router_dns.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282
  1. package route
  2. import (
  3. "context"
  4. "errors"
  5. "net/netip"
  6. "strings"
  7. "time"
  8. "github.com/sagernet/sing-box/adapter"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-dns"
  11. "github.com/sagernet/sing/common/cache"
  12. E "github.com/sagernet/sing/common/exceptions"
  13. F "github.com/sagernet/sing/common/format"
  14. M "github.com/sagernet/sing/common/metadata"
  15. mDNS "github.com/miekg/dns"
  16. )
  17. type DNSReverseMapping struct {
  18. cache *cache.LruCache[netip.Addr, string]
  19. }
  20. func NewDNSReverseMapping() *DNSReverseMapping {
  21. return &DNSReverseMapping{
  22. cache: cache.New[netip.Addr, string](),
  23. }
  24. }
  25. func (m *DNSReverseMapping) Save(address netip.Addr, domain string, ttl int) {
  26. m.cache.StoreWithExpire(address, domain, time.Now().Add(time.Duration(ttl)*time.Second))
  27. }
  28. func (m *DNSReverseMapping) Query(address netip.Addr) (string, bool) {
  29. domain, loaded := m.cache.Load(address)
  30. return domain, loaded
  31. }
  32. func (r *Router) matchDNS(ctx context.Context, allowFakeIP bool, index int) (context.Context, dns.Transport, dns.DomainStrategy, adapter.DNSRule, int) {
  33. metadata := adapter.ContextFrom(ctx)
  34. if metadata == nil {
  35. panic("no context")
  36. }
  37. if index < len(r.dnsRules) {
  38. dnsRules := r.dnsRules
  39. if index != -1 {
  40. dnsRules = dnsRules[index+1:]
  41. }
  42. for currentRuleIndex, rule := range dnsRules {
  43. metadata.ResetRuleCache()
  44. if rule.Match(metadata) {
  45. detour := rule.Outbound()
  46. transport, loaded := r.transportMap[detour]
  47. if !loaded {
  48. r.dnsLogger.ErrorContext(ctx, "transport not found: ", detour)
  49. continue
  50. }
  51. _, isFakeIP := transport.(adapter.FakeIPTransport)
  52. if isFakeIP && !allowFakeIP {
  53. continue
  54. }
  55. ruleIndex := currentRuleIndex
  56. if index != -1 {
  57. ruleIndex += index + 1
  58. }
  59. r.dnsLogger.DebugContext(ctx, "match[", ruleIndex, "] ", rule.String(), " => ", detour)
  60. if isFakeIP || rule.DisableCache() {
  61. ctx = dns.ContextWithDisableCache(ctx, true)
  62. }
  63. if rewriteTTL := rule.RewriteTTL(); rewriteTTL != nil {
  64. ctx = dns.ContextWithRewriteTTL(ctx, *rewriteTTL)
  65. }
  66. if clientSubnet := rule.ClientSubnet(); clientSubnet != nil {
  67. ctx = dns.ContextWithClientSubnet(ctx, *clientSubnet)
  68. }
  69. if domainStrategy, dsLoaded := r.transportDomainStrategy[transport]; dsLoaded {
  70. return ctx, transport, domainStrategy, rule, ruleIndex
  71. } else {
  72. return ctx, transport, r.defaultDomainStrategy, rule, ruleIndex
  73. }
  74. }
  75. }
  76. }
  77. if domainStrategy, dsLoaded := r.transportDomainStrategy[r.defaultTransport]; dsLoaded {
  78. return ctx, r.defaultTransport, domainStrategy, nil, -1
  79. } else {
  80. return ctx, r.defaultTransport, r.defaultDomainStrategy, nil, -1
  81. }
  82. }
  83. func (r *Router) Exchange(ctx context.Context, message *mDNS.Msg) (*mDNS.Msg, error) {
  84. if len(message.Question) > 0 {
  85. r.dnsLogger.DebugContext(ctx, "exchange ", formatQuestion(message.Question[0].String()))
  86. }
  87. var (
  88. response *mDNS.Msg
