dns_server.c 195 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399
  1. /*************************************************************************
  2. *
  3. * Copyright (C) 2018-2023 Ruilin Peng (Nick) <[email protected]>.
  4. *
  5. * smartdns is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * smartdns is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #ifndef _GNU_SOURCE
  19. #define _GNU_SOURCE
  20. #endif
  21. #include "dns_server.h"
  22. #include "atomic.h"
  23. #include "dns.h"
  24. #include "dns_cache.h"
  25. #include "dns_client.h"
  26. #include "dns_conf.h"
  27. #include "fast_ping.h"
  28. #include "hashtable.h"
  29. #include "list.h"
  30. #include "nftset.h"
  31. #include "tlog.h"
  32. #include "util.h"
  33. #include <errno.h>
  34. #include <fcntl.h>
  35. #include <ifaddrs.h>
  36. #include <net/if.h>
  37. #include <netinet/ip.h>
  38. #include <netinet/tcp.h>
  39. #include <openssl/err.h>
  40. #include <openssl/evp.h>
  41. #include <openssl/pem.h>
  42. #include <openssl/rsa.h>
  43. #include <openssl/ssl.h>
  44. #include <openssl/x509.h>
  45. #include <pthread.h>
  46. #include <signal.h>
  47. #include <stdio.h>
  48. #include <stdlib.h>
  49. #include <string.h>
  50. #include <sys/epoll.h>
  51. #include <sys/eventfd.h>
  52. #include <sys/ioctl.h>
  53. #include <sys/socket.h>
  54. #include <sys/types.h>
  55. #include <sys/wait.h>
  56. #define DNS_MAX_EVENTS 256
  57. #define IPV6_READY_CHECK_TIME 180
  58. #define DNS_SERVER_TMOUT_TTL (5 * 60)
  59. #define DNS_SERVER_FAIL_TTL (60)
  60. #define DNS_SERVER_SOA_TTL (30)
  61. #define DNS_SERVER_ADDR_TTL (60)
  62. #define DNS_CONN_BUFF_SIZE 4096
  63. #define DNS_REQUEST_MAX_TIMEOUT 950
  64. #define DNS_PING_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT)
  65. #define DNS_PING_CHECK_INTERVAL (250)
  66. #define DNS_PING_SECOND_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT - DNS_PING_CHECK_INTERVAL)
  67. #define SOCKET_IP_TOS (IPTOS_LOWDELAY | IPTOS_RELIABILITY)
  68. #define SOCKET_PRIORITY (6)
  69. #define CACHE_AUTO_ENABLE_SIZE (1024 * 1024 * 128)
  70. #define EXPIRED_DOMAIN_PREFETCH_TIME (3600 * 8)
  71. #define DNS_MAX_DOMAIN_REFETCH_NUM 64
  72. #define PREFETCH_FLAGS_NO_DUALSTACK (1 << 0)
  73. #define PREFETCH_FLAGS_EXPIRED (1 << 1)
  74. #define RECV_ERROR_AGAIN 1
  75. #define RECV_ERROR_OK 0
  76. #define RECV_ERROR_FAIL (-1)
  77. #define RECV_ERROR_CLOSE (-2)
  78. #define RECV_ERROR_INVALID_PACKET (-3)
  79. typedef enum {
  80. DNS_CONN_TYPE_UDP_SERVER = 0,
  81. DNS_CONN_TYPE_TCP_SERVER,
  82. DNS_CONN_TYPE_TCP_CLIENT,
  83. DNS_CONN_TYPE_TLS_SERVER,
  84. DNS_CONN_TYPE_TLS_CLIENT,
  85. DNS_CONN_TYPE_HTTPS_SERVER,
  86. DNS_CONN_TYPE_HTTPS_CLIENT,
  87. } DNS_CONN_TYPE;
  88. typedef enum DNS_CHILD_POST_RESULT {
  89. DNS_CHILD_POST_SUCCESS = 0,
  90. DNS_CHILD_POST_FAIL,
  91. DNS_CHILD_POST_SKIP,
  92. DNS_CHILD_POST_NO_RESPONSE,
  93. } DNS_CHILD_POST_RESULT;
  94. struct rule_walk_args {
  95. void *args;
  96. unsigned char *key[DOMAIN_RULE_MAX];
  97. uint32_t key_len[DOMAIN_RULE_MAX];
  98. };
  99. struct dns_conn_buf {
  100. char buf[DNS_CONN_BUFF_SIZE];
  101. int buffsize;
  102. int size;
  103. };
  104. struct dns_server_conn_head {
  105. DNS_CONN_TYPE type;
  106. int fd;
  107. struct list_head list;
  108. time_t last_request_time;
  109. atomic_t refcnt;
  110. const char *dns_group;
  111. uint32_t server_flags;
  112. struct nftset_ipset_rules *ipset_nftset_rule;
  113. };
  114. struct dns_server_post_context {
  115. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  116. unsigned char *inpacket;
  117. int inpacket_maxlen;
  118. int inpacket_len;
  119. unsigned char packet_buff[DNS_PACKSIZE];
  120. unsigned int packet_maxlen;
  121. struct dns_request *request;
  122. struct dns_packet *packet;
  123. int ip_num;
  124. const unsigned char *ip_addr[MAX_IP_NUM];
  125. dns_type_t qtype;
  126. int do_cache;
  127. int do_reply;
  128. int do_ipset;
  129. int do_log_result;
  130. int reply_ttl;
  131. int cache_ttl;
  132. int no_check_add_ip;
  133. int do_audit;
  134. int do_force_soa;
  135. int skip_notify_count;
  136. int select_all_best_ip;
  137. int no_release_parent;
  138. };
  139. typedef enum dns_server_client_status {
  140. DNS_SERVER_CLIENT_STATUS_INIT = 0,
  141. DNS_SERVER_CLIENT_STATUS_CONNECTING,
  142. DNS_SERVER_CLIENT_STATUS_CONNECTIONLESS,
  143. DNS_SERVER_CLIENT_STATUS_CONNECTED,
  144. DNS_SERVER_CLIENT_STATUS_DISCONNECTED,
  145. } dns_server_client_status;
  146. struct dns_server_conn_udp {
  147. struct dns_server_conn_head head;
  148. socklen_t addr_len;
  149. struct sockaddr_storage addr;
  150. };
  151. struct dns_server_conn_tcp_server {
  152. struct dns_server_conn_head head;
  153. };
  154. struct dns_server_conn_tls_server {
  155. struct dns_server_conn_head head;
  156. SSL_CTX *ssl_ctx;
  157. };
  158. struct dns_server_conn_tcp_client {
  159. struct dns_server_conn_head head;
  160. struct dns_conn_buf recvbuff;
  161. struct dns_conn_buf sndbuff;
  162. socklen_t addr_len;
  163. struct sockaddr_storage addr;
  164. socklen_t localaddr_len;
  165. struct sockaddr_storage localaddr;
  166. dns_server_client_status status;
  167. };
  168. struct dns_server_conn_tls_client {
  169. struct dns_server_conn_head head;
  170. struct dns_conn_buf recvbuff;
  171. struct dns_conn_buf sndbuff;
  172. socklen_t addr_len;
  173. struct sockaddr_storage addr;
  174. socklen_t localaddr_len;
  175. struct sockaddr_storage localaddr;
  176. dns_server_client_status status;
  177. SSL *ssl;
  178. pthread_mutex_t ssl_lock;
  179. };
  180. /* ip address lists of domain */
  181. struct dns_ip_address {
  182. struct hlist_node node;
  183. int hitnum;
  184. unsigned long recv_tick;
  185. int ping_time;
  186. dns_type_t addr_type;
  187. char cname[DNS_MAX_CNAME_LEN];
  188. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  189. };
  190. struct dns_request_pending_list {
  191. pthread_mutex_t request_list_lock;
  192. unsigned short qtype;
  193. char domain[DNS_MAX_CNAME_LEN];
  194. uint32_t server_flags;
  195. char dns_group_name[DNS_GROUP_NAME_LEN];
  196. struct list_head request_list;
  197. struct hlist_node node;
  198. };
  199. struct dns_request_domain_rule {
  200. struct dns_rule *rules[DOMAIN_RULE_MAX];
  201. int is_sub_rule[DOMAIN_RULE_MAX];
  202. };
  203. typedef DNS_CHILD_POST_RESULT (*child_request_callback)(struct dns_request *request, struct dns_request *child_request,
  204. int is_first_resp);
  205. struct dns_request {
  206. atomic_t refcnt;
  207. struct dns_server_conn_head *conn;
  208. uint32_t server_flags;
  209. char dns_group_name[DNS_GROUP_NAME_LEN];
  210. /* dns request list */
  211. struct list_head list;
  212. struct list_head pending_list;
  213. /* dns request timeout check list */
  214. struct list_head check_list;
  215. /* dns query */
  216. char domain[DNS_MAX_CNAME_LEN];
  217. dns_type_t qtype;
  218. int qclass;
  219. unsigned long send_tick;
  220. unsigned short id;
  221. unsigned short rcode;
  222. unsigned short ss_family;
  223. char remote_server_fail;
  224. char skip_qtype_soa;
  225. socklen_t addr_len;
  226. union {
  227. struct sockaddr_in in;
  228. struct sockaddr_in6 in6;
  229. struct sockaddr addr;
  230. };
  231. struct sockaddr_storage localaddr;
  232. int has_ecs;
  233. struct dns_opt_ecs ecs;
  234. dns_result_callback result_callback;
  235. void *user_ptr;
  236. int has_ping_result;
  237. int has_ping_tcp;
  238. int has_ptr;
  239. char ptr_hostname[DNS_MAX_CNAME_LEN];
  240. int has_cname;
  241. char cname[DNS_MAX_CNAME_LEN];
  242. int ttl_cname;
  243. int has_ip;
  244. int ping_time;
  245. int ip_ttl;
  246. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  247. struct dns_soa soa;
  248. int has_soa;
  249. int force_soa;
  250. atomic_t notified;
  251. atomic_t do_callback;
  252. atomic_t adblock;
  253. atomic_t soa_num;
  254. /* send original raw packet to server/client like proxy */
  255. int passthrough;
  256. int request_wait;
  257. int prefetch;
  258. int prefetch_flags;
  259. int dualstack_selection;
  260. int dualstack_selection_force_soa;
  261. int dualstack_selection_query;
  262. int dualstack_selection_ping_time;
  263. int dualstack_selection_has_ip;
  264. struct dns_request *dualstack_request;
  265. int no_serve_expired;
  266. pthread_mutex_t ip_map_lock;
  267. struct dns_request *child_request;
  268. struct dns_request *parent_request;
  269. child_request_callback child_callback;
  270. atomic_t ip_map_num;
  271. DECLARE_HASHTABLE(ip_map, 4);
  272. struct dns_request_domain_rule domain_rule;
  273. int skip_domain_rule;
  274. struct dns_domain_check_orders *check_order_list;
  275. int check_order;
  276. enum response_mode_type response_mode;
  277. struct dns_request_pending_list *request_pending_list;
  278. int no_select_possible_ip;
  279. int no_cache_cname;
  280. int no_cache;
  281. int no_ipalias;
  282. int has_cname_loop;
  283. };
  284. /* dns server data */
  285. struct dns_server {
  286. atomic_t run;
  287. int epoll_fd;
  288. int event_fd;
  289. struct list_head conn_list;
  290. pid_t cache_save_pid;
  291. time_t cache_save_time;
  292. /* dns request list */
  293. pthread_mutex_t request_list_lock;
  294. struct list_head request_list;
  295. DECLARE_HASHTABLE(request_pending, 4);
  296. pthread_mutex_t request_pending_lock;
  297. };
  298. static struct dns_server server;
  299. static tlog_log *dns_audit;
  300. static int is_ipv6_ready;
  301. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype,
  302. struct dns_server_query_option *server_query_option, int prefetch_flags);
  303. static int _dns_server_get_answer(struct dns_server_post_context *context);
  304. static void _dns_server_request_get(struct dns_request *request);
  305. static void _dns_server_request_release(struct dns_request *request);
  306. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete);
  307. static int _dns_server_request_complete(struct dns_request *request);
  308. static int _dns_server_reply_passthrough(struct dns_server_post_context *context);
  309. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event);
  310. static int _dns_request_post(struct dns_server_post_context *context);
  311. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context);
  312. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule);
  313. static const char *_dns_server_get_request_groupname(struct dns_request *request);
  314. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len);
  315. static int _dns_server_cache_save(int check_lock);
  316. int dns_is_ipv6_ready(void)
  317. {
  318. return is_ipv6_ready;
  319. }
  320. static void _dns_server_wakeup_thread(void)
  321. {
  322. uint64_t u = 1;
  323. int unused __attribute__((unused));
  324. unused = write(server.event_fd, &u, sizeof(u));
  325. }
  326. static int _dns_server_forward_request(unsigned char *inpacket, int inpacket_len)
  327. {
  328. return -1;
  329. }
  330. static int _dns_server_has_bind_flag(struct dns_request *request, uint32_t flag)
  331. {
  332. if (request->server_flags & flag) {
  333. return 0;
  334. }
  335. return -1;
  336. }
  337. static void *_dns_server_get_bind_ipset_nftset_rule(struct dns_request *request, enum domain_rule type)
  338. {
  339. if (request->conn == NULL) {
  340. return NULL;
  341. }
  342. if (request->conn->ipset_nftset_rule == NULL) {
  343. return NULL;
  344. }
  345. switch (type) {
  346. case DOMAIN_RULE_IPSET:
  347. return request->conn->ipset_nftset_rule->ipset;
  348. case DOMAIN_RULE_IPSET_IPV4:
  349. return request->conn->ipset_nftset_rule->ipset_ip;
  350. case DOMAIN_RULE_IPSET_IPV6:
  351. return request->conn->ipset_nftset_rule->ipset_ip6;
  352. case DOMAIN_RULE_NFTSET_IP:
  353. return request->conn->ipset_nftset_rule->nftset_ip;
  354. case DOMAIN_RULE_NFTSET_IP6:
  355. return request->conn->ipset_nftset_rule->nftset_ip6;
  356. default:
  357. break;
  358. }
  359. return NULL;
  360. }
  361. static int _dns_server_get_reply_ttl(struct dns_request *request, int ttl)
  362. {
  363. int reply_ttl = ttl;
  364. if ((request->passthrough == 0 || request->passthrough == 2) && dns_conf_cachesize > 0 &&
  365. request->check_order_list->orders[0].type != DOMAIN_CHECK_NONE) {
  366. reply_ttl = dns_conf_serve_expired_reply_ttl;
  367. if (reply_ttl < 2) {
  368. reply_ttl = 2;
  369. }
  370. }
  371. return reply_ttl;
  372. }
  373. static int _dns_server_get_conf_ttl(struct dns_request *request, int ttl)
  374. {
  375. int rr_ttl = dns_conf_rr_ttl;
  376. int rr_ttl_min = dns_conf_rr_ttl_min;
  377. int rr_ttl_max = dns_conf_rr_ttl_max;
  378. struct dns_ttl_rule *ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  379. if (ttl_rule != NULL) {
  380. if (ttl_rule->ttl > 0) {
  381. rr_ttl = ttl_rule->ttl;
  382. }
  383. /* make domain rule ttl high priority */
  384. if (ttl_rule->ttl_min > 0) {
  385. rr_ttl_min = ttl_rule->ttl_min;
  386. if (dns_conf_rr_ttl_max <= rr_ttl_min && dns_conf_rr_ttl_max > 0) {
  387. rr_ttl_max = rr_ttl_min;
  388. }
  389. }
  390. if (ttl_rule->ttl_max > 0) {
  391. rr_ttl_max = ttl_rule->ttl_max;
  392. if (dns_conf_rr_ttl_min >= rr_ttl_max && dns_conf_rr_ttl_min > 0 && ttl_rule->ttl_min <= 0) {
  393. rr_ttl_min = rr_ttl_max;
  394. }
  395. }
  396. }
  397. if (rr_ttl > 0) {
  398. return rr_ttl;
  399. }
  400. /* make rr_ttl_min first priority */
  401. if (rr_ttl_max < rr_ttl_min && rr_ttl_max > 0) {
  402. rr_ttl_max = rr_ttl_min;
  403. }
  404. if (rr_ttl_max > 0 && ttl >= rr_ttl_max) {
  405. ttl = rr_ttl_max;
  406. } else if (rr_ttl_min > 0 && ttl <= rr_ttl_min) {
  407. ttl = rr_ttl_min;
  408. }
  409. return ttl;
  410. }
  411. static int _dns_server_epoll_ctl(struct dns_server_conn_head *head, int op, uint32_t events)
  412. {
  413. struct epoll_event event;
  414. memset(&event, 0, sizeof(event));
  415. event.events = events;
  416. event.data.ptr = head;
  417. if (epoll_ctl(server.epoll_fd, op, head->fd, &event) != 0) {
  418. return -1;
  419. }
  420. return 0;
  421. }
  422. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule)
  423. {
  424. if (rule >= DOMAIN_RULE_MAX || request == NULL) {
  425. return NULL;
  426. }
  427. return request->domain_rule.rules[rule];
  428. }
  429. static int _dns_server_is_dns_rule_extract_match(struct dns_request *request, enum domain_rule rule)
  430. {
  431. if (rule >= DOMAIN_RULE_MAX || request == NULL) {
  432. return 0;
  433. }
  434. return request->domain_rule.is_sub_rule[rule] == 0;
  435. }
  436. static int _dns_server_is_dns64_request(struct dns_request *request)
  437. {
  438. if (request->qtype != DNS_T_AAAA) {
  439. return 0;
  440. }
  441. if (request->dualstack_selection_query == 1) {
  442. return 0;
  443. }
  444. if (dns_conf_dns_dns64.prefix_len <= 0) {
  445. return 0;
  446. }
  447. return 1;
  448. }
  449. static void _dns_server_set_dualstack_selection(struct dns_request *request)
  450. {
  451. struct dns_rule_flags *rule_flag = NULL;
  452. if (request->dualstack_selection_query || is_ipv6_ready == 0) {
  453. request->dualstack_selection = 0;
  454. return;
  455. }
  456. if ((request->prefetch_flags & PREFETCH_FLAGS_NO_DUALSTACK) != 0 ||
  457. (request->prefetch_flags & PREFETCH_FLAGS_EXPIRED) != 0) {
  458. request->dualstack_selection = 0;
  459. return;
  460. }
  461. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  462. if (rule_flag) {
  463. if (rule_flag->flags & DOMAIN_FLAG_DUALSTACK_SELECT) {
  464. request->dualstack_selection = 1;
  465. return;
  466. }
  467. if (rule_flag->is_flag_set & DOMAIN_FLAG_DUALSTACK_SELECT) {
  468. request->dualstack_selection = 0;
  469. return;
  470. }
  471. }
  472. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_DUALSTACK_SELECTION) == 0) {
  473. request->dualstack_selection = 0;
  474. return;
  475. }
  476. request->dualstack_selection = dns_conf_dualstack_ip_selection;
  477. }
  478. static int _dns_server_is_return_soa_qtype(struct dns_request *request, dns_type_t qtype)
  479. {
  480. struct dns_rule_flags *rule_flag = NULL;
  481. unsigned int flags = 0;
  482. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_SOA) == 0) {
  483. /* when both has no rule SOA and force AAAA soa, force AAAA soa has high priority */
  484. if (qtype == DNS_T_AAAA && _dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0) {
  485. return 1;
  486. }
  487. return 0;
  488. }
  489. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  490. if (rule_flag) {
  491. flags = rule_flag->flags;
  492. if (flags & DOMAIN_FLAG_ADDR_SOA) {
  493. return 1;
  494. }
  495. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  496. request->skip_qtype_soa = 1;
  497. return 0;
  498. }
  499. switch (qtype) {
  500. case DNS_T_A:
  501. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA) {
  502. return 1;
  503. }
  504. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  505. request->skip_qtype_soa = 1;
  506. return 0;
  507. }
  508. break;
  509. case DNS_T_AAAA:
  510. if (flags & DOMAIN_FLAG_ADDR_IPV6_SOA) {
  511. return 1;
  512. }
  513. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  514. request->skip_qtype_soa = 1;
  515. return 0;
  516. }
  517. break;
  518. default:
  519. break;
  520. }
  521. }
  522. if (qtype == DNS_T_AAAA) {
  523. if (_dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0 || dns_conf_force_AAAA_SOA == 1) {
  524. return 1;
  525. }
  526. }
  527. return 0;
  528. }
  529. static int _dns_server_is_return_soa(struct dns_request *request)
  530. {
  531. return _dns_server_is_return_soa_qtype(request, request->qtype);
  532. }
  533. static void _dns_server_post_context_init(struct dns_server_post_context *context, struct dns_request *request)
  534. {
  535. memset(context, 0, sizeof(*context));
  536. context->packet = (struct dns_packet *)(context->packet_buff);
  537. context->packet_maxlen = sizeof(context->packet_buff);
  538. context->inpacket = (unsigned char *)(context->inpacket_buff);
  539. context->inpacket_maxlen = sizeof(context->inpacket_buff);
  540. context->qtype = request->qtype;
  541. context->request = request;
  542. }
  543. static void _dns_server_context_add_ip(struct dns_server_post_context *context, const unsigned char *ip_addr)
  544. {
  545. if (context->ip_num < MAX_IP_NUM) {
  546. context->ip_addr[context->ip_num] = ip_addr;
  547. }
  548. context->ip_num++;
  549. }
  550. static void _dns_server_post_context_init_from(struct dns_server_post_context *context, struct dns_request *request,
  551. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len)
  552. {
  553. memset(context, 0, sizeof(*context));
  554. context->packet = packet;
  555. context->packet_maxlen = sizeof(context->packet_buff);
  556. context->inpacket = inpacket;
  557. context->inpacket_len = inpacket_len;
  558. context->inpacket_maxlen = sizeof(context->inpacket);
  559. context->qtype = request->qtype;
  560. context->request = request;
  561. }
  562. static struct dns_ip_address *_dns_ip_address_get(struct dns_request *request, unsigned char *addr,
  563. dns_type_t addr_type)
  564. {
  565. uint32_t key = 0;
  566. struct dns_ip_address *addr_map = NULL;
  567. struct dns_ip_address *addr_tmp = NULL;
  568. int addr_len = 0;
  569. if (addr_type == DNS_T_A) {
  570. addr_len = DNS_RR_A_LEN;
  571. } else if (addr_type == DNS_T_AAAA) {
  572. addr_len = DNS_RR_AAAA_LEN;
  573. } else {
  574. return NULL;
  575. }
  576. /* store the ip address and the number of hits */
  577. key = jhash(addr, addr_len, 0);
  578. key = jhash(&addr_type, sizeof(addr_type), key);
  579. pthread_mutex_lock(&request->ip_map_lock);
  580. hash_for_each_possible(request->ip_map, addr_tmp, node, key)
  581. {
  582. if (addr_type != addr_tmp->addr_type) {
  583. continue;
  584. }
  585. if (memcmp(addr_tmp->ip_addr, addr, addr_len) != 0) {
  586. continue;
  587. }
  588. addr_map = addr_tmp;
  589. break;
  590. }
  591. pthread_mutex_unlock(&request->ip_map_lock);
  592. return addr_map;
  593. }
  594. static void _dns_server_audit_log(struct dns_server_post_context *context)
  595. {
  596. char req_host[MAX_IP_LEN];
  597. char req_result[1024] = {0};
  598. char *ip_msg = req_result;
  599. char req_time[MAX_IP_LEN];
  600. struct tlog_time tm;
  601. int i = 0;
  602. int j = 0;
  603. int rr_count = 0;
  604. struct dns_rrs *rrs = NULL;
  605. char name[DNS_MAX_CNAME_LEN] = {0};
  606. int ttl = 0;
  607. int len = 0;
  608. int left_len = sizeof(req_result);
  609. int total_len = 0;
  610. int ip_num = 0;
  611. struct dns_request *request = context->request;
  612. int has_soa = request->has_soa;
  613. if (dns_audit == NULL || !dns_conf_audit_enable || context->do_audit == 0) {
  614. return;
  615. }
  616. if (request->conn == NULL) {
  617. return;
  618. }
  619. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  620. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  621. for (i = 0; i < rr_count && rrs && left_len > 0; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  622. switch (rrs->type) {
  623. case DNS_T_A: {
  624. unsigned char ipv4_addr[4];
  625. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  626. continue;
  627. }
  628. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  629. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  630. continue;
  631. }
  632. const char *fmt = "%d.%d.%d.%d";
  633. if (ip_num > 0) {
  634. fmt = ", %d.%d.%d.%d";
  635. }
  636. len =
  637. snprintf(ip_msg + total_len, left_len, fmt, ipv4_addr[0], ipv4_addr[1], ipv4_addr[2], ipv4_addr[3]);
  638. ip_num++;
  639. has_soa = 0;
  640. } break;
  641. case DNS_T_AAAA: {
  642. unsigned char ipv6_addr[16];
  643. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  644. continue;
  645. }
  646. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  647. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  648. continue;
  649. }
  650. const char *fmt = "%s";
  651. if (ip_num > 0) {
  652. fmt = ", %s";
  653. }
  654. req_host[0] = '\0';
  655. inet_ntop(AF_INET6, ipv6_addr, req_host, sizeof(req_host));
  656. len = snprintf(ip_msg + total_len, left_len, fmt, req_host);
  657. ip_num++;
  658. has_soa = 0;
  659. } break;
  660. case DNS_T_SOA: {
  661. if (ip_num == 0) {
  662. has_soa = 1;
  663. }
  664. } break;
  665. default:
  666. continue;
  667. }
  668. if (len < 0 || len >= left_len) {
  669. left_len = 0;
  670. break;
  671. }
  672. left_len -= len;
  673. total_len += len;
  674. }
  675. }
  676. if (has_soa && ip_num == 0) {
  677. if (!dns_conf_audit_log_SOA) {
  678. return;
  679. }
  680. if (request->dualstack_selection_force_soa) {
  681. snprintf(req_result, left_len, "dualstack soa");
  682. } else {
  683. snprintf(req_result, left_len, "soa");
  684. }
  685. }
  686. get_host_by_addr(req_host, sizeof(req_host), &request->addr);
  687. tlog_localtime(&tm);
  688. if (req_host[0] == '\0') {
  689. safe_strncpy(req_host, "API", MAX_IP_LEN);
  690. }
  691. snprintf(req_time, sizeof(req_time), "[%.4d-%.2d-%.2d %.2d:%.2d:%.2d,%.3d]", tm.year, tm.mon, tm.mday, tm.hour,
  692. tm.min, tm.sec, tm.usec / 1000);
  693. tlog_printf(dns_audit, "%s %s query %s, type %d, time %lums, speed: %.1fms, result %s\n", req_time, req_host,
  694. request->domain, request->qtype, get_tick_count() - request->send_tick,
  695. ((float)request->ping_time) / 10, req_result);
  696. }
  697. static void _dns_rrs_result_log(struct dns_server_post_context *context, struct dns_ip_address *addr_map)
  698. {
  699. struct dns_request *request = context->request;
  700. if (context->do_log_result == 0 || addr_map == NULL) {
  701. return;
  702. }
  703. if (addr_map->addr_type == DNS_T_A) {
  704. tlog(TLOG_INFO, "result: %s, id: %d, index: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->id,
  705. context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0], addr_map->ip_addr[1],
  706. addr_map->ip_addr[2], addr_map->ip_addr[3]);
  707. } else if (addr_map->addr_type == DNS_T_AAAA) {
  708. tlog(TLOG_INFO,
  709. "result: %s, id: %d, index: %d, rtt: %.1f ms, "
  710. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  711. request->domain, request->id, context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0],
  712. addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3], addr_map->ip_addr[4],
  713. addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7], addr_map->ip_addr[8],
  714. addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11], addr_map->ip_addr[12],
  715. addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  716. }
  717. }
  718. static int _dns_rrs_add_all_best_ip(struct dns_server_post_context *context)
  719. {
  720. struct dns_ip_address *addr_map = NULL;
  721. struct dns_ip_address *added_ip_addr = NULL;
  722. struct hlist_node *tmp = NULL;
  723. struct dns_request *request = context->request;
  724. unsigned long bucket = 0;
  725. char *domain = NULL;
  726. int ret = 0;
  727. int ignore_speed = 0;
  728. int maxhit = 0;
  729. if (context->select_all_best_ip == 0 || context->ip_num >= dns_conf_max_reply_ip_num) {
  730. return 0;
  731. }
  732. domain = request->domain;
  733. /* add CNAME record */
  734. if (request->has_cname) {
  735. domain = request->cname;
  736. }
  737. /* add fasted ip address at first place of dns RR */
  738. if (request->has_ip) {
  739. added_ip_addr = _dns_ip_address_get(request, request->ip_addr, request->qtype);
  740. _dns_rrs_result_log(context, added_ip_addr);
  741. }
  742. if (request->passthrough == 2) {
  743. ignore_speed = 1;
  744. }
  745. while (true) {
  746. pthread_mutex_lock(&request->ip_map_lock);
  747. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  748. {
  749. if (context->ip_num >= dns_conf_max_reply_ip_num) {
  750. break;
  751. }
  752. if (context->qtype != addr_map->addr_type) {
  753. continue;
  754. }
  755. if (addr_map == added_ip_addr) {
  756. continue;
  757. }
  758. if (addr_map->hitnum > maxhit) {
  759. maxhit = addr_map->hitnum;
  760. }
  761. if (addr_map->ping_time < 0 && ignore_speed == 0) {
  762. continue;
  763. }
  764. if (addr_map->hitnum < maxhit && ignore_speed == 1) {
  765. continue;
  766. }
  767. /* if ping time is larger than 5ms, check again. */
  768. if (addr_map->ping_time - request->ping_time >= 50) {
  769. int ttl_range = request->ping_time + request->ping_time / 10 + 5;
  770. if ((ttl_range < addr_map->ping_time) && addr_map->ping_time >= 100 && ignore_speed == 0) {
  771. continue;
  772. }
  773. }
  774. _dns_server_context_add_ip(context, addr_map->ip_addr);
  775. if (addr_map->addr_type == DNS_T_A) {
  776. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  777. } else if (addr_map->addr_type == DNS_T_AAAA) {
  778. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  779. }
  780. _dns_rrs_result_log(context, addr_map);
  781. }
  782. pthread_mutex_unlock(&request->ip_map_lock);
  783. if (context->ip_num <= 0 && ignore_speed == 0) {
  784. ignore_speed = 1;
  785. } else {
  786. break;
  787. }
  788. }
  789. return ret;
  790. }
  791. static void _dns_server_setup_soa(struct dns_request *request)
  792. {
  793. struct dns_soa *soa = NULL;
  794. soa = &request->soa;
  795. safe_strncpy(soa->mname, "a.gtld-servers.net", DNS_MAX_CNAME_LEN);
  796. safe_strncpy(soa->rname, "nstld.verisign-grs.com", DNS_MAX_CNAME_LEN);
  797. soa->serial = 1800;
  798. soa->refresh = 1800;
  799. soa->retry = 900;
  800. soa->expire = 604800;
  801. soa->minimum = 86400;
  802. }
  803. static int _dns_add_rrs(struct dns_server_post_context *context)
  804. {
  805. struct dns_request *request = context->request;
  806. int ret = 0;
  807. int has_soa = request->has_soa;
  808. char *domain = request->domain;
  809. if (request->has_ptr) {
  810. /* add PTR record */
  811. ret = dns_add_PTR(context->packet, DNS_RRS_AN, request->domain, request->ip_ttl, request->ptr_hostname);
  812. }
  813. /* add CNAME record */
  814. if (request->has_cname && context->do_force_soa == 0) {
  815. ret |= dns_add_CNAME(context->packet, DNS_RRS_AN, request->domain, request->ttl_cname, request->cname);
  816. domain = request->cname;
  817. }
  818. /* add A record */
  819. if (request->has_ip && context->do_force_soa == 0) {
  820. _dns_server_context_add_ip(context, request->ip_addr);
  821. if (context->qtype == DNS_T_A) {
  822. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  823. tlog(TLOG_DEBUG, "result: %s, rtt: %.1f ms, %d.%d.%d.%d", request->domain, ((float)request->ping_time) / 10,
  824. request->ip_addr[0], request->ip_addr[1], request->ip_addr[2], request->ip_addr[3]);
  825. }
  826. /* add AAAA record */
  827. if (context->qtype == DNS_T_AAAA) {
  828. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  829. tlog(TLOG_DEBUG,
  830. "result: %s, rtt: %.1f ms, "
  831. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  832. request->domain, ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1],
  833. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5],
  834. request->ip_addr[6], request->ip_addr[7], request->ip_addr[8], request->ip_addr[9],
  835. request->ip_addr[10], request->ip_addr[11], request->ip_addr[12], request->ip_addr[13],
  836. request->ip_addr[14], request->ip_addr[15]);
  837. }
  838. }
  839. if (context->do_force_soa == 0) {
  840. ret |= _dns_rrs_add_all_best_ip(context);
  841. }
  842. if (context->qtype == DNS_T_A || context->qtype == DNS_T_AAAA) {
  843. if (context->ip_num > 0) {
  844. has_soa = 0;
  845. }
  846. }
  847. /* add SOA record */
  848. if (has_soa) {
  849. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  850. tlog(TLOG_DEBUG, "result: %s, qtype: %d, return SOA", request->domain, context->qtype);
  851. } else if (context->do_force_soa == 1) {
  852. _dns_server_setup_soa(request);
  853. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  854. }
  855. if (request->has_ecs) {
  856. ret |= dns_add_OPT_ECS(context->packet, &request->ecs);
  857. }
  858. if (request->rcode != DNS_RC_NOERROR) {
  859. tlog(TLOG_INFO, "result: %s, qtype: %d, rtcode: %d", domain, context->qtype, request->rcode);
  860. }
  861. return ret;
  862. }
  863. static int _dns_setup_dns_packet(struct dns_server_post_context *context)
  864. {
  865. struct dns_head head;
  866. struct dns_request *request = context->request;
  867. int ret = 0;
  868. memset(&head, 0, sizeof(head));
  869. head.id = request->id;
  870. head.qr = DNS_QR_ANSWER;
  871. head.opcode = DNS_OP_QUERY;
  872. head.rd = 1;
  873. head.ra = 1;
  874. head.aa = 0;
  875. head.tc = 0;
  876. head.rcode = request->rcode;
  877. /* init a new DNS packet */
  878. ret = dns_packet_init(context->packet, context->packet_maxlen, &head);
  879. if (ret != 0) {
  880. return -1;
  881. }
  882. /* add request domain */
  883. ret = dns_add_domain(context->packet, request->domain, context->qtype, request->qclass);
