dns_server.c 191 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228
  1. /*************************************************************************
  2. *
  3. * Copyright (C) 2018-2023 Ruilin Peng (Nick) <[email protected]>.
  4. *
  5. * smartdns is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * smartdns is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #ifndef _GNU_SOURCE
  19. #define _GNU_SOURCE
  20. #endif
  21. #include "dns_server.h"
  22. #include "atomic.h"
  23. #include "dns.h"
  24. #include "dns_cache.h"
  25. #include "dns_client.h"
  26. #include "dns_conf.h"
  27. #include "fast_ping.h"
  28. #include "hashtable.h"
  29. #include "list.h"
  30. #include "nftset.h"
  31. #include "tlog.h"
  32. #include "util.h"
  33. #include <errno.h>
  34. #include <fcntl.h>
  35. #include <ifaddrs.h>
  36. #include <net/if.h>
  37. #include <netinet/ip.h>
  38. #include <netinet/tcp.h>
  39. #include <openssl/err.h>
  40. #include <openssl/evp.h>
  41. #include <openssl/pem.h>
  42. #include <openssl/rsa.h>
  43. #include <openssl/ssl.h>
  44. #include <openssl/x509.h>
  45. #include <pthread.h>
  46. #include <signal.h>
  47. #include <stdio.h>
  48. #include <stdlib.h>
  49. #include <string.h>
  50. #include <sys/epoll.h>
  51. #include <sys/eventfd.h>
  52. #include <sys/ioctl.h>
  53. #include <sys/socket.h>
  54. #include <sys/types.h>
  55. #include <sys/wait.h>
  56. #define DNS_MAX_EVENTS 256
  57. #define IPV6_READY_CHECK_TIME 180
  58. #define DNS_SERVER_TMOUT_TTL (5 * 60)
  59. #define DNS_SERVER_FAIL_TTL (60)
  60. #define DNS_SERVER_SOA_TTL (30)
  61. #define DNS_SERVER_ADDR_TTL (60)
  62. #define DNS_CONN_BUFF_SIZE 4096
  63. #define DNS_REQUEST_MAX_TIMEOUT 950
  64. #define DNS_PING_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT)
  65. #define DNS_PING_CHECK_INTERVAL (250)
  66. #define DNS_PING_SECOND_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT - DNS_PING_CHECK_INTERVAL)
  67. #define SOCKET_IP_TOS (IPTOS_LOWDELAY | IPTOS_RELIABILITY)
  68. #define SOCKET_PRIORITY (6)
  69. #define CACHE_AUTO_ENABLE_SIZE (1024 * 1024 * 128)
  70. #define EXPIRED_DOMAIN_PREFETCH_TIME (3600 * 8)
  71. #define DNS_MAX_DOMAIN_REFETCH_NUM 16
  72. #define RECV_ERROR_AGAIN 1
  73. #define RECV_ERROR_OK 0
  74. #define RECV_ERROR_FAIL (-1)
  75. #define RECV_ERROR_CLOSE (-2)
  76. #define RECV_ERROR_INVALID_PACKET (-3)
  77. typedef enum {
  78. DNS_CONN_TYPE_UDP_SERVER = 0,
  79. DNS_CONN_TYPE_TCP_SERVER,
  80. DNS_CONN_TYPE_TCP_CLIENT,
  81. DNS_CONN_TYPE_TLS_SERVER,
  82. DNS_CONN_TYPE_TLS_CLIENT,
  83. DNS_CONN_TYPE_HTTPS_SERVER,
  84. DNS_CONN_TYPE_HTTPS_CLIENT,
  85. } DNS_CONN_TYPE;
  86. typedef enum DNS_CHILD_POST_RESULT {
  87. DNS_CHILD_POST_SUCCESS = 0,
  88. DNS_CHILD_POST_FAIL,
  89. DNS_CHILD_POST_SKIP,
  90. DNS_CHILD_POST_NO_RESPONSE,
  91. } DNS_CHILD_POST_RESULT;
  92. struct rule_walk_args {
  93. void *args;
  94. unsigned char *key[DOMAIN_RULE_MAX];
  95. uint32_t key_len[DOMAIN_RULE_MAX];
  96. };
  97. struct dns_conn_buf {
  98. char buf[DNS_CONN_BUFF_SIZE];
  99. int buffsize;
  100. int size;
  101. };
  102. struct dns_server_conn_head {
  103. DNS_CONN_TYPE type;
  104. int fd;
  105. struct list_head list;
  106. time_t last_request_time;
  107. atomic_t refcnt;
  108. const char *dns_group;
  109. uint32_t server_flags;
  110. struct nftset_ipset_rules *ipset_nftset_rule;
  111. };
  112. struct dns_server_post_context {
  113. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  114. unsigned char *inpacket;
  115. int inpacket_maxlen;
  116. int inpacket_len;
  117. unsigned char packet_buff[DNS_PACKSIZE];
  118. unsigned int packet_maxlen;
  119. struct dns_request *request;
  120. struct dns_packet *packet;
  121. int ip_num;
  122. const unsigned char *ip_addr[MAX_IP_NUM];
  123. dns_type_t qtype;
  124. int do_cache;
  125. int do_reply;
  126. int do_ipset;
  127. int do_log_result;
  128. int reply_ttl;
  129. int cache_ttl;
  130. int no_check_add_ip;
  131. int do_audit;
  132. int do_force_soa;
  133. int skip_notify_count;
  134. int select_all_best_ip;
  135. int no_release_parent;
  136. };
  137. typedef enum dns_server_client_status {
  138. DNS_SERVER_CLIENT_STATUS_INIT = 0,
  139. DNS_SERVER_CLIENT_STATUS_CONNECTING,
  140. DNS_SERVER_CLIENT_STATUS_CONNECTIONLESS,
  141. DNS_SERVER_CLIENT_STATUS_CONNECTED,
  142. DNS_SERVER_CLIENT_STATUS_DISCONNECTED,
  143. } dns_server_client_status;
  144. struct dns_server_conn_udp {
  145. struct dns_server_conn_head head;
  146. socklen_t addr_len;
  147. struct sockaddr_storage addr;
  148. };
  149. struct dns_server_conn_tcp_server {
  150. struct dns_server_conn_head head;
  151. };
  152. struct dns_server_conn_tls_server {
  153. struct dns_server_conn_head head;
  154. SSL_CTX *ssl_ctx;
  155. };
  156. struct dns_server_conn_tcp_client {
  157. struct dns_server_conn_head head;
  158. struct dns_conn_buf recvbuff;
  159. struct dns_conn_buf sndbuff;
  160. socklen_t addr_len;
  161. struct sockaddr_storage addr;
  162. socklen_t localaddr_len;
  163. struct sockaddr_storage localaddr;
  164. dns_server_client_status status;
  165. };
  166. struct dns_server_conn_tls_client {
  167. struct dns_server_conn_head head;
  168. struct dns_conn_buf recvbuff;
  169. struct dns_conn_buf sndbuff;
  170. socklen_t addr_len;
  171. struct sockaddr_storage addr;
  172. socklen_t localaddr_len;
  173. struct sockaddr_storage localaddr;
  174. dns_server_client_status status;
  175. SSL *ssl;
  176. pthread_mutex_t ssl_lock;
  177. };
  178. /* ip address lists of domain */
  179. struct dns_ip_address {
  180. struct hlist_node node;
  181. int hitnum;
  182. unsigned long recv_tick;
  183. int ping_time;
  184. dns_type_t addr_type;
  185. char cname[DNS_MAX_CNAME_LEN];
  186. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  187. };
  188. struct dns_request_pending_list {
  189. pthread_mutex_t request_list_lock;
  190. unsigned short qtype;
  191. char domain[DNS_MAX_CNAME_LEN];
  192. uint32_t server_flags;
  193. char dns_group_name[DNS_GROUP_NAME_LEN];
  194. struct list_head request_list;
  195. struct hlist_node node;
  196. };
  197. struct dns_request_domain_rule {
  198. struct dns_rule *rules[DOMAIN_RULE_MAX];
  199. int is_sub_rule[DOMAIN_RULE_MAX];
  200. };
  201. typedef DNS_CHILD_POST_RESULT (*child_request_callback)(struct dns_request *request, struct dns_request *child_request,
  202. int is_first_resp);
  203. struct dns_request {
  204. atomic_t refcnt;
  205. struct dns_server_conn_head *conn;
  206. uint32_t server_flags;
  207. char dns_group_name[DNS_GROUP_NAME_LEN];
  208. /* dns request list */
  209. struct list_head list;
  210. struct list_head pending_list;
  211. /* dns request timeout check list */
  212. struct list_head check_list;
  213. /* dns query */
  214. char domain[DNS_MAX_CNAME_LEN];
  215. dns_type_t qtype;
  216. int qclass;
  217. unsigned long send_tick;
  218. unsigned short id;
  219. unsigned short rcode;
  220. unsigned short ss_family;
  221. char remote_server_fail;
  222. char skip_qtype_soa;
  223. socklen_t addr_len;
  224. union {
  225. struct sockaddr_in in;
  226. struct sockaddr_in6 in6;
  227. struct sockaddr addr;
  228. };
  229. struct sockaddr_storage localaddr;
  230. int has_ecs;
  231. struct dns_opt_ecs ecs;
  232. dns_result_callback result_callback;
  233. void *user_ptr;
  234. int has_ping_result;
  235. int has_ping_tcp;
  236. int has_ptr;
  237. char ptr_hostname[DNS_MAX_CNAME_LEN];
  238. int has_cname;
  239. char cname[DNS_MAX_CNAME_LEN];
  240. int ttl_cname;
  241. int has_ip;
  242. int ping_time;
  243. int ip_ttl;
  244. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  245. struct dns_soa soa;
  246. int has_soa;
  247. atomic_t notified;
  248. atomic_t do_callback;
  249. atomic_t adblock;
  250. atomic_t soa_num;
  251. /* send original raw packet to server/client like proxy */
  252. int passthrough;
  253. int request_wait;
  254. int prefetch;
  255. int prefetch_expired_domain;
  256. int dualstack_selection;
  257. int dualstack_selection_force_soa;
  258. int dualstack_selection_query;
  259. int dualstack_selection_ping_time;
  260. int dualstack_selection_has_ip;
  261. struct dns_request *dualstack_request;
  262. int no_serve_expired;
  263. pthread_mutex_t ip_map_lock;
  264. struct dns_request *child_request;
  265. struct dns_request *parent_request;
  266. child_request_callback child_callback;
  267. atomic_t ip_map_num;
  268. DECLARE_HASHTABLE(ip_map, 4);
  269. struct dns_request_domain_rule domain_rule;
  270. int skip_domain_rule;
  271. struct dns_domain_check_orders *check_order_list;
  272. int check_order;
  273. enum response_mode_type response_mode;
  274. struct dns_request_pending_list *request_pending_list;
  275. int no_select_possible_ip;
  276. int no_cache_cname;
  277. int no_cache;
  278. int has_cname_loop;
  279. };
  280. /* dns server data */
  281. struct dns_server {
  282. atomic_t run;
  283. int epoll_fd;
  284. int event_fd;
  285. struct list_head conn_list;
  286. pid_t cache_save_pid;
  287. time_t cache_save_time;
  288. /* dns request list */
  289. pthread_mutex_t request_list_lock;
  290. struct list_head request_list;
  291. DECLARE_HASHTABLE(request_pending, 4);
  292. pthread_mutex_t request_pending_lock;
  293. };
  294. static struct dns_server server;
  295. static tlog_log *dns_audit;
  296. static int is_ipv6_ready;
  297. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype, int expired_domain,
  298. struct dns_server_query_option *server_query_option);
  299. static int _dns_server_get_answer(struct dns_server_post_context *context);
  300. static void _dns_server_request_get(struct dns_request *request);
  301. static void _dns_server_request_release(struct dns_request *request);
  302. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete);
  303. static int _dns_server_request_complete(struct dns_request *request);
  304. static int _dns_server_reply_passthrough(struct dns_server_post_context *context);
  305. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event);
  306. static int _dns_request_post(struct dns_server_post_context *context);
  307. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context);
  308. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule);
  309. static const char *_dns_server_get_request_groupname(struct dns_request *request);
  310. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len);
  311. static int _dns_server_cache_save(int check_lock);
  312. int dns_is_ipv6_ready(void)
  313. {
  314. return is_ipv6_ready;
  315. }
  316. static void _dns_server_wakeup_thread(void)
  317. {
  318. uint64_t u = 1;
  319. int unused __attribute__((unused));
  320. unused = write(server.event_fd, &u, sizeof(u));
  321. }
  322. static int _dns_server_forward_request(unsigned char *inpacket, int inpacket_len)
  323. {
  324. return -1;
  325. }
  326. static int _dns_server_has_bind_flag(struct dns_request *request, uint32_t flag)
  327. {
  328. if (request->server_flags & flag) {
  329. return 0;
  330. }
  331. return -1;
  332. }
  333. static void *_dns_server_get_bind_ipset_nftset_rule(struct dns_request *request, enum domain_rule type)
  334. {
  335. if (request->conn == NULL) {
  336. return NULL;
  337. }
  338. if (request->conn->ipset_nftset_rule == NULL) {
  339. return NULL;
  340. }
  341. switch (type) {
  342. case DOMAIN_RULE_IPSET:
  343. return request->conn->ipset_nftset_rule->ipset;
  344. case DOMAIN_RULE_IPSET_IPV4:
  345. return request->conn->ipset_nftset_rule->ipset_ip;
  346. case DOMAIN_RULE_IPSET_IPV6:
  347. return request->conn->ipset_nftset_rule->ipset_ip6;
  348. case DOMAIN_RULE_NFTSET_IP:
  349. return request->conn->ipset_nftset_rule->nftset_ip;
  350. case DOMAIN_RULE_NFTSET_IP6:
  351. return request->conn->ipset_nftset_rule->nftset_ip6;
  352. default:
  353. break;
  354. }
  355. return NULL;
  356. }
  357. static int _dns_server_get_reply_ttl(struct dns_request *request, int ttl)
  358. {
  359. int reply_ttl = ttl;
  360. if ((request->passthrough == 0 || request->passthrough == 2) && dns_conf_cachesize > 0 &&
  361. request->check_order_list->orders[0].type != DOMAIN_CHECK_NONE) {
  362. reply_ttl = dns_conf_serve_expired_reply_ttl;
  363. if (reply_ttl < 2) {
  364. reply_ttl = 2;
  365. }
  366. }
  367. return reply_ttl;
  368. }
  369. static int _dns_server_get_conf_ttl(struct dns_request *request, int ttl)
  370. {
  371. int rr_ttl = dns_conf_rr_ttl;
  372. int rr_ttl_min = dns_conf_rr_ttl_min;
  373. int rr_ttl_max = dns_conf_rr_ttl_max;
  374. struct dns_ttl_rule *ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  375. if (ttl_rule != NULL) {
  376. if (ttl_rule->ttl > 0) {
  377. rr_ttl = ttl_rule->ttl;
  378. }
  379. /* make domain rule ttl high priority */
  380. if (ttl_rule->ttl_min > 0) {
  381. rr_ttl_min = ttl_rule->ttl_min;
  382. if (dns_conf_rr_ttl_max <= rr_ttl_min && dns_conf_rr_ttl_max > 0) {
  383. rr_ttl_max = rr_ttl_min;
  384. }
  385. }
  386. if (ttl_rule->ttl_max > 0) {
  387. rr_ttl_max = ttl_rule->ttl_max;
  388. if (dns_conf_rr_ttl_min >= rr_ttl_max && dns_conf_rr_ttl_min > 0 && ttl_rule->ttl_min <= 0) {
  389. rr_ttl_min = rr_ttl_max;
  390. }
  391. }
  392. }
  393. if (rr_ttl > 0) {
  394. return rr_ttl;
  395. }
  396. /* make rr_ttl_min first priority */
  397. if (rr_ttl_max < rr_ttl_min && rr_ttl_max > 0) {
  398. rr_ttl_max = rr_ttl_min;
  399. }
  400. if (rr_ttl_max > 0 && ttl >= rr_ttl_max) {
  401. ttl = rr_ttl_max;
  402. } else if (rr_ttl_min > 0 && ttl <= rr_ttl_min) {
  403. ttl = rr_ttl_min;
  404. }
  405. return ttl;
  406. }
  407. static int _dns_server_epoll_ctl(struct dns_server_conn_head *head, int op, uint32_t events)
  408. {
  409. struct epoll_event event;
  410. memset(&event, 0, sizeof(event));
  411. event.events = events;
  412. event.data.ptr = head;
  413. if (epoll_ctl(server.epoll_fd, op, head->fd, &event) != 0) {
  414. return -1;
  415. }
  416. return 0;
  417. }
  418. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule)
  419. {
  420. if (rule >= DOMAIN_RULE_MAX || request == NULL) {
  421. return NULL;
  422. }
  423. return request->domain_rule.rules[rule];
  424. }
  425. static int _dns_server_is_dns_rule_extract_match(struct dns_request *request, enum domain_rule rule)
  426. {
  427. if (rule >= DOMAIN_RULE_MAX || request == NULL) {
  428. return 0;
  429. }
  430. return request->domain_rule.is_sub_rule[rule] == 0;
  431. }
  432. static int _dns_server_is_dns64_request(struct dns_request *request)
  433. {
  434. if (request->qtype != DNS_T_AAAA) {
  435. return 0;
  436. }
  437. if (request->dualstack_selection_query == 1) {
  438. return 0;
  439. }
  440. if (dns_conf_dns_dns64.prefix_len <= 0) {
  441. return 0;
  442. }
  443. return 1;
  444. }
  445. static void _dns_server_set_dualstack_selection(struct dns_request *request)
  446. {
  447. struct dns_rule_flags *rule_flag = NULL;
  448. if (request->dualstack_selection_query || request->prefetch_expired_domain == 1 || is_ipv6_ready == 0) {
  449. request->dualstack_selection = 0;
  450. return;
  451. }
  452. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  453. if (rule_flag) {
  454. if (rule_flag->flags & DOMAIN_FLAG_DUALSTACK_SELECT) {
  455. request->dualstack_selection = 1;
  456. return;
  457. }
  458. if (rule_flag->is_flag_set & DOMAIN_FLAG_DUALSTACK_SELECT) {
  459. request->dualstack_selection = 0;
  460. return;
  461. }
  462. }
  463. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_DUALSTACK_SELECTION) == 0) {
  464. request->dualstack_selection = 0;
  465. return;
  466. }
  467. request->dualstack_selection = dns_conf_dualstack_ip_selection;
  468. }
  469. static int _dns_server_is_return_soa_qtype(struct dns_request *request, dns_type_t qtype)
  470. {
  471. struct dns_rule_flags *rule_flag = NULL;
  472. unsigned int flags = 0;
  473. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_SOA) == 0) {
  474. /* when both has no rule SOA and force AAAA soa, force AAAA soa has high priority */
  475. if (qtype == DNS_T_AAAA && _dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0) {
  476. return 1;
  477. }
  478. return 0;
  479. }
  480. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  481. if (rule_flag) {
  482. flags = rule_flag->flags;
  483. if (flags & DOMAIN_FLAG_ADDR_SOA) {
  484. return 1;
  485. }
  486. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  487. request->skip_qtype_soa = 1;
  488. return 0;
  489. }
  490. switch (qtype) {
  491. case DNS_T_A:
  492. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA) {
  493. return 1;
  494. }
  495. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  496. request->skip_qtype_soa = 1;
  497. return 0;
  498. }
  499. break;
  500. case DNS_T_AAAA:
  501. if (flags & DOMAIN_FLAG_ADDR_IPV6_SOA) {
  502. return 1;
  503. }
  504. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  505. request->skip_qtype_soa = 1;
  506. return 0;
  507. }
  508. break;
  509. default:
  510. break;
  511. }
  512. }
  513. if (qtype == DNS_T_AAAA) {
  514. if (_dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0 || dns_conf_force_AAAA_SOA == 1) {
  515. return 1;
  516. }
  517. }
  518. return 0;
  519. }
  520. static int _dns_server_is_return_soa(struct dns_request *request)
  521. {
  522. return _dns_server_is_return_soa_qtype(request, request->qtype);
  523. }
  524. static void _dns_server_post_context_init(struct dns_server_post_context *context, struct dns_request *request)
  525. {
  526. memset(context, 0, sizeof(*context));
  527. context->packet = (struct dns_packet *)(context->packet_buff);
  528. context->packet_maxlen = sizeof(context->packet_buff);
  529. context->inpacket = (unsigned char *)(context->inpacket_buff);
  530. context->inpacket_maxlen = sizeof(context->inpacket_buff);
  531. context->qtype = request->qtype;
  532. context->request = request;
  533. }
  534. static void _dns_server_post_context_init_from(struct dns_server_post_context *context, struct dns_request *request,
  535. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len)
  536. {
  537. memset(context, 0, sizeof(*context));
  538. context->packet = packet;
  539. context->packet_maxlen = sizeof(context->packet_buff);
  540. context->inpacket = inpacket;
  541. context->inpacket_len = inpacket_len;
  542. context->inpacket_maxlen = sizeof(context->inpacket);
  543. context->qtype = request->qtype;
  544. context->request = request;
  545. }
  546. static struct dns_ip_address *_dns_ip_address_get(struct dns_request *request, unsigned char *addr,
  547. dns_type_t addr_type)
  548. {
  549. uint32_t key = 0;
  550. struct dns_ip_address *addr_map = NULL;
  551. struct dns_ip_address *addr_tmp = NULL;
  552. int addr_len = 0;
  553. if (addr_type == DNS_T_A) {
  554. addr_len = DNS_RR_A_LEN;
  555. } else if (addr_type == DNS_T_AAAA) {
  556. addr_len = DNS_RR_AAAA_LEN;
  557. } else {
  558. return NULL;
  559. }
  560. /* store the ip address and the number of hits */
  561. key = jhash(addr, addr_len, 0);
  562. key = jhash(&addr_type, sizeof(addr_type), key);
  563. pthread_mutex_lock(&request->ip_map_lock);
  564. hash_for_each_possible(request->ip_map, addr_tmp, node, key)
  565. {
  566. if (addr_type != addr_tmp->addr_type) {
  567. continue;
  568. }
  569. if (memcmp(addr_tmp->ip_addr, addr, addr_len) != 0) {
  570. continue;
  571. }
  572. addr_map = addr_tmp;
  573. break;
  574. }
  575. pthread_mutex_unlock(&request->ip_map_lock);
  576. return addr_map;
  577. }
  578. static void _dns_server_audit_log(struct dns_server_post_context *context)
  579. {
  580. char req_host[MAX_IP_LEN];
  581. char req_result[1024] = {0};
  582. char *ip_msg = req_result;
  583. char req_time[MAX_IP_LEN];
  584. struct tlog_time tm;
  585. int i = 0;
  586. int j = 0;
  587. int rr_count = 0;
  588. struct dns_rrs *rrs = NULL;
  589. char name[DNS_MAX_CNAME_LEN] = {0};
  590. int ttl = 0;
  591. int len = 0;
  592. int left_len = sizeof(req_result);
  593. int total_len = 0;
  594. int ip_num = 0;
  595. struct dns_request *request = context->request;
  596. int has_soa = request->has_soa;
  597. if (dns_audit == NULL || !dns_conf_audit_enable || context->do_audit == 0) {
  598. return;
  599. }
  600. if (request->conn == NULL) {
  601. return;
  602. }
  603. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  604. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  605. for (i = 0; i < rr_count && rrs && left_len > 0; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  606. switch (rrs->type) {
  607. case DNS_T_A: {
  608. unsigned char ipv4_addr[4];
  609. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  610. continue;
  611. }
  612. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  613. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  614. continue;
  615. }
  616. const char *fmt = "%d.%d.%d.%d";
  617. if (ip_num > 0) {
  618. fmt = ", %d.%d.%d.%d";
  619. }
  620. len =
  621. snprintf(ip_msg + total_len, left_len, fmt, ipv4_addr[0], ipv4_addr[1], ipv4_addr[2], ipv4_addr[3]);
  622. ip_num++;
  623. has_soa = 0;
  624. } break;
  625. case DNS_T_AAAA: {
  626. unsigned char ipv6_addr[16];
  627. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  628. continue;
  629. }
  630. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  631. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  632. continue;
  633. }
  634. const char *fmt = "%s";
  635. if (ip_num > 0) {
  636. fmt = ", %s";
  637. }
  638. req_host[0] = '\0';
  639. inet_ntop(AF_INET6, ipv6_addr, req_host, sizeof(req_host));
  640. len = snprintf(ip_msg + total_len, left_len, fmt, req_host);
  641. ip_num++;
  642. has_soa = 0;
  643. } break;
  644. case DNS_T_SOA: {
  645. if (ip_num == 0) {
  646. has_soa = 1;
  647. }
  648. } break;
  649. default:
  650. continue;
  651. }
  652. if (len < 0 || len >= left_len) {
  653. left_len = 0;
  654. break;
  655. }
  656. left_len -= len;
  657. total_len += len;
  658. }
  659. }
  660. if (has_soa && ip_num == 0) {
  661. if (!dns_conf_audit_log_SOA) {
  662. return;
  663. }
  664. if (request->dualstack_selection_force_soa) {
  665. snprintf(req_result, left_len, "dualstack soa");
  666. } else {
  667. snprintf(req_result, left_len, "soa");
  668. }
  669. }
  670. get_host_by_addr(req_host, sizeof(req_host), &request->addr);
  671. tlog_localtime(&tm);
  672. if (req_host[0] == '\0') {
  673. safe_strncpy(req_host, "API", MAX_IP_LEN);
  674. }
  675. snprintf(req_time, sizeof(req_time), "[%.4d-%.2d-%.2d %.2d:%.2d:%.2d,%.3d]", tm.year, tm.mon, tm.mday, tm.hour,
  676. tm.min, tm.sec, tm.usec / 1000);
  677. tlog_printf(dns_audit, "%s %s query %s, type %d, time %lums, speed: %.1fms, result %s\n", req_time, req_host,
  678. request->domain, request->qtype, get_tick_count() - request->send_tick,
  679. ((float)request->ping_time) / 10, req_result);
  680. }
  681. static void _dns_rrs_result_log(struct dns_server_post_context *context, struct dns_ip_address *addr_map)
  682. {
  683. struct dns_request *request = context->request;
  684. if (context->do_log_result == 0 || addr_map == NULL) {
  685. return;
  686. }
  687. if (addr_map->addr_type == DNS_T_A) {
  688. tlog(TLOG_INFO, "result: %s, id: %d, index: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->id,
  689. context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0], addr_map->ip_addr[1],
  690. addr_map->ip_addr[2], addr_map->ip_addr[3]);
  691. } else if (addr_map->addr_type == DNS_T_AAAA) {
  692. tlog(TLOG_INFO,
  693. "result: %s, id: %d, index: %d, rtt: %.1f ms, "
  694. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  695. request->domain, request->id, context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0],
  696. addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3], addr_map->ip_addr[4],
  697. addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7], addr_map->ip_addr[8],
  698. addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11], addr_map->ip_addr[12],
  699. addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  700. }
  701. }
  702. static int _dns_rrs_add_all_best_ip(struct dns_server_post_context *context)
  703. {
  704. struct dns_ip_address *addr_map = NULL;
  705. struct dns_ip_address *added_ip_addr = NULL;
  706. struct hlist_node *tmp = NULL;
  707. struct dns_request *request = context->request;
  708. unsigned long bucket = 0;
  709. char *domain = NULL;
  710. int ret = 0;
  711. int ignore_speed = 0;
  712. int maxhit = 0;
  713. if (context->select_all_best_ip == 0 || context->ip_num >= dns_conf_max_reply_ip_num) {
  714. return 0;
  715. }
  716. domain = request->domain;
  717. /* add CNAME record */
  718. if (request->has_cname) {
  719. domain = request->cname;
  720. }
  721. /* add fasted ip address at first place of dns RR */
  722. if (request->has_ip) {
  723. added_ip_addr = _dns_ip_address_get(request, request->ip_addr, request->qtype);
  724. _dns_rrs_result_log(context, added_ip_addr);
  725. }
  726. if (request->passthrough == 2) {
  727. ignore_speed = 1;
  728. }
  729. while (true) {
  730. pthread_mutex_lock(&request->ip_map_lock);
  731. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  732. {
  733. if (context->ip_num >= dns_conf_max_reply_ip_num) {
  734. break;
  735. }
  736. if (context->qtype != addr_map->addr_type) {
  737. continue;
  738. }
  739. if (addr_map == added_ip_addr) {
  740. continue;
  741. }
  742. if (addr_map->hitnum > maxhit) {
  743. maxhit = addr_map->hitnum;
  744. }
  745. if (addr_map->ping_time < 0 && ignore_speed == 0) {
  746. continue;
  747. }
  748. if (addr_map->hitnum < maxhit && ignore_speed == 1) {
  749. continue;
  750. }
  751. /* if ping time is larger than 5ms, check again. */
  752. if (addr_map->ping_time - request->ping_time >= 50) {
  753. int ttl_range = request->ping_time + request->ping_time / 10 + 5;
  754. if ((ttl_range < addr_map->ping_time) && addr_map->ping_time >= 100 && ignore_speed == 0) {
  755. continue;
  756. }
  757. }
  758. context->ip_addr[context->ip_num] = addr_map->ip_addr;
  759. context->ip_num++;
  760. if (addr_map->addr_type == DNS_T_A) {
  761. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  762. } else if (addr_map->addr_type == DNS_T_AAAA) {
  763. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  764. }
  765. _dns_rrs_result_log(context, addr_map);
  766. }
  767. pthread_mutex_unlock(&request->ip_map_lock);
  768. if (context->ip_num <= 0 && ignore_speed == 0) {
  769. ignore_speed = 1;
  770. } else {
  771. break;
  772. }
  773. }
  774. return ret;
  775. }
  776. static void _dns_server_setup_soa(struct dns_request *request)
  777. {
  778. struct dns_soa *soa = NULL;
  779. soa = &request->soa;
  780. safe_strncpy(soa->mname, "a.gtld-servers.net", DNS_MAX_CNAME_LEN);
  781. safe_strncpy(soa->rname, "nstld.verisign-grs.com", DNS_MAX_CNAME_LEN);
  782. soa->serial = 1800;
  783. soa->refresh = 1800;
  784. soa->retry = 900;
  785. soa->expire = 604800;
  786. soa->minimum = 86400;
  787. }
  788. static int _dns_add_rrs(struct dns_server_post_context *context)
  789. {
  790. struct dns_request *request = context->request;
  791. int ret = 0;
  792. int has_soa = request->has_soa;
  793. char *domain = request->domain;
  794. if (request->has_ptr) {
  795. /* add PTR record */
  796. ret = dns_add_PTR(context->packet, DNS_RRS_AN, request->domain, 30, request->ptr_hostname);
  797. }
  798. /* add CNAME record */
  799. if (request->has_cname && context->do_force_soa == 0) {
  800. ret |= dns_add_CNAME(context->packet, DNS_RRS_AN, request->domain, request->ttl_cname, request->cname);
  801. domain = request->cname;
  802. }
  803. /* add A record */
  804. if (request->has_ip && context->do_force_soa == 0) {
  805. context->ip_addr[0] = request->ip_addr;
  806. context->ip_num++;
  807. if (context->qtype == DNS_T_A) {
  808. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  809. tlog(TLOG_DEBUG, "result: %s, rtt: %.1f ms, %d.%d.%d.%d", request->domain, ((float)request->ping_time) / 10,
  810. request->ip_addr[0], request->ip_addr[1], request->ip_addr[2], request->ip_addr[3]);
  811. }
  812. /* add AAAA record */
  813. if (context->qtype == DNS_T_AAAA) {
  814. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  815. tlog(TLOG_DEBUG,
  816. "result: %s, rtt: %.1f ms, "
  817. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  818. request->domain, ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1],
  819. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5],
  820. request->ip_addr[6], request->ip_addr[7], request->ip_addr[8], request->ip_addr[9],
  821. request->ip_addr[10], request->ip_addr[11], request->ip_addr[12], request->ip_addr[13],
  822. request->ip_addr[14], request->ip_addr[15]);
  823. }
  824. }
  825. if (context->do_force_soa == 0) {
  826. ret |= _dns_rrs_add_all_best_ip(context);
  827. }
  828. if (context->qtype == DNS_T_A || context->qtype == DNS_T_AAAA) {
  829. if (context->ip_num > 0) {
  830. has_soa = 0;
  831. }
  832. }
  833. /* add SOA record */
  834. if (has_soa) {
  835. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  836. tlog(TLOG_DEBUG, "result: %s, qtype: %d, return SOA", request->domain, context->qtype);
  837. } else if (context->do_force_soa == 1) {
  838. _dns_server_setup_soa(request);
  839. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  840. }
  841. if (request->has_ecs) {
  842. ret |= dns_add_OPT_ECS(context->packet, &request->ecs);
  843. }
  844. if (request->rcode != DNS_RC_NOERROR) {
  845. tlog(TLOG_INFO, "result: %s, qtype: %d, rtcode: %d", domain, context->qtype, request->rcode);
  846. }
  847. return ret;
  848. }
  849. static int _dns_setup_dns_packet(struct dns_server_post_context *context)
