2021-03-09 22:24:35 +00:00
|
|
|
#include "server.hpp"
|
2022-09-13 20:19:28 +00:00
|
|
|
#include <llarp/constants/platform.hpp>
|
|
|
|
#include <llarp/constants/apple.hpp>
|
2021-03-09 22:24:35 +00:00
|
|
|
#include "dns.hpp"
|
2022-09-13 20:19:28 +00:00
|
|
|
#include <iterator>
|
2021-03-09 22:24:35 +00:00
|
|
|
#include <llarp/crypto/crypto.hpp>
|
2019-02-02 23:12:42 +00:00
|
|
|
#include <array>
|
2022-09-12 16:05:49 +00:00
|
|
|
#include <stdexcept>
|
2019-07-30 23:42:13 +00:00
|
|
|
#include <utility>
|
2021-03-09 22:24:35 +00:00
|
|
|
#include <llarp/ev/udp_handle.hpp>
|
2022-04-07 20:44:23 +00:00
|
|
|
#include <optional>
|
|
|
|
#include <memory>
|
|
|
|
#include <unbound.h>
|
|
|
|
#include <uvw.hpp>
|
2019-02-02 23:12:42 +00:00
|
|
|
|
2022-09-12 16:17:22 +00:00
|
|
|
#include "oxen/log.hpp"
|
2022-06-22 16:14:33 +00:00
|
|
|
#include "sd_platform.hpp"
|
|
|
|
#include "nm_platform.hpp"
|
2022-07-28 16:07:38 +00:00
|
|
|
#include "win32_platform.hpp"
|
2022-06-22 16:14:33 +00:00
|
|
|
|
2021-03-02 18:18:22 +00:00
|
|
|
namespace llarp::dns
|
2018-12-03 22:22:59 +00:00
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
static auto logcat = log::Cat("dns");
|
|
|
|
|
2021-03-02 18:18:22 +00:00
|
|
|
void
|
2022-04-07 20:44:23 +00:00
|
|
|
QueryJob_Base::Cancel() const
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
Message reply{m_Query};
|
|
|
|
reply.AddServFail();
|
|
|
|
SendReply(reply.ToBuffer());
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2018-12-03 22:22:59 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
/// sucks up udp packets from a bound socket and feeds it to a server
|
|
|
|
class UDPReader : public PacketSource_Base, public std::enable_shared_from_this<UDPReader>
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
Server& m_DNS;
|
|
|
|
std::shared_ptr<llarp::UDPHandle> m_udp;
|
|
|
|
SockAddr m_LocalAddr;
|
2018-12-04 16:35:25 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
public:
|
|
|
|
explicit UDPReader(Server& dns, const EventLoop_ptr& loop, llarp::SockAddr bindaddr)
|
|
|
|
: m_DNS{dns}
|
2018-12-04 16:35:25 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
m_udp = loop->make_udp([&](auto&, SockAddr src, llarp::OwnedBuffer buf) {
|
|
|
|
if (src == m_LocalAddr)
|
|
|
|
return;
|
2022-07-28 16:07:38 +00:00
|
|
|
if (not m_DNS.MaybeHandlePacket(shared_from_this(), m_LocalAddr, src, std::move(buf)))
|
2022-04-07 20:44:23 +00:00
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
log::warning(logcat, "did not handle dns packet from {} to {}", src, m_LocalAddr);
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
|
|
|
});
|
|
|
|
m_udp->listen(bindaddr);
|
|
|
|
if (auto maybe_addr = BoundOn())
|
|
|
|
{
|
|
|
|
m_LocalAddr = *maybe_addr;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
throw std::runtime_error{"cannot find which address our dns socket is bound on"};
|
2018-12-03 22:22:59 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
std::optional<SockAddr>
|
|
|
|
BoundOn() const override
|
|
|
|
{
|
|
|
|
return m_udp->LocalAddr();
|
|
|
|
}
|
2018-12-03 22:22:59 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
bool
|
|
|
|
WouldLoop(const SockAddr& to, const SockAddr&) const override
|
|
|
|
{
|
|
|
|
