nameserver_tcp.go 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. package dns
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/binary"
  6. "net/url"
  7. "sync"
  8. "sync/atomic"
  9. "time"
  10. "github.com/xtls/xray-core/common"
  11. "github.com/xtls/xray-core/common/buf"
  12. "github.com/xtls/xray-core/common/errors"
  13. "github.com/xtls/xray-core/common/log"
  14. "github.com/xtls/xray-core/common/net"
  15. "github.com/xtls/xray-core/common/net/cnc"
  16. "github.com/xtls/xray-core/common/protocol/dns"
  17. "github.com/xtls/xray-core/common/session"
  18. "github.com/xtls/xray-core/common/signal/pubsub"
  19. "github.com/xtls/xray-core/common/task"
  20. dns_feature "github.com/xtls/xray-core/features/dns"
  21. "github.com/xtls/xray-core/features/routing"
  22. "github.com/xtls/xray-core/transport/internet"
  23. "golang.org/x/net/dns/dnsmessage"
  24. )
  25. // TCPNameServer implemented DNS over TCP (RFC7766).
  26. type TCPNameServer struct {
  27. sync.RWMutex
  28. name string
  29. destination *net.Destination
  30. ips map[string]*record
  31. pub *pubsub.Service
  32. cleanup *task.Periodic
  33. reqID uint32
  34. dial func(context.Context) (net.Conn, error)
  35. queryStrategy QueryStrategy
  36. }
  37. // NewTCPNameServer creates DNS over TCP server object for remote resolving.
  38. func NewTCPNameServer(
  39. url *url.URL,
  40. dispatcher routing.Dispatcher,
  41. queryStrategy QueryStrategy,
  42. ) (*TCPNameServer, error) {
  43. s, err := baseTCPNameServer(url, "TCP", queryStrategy)
  44. if err != nil {
  45. return nil, err
  46. }
  47. s.dial = func(ctx context.Context) (net.Conn, error) {
  48. link, err := dispatcher.Dispatch(toDnsContext(ctx, s.destination.String()), *s.destination)
  49. if err != nil {
  50. return nil, err
  51. }
  52. return cnc.NewConnection(
  53. cnc.ConnectionInputMulti(link.Writer),
  54. cnc.ConnectionOutputMulti(link.Reader),
  55. ), nil
  56. }
  57. return s, nil
  58. }
  59. // NewTCPLocalNameServer creates DNS over TCP client object for local resolving
  60. func NewTCPLocalNameServer(url *url.URL, queryStrategy QueryStrategy) (*TCPNameServer, error) {
  61. s, err := baseTCPNameServer(url, "TCPL", queryStrategy)
  62. if err != nil {
  63. return nil, err
  64. }
  65. s.dial = func(ctx context.Context) (net.Conn, error) {
  66. return internet.DialSystem(ctx, *s.destination, nil)
  67. }
  68. return s, nil
  69. }
  70. func baseTCPNameServer(url *url.URL, prefix string, queryStrategy QueryStrategy) (*TCPNameServer, error) {
  71. port := net.Port(53)
  72. if url.Port() != "" {
  73. var err error
  74. if port, err = net.PortFromString(url.Port()); err != nil {
  75. return nil, err
  76. }
  77. }
  78. dest := net.TCPDestination(net.ParseAddress(url.Hostname()), port)
  79. s := &TCPNameServer{
  80. destination: &dest,
  81. ips: make(map[string]*record),
  82. pub: pubsub.NewService(),
  83. name: prefix + "//" + dest.NetAddr(),
  84. queryStrategy: queryStrategy,
  85. }
  86. s.cleanup = &task.Periodic{
  87. Interval: time.Minute,
  88. Execute: s.Cleanup,
  89. }
  90. return s, nil
  91. }
  92. // Name implements Server.
  93. func (s *TCPNameServer) Name() string {
  94. return s.name
  95. }
  96. // Cleanup clears expired items from cache
  97. func (s *TCPNameServer) Cleanup() error {
  98. now := time.Now()
  99. s.Lock()
  100. defer s.Unlock()
  101. if len(s.ips) == 0 {
  102. return errors.New("nothing to do. stopping...")