  850. {
  851. struct dns_head head;
  852. struct dns_request *request = context->request;
  853. int ret = 0;
  854. memset(&head, 0, sizeof(head));
  855. head.id = request->id;
  856. head.qr = DNS_QR_ANSWER;
  857. head.opcode = DNS_OP_QUERY;
  858. head.rd = 1;
  859. head.ra = 1;
  860. head.aa = 0;
  861. head.tc = 0;
  862. head.rcode = request->rcode;
  863. /* init a new DNS packet */
  864. ret = dns_packet_init(context->packet, context->packet_maxlen, &head);
  865. if (ret != 0) {
  866. return -1;
  867. }
  868. /* add request domain */
  869. ret = dns_add_domain(context->packet, request->domain, context->qtype, request->qclass);
  870. if (ret != 0) {
  871. return -1;
  872. }
  873. /* add RECORDs */
  874. ret = _dns_add_rrs(context);
  875. if (ret != 0) {
  876. return -1;
  877. }
  878. return 0;
  879. }
  880. static int _dns_setup_dns_raw_packet(struct dns_server_post_context *context)
  881. {
  882. /* encode to binary data */
  883. int encode_len = dns_encode(context->inpacket, context->inpacket_maxlen, context->packet);
  884. if (encode_len <= 0) {
  885. tlog(TLOG_DEBUG, "encode raw packet failed for %s", context->request->domain);
  886. return -1;
  887. }
  888. context->inpacket_len = encode_len;
  889. return 0;
  890. }
  891. static void _dns_server_conn_release(struct dns_server_conn_head *conn)
  892. {
  893. if (conn == NULL) {
  894. return;
  895. }
  896. int refcnt = atomic_dec_return(&conn->refcnt);
  897. if (refcnt) {
  898. if (refcnt < 0) {
  899. BUG("BUG: refcnt is %d, type = %d", refcnt, conn->type);
  900. }
  901. return;
  902. }
  903. if (conn->fd > 0) {
  904. close(conn->fd);
  905. conn->fd = -1;
  906. }
  907. if (conn->type == DNS_CONN_TYPE_TLS_CLIENT || conn->type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  908. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  909. if (tls_client->ssl != NULL) {
  910. SSL_free(tls_client->ssl);
  911. tls_client->ssl = NULL;
  912. }
  913. pthread_mutex_destroy(&tls_client->ssl_lock);
  914. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER) {
  915. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  916. if (tls_server->ssl_ctx != NULL) {
  917. SSL_CTX_free(tls_server->ssl_ctx);
  918. tls_server->ssl_ctx = NULL;
  919. }
  920. }
  921. list_del_init(&conn->list);
  922. free(conn);
  923. }
  924. static void _dns_server_conn_get(struct dns_server_conn_head *conn)
  925. {
  926. if (conn == NULL) {
  927. return;
  928. }
  929. if (atomic_inc_return(&conn->refcnt) <= 0) {
  930. BUG("BUG: client ref is invalid.");
  931. }
  932. }
  933. static int _dns_server_reply_tcp_to_buffer(struct dns_server_conn_tcp_client *tcpclient, void *packet, int len)
  934. {
  935. if ((int)sizeof(tcpclient->sndbuff.buf) - tcpclient->sndbuff.size < len) {
  936. return -1;
  937. }
  938. memcpy(tcpclient->sndbuff.buf + tcpclient->sndbuff.size, packet, len);
  939. tcpclient->sndbuff.size += len;
  940. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN | EPOLLOUT) != 0) {
  941. tlog(TLOG_ERROR, "epoll ctl failed.");
  942. return -1;
  943. }
  944. return 0;
  945. }
  946. static int _dns_server_reply_tcp(struct dns_request *request, struct dns_server_conn_tcp_client *tcpclient,
  947. void *packet, unsigned short len)
  948. {
  949. int send_len = 0;
  950. unsigned char inpacket_data[DNS_IN_PACKSIZE];
  951. unsigned char *inpacket = inpacket_data;
  952. if (len > sizeof(inpacket_data) - 2) {
  953. tlog(TLOG_ERROR, "packet size is invalid.");
  954. return -1;
  955. }
  956. /* TCP query format
  957. * | len (short) | dns query data |
  958. */
  959. *((unsigned short *)(inpacket)) = htons(len);
  960. memcpy(inpacket + 2, packet, len);
  961. len += 2;
  962. send_len = _dns_server_tcp_socket_send(tcpclient, inpacket, len);
  963. if (send_len < 0) {
  964. if (errno == EAGAIN) {
  965. /* save data to buffer, and retry when EPOLLOUT is available */
  966. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket, len);
  967. }
  968. return -1;
  969. } else if (send_len < len) {
  970. /* save remain data to buffer, and retry when EPOLLOUT is available */
  971. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket + send_len, len - send_len);
  972. }
  973. return 0;
  974. }
  975. static int _dns_server_reply_udp(struct dns_request *request, struct dns_server_conn_udp *udpserver,
  976. unsigned char *inpacket, int inpacket_len)
  977. {
  978. int send_len = 0;
  979. struct iovec iovec[1];
  980. struct msghdr msg;
  981. struct cmsghdr *cmsg;
  982. char msg_control[64];
  983. if (atomic_read(&server.run) == 0 || inpacket == NULL || inpacket_len <= 0) {
  984. return -1;
  985. }
  986. iovec[0].iov_base = inpacket;
  987. iovec[0].iov_len = inpacket_len;
  988. memset(msg_control, 0, sizeof(msg_control));
  989. msg.msg_iov = iovec;
  990. msg.msg_iovlen = 1;
  991. msg.msg_control = msg_control;
  992. msg.msg_controllen = sizeof(msg_control);
  993. msg.msg_flags = 0;
  994. msg.msg_name = &request->addr;
  995. msg.msg_namelen = request->addr_len;
  996. cmsg = CMSG_FIRSTHDR(&msg);
  997. if (request->localaddr.ss_family == AF_INET) {
  998. struct sockaddr_in *s4 = (struct sockaddr_in *)&request->localaddr;
  999. cmsg->cmsg_level = SOL_IP;
  1000. cmsg->cmsg_type = IP_PKTINFO;
  1001. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
  1002. msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo));
  1003. struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  1004. memset(pktinfo, 0, sizeof(*pktinfo));
  1005. pktinfo->ipi_spec_dst = s4->sin_addr;
  1006. } else if (request->localaddr.ss_family == AF_INET6) {
  1007. struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&request->localaddr;
  1008. cmsg->cmsg_level = IPPROTO_IPV6;
  1009. cmsg->cmsg_type = IPV6_PKTINFO;
  1010. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
  1011. msg.msg_controllen = CMSG_SPACE(sizeof(struct in6_pktinfo));
  1012. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  1013. memset(pktinfo, 0, sizeof(*pktinfo));
  1014. pktinfo->ipi6_addr = s6->sin6_addr;
  1015. } else {
  1016. goto use_send;
  1017. }
  1018. send_len = sendmsg(udpserver->head.fd, &msg, 0);
  1019. if (send_len == inpacket_len) {
  1020. return 0;
  1021. }
  1022. use_send:
  1023. send_len = sendto(udpserver->head.fd, inpacket, inpacket_len, 0, &request->addr, request->addr_len);
  1024. if (send_len != inpacket_len) {
  1025. tlog(TLOG_DEBUG, "send failed, %s", strerror(errno));
  1026. return -1;
  1027. }
  1028. return 0;
  1029. }
  1030. static int _dns_reply_inpacket(struct dns_request *request, unsigned char *inpacket, int inpacket_len)
  1031. {
  1032. struct dns_server_conn_head *conn = request->conn;
  1033. int ret = 0;
  1034. if (conn == NULL) {
  1035. tlog(TLOG_ERROR, "client is invalid, domain: %s", request->domain);
  1036. return -1;
  1037. }
  1038. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  1039. ret = _dns_server_reply_udp(request, (struct dns_server_conn_udp *)conn, inpacket, inpacket_len);
  1040. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  1041. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1042. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT) {
  1043. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1044. } else {
  1045. ret = -1;
  1046. }
  1047. return ret;
  1048. }
  1049. static int _dns_server_request_update_cache(struct dns_request *request, dns_type_t qtype,
  1050. struct dns_cache_data *cache_data, int has_soa, int cache_ttl)
  1051. {
  1052. int ttl = 0;
  1053. int speed = 0;
  1054. if (qtype != DNS_T_A && qtype != DNS_T_AAAA) {
  1055. goto errout;
  1056. }
  1057. if (cache_ttl > 0) {
  1058. ttl = cache_ttl;
  1059. } else {
  1060. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1061. }
  1062. speed = request->ping_time;
  1063. if (has_soa) {
  1064. if (request->dualstack_selection && request->has_ip && request->qtype == DNS_T_AAAA) {
  1065. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1066. } else {
  1067. ttl = dns_conf_rr_ttl;
  1068. if (ttl == 0) {
  1069. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1070. }
  1071. }
  1072. dns_cache_set_data_soa(cache_data, request->cname, request->ttl_cname);
  1073. }
  1074. tlog(TLOG_DEBUG, "cache %s qtype: %d ttl: %d\n", request->domain, qtype, ttl);
  1075. /* if doing prefetch, update cache only */
  1076. struct dns_cache_key cache_key;
  1077. cache_key.dns_group_name = request->dns_group_name;
  1078. cache_key.domain = request->domain;
  1079. cache_key.qtype = request->qtype;
  1080. cache_key.query_flag = request->server_flags;
  1081. if (request->prefetch) {
  1082. if (request->prefetch_expired_domain == 0) {
  1083. if (dns_cache_replace(&cache_key, ttl, speed, request->no_serve_expired, cache_data) != 0) {
  1084. goto errout;
  1085. }
  1086. } else {
  1087. if (dns_cache_replace_inactive(&cache_key, ttl, speed, request->no_serve_expired, cache_data) != 0) {
  1088. goto errout;
  1089. }
  1090. }
  1091. } else {
  1092. /* insert result to cache */
  1093. if (dns_cache_insert(&cache_key, ttl, speed, request->no_serve_expired, cache_data) != 0) {
  1094. goto errout;
  1095. }
  1096. }
  1097. return 0;
  1098. errout:
  1099. if (cache_data) {
  1100. dns_cache_data_free(cache_data);
  1101. }
  1102. return -1;
  1103. }
  1104. static int _dns_cache_cname_packet(struct dns_server_post_context *context)
  1105. {
  1106. struct dns_packet *packet = context->packet;
  1107. struct dns_packet *cname_packet = NULL;
  1108. int ret = 0;
  1109. int i = 0;
  1110. int j = 0;
  1111. int rr_count = 0;
  1112. int ttl = 0;
  1113. int speed = 0;
  1114. unsigned char packet_buff[DNS_PACKSIZE];
  1115. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  1116. int inpacket_len = 0;
  1117. struct dns_cache_data *cache_packet = NULL;
  1118. struct dns_rrs *rrs = NULL;
  1119. char name[DNS_MAX_CNAME_LEN] = {0};
  1120. cname_packet = (struct dns_packet *)packet_buff;
  1121. int has_result = 0;
  1122. struct dns_request *request = context->request;
  1123. if (request->has_cname == 0 || request->no_cache_cname == 1 || request->no_cache == 1) {
  1124. return 0;
  1125. }
  1126. /* init a new DNS packet */
  1127. ret = dns_packet_init(cname_packet, DNS_PACKSIZE, &packet->head);
  1128. if (ret != 0) {
  1129. return -1;
  1130. }
  1131. /* add request domain */
  1132. ret = dns_add_domain(cname_packet, request->cname, context->qtype, DNS_C_IN);
  1133. if (ret != 0) {
  1134. return -1;
  1135. }
  1136. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  1137. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1138. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1139. switch (rrs->type) {
  1140. case DNS_T_A: {
  1141. unsigned char ipv4_addr[4];
  1142. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  1143. continue;
  1144. }
  1145. if (strncmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1146. continue;
  1147. }
  1148. ret = dns_add_A(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv4_addr);
  1149. if (ret != 0) {
  1150. return -1;
  1151. }
  1152. has_result = 1;
  1153. } break;
  1154. case DNS_T_AAAA: {
  1155. unsigned char ipv6_addr[16];
  1156. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  1157. continue;
  1158. }
  1159. if (strncmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1160. continue;
  1161. }
  1162. ret = dns_add_AAAA(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv6_addr);
  1163. if (ret != 0) {
  1164. return -1;
  1165. }
  1166. has_result = 1;
  1167. } break;
  1168. case DNS_T_SOA: {
  1169. struct dns_soa soa;
  1170. if (dns_get_SOA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, &soa) != 0) {
  1171. continue;
  1172. }
  1173. ret = dns_add_SOA(cname_packet, DNS_RRS_AN, request->cname, ttl, &soa);
  1174. if (ret != 0) {
  1175. return -1;
  1176. }
  1177. has_result = 1;
  1178. break;
  1179. }
  1180. default:
  1181. continue;
  1182. }
  1183. }
  1184. }
  1185. if (has_result == 0) {
  1186. return 0;
  1187. }
  1188. inpacket_len = dns_encode(inpacket_buff, DNS_IN_PACKSIZE, cname_packet);
  1189. if (inpacket_len <= 0) {
  1190. return -1;
  1191. }
  1192. cache_packet = dns_cache_new_data_packet(inpacket_buff, inpacket_len);
  1193. if (cache_packet == NULL) {
  1194. return -1;
  1195. }
  1196. if (context->qtype != DNS_T_A && context->qtype != DNS_T_AAAA) {
  1197. return -1;
  1198. }
  1199. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1200. speed = request->ping_time;
  1201. tlog(TLOG_DEBUG, "Cache CNAME: %s, qtype: %d, speed: %d", request->cname, request->qtype, speed);
  1202. /* if doing prefetch, update cache only */
  1203. struct dns_cache_key cache_key;
  1204. cache_key.dns_group_name = request->dns_group_name;
  1205. cache_key.domain = request->cname;
  1206. cache_key.qtype = context->qtype;
  1207. cache_key.query_flag = request->server_flags;
  1208. if (request->prefetch) {
  1209. if (request->prefetch_expired_domain == 0) {
  1210. if (dns_cache_replace(&cache_key, ttl, speed, request->no_serve_expired, cache_packet) != 0) {
  1211. goto errout;
  1212. }
  1213. } else {
  1214. if (dns_cache_replace_inactive(&cache_key, ttl, speed, request->no_serve_expired, cache_packet) != 0) {
  1215. goto errout;
  1216. }
  1217. }
  1218. } else {
  1219. /* insert result to cache */
  1220. if (dns_cache_insert(&cache_key, ttl, speed, request->no_serve_expired, cache_packet) != 0) {
  1221. goto errout;
  1222. }
  1223. }
  1224. return 0;
  1225. errout:
  1226. if (cache_packet) {
  1227. dns_cache_data_free(cache_packet);
  1228. }
  1229. return -1;
  1230. }
  1231. static int _dns_cache_packet(struct dns_server_post_context *context)
  1232. {
  1233. struct dns_request *request = context->request;
  1234. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1235. if (cache_packet == NULL) {
  1236. return -1;
  1237. }
  1238. /* if doing prefetch, update cache only */
  1239. struct dns_cache_key cache_key;
  1240. cache_key.dns_group_name = request->dns_group_name;
  1241. cache_key.domain = request->domain;
  1242. cache_key.qtype = context->qtype;
  1243. cache_key.query_flag = request->server_flags;
  1244. if (request->prefetch) {
  1245. if (dns_cache_replace(&cache_key, context->reply_ttl, -1, request->no_serve_expired, cache_packet) != 0) {
  1246. goto errout;
  1247. }
  1248. } else {
  1249. /* insert result to cache */
  1250. if (dns_cache_insert(&cache_key, context->reply_ttl, -1, request->no_serve_expired, cache_packet) != 0) {
  1251. goto errout;
  1252. }
  1253. }
  1254. return 0;
  1255. errout:
  1256. if (cache_packet) {
  1257. dns_cache_data_free(cache_packet);
  1258. }
  1259. return -1;
  1260. }
  1261. static int _dns_result_callback(struct dns_server_post_context *context)
  1262. {
  1263. struct dns_result result;
  1264. char ip[DNS_MAX_CNAME_LEN];
  1265. unsigned int ping_time = -1;
  1266. struct dns_request *request = context->request;
  1267. if (request->result_callback == NULL) {
  1268. return 0;
  1269. }
  1270. if (atomic_inc_return(&request->do_callback) != 1) {
  1271. return 0;
  1272. }
  1273. ip[0] = 0;
  1274. memset(&result, 0, sizeof(result));
  1275. ping_time = request->ping_time;
  1276. result.domain = request->domain;
  1277. result.rtcode = request->rcode;
  1278. result.addr_type = request->qtype;
  1279. result.ip = ip;
  1280. result.has_soa = request->has_soa | context->do_force_soa;
  1281. result.ping_time = ping_time;
  1282. result.ip_num = 0;
  1283. if (request->has_ip != 0 && context->do_force_soa == 0) {
  1284. for (int i = 0; i < context->ip_num && i < MAX_IP_NUM; i++) {
  1285. result.ip_addr[i] = context->ip_addr[i];
  1286. result.ip_num++;
  1287. }
  1288. if (request->qtype == DNS_T_A) {
  1289. sprintf(ip, "%d.%d.%d.%d", request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1290. request->ip_addr[3]);
  1291. } else if (request->qtype == DNS_T_AAAA) {
  1292. sprintf(ip, "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x", request->ip_addr[0],
  1293. request->ip_addr[1], request->ip_addr[2], request->ip_addr[3], request->ip_addr[4],
  1294. request->ip_addr[5], request->ip_addr[6], request->ip_addr[7], request->ip_addr[8],
  1295. request->ip_addr[9], request->ip_addr[10], request->ip_addr[11], request->ip_addr[12],
  1296. request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1297. }
  1298. }
  1299. return request->result_callback(&result, request->user_ptr);
  1300. }
  1301. static int _dns_cache_specify_packet(struct dns_server_post_context *context)
  1302. {
  1303. switch (context->qtype) {
  1304. case DNS_T_PTR:
  1305. case DNS_T_HTTPS:
  1306. case DNS_T_TXT:
  1307. case DNS_T_SRV:
  1308. break;
  1309. default:
  1310. return 0;
  1311. break;
  1312. }
  1313. return _dns_cache_packet(context);
  1314. }
  1315. static int _dns_cache_reply_packet(struct dns_server_post_context *context)
  1316. {
  1317. struct dns_request *request = context->request;
  1318. int has_soa = request->has_soa;
  1319. if (context->do_cache == 0 || request->no_cache == 1) {
  1320. return 0;
  1321. }
  1322. if (context->packet->head.rcode == DNS_RC_SERVFAIL || context->packet->head.rcode == DNS_RC_NXDOMAIN ||
  1323. context->packet->head.rcode == DNS_RC_NOTIMP) {
  1324. context->reply_ttl = DNS_SERVER_FAIL_TTL;
  1325. /* Do not cache record if cannot connect to remote */
  1326. if (request->remote_server_fail == 0 && context->packet->head.rcode == DNS_RC_SERVFAIL) {
  1327. return 0;
  1328. }
  1329. if (context->packet->head.rcode == DNS_RC_NOTIMP) {
  1330. return 0;
  1331. }
  1332. return _dns_cache_packet(context);
  1333. }
  1334. if (context->qtype != DNS_T_AAAA && context->qtype != DNS_T_A) {
  1335. return _dns_cache_specify_packet(context);
  1336. }
  1337. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1338. if (cache_packet == NULL) {
  1339. return -1;
  1340. }
  1341. if (context->ip_num > 0) {
  1342. has_soa = 0;
  1343. }
  1344. if (context->do_force_soa) {
  1345. has_soa = 0;
  1346. }
  1347. if (_dns_server_request_update_cache(request, context->qtype, cache_packet, has_soa, context->cache_ttl) != 0) {
  1348. tlog(TLOG_WARN, "update packet cache failed.");
  1349. }
  1350. _dns_cache_cname_packet(context);
  1351. return 0;
  1352. }
  1353. static int _dns_server_setup_ipset_nftset_packet(struct dns_server_post_context *context)
  1354. {
  1355. int ttl = 0;
  1356. struct dns_request *request = context->request;
  1357. char name[DNS_MAX_CNAME_LEN] = {0};
  1358. int rr_count = 0;
  1359. int timeout_value = 0;
  1360. int i = 0;
  1361. int j = 0;
  1362. struct dns_rrs *rrs = NULL;
  1363. struct dns_ipset_rule *rule = NULL;
  1364. struct dns_ipset_rule *ipset_rule = NULL;
  1365. struct dns_ipset_rule *ipset_rule_v4 = NULL;
  1366. struct dns_ipset_rule *ipset_rule_v6 = NULL;
  1367. struct dns_nftset_rule *nftset_ip = NULL;
  1368. struct dns_nftset_rule *nftset_ip6 = NULL;
  1369. struct dns_rule_flags *rule_flags = NULL;
  1370. int check_no_speed_rule = 0;
  1371. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_IPSET) == 0) {
  1372. return 0;
  1373. }
  1374. if (context->do_ipset == 0) {
  1375. return 0;
  1376. }
  1377. if (context->ip_num <= 0) {
  1378. return 0;
  1379. }
  1380. if (request->ping_time < 0 && request->has_ip > 0 && request->passthrough == 0) {
  1381. check_no_speed_rule = 1;
  1382. }
  1383. /* check ipset rule */
  1384. rule_flags = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  1385. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IGN) == 0) {
  1386. ipset_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET);
  1387. if (ipset_rule == NULL) {
  1388. ipset_rule = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET);
  1389. }
  1390. }
  1391. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV4_IGN) == 0) {
  1392. ipset_rule_v4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1393. if (ipset_rule_v4 == NULL) {
  1394. ipset_rule_v4 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1395. }
  1396. if (ipset_rule == NULL && check_no_speed_rule && dns_conf_ipset_no_speed.ipv4_enable) {
  1397. ipset_rule_v4 = &dns_conf_ipset_no_speed.ipv4;
  1398. }
  1399. }
  1400. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV6_IGN) == 0) {
  1401. ipset_rule_v6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1402. if (ipset_rule_v6 == NULL) {
  1403. ipset_rule_v6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1404. }
  1405. if (ipset_rule_v6 == NULL && check_no_speed_rule && dns_conf_ipset_no_speed.ipv6_enable) {
  1406. ipset_rule_v6 = &dns_conf_ipset_no_speed.ipv6;
  1407. }
  1408. }
  1409. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP_IGN) == 0) {
  1410. nftset_ip = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP);
  1411. if (nftset_ip == NULL) {
  1412. nftset_ip = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP);
  1413. }
  1414. if (nftset_ip == NULL && check_no_speed_rule && dns_conf_nftset_no_speed.ip_enable) {
  1415. nftset_ip = &dns_conf_nftset_no_speed.ip;
  1416. }
  1417. }
  1418. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP6_IGN) == 0) {
  1419. nftset_ip6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1420. if (nftset_ip6 == NULL) {
  1421. nftset_ip6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1422. }
  1423. if (nftset_ip6 == NULL && check_no_speed_rule && dns_conf_nftset_no_speed.ip6_enable) {
  1424. nftset_ip6 = &dns_conf_nftset_no_speed.ip6;
  1425. }
  1426. }
  1427. if (!(ipset_rule || ipset_rule_v4 || ipset_rule_v6 || nftset_ip || nftset_ip6)) {
  1428. return 0;
  1429. }
  1430. timeout_value = request->ip_ttl * 3;
  1431. if (timeout_value == 0) {
  1432. timeout_value = _dns_server_get_conf_ttl(request, 0) * 3;
  1433. }
  1434. for (j = 1; j < DNS_RRS_OPT; j++) {
  1435. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1436. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1437. switch (rrs->type) {
  1438. case DNS_T_A: {
  1439. unsigned char addr[4];
  1440. if (context->qtype != DNS_T_A) {
  1441. break;
  1442. }
  1443. /* get A result */
  1444. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1445. rule = ipset_rule_v4 ? ipset_rule_v4 : ipset_rule;
  1446. if (rule != NULL) {
  1447. /* add IPV4 to ipset */
  1448. tlog(TLOG_DEBUG, "IPSET-MATCH: domain: %s, ipset: %s, IP: %d.%d.%d.%d", request->domain,
  1449. rule->ipsetname, addr[0], addr[1], addr[2], addr[3]);
  1450. ipset_add(rule->ipsetname, addr, DNS_RR_A_LEN, timeout_value);
  1451. }
  1452. if (nftset_ip != NULL) {
  1453. /* add IPV4 to ipset */
  1454. tlog(TLOG_DEBUG, "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: %d.%d.%d.%d", request->domain,
  1455. nftset_ip->familyname, nftset_ip->nfttablename, nftset_ip->nftsetname, addr[0], addr[1],
  1456. addr[2], addr[3]);
  1457. nftset_add(nftset_ip->familyname, nftset_ip->nfttablename, nftset_ip->nftsetname, addr,
  1458. DNS_RR_A_LEN, timeout_value);
  1459. }
  1460. } break;
  1461. case DNS_T_AAAA: {
  1462. unsigned char addr[16];
  1463. if (context->qtype != DNS_T_AAAA) {
  1464. /* ignore non-matched query type */
  1465. break;
  1466. }
  1467. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1468. rule = ipset_rule_v6 ? ipset_rule_v6 : ipset_rule;
  1469. if (rule != NULL) {
  1470. tlog(TLOG_DEBUG,
  1471. "IPSET-MATCH: domain: %s, ipset: %s, IP: "
  1472. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1473. request->domain, rule->ipsetname, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5],
  1474. addr[6], addr[7], addr[8], addr[9], addr[10], addr[11], addr[12], addr[13], addr[14],
  1475. addr[15]);
  1476. ipset_add(rule->ipsetname, addr, DNS_RR_AAAA_LEN, timeout_value);
  1477. }
  1478. if (nftset_ip6 != NULL) {
  1479. /* add IPV6 to ipset */
  1480. tlog(TLOG_DEBUG,
  1481. "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: "
  1482. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1483. request->domain, nftset_ip6->familyname, nftset_ip6->nfttablename, nftset_ip6->nftsetname,
  1484. addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9],
  1485. addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  1486. nftset_add(nftset_ip6->familyname, nftset_ip6->nfttablename, nftset_ip6->nftsetname, addr,
  1487. DNS_RR_AAAA_LEN, timeout_value);
  1488. }
  1489. } break;
  1490. default:
  1491. break;
  1492. }
  1493. }
  1494. }
  1495. return 0;
  1496. }
  1497. static int _dns_result_child_post(struct dns_server_post_context *context)
  1498. {
  1499. struct dns_request *request = context->request;
  1500. struct dns_request *parent_request = request->parent_request;
  1501. DNS_CHILD_POST_RESULT child_ret = DNS_CHILD_POST_FAIL;
  1502. /* not a child request */
  1503. if (parent_request == NULL) {
  1504. return 0;
  1505. }
  1506. if (request->child_callback) {
  1507. int is_first_resp = context->no_release_parent;
  1508. child_ret = request->child_callback(parent_request, request, is_first_resp);
  1509. }
  1510. if (context->do_reply == 1 && child_ret == DNS_CHILD_POST_SUCCESS) {
  1511. struct dns_server_post_context parent_context;
  1512. _dns_server_post_context_init(&parent_context, parent_request);
  1513. parent_context.do_cache = context->do_cache;
  1514. parent_context.do_ipset = context->do_ipset;
  1515. parent_context.do_force_soa = context->do_force_soa;
  1516. parent_context.do_audit = context->do_audit;
  1517. parent_context.do_reply = context->do_reply;
  1518. parent_context.reply_ttl = context->reply_ttl;
  1519. parent_context.cache_ttl = context->cache_ttl;
  1520. parent_context.skip_notify_count = context->skip_notify_count;
  1521. parent_context.select_all_best_ip = 1;
  1522. parent_context.no_release_parent = context->no_release_parent;
  1523. _dns_request_post(&parent_context);
  1524. _dns_server_reply_all_pending_list(parent_request, &parent_context);
  1525. }
  1526. if (context->no_release_parent == 0) {
  1527. tlog(TLOG_DEBUG, "query %s with child %s done", parent_request->domain, request->domain);
  1528. request->parent_request = NULL;
  1529. parent_request->request_wait--;
  1530. _dns_server_request_release(parent_request);
  1531. }
  1532. if (child_ret == DNS_CHILD_POST_FAIL) {
  1533. return -1;
  1534. }
  1535. return 0;
  1536. }
  1537. static int _dns_request_update_id_ttl(struct dns_server_post_context *context)
  1538. {
  1539. int ttl = context->reply_ttl;
  1540. struct dns_request *request = context->request;
  1541. if (dns_conf_rr_ttl_reply_max > 0) {
  1542. if (request->ip_ttl > dns_conf_rr_ttl_reply_max && ttl == 0) {
  1543. ttl = request->ip_ttl;
  1544. }
  1545. if (ttl > dns_conf_rr_ttl_reply_max) {
  1546. ttl = dns_conf_rr_ttl_reply_max;
  1547. }
  1548. if (ttl == 0) {
  1549. ttl = dns_conf_rr_ttl_reply_max;
  1550. }
  1551. }
  1552. if (ttl == 0) {
  1553. ttl = request->ip_ttl;
  1554. if (ttl == 0) {
  1555. ttl = _dns_server_get_conf_ttl(request, ttl);
  1556. }
  1557. }
  1558. struct dns_update_param param;
  1559. param.id = request->id;
  1560. param.cname_ttl = ttl;
  1561. param.ip_ttl = ttl;
  1562. if (dns_packet_update(context->inpacket, context->inpacket_len, &param) != 0) {
  1563. tlog(TLOG_ERROR, "update packet info failed.");
  1564. return -1;
  1565. }
  1566. return 0;
  1567. }
  1568. static int _dns_request_post(struct dns_server_post_context *context)
  1569. {
  1570. struct dns_request *request = context->request;
  1571. char clientip[DNS_MAX_CNAME_LEN] = {0};
  1572. int ret = 0;
  1573. tlog(TLOG_DEBUG, "reply %s qtype: %d, rcode: %d, reply: %d", request->domain, request->qtype,
  1574. context->packet->head.rcode, context->do_reply);
  1575. /* init a new DNS packet */
  1576. ret = _dns_setup_dns_packet(context);
  1577. if (ret != 0) {
  1578. tlog(TLOG_ERROR, "setup dns packet failed.");
  1579. return -1;
  1580. }
  1581. ret = _dns_setup_dns_raw_packet(context);
  1582. if (ret != 0) {
  1583. tlog(TLOG_ERROR, "set dns raw packet failed.");
  1584. return -1;
  1585. }
  1586. /* cache reply packet */
  1587. ret = _dns_cache_reply_packet(context);
  1588. if (ret != 0) {
  1589. tlog(TLOG_WARN, "cache packet for %s failed.", request->domain);
  1590. }
  1591. /* setup ipset */
  1592. _dns_server_setup_ipset_nftset_packet(context);
  1593. /* reply child request */
  1594. _dns_result_child_post(context);
  1595. if (context->do_reply == 0) {
  1596. return 0;
  1597. }
  1598. if (context->skip_notify_count == 0) {
  1599. if (atomic_inc_return(&request->notified) != 1) {
  1600. tlog(TLOG_DEBUG, "skip reply %s %d", request->domain, request->qtype);
  1601. return 0;
  1602. }
  1603. }
  1604. /* log audit log */
  1605. _dns_server_audit_log(context);
  1606. /* reply API callback */
  1607. _dns_result_callback(context);
  1608. if (request->conn == NULL) {
  1609. return 0;
  1610. }
  1611. ret = _dns_request_update_id_ttl(context);
  1612. if (ret != 0) {
  1613. tlog(TLOG_ERROR, "update packet ttl failed.");
  1614. return -1;
  1615. }
  1616. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  1617. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype, request->id,
  1618. request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  1619. get_tick_count() - request->send_tick);
  1620. ret = _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  1621. if (ret != 0) {
  1622. tlog(TLOG_DEBUG, "reply raw packet to client failed.");
  1623. return -1;
  1624. }
  1625. return 0;
  1626. }
  1627. static int _dns_server_reply_SOA(int rcode, struct dns_request *request)
  1628. {
  1629. /* return SOA record */
  1630. request->rcode = rcode;
  1631. if (request->ip_ttl <= 0) {