  884. if (ret != 0) {
  885. return -1;
  886. }
  887. /* add RECORDs */
  888. ret = _dns_add_rrs(context);
  889. if (ret != 0) {
  890. return -1;
  891. }
  892. return 0;
  893. }
  894. static int _dns_setup_dns_raw_packet(struct dns_server_post_context *context)
  895. {
  896. /* encode to binary data */
  897. int encode_len = dns_encode(context->inpacket, context->inpacket_maxlen, context->packet);
  898. if (encode_len <= 0) {
  899. tlog(TLOG_DEBUG, "encode raw packet failed for %s", context->request->domain);
  900. return -1;
  901. }
  902. context->inpacket_len = encode_len;
  903. return 0;
  904. }
  905. static void _dns_server_conn_release(struct dns_server_conn_head *conn)
  906. {
  907. if (conn == NULL) {
  908. return;
  909. }
  910. int refcnt = atomic_dec_return(&conn->refcnt);
  911. if (refcnt) {
  912. if (refcnt < 0) {
  913. BUG("BUG: refcnt is %d, type = %d", refcnt, conn->type);
  914. }
  915. return;
  916. }
  917. if (conn->fd > 0) {
  918. close(conn->fd);
  919. conn->fd = -1;
  920. }
  921. if (conn->type == DNS_CONN_TYPE_TLS_CLIENT || conn->type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  922. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  923. if (tls_client->ssl != NULL) {
  924. SSL_free(tls_client->ssl);
  925. tls_client->ssl = NULL;
  926. }
  927. pthread_mutex_destroy(&tls_client->ssl_lock);
  928. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER) {
  929. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  930. if (tls_server->ssl_ctx != NULL) {
  931. SSL_CTX_free(tls_server->ssl_ctx);
  932. tls_server->ssl_ctx = NULL;
  933. }
  934. }
  935. list_del_init(&conn->list);
  936. free(conn);
  937. }
  938. static void _dns_server_conn_get(struct dns_server_conn_head *conn)
  939. {
  940. if (conn == NULL) {
  941. return;
  942. }
  943. if (atomic_inc_return(&conn->refcnt) <= 0) {
  944. BUG("BUG: client ref is invalid.");
  945. }
  946. }
  947. static int _dns_server_reply_tcp_to_buffer(struct dns_server_conn_tcp_client *tcpclient, void *packet, int len)
  948. {
  949. if ((int)sizeof(tcpclient->sndbuff.buf) - tcpclient->sndbuff.size < len) {
  950. return -1;
  951. }
  952. memcpy(tcpclient->sndbuff.buf + tcpclient->sndbuff.size, packet, len);
  953. tcpclient->sndbuff.size += len;
  954. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN | EPOLLOUT) != 0) {
  955. tlog(TLOG_ERROR, "epoll ctl failed.");
  956. return -1;
  957. }
  958. return 0;
  959. }
  960. static int _dns_server_reply_tcp(struct dns_request *request, struct dns_server_conn_tcp_client *tcpclient,
  961. void *packet, unsigned short len)
  962. {
  963. int send_len = 0;
  964. unsigned char inpacket_data[DNS_IN_PACKSIZE];
  965. unsigned char *inpacket = inpacket_data;
  966. if (len > sizeof(inpacket_data) - 2) {
  967. tlog(TLOG_ERROR, "packet size is invalid.");
  968. return -1;
  969. }
  970. /* TCP query format
  971. * | len (short) | dns query data |
  972. */
  973. *((unsigned short *)(inpacket)) = htons(len);
  974. memcpy(inpacket + 2, packet, len);
  975. len += 2;
  976. send_len = _dns_server_tcp_socket_send(tcpclient, inpacket, len);
  977. if (send_len < 0) {
  978. if (errno == EAGAIN) {
  979. /* save data to buffer, and retry when EPOLLOUT is available */
  980. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket, len);
  981. }
  982. return -1;
  983. } else if (send_len < len) {
  984. /* save remain data to buffer, and retry when EPOLLOUT is available */
  985. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket + send_len, len - send_len);
  986. }
  987. return 0;
  988. }
  989. static int _dns_server_reply_udp(struct dns_request *request, struct dns_server_conn_udp *udpserver,
  990. unsigned char *inpacket, int inpacket_len)
  991. {
  992. int send_len = 0;
  993. struct iovec iovec[1];
  994. struct msghdr msg;
  995. struct cmsghdr *cmsg;
  996. char msg_control[64];
  997. if (atomic_read(&server.run) == 0 || inpacket == NULL || inpacket_len <= 0) {
  998. return -1;
  999. }
  1000. iovec[0].iov_base = inpacket;
  1001. iovec[0].iov_len = inpacket_len;
  1002. memset(msg_control, 0, sizeof(msg_control));
  1003. msg.msg_iov = iovec;
  1004. msg.msg_iovlen = 1;
  1005. msg.msg_control = msg_control;
  1006. msg.msg_controllen = sizeof(msg_control);
  1007. msg.msg_flags = 0;
  1008. msg.msg_name = &request->addr;
  1009. msg.msg_namelen = request->addr_len;
  1010. cmsg = CMSG_FIRSTHDR(&msg);
  1011. if (request->localaddr.ss_family == AF_INET) {
  1012. struct sockaddr_in *s4 = (struct sockaddr_in *)&request->localaddr;
  1013. cmsg->cmsg_level = SOL_IP;
  1014. cmsg->cmsg_type = IP_PKTINFO;
  1015. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
  1016. msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo));
  1017. struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  1018. memset(pktinfo, 0, sizeof(*pktinfo));
  1019. pktinfo->ipi_spec_dst = s4->sin_addr;
  1020. } else if (request->localaddr.ss_family == AF_INET6) {
  1021. struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&request->localaddr;
  1022. cmsg->cmsg_level = IPPROTO_IPV6;
  1023. cmsg->cmsg_type = IPV6_PKTINFO;
  1024. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
  1025. msg.msg_controllen = CMSG_SPACE(sizeof(struct in6_pktinfo));
  1026. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  1027. memset(pktinfo, 0, sizeof(*pktinfo));
  1028. pktinfo->ipi6_addr = s6->sin6_addr;
  1029. } else {
  1030. goto use_send;
  1031. }
  1032. send_len = sendmsg(udpserver->head.fd, &msg, 0);
  1033. if (send_len == inpacket_len) {
  1034. return 0;
  1035. }
  1036. use_send:
  1037. send_len = sendto(udpserver->head.fd, inpacket, inpacket_len, 0, &request->addr, request->addr_len);
  1038. if (send_len != inpacket_len) {
  1039. tlog(TLOG_DEBUG, "send failed, %s", strerror(errno));
  1040. return -1;
  1041. }
  1042. return 0;
  1043. }
  1044. static int _dns_reply_inpacket(struct dns_request *request, unsigned char *inpacket, int inpacket_len)
  1045. {
  1046. struct dns_server_conn_head *conn = request->conn;
  1047. int ret = 0;
  1048. if (conn == NULL) {
  1049. tlog(TLOG_ERROR, "client is invalid, domain: %s", request->domain);
  1050. return -1;
  1051. }
  1052. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  1053. ret = _dns_server_reply_udp(request, (struct dns_server_conn_udp *)conn, inpacket, inpacket_len);
  1054. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  1055. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1056. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT) {
  1057. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1058. } else {
  1059. ret = -1;
  1060. }
  1061. return ret;
  1062. }
  1063. static inline int _dns_server_expired_cache_ttl(struct dns_cache *cache)
  1064. {
  1065. return cache->info.insert_time + cache->info.ttl + dns_conf_serve_expired_ttl - time(NULL);
  1066. }
  1067. static int _dns_cache_is_specify_packet(int qtype)
  1068. {
  1069. switch (qtype) {
  1070. case DNS_T_PTR:
  1071. case DNS_T_HTTPS:
  1072. case DNS_T_TXT:
  1073. case DNS_T_SRV:
  1074. break;
  1075. default:
  1076. return -1;
  1077. break;
  1078. }
  1079. return 0;
  1080. }
  1081. static int _dns_server_get_cache_timeout(struct dns_request *request, struct dns_cache_key *cache_key, int ttl)
  1082. {
  1083. int timeout = 0;
  1084. if (request->rcode != DNS_RC_NOERROR) {
  1085. return ttl + 1;
  1086. }
  1087. if (dns_conf_prefetch && _dns_cache_is_specify_packet(request->qtype) != 0) {
  1088. if (dns_conf_serve_expired) {
  1089. timeout = dns_conf_serve_expired_prefetch_time;
  1090. if (timeout == 0) {
  1091. timeout = dns_conf_serve_expired_ttl / 2;
  1092. if (timeout == 0 || timeout > EXPIRED_DOMAIN_PREFETCH_TIME) {
  1093. timeout = EXPIRED_DOMAIN_PREFETCH_TIME;
  1094. }
  1095. }
  1096. if ((request->prefetch_flags & PREFETCH_FLAGS_EXPIRED) == 0) {
  1097. timeout += ttl;
  1098. } else if (cache_key != NULL) {
  1099. struct dns_cache *old_cache = dns_cache_lookup(cache_key);
  1100. if (old_cache) {
  1101. time_t next_ttl = _dns_server_expired_cache_ttl(old_cache) - old_cache->info.ttl + ttl;
  1102. if (next_ttl < timeout) {
  1103. timeout = next_ttl;
  1104. }
  1105. dns_cache_release(old_cache);
  1106. }
  1107. }
  1108. } else {
  1109. timeout = ttl - 3;
  1110. }
  1111. } else {
  1112. timeout = ttl;
  1113. if (dns_conf_serve_expired) {
  1114. timeout += dns_conf_serve_expired_ttl;
  1115. }
  1116. }
  1117. if (timeout <= 0) {
  1118. timeout = 1;
  1119. }
  1120. return timeout;
  1121. }
  1122. static int _dns_server_request_update_cache(struct dns_request *request, int speed, dns_type_t qtype,
  1123. struct dns_cache_data *cache_data, int cache_ttl)
  1124. {
  1125. int ttl = 0;
  1126. int ret = -1;
  1127. if (qtype != DNS_T_A && qtype != DNS_T_AAAA) {
  1128. goto errout;
  1129. }
  1130. if (cache_ttl > 0) {
  1131. ttl = cache_ttl;
  1132. } else {
  1133. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1134. }
  1135. tlog(TLOG_DEBUG, "cache %s qtype: %d ttl: %d\n", request->domain, qtype, ttl);
  1136. /* if doing prefetch, update cache only */
  1137. struct dns_cache_key cache_key;
  1138. cache_key.dns_group_name = request->dns_group_name;
  1139. cache_key.domain = request->domain;
  1140. cache_key.qtype = request->qtype;
  1141. cache_key.query_flag = request->server_flags;
  1142. if (request->prefetch) {
  1143. if (dns_cache_replace(&cache_key, request->rcode, ttl, speed,
  1144. _dns_server_get_cache_timeout(request, &cache_key, ttl),
  1145. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_data) != 0) {
  1146. ret = 0;
  1147. goto errout;
  1148. }
  1149. } else {
  1150. /* insert result to cache */
  1151. if (dns_cache_insert(&cache_key, request->rcode, ttl, speed, _dns_server_get_cache_timeout(request, NULL, ttl),
  1152. cache_data) != 0) {
  1153. ret = -1;
  1154. goto errout;
  1155. }
  1156. }
  1157. return 0;
  1158. errout:
  1159. if (cache_data) {
  1160. dns_cache_data_put(cache_data);
  1161. }
  1162. return ret;
  1163. }
  1164. static int _dns_cache_cname_packet(struct dns_server_post_context *context)
  1165. {
  1166. struct dns_packet *packet = context->packet;
  1167. struct dns_packet *cname_packet = NULL;
  1168. int ret = -1;
  1169. int i = 0;
  1170. int j = 0;
  1171. int rr_count = 0;
  1172. int ttl = 0;
  1173. int speed = 0;
  1174. unsigned char packet_buff[DNS_PACKSIZE];
  1175. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  1176. int inpacket_len = 0;
  1177. struct dns_cache_data *cache_packet = NULL;
  1178. struct dns_rrs *rrs = NULL;
  1179. char name[DNS_MAX_CNAME_LEN] = {0};
  1180. cname_packet = (struct dns_packet *)packet_buff;
  1181. int has_result = 0;
  1182. struct dns_request *request = context->request;
  1183. if (request->has_cname == 0 || request->no_cache_cname == 1 || request->no_cache == 1) {
  1184. return 0;
  1185. }
  1186. /* init a new DNS packet */
  1187. ret = dns_packet_init(cname_packet, DNS_PACKSIZE, &packet->head);
  1188. if (ret != 0) {
  1189. return -1;
  1190. }
  1191. /* add request domain */
  1192. ret = dns_add_domain(cname_packet, request->cname, context->qtype, DNS_C_IN);
  1193. if (ret != 0) {
  1194. return -1;
  1195. }
  1196. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  1197. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1198. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1199. switch (rrs->type) {
  1200. case DNS_T_A: {
  1201. unsigned char ipv4_addr[4];
  1202. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  1203. continue;
  1204. }
  1205. if (strncmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1206. continue;
  1207. }
  1208. ret = dns_add_A(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv4_addr);
  1209. if (ret != 0) {
  1210. return -1;
  1211. }
  1212. has_result = 1;
  1213. } break;
  1214. case DNS_T_AAAA: {
  1215. unsigned char ipv6_addr[16];
  1216. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  1217. continue;
  1218. }
  1219. if (strncmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1220. continue;
  1221. }
  1222. ret = dns_add_AAAA(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv6_addr);
  1223. if (ret != 0) {
  1224. return -1;
  1225. }
  1226. has_result = 1;
  1227. } break;
  1228. case DNS_T_SOA: {
  1229. struct dns_soa soa;
  1230. if (dns_get_SOA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, &soa) != 0) {
  1231. continue;
  1232. }
  1233. ret = dns_add_SOA(cname_packet, DNS_RRS_AN, request->cname, ttl, &soa);
  1234. if (ret != 0) {
  1235. return -1;
  1236. }
  1237. has_result = 1;
  1238. break;
  1239. }
  1240. default:
  1241. continue;
  1242. }
  1243. }
  1244. }
  1245. if (has_result == 0) {
  1246. return 0;
  1247. }
  1248. inpacket_len = dns_encode(inpacket_buff, DNS_IN_PACKSIZE, cname_packet);
  1249. if (inpacket_len <= 0) {
  1250. return -1;
  1251. }
  1252. if (context->qtype != DNS_T_A && context->qtype != DNS_T_AAAA) {
  1253. return -1;
  1254. }
  1255. cache_packet = dns_cache_new_data_packet(inpacket_buff, inpacket_len);
  1256. if (cache_packet == NULL) {
  1257. goto errout;
  1258. }
  1259. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1260. speed = request->ping_time;
  1261. tlog(TLOG_DEBUG, "Cache CNAME: %s, qtype: %d, speed: %d", request->cname, request->qtype, speed);
  1262. /* if doing prefetch, update cache only */
  1263. struct dns_cache_key cache_key;
  1264. cache_key.dns_group_name = request->dns_group_name;
  1265. cache_key.domain = request->cname;
  1266. cache_key.qtype = context->qtype;
  1267. cache_key.query_flag = request->server_flags;
  1268. if (request->prefetch) {
  1269. if (dns_cache_replace(&cache_key, request->rcode, ttl, speed,
  1270. _dns_server_get_cache_timeout(request, &cache_key, ttl),
  1271. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_packet) != 0) {
  1272. ret = 0;
  1273. goto errout;
  1274. }
  1275. } else {
  1276. /* insert result to cache */
  1277. if (dns_cache_insert(&cache_key, request->rcode, ttl, speed, _dns_server_get_cache_timeout(request, NULL, ttl),
  1278. cache_packet) != 0) {
  1279. ret = -1;
  1280. goto errout;
  1281. }
  1282. }
  1283. return 0;
  1284. errout:
  1285. if (cache_packet) {
  1286. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  1287. }
  1288. return ret;
  1289. }
  1290. static int _dns_cache_packet(struct dns_server_post_context *context)
  1291. {
  1292. struct dns_request *request = context->request;
  1293. int ret = -1;
  1294. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1295. if (cache_packet == NULL) {
  1296. goto errout;
  1297. }
  1298. /* if doing prefetch, update cache only */
  1299. struct dns_cache_key cache_key;
  1300. cache_key.dns_group_name = request->dns_group_name;
  1301. cache_key.domain = request->domain;
  1302. cache_key.qtype = context->qtype;
  1303. cache_key.query_flag = request->server_flags;
  1304. if (request->prefetch) {
  1305. if (dns_cache_replace(&cache_key, request->rcode, request->ip_ttl, -1,
  1306. _dns_server_get_cache_timeout(request, &cache_key, request->ip_ttl),
  1307. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_packet) != 0) {
  1308. ret = 0;
  1309. goto errout;
  1310. }
  1311. } else {
  1312. /* insert result to cache */
  1313. if (dns_cache_insert(&cache_key, request->rcode, request->ip_ttl, -1,
  1314. _dns_server_get_cache_timeout(request, NULL, request->ip_ttl), cache_packet) != 0) {
  1315. ret = -1;
  1316. goto errout;
  1317. }
  1318. }
  1319. return 0;
  1320. errout:
  1321. if (cache_packet) {
  1322. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  1323. }
  1324. return ret;
  1325. }
  1326. static int _dns_result_callback(struct dns_server_post_context *context)
  1327. {
  1328. struct dns_result result;
  1329. char ip[DNS_MAX_CNAME_LEN];
  1330. unsigned int ping_time = -1;
  1331. struct dns_request *request = context->request;
  1332. if (request->result_callback == NULL) {
  1333. return 0;
  1334. }
  1335. if (atomic_inc_return(&request->do_callback) != 1) {
  1336. return 0;
  1337. }
  1338. ip[0] = 0;
  1339. memset(&result, 0, sizeof(result));
  1340. ping_time = request->ping_time;
  1341. result.domain = request->domain;
  1342. result.rtcode = request->rcode;
  1343. result.addr_type = request->qtype;
  1344. result.ip = ip;
  1345. result.has_soa = request->has_soa | context->do_force_soa;
  1346. result.ping_time = ping_time;
  1347. result.ip_num = 0;
  1348. if (request->has_ip != 0 && context->do_force_soa == 0) {
  1349. for (int i = 0; i < context->ip_num && i < MAX_IP_NUM; i++) {
  1350. result.ip_addr[i] = context->ip_addr[i];
  1351. result.ip_num++;
  1352. }
  1353. if (request->qtype == DNS_T_A) {
  1354. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1355. request->ip_addr[3]);
  1356. } else if (request->qtype == DNS_T_AAAA) {
  1357. snprintf(ip, sizeof(ip), "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1358. request->ip_addr[0], request->ip_addr[1], request->ip_addr[2], request->ip_addr[3],
  1359. request->ip_addr[4], request->ip_addr[5], request->ip_addr[6], request->ip_addr[7],
  1360. request->ip_addr[8], request->ip_addr[9], request->ip_addr[10], request->ip_addr[11],
  1361. request->ip_addr[12], request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1362. }
  1363. }
  1364. return request->result_callback(&result, request->user_ptr);
  1365. }
  1366. static int _dns_cache_specify_packet(struct dns_server_post_context *context)
  1367. {
  1368. if (_dns_cache_is_specify_packet(context->qtype) != 0) {
  1369. return 0;
  1370. }
  1371. return _dns_cache_packet(context);
  1372. }
  1373. static int _dns_cache_reply_packet(struct dns_server_post_context *context)
  1374. {
  1375. struct dns_request *request = context->request;
  1376. int speed = -1;
  1377. if (context->do_cache == 0 || request->no_cache == 1) {
  1378. return 0;
  1379. }
  1380. if (context->packet->head.rcode == DNS_RC_SERVFAIL || context->packet->head.rcode == DNS_RC_NXDOMAIN ||
  1381. context->packet->head.rcode == DNS_RC_NOTIMP) {
  1382. context->reply_ttl = DNS_SERVER_FAIL_TTL;
  1383. /* Do not cache record if cannot connect to remote */
  1384. if (request->remote_server_fail == 0 && context->packet->head.rcode == DNS_RC_SERVFAIL) {
  1385. return 0;
  1386. }
  1387. if (context->packet->head.rcode == DNS_RC_NOTIMP) {
  1388. return 0;
  1389. }
  1390. return _dns_cache_packet(context);
  1391. }
  1392. if (context->qtype != DNS_T_AAAA && context->qtype != DNS_T_A) {
  1393. return _dns_cache_specify_packet(context);
  1394. }
  1395. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1396. if (cache_packet == NULL) {
  1397. return -1;
  1398. }
  1399. speed = request->ping_time;
  1400. if (context->do_force_soa) {
  1401. speed = -1;
  1402. }
  1403. if (_dns_server_request_update_cache(request, speed, context->qtype, cache_packet, context->cache_ttl) != 0) {
  1404. tlog(TLOG_WARN, "update packet cache failed.");
  1405. }
  1406. _dns_cache_cname_packet(context);
  1407. return 0;
  1408. }
  1409. static int _dns_server_setup_ipset_nftset_packet(struct dns_server_post_context *context)
  1410. {
  1411. int ttl = 0;
  1412. struct dns_request *request = context->request;
  1413. char name[DNS_MAX_CNAME_LEN] = {0};
  1414. int rr_count = 0;
  1415. int timeout_value = 0;
  1416. int i = 0;
  1417. int j = 0;
  1418. struct dns_rrs *rrs = NULL;
  1419. struct dns_ipset_rule *rule = NULL;
  1420. struct dns_ipset_rule *ipset_rule = NULL;
  1421. struct dns_ipset_rule *ipset_rule_v4 = NULL;
  1422. struct dns_ipset_rule *ipset_rule_v6 = NULL;
  1423. struct dns_nftset_rule *nftset_ip = NULL;
  1424. struct dns_nftset_rule *nftset_ip6 = NULL;
  1425. struct dns_rule_flags *rule_flags = NULL;
  1426. int check_no_speed_rule = 0;
  1427. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_IPSET) == 0) {
  1428. return 0;
  1429. }
  1430. if (context->do_ipset == 0) {
  1431. return 0;
  1432. }
  1433. if (context->ip_num <= 0) {
  1434. return 0;
  1435. }
  1436. if (request->ping_time < 0 && request->has_ip > 0 && request->passthrough == 0) {
  1437. check_no_speed_rule = 1;
  1438. }
  1439. /* check ipset rule */
  1440. rule_flags = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  1441. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IGN) == 0) {
  1442. ipset_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET);
  1443. if (ipset_rule == NULL) {
  1444. ipset_rule = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET);
  1445. }
  1446. }
  1447. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV4_IGN) == 0) {
  1448. ipset_rule_v4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1449. if (ipset_rule_v4 == NULL) {
  1450. ipset_rule_v4 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1451. }
  1452. if (ipset_rule == NULL && check_no_speed_rule && dns_conf_ipset_no_speed.ipv4_enable) {
  1453. ipset_rule_v4 = &dns_conf_ipset_no_speed.ipv4;
  1454. }
  1455. }
  1456. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV6_IGN) == 0) {
  1457. ipset_rule_v6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1458. if (ipset_rule_v6 == NULL) {
  1459. ipset_rule_v6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1460. }
  1461. if (ipset_rule_v6 == NULL && check_no_speed_rule && dns_conf_ipset_no_speed.ipv6_enable) {
  1462. ipset_rule_v6 = &dns_conf_ipset_no_speed.ipv6;
  1463. }
  1464. }
  1465. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP_IGN) == 0) {
  1466. nftset_ip = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP);
  1467. if (nftset_ip == NULL) {
  1468. nftset_ip = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP);
  1469. }
  1470. if (nftset_ip == NULL && check_no_speed_rule && dns_conf_nftset_no_speed.ip_enable) {
  1471. nftset_ip = &dns_conf_nftset_no_speed.ip;
  1472. }
  1473. }
  1474. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP6_IGN) == 0) {
  1475. nftset_ip6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1476. if (nftset_ip6 == NULL) {
  1477. nftset_ip6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1478. }
  1479. if (nftset_ip6 == NULL && check_no_speed_rule && dns_conf_nftset_no_speed.ip6_enable) {
  1480. nftset_ip6 = &dns_conf_nftset_no_speed.ip6;
  1481. }
  1482. }
  1483. if (!(ipset_rule || ipset_rule_v4 || ipset_rule_v6 || nftset_ip || nftset_ip6)) {
  1484. return 0;
  1485. }
  1486. timeout_value = request->ip_ttl * 3;
  1487. if (timeout_value == 0) {
  1488. timeout_value = _dns_server_get_conf_ttl(request, 0) * 3;
  1489. }
  1490. for (j = 1; j < DNS_RRS_OPT; j++) {
  1491. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1492. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1493. switch (rrs->type) {
  1494. case DNS_T_A: {
  1495. unsigned char addr[4];
  1496. if (context->qtype != DNS_T_A) {
  1497. break;
  1498. }
  1499. /* get A result */
  1500. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1501. rule = ipset_rule_v4 ? ipset_rule_v4 : ipset_rule;
  1502. if (rule != NULL) {
  1503. /* add IPV4 to ipset */
  1504. tlog(TLOG_DEBUG, "IPSET-MATCH: domain: %s, ipset: %s, IP: %d.%d.%d.%d", request->domain,
  1505. rule->ipsetname, addr[0], addr[1], addr[2], addr[3]);
  1506. ipset_add(rule->ipsetname, addr, DNS_RR_A_LEN, timeout_value);
  1507. }
  1508. if (nftset_ip != NULL) {
  1509. /* add IPV4 to ipset */
  1510. tlog(TLOG_DEBUG, "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: %d.%d.%d.%d", request->domain,
  1511. nftset_ip->familyname, nftset_ip->nfttablename, nftset_ip->nftsetname, addr[0], addr[1],
  1512. addr[2], addr[3]);
  1513. nftset_add(nftset_ip->familyname, nftset_ip->nfttablename, nftset_ip->nftsetname, addr,
  1514. DNS_RR_A_LEN, timeout_value);
  1515. }
  1516. } break;
  1517. case DNS_T_AAAA: {
  1518. unsigned char addr[16];
  1519. if (context->qtype != DNS_T_AAAA) {
  1520. /* ignore non-matched query type */
  1521. break;
  1522. }
  1523. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1524. rule = ipset_rule_v6 ? ipset_rule_v6 : ipset_rule;
  1525. if (rule != NULL) {
  1526. tlog(TLOG_DEBUG,
  1527. "IPSET-MATCH: domain: %s, ipset: %s, IP: "
  1528. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1529. request->domain, rule->ipsetname, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5],
  1530. addr[6], addr[7], addr[8], addr[9], addr[10], addr[11], addr[12], addr[13], addr[14],
  1531. addr[15]);
  1532. ipset_add(rule->ipsetname, addr, DNS_RR_AAAA_LEN, timeout_value);
  1533. }
  1534. if (nftset_ip6 != NULL) {
  1535. /* add IPV6 to ipset */
  1536. tlog(TLOG_DEBUG,
  1537. "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: "
  1538. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1539. request->domain, nftset_ip6->familyname, nftset_ip6->nfttablename, nftset_ip6->nftsetname,
  1540. addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9],
  1541. addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  1542. nftset_add(nftset_ip6->familyname, nftset_ip6->nfttablename, nftset_ip6->nftsetname, addr,
  1543. DNS_RR_AAAA_LEN, timeout_value);
  1544. }
  1545. } break;
  1546. default:
  1547. break;
  1548. }
  1549. }
  1550. }
  1551. return 0;
  1552. }
  1553. static int _dns_result_child_post(struct dns_server_post_context *context)
  1554. {
  1555. struct dns_request *request = context->request;
  1556. struct dns_request *parent_request = request->parent_request;
  1557. DNS_CHILD_POST_RESULT child_ret = DNS_CHILD_POST_FAIL;
  1558. /* not a child request */
  1559. if (parent_request == NULL) {
  1560. return 0;
  1561. }
  1562. if (request->child_callback) {
  1563. int is_first_resp = context->no_release_parent;
  1564. child_ret = request->child_callback(parent_request, request, is_first_resp);
  1565. }
  1566. if (context->do_reply == 1 && child_ret == DNS_CHILD_POST_SUCCESS) {
  1567. struct dns_server_post_context parent_context;
  1568. _dns_server_post_context_init(&parent_context, parent_request);
  1569. parent_context.do_cache = context->do_cache;
  1570. parent_context.do_ipset = context->do_ipset;
  1571. parent_context.do_force_soa = context->do_force_soa;
  1572. parent_context.do_audit = context->do_audit;
  1573. parent_context.do_reply = context->do_reply;
  1574. parent_context.reply_ttl = context->reply_ttl;
  1575. parent_context.cache_ttl = context->cache_ttl;
  1576. parent_context.skip_notify_count = context->skip_notify_count;
  1577. parent_context.select_all_best_ip = 1;
  1578. parent_context.no_release_parent = context->no_release_parent;
  1579. _dns_request_post(&parent_context);
  1580. _dns_server_reply_all_pending_list(parent_request, &parent_context);
  1581. }
  1582. if (context->no_release_parent == 0) {
  1583. tlog(TLOG_DEBUG, "query %s with child %s done", parent_request->domain, request->domain);
  1584. request->parent_request = NULL;
  1585. parent_request->request_wait--;
  1586. _dns_server_request_release(parent_request);
  1587. }
  1588. if (child_ret == DNS_CHILD_POST_FAIL) {
  1589. return -1;
  1590. }
  1591. return 0;
  1592. }
  1593. static int _dns_request_update_id_ttl(struct dns_server_post_context *context)
  1594. {
  1595. int ttl = context->reply_ttl;
  1596. struct dns_request *request = context->request;
  1597. if (dns_conf_rr_ttl_reply_max > 0) {
  1598. if (request->ip_ttl > dns_conf_rr_ttl_reply_max && ttl == 0) {
  1599. ttl = request->ip_ttl;
  1600. }
  1601. if (ttl > dns_conf_rr_ttl_reply_max) {
  1602. ttl = dns_conf_rr_ttl_reply_max;
  1603. }
  1604. if (ttl == 0) {
  1605. ttl = dns_conf_rr_ttl_reply_max;
  1606. }
  1607. }
  1608. if (ttl == 0) {
  1609. ttl = request->ip_ttl;
  1610. if (ttl == 0) {
  1611. ttl = _dns_server_get_conf_ttl(request, ttl);
  1612. }
  1613. }
  1614. struct dns_update_param param;
  1615. param.id = request->id;
  1616. param.cname_ttl = ttl;
  1617. param.ip_ttl = ttl;
  1618. if (dns_packet_update(context->inpacket, context->inpacket_len, &param) != 0) {
  1619. tlog(TLOG_ERROR, "update packet info failed.");
  1620. return -1;
  1621. }
  1622. return 0;
  1623. }
  1624. static int _dns_request_post(struct dns_server_post_context *context)
  1625. {
  1626. struct dns_request *request = context->request;
  1627. char clientip[DNS_MAX_CNAME_LEN] = {0};
  1628. int ret = 0;
  1629. tlog(TLOG_DEBUG, "reply %s qtype: %d, rcode: %d, reply: %d", request->domain, request->qtype,
  1630. context->packet->head.rcode, context->do_reply);
  1631. /* init a new DNS packet */
  1632. ret = _dns_setup_dns_packet(context);
  1633. if (ret != 0) {
  1634. tlog(TLOG_ERROR, "setup dns packet failed.");
  1635. return -1;
  1636. }
  1637. ret = _dns_setup_dns_raw_packet(context);
  1638. if (ret != 0) {
  1639. tlog(TLOG_ERROR, "set dns raw packet failed.");
  1640. return -1;
  1641. }
  1642. /* cache reply packet */
  1643. ret = _dns_cache_reply_packet(context);
  1644. if (ret != 0) {
  1645. tlog(TLOG_WARN, "cache packet for %s failed.", request->domain);
  1646. }
  1647. /* setup ipset */
  1648. _dns_server_setup_ipset_nftset_packet(context);
  1649. /* reply child request */
  1650. _dns_result_child_post(context);
  1651. if (context->do_reply == 0) {
  1652. return 0;
  1653. }
  1654. if (context->skip_notify_count == 0) {
  1655. if (atomic_inc_return(&request->notified) != 1) {
  1656. tlog(TLOG_DEBUG, "skip reply %s %d", request->domain, request->qtype);
  1657. return 0;
  1658. }
  1659. }
  1660. /* log audit log */
  1661. _dns_server_audit_log(context);
  1662. /* reply API callback */
  1663. _dns_result_callback(context);
  1664. if (request->conn == NULL) {
  1665. return 0;
  1666. }
  1667. ret = _dns_request_update_id_ttl(context);
  1668. if (ret != 0) {
  1669. tlog(TLOG_ERROR, "update packet ttl failed.");
  1670. return -1;
  1671. }
  1672. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  1673. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype, request->id,
  1674. request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  1675. get_tick_count() - request->send_tick);
  1676. ret = _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  1677. if (ret != 0) {
  1678. tlog(TLOG_DEBUG, "reply raw packet to client failed.");
  1679. return -1;
  1680. }
  1681. return 0;
  1682. }
  1683. static int _dns_server_reply_SOA(int rcode, struct dns_request *request)
  1684. {
  1685. /* return SOA record */
  1686. request->rcode = rcode;
  1687. if (request->ip_ttl <= 0) {
  1688. request->ip_ttl = DNS_SERVER_SOA_TTL;
  1689. }
  1690. _dns_server_setup_soa(request);
  1691. struct dns_server_post_context context;
  1692. _dns_server_post_context_init(&context, request);
  1693. context.do_audit = 1;
  1694. context.do_reply = 1;
  1695. context.do_force_soa = 1;
  1696. _dns_request_post(&context);
  1697. return 0;
  1698. }
  1699. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context)
  1700. {