  103. }
  104. for domain, record := range s.ips {
  105. if record.A != nil && record.A.Expire.Before(now) {
  106. record.A = nil
  107. }
  108. if record.AAAA != nil && record.AAAA.Expire.Before(now) {
  109. record.AAAA = nil
  110. }
  111. if record.A == nil && record.AAAA == nil {
  112. errors.LogDebug(context.Background(), s.name, " cleanup ", domain)
  113. delete(s.ips, domain)
  114. } else {
  115. s.ips[domain] = record
  116. }
  117. }
  118. if len(s.ips) == 0 {
  119. s.ips = make(map[string]*record)
  120. }
  121. return nil
  122. }
  123. func (s *TCPNameServer) updateIP(req *dnsRequest, ipRec *IPRecord) {
  124. elapsed := time.Since(req.start)
  125. s.Lock()
  126. rec, found := s.ips[req.domain]
  127. if !found {
  128. rec = &record{}
  129. }
  130. updated := false
  131. switch req.reqType {
  132. case dnsmessage.TypeA:
  133. if isNewer(rec.A, ipRec) {
  134. rec.A = ipRec
  135. updated = true
  136. }
  137. case dnsmessage.TypeAAAA:
  138. addr := make([]net.Address, 0)
  139. for _, ip := range ipRec.IP {
  140. if len(ip.IP()) == net.IPv6len {
  141. addr = append(addr, ip)
  142. }
  143. }
  144. ipRec.IP = addr
  145. if isNewer(rec.AAAA, ipRec) {
  146. rec.AAAA = ipRec
  147. updated = true
  148. }
  149. }
  150. errors.LogInfo(context.Background(), s.name, " got answer: ", req.domain, " ", req.reqType, " -> ", ipRec.IP, " ", elapsed)
  151. if updated {
  152. s.ips[req.domain] = rec
  153. }
  154. switch req.reqType {
  155. case dnsmessage.TypeA:
  156. s.pub.Publish(req.domain+"4", nil)
  157. case dnsmessage.TypeAAAA:
  158. s.pub.Publish(req.domain+"6", nil)
  159. }
  160. s.Unlock()
  161. common.Must(s.cleanup.Start())
  162. }
  163. func (s *TCPNameServer) newReqID() uint16 {
  164. return uint16(atomic.AddUint32(&s.reqID, 1))
  165. }
  166. func (s *TCPNameServer) sendQuery(ctx context.Context, domain string, clientIP net.IP, option dns_feature.IPOption) {
  167. errors.LogDebug(ctx, s.name, " querying DNS for: ", domain)
  168. reqs := buildReqMsgs(domain, option, s.newReqID, genEDNS0Options(clientIP))
  169. var deadline time.Time
  170. if d, ok := ctx.Deadline(); ok {
  171. deadline = d
  172. } else {
  173. deadline = time.Now().Add(time.Second * 5)
  174. }
  175. for _, req := range reqs {
  176. go func(r *dnsRequest) {
  177. dnsCtx := ctx
  178. if inbound := session.InboundFromContext(ctx); inbound != nil {
  179. dnsCtx = session.ContextWithInbound(dnsCtx, inbound)
  180. }
  181. dnsCtx = session.ContextWithContent(dnsCtx, &session.Content{
  182. Protocol: "dns",
  183. SkipDNSResolve: true,
  184. })
  185. var cancel context.CancelFunc
  186. dnsCtx, cancel = context.WithDeadline(dnsCtx, deadline)
  187. defer cancel()
  188. b, err := dns.PackMessage(r.msg)
  189. if err != nil {
  190. errors.LogErrorInner(ctx, err, "failed to pack dns query")
  191. return
  192. }
  193. conn, err := s.dial(dnsCtx)
  194. if err != nil {
  195. errors.LogErrorInner(ctx, err, "failed to dial namesever")
  196. return
  197. }
  198. defer conn.Close()
  199. dnsReqBuf := buf.New()
  200. binary.Write(dnsReqBuf, binary.BigEndian, uint16(b.Len()))
  201. dnsReqBuf.Write(b.Bytes())
  202. b.Release()
  203. _, err = conn.Write(dnsReqBuf.Bytes())
  204. if err != nil {
  205. errors.LogErrorInner(ctx, err, "failed to send query")
  206. return
  207. }
  208. dnsReqBuf.Release()
  209. respBuf := buf.New()
  210. defer respBuf.Release()
  211. n, err := respBuf.ReadFullFrom(conn, 2)
  212. if err != nil && n == 0 {
