nameserver_quic.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. package dns
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/binary"
  6. go_errors "errors"
  7. "net/url"
  8. "sync"
  9. "time"
  10. "github.com/quic-go/quic-go"
  11. "github.com/xtls/xray-core/common/buf"
  12. "github.com/xtls/xray-core/common/errors"
  13. "github.com/xtls/xray-core/common/log"
  14. "github.com/xtls/xray-core/common/net"
  15. "github.com/xtls/xray-core/common/protocol/dns"
  16. "github.com/xtls/xray-core/common/session"
  17. dns_feature "github.com/xtls/xray-core/features/dns"
  18. "github.com/xtls/xray-core/transport/internet/tls"
  19. "golang.org/x/net/http2"
  20. )
  21. // NextProtoDQ - During connection establishment, DNS/QUIC support is indicated
  22. // by selecting the ALPN token "dq" in the crypto handshake.
  23. const NextProtoDQ = "doq"
  24. const handshakeTimeout = time.Second * 8
  25. // QUICNameServer implemented DNS over QUIC
  26. type QUICNameServer struct {
  27. sync.RWMutex
  28. cacheController *CacheController
  29. destination *net.Destination
  30. connection *quic.Conn
  31. clientIP net.IP
  32. }
  33. // NewQUICNameServer creates DNS-over-QUIC client object for local resolving
  34. func NewQUICNameServer(url *url.URL, disableCache bool, clientIP net.IP) (*QUICNameServer, error) {
  35. errors.LogInfo(context.Background(), "DNS: created Local DNS-over-QUIC client for ", url.String())
  36. var err error
  37. port := net.Port(853)
  38. if url.Port() != "" {
  39. port, err = net.PortFromString(url.Port())
  40. if err != nil {
  41. return nil, err
  42. }
  43. }
  44. dest := net.UDPDestination(net.ParseAddress(url.Hostname()), port)
  45. s := &QUICNameServer{
  46. cacheController: NewCacheController(url.String(), disableCache),
  47. destination: &dest,
  48. clientIP: clientIP,
  49. }
  50. return s, nil
  51. }
  52. // Name returns client name
  53. func (s *QUICNameServer) Name() string {
  54. return s.cacheController.name
  55. }
  56. func (s *QUICNameServer) newReqID() uint16 {
  57. return 0
  58. }
  59. func (s *QUICNameServer) sendQuery(ctx context.Context, noResponseErrCh chan<- error, domain string, option dns_feature.IPOption) {
  60. errors.LogInfo(ctx, s.Name(), " querying: ", domain)
  61. reqs := buildReqMsgs(domain, option, s.newReqID, genEDNS0Options(s.clientIP, 0))
  62. var deadline time.Time
  63. if d, ok := ctx.Deadline(); ok {
  64. deadline = d
  65. } else {
  66. deadline = time.Now().Add(time.Second * 5)
  67. }
  68. for _, req := range reqs {
  69. go func(r *dnsRequest) {
  70. // generate new context for each req, using same context
  71. // may cause reqs all aborted if any one encounter an error
  72. dnsCtx := ctx
  73. // reserve internal dns server requested Inbound
  74. if inbound := session.InboundFromContext(ctx); inbound != nil {
  75. dnsCtx = session.ContextWithInbound(dnsCtx, inbound)
  76. }
  77. dnsCtx = session.ContextWithContent(dnsCtx, &session.Content{
  78. Protocol: "quic",
  79. SkipDNSResolve: true,
  80. })
  81. var cancel context.CancelFunc
  82. dnsCtx, cancel = context.WithDeadline(dnsCtx, deadline)
  83. defer cancel()
  84. b, err := dns.PackMessage(r.msg)
  85. if err != nil {
  86. errors.LogErrorInner(ctx, err, "failed to pack dns query")
  87. noResponseErrCh <- err
  88. return
  89. }
  90. dnsReqBuf := buf.New()
  91. err = binary.Write(dnsReqBuf, binary.BigEndian, uint16(b.Len()))
  92. if err != nil {
  93. errors.LogErrorInner(ctx, err, "binary write failed")
  94. noResponseErrCh <- err
  95. return
  96. }
  97. _, err = dnsReqBuf.Write(b.Bytes())
  98. if err != nil {
  99. errors.LogErrorInner(ctx, err, "buffer write failed")
  100. noResponseErrCh <- err
  101. return
  102. }
  103. b.Release()
  104. conn, err := s.openStream(dnsCtx)
  105. if err != nil {
  106. errors.LogErrorInner(ctx, err, "failed to open quic connection")
  107. noResponseErrCh <- err
  108. return
  109. }
  110. _, err = conn.Write(dnsReqBuf.Bytes())
  111. if err != nil {
  112. errors.LogErrorInner(ctx, err, "failed to send query")
  113. noResponseErrCh <- err
  114. return
  115. }
  116. _ = conn.Close()
  117. respBuf := buf.New()
  118. defer respBuf.Release()
  119. n, err := respBuf.ReadFullFrom(conn, 2)
  120. if err != nil && n == 0 {
  121. errors.LogErrorInner(ctx, err, "failed to read response length")
  122. noResponseErrCh <- err
  123. return
  124. }
  125. var length int16