  1701. struct dns_request_pending_list *pending_list = NULL;
  1702. struct dns_request *req = NULL;
  1703. struct dns_request *tmp = NULL;
  1704. int ret = 0;
  1705. if (request->request_pending_list == NULL) {
  1706. return 0;
  1707. }
  1708. pthread_mutex_lock(&server.request_pending_lock);
  1709. pending_list = request->request_pending_list;
  1710. request->request_pending_list = NULL;
  1711. hlist_del_init(&pending_list->node);
  1712. pthread_mutex_unlock(&server.request_pending_lock);
  1713. pthread_mutex_lock(&pending_list->request_list_lock);
  1714. list_del_init(&request->pending_list);
  1715. list_for_each_entry_safe(req, tmp, &(pending_list->request_list), pending_list)
  1716. {
  1717. struct dns_server_post_context context_pending;
  1718. _dns_server_post_context_init_from(&context_pending, req, context->packet, context->inpacket,
  1719. context->inpacket_len);
  1720. req->dualstack_selection = request->dualstack_selection;
  1721. req->dualstack_selection_query = request->dualstack_selection_query;
  1722. req->dualstack_selection_force_soa = request->dualstack_selection_force_soa;
  1723. req->dualstack_selection_has_ip = request->dualstack_selection_has_ip;
  1724. req->dualstack_selection_ping_time = request->dualstack_selection_ping_time;
  1725. req->ping_time = request->ping_time;
  1726. _dns_server_get_answer(&context_pending);
  1727. context_pending.do_cache = 0;
  1728. context_pending.do_audit = context->do_audit;
  1729. context_pending.do_reply = context->do_reply;
  1730. context_pending.do_force_soa = context->do_force_soa;
  1731. context_pending.do_ipset = 0;
  1732. context_pending.reply_ttl = request->ip_ttl;
  1733. context_pending.no_release_parent = 0;
  1734. _dns_server_reply_passthrough(&context_pending);
  1735. req->request_pending_list = NULL;
  1736. list_del_init(&req->pending_list);
  1737. _dns_server_request_release_complete(req, 0);
  1738. }
  1739. pthread_mutex_unlock(&pending_list->request_list_lock);
  1740. free(pending_list);
  1741. return ret;
  1742. }
  1743. static void _dns_server_check_complete_dualstack(struct dns_request *request, struct dns_request *dualstack_request)
  1744. {
  1745. if (dualstack_request == NULL || request == NULL) {
  1746. return;
  1747. }
  1748. if (dualstack_request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  1749. return;
  1750. }
  1751. if (dualstack_request->ping_time > 0) {
  1752. return;
  1753. }
  1754. if (dualstack_request->dualstack_selection_query == 1) {
  1755. return;
  1756. }
  1757. if (request->ping_time <= (dns_conf_dualstack_ip_selection_threshold * 10)) {
  1758. return;
  1759. }
  1760. dualstack_request->dualstack_selection_has_ip = request->has_ip;
  1761. dualstack_request->dualstack_selection_ping_time = request->ping_time;
  1762. dualstack_request->dualstack_selection_force_soa = 1;
  1763. _dns_server_request_complete(dualstack_request);
  1764. }
  1765. static int _dns_server_force_dualstack(struct dns_request *request)
  1766. {
  1767. /* for dualstack request as first pending request, check if need to choose another request*/
  1768. if (request->dualstack_request) {
  1769. struct dns_request *dualstack_request = request->dualstack_request;
  1770. request->dualstack_selection_has_ip = dualstack_request->has_ip;
  1771. request->dualstack_selection_ping_time = dualstack_request->ping_time;
  1772. request->dualstack_selection = 1;
  1773. /* if another request still waiting for ping, force complete another request */
  1774. _dns_server_check_complete_dualstack(request, dualstack_request);
  1775. }
  1776. if (request->dualstack_selection_ping_time < 0 || request->dualstack_selection == 0) {
  1777. return -1;
  1778. }
  1779. if (request->has_soa || request->rcode != DNS_RC_NOERROR) {
  1780. return -1;
  1781. }
  1782. if (request->dualstack_selection_has_ip == 0) {
  1783. return -1;
  1784. }
  1785. if (request->ping_time > 0) {
  1786. if (request->dualstack_selection_ping_time + (dns_conf_dualstack_ip_selection_threshold * 10) >
  1787. request->ping_time) {
  1788. return -1;
  1789. }
  1790. }
  1791. if (request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  1792. return -1;
  1793. }
  1794. /* if ipv4 is fasting than ipv6, add ipv4 to cache, and return SOA for AAAA request */
  1795. tlog(TLOG_INFO, "result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d", request->domain,
  1796. request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id, request->ping_time,
  1797. request->dualstack_selection_ping_time);
  1798. request->dualstack_selection_force_soa = 1;
  1799. return 0;
  1800. }
  1801. static int _dns_server_request_complete_with_all_IPs(struct dns_request *request, int with_all_ips)
  1802. {
  1803. int ttl = 0;
  1804. struct dns_server_post_context context;
  1805. if (request->rcode == DNS_RC_SERVFAIL || request->rcode == DNS_RC_NXDOMAIN) {
  1806. ttl = DNS_SERVER_FAIL_TTL;
  1807. }
  1808. if (request->prefetch == 1) {
  1809. return 0;
  1810. }
  1811. if (atomic_inc_return(&request->notified) != 1) {
  1812. return 0;
  1813. }
  1814. if (request->has_ip != 0 && request->passthrough == 0) {
  1815. request->has_soa = 0;
  1816. if (request->has_ping_result == 0 && request->ip_ttl > DNS_SERVER_TMOUT_TTL) {
  1817. request->ip_ttl = DNS_SERVER_TMOUT_TTL;
  1818. }
  1819. ttl = request->ip_ttl;
  1820. }
  1821. if (_dns_server_force_dualstack(request) == 0) {
  1822. goto out;
  1823. }
  1824. if (request->has_soa) {
  1825. tlog(TLOG_INFO, "result: %s, qtype: %d, SOA", request->domain, request->qtype);
  1826. } else {
  1827. if (request->qtype == DNS_T_A) {
  1828. tlog(TLOG_INFO, "result: %s, qtype: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->qtype,
  1829. ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1830. request->ip_addr[3]);
  1831. } else if (request->qtype == DNS_T_AAAA) {
  1832. tlog(TLOG_INFO,
  1833. "result: %s, qtype: %d, rtt: %.1f ms, "
  1834. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1835. request->domain, request->qtype, ((float)request->ping_time) / 10, request->ip_addr[0],
  1836. request->ip_addr[1], request->ip_addr[2], request->ip_addr[3], request->ip_addr[4],
  1837. request->ip_addr[5], request->ip_addr[6], request->ip_addr[7], request->ip_addr[8],
  1838. request->ip_addr[9], request->ip_addr[10], request->ip_addr[11], request->ip_addr[12],
  1839. request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1840. }
  1841. }
  1842. out:
  1843. _dns_server_post_context_init(&context, request);
  1844. context.do_cache = 1;
  1845. context.do_ipset = 1;
  1846. context.do_force_soa = request->dualstack_selection_force_soa | request->force_soa;
  1847. context.do_audit = 1;
  1848. context.do_reply = 1;
  1849. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  1850. context.skip_notify_count = 1;
  1851. context.select_all_best_ip = with_all_ips;
  1852. context.no_release_parent = 1;
  1853. _dns_request_post(&context);
  1854. return _dns_server_reply_all_pending_list(request, &context);
  1855. }
  1856. static int _dns_server_request_complete(struct dns_request *request)
  1857. {
  1858. return _dns_server_request_complete_with_all_IPs(request, 0);
  1859. }
  1860. static int _dns_ip_address_check_add(struct dns_request *request, char *cname, unsigned char *addr,
  1861. dns_type_t addr_type, int ping_time, struct dns_ip_address **out_addr_map)
  1862. {
  1863. uint32_t key = 0;
  1864. struct dns_ip_address *addr_map = NULL;
  1865. int addr_len = 0;
  1866. if (ping_time == 0) {
  1867. ping_time = -1;
  1868. }
  1869. if (addr_type == DNS_T_A) {
  1870. addr_len = DNS_RR_A_LEN;
  1871. } else if (addr_type == DNS_T_AAAA) {
  1872. addr_len = DNS_RR_AAAA_LEN;
  1873. } else {
  1874. return -1;
  1875. }
  1876. /* store the ip address and the number of hits */
  1877. key = jhash(addr, addr_len, 0);
  1878. key = jhash(&addr_type, sizeof(addr_type), key);
  1879. pthread_mutex_lock(&request->ip_map_lock);
  1880. hash_for_each_possible(request->ip_map, addr_map, node, key)
  1881. {
  1882. if (addr_map->addr_type != addr_type) {
  1883. continue;
  1884. }
  1885. if (memcmp(addr_map->ip_addr, addr, addr_len) != 0) {
  1886. continue;
  1887. }
  1888. addr_map->hitnum++;
  1889. addr_map->recv_tick = get_tick_count();
  1890. pthread_mutex_unlock(&request->ip_map_lock);
  1891. return -1;
  1892. }
  1893. atomic_inc(&request->ip_map_num);
  1894. addr_map = malloc(sizeof(*addr_map));
  1895. if (addr_map == NULL) {
  1896. pthread_mutex_unlock(&request->ip_map_lock);
  1897. tlog(TLOG_ERROR, "malloc addr map failed");
  1898. return -1;
  1899. }
  1900. memset(addr_map, 0, sizeof(*addr_map));
  1901. addr_map->addr_type = addr_type;
  1902. addr_map->hitnum = 1;
  1903. addr_map->recv_tick = get_tick_count();
  1904. addr_map->ping_time = ping_time;
  1905. memcpy(addr_map->ip_addr, addr, addr_len);
  1906. if (dns_conf_force_no_cname == 0) {
  1907. safe_strncpy(addr_map->cname, cname, DNS_MAX_CNAME_LEN);
  1908. }
  1909. hash_add(request->ip_map, &addr_map->node, key);
  1910. pthread_mutex_unlock(&request->ip_map_lock);
  1911. if (out_addr_map != NULL) {
  1912. *out_addr_map = addr_map;
  1913. }
  1914. return 0;
  1915. }
  1916. static void _dns_server_request_remove_all(void)
  1917. {
  1918. struct dns_request *request = NULL;
  1919. struct dns_request *tmp = NULL;
  1920. LIST_HEAD(remove_list);
  1921. pthread_mutex_lock(&server.request_list_lock);
  1922. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  1923. {
  1924. list_add_tail(&request->check_list, &remove_list);
  1925. _dns_server_request_get(request);
  1926. }
  1927. pthread_mutex_unlock(&server.request_list_lock);
  1928. list_for_each_entry_safe(request, tmp, &remove_list, check_list)
  1929. {
  1930. _dns_server_request_complete(request);
  1931. _dns_server_request_release(request);
  1932. }
  1933. }
  1934. static void _dns_server_select_possible_ipaddress(struct dns_request *request)
  1935. {
  1936. int maxhit = 0;
  1937. unsigned long bucket = 0;
  1938. unsigned long max_recv_tick = 0;
  1939. struct dns_ip_address *addr_map = NULL;
  1940. struct dns_ip_address *maxhit_addr_map = NULL;
  1941. struct dns_ip_address *last_recv_addr_map = NULL;
  1942. struct dns_ip_address *selected_addr_map = NULL;
  1943. struct hlist_node *tmp = NULL;
  1944. if (atomic_read(&request->notified) > 0) {
  1945. return;
  1946. }
  1947. if (request->no_select_possible_ip != 0) {
  1948. return;
  1949. }
  1950. if (request->ping_time > 0) {
  1951. return;
  1952. }
  1953. /* Return the most likely correct IP address */
  1954. /* Returns the IP with the most hits, or the last returned record is considered to be the most likely correct. */
  1955. pthread_mutex_lock(&request->ip_map_lock);
  1956. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  1957. {
  1958. if (addr_map->addr_type != request->qtype) {
  1959. continue;
  1960. }
  1961. if (addr_map->recv_tick - request->send_tick > max_recv_tick) {
  1962. max_recv_tick = addr_map->recv_tick - request->send_tick;
  1963. last_recv_addr_map = addr_map;
  1964. }
  1965. if (addr_map->hitnum > maxhit) {
  1966. maxhit = addr_map->hitnum;
  1967. maxhit_addr_map = addr_map;
  1968. }
  1969. }
  1970. pthread_mutex_unlock(&request->ip_map_lock);
  1971. if (maxhit_addr_map && maxhit > 1) {
  1972. selected_addr_map = maxhit_addr_map;
  1973. } else if (last_recv_addr_map) {
  1974. selected_addr_map = last_recv_addr_map;
  1975. }
  1976. if (selected_addr_map == NULL) {
  1977. return;
  1978. }
  1979. tlog(TLOG_DEBUG, "select best ip address, %s", request->domain);
  1980. switch (request->qtype) {
  1981. case DNS_T_A: {
  1982. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_A_LEN);
  1983. request->ip_ttl = dns_conf_rr_ttl_min > 0 ? dns_conf_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  1984. tlog(TLOG_DEBUG, "possible result: %s, rcode: %d, hitnum: %d, %d.%d.%d.%d", request->domain, request->rcode,
  1985. selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1986. request->ip_addr[3]);
  1987. } break;
  1988. case DNS_T_AAAA: {
  1989. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_AAAA_LEN);
  1990. request->ip_ttl = dns_conf_rr_ttl_min > 0 ? dns_conf_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  1991. tlog(TLOG_DEBUG,
  1992. "possible result: %s, rcode: %d, hitnum: %d, "
  1993. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1994. request->domain, request->rcode, selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1],
  1995. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5], request->ip_addr[6],
  1996. request->ip_addr[7], request->ip_addr[8], request->ip_addr[9], request->ip_addr[10], request->ip_addr[11],
  1997. request->ip_addr[12], request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1998. } break;
  1999. default:
  2000. break;
  2001. }
  2002. }
  2003. static void _dns_server_delete_request(struct dns_request *request)
  2004. {
  2005. if (atomic_read(&request->notified) == 0) {
  2006. _dns_server_request_complete(request);
  2007. }
  2008. if (request->conn) {
  2009. _dns_server_conn_release(request->conn);
  2010. }
  2011. pthread_mutex_destroy(&request->ip_map_lock);
  2012. memset(request, 0, sizeof(*request));
  2013. free(request);
  2014. }
  2015. static void _dns_server_complete_with_multi_ipaddress(struct dns_request *request)
  2016. {
  2017. struct dns_server_post_context context;
  2018. int do_reply = 0;
  2019. if (atomic_read(&request->ip_map_num) > 0) {
  2020. request->has_soa = 0;
  2021. }
  2022. if (atomic_inc_return(&request->notified) == 1) {
  2023. do_reply = 1;
  2024. _dns_server_force_dualstack(request);
  2025. }
  2026. if (request->passthrough && do_reply == 0) {
  2027. return;
  2028. }
  2029. _dns_server_post_context_init(&context, request);
  2030. context.do_cache = 1;
  2031. context.do_ipset = 1;
  2032. context.do_reply = do_reply;
  2033. context.do_log_result = 1;
  2034. context.select_all_best_ip = 1;
  2035. context.skip_notify_count = 1;
  2036. context.do_force_soa = request->dualstack_selection_force_soa | request->force_soa;
  2037. _dns_request_post(&context);
  2038. _dns_server_reply_all_pending_list(request, &context);
  2039. }
  2040. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete)
  2041. {
  2042. struct dns_ip_address *addr_map = NULL;
  2043. struct hlist_node *tmp = NULL;
  2044. unsigned long bucket = 0;
  2045. pthread_mutex_lock(&server.request_list_lock);
  2046. int refcnt = atomic_dec_return(&request->refcnt);
  2047. if (refcnt) {
  2048. pthread_mutex_unlock(&server.request_list_lock);
  2049. if (refcnt < 0) {
  2050. BUG("BUG: refcnt is %d, domain %s, qtype %d", refcnt, request->domain, request->qtype);
  2051. }
  2052. return;
  2053. }
  2054. list_del_init(&request->list);
  2055. list_del_init(&request->check_list);
  2056. pthread_mutex_unlock(&server.request_list_lock);
  2057. pthread_mutex_lock(&server.request_pending_lock);
  2058. list_del_init(&request->pending_list);
  2059. pthread_mutex_unlock(&server.request_pending_lock);
  2060. if (do_complete) {
  2061. /* Select max hit ip address, and return to client */
  2062. _dns_server_select_possible_ipaddress(request);
  2063. _dns_server_complete_with_multi_ipaddress(request);
  2064. }
  2065. if (request->parent_request != NULL) {
  2066. _dns_server_request_release(request->parent_request);
  2067. request->parent_request = NULL;
  2068. }
  2069. pthread_mutex_lock(&request->ip_map_lock);
  2070. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  2071. {
  2072. hash_del(&addr_map->node);
  2073. free(addr_map);
  2074. }
  2075. pthread_mutex_unlock(&request->ip_map_lock);
  2076. _dns_server_delete_request(request);
  2077. }
  2078. static void _dns_server_request_release(struct dns_request *request)
  2079. {
  2080. _dns_server_request_release_complete(request, 1);
  2081. }
  2082. static void _dns_server_request_get(struct dns_request *request)
  2083. {
  2084. if (atomic_inc_return(&request->refcnt) <= 0) {
  2085. BUG("BUG: request ref is invalid, %s", request->domain);
  2086. }
  2087. }
  2088. static int _dns_server_set_to_pending_list(struct dns_request *request)
  2089. {
  2090. struct dns_request_pending_list *pending_list = NULL;
  2091. struct dns_request_pending_list *pending_list_tmp = NULL;
  2092. uint32_t key = 0;
  2093. int ret = -1;
  2094. if (request->qtype != DNS_T_A && request->qtype != DNS_T_AAAA) {
  2095. return ret;
  2096. }
  2097. key = hash_string(request->domain);
  2098. key = hash_string_initval(request->dns_group_name, key);
  2099. key = jhash(&(request->qtype), sizeof(request->qtype), key);
  2100. key = jhash(&(request->server_flags), sizeof(request->server_flags), key);
  2101. pthread_mutex_lock(&server.request_pending_lock);
  2102. hash_for_each_possible(server.request_pending, pending_list_tmp, node, key)
  2103. {
  2104. if (request->qtype != pending_list_tmp->qtype) {
  2105. continue;
  2106. }
  2107. if (request->server_flags != pending_list_tmp->server_flags) {
  2108. continue;
  2109. }
  2110. if (strcmp(request->dns_group_name, pending_list_tmp->dns_group_name) != 0) {
  2111. continue;
  2112. }
  2113. if (strncmp(request->domain, pending_list_tmp->domain, DNS_MAX_CNAME_LEN) != 0) {
  2114. continue;
  2115. }
  2116. pending_list = pending_list_tmp;
  2117. break;
  2118. }
  2119. if (pending_list == NULL) {
  2120. pending_list = malloc(sizeof(*pending_list));
  2121. if (pending_list == NULL) {
  2122. ret = -1;
  2123. goto out;
  2124. }
  2125. memset(pending_list, 0, sizeof(*pending_list));
  2126. pthread_mutex_init(&pending_list->request_list_lock, NULL);
  2127. INIT_LIST_HEAD(&pending_list->request_list);
  2128. INIT_HLIST_NODE(&pending_list->node);
  2129. pending_list->qtype = request->qtype;
  2130. pending_list->server_flags = request->server_flags;
  2131. safe_strncpy(pending_list->domain, request->domain, DNS_MAX_CNAME_LEN);
  2132. safe_strncpy(pending_list->dns_group_name, request->dns_group_name, DNS_GROUP_NAME_LEN);
  2133. hash_add(server.request_pending, &pending_list->node, key);
  2134. request->request_pending_list = pending_list;
  2135. } else {
  2136. ret = 0;
  2137. }
  2138. if (ret == 0) {
  2139. _dns_server_request_get(request);
  2140. }
  2141. list_add_tail(&request->pending_list, &pending_list->request_list);
  2142. out:
  2143. pthread_mutex_unlock(&server.request_pending_lock);
  2144. return ret;
  2145. }
  2146. static struct dns_request *_dns_server_new_request(void)
  2147. {
  2148. struct dns_request *request = NULL;
  2149. request = malloc(sizeof(*request));
  2150. if (request == NULL) {
  2151. tlog(TLOG_ERROR, "malloc request failed.\n");
  2152. goto errout;
  2153. }
  2154. memset(request, 0, sizeof(*request));
  2155. pthread_mutex_init(&request->ip_map_lock, NULL);
  2156. atomic_set(&request->adblock, 0);
  2157. atomic_set(&request->soa_num, 0);
  2158. atomic_set(&request->ip_map_num, 0);
  2159. atomic_set(&request->refcnt, 0);
  2160. atomic_set(&request->notified, 0);
  2161. atomic_set(&request->do_callback, 0);
  2162. request->ping_time = -1;
  2163. request->prefetch = 0;
  2164. request->dualstack_selection = dns_conf_dualstack_ip_selection;
  2165. request->dualstack_selection_ping_time = -1;
  2166. request->rcode = DNS_RC_SERVFAIL;
  2167. request->conn = NULL;
  2168. request->qclass = DNS_C_IN;
  2169. request->result_callback = NULL;
  2170. request->check_order_list = &dns_conf_check_orders;
  2171. request->response_mode = dns_conf_response_mode;
  2172. INIT_LIST_HEAD(&request->list);
  2173. INIT_LIST_HEAD(&request->pending_list);
  2174. INIT_LIST_HEAD(&request->check_list);
  2175. hash_init(request->ip_map);
  2176. _dns_server_request_get(request);
  2177. return request;
  2178. errout:
  2179. return NULL;
  2180. }
  2181. static void _dns_server_ping_result(struct ping_host_struct *ping_host, const char *host, FAST_PING_RESULT result,
  2182. struct sockaddr *addr, socklen_t addr_len, int seqno, int ttl, struct timeval *tv,
  2183. int error, void *userptr)
  2184. {
  2185. struct dns_request *request = userptr;
  2186. int may_complete = 0;
  2187. int threshold = 100;
  2188. struct dns_ip_address *addr_map = NULL;
  2189. int last_rtt = request->ping_time;
  2190. if (request == NULL) {
  2191. return;
  2192. }
  2193. if (result == PING_RESULT_END) {
  2194. _dns_server_request_release(request);
  2195. fast_ping_stop(ping_host);
  2196. return;
  2197. } else if (result == PING_RESULT_TIMEOUT) {
  2198. tlog(TLOG_DEBUG, "ping %s timeout", host);
  2199. goto out;
  2200. return;
  2201. } else if (result == PING_RESULT_ERROR) {
  2202. if (addr->sa_family != AF_INET6) {
  2203. return;
  2204. }
  2205. if (is_ipv6_ready) {
  2206. if (error == EADDRNOTAVAIL || errno == EACCES) {
  2207. is_ipv6_ready = 0;
  2208. tlog(TLOG_ERROR, "IPV6 is not ready, disable all ipv6 feature, recheck after %ds",
  2209. IPV6_READY_CHECK_TIME);
  2210. }
  2211. }
  2212. return;
  2213. }
  2214. int rtt = tv->tv_sec * 10000 + tv->tv_usec / 100;
  2215. if (result == PING_RESULT_RESPONSE) {
  2216. tlog(TLOG_DEBUG, "from %s: seq=%d time=%d, lasttime=%d id=%d", host, seqno, rtt, last_rtt, request->id);
  2217. } else {
  2218. tlog(TLOG_DEBUG, "from %s: seq=%d timeout, id=%d", host, seqno, request->id);
  2219. }
  2220. switch (addr->sa_family) {
  2221. case AF_INET: {
  2222. struct sockaddr_in *addr_in = NULL;
  2223. addr_in = (struct sockaddr_in *)addr;
  2224. addr_map = _dns_ip_address_get(request, (unsigned char *)&addr_in->sin_addr.s_addr, DNS_T_A);
  2225. if (addr_map) {
  2226. addr_map->ping_time = rtt;
  2227. }
  2228. if (request->ping_time > rtt || request->ping_time == -1) {
  2229. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, 4);
  2230. request->ping_time = rtt;
  2231. request->has_cname = 0;
  2232. request->has_ip = 1;
  2233. if (addr_map && addr_map->cname[0] != 0) {
  2234. request->has_cname = 1;
  2235. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2236. } else {
  2237. request->has_cname = 0;
  2238. }
  2239. }
  2240. if (request->qtype == DNS_T_AAAA && request->dualstack_selection) {
  2241. if (request->ping_time < 0 && request->has_soa == 0) {
  2242. return;
  2243. }
  2244. }
  2245. if (request->qtype == DNS_T_A) {
  2246. request->has_ping_result = 1;
  2247. }
  2248. } break;
  2249. case AF_INET6: {
  2250. struct sockaddr_in6 *addr_in6 = NULL;
  2251. addr_in6 = (struct sockaddr_in6 *)addr;
  2252. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  2253. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr + 12, DNS_T_A);
  2254. if (addr_map) {
  2255. addr_map->ping_time = rtt;
  2256. }
  2257. if (request->ping_time > rtt || request->ping_time == -1) {
  2258. request->ping_time = rtt;
  2259. request->has_cname = 0;
  2260. request->has_ip = 1;
  2261. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr + 12, 4);
  2262. if (addr_map && addr_map->cname[0] != 0) {
  2263. request->has_cname = 1;
  2264. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2265. } else {
  2266. request->has_cname = 0;
  2267. }
  2268. }
  2269. if (request->qtype == DNS_T_A) {
  2270. request->has_ping_result = 1;
  2271. }
  2272. } else {
  2273. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr, DNS_T_AAAA);
  2274. if (addr_map) {
  2275. addr_map->ping_time = rtt;
  2276. }
  2277. if (request->ping_time > rtt || request->ping_time == -1) {
  2278. request->ping_time = rtt;
  2279. request->has_cname = 0;
  2280. request->has_ip = 1;
  2281. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr, 16);
  2282. if (addr_map && addr_map->cname[0] != 0) {
  2283. request->has_cname = 1;
  2284. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2285. } else {
  2286. request->has_cname = 0;
  2287. }
  2288. }
  2289. if (request->qtype == DNS_T_AAAA) {
  2290. request->has_ping_result = 1;
  2291. }
  2292. }
  2293. } break;
  2294. default:
  2295. break;
  2296. }
  2297. out:
  2298. /* If the ping delay is less than the threshold, the result is returned */
  2299. if (request->ping_time > 0) {
  2300. if (request->ping_time < threshold) {
  2301. may_complete = 1;
  2302. } else if (request->ping_time < (int)(get_tick_count() - request->send_tick) * 8) {
  2303. may_complete = 1;
  2304. }
  2305. }
  2306. /* Get first ping result */
  2307. if (request->response_mode == DNS_RESPONSE_MODE_FIRST_PING_IP && last_rtt == -1 && request->ping_time > 0) {
  2308. may_complete = 1;
  2309. }
  2310. if (may_complete && request->has_ping_result == 1) {
  2311. _dns_server_request_complete(request);
  2312. }
  2313. }
  2314. static int _dns_server_ping(struct dns_request *request, PING_TYPE type, char *ip, int timeout)
  2315. {
  2316. if (fast_ping_start(type, ip, 1, 0, timeout, _dns_server_ping_result, request) == NULL) {
  2317. return -1;
  2318. }
  2319. return 0;
  2320. }
  2321. static int _dns_server_check_speed(struct dns_request *request, char *ip)
  2322. {
  2323. char tcp_ip[DNS_MAX_CNAME_LEN] = {0};
  2324. int port = 80;
  2325. int type = DOMAIN_CHECK_NONE;
  2326. int order = request->check_order;
  2327. int ping_timeout = DNS_PING_TIMEOUT;
  2328. unsigned long now = get_tick_count();
  2329. if (order >= DOMAIN_CHECK_NUM || request->check_order_list == NULL) {
  2330. return -1;
  2331. }
  2332. if (request->passthrough) {
  2333. return -1;
  2334. }
  2335. ping_timeout = ping_timeout - (now - request->send_tick);
  2336. if (ping_timeout > DNS_PING_TIMEOUT) {
  2337. ping_timeout = DNS_PING_TIMEOUT;
  2338. } else if (ping_timeout < 200) {
  2339. ping_timeout = 200;
  2340. }
  2341. port = request->check_order_list->orders[order].tcp_port;
  2342. type = request->check_order_list->orders[order].type;
  2343. switch (type) {
  2344. case DOMAIN_CHECK_ICMP:
  2345. tlog(TLOG_DEBUG, "ping %s with icmp, order: %d, timeout: %d", ip, order, ping_timeout);
  2346. return _dns_server_ping(request, PING_TYPE_ICMP, ip, ping_timeout);
  2347. break;
  2348. case DOMAIN_CHECK_TCP:
  2349. snprintf(tcp_ip, sizeof(tcp_ip), "%s:%d", ip, port);
  2350. tlog(TLOG_DEBUG, "ping %s with tcp, order: %d, timeout: %d", tcp_ip, order, ping_timeout);
  2351. return _dns_server_ping(request, PING_TYPE_TCP, tcp_ip, ping_timeout);
  2352. break;
  2353. default:
  2354. break;
  2355. }
  2356. return -1;
  2357. }
  2358. static struct dns_ip_rules *_dns_server_ip_rule_get(struct dns_request *request, unsigned char *addr, int addr_len,
  2359. dns_type_t addr_type)
  2360. {
  2361. prefix_t prefix;
  2362. radix_node_t *node = NULL;
  2363. struct dns_ip_rules *rule = NULL;
  2364. /* Match IP address rules */
  2365. if (prefix_from_blob(addr, addr_len, addr_len * 8, &prefix) == NULL) {
  2366. return NULL;
  2367. }
  2368. switch (prefix.family) {
  2369. case AF_INET:
  2370. node = radix_search_best(dns_conf_address_rule.ipv4, &prefix);
  2371. break;
  2372. case AF_INET6:
  2373. node = radix_search_best(dns_conf_address_rule.ipv6, &prefix);
  2374. break;
  2375. default:
  2376. break;
  2377. }
  2378. if (node == NULL) {
  2379. return NULL;
  2380. }
  2381. if (node->data == NULL) {
  2382. return NULL;
  2383. }
  2384. rule = node->data;
  2385. return rule;
  2386. }
  2387. static int _dns_server_ip_rule_check(struct dns_request *request, struct dns_ip_rules *ip_rules, int result_flag)
  2388. {
  2389. struct ip_rule_flags *rule_flags = NULL;
  2390. if (ip_rules == NULL) {
  2391. goto rule_not_found;
  2392. }
  2393. rule_flags = container_of(ip_rules->rules[IP_RULE_FLAGS], struct ip_rule_flags, head);
  2394. if (rule_flags != NULL) {
  2395. if (rule_flags->flags & IP_RULE_FLAG_BOGUS) {
  2396. request->rcode = DNS_RC_NXDOMAIN;
  2397. request->has_soa = 1;
  2398. request->force_soa = 1;
  2399. _dns_server_setup_soa(request);
  2400. goto nxdomain;
  2401. }
  2402. /* blacklist-ip */
  2403. if (rule_flags->flags & IP_RULE_FLAG_BLACKLIST) {
  2404. if (result_flag & DNSSERVER_FLAG_BLACKLIST_IP) {
  2405. goto match;
  2406. }
  2407. }
  2408. /* ignore-ip */
  2409. if (rule_flags->flags & IP_RULE_FLAG_IP_IGNORE) {
  2410. goto skip;
  2411. }
  2412. }
  2413. if (ip_rules->rules[IP_RULE_ALIAS] != NULL) {
  2414. goto match;
  2415. }
  2416. rule_not_found:
  2417. if (result_flag & DNSSERVER_FLAG_WHITELIST_IP) {
  2418. if (rule_flags == NULL) {
  2419. goto skip;
  2420. }
  2421. if (!(rule_flags->flags & IP_RULE_FLAG_WHITELIST)) {
  2422. goto skip;
  2423. }
  2424. }
  2425. return -1;
  2426. skip:
  2427. return -2;
  2428. nxdomain:
  2429. return -3;
  2430. match:
  2431. if (request->rcode == DNS_RC_SERVFAIL) {
  2432. request->rcode = DNS_RC_NXDOMAIN;
  2433. }
  2434. return 0;
  2435. }
  2436. static int _dns_server_process_ip_alias(struct dns_request *request, struct dns_iplist_ip_addresses *alias,
  2437. unsigned char **paddrs, int *paddr_num, int max_paddr_num, int addr_len)
  2438. {
  2439. int addr_num = 0;
  2440. if (alias == NULL) {
  2441. return 0;
  2442. }
  2443. if (request == NULL) {
  2444. return -1;
  2445. }
  2446. if (alias->ipaddr_num <= 0) {
  2447. return 0;
  2448. }
  2449. for (int i = 0; i < alias->ipaddr_num && i < max_paddr_num; i++) {
  2450. if (alias->ipaddr[i].addr_len != addr_len) {
  2451. continue;
  2452. }
  2453. paddrs[i] = alias->ipaddr[i].addr;
  2454. addr_num++;
  2455. }
  2456. *paddr_num = addr_num;
  2457. return 0;
  2458. }
  2459. static int _dns_server_process_ip_rule(struct dns_request *request, unsigned char *addr, int addr_len,
  2460. dns_type_t addr_type, int result_flag, struct dns_iplist_ip_addresses **alias)
  2461. {
  2462. struct dns_ip_rules *ip_rules = NULL;
  2463. int ret = 0;
  2464. ip_rules = _dns_server_ip_rule_get(request, addr, addr_len, addr_type);
  2465. ret = _dns_server_ip_rule_check(request, ip_rules, result_flag);
  2466. if (ret != 0) {
  2467. return ret;
  2468. }
  2469. if (ip_rules->rules[IP_RULE_ALIAS] && alias != NULL) {
  2470. if (request->no_ipalias == 0) {
  2471. struct ip_rule_alias *rule = container_of(ip_rules->rules[IP_RULE_ALIAS], struct ip_rule_alias, head);
  2472. *alias = &rule->ip_alias;
  2473. if (alias == NULL) {
  2474. return 0;
  2475. }
  2476. }
  2477. /* need process ip alias */
  2478. return -1;
  2479. }
  2480. return 0;
  2481. }
  2482. static int _dns_server_is_adblock_ipv6(const unsigned char addr[16])
  2483. {
  2484. int i = 0;
  2485. for (i = 0; i < 15; i++) {
  2486. if (addr[i]) {
  2487. return -1;
  2488. }
  2489. }
  2490. if (addr[15] == 0 || addr[15] == 1) {
  2491. return 0;
  2492. }
  2493. return -1;
  2494. }
  2495. static int _dns_server_process_answer_A(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  2496. char *cname, unsigned int result_flag)
  2497. {
  2498. int ttl = 0;
  2499. int ip_check_result = 0;
  2500. unsigned char addr[4];
  2501. unsigned char *paddrs[MAX_IP_NUM];
  2502. int paddr_num = 0;