return to != m_LocalAddr;
|
|
|
|
}
|
2020-06-09 16:59:49 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
SendTo(const SockAddr& to, const SockAddr&, llarp::OwnedBuffer buf) const override
|
|
|
|
{
|
|
|
|
m_udp->send(to, std::move(buf));
|
|
|
|
}
|
2020-06-15 18:15:10 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
Stop() override
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
m_udp->close();
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
namespace libunbound
|
|
|
|
{
|
|
|
|
class Resolver;
|
|
|
|
|
|
|
|
class Query : public QueryJob_Base
|
|
|
|
{
|
|
|
|
std::weak_ptr<Resolver> parent;
|
2022-07-28 16:07:38 +00:00
|
|
|
std::shared_ptr<PacketSource_Base> src;
|
2022-04-07 20:44:23 +00:00
|
|
|
SockAddr resolverAddr;
|
|
|
|
SockAddr askerAddr;
|
|
|
|
|
|
|
|
public:
|
|
|
|
explicit Query(
|
|
|
|
std::weak_ptr<Resolver> parent_,
|
|
|
|
Message query,
|
2022-07-28 16:07:38 +00:00
|
|
|
std::shared_ptr<PacketSource_Base> pktsrc,
|
2022-04-07 20:44:23 +00:00
|
|
|
SockAddr toaddr,
|
|
|
|
SockAddr fromaddr)
|
|
|
|
: QueryJob_Base{std::move(query)}
|
|
|
|
, parent{parent_}
|
2022-09-12 22:11:25 +00:00
|
|
|
, src{std::move(pktsrc)}
|
2022-04-07 20:44:23 +00:00
|
|
|
, resolverAddr{std::move(toaddr)}
|
|
|
|
, askerAddr{std::move(fromaddr)}
|
|
|
|
{}
|
|
|
|
|
|
|
|
virtual void
|
|
|
|
SendReply(llarp::OwnedBuffer replyBuf) const override;
|
|
|
|
};
|
|
|
|
|
|
|
|
/// Resolver_Base that uses libunbound
|
|
|
|
class Resolver : public Resolver_Base, public std::enable_shared_from_this<Resolver>
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
std::shared_ptr<ub_ctx> m_ctx;
|
|
|
|
std::weak_ptr<EventLoop> m_Loop;
|
|
|
|
#ifdef _WIN32
|
|
|
|
// windows is dumb so we do ub mainloop in a thread
|
|
|
|
std::thread runner;
|
|
|
|
std::atomic<bool> running;
|
|
|
|
#else
|
|
|
|
std::shared_ptr<uvw::PollHandle> m_Poller;
|
|
|
|
#endif
|
|
|
|
|
2022-07-28 16:07:38 +00:00
|
|
|
std::optional<SockAddr> m_LocalAddr;
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
struct ub_result_deleter
|
|
|
|
{
|
|
|
|
void
|
|
|
|
operator()(ub_result* ptr)
|
|
|
|
{
|
|
|
|
::ub_resolve_free(ptr);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2022-07-28 16:07:38 +00:00
|
|
|
const net::Platform*
|
|
|
|
Net_ptr() const
|
|
|
|
{
|
|
|
|
return m_Loop.lock()->Net_ptr();
|
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
static void
|
|
|
|
Callback(void* data, int err, ub_result* _result)
|
|
|
|
{
|
|
|
|
// take ownership of ub_result
|
|
|
|
std::unique_ptr<ub_result, ub_result_deleter> result{_result};
|
|
|
|
// take ownership of our query
|
|
|
|
std::unique_ptr<Query> query{static_cast<Query*>(data)};
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
{
|
|
|
|
// some kind of error from upstream
|
|
|
|
query->Cancel();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// rewrite response
|
|
|
|
OwnedBuffer pkt{(const byte_t*)result->answer_packet, (size_t)result->answer_len};
|
|
|
|
llarp_buffer_t buf{pkt};
|
|
|
|
MessageHeader hdr;
|
|
|
|
hdr.Decode(&buf);
|
|
|
|
hdr.id = query->Underlying().hdr_id;
|
|
|
|
buf.cur = buf.base;
|
|
|
|
hdr.Encode(&buf);
|
|
|
|
|
|
|
|
// send reply
|
|
|
|
query->SendReply(std::move(pkt));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
