffer, 1); // rdLength
2018-08-08 12:40:54 +00:00
*write_buffer++ = 0; // write a null byte
uint out_bytes = write_buffer - bufferBegin;
llarp::LogDebug("Sending 404, ", out_bytes, " bytes");
// struct llarp_udp_io *udp = (struct llarp_udp_io *)request->user;
request->sendto_hook(request->user, from, buf, out_bytes);
}
void
writecname_dnss_response(std::string cname, const struct sockaddr *from,
dnsd_question_request *request)
{
const size_t BUFFER_SIZE = 1024 + (request->question.name.size() * 2);
char buf[BUFFER_SIZE];
memset(buf, 0, BUFFER_SIZE);
char *write_buffer = buf;
char *bufferBegin = buf;
// build header
put16bits(write_buffer, request->id);
int fields = (1 << 15); // QR => message type, 1 = response
fields += (0 << 14); // I think opcode is always 0
fields += 0; // response code (3 => not found, 0 = Ok)
2018-08-08 12:40:54 +00:00
// fields |= 1UL << 7; // RA recursion available
// fields |= 1UL << 8; // RD recursion desired
// fields |= 1UL << 9; // 9 is truncate, forces TCP
put16bits(write_buffer, fields);
put16bits(write_buffer, 1); // QD (number of questions)
put16bits(write_buffer, 1); // AN (number of answers)
put16bits(write_buffer, 1); // NS (number of auth RRs)
put16bits(write_buffer, 1); // AR (number of Additional RRs)
// code question
code_domain(write_buffer, request->question.name);
put16bits(write_buffer, request->question.type);
put16bits(write_buffer, request->question.qClass);
// code answer
code_domain(write_buffer, request->question.name); // com, type=6, ttl=0
2018-08-08 12:40:54 +00:00
put16bits(write_buffer, 5); // cname
put16bits(write_buffer, request->question.qClass);
put32bits(write_buffer, 1); // ttl
put16bits(write_buffer, cname.length() + 2); // rdLength
2018-08-08 12:40:54 +00:00
code_domain(write_buffer, cname); // com, type=6, ttl=0
// location of cname
//*write_buffer++ = ip[0];
//*write_buffer++ = ip[1];
// write auth RR
code_domain(write_buffer, cname); // com, type=6, ttl=0
2018-08-08 12:40:54 +00:00
put16bits(write_buffer, 2); // NS
put16bits(write_buffer, request->question.qClass);
put32bits(write_buffer, 1); // ttl
std::string local("ns1.loki");
put16bits(write_buffer, local.length() + 2); // rdLength
2018-08-08 12:40:54 +00:00
code_domain(write_buffer, local); // com, type=6, ttl=0
// write addl RR
code_domain(write_buffer, local); // com, type=6, ttl=0
2018-08-08 12:40:54 +00:00
put16bits(write_buffer, 1); // A
put16bits(write_buffer, request->question.qClass);
put32bits(write_buffer, 1); // ttl
put16bits(write_buffer, 4); // rdLength
*write_buffer++ = 127;
*write_buffer++ = 0;
*write_buffer++ = 0;
*write_buffer++ = 1;
uint out_bytes = write_buffer - bufferBegin;
llarp::LogDebug("Sending cname, ", out_bytes, " bytes");
// struct llarp_udp_io *udp = (struct llarp_udp_io *)request->user;
request->sendto_hook(request->user, from, buf, out_bytes);
}
2018-07-22 03:34:28 +00:00
// FIXME: we need an DNS answer not a sockaddr
// otherwise ttl, type and class can't be relayed correctly
2018-07-16 12:48:04 +00:00
void
2018-07-21 13:24:47 +00:00
writesend_dnss_response(struct sockaddr *hostRes, const struct sockaddr *from,
2018-07-22 03:34:28 +00:00
dnsd_question_request *request)
2018-07-16 12:48:04 +00:00
{
2018-08-08 12:40:54 +00:00