  1632. request->ip_ttl = DNS_SERVER_SOA_TTL;
  1633. }
  1634. _dns_server_setup_soa(request);
  1635. struct dns_server_post_context context;
  1636. _dns_server_post_context_init(&context, request);
  1637. context.do_audit = 1;
  1638. context.do_reply = 1;
  1639. context.do_force_soa = 1;
  1640. _dns_request_post(&context);
  1641. return 0;
  1642. }
  1643. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context)
  1644. {
  1645. struct dns_request_pending_list *pending_list = NULL;
  1646. struct dns_request *req = NULL;
  1647. struct dns_request *tmp = NULL;
  1648. int ret = 0;
  1649. if (request->request_pending_list == NULL) {
  1650. return 0;
  1651. }
  1652. pthread_mutex_lock(&server.request_pending_lock);
  1653. pending_list = request->request_pending_list;
  1654. request->request_pending_list = NULL;
  1655. hlist_del_init(&pending_list->node);
  1656. pthread_mutex_unlock(&server.request_pending_lock);
  1657. pthread_mutex_lock(&pending_list->request_list_lock);
  1658. list_del_init(&request->pending_list);
  1659. list_for_each_entry_safe(req, tmp, &(pending_list->request_list), pending_list)
  1660. {
  1661. struct dns_server_post_context context_pending;
  1662. _dns_server_post_context_init_from(&context_pending, req, context->packet, context->inpacket,
  1663. context->inpacket_len);
  1664. req->dualstack_selection = request->dualstack_selection;
  1665. req->dualstack_selection_query = request->dualstack_selection_query;
  1666. req->dualstack_selection_force_soa = request->dualstack_selection_force_soa;
  1667. req->dualstack_selection_has_ip = request->dualstack_selection_has_ip;
  1668. req->dualstack_selection_ping_time = request->dualstack_selection_ping_time;
  1669. req->ping_time = request->ping_time;
  1670. _dns_server_get_answer(&context_pending);
  1671. context_pending.do_cache = 0;
  1672. context_pending.do_audit = context->do_audit;
  1673. context_pending.do_reply = context->do_reply;
  1674. context_pending.do_force_soa = context->do_force_soa;
  1675. context_pending.do_ipset = 0;
  1676. context_pending.reply_ttl = request->ip_ttl;
  1677. context_pending.no_release_parent = 0;
  1678. _dns_server_reply_passthrough(&context_pending);
  1679. req->request_pending_list = NULL;
  1680. list_del_init(&req->pending_list);
  1681. _dns_server_request_release_complete(req, 0);
  1682. }
  1683. pthread_mutex_unlock(&pending_list->request_list_lock);
  1684. free(pending_list);
  1685. return ret;
  1686. }
  1687. static void _dns_server_check_complete_dualstack(struct dns_request *request, struct dns_request *dualstack_request)
  1688. {
  1689. if (dualstack_request == NULL || request == NULL) {
  1690. return;
  1691. }
  1692. if (dualstack_request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  1693. return;
  1694. }
  1695. if (dualstack_request->ping_time > 0) {
  1696. return;
  1697. }
  1698. if (dualstack_request->dualstack_selection_query == 1) {
  1699. return;
  1700. }
  1701. if (request->ping_time <= (dns_conf_dualstack_ip_selection_threshold * 10)) {
  1702. return;
  1703. }
  1704. dualstack_request->dualstack_selection_has_ip = request->has_ip;
  1705. dualstack_request->dualstack_selection_ping_time = request->ping_time;
  1706. dualstack_request->dualstack_selection_force_soa = 1;
  1707. _dns_server_request_complete(dualstack_request);
  1708. }
  1709. static int _dns_server_force_dualstack(struct dns_request *request)
  1710. {
  1711. /* for dualstack request as first pending request, check if need to choose another request*/
  1712. if (request->dualstack_request) {
  1713. struct dns_request *dualstack_request = request->dualstack_request;
  1714. request->dualstack_selection_has_ip = dualstack_request->has_ip;
  1715. request->dualstack_selection_ping_time = dualstack_request->ping_time;
  1716. request->dualstack_selection = 1;
  1717. /* if another request still waiting for ping, force complete another request */
  1718. _dns_server_check_complete_dualstack(request, dualstack_request);
  1719. }
  1720. if (request->dualstack_selection_ping_time < 0 || request->dualstack_selection == 0) {
  1721. return -1;
  1722. }
  1723. if (request->has_soa || request->rcode != DNS_RC_NOERROR) {
  1724. return -1;
  1725. }
  1726. if (request->dualstack_selection_has_ip == 0) {
  1727. return -1;
  1728. }
  1729. if (request->ping_time > 0) {
  1730. if (request->dualstack_selection_ping_time + (dns_conf_dualstack_ip_selection_threshold * 10) >
  1731. request->ping_time) {
  1732. return -1;
  1733. }
  1734. }
  1735. if (request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  1736. return -1;
  1737. }
  1738. /* if ipv4 is fasting than ipv6, add ipv4 to cache, and return SOA for AAAA request */
  1739. tlog(TLOG_INFO, "result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d", request->domain,
  1740. request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id, request->ping_time,
  1741. request->dualstack_selection_ping_time);
  1742. request->dualstack_selection_force_soa = 1;
  1743. return 0;
  1744. }
  1745. static int _dns_server_request_complete_with_all_IPs(struct dns_request *request, int with_all_ips)
  1746. {
  1747. int ttl = 0;
  1748. struct dns_server_post_context context;
  1749. if (request->rcode == DNS_RC_SERVFAIL || request->rcode == DNS_RC_NXDOMAIN) {
  1750. ttl = DNS_SERVER_FAIL_TTL;
  1751. }
  1752. if (request->prefetch == 1) {
  1753. return 0;
  1754. }
  1755. if (atomic_inc_return(&request->notified) != 1) {
  1756. return 0;
  1757. }
  1758. if (request->has_ip != 0 && request->passthrough == 0) {
  1759. request->has_soa = 0;
  1760. if (request->has_ping_result == 0 && request->ip_ttl > DNS_SERVER_TMOUT_TTL) {
  1761. request->ip_ttl = DNS_SERVER_TMOUT_TTL;
  1762. }
  1763. ttl = request->ip_ttl;
  1764. }
  1765. if (_dns_server_force_dualstack(request) == 0) {
  1766. goto out;
  1767. }
  1768. if (request->has_soa) {
  1769. tlog(TLOG_INFO, "result: %s, qtype: %d, SOA", request->domain, request->qtype);
  1770. } else {
  1771. if (request->qtype == DNS_T_A) {
  1772. tlog(TLOG_INFO, "result: %s, qtype: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->qtype,
  1773. ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1774. request->ip_addr[3]);
  1775. } else if (request->qtype == DNS_T_AAAA) {
  1776. tlog(TLOG_INFO,
  1777. "result: %s, qtype: %d, rtt: %.1f ms, "
  1778. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1779. request->domain, request->qtype, ((float)request->ping_time) / 10, request->ip_addr[0],
  1780. request->ip_addr[1], request->ip_addr[2], request->ip_addr[3], request->ip_addr[4],
  1781. request->ip_addr[5], request->ip_addr[6], request->ip_addr[7], request->ip_addr[8],
  1782. request->ip_addr[9], request->ip_addr[10], request->ip_addr[11], request->ip_addr[12],
  1783. request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1784. }
  1785. }
  1786. out:
  1787. _dns_server_post_context_init(&context, request);
  1788. context.do_cache = 1;
  1789. context.do_ipset = 1;
  1790. context.do_force_soa = request->dualstack_selection_force_soa;
  1791. context.do_audit = 1;
  1792. context.do_reply = 1;
  1793. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  1794. context.skip_notify_count = 1;
  1795. context.select_all_best_ip = with_all_ips;
  1796. context.no_release_parent = 1;
  1797. _dns_request_post(&context);
  1798. return _dns_server_reply_all_pending_list(request, &context);
  1799. }
  1800. static int _dns_server_request_complete(struct dns_request *request)
  1801. {
  1802. return _dns_server_request_complete_with_all_IPs(request, 0);
  1803. }
  1804. static int _dns_ip_address_check_add(struct dns_request *request, char *cname, unsigned char *addr,
  1805. dns_type_t addr_type, int ping_time, struct dns_ip_address **out_addr_map)
  1806. {
  1807. uint32_t key = 0;
  1808. struct dns_ip_address *addr_map = NULL;
  1809. int addr_len = 0;
  1810. if (ping_time == 0) {
  1811. ping_time = -1;
  1812. }
  1813. if (addr_type == DNS_T_A) {
  1814. addr_len = DNS_RR_A_LEN;
  1815. } else if (addr_type == DNS_T_AAAA) {
  1816. addr_len = DNS_RR_AAAA_LEN;
  1817. } else {
  1818. return -1;
  1819. }
  1820. /* store the ip address and the number of hits */
  1821. key = jhash(addr, addr_len, 0);
  1822. key = jhash(&addr_type, sizeof(addr_type), key);
  1823. pthread_mutex_lock(&request->ip_map_lock);
  1824. hash_for_each_possible(request->ip_map, addr_map, node, key)
  1825. {
  1826. if (addr_map->addr_type != addr_type) {
  1827. continue;
  1828. }
  1829. if (memcmp(addr_map->ip_addr, addr, addr_len) != 0) {
  1830. continue;
  1831. }
  1832. addr_map->hitnum++;
  1833. addr_map->recv_tick = get_tick_count();
  1834. pthread_mutex_unlock(&request->ip_map_lock);
  1835. return -1;
  1836. }
  1837. atomic_inc(&request->ip_map_num);
  1838. addr_map = malloc(sizeof(*addr_map));
  1839. if (addr_map == NULL) {
  1840. pthread_mutex_unlock(&request->ip_map_lock);
  1841. tlog(TLOG_ERROR, "malloc addr map failed");
  1842. return -1;
  1843. }
  1844. memset(addr_map, 0, sizeof(*addr_map));
  1845. addr_map->addr_type = addr_type;
  1846. addr_map->hitnum = 1;
  1847. addr_map->recv_tick = get_tick_count();
  1848. addr_map->ping_time = ping_time;
  1849. memcpy(addr_map->ip_addr, addr, addr_len);
  1850. if (dns_conf_force_no_cname == 0) {
  1851. safe_strncpy(addr_map->cname, cname, DNS_MAX_CNAME_LEN);
  1852. }
  1853. hash_add(request->ip_map, &addr_map->node, key);
  1854. pthread_mutex_unlock(&request->ip_map_lock);
  1855. if (out_addr_map != NULL) {
  1856. *out_addr_map = addr_map;
  1857. }
  1858. return 0;
  1859. }
  1860. static void _dns_server_request_remove_all(void)
  1861. {
  1862. struct dns_request *request = NULL;
  1863. struct dns_request *tmp = NULL;
  1864. LIST_HEAD(remove_list);
  1865. pthread_mutex_lock(&server.request_list_lock);
  1866. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  1867. {
  1868. list_add_tail(&request->check_list, &remove_list);
  1869. _dns_server_request_get(request);
  1870. }
  1871. pthread_mutex_unlock(&server.request_list_lock);
  1872. list_for_each_entry_safe(request, tmp, &remove_list, check_list)
  1873. {
  1874. _dns_server_request_complete(request);
  1875. _dns_server_request_release(request);
  1876. }
  1877. }
  1878. static void _dns_server_select_possible_ipaddress(struct dns_request *request)
  1879. {
  1880. int maxhit = 0;
  1881. unsigned long bucket = 0;
  1882. unsigned long max_recv_tick = 0;
  1883. struct dns_ip_address *addr_map = NULL;
  1884. struct dns_ip_address *maxhit_addr_map = NULL;
  1885. struct dns_ip_address *last_recv_addr_map = NULL;
  1886. struct dns_ip_address *selected_addr_map = NULL;
  1887. struct hlist_node *tmp = NULL;
  1888. if (atomic_read(&request->notified) > 0) {
  1889. return;
  1890. }
  1891. if (request->no_select_possible_ip != 0) {
  1892. return;
  1893. }
  1894. if (request->ping_time > 0) {
  1895. return;
  1896. }
  1897. /* Return the most likely correct IP address */
  1898. /* Returns the IP with the most hits, or the last returned record is considered to be the most likely correct. */
  1899. pthread_mutex_lock(&request->ip_map_lock);
  1900. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  1901. {
  1902. if (addr_map->addr_type != request->qtype) {
  1903. continue;
  1904. }
  1905. if (addr_map->recv_tick - request->send_tick > max_recv_tick) {
  1906. max_recv_tick = addr_map->recv_tick - request->send_tick;
  1907. last_recv_addr_map = addr_map;
  1908. }
  1909. if (addr_map->hitnum > maxhit) {
  1910. maxhit = addr_map->hitnum;
  1911. maxhit_addr_map = addr_map;
  1912. }
  1913. }
  1914. pthread_mutex_unlock(&request->ip_map_lock);
  1915. if (maxhit_addr_map && maxhit > 1) {
  1916. selected_addr_map = maxhit_addr_map;
  1917. } else if (last_recv_addr_map) {
  1918. selected_addr_map = last_recv_addr_map;
  1919. }
  1920. if (selected_addr_map == NULL) {
  1921. return;
  1922. }
  1923. tlog(TLOG_DEBUG, "select best ip address, %s", request->domain);
  1924. switch (request->qtype) {
  1925. case DNS_T_A: {
  1926. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_A_LEN);
  1927. request->ip_ttl = dns_conf_rr_ttl_min > 0 ? dns_conf_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  1928. tlog(TLOG_DEBUG, "possible result: %s, rcode: %d, hitnum: %d, %d.%d.%d.%d", request->domain, request->rcode,
  1929. selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1930. request->ip_addr[3]);
  1931. } break;
  1932. case DNS_T_AAAA: {
  1933. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_AAAA_LEN);
  1934. request->ip_ttl = dns_conf_rr_ttl_min > 0 ? dns_conf_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  1935. tlog(TLOG_DEBUG,
  1936. "possible result: %s, rcode: %d, hitnum: %d, "
  1937. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1938. request->domain, request->rcode, selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1],
  1939. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5], request->ip_addr[6],
  1940. request->ip_addr[7], request->ip_addr[8], request->ip_addr[9], request->ip_addr[10], request->ip_addr[11],
  1941. request->ip_addr[12], request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1942. } break;
  1943. default:
  1944. break;
  1945. }
  1946. }
  1947. static void _dns_server_delete_request(struct dns_request *request)
  1948. {
  1949. if (atomic_read(&request->notified) == 0) {
  1950. _dns_server_request_complete(request);
  1951. }
  1952. if (request->conn) {
  1953. _dns_server_conn_release(request->conn);
  1954. }
  1955. pthread_mutex_destroy(&request->ip_map_lock);
  1956. memset(request, 0, sizeof(*request));
  1957. free(request);
  1958. }
  1959. static void _dns_server_complete_with_multi_ipaddress(struct dns_request *request)
  1960. {
  1961. struct dns_server_post_context context;
  1962. int do_reply = 0;
  1963. if (atomic_read(&request->ip_map_num) > 0) {
  1964. request->has_soa = 0;
  1965. }
  1966. if (atomic_inc_return(&request->notified) == 1) {
  1967. do_reply = 1;
  1968. _dns_server_force_dualstack(request);
  1969. }
  1970. if (request->passthrough && do_reply == 0) {
  1971. return;
  1972. }
  1973. _dns_server_post_context_init(&context, request);
  1974. context.do_cache = 1;
  1975. context.do_ipset = 1;
  1976. context.do_reply = do_reply;
  1977. context.do_log_result = 1;
  1978. context.select_all_best_ip = 1;
  1979. context.skip_notify_count = 1;
  1980. context.do_force_soa = request->dualstack_selection_force_soa;
  1981. _dns_request_post(&context);
  1982. _dns_server_reply_all_pending_list(request, &context);
  1983. }
  1984. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete)
  1985. {
  1986. struct dns_ip_address *addr_map = NULL;
  1987. struct hlist_node *tmp = NULL;
  1988. unsigned long bucket = 0;
  1989. pthread_mutex_lock(&server.request_list_lock);
  1990. int refcnt = atomic_dec_return(&request->refcnt);
  1991. if (refcnt) {
  1992. pthread_mutex_unlock(&server.request_list_lock);
  1993. if (refcnt < 0) {
  1994. BUG("BUG: refcnt is %d, domain %s, qtype %d", refcnt, request->domain, request->qtype);
  1995. }
  1996. return;
  1997. }
  1998. list_del_init(&request->list);
  1999. list_del_init(&request->check_list);
  2000. pthread_mutex_unlock(&server.request_list_lock);
  2001. pthread_mutex_lock(&server.request_pending_lock);
  2002. list_del_init(&request->pending_list);
  2003. pthread_mutex_unlock(&server.request_pending_lock);
  2004. if (do_complete) {
  2005. /* Select max hit ip address, and return to client */
  2006. _dns_server_select_possible_ipaddress(request);
  2007. _dns_server_complete_with_multi_ipaddress(request);
  2008. }
  2009. if (request->parent_request != NULL) {
  2010. _dns_server_request_release(request->parent_request);
  2011. request->parent_request = NULL;
  2012. }
  2013. pthread_mutex_lock(&request->ip_map_lock);
  2014. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  2015. {
  2016. hash_del(&addr_map->node);
  2017. free(addr_map);
  2018. }
  2019. pthread_mutex_unlock(&request->ip_map_lock);
  2020. _dns_server_delete_request(request);
  2021. }
  2022. static void _dns_server_request_release(struct dns_request *request)
  2023. {
  2024. _dns_server_request_release_complete(request, 1);
  2025. }
  2026. static void _dns_server_request_get(struct dns_request *request)
  2027. {
  2028. if (atomic_inc_return(&request->refcnt) <= 0) {
  2029. BUG("BUG: request ref is invalid, %s", request->domain);
  2030. }
  2031. }
  2032. static int _dns_server_set_to_pending_list(struct dns_request *request)
  2033. {
  2034. struct dns_request_pending_list *pending_list = NULL;
  2035. struct dns_request_pending_list *pending_list_tmp = NULL;
  2036. uint32_t key = 0;
  2037. int ret = -1;
  2038. if (request->qtype != DNS_T_A && request->qtype != DNS_T_AAAA) {
  2039. return ret;
  2040. }
  2041. key = hash_string(request->domain);
  2042. key = hash_string_initval(request->dns_group_name, key);
  2043. key = jhash(&(request->qtype), sizeof(request->qtype), key);
  2044. key = jhash(&(request->server_flags), sizeof(request->server_flags), key);
  2045. pthread_mutex_lock(&server.request_pending_lock);
  2046. hash_for_each_possible(server.request_pending, pending_list_tmp, node, key)
  2047. {
  2048. if (request->qtype != pending_list_tmp->qtype) {
  2049. continue;
  2050. }
  2051. if (request->server_flags != pending_list_tmp->server_flags) {
  2052. continue;
  2053. }
  2054. if (strcmp(request->dns_group_name, pending_list_tmp->dns_group_name) != 0) {
  2055. continue;
  2056. }
  2057. if (strncmp(request->domain, pending_list_tmp->domain, DNS_MAX_CNAME_LEN) != 0) {
  2058. continue;
  2059. }
  2060. pending_list = pending_list_tmp;
  2061. break;
  2062. }
  2063. if (pending_list == NULL) {
  2064. pending_list = malloc(sizeof(*pending_list));
  2065. if (pending_list == NULL) {
  2066. ret = -1;
  2067. goto out;
  2068. }
  2069. memset(pending_list, 0, sizeof(*pending_list));
  2070. pthread_mutex_init(&pending_list->request_list_lock, NULL);
  2071. INIT_LIST_HEAD(&pending_list->request_list);
  2072. INIT_HLIST_NODE(&pending_list->node);
  2073. pending_list->qtype = request->qtype;
  2074. pending_list->server_flags = request->server_flags;
  2075. safe_strncpy(pending_list->domain, request->domain, DNS_MAX_CNAME_LEN);
  2076. safe_strncpy(pending_list->dns_group_name, request->dns_group_name, DNS_GROUP_NAME_LEN);
  2077. hash_add(server.request_pending, &pending_list->node, key);
  2078. request->request_pending_list = pending_list;
  2079. } else {
  2080. ret = 0;
  2081. }
  2082. if (ret == 0) {
  2083. _dns_server_request_get(request);
  2084. }
  2085. list_add_tail(&request->pending_list, &pending_list->request_list);
  2086. out:
  2087. pthread_mutex_unlock(&server.request_pending_lock);
  2088. return ret;
  2089. }
  2090. static struct dns_request *_dns_server_new_request(void)
  2091. {
  2092. struct dns_request *request = NULL;
  2093. request = malloc(sizeof(*request));
  2094. if (request == NULL) {
  2095. tlog(TLOG_ERROR, "malloc request failed.\n");
  2096. goto errout;
  2097. }
  2098. memset(request, 0, sizeof(*request));
  2099. pthread_mutex_init(&request->ip_map_lock, NULL);
  2100. atomic_set(&request->adblock, 0);
  2101. atomic_set(&request->soa_num, 0);
  2102. atomic_set(&request->ip_map_num, 0);
  2103. atomic_set(&request->refcnt, 0);
  2104. atomic_set(&request->notified, 0);
  2105. atomic_set(&request->do_callback, 0);
  2106. request->ping_time = -1;
  2107. request->prefetch = 0;
  2108. request->dualstack_selection = dns_conf_dualstack_ip_selection;
  2109. request->dualstack_selection_ping_time = -1;
  2110. request->rcode = DNS_RC_SERVFAIL;
  2111. request->conn = NULL;
  2112. request->qclass = DNS_C_IN;
  2113. request->result_callback = NULL;
  2114. request->check_order_list = &dns_conf_check_orders;
  2115. request->response_mode = dns_conf_response_mode;
  2116. INIT_LIST_HEAD(&request->list);
  2117. INIT_LIST_HEAD(&request->pending_list);
  2118. INIT_LIST_HEAD(&request->check_list);
  2119. hash_init(request->ip_map);
  2120. _dns_server_request_get(request);
  2121. return request;
  2122. errout:
  2123. return NULL;
  2124. }
  2125. static void _dns_server_ping_result(struct ping_host_struct *ping_host, const char *host, FAST_PING_RESULT result,
  2126. struct sockaddr *addr, socklen_t addr_len, int seqno, int ttl, struct timeval *tv,
  2127. int error, void *userptr)
  2128. {
  2129. struct dns_request *request = userptr;
  2130. int may_complete = 0;
  2131. int threshold = 100;
  2132. struct dns_ip_address *addr_map = NULL;
  2133. int last_rtt = request->ping_time;
  2134. if (request == NULL) {
  2135. return;
  2136. }
  2137. if (result == PING_RESULT_END) {
  2138. _dns_server_request_release(request);
  2139. fast_ping_stop(ping_host);
  2140. return;
  2141. } else if (result == PING_RESULT_TIMEOUT) {
  2142. tlog(TLOG_DEBUG, "ping %s timeout", host);
  2143. goto out;
  2144. return;
  2145. } else if (result == PING_RESULT_ERROR) {
  2146. if (addr->sa_family != AF_INET6) {
  2147. return;
  2148. }
  2149. if (is_ipv6_ready) {
  2150. if (error == EADDRNOTAVAIL || errno == EACCES) {
  2151. is_ipv6_ready = 0;
  2152. tlog(TLOG_ERROR, "IPV6 is not ready, disable all ipv6 feature, recheck after %ds",
  2153. IPV6_READY_CHECK_TIME);
  2154. }
  2155. }
  2156. return;
  2157. }
  2158. int rtt = tv->tv_sec * 10000 + tv->tv_usec / 100;
  2159. if (result == PING_RESULT_RESPONSE) {
  2160. tlog(TLOG_DEBUG, "from %s: seq=%d time=%d, lasttime=%d id=%d", host, seqno, rtt, last_rtt, request->id);
  2161. } else {
  2162. tlog(TLOG_DEBUG, "from %s: seq=%d timeout, id=%d", host, seqno, request->id);
  2163. }
  2164. switch (addr->sa_family) {
  2165. case AF_INET: {
  2166. struct sockaddr_in *addr_in = NULL;
  2167. addr_in = (struct sockaddr_in *)addr;
  2168. addr_map = _dns_ip_address_get(request, (unsigned char *)&addr_in->sin_addr.s_addr, DNS_T_A);
  2169. if (addr_map) {
  2170. addr_map->ping_time = rtt;
  2171. }
  2172. if (request->ping_time > rtt || request->ping_time == -1) {
  2173. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, 4);
  2174. request->ping_time = rtt;
  2175. request->has_cname = 0;
  2176. request->has_ip = 1;
  2177. if (addr_map && addr_map->cname[0] != 0) {
  2178. request->has_cname = 1;
  2179. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2180. } else {
  2181. request->has_cname = 0;
  2182. }
  2183. }
  2184. if (request->qtype == DNS_T_AAAA && request->dualstack_selection) {
  2185. if (request->ping_time < 0 && request->has_soa == 0) {
  2186. return;
  2187. }
  2188. }
  2189. if (request->qtype == DNS_T_A) {
  2190. request->has_ping_result = 1;
  2191. }
  2192. } break;
  2193. case AF_INET6: {
  2194. struct sockaddr_in6 *addr_in6 = NULL;
  2195. addr_in6 = (struct sockaddr_in6 *)addr;
  2196. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  2197. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr + 12, DNS_T_A);
  2198. if (addr_map) {
  2199. addr_map->ping_time = rtt;
  2200. }
  2201. if (request->ping_time > rtt || request->ping_time == -1) {
  2202. request->ping_time = rtt;
  2203. request->has_cname = 0;
  2204. request->has_ip = 1;
  2205. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr + 12, 4);
  2206. if (addr_map && addr_map->cname[0] != 0) {
  2207. request->has_cname = 1;
  2208. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2209. } else {
  2210. request->has_cname = 0;
  2211. }
  2212. }
  2213. if (request->qtype == DNS_T_A) {
  2214. request->has_ping_result = 1;
  2215. }
  2216. } else {
  2217. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr, DNS_T_AAAA);
  2218. if (addr_map) {
  2219. addr_map->ping_time = rtt;
  2220. }
  2221. if (request->ping_time > rtt || request->ping_time == -1) {
  2222. request->ping_time = rtt;
  2223. request->has_cname = 0;
  2224. request->has_ip = 1;
  2225. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr, 16);
  2226. if (addr_map && addr_map->cname[0] != 0) {
  2227. request->has_cname = 1;
  2228. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2229. } else {
  2230. request->has_cname = 0;
  2231. }
  2232. }
  2233. if (request->qtype == DNS_T_AAAA) {
  2234. request->has_ping_result = 1;
  2235. }
  2236. }
  2237. } break;
  2238. default:
  2239. break;
  2240. }
  2241. out:
  2242. /* If the ping delay is less than the threshold, the result is returned */
  2243. if (request->ping_time > 0) {
  2244. if (request->ping_time < threshold) {
  2245. may_complete = 1;
  2246. } else if (request->ping_time < (int)(get_tick_count() - request->send_tick) * 8) {
  2247. may_complete = 1;
  2248. }
  2249. }
  2250. /* Get first ping result */
  2251. if (request->response_mode == DNS_RESPONSE_MODE_FIRST_PING_IP && last_rtt == -1 && request->ping_time > 0) {
  2252. may_complete = 1;
  2253. }
  2254. if (may_complete && request->has_ping_result == 1) {
  2255. _dns_server_request_complete(request);
  2256. }
  2257. }
  2258. static int _dns_server_ping(struct dns_request *request, PING_TYPE type, char *ip, int timeout)
  2259. {
  2260. if (fast_ping_start(type, ip, 1, 0, timeout, _dns_server_ping_result, request) == NULL) {
  2261. return -1;
  2262. }
  2263. return 0;
  2264. }
  2265. static int _dns_server_check_speed(struct dns_request *request, char *ip)
  2266. {
  2267. char tcp_ip[DNS_MAX_CNAME_LEN] = {0};
  2268. int port = 80;
  2269. int type = DOMAIN_CHECK_NONE;
  2270. int order = request->check_order;
  2271. int ping_timeout = DNS_PING_TIMEOUT;
  2272. unsigned long now = get_tick_count();
  2273. if (order >= DOMAIN_CHECK_NUM || request->check_order_list == NULL) {
  2274. return -1;
  2275. }
  2276. if (request->passthrough) {
  2277. return -1;
  2278. }
  2279. ping_timeout = ping_timeout - (now - request->send_tick);
  2280. if (ping_timeout > DNS_PING_TIMEOUT) {
  2281. ping_timeout = DNS_PING_TIMEOUT;
  2282. } else if (ping_timeout < 200) {
  2283. ping_timeout = 200;
  2284. }
  2285. port = request->check_order_list->orders[order].tcp_port;
  2286. type = request->check_order_list->orders[order].type;
  2287. switch (type) {
  2288. case DOMAIN_CHECK_ICMP:
  2289. tlog(TLOG_DEBUG, "ping %s with icmp, order: %d, timeout: %d", ip, order, ping_timeout);
  2290. return _dns_server_ping(request, PING_TYPE_ICMP, ip, ping_timeout);
  2291. break;
  2292. case DOMAIN_CHECK_TCP:
  2293. snprintf(tcp_ip, sizeof(tcp_ip), "%s:%d", ip, port);
  2294. tlog(TLOG_DEBUG, "ping %s with tcp, order: %d, timeout: %d", tcp_ip, order, ping_timeout);
  2295. return _dns_server_ping(request, PING_TYPE_TCP, tcp_ip, ping_timeout);
  2296. break;
  2297. default:
  2298. break;
  2299. }
  2300. return -1;
  2301. }
  2302. static int _dns_server_ip_rule_check(struct dns_request *request, unsigned char *addr, int addr_len,
  2303. dns_type_t addr_type, int result_flag)
  2304. {
  2305. prefix_t prefix;
  2306. radix_node_t *node = NULL;
  2307. struct dns_ip_address_rule *rule = NULL;
  2308. /* Match IP address rules */
  2309. if (prefix_from_blob(addr, addr_len, addr_len * 8, &prefix) == NULL) {
  2310. return -1;
  2311. }
  2312. switch (prefix.family) {
  2313. case AF_INET:
  2314. node = radix_search_best(dns_conf_address_rule.ipv4, &prefix);
  2315. break;
  2316. case AF_INET6:
  2317. node = radix_search_best(dns_conf_address_rule.ipv6, &prefix);
  2318. break;
  2319. default:
  2320. break;
  2321. }
  2322. if (node == NULL) {
  2323. goto rule_not_found;
  2324. }
  2325. if (node->data == NULL) {
  2326. goto rule_not_found;
  2327. }
  2328. /* bogus-nxdomain */
  2329. rule = node->data;
  2330. if (rule->bogus) {
  2331. request->rcode = DNS_RC_NXDOMAIN;
  2332. request->has_soa = 1;
  2333. _dns_server_setup_soa(request);
  2334. goto match;
  2335. }
  2336. /* blacklist-ip */
  2337. if (rule->blacklist) {
  2338. if (result_flag & DNSSERVER_FLAG_BLACKLIST_IP) {
  2339. goto match;
  2340. }
  2341. }
  2342. /* ignore-ip */
  2343. if (rule->ip_ignore) {
  2344. goto skip;
  2345. }
  2346. rule_not_found:
  2347. if (result_flag & DNSSERVER_FLAG_WHITELIST_IP) {
  2348. if (rule == NULL) {
  2349. goto skip;
  2350. }
  2351. if (!rule->whitelist) {
  2352. goto skip;
  2353. }
  2354. }
  2355. return -1;
  2356. skip:
  2357. return -2;
  2358. match:
  2359. if (request->rcode == DNS_RC_SERVFAIL) {
  2360. request->rcode = DNS_RC_NXDOMAIN;
  2361. }
  2362. return 0;
  2363. }
  2364. static int _dns_server_is_adblock_ipv6(const unsigned char addr[16])
  2365. {
  2366. int i = 0;
  2367. for (i = 0; i < 15; i++) {
  2368. if (addr[i]) {
  2369. return -1;
  2370. }
  2371. }
  2372. if (addr[15] == 0 || addr[15] == 1) {
  2373. return 0;
  2374. }
  2375. return -1;
  2376. }
  2377. static int _dns_server_process_answer_A(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  2378. char *cname, unsigned int result_flag)
  2379. {
  2380. int ttl = 0;
  2381. int ip_check_result = 0;
  2382. unsigned char addr[4];
  2383. char name[DNS_MAX_CNAME_LEN] = {0};
  2384. char ip[DNS_MAX_CNAME_LEN] = {0};
  2385. if (request->qtype != DNS_T_A) {
  2386. /* ignore non-matched query type */
  2387. if (request->dualstack_selection == 0) {
  2388. return 0;
  2389. }
  2390. }
  2391. _dns_server_request_get(request);
  2392. /* get A result */
  2393. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2394. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl, addr[0], addr[1], addr[2], addr[3]);
  2395. /* if domain is not match */
  2396. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2397. _dns_server_request_release(request);
  2398. return -1;