SetOpt(std::string key, std::string val)
|
|
|
|
{
|
|
|
|
ub_ctx_set_option(m_ctx.get(), key.c_str(), val.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
llarp::DnsConfig m_conf;
|
|
|
|
|
|
|
|
public:
|
|
|
|
explicit Resolver(const EventLoop_ptr& loop, llarp::DnsConfig conf)
|
|
|
|
: m_ctx{::ub_ctx_create(), ::ub_ctx_delete}, m_Loop{loop}, m_conf{std::move(conf)}
|
|
|
|
{
|
|
|
|
Up(m_conf);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
virtual ~Resolver()
|
|
|
|
{
|
|
|
|
running = false;
|
|
|
|
runner.join();
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
virtual ~Resolver() = default;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
std::string_view
|
|
|
|
ResolverName() const override
|
|
|
|
{
|
|
|
|
return "unbound";
|
|
|
|
}
|
|
|
|
|
2022-07-28 16:07:38 +00:00
|
|
|
virtual std::optional<SockAddr>
|
|
|
|
GetLocalAddr() const override
|
|
|
|
{
|
|
|
|
return m_LocalAddr;
|
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
Up(const llarp::DnsConfig& conf)
|
|
|
|
{
|
|
|
|
// set libunbound settings
|
2022-09-13 20:16:51 +00:00
|
|
|
|
|
|
|
SetOpt("do-tcp:", "no");
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
for (const auto& [k, v] : conf.m_ExtraOpts)
|
|
|
|
SetOpt(k, v);
|
|
|
|
|
|
|
|
// add host files
|
|
|
|
for (const auto& file : conf.m_hostfiles)
|
|
|
|
{
|
|
|
|
const auto str = file.u8string();
|
|
|
|
if (auto ret = ub_ctx_hosts(m_ctx.get(), str.c_str()))
|
|
|
|
{
|
|
|
|
throw std::runtime_error{
|
|
|
|
fmt::format("Failed to add host file {}: {}", file, ub_strerror(ret))};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// set up forward dns
|
|
|
|
for (const auto& dns : conf.m_upstreamDNS)
|
|
|
|
{
|
2022-09-13 20:19:28 +00:00
|
|
|
std::string str = dns.hostString();
|
2022-04-07 20:44:23 +00:00
|
|
|
|
|
|
|
if (const auto port = dns.getPort(); port != 53)
|
2022-09-13 20:19:28 +00:00
|
|
|
fmt::format_to(std::back_inserter(str), "@{}", port);
|
2022-04-07 20:44:23 +00:00
|
|
|
|
2022-09-13 20:20:04 +00:00
|
|
|
log::info(logcat, "Using upstream dns {}", str);
|
|
|
|
|
2022-09-13 20:19:28 +00:00
|
|
|
auto* ctx = m_ctx.get();
|
|
|
|
if (auto err = ub_ctx_set_fwd(ctx, str.c_str()))
|
2022-04-07 20:44:23 +00:00
|
|
|
{
|
|
|
|
throw std::runtime_error{
|
|
|
|
fmt::format("cannot use {} as upstream dns: {}", str, ub_strerror(err))};
|
|
|
|
}
|
2022-09-13 20:19:28 +00:00
|
|
|
|
|
|
|
if constexpr (platform::is_apple)
|
|
|
|
{
|
|
|
|
// On Apple, when we turn on exit mode, we can't directly connect to upstream from here
|
|
|
|
// because, from within the network extension, macOS ignores setting the tunnel as the
|
|
|
|
// default route and would leak all DNS; instead we have to bounce things through the
|
|
|
|
// objective C trampoline code so that it can call into Apple's special snowflake API to
|
|
|
|
// set up a socket that has the magic Apple snowflake sauce added on top so that it
|
|
|
|
// actually routes through the tunnel instead of around it.
|
|
|
|
//
|
|
|
|
// This behaviour is all carefully and explicitly documented by Apple with plenty of
|
|
|
|
// examples and other exposition, of course, just like all of their wonderful new APIs
|
|
|
|
// to reinvent standard unix interfaces.