  89. cached bool
  90. transport dns.Transport
  91. err error
  92. )
  93. response, cached = r.dnsClient.ExchangeCache(ctx, message)
  94. if !cached {
  95. var metadata *adapter.InboundContext
  96. ctx, metadata = adapter.AppendContext(ctx)
  97. if len(message.Question) > 0 {
  98. metadata.QueryType = message.Question[0].Qtype
  99. switch metadata.QueryType {
  100. case mDNS.TypeA:
  101. metadata.IPVersion = 4
  102. case mDNS.TypeAAAA:
  103. metadata.IPVersion = 6
  104. }
  105. metadata.Domain = fqdnToDomain(message.Question[0].Name)
  106. }
  107. var (
  108. strategy dns.DomainStrategy
  109. rule adapter.DNSRule
  110. ruleIndex int
  111. )
  112. ruleIndex = -1
  113. for {
  114. var (
  115. dnsCtx context.Context
  116. cancel context.CancelFunc
  117. addressLimit bool
  118. )
  119. dnsCtx, transport, strategy, rule, ruleIndex = r.matchDNS(ctx, true, ruleIndex)
  120. dnsCtx, cancel = context.WithTimeout(dnsCtx, C.DNSTimeout)
  121. if rule != nil && rule.WithAddressLimit() && isAddressQuery(message) {
  122. addressLimit = true
  123. response, err = r.dnsClient.ExchangeWithResponseCheck(dnsCtx, transport, message, strategy, func(response *mDNS.Msg) bool {
  124. metadata.DestinationAddresses, _ = dns.MessageToAddresses(response)
  125. return rule.MatchAddressLimit(metadata)
  126. })
  127. } else {
  128. addressLimit = false
  129. response, err = r.dnsClient.Exchange(dnsCtx, transport, message, strategy)
  130. }
  131. cancel()
  132. var rejected bool
  133. if err != nil {
  134. if errors.Is(err, dns.ErrResponseRejectedCached) {
  135. rejected = true
  136. r.dnsLogger.DebugContext(ctx, E.Cause(err, "response rejected for ", formatQuestion(message.Question[0].String())), " (cached)")
  137. } else if errors.Is(err, dns.ErrResponseRejected) {
  138. rejected = true
  139. r.dnsLogger.DebugContext(ctx, E.Cause(err, "response rejected for ", formatQuestion(message.Question[0].String())))
  140. } else if len(message.Question) > 0 {
  141. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "exchange failed for ", formatQuestion(message.Question[0].String())))
  142. } else {
  143. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "exchange failed for <empty query>"))
  144. }
  145. }
  146. if addressLimit && rejected {
  147. continue
  148. }
  149. break
  150. }
  151. }
  152. if err != nil {
  153. return nil, err
  154. }
  155. if r.dnsReverseMapping != nil && len(message.Question) > 0 && response != nil && len(response.Answer) > 0 {
  156. if _, isFakeIP := transport.(adapter.FakeIPTransport); !isFakeIP {
  157. for _, answer := range response.Answer {
  158. switch record := answer.(type) {
  159. case *mDNS.A:
  160. r.dnsReverseMapping.Save(M.AddrFromIP(record.A), fqdnToDomain(record.Hdr.Name), int(record.Hdr.Ttl))
  161. case *mDNS.AAAA:
  162. r.dnsReverseMapping.Save(M.AddrFromIP(record.AAAA), fqdnToDomain(record.Hdr.Name), int(record.Hdr.Ttl))
  163. }
  164. }
  165. }
  166. }
  167. return response, nil
  168. }
  169. func (r *Router) Lookup(ctx context.Context, domain string, strategy dns.DomainStrategy) ([]netip.Addr, error) {
  170. var (
  171. responseAddrs []netip.Addr
  172. cached bool
  173. err error
  174. )