  2399. }
  2400. /* ip rule check */
  2401. ip_check_result = _dns_server_ip_rule_check(request, addr, 4, DNS_T_A, result_flag);
  2402. if (ip_check_result == 0) {
  2403. /* match */
  2404. _dns_server_request_release(request);
  2405. return -1;
  2406. } else if (ip_check_result == -2) {
  2407. /* skip */
  2408. _dns_server_request_release(request);
  2409. return -2;
  2410. }
  2411. if (atomic_read(&request->ip_map_num) == 0) {
  2412. request->has_ip = 1;
  2413. memcpy(request->ip_addr, addr, DNS_RR_A_LEN);
  2414. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2415. if (cname[0] != 0 && request->has_cname == 0 && dns_conf_force_no_cname == 0) {
  2416. request->has_cname = 1;
  2417. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2418. }
  2419. } else {
  2420. if (ttl < request->ip_ttl) {
  2421. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2422. }
  2423. }
  2424. /* Ad blocking result */
  2425. if (addr[0] == 0 || addr[0] == 127) {
  2426. /* If half of the servers return the same result, then ignore this address */
  2427. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2428. request->rcode = DNS_RC_NOERROR;
  2429. _dns_server_request_release(request);
  2430. return -1;
  2431. }
  2432. }
  2433. /* add this ip to request */
  2434. if (_dns_ip_address_check_add(request, cname, addr, DNS_T_A, 0, NULL) != 0) {
  2435. _dns_server_request_release(request);
  2436. return -1;
  2437. }
  2438. sprintf(ip, "%d.%d.%d.%d", addr[0], addr[1], addr[2], addr[3]);
  2439. /* start ping */
  2440. if (_dns_server_check_speed(request, ip) != 0) {
  2441. _dns_server_request_release(request);
  2442. }
  2443. return 0;
  2444. }
  2445. static int _dns_server_process_answer_AAAA(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  2446. char *cname, unsigned int result_flag)
  2447. {
  2448. unsigned char addr[16];
  2449. char name[DNS_MAX_CNAME_LEN] = {0};
  2450. char ip[DNS_MAX_CNAME_LEN] = {0};
  2451. int ttl = 0;
  2452. int ip_check_result = 0;
  2453. if (request->qtype != DNS_T_AAAA) {
  2454. /* ignore non-matched query type */
  2455. return -1;
  2456. }
  2457. _dns_server_request_get(request);
  2458. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2459. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2460. name, ttl, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9], addr[10],
  2461. addr[11], addr[12], addr[13], addr[14], addr[15]);
  2462. /* if domain is not match */
  2463. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2464. _dns_server_request_release(request);
  2465. return -1;
  2466. }
  2467. ip_check_result = _dns_server_ip_rule_check(request, addr, 16, DNS_T_AAAA, result_flag);
  2468. if (ip_check_result == 0) {
  2469. /* match */
  2470. _dns_server_request_release(request);
  2471. return -1;
  2472. } else if (ip_check_result == -2) {
  2473. /* skip */
  2474. _dns_server_request_release(request);
  2475. return -2;
  2476. }
  2477. if (atomic_read(&request->ip_map_num) == 0) {
  2478. request->has_ip = 1;
  2479. memcpy(request->ip_addr, addr, DNS_RR_AAAA_LEN);
  2480. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2481. if (cname[0] != 0 && request->has_cname == 0 && dns_conf_force_no_cname == 0) {
  2482. request->has_cname = 1;
  2483. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2484. }
  2485. } else {
  2486. if (ttl < request->ip_ttl) {
  2487. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2488. }
  2489. }
  2490. /* Ad blocking result */
  2491. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  2492. /* If half of the servers return the same result, then ignore this address */
  2493. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2494. request->rcode = DNS_RC_NOERROR;
  2495. _dns_server_request_release(request);
  2496. return -1;
  2497. }
  2498. }
  2499. /* add this ip to request */
  2500. if (_dns_ip_address_check_add(request, cname, addr, DNS_T_AAAA, 0, NULL) != 0) {
  2501. _dns_server_request_release(request);
  2502. return -1;
  2503. }
  2504. sprintf(ip, "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]", addr[0], addr[1], addr[2],
  2505. addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9], addr[10], addr[11], addr[12], addr[13],
  2506. addr[14], addr[15]);
  2507. /* start ping */
  2508. if (_dns_server_check_speed(request, ip) != 0) {
  2509. _dns_server_request_release(request);
  2510. }
  2511. return 0;
  2512. }
  2513. static int _dns_server_process_answer(struct dns_request *request, const char *domain, struct dns_packet *packet,
  2514. unsigned int result_flag)
  2515. {
  2516. int ttl = 0;
  2517. char name[DNS_MAX_CNAME_LEN] = {0};
  2518. char cname[DNS_MAX_CNAME_LEN] = {0};
  2519. int rr_count = 0;
  2520. int i = 0;
  2521. int j = 0;
  2522. struct dns_rrs *rrs = NULL;
  2523. int ret = 0;
  2524. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  2525. if (request->rcode == DNS_RC_SERVFAIL) {
  2526. request->rcode = packet->head.rcode;
  2527. request->remote_server_fail = 1;
  2528. }
  2529. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  2530. return -1;
  2531. }
  2532. request->remote_server_fail = 0;
  2533. if (request->rcode == DNS_RC_SERVFAIL) {
  2534. request->rcode = packet->head.rcode;
  2535. }
  2536. for (j = 1; j < DNS_RRS_OPT; j++) {
  2537. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2538. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2539. switch (rrs->type) {
  2540. case DNS_T_A: {
  2541. ret = _dns_server_process_answer_A(rrs, request, domain, cname, result_flag);
  2542. if (ret == -1) {
  2543. break;
  2544. } else if (ret == -2) {
  2545. continue;
  2546. }
  2547. request->rcode = packet->head.rcode;
  2548. } break;
  2549. case DNS_T_AAAA: {
  2550. ret = _dns_server_process_answer_AAAA(rrs, request, domain, cname, result_flag);
  2551. if (ret == -1) {
  2552. break;
  2553. } else if (ret == -2) {
  2554. continue;
  2555. }
  2556. request->rcode = packet->head.rcode;
  2557. } break;
  2558. case DNS_T_NS: {
  2559. char nsname[DNS_MAX_CNAME_LEN];
  2560. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, nsname, DNS_MAX_CNAME_LEN);
  2561. tlog(TLOG_DEBUG, "NS: %s ttl: %d nsname: %s\n", name, ttl, nsname);
  2562. } break;
  2563. case DNS_T_CNAME: {
  2564. char domain_name[DNS_MAX_CNAME_LEN] = {0};
  2565. char domain_cname[DNS_MAX_CNAME_LEN] = {0};
  2566. dns_get_CNAME(rrs, domain_name, DNS_MAX_CNAME_LEN, &ttl, domain_cname, DNS_MAX_CNAME_LEN);
  2567. if (strncmp(domain_name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2568. strncmp(domain_name, cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2569. continue;
  2570. }
  2571. safe_strncpy(cname, domain_cname, DNS_MAX_CNAME_LEN);
  2572. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  2573. tlog(TLOG_DEBUG, "name: %s ttl: %d cname: %s\n", domain_name, ttl, cname);
  2574. } break;
  2575. case DNS_T_SOA: {
  2576. /* if DNS64 enabled, skip check SOA. */
  2577. if (_dns_server_is_dns64_request(request)) {
  2578. break;
  2579. }
  2580. request->has_soa = 1;
  2581. if (request->rcode != DNS_RC_NOERROR) {
  2582. request->rcode = packet->head.rcode;
  2583. }
  2584. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  2585. tlog(TLOG_DEBUG,
  2586. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: "
  2587. "%d, minimum: %d",
  2588. domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  2589. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  2590. int soa_num = atomic_inc_return(&request->soa_num);
  2591. if ((soa_num >= (dns_server_alive_num() / 3) + 1 || soa_num > 4) &&
  2592. atomic_read(&request->ip_map_num) <= 0) {
  2593. request->ip_ttl = ttl;
  2594. _dns_server_request_complete(request);
  2595. }
  2596. } break;
  2597. default:
  2598. tlog(TLOG_DEBUG, "%s, qtype: %d, rrstype = %d", name, rrs->type, j);
  2599. break;
  2600. }
  2601. }
  2602. }
  2603. return 0;
  2604. }
  2605. static int _dns_server_passthrough_rule_check(struct dns_request *request, const char *domain,
  2606. struct dns_packet *packet, unsigned int result_flag, int *pttl)
  2607. {
  2608. int ttl = 0;
  2609. char name[DNS_MAX_CNAME_LEN] = {0};
  2610. char cname[DNS_MAX_CNAME_LEN];
  2611. int rr_count = 0;
  2612. int i = 0;
  2613. int j = 0;
  2614. struct dns_rrs *rrs = NULL;
  2615. int ip_check_result = 0;
  2616. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  2617. if (request->rcode == DNS_RC_SERVFAIL) {
  2618. request->rcode = packet->head.rcode;
  2619. request->remote_server_fail = 1;
  2620. }
  2621. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  2622. return 0;
  2623. }
  2624. request->remote_server_fail = 0;
  2625. if (request->rcode == DNS_RC_SERVFAIL) {
  2626. request->rcode = packet->head.rcode;
  2627. }
  2628. for (j = 1; j < DNS_RRS_OPT; j++) {
  2629. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2630. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2631. switch (rrs->type) {
  2632. case DNS_T_A: {
  2633. unsigned char addr[4];
  2634. int ttl_tmp = 0;
  2635. if (request->qtype != DNS_T_A) {
  2636. /* ignore non-matched query type */
  2637. if (request->dualstack_selection == 0) {
  2638. break;
  2639. }
  2640. }
  2641. _dns_server_request_get(request);
  2642. /* get A result */
  2643. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  2644. /* if domain is not match */
  2645. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2646. _dns_server_request_release(request);
  2647. continue;
  2648. }
  2649. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl_tmp, addr[0], addr[1], addr[2],
  2650. addr[3]);
  2651. /* ip rule check */
  2652. ip_check_result = _dns_server_ip_rule_check(request, addr, 4, DNS_T_A, result_flag);
  2653. if (ip_check_result == 0) {
  2654. /* match */
  2655. _dns_server_request_release(request);
  2656. return 0;
  2657. } else if (ip_check_result == -2) {
  2658. /* skip */
  2659. _dns_server_request_release(request);
  2660. return 0;
  2661. }
  2662. /* Ad blocking result */
  2663. if (addr[0] == 0 || addr[0] == 127) {
  2664. /* If half of the servers return the same result, then ignore this address */
  2665. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2666. _dns_server_request_release(request);
  2667. return 0;
  2668. }
  2669. }
  2670. ttl = ttl_tmp;
  2671. _dns_server_request_release(request);
  2672. } break;
  2673. case DNS_T_AAAA: {
  2674. unsigned char addr[16];
  2675. int ttl_tmp = 0;
  2676. if (request->qtype != DNS_T_AAAA) {
  2677. /* ignore non-matched query type */
  2678. break;
  2679. }
  2680. _dns_server_request_get(request);
  2681. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  2682. /* if domain is not match */
  2683. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2684. _dns_server_request_release(request);
  2685. continue;
  2686. }
  2687. tlog(TLOG_DEBUG,
  2688. "domain: %s TTL: %d IP: %.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2689. name, ttl_tmp, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8],
  2690. addr[9], addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  2691. ip_check_result = _dns_server_ip_rule_check(request, addr, 16, DNS_T_AAAA, result_flag);
  2692. if (ip_check_result == 0) {
  2693. /* match */
  2694. _dns_server_request_release(request);
  2695. return 0;
  2696. } else if (ip_check_result == -2) {
  2697. /* skip */
  2698. _dns_server_request_release(request);
  2699. return 0;
  2700. }
  2701. /* Ad blocking result */
  2702. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  2703. /* If half of the servers return the same result, then ignore this address */
  2704. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2705. _dns_server_request_release(request);
  2706. return 0;
  2707. }
  2708. }
  2709. ttl = ttl_tmp;
  2710. _dns_server_request_release(request);
  2711. } break;
  2712. case DNS_T_CNAME: {
  2713. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2714. } break;
  2715. default:
  2716. if (ttl == 0) {
  2717. /* Get TTL */
  2718. char tmpname[DNS_MAX_CNAME_LEN];
  2719. char tmpbuf[DNS_MAX_CNAME_LEN];
  2720. dns_get_CNAME(rrs, tmpname, DNS_MAX_CNAME_LEN, &ttl, tmpbuf, DNS_MAX_CNAME_LEN);
  2721. if (request->ip_ttl == 0) {
  2722. request->ip_ttl = ttl;
  2723. }
  2724. }
  2725. break;
  2726. }
  2727. }
  2728. }
  2729. *pttl = ttl;
  2730. return -1;
  2731. }
  2732. static int _dns_server_get_answer(struct dns_server_post_context *context)
  2733. {
  2734. int i = 0;
  2735. int j = 0;
  2736. int ttl = 0;
  2737. struct dns_rrs *rrs = NULL;
  2738. int rr_count = 0;
  2739. struct dns_request *request = context->request;
  2740. struct dns_packet *packet = context->packet;
  2741. for (j = 1; j < DNS_RRS_OPT; j++) {
  2742. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2743. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2744. switch (rrs->type) {
  2745. case DNS_T_A: {
  2746. unsigned char addr[4];
  2747. char name[DNS_MAX_CNAME_LEN] = {0};
  2748. struct dns_ip_address *addr_map = NULL;
  2749. if (request->qtype != DNS_T_A) {
  2750. continue;
  2751. }
  2752. /* get A result */
  2753. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2754. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2755. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2756. continue;
  2757. }
  2758. if (context->no_check_add_ip == 0 &&
  2759. _dns_ip_address_check_add(request, name, addr, DNS_T_A, request->ping_time, &addr_map) != 0) {
  2760. continue;
  2761. }
  2762. context->ip_addr[context->ip_num] = addr_map->ip_addr;
  2763. context->ip_num++;
  2764. if (request->has_ip == 1) {
  2765. continue;
  2766. }
  2767. memcpy(request->ip_addr, addr, DNS_RR_A_LEN);
  2768. /* add this ip to request */
  2769. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2770. request->has_ip = 1;
  2771. request->rcode = packet->head.rcode;
  2772. } break;
  2773. case DNS_T_AAAA: {
  2774. unsigned char addr[16];
  2775. char name[DNS_MAX_CNAME_LEN] = {0};
  2776. struct dns_ip_address *addr_map = NULL;
  2777. if (request->qtype != DNS_T_AAAA) {
  2778. /* ignore non-matched query type */
  2779. continue;
  2780. }
  2781. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2782. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2783. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2784. continue;
  2785. }
  2786. if (context->no_check_add_ip == 0 &&
  2787. _dns_ip_address_check_add(request, name, addr, DNS_T_AAAA, request->ping_time, &addr_map) != 0) {
  2788. continue;
  2789. }
  2790. context->ip_addr[context->ip_num] = addr_map->ip_addr;
  2791. context->ip_num++;
  2792. if (request->has_ip == 1) {
  2793. continue;
  2794. }
  2795. memcpy(request->ip_addr, addr, DNS_RR_AAAA_LEN);
  2796. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2797. request->has_ip = 1;
  2798. request->rcode = packet->head.rcode;
  2799. } break;
  2800. case DNS_T_NS: {
  2801. char cname[DNS_MAX_CNAME_LEN];
  2802. char name[DNS_MAX_CNAME_LEN] = {0};
  2803. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2804. tlog(TLOG_DEBUG, "NS: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  2805. } break;
  2806. case DNS_T_CNAME: {
  2807. char cname[DNS_MAX_CNAME_LEN];
  2808. char name[DNS_MAX_CNAME_LEN] = {0};
  2809. if (dns_conf_force_no_cname) {
  2810. continue;
  2811. }
  2812. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2813. tlog(TLOG_DEBUG, "name: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  2814. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2815. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2816. continue;
  2817. }
  2818. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2819. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  2820. request->has_cname = 1;
  2821. } break;
  2822. case DNS_T_SOA: {
  2823. char name[DNS_MAX_CNAME_LEN] = {0};
  2824. request->has_soa = 1;
  2825. if (request->rcode != DNS_RC_NOERROR) {
  2826. request->rcode = packet->head.rcode;
  2827. }
  2828. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  2829. tlog(TLOG_DEBUG,
  2830. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: "
  2831. "%d, minimum: %d",
  2832. request->domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  2833. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  2834. } break;
  2835. default:
  2836. break;
  2837. }
  2838. }
  2839. }
  2840. return 0;
  2841. }
  2842. static int _dns_server_reply_passthrough(struct dns_server_post_context *context)
  2843. {
  2844. struct dns_request *request = context->request;
  2845. if (atomic_inc_return(&request->notified) != 1) {
  2846. return 0;
  2847. }
  2848. _dns_server_get_answer(context);
  2849. _dns_cache_reply_packet(context);
  2850. if (_dns_server_setup_ipset_nftset_packet(context) != 0) {
  2851. tlog(TLOG_DEBUG, "setup ipset failed.");
  2852. }
  2853. _dns_result_callback(context);
  2854. _dns_server_audit_log(context);
  2855. /* reply child request */
  2856. _dns_result_child_post(context);
  2857. if (request->conn && context->do_reply == 1) {
  2858. char clientip[DNS_MAX_CNAME_LEN] = {0};
  2859. /* When passthrough, modify the id to be the id of the client request. */
  2860. int ret = _dns_request_update_id_ttl(context);
  2861. if (ret != 0) {
  2862. tlog(TLOG_ERROR, "update packet ttl failed.");
  2863. return -1;
  2864. }
  2865. _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  2866. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  2867. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype,
  2868. request->id, request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  2869. get_tick_count() - request->send_tick);
  2870. }
  2871. return _dns_server_reply_all_pending_list(request, context);
  2872. }
  2873. static void _dns_server_query_end(struct dns_request *request)
  2874. {
  2875. int ip_num = 0;
  2876. int request_wait = 0;
  2877. pthread_mutex_lock(&request->ip_map_lock);
  2878. ip_num = atomic_read(&request->ip_map_num);
  2879. request_wait = request->request_wait;
  2880. request->request_wait--;
  2881. pthread_mutex_unlock(&request->ip_map_lock);
  2882. /* Not need to wait check result if only has one ip address */
  2883. if (ip_num <= 1 && request_wait == 1) {
  2884. if (request->dualstack_selection_query == 1) {
  2885. if ((dns_conf_ipset_no_speed.ipv4_enable || dns_conf_nftset_no_speed.ip_enable ||
  2886. dns_conf_ipset_no_speed.ipv6_enable || dns_conf_nftset_no_speed.ip6_enable) &&
  2887. dns_conf_dns_dns64.prefix_len == 0) {
  2888. /* if speed check fail enabled, we need reply quickly, otherwise wait for ping result.*/
  2889. _dns_server_request_complete(request);
  2890. }
  2891. goto out;
  2892. }
  2893. if (request->dualstack_selection_has_ip && request->dualstack_selection_ping_time > 0) {
  2894. goto out;
  2895. }
  2896. request->has_ping_result = 1;
  2897. _dns_server_request_complete(request);
  2898. }
  2899. out:
  2900. _dns_server_request_release(request);
  2901. }
  2902. static int dns_server_dualstack_callback(const struct dns_result *result, void *user_ptr)
  2903. {
  2904. struct dns_request *request = (struct dns_request *)user_ptr;
  2905. tlog(TLOG_DEBUG, "dualstack result: domain: %s, ip: %s, type: %d, ping: %d, rcode: %d", result->domain, result->ip,
  2906. result->addr_type, result->ping_time, result->rtcode);
  2907. if (request == NULL) {
  2908. return -1;
  2909. }
  2910. if (result->rtcode == DNS_RC_NOERROR && result->ip[0] != 0) {
  2911. request->dualstack_selection_has_ip = 1;
  2912. }
  2913. request->dualstack_selection_ping_time = result->ping_time;
  2914. _dns_server_query_end(request);
  2915. return 0;
  2916. }
  2917. static void _dns_server_passthrough_may_complete(struct dns_request *request)
  2918. {
  2919. const unsigned char *addr;
  2920. if (request->passthrough != 2) {
  2921. return;
  2922. }
  2923. if (request->has_ip == 0 && request->has_soa == 0) {
  2924. return;
  2925. }
  2926. if (request->qtype == DNS_T_A && request->has_ip == 1) {
  2927. /* Ad blocking result */
  2928. addr = request->ip_addr;
  2929. if (addr[0] == 0 || addr[0] == 127) {
  2930. /* If half of the servers return the same result, then ignore this address */
  2931. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2932. return;
  2933. }
  2934. }
  2935. }
  2936. if (request->qtype == DNS_T_AAAA && request->has_ip == 1) {
  2937. addr = request->ip_addr;
  2938. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  2939. /* If half of the servers return the same result, then ignore this address */
  2940. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2941. return;
  2942. }
  2943. }
  2944. }
  2945. _dns_server_request_complete_with_all_IPs(request, 1);
  2946. }
  2947. static int dns_server_resolve_callback(const char *domain, dns_result_type rtype, struct dns_server_info *server_info,
  2948. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len,
  2949. void *user_ptr)
  2950. {
  2951. struct dns_request *request = user_ptr;
  2952. int ret = 0;
  2953. unsigned long result_flag = dns_client_server_result_flag(server_info);
  2954. if (request == NULL) {
  2955. return -1;
  2956. }
  2957. if (rtype == DNS_QUERY_RESULT) {
  2958. tlog(TLOG_DEBUG, "query result from server %s:%d, type: %d", dns_client_get_server_ip(server_info),
  2959. dns_client_get_server_port(server_info), dns_client_get_server_type(server_info));
  2960. if (request->passthrough == 1 && atomic_read(&request->notified) == 0) {
  2961. struct dns_server_post_context context;
  2962. int ttl = 0;
  2963. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  2964. if (ret == 0) {
  2965. return 0;
  2966. }
  2967. ttl = _dns_server_get_conf_ttl(request, ttl);
  2968. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  2969. context.do_cache = 1;
  2970. context.do_audit = 1;
  2971. context.do_reply = 1;
  2972. context.do_ipset = 1;
  2973. context.reply_ttl = ttl;
  2974. return _dns_server_reply_passthrough(&context);
  2975. }
  2976. if (request->prefetch == 0 && request->response_mode == DNS_RESPONSE_MODE_FASTEST_RESPONSE &&
  2977. atomic_read(&request->notified) == 0) {
  2978. struct dns_server_post_context context;
  2979. int ttl = 0;
  2980. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  2981. if (ret != 0) {
  2982. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  2983. context.do_cache = 1;
  2984. context.do_audit = 1;
  2985. context.do_reply = 1;
  2986. context.do_ipset = 1;
  2987. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  2988. context.cache_ttl = _dns_server_get_conf_ttl(request, ttl);
  2989. request->ip_ttl = context.cache_ttl;
  2990. context.no_check_add_ip = 1;
  2991. _dns_server_reply_passthrough(&context);
  2992. request->cname[0] = 0;
  2993. request->has_ip = 0;
  2994. request->has_cname = 0;
  2995. request->has_ping_result = 0;
  2996. request->has_soa = 0;
  2997. request->has_ptr = 0;
  2998. request->ping_time = -1;
  2999. request->ip_ttl = 0;
  3000. }
  3001. }
  3002. _dns_server_process_answer(request, domain, packet, result_flag);
  3003. _dns_server_passthrough_may_complete(request);
  3004. return 0;
  3005. } else if (rtype == DNS_QUERY_ERR) {
  3006. tlog(TLOG_ERROR, "request failed, %s", domain);
  3007. return -1;
  3008. } else {
  3009. _dns_server_query_end(request);
  3010. }
  3011. return 0;
  3012. }
  3013. static int _dns_server_get_inet_by_addr(struct sockaddr_storage *localaddr, struct sockaddr_storage *addr, int family)
  3014. {
  3015. struct ifaddrs *ifaddr = NULL;
  3016. struct ifaddrs *ifa = NULL;
  3017. char ethname[16] = {0};
  3018. if (getifaddrs(&ifaddr) == -1) {
  3019. return -1;
  3020. }
  3021. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3022. if (ifa->ifa_addr == NULL) {
  3023. continue;
  3024. }
  3025. if (localaddr->ss_family != ifa->ifa_addr->sa_family) {
  3026. continue;
  3027. }
  3028. switch (ifa->ifa_addr->sa_family) {
  3029. case AF_INET: {
  3030. struct sockaddr_in *addr_in_1 = NULL;
  3031. struct sockaddr_in *addr_in_2 = NULL;
  3032. addr_in_1 = (struct sockaddr_in *)ifa->ifa_addr;
  3033. addr_in_2 = (struct sockaddr_in *)localaddr;
  3034. if (memcmp(&(addr_in_1->sin_addr.s_addr), &(addr_in_2->sin_addr.s_addr), 4) != 0) {
  3035. continue;
  3036. }
  3037. } break;
  3038. case AF_INET6: {
  3039. struct sockaddr_in6 *addr_in6_1 = NULL;
  3040. struct sockaddr_in6 *addr_in6_2 = NULL;
  3041. addr_in6_1 = (struct sockaddr_in6 *)ifa->ifa_addr;
  3042. addr_in6_2 = (struct sockaddr_in6 *)localaddr;
  3043. if (IN6_IS_ADDR_V4MAPPED(&addr_in6_1->sin6_addr)) {
  3044. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr + 12;
  3045. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr + 12;
  3046. if (memcmp(addr1, addr2, 4) != 0) {
  3047. continue;
  3048. }
  3049. } else {
  3050. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr;
  3051. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr;
  3052. if (memcmp(addr1, addr2, 16) != 0) {
  3053. continue;
  3054. }
  3055. }
  3056. } break;
  3057. default:
  3058. continue;
  3059. break;
  3060. }
  3061. safe_strncpy(ethname, ifa->ifa_name, sizeof(ethname));
  3062. break;
  3063. }
  3064. if (ethname[0] == '\0') {
  3065. goto errout;
  3066. }
  3067. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3068. if (ifa->ifa_addr == NULL) {
  3069. continue;
  3070. }
  3071. if (ifa->ifa_addr->sa_family != family) {
  3072. continue;
  3073. }
  3074. if (strncmp(ethname, ifa->ifa_name, sizeof(ethname)) != 0) {
  3075. continue;
  3076. }
  3077. if (family == AF_INET) {
  3078. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in));
  3079. } else if (family == AF_INET6) {
  3080. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in6));
  3081. }
  3082. break;
  3083. }
  3084. freeifaddrs(ifaddr);
  3085. return 0;
  3086. errout:
  3087. if (ifaddr) {
  3088. freeifaddrs(ifaddr);
  3089. }
  3090. return -1;
  3091. }
  3092. static int _dns_server_reply_request_eth_ip(struct dns_request *request)
  3093. {
  3094. struct sockaddr_in *addr_in = NULL;
  3095. struct sockaddr_in6 *addr_in6 = NULL;
  3096. struct sockaddr_storage *localaddr = NULL;
  3097. struct sockaddr_storage localaddr_buff;
  3098. localaddr = &request->localaddr;
  3099. /* address /domain/ rule */
  3100. switch (request->qtype) {
  3101. case DNS_T_A:
  3102. if (localaddr->ss_family != AF_INET) {
  3103. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET) != 0) {
  3104. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3105. return 0;
  3106. }
  3107. localaddr = &localaddr_buff;
  3108. }
  3109. addr_in = (struct sockaddr_in *)localaddr;
  3110. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, DNS_RR_A_LEN);
  3111. break;
  3112. case DNS_T_AAAA:
  3113. if (localaddr->ss_family != AF_INET6) {
  3114. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET6) != 0) {
  3115. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3116. return 0;
  3117. }
  3118. localaddr = &localaddr_buff;
  3119. }
  3120. addr_in6 = (struct sockaddr_in6 *)localaddr;
  3121. memcpy(request->ip_addr, &addr_in6->sin6_addr.s6_addr, DNS_RR_AAAA_LEN);
  3122. break;
  3123. default:
  3124. goto out;
  3125. break;
  3126. }
  3127. request->rcode = DNS_RC_NOERROR;
  3128. request->ip_ttl = dns_conf_local_ttl;
  3129. request->has_ip = 1;
  3130. struct dns_server_post_context context;
  3131. _dns_server_post_context_init(&context, request);
  3132. context.do_reply = 1;
  3133. _dns_request_post(&context);
  3134. return 0;
  3135. out:
  3136. return -1;
  3137. }
  3138. static int _dns_server_process_ptrs(struct dns_request *request)
  3139. {
  3140. uint32_t key = 0;
  3141. struct dns_ptr *ptr = NULL;
  3142. struct dns_ptr *ptr_tmp = NULL;
  3143. key = hash_string(request->domain);
  3144. hash_for_each_possible(dns_ptr_table.ptr, ptr_tmp, node, key)
  3145. {
  3146. if (strncmp(ptr_tmp->ptr_domain, request->domain, DNS_MAX_CNAME_LEN) != 0) {
  3147. continue;
  3148. }
  3149. ptr = ptr_tmp;
  3150. break;
  3151. }
  3152. if (ptr == NULL) {
  3153. goto errout;
  3154. }
  3155. request->has_ptr = 1;
  3156. safe_strncpy(request->ptr_hostname, ptr->hostname, DNS_MAX_CNAME_LEN);
  3157. return 0;
  3158. errout:
  3159. return -1;
  3160. }
  3161. static int _dns_server_process_local_ptr(struct dns_request *request)
  3162. {
  3163. struct ifaddrs *ifaddr = NULL;
  3164. struct ifaddrs *ifa = NULL;
  3165. unsigned char *addr = NULL;
  3166. char reverse_addr[128] = {0};
  3167. int found = 0;
  3168. if (getifaddrs(&ifaddr) == -1) {
  3169. return -1;
  3170. }
  3171. /* Get the NIC IP and match it. If the match is successful, return the host name. */
  3172. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3173. if (ifa->ifa_addr == NULL) {
  3174. continue;
  3175. }
  3176. switch (ifa->ifa_addr->sa_family) {
  3177. case AF_INET: {
  3178. struct sockaddr_in *addr_in = NULL;
  3179. addr_in = (struct sockaddr_in *)ifa->ifa_addr;
  3180. addr = (unsigned char *)&(addr_in->sin_addr.s_addr);
  3181. snprintf(reverse_addr, sizeof(reverse_addr), "%d.%d.%d.%d.in-addr.arpa", addr[3], addr[2], addr[1],
  3182. addr[0]);
  3183. } break;
  3184. case AF_INET6: {
  3185. struct sockaddr_in6 *addr_in6 = NULL;
  3186. addr_in6 = (struct sockaddr_in6 *)ifa->ifa_addr;
  3187. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  3188. addr = addr_in6->sin6_addr.s6_addr + 12;
  3189. snprintf(reverse_addr, sizeof(reverse_addr), "%d.%d.%d.%d.in-addr.arpa", addr[3], addr[2], addr[1],
  3190. addr[0]);
  3191. } else {
  3192. addr = addr_in6->sin6_addr.s6_addr;
  3193. snprintf(reverse_addr, sizeof(reverse_addr),
  3194. "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x."