  126. err = binary.Read(bytes.NewReader(respBuf.Bytes()), binary.BigEndian, &length)
  127. if err != nil {
  128. errors.LogErrorInner(ctx, err, "failed to parse response length")
  129. noResponseErrCh <- err
  130. return
  131. }
  132. respBuf.Clear()
  133. n, err = respBuf.ReadFullFrom(conn, int32(length))
  134. if err != nil && n == 0 {
  135. errors.LogErrorInner(ctx, err, "failed to read response length")
  136. noResponseErrCh <- err
  137. return
  138. }
  139. rec, err := parseResponse(respBuf.Bytes())
  140. if err != nil {
  141. errors.LogErrorInner(ctx, err, "failed to handle response")
  142. noResponseErrCh <- err
  143. return
  144. }
  145. s.cacheController.updateIP(r, rec)
  146. }(req)
  147. }
  148. }
  149. // QueryIP is called from dns.Server->queryIPTimeout
  150. func (s *QUICNameServer) QueryIP(ctx context.Context, domain string, option dns_feature.IPOption) ([]net.IP, uint32, error) {
  151. fqdn := Fqdn(domain)
  152. sub4, sub6 := s.cacheController.registerSubscribers(fqdn, option)
  153. defer closeSubscribers(sub4, sub6)
  154. if s.cacheController.disableCache {
  155. errors.LogDebug(ctx, "DNS cache is disabled. Querying IP for ", domain, " at ", s.Name())
  156. } else {
  157. ips, ttl, err := s.cacheController.findIPsForDomain(fqdn, option)
  158. if !go_errors.Is(err, errRecordNotFound) {
  159. errors.LogDebugInner(ctx, err, s.Name(), " cache HIT ", domain, " -> ", ips)
  160. log.Record(&log.DNSLog{Server: s.Name(), Domain: domain, Result: ips, Status: log.DNSCacheHit, Elapsed: 0, Error: err})
  161. return ips, ttl, err
  162. }
  163. }
  164. noResponseErrCh := make(chan error, 2)
  165. s.sendQuery(ctx, noResponseErrCh, fqdn, option)
  166. start := time.Now()
  167. if sub4 != nil {
  168. select {
  169. case <-ctx.Done():
  170. return nil, 0, ctx.Err()
  171. case err := <-noResponseErrCh:
  172. return nil, 0, err
  173. case <-sub4.Wait():
  174. sub4.Close()
  175. }
  176. }
  177. if sub6 != nil {
  178. select {
  179. case <-ctx.Done():
  180. return nil, 0, ctx.Err()
  181. case err := <-noResponseErrCh:
  182. return nil, 0, err
  183. case <-sub6.Wait():
  184. sub6.Close()
  185. }
  186. }
  187. ips, ttl, err := s.cacheController.findIPsForDomain(fqdn, option)
  188. log.Record(&log.DNSLog{Server: s.Name(), Domain: domain, Result: ips, Status: log.DNSQueried, Elapsed: time.Since(start), Error: err})
  189. return ips, ttl, err
  190. }
  191. func isActive(s *quic.Conn) bool {
  192. select {
  193. case <-s.Context().Done():
  194. return false
  195. default:
  196. return true
  197. }
  198. }
  199. func (s *QUICNameServer) getConnection() (*quic.Conn, error) {
  200. var conn *quic.Conn
  201. s.RLock()
  202. conn = s.connection
  203. if conn != nil && isActive(conn) {
  204. s.RUnlock()
  205. return conn, nil
  206. }
  207. if conn != nil {
  208. // we're recreating the connection, let's create a new one
  209. _ = conn.CloseWithError(0, "")
  210. }
  211. s.RUnlock()
  212. s.Lock()
  213. defer s.Unlock()
  214. var err error
  215. conn, err = s.openConnection()
  216. if err != nil {
  217. // This does not look too nice, but QUIC (or maybe quic-go)
  218. // doesn't seem stable enough.
  219. // Maybe retransmissions aren't fully implemented in quic-go?
  220. // Anyways, the simple solution is to make a second try when
  221. // it fails to open the QUIC connection.
  222. conn, err = s.openConnection()
  223. if err != nil {
  224. return nil, err
  225. }
  226. }
  227. s.connection = conn
  228. return conn, nil
  229. }
  230. func (s *QUICNameServer) openConnection() (*quic.Conn, error) {
  231. tlsConfig := tls.Config{}
  232. quicConfig := &quic.Config{
  233. HandshakeIdleTimeout: handshakeTimeout,
  234. }
  235. tlsConfig.ServerName = s.destination.Address.String()
  236. conn, err := quic.DialAddr(context.Background(), s.destination.NetAddr(), tlsConfig.GetTLSConfig(tls.WithNextProto("http/1.1", http2.NextProtoTLS, NextProtoDQ)), quicConfig)
  237. log.Record(&log.AccessMessage{
  238. From: "DNS",
  239. To: s.destination,
  240. Status: log.AccessAccepted,
  241. Detour: "local",
  242. })
  243. if err != nil {
  244. return nil, err
  245. }
  246. return conn, nil
  247. }
  248. func (s *QUICNameServer) openStream(ctx context.Context) (*quic.Stream, error) {
  249. conn, err := s.getConnection()
  250. if err != nil {
  251. return nil, err
  252. }
  253. // open a new stream
  254. return conn.OpenStreamSync(ctx)
  255. }