  2503. char name[DNS_MAX_CNAME_LEN] = {0};
  2504. char ip[DNS_MAX_CNAME_LEN] = {0};
  2505. struct dns_iplist_ip_addresses *alias = NULL;
  2506. if (request->qtype != DNS_T_A) {
  2507. /* ignore non-matched query type */
  2508. if (request->dualstack_selection == 0) {
  2509. return 0;
  2510. }
  2511. }
  2512. /* get A result */
  2513. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2514. paddrs[paddr_num] = addr;
  2515. paddr_num = 1;
  2516. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl, addr[0], addr[1], addr[2], addr[3]);
  2517. /* if domain is not match */
  2518. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2519. return -1;
  2520. }
  2521. /* ip rule check */
  2522. ip_check_result = _dns_server_process_ip_rule(request, addr, 4, DNS_T_A, result_flag, &alias);
  2523. if (ip_check_result == 0) {
  2524. /* match */
  2525. return -1;
  2526. } else if (ip_check_result == -2 || ip_check_result == -3) {
  2527. /* skip, nxdomain */
  2528. return ip_check_result;
  2529. }
  2530. int ret = _dns_server_process_ip_alias(request, alias, paddrs, &paddr_num, MAX_IP_NUM, DNS_RR_A_LEN);
  2531. if (ret != 0) {
  2532. return ret;
  2533. }
  2534. for (int i = 0; i < paddr_num; i++) {
  2535. unsigned char *paddr = paddrs[i];
  2536. if (atomic_read(&request->ip_map_num) == 0) {
  2537. request->has_ip = 1;
  2538. memcpy(request->ip_addr, paddr, DNS_RR_A_LEN);
  2539. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2540. if (cname[0] != 0 && request->has_cname == 0 && dns_conf_force_no_cname == 0) {
  2541. request->has_cname = 1;
  2542. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2543. }
  2544. } else {
  2545. if (ttl < request->ip_ttl) {
  2546. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2547. }
  2548. }
  2549. /* Ad blocking result */
  2550. if (paddr[0] == 0 || paddr[0] == 127) {
  2551. /* If half of the servers return the same result, then ignore this address */
  2552. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2553. request->rcode = DNS_RC_NOERROR;
  2554. return -1;
  2555. }
  2556. }
  2557. /* add this ip to request */
  2558. if (_dns_ip_address_check_add(request, cname, paddr, DNS_T_A, 0, NULL) != 0) {
  2559. return -1;
  2560. }
  2561. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", paddr[0], paddr[1], paddr[2], paddr[3]);
  2562. /* start ping */
  2563. _dns_server_request_get(request);
  2564. if (_dns_server_check_speed(request, ip) != 0) {
  2565. _dns_server_request_release(request);
  2566. }
  2567. }
  2568. return 0;
  2569. }
  2570. static int _dns_server_process_answer_AAAA(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  2571. char *cname, unsigned int result_flag)
  2572. {
  2573. unsigned char addr[16];
  2574. unsigned char *paddrs[MAX_IP_NUM];
  2575. int paddr_num = 0;
  2576. char name[DNS_MAX_CNAME_LEN] = {0};
  2577. char ip[DNS_MAX_CNAME_LEN] = {0};
  2578. int ttl = 0;
  2579. int ip_check_result = 0;
  2580. struct dns_iplist_ip_addresses *alias = NULL;
  2581. if (request->qtype != DNS_T_AAAA) {
  2582. /* ignore non-matched query type */
  2583. return -1;
  2584. }
  2585. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2586. paddrs[paddr_num] = addr;
  2587. paddr_num = 1;
  2588. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2589. name, ttl, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9], addr[10],
  2590. addr[11], addr[12], addr[13], addr[14], addr[15]);
  2591. /* if domain is not match */
  2592. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2593. return -1;
  2594. }
  2595. ip_check_result = _dns_server_process_ip_rule(request, addr, 16, DNS_T_AAAA, result_flag, &alias);
  2596. if (ip_check_result == 0) {
  2597. /* match */
  2598. return -1;
  2599. } else if (ip_check_result == -2 || ip_check_result == -3) {
  2600. /* skip, nxdomain */
  2601. return ip_check_result;
  2602. }
  2603. int ret = _dns_server_process_ip_alias(request, alias, paddrs, &paddr_num, MAX_IP_NUM, DNS_RR_AAAA_LEN);
  2604. if (ret != 0) {
  2605. return ret;
  2606. }
  2607. for (int i = 0; i < paddr_num; i++) {
  2608. unsigned char *paddr = paddrs[i];
  2609. if (atomic_read(&request->ip_map_num) == 0) {
  2610. request->has_ip = 1;
  2611. memcpy(request->ip_addr, paddr, DNS_RR_AAAA_LEN);
  2612. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2613. if (cname[0] != 0 && request->has_cname == 0 && dns_conf_force_no_cname == 0) {
  2614. request->has_cname = 1;
  2615. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2616. }
  2617. } else {
  2618. if (ttl < request->ip_ttl) {
  2619. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2620. }
  2621. }
  2622. /* Ad blocking result */
  2623. if (_dns_server_is_adblock_ipv6(paddr) == 0) {
  2624. /* If half of the servers return the same result, then ignore this address */
  2625. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2626. request->rcode = DNS_RC_NOERROR;
  2627. return -1;
  2628. }
  2629. }
  2630. /* add this ip to request */
  2631. if (_dns_ip_address_check_add(request, cname, paddr, DNS_T_AAAA, 0, NULL) != 0) {
  2632. return -1;
  2633. }
  2634. snprintf(ip, sizeof(ip), "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]", paddr[0],
  2635. paddr[1], paddr[2], paddr[3], paddr[4], paddr[5], paddr[6], paddr[7], paddr[8], paddr[9], paddr[10],
  2636. paddr[11], paddr[12], paddr[13], paddr[14], paddr[15]);
  2637. /* start ping */
  2638. _dns_server_request_get(request);
  2639. if (_dns_server_check_speed(request, ip) != 0) {
  2640. _dns_server_request_release(request);
  2641. }
  2642. }
  2643. return 0;
  2644. }
  2645. static int _dns_server_process_answer(struct dns_request *request, const char *domain, struct dns_packet *packet,
  2646. unsigned int result_flag)
  2647. {
  2648. int ttl = 0;
  2649. char name[DNS_MAX_CNAME_LEN] = {0};
  2650. char cname[DNS_MAX_CNAME_LEN] = {0};
  2651. int rr_count = 0;
  2652. int i = 0;
  2653. int j = 0;
  2654. struct dns_rrs *rrs = NULL;
  2655. int ret = 0;
  2656. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  2657. if (request->rcode == DNS_RC_SERVFAIL) {
  2658. request->rcode = packet->head.rcode;
  2659. request->remote_server_fail = 1;
  2660. }
  2661. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  2662. return -1;
  2663. }
  2664. request->remote_server_fail = 0;
  2665. if (request->rcode == DNS_RC_SERVFAIL) {
  2666. request->rcode = packet->head.rcode;
  2667. }
  2668. for (j = 1; j < DNS_RRS_OPT; j++) {
  2669. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2670. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2671. switch (rrs->type) {
  2672. case DNS_T_A: {
  2673. ret = _dns_server_process_answer_A(rrs, request, domain, cname, result_flag);
  2674. if (ret == -1) {
  2675. break;
  2676. } else if (ret == -2) {
  2677. continue;
  2678. } else if (ret == -3) {
  2679. return -1;
  2680. }
  2681. request->rcode = packet->head.rcode;
  2682. } break;
  2683. case DNS_T_AAAA: {
  2684. ret = _dns_server_process_answer_AAAA(rrs, request, domain, cname, result_flag);
  2685. if (ret == -1) {
  2686. break;
  2687. } else if (ret == -2) {
  2688. continue;
  2689. } else if (ret == -3) {
  2690. return -1;
  2691. }
  2692. request->rcode = packet->head.rcode;
  2693. } break;
  2694. case DNS_T_NS: {
  2695. char nsname[DNS_MAX_CNAME_LEN];
  2696. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, nsname, DNS_MAX_CNAME_LEN);
  2697. tlog(TLOG_DEBUG, "NS: %s ttl: %d nsname: %s\n", name, ttl, nsname);
  2698. } break;
  2699. case DNS_T_CNAME: {
  2700. char domain_name[DNS_MAX_CNAME_LEN] = {0};
  2701. char domain_cname[DNS_MAX_CNAME_LEN] = {0};
  2702. dns_get_CNAME(rrs, domain_name, DNS_MAX_CNAME_LEN, &ttl, domain_cname, DNS_MAX_CNAME_LEN);
  2703. if (strncmp(domain_name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2704. strncmp(domain_name, cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2705. continue;
  2706. }
  2707. safe_strncpy(cname, domain_cname, DNS_MAX_CNAME_LEN);
  2708. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  2709. tlog(TLOG_DEBUG, "name: %s ttl: %d cname: %s\n", domain_name, ttl, cname);
  2710. } break;
  2711. case DNS_T_SOA: {
  2712. /* if DNS64 enabled, skip check SOA. */
  2713. if (_dns_server_is_dns64_request(request)) {
  2714. break;
  2715. }
  2716. request->has_soa = 1;
  2717. if (request->rcode != DNS_RC_NOERROR) {
  2718. request->rcode = packet->head.rcode;
  2719. }
  2720. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  2721. tlog(TLOG_DEBUG,
  2722. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: "
  2723. "%d, minimum: %d",
  2724. domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  2725. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  2726. int soa_num = atomic_inc_return(&request->soa_num);
  2727. if ((soa_num >= (dns_server_alive_num() / 3) + 1 || soa_num > 4) &&
  2728. atomic_read(&request->ip_map_num) <= 0) {
  2729. request->ip_ttl = ttl;
  2730. _dns_server_request_complete(request);
  2731. }
  2732. } break;
  2733. default:
  2734. tlog(TLOG_DEBUG, "%s, qtype: %d, rrstype = %d", name, rrs->type, j);
  2735. break;
  2736. }
  2737. }
  2738. }
  2739. return 0;
  2740. }
  2741. static int _dns_server_passthrough_rule_check(struct dns_request *request, const char *domain,
  2742. struct dns_packet *packet, unsigned int result_flag, int *pttl)
  2743. {
  2744. int ttl = 0;
  2745. char name[DNS_MAX_CNAME_LEN] = {0};
  2746. char cname[DNS_MAX_CNAME_LEN];
  2747. int rr_count = 0;
  2748. int i = 0;
  2749. int j = 0;
  2750. struct dns_rrs *rrs = NULL;
  2751. int ip_check_result = 0;
  2752. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  2753. if (request->rcode == DNS_RC_SERVFAIL) {
  2754. request->rcode = packet->head.rcode;
  2755. request->remote_server_fail = 1;
  2756. }
  2757. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  2758. return 0;
  2759. }
  2760. request->remote_server_fail = 0;
  2761. if (request->rcode == DNS_RC_SERVFAIL) {
  2762. request->rcode = packet->head.rcode;
  2763. }
  2764. for (j = 1; j < DNS_RRS_OPT; j++) {
  2765. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2766. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2767. switch (rrs->type) {
  2768. case DNS_T_A: {
  2769. unsigned char addr[4];
  2770. int ttl_tmp = 0;
  2771. if (request->qtype != DNS_T_A) {
  2772. /* ignore non-matched query type */
  2773. if (request->dualstack_selection == 0) {
  2774. break;
  2775. }
  2776. }
  2777. _dns_server_request_get(request);
  2778. /* get A result */
  2779. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  2780. /* if domain is not match */
  2781. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2782. _dns_server_request_release(request);
  2783. continue;
  2784. }
  2785. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl_tmp, addr[0], addr[1], addr[2],
  2786. addr[3]);
  2787. /* ip rule check */
  2788. ip_check_result = _dns_server_process_ip_rule(request, addr, 4, DNS_T_A, result_flag, NULL);
  2789. if (ip_check_result == 0 || ip_check_result == -2 || ip_check_result == -3) {
  2790. /* match, skip, nxdomain */
  2791. _dns_server_request_release(request);
  2792. return 0;
  2793. }
  2794. /* Ad blocking result */
  2795. if (addr[0] == 0 || addr[0] == 127) {
  2796. /* If half of the servers return the same result, then ignore this address */
  2797. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2798. _dns_server_request_release(request);
  2799. return 0;
  2800. }
  2801. }
  2802. ttl = ttl_tmp;
  2803. _dns_server_request_release(request);
  2804. } break;
  2805. case DNS_T_AAAA: {
  2806. unsigned char addr[16];
  2807. int ttl_tmp = 0;
  2808. if (request->qtype != DNS_T_AAAA) {
  2809. /* ignore non-matched query type */
  2810. break;
  2811. }
  2812. _dns_server_request_get(request);
  2813. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  2814. /* if domain is not match */
  2815. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  2816. _dns_server_request_release(request);
  2817. continue;
  2818. }
  2819. tlog(TLOG_DEBUG,
  2820. "domain: %s TTL: %d IP: %.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2821. name, ttl_tmp, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8],
  2822. addr[9], addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  2823. ip_check_result = _dns_server_process_ip_rule(request, addr, 16, DNS_T_AAAA, result_flag, NULL);
  2824. if (ip_check_result == 0 || ip_check_result == -2 || ip_check_result == -3) {
  2825. /* match, skip, nxdomain */
  2826. _dns_server_request_release(request);
  2827. return 0;
  2828. }
  2829. /* Ad blocking result */
  2830. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  2831. /* If half of the servers return the same result, then ignore this address */
  2832. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  2833. _dns_server_request_release(request);
  2834. return 0;
  2835. }
  2836. }
  2837. ttl = ttl_tmp;
  2838. _dns_server_request_release(request);
  2839. } break;
  2840. case DNS_T_CNAME: {
  2841. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2842. } break;
  2843. default:
  2844. if (ttl == 0) {
  2845. /* Get TTL */
  2846. char tmpname[DNS_MAX_CNAME_LEN];
  2847. char tmpbuf[DNS_MAX_CNAME_LEN];
  2848. dns_get_CNAME(rrs, tmpname, DNS_MAX_CNAME_LEN, &ttl, tmpbuf, DNS_MAX_CNAME_LEN);
  2849. if (request->ip_ttl == 0) {
  2850. request->ip_ttl = ttl;
  2851. }
  2852. }
  2853. break;
  2854. }
  2855. }
  2856. }
  2857. *pttl = ttl;
  2858. return -1;
  2859. }
  2860. static int _dns_server_get_answer(struct dns_server_post_context *context)
  2861. {
  2862. int i = 0;
  2863. int j = 0;
  2864. int ttl = 0;
  2865. struct dns_rrs *rrs = NULL;
  2866. int rr_count = 0;
  2867. struct dns_request *request = context->request;
  2868. struct dns_packet *packet = context->packet;
  2869. for (j = 1; j < DNS_RRS_OPT; j++) {
  2870. rrs = dns_get_rrs_start(packet, j, &rr_count);
  2871. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  2872. switch (rrs->type) {
  2873. case DNS_T_A: {
  2874. unsigned char addr[4];
  2875. char name[DNS_MAX_CNAME_LEN] = {0};
  2876. struct dns_ip_address *addr_map = NULL;
  2877. if (request->qtype != DNS_T_A) {
  2878. continue;
  2879. }
  2880. /* get A result */
  2881. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2882. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2883. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2884. continue;
  2885. }
  2886. if (context->no_check_add_ip == 0 &&
  2887. _dns_ip_address_check_add(request, name, addr, DNS_T_A, request->ping_time, &addr_map) != 0) {
  2888. continue;
  2889. }
  2890. _dns_server_context_add_ip(context, addr_map->ip_addr);
  2891. if (request->has_ip == 1) {
  2892. continue;
  2893. }
  2894. memcpy(request->ip_addr, addr, DNS_RR_A_LEN);
  2895. /* add this ip to request */
  2896. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2897. request->has_ip = 1;
  2898. request->rcode = packet->head.rcode;
  2899. } break;
  2900. case DNS_T_AAAA: {
  2901. unsigned char addr[16];
  2902. char name[DNS_MAX_CNAME_LEN] = {0};
  2903. struct dns_ip_address *addr_map = NULL;
  2904. if (request->qtype != DNS_T_AAAA) {
  2905. /* ignore non-matched query type */
  2906. continue;
  2907. }
  2908. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  2909. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2910. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2911. continue;
  2912. }
  2913. if (context->no_check_add_ip == 0 &&
  2914. _dns_ip_address_check_add(request, name, addr, DNS_T_AAAA, request->ping_time, &addr_map) != 0) {
  2915. continue;
  2916. }
  2917. _dns_server_context_add_ip(context, addr_map->ip_addr);
  2918. if (request->has_ip == 1) {
  2919. continue;
  2920. }
  2921. memcpy(request->ip_addr, addr, DNS_RR_AAAA_LEN);
  2922. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  2923. request->has_ip = 1;
  2924. request->rcode = packet->head.rcode;
  2925. } break;
  2926. case DNS_T_NS: {
  2927. char cname[DNS_MAX_CNAME_LEN];
  2928. char name[DNS_MAX_CNAME_LEN] = {0};
  2929. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2930. tlog(TLOG_DEBUG, "NS: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  2931. } break;
  2932. case DNS_T_CNAME: {
  2933. char cname[DNS_MAX_CNAME_LEN];
  2934. char name[DNS_MAX_CNAME_LEN] = {0};
  2935. if (dns_conf_force_no_cname) {
  2936. continue;
  2937. }
  2938. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  2939. tlog(TLOG_DEBUG, "name: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  2940. if (strncmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  2941. strncmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  2942. continue;
  2943. }
  2944. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  2945. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  2946. request->has_cname = 1;
  2947. } break;
  2948. case DNS_T_SOA: {
  2949. char name[DNS_MAX_CNAME_LEN] = {0};
  2950. request->has_soa = 1;
  2951. if (request->rcode != DNS_RC_NOERROR) {
  2952. request->rcode = packet->head.rcode;
  2953. }
  2954. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  2955. tlog(TLOG_DEBUG,
  2956. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: "
  2957. "%d, minimum: %d",
  2958. request->domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  2959. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  2960. } break;
  2961. default:
  2962. break;
  2963. }
  2964. }
  2965. }
  2966. return 0;
  2967. }
  2968. static int _dns_server_reply_passthrough(struct dns_server_post_context *context)
  2969. {
  2970. struct dns_request *request = context->request;
  2971. if (atomic_inc_return(&request->notified) != 1) {
  2972. return 0;
  2973. }
  2974. _dns_server_get_answer(context);
  2975. _dns_cache_reply_packet(context);
  2976. if (_dns_server_setup_ipset_nftset_packet(context) != 0) {
  2977. tlog(TLOG_DEBUG, "setup ipset failed.");
  2978. }
  2979. _dns_result_callback(context);
  2980. _dns_server_audit_log(context);
  2981. /* reply child request */
  2982. _dns_result_child_post(context);
  2983. if (request->conn && context->do_reply == 1) {
  2984. char clientip[DNS_MAX_CNAME_LEN] = {0};
  2985. /* When passthrough, modify the id to be the id of the client request. */
  2986. int ret = _dns_request_update_id_ttl(context);
  2987. if (ret != 0) {
  2988. tlog(TLOG_ERROR, "update packet ttl failed.");
  2989. return -1;
  2990. }
  2991. _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  2992. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  2993. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype,
  2994. request->id, request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  2995. get_tick_count() - request->send_tick);
  2996. }
  2997. return _dns_server_reply_all_pending_list(request, context);
  2998. }
  2999. static void _dns_server_query_end(struct dns_request *request)
  3000. {
  3001. int ip_num = 0;
  3002. int request_wait = 0;
  3003. pthread_mutex_lock(&request->ip_map_lock);
  3004. ip_num = atomic_read(&request->ip_map_num);
  3005. request_wait = request->request_wait;
  3006. request->request_wait--;
  3007. pthread_mutex_unlock(&request->ip_map_lock);
  3008. /* Not need to wait check result if only has one ip address */
  3009. if (ip_num <= 1 && request_wait == 1) {
  3010. if (request->dualstack_selection_query == 1) {
  3011. if ((dns_conf_ipset_no_speed.ipv4_enable || dns_conf_nftset_no_speed.ip_enable ||
  3012. dns_conf_ipset_no_speed.ipv6_enable || dns_conf_nftset_no_speed.ip6_enable) &&
  3013. dns_conf_dns_dns64.prefix_len == 0) {
  3014. /* if speed check fail enabled, we need reply quickly, otherwise wait for ping result.*/
  3015. _dns_server_request_complete(request);
  3016. }
  3017. goto out;
  3018. }
  3019. if (request->dualstack_selection_has_ip && request->dualstack_selection_ping_time > 0) {
  3020. goto out;
  3021. }
  3022. request->has_ping_result = 1;
  3023. _dns_server_request_complete(request);
  3024. }
  3025. out:
  3026. _dns_server_request_release(request);
  3027. }
  3028. static int dns_server_dualstack_callback(const struct dns_result *result, void *user_ptr)
  3029. {
  3030. struct dns_request *request = (struct dns_request *)user_ptr;
  3031. tlog(TLOG_DEBUG, "dualstack result: domain: %s, ip: %s, type: %d, ping: %d, rcode: %d", result->domain, result->ip,
  3032. result->addr_type, result->ping_time, result->rtcode);
  3033. if (request == NULL) {
  3034. return -1;
  3035. }
  3036. if (result->rtcode == DNS_RC_NOERROR && result->ip[0] != 0) {
  3037. request->dualstack_selection_has_ip = 1;
  3038. }
  3039. request->dualstack_selection_ping_time = result->ping_time;
  3040. _dns_server_query_end(request);
  3041. return 0;
  3042. }
  3043. static void _dns_server_passthrough_may_complete(struct dns_request *request)
  3044. {
  3045. const unsigned char *addr;
  3046. if (request->passthrough != 2) {
  3047. return;
  3048. }
  3049. if (request->has_ip == 0 && request->has_soa == 0) {
  3050. return;
  3051. }
  3052. if (request->qtype == DNS_T_A && request->has_ip == 1) {
  3053. /* Ad blocking result */
  3054. addr = request->ip_addr;
  3055. if (addr[0] == 0 || addr[0] == 127) {
  3056. /* If half of the servers return the same result, then ignore this address */
  3057. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3058. return;
  3059. }
  3060. }
  3061. }
  3062. if (request->qtype == DNS_T_AAAA && request->has_ip == 1) {
  3063. addr = request->ip_addr;
  3064. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  3065. /* If half of the servers return the same result, then ignore this address */
  3066. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3067. return;
  3068. }
  3069. }
  3070. }
  3071. _dns_server_request_complete_with_all_IPs(request, 1);
  3072. }
  3073. static int dns_server_resolve_callback(const char *domain, dns_result_type rtype, struct dns_server_info *server_info,
  3074. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len,
  3075. void *user_ptr)
  3076. {
  3077. struct dns_request *request = user_ptr;
  3078. int ret = 0;
  3079. unsigned long result_flag = dns_client_server_result_flag(server_info);
  3080. if (request == NULL) {
  3081. return -1;
  3082. }
  3083. if (rtype == DNS_QUERY_RESULT) {
  3084. tlog(TLOG_DEBUG, "query result from server %s:%d, type: %d", dns_client_get_server_ip(server_info),
  3085. dns_client_get_server_port(server_info), dns_client_get_server_type(server_info));
  3086. if (request->passthrough == 1 && atomic_read(&request->notified) == 0) {
  3087. struct dns_server_post_context context;
  3088. int ttl = 0;
  3089. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  3090. if (ret == 0) {
  3091. return 0;
  3092. }
  3093. ttl = _dns_server_get_conf_ttl(request, ttl);
  3094. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  3095. context.do_cache = 1;
  3096. context.do_audit = 1;
  3097. context.do_reply = 1;
  3098. context.do_ipset = 1;
  3099. context.reply_ttl = ttl;
  3100. return _dns_server_reply_passthrough(&context);
  3101. }
  3102. if (request->prefetch == 0 && request->response_mode == DNS_RESPONSE_MODE_FASTEST_RESPONSE &&
  3103. atomic_read(&request->notified) == 0) {
  3104. struct dns_server_post_context context;
  3105. int ttl = 0;
  3106. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  3107. if (ret != 0) {
  3108. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  3109. context.do_cache = 1;
  3110. context.do_audit = 1;
  3111. context.do_reply = 1;
  3112. context.do_ipset = 1;
  3113. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  3114. context.cache_ttl = _dns_server_get_conf_ttl(request, ttl);
  3115. request->ip_ttl = context.cache_ttl;
  3116. context.no_check_add_ip = 1;
  3117. _dns_server_reply_passthrough(&context);
  3118. request->cname[0] = 0;
  3119. request->has_ip = 0;
  3120. request->has_cname = 0;
  3121. request->has_ping_result = 0;
  3122. request->has_soa = 0;
  3123. request->has_ptr = 0;
  3124. request->ping_time = -1;
  3125. request->ip_ttl = 0;
  3126. }
  3127. }
  3128. _dns_server_process_answer(request, domain, packet, result_flag);
  3129. _dns_server_passthrough_may_complete(request);
  3130. return 0;
  3131. } else if (rtype == DNS_QUERY_ERR) {
  3132. tlog(TLOG_ERROR, "request failed, %s", domain);
  3133. return -1;
  3134. } else {
  3135. _dns_server_query_end(request);
  3136. }
  3137. return 0;
  3138. }
  3139. static int _dns_server_get_inet_by_addr(struct sockaddr_storage *localaddr, struct sockaddr_storage *addr, int family)
  3140. {
  3141. struct ifaddrs *ifaddr = NULL;
  3142. struct ifaddrs *ifa = NULL;
  3143. char ethname[16] = {0};
  3144. if (getifaddrs(&ifaddr) == -1) {
  3145. return -1;
  3146. }
  3147. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3148. if (ifa->ifa_addr == NULL) {
  3149. continue;
  3150. }
  3151. if (localaddr->ss_family != ifa->ifa_addr->sa_family) {
  3152. continue;
  3153. }
  3154. switch (ifa->ifa_addr->sa_family) {
  3155. case AF_INET: {
  3156. struct sockaddr_in *addr_in_1 = NULL;
  3157. struct sockaddr_in *addr_in_2 = NULL;
  3158. addr_in_1 = (struct sockaddr_in *)ifa->ifa_addr;
  3159. addr_in_2 = (struct sockaddr_in *)localaddr;
  3160. if (memcmp(&(addr_in_1->sin_addr.s_addr), &(addr_in_2->sin_addr.s_addr), 4) != 0) {
  3161. continue;
  3162. }
  3163. } break;
  3164. case AF_INET6: {
  3165. struct sockaddr_in6 *addr_in6_1 = NULL;
  3166. struct sockaddr_in6 *addr_in6_2 = NULL;
  3167. addr_in6_1 = (struct sockaddr_in6 *)ifa->ifa_addr;
  3168. addr_in6_2 = (struct sockaddr_in6 *)localaddr;
  3169. if (IN6_IS_ADDR_V4MAPPED(&addr_in6_1->sin6_addr)) {
  3170. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr + 12;
  3171. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr + 12;
  3172. if (memcmp(addr1, addr2, 4) != 0) {
  3173. continue;
  3174. }
  3175. } else {
  3176. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr;
  3177. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr;
  3178. if (memcmp(addr1, addr2, 16) != 0) {
  3179. continue;
  3180. }
  3181. }
  3182. } break;
  3183. default:
  3184. continue;
  3185. break;
  3186. }
  3187. safe_strncpy(ethname, ifa->ifa_name, sizeof(ethname));
  3188. break;
  3189. }
  3190. if (ethname[0] == '\0') {
  3191. goto errout;
  3192. }
  3193. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3194. if (ifa->ifa_addr == NULL) {
  3195. continue;
  3196. }
  3197. if (ifa->ifa_addr->sa_family != family) {
  3198. continue;
  3199. }
  3200. if (strncmp(ethname, ifa->ifa_name, sizeof(ethname)) != 0) {
  3201. continue;
  3202. }
  3203. if (family == AF_INET) {
  3204. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in));
  3205. } else if (family == AF_INET6) {
  3206. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in6));
  3207. }
  3208. break;
  3209. }
  3210. if (ifa == NULL) {
  3211. goto errout;
  3212. }
  3213. freeifaddrs(ifaddr);
  3214. return 0;
  3215. errout:
  3216. if (ifaddr) {
  3217. freeifaddrs(ifaddr);
  3218. }
  3219. return -1;
  3220. }
  3221. static int _dns_server_reply_request_eth_ip(struct dns_request *request)
  3222. {
  3223. struct sockaddr_in *addr_in = NULL;
  3224. struct sockaddr_in6 *addr_in6 = NULL;
  3225. struct sockaddr_storage *localaddr = NULL;
  3226. struct sockaddr_storage localaddr_buff;
  3227. localaddr = &request->localaddr;
  3228. /* address /domain/ rule */
  3229. switch (request->qtype) {
  3230. case DNS_T_A:
  3231. if (localaddr->ss_family != AF_INET) {
  3232. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET) != 0) {
  3233. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3234. return 0;
  3235. }
  3236. localaddr = &localaddr_buff;
  3237. }
  3238. addr_in = (struct sockaddr_in *)localaddr;
  3239. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, DNS_RR_A_LEN);
  3240. break;
  3241. case DNS_T_AAAA:
  3242. if (localaddr->ss_family != AF_INET6) {
  3243. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET6) != 0) {
  3244. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3245. return 0;
  3246. }
  3247. localaddr = &localaddr_buff;
  3248. }
  3249. addr_in6 = (struct sockaddr_in6 *)localaddr;
  3250. memcpy(request->ip_addr, &addr_in6->sin6_addr.s6_addr, DNS_RR_AAAA_LEN);
  3251. break;
  3252. default:
  3253. goto out;
  3254. break;
  3255. }
  3256. request->rcode = DNS_RC_NOERROR;
  3257. request->ip_ttl = dns_conf_local_ttl;
  3258. request->has_ip = 1;
  3259. struct dns_server_post_context context;
  3260. _dns_server_post_context_init(&context, request);
  3261. context.do_reply = 1;
  3262. _dns_request_post(&context);
  3263. return 0;
  3264. out:
  3265. return -1;
  3266. }
  3267. static int _dns_server_process_ptrs(struct dns_request *request)
  3268. {
  3269. uint32_t key = 0;
  3270. struct dns_ptr *ptr = NULL;
  3271. struct dns_ptr *ptr_tmp = NULL;
  3272. key = hash_string(request->domain);
  3273. hash_for_each_possible(dns_ptr_table.ptr, ptr_tmp, node, key)
  3274. {
  3275. if (strncmp(ptr_tmp->ptr_domain, request->domain, DNS_MAX_PTR_LEN) != 0) {
  3276. continue;
  3277. }
  3278. ptr = ptr_tmp;
  3279. break;
  3280. }
  3281. if (ptr == NULL) {
  3282. goto errout;
  3283. }
  3284. request->has_ptr = 1;
  3285. safe_strncpy(request->ptr_hostname, ptr->hostname, DNS_MAX_CNAME_LEN);
  3286. return 0;
  3287. errout:
  3288. return -1;
  3289. }
  3290. static int _dns_server_process_local_ptr(struct dns_request *request)
  3291. {
  3292. struct ifaddrs *ifaddr = NULL;
  3293. struct ifaddrs *ifa = NULL;
  3294. unsigned char *addr = NULL;
  3295. char reverse_addr[DNS_MAX_CNAME_LEN] = {0};
  3296. int found = 0;
  3297. if (getifaddrs(&ifaddr) == -1) {
  3298. return -1;
  3299. }
  3300. /* Get the NIC IP and match it. If the match is successful, return the host name. */
  3301. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3302. if (ifa->ifa_addr == NULL) {
  3303. continue;
  3304. }
  3305. switch (ifa->ifa_addr->sa_family) {
  3306. case AF_INET: {
  3307. struct sockaddr_in *addr_in = NULL;
  3308. addr_in = (struct sockaddr_in *)ifa->ifa_addr;
  3309. addr = (unsigned char *)&(addr_in->sin_addr.s_addr);
  3310. snprintf(reverse_addr, sizeof(reverse_addr), "%d.%d.%d.%d.in-addr.arpa", addr[3], addr[2], addr[1],
  3311. addr[0]);
  3312. } break;
  3313. case AF_INET6: {
  3314. struct sockaddr_in6 *addr_in6 = NULL;
  3315. addr_in6 = (struct sockaddr_in6 *)ifa->ifa_addr;
  3316. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  3317. addr = addr_in6->sin6_addr.s6_addr + 12;
  3318. snprintf(reverse_addr, sizeof(reverse_addr), "%d.%d.%d.%d.in-addr.arpa", addr[3], addr[2], addr[1],
  3319. addr[0]);
  3320. } else {
  3321. addr = addr_in6->sin6_addr.s6_addr;
  3322. snprintf(reverse_addr, sizeof(reverse_addr),
  3323. "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x."