|
|
|
|
if (dns.hostString() == "127.0.0.1" && dns.getPort() == apple::dns_trampoline_port)
|
|
|
|
{
|
|
|
|
// Not at all clear why this is needed but without it we get "send failed: Can't
|
|
|
|
// assign requested address" when unbound tries to connect to the localhost address
|
|
|
|
// using a source address of 0.0.0.0. Yay apple.
|
|
|
|
ub_ctx_set_option(ctx, "outgoing-interface:", "127.0.0.1");
|
|
|
|
|
|
|
|
// The trampoline expects just a single source port (and sends everything back to it)
|
|
|
|
ub_ctx_set_option(ctx, "outgoing-range:", "1");
|
|
|
|
ub_ctx_set_option(ctx, "outgoing-port-avoid:", "0-65535");
|
|
|
|
ub_ctx_set_option(
|
|
|
|
ctx,
|
|
|
|
"outgoing-port-permit:",
|
|
|
|
std::to_string(apple::dns_trampoline_source_port).c_str());
|
|
|
|
}
|
|
|
|
}
|
2022-07-28 16:07:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (auto maybe_addr = conf.m_QueryBind)
|
|
|
|
{
|
|
|
|
SockAddr addr{*maybe_addr};
|
|
|
|
std::string host{addr.hostString()};
|
|
|
|
|
|
|
|
if (addr.getPort() == 0)
|
2022-04-07 20:44:23 +00:00
|
|
|
{
|
2022-07-28 16:07:38 +00:00
|
|
|
// unbound manages their own sockets because of COURSE it does. so we find an open port
|
|
|
|
// on our system and use it so we KNOW what it is before giving it to unbound to
|
|
|
|
// explicitly bind to JUST that port.
|
|
|
|
|
2022-09-12 16:05:49 +00:00
|
|
|
int fd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (fd == -1)
|
2022-09-12 16:17:22 +00:00
|
|
|
throw std::invalid_argument{
|
|
|
|
fmt::format("Failed to create UDP socket for unbound: {}", strerror(errno))};
|
|
|
|
if (0 != bind(fd, static_cast<const sockaddr*>(addr), addr.sockaddr_len()))
|
|
|
|
{
|
2022-09-12 16:05:49 +00:00
|
|
|
close(fd);
|
2022-09-12 16:17:22 +00:00
|
|
|
throw std::invalid_argument{
|
|
|
|
fmt::format("Failed to bind UDP socket for unbound: {}", strerror(errno))};
|
2022-09-12 16:05:49 +00:00
|
|
|
}
|
|
|
|
struct sockaddr_storage sas;
|
|
|
|
auto* sa = reinterpret_cast<struct sockaddr*>(&sas);
|
2022-09-12 20:22:40 +00:00
|
|
|
socklen_t sa_len = sizeof(sas);
|
2022-09-12 16:17:22 +00:00
|
|
|
if (0 != getsockname(fd, sa, &sa_len))
|
|
|
|
{
|
2022-09-12 16:05:49 +00:00
|
|
|
close(fd);
|
2022-09-12 16:17:22 +00:00
|
|
|
throw std::invalid_argument{
|
|
|
|
fmt::format("Failed to query UDP port for unbound: {}", strerror(errno))};
|
2022-09-12 16:05:49 +00:00
|
|
|
}
|
|
|
|
addr = SockAddr{*sa};
|
|
|
|
close(fd);
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
2022-07-28 16:07:38 +00:00
|
|
|
m_LocalAddr = addr;
|
|
|
|
|
2022-09-12 16:17:22 +00:00
|
|
|
log::info(logcat, "sending dns queries from {}:{}", host, addr.getPort());
|
2022-07-28 16:07:38 +00:00
|
|
|
// set up query bind port if needed
|
|
|
|
SetOpt("outgoing-interface:", host);
|
|
|
|
SetOpt("outgoing-range:", "1");
|
|
|
|
SetOpt("outgoing-port-avoid:", "0-65535");
|
|
|
|
SetOpt("outgoing-port-permit:", std::to_string(addr.getPort()));
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
2022-07-28 16:07:38 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
// set async
|
|
|
|
ub_ctx_async(m_ctx.get(), 1);
|
|
|
|
// setup mainloop
|
|
|
|
#ifdef _WIN32
|
|
|
|
running = true;
|
|
|
|
runner = std::thread{[this]() {
|
|
|
|
while (running)
|
|
|
|
{
|
|
|
|
if (m_ctx.get())
|
|
|
|
