route_dns.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348
  1. package route
  2. import (
  3. "context"
  4. "errors"
  5. "net/netip"
  6. "strings"
  7. "time"
  8. "github.com/sagernet/sing-box/adapter"
  9. C "github.com/sagernet/sing-box/constant"
  10. R "github.com/sagernet/sing-box/route/rule"
  11. "github.com/sagernet/sing-dns"
  12. "github.com/sagernet/sing-tun"
  13. "github.com/sagernet/sing/common/cache"
  14. E "github.com/sagernet/sing/common/exceptions"
  15. F "github.com/sagernet/sing/common/format"
  16. M "github.com/sagernet/sing/common/metadata"
  17. mDNS "github.com/miekg/dns"
  18. )
  19. type DNSReverseMapping struct {
  20. cache *cache.LruCache[netip.Addr, string]
  21. }
  22. func NewDNSReverseMapping() *DNSReverseMapping {
  23. return &DNSReverseMapping{
  24. cache: cache.New[netip.Addr, string](),
  25. }
  26. }
  27. func (m *DNSReverseMapping) Save(address netip.Addr, domain string, ttl int) {
  28. m.cache.StoreWithExpire(address, domain, time.Now().Add(time.Duration(ttl)*time.Second))
  29. }
  30. func (m *DNSReverseMapping) Query(address netip.Addr) (string, bool) {
  31. domain, loaded := m.cache.Load(address)
  32. return domain, loaded
  33. }
  34. func (r *Router) matchDNS(ctx context.Context, allowFakeIP bool, ruleIndex int, isAddressQuery bool) (dns.Transport, dns.QueryOptions, adapter.DNSRule, int) {
  35. metadata := adapter.ContextFrom(ctx)
  36. if metadata == nil {
  37. panic("no context")
  38. }
  39. var options dns.QueryOptions
  40. var currentRuleIndex int
  41. if ruleIndex != -1 {
  42. currentRuleIndex = ruleIndex + 1
  43. }
  44. for ; currentRuleIndex < len(r.dnsRules); currentRuleIndex++ {
  45. currentRule := r.dnsRules[currentRuleIndex]
  46. if currentRule.WithAddressLimit() && !isAddressQuery {
  47. continue
  48. }
  49. metadata.ResetRuleCache()
  50. if currentRule.Match(metadata) {
  51. ruleDescription := currentRule.String()
  52. if ruleDescription != "" {
  53. r.logger.DebugContext(ctx, "match[", currentRuleIndex, "] ", currentRule, " => ", currentRule.Action())
  54. } else {
  55. r.logger.DebugContext(ctx, "match[", currentRuleIndex, "] => ", currentRule.Action())
  56. }
  57. switch action := currentRule.Action().(type) {
  58. case *R.RuleActionDNSRoute:
  59. transport, loaded := r.transportMap[action.Server]
  60. if !loaded {
  61. r.dnsLogger.ErrorContext(ctx, "transport not found: ", action.Server)
  62. continue
  63. }
  64. _, isFakeIP := transport.(adapter.FakeIPTransport)
  65. if isFakeIP && !allowFakeIP {
  66. continue
  67. }
  68. if isFakeIP || action.DisableCache {
  69. options.DisableCache = true
  70. }
  71. if action.RewriteTTL != nil {
  72. options.RewriteTTL = action.RewriteTTL
  73. }
  74. if action.ClientSubnet.IsValid() {
  75. options.ClientSubnet = action.ClientSubnet
  76. }
  77. if domainStrategy, dsLoaded := r.transportDomainStrategy[transport]; dsLoaded {
  78. options.Strategy = domainStrategy
  79. } else {
  80. options.Strategy = r.defaultDomainStrategy
  81. }
  82. r.logger.DebugContext(ctx, "match[", currentRuleIndex, "] => ", currentRule.Action())
  83. return transport, options, currentRule, currentRuleIndex
  84. case *R.RuleActionDNSRouteOptions:
  85. if action.DisableCache {
  86. options.DisableCache = true
  87. }
  88. if action.RewriteTTL != nil {
  89. options.RewriteTTL = action.RewriteTTL
  90. }
  91. if action.ClientSubnet.IsValid() {
  92. options.ClientSubnet = action.ClientSubnet
  93. }
  94. r.logger.DebugContext(ctx, "match[", currentRuleIndex, "] => ", currentRule.Action())
  95. case *R.RuleActionReject:
  96. r.logger.DebugContext(ctx, "match[", currentRuleIndex, "] => ", currentRule.Action())
  97. return nil, options, currentRule, currentRuleIndex
  98. }
  99. }
  100. }
  101. if domainStrategy, dsLoaded := r.transportDomainStrategy[r.defaultTransport]; dsLoaded {
  102. options.Strategy = domainStrategy
  103. } else {
  104. options.Strategy = r.defaultDomainStrategy
  105. }
  106. return r.defaultTransport, options, nil, -1
  107. }