  213. errors.LogErrorInner(ctx, err, "failed to read response length")
  214. return
  215. }
  216. var length int16
  217. err = binary.Read(bytes.NewReader(respBuf.Bytes()), binary.BigEndian, &length)
  218. if err != nil {
  219. errors.LogErrorInner(ctx, err, "failed to parse response length")
  220. return
  221. }
  222. respBuf.Clear()
  223. n, err = respBuf.ReadFullFrom(conn, int32(length))
  224. if err != nil && n == 0 {
  225. errors.LogErrorInner(ctx, err, "failed to read response length")
  226. return
  227. }
  228. rec, err := parseResponse(respBuf.Bytes())
  229. if err != nil {
  230. errors.LogErrorInner(ctx, err, "failed to parse DNS over TCP response")
  231. return
  232. }
  233. s.updateIP(r, rec)
  234. }(req)
  235. }
  236. }
  237. func (s *TCPNameServer) findIPsForDomain(domain string, option dns_feature.IPOption) ([]net.IP, error) {
  238. s.RLock()
  239. record, found := s.ips[domain]
  240. s.RUnlock()
  241. if !found {
  242. return nil, errRecordNotFound
  243. }
  244. var err4 error
  245. var err6 error
  246. var ips []net.Address
  247. var ip6 []net.Address
  248. if option.IPv4Enable {
  249. ips, err4 = record.A.getIPs()
  250. }
  251. if option.IPv6Enable {
  252. ip6, err6 = record.AAAA.getIPs()
  253. ips = append(ips, ip6...)
  254. }
  255. if len(ips) > 0 {
  256. return toNetIP(ips)
  257. }
  258. if err4 != nil {
  259. return nil, err4
  260. }
  261. if err6 != nil {
  262. return nil, err6
  263. }
  264. return nil, dns_feature.ErrEmptyResponse
  265. }
  266. // QueryIP implements Server.
  267. func (s *TCPNameServer) QueryIP(ctx context.Context, domain string, clientIP net.IP, option dns_feature.IPOption, disableCache bool) ([]net.IP, error) {
  268. fqdn := Fqdn(domain)
  269. option = ResolveIpOptionOverride(s.queryStrategy, option)
  270. if !option.IPv4Enable && !option.IPv6Enable {
  271. return nil, dns_feature.ErrEmptyResponse
  272. }
  273. if disableCache {
  274. errors.LogDebug(ctx, "DNS cache is disabled. Querying IP for ", domain, " at ", s.name)
  275. } else {
  276. ips, err := s.findIPsForDomain(fqdn, option)
  277. if err == nil || err == dns_feature.ErrEmptyResponse {
  278. errors.LogDebugInner(ctx, err, s.name, " cache HIT ", domain, " -> ", ips)
  279. log.Record(&log.DNSLog{Server: s.name, Domain: domain, Result: ips, Status: log.DNSCacheHit, Elapsed: 0, Error: err})
  280. return ips, err
  281. }
  282. }
  283. // ipv4 and ipv6 belong to different subscription groups
  284. var sub4, sub6 *pubsub.Subscriber
  285. if option.IPv4Enable {
  286. sub4 = s.pub.Subscribe(fqdn + "4")
  287. defer sub4.Close()
  288. }
  289. if option.IPv6Enable {
  290. sub6 = s.pub.Subscribe(fqdn + "6")
  291. defer sub6.Close()
  292. }
  293. done := make(chan interface{})
  294. go func() {
  295. if sub4 != nil {
  296. select {
  297. case <-sub4.Wait():
  298. case <-ctx.Done():
  299. }
  300. }
  301. if sub6 != nil {
  302. select {
  303. case <-sub6.Wait():
  304. case <-ctx.Done():
  305. }
  306. }
  307. close(done)
  308. }()
  309. s.sendQuery(ctx, fqdn, clientIP, option)
  310. start := time.Now()
  311. for {
  312. ips, err := s.findIPsForDomain(fqdn, option)
  313. if err != errRecordNotFound {
  314. log.Record(&log.DNSLog{Server: s.name, Domain: domain, Result: ips, Status: log.DNSQueried, Elapsed: time.Since(start), Error: err})
  315. return ips, err
  316. }
  317. select {
  318. case <-ctx.Done():
  319. return nil, ctx.Err()
  320. case <-done:
  321. }
  322. }
  323. }