ub_wait(m_ctx.get());
|
|
|
|
std::this_thread::sleep_for(25ms);
|
|
|
|
}
|
|
|
|
if (m_ctx.get())
|
|
|
|
ub_process(m_ctx.get());
|
|
|
|
}};
|
|
|
|
#else
|
|
|
|
if (auto loop = m_Loop.lock())
|
|
|
|
{
|
|
|
|
if (auto loop_ptr = loop->MaybeGetUVWLoop())
|
|
|
|
{
|
|
|
|
m_Poller = loop_ptr->resource<uvw::PollHandle>(ub_fd(m_ctx.get()));
|
|
|
|
m_Poller->on<uvw::PollEvent>([ptr = std::weak_ptr<ub_ctx>{m_ctx}](auto&, auto&) {
|
|
|
|
if (auto ctx = ptr.lock())
|
|
|
|
ub_process(ctx.get());
|
|
|
|
});
|
|
|
|
m_Poller->start(uvw::PollHandle::Event::READABLE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
throw std::runtime_error{"no uvw loop"};
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
Down()
|
|
|
|
{
|
|
|
|
#ifdef _WIN32
|
|
|
|
running = false;
|
|
|
|
runner.join();
|
|
|
|
#else
|
|
|
|
m_Poller->close();
|
|
|
|
if (auto loop = m_Loop.lock())
|
|
|
|
{
|
|
|
|
if (auto loop_ptr = loop->MaybeGetUVWLoop())
|
|
|
|
{
|
|
|
|
m_Poller = loop_ptr->resource<uvw::PollHandle>(ub_fd(m_ctx.get()));
|
|
|
|
m_Poller->on<uvw::PollEvent>([ptr = std::weak_ptr<ub_ctx>{m_ctx}](auto&, auto&) {
|
|
|
|
if (auto ctx = ptr.lock())
|
|
|
|
ub_process(ctx.get());
|
|
|
|
});
|
|
|
|
m_Poller->start(uvw::PollHandle::Event::READABLE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
m_ctx.reset();
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
Rank() const override
|
|
|
|
{
|
|
|
|
return 10;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ResetInternalState() override
|
2020-06-09 16:59:49 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
Down();
|
|
|
|
Up(m_conf);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
CancelPendingQueries() override
|
|
|
|
{
|
|
|
|
Down();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WouldLoop(const SockAddr& to, const SockAddr& from) const override
|
|
|
|
{
|
|
|
|
#if defined(ANDROID)
|
|
|
|
(void)to;
|
|
|
|
(void)from;
|
2020-06-09 16:59:49 +00:00
|
|
|
return false;
|
2022-04-07 20:44:23 +00:00
|
|
|
#else
|
|
|
|
const auto& vec = m_conf.m_upstreamDNS;
|
|
|
|
return std::find(vec.begin(), vec.end(), to) != std::end(vec)
|
|
|
|
or std::find(vec.begin(), vec.end(), from) != std::end(vec);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
template <typename Callable>
|
|
|
|
void
|
|
|
|
call(Callable&& f)
|
|
|
|
{
|
|
|
|
if (auto loop = m_Loop.lock())
|
|
|
|
loop->call(std::forward<Callable>(f));
|
|
|
|
else
|
2022-09-12 16:17:22 +00:00
|
|
|
log::critical(logcat, "no mainloop?");
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
MaybeHookDNS(
|
2022-07-28 16:07:38 +00:00
|
|
|
std::shared_ptr<PacketSource_Base> source,
|
2022-04-07 20:44:23 +00:00
|
|
|
const Message& query,
|
|
|
|
const SockAddr& to,
|
|
|
|
const SockAddr& from) override
|
|
|
|
{
|
|
|
|
if (WouldLoop(to, from))
|
|
|
|
return false;
|
|
|
|
// we use this unique ptr to clean up on fail
|
|
|
|
auto tmp = std::make_unique<Query>(weak_from_this(), query, source, to, from);
|
|
|
|
// no questions, send fail
|
|
|
|
if (query.questions.empty())
|
|
|
|
{
|
|
|
|
tmp->Cancel();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (const auto& q : query.questions)
|
|
|
|
{
|
|
|
|
// dont process .loki or .snode
|
|
|
|
if (q.HasTLD(".loki") or q.HasTLD(".snode"))
|
|
|
|
{
|
|
|
|