  108. func (r *Router) Exchange(ctx context.Context, message *mDNS.Msg) (*mDNS.Msg, error) {
  109. if len(message.Question) != 1 {
  110. r.dnsLogger.WarnContext(ctx, "bad question size: ", len(message.Question))
  111. responseMessage := mDNS.Msg{
  112. MsgHdr: mDNS.MsgHdr{
  113. Id: message.Id,
  114. Response: true,
  115. Rcode: mDNS.RcodeFormatError,
  116. },
  117. Question: message.Question,
  118. }
  119. return &responseMessage, nil
  120. }
  121. var (
  122. response *mDNS.Msg
  123. cached bool
  124. transport dns.Transport
  125. err error
  126. )
  127. response, cached = r.dnsClient.ExchangeCache(ctx, message)
  128. if !cached {
  129. var metadata *adapter.InboundContext
  130. ctx, metadata = adapter.ExtendContext(ctx)
  131. metadata.Destination = M.Socksaddr{}
  132. metadata.QueryType = message.Question[0].Qtype
  133. switch metadata.QueryType {
  134. case mDNS.TypeA:
  135. metadata.IPVersion = 4
  136. case mDNS.TypeAAAA:
  137. metadata.IPVersion = 6
  138. }
  139. metadata.Domain = fqdnToDomain(message.Question[0].Name)
  140. var (
  141. options dns.QueryOptions
  142. rule adapter.DNSRule
  143. ruleIndex int
  144. )
  145. ruleIndex = -1
  146. for {
  147. dnsCtx := adapter.OverrideContext(ctx)
  148. var addressLimit bool
  149. transport, options, rule, ruleIndex = r.matchDNS(ctx, true, ruleIndex, isAddressQuery(message))
  150. if rule != nil {
  151. switch action := rule.Action().(type) {
  152. case *R.RuleActionReject:
  153. switch action.Method {
  154. case C.RuleActionRejectMethodDefault:
  155. return dns.FixedResponse(message.Id, message.Question[0], nil, 0), nil
  156. case C.RuleActionRejectMethodDrop:
  157. return nil, tun.ErrDrop
  158. }
  159. }
  160. }
  161. r.dnsLogger.DebugContext(ctx, "exchange ", formatQuestion(message.Question[0].String()), " via ", transport.Name())
  162. if rule != nil && rule.WithAddressLimit() {
  163. addressLimit = true
  164. response, err = r.dnsClient.ExchangeWithResponseCheck(dnsCtx, transport, message, options, func(responseAddrs []netip.Addr) bool {
  165. metadata.DestinationAddresses = responseAddrs
  166. return rule.MatchAddressLimit(metadata)
  167. })
  168. } else {
  169. addressLimit = false
  170. response, err = r.dnsClient.Exchange(dnsCtx, transport, message, options)
  171. }
  172. var rejected bool
  173. if err != nil {
  174. if errors.Is(err, dns.ErrResponseRejectedCached) {
  175. rejected = true
  176. r.dnsLogger.DebugContext(ctx, E.Cause(err, "response rejected for ", formatQuestion(message.Question[0].String())), " (cached)")
  177. } else if errors.Is(err, dns.ErrResponseRejected) {
  178. rejected = true
  179. r.dnsLogger.DebugContext(ctx, E.Cause(err, "response rejected for ", formatQuestion(message.Question[0].String())))
  180. } else if len(message.Question) > 0 {
  181. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "exchange failed for ", formatQuestion(message.Question[0].String())))
  182. } else {
  183. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "exchange failed for <empty query>"))
  184. }
  185. }
  186. if addressLimit && rejected {
  187. continue
  188. }
  189. break
  190. }
  191. }
  192. if err != nil {
  193. return nil, err
  194. }
  195. if r.dnsReverseMapping != nil && response != nil && len(response.Answer) > 0 {
  196. if _, isFakeIP := transport.(adapter.FakeIPTransport); !isFakeIP {
  197. for _, answer := range response.Answer {
  198. switch record := answer.(type) {
  199. case *mDNS.A:
  200. r.dnsReverseMapping.Save(M.AddrFromIP(record.A), fqdnToDomain(record.Hdr.Name), int(record.Hdr.Ttl))
  201. case *mDNS.AAAA:
  202. r.dnsReverseMapping.Save(M.AddrFromIP(record.AAAA), fqdnToDomain(record.Hdr.Name), int(record.Hdr.Ttl))
  203. }
  204. }
  205. }
  206. }
  207. return response, nil
  208. }
  209. func (r *Router) Lookup(ctx context.Context, domain string, strategy dns.DomainStrategy) ([]netip.Addr, error) {
  210. var (
  211. responseAddrs []netip.Addr
  212. cached bool
  213. err error
  214. )
  215. printResult := func() {
  216. if err != nil {
  217. if errors.Is(err, dns.ErrResponseRejectedCached) {