  3324. "%x.ip6.arpa",
  3325. addr[15] & 0xF, (addr[15] >> 4) & 0xF, addr[14] & 0xF, (addr[14] >> 4) & 0xF, addr[13] & 0xF,
  3326. (addr[13] >> 4) & 0xF, addr[12] & 0xF, (addr[12] >> 4) & 0xF, addr[11] & 0xF,
  3327. (addr[11] >> 4) & 0xF, addr[10] & 0xF, (addr[10] >> 4) & 0xF, addr[9] & 0xF,
  3328. (addr[9] >> 4) & 0xF, addr[8] & 0xF, (addr[8] >> 4) & 0xF, addr[7] & 0xF, (addr[7] >> 4) & 0xF,
  3329. addr[6] & 0xF, (addr[6] >> 4) & 0xF, addr[5] & 0xF, (addr[5] >> 4) & 0xF, addr[4] & 0xF,
  3330. (addr[4] >> 4) & 0xF, addr[3] & 0xF, (addr[3] >> 4) & 0xF, addr[2] & 0xF, (addr[2] >> 4) & 0xF,
  3331. addr[1] & 0xF, (addr[1] >> 4) & 0xF, addr[0] & 0xF, (addr[0] >> 4) & 0xF);
  3332. }
  3333. } break;
  3334. default:
  3335. continue;
  3336. break;
  3337. }
  3338. if (strncmp(request->domain, reverse_addr, DNS_MAX_CNAME_LEN) == 0) {
  3339. found = 1;
  3340. break;
  3341. }
  3342. }
  3343. /* Determine if the smartdns service is in effect. */
  3344. if (strncmp(request->domain, "0.0.0.0.in-addr.arpa", DNS_MAX_CNAME_LEN - 1) == 0) {
  3345. found = 1;
  3346. }
  3347. /* Determine if the smartdns service is in effect. */
  3348. if (found == 0 && strncmp(request->domain, "smartdns", sizeof("smartdns")) == 0) {
  3349. found = 1;
  3350. }
  3351. if (found == 0) {
  3352. goto errout;
  3353. }
  3354. char full_hostname[DNS_MAX_CNAME_LEN];
  3355. if (dns_conf_server_name[0] == 0) {
  3356. char hostname[DNS_MAX_CNAME_LEN];
  3357. char domainname[DNS_MAX_CNAME_LEN];
  3358. /* get local domain name */
  3359. if (getdomainname(domainname, DNS_MAX_CNAME_LEN - 1) == 0) {
  3360. /* check domain is valid */
  3361. if (strncmp(domainname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  3362. domainname[0] = '\0';
  3363. }
  3364. }
  3365. if (gethostname(hostname, DNS_MAX_CNAME_LEN - 1) == 0) {
  3366. /* check hostname is valid */
  3367. if (strncmp(hostname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  3368. hostname[0] = '\0';
  3369. }
  3370. }
  3371. if (hostname[0] != '\0' && domainname[0] != '\0') {
  3372. snprintf(full_hostname, sizeof(full_hostname), "%.64s.%.128s", hostname, domainname);
  3373. } else if (hostname[0] != '\0') {
  3374. safe_strncpy(full_hostname, hostname, DNS_MAX_CNAME_LEN);
  3375. } else {
  3376. safe_strncpy(full_hostname, "smartdns", DNS_MAX_CNAME_LEN);
  3377. }
  3378. } else {
  3379. /* return configured server name */
  3380. safe_strncpy(full_hostname, dns_conf_server_name, DNS_MAX_CNAME_LEN);
  3381. }
  3382. request->has_ptr = 1;
  3383. safe_strncpy(request->ptr_hostname, full_hostname, DNS_MAX_CNAME_LEN);
  3384. freeifaddrs(ifaddr);
  3385. return 0;
  3386. errout:
  3387. if (ifaddr) {
  3388. freeifaddrs(ifaddr);
  3389. }
  3390. return -1;
  3391. }
  3392. static int _dns_server_get_local_ttl(struct dns_request *request)
  3393. {
  3394. struct dns_ttl_rule *ttl_rule;
  3395. /* get domain rule flag */
  3396. ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  3397. if (ttl_rule != NULL) {
  3398. if (ttl_rule->ttl > 0) {
  3399. return ttl_rule->ttl;
  3400. }
  3401. }
  3402. if (dns_conf_local_ttl > 0) {
  3403. return dns_conf_local_ttl;
  3404. }
  3405. if (dns_conf_rr_ttl > 0) {
  3406. return dns_conf_rr_ttl;
  3407. }
  3408. if (dns_conf_rr_ttl_min > 0) {
  3409. return dns_conf_rr_ttl_min;
  3410. }
  3411. return DNS_SERVER_ADDR_TTL;
  3412. }
  3413. static int _dns_server_process_private_ptr(struct dns_request *request)
  3414. {
  3415. int a, b, c, d;
  3416. int ret = sscanf(request->domain, "%d.%d.%d.%d.in-addr.arpa", &a, &b, &c, &d);
  3417. if (ret != 4) {
  3418. return -1;
  3419. }
  3420. if (d == 10 || (d == 172 && c >= 16 && c <= 31) || (d == 192 && c == 168)) {
  3421. request->has_soa = 1;
  3422. _dns_server_setup_soa(request);
  3423. return 0;
  3424. }
  3425. return -1;
  3426. }
  3427. static int _dns_server_process_ptr(struct dns_request *request)
  3428. {
  3429. if (_dns_server_process_ptrs(request) == 0) {
  3430. goto reply_exit;
  3431. }
  3432. if (_dns_server_process_local_ptr(request) == 0) {
  3433. goto reply_exit;
  3434. }
  3435. if (_dns_server_process_private_ptr(request) == 0) {
  3436. goto reply_exit;
  3437. }
  3438. return -1;
  3439. reply_exit:
  3440. request->rcode = DNS_RC_NOERROR;
  3441. request->ip_ttl = _dns_server_get_local_ttl(request);
  3442. struct dns_server_post_context context;
  3443. _dns_server_post_context_init(&context, request);
  3444. context.do_reply = 1;
  3445. context.do_audit = 0;
  3446. context.do_cache = 1;
  3447. _dns_request_post(&context);
  3448. return 0;
  3449. }
  3450. static int _dns_server_process_DDR(struct dns_request *request)
  3451. {
  3452. return _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  3453. }
  3454. static int _dns_server_process_srv(struct dns_request *request)
  3455. {
  3456. if (strncmp("_dns.resolver.arpa", request->domain, DNS_MAX_CNAME_LEN) == 0) {
  3457. return _dns_server_process_DDR(request);
  3458. }
  3459. return -1;
  3460. }
  3461. static void _dns_server_log_rule(const char *domain, enum domain_rule rule_type, unsigned char *rule_key,
  3462. int rule_key_len)
  3463. {
  3464. char rule_name[DNS_MAX_CNAME_LEN];
  3465. if (rule_key_len <= 0) {
  3466. return;
  3467. }
  3468. reverse_string(rule_name, (char *)rule_key, rule_key_len, 1);
  3469. rule_name[rule_key_len] = 0;
  3470. tlog(TLOG_INFO, "RULE-MATCH, type: %d, domain: %s, rule: %s", rule_type, domain, rule_name);
  3471. }
  3472. static void _dns_server_update_rule_by_flags(struct dns_request *request)
  3473. {
  3474. struct dns_rule_flags *rule_flag = (struct dns_rule_flags *)request->domain_rule.rules[0];
  3475. unsigned int flags = 0;
  3476. if (rule_flag == NULL) {
  3477. return;
  3478. }
  3479. flags = rule_flag->flags;
  3480. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  3481. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  3482. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  3483. }
  3484. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  3485. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  3486. }
  3487. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  3488. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  3489. }
  3490. if (flags & DOMAIN_FLAG_IPSET_IGN) {
  3491. request->domain_rule.rules[DOMAIN_RULE_IPSET] = NULL;
  3492. }
  3493. if (flags & DOMAIN_FLAG_IPSET_IPV4_IGN) {
  3494. request->domain_rule.rules[DOMAIN_RULE_IPSET_IPV4] = NULL;
  3495. }
  3496. if (flags & DOMAIN_FLAG_IPSET_IPV6_IGN) {
  3497. request->domain_rule.rules[DOMAIN_RULE_IPSET_IPV6] = NULL;
  3498. }
  3499. if (flags & DOMAIN_FLAG_NFTSET_IP_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  3500. request->domain_rule.rules[DOMAIN_RULE_NFTSET_IP] = NULL;
  3501. }
  3502. if (flags & DOMAIN_FLAG_NFTSET_IP6_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  3503. request->domain_rule.rules[DOMAIN_RULE_NFTSET_IP6] = NULL;
  3504. }
  3505. if (flags & DOMAIN_FLAG_NAMESERVER_IGNORE) {
  3506. request->domain_rule.rules[DOMAIN_RULE_NAMESERVER] = NULL;
  3507. }
  3508. }
  3509. static int _dns_server_get_rules(unsigned char *key, uint32_t key_len, int is_subkey, void *value, void *arg)
  3510. {
  3511. struct rule_walk_args *walk_args = arg;
  3512. struct dns_request *request = walk_args->args;
  3513. struct dns_domain_rule *domain_rule = value;
  3514. int i = 0;
  3515. if (domain_rule == NULL) {
  3516. return 0;
  3517. }
  3518. if (domain_rule->sub_rule_only != domain_rule->root_rule_only) {
  3519. /* only subkey rule */
  3520. if (domain_rule->sub_rule_only == 1 && is_subkey == 0) {
  3521. return 0;
  3522. }
  3523. /* only root key rule */
  3524. if (domain_rule->root_rule_only == 1 && is_subkey == 1) {
  3525. return 0;
  3526. }
  3527. }
  3528. for (i = 0; i < DOMAIN_RULE_MAX; i++) {
  3529. if (domain_rule->rules[i] == NULL) {
  3530. continue;
  3531. }
  3532. request->domain_rule.rules[i] = domain_rule->rules[i];
  3533. request->domain_rule.is_sub_rule[i] = is_subkey;
  3534. walk_args->key[i] = key;
  3535. walk_args->key_len[i] = key_len;
  3536. }
  3537. /* update rules by flags */
  3538. _dns_server_update_rule_by_flags(request);
  3539. return 0;
  3540. }
  3541. static void _dns_server_get_domain_rule_by_domain(struct dns_request *request, const char *domain, int out_log)
  3542. {
  3543. int domain_len = 0;
  3544. char domain_key[DNS_MAX_CNAME_LEN];
  3545. int matched_key_len = DNS_MAX_CNAME_LEN;
  3546. unsigned char matched_key[DNS_MAX_CNAME_LEN];
  3547. struct rule_walk_args walk_args;
  3548. int i = 0;
  3549. if (request->skip_domain_rule != 0) {
  3550. return;
  3551. }
  3552. memset(&walk_args, 0, sizeof(walk_args));
  3553. walk_args.args = request;
  3554. /* reverse domain string */
  3555. domain_len = strlen(domain);
  3556. if (domain_len >= (int)sizeof(domain_key) - 2) {
  3557. return;
  3558. }
  3559. reverse_string(domain_key, domain, domain_len, 1);
  3560. domain_key[domain_len] = '.';
  3561. domain_len++;
  3562. domain_key[domain_len] = 0;
  3563. /* find domain rule */
  3564. art_substring_walk(&dns_conf_domain_rule, (unsigned char *)domain_key, domain_len, _dns_server_get_rules,
  3565. &walk_args);
  3566. if (likely(dns_conf_log_level > TLOG_DEBUG)) {
  3567. return;
  3568. }
  3569. /* output log rule */
  3570. for (i = 0; i < DOMAIN_RULE_MAX; i++) {
  3571. if (walk_args.key[i] == NULL) {
  3572. continue;
  3573. }
  3574. matched_key_len = walk_args.key_len[i];
  3575. if (walk_args.key_len[i] >= sizeof(matched_key)) {
  3576. continue;
  3577. }
  3578. memcpy(matched_key, walk_args.key[i], walk_args.key_len[i]);
  3579. matched_key_len--;
  3580. matched_key[matched_key_len] = 0;
  3581. if (out_log != 0) {
  3582. _dns_server_log_rule(request->domain, i, matched_key, matched_key_len);
  3583. }
  3584. }
  3585. request->skip_domain_rule = 1;
  3586. }
  3587. static void _dns_server_get_domain_rule(struct dns_request *request)
  3588. {
  3589. _dns_server_get_domain_rule_by_domain(request, request->domain, 1);
  3590. }
  3591. static int _dns_server_pre_process_server_flags(struct dns_request *request)
  3592. {
  3593. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0) {
  3594. request->no_cache = 1;
  3595. }
  3596. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_IP_ALIAS) == 0) {
  3597. request->no_ipalias = 1;
  3598. }
  3599. return -1;
  3600. }
  3601. static int _dns_server_pre_process_rule_flags(struct dns_request *request)
  3602. {
  3603. struct dns_rule_flags *rule_flag = NULL;
  3604. unsigned int flags = 0;
  3605. int rcode = DNS_RC_NOERROR;
  3606. /* get domain rule flag */
  3607. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3608. if (rule_flag == NULL) {
  3609. if (_dns_server_is_return_soa(request)) {
  3610. goto soa;
  3611. }
  3612. goto out;
  3613. }
  3614. flags = rule_flag->flags;
  3615. if (flags & DOMAIN_FLAG_NO_SERVE_EXPIRED) {
  3616. request->no_serve_expired = 1;
  3617. }
  3618. if (flags & DOMAIN_FLAG_NO_CACHE) {
  3619. request->no_cache = 1;
  3620. }
  3621. if (flags & DOMAIN_FLAG_NO_IPALIAS) {
  3622. request->no_ipalias = 1;
  3623. }
  3624. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  3625. /* ignore this domain */
  3626. goto skip_soa_out;
  3627. }
  3628. /* return specific type of address */
  3629. switch (request->qtype) {
  3630. case DNS_T_A:
  3631. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  3632. /* ignore this domain for A request */
  3633. goto skip_soa_out;
  3634. }
  3635. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] != NULL) {
  3636. goto skip_soa_out;
  3637. }
  3638. if (_dns_server_is_return_soa(request)) {
  3639. /* return SOA for A request */
  3640. if (_dns_server_is_return_soa_qtype(request, DNS_T_AAAA)) {
  3641. rcode = DNS_RC_NXDOMAIN;
  3642. }
  3643. goto soa;
  3644. }
  3645. break;
  3646. case DNS_T_AAAA:
  3647. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  3648. /* ignore this domain for A request */
  3649. goto skip_soa_out;
  3650. }
  3651. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] != NULL) {
  3652. goto skip_soa_out;
  3653. }
  3654. if (_dns_server_is_return_soa(request)) {
  3655. /* return SOA for A request */
  3656. if (_dns_server_is_return_soa_qtype(request, DNS_T_A)) {
  3657. rcode = DNS_RC_NXDOMAIN;
  3658. }
  3659. goto soa;
  3660. }
  3661. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA && request->dualstack_selection) {
  3662. /* if IPV4 return SOA and dualstack-selection enabled, set request dualstack disable */
  3663. request->dualstack_selection = 0;
  3664. }
  3665. break;
  3666. default:
  3667. goto out;
  3668. break;
  3669. }
  3670. if (_dns_server_is_return_soa(request)) {
  3671. goto soa;
  3672. }
  3673. skip_soa_out:
  3674. request->skip_qtype_soa = 1;
  3675. out:
  3676. return -1;
  3677. soa:
  3678. /* return SOA */
  3679. _dns_server_reply_SOA(rcode, request);
  3680. return 0;
  3681. }
  3682. static int _dns_server_address_generate_order(int orders[], int order_num, int max_order_count)
  3683. {
  3684. int i = 0;
  3685. int j = 0;
  3686. int k = 0;
  3687. unsigned int seed = time(NULL);
  3688. for (i = 0; i < order_num && i < max_order_count; i++) {
  3689. orders[i] = i;
  3690. }
  3691. for (i = 0; i < order_num && max_order_count; i++) {
  3692. k = rand_r(&seed) % order_num;
  3693. j = rand_r(&seed) % order_num;
  3694. if (j == k) {
  3695. continue;
  3696. }
  3697. int temp = orders[j];
  3698. orders[j] = orders[k];
  3699. orders[k] = temp;
  3700. }
  3701. return 0;
  3702. }
  3703. static int _dns_server_process_address(struct dns_request *request)
  3704. {
  3705. struct dns_rule_address_IPV4 *address_ipv4 = NULL;
  3706. struct dns_rule_address_IPV6 *address_ipv6 = NULL;
  3707. int orders[DNS_MAX_REPLY_IP_NUM];
  3708. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_ADDR) == 0) {
  3709. goto errout;
  3710. }
  3711. /* address /domain/ rule */
  3712. switch (request->qtype) {
  3713. case DNS_T_A:
  3714. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] == NULL) {
  3715. goto errout;
  3716. }
  3717. address_ipv4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV4);
  3718. if (address_ipv4 == NULL) {
  3719. goto errout;
  3720. }
  3721. _dns_server_address_generate_order(orders, address_ipv4->addr_num, DNS_MAX_REPLY_IP_NUM);
  3722. memcpy(request->ip_addr, address_ipv4->ipv4_addr[orders[0]], DNS_RR_A_LEN);
  3723. for (int i = 1; i < address_ipv4->addr_num; i++) {
  3724. int index = orders[i];
  3725. if (index >= address_ipv4->addr_num) {
  3726. continue;
  3727. }
  3728. _dns_ip_address_check_add(request, request->cname, address_ipv4->ipv4_addr[index], DNS_T_A, 1, NULL);
  3729. }
  3730. break;
  3731. case DNS_T_AAAA:
  3732. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] == NULL) {
  3733. goto errout;
  3734. }
  3735. address_ipv6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV6);
  3736. if (address_ipv6 == NULL) {
  3737. goto errout;
  3738. }
  3739. _dns_server_address_generate_order(orders, address_ipv6->addr_num, DNS_MAX_REPLY_IP_NUM);
  3740. memcpy(request->ip_addr, address_ipv6->ipv6_addr[orders[0]], DNS_RR_AAAA_LEN);
  3741. for (int i = 1; i < address_ipv6->addr_num; i++) {
  3742. int index = orders[i];
  3743. if (index >= address_ipv6->addr_num) {
  3744. continue;
  3745. }
  3746. _dns_ip_address_check_add(request, request->cname, address_ipv6->ipv6_addr[index], DNS_T_AAAA, 1, NULL);
  3747. }
  3748. break;
  3749. default:
  3750. goto errout;
  3751. break;
  3752. }
  3753. request->rcode = DNS_RC_NOERROR;
  3754. request->ip_ttl = _dns_server_get_local_ttl(request);
  3755. request->has_ip = 1;
  3756. struct dns_server_post_context context;
  3757. _dns_server_post_context_init(&context, request);
  3758. context.do_reply = 1;
  3759. context.do_audit = 1;
  3760. context.do_ipset = 1;
  3761. context.select_all_best_ip = 1;
  3762. _dns_request_post(&context);
  3763. return 0;
  3764. errout:
  3765. return -1;
  3766. }
  3767. static struct dns_request *_dns_server_new_child_request(struct dns_request *request, const char *domain,
  3768. dns_type_t qtype, child_request_callback child_callback)
  3769. {
  3770. struct dns_request *child_request = NULL;
  3771. child_request = _dns_server_new_request();
  3772. if (child_request == NULL) {
  3773. tlog(TLOG_ERROR, "malloc failed.\n");
  3774. goto errout;
  3775. }
  3776. child_request->server_flags = request->server_flags;
  3777. safe_strncpy(child_request->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  3778. safe_strncpy(child_request->domain, domain, sizeof(child_request->domain));
  3779. child_request->prefetch = request->prefetch;
  3780. child_request->prefetch_flags = request->prefetch_flags;
  3781. child_request->child_callback = child_callback;
  3782. child_request->parent_request = request;
  3783. child_request->qtype = qtype;
  3784. child_request->qclass = request->qclass;
  3785. if (request->has_ecs) {
  3786. memcpy(&child_request->ecs, &request->ecs, sizeof(child_request->ecs));
  3787. child_request->has_ecs = request->has_ecs;
  3788. }
  3789. _dns_server_request_get(request);
  3790. /* reference count is 1 hold by parent request */
  3791. request->child_request = child_request;
  3792. _dns_server_get_domain_rule(child_request);
  3793. return child_request;
  3794. errout:
  3795. if (child_request) {
  3796. _dns_server_request_release(child_request);
  3797. }
  3798. return NULL;
  3799. }
  3800. static int _dns_server_request_copy(struct dns_request *request, struct dns_request *from)
  3801. {
  3802. unsigned long bucket = 0;
  3803. struct dns_ip_address *addr_map = NULL;
  3804. struct hlist_node *tmp = NULL;
  3805. uint32_t key = 0;
  3806. int addr_len = 0;
  3807. request->rcode = from->rcode;
  3808. if (from->has_ip) {
  3809. request->has_ip = 1;
  3810. request->ip_ttl = _dns_server_get_conf_ttl(request, from->ip_ttl);
  3811. request->ping_time = from->ping_time;
  3812. memcpy(request->ip_addr, from->ip_addr, sizeof(request->ip_addr));
  3813. }
  3814. if (from->has_cname) {
  3815. request->has_cname = 1;
  3816. request->ttl_cname = from->ttl_cname;
  3817. safe_strncpy(request->cname, from->cname, sizeof(request->cname));
  3818. }
  3819. if (from->has_soa) {
  3820. request->has_soa = 1;
  3821. memcpy(&request->soa, &from->soa, sizeof(request->soa));
  3822. }
  3823. pthread_mutex_lock(&request->ip_map_lock);
  3824. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  3825. {
  3826. hash_del(&addr_map->node);
  3827. free(addr_map);
  3828. }
  3829. pthread_mutex_unlock(&request->ip_map_lock);
  3830. pthread_mutex_lock(&from->ip_map_lock);
  3831. hash_for_each_safe(from->ip_map, bucket, tmp, addr_map, node)
  3832. {
  3833. struct dns_ip_address *new_addr_map = NULL;
  3834. if (addr_map->addr_type == DNS_T_A) {
  3835. addr_len = DNS_RR_A_LEN;
  3836. } else if (addr_map->addr_type == DNS_T_AAAA) {
  3837. addr_len = DNS_RR_AAAA_LEN;
  3838. } else {
  3839. continue;
  3840. }
  3841. new_addr_map = malloc(sizeof(struct dns_ip_address));
  3842. if (new_addr_map == NULL) {
  3843. tlog(TLOG_ERROR, "malloc failed.\n");
  3844. pthread_mutex_unlock(&from->ip_map_lock);
  3845. return -1;
  3846. }
  3847. memcpy(new_addr_map, addr_map, sizeof(struct dns_ip_address));
  3848. new_addr_map->ping_time = addr_map->ping_time;
  3849. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  3850. key = jhash(&addr_map->addr_type, sizeof(addr_map->addr_type), key);
  3851. pthread_mutex_lock(&request->ip_map_lock);
  3852. hash_add(request->ip_map, &new_addr_map->node, key);
  3853. pthread_mutex_unlock(&request->ip_map_lock);
  3854. }
  3855. pthread_mutex_unlock(&from->ip_map_lock);
  3856. return 0;
  3857. }
  3858. static DNS_CHILD_POST_RESULT _dns_server_process_cname_callback(struct dns_request *request,
  3859. struct dns_request *child_request, int is_first_resp)
  3860. {
  3861. _dns_server_request_copy(request, child_request);
  3862. if (child_request->rcode == DNS_RC_NOERROR && dns_conf_force_no_cname == 0 && child_request->has_soa == 0) {
  3863. safe_strncpy(request->cname, child_request->domain, sizeof(request->cname));
  3864. request->has_cname = 1;
  3865. request->ttl_cname = _dns_server_get_conf_ttl(request, child_request->ip_ttl);
  3866. }
  3867. return DNS_CHILD_POST_SUCCESS;
  3868. }
  3869. static int _dns_server_process_cname_pre(struct dns_request *request)
  3870. {
  3871. struct dns_cname_rule *cname = NULL;
  3872. struct dns_rule_flags *rule_flag = NULL;
  3873. struct dns_request_domain_rule domain_rule;
  3874. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  3875. return 0;
  3876. }
  3877. if (request->has_cname_loop == 1) {
  3878. return 0;
  3879. }
  3880. /* get domain rule flag */
  3881. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3882. if (rule_flag != NULL) {
  3883. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  3884. return 0;
  3885. }
  3886. }
  3887. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  3888. if (cname == NULL) {
  3889. return 0;
  3890. }
  3891. request->skip_domain_rule = 0;
  3892. /* copy child rules */
  3893. memcpy(&domain_rule, &request->domain_rule, sizeof(domain_rule));
  3894. memset(&request->domain_rule, 0, sizeof(request->domain_rule));
  3895. _dns_server_get_domain_rule_by_domain(request, cname->cname, 0);
  3896. request->domain_rule.rules[DOMAIN_RULE_CNAME] = domain_rule.rules[DOMAIN_RULE_CNAME];
  3897. request->domain_rule.is_sub_rule[DOMAIN_RULE_CNAME] = domain_rule.is_sub_rule[DOMAIN_RULE_CNAME];
  3898. request->no_select_possible_ip = 1;
  3899. request->no_cache_cname = 1;
  3900. safe_strncpy(request->cname, cname->cname, sizeof(request->cname));
  3901. return 0;
  3902. }
  3903. static int _dns_server_process_cname(struct dns_request *request)
  3904. {
  3905. struct dns_cname_rule *cname = NULL;
  3906. const char *child_group_name = NULL;
  3907. int ret = 0;
  3908. struct dns_rule_flags *rule_flag = NULL;
  3909. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  3910. return 0;
  3911. }
  3912. if (request->has_cname_loop == 1) {
  3913. return 0;
  3914. }
  3915. /* get domain rule flag */
  3916. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  3917. if (rule_flag != NULL) {
  3918. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  3919. return 0;
  3920. }
  3921. }
  3922. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  3923. if (cname == NULL) {
  3924. return 0;
  3925. }
  3926. tlog(TLOG_INFO, "query %s with cname %s", request->domain, cname->cname);
  3927. struct dns_request *child_request =
  3928. _dns_server_new_child_request(request, cname->cname, request->qtype, _dns_server_process_cname_callback);
  3929. if (child_request == NULL) {
  3930. tlog(TLOG_ERROR, "malloc failed.\n");
  3931. return -1;
  3932. }
  3933. /* check cname rule loop */
  3934. struct dns_request *check_request = child_request->parent_request;
  3935. struct dns_cname_rule *child_cname = _dns_server_get_dns_rule(child_request, DOMAIN_RULE_CNAME);
  3936. /* sub domain rule*/
  3937. if (child_cname != NULL && strncmp(child_request->domain, child_cname->cname, DNS_MAX_CNAME_LEN) == 0) {
  3938. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  3939. child_request->has_cname_loop = 1;
  3940. }
  3941. /* loop rule */
  3942. while (check_request != NULL && child_cname != NULL) {
  3943. struct dns_cname_rule *check_cname = _dns_server_get_dns_rule(check_request, DOMAIN_RULE_CNAME);
  3944. if (check_cname == NULL) {
  3945. break;
  3946. }
  3947. if (strstr(child_request->domain, check_request->domain) != NULL &&
  3948. check_request != child_request->parent_request) {
  3949. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  3950. child_request->has_cname_loop = 1;
  3951. break;
  3952. }
  3953. check_request = check_request->parent_request;
  3954. }
  3955. child_group_name = _dns_server_get_request_groupname(child_request);
  3956. if (child_group_name) {
  3957. /* reset dns group and setup child request domain group again when do query.*/
  3958. child_request->dns_group_name[0] = '\0';
  3959. }
  3960. request->request_wait++;
  3961. ret = _dns_server_do_query(child_request, 0);
  3962. if (ret != 0) {
  3963. request->request_wait--;
  3964. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  3965. goto errout;
  3966. }
  3967. _dns_server_request_release_complete(child_request, 0);
  3968. return 1;
  3969. errout:
  3970. if (child_request) {
  3971. request->child_request = NULL;
  3972. _dns_server_request_release(child_request);
  3973. }
  3974. return -1;
  3975. }
  3976. static enum DNS_CHILD_POST_RESULT
  3977. _dns_server_process_dns64_callback(struct dns_request *request, struct dns_request *child_request, int is_first_resp)
  3978. {
  3979. unsigned long bucket = 0;
