| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336 |
- package dns
- import (
- "bytes"
- "context"
- "encoding/binary"
- go_errors "errors"
- "net/url"
- "sync"
- "time"
- "github.com/quic-go/quic-go"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/errors"
- "github.com/xtls/xray-core/common/log"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/protocol/dns"
- "github.com/xtls/xray-core/common/session"
- dns_feature "github.com/xtls/xray-core/features/dns"
- "github.com/xtls/xray-core/transport/internet/tls"
- "golang.org/x/net/http2"
- )
- // NextProtoDQ - During connection establishment, DNS/QUIC support is indicated
- // by selecting the ALPN token "dq" in the crypto handshake.
- const NextProtoDQ = "doq"
- const handshakeTimeout = time.Second * 8
- // QUICNameServer implemented DNS over QUIC
- type QUICNameServer struct {
- sync.RWMutex
- cacheController *CacheController
- destination *net.Destination
- connection *quic.Conn
- clientIP net.IP
- }
- // NewQUICNameServer creates DNS-over-QUIC client object for local resolving
- func NewQUICNameServer(url *url.URL, disableCache bool, serveStale bool, serveExpiredTTL uint32, clientIP net.IP) (*QUICNameServer, error) {
- errors.LogInfo(context.Background(), "DNS: created Local DNS-over-QUIC client for ", url.String())
- var err error
- port := net.Port(853)
- if url.Port() != "" {
- port, err = net.PortFromString(url.Port())
- if err != nil {
- return nil, err
- }
- }
- dest := net.UDPDestination(net.ParseAddress(url.Hostname()), port)
- s := &QUICNameServer{
- cacheController: NewCacheController(url.String(), disableCache, serveStale, serveExpiredTTL),
- destination: &dest,
- clientIP: clientIP,
- }
- return s, nil
- }
- // Name returns client name
- func (s *QUICNameServer) Name() string {
- return s.cacheController.name
- }
- func (s *QUICNameServer) newReqID() uint16 {
- return 0
- }
- func (s *QUICNameServer) sendQuery(ctx context.Context, noResponseErrCh chan<- error, domain string, option dns_feature.IPOption) {
- errors.LogInfo(ctx, s.Name(), " querying: ", domain)
- reqs := buildReqMsgs(domain, option, s.newReqID, genEDNS0Options(s.clientIP, 0))
- var deadline time.Time
- if d, ok := ctx.Deadline(); ok {
- deadline = d
- } else {
- deadline = time.Now().Add(time.Second * 5)
- }
- for _, req := range reqs {
- go func(r *dnsRequest) {
- // generate new context for each req, using same context
- // may cause reqs all aborted if any one encounter an error
- dnsCtx := ctx
- // reserve internal dns server requested Inbound
- if inbound := session.InboundFromContext(ctx); inbound != nil {
- dnsCtx = session.ContextWithInbound(dnsCtx, inbound)
- }
- dnsCtx = session.ContextWithContent(dnsCtx, &session.Content{
- Protocol: "quic",
- SkipDNSResolve: true,
- })
- var cancel context.CancelFunc
- dnsCtx, cancel = context.WithDeadline(dnsCtx, deadline)
- defer cancel()
- b, err := dns.PackMessage(r.msg)
- if err != nil {
- errors.LogErrorInner(ctx, err, "failed to pack dns query")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- dnsReqBuf := buf.New()
- err = binary.Write(dnsReqBuf, binary.BigEndian, uint16(b.Len()))
- if err != nil {
- errors.LogErrorInner(ctx, err, "binary write failed")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- _, err = dnsReqBuf.Write(b.Bytes())
- if err != nil {
- errors.LogErrorInner(ctx, err, "buffer write failed")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- b.Release()
- conn, err := s.openStream(dnsCtx)
- if err != nil {
- errors.LogErrorInner(ctx, err, "failed to open quic connection")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- _, err = conn.Write(dnsReqBuf.Bytes())
- if err != nil {
- errors.LogErrorInner(ctx, err, "failed to send query")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- _ = conn.Close()
- respBuf := buf.New()
- defer respBuf.Release()
- n, err := respBuf.ReadFullFrom(conn, 2)
- if err != nil && n == 0 {
- errors.LogErrorInner(ctx, err, "failed to read response length")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- var length int16
- err = binary.Read(bytes.NewReader(respBuf.Bytes()), binary.BigEndian, &length)
- if err != nil {
- errors.LogErrorInner(ctx, err, "failed to parse response length")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- respBuf.Clear()
- n, err = respBuf.ReadFullFrom(conn, int32(length))