tmp->Cancel();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// leak bare pointer and try to do the request
|
|
|
|
const auto& q = query.questions[0];
|
|
|
|
if (auto err = ub_resolve_async(
|
|
|
|
m_ctx.get(),
|
|
|
|
q.Name().c_str(),
|
|
|
|
q.qtype,
|
|
|
|
q.qclass,
|
2022-09-12 22:11:25 +00:00
|
|
|
tmp.get(),
|
2022-04-07 20:44:23 +00:00
|
|
|
&Resolver::Callback,
|
|
|
|
nullptr))
|
|
|
|
{
|
|
|
|
// take back ownership on fail
|
2022-09-12 16:17:22 +00:00
|
|
|
log::warning(
|
|
|
|
logcat, "failed to send upstream query with libunbound: {}", ub_strerror(err));
|
2022-04-07 20:44:23 +00:00
|
|
|
tmp->Cancel();
|
2022-09-12 22:11:25 +00:00
|
|
|
} else {
|
|
|
|
(void) tmp.release();
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
|
|
|
return true;
|
2020-06-09 16:59:49 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
void
|
|
|
|
Query::SendReply(llarp::OwnedBuffer replyBuf) const
|
|
|
|
{
|
2022-07-28 16:07:38 +00:00
|
|
|
if (auto ptr = parent.lock())
|
2022-04-07 20:44:23 +00:00
|
|
|
{
|
2022-09-12 22:11:25 +00:00
|
|
|
ptr->call([src = src, from = resolverAddr, to = askerAddr, buf = replyBuf.copy()] {
|
2022-07-28 16:07:38 +00:00
|
|
|
src->SendTo(to, from, OwnedBuffer::copy_from(buf));
|
2022-04-07 20:44:23 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
else
|
2022-09-12 16:17:22 +00:00
|
|
|
log::error(logcat, "no source or parent");
|
2020-06-09 16:59:49 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
} // namespace libunbound
|
|
|
|
|
2022-07-28 16:07:38 +00:00
|
|
|
Server::Server(EventLoop_ptr loop, llarp::DnsConfig conf, unsigned int netif)
|
2022-06-22 16:14:33 +00:00
|
|
|
: m_Loop{std::move(loop)}
|
|
|
|
, m_Config{std::move(conf)}
|
|
|
|
, m_Platform{CreatePlatform()}
|
2022-07-28 16:07:38 +00:00
|
|
|
, m_NetIfIndex{std::move(netif)}
|
2022-04-07 20:44:23 +00:00
|
|
|
{}
|
|
|
|
|
2022-07-28 16:07:38 +00:00
|
|
|
std::vector<std::weak_ptr<Resolver_Base>>
|
|
|
|
Server::GetAllResolvers() const
|
|
|
|
{
|
|
|
|
std::vector<std::weak_ptr<Resolver_Base>> all;
|
|
|
|
for (const auto& res : m_Resolvers)
|
|
|
|
all.push_back(res);
|
|
|
|
return all;
|
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
Server::Start()
|
|
|
|
{
|
|
|
|
// set up udp sockets
|
|
|
|
for (const auto& addr : m_Config.m_bind)
|
2021-06-09 10:38:11 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto ptr = MakePacketSourceOn(addr, m_Config))
|
|
|
|
AddPacketSource(std::move(ptr));
|
2021-06-09 10:38:11 +00:00
|
|
|
}
|
2020-06-09 16:59:49 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
// add default resolver as needed
|
|
|
|
if (auto ptr = MakeDefaultResolver())
|
|
|
|
AddResolver(ptr);
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2018-12-03 22:22:59 +00:00
|
|
|
|
2022-06-22 16:14:33 +00:00
|
|
|
std::shared_ptr<I_Platform>
|
|
|
|
Server::CreatePlatform() const
|
|
|
|
{
|
|
|
|
auto plat = std::make_shared<Multi_Platform>();
|
|
|
|
if constexpr (llarp::platform::has_systemd)
|
|
|
|
{
|
|
|
|
plat->add_impl(std::make_unique<SD_Platform_t>());
|
|
|
|
plat->add_impl(std::make_unique<NM_Platform_t>());
|
|
|
|
}
|
2022-07-28 16:07:38 +00:00
|
|
|
if constexpr (llarp::platform::is_windows)
|
|
|
|
{
|
|
|
|
plat->add_impl(std::make_unique<Win32_Platform_t>());
|
|
|
|
}
|
2022-06-22 16:14:33 +00:00
|
|
|
return plat;
|
