audit.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. /*************************************************************************
  2. *
  3. * Copyright (C) 2018-2025 Ruilin Peng (Nick) <[email protected]>.
  4. *
  5. * smartdns is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * smartdns is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #include "audit.h"
  19. #include "dns_server.h"
  20. #include "smartdns/dns_plugin.h"
  21. #include <syslog.h>
  22. static tlog_log *dns_audit;
  23. void _dns_server_audit_log(struct dns_server_post_context *context)
  24. {
  25. char req_host[MAX_IP_LEN];
  26. char req_result[1024] = {0};
  27. char *ip_msg = req_result;
  28. char req_time[MAX_IP_LEN] = {0};
  29. struct tlog_time tm;
  30. int i = 0;
  31. int j = 0;
  32. int rr_count = 0;
  33. struct dns_rrs *rrs = NULL;
  34. char name[DNS_MAX_CNAME_LEN] = {0};
  35. int ttl = 0;
  36. int len = 0;
  37. int left_len = sizeof(req_result);
  38. int total_len = 0;
  39. int ip_num = 0;
  40. struct dns_request *request = context->request;
  41. int has_soa = request->has_soa;
  42. if (atomic_read(&request->notified) == 1) {
  43. request->query_time = get_tick_count() - request->send_tick;
  44. }
  45. if (dns_audit == NULL || !dns_conf.audit_enable || context->do_audit == 0) {
  46. return;
  47. }
  48. /* skip log prefetch request and dualstack selection request */
  49. if (request->prefetch || request->dualstack_selection_query) {
  50. return;
  51. }
  52. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  53. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  54. for (i = 0; i < rr_count && rrs && left_len > 0; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  55. switch (rrs->type) {
  56. case DNS_T_A: {
  57. unsigned char ipv4_addr[4];
  58. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  59. continue;
  60. }
  61. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  62. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  63. continue;
  64. }
  65. const char *fmt = "%d.%d.%d.%d";
  66. if (ip_num > 0) {
  67. fmt = ", %d.%d.%d.%d";
  68. }
  69. len =
  70. snprintf(ip_msg + total_len, left_len, fmt, ipv4_addr[0], ipv4_addr[1], ipv4_addr[2], ipv4_addr[3]);
  71. ip_num++;
  72. has_soa = 0;
  73. } break;
  74. case DNS_T_AAAA: {
  75. unsigned char ipv6_addr[16];
  76. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  77. continue;
  78. }
  79. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  80. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  81. continue;
  82. }
  83. const char *fmt = "%s";
  84. if (ip_num > 0) {
  85. fmt = ", %s";
  86. }
  87. req_host[0] = '\0';
  88. inet_ntop(AF_INET6, ipv6_addr, req_host, sizeof(req_host));
  89. len = snprintf(ip_msg + total_len, left_len, fmt, req_host);
  90. ip_num++;
  91. has_soa = 0;
  92. } break;
  93. case DNS_T_SOA: {
  94. if (ip_num == 0) {
  95. has_soa = 1;
  96. }
  97. } break;
  98. default:
  99. continue;
  100. }
  101. if (len < 0 || len >= left_len) {
  102. left_len = 0;
  103. break;
  104. }
  105. left_len -= len;
  106. total_len += len;
  107. }
  108. }
  109. if (has_soa && ip_num == 0) {
  110. if (!dns_conf.audit_log_SOA) {
  111. return;
  112. }
  113. if (request->dualstack_selection_force_soa) {
  114. snprintf(req_result, left_len, "dualstack soa");
  115. } else {
  116. snprintf(req_result, left_len, "soa");
  117. }
  118. }
  119. get_host_by_addr(req_host, sizeof(req_host), &request->addr);
  120. tlog_localtime(&tm);
  121. if (req_host[0] == '\0') {
  122. safe_strncpy(req_host, "API", MAX_IP_LEN);
  123. }
  124. if (dns_conf.audit_syslog == 0) {
  125. snprintf(req_time, sizeof(req_time), "[%.4d-%.2d-%.2d %.2d:%.2d:%.2d,%.3d] ", tm.year, tm.mon, tm.mday, tm.hour,
  126. tm.min, tm.sec, tm.usec / 1000);
  127. }
  128. tlog_printf(dns_audit, "%s%s query %s, type %d, time %dms, speed: %.1fms, group %s, result %s\n", req_time,
  129. req_host, request->domain, request->qtype, request->query_time, ((float)request->ping_time) / 10,
  130. request->dns_group_name[0] != '\0' ? request->dns_group_name : DNS_SERVER_GROUP_DEFAULT, req_result);
  131. }
  132. static int _dns_server_audit_syslog(struct tlog_log *log, const char *buff, int bufflen)
  133. {
  134. syslog(LOG_INFO, "%.*s", bufflen, buff);
  135. return 0;
  136. }
  137. static int _dns_server_audit_output_callback(struct tlog_log *log, const char *buff, int bufflen)
  138. {
  139. smartdns_plugin_func_server_audit_log_callback(buff, bufflen);
  140. if (dns_conf.audit_syslog) {
  141. return _dns_server_audit_syslog(log, buff, bufflen);
  142. }
  143. return tlog_write(log, buff, bufflen);
  144. }
  145. int _dns_server_audit_init(void)
  146. {
  147. char *audit_file = SMARTDNS_AUDIT_FILE;
  148. unsigned int tlog_flag = 0;
  149. if (dns_conf.audit_enable == 0) {
  150. return 0;
  151. }
  152. if (dns_conf.audit_file[0] != 0) {
  153. audit_file = dns_conf.audit_file;
  154. }
  155. if (dns_conf.audit_syslog) {
  156. tlog_flag |= TLOG_SEGMENT;
  157. }
  158. dns_audit = tlog_open(audit_file, dns_conf.audit_size, dns_conf.audit_num, 0, tlog_flag);
  159. if (dns_audit == NULL) {
  160. return -1;
  161. }
  162. tlog_reg_output_func(dns_audit, _dns_server_audit_output_callback);
  163. if (dns_conf.audit_file_mode > 0) {
  164. tlog_set_permission(dns_audit, dns_conf.audit_file_mode, dns_conf.audit_file_mode);
  165. }
  166. if (dns_conf.audit_console != 0) {
  167. tlog_logscreen(dns_audit, 1);
  168. }
  169. return 0;
  170. }