  3195. "%x.ip6.arpa",
  3196. addr[15] & 0xF, (addr[15] >> 4) & 0xF, addr[14] & 0xF, (addr[14] >> 4) & 0xF, addr[13] & 0xF,
  3197. (addr[13] >> 4) & 0xF, addr[12] & 0xF, (addr[12] >> 4) & 0xF, addr[11] & 0xF,
  3198. (addr[11] >> 4) & 0xF, addr[10] & 0xF, (addr[10] >> 4) & 0xF, addr[9] & 0xF,
  3199. (addr[9] >> 4) & 0xF, addr[8] & 0xF, (addr[8] >> 4) & 0xF, addr[7] & 0xF, (addr[7] >> 4) & 0xF,
  3200. addr[6] & 0xF, (addr[6] >> 4) & 0xF, addr[5] & 0xF, (addr[5] >> 4) & 0xF, addr[4] & 0xF,
  3201. (addr[4] >> 4) & 0xF, addr[3] & 0xF, (addr[3] >> 4) & 0xF, addr[2] & 0xF, (addr[2] >> 4) & 0xF,
  3202. addr[1] & 0xF, (addr[1] >> 4) & 0xF, addr[0] & 0xF, (addr[0] >> 4) & 0xF);
  3203. }
  3204. } break;
  3205. default:
  3206. continue;
  3207. break;
  3208. }
  3209. if (strncmp(request->domain, reverse_addr, DNS_MAX_CNAME_LEN) == 0) {
  3210. found = 1;
  3211. break;
  3212. }
  3213. }
  3214. /* Determine if the smartdns service is in effect. */
  3215. if (strncmp(request->domain, "0.0.0.0.in-addr.arpa", DNS_MAX_CNAME_LEN - 1) == 0) {
  3216. found = 1;
  3217. }
  3218. /* Determine if the smartdns service is in effect. */
  3219. if (found == 0 && strncmp(request->domain, "smartdns", sizeof("smartdns")) == 0) {
  3220. found = 1;
  3221. }
  3222. if (found == 0) {
  3223. goto errout;
  3224. }
  3225. char full_hostname[DNS_MAX_CNAME_LEN];
  3226. if (dns_conf_server_name[0] == 0) {
  3227. char hostname[DNS_MAX_CNAME_LEN];
  3228. char domainname[DNS_MAX_CNAME_LEN];
  3229. /* get local domain name */
  3230. if (getdomainname(domainname, DNS_MAX_CNAME_LEN - 1) == 0) {
  3231. /* check domain is valid */
  3232. if (strncmp(domainname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  3233. domainname[0] = '\0';
  3234. }
  3235. }
  3236. if (gethostname(hostname, DNS_MAX_CNAME_LEN - 1) == 0) {
  3237. /* check hostname is valid */
  3238. if (strncmp(hostname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  3239. hostname[0] = '\0';
  3240. }
  3241. }
  3242. if (hostname[0] != '\0' && domainname[0] != '\0') {
  3243. snprintf(full_hostname, sizeof(full_hostname), "%.64s.%.128s", hostname, domainname);
  3244. } else if (hostname[0] != '\0') {
  3245. safe_strncpy(full_hostname, hostname, DNS_MAX_CNAME_LEN);
  3246. } else {
  3247. safe_strncpy(full_hostname, "smartdns", DNS_MAX_CNAME_LEN);
  3248. }
  3249. } else {
  3250. /* return configured server name */
  3251. safe_strncpy(full_hostname, dns_conf_server_name, DNS_MAX_CNAME_LEN);
  3252. }
  3253. request->has_ptr = 1;
  3254. safe_strncpy(request->ptr_hostname, full_hostname, DNS_MAX_CNAME_LEN);
  3255. freeifaddrs(ifaddr);
  3256. return 0;
  3257. errout:
  3258. if (ifaddr) {
  3259. freeifaddrs(ifaddr);
  3260. }
  3261. return -1;
  3262. }
  3263. static int _dns_server_process_ptr(struct dns_request *request)
  3264. {
  3265. if (_dns_server_process_ptrs(request) == 0) {
  3266. goto reply_exit;
  3267. }
  3268. if (_dns_server_process_local_ptr(request) == 0) {
  3269. goto reply_exit;
  3270. }
  3271. return -1;
  3272. reply_exit:
  3273. request->rcode = DNS_RC_NOERROR;
  3274. struct dns_server_post_context context;
  3275. _dns_server_post_context_init(&context, request);
  3276. context.do_reply = 1;
  3277. context.do_audit = 0;
  3278. _dns_request_post(&context);
  3279. return 0;
  3280. }
  3281. static void _dns_server_log_rule(const char *domain, enum domain_rule rule_type, unsigned char *rule_key,
  3282. int rule_key_len)
  3283. {
  3284. char rule_name[DNS_MAX_CNAME_LEN];
  3285. if (rule_key_len <= 0) {
  3286. return;
  3287. }
  3288. reverse_string(rule_name, (char *)rule_key, rule_key_len, 1);
  3289. rule_name[rule_key_len] = 0;
  3290. tlog(TLOG_INFO, "RULE-MATCH, type: %d, domain: %s, rule: %s", rule_type, domain, rule_name);
  3291. }
  3292. static void _dns_server_update_rule_by_flags(struct dns_request *request)
  3293. {
  3294. struct dns_rule_flags *rule_flag = (struct dns_rule_flags *)request->domain_rule.rules[0];
  3295. unsigned int flags = 0;
  3296. if (rule_flag == NULL) {
  3297. return;
  3298. }
  3299. flags = rule_flag->flags;
  3300. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  3301. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  3302. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  3303. }
  3304. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  3305. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  3306. }
  3307. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  3308. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  3309. }
  3310. if (flags & DOMAIN_FLAG_IPSET_IGN) {
  3311. request->domain_rule.rules[DOMAIN_RULE_IPSET] = NULL;
  3312. }
  3313. if (flags & DOMAIN_FLAG_IPSET_IPV4_IGN) {
  3314. request->domain_rule.rules[DOMAIN_RULE_IPSET_IPV4] = NULL;
  3315. }
  3316. if (flags & DOMAIN_FLAG_IPSET_IPV6_IGN) {
  3317. request->domain_rule.rules[DOMAIN_RULE_IPSET_IPV6] = NULL;
  3318. }
  3319. if (flags & DOMAIN_FLAG_NFTSET_IP_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  3320. request->domain_rule.rules[DOMAIN_RULE_NFTSET_IP] = NULL;
  3321. }
  3322. if (flags & DOMAIN_FLAG_NFTSET_IP6_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  3323. request->domain_rule.rules[DOMAIN_RULE_NFTSET_IP6] = NULL;
  3324. }
  3325. if (flags & DOMAIN_FLAG_NAMESERVER_IGNORE) {
  3326. request->domain_rule.rules[DOMAIN_RULE_NAMESERVER] = NULL;
  3327. }
  3328. }
  3329. static int _dns_server_get_rules(unsigned char *key, uint32_t key_len, int is_subkey, void *value, void *arg)
  3330. {
  3331. struct rule_walk_args *walk_args = arg;
  3332. struct dns_request *request = walk_args->args;
  3333. struct dns_domain_rule *domain_rule = value;
  3334. int i = 0;
  3335. if (domain_rule == NULL) {
  3336. return 0;
  3337. }
  3338. /* only subkey rule */
  3339. if (domain_rule->sub_rule_only == 1 && is_subkey == 0) {
  3340. return 0;
  3341. }
  3342. /* only root key rule */
  3343. if (domain_rule->root_rule_only == 1 && is_subkey == 1) {
  3344. return 0;
  3345. }
  3346. for (i = 0; i < DOMAIN_RULE_MAX; i++) {
  3347. if (domain_rule->rules[i] == NULL) {
  3348. continue;
  3349. }
  3350. request->domain_rule.rules[i] = domain_rule->rules[i];
  3351. request->domain_rule.is_sub_rule[i] = is_subkey;
  3352. walk_args->key[i] = key;
  3353. walk_args->key_len[i] = key_len;
  3354. }
  3355. /* update rules by flags */
  3356. _dns_server_update_rule_by_flags(request);
  3357. return 0;
  3358. }
  3359. static void _dns_server_get_domain_rule_by_domain(struct dns_request *request, const char *domain, int out_log)
  3360. {
  3361. int domain_len = 0;
  3362. char domain_key[DNS_MAX_CNAME_LEN];
  3363. int matched_key_len = DNS_MAX_CNAME_LEN;
  3364. unsigned char matched_key[DNS_MAX_CNAME_LEN];
  3365. struct rule_walk_args walk_args;
  3366. int i = 0;
  3367. if (request->skip_domain_rule != 0) {
  3368. return;
  3369. }
  3370. memset(&walk_args, 0, sizeof(walk_args));
  3371. walk_args.args = request;
  3372. /* reverse domain string */
  3373. domain_len = strlen(domain);
  3374. reverse_string(domain_key, domain, domain_len, 1);
  3375. domain_key[domain_len] = '.';
  3376. domain_len++;
  3377. domain_key[domain_len] = 0;
  3378. /* find domain rule */
  3379. art_substring_walk(&dns_conf_domain_rule, (unsigned char *)domain_key, domain_len, _dns_server_get_rules,
  3380. &walk_args);
  3381. if (likely(dns_conf_log_level > TLOG_DEBUG)) {
  3382. return;
  3383. }
  3384. /* output log rule */
  3385. for (i = 0; i < DOMAIN_RULE_MAX; i++) {
  3386. if (walk_args.key[i] == NULL) {
  3387. continue;
  3388. }
  3389. matched_key_len = walk_args.key_len[i];
  3390. if (walk_args.key_len[i] >= sizeof(matched_key)) {
  3391. continue;
  3392. }
  3393. memcpy(matched_key, walk_args.key[i], walk_args.key_len[i]);
  3394. matched_key_len--;
  3395. matched_key[matched_key_len] = 0;
  3396. if (out_log != 0) {
  3397. _dns_server_log_rule(request->domain, i, matched_key, matched_key_len);
  3398. }
  3399. }
  3400. request->skip_domain_rule = 1;
  3401. }
  3402. static void _dns_server_get_domain_rule(struct dns_request *request)
  3403. {
  3404. _dns_server_get_domain_rule_by_domain(request, request->domain, 1);
  3405. }
  3406. static int _dns_server_pre_process_rule_flags(struct dns_request *request)
  3407. {
  3408. struct dns_rule_flags *rule_flag = NULL;
  3409. unsigned int flags = 0;
  3410. int rcode = DNS_RC_NOERROR;
  3411. /* get domain rule flag */
  3412. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3413. if (rule_flag == NULL) {
  3414. if (_dns_server_is_return_soa(request)) {
  3415. goto soa;
  3416. }
  3417. goto out;
  3418. }
  3419. flags = rule_flag->flags;
  3420. if (flags & DOMAIN_FLAG_NO_SERVE_EXPIRED) {
  3421. request->no_serve_expired = 1;
  3422. }
  3423. if ((flags & DOMAIN_FLAG_NO_CACHE) || (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0)) {
  3424. request->no_cache = 1;
  3425. }
  3426. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  3427. /* ignore this domain */
  3428. goto skip_soa_out;
  3429. }
  3430. /* return specific type of address */
  3431. switch (request->qtype) {
  3432. case DNS_T_A:
  3433. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  3434. /* ignore this domain for A request */
  3435. goto skip_soa_out;
  3436. }
  3437. if (_dns_server_is_return_soa(request)) {
  3438. /* return SOA for A request */
  3439. if (_dns_server_is_return_soa_qtype(request, DNS_T_AAAA)) {
  3440. rcode = DNS_RC_NXDOMAIN;
  3441. }
  3442. goto soa;
  3443. }
  3444. break;
  3445. case DNS_T_AAAA:
  3446. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  3447. /* ignore this domain for A request */
  3448. goto skip_soa_out;
  3449. }
  3450. if (_dns_server_is_return_soa(request)) {
  3451. /* return SOA for A request */
  3452. if (_dns_server_is_return_soa_qtype(request, DNS_T_A)) {
  3453. rcode = DNS_RC_NXDOMAIN;
  3454. }
  3455. goto soa;
  3456. }
  3457. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA && request->dualstack_selection) {
  3458. /* if IPV4 return SOA and dualstack-selection enabled, set request dualstack disable */
  3459. request->dualstack_selection = 0;
  3460. }
  3461. break;
  3462. default:
  3463. goto out;
  3464. break;
  3465. }
  3466. if (_dns_server_is_return_soa(request)) {
  3467. goto soa;
  3468. }
  3469. skip_soa_out:
  3470. request->skip_qtype_soa = 1;
  3471. out:
  3472. return -1;
  3473. soa:
  3474. /* return SOA */
  3475. _dns_server_reply_SOA(rcode, request);
  3476. return 0;
  3477. }
  3478. static int _dns_server_get_local_ttl(struct dns_request *request)
  3479. {
  3480. struct dns_ttl_rule *ttl_rule;
  3481. /* get domain rule flag */
  3482. ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  3483. if (ttl_rule != NULL) {
  3484. if (ttl_rule->ttl > 0) {
  3485. return ttl_rule->ttl;
  3486. }
  3487. }
  3488. if (dns_conf_local_ttl > 0) {
  3489. return dns_conf_local_ttl;
  3490. }
  3491. if (dns_conf_rr_ttl > 0) {
  3492. return dns_conf_rr_ttl;
  3493. }
  3494. if (dns_conf_rr_ttl_min > 0) {
  3495. return dns_conf_rr_ttl_min;
  3496. }
  3497. return DNS_SERVER_ADDR_TTL;
  3498. }
  3499. static int _dns_server_address_generate_order(int orders[], int order_num, int max_order_count)
  3500. {
  3501. int i = 0;
  3502. int j = 0;
  3503. int k = 0;
  3504. for (i = 0; i < order_num && i < max_order_count; i++) {
  3505. orders[i] = i;
  3506. }
  3507. for (i = 0; i < order_num && max_order_count; i++) {
  3508. k = rand() % order_num;
  3509. j = rand() % order_num;
  3510. if (j == k) {
  3511. continue;
  3512. }
  3513. int temp = orders[j];
  3514. orders[j] = orders[k];
  3515. orders[k] = temp;
  3516. }
  3517. return 0;
  3518. }
  3519. static int _dns_server_process_address(struct dns_request *request)
  3520. {
  3521. struct dns_rule_address_IPV4 *address_ipv4 = NULL;
  3522. struct dns_rule_address_IPV6 *address_ipv6 = NULL;
  3523. int orders[DNS_MAX_REPLY_IP_NUM];
  3524. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_ADDR) == 0) {
  3525. goto errout;
  3526. }
  3527. /* address /domain/ rule */
  3528. switch (request->qtype) {
  3529. case DNS_T_A:
  3530. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] == NULL) {
  3531. goto errout;
  3532. }
  3533. address_ipv4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV4);
  3534. if (address_ipv4 == NULL) {
  3535. goto errout;
  3536. }
  3537. _dns_server_address_generate_order(orders, address_ipv4->addr_num, DNS_MAX_REPLY_IP_NUM);
  3538. memcpy(request->ip_addr, address_ipv4->ipv4_addr[orders[0]], DNS_RR_A_LEN);
  3539. for (int i = 1; i < address_ipv4->addr_num; i++) {
  3540. int index = orders[i];
  3541. if (index >= address_ipv4->addr_num) {
  3542. continue;
  3543. }
  3544. _dns_ip_address_check_add(request, request->cname, address_ipv4->ipv4_addr[index], DNS_T_A, 1, NULL);
  3545. }
  3546. break;
  3547. case DNS_T_AAAA:
  3548. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] == NULL) {
  3549. goto errout;
  3550. }
  3551. address_ipv6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV6);
  3552. if (address_ipv6 == NULL) {
  3553. goto errout;
  3554. }
  3555. _dns_server_address_generate_order(orders, address_ipv6->addr_num, DNS_MAX_REPLY_IP_NUM);
  3556. memcpy(request->ip_addr, address_ipv6->ipv6_addr[orders[0]], DNS_RR_AAAA_LEN);
  3557. for (int i = 1; i < address_ipv6->addr_num; i++) {
  3558. int index = orders[i];
  3559. if (index >= address_ipv6->addr_num) {
  3560. continue;
  3561. }
  3562. _dns_ip_address_check_add(request, request->cname, address_ipv6->ipv6_addr[index], DNS_T_AAAA, 1, NULL);
  3563. }
  3564. break;
  3565. default:
  3566. goto errout;
  3567. break;
  3568. }
  3569. request->rcode = DNS_RC_NOERROR;
  3570. request->ip_ttl = _dns_server_get_local_ttl(request);
  3571. request->has_ip = 1;
  3572. struct dns_server_post_context context;
  3573. _dns_server_post_context_init(&context, request);
  3574. context.do_reply = 1;
  3575. context.do_audit = 1;
  3576. context.do_ipset = 1;
  3577. context.select_all_best_ip = 1;
  3578. _dns_request_post(&context);
  3579. return 0;
  3580. errout:
  3581. return -1;
  3582. }
  3583. static struct dns_request *_dns_server_new_child_request(struct dns_request *request, const char *domain,
  3584. dns_type_t qtype, child_request_callback child_callback)
  3585. {
  3586. struct dns_request *child_request = NULL;
  3587. child_request = _dns_server_new_request();
  3588. if (child_request == NULL) {
  3589. tlog(TLOG_ERROR, "malloc failed.\n");
  3590. goto errout;
  3591. }
  3592. child_request->server_flags = request->server_flags;
  3593. safe_strncpy(child_request->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  3594. safe_strncpy(child_request->domain, domain, sizeof(child_request->domain));
  3595. child_request->prefetch = request->prefetch;
  3596. child_request->prefetch_expired_domain = request->prefetch_expired_domain;
  3597. child_request->child_callback = child_callback;
  3598. child_request->parent_request = request;
  3599. child_request->qtype = qtype;
  3600. child_request->qclass = request->qclass;
  3601. if (request->has_ecs) {
  3602. memcpy(&child_request->ecs, &request->ecs, sizeof(child_request->ecs));
  3603. child_request->has_ecs = request->has_ecs;
  3604. }
  3605. _dns_server_request_get(request);
  3606. /* reference count is 1 hold by parent request */
  3607. request->child_request = child_request;
  3608. _dns_server_get_domain_rule(child_request);
  3609. return child_request;
  3610. errout:
  3611. if (child_request) {
  3612. _dns_server_request_release(child_request);
  3613. }
  3614. return NULL;
  3615. }
  3616. static int _dns_server_request_copy(struct dns_request *request, struct dns_request *from)
  3617. {
  3618. unsigned long bucket = 0;
  3619. struct dns_ip_address *addr_map = NULL;
  3620. struct hlist_node *tmp = NULL;
  3621. uint32_t key = 0;
  3622. int addr_len = 0;
  3623. request->rcode = from->rcode;
  3624. if (from->has_ip) {
  3625. request->has_ip = 1;
  3626. request->ip_ttl = _dns_server_get_conf_ttl(request, from->ip_ttl);
  3627. request->ping_time = from->ping_time;
  3628. memcpy(request->ip_addr, from->ip_addr, sizeof(request->ip_addr));
  3629. }
  3630. if (from->has_cname) {
  3631. request->has_cname = 1;
  3632. request->ttl_cname = from->ttl_cname;
  3633. safe_strncpy(request->cname, from->cname, sizeof(request->cname));
  3634. }
  3635. if (from->has_soa) {
  3636. request->has_soa = 1;
  3637. memcpy(&request->soa, &from->soa, sizeof(request->soa));
  3638. }
  3639. pthread_mutex_lock(&request->ip_map_lock);
  3640. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  3641. {
  3642. hash_del(&addr_map->node);
  3643. free(addr_map);
  3644. }
  3645. pthread_mutex_unlock(&request->ip_map_lock);
  3646. pthread_mutex_lock(&from->ip_map_lock);
  3647. hash_for_each_safe(from->ip_map, bucket, tmp, addr_map, node)
  3648. {
  3649. struct dns_ip_address *new_addr_map = NULL;
  3650. if (addr_map->addr_type == DNS_T_A) {
  3651. addr_len = DNS_RR_A_LEN;
  3652. } else if (addr_map->addr_type == DNS_T_AAAA) {
  3653. addr_len = DNS_RR_AAAA_LEN;
  3654. } else {
  3655. continue;
  3656. }
  3657. new_addr_map = malloc(sizeof(struct dns_ip_address));
  3658. if (new_addr_map == NULL) {
  3659. tlog(TLOG_ERROR, "malloc failed.\n");
  3660. pthread_mutex_unlock(&from->ip_map_lock);
  3661. return -1;
  3662. }
  3663. memcpy(new_addr_map, addr_map, sizeof(struct dns_ip_address));
  3664. new_addr_map->ping_time = addr_map->ping_time;
  3665. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  3666. key = jhash(&addr_map->addr_type, sizeof(addr_map->addr_type), key);
  3667. pthread_mutex_lock(&request->ip_map_lock);
  3668. hash_add(request->ip_map, &new_addr_map->node, key);
  3669. pthread_mutex_unlock(&request->ip_map_lock);
  3670. }
  3671. pthread_mutex_unlock(&from->ip_map_lock);
  3672. return 0;
  3673. }
  3674. static DNS_CHILD_POST_RESULT _dns_server_process_cname_callback(struct dns_request *request,
  3675. struct dns_request *child_request, int is_first_resp)
  3676. {
  3677. _dns_server_request_copy(request, child_request);
  3678. if (child_request->rcode == DNS_RC_NOERROR && dns_conf_force_no_cname == 0 && child_request->has_soa == 0) {
  3679. safe_strncpy(request->cname, child_request->domain, sizeof(request->cname));
  3680. request->has_cname = 1;
  3681. request->ttl_cname = _dns_server_get_conf_ttl(request, child_request->ip_ttl);
  3682. }
  3683. return DNS_CHILD_POST_SUCCESS;
  3684. }
  3685. static int _dns_server_process_cname_pre(struct dns_request *request)
  3686. {
  3687. struct dns_cname_rule *cname = NULL;
  3688. struct dns_rule_flags *rule_flag = NULL;
  3689. struct dns_request_domain_rule domain_rule;
  3690. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  3691. return 0;
  3692. }
  3693. if (request->has_cname_loop == 1) {
  3694. return 0;
  3695. }
  3696. /* get domain rule flag */
  3697. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3698. if (rule_flag != NULL) {
  3699. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  3700. return 0;
  3701. }
  3702. }
  3703. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  3704. if (cname == NULL) {
  3705. return 0;
  3706. }
  3707. request->skip_domain_rule = 0;
  3708. /* copy child rules */
  3709. memcpy(&domain_rule, &request->domain_rule, sizeof(domain_rule));
  3710. memset(&request->domain_rule, 0, sizeof(request->domain_rule));
  3711. _dns_server_get_domain_rule_by_domain(request, cname->cname, 0);
  3712. request->domain_rule.rules[DOMAIN_RULE_CNAME] = domain_rule.rules[DOMAIN_RULE_CNAME];
  3713. request->domain_rule.is_sub_rule[DOMAIN_RULE_CNAME] = domain_rule.is_sub_rule[DOMAIN_RULE_CNAME];
  3714. request->no_select_possible_ip = 1;
  3715. request->no_cache_cname = 1;
  3716. safe_strncpy(request->cname, cname->cname, sizeof(request->cname));
  3717. return 0;
  3718. }
  3719. static int _dns_server_process_cname(struct dns_request *request)
  3720. {
  3721. struct dns_cname_rule *cname = NULL;
  3722. const char *child_group_name = NULL;
  3723. int ret = 0;
  3724. struct dns_rule_flags *rule_flag = NULL;
  3725. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  3726. return 0;
  3727. }
  3728. if (request->has_cname_loop == 1) {
  3729. return 0;
  3730. }
  3731. /* get domain rule flag */
  3732. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3733. if (rule_flag != NULL) {
  3734. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  3735. return 0;
  3736. }
  3737. }
  3738. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  3739. if (cname == NULL) {
  3740. return 0;
  3741. }
  3742. tlog(TLOG_INFO, "query %s with cname %s", request->domain, cname->cname);
  3743. struct dns_request *child_request =
  3744. _dns_server_new_child_request(request, cname->cname, request->qtype, _dns_server_process_cname_callback);
  3745. if (child_request == NULL) {
  3746. tlog(TLOG_ERROR, "malloc failed.\n");
  3747. return -1;
  3748. }
  3749. /* check cname rule loop */
  3750. struct dns_request *check_request = child_request->parent_request;
  3751. struct dns_cname_rule *child_cname = _dns_server_get_dns_rule(child_request, DOMAIN_RULE_CNAME);
  3752. /* sub domain rule*/
  3753. if (child_cname != NULL && strncmp(child_request->domain, child_cname->cname, DNS_MAX_CNAME_LEN) == 0) {
  3754. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  3755. child_request->has_cname_loop = 1;
  3756. }
  3757. /* loop rule */
  3758. while (check_request != NULL && child_cname != NULL) {
  3759. struct dns_cname_rule *check_cname = _dns_server_get_dns_rule(check_request, DOMAIN_RULE_CNAME);
  3760. if (check_cname == NULL) {
  3761. break;
  3762. }
  3763. if (strstr(child_request->domain, check_request->domain) != NULL &&
  3764. check_request != child_request->parent_request) {
  3765. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  3766. child_request->has_cname_loop = 1;
  3767. break;
  3768. }
  3769. check_request = check_request->parent_request;
  3770. }
  3771. child_group_name = _dns_server_get_request_groupname(child_request);
  3772. if (child_group_name) {
  3773. /* reset dns group and setup child request domain group again when do query.*/
  3774. child_request->dns_group_name[0] = '\0';
  3775. }
  3776. request->request_wait++;
  3777. ret = _dns_server_do_query(child_request, 0);
  3778. if (ret != 0) {
  3779. request->request_wait--;
  3780. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  3781. goto errout;
  3782. }
  3783. _dns_server_request_release_complete(child_request, 0);
  3784. return 1;
  3785. errout:
  3786. if (child_request) {
  3787. request->child_request = NULL;
  3788. _dns_server_request_release(child_request);
  3789. }
  3790. return -1;
  3791. }
  3792. static enum DNS_CHILD_POST_RESULT
  3793. _dns_server_process_dns64_callback(struct dns_request *request, struct dns_request *child_request, int is_first_resp)
  3794. {
  3795. unsigned long bucket = 0;
  3796. struct dns_ip_address *addr_map = NULL;
  3797. struct hlist_node *tmp = NULL;
  3798. uint32_t key = 0;
  3799. int addr_len = 0;
  3800. if (request->has_ip == 1) {
  3801. if (memcmp(request->ip_addr, dns_conf_dns_dns64.prefix, 12) != 0) {
  3802. return DNS_CHILD_POST_SKIP;
  3803. }
  3804. }
  3805. if (child_request->qtype != DNS_T_A) {
  3806. return DNS_CHILD_POST_FAIL;
  3807. }
  3808. if (child_request->has_cname == 1) {
  3809. safe_strncpy(request->cname, child_request->cname, sizeof(request->cname));
  3810. request->has_cname = 1;
  3811. request->ttl_cname = child_request->ttl_cname;
  3812. }
  3813. if (child_request->has_ip == 0) {
  3814. if (child_request->has_soa) {
  3815. memcpy(&request->soa, &child_request->soa, sizeof(struct dns_soa));
  3816. request->has_soa = 1;
  3817. return DNS_CHILD_POST_SUCCESS;
  3818. }
  3819. if (request->has_soa == 0) {
  3820. _dns_server_setup_soa(request);
  3821. request->has_soa = 1;
  3822. }
  3823. return DNS_CHILD_POST_FAIL;
  3824. }
  3825. memcpy(request->ip_addr, dns_conf_dns_dns64.prefix, 16);
  3826. memcpy(request->ip_addr + 12, child_request->ip_addr, 4);
  3827. request->ip_ttl = child_request->ip_ttl;
  3828. request->has_ip = 1;
  3829. request->has_soa = 0;
  3830. request->rcode = child_request->rcode;
  3831. pthread_mutex_lock(&request->ip_map_lock);
  3832. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  3833. {
  3834. hash_del(&addr_map->node);
  3835. free(addr_map);
  3836. }
  3837. pthread_mutex_unlock(&request->ip_map_lock);
  3838. pthread_mutex_lock(&child_request->ip_map_lock);
  3839. hash_for_each_safe(child_request->ip_map, bucket, tmp, addr_map, node)
  3840. {
  3841. struct dns_ip_address *new_addr_map = NULL;
  3842. if (addr_map->addr_type == DNS_T_A) {
  3843. addr_len = DNS_RR_A_LEN;
  3844. } else {
  3845. continue;
  3846. }
  3847. new_addr_map = malloc(sizeof(struct dns_ip_address));