// llarp::Addr test(*from);
// llarp::LogInfo("from ", test);
2018-07-21 13:24:47 +00:00
if(!hostRes)
2018-07-16 12:48:04 +00:00
{
llarp::LogWarn("Failed to resolve");
write404_dnss_response(from, request);
2018-07-16 12:48:04 +00:00
return;
}
2018-08-01 09:04:40 +00:00
const size_t BUFFER_SIZE = 1024 + (request->question.name.size() * 2);
2018-07-16 12:48:04 +00:00
char buf[BUFFER_SIZE];
memset(buf, 0, BUFFER_SIZE);
2018-07-21 13:24:47 +00:00
char *write_buffer = buf;
char *bufferBegin = buf;
2018-07-16 12:48:04 +00:00
// build header
put16bits(write_buffer, request->id);
2018-07-21 13:24:47 +00:00
int fields = (1 << 15); // QR => message type, 1 = response
fields += (0 << 14); // I think opcode is always 0
fields += 0; // response code (3 => not found, 0 = Ok)
2018-07-16 12:48:04 +00:00
put16bits(write_buffer, fields);
2018-07-21 13:24:47 +00:00
put16bits(write_buffer, 1); // QD (number of questions)
put16bits(write_buffer, 1); // AN (number of answers)
put16bits(write_buffer, 0); // NS (number of auth RRs)
put16bits(write_buffer, 0); // AR (number of Additional RRs)
2018-07-16 12:48:04 +00:00
// code question
2018-07-22 03:34:28 +00:00
code_domain(write_buffer, request->question.name);
put16bits(write_buffer, request->question.type);
put16bits(write_buffer, request->question.qClass);
2018-07-16 12:48:04 +00:00
// code answer
2018-07-22 03:34:28 +00:00
code_domain(write_buffer, request->question.name); // com, type=6, ttl=0
put16bits(write_buffer, request->question.type);
put16bits(write_buffer, request->question.qClass);
put32bits(write_buffer, 1); // ttl
2018-07-16 12:48:04 +00:00
// has to be a string of 4 bytes
struct sockaddr_in *sin = (struct sockaddr_in *)hostRes;
2018-07-21 13:24:47 +00:00
unsigned char *ip = (unsigned char *)&sin->sin_addr.s_addr;
2018-07-16 12:48:04 +00:00
2018-07-21 13:24:47 +00:00
put16bits(write_buffer, 4); // rdLength
2018-07-16 12:48:04 +00:00
*write_buffer++ = ip[0];
*write_buffer++ = ip[1];
*write_buffer++ = ip[2];
*write_buffer++ = ip[3];
uint out_bytes = write_buffer - bufferBegin;
llarp::LogDebug("Sending found, ", out_bytes, " bytes");
2018-07-21 13:24:47 +00:00
// struct llarp_udp_io *udp = (struct llarp_udp_io *)request->user;
request->sendto_hook(request->user, from, buf, out_bytes);
2018-07-16 12:48:04 +00:00
}
2018-07-21 13:24:47 +00:00
void
2018-07-22 03:34:28 +00:00
handle_dnsc_result(dnsc_answer_request *client_request)
2018-07-16 12:48:04 +00:00
{
dnsd_question_request *server_request =
(dnsd_question_request *)client_request->user;
2018-08-08 12:40:54 +00:00
if(!server_request)
{
llarp::LogError("Couldn't map client requser user to a server request");
return;
}
2018-07-21 13:24:47 +00:00
writesend_dnss_response(
client_request->found ? &client_request->result : nullptr,
server_request->from, server_request);
llarp_host_resolved(client_request);
2018-07-16 12:48:04 +00:00
}
2018-07-21 13:19:06 +00:00
// our generic version
2018-07-16 12:48:04 +00:00
void
2018-07-21 13:24:47 +00:00
handle_recvfrom(const char *buffer, ssize_t nbytes, const struct sockaddr *from,
2018-07-22 03:34:28 +00:00
dnsd_question_request *request)
2018-07-16 12:48:04 +00:00
{
const size_t HDR_OFFSET = 12;
2018-07-21 13:24:47 +00:00