  218. r.dnsLogger.DebugContext(ctx, "response rejected for ", domain, " (cached)")
  219. } else if errors.Is(err, dns.ErrResponseRejected) {
  220. r.dnsLogger.DebugContext(ctx, "response rejected for ", domain)
  221. } else {
  222. r.dnsLogger.ErrorContext(ctx, E.Cause(err, "lookup failed for ", domain))
  223. }
  224. } else if len(responseAddrs) == 0 {
  225. r.dnsLogger.ErrorContext(ctx, "lookup failed for ", domain, ": empty result")
  226. err = dns.RCodeNameError
  227. }
  228. }
  229. responseAddrs, cached = r.dnsClient.LookupCache(ctx, domain, strategy)
  230. if cached {
  231. if len(responseAddrs) == 0 {
  232. return nil, dns.RCodeNameError
  233. }
  234. return responseAddrs, nil
  235. }
  236. r.dnsLogger.DebugContext(ctx, "lookup domain ", domain)
  237. ctx, metadata := adapter.ExtendContext(ctx)
  238. metadata.Destination = M.Socksaddr{}
  239. metadata.Domain = domain
  240. if metadata.DNSServer != "" {
  241. transport, loaded := r.transportMap[metadata.DNSServer]
  242. if !loaded {
  243. return nil, E.New("transport not found: ", metadata.DNSServer)
  244. }
  245. if strategy == dns.DomainStrategyAsIS {
  246. if transportDomainStrategy, loaded := r.transportDomainStrategy[transport]; loaded {
  247. strategy = transportDomainStrategy
  248. } else {
  249. strategy = r.defaultDomainStrategy
  250. }
  251. }
  252. responseAddrs, err = r.dnsClient.Lookup(ctx, transport, domain, dns.QueryOptions{Strategy: strategy})
  253. } else {
  254. var (
  255. transport dns.Transport
  256. options dns.QueryOptions
  257. rule adapter.DNSRule
  258. ruleIndex int
  259. )
  260. ruleIndex = -1
  261. for {
  262. dnsCtx := adapter.OverrideContext(ctx)
  263. var addressLimit bool
  264. transport, options, rule, ruleIndex = r.matchDNS(ctx, false, ruleIndex, true)
  265. if strategy != dns.DomainStrategyAsIS {
  266. options.Strategy = strategy
  267. }
  268. if rule != nil {
  269. switch action := rule.Action().(type) {
  270. case *R.RuleActionReject:
  271. switch action.Method {
  272. case C.RuleActionRejectMethodDefault:
  273. return nil, nil
  274. case C.RuleActionRejectMethodDrop:
  275. return nil, tun.ErrDrop
  276. }
  277. }
  278. }
  279. if rule != nil && rule.WithAddressLimit() {
  280. addressLimit = true
  281. responseAddrs, err = r.dnsClient.LookupWithResponseCheck(dnsCtx, transport, domain, options, func(responseAddrs []netip.Addr) bool {
  282. metadata.DestinationAddresses = responseAddrs
  283. return rule.MatchAddressLimit(metadata)
  284. })
  285. } else {
  286. addressLimit = false
  287. responseAddrs, err = r.dnsClient.Lookup(dnsCtx, transport, domain, options)
  288. }
  289. if !addressLimit || err == nil {
  290. break
  291. }
  292. printResult()
  293. }
  294. }
  295. printResult()
  296. if len(responseAddrs) > 0 {
  297. r.dnsLogger.InfoContext(ctx, "lookup succeed for ", domain, ": ", strings.Join(F.MapToString(responseAddrs), " "))
  298. }
  299. return responseAddrs, err
  300. }
  301. func (r *Router) LookupDefault(ctx context.Context, domain string) ([]netip.Addr, error) {
  302. return r.Lookup(ctx, domain, dns.DomainStrategyAsIS)
  303. }
  304. func (r *Router) ClearDNSCache() {
  305. r.dnsClient.ClearCache()
  306. if r.platformInterface != nil {
  307. r.platformInterface.ClearDNSCache()
  308. }
  309. }
  310. func isAddressQuery(message *mDNS.Msg) bool {
  311. for _, question := range message.Question {
  312. if question.Qtype == mDNS.TypeA || question.Qtype == mDNS.TypeAAAA || question.Qtype == mDNS.TypeHTTPS {
  313. return true
  314. }
  315. }
  316. return false
  317. }
  318. func fqdnToDomain(fqdn string) string {
  319. if mDNS.IsFqdn(fqdn) {
  320. return fqdn[:len(fqdn)-1]
  321. }
  322. return fqdn
  323. }
  324. func formatQuestion(string string) string {
  325. if strings.HasPrefix(string, ";") {
  326. string = string[1:]
  327. }
  328. string = strings.ReplaceAll(string, "\t", " ")
  329. for strings.Contains(string, " ") {
  330. string = strings.ReplaceAll(string, " ", " ")
  331. }
  332. return string
  333. }