  3848. if (new_addr_map == NULL) {
  3849. tlog(TLOG_ERROR, "malloc failed.\n");
  3850. pthread_mutex_unlock(&child_request->ip_map_lock);
  3851. return DNS_CHILD_POST_FAIL;
  3852. }
  3853. memset(new_addr_map, 0, sizeof(struct dns_ip_address));
  3854. new_addr_map->addr_type = DNS_T_AAAA;
  3855. addr_len = DNS_RR_AAAA_LEN;
  3856. memcpy(new_addr_map->ip_addr, dns_conf_dns_dns64.prefix, 16);
  3857. memcpy(new_addr_map->ip_addr + 12, addr_map->ip_addr, 4);
  3858. new_addr_map->ping_time = addr_map->ping_time;
  3859. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  3860. key = jhash(&new_addr_map->addr_type, sizeof(new_addr_map->addr_type), key);
  3861. pthread_mutex_lock(&request->ip_map_lock);
  3862. hash_add(request->ip_map, &new_addr_map->node, key);
  3863. pthread_mutex_unlock(&request->ip_map_lock);
  3864. }
  3865. pthread_mutex_unlock(&child_request->ip_map_lock);
  3866. if (request->dualstack_selection == 1) {
  3867. return DNS_CHILD_POST_NO_RESPONSE;
  3868. }
  3869. return DNS_CHILD_POST_SUCCESS;
  3870. }
  3871. static int _dns_server_process_dns64(struct dns_request *request)
  3872. {
  3873. if (_dns_server_is_dns64_request(request) == 0) {
  3874. return 0;
  3875. }
  3876. tlog(TLOG_DEBUG, "query %s with dns64", request->domain);
  3877. struct dns_request *child_request =
  3878. _dns_server_new_child_request(request, request->domain, DNS_T_A, _dns_server_process_dns64_callback);
  3879. if (child_request == NULL) {
  3880. tlog(TLOG_ERROR, "malloc failed.\n");
  3881. return -1;
  3882. }
  3883. request->request_wait++;
  3884. int ret = _dns_server_do_query(child_request, 0);
  3885. if (ret != 0) {
  3886. request->request_wait--;
  3887. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  3888. goto errout;
  3889. }
  3890. _dns_server_request_release_complete(child_request, 0);
  3891. return 1;
  3892. errout:
  3893. if (child_request) {
  3894. request->child_request = NULL;
  3895. _dns_server_request_release(child_request);
  3896. }
  3897. return -1;
  3898. }
  3899. static int _dns_server_qtype_soa(struct dns_request *request)
  3900. {
  3901. if (request->skip_qtype_soa || dns_qtype_soa_table == NULL) {
  3902. return -1;
  3903. }
  3904. if (request->qtype >= 0 && request->qtype <= MAX_QTYPE_NUM) {
  3905. int offset = request->qtype / 8;
  3906. int bit = request->qtype % 8;
  3907. if ((dns_qtype_soa_table[offset] & (1 << bit)) == 0) {
  3908. return -1;
  3909. }
  3910. }
  3911. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3912. tlog(TLOG_DEBUG, "force qtype %d soa", request->qtype);
  3913. return 0;
  3914. }
  3915. static void _dns_server_process_speed_rule(struct dns_request *request)
  3916. {
  3917. struct dns_domain_check_orders *check_order = NULL;
  3918. struct dns_response_mode_rule *response_mode = NULL;
  3919. /* get speed check mode */
  3920. check_order = _dns_server_get_dns_rule(request, DOMAIN_RULE_CHECKSPEED);
  3921. if (check_order != NULL) {
  3922. request->check_order_list = check_order;
  3923. }
  3924. /* get response mode */
  3925. response_mode = _dns_server_get_dns_rule(request, DOMAIN_RULE_RESPONSE_MODE);
  3926. if (response_mode != NULL) {
  3927. request->response_mode = response_mode->mode;
  3928. }
  3929. }
  3930. static int _dns_server_get_expired_ttl_reply(struct dns_cache *dns_cache)
  3931. {
  3932. int ttl = dns_cache_get_ttl(dns_cache);
  3933. if (ttl > 0) {
  3934. return ttl;
  3935. }
  3936. return dns_conf_serve_expired_reply_ttl;
  3937. }
  3938. static int _dns_server_get_expired_cname_ttl_reply(struct dns_cache *dns_cache)
  3939. {
  3940. int ttl = dns_cache_get_cname_ttl(dns_cache);
  3941. if (ttl > 0) {
  3942. return ttl;
  3943. }
  3944. return _dns_server_get_expired_ttl_reply(dns_cache);
  3945. }
  3946. static int _dns_server_process_cache_addr(struct dns_request *request, struct dns_cache *dns_cache)
  3947. {
  3948. struct dns_cache_addr *cache_addr = (struct dns_cache_addr *)dns_cache_get_data(dns_cache);
  3949. if (cache_addr->head.cache_type != CACHE_TYPE_ADDR) {
  3950. goto errout;
  3951. }
  3952. /* Cache hits, returning results in the cache */
  3953. switch (request->qtype) {
  3954. case DNS_T_A:
  3955. memcpy(request->ip_addr, cache_addr->addr_data.ipv4_addr, DNS_RR_A_LEN);
  3956. break;
  3957. case DNS_T_AAAA:
  3958. memcpy(request->ip_addr, cache_addr->addr_data.ipv6_addr, DNS_RR_AAAA_LEN);
  3959. break;
  3960. default:
  3961. goto errout;
  3962. break;
  3963. }
  3964. request->ip_ttl = _dns_server_get_expired_ttl_reply(dns_cache);
  3965. request->has_ip = 1;
  3966. if (cache_addr->addr_data.cname[0] != 0) {
  3967. safe_strncpy(request->cname, cache_addr->addr_data.cname, DNS_MAX_CNAME_LEN);
  3968. request->has_cname = 1;
  3969. request->ttl_cname = _dns_server_get_expired_cname_ttl_reply(dns_cache);
  3970. }
  3971. request->rcode = DNS_RC_NOERROR;
  3972. struct dns_server_post_context context;
  3973. _dns_server_post_context_init(&context, request);
  3974. context.do_reply = 1;
  3975. context.do_audit = 1;
  3976. context.do_ipset = 1;
  3977. _dns_request_post(&context);
  3978. return 0;
  3979. errout:
  3980. return -1;
  3981. }
  3982. static int _dns_server_process_cache_packet(struct dns_request *request, struct dns_cache *dns_cache)
  3983. {
  3984. struct dns_cache_packet *cache_packet = (struct dns_cache_packet *)dns_cache_get_data(dns_cache);
  3985. int do_ipset = (dns_cache_get_ttl(dns_cache) == 0);
  3986. if (cache_packet->head.cache_type != CACHE_TYPE_PACKET) {
  3987. return -1;
  3988. }
  3989. if (dns_cache_is_visited(dns_cache) == 0) {
  3990. do_ipset = 1;
  3991. }
  3992. if (dns_cache->info.qtype != request->qtype) {
  3993. return -1;
  3994. }
  3995. struct dns_server_post_context context;
  3996. _dns_server_post_context_init(&context, request);
  3997. context.inpacket = cache_packet->data;
  3998. context.inpacket_len = cache_packet->head.size;
  3999. request->ping_time = dns_cache->info.speed;
  4000. if (dns_decode(context.packet, context.packet_maxlen, cache_packet->data, cache_packet->head.size) != 0) {
  4001. tlog(TLOG_ERROR, "decode cache failed, %d, %d", context.packet_maxlen, context.inpacket_len);
  4002. return -1;
  4003. }
  4004. request->rcode = context.packet->head.rcode;
  4005. context.do_cache = 0;
  4006. context.do_ipset = do_ipset;
  4007. context.do_audit = 1;
  4008. context.do_reply = 1;
  4009. context.reply_ttl = _dns_server_get_expired_ttl_reply(dns_cache);
  4010. return _dns_server_reply_passthrough(&context);
  4011. }
  4012. static int _dns_server_process_cache_data(struct dns_request *request, struct dns_cache *dns_cache)
  4013. {
  4014. enum CACHE_TYPE cache_type = CACHE_TYPE_NONE;
  4015. int ret = -1;
  4016. cache_type = dns_cache_data_type(dns_cache->cache_data);
  4017. request->ping_time = dns_cache->info.speed;
  4018. switch (cache_type) {
  4019. case CACHE_TYPE_ADDR:
  4020. ret = _dns_server_process_cache_addr(request, dns_cache);
  4021. if (ret != 0) {
  4022. goto out;
  4023. }
  4024. break;
  4025. case CACHE_TYPE_PACKET:
  4026. ret = _dns_server_process_cache_packet(request, dns_cache);
  4027. if (ret != 0) {
  4028. goto out;
  4029. }
  4030. break;
  4031. default:
  4032. goto out;
  4033. break;
  4034. }
  4035. return 0;
  4036. out:
  4037. return -1;
  4038. }
  4039. static int _dns_server_process_cache(struct dns_request *request)
  4040. {
  4041. struct dns_cache *dns_cache = NULL;
  4042. struct dns_cache *dualstack_dns_cache = NULL;
  4043. int ret = -1;
  4044. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0) {
  4045. goto out;
  4046. }
  4047. struct dns_cache_key cache_key;
  4048. cache_key.dns_group_name = request->dns_group_name;
  4049. cache_key.domain = request->domain;
  4050. cache_key.qtype = request->qtype;
  4051. cache_key.query_flag = request->server_flags;
  4052. dns_cache = dns_cache_lookup(&cache_key);
  4053. if (dns_cache == NULL) {
  4054. goto out;
  4055. }
  4056. if (request->qtype != dns_cache->info.qtype) {
  4057. goto out;
  4058. }
  4059. if (request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  4060. goto reply_cache;
  4061. }
  4062. if (request->dualstack_selection) {
  4063. int dualstack_qtype = 0;
  4064. if (request->qtype == DNS_T_A) {
  4065. dualstack_qtype = DNS_T_AAAA;
  4066. } else if (request->qtype == DNS_T_AAAA) {
  4067. dualstack_qtype = DNS_T_A;
  4068. } else {
  4069. goto out;
  4070. }
  4071. cache_key.qtype = dualstack_qtype;
  4072. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  4073. if (dualstack_dns_cache == NULL && request->cname[0] != '\0') {
  4074. cache_key.domain = request->cname;
  4075. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  4076. }
  4077. if (dualstack_dns_cache && dns_cache_is_soa(dualstack_dns_cache) == 0 &&
  4078. (dualstack_dns_cache->info.speed > 0)) {
  4079. if (dns_cache_is_soa(dns_cache)) {
  4080. ret = _dns_server_process_cache_packet(request, dns_cache);
  4081. goto out_update_cache;
  4082. }
  4083. if ((dualstack_dns_cache->info.speed + (dns_conf_dualstack_ip_selection_threshold * 10)) <
  4084. dns_cache->info.speed ||
  4085. dns_cache->info.speed < 0) {
  4086. tlog(TLOG_DEBUG, "cache result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d",
  4087. request->domain, request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id,
  4088. dns_cache->info.speed, dualstack_dns_cache->info.speed);
  4089. request->ip_ttl = _dns_server_get_expired_ttl_reply(dualstack_dns_cache);
  4090. ret = _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4091. goto out_update_cache;
  4092. }
  4093. }
  4094. }
  4095. reply_cache:
  4096. if (dns_cache_is_soa(dns_cache)) {
  4097. if (dns_cache_get_ttl(dns_cache) > 0) {
  4098. ret = _dns_server_process_cache_packet(request, dns_cache);
  4099. }
  4100. goto out;
  4101. }
  4102. if (dns_cache_get_ttl(dns_cache) <= 0 && request->no_serve_expired == 1) {
  4103. goto out;
  4104. }
  4105. ret = _dns_server_process_cache_data(request, dns_cache);
  4106. if (ret != 0) {
  4107. goto out;
  4108. }
  4109. out_update_cache:
  4110. if (dns_cache_get_ttl(dns_cache) == 0) {
  4111. struct dns_server_query_option dns_query_options;
  4112. dns_query_options.server_flags = request->server_flags;
  4113. dns_query_options.dns_group_name = request->dns_group_name;
  4114. if (request->conn == NULL) {
  4115. dns_query_options.server_flags = dns_cache_get_query_flag(dns_cache);
  4116. dns_query_options.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  4117. }
  4118. dns_query_options.ecs_enable_flag = 0;
  4119. if (request->has_ecs) {
  4120. dns_query_options.ecs_enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  4121. memcpy(&dns_query_options.ecs_dns, &request->ecs, sizeof(dns_query_options.ecs_dns));
  4122. }
  4123. _dns_server_prefetch_request(request->domain, request->qtype, 0, &dns_query_options);
  4124. } else {
  4125. dns_cache_update(dns_cache);
  4126. }
  4127. out:
  4128. if (dns_cache) {
  4129. dns_cache_release(dns_cache);
  4130. }
  4131. if (dualstack_dns_cache) {
  4132. dns_cache_release(dualstack_dns_cache);
  4133. dualstack_dns_cache = NULL;
  4134. }
  4135. return ret;
  4136. }
  4137. void dns_server_check_ipv6_ready(void)
  4138. {
  4139. static int do_get_conf = 0;
  4140. static int is_icmp_check_set;
  4141. static int is_tcp_check_set;
  4142. int i = 0;
  4143. if (do_get_conf == 0) {
  4144. for (i = 0; i < DOMAIN_CHECK_NUM; i++) {
  4145. if (dns_conf_check_orders.orders[i].type == DOMAIN_CHECK_ICMP) {
  4146. is_icmp_check_set = 1;
  4147. }
  4148. if (dns_conf_check_orders.orders[i].type == DOMAIN_CHECK_TCP) {
  4149. is_tcp_check_set = 1;
  4150. }
  4151. }
  4152. if (is_icmp_check_set == 0) {
  4153. tlog(TLOG_INFO, "ICMP ping is disabled, no ipv6 icmp check feature");
  4154. }
  4155. do_get_conf = 1;
  4156. }
  4157. if (is_icmp_check_set) {
  4158. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_ICMP, "2001::", 1, 0, 100, NULL, NULL);
  4159. if (check_ping) {
  4160. fast_ping_stop(check_ping);
  4161. is_ipv6_ready = 1;
  4162. return;
  4163. }
  4164. if (errno == EADDRNOTAVAIL) {
  4165. is_ipv6_ready = 0;
  4166. return;
  4167. }
  4168. }
  4169. if (is_tcp_check_set) {
  4170. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_TCP, "2001::", 1, 0, 100, NULL, NULL);
  4171. if (check_ping) {
  4172. fast_ping_stop(check_ping);
  4173. is_ipv6_ready = 1;
  4174. return;
  4175. }
  4176. if (errno == EADDRNOTAVAIL) {
  4177. is_ipv6_ready = 0;
  4178. return;
  4179. }
  4180. }
  4181. }
  4182. static void _dns_server_request_set_client(struct dns_request *request, struct dns_server_conn_head *conn)
  4183. {
  4184. request->conn = conn;
  4185. request->server_flags = conn->server_flags;
  4186. _dns_server_conn_get(conn);
  4187. }
  4188. static void _dns_server_request_set_id(struct dns_request *request, unsigned short id)
  4189. {
  4190. request->id = id;
  4191. }
  4192. static void _dns_server_request_set_enable_prefetch(struct dns_request *request, int expired_domain)
  4193. {
  4194. request->prefetch = 1;
  4195. request->prefetch_expired_domain = expired_domain;
  4196. }
  4197. static int _dns_server_request_set_client_addr(struct dns_request *request, struct sockaddr_storage *from,
  4198. socklen_t from_len)
  4199. {
  4200. switch (from->ss_family) {
  4201. case AF_INET:
  4202. memcpy(&request->in, from, from_len);
  4203. request->addr_len = from_len;
  4204. break;
  4205. case AF_INET6:
  4206. memcpy(&request->in6, from, from_len);
  4207. request->addr_len = from_len;
  4208. break;
  4209. default:
  4210. return -1;
  4211. break;
  4212. }
  4213. return 0;
  4214. }
  4215. static void _dns_server_request_set_callback(struct dns_request *request, dns_result_callback callback, void *user_ptr)
  4216. {
  4217. request->result_callback = callback;
  4218. request->user_ptr = user_ptr;
  4219. }
  4220. static int _dns_server_process_smartdns_domain(struct dns_request *request)
  4221. {
  4222. struct dns_rule_flags *rule_flag = NULL;
  4223. unsigned int flags = 0;
  4224. /* get domain rule flag */
  4225. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  4226. if (rule_flag == NULL) {
  4227. return -1;
  4228. }
  4229. if (_dns_server_is_dns_rule_extract_match(request, DOMAIN_RULE_FLAGS) == 0) {
  4230. return -1;
  4231. }
  4232. flags = rule_flag->flags;
  4233. if (!(flags & DOMAIN_FLAG_SMARTDNS_DOMAIN)) {
  4234. return -1;
  4235. }
  4236. return _dns_server_reply_request_eth_ip(request);
  4237. }
  4238. static int _dns_server_process_special_query(struct dns_request *request)
  4239. {
  4240. int ret = 0;
  4241. switch (request->qtype) {
  4242. case DNS_T_PTR:
  4243. /* return PTR record */
  4244. ret = _dns_server_process_ptr(request);
  4245. if (ret == 0) {
  4246. goto clean_exit;
  4247. } else {
  4248. /* pass to upstream server */
  4249. request->passthrough = 1;
  4250. }
  4251. break;
  4252. case DNS_T_A:
  4253. break;
  4254. case DNS_T_AAAA:
  4255. break;
  4256. default:
  4257. tlog(TLOG_DEBUG, "unsupported qtype: %d, domain: %s", request->qtype, request->domain);
  4258. request->passthrough = 1;
  4259. /* pass request to upstream server */
  4260. break;
  4261. }
  4262. return -1;
  4263. clean_exit:
  4264. return 0;
  4265. }
  4266. static const char *_dns_server_get_request_groupname(struct dns_request *request)
  4267. {
  4268. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_NAMESERVER) == 0) {
  4269. return NULL;
  4270. }
  4271. /* Get the nameserver rule */
  4272. if (request->domain_rule.rules[DOMAIN_RULE_NAMESERVER]) {
  4273. struct dns_nameserver_rule *nameserver_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_NAMESERVER);
  4274. return nameserver_rule->group_name;
  4275. }
  4276. return NULL;
  4277. }
  4278. static void _dns_server_check_set_passthrough(struct dns_request *request)
  4279. {
  4280. if (request->check_order_list->orders[0].type == DOMAIN_CHECK_NONE) {
  4281. request->passthrough = 1;
  4282. }
  4283. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_SPEED_CHECK) == 0) {
  4284. request->passthrough = 1;
  4285. }
  4286. if (is_ipv6_ready == 0 && request->qtype == DNS_T_AAAA) {
  4287. request->passthrough = 1;
  4288. }
  4289. if (request->passthrough == 1) {
  4290. request->dualstack_selection = 0;
  4291. }
  4292. if (request->passthrough == 1 && (request->qtype == DNS_T_A || request->qtype == DNS_T_AAAA)) {
  4293. request->passthrough = 2;
  4294. }
  4295. }
  4296. static int _dns_server_process_host(struct dns_request *request)
  4297. {
  4298. uint32_t key = 0;
  4299. struct dns_hosts *host = NULL;
  4300. struct dns_hosts *host_tmp = NULL;
  4301. int dns_type = request->qtype;
  4302. char hostname_lower[DNS_MAX_CNAME_LEN];
  4303. if (dns_hosts_record_num <= 0) {
  4304. return -1;
  4305. }
  4306. key = hash_string(to_lower_case(hostname_lower, request->domain, DNS_MAX_CNAME_LEN));
  4307. key = jhash(&dns_type, sizeof(dns_type), key);
  4308. hash_for_each_possible(dns_hosts_table.hosts, host_tmp, node, key)
  4309. {
  4310. if (host_tmp->dns_type != dns_type) {
  4311. continue;
  4312. }
  4313. if (strncmp(host_tmp->domain, hostname_lower, DNS_MAX_CNAME_LEN) != 0) {
  4314. continue;
  4315. }
  4316. host = host_tmp;
  4317. break;
  4318. }
  4319. if (host == NULL) {
  4320. return -1;
  4321. }
  4322. if (host->is_soa) {
  4323. request->has_soa = 1;
  4324. return _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4325. }
  4326. switch (request->qtype) {
  4327. case DNS_T_A:
  4328. memcpy(request->ip_addr, host->ipv4_addr, DNS_RR_A_LEN);
  4329. break;
  4330. case DNS_T_AAAA:
  4331. memcpy(request->ip_addr, host->ipv6_addr, DNS_RR_AAAA_LEN);
  4332. break;
  4333. default:
  4334. goto errout;
  4335. break;
  4336. }
  4337. request->rcode = DNS_RC_NOERROR;
  4338. request->ip_ttl = dns_conf_local_ttl;
  4339. request->has_ip = 1;
  4340. struct dns_server_post_context context;
  4341. _dns_server_post_context_init(&context, request);
  4342. context.do_reply = 1;
  4343. context.do_audit = 1;
  4344. _dns_request_post(&context);
  4345. return 0;
  4346. errout:
  4347. return -1;
  4348. }
  4349. static int _dns_server_setup_query_option(struct dns_request *request, struct dns_query_options *options)
  4350. {
  4351. options->enable_flag = 0;
  4352. if (request->has_ecs) {
  4353. memcpy(&options->ecs_dns, &request->ecs, sizeof(options->ecs_dns));
  4354. options->enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  4355. }
  4356. return 0;
  4357. }
  4358. static int _dns_server_query_dualstack(struct dns_request *request)
  4359. {
  4360. int ret = -1;
  4361. struct dns_request *request_dualstack = NULL;
  4362. dns_type_t qtype = request->qtype;
  4363. if (request->dualstack_selection == 0) {
  4364. return 0;
  4365. }
  4366. if (qtype == DNS_T_A) {
  4367. qtype = DNS_T_AAAA;
  4368. } else if (qtype == DNS_T_AAAA) {
  4369. qtype = DNS_T_A;
  4370. } else {
  4371. return 0;
  4372. }
  4373. request_dualstack = _dns_server_new_request();
  4374. if (request_dualstack == NULL) {
  4375. tlog(TLOG_ERROR, "malloc failed.\n");
  4376. goto errout;
  4377. }
  4378. request_dualstack->server_flags = request->server_flags;
  4379. safe_strncpy(request_dualstack->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  4380. safe_strncpy(request_dualstack->domain, request->domain, sizeof(request->domain));
  4381. request_dualstack->qtype = qtype;
  4382. request_dualstack->dualstack_selection_query = 1;
  4383. request_dualstack->has_cname_loop = request->has_cname_loop;
  4384. request_dualstack->prefetch = request->prefetch;
  4385. request_dualstack->prefetch_expired_domain = request->prefetch_expired_domain;
  4386. _dns_server_request_get(request);
  4387. request_dualstack->dualstack_request = request;
  4388. _dns_server_request_set_callback(request_dualstack, dns_server_dualstack_callback, request);
  4389. request->request_wait++;
  4390. ret = _dns_server_do_query(request_dualstack, 0);
  4391. if (ret != 0) {
  4392. request->request_wait--;
  4393. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, qtype);
  4394. goto errout;
  4395. }
  4396. _dns_server_request_release(request_dualstack);
  4397. return ret;
  4398. errout:
  4399. if (request_dualstack) {
  4400. _dns_server_request_set_callback(request_dualstack, NULL, NULL);
  4401. _dns_server_request_release(request_dualstack);
  4402. }
  4403. _dns_server_request_release(request);
  4404. return ret;
  4405. }
  4406. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event)
  4407. {
  4408. int ret = -1;
  4409. const char *group_name = NULL;
  4410. const char *dns_group = NULL;
  4411. struct dns_query_options options;
  4412. if (request->conn) {
  4413. dns_group = request->conn->dns_group;
  4414. }
  4415. request->send_tick = get_tick_count();
  4416. /* lookup domain rule */
  4417. _dns_server_get_domain_rule(request);
  4418. group_name = request->dns_group_name;
  4419. if (request->dns_group_name[0] == '\0') {
  4420. group_name = _dns_server_get_request_groupname(request);
  4421. if (group_name == NULL) {
  4422. group_name = dns_group;
  4423. }
  4424. safe_strncpy(request->dns_group_name, group_name, DNS_GROUP_NAME_LEN);
  4425. }
  4426. if (_dns_server_process_cname_pre(request) != 0) {
  4427. goto errout;
  4428. }
  4429. _dns_server_set_dualstack_selection(request);
  4430. if (_dns_server_process_special_query(request) == 0) {
  4431. goto clean_exit;
  4432. }
  4433. /* process domain flag */
  4434. if (_dns_server_pre_process_rule_flags(request) == 0) {
  4435. goto clean_exit;
  4436. }
  4437. /* process domain address */
  4438. if (_dns_server_process_address(request) == 0) {
  4439. goto clean_exit;
  4440. }
  4441. if (_dns_server_process_smartdns_domain(request) == 0) {
  4442. goto clean_exit;
  4443. }
  4444. if (_dns_server_process_host(request) == 0) {
  4445. goto clean_exit;
  4446. }
  4447. /* process qtype soa */
  4448. if (_dns_server_qtype_soa(request) == 0) {
  4449. goto clean_exit;
  4450. }
  4451. /* process speed check rule */
  4452. _dns_server_process_speed_rule(request);
  4453. /* check and set passthrough */
  4454. _dns_server_check_set_passthrough(request);
  4455. /* process cache */
  4456. if (request->prefetch == 0 && request->dualstack_selection_query == 0) {
  4457. if (_dns_server_process_cache(request) == 0) {
  4458. goto clean_exit;
  4459. }
  4460. }
  4461. ret = _dns_server_set_to_pending_list(request);
  4462. if (ret == 0) {
  4463. goto clean_exit;
  4464. }
  4465. if (_dns_server_process_cname(request) != 0) {
  4466. goto clean_exit;
  4467. }
  4468. // setup options
  4469. _dns_server_setup_query_option(request, &options);
  4470. pthread_mutex_lock(&server.request_list_lock);
  4471. if (list_empty(&server.request_list) && skip_notify_event == 1) {
  4472. _dns_server_wakeup_thread();
  4473. }
  4474. list_add_tail(&request->list, &server.request_list);
  4475. pthread_mutex_unlock(&server.request_list_lock);
  4476. // Get reference for DNS query
  4477. request->request_wait++;
  4478. _dns_server_request_get(request);
  4479. if (dns_client_query(request->domain, request->qtype, dns_server_resolve_callback, request, group_name, &options) !=
  4480. 0) {
  4481. request->request_wait--;
  4482. _dns_server_request_release(request);
  4483. tlog(TLOG_DEBUG, "send dns request failed.");
  4484. goto errout;
  4485. }
  4486. /* When the dual stack ip preference is enabled, both A and AAAA records are requested. */
  4487. _dns_server_query_dualstack(request);
  4488. if (_dns_server_process_dns64(request) != 0) {
  4489. goto clean_exit;
  4490. }
  4491. clean_exit:
  4492. return 0;
  4493. errout:
  4494. request = NULL;
  4495. return ret;
  4496. }
  4497. static int _dns_server_check_request_supported(struct dns_request *request, struct dns_packet *packet)
  4498. {
  4499. if (request->qclass != DNS_C_IN) {
  4500. return -1;
  4501. }
  4502. if (packet->head.opcode != DNS_OP_QUERY) {
  4503. return -1;
  4504. }
  4505. return 0;
  4506. }
  4507. static int _dns_server_parser_request(struct dns_request *request, struct dns_packet *packet)
  4508. {
  4509. struct dns_rrs *rrs = NULL;
  4510. int rr_count = 0;
  4511. int i = 0;
  4512. int ret = 0;
  4513. int qclass = 0;
  4514. int qtype = DNS_T_ALL;
  4515. char domain[DNS_MAX_CNAME_LEN];
  4516. if (packet->head.qr != DNS_QR_QUERY) {
  4517. goto errout;
  4518. }
  4519. /* get request domain and request qtype */
  4520. rrs = dns_get_rrs_start(packet, DNS_RRS_QD, &rr_count);
  4521. if (rr_count > 1 || rr_count <= 0) {
  4522. goto errout;
  4523. }
  4524. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  4525. ret = dns_get_domain(rrs, domain, sizeof(domain), &qtype, &qclass);
  4526. if (ret != 0) {
  4527. goto errout;
  4528. }
  4529. // Only support one question.
