mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-19 09:25:28 +00:00
7caa87862e
All #ifndef guards on headers have been removed, I think, in favor of #pragma once Headers are now included as `#include "filename"` if the included file resides in the same directory as the file including it, or any subdirectory therein. Otherwise they are included as `#include <project/top/dir/relative/path/filename>` The above does not include system/os headers.
179 lines
4.7 KiB
C++
179 lines
4.7 KiB
C++
#include "server.hpp"
|
|
#include "dns.hpp"
|
|
#include <llarp/crypto/crypto.hpp>
|
|
#include <array>
|
|
#include <utility>
|
|
#include <llarp/ev/udp_handle.hpp>
|
|
|
|
namespace llarp::dns
|
|
{
|
|
PacketHandler::PacketHandler(EventLoop_ptr loop, IQueryHandler* h)
|
|
: m_QueryHandler{h}, m_Loop{std::move(loop)}
|
|
{}
|
|
|
|
Proxy::Proxy(EventLoop_ptr loop, IQueryHandler* h)
|
|
: PacketHandler{loop, h}, m_Loop(std::move(loop))
|
|
{
|
|
m_Server = m_Loop->make_udp(
|
|
[this](UDPHandle&, SockAddr a, OwnedBuffer buf) { HandlePacket(a, a, buf); });
|
|
}
|
|
|
|
void
|
|
PacketHandler::Stop()
|
|
{
|
|
if (m_UnboundResolver)
|
|
m_UnboundResolver->Stop();
|
|
}
|
|
|
|
bool
|
|
Proxy::Start(SockAddr addr, std::vector<IpAddress> resolvers)
|
|
{
|
|
if (not PacketHandler::Start(addr, std::move(resolvers)))
|
|
return false;
|
|
return m_Server->listen(addr);
|
|
}
|
|
|
|
void
|
|
PacketHandler::Restart()
|
|
{
|
|
if (m_UnboundResolver)
|
|
{
|
|
LogInfo("reset libunbound's internal stuff");
|
|
m_UnboundResolver->Init();
|
|
}
|
|
}
|
|
|
|
bool
|
|
PacketHandler::Start(SockAddr, std::vector<IpAddress> resolvers)
|
|
{
|
|
return SetupUnboundResolver(std::move(resolvers));
|
|
}
|
|
|
|
bool
|
|
PacketHandler::SetupUnboundResolver(std::vector<IpAddress> resolvers)
|
|
{
|
|
auto failFunc = [self = weak_from_this()](
|
|
const SockAddr& from, const SockAddr& to, Message msg) {
|
|
if (auto this_ptr = self.lock())
|
|
this_ptr->SendServerMessageBufferTo(from, to, msg.ToBuffer());
|
|
};
|
|
|
|
auto replyFunc = [self = weak_from_this()](auto&&... args) {
|
|
if (auto this_ptr = self.lock())
|
|
this_ptr->SendServerMessageBufferTo(std::forward<decltype(args)>(args)...);
|
|
};
|
|
|
|
m_UnboundResolver =
|
|
std::make_shared<UnboundResolver>(m_Loop, std::move(replyFunc), std::move(failFunc));
|
|
if (not m_UnboundResolver->Init())
|
|
{
|
|
llarp::LogError("Failed to initialize upstream DNS resolver.");
|
|
m_UnboundResolver = nullptr;
|
|
return false;
|
|
}
|
|
for (const auto& resolver : resolvers)
|
|
{
|
|
if (not m_UnboundResolver->AddUpstreamResolver(resolver.toHost()))
|
|
{
|
|
llarp::LogError("Failed to add upstream DNS server: ", resolver.toHost());
|
|
m_UnboundResolver = nullptr;
|
|
return false;
|
|
}
|
|
m_Resolvers.emplace(resolver);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void
|
|
Proxy::SendServerMessageBufferTo(const SockAddr&, const SockAddr& to, llarp_buffer_t buf)
|
|
{
|
|
if (!m_Server->send(to, buf))
|
|
llarp::LogError("dns reply failed");
|
|
}
|
|
|
|
bool
|
|
PacketHandler::ShouldHandlePacket(
|
|
const SockAddr& to, [[maybe_unused]] const SockAddr& from, llarp_buffer_t buf) const
|
|
{
|
|
MessageHeader hdr;
|
|
if (not hdr.Decode(&buf))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
Message msg{hdr};
|
|
if (not msg.Decode(&buf))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (m_QueryHandler and m_QueryHandler->ShouldHookDNSMessage(msg))
|
|
return true;
|
|
|
|
if (m_Resolvers.find(to) != m_Resolvers.end())
|
|
{
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void
|
|
PacketHandler::HandlePacket(const SockAddr& resolver, const SockAddr& from, llarp_buffer_t buf)
|
|
{
|
|
MessageHeader hdr;
|
|
if (not hdr.Decode(&buf))
|
|
{
|
|
llarp::LogWarn("failed to parse dns header from ", from);
|
|
return;
|
|
}
|
|
|
|
Message msg(hdr);
|
|
if (not msg.Decode(&buf))
|
|
{
|
|
llarp::LogWarn("failed to parse dns message from ", from);
|
|
return;
|
|
}
|
|
|
|
// we don't provide a DoH resolver because it requires verified TLS
|
|
// TLS needs X509/ASN.1-DER and opting into the Root CA Cabal
|
|
// thankfully mozilla added a backdoor that allows ISPs to turn it off
|
|
// so we disable DoH for firefox using mozilla's ISP backdoor
|
|
// see: https://github.com/loki-project/loki-network/issues/832
|
|
for (const auto& q : msg.questions)
|
|
{
|
|
// is this firefox looking for their backdoor record?
|
|
if (q.IsName("use-application-dns.net"))
|
|
{
|
|
// yea it is, let's turn off DoH because god is dead.
|
|
msg.AddNXReply();
|
|
// press F to pay respects
|
|
SendServerMessageBufferTo(resolver, from, msg.ToBuffer());
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (m_QueryHandler && m_QueryHandler->ShouldHookDNSMessage(msg))
|
|
{
|
|
auto reply = [self = shared_from_this(), to = from, resolver](dns::Message msg) {
|
|
self->SendServerMessageBufferTo(resolver, to, msg.ToBuffer());
|
|
};
|
|
if (!m_QueryHandler->HandleHookedDNSMessage(std::move(msg), reply))
|
|
{
|
|
llarp::LogWarn("failed to handle hooked dns");
|
|
}
|
|
}
|
|
else if (not m_UnboundResolver)
|
|
{
|
|
// no upstream resolvers
|
|
// let's serv fail it
|
|
msg.AddServFail();
|
|
SendServerMessageBufferTo(resolver, from, msg.ToBuffer());
|
|
}
|
|
else
|
|
{
|
|
m_UnboundResolver->Lookup(resolver, from, std::move(msg));
|
|
}
|
|
}
|
|
} // namespace llarp::dns
|