- if err != nil && n == 0 {
- errors.LogErrorInner(ctx, err, "failed to read response length")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- rec, err := parseResponse(respBuf.Bytes())
- if err != nil {
- errors.LogErrorInner(ctx, err, "failed to handle response")
- if noResponseErrCh != nil {
- noResponseErrCh <- err
- }
- return
- }
- s.cacheController.updateIP(r, rec)
- }(req)
- }
- }
- // QueryIP is called from dns.Server->queryIPTimeout
- func (s *QUICNameServer) QueryIP(ctx context.Context, domain string, option dns_feature.IPOption) ([]net.IP, uint32, error) {
- fqdn := Fqdn(domain)
- sub4, sub6 := s.cacheController.registerSubscribers(fqdn, option)
- defer closeSubscribers(sub4, sub6)
- queryOption := option
- if s.cacheController.disableCache {
- errors.LogDebug(ctx, "DNS cache is disabled. Querying IP for ", domain, " at ", s.Name())
- } else {
- ips, ttl, isARecordExpired, isAAAARecordExpired, err := s.cacheController.findIPsForDomain(fqdn, option)
- if sub4 != nil && !isARecordExpired {
- sub4.Close()
- sub4 = nil
- queryOption.IPv4Enable = false
- }
- if sub6 != nil && !isAAAARecordExpired {
- sub6.Close()
- sub6 = nil
- queryOption.IPv6Enable = false
- }
- if !go_errors.Is(err, errRecordNotFound) {
- if ttl > 0 {
- errors.LogDebugInner(ctx, err, s.Name(), " cache HIT ", domain, " -> ", ips)
- log.Record(&log.DNSLog{Server: s.Name(), Domain: domain, Result: ips, Status: log.DNSCacheHit, Elapsed: 0, Error: err})
- return ips, uint32(ttl), err
- }
- if s.cacheController.serveStale && (s.cacheController.serveExpiredTTL == 0 || s.cacheController.serveExpiredTTL < ttl) {
- errors.LogDebugInner(ctx, err, s.Name(), " cache OPTIMISTE ", domain, " -> ", ips)
- s.sendQuery(ctx, nil, fqdn, queryOption)
- return ips, 1, err
- }
- }
- }
- noResponseErrCh := make(chan error, 2)
- s.sendQuery(ctx, noResponseErrCh, fqdn, queryOption)
- start := time.Now()
- if sub4 != nil {
- select {
- case <-ctx.Done():
- return nil, 0, ctx.Err()
- case err := <-noResponseErrCh:
- return nil, 0, err
- case <-sub4.Wait():
- sub4.Close()
- }
- }
- if sub6 != nil {
- select {
- case <-ctx.Done():
- return nil, 0, ctx.Err()
- case err := <-noResponseErrCh:
- return nil, 0, err
- case <-sub6.Wait():
- sub6.Close()
- }
- }
- ips, ttl, _, _, err := s.cacheController.findIPsForDomain(fqdn, option)
- log.Record(&log.DNSLog{Server: s.Name(), Domain: domain, Result: ips, Status: log.DNSQueried, Elapsed: time.Since(start), Error: err})
- var rTTL uint32
- if ttl <= 0 {
- rTTL = 1
- } else {
- rTTL = uint32(ttl)
- }
- return ips, rTTL, err
- }
- func isActive(s *quic.Conn) bool {
- select {
- case <-s.Context().Done():
- return false
- default:
- return true
- }
- }
- func (s *QUICNameServer) getConnection() (*quic.Conn, error) {
- var conn *quic.Conn
- s.RLock()
- conn = s.connection
- if conn != nil && isActive(conn) {
- s.RUnlock()
- return conn, nil
- }
- if conn != nil {
- // we're recreating the connection, let's create a new one
- _ = conn.CloseWithError(0, "")
- }
- s.RUnlock()
- s.Lock()
- defer s.Unlock()
- var err error
- conn, err = s.openConnection()
- if err != nil {
- // This does not look too nice, but QUIC (or maybe quic-go)
- // doesn't seem stable enough.
- // Maybe retransmissions aren't fully implemented in quic-go?
- // Anyways, the simple solution is to make a second try when
- // it fails to open the QUIC connection.
- conn, err = s.openConnection()
- if err != nil {
- return nil, err
- }
- }
- s.connection = conn
- return conn, nil
- }
- func (s *QUICNameServer) openConnection() (*quic.Conn, error) {
- tlsConfig := tls.Config{}
- quicConfig := &quic.Config{
- HandshakeIdleTimeout: handshakeTimeout,
- }
- tlsConfig.ServerName = s.destination.Address.String()
- conn, err := quic.DialAddr(context.Background(), s.destination.NetAddr(), tlsConfig.GetTLSConfig(tls.WithNextProto("http/1.1", http2.NextProtoTLS, NextProtoDQ)), quicConfig)
- log.Record(&log.AccessMessage{
- From: "DNS",
- To: s.destination,
- Status: log.AccessAccepted,
- Detour: "local",
- })
- if err != nil {
- return nil, err
- }
- return conn, nil
- }
- func (s *QUICNameServer) openStream(ctx context.Context) (*quic.Stream, error) {
- conn, err := s.getConnection()
- if err != nil {
- return nil, err
- }
- // open a new stream
- return conn.OpenStreamSync(ctx)
- }
|