  4530. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4531. request->qtype = qtype;
  4532. break;
  4533. }
  4534. request->qclass = qclass;
  4535. if (_dns_server_check_request_supported(request, packet) != 0) {
  4536. goto errout;
  4537. }
  4538. /* get request opts */
  4539. rr_count = 0;
  4540. rrs = dns_get_rrs_start(packet, DNS_RRS_OPT, &rr_count);
  4541. if (rr_count <= 0) {
  4542. return 0;
  4543. }
  4544. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  4545. ret = dns_get_OPT_ECS(rrs, NULL, NULL, &request->ecs);
  4546. if (ret != 0) {
  4547. continue;
  4548. }
  4549. request->has_ecs = 1;
  4550. break;
  4551. }
  4552. return 0;
  4553. errout:
  4554. request->rcode = DNS_RC_NOTIMP;
  4555. return -1;
  4556. }
  4557. static int _dns_server_recv(struct dns_server_conn_head *conn, unsigned char *inpacket, int inpacket_len,
  4558. struct sockaddr_storage *local, socklen_t local_len, struct sockaddr_storage *from,
  4559. socklen_t from_len)
  4560. {
  4561. int decode_len = 0;
  4562. int ret = -1;
  4563. unsigned char packet_buff[DNS_PACKSIZE];
  4564. char name[DNS_MAX_CNAME_LEN];
  4565. struct dns_packet *packet = (struct dns_packet *)packet_buff;
  4566. struct dns_request *request = NULL;
  4567. /* decode packet */
  4568. tlog(TLOG_DEBUG, "recv query packet from %s, len = %d, type = %d",
  4569. get_host_by_addr(name, sizeof(name), (struct sockaddr *)from), inpacket_len, conn->type);
  4570. decode_len = dns_decode(packet, DNS_PACKSIZE, inpacket, inpacket_len);
  4571. if (decode_len < 0) {
  4572. tlog(TLOG_DEBUG, "decode failed.\n");
  4573. ret = RECV_ERROR_INVALID_PACKET;
  4574. if (dns_save_fail_packet) {
  4575. dns_packet_save(dns_save_fail_packet_dir, "server", name, inpacket, inpacket_len);
  4576. }
  4577. goto errout;
  4578. }
  4579. tlog(TLOG_DEBUG,
  4580. "request qdcount = %d, ancount = %d, nscount = %d, nrcount = %d, len = %d, id = %d, tc = %d, rd = %d, ra = "
  4581. "%d, rcode = %d\n",
  4582. packet->head.qdcount, packet->head.ancount, packet->head.nscount, packet->head.nrcount, inpacket_len,
  4583. packet->head.id, packet->head.tc, packet->head.rd, packet->head.ra, packet->head.rcode);
  4584. request = _dns_server_new_request();
  4585. if (request == NULL) {
  4586. tlog(TLOG_ERROR, "malloc failed.\n");
  4587. goto errout;
  4588. }
  4589. memcpy(&request->localaddr, local, local_len);
  4590. _dns_server_request_set_client(request, conn);
  4591. _dns_server_request_set_client_addr(request, from, from_len);
  4592. _dns_server_request_set_id(request, packet->head.id);
  4593. if (_dns_server_parser_request(request, packet) != 0) {
  4594. tlog(TLOG_DEBUG, "parser request failed.");
  4595. ret = RECV_ERROR_INVALID_PACKET;
  4596. goto errout;
  4597. }
  4598. tlog(TLOG_DEBUG, "query %s from %s, qtype: %d, id: %d\n", request->domain, name, request->qtype, request->id);
  4599. ret = _dns_server_do_query(request, 1);
  4600. if (ret != 0) {
  4601. tlog(TLOG_DEBUG, "do query %s failed.\n", request->domain);
  4602. goto errout;
  4603. }
  4604. _dns_server_request_release_complete(request, 0);
  4605. return ret;
  4606. errout:
  4607. if (request) {
  4608. _dns_server_forward_request(inpacket, inpacket_len);
  4609. _dns_server_request_release(request);
  4610. }
  4611. return ret;
  4612. }
  4613. static int _dns_server_setup_server_query_options(struct dns_request *request,
  4614. struct dns_server_query_option *server_query_option)
  4615. {
  4616. if (server_query_option == NULL) {
  4617. return 0;
  4618. }
  4619. request->server_flags = server_query_option->server_flags;
  4620. if (server_query_option->dns_group_name) {
  4621. safe_strncpy(request->dns_group_name, server_query_option->dns_group_name, DNS_GROUP_NAME_LEN);
  4622. }
  4623. if (server_query_option->ecs_enable_flag & DNS_QUEY_OPTION_ECS_DNS) {
  4624. request->has_ecs = 1;
  4625. memcpy(&request->ecs, &server_query_option->ecs_dns, sizeof(request->ecs));
  4626. }
  4627. return 0;
  4628. }
  4629. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype, int expired_domain,
  4630. struct dns_server_query_option *server_query_option)
  4631. {
  4632. int ret = -1;
  4633. struct dns_request *request = NULL;
  4634. request = _dns_server_new_request();
  4635. if (request == NULL) {
  4636. tlog(TLOG_ERROR, "malloc failed.\n");
  4637. goto errout;
  4638. }
  4639. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4640. request->qtype = qtype;
  4641. _dns_server_setup_server_query_options(request, server_query_option);
  4642. _dns_server_request_set_enable_prefetch(request, expired_domain);
  4643. ret = _dns_server_do_query(request, 0);
  4644. if (ret != 0) {
  4645. tlog(TLOG_DEBUG, "prefetch do query %s failed.\n", request->domain);
  4646. goto errout;
  4647. }
  4648. _dns_server_request_release(request);
  4649. return ret;
  4650. errout:
  4651. if (request) {
  4652. _dns_server_request_release(request);
  4653. }
  4654. return ret;
  4655. }
  4656. int dns_server_query(const char *domain, int qtype, struct dns_server_query_option *server_query_option,
  4657. dns_result_callback callback, void *user_ptr)
  4658. {
  4659. int ret = -1;
  4660. struct dns_request *request = NULL;
  4661. request = _dns_server_new_request();
  4662. if (request == NULL) {
  4663. tlog(TLOG_ERROR, "malloc failed.\n");
  4664. goto errout;
  4665. }
  4666. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4667. request->qtype = qtype;
  4668. _dns_server_setup_server_query_options(request, server_query_option);
  4669. _dns_server_request_set_callback(request, callback, user_ptr);
  4670. ret = _dns_server_do_query(request, 0);
  4671. if (ret != 0) {
  4672. tlog(TLOG_ERROR, "do query %s failed.\n", domain);
  4673. goto errout;
  4674. }
  4675. _dns_server_request_release_complete(request, 0);
  4676. return ret;
  4677. errout:
  4678. if (request) {
  4679. _dns_server_request_set_callback(request, NULL, NULL);
  4680. _dns_server_request_release(request);
  4681. }
  4682. return ret;
  4683. }
  4684. static int _dns_server_process_udp_one(struct dns_server_conn_udp *udpconn, struct epoll_event *event,
  4685. unsigned long now)
  4686. {
  4687. int len = 0;
  4688. unsigned char inpacket[DNS_IN_PACKSIZE];
  4689. struct sockaddr_storage from;
  4690. socklen_t from_len = sizeof(from);
  4691. struct sockaddr_storage local;
  4692. socklen_t local_len = sizeof(local);
  4693. struct msghdr msg;
  4694. struct iovec iov;
  4695. char ans_data[4096];
  4696. struct cmsghdr *cmsg = NULL;
  4697. memset(&msg, 0, sizeof(msg));
  4698. iov.iov_base = (char *)inpacket;
  4699. iov.iov_len = sizeof(inpacket);
  4700. msg.msg_name = &from;
  4701. msg.msg_namelen = sizeof(from);
  4702. msg.msg_iov = &iov;
  4703. msg.msg_iovlen = 1;
  4704. msg.msg_control = ans_data;
  4705. msg.msg_controllen = sizeof(ans_data);
  4706. len = recvmsg(udpconn->head.fd, &msg, MSG_DONTWAIT);
  4707. if (len < 0) {
  4708. if (errno == EAGAIN || errno == EWOULDBLOCK) {
  4709. return -2;
  4710. }
  4711. tlog(TLOG_ERROR, "recvfrom failed, %s\n", strerror(errno));
  4712. return -1;
  4713. }
  4714. from_len = msg.msg_namelen;
  4715. for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
  4716. if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO) {
  4717. const struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  4718. unsigned char *addr = (unsigned char *)&pktinfo->ipi_addr.s_addr;
  4719. fill_sockaddr_by_ip(addr, sizeof(in_addr_t), 0, (struct sockaddr *)&local, &local_len);
  4720. } else if (cmsg->cmsg_level == IPPROTO_IPV6 && cmsg->cmsg_type == IPV6_PKTINFO) {
  4721. const struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  4722. unsigned char *addr = (unsigned char *)pktinfo->ipi6_addr.s6_addr;
  4723. fill_sockaddr_by_ip(addr, sizeof(struct in6_addr), 0, (struct sockaddr *)&local, &local_len);
  4724. }
  4725. }
  4726. return _dns_server_recv(&udpconn->head, inpacket, len, &local, local_len, &from, from_len);
  4727. }
  4728. static int _dns_server_process_udp(struct dns_server_conn_udp *udpconn, struct epoll_event *event, unsigned long now)
  4729. {
  4730. int count = 0;
  4731. while (count < 32) {
  4732. int ret = _dns_server_process_udp_one(udpconn, event, now);
  4733. if (ret != 0) {
  4734. if (ret == -2) {
  4735. return 0;
  4736. }
  4737. return ret;
  4738. }
  4739. count++;
  4740. }
  4741. return 0;
  4742. }
  4743. static void _dns_server_client_touch(struct dns_server_conn_head *conn)
  4744. {
  4745. time(&conn->last_request_time);
  4746. }
  4747. static int _dns_server_client_close(struct dns_server_conn_head *conn)
  4748. {
  4749. if (conn->fd > 0) {
  4750. _dns_server_epoll_ctl(conn, EPOLL_CTL_DEL, 0);
  4751. close(conn->fd);
  4752. conn->fd = -1;
  4753. }
  4754. list_del_init(&conn->list);
  4755. _dns_server_conn_release(conn);
  4756. return 0;
  4757. }
  4758. static int _dns_server_tcp_accept(struct dns_server_conn_tcp_server *tcpserver, struct epoll_event *event,
  4759. unsigned long now)
  4760. {
  4761. struct sockaddr_storage addr;
  4762. struct dns_server_conn_tcp_client *tcpclient = NULL;
  4763. socklen_t addr_len = sizeof(addr);
  4764. int fd = -1;
  4765. fd = accept4(tcpserver->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  4766. if (fd < 0) {
  4767. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  4768. return -1;
  4769. }
  4770. tcpclient = malloc(sizeof(*tcpclient));
  4771. if (tcpclient == NULL) {
  4772. tlog(TLOG_ERROR, "malloc for tcpclient failed.");
  4773. goto errout;
  4774. }
  4775. memset(tcpclient, 0, sizeof(*tcpclient));
  4776. tcpclient->head.fd = fd;
  4777. tcpclient->head.type = DNS_CONN_TYPE_TCP_CLIENT;
  4778. tcpclient->head.server_flags = tcpserver->head.server_flags;
  4779. tcpclient->head.dns_group = tcpserver->head.dns_group;
  4780. tcpclient->head.ipset_nftset_rule = tcpserver->head.ipset_nftset_rule;
  4781. atomic_set(&tcpclient->head.refcnt, 0);
  4782. memcpy(&tcpclient->addr, &addr, addr_len);
  4783. tcpclient->addr_len = addr_len;
  4784. tcpclient->localaddr_len = sizeof(struct sockaddr_storage);
  4785. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  4786. tlog(TLOG_ERROR, "epoll ctl failed.");
  4787. return -1;
  4788. }
  4789. if (getsocket_inet(tcpclient->head.fd, (struct sockaddr *)&tcpclient->localaddr, &tcpclient->localaddr_len) != 0) {
  4790. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  4791. goto errout;
  4792. }
  4793. _dns_server_client_touch(&tcpclient->head);
  4794. list_add(&tcpclient->head.list, &server.conn_list);
  4795. _dns_server_conn_get(&tcpclient->head);
  4796. return 0;
  4797. errout:
  4798. if (fd > 0) {
  4799. close(fd);
  4800. }
  4801. if (tcpclient) {
  4802. free(tcpclient);
  4803. }
  4804. return -1;
  4805. }
  4806. static ssize_t _ssl_read(struct dns_server_conn_tls_client *conn, void *buff, int num)
  4807. {
  4808. ssize_t ret = 0;
  4809. if (conn == NULL || buff == NULL) {
  4810. return SSL_ERROR_SYSCALL;
  4811. }
  4812. pthread_mutex_lock(&conn->ssl_lock);
  4813. ret = SSL_read(conn->ssl, buff, num);
  4814. pthread_mutex_unlock(&conn->ssl_lock);
  4815. return ret;
  4816. }
  4817. static ssize_t _ssl_write(struct dns_server_conn_tls_client *conn, const void *buff, int num)
  4818. {
  4819. ssize_t ret = 0;
  4820. if (conn == NULL || buff == NULL || conn->ssl == NULL) {
  4821. return SSL_ERROR_SYSCALL;
  4822. }
  4823. pthread_mutex_lock(&conn->ssl_lock);
  4824. ret = SSL_write(conn->ssl, buff, num);
  4825. pthread_mutex_unlock(&conn->ssl_lock);
  4826. return ret;
  4827. }
  4828. static int _ssl_get_error(struct dns_server_conn_tls_client *conn, int ret)
  4829. {
  4830. int err = 0;
  4831. if (conn == NULL || conn->ssl == NULL) {
  4832. return SSL_ERROR_SYSCALL;
  4833. }
  4834. pthread_mutex_lock(&conn->ssl_lock);
  4835. err = SSL_get_error(conn->ssl, ret);
  4836. pthread_mutex_unlock(&conn->ssl_lock);
  4837. return err;
  4838. }
  4839. static int _ssl_do_accept(struct dns_server_conn_tls_client *conn)
  4840. {
  4841. int err = 0;
  4842. if (conn == NULL || conn->ssl == NULL) {
  4843. return SSL_ERROR_SYSCALL;
  4844. }
  4845. pthread_mutex_lock(&conn->ssl_lock);
  4846. err = SSL_accept(conn->ssl);
  4847. pthread_mutex_unlock(&conn->ssl_lock);
  4848. return err;
  4849. }
  4850. static int _dns_server_socket_ssl_send(struct dns_server_conn_tls_client *tls_client, const void *buf, int num)
  4851. {
  4852. int ret = 0;
  4853. int ssl_ret = 0;
  4854. unsigned long ssl_err = 0;
  4855. if (tls_client->ssl == NULL) {
  4856. errno = EINVAL;
  4857. return -1;
  4858. }
  4859. if (num < 0) {
  4860. errno = EINVAL;
  4861. return -1;
  4862. }
  4863. ret = _ssl_write(tls_client, buf, num);
  4864. if (ret > 0) {
  4865. return ret;
  4866. }
  4867. ssl_ret = _ssl_get_error(tls_client, ret);
  4868. switch (ssl_ret) {
  4869. case SSL_ERROR_NONE:
  4870. return 0;
  4871. break;
  4872. case SSL_ERROR_ZERO_RETURN:
  4873. case SSL_ERROR_WANT_READ:
  4874. errno = EAGAIN;
  4875. ret = -1;
  4876. break;
  4877. case SSL_ERROR_WANT_WRITE:
  4878. errno = EAGAIN;
  4879. ret = -1;
  4880. break;
  4881. case SSL_ERROR_SSL:
  4882. ssl_err = ERR_get_error();
  4883. int ssl_reason = ERR_GET_REASON(ssl_err);
  4884. if (ssl_reason == SSL_R_UNINITIALIZED || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN ||
  4885. ssl_reason == SSL_R_BAD_LENGTH || ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT ||
  4886. ssl_reason == SSL_R_BAD_WRITE_RETRY) {
  4887. errno = EAGAIN;
  4888. return -1;
  4889. }
  4890. tlog(TLOG_ERROR, "SSL write fail error no: %s(%d)\n", ERR_reason_error_string(ssl_err), ssl_reason);
  4891. errno = EFAULT;
  4892. ret = -1;
  4893. break;
  4894. case SSL_ERROR_SYSCALL:
  4895. tlog(TLOG_DEBUG, "SSL syscall failed, %s", strerror(errno));
  4896. return ret;
  4897. default:
  4898. errno = EFAULT;
  4899. ret = -1;
  4900. break;
  4901. }
  4902. return ret;
  4903. }
  4904. static int _dns_server_socket_ssl_recv(struct dns_server_conn_tls_client *tls_client, void *buf, int num)
  4905. {
  4906. ssize_t ret = 0;
  4907. int ssl_ret = 0;
  4908. unsigned long ssl_err = 0;
  4909. if (tls_client->ssl == NULL) {
  4910. errno = EFAULT;
  4911. return -1;
  4912. }
  4913. ret = _ssl_read(tls_client, buf, num);
  4914. if (ret >= 0) {
  4915. return ret;
  4916. }
  4917. ssl_ret = _ssl_get_error(tls_client, ret);
  4918. switch (ssl_ret) {
  4919. case SSL_ERROR_NONE:
  4920. case SSL_ERROR_ZERO_RETURN:
  4921. return 0;
  4922. break;
  4923. case SSL_ERROR_WANT_READ:
  4924. errno = EAGAIN;
  4925. ret = -1;
  4926. break;
  4927. case SSL_ERROR_WANT_WRITE:
  4928. errno = EAGAIN;
  4929. ret = -1;
  4930. break;
  4931. case SSL_ERROR_SSL:
  4932. ssl_err = ERR_get_error();
  4933. int ssl_reason = ERR_GET_REASON(ssl_err);
  4934. if (ssl_reason == SSL_R_UNINITIALIZED) {
  4935. errno = EAGAIN;
  4936. return -1;
  4937. }
  4938. if (ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN) {
  4939. return 0;
  4940. }
  4941. tlog(TLOG_INFO, "SSL read fail error no: %s(%lx), len: %d\n", ERR_reason_error_string(ssl_err), ssl_err, num);
  4942. errno = EFAULT;
  4943. ret = -1;
  4944. break;
  4945. case SSL_ERROR_SYSCALL:
  4946. if (errno == 0) {
  4947. return 0;
  4948. }
  4949. if (errno != ECONNRESET) {
  4950. tlog(TLOG_INFO, "SSL syscall failed, %s ", strerror(errno));
  4951. }
  4952. ret = -1;
  4953. return ret;
  4954. default:
  4955. errno = EFAULT;
  4956. ret = -1;
  4957. break;
  4958. }
  4959. return ret;
  4960. }
  4961. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  4962. {
  4963. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  4964. return send(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  4965. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  4966. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  4967. int ret = _dns_server_socket_ssl_send((struct dns_server_conn_tls_client *)tcp_client, data, data_len);
  4968. return ret;
  4969. } else {
  4970. return -1;
  4971. }
  4972. }
  4973. static int _dns_server_tcp_socket_recv(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  4974. {
  4975. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  4976. return recv(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  4977. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  4978. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  4979. return _dns_server_socket_ssl_recv((struct dns_server_conn_tls_client *)tcp_client, data, data_len);
  4980. } else {
  4981. return -1;
  4982. }
  4983. }
  4984. static int _dns_server_tcp_recv(struct dns_server_conn_tcp_client *tcpclient)
  4985. {
  4986. ssize_t len = 0;
  4987. /* Receive data */
  4988. while (tcpclient->recvbuff.size < (int)sizeof(tcpclient->recvbuff.buf)) {
  4989. if (tcpclient->recvbuff.size == (int)sizeof(tcpclient->recvbuff.buf)) {
  4990. return 0;
  4991. }
  4992. len = _dns_server_tcp_socket_recv(tcpclient, tcpclient->recvbuff.buf + tcpclient->recvbuff.size,
  4993. sizeof(tcpclient->recvbuff.buf) - tcpclient->recvbuff.size);
  4994. if (len < 0) {
  4995. if (errno == EAGAIN) {
  4996. return RECV_ERROR_AGAIN;
  4997. }
  4998. if (errno == ECONNRESET) {
  4999. return RECV_ERROR_CLOSE;
  5000. }
  5001. tlog(TLOG_ERROR, "recv failed, %s\n", strerror(errno));
  5002. return RECV_ERROR_FAIL;
  5003. } else if (len == 0) {
  5004. return RECV_ERROR_CLOSE;
  5005. }
  5006. tcpclient->recvbuff.size += len;
  5007. }
  5008. return 0;
  5009. }
  5010. static int _dns_server_tcp_process_one_request(struct dns_server_conn_tcp_client *tcpclient)
  5011. {
  5012. unsigned short request_len = 0;
  5013. int total_len = tcpclient->recvbuff.size;
  5014. int proceed_len = 0;
  5015. unsigned char *request_data = NULL;
  5016. int ret = 0;
  5017. /* Handling multiple requests */
  5018. for (;;) {
  5019. if ((total_len - proceed_len) <= (int)sizeof(unsigned short)) {
  5020. ret = RECV_ERROR_AGAIN;
  5021. break;
  5022. }
  5023. /* Get record length */
  5024. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len);
  5025. request_len = ntohs(*((unsigned short *)(request_data)));
  5026. if (request_len >= sizeof(tcpclient->recvbuff.buf)) {
  5027. tlog(TLOG_DEBUG, "request length is invalid.");
  5028. return RECV_ERROR_FAIL;
  5029. }
  5030. if (request_len > (total_len - proceed_len - sizeof(unsigned short))) {
  5031. ret = RECV_ERROR_AGAIN;
  5032. break;
  5033. }
  5034. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len + sizeof(unsigned short));
  5035. /* process one record */
  5036. ret = _dns_server_recv(&tcpclient->head, request_data, request_len, &tcpclient->localaddr,
  5037. tcpclient->localaddr_len, &tcpclient->addr, tcpclient->addr_len);
  5038. if (ret != 0) {
  5039. return ret;
  5040. }
  5041. proceed_len += sizeof(unsigned short) + request_len;
  5042. }
  5043. if (total_len > proceed_len && proceed_len > 0) {
  5044. memmove(tcpclient->recvbuff.buf, tcpclient->recvbuff.buf + proceed_len, total_len - proceed_len);
  5045. }
  5046. tcpclient->recvbuff.size -= proceed_len;
  5047. return ret;
  5048. }
  5049. static int _dns_server_tcp_process_requests(struct dns_server_conn_tcp_client *tcpclient)
  5050. {
  5051. int recv_ret = 0;
  5052. int request_ret = 0;
  5053. int is_eof = 0;
  5054. for (;;) {
  5055. recv_ret = _dns_server_tcp_recv(tcpclient);
  5056. if (recv_ret < 0) {
  5057. if (recv_ret == RECV_ERROR_CLOSE) {
  5058. return RECV_ERROR_CLOSE;
  5059. }
  5060. if (tcpclient->recvbuff.size > 0) {
  5061. is_eof = RECV_ERROR_AGAIN;
  5062. } else {
  5063. return RECV_ERROR_FAIL;
  5064. }
  5065. }
  5066. request_ret = _dns_server_tcp_process_one_request(tcpclient);
  5067. if (request_ret < 0) {
  5068. /* failed */
  5069. tlog(TLOG_DEBUG, "process one request failed.");
  5070. return RECV_ERROR_FAIL;
  5071. }
  5072. if (request_ret == RECV_ERROR_AGAIN && is_eof == RECV_ERROR_AGAIN) {
  5073. /* failed or remote shutdown */
  5074. return RECV_ERROR_FAIL;
  5075. }
  5076. if (recv_ret == RECV_ERROR_AGAIN && request_ret == RECV_ERROR_AGAIN) {
  5077. /* process complete */
  5078. return 0;
  5079. }
  5080. }
  5081. return 0;
  5082. }
  5083. static int _dns_server_tcp_send(struct dns_server_conn_tcp_client *tcpclient)
  5084. {
  5085. int len = 0;
  5086. while (tcpclient->sndbuff.size > 0) {
  5087. len = _dns_server_tcp_socket_send(tcpclient, tcpclient->sndbuff.buf, tcpclient->sndbuff.size);
  5088. if (len < 0) {
  5089. if (errno == EAGAIN) {
  5090. return RECV_ERROR_AGAIN;
  5091. }
  5092. return RECV_ERROR_FAIL;
  5093. } else if (len == 0) {
  5094. break;
  5095. }
  5096. tcpclient->sndbuff.size -= len;
  5097. }
  5098. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN) != 0) {
  5099. tlog(TLOG_ERROR, "epoll ctl failed.");
  5100. return -1;
  5101. }
  5102. return 0;
  5103. }
  5104. static int _dns_server_process_tcp(struct dns_server_conn_tcp_client *dnsserver, struct epoll_event *event,
  5105. unsigned long now)
  5106. {
  5107. int ret = 0;
  5108. if (event->events & EPOLLIN) {
  5109. ret = _dns_server_tcp_process_requests(dnsserver);
  5110. if (ret != 0) {
  5111. _dns_server_client_close(&dnsserver->head);
  5112. if (ret == RECV_ERROR_CLOSE) {
  5113. return 0;
  5114. }
  5115. tlog(TLOG_DEBUG, "process tcp request failed.");
  5116. return RECV_ERROR_FAIL;
  5117. }
  5118. }
  5119. if (event->events & EPOLLOUT) {
  5120. if (_dns_server_tcp_send(dnsserver) != 0) {
  5121. _dns_server_client_close(&dnsserver->head);
  5122. tlog(TLOG_DEBUG, "send tcp failed.");
  5123. return RECV_ERROR_FAIL;
  5124. }
  5125. }
  5126. return 0;
  5127. }
  5128. static int _dns_server_tls_accept(struct dns_server_conn_tls_server *tls_server, struct epoll_event *event,
  5129. unsigned long now)
  5130. {
  5131. struct sockaddr_storage addr;
  5132. struct dns_server_conn_tls_client *tls_client = NULL;
  5133. socklen_t addr_len = sizeof(addr);
  5134. int fd = -1;
  5135. SSL *ssl = NULL;
  5136. fd = accept4(tls_server->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  5137. if (fd < 0) {
  5138. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  5139. return -1;
  5140. }
  5141. tls_client = malloc(sizeof(*tls_client));
  5142. if (tls_client == NULL) {
  5143. tlog(TLOG_ERROR, "malloc for tls_client failed.");
  5144. goto errout;
  5145. }
  5146. memset(tls_client, 0, sizeof(*tls_client));
  5147. tls_client->head.fd = fd;
  5148. tls_client->head.type = DNS_CONN_TYPE_TLS_CLIENT;
  5149. tls_client->head.server_flags = tls_server->head.server_flags;
  5150. tls_client->head.dns_group = tls_server->head.dns_group;
  5151. tls_client->head.ipset_nftset_rule = tls_server->head.ipset_nftset_rule;
  5152. atomic_set(&tls_client->head.refcnt, 0);
  5153. memcpy(&tls_client->addr, &addr, addr_len);
  5154. tls_client->addr_len = addr_len;
  5155. tls_client->localaddr_len = sizeof(struct sockaddr_storage);
  5156. if (_dns_server_epoll_ctl(&tls_client->head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  5157. tlog(TLOG_ERROR, "epoll ctl failed.");
  5158. return -1;
  5159. }
  5160. if (getsocket_inet(tls_client->head.fd, (struct sockaddr *)&tls_client->localaddr, &tls_client->localaddr_len) !=
  5161. 0) {
  5162. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  5163. goto errout;
  5164. }
  5165. ssl = SSL_new(tls_server->ssl_ctx);
  5166. if (ssl == NULL) {
  5167. tlog(TLOG_ERROR, "SSL_new failed.");
  5168. goto errout;
  5169. }
  5170. if (SSL_set_fd(ssl, fd) != 1) {
  5171. tlog(TLOG_ERROR, "SSL_set_fd failed.");
  5172. goto errout;
  5173. }
  5174. tls_client->ssl = ssl;
  5175. tls_client->status = DNS_SERVER_CLIENT_STATUS_CONNECTING;
  5176. pthread_mutex_init(&tls_client->ssl_lock, NULL);
  5177. _dns_server_client_touch(&tls_client->head);
  5178. list_add(&tls_client->head.list, &server.conn_list);
  5179. _dns_server_conn_get(&tls_client->head);
  5180. return 0;
  5181. errout:
  5182. if (fd > 0) {
  5183. close(fd);
  5184. }
  5185. if (ssl) {
  5186. SSL_free(ssl);
  5187. }
  5188. if (tls_client) {
  5189. free(tls_client);
  5190. }
  5191. return -1;
  5192. }
  5193. static int _dns_server_process_tls(struct dns_server_conn_tls_client *tls_client, struct epoll_event *event,
  5194. unsigned long now)
  5195. {
  5196. int ret = 0;
  5197. int ssl_ret = 0;
  5198. struct epoll_event fd_event;
  5199. if (tls_client->status == DNS_SERVER_CLIENT_STATUS_CONNECTING) {
  5200. /* do SSL hand shake */
  5201. ret = _ssl_do_accept(tls_client);
  5202. if (ret == 0) {
  5203. goto errout;
  5204. } else if (ret < 0) {
  5205. memset(&fd_event, 0, sizeof(fd_event));
  5206. ssl_ret = _ssl_get_error(tls_client, ret);
  5207. if (ssl_ret == SSL_ERROR_WANT_READ) {
  5208. fd_event.events = EPOLLIN;
  5209. } else if (ssl_ret == SSL_ERROR_WANT_WRITE) {
  5210. fd_event.events = EPOLLOUT | EPOLLIN;
  5211. } else if (ssl_ret == SSL_ERROR_SYSCALL) {
  5212. goto errout;
  5213. } else {
  5214. unsigned long ssl_err = ERR_get_error();
  5215. int ssl_reason = ERR_GET_REASON(ssl_err);
  5216. tlog(TLOG_DEBUG, "Handshake with %s failed, error no: %s(%d, %d, %d)\n", "",
  5217. ERR_reason_error_string(ssl_err), ret, ssl_ret, ssl_reason);
  5218. ret = 0;
  5219. goto errout;
  5220. }
  5221. fd_event.data.ptr = tls_client;
  5222. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->head.fd, &fd_event) != 0) {
  5223. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  5224. goto errout;
  5225. }
  5226. return 0;
  5227. }
  5228. tls_client->status = DNS_SERVER_CLIENT_STATUS_CONNECTED;
  5229. memset(&fd_event, 0, sizeof(fd_event));
  5230. fd_event.events = EPOLLIN | EPOLLOUT;
  5231. fd_event.data.ptr = tls_client;
  5232. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->head.fd, &fd_event) != 0) {
  5233. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  5234. goto errout;
  5235. }
  5236. }
  5237. return _dns_server_process_tcp((struct dns_server_conn_tcp_client *)tls_client, event, now);
  5238. errout:
  5239. _dns_server_client_close(&tls_client->head);
  5240. return ret;
  5241. }
  5242. static int _dns_server_process(struct dns_server_conn_head *conn, struct epoll_event *event, unsigned long now)
  5243. {
  5244. int ret = 0;
  5245. _dns_server_client_touch(conn);
  5246. _dns_server_conn_get(conn);
  5247. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  5248. struct dns_server_conn_udp *udpconn = (struct dns_server_conn_udp *)conn;
  5249. ret = _dns_server_process_udp(udpconn, event, now);
  5250. } else if (conn->type == DNS_CONN_TYPE_TCP_SERVER) {
  5251. struct dns_server_conn_tcp_server *tcpserver = (struct dns_server_conn_tcp_server *)conn;
  5252. ret = _dns_server_tcp_accept(tcpserver, event, now);
  5253. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  5254. struct dns_server_conn_tcp_client *tcpclient = (struct dns_server_conn_tcp_client *)conn;
  5255. ret = _dns_server_process_tcp(tcpclient, event, now);
  5256. if (ret != 0) {
  5257. char name[DNS_MAX_CNAME_LEN];
  5258. tlog(TLOG_DEBUG, "process TCP packet from %s failed.",
  5259. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tcpclient->addr));
  5260. }
  5261. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER) {
  5262. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  5263. ret = _dns_server_tls_accept(tls_server, event, now);
  5264. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT) {
  5265. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  5266. ret = _dns_server_process_tls(tls_client, event, now);
  5267. if (ret != 0) {
  5268. char name[DNS_MAX_CNAME_LEN];
  5269. tlog(TLOG_DEBUG, "process TLS packet from %s failed.",
  5270. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tls_client->addr));
  5271. }
  5272. } else {
  5273. tlog(TLOG_ERROR, "unsupported dns server type %d", conn->type);
  5274. _dns_server_client_close(conn);
  5275. ret = -1;
  5276. }
  5277. _dns_server_conn_release(conn);