  175. responseAddrs, cached = r.dnsClient.LookupCache(ctx, domain, strategy)
  176. if cached {
  177. return responseAddrs, nil
  178. }
  179. r.dnsLogger.DebugContext(ctx, "lookup domain ", domain)
  180. ctx, metadata := adapter.AppendContext(ctx)
  181. metadata.Domain = domain
  182. var (
  183. transport dns.Transport
  184. transportStrategy dns.DomainStrategy
  185. rule adapter.DNSRule
  186. ruleIndex int
  187. )
  188. ruleIndex = -1
  189. for {
  190. var (
  191. dnsCtx context.Context
  192. cancel context.CancelFunc
  193. addressLimit bool
  194. )
  195. metadata.ResetRuleCache()
  196. metadata.DestinationAddresses = nil
  197. dnsCtx, transport, transportStrategy, rule, ruleIndex = r.matchDNS(ctx, false, ruleIndex)
  198. if strategy == dns.DomainStrategyAsIS {
  199. strategy = transportStrategy
  200. }
  201. dnsCtx, cancel = context.WithTimeout(dnsCtx, C.DNSTimeout)
  202. if rule != nil && rule.WithAddressLimit() {
  203. addressLimit = true
  204. responseAddrs, err = r.dnsClient.LookupWithResponseCheck(dnsCtx, transport, domain, strategy, func(responseAddrs []netip.Addr) bool {
  205. metadata.DestinationAddresses = responseAddrs
  206. return rule.MatchAddressLimit(metadata)
  207. })
  208. } else {
  209. addressLimit = false
  210. responseAddrs, err = r.dnsClient.Lookup(dnsCtx, transport, domain, strategy)
  211. }
  212. cancel()
  213. if err != nil {
  214. if errors.Is(err, dns.ErrResponseRejectedCached) {
  215. r.dnsLogger.DebugContext(ctx, "response rejected for ", domain, " (cached)")
  216. } else if errors.Is(err, dns.ErrResponseRejected) {
  217. r.dnsLogger.DebugContext(ctx, "response rejected for ", domain)
  218. } else {
  219. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "lookup failed for ", domain))
  220. }
  221. } else if len(responseAddrs) == 0 {
  222. r.dnsLogger.ErrorContext(ctx, "lookup failed for ", domain, ": empty result")
  223. err = dns.RCodeNameError
  224. }
  225. if !addressLimit || err == nil {
  226. break
  227. }
  228. }
  229. if len(responseAddrs) > 0 {
  230. r.dnsLogger.InfoContext(ctx, "lookup succeed for ", domain, ": ", strings.Join(F.MapToString(responseAddrs), " "))
  231. }
  232. return responseAddrs, err
  233. }
  234. func (r *Router) LookupDefault(ctx context.Context, domain string) ([]netip.Addr, error) {
  235. return r.Lookup(ctx, domain, dns.DomainStrategyAsIS)
  236. }
  237. func (r *Router) ClearDNSCache() {
  238. r.dnsClient.ClearCache()
  239. if r.platformInterface != nil {
  240. r.platformInterface.ClearDNSCache()
  241. }
  242. }
  243. func isAddressQuery(message *mDNS.Msg) bool {
  244. for _, question := range message.Question {
  245. if question.Qtype == mDNS.TypeA || question.Qtype == mDNS.TypeAAAA {
  246. return true
  247. }
  248. }
  249. return false
  250. }
  251. func fqdnToDomain(fqdn string) string {
  252. if mDNS.IsFqdn(fqdn) {
  253. return fqdn[:len(fqdn)-1]
  254. }
  255. return fqdn
  256. }
  257. func formatQuestion(string string) string {
  258. if strings.HasPrefix(string, ";") {
  259. string = string[1:]
  260. }
  261. string = strings.ReplaceAll(string, "\t", " ")
  262. for strings.Contains(string, " ") {
  263. string = strings.ReplaceAll(string, " ", " ")
  264. }
  265. return string
  266. }