  3980. struct dns_ip_address *addr_map = NULL;
  3981. struct hlist_node *tmp = NULL;
  3982. uint32_t key = 0;
  3983. int addr_len = 0;
  3984. if (request->has_ip == 1) {
  3985. if (memcmp(request->ip_addr, dns_conf_dns_dns64.prefix, 12) != 0) {
  3986. return DNS_CHILD_POST_SKIP;
  3987. }
  3988. }
  3989. if (child_request->qtype != DNS_T_A) {
  3990. return DNS_CHILD_POST_FAIL;
  3991. }
  3992. if (child_request->has_cname == 1) {
  3993. safe_strncpy(request->cname, child_request->cname, sizeof(request->cname));
  3994. request->has_cname = 1;
  3995. request->ttl_cname = child_request->ttl_cname;
  3996. }
  3997. if (child_request->has_ip == 0) {
  3998. if (child_request->has_soa) {
  3999. memcpy(&request->soa, &child_request->soa, sizeof(struct dns_soa));
  4000. request->has_soa = 1;
  4001. return DNS_CHILD_POST_SUCCESS;
  4002. }
  4003. if (request->has_soa == 0) {
  4004. _dns_server_setup_soa(request);
  4005. request->has_soa = 1;
  4006. }
  4007. return DNS_CHILD_POST_FAIL;
  4008. }
  4009. memcpy(request->ip_addr, dns_conf_dns_dns64.prefix, 16);
  4010. memcpy(request->ip_addr + 12, child_request->ip_addr, 4);
  4011. request->ip_ttl = child_request->ip_ttl;
  4012. request->has_ip = 1;
  4013. request->has_soa = 0;
  4014. request->rcode = child_request->rcode;
  4015. pthread_mutex_lock(&request->ip_map_lock);
  4016. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  4017. {
  4018. hash_del(&addr_map->node);
  4019. free(addr_map);
  4020. }
  4021. pthread_mutex_unlock(&request->ip_map_lock);
  4022. pthread_mutex_lock(&child_request->ip_map_lock);
  4023. hash_for_each_safe(child_request->ip_map, bucket, tmp, addr_map, node)
  4024. {
  4025. struct dns_ip_address *new_addr_map = NULL;
  4026. if (addr_map->addr_type == DNS_T_A) {
  4027. addr_len = DNS_RR_A_LEN;
  4028. } else {
  4029. continue;
  4030. }
  4031. new_addr_map = malloc(sizeof(struct dns_ip_address));
  4032. if (new_addr_map == NULL) {
  4033. tlog(TLOG_ERROR, "malloc failed.\n");
  4034. pthread_mutex_unlock(&child_request->ip_map_lock);
  4035. return DNS_CHILD_POST_FAIL;
  4036. }
  4037. memset(new_addr_map, 0, sizeof(struct dns_ip_address));
  4038. new_addr_map->addr_type = DNS_T_AAAA;
  4039. addr_len = DNS_RR_AAAA_LEN;
  4040. memcpy(new_addr_map->ip_addr, dns_conf_dns_dns64.prefix, 16);
  4041. memcpy(new_addr_map->ip_addr + 12, addr_map->ip_addr, 4);
  4042. new_addr_map->ping_time = addr_map->ping_time;
  4043. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  4044. key = jhash(&new_addr_map->addr_type, sizeof(new_addr_map->addr_type), key);
  4045. pthread_mutex_lock(&request->ip_map_lock);
  4046. hash_add(request->ip_map, &new_addr_map->node, key);
  4047. pthread_mutex_unlock(&request->ip_map_lock);
  4048. }
  4049. pthread_mutex_unlock(&child_request->ip_map_lock);
  4050. if (request->dualstack_selection == 1) {
  4051. return DNS_CHILD_POST_NO_RESPONSE;
  4052. }
  4053. return DNS_CHILD_POST_SUCCESS;
  4054. }
  4055. static int _dns_server_process_dns64(struct dns_request *request)
  4056. {
  4057. if (_dns_server_is_dns64_request(request) == 0) {
  4058. return 0;
  4059. }
  4060. tlog(TLOG_DEBUG, "query %s with dns64", request->domain);
  4061. struct dns_request *child_request =
  4062. _dns_server_new_child_request(request, request->domain, DNS_T_A, _dns_server_process_dns64_callback);
  4063. if (child_request == NULL) {
  4064. tlog(TLOG_ERROR, "malloc failed.\n");
  4065. return -1;
  4066. }
  4067. request->request_wait++;
  4068. int ret = _dns_server_do_query(child_request, 0);
  4069. if (ret != 0) {
  4070. request->request_wait--;
  4071. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  4072. goto errout;
  4073. }
  4074. _dns_server_request_release_complete(child_request, 0);
  4075. return 1;
  4076. errout:
  4077. if (child_request) {
  4078. request->child_request = NULL;
  4079. _dns_server_request_release(child_request);
  4080. }
  4081. return -1;
  4082. }
  4083. static int _dns_server_qtype_soa(struct dns_request *request)
  4084. {
  4085. if (request->skip_qtype_soa || dns_qtype_soa_table == NULL) {
  4086. return -1;
  4087. }
  4088. if (request->qtype >= 0 && request->qtype <= MAX_QTYPE_NUM) {
  4089. int offset = request->qtype / 8;
  4090. int bit = request->qtype % 8;
  4091. if ((dns_qtype_soa_table[offset] & (1 << bit)) == 0) {
  4092. return -1;
  4093. }
  4094. }
  4095. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4096. tlog(TLOG_DEBUG, "force qtype %d soa", request->qtype);
  4097. return 0;
  4098. }
  4099. static void _dns_server_process_speed_rule(struct dns_request *request)
  4100. {
  4101. struct dns_domain_check_orders *check_order = NULL;
  4102. struct dns_response_mode_rule *response_mode = NULL;
  4103. /* get speed check mode */
  4104. check_order = _dns_server_get_dns_rule(request, DOMAIN_RULE_CHECKSPEED);
  4105. if (check_order != NULL) {
  4106. request->check_order_list = check_order;
  4107. }
  4108. /* get response mode */
  4109. response_mode = _dns_server_get_dns_rule(request, DOMAIN_RULE_RESPONSE_MODE);
  4110. if (response_mode != NULL) {
  4111. request->response_mode = response_mode->mode;
  4112. }
  4113. }
  4114. static int _dns_server_get_expired_ttl_reply(struct dns_cache *dns_cache)
  4115. {
  4116. int ttl = dns_cache_get_ttl(dns_cache);
  4117. if (ttl > 0) {
  4118. return ttl;
  4119. }
  4120. return dns_conf_serve_expired_reply_ttl;
  4121. }
  4122. static int _dns_server_process_cache_packet(struct dns_request *request, struct dns_cache *dns_cache)
  4123. {
  4124. int ret = -1;
  4125. struct dns_cache_packet *cache_packet = (struct dns_cache_packet *)dns_cache_get_data(dns_cache);
  4126. if (cache_packet == NULL) {
  4127. goto out;
  4128. }
  4129. int do_ipset = (dns_cache_get_ttl(dns_cache) == 0);
  4130. if (dns_cache_is_visited(dns_cache) == 0) {
  4131. do_ipset = 1;
  4132. }
  4133. if (dns_cache->info.qtype != request->qtype) {
  4134. goto out;
  4135. }
  4136. struct dns_server_post_context context;
  4137. _dns_server_post_context_init(&context, request);
  4138. context.inpacket = cache_packet->data;
  4139. context.inpacket_len = cache_packet->head.size;
  4140. request->ping_time = dns_cache->info.speed;
  4141. if (dns_decode(context.packet, context.packet_maxlen, cache_packet->data, cache_packet->head.size) != 0) {
  4142. tlog(TLOG_ERROR, "decode cache failed, %d, %d", context.packet_maxlen, context.inpacket_len);
  4143. goto out;
  4144. }
  4145. request->rcode = context.packet->head.rcode;
  4146. context.do_cache = 0;
  4147. context.do_ipset = do_ipset;
  4148. context.do_audit = 1;
  4149. context.do_reply = 1;
  4150. context.reply_ttl = _dns_server_get_expired_ttl_reply(dns_cache);
  4151. ret = _dns_server_reply_passthrough(&context);
  4152. out:
  4153. if (cache_packet) {
  4154. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  4155. }
  4156. return ret;
  4157. }
  4158. static int _dns_server_process_cache_data(struct dns_request *request, struct dns_cache *dns_cache)
  4159. {
  4160. int ret = -1;
  4161. request->ping_time = dns_cache->info.speed;
  4162. ret = _dns_server_process_cache_packet(request, dns_cache);
  4163. if (ret != 0) {
  4164. goto out;
  4165. }
  4166. return 0;
  4167. out:
  4168. return -1;
  4169. }
  4170. static int _dns_server_process_cache(struct dns_request *request)
  4171. {
  4172. struct dns_cache *dns_cache = NULL;
  4173. struct dns_cache *dualstack_dns_cache = NULL;
  4174. int ret = -1;
  4175. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0) {
  4176. goto out;
  4177. }
  4178. struct dns_cache_key cache_key;
  4179. cache_key.dns_group_name = request->dns_group_name;
  4180. cache_key.domain = request->domain;
  4181. cache_key.qtype = request->qtype;
  4182. cache_key.query_flag = request->server_flags;
  4183. dns_cache = dns_cache_lookup(&cache_key);
  4184. if (dns_cache == NULL) {
  4185. goto out;
  4186. }
  4187. if (request->qtype != dns_cache->info.qtype) {
  4188. goto out;
  4189. }
  4190. if (request->qtype == DNS_T_A && dns_conf_dualstack_ip_allow_force_AAAA == 0) {
  4191. goto reply_cache;
  4192. }
  4193. if (request->qtype != DNS_T_A && request->qtype != DNS_T_AAAA) {
  4194. goto reply_cache;
  4195. }
  4196. if (request->dualstack_selection) {
  4197. int dualstack_qtype = 0;
  4198. if (request->qtype == DNS_T_A) {
  4199. dualstack_qtype = DNS_T_AAAA;
  4200. } else if (request->qtype == DNS_T_AAAA) {
  4201. dualstack_qtype = DNS_T_A;
  4202. } else {
  4203. goto reply_cache;
  4204. }
  4205. cache_key.qtype = dualstack_qtype;
  4206. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  4207. if (dualstack_dns_cache == NULL && request->cname[0] != '\0') {
  4208. cache_key.domain = request->cname;
  4209. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  4210. }
  4211. if (dualstack_dns_cache && (dualstack_dns_cache->info.speed > 0)) {
  4212. if ((dualstack_dns_cache->info.speed + (dns_conf_dualstack_ip_selection_threshold * 10)) <
  4213. dns_cache->info.speed ||
  4214. dns_cache->info.speed < 0) {
  4215. tlog(TLOG_DEBUG, "cache result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d",
  4216. request->domain, request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id,
  4217. dns_cache->info.speed, dualstack_dns_cache->info.speed);
  4218. request->ip_ttl = _dns_server_get_expired_ttl_reply(dualstack_dns_cache);
  4219. ret = _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4220. goto out_update_cache;
  4221. }
  4222. }
  4223. }
  4224. reply_cache:
  4225. if (dns_cache_get_ttl(dns_cache) <= 0 && request->no_serve_expired == 1) {
  4226. goto out;
  4227. }
  4228. ret = _dns_server_process_cache_data(request, dns_cache);
  4229. if (ret != 0) {
  4230. goto out;
  4231. }
  4232. out_update_cache:
  4233. if (dns_cache_get_ttl(dns_cache) == 0) {
  4234. struct dns_server_query_option dns_query_options;
  4235. dns_query_options.server_flags = request->server_flags;
  4236. dns_query_options.dns_group_name = request->dns_group_name;
  4237. if (request->conn == NULL) {
  4238. dns_query_options.server_flags = dns_cache_get_query_flag(dns_cache);
  4239. dns_query_options.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  4240. }
  4241. dns_query_options.ecs_enable_flag = 0;
  4242. if (request->has_ecs) {
  4243. dns_query_options.ecs_enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  4244. memcpy(&dns_query_options.ecs_dns, &request->ecs, sizeof(dns_query_options.ecs_dns));
  4245. }
  4246. _dns_server_prefetch_request(request->domain, request->qtype, &dns_query_options, 0);
  4247. } else {
  4248. dns_cache_update(dns_cache);
  4249. }
  4250. out:
  4251. if (dns_cache) {
  4252. dns_cache_release(dns_cache);
  4253. }
  4254. if (dualstack_dns_cache) {
  4255. dns_cache_release(dualstack_dns_cache);
  4256. dualstack_dns_cache = NULL;
  4257. }
  4258. return ret;
  4259. }
  4260. void dns_server_check_ipv6_ready(void)
  4261. {
  4262. static int do_get_conf = 0;
  4263. static int is_icmp_check_set;
  4264. static int is_tcp_check_set;
  4265. int i = 0;
  4266. if (do_get_conf == 0) {
  4267. for (i = 0; i < DOMAIN_CHECK_NUM; i++) {
  4268. if (dns_conf_check_orders.orders[i].type == DOMAIN_CHECK_ICMP) {
  4269. is_icmp_check_set = 1;
  4270. }
  4271. if (dns_conf_check_orders.orders[i].type == DOMAIN_CHECK_TCP) {
  4272. is_tcp_check_set = 1;
  4273. }
  4274. }
  4275. if (is_icmp_check_set == 0) {
  4276. tlog(TLOG_INFO, "ICMP ping is disabled, no ipv6 icmp check feature");
  4277. }
  4278. do_get_conf = 1;
  4279. }
  4280. if (is_icmp_check_set) {
  4281. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_ICMP, "2001::", 1, 0, 100, NULL, NULL);
  4282. if (check_ping) {
  4283. fast_ping_stop(check_ping);
  4284. is_ipv6_ready = 1;
  4285. return;
  4286. }
  4287. if (errno == EADDRNOTAVAIL) {
  4288. is_ipv6_ready = 0;
  4289. return;
  4290. }
  4291. }
  4292. if (is_tcp_check_set) {
  4293. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_TCP, "2001::", 1, 0, 100, NULL, NULL);
  4294. if (check_ping) {
  4295. fast_ping_stop(check_ping);
  4296. is_ipv6_ready = 1;
  4297. return;
  4298. }
  4299. if (errno == EADDRNOTAVAIL) {
  4300. is_ipv6_ready = 0;
  4301. return;
  4302. }
  4303. }
  4304. }
  4305. static void _dns_server_request_set_client(struct dns_request *request, struct dns_server_conn_head *conn)
  4306. {
  4307. request->conn = conn;
  4308. request->server_flags = conn->server_flags;
  4309. _dns_server_conn_get(conn);
  4310. }
  4311. static void _dns_server_request_set_id(struct dns_request *request, unsigned short id)
  4312. {
  4313. request->id = id;
  4314. }
  4315. static int _dns_server_request_set_client_addr(struct dns_request *request, struct sockaddr_storage *from,
  4316. socklen_t from_len)
  4317. {
  4318. switch (from->ss_family) {
  4319. case AF_INET:
  4320. memcpy(&request->in, from, from_len);
  4321. request->addr_len = from_len;
  4322. break;
  4323. case AF_INET6:
  4324. memcpy(&request->in6, from, from_len);
  4325. request->addr_len = from_len;
  4326. break;
  4327. default:
  4328. return -1;
  4329. break;
  4330. }
  4331. return 0;
  4332. }
  4333. static void _dns_server_request_set_callback(struct dns_request *request, dns_result_callback callback, void *user_ptr)
  4334. {
  4335. request->result_callback = callback;
  4336. request->user_ptr = user_ptr;
  4337. }
  4338. static int _dns_server_process_smartdns_domain(struct dns_request *request)
  4339. {
  4340. struct dns_rule_flags *rule_flag = NULL;
  4341. unsigned int flags = 0;
  4342. /* get domain rule flag */
  4343. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  4344. if (rule_flag == NULL) {
  4345. return -1;
  4346. }
  4347. if (_dns_server_is_dns_rule_extract_match(request, DOMAIN_RULE_FLAGS) == 0) {
  4348. return -1;
  4349. }
  4350. flags = rule_flag->flags;
  4351. if (!(flags & DOMAIN_FLAG_SMARTDNS_DOMAIN)) {
  4352. return -1;
  4353. }
  4354. return _dns_server_reply_request_eth_ip(request);
  4355. }
  4356. static int _dns_server_process_ptr_query(struct dns_request *request)
  4357. {
  4358. if (request->qtype != DNS_T_PTR) {
  4359. return -1;
  4360. }
  4361. if (_dns_server_process_ptr(request) == 0) {
  4362. return 0;
  4363. }
  4364. request->passthrough = 1;
  4365. return -1;
  4366. }
  4367. static int _dns_server_process_special_query(struct dns_request *request)
  4368. {
  4369. int ret = 0;
  4370. switch (request->qtype) {
  4371. case DNS_T_PTR:
  4372. break;
  4373. case DNS_T_SVCB:
  4374. ret = _dns_server_process_srv(request);
  4375. if (ret == 0) {
  4376. goto clean_exit;
  4377. } else {
  4378. /* pass to upstream server */
  4379. request->passthrough = 1;
  4380. }
  4381. break;
  4382. case DNS_T_A:
  4383. break;
  4384. case DNS_T_AAAA:
  4385. break;
  4386. default:
  4387. tlog(TLOG_DEBUG, "unsupported qtype: %d, domain: %s", request->qtype, request->domain);
  4388. request->passthrough = 1;
  4389. /* pass request to upstream server */
  4390. break;
  4391. }
  4392. return -1;
  4393. clean_exit:
  4394. return 0;
  4395. }
  4396. static const char *_dns_server_get_request_groupname(struct dns_request *request)
  4397. {
  4398. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_NAMESERVER) == 0) {
  4399. return NULL;
  4400. }
  4401. /* Get the nameserver rule */
  4402. if (request->domain_rule.rules[DOMAIN_RULE_NAMESERVER]) {
  4403. struct dns_nameserver_rule *nameserver_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_NAMESERVER);
  4404. return nameserver_rule->group_name;
  4405. }
  4406. return NULL;
  4407. }
  4408. static void _dns_server_check_set_passthrough(struct dns_request *request)
  4409. {
  4410. if (request->check_order_list->orders[0].type == DOMAIN_CHECK_NONE) {
  4411. request->passthrough = 1;
  4412. }
  4413. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_SPEED_CHECK) == 0) {
  4414. request->passthrough = 1;
  4415. }
  4416. if (is_ipv6_ready == 0 && request->qtype == DNS_T_AAAA) {
  4417. request->passthrough = 1;
  4418. }
  4419. if (request->passthrough == 1) {
  4420. request->dualstack_selection = 0;
  4421. }
  4422. if (request->passthrough == 1 && (request->qtype == DNS_T_A || request->qtype == DNS_T_AAAA)) {
  4423. request->passthrough = 2;
  4424. }
  4425. }
  4426. static int _dns_server_process_host(struct dns_request *request)
  4427. {
  4428. uint32_t key = 0;
  4429. struct dns_hosts *host = NULL;
  4430. struct dns_hosts *host_tmp = NULL;
  4431. int dns_type = request->qtype;
  4432. char hostname_lower[DNS_MAX_CNAME_LEN];
  4433. if (dns_hosts_record_num <= 0) {
  4434. return -1;
  4435. }
  4436. key = hash_string(to_lower_case(hostname_lower, request->domain, DNS_MAX_CNAME_LEN));
  4437. key = jhash(&dns_type, sizeof(dns_type), key);
  4438. hash_for_each_possible(dns_hosts_table.hosts, host_tmp, node, key)
  4439. {
  4440. if (host_tmp->dns_type != dns_type) {
  4441. continue;
  4442. }
  4443. if (strncmp(host_tmp->domain, hostname_lower, DNS_MAX_CNAME_LEN) != 0) {
  4444. continue;
  4445. }
  4446. host = host_tmp;
  4447. break;
  4448. }
  4449. if (host == NULL) {
  4450. return -1;
  4451. }
  4452. if (host->is_soa) {
  4453. request->has_soa = 1;
  4454. return _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4455. }
  4456. switch (request->qtype) {
  4457. case DNS_T_A:
  4458. memcpy(request->ip_addr, host->ipv4_addr, DNS_RR_A_LEN);
  4459. break;
  4460. case DNS_T_AAAA:
  4461. memcpy(request->ip_addr, host->ipv6_addr, DNS_RR_AAAA_LEN);
  4462. break;
  4463. default:
  4464. goto errout;
  4465. break;
  4466. }
  4467. request->rcode = DNS_RC_NOERROR;
  4468. request->ip_ttl = dns_conf_local_ttl;
  4469. request->has_ip = 1;
  4470. struct dns_server_post_context context;
  4471. _dns_server_post_context_init(&context, request);
  4472. context.do_reply = 1;
  4473. context.do_audit = 1;
  4474. _dns_request_post(&context);
  4475. return 0;
  4476. errout:
  4477. return -1;
  4478. }
  4479. static int _dns_server_setup_query_option(struct dns_request *request, struct dns_query_options *options)
  4480. {
  4481. options->enable_flag = 0;
  4482. if (request->has_ecs) {
  4483. memcpy(&options->ecs_dns, &request->ecs, sizeof(options->ecs_dns));
  4484. options->enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  4485. }
  4486. return 0;
  4487. }
  4488. static int _dns_server_query_dualstack(struct dns_request *request)
  4489. {
  4490. int ret = -1;
  4491. struct dns_request *request_dualstack = NULL;
  4492. dns_type_t qtype = request->qtype;
  4493. if (request->dualstack_selection == 0) {
  4494. return 0;
  4495. }
  4496. if (qtype == DNS_T_A) {
  4497. qtype = DNS_T_AAAA;
  4498. } else if (qtype == DNS_T_AAAA) {
  4499. qtype = DNS_T_A;
  4500. } else {
  4501. return 0;
  4502. }
  4503. request_dualstack = _dns_server_new_request();
  4504. if (request_dualstack == NULL) {
  4505. tlog(TLOG_ERROR, "malloc failed.\n");
  4506. goto errout;
  4507. }
  4508. request_dualstack->server_flags = request->server_flags;
  4509. safe_strncpy(request_dualstack->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  4510. safe_strncpy(request_dualstack->domain, request->domain, sizeof(request->domain));
  4511. request_dualstack->qtype = qtype;
  4512. request_dualstack->dualstack_selection_query = 1;
  4513. request_dualstack->has_cname_loop = request->has_cname_loop;
  4514. request_dualstack->prefetch = request->prefetch;
  4515. request_dualstack->prefetch_flags = request->prefetch_flags;
  4516. _dns_server_request_get(request);
  4517. request_dualstack->dualstack_request = request;
  4518. _dns_server_request_set_callback(request_dualstack, dns_server_dualstack_callback, request);
  4519. request->request_wait++;
  4520. ret = _dns_server_do_query(request_dualstack, 0);
  4521. if (ret != 0) {
  4522. request->request_wait--;
  4523. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, qtype);
  4524. goto errout;
  4525. }
  4526. _dns_server_request_release(request_dualstack);
  4527. return ret;
  4528. errout:
  4529. if (request_dualstack) {
  4530. _dns_server_request_set_callback(request_dualstack, NULL, NULL);
  4531. _dns_server_request_release(request_dualstack);
  4532. }
  4533. _dns_server_request_release(request);
  4534. return ret;
  4535. }
  4536. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event)
  4537. {
  4538. int ret = -1;
  4539. const char *group_name = NULL;
  4540. const char *dns_group = NULL;
  4541. struct dns_query_options options;
  4542. if (request->conn) {
  4543. dns_group = request->conn->dns_group;
  4544. }
  4545. request->send_tick = get_tick_count();
  4546. /* lookup domain rule */
  4547. _dns_server_get_domain_rule(request);
  4548. group_name = request->dns_group_name;
  4549. if (request->dns_group_name[0] == '\0') {
  4550. group_name = _dns_server_get_request_groupname(request);
  4551. if (group_name == NULL) {
  4552. group_name = dns_group;
  4553. }
  4554. safe_strncpy(request->dns_group_name, group_name, DNS_GROUP_NAME_LEN);
  4555. }
  4556. if (_dns_server_process_cname_pre(request) != 0) {
  4557. goto errout;
  4558. }
  4559. _dns_server_set_dualstack_selection(request);
  4560. if (_dns_server_process_special_query(request) == 0) {
  4561. goto clean_exit;
  4562. }
  4563. if (_dns_server_pre_process_server_flags(request) == 0) {
  4564. goto clean_exit;
  4565. }
  4566. /* process domain flag */
  4567. if (_dns_server_pre_process_rule_flags(request) == 0) {
  4568. goto clean_exit;
  4569. }
  4570. /* process domain address */
  4571. if (_dns_server_process_address(request) == 0) {
  4572. goto clean_exit;
  4573. }
  4574. if (_dns_server_process_smartdns_domain(request) == 0) {
  4575. goto clean_exit;
  4576. }
  4577. if (_dns_server_process_host(request) == 0) {
  4578. goto clean_exit;
  4579. }
  4580. /* process qtype soa */
  4581. if (_dns_server_qtype_soa(request) == 0) {
  4582. goto clean_exit;
  4583. }
  4584. /* process speed check rule */
  4585. _dns_server_process_speed_rule(request);
  4586. /* check and set passthrough */
  4587. _dns_server_check_set_passthrough(request);
  4588. /* process cache */
  4589. if (request->prefetch == 0 && request->dualstack_selection_query == 0) {
  4590. if (_dns_server_process_cache(request) == 0) {
  4591. goto clean_exit;
  4592. }
  4593. }
  4594. /* process ptr */
  4595. if (_dns_server_process_ptr_query(request) == 0) {
  4596. goto clean_exit;
  4597. }
  4598. ret = _dns_server_set_to_pending_list(request);
  4599. if (ret == 0) {
  4600. goto clean_exit;
  4601. }
  4602. if (_dns_server_process_cname(request) != 0) {
  4603. goto clean_exit;
  4604. }
  4605. // setup options
  4606. _dns_server_setup_query_option(request, &options);
  4607. pthread_mutex_lock(&server.request_list_lock);
  4608. if (list_empty(&server.request_list) && skip_notify_event == 1) {
  4609. _dns_server_wakeup_thread();
  4610. }
  4611. list_add_tail(&request->list, &server.request_list);
  4612. pthread_mutex_unlock(&server.request_list_lock);
  4613. // Get reference for DNS query
  4614. request->request_wait++;
  4615. _dns_server_request_get(request);
  4616. if (dns_client_query(request->domain, request->qtype, dns_server_resolve_callback, request, group_name, &options) !=
  4617. 0) {
  4618. request->request_wait--;
  4619. _dns_server_request_release(request);
  4620. tlog(TLOG_DEBUG, "send dns request failed.");
  4621. goto errout;
  4622. }
  4623. /* When the dual stack ip preference is enabled, both A and AAAA records are requested. */
  4624. _dns_server_query_dualstack(request);
  4625. if (_dns_server_process_dns64(request) != 0) {
  4626. goto clean_exit;
  4627. }
  4628. clean_exit:
  4629. return 0;
  4630. errout:
  4631. request = NULL;
  4632. return ret;
  4633. }
  4634. static int _dns_server_check_request_supported(struct dns_request *request, struct dns_packet *packet)
  4635. {
  4636. if (request->qclass != DNS_C_IN) {
  4637. return -1;
  4638. }
  4639. if (packet->head.opcode != DNS_OP_QUERY) {
  4640. return -1;
  4641. }
  4642. return 0;
  4643. }
  4644. static int _dns_server_parser_request(struct dns_request *request, struct dns_packet *packet)
  4645. {
  4646. struct dns_rrs *rrs = NULL;
  4647. int rr_count = 0;
  4648. int i = 0;
  4649. int ret = 0;
  4650. int qclass = 0;
  4651. int qtype = DNS_T_ALL;
  4652. char domain[DNS_MAX_CNAME_LEN];
  4653. if (packet->head.qr != DNS_QR_QUERY) {
  4654. goto errout;
  4655. }
  4656. /* get request domain and request qtype */
  4657. rrs = dns_get_rrs_start(packet, DNS_RRS_QD, &rr_count);
  4658. if (rr_count > 1 || rr_count <= 0) {
  4659. goto errout;
  4660. }
  4661. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  4662. ret = dns_get_domain(rrs, domain, sizeof(domain), &qtype, &qclass);
  4663. if (ret != 0) {
  4664. goto errout;
  4665. }
  4666. // Only support one question.