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
std::shared_ptr<PacketSource_Base>
|
|
|
|
Server::MakePacketSourceOn(const llarp::SockAddr& addr, const llarp::DnsConfig&)
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
return std::make_shared<UDPReader>(*this, m_Loop, addr);
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
std::shared_ptr<Resolver_Base>
|
|
|
|
Server::MakeDefaultResolver()
|
2021-09-01 18:31:45 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (m_Config.m_upstreamDNS.empty())
|
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
log::info(
|
|
|
|
logcat,
|
2022-04-07 20:44:23 +00:00
|
|
|
"explicitly no upstream dns providers specified, we will not resolve anything but .loki "
|
|
|
|
"and .snode");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return std::make_shared<libunbound::Resolver>(m_Loop, m_Config);
|
2021-09-01 18:10:08 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
std::vector<SockAddr>
|
|
|
|
Server::BoundPacketSourceAddrs() const
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
std::vector<SockAddr> addrs;
|
|
|
|
for (const auto& src : m_PacketSources)
|
2020-06-15 18:15:10 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto ptr = src.lock())
|
|
|
|
if (auto maybe_addr = ptr->BoundOn())
|
|
|
|
addrs.emplace_back(*maybe_addr);
|
2020-06-15 18:15:10 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
return addrs;
|
|
|
|
}
|
2020-06-15 18:15:10 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
std::optional<SockAddr>
|
|
|
|
Server::FirstBoundPacketSourceAddr() const
|
|
|
|
{
|
|
|
|
for (const auto& src : m_PacketSources)
|
2018-12-03 22:22:59 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto ptr = src.lock())
|
|
|
|
if (auto bound = ptr->BoundOn())
|
|
|
|
return bound;
|
2019-05-22 16:20:03 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
Server::AddResolver(std::weak_ptr<Resolver_Base> resolver)
|
|
|
|
{
|
|
|
|
m_Resolvers.insert(resolver);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
Server::AddResolver(std::shared_ptr<Resolver_Base> resolver)
|
|
|
|
{
|
|
|
|
m_OwnedResolvers.insert(resolver);
|
|
|
|
AddResolver(std::weak_ptr<Resolver_Base>{resolver});
|
|
|
|
}
|
2019-05-22 16:20:03 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
Server::AddPacketSource(std::weak_ptr<PacketSource_Base> pkt)
|
|
|
|
{
|
|
|
|
m_PacketSources.push_back(pkt);
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2020-06-15 18:15:10 +00:00
|
|
|
|
2021-03-02 18:18:22 +00:00
|
|
|
void
|
2022-04-07 20:44:23 +00:00
|
|
|
Server::AddPacketSource(std::shared_ptr<PacketSource_Base> pkt)
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
AddPacketSource(std::weak_ptr<PacketSource_Base>{pkt});
|
2022-09-12 22:11:25 +00:00
|
|
|
m_OwnedPacketSources.push_back(std::move(pkt));
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
Server::Stop()
|
|
|
|
{
|
|
|
|
for (const auto& resolver : m_Resolvers)
|
2019-05-22 16:20:03 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto ptr = resolver.lock())
|
|
|
|
ptr->CancelPendingQueries();
|
2018-12-03 22:22:59 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
2018-12-03 22:22:59 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
void
|
|
|
|
Server::Reset()
|
|
|
|
{
|
|
|
|
for (const auto& resolver : m_Resolvers)