  5278. if (ret == RECV_ERROR_INVALID_PACKET) {
  5279. ret = 0;
  5280. }
  5281. return ret;
  5282. }
  5283. static int _dns_server_second_ping_check(struct dns_request *request)
  5284. {
  5285. struct dns_ip_address *addr_map = NULL;
  5286. unsigned long bucket = 0;
  5287. char ip[DNS_MAX_CNAME_LEN] = {0};
  5288. int ret = -1;
  5289. if (request->has_ping_result) {
  5290. return ret;
  5291. }
  5292. /* start tcping */
  5293. pthread_mutex_lock(&request->ip_map_lock);
  5294. hash_for_each(request->ip_map, bucket, addr_map, node)
  5295. {
  5296. switch (addr_map->addr_type) {
  5297. case DNS_T_A: {
  5298. _dns_server_request_get(request);
  5299. sprintf(ip, "%d.%d.%d.%d", addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2],
  5300. addr_map->ip_addr[3]);
  5301. ret = _dns_server_check_speed(request, ip);
  5302. if (ret != 0) {
  5303. _dns_server_request_release(request);
  5304. }
  5305. } break;
  5306. case DNS_T_AAAA: {
  5307. _dns_server_request_get(request);
  5308. sprintf(ip, "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]",
  5309. addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3],
  5310. addr_map->ip_addr[4], addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7],
  5311. addr_map->ip_addr[8], addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11],
  5312. addr_map->ip_addr[12], addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  5313. ret = _dns_server_check_speed(request, ip);
  5314. if (ret != 0) {
  5315. _dns_server_request_release(request);
  5316. }
  5317. } break;
  5318. default:
  5319. break;
  5320. }
  5321. }
  5322. pthread_mutex_unlock(&request->ip_map_lock);
  5323. return ret;
  5324. }
  5325. static void _dns_server_prefetch_domain(struct dns_cache *dns_cache)
  5326. {
  5327. /* If there are still hits, continue pre-fetching */
  5328. struct dns_server_query_option server_query_option;
  5329. int hitnum = dns_cache_hitnum_dec_get(dns_cache);
  5330. if (hitnum <= 0) {
  5331. return;
  5332. }
  5333. /* start prefetch domain */
  5334. tlog(TLOG_DEBUG, "prefetch by cache %s, qtype %d, ttl %d, hitnum %d", dns_cache->info.domain, dns_cache->info.qtype,
  5335. dns_cache->info.ttl, hitnum);
  5336. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  5337. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  5338. server_query_option.ecs_enable_flag = 0;
  5339. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, 0, &server_query_option) != 0) {
  5340. tlog(TLOG_ERROR, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  5341. }
  5342. }
  5343. static void _dns_server_prefetch_expired_domain(struct dns_cache *dns_cache)
  5344. {
  5345. /* start prefetch domain */
  5346. tlog(TLOG_DEBUG, "expired domain, prefetch by cache %s, qtype %d, ttl %d", dns_cache->info.domain,
  5347. dns_cache->info.qtype, dns_cache->info.ttl);
  5348. struct dns_server_query_option server_query_option;
  5349. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  5350. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  5351. server_query_option.ecs_enable_flag = 0;
  5352. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, 1, &server_query_option) != 0) {
  5353. tlog(TLOG_DEBUG, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  5354. }
  5355. }
  5356. static void _dns_server_tcp_idle_check(void)
  5357. {
  5358. struct dns_server_conn_head *conn = NULL;
  5359. struct dns_server_conn_head *tmp = NULL;
  5360. time_t now = 0;
  5361. if (dns_conf_tcp_idle_time <= 0) {
  5362. return;
  5363. }
  5364. time(&now);
  5365. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5366. {
  5367. if (conn->type != DNS_CONN_TYPE_TCP_CLIENT && conn->type != DNS_CONN_TYPE_TLS_CLIENT) {
  5368. continue;
  5369. }
  5370. if (conn->last_request_time > now - dns_conf_tcp_idle_time) {
  5371. continue;
  5372. }
  5373. _dns_server_client_close(conn);
  5374. }
  5375. }
  5376. #ifdef TEST
  5377. static void _dns_server_check_need_exit(void)
  5378. {
  5379. static int parent_pid = 0;
  5380. if (parent_pid == 0) {
  5381. parent_pid = getppid();
  5382. }
  5383. if (parent_pid != getppid()) {
  5384. tlog(TLOG_WARN, "parent process exit, exit too.");
  5385. dns_server_stop();
  5386. }
  5387. }
  5388. #else
  5389. #define _dns_server_check_need_exit()
  5390. #endif
  5391. static void _dns_server_save_cache_to_file(void)
  5392. {
  5393. time_t now;
  5394. int check_time = dns_conf_cache_checkpoint_time;
  5395. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0 || dns_conf_cache_checkpoint_time <= 0) {
  5396. return;
  5397. }
  5398. time(&now);
  5399. if (server.cache_save_pid > 0) {
  5400. int ret = waitpid(server.cache_save_pid, NULL, WNOHANG);
  5401. if (ret == server.cache_save_pid) {
  5402. server.cache_save_pid = 0;
  5403. } else if (ret < 0) {
  5404. tlog(TLOG_ERROR, "waitpid failed, errno %d, error info '%s'", errno, strerror(errno));
  5405. server.cache_save_pid = 0;
  5406. } else {
  5407. if (now - 30 > server.cache_save_time) {
  5408. kill(server.cache_save_pid, SIGKILL);
  5409. }
  5410. return;
  5411. }
  5412. }
  5413. if (check_time < 120) {
  5414. check_time = 120;
  5415. }
  5416. if (now - check_time < server.cache_save_time) {
  5417. return;
  5418. }
  5419. /* server is busy, skip*/
  5420. pthread_mutex_lock(&server.request_list_lock);
  5421. if (list_empty(&server.request_list) != 0) {
  5422. pthread_mutex_unlock(&server.request_list_lock);
  5423. return;
  5424. }
  5425. pthread_mutex_unlock(&server.request_list_lock);
  5426. server.cache_save_time = now;
  5427. int pid = fork();
  5428. if (pid == 0) {
  5429. /* child process */
  5430. for (int i = 3; i < 1024; i++) {
  5431. close(i);
  5432. }
  5433. tlog_setlevel(TLOG_OFF);
  5434. _dns_server_cache_save(1);
  5435. _exit(0);
  5436. } else if (pid < 0) {
  5437. tlog(TLOG_DEBUG, "fork failed, errno %d, error info '%s'", errno, strerror(errno));
  5438. return;
  5439. }
  5440. server.cache_save_pid = pid;
  5441. }
  5442. static void _dns_server_period_run_second(void)
  5443. {
  5444. static unsigned int sec = 0;
  5445. static time_t last = 0;
  5446. time_t now = 0;
  5447. sec++;
  5448. time(&now);
  5449. if (last == 0) {
  5450. last = now;
  5451. }
  5452. if (now - 180 > last) {
  5453. dns_cache_invalidate(NULL, 0, 0, NULL, 0);
  5454. tlog(TLOG_WARN, "Service paused for 180s, force invalidate cache.");
  5455. }
  5456. last = now;
  5457. if (sec % 2 == 0) {
  5458. if (dns_conf_prefetch) {
  5459. /* do pre-fetching */
  5460. if (dns_conf_serve_expired) {
  5461. int prefetch_time = dns_conf_serve_expired_prefetch_time;
  5462. if (prefetch_time == 0) {
  5463. prefetch_time = dns_conf_serve_expired_ttl / 2;
  5464. if (prefetch_time == 0 || prefetch_time > EXPIRED_DOMAIN_PREFETCH_TIME) {
  5465. prefetch_time = EXPIRED_DOMAIN_PREFETCH_TIME;
  5466. }
  5467. }
  5468. dns_cache_invalidate(NULL, 0, DNS_MAX_DOMAIN_REFETCH_NUM, _dns_server_prefetch_expired_domain,
  5469. prefetch_time);
  5470. } else {
  5471. dns_cache_invalidate(_dns_server_prefetch_domain, 3, DNS_MAX_DOMAIN_REFETCH_NUM, NULL, 0);
  5472. }
  5473. } else {
  5474. dns_cache_invalidate(NULL, 0, 0, NULL, 0);
  5475. }
  5476. }
  5477. _dns_server_tcp_idle_check();
  5478. _dns_server_check_need_exit();
  5479. if (sec % IPV6_READY_CHECK_TIME == 0 && is_ipv6_ready == 0) {
  5480. dns_server_check_ipv6_ready();
  5481. }
  5482. if (sec % 60 == 0) {
  5483. if (dns_server_check_update_hosts() == 0) {
  5484. tlog(TLOG_INFO, "Update host file data");
  5485. }
  5486. }
  5487. _dns_server_save_cache_to_file();
  5488. }
  5489. static void _dns_server_period_run(unsigned int msec)
  5490. {
  5491. struct dns_request *request = NULL;
  5492. struct dns_request *tmp = NULL;
  5493. LIST_HEAD(check_list);
  5494. if ((msec % 10) == 0) {
  5495. _dns_server_period_run_second();
  5496. }
  5497. unsigned long now = get_tick_count();
  5498. pthread_mutex_lock(&server.request_list_lock);
  5499. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  5500. {
  5501. /* Need to use tcping detection speed */
  5502. int check_order = request->check_order + 1;
  5503. if (atomic_read(&request->ip_map_num) == 0 || request->has_soa) {
  5504. continue;
  5505. }
  5506. if (request->send_tick < now - (check_order * DNS_PING_CHECK_INTERVAL) && request->has_ping_result == 0) {
  5507. _dns_server_request_get(request);
  5508. list_add_tail(&request->check_list, &check_list);
  5509. request->check_order++;
  5510. }
  5511. }
  5512. pthread_mutex_unlock(&server.request_list_lock);
  5513. list_for_each_entry_safe(request, tmp, &check_list, check_list)
  5514. {
  5515. _dns_server_second_ping_check(request);
  5516. list_del_init(&request->check_list);
  5517. _dns_server_request_release(request);
  5518. }
  5519. }
  5520. static void _dns_server_close_socket(void)
  5521. {
  5522. struct dns_server_conn_head *conn = NULL;
  5523. struct dns_server_conn_head *tmp = NULL;
  5524. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5525. {
  5526. _dns_server_client_close(conn);
  5527. }
  5528. }
  5529. static void _dns_server_close_socket_server(void)
  5530. {
  5531. struct dns_server_conn_head *conn = NULL;
  5532. struct dns_server_conn_head *tmp = NULL;
  5533. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5534. {
  5535. switch (conn->type) {
  5536. case DNS_CONN_TYPE_HTTPS_SERVER:
  5537. case DNS_CONN_TYPE_TLS_SERVER: {
  5538. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  5539. if (tls_server->ssl_ctx) {
  5540. SSL_CTX_free(tls_server->ssl_ctx);
  5541. tls_server->ssl_ctx = NULL;
  5542. }
  5543. _dns_server_client_close(conn);
  5544. break;
  5545. }
  5546. case DNS_CONN_TYPE_UDP_SERVER:
  5547. case DNS_CONN_TYPE_TCP_SERVER:
  5548. _dns_server_client_close(conn);
  5549. break;
  5550. default:
  5551. break;
  5552. }
  5553. }
  5554. }
  5555. int dns_server_run(void)
  5556. {
  5557. struct epoll_event events[DNS_MAX_EVENTS + 1];
  5558. int num = 0;
  5559. int i = 0;
  5560. unsigned long now = {0};
  5561. unsigned long last = {0};
  5562. unsigned int msec = 0;
  5563. int sleep = 100;
  5564. int sleep_time = 0;
  5565. unsigned long expect_time = 0;
  5566. sleep_time = sleep;
  5567. now = get_tick_count() - sleep;
  5568. last = now;
  5569. expect_time = now + sleep;
  5570. while (atomic_read(&server.run)) {
  5571. now = get_tick_count();
  5572. if (sleep_time > 0) {
  5573. sleep_time -= now - last;
  5574. if (sleep_time <= 0) {
  5575. sleep_time = 0;
  5576. }
  5577. int cnt = sleep_time / sleep;
  5578. msec -= cnt;
  5579. expect_time -= cnt * sleep;
  5580. sleep_time -= cnt * sleep;
  5581. }
  5582. if (now >= expect_time) {
  5583. msec++;
  5584. if (last != now) {
  5585. _dns_server_period_run(msec);
  5586. }
  5587. sleep_time = sleep - (now - expect_time);
  5588. if (sleep_time < 0) {
  5589. sleep_time = 0;
  5590. expect_time = now;
  5591. }
  5592. /* When server is idle, the sleep time is 1000ms, to reduce CPU usage */
  5593. pthread_mutex_lock(&server.request_list_lock);
  5594. if (list_empty(&server.request_list)) {
  5595. int cnt = 10 - (msec % 10) - 1;
  5596. sleep_time += sleep * cnt;
  5597. msec += cnt;
  5598. /* sleep to next second */
  5599. expect_time += sleep * cnt;
  5600. }
  5601. pthread_mutex_unlock(&server.request_list_lock);
  5602. expect_time += sleep;
  5603. }
  5604. last = now;
  5605. num = epoll_wait(server.epoll_fd, events, DNS_MAX_EVENTS, sleep_time);
  5606. if (num < 0) {
  5607. usleep(100000);
  5608. continue;
  5609. }
  5610. if (num == 0) {
  5611. continue;
  5612. }
  5613. for (i = 0; i < num; i++) {
  5614. struct epoll_event *event = &events[i];
  5615. /* read event */
  5616. if (event->data.fd == server.event_fd) {
  5617. uint64_t value;
  5618. int unused __attribute__((unused));
  5619. unused = read(server.event_fd, &value, sizeof(uint64_t));
  5620. continue;
  5621. }
  5622. struct dns_server_conn_head *conn_head = event->data.ptr;
  5623. if (conn_head == NULL) {
  5624. tlog(TLOG_ERROR, "invalid fd\n");
  5625. continue;
  5626. }
  5627. if (_dns_server_process(conn_head, event, now) != 0) {
  5628. tlog(TLOG_DEBUG, "dns server process failed.");
  5629. }
  5630. }
  5631. }
  5632. _dns_server_close_socket_server();
  5633. close(server.epoll_fd);
  5634. server.epoll_fd = -1;
  5635. return 0;
  5636. }
  5637. static struct addrinfo *_dns_server_getaddr(const char *host, const char *port, int type, int protocol)
  5638. {
  5639. struct addrinfo hints;
  5640. struct addrinfo *result = NULL;
  5641. memset(&hints, 0, sizeof(hints));
  5642. hints.ai_family = AF_UNSPEC;
  5643. hints.ai_socktype = type;
  5644. hints.ai_protocol = protocol;
  5645. hints.ai_flags = AI_PASSIVE;
  5646. if (getaddrinfo(host, port, &hints, &result) != 0) {
  5647. tlog(TLOG_ERROR, "get addr info failed. %s\n", strerror(errno));
  5648. goto errout;
  5649. }
  5650. return result;
  5651. errout:
  5652. if (result) {
  5653. freeaddrinfo(result);
  5654. }
  5655. return NULL;
  5656. }
  5657. int dns_server_start(void)
  5658. {
  5659. struct dns_server_conn_head *conn = NULL;
  5660. list_for_each_entry(conn, &server.conn_list, list)
  5661. {
  5662. if (conn->fd <= 0) {
  5663. continue;
  5664. }
  5665. if (_dns_server_epoll_ctl(conn, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  5666. tlog(TLOG_ERROR, "epoll ctl failed.");
  5667. return -1;
  5668. }
  5669. }
  5670. return 0;
  5671. }
  5672. static int _dns_create_socket(const char *host_ip, int type)
  5673. {
  5674. int fd = -1;
  5675. struct addrinfo *gai = NULL;
  5676. char port_str[16];
  5677. char ip[MAX_IP_LEN];
  5678. char host_ip_device[MAX_IP_LEN * 2];
  5679. int port = 0;
  5680. char *host = NULL;
  5681. int optval = 1;
  5682. int yes = 1;
  5683. const int priority = SOCKET_PRIORITY;
  5684. const int ip_tos = SOCKET_IP_TOS;
  5685. const char *ifname = NULL;
  5686. safe_strncpy(host_ip_device, host_ip, sizeof(host_ip_device));
  5687. ifname = strstr(host_ip_device, "@");
  5688. if (ifname) {
  5689. *(char *)ifname = '\0';
  5690. ifname++;
  5691. }
  5692. if (parse_ip(host_ip_device, ip, &port) == 0) {
  5693. host = ip;
  5694. }
  5695. if (port <= 0) {
  5696. port = DEFAULT_DNS_PORT;
  5697. }
  5698. snprintf(port_str, sizeof(port_str), "%d", port);
  5699. gai = _dns_server_getaddr(host, port_str, type, 0);
  5700. if (gai == NULL) {
  5701. tlog(TLOG_ERROR, "get address failed.\n");
  5702. goto errout;
  5703. }
  5704. fd = socket(gai->ai_family, gai->ai_socktype, gai->ai_protocol);
  5705. if (fd < 0) {
  5706. tlog(TLOG_ERROR, "create socket failed, family = %d, type = %d, proto = %d, %s\n", gai->ai_family,
  5707. gai->ai_socktype, gai->ai_protocol, strerror(errno));
  5708. goto errout;
  5709. }
  5710. if (type == SOCK_STREAM) {
  5711. if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)) != 0) {
  5712. tlog(TLOG_ERROR, "set socket opt failed.");
  5713. goto errout;
  5714. }
  5715. setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &yes, sizeof(yes));
  5716. } else {
  5717. setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &optval, sizeof(optval));
  5718. setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, &optval, sizeof(optval));
  5719. }
  5720. setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &priority, sizeof(priority));
  5721. setsockopt(fd, IPPROTO_IP, IP_TOS, &ip_tos, sizeof(ip_tos));
  5722. if (ifname != NULL) {
  5723. struct ifreq ifr;
  5724. memset(&ifr, 0, sizeof(struct ifreq));
  5725. safe_strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
  5726. ioctl(fd, SIOCGIFINDEX, &ifr);
  5727. if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, (void *)&ifr, sizeof(struct ifreq)) < 0) {
  5728. tlog(TLOG_ERROR, "bind socket to device %s failed, %s\n", ifr.ifr_name, strerror(errno));
  5729. goto errout;
  5730. }
  5731. }
  5732. if (bind(fd, gai->ai_addr, gai->ai_addrlen) != 0) {
  5733. tlog(TLOG_ERROR, "bind service %s failed, %s\n", host_ip, strerror(errno));
  5734. goto errout;
  5735. }
  5736. if (type == SOCK_STREAM) {
  5737. if (listen(fd, 16) != 0) {
  5738. tlog(TLOG_ERROR, "listen failed.\n");
  5739. goto errout;
  5740. }
  5741. }
  5742. fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC);
  5743. freeaddrinfo(gai);
  5744. return fd;
  5745. errout:
  5746. if (fd > 0) {
  5747. close(fd);
  5748. }
  5749. if (gai) {
  5750. freeaddrinfo(gai);
  5751. }
  5752. return -1;
  5753. }
  5754. static int _dns_server_set_flags(struct dns_server_conn_head *head, struct dns_bind_ip *bind_ip)
  5755. {
  5756. time(&head->last_request_time);
  5757. head->server_flags = bind_ip->flags;
  5758. head->dns_group = bind_ip->group;
  5759. head->ipset_nftset_rule = &bind_ip->nftset_ipset_rule;
  5760. atomic_set(&head->refcnt, 0);
  5761. list_add(&head->list, &server.conn_list);
  5762. return 0;
  5763. }
  5764. static int _dns_server_socket_udp(struct dns_bind_ip *bind_ip)
  5765. {
  5766. const char *host_ip = NULL;
  5767. struct dns_server_conn_udp *conn = NULL;
  5768. int fd = -1;
  5769. host_ip = bind_ip->ip;
  5770. conn = malloc(sizeof(struct dns_server_conn_udp));
  5771. if (conn == NULL) {
  5772. goto errout;
  5773. }
  5774. INIT_LIST_HEAD(&conn->head.list);
  5775. fd = _dns_create_socket(host_ip, SOCK_DGRAM);
  5776. if (fd <= 0) {
  5777. goto errout;
  5778. }
  5779. conn->head.type = DNS_CONN_TYPE_UDP_SERVER;
  5780. conn->head.fd = fd;
  5781. _dns_server_set_flags(&conn->head, bind_ip);
  5782. _dns_server_conn_get(&conn->head);
  5783. return 0;
  5784. errout:
  5785. if (conn) {
  5786. free(conn);
  5787. conn = NULL;
  5788. }
  5789. if (fd > 0) {
  5790. close(fd);
  5791. }
  5792. return -1;
  5793. }
  5794. static int _dns_server_socket_tcp(struct dns_bind_ip *bind_ip)
  5795. {
  5796. const char *host_ip = NULL;
  5797. struct dns_server_conn_tcp_server *conn = NULL;
  5798. int fd = -1;
  5799. const int on = 1;
  5800. host_ip = bind_ip->ip;
  5801. conn = malloc(sizeof(struct dns_server_conn_tcp_server));
  5802. if (conn == NULL) {
  5803. goto errout;
  5804. }
  5805. INIT_LIST_HEAD(&conn->head.list);
  5806. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  5807. if (fd <= 0) {
  5808. goto errout;
  5809. }
  5810. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  5811. conn->head.type = DNS_CONN_TYPE_TCP_SERVER;
  5812. conn->head.fd = fd;
  5813. _dns_server_set_flags(&conn->head, bind_ip);
  5814. _dns_server_conn_get(&conn->head);
  5815. return 0;
  5816. errout:
  5817. if (conn) {
  5818. free(conn);
  5819. conn = NULL;
  5820. }
  5821. if (fd > 0) {
  5822. close(fd);
  5823. }
  5824. return -1;
  5825. }
  5826. static int _dns_server_socket_tls_ssl_pass_callback(char *buf, int size, int rwflag, void *userdata)
  5827. {
  5828. struct dns_bind_ip *bind_ip = userdata;
  5829. if (bind_ip->ssl_cert_key_pass == NULL || bind_ip->ssl_cert_key_pass[0] == '\0') {
  5830. return 0;
  5831. }
  5832. safe_strncpy(buf, bind_ip->ssl_cert_key_pass, size);
  5833. return strlen(buf);
  5834. }
  5835. static int _dns_server_socket_tls(struct dns_bind_ip *bind_ip, DNS_CONN_TYPE conn_type)
  5836. {
  5837. const char *host_ip = NULL;
  5838. const char *ssl_cert_file = NULL;
  5839. const char *ssl_cert_key_file = NULL;
  5840. struct dns_server_conn_tls_server *conn = NULL;
  5841. int fd = -1;
  5842. const SSL_METHOD *method = NULL;
  5843. SSL_CTX *ssl_ctx = NULL;
  5844. const int on = 1;
  5845. host_ip = bind_ip->ip;
  5846. ssl_cert_file = bind_ip->ssl_cert_file;
  5847. ssl_cert_key_file = bind_ip->ssl_cert_key_file;
  5848. if (ssl_cert_file == NULL || ssl_cert_key_file == NULL) {
  5849. tlog(TLOG_WARN, "no cert or cert key file");
  5850. goto errout;
  5851. }
  5852. if (ssl_cert_file[0] == '\0' || ssl_cert_key_file[0] == '\0') {
  5853. tlog(TLOG_WARN, "no cert or cert key file");
  5854. goto errout;
  5855. }
  5856. conn = malloc(sizeof(struct dns_server_conn_tls_server));
  5857. if (conn == NULL) {
  5858. goto errout;
  5859. }
  5860. INIT_LIST_HEAD(&conn->head.list);
  5861. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  5862. if (fd <= 0) {
  5863. goto errout;
  5864. }
  5865. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  5866. #if (OPENSSL_VERSION_NUMBER >= 0x10100000L)
  5867. method = TLS_server_method();
  5868. if (method == NULL) {
  5869. goto errout;
  5870. }
  5871. #else
  5872. method = SSLv23_server_method();
  5873. #endif
  5874. ssl_ctx = SSL_CTX_new(method);
  5875. if (ssl_ctx == NULL) {
  5876. goto errout;
  5877. }
  5878. SSL_CTX_set_session_cache_mode(ssl_ctx,
  5879. SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_NO_INTERNAL | SSL_SESS_CACHE_NO_AUTO_CLEAR);
  5880. SSL_CTX_set_default_passwd_cb(ssl_ctx, _dns_server_socket_tls_ssl_pass_callback);
  5881. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, bind_ip);
  5882. /* Set the key and cert */
  5883. if (ssl_cert_file[0] != '\0' && SSL_CTX_use_certificate_chain_file(ssl_ctx, ssl_cert_file) <= 0) {
  5884. tlog(TLOG_ERROR, "load cert %s failed, %s", ssl_cert_file, ERR_error_string(ERR_get_error(), NULL));
  5885. goto errout;
  5886. }
  5887. if (ssl_cert_key_file[0] != '\0' &&
  5888. SSL_CTX_use_PrivateKey_file(ssl_ctx, ssl_cert_key_file, SSL_FILETYPE_PEM) <= 0) {
  5889. tlog(TLOG_ERROR, "load cert key %s failed, %s", ssl_cert_key_file, ERR_error_string(ERR_get_error(), NULL));
  5890. goto errout;
  5891. }
  5892. conn->head.type = conn_type;
  5893. conn->head.fd = fd;
  5894. conn->ssl_ctx = ssl_ctx;
  5895. _dns_server_set_flags(&conn->head, bind_ip);
  5896. _dns_server_conn_get(&conn->head);
  5897. return 0;
  5898. errout:
  5899. if (ssl_ctx) {
  5900. SSL_CTX_free(ssl_ctx);
  5901. ssl_ctx = NULL;
  5902. }
  5903. if (conn) {
  5904. free(conn);
  5905. conn = NULL;
  5906. }
  5907. if (fd > 0) {
  5908. close(fd);
  5909. }
  5910. return -1;
  5911. }
  5912. static int _dns_server_socket(void)
  5913. {
  5914. int i = 0;
  5915. for (i = 0; i < dns_conf_bind_ip_num; i++) {
  5916. struct dns_bind_ip *bind_ip = &dns_conf_bind_ip[i];
  5917. switch (bind_ip->type) {
  5918. case DNS_BIND_TYPE_UDP:
  5919. if (_dns_server_socket_udp(bind_ip) != 0) {
  5920. goto errout;
  5921. }
  5922. break;
  5923. case DNS_BIND_TYPE_TCP:
  5924. if (_dns_server_socket_tcp(bind_ip) != 0) {
  5925. goto errout;
  5926. }
  5927. break;
  5928. case DNS_BIND_TYPE_HTTPS:
  5929. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_HTTPS_SERVER) != 0) {
  5930. goto errout;
  5931. }
  5932. break;
  5933. case DNS_BIND_TYPE_TLS:
  5934. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_TLS_SERVER) != 0) {
  5935. goto errout;
  5936. }
  5937. break;
  5938. default:
  5939. break;
  5940. }
  5941. }
  5942. return 0;
  5943. errout:
  5944. return -1;
  5945. }
  5946. static int _dns_server_audit_init(void)
  5947. {
  5948. char *audit_file = SMARTDNS_AUDIT_FILE;
  5949. if (dns_conf_audit_enable == 0) {
  5950. return 0;
  5951. }
  5952. if (dns_conf_audit_file[0] != 0) {
  5953. audit_file = dns_conf_audit_file;
  5954. }
  5955. dns_audit = tlog_open(audit_file, dns_conf_audit_size, dns_conf_audit_num, 0, 0);
  5956. if (dns_audit == NULL) {
  5957. return -1;
  5958. }
  5959. if (dns_conf_audit_file_mode > 0) {
  5960. tlog_set_permission(dns_audit, dns_conf_audit_file_mode, dns_conf_audit_file_mode);
  5961. }
  5962. if (dns_conf_audit_console != 0) {
  5963. tlog_logscreen(dns_audit, 1);
  5964. }
  5965. return 0;
  5966. }
  5967. static int _dns_server_cache_init(void)
  5968. {
  5969. if (dns_cache_init(dns_conf_cachesize, dns_conf_serve_expired, dns_conf_serve_expired_ttl) != 0) {
  5970. tlog(TLOG_ERROR, "init cache failed.");
  5971. return -1;
  5972. }
  5973. const char *dns_cache_file = dns_conf_get_cache_dir();
  5974. if (dns_conf_cache_persist == 2) {
  5975. uint64_t freespace = get_free_space(dns_cache_file);
  5976. if (freespace >= CACHE_AUTO_ENABLE_SIZE) {
  5977. tlog(TLOG_INFO, "auto enable cache persist.");
  5978. dns_conf_cache_persist = 1;
  5979. }
  5980. }
  5981. if (dns_conf_cachesize <= 0 || dns_conf_cache_persist == 0) {
  5982. return 0;
  5983. }
  5984. if (dns_cache_load(dns_cache_file) != 0) {
  5985. tlog(TLOG_WARN, "Load cache failed.");
  5986. return 0;
  5987. }
  5988. return 0;
  5989. }
  5990. static int _dns_server_cache_save(int check_lock)
  5991. {
  5992. const char *dns_cache_file = dns_conf_get_cache_dir();
  5993. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0) {
  5994. if (access(dns_cache_file, F_OK) == 0) {
  5995. unlink(dns_cache_file);
  5996. }
  5997. return 0;
  5998. }
  5999. if (dns_cache_save(dns_cache_file, check_lock) != 0) {
  6000. tlog(TLOG_WARN, "save cache failed.");
  6001. return -1;
  6002. }
  6003. return 0;
  6004. }
  6005. static int _dns_server_init_wakeup_event(void)
  6006. {
  6007. int fdevent = -1;
  6008. fdevent = eventfd(0, EFD_CLOEXEC | EFD_NONBLOCK);
  6009. if (fdevent < 0) {
  6010. tlog(TLOG_ERROR, "create eventfd failed, %s\n", strerror(errno));
  6011. goto errout;
  6012. }
  6013. struct epoll_event event;
  6014. memset(&event, 0, sizeof(event));
  6015. event.events = EPOLLIN | EPOLLERR;
  6016. event.data.fd = fdevent;
  6017. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_ADD, fdevent, &event) != 0) {
  6018. tlog(TLOG_ERROR, "set eventfd failed, %s\n", strerror(errno));
  6019. goto errout;
  6020. }
  6021. server.event_fd = fdevent;
  6022. return 0;
  6023. errout:
  6024. return -1;
  6025. }
  6026. int dns_server_init(void)
  6027. {
  6028. pthread_attr_t attr;
  6029. int epollfd = -1;
  6030. int ret = -1;
  6031. _dns_server_check_need_exit();
  6032. if (server.epoll_fd > 0) {
  6033. return -1;
  6034. }
  6035. if (_dns_server_cache_init() != 0) {
  6036. tlog(TLOG_ERROR, "init dns cache filed.");
  6037. goto errout;
  6038. }
  6039. if (_dns_server_audit_init() != 0) {
  6040. tlog(TLOG_ERROR, "init audit failed.");
  6041. goto errout;
  6042. }
  6043. memset(&server, 0, sizeof(server));
  6044. pthread_attr_init(&attr);
  6045. INIT_LIST_HEAD(&server.conn_list);
  6046. time(&server.cache_save_time);
  6047. epollfd = epoll_create1(EPOLL_CLOEXEC);
  6048. if (epollfd < 0) {
  6049. tlog(TLOG_ERROR, "create epoll failed, %s\n", strerror(errno));
  6050. goto errout;
  6051. }
  6052. ret = _dns_server_socket();
  6053. if (ret != 0) {
  6054. tlog(TLOG_ERROR, "create server socket failed.\n");
  6055. goto errout;
  6056. }
  6057. pthread_mutex_init(&server.request_list_lock, NULL);
  6058. INIT_LIST_HEAD(&server.request_list);
  6059. server.epoll_fd = epollfd;
  6060. atomic_set(&server.run, 1);
  6061. if (dns_server_start() != 0) {
  6062. tlog(TLOG_ERROR, "start service failed.\n");
  6063. goto errout;
  6064. }
  6065. dns_server_check_ipv6_ready();
  6066. tlog(TLOG_INFO, "%s",
  6067. (is_ipv6_ready) ? "IPV6 is ready, enable IPV6 features" : "IPV6 is not ready, disable IPV6 features");
  6068. if (_dns_server_init_wakeup_event() != 0) {
  6069. tlog(TLOG_ERROR, "init wakeup event failed.");
  6070. goto errout;
  6071. }
  6072. return 0;
  6073. errout:
  6074. atomic_set(&server.run, 0);
  6075. if (epollfd) {
  6076. close(epollfd);
  6077. }
  6078. _dns_server_close_socket();
  6079. pthread_mutex_destroy(&server.request_list_lock);
  6080. dns_cache_destroy();
  6081. return -1;
  6082. }
  6083. void dns_server_stop(void)
  6084. {
  6085. atomic_set(&server.run, 0);
  6086. _dns_server_wakeup_thread();
  6087. }
  6088. void dns_server_exit(void)
  6089. {
  6090. if (server.event_fd > 0) {
  6091. close(server.event_fd);
  6092. server.event_fd = -1;
  6093. }
  6094. if (server.cache_save_pid > 0) {
  6095. kill(server.cache_save_pid, SIGKILL);
  6096. server.cache_save_pid = 0;
  6097. }
  6098. _dns_server_close_socket();
  6099. _dns_server_cache_save(0);
  6100. _dns_server_request_remove_all();
  6101. pthread_mutex_destroy(&server.request_list_lock);
  6102. dns_cache_destroy();
  6103. }