  4667. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4668. request->qtype = qtype;
  4669. break;
  4670. }
  4671. request->qclass = qclass;
  4672. if (_dns_server_check_request_supported(request, packet) != 0) {
  4673. goto errout;
  4674. }
  4675. /* get request opts */
  4676. rr_count = 0;
  4677. rrs = dns_get_rrs_start(packet, DNS_RRS_OPT, &rr_count);
  4678. if (rr_count <= 0) {
  4679. return 0;
  4680. }
  4681. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  4682. ret = dns_get_OPT_ECS(rrs, NULL, NULL, &request->ecs);
  4683. if (ret != 0) {
  4684. continue;
  4685. }
  4686. request->has_ecs = 1;
  4687. break;
  4688. }
  4689. return 0;
  4690. errout:
  4691. request->rcode = DNS_RC_NOTIMP;
  4692. return -1;
  4693. }
  4694. static int _dns_server_recv(struct dns_server_conn_head *conn, unsigned char *inpacket, int inpacket_len,
  4695. struct sockaddr_storage *local, socklen_t local_len, struct sockaddr_storage *from,
  4696. socklen_t from_len)
  4697. {
  4698. int decode_len = 0;
  4699. int ret = -1;
  4700. unsigned char packet_buff[DNS_PACKSIZE];
  4701. char name[DNS_MAX_CNAME_LEN];
  4702. struct dns_packet *packet = (struct dns_packet *)packet_buff;
  4703. struct dns_request *request = NULL;
  4704. /* decode packet */
  4705. tlog(TLOG_DEBUG, "recv query packet from %s, len = %d, type = %d",
  4706. get_host_by_addr(name, sizeof(name), (struct sockaddr *)from), inpacket_len, conn->type);
  4707. decode_len = dns_decode(packet, DNS_PACKSIZE, inpacket, inpacket_len);
  4708. if (decode_len < 0) {
  4709. tlog(TLOG_DEBUG, "decode failed.\n");
  4710. ret = RECV_ERROR_INVALID_PACKET;
  4711. if (dns_save_fail_packet) {
  4712. dns_packet_save(dns_save_fail_packet_dir, "server", name, inpacket, inpacket_len);
  4713. }
  4714. goto errout;
  4715. }
  4716. tlog(TLOG_DEBUG,
  4717. "request qdcount = %d, ancount = %d, nscount = %d, nrcount = %d, len = %d, id = %d, tc = %d, rd = %d, ra = "
  4718. "%d, rcode = %d\n",
  4719. packet->head.qdcount, packet->head.ancount, packet->head.nscount, packet->head.nrcount, inpacket_len,
  4720. packet->head.id, packet->head.tc, packet->head.rd, packet->head.ra, packet->head.rcode);
  4721. request = _dns_server_new_request();
  4722. if (request == NULL) {
  4723. tlog(TLOG_ERROR, "malloc failed.\n");
  4724. goto errout;
  4725. }
  4726. memcpy(&request->localaddr, local, local_len);
  4727. _dns_server_request_set_client(request, conn);
  4728. _dns_server_request_set_client_addr(request, from, from_len);
  4729. _dns_server_request_set_id(request, packet->head.id);
  4730. if (_dns_server_parser_request(request, packet) != 0) {
  4731. tlog(TLOG_DEBUG, "parser request failed.");
  4732. ret = RECV_ERROR_INVALID_PACKET;
  4733. goto errout;
  4734. }
  4735. tlog(TLOG_DEBUG, "query %s from %s, qtype: %d, id: %d\n", request->domain, name, request->qtype, request->id);
  4736. ret = _dns_server_do_query(request, 1);
  4737. if (ret != 0) {
  4738. tlog(TLOG_DEBUG, "do query %s failed.\n", request->domain);
  4739. goto errout;
  4740. }
  4741. _dns_server_request_release_complete(request, 0);
  4742. return ret;
  4743. errout:
  4744. if (request) {
  4745. _dns_server_forward_request(inpacket, inpacket_len);
  4746. _dns_server_request_release(request);
  4747. }
  4748. return ret;
  4749. }
  4750. static int _dns_server_setup_server_query_options(struct dns_request *request,
  4751. struct dns_server_query_option *server_query_option)
  4752. {
  4753. if (server_query_option == NULL) {
  4754. return 0;
  4755. }
  4756. request->server_flags = server_query_option->server_flags;
  4757. if (server_query_option->dns_group_name) {
  4758. safe_strncpy(request->dns_group_name, server_query_option->dns_group_name, DNS_GROUP_NAME_LEN);
  4759. }
  4760. if (server_query_option->ecs_enable_flag & DNS_QUEY_OPTION_ECS_DNS) {
  4761. request->has_ecs = 1;
  4762. memcpy(&request->ecs, &server_query_option->ecs_dns, sizeof(request->ecs));
  4763. }
  4764. return 0;
  4765. }
  4766. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype,
  4767. struct dns_server_query_option *server_query_option, int prefetch_flag)
  4768. {
  4769. int ret = -1;
  4770. struct dns_request *request = NULL;
  4771. request = _dns_server_new_request();
  4772. if (request == NULL) {
  4773. tlog(TLOG_ERROR, "malloc failed.\n");
  4774. goto errout;
  4775. }
  4776. request->prefetch = 1;
  4777. request->prefetch_flags = prefetch_flag;
  4778. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4779. request->qtype = qtype;
  4780. _dns_server_setup_server_query_options(request, server_query_option);
  4781. ret = _dns_server_do_query(request, 0);
  4782. if (ret != 0) {
  4783. tlog(TLOG_DEBUG, "prefetch do query %s failed.\n", request->domain);
  4784. goto errout;
  4785. }
  4786. _dns_server_request_release(request);
  4787. return ret;
  4788. errout:
  4789. if (request) {
  4790. _dns_server_request_release(request);
  4791. }
  4792. return ret;
  4793. }
  4794. int dns_server_query(const char *domain, int qtype, struct dns_server_query_option *server_query_option,
  4795. dns_result_callback callback, void *user_ptr)
  4796. {
  4797. int ret = -1;
  4798. struct dns_request *request = NULL;
  4799. request = _dns_server_new_request();
  4800. if (request == NULL) {
  4801. tlog(TLOG_ERROR, "malloc failed.\n");
  4802. goto errout;
  4803. }
  4804. safe_strncpy(request->domain, domain, sizeof(request->domain));
  4805. request->qtype = qtype;
  4806. _dns_server_setup_server_query_options(request, server_query_option);
  4807. _dns_server_request_set_callback(request, callback, user_ptr);
  4808. ret = _dns_server_do_query(request, 0);
  4809. if (ret != 0) {
  4810. tlog(TLOG_DEBUG, "do query %s failed.\n", domain);
  4811. goto errout;
  4812. }
  4813. _dns_server_request_release_complete(request, 0);
  4814. return ret;
  4815. errout:
  4816. if (request) {
  4817. _dns_server_request_set_callback(request, NULL, NULL);
  4818. _dns_server_request_release(request);
  4819. }
  4820. return ret;
  4821. }
  4822. static int _dns_server_process_udp_one(struct dns_server_conn_udp *udpconn, struct epoll_event *event,
  4823. unsigned long now)
  4824. {
  4825. int len = 0;
  4826. unsigned char inpacket[DNS_IN_PACKSIZE];
  4827. struct sockaddr_storage from;
  4828. socklen_t from_len = sizeof(from);
  4829. struct sockaddr_storage local;
  4830. socklen_t local_len = sizeof(local);
  4831. struct msghdr msg;
  4832. struct iovec iov;
  4833. char ans_data[4096];
  4834. struct cmsghdr *cmsg = NULL;
  4835. memset(&msg, 0, sizeof(msg));
  4836. iov.iov_base = (char *)inpacket;
  4837. iov.iov_len = sizeof(inpacket);
  4838. msg.msg_name = &from;
  4839. msg.msg_namelen = sizeof(from);
  4840. msg.msg_iov = &iov;
  4841. msg.msg_iovlen = 1;
  4842. msg.msg_control = ans_data;
  4843. msg.msg_controllen = sizeof(ans_data);
  4844. len = recvmsg(udpconn->head.fd, &msg, MSG_DONTWAIT);
  4845. if (len < 0) {
  4846. if (errno == EAGAIN || errno == EWOULDBLOCK) {
  4847. return -2;
  4848. }
  4849. tlog(TLOG_ERROR, "recvfrom failed, %s\n", strerror(errno));
  4850. return -1;
  4851. }
  4852. from_len = msg.msg_namelen;
  4853. for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
  4854. if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO) {
  4855. const struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  4856. unsigned char *addr = (unsigned char *)&pktinfo->ipi_addr.s_addr;
  4857. fill_sockaddr_by_ip(addr, sizeof(in_addr_t), 0, (struct sockaddr *)&local, &local_len);
  4858. } else if (cmsg->cmsg_level == IPPROTO_IPV6 && cmsg->cmsg_type == IPV6_PKTINFO) {
  4859. const struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  4860. unsigned char *addr = (unsigned char *)pktinfo->ipi6_addr.s6_addr;
  4861. fill_sockaddr_by_ip(addr, sizeof(struct in6_addr), 0, (struct sockaddr *)&local, &local_len);
  4862. }
  4863. }
  4864. return _dns_server_recv(&udpconn->head, inpacket, len, &local, local_len, &from, from_len);
  4865. }
  4866. static int _dns_server_process_udp(struct dns_server_conn_udp *udpconn, struct epoll_event *event, unsigned long now)
  4867. {
  4868. int count = 0;
  4869. while (count < 32) {
  4870. int ret = _dns_server_process_udp_one(udpconn, event, now);
  4871. if (ret != 0) {
  4872. if (ret == -2) {
  4873. return 0;
  4874. }
  4875. return ret;
  4876. }
  4877. count++;
  4878. }
  4879. return 0;
  4880. }
  4881. static void _dns_server_client_touch(struct dns_server_conn_head *conn)
  4882. {
  4883. time(&conn->last_request_time);
  4884. }
  4885. static int _dns_server_client_close(struct dns_server_conn_head *conn)
  4886. {
  4887. if (conn->fd > 0) {
  4888. _dns_server_epoll_ctl(conn, EPOLL_CTL_DEL, 0);
  4889. close(conn->fd);
  4890. conn->fd = -1;
  4891. }
  4892. list_del_init(&conn->list);
  4893. _dns_server_conn_release(conn);
  4894. return 0;
  4895. }
  4896. static int _dns_server_tcp_accept(struct dns_server_conn_tcp_server *tcpserver, struct epoll_event *event,
  4897. unsigned long now)
  4898. {
  4899. struct sockaddr_storage addr;
  4900. struct dns_server_conn_tcp_client *tcpclient = NULL;
  4901. socklen_t addr_len = sizeof(addr);
  4902. int fd = -1;
  4903. fd = accept4(tcpserver->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  4904. if (fd < 0) {
  4905. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  4906. return -1;
  4907. }
  4908. tcpclient = malloc(sizeof(*tcpclient));
  4909. if (tcpclient == NULL) {
  4910. tlog(TLOG_ERROR, "malloc for tcpclient failed.");
  4911. goto errout;
  4912. }
  4913. memset(tcpclient, 0, sizeof(*tcpclient));
  4914. tcpclient->head.fd = fd;
  4915. tcpclient->head.type = DNS_CONN_TYPE_TCP_CLIENT;
  4916. tcpclient->head.server_flags = tcpserver->head.server_flags;
  4917. tcpclient->head.dns_group = tcpserver->head.dns_group;
  4918. tcpclient->head.ipset_nftset_rule = tcpserver->head.ipset_nftset_rule;
  4919. atomic_set(&tcpclient->head.refcnt, 0);
  4920. memcpy(&tcpclient->addr, &addr, addr_len);
  4921. tcpclient->addr_len = addr_len;
  4922. tcpclient->localaddr_len = sizeof(struct sockaddr_storage);
  4923. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  4924. tlog(TLOG_ERROR, "epoll ctl failed.");
  4925. return -1;
  4926. }
  4927. if (getsocket_inet(tcpclient->head.fd, (struct sockaddr *)&tcpclient->localaddr, &tcpclient->localaddr_len) != 0) {
  4928. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  4929. goto errout;
  4930. }
  4931. _dns_server_client_touch(&tcpclient->head);
  4932. list_add(&tcpclient->head.list, &server.conn_list);
  4933. _dns_server_conn_get(&tcpclient->head);
  4934. return 0;
  4935. errout:
  4936. if (fd > 0) {
  4937. close(fd);
  4938. }
  4939. if (tcpclient) {
  4940. free(tcpclient);
  4941. }
  4942. return -1;
  4943. }
  4944. static ssize_t _ssl_read(struct dns_server_conn_tls_client *conn, void *buff, int num)
  4945. {
  4946. ssize_t ret = 0;
  4947. if (conn == NULL || buff == NULL) {
  4948. return SSL_ERROR_SYSCALL;
  4949. }
  4950. pthread_mutex_lock(&conn->ssl_lock);
  4951. ret = SSL_read(conn->ssl, buff, num);
  4952. pthread_mutex_unlock(&conn->ssl_lock);
  4953. return ret;
  4954. }
  4955. static ssize_t _ssl_write(struct dns_server_conn_tls_client *conn, const void *buff, int num)
  4956. {
  4957. ssize_t ret = 0;
  4958. if (conn == NULL || buff == NULL || conn->ssl == NULL) {
  4959. return SSL_ERROR_SYSCALL;
  4960. }
  4961. pthread_mutex_lock(&conn->ssl_lock);
  4962. ret = SSL_write(conn->ssl, buff, num);
  4963. pthread_mutex_unlock(&conn->ssl_lock);
  4964. return ret;
  4965. }
  4966. static int _ssl_get_error(struct dns_server_conn_tls_client *conn, int ret)
  4967. {
  4968. int err = 0;
  4969. if (conn == NULL || conn->ssl == NULL) {
  4970. return SSL_ERROR_SYSCALL;
  4971. }
  4972. pthread_mutex_lock(&conn->ssl_lock);
  4973. err = SSL_get_error(conn->ssl, ret);
  4974. pthread_mutex_unlock(&conn->ssl_lock);
  4975. return err;
  4976. }
  4977. static int _ssl_do_accept(struct dns_server_conn_tls_client *conn)
  4978. {
  4979. int err = 0;
  4980. if (conn == NULL || conn->ssl == NULL) {
  4981. return SSL_ERROR_SYSCALL;
  4982. }
  4983. pthread_mutex_lock(&conn->ssl_lock);
  4984. err = SSL_accept(conn->ssl);
  4985. pthread_mutex_unlock(&conn->ssl_lock);
  4986. return err;
  4987. }
  4988. static int _dns_server_socket_ssl_send(struct dns_server_conn_tls_client *tls_client, const void *buf, int num)
  4989. {
  4990. int ret = 0;
  4991. int ssl_ret = 0;
  4992. unsigned long ssl_err = 0;
  4993. if (tls_client->ssl == NULL) {
  4994. errno = EINVAL;
  4995. return -1;
  4996. }
  4997. if (num < 0) {
  4998. errno = EINVAL;
  4999. return -1;
  5000. }
  5001. ret = _ssl_write(tls_client, buf, num);
  5002. if (ret > 0) {
  5003. return ret;
  5004. }
  5005. ssl_ret = _ssl_get_error(tls_client, ret);
  5006. switch (ssl_ret) {
  5007. case SSL_ERROR_NONE:
  5008. return 0;
  5009. break;
  5010. case SSL_ERROR_ZERO_RETURN:
  5011. case SSL_ERROR_WANT_READ:
  5012. errno = EAGAIN;
  5013. ret = -1;
  5014. break;
  5015. case SSL_ERROR_WANT_WRITE:
  5016. errno = EAGAIN;
  5017. ret = -1;
  5018. break;
  5019. case SSL_ERROR_SSL:
  5020. ssl_err = ERR_get_error();
  5021. int ssl_reason = ERR_GET_REASON(ssl_err);
  5022. if (ssl_reason == SSL_R_UNINITIALIZED || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN ||
  5023. ssl_reason == SSL_R_BAD_LENGTH || ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT ||
  5024. ssl_reason == SSL_R_BAD_WRITE_RETRY) {
  5025. errno = EAGAIN;
  5026. return -1;
  5027. }
  5028. tlog(TLOG_ERROR, "SSL write fail error no: %s(%d)\n", ERR_reason_error_string(ssl_err), ssl_reason);
  5029. errno = EFAULT;
  5030. ret = -1;
  5031. break;
  5032. case SSL_ERROR_SYSCALL:
  5033. tlog(TLOG_DEBUG, "SSL syscall failed, %s", strerror(errno));
  5034. return ret;
  5035. default:
  5036. errno = EFAULT;
  5037. ret = -1;
  5038. break;
  5039. }
  5040. return ret;
  5041. }
  5042. static int _dns_server_socket_ssl_recv(struct dns_server_conn_tls_client *tls_client, void *buf, int num)
  5043. {
  5044. ssize_t ret = 0;
  5045. int ssl_ret = 0;
  5046. unsigned long ssl_err = 0;
  5047. if (tls_client->ssl == NULL) {
  5048. errno = EFAULT;
  5049. return -1;
  5050. }
  5051. ret = _ssl_read(tls_client, buf, num);
  5052. if (ret >= 0) {
  5053. return ret;
  5054. }
  5055. ssl_ret = _ssl_get_error(tls_client, ret);
  5056. switch (ssl_ret) {
  5057. case SSL_ERROR_NONE:
  5058. case SSL_ERROR_ZERO_RETURN:
  5059. return 0;
  5060. break;
  5061. case SSL_ERROR_WANT_READ:
  5062. errno = EAGAIN;
  5063. ret = -1;
  5064. break;
  5065. case SSL_ERROR_WANT_WRITE:
  5066. errno = EAGAIN;
  5067. ret = -1;
  5068. break;
  5069. case SSL_ERROR_SSL:
  5070. ssl_err = ERR_get_error();
  5071. int ssl_reason = ERR_GET_REASON(ssl_err);
  5072. if (ssl_reason == SSL_R_UNINITIALIZED) {
  5073. errno = EAGAIN;
  5074. return -1;
  5075. }
  5076. if (ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN) {
  5077. return 0;
  5078. }
  5079. tlog(TLOG_INFO, "SSL read fail error no: %s(%lx), len: %d\n", ERR_reason_error_string(ssl_err), ssl_err, num);
  5080. errno = EFAULT;
  5081. ret = -1;
  5082. break;
  5083. case SSL_ERROR_SYSCALL:
  5084. if (errno == 0) {
  5085. return 0;
  5086. }
  5087. if (errno != ECONNRESET) {
  5088. tlog(TLOG_INFO, "SSL syscall failed, %s ", strerror(errno));
  5089. }
  5090. ret = -1;
  5091. return ret;
  5092. default:
  5093. errno = EFAULT;
  5094. ret = -1;
  5095. break;
  5096. }
  5097. return ret;
  5098. }
  5099. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  5100. {
  5101. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  5102. return send(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  5103. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  5104. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  5105. int ret = _dns_server_socket_ssl_send((struct dns_server_conn_tls_client *)tcp_client, data, data_len);
  5106. return ret;
  5107. } else {
  5108. return -1;
  5109. }
  5110. }
  5111. static int _dns_server_tcp_socket_recv(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  5112. {
  5113. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  5114. return recv(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  5115. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  5116. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  5117. return _dns_server_socket_ssl_recv((struct dns_server_conn_tls_client *)tcp_client, data, data_len);
  5118. } else {
  5119. return -1;
  5120. }
  5121. }
  5122. static int _dns_server_tcp_recv(struct dns_server_conn_tcp_client *tcpclient)
  5123. {
  5124. ssize_t len = 0;
  5125. /* Receive data */
  5126. while (tcpclient->recvbuff.size < (int)sizeof(tcpclient->recvbuff.buf)) {
  5127. if (tcpclient->recvbuff.size == (int)sizeof(tcpclient->recvbuff.buf)) {
  5128. return 0;
  5129. }
  5130. len = _dns_server_tcp_socket_recv(tcpclient, tcpclient->recvbuff.buf + tcpclient->recvbuff.size,
  5131. sizeof(tcpclient->recvbuff.buf) - tcpclient->recvbuff.size);
  5132. if (len < 0) {
  5133. if (errno == EAGAIN) {
  5134. return RECV_ERROR_AGAIN;
  5135. }
  5136. if (errno == ECONNRESET) {
  5137. return RECV_ERROR_CLOSE;
  5138. }
  5139. tlog(TLOG_ERROR, "recv failed, %s\n", strerror(errno));
  5140. return RECV_ERROR_FAIL;
  5141. } else if (len == 0) {
  5142. return RECV_ERROR_CLOSE;
  5143. }
  5144. tcpclient->recvbuff.size += len;
  5145. }
  5146. return 0;
  5147. }
  5148. static int _dns_server_tcp_process_one_request(struct dns_server_conn_tcp_client *tcpclient)
  5149. {
  5150. unsigned short request_len = 0;
  5151. int total_len = tcpclient->recvbuff.size;
  5152. int proceed_len = 0;
  5153. unsigned char *request_data = NULL;
  5154. int ret = 0;
  5155. /* Handling multiple requests */
  5156. for (;;) {
  5157. if ((total_len - proceed_len) <= (int)sizeof(unsigned short)) {
  5158. ret = RECV_ERROR_AGAIN;
  5159. break;
  5160. }
  5161. /* Get record length */
  5162. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len);
  5163. request_len = ntohs(*((unsigned short *)(request_data)));
  5164. if (request_len >= sizeof(tcpclient->recvbuff.buf)) {
  5165. tlog(TLOG_DEBUG, "request length is invalid.");
  5166. return RECV_ERROR_FAIL;
  5167. }
  5168. if (request_len > (total_len - proceed_len - sizeof(unsigned short))) {
  5169. ret = RECV_ERROR_AGAIN;
  5170. break;
  5171. }
  5172. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len + sizeof(unsigned short));
  5173. /* process one record */
  5174. ret = _dns_server_recv(&tcpclient->head, request_data, request_len, &tcpclient->localaddr,
  5175. tcpclient->localaddr_len, &tcpclient->addr, tcpclient->addr_len);
  5176. if (ret != 0) {
  5177. return ret;
  5178. }
  5179. proceed_len += sizeof(unsigned short) + request_len;
  5180. }
  5181. if (total_len > proceed_len && proceed_len > 0) {
  5182. memmove(tcpclient->recvbuff.buf, tcpclient->recvbuff.buf + proceed_len, total_len - proceed_len);
  5183. }
  5184. tcpclient->recvbuff.size -= proceed_len;
  5185. return ret;
  5186. }
  5187. static int _dns_server_tcp_process_requests(struct dns_server_conn_tcp_client *tcpclient)
  5188. {
  5189. int recv_ret = 0;
  5190. int request_ret = 0;
  5191. int is_eof = 0;
  5192. for (;;) {
  5193. recv_ret = _dns_server_tcp_recv(tcpclient);
  5194. if (recv_ret < 0) {
  5195. if (recv_ret == RECV_ERROR_CLOSE) {
  5196. return RECV_ERROR_CLOSE;
  5197. }
  5198. if (tcpclient->recvbuff.size > 0) {
  5199. is_eof = RECV_ERROR_AGAIN;
  5200. } else {
  5201. return RECV_ERROR_FAIL;
  5202. }
  5203. }
  5204. request_ret = _dns_server_tcp_process_one_request(tcpclient);
  5205. if (request_ret < 0) {
  5206. /* failed */
  5207. tlog(TLOG_DEBUG, "process one request failed.");
  5208. return RECV_ERROR_FAIL;
  5209. }
  5210. if (request_ret == RECV_ERROR_AGAIN && is_eof == RECV_ERROR_AGAIN) {
  5211. /* failed or remote shutdown */
  5212. return RECV_ERROR_FAIL;
  5213. }
  5214. if (recv_ret == RECV_ERROR_AGAIN && request_ret == RECV_ERROR_AGAIN) {
  5215. /* process complete */
  5216. return 0;
  5217. }
  5218. }
  5219. return 0;
  5220. }
  5221. static int _dns_server_tcp_send(struct dns_server_conn_tcp_client *tcpclient)
  5222. {
  5223. int len = 0;
  5224. while (tcpclient->sndbuff.size > 0) {
  5225. len = _dns_server_tcp_socket_send(tcpclient, tcpclient->sndbuff.buf, tcpclient->sndbuff.size);
  5226. if (len < 0) {
  5227. if (errno == EAGAIN) {
  5228. return RECV_ERROR_AGAIN;
  5229. }
  5230. return RECV_ERROR_FAIL;
  5231. } else if (len == 0) {
  5232. break;
  5233. }
  5234. tcpclient->sndbuff.size -= len;
  5235. }
  5236. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN) != 0) {
  5237. tlog(TLOG_ERROR, "epoll ctl failed.");
  5238. return -1;
  5239. }
  5240. return 0;
  5241. }
  5242. static int _dns_server_process_tcp(struct dns_server_conn_tcp_client *dnsserver, struct epoll_event *event,
  5243. unsigned long now)
  5244. {
  5245. int ret = 0;
  5246. if (event->events & EPOLLIN) {
  5247. ret = _dns_server_tcp_process_requests(dnsserver);
  5248. if (ret != 0) {
  5249. _dns_server_client_close(&dnsserver->head);
  5250. if (ret == RECV_ERROR_CLOSE) {
  5251. return 0;
  5252. }
  5253. tlog(TLOG_DEBUG, "process tcp request failed.");
  5254. return RECV_ERROR_FAIL;
  5255. }
  5256. }
  5257. if (event->events & EPOLLOUT) {
  5258. if (_dns_server_tcp_send(dnsserver) != 0) {
  5259. _dns_server_client_close(&dnsserver->head);
  5260. tlog(TLOG_DEBUG, "send tcp failed.");
  5261. return RECV_ERROR_FAIL;
  5262. }
  5263. }
  5264. return 0;
  5265. }
  5266. static int _dns_server_tls_accept(struct dns_server_conn_tls_server *tls_server, struct epoll_event *event,
  5267. unsigned long now)
  5268. {
  5269. struct sockaddr_storage addr;
  5270. struct dns_server_conn_tls_client *tls_client = NULL;
  5271. socklen_t addr_len = sizeof(addr);
  5272. int fd = -1;
  5273. SSL *ssl = NULL;
  5274. fd = accept4(tls_server->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  5275. if (fd < 0) {
  5276. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  5277. return -1;
  5278. }
  5279. tls_client = malloc(sizeof(*tls_client));
  5280. if (tls_client == NULL) {
  5281. tlog(TLOG_ERROR, "malloc for tls_client failed.");
  5282. goto errout;
  5283. }
  5284. memset(tls_client, 0, sizeof(*tls_client));
  5285. tls_client->head.fd = fd;
  5286. tls_client->head.type = DNS_CONN_TYPE_TLS_CLIENT;
  5287. tls_client->head.server_flags = tls_server->head.server_flags;
  5288. tls_client->head.dns_group = tls_server->head.dns_group;
  5289. tls_client->head.ipset_nftset_rule = tls_server->head.ipset_nftset_rule;
  5290. atomic_set(&tls_client->head.refcnt, 0);
  5291. memcpy(&tls_client->addr, &addr, addr_len);
  5292. tls_client->addr_len = addr_len;
  5293. tls_client->localaddr_len = sizeof(struct sockaddr_storage);
  5294. if (_dns_server_epoll_ctl(&tls_client->head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  5295. tlog(TLOG_ERROR, "epoll ctl failed.");
  5296. return -1;
  5297. }
  5298. if (getsocket_inet(tls_client->head.fd, (struct sockaddr *)&tls_client->localaddr, &tls_client->localaddr_len) !=
  5299. 0) {
  5300. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  5301. goto errout;
  5302. }
  5303. ssl = SSL_new(tls_server->ssl_ctx);
  5304. if (ssl == NULL) {
  5305. tlog(TLOG_ERROR, "SSL_new failed.");
  5306. goto errout;
  5307. }
  5308. if (SSL_set_fd(ssl, fd) != 1) {
  5309. tlog(TLOG_ERROR, "SSL_set_fd failed.");
  5310. goto errout;
  5311. }
  5312. tls_client->ssl = ssl;
  5313. tls_client->status = DNS_SERVER_CLIENT_STATUS_CONNECTING;
  5314. pthread_mutex_init(&tls_client->ssl_lock, NULL);
  5315. _dns_server_client_touch(&tls_client->head);
  5316. list_add(&tls_client->head.list, &server.conn_list);
  5317. _dns_server_conn_get(&tls_client->head);
  5318. return 0;
  5319. errout:
  5320. if (fd > 0) {
  5321. close(fd);
  5322. }
  5323. if (ssl) {
  5324. SSL_free(ssl);
  5325. }
  5326. if (tls_client) {
  5327. free(tls_client);
  5328. }
  5329. return -1;
  5330. }
  5331. static int _dns_server_process_tls(struct dns_server_conn_tls_client *tls_client, struct epoll_event *event,
  5332. unsigned long now)
  5333. {
  5334. int ret = 0;
  5335. int ssl_ret = 0;
  5336. struct epoll_event fd_event;
  5337. if (tls_client->status == DNS_SERVER_CLIENT_STATUS_CONNECTING) {
  5338. /* do SSL hand shake */
  5339. ret = _ssl_do_accept(tls_client);
  5340. if (ret <= 0) {
  5341. memset(&fd_event, 0, sizeof(fd_event));
  5342. ssl_ret = _ssl_get_error(tls_client, ret);
  5343. if (ssl_ret == SSL_ERROR_WANT_READ) {
  5344. fd_event.events = EPOLLIN;
  5345. } else if (ssl_ret == SSL_ERROR_WANT_WRITE) {
  5346. fd_event.events = EPOLLOUT | EPOLLIN;
  5347. } else if (ssl_ret == SSL_ERROR_SYSCALL) {
  5348. goto errout;
  5349. } else {
  5350. unsigned long ssl_err = ERR_get_error();
  5351. int ssl_reason = ERR_GET_REASON(ssl_err);
  5352. char name[DNS_MAX_CNAME_LEN];
  5353. tlog(TLOG_DEBUG, "Handshake with %s failed, error no: %s(%d, %d, %d)\n",
  5354. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tls_client->addr),
  5355. ERR_reason_error_string(ssl_err), ret, ssl_ret, ssl_reason);
  5356. ret = 0;
  5357. goto errout;
  5358. }
  5359. fd_event.data.ptr = tls_client;
  5360. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->head.fd, &fd_event) != 0) {
  5361. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  5362. goto errout;
  5363. }
  5364. return 0;
  5365. }
  5366. tls_client->status = DNS_SERVER_CLIENT_STATUS_CONNECTED;
  5367. memset(&fd_event, 0, sizeof(fd_event));
  5368. fd_event.events = EPOLLIN | EPOLLOUT;
  5369. fd_event.data.ptr = tls_client;
  5370. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->head.fd, &fd_event) != 0) {
  5371. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  5372. goto errout;
  5373. }
  5374. }
  5375. return _dns_server_process_tcp((struct dns_server_conn_tcp_client *)tls_client, event, now);
  5376. errout:
  5377. _dns_server_client_close(&tls_client->head);
  5378. return ret;
  5379. }
  5380. static int _dns_server_process(struct dns_server_conn_head *conn, struct epoll_event *event, unsigned long now)
  5381. {
  5382. int ret = 0;
  5383. _dns_server_client_touch(conn);
  5384. _dns_server_conn_get(conn);
  5385. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  5386. struct dns_server_conn_udp *udpconn = (struct dns_server_conn_udp *)conn;
  5387. ret = _dns_server_process_udp(udpconn, event, now);
  5388. } else if (conn->type == DNS_CONN_TYPE_TCP_SERVER) {
  5389. struct dns_server_conn_tcp_server *tcpserver = (struct dns_server_conn_tcp_server *)conn;
  5390. ret = _dns_server_tcp_accept(tcpserver, event, now);
  5391. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  5392. struct dns_server_conn_tcp_client *tcpclient = (struct dns_server_conn_tcp_client *)conn;
  5393. ret = _dns_server_process_tcp(tcpclient, event, now);
  5394. if (ret != 0) {
  5395. char name[DNS_MAX_CNAME_LEN];
  5396. tlog(TLOG_DEBUG, "process TCP packet from %s failed.",
  5397. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tcpclient->addr));
  5398. }
  5399. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER) {
  5400. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  5401. ret = _dns_server_tls_accept(tls_server, event, now);
  5402. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT) {
  5403. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  5404. ret = _dns_server_process_tls(tls_client, event, now);
  5405. if (ret != 0) {
  5406. char name[DNS_MAX_CNAME_LEN];
  5407. tlog(TLOG_DEBUG, "process TLS packet from %s failed.",
  5408. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tls_client->addr));
