dns_server.c 245 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361
  1. /*************************************************************************
  2. *
  3. * Copyright (C) 2018-2024 Ruilin Peng (Nick) <[email protected]>.
  4. *
  5. * smartdns is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * smartdns is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #ifndef _GNU_SOURCE
  19. #define _GNU_SOURCE
  20. #endif
  21. #include "dns_server.h"
  22. #include "atomic.h"
  23. #include "dns.h"
  24. #include "dns_cache.h"
  25. #include "dns_client.h"
  26. #include "dns_conf.h"
  27. #include "dns_plugin.h"
  28. #include "fast_ping.h"
  29. #include "hashtable.h"
  30. #include "http_parse.h"
  31. #include "list.h"
  32. #include "nftset.h"
  33. #include "tlog.h"
  34. #include "util.h"
  35. #include <arpa/inet.h>
  36. #include <errno.h>
  37. #include <fcntl.h>
  38. #include <ifaddrs.h>
  39. #include <linux/netlink.h>
  40. #include <linux/rtnetlink.h>
  41. #include <math.h>
  42. #include <net/if.h>
  43. #include <netinet/ip.h>
  44. #include <netinet/tcp.h>
  45. #include <openssl/err.h>
  46. #include <openssl/evp.h>
  47. #include <openssl/pem.h>
  48. #include <openssl/rsa.h>
  49. #include <openssl/ssl.h>
  50. #include <openssl/x509.h>
  51. #include <pthread.h>
  52. #include <signal.h>
  53. #include <stdio.h>
  54. #include <stdlib.h>
  55. #include <string.h>
  56. #include <sys/epoll.h>
  57. #include <sys/eventfd.h>
  58. #include <sys/ioctl.h>
  59. #include <sys/socket.h>
  60. #include <sys/types.h>
  61. #include <sys/wait.h>
  62. #include <syslog.h>
  63. #define DNS_MAX_EVENTS 256
  64. #define IPV6_READY_CHECK_TIME 180
  65. #define DNS_SERVER_TMOUT_TTL (5 * 60)
  66. #define DNS_SERVER_FAIL_TTL (60)
  67. #define DNS_SERVER_SOA_TTL (30)
  68. #define DNS_SERVER_ADDR_TTL (60)
  69. #define DNS_CONN_BUFF_SIZE 4096
  70. #define DNS_REQUEST_MAX_TIMEOUT 950
  71. #define DNS_PING_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT)
  72. #define DNS_PING_CHECK_INTERVAL (250)
  73. #define DNS_PING_SECOND_TIMEOUT (DNS_REQUEST_MAX_TIMEOUT - DNS_PING_CHECK_INTERVAL)
  74. #define SOCKET_IP_TOS (IPTOS_LOWDELAY | IPTOS_RELIABILITY)
  75. #define SOCKET_PRIORITY (6)
  76. #define CACHE_AUTO_ENABLE_SIZE (1024 * 1024 * 128)
  77. #define EXPIRED_DOMAIN_PREFETCH_TIME (3600 * 8)
  78. #define DNS_MAX_DOMAIN_REFETCH_NUM 64
  79. #define DNS_SERVER_NEIGHBOR_CACHE_MAX_NUM 8192
  80. #define DNS_SERVER_NEIGHBOR_CACHE_TIMEOUT (3600 * 1)
  81. #define DNS_SERVER_NEIGHBOR_CACHE_NOMAC_TIMEOUT 60
  82. #define PREFETCH_FLAGS_NO_DUALSTACK (1 << 0)
  83. #define PREFETCH_FLAGS_EXPIRED (1 << 1)
  84. #define PREFETCH_FLAGS_NOPREFETCH (1 << 2)
  85. #define RECV_ERROR_AGAIN 1
  86. #define RECV_ERROR_OK 0
  87. #define RECV_ERROR_FAIL (-1)
  88. #define RECV_ERROR_CLOSE (-2)
  89. #define RECV_ERROR_INVALID_PACKET (-3)
  90. typedef enum {
  91. DNS_CONN_TYPE_UDP_SERVER = 0,
  92. DNS_CONN_TYPE_TCP_SERVER,
  93. DNS_CONN_TYPE_TCP_CLIENT,
  94. DNS_CONN_TYPE_TLS_SERVER,
  95. DNS_CONN_TYPE_TLS_CLIENT,
  96. DNS_CONN_TYPE_HTTPS_SERVER,
  97. DNS_CONN_TYPE_HTTPS_CLIENT,
  98. } DNS_CONN_TYPE;
  99. typedef enum DNS_CHILD_POST_RESULT {
  100. DNS_CHILD_POST_SUCCESS = 0,
  101. DNS_CHILD_POST_FAIL,
  102. DNS_CHILD_POST_SKIP,
  103. DNS_CHILD_POST_NO_RESPONSE,
  104. } DNS_CHILD_POST_RESULT;
  105. struct rule_walk_args {
  106. void *args;
  107. int rule_index;
  108. unsigned char *key[DOMAIN_RULE_MAX];
  109. uint32_t key_len[DOMAIN_RULE_MAX];
  110. };
  111. struct neighbor_enum_args {
  112. uint8_t *netaddr;
  113. int netaddr_len;
  114. struct client_roue_group_mac *group_mac;
  115. };
  116. struct neighbor_cache_item {
  117. struct hlist_node node;
  118. struct list_head list;
  119. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  120. int ip_addr_len;
  121. unsigned char mac[6];
  122. int has_mac;
  123. time_t last_update_time;
  124. };
  125. struct neighbor_cache {
  126. DECLARE_HASHTABLE(cache, 6);
  127. atomic_t cache_num;
  128. struct list_head list;
  129. pthread_mutex_t lock;
  130. };
  131. struct local_addr_cache_item {
  132. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  133. int ip_addr_len;
  134. int mask_len;
  135. };
  136. struct local_addr_cache {
  137. radix_tree_t *addr;
  138. int fd_netlink;
  139. };
  140. struct dns_conn_buf {
  141. char buf[DNS_CONN_BUFF_SIZE];
  142. int buffsize;
  143. int size;
  144. };
  145. struct dns_server_conn_head {
  146. DNS_CONN_TYPE type;
  