const char *p_buffer = buffer;
2018-07-16 12:48:04 +00:00
2018-07-21 13:19:06 +00:00
int rcode = (buffer[3] & 0x0F);
llarp::LogDebug("dnsd rcode ", rcode);
2018-07-21 13:24:47 +00:00
2018-07-21 13:19:06 +00:00
dns_msg_header *msg = decode_hdr(p_buffer);
2018-07-16 12:48:04 +00:00
p_buffer += HDR_OFFSET;
2018-07-21 13:24:47 +00:00
request->id = msg->id;
2018-07-16 12:48:04 +00:00
std::string m_qName = "";
2018-07-21 13:24:47 +00:00
int length = *p_buffer++;
while(length != 0)
{
for(int i = 0; i < length; i++)
{
2018-07-16 12:48:04 +00:00
char c = *p_buffer++;
m_qName.append(1, c);
}
length = *p_buffer++;
2018-07-21 13:24:47 +00:00
if(length != 0)
m_qName.append(1, '.');
2018-07-16 12:48:04 +00:00
}
2018-07-22 03:34:28 +00:00
request->question.name = m_qName;
request->question.type = get16bits(p_buffer);
request->question.qClass = get16bits(p_buffer);
llarp::LogDebug("qName ", request->question.name);
llarp::LogDebug("qType ", request->question.type);
llarp::LogDebug("qClass ", request->question.qClass);
2018-07-21 13:24:47 +00:00
/*
llarp::Addr test(*request->from);
llarp::LogInfo("DNS request from ", test);
llarp::Addr test2(from);
llarp::LogInfo("DNS request from ", test2);
*/
2018-08-08 12:40:54 +00:00
sockaddr *fromCopy =
new sockaddr(*from); // make our own sockaddr that won't get cleaned up
if(request->context->intercept)
2018-07-16 12:48:04 +00:00
{
2018-08-08 12:40:54 +00:00
// llarp::Addr test(*from);
// llarp::LogInfo("from ", test);
dnsd_query_hook_response *intercept =
request->context->intercept(request->question.name, fromCopy, request);
// if(!forward_dns_request(m_qName))
if(intercept != nullptr)
{
llarp::LogDebug("hook returned a response");
2018-08-08 12:40:54 +00:00
if(intercept->dontSendResponse)
{
llarp::LogDebug("HOOKED: Not sending a response");
return;
}
2018-08-08 12:40:54 +00:00
if(intercept->dontLookUp == true && intercept->returnThis)
{
llarp::LogDebug("HOOKED: sending an immediate override");
// told that hook will handle overrides
writesend_dnss_response(intercept->returnThis, fromCopy, request);
return;
}
}
2018-07-16 12:48:04 +00:00
}
// FIXME: check request and context's client
2018-08-08 12:40:54 +00:00
if(!request->context)
2018-08-01 09:04:40 +00:00
{
llarp::LogError("dnsd request context was not a dnsd context");
writesend_dnss_response(nullptr, fromCopy, request);
return;
}
/*
2018-08-01 09:04:40 +00:00
struct dns_tracker *tracker = (struct dns_tracker *)request->context->tracker;
if (!tracker)
{
llarp::LogError("dnsd request context tracker was not a dns_tracker");
sockaddr *fromCopy = new sockaddr(*from);
writesend_dnss_response(nullptr, fromCopy, request);
return;
}
dnsd_context *dnsd = tracker->dnsd;
if (!dnsd)
{
llarp::LogError("tracker dnsd was not a dnsd context");
sockaddr *fromCopy = new sockaddr(*from);
writesend_dnss_response(nullptr, fromCopy, request);
return;
}
*/
2018-07-22 03:34:28 +00:00
if(request->llarp)
2018-07-16 12:48:04 +00:00
{
2018-08-01 09:04:40 +00:00
// make async request
2018-08-08 12:40:54 +00:00
llarp_resolve_host(&request->context->client, m_qName.c_str(),
&handle_dnsc_result, (void *)request);
2018-07-16 12:48:04 +00:00
}
2018-07-22 03:34:28 +00:00
else
{
2018-08-01 09:04:40 +00:00
// make raw/sync request