  5409. }
  5410. } else {
  5411. tlog(TLOG_ERROR, "unsupported dns server type %d", conn->type);
  5412. _dns_server_client_close(conn);
  5413. ret = -1;
  5414. }
  5415. _dns_server_conn_release(conn);
  5416. if (ret == RECV_ERROR_INVALID_PACKET) {
  5417. ret = 0;
  5418. }
  5419. return ret;
  5420. }
  5421. static int _dns_server_second_ping_check(struct dns_request *request)
  5422. {
  5423. struct dns_ip_address *addr_map = NULL;
  5424. unsigned long bucket = 0;
  5425. char ip[DNS_MAX_CNAME_LEN] = {0};
  5426. int ret = -1;
  5427. if (request->has_ping_result) {
  5428. return ret;
  5429. }
  5430. /* start tcping */
  5431. pthread_mutex_lock(&request->ip_map_lock);
  5432. hash_for_each(request->ip_map, bucket, addr_map, node)
  5433. {
  5434. switch (addr_map->addr_type) {
  5435. case DNS_T_A: {
  5436. _dns_server_request_get(request);
  5437. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2],
  5438. addr_map->ip_addr[3]);
  5439. ret = _dns_server_check_speed(request, ip);
  5440. if (ret != 0) {
  5441. _dns_server_request_release(request);
  5442. }
  5443. } break;
  5444. case DNS_T_AAAA: {
  5445. _dns_server_request_get(request);
  5446. snprintf(ip, sizeof(ip), "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]",
  5447. addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3],
  5448. addr_map->ip_addr[4], addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7],
  5449. addr_map->ip_addr[8], addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11],
  5450. addr_map->ip_addr[12], addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  5451. ret = _dns_server_check_speed(request, ip);
  5452. if (ret != 0) {
  5453. _dns_server_request_release(request);
  5454. }
  5455. } break;
  5456. default:
  5457. break;
  5458. }
  5459. }
  5460. pthread_mutex_unlock(&request->ip_map_lock);
  5461. return ret;
  5462. }
  5463. static int _dns_server_prefetch_domain(struct dns_cache *dns_cache)
  5464. {
  5465. /* If there are still hits, continue pre-fetching */
  5466. struct dns_server_query_option server_query_option;
  5467. int hitnum = dns_cache_hitnum_dec_get(dns_cache);
  5468. if (hitnum <= 0) {
  5469. return -1;
  5470. }
  5471. /* start prefetch domain */
  5472. tlog(TLOG_DEBUG, "prefetch by cache %s, qtype %d, ttl %d, hitnum %d", dns_cache->info.domain, dns_cache->info.qtype,
  5473. dns_cache->info.ttl, hitnum);
  5474. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  5475. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  5476. server_query_option.ecs_enable_flag = 0;
  5477. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, &server_query_option,
  5478. PREFETCH_FLAGS_NO_DUALSTACK) != 0) {
  5479. tlog(TLOG_ERROR, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  5480. return -1;
  5481. }
  5482. return 0;
  5483. }
  5484. static int _dns_server_prefetch_expired_domain(struct dns_cache *dns_cache)
  5485. {
  5486. time_t ttl = _dns_server_expired_cache_ttl(dns_cache);
  5487. if (ttl <= 1) {
  5488. return -1;
  5489. }
  5490. /* start prefetch domain */
  5491. tlog(TLOG_DEBUG, "expired domain, prefetch by cache %s, qtype %d, ttl %llu", dns_cache->info.domain,
  5492. dns_cache->info.qtype, (unsigned long long)ttl);
  5493. struct dns_server_query_option server_query_option;
  5494. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  5495. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  5496. server_query_option.ecs_enable_flag = 0;
  5497. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, &server_query_option,
  5498. PREFETCH_FLAGS_EXPIRED) != 0) {
  5499. tlog(TLOG_DEBUG, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  5500. return -1;
  5501. }
  5502. return 0;
  5503. }
  5504. static int _dns_server_cache_expired(struct dns_cache *dns_cache)
  5505. {
  5506. if (dns_cache->info.rcode != DNS_RC_NOERROR) {
  5507. return -1;
  5508. }
  5509. if (dns_conf_prefetch == 1 && _dns_cache_is_specify_packet(dns_cache->info.qtype) != 0) {
  5510. if (dns_conf_serve_expired == 1) {
  5511. return _dns_server_prefetch_expired_domain(dns_cache);
  5512. } else {
  5513. return _dns_server_prefetch_domain(dns_cache);
  5514. }
  5515. }
  5516. return -1;
  5517. }
  5518. static void _dns_server_tcp_idle_check(void)
  5519. {
  5520. struct dns_server_conn_head *conn = NULL;
  5521. struct dns_server_conn_head *tmp = NULL;
  5522. time_t now = 0;
  5523. if (dns_conf_tcp_idle_time <= 0) {
  5524. return;
  5525. }
  5526. time(&now);
  5527. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5528. {
  5529. if (conn->type != DNS_CONN_TYPE_TCP_CLIENT && conn->type != DNS_CONN_TYPE_TLS_CLIENT) {
  5530. continue;
  5531. }
  5532. if (conn->last_request_time > now - dns_conf_tcp_idle_time) {
  5533. continue;
  5534. }
  5535. _dns_server_client_close(conn);
  5536. }
  5537. }
  5538. #ifdef TEST
  5539. static void _dns_server_check_need_exit(void)
  5540. {
  5541. static int parent_pid = 0;
  5542. if (parent_pid == 0) {
  5543. parent_pid = getppid();
  5544. }
  5545. if (parent_pid != getppid()) {
  5546. tlog(TLOG_WARN, "parent process exit, exit too.");
  5547. dns_server_stop();
  5548. }
  5549. }
  5550. #else
  5551. #define _dns_server_check_need_exit()
  5552. #endif
  5553. static void _dns_server_save_cache_to_file(void)
  5554. {
  5555. time_t now;
  5556. int check_time = dns_conf_cache_checkpoint_time;
  5557. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0 || dns_conf_cache_checkpoint_time <= 0) {
  5558. return;
  5559. }
  5560. time(&now);
  5561. if (server.cache_save_pid > 0) {
  5562. int ret = waitpid(server.cache_save_pid, NULL, WNOHANG);
  5563. if (ret == server.cache_save_pid) {
  5564. server.cache_save_pid = 0;
  5565. } else if (ret < 0) {
  5566. tlog(TLOG_ERROR, "waitpid failed, errno %d, error info '%s'", errno, strerror(errno));
  5567. server.cache_save_pid = 0;
  5568. } else {
  5569. if (now - 30 > server.cache_save_time) {
  5570. kill(server.cache_save_pid, SIGKILL);
  5571. }
  5572. return;
  5573. }
  5574. }
  5575. if (check_time < 120) {
  5576. check_time = 120;
  5577. }
  5578. if (now - check_time < server.cache_save_time) {
  5579. return;
  5580. }
  5581. /* server is busy, skip*/
  5582. pthread_mutex_lock(&server.request_list_lock);
  5583. if (list_empty(&server.request_list) != 0) {
  5584. pthread_mutex_unlock(&server.request_list_lock);
  5585. return;
  5586. }
  5587. pthread_mutex_unlock(&server.request_list_lock);
  5588. server.cache_save_time = now;
  5589. int pid = fork();
  5590. if (pid == 0) {
  5591. /* child process */
  5592. for (int i = 3; i < 1024; i++) {
  5593. close(i);
  5594. }
  5595. tlog_setlevel(TLOG_OFF);
  5596. _dns_server_cache_save(1);
  5597. _exit(0);
  5598. } else if (pid < 0) {
  5599. tlog(TLOG_DEBUG, "fork failed, errno %d, error info '%s'", errno, strerror(errno));
  5600. return;
  5601. }
  5602. server.cache_save_pid = pid;
  5603. }
  5604. static void _dns_server_period_run_second(void)
  5605. {
  5606. static unsigned int sec = 0;
  5607. sec++;
  5608. _dns_server_tcp_idle_check();
  5609. _dns_server_check_need_exit();
  5610. if (sec % IPV6_READY_CHECK_TIME == 0 && is_ipv6_ready == 0) {
  5611. dns_server_check_ipv6_ready();
  5612. }
  5613. if (sec % 60 == 0) {
  5614. if (dns_server_check_update_hosts() == 0) {
  5615. tlog(TLOG_INFO, "Update host file data");
  5616. }
  5617. }
  5618. _dns_server_save_cache_to_file();
  5619. }
  5620. static void _dns_server_period_run(unsigned int msec)
  5621. {
  5622. struct dns_request *request = NULL;
  5623. struct dns_request *tmp = NULL;
  5624. LIST_HEAD(check_list);
  5625. if ((msec % 10) == 0) {
  5626. _dns_server_period_run_second();
  5627. }
  5628. unsigned long now = get_tick_count();
  5629. pthread_mutex_lock(&server.request_list_lock);
  5630. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  5631. {
  5632. /* Need to use tcping detection speed */
  5633. int check_order = request->check_order + 1;
  5634. if (atomic_read(&request->ip_map_num) == 0 || request->has_soa) {
  5635. continue;
  5636. }
  5637. if (request->send_tick < now - (check_order * DNS_PING_CHECK_INTERVAL) && request->has_ping_result == 0) {
  5638. _dns_server_request_get(request);
  5639. list_add_tail(&request->check_list, &check_list);
  5640. request->check_order++;
  5641. }
  5642. }
  5643. pthread_mutex_unlock(&server.request_list_lock);
  5644. list_for_each_entry_safe(request, tmp, &check_list, check_list)
  5645. {
  5646. _dns_server_second_ping_check(request);
  5647. list_del_init(&request->check_list);
  5648. _dns_server_request_release(request);
  5649. }
  5650. }
  5651. static void _dns_server_close_socket(void)
  5652. {
  5653. struct dns_server_conn_head *conn = NULL;
  5654. struct dns_server_conn_head *tmp = NULL;
  5655. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5656. {
  5657. _dns_server_client_close(conn);
  5658. }
  5659. }
  5660. static void _dns_server_close_socket_server(void)
  5661. {
  5662. struct dns_server_conn_head *conn = NULL;
  5663. struct dns_server_conn_head *tmp = NULL;
  5664. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  5665. {
  5666. switch (conn->type) {
  5667. case DNS_CONN_TYPE_HTTPS_SERVER:
  5668. case DNS_CONN_TYPE_TLS_SERVER: {
  5669. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  5670. if (tls_server->ssl_ctx) {
  5671. SSL_CTX_free(tls_server->ssl_ctx);
  5672. tls_server->ssl_ctx = NULL;
  5673. }
  5674. _dns_server_client_close(conn);
  5675. break;
  5676. }
  5677. case DNS_CONN_TYPE_UDP_SERVER:
  5678. case DNS_CONN_TYPE_TCP_SERVER:
  5679. _dns_server_client_close(conn);
  5680. break;
  5681. default:
  5682. break;
  5683. }
  5684. }
  5685. }
  5686. int dns_server_run(void)
  5687. {
  5688. struct epoll_event events[DNS_MAX_EVENTS + 1];
  5689. int num = 0;
  5690. int i = 0;
  5691. unsigned long now = {0};
  5692. unsigned long last = {0};
  5693. unsigned int msec = 0;
  5694. int sleep = 100;
  5695. int sleep_time = 0;
  5696. unsigned long expect_time = 0;
  5697. sleep_time = sleep;
  5698. now = get_tick_count() - sleep;
  5699. last = now;
  5700. expect_time = now + sleep;
  5701. while (atomic_read(&server.run)) {
  5702. now = get_tick_count();
  5703. if (sleep_time > 0) {
  5704. sleep_time -= now - last;
  5705. if (sleep_time <= 0) {
  5706. sleep_time = 0;
  5707. }
  5708. int cnt = sleep_time / sleep;
  5709. msec -= cnt;
  5710. expect_time -= cnt * sleep;
  5711. sleep_time -= cnt * sleep;
  5712. }
  5713. if (now >= expect_time) {
  5714. msec++;
  5715. if (last != now) {
  5716. _dns_server_period_run(msec);
  5717. }
  5718. sleep_time = sleep - (now - expect_time);
  5719. if (sleep_time < 0) {
  5720. sleep_time = 0;
  5721. expect_time = now;
  5722. }
  5723. /* When server is idle, the sleep time is 1000ms, to reduce CPU usage */
  5724. pthread_mutex_lock(&server.request_list_lock);
  5725. if (list_empty(&server.request_list)) {
  5726. int cnt = 10 - (msec % 10) - 1;
  5727. sleep_time += sleep * cnt;
  5728. msec += cnt;
  5729. /* sleep to next second */
  5730. expect_time += sleep * cnt;
  5731. }
  5732. pthread_mutex_unlock(&server.request_list_lock);
  5733. expect_time += sleep;
  5734. }
  5735. last = now;
  5736. num = epoll_wait(server.epoll_fd, events, DNS_MAX_EVENTS, sleep_time);
  5737. if (num < 0) {
  5738. usleep(100000);
  5739. continue;
  5740. }
  5741. if (num == 0) {
  5742. continue;
  5743. }
  5744. for (i = 0; i < num; i++) {
  5745. struct epoll_event *event = &events[i];
  5746. /* read event */
  5747. if (event->data.fd == server.event_fd) {
  5748. uint64_t value;
  5749. int unused __attribute__((unused));
  5750. unused = read(server.event_fd, &value, sizeof(uint64_t));
  5751. continue;
  5752. }
  5753. struct dns_server_conn_head *conn_head = event->data.ptr;
  5754. if (conn_head == NULL) {
  5755. tlog(TLOG_ERROR, "invalid fd\n");
  5756. continue;
  5757. }
  5758. if (_dns_server_process(conn_head, event, now) != 0) {
  5759. tlog(TLOG_DEBUG, "dns server process failed.");
  5760. }
  5761. }
  5762. }
  5763. _dns_server_close_socket_server();
  5764. close(server.epoll_fd);
  5765. server.epoll_fd = -1;
  5766. return 0;
  5767. }
  5768. static struct addrinfo *_dns_server_getaddr(const char *host, const char *port, int type, int protocol)
  5769. {
  5770. struct addrinfo hints;
  5771. struct addrinfo *result = NULL;
  5772. memset(&hints, 0, sizeof(hints));
  5773. hints.ai_family = AF_UNSPEC;
  5774. hints.ai_socktype = type;
  5775. hints.ai_protocol = protocol;
  5776. hints.ai_flags = AI_PASSIVE;
  5777. if (getaddrinfo(host, port, &hints, &result) != 0) {
  5778. tlog(TLOG_ERROR, "get addr info failed. %s\n", strerror(errno));
  5779. goto errout;
  5780. }
  5781. return result;
  5782. errout:
  5783. if (result) {
  5784. freeaddrinfo(result);
  5785. }
  5786. return NULL;
  5787. }
  5788. int dns_server_start(void)
  5789. {
  5790. struct dns_server_conn_head *conn = NULL;
  5791. list_for_each_entry(conn, &server.conn_list, list)
  5792. {
  5793. if (conn->fd <= 0) {
  5794. continue;
  5795. }
  5796. if (_dns_server_epoll_ctl(conn, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  5797. tlog(TLOG_ERROR, "epoll ctl failed.");
  5798. return -1;
  5799. }
  5800. }
  5801. return 0;
  5802. }
  5803. static int _dns_create_socket(const char *host_ip, int type)
  5804. {
  5805. int fd = -1;
  5806. struct addrinfo *gai = NULL;
  5807. char port_str[16];
  5808. char ip[MAX_IP_LEN];
  5809. char host_ip_device[MAX_IP_LEN * 2];
  5810. int port = 0;
  5811. char *host = NULL;
  5812. int optval = 1;
  5813. int yes = 1;
  5814. const int priority = SOCKET_PRIORITY;
  5815. const int ip_tos = SOCKET_IP_TOS;
  5816. const char *ifname = NULL;
  5817. safe_strncpy(host_ip_device, host_ip, sizeof(host_ip_device));
  5818. ifname = strstr(host_ip_device, "@");
  5819. if (ifname) {
  5820. *(char *)ifname = '\0';
  5821. ifname++;
  5822. }
  5823. if (parse_ip(host_ip_device, ip, &port) == 0) {
  5824. host = ip;
  5825. }
  5826. if (port <= 0) {
  5827. port = DEFAULT_DNS_PORT;
  5828. }
  5829. snprintf(port_str, sizeof(port_str), "%d", port);
  5830. gai = _dns_server_getaddr(host, port_str, type, 0);
  5831. if (gai == NULL) {
  5832. tlog(TLOG_ERROR, "get address failed.\n");
  5833. goto errout;
  5834. }
  5835. fd = socket(gai->ai_family, gai->ai_socktype, gai->ai_protocol);
  5836. if (fd < 0) {
  5837. tlog(TLOG_ERROR, "create socket failed, family = %d, type = %d, proto = %d, %s\n", gai->ai_family,
  5838. gai->ai_socktype, gai->ai_protocol, strerror(errno));
  5839. goto errout;
  5840. }
  5841. if (type == SOCK_STREAM) {
  5842. if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)) != 0) {
  5843. tlog(TLOG_ERROR, "set socket opt failed.");
  5844. goto errout;
  5845. }
  5846. setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &yes, sizeof(yes));
  5847. } else {
  5848. setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &optval, sizeof(optval));
  5849. setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, &optval, sizeof(optval));
  5850. }
  5851. setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &priority, sizeof(priority));
  5852. setsockopt(fd, IPPROTO_IP, IP_TOS, &ip_tos, sizeof(ip_tos));
  5853. if (ifname != NULL) {
  5854. struct ifreq ifr;
  5855. memset(&ifr, 0, sizeof(struct ifreq));
  5856. safe_strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
  5857. ioctl(fd, SIOCGIFINDEX, &ifr);
  5858. if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, (void *)&ifr, sizeof(struct ifreq)) < 0) {
  5859. tlog(TLOG_ERROR, "bind socket to device %s failed, %s\n", ifr.ifr_name, strerror(errno));
  5860. goto errout;
  5861. }
  5862. }
  5863. if (bind(fd, gai->ai_addr, gai->ai_addrlen) != 0) {
  5864. tlog(TLOG_ERROR, "bind service %s failed, %s\n", host_ip, strerror(errno));
  5865. goto errout;
  5866. }
  5867. if (type == SOCK_STREAM) {
  5868. if (listen(fd, 16) != 0) {
  5869. tlog(TLOG_ERROR, "listen failed.\n");
  5870. goto errout;
  5871. }
  5872. }
  5873. fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC);
  5874. freeaddrinfo(gai);
  5875. return fd;
  5876. errout:
  5877. if (fd > 0) {
  5878. close(fd);
  5879. }
  5880. if (gai) {
  5881. freeaddrinfo(gai);
  5882. }
  5883. return -1;
  5884. }
  5885. static int _dns_server_set_flags(struct dns_server_conn_head *head, struct dns_bind_ip *bind_ip)
  5886. {
  5887. time(&head->last_request_time);
  5888. head->server_flags = bind_ip->flags;
  5889. head->dns_group = bind_ip->group;
  5890. head->ipset_nftset_rule = &bind_ip->nftset_ipset_rule;
  5891. atomic_set(&head->refcnt, 0);
  5892. list_add(&head->list, &server.conn_list);
  5893. return 0;
  5894. }
  5895. static int _dns_server_socket_udp(struct dns_bind_ip *bind_ip)
  5896. {
  5897. const char *host_ip = NULL;
  5898. struct dns_server_conn_udp *conn = NULL;
  5899. int fd = -1;
  5900. host_ip = bind_ip->ip;
  5901. conn = malloc(sizeof(struct dns_server_conn_udp));
  5902. if (conn == NULL) {
  5903. goto errout;
  5904. }
  5905. INIT_LIST_HEAD(&conn->head.list);
  5906. fd = _dns_create_socket(host_ip, SOCK_DGRAM);
  5907. if (fd <= 0) {
  5908. goto errout;
  5909. }
  5910. conn->head.type = DNS_CONN_TYPE_UDP_SERVER;
  5911. conn->head.fd = fd;
  5912. _dns_server_set_flags(&conn->head, bind_ip);
  5913. _dns_server_conn_get(&conn->head);
  5914. return 0;
  5915. errout:
  5916. if (conn) {
  5917. free(conn);
  5918. conn = NULL;
  5919. }
  5920. if (fd > 0) {
  5921. close(fd);
  5922. }
  5923. return -1;
  5924. }
  5925. static int _dns_server_socket_tcp(struct dns_bind_ip *bind_ip)
  5926. {
  5927. const char *host_ip = NULL;
  5928. struct dns_server_conn_tcp_server *conn = NULL;
  5929. int fd = -1;
  5930. const int on = 1;
  5931. host_ip = bind_ip->ip;
  5932. conn = malloc(sizeof(struct dns_server_conn_tcp_server));
  5933. if (conn == NULL) {
  5934. goto errout;
  5935. }
  5936. INIT_LIST_HEAD(&conn->head.list);
  5937. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  5938. if (fd <= 0) {
  5939. goto errout;
  5940. }
  5941. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  5942. conn->head.type = DNS_CONN_TYPE_TCP_SERVER;
  5943. conn->head.fd = fd;
  5944. _dns_server_set_flags(&conn->head, bind_ip);
  5945. _dns_server_conn_get(&conn->head);
  5946. return 0;
  5947. errout:
  5948. if (conn) {
  5949. free(conn);
  5950. conn = NULL;
  5951. }
  5952. if (fd > 0) {
  5953. close(fd);
  5954. }
  5955. return -1;
  5956. }
  5957. static int _dns_server_socket_tls_ssl_pass_callback(char *buf, int size, int rwflag, void *userdata)
  5958. {
  5959. struct dns_bind_ip *bind_ip = userdata;
  5960. if (bind_ip->ssl_cert_key_pass == NULL || bind_ip->ssl_cert_key_pass[0] == '\0') {
  5961. return 0;
  5962. }
  5963. safe_strncpy(buf, bind_ip->ssl_cert_key_pass, size);
  5964. return strlen(buf);
  5965. }
  5966. static int _dns_server_socket_tls(struct dns_bind_ip *bind_ip, DNS_CONN_TYPE conn_type)
  5967. {
  5968. const char *host_ip = NULL;
  5969. const char *ssl_cert_file = NULL;
  5970. const char *ssl_cert_key_file = NULL;
  5971. struct dns_server_conn_tls_server *conn = NULL;
  5972. int fd = -1;
  5973. const SSL_METHOD *method = NULL;
  5974. SSL_CTX *ssl_ctx = NULL;
  5975. const int on = 1;
  5976. host_ip = bind_ip->ip;
  5977. ssl_cert_file = bind_ip->ssl_cert_file;
  5978. ssl_cert_key_file = bind_ip->ssl_cert_key_file;
  5979. if (ssl_cert_file == NULL || ssl_cert_key_file == NULL) {
  5980. tlog(TLOG_WARN, "no cert or cert key file");
  5981. goto errout;
  5982. }
  5983. if (ssl_cert_file[0] == '\0' || ssl_cert_key_file[0] == '\0') {
  5984. tlog(TLOG_WARN, "no cert or cert key file");
  5985. goto errout;
  5986. }
  5987. conn = malloc(sizeof(struct dns_server_conn_tls_server));
  5988. if (conn == NULL) {
  5989. goto errout;
  5990. }
  5991. INIT_LIST_HEAD(&conn->head.list);
  5992. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  5993. if (fd <= 0) {
  5994. goto errout;
  5995. }
  5996. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  5997. #if (OPENSSL_VERSION_NUMBER >= 0x10100000L)
  5998. method = TLS_server_method();
  5999. if (method == NULL) {
  6000. goto errout;
  6001. }
  6002. #else
  6003. method = SSLv23_server_method();
  6004. #endif
  6005. ssl_ctx = SSL_CTX_new(method);
  6006. if (ssl_ctx == NULL) {
  6007. goto errout;
  6008. }
  6009. SSL_CTX_set_session_cache_mode(ssl_ctx,
  6010. SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_NO_INTERNAL | SSL_SESS_CACHE_NO_AUTO_CLEAR);
  6011. SSL_CTX_set_default_passwd_cb(ssl_ctx, _dns_server_socket_tls_ssl_pass_callback);
  6012. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, bind_ip);
  6013. /* Set the key and cert */
  6014. if (ssl_cert_file[0] != '\0' && SSL_CTX_use_certificate_chain_file(ssl_ctx, ssl_cert_file) <= 0) {
  6015. tlog(TLOG_ERROR, "load cert %s failed, %s", ssl_cert_file, ERR_error_string(ERR_get_error(), NULL));
  6016. goto errout;
  6017. }
  6018. if (ssl_cert_key_file[0] != '\0' &&
  6019. SSL_CTX_use_PrivateKey_file(ssl_ctx, ssl_cert_key_file, SSL_FILETYPE_PEM) <= 0) {
  6020. tlog(TLOG_ERROR, "load cert key %s failed, %s", ssl_cert_key_file, ERR_error_string(ERR_get_error(), NULL));
  6021. goto errout;
  6022. }
  6023. conn->head.type = conn_type;
  6024. conn->head.fd = fd;
  6025. conn->ssl_ctx = ssl_ctx;
  6026. _dns_server_set_flags(&conn->head, bind_ip);
  6027. _dns_server_conn_get(&conn->head);
  6028. return 0;
  6029. errout:
  6030. if (ssl_ctx) {
  6031. SSL_CTX_free(ssl_ctx);
  6032. ssl_ctx = NULL;
  6033. }
  6034. if (conn) {
  6035. free(conn);
  6036. conn = NULL;
  6037. }
  6038. if (fd > 0) {
  6039. close(fd);
  6040. }
  6041. return -1;
  6042. }
  6043. static int _dns_server_socket(void)
  6044. {
  6045. int i = 0;
  6046. for (i = 0; i < dns_conf_bind_ip_num; i++) {
  6047. struct dns_bind_ip *bind_ip = &dns_conf_bind_ip[i];
  6048. switch (bind_ip->type) {
  6049. case DNS_BIND_TYPE_UDP:
  6050. if (_dns_server_socket_udp(bind_ip) != 0) {
  6051. goto errout;
  6052. }
  6053. break;
  6054. case DNS_BIND_TYPE_TCP:
  6055. if (_dns_server_socket_tcp(bind_ip) != 0) {
  6056. goto errout;
  6057. }
  6058. break;
  6059. case DNS_BIND_TYPE_HTTPS:
  6060. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_HTTPS_SERVER) != 0) {
  6061. goto errout;
  6062. }
  6063. break;
  6064. case DNS_BIND_TYPE_TLS:
  6065. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_TLS_SERVER) != 0) {
  6066. goto errout;
  6067. }
  6068. break;
  6069. default:
  6070. break;
  6071. }
  6072. }
  6073. return 0;
  6074. errout:
  6075. return -1;
  6076. }
  6077. static int _dns_server_audit_init(void)
  6078. {
  6079. char *audit_file = SMARTDNS_AUDIT_FILE;
  6080. if (dns_conf_audit_enable == 0) {
  6081. return 0;
  6082. }
  6083. if (dns_conf_audit_file[0] != 0) {
  6084. audit_file = dns_conf_audit_file;
  6085. }
  6086. dns_audit = tlog_open(audit_file, dns_conf_audit_size, dns_conf_audit_num, 0, 0);
  6087. if (dns_audit == NULL) {
  6088. return -1;
  6089. }
  6090. if (dns_conf_audit_file_mode > 0) {
  6091. tlog_set_permission(dns_audit, dns_conf_audit_file_mode, dns_conf_audit_file_mode);
  6092. }
  6093. if (dns_conf_audit_console != 0) {
  6094. tlog_logscreen(dns_audit, 1);
  6095. }
  6096. return 0;
  6097. }
  6098. static int _dns_server_cache_init(void)
  6099. {
  6100. if (dns_cache_init(dns_conf_cachesize, _dns_server_cache_expired) != 0) {
  6101. tlog(TLOG_ERROR, "init cache failed.");
  6102. return -1;
  6103. }
  6104. const char *dns_cache_file = dns_conf_get_cache_dir();
  6105. if (dns_conf_cache_persist == 2) {
  6106. uint64_t freespace = get_free_space(dns_cache_file);
  6107. if (freespace >= CACHE_AUTO_ENABLE_SIZE) {
  6108. tlog(TLOG_INFO, "auto enable cache persist.");
  6109. dns_conf_cache_persist = 1;
  6110. }
  6111. }
  6112. if (dns_conf_cachesize <= 0 || dns_conf_cache_persist == 0) {
  6113. return 0;
  6114. }
  6115. if (dns_cache_load(dns_cache_file) != 0) {
  6116. tlog(TLOG_WARN, "Load cache failed.");
  6117. return 0;
  6118. }
  6119. return 0;
  6120. }
  6121. static int _dns_server_cache_save(int check_lock)
  6122. {
  6123. const char *dns_cache_file = dns_conf_get_cache_dir();
  6124. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0) {
  6125. if (access(dns_cache_file, F_OK) == 0) {
  6126. unlink(dns_cache_file);
  6127. }
  6128. return 0;
  6129. }
  6130. if (dns_cache_save(dns_cache_file, check_lock) != 0) {
  6131. tlog(TLOG_WARN, "save cache failed.");
  6132. return -1;
  6133. }
  6134. return 0;
  6135. }
  6136. static int _dns_server_init_wakeup_event(void)
  6137. {
  6138. int fdevent = -1;
  6139. fdevent = eventfd(0, EFD_CLOEXEC | EFD_NONBLOCK);
  6140. if (fdevent < 0) {
  6141. tlog(TLOG_ERROR, "create eventfd failed, %s\n", strerror(errno));
  6142. goto errout;
  6143. }
  6144. struct epoll_event event;
  6145. memset(&event, 0, sizeof(event));
  6146. event.events = EPOLLIN | EPOLLERR;
  6147. event.data.fd = fdevent;
  6148. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_ADD, fdevent, &event) != 0) {
  6149. tlog(TLOG_ERROR, "set eventfd failed, %s\n", strerror(errno));
  6150. goto errout;
  6151. }
  6152. server.event_fd = fdevent;
  6153. return 0;
  6154. errout:
  6155. return -1;
  6156. }
  6157. int dns_server_init(void)
  6158. {
  6159. pthread_attr_t attr;
  6160. int epollfd = -1;
  6161. int ret = -1;
  6162. _dns_server_check_need_exit();
  6163. if (server.epoll_fd > 0) {
  6164. return -1;
  6165. }
  6166. if (_dns_server_cache_init() != 0) {
  6167. tlog(TLOG_ERROR, "init dns cache filed.");
  6168. goto errout;
  6169. }
  6170. if (_dns_server_audit_init() != 0) {
  6171. tlog(TLOG_ERROR, "init audit failed.");
  6172. goto errout;
  6173. }
  6174. memset(&server, 0, sizeof(server));
  6175. pthread_attr_init(&attr);
  6176. INIT_LIST_HEAD(&server.conn_list);
  6177. time(&server.cache_save_time);
  6178. epollfd = epoll_create1(EPOLL_CLOEXEC);
  6179. if (epollfd < 0) {
  6180. tlog(TLOG_ERROR, "create epoll failed, %s\n", strerror(errno));
  6181. goto errout;
  6182. }
  6183. ret = _dns_server_socket();
  6184. if (ret != 0) {
  6185. tlog(TLOG_ERROR, "create server socket failed.\n");
  6186. goto errout;
  6187. }
  6188. pthread_mutex_init(&server.request_list_lock, NULL);
  6189. INIT_LIST_HEAD(&server.request_list);
  6190. server.epoll_fd = epollfd;
  6191. atomic_set(&server.run, 1);
  6192. if (dns_server_start() != 0) {
  6193. tlog(TLOG_ERROR, "start service failed.\n");
  6194. goto errout;
  6195. }
  6196. dns_server_check_ipv6_ready();
  6197. tlog(TLOG_INFO, "%s",
  6198. (is_ipv6_ready) ? "IPV6 is ready, enable IPV6 features" : "IPV6 is not ready, disable IPV6 features");
  6199. if (_dns_server_init_wakeup_event() != 0) {
  6200. tlog(TLOG_ERROR, "init wakeup event failed.");
  6201. goto errout;
  6202. }
  6203. return 0;
  6204. errout:
  6205. atomic_set(&server.run, 0);
  6206. if (epollfd) {
  6207. close(epollfd);
  6208. }
  6209. _dns_server_close_socket();
  6210. pthread_mutex_destroy(&server.request_list_lock);
  6211. dns_cache_destroy();
  6212. return -1;
  6213. }
  6214. void dns_server_stop(void)
  6215. {
  6216. atomic_set(&server.run, 0);
  6217. _dns_server_wakeup_thread();
  6218. }
  6219. void dns_server_exit(void)
  6220. {
  6221. if (server.event_fd > 0) {
  6222. close(server.event_fd);
  6223. server.event_fd = -1;
  6224. }
  6225. if (server.cache_save_pid > 0) {
  6226. kill(server.cache_save_pid, SIGKILL);
  6227. server.cache_save_pid = 0;
  6228. }
  6229. _dns_server_close_socket();
  6230. _dns_server_cache_save(0);
  6231. _dns_server_request_remove_all();
  6232. pthread_mutex_destroy(&server.request_list_lock);
  6233. dns_cache_destroy();
  6234. }