|
2018-12-03 22:22:59 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto ptr = resolver.lock())
|
|
|
|
ptr->ResetInternalState();
|
2018-12-04 16:35:25 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
}
|
2018-12-04 16:16:43 +00:00
|
|
|
|
2022-06-22 16:14:33 +00:00
|
|
|
void
|
|
|
|
Server::SetDNSMode(bool all_queries)
|
|
|
|
{
|
|
|
|
if (auto maybe_addr = FirstBoundPacketSourceAddr())
|
2022-07-28 16:07:38 +00:00
|
|
|
m_Platform->set_resolver(m_NetIfIndex, *maybe_addr, all_queries);
|
2022-06-22 16:14:33 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
bool
|
|
|
|
Server::MaybeHandlePacket(
|
2022-07-28 16:07:38 +00:00
|
|
|
std::shared_ptr<PacketSource_Base> ptr,
|
2022-04-07 20:44:23 +00:00
|
|
|
const SockAddr& to,
|
|
|
|
const SockAddr& from,
|
|
|
|
llarp::OwnedBuffer buf)
|
|
|
|
{
|
|
|
|
// dont process to prevent feedback loop
|
|
|
|
if (ptr->WouldLoop(to, from))
|
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
log::warning(logcat, "preventing dns packet replay to={} from={}", to, from);
|
2022-04-07 20:44:23 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto maybe = MaybeParseDNSMessage(buf);
|
|
|
|
if (not maybe)
|
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
log::warning(logcat, "invalid dns message format from {} to dns listener on {}", from, to);
|
2022-04-07 20:44:23 +00:00
|
|
|
return false;
|
|
|
|
}
|
2022-07-28 16:07:38 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
auto& msg = *maybe;
|
2021-03-02 18:18:22 +00:00
|
|
|
// we don't provide a DoH resolver because it requires verified TLS
|
|
|
|
// TLS needs X509/ASN.1-DER and opting into the Root CA Cabal
|
|
|
|
// thankfully mozilla added a backdoor that allows ISPs to turn it off
|
|
|
|
// so we disable DoH for firefox using mozilla's ISP backdoor
|
2022-04-07 20:44:23 +00:00
|
|
|
// see: https://github.com/oxen-io/lokinet/issues/832
|
2021-03-02 18:18:22 +00:00
|
|
|
for (const auto& q : msg.questions)
|
2018-12-04 16:35:25 +00:00
|
|
|
{
|
2021-03-02 18:18:22 +00:00
|
|
|
// is this firefox looking for their backdoor record?
|
|
|
|
if (q.IsName("use-application-dns.net"))
|
2018-12-04 16:35:25 +00:00
|
|
|
{
|
2021-03-02 18:18:22 +00:00
|
|
|
// yea it is, let's turn off DoH because god is dead.
|
|
|
|
msg.AddNXReply();
|
2022-04-07 20:44:23 +00:00
|
|
|
// press F to pay respects and send it back where it came from
|
|
|
|
ptr->SendTo(from, to, msg.ToBuffer());
|
|
|
|
return true;
|
2018-12-04 16:35:25 +00:00
|
|
|
}
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2019-11-01 13:40:31 +00:00
|
|
|
|
2022-04-07 20:44:23 +00:00
|
|
|
for (const auto& resolver : m_Resolvers)
|
2021-03-02 18:18:22 +00:00
|
|
|
{
|
2022-04-07 20:44:23 +00:00
|
|
|
if (auto res_ptr = resolver.lock())
|
2018-12-03 22:22:59 +00:00
|
|
|
{
|
2022-09-12 16:17:22 +00:00
|
|
|
log::debug(
|
|
|
|
logcat, "check resolver {} for dns from {} to {}", res_ptr->ResolverName(), from, to);
|
2022-07-28 16:07:38 +00:00
|
|
|
if (res_ptr->MaybeHookDNS(ptr, msg, to, from))
|
2022-04-07 20:44:23 +00:00
|
|
|
return true;
|
2018-12-03 22:22:59 +00:00
|
|
|
}
|
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
return false;
|
2021-03-02 18:18:22 +00:00
|
|
|
}
|
2022-04-07 20:44:23 +00:00
|
|
|
|
2021-03-02 18:18:22 +00:00
|
|
|
} // namespace llarp::dns
|