2018-08-08 12:40:54 +00:00
raw_resolve_host(&request->context->client, m_qName.c_str(),
&handle_dnsc_result, (void *)request);
2018-07-22 03:34:28 +00:00
}
2018-07-16 12:48:04 +00:00
}
void
llarp_handle_dnsd_recvfrom(struct llarp_udp_io *udp,
2018-08-01 09:04:40 +00:00
const struct sockaddr *saddr, const void *buf,
ssize_t sz)
2018-07-16 12:48:04 +00:00
{
2018-08-08 12:40:54 +00:00
if(!dns_udp_tracker.dnsd)
2018-08-01 09:04:40 +00:00
{
llarp::LogError("No tracker set in dnsd context");
return;
}
// create new request
2018-07-22 03:34:28 +00:00
dnsd_question_request *llarp_dns_request = new dnsd_question_request;
2018-08-08 12:40:54 +00:00
llarp_dns_request->context = dns_udp_tracker.dnsd; // set context
llarp_dns_request->from =
new sockaddr(*saddr); // make a copy of the sockaddr
llarp_dns_request->user = (void *)udp;
llarp_dns_request->llarp = true;
llarp_dns_request->sendto_hook =
&llarp_sendto_dns_hook_func; // set sock hook
2018-07-21 13:19:06 +00:00
2018-07-21 13:24:47 +00:00
// llarp::LogInfo("Server request's UDP ", llarp_dns_request->user);
handle_recvfrom((char *)buf, sz, llarp_dns_request->from, llarp_dns_request);
2018-07-16 12:48:04 +00:00
}
void
2018-07-21 13:24:47 +00:00
raw_handle_recvfrom(int *sockfd, const struct sockaddr *saddr, const void *buf,
ssize_t sz)
2018-07-16 12:48:04 +00:00
{
2018-08-08 12:40:54 +00:00
if(!dns_udp_tracker.dnsd)
2018-08-01 09:04:40 +00:00
{
llarp::LogError("No tracker set in dnsd context");
return;
}
2018-07-22 03:34:28 +00:00
dnsd_question_request *llarp_dns_request = new dnsd_question_request;
2018-08-08 12:40:54 +00:00
llarp_dns_request->context = dns_udp_tracker.dnsd; // set context
llarp_dns_request->from =
new sockaddr(*saddr); // make a copy of the sockaddr
llarp_dns_request->user = (void *)sockfd;
llarp_dns_request->llarp = false;
llarp_dns_request->sendto_hook = &raw_sendto_dns_hook_func;
2018-08-01 09:04:40 +00:00
handle_recvfrom((char *)buf, sz, llarp_dns_request->from, llarp_dns_request);
2018-07-16 12:48:04 +00:00
}
bool
llarp_dnsd_init(struct dnsd_context *dnsd, struct llarp_ev_loop *netloop,
2018-08-08 12:40:54 +00:00
struct llarp_logic *logic, const char *dnsd_ifname,
uint16_t dnsd_port, const char *dnsc_hostname,
uint16_t dnsc_port)
{
struct sockaddr_in bindaddr;
bindaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
2018-07-21 13:24:47 +00:00
bindaddr.sin_family = AF_INET;
bindaddr.sin_port = htons(dnsd_port);
dnsd->udp.user = &dns_udp_tracker;
dnsd->udp.recvfrom = &llarp_handle_dns_recvfrom;
dnsd->udp.tick = nullptr;
2018-07-21 13:19:06 +00:00
dns_udp_tracker.dnsd = dnsd;
2018-07-21 13:24:47 +00:00
2018-08-08 12:40:54 +00:00
dnsd->tracker = &dns_udp_tracker; // register global tracker with context
dnsd->logic = logic; // set logic worker for timers
dnsd->intercept = nullptr; // set default intercepter
// configure dns client
2018-07-21 13:24:47 +00:00
if(!llarp_dnsc_init(&dnsd->client, &dnsd->udp, dnsc_hostname, dnsc_port))
{
llarp::LogError("Couldnt init dns client");
return false;
}
2018-08-08 12:40:54 +00:00
if(netloop)
2018-08-01 09:04:40 +00:00
{
return llarp_ev_add_udp(netloop, &dnsd->udp, (const sockaddr *)&bindaddr)
2018-08-08 12:40:54 +00:00
!= -1;
2018-08-01 09:04:40 +00:00
}
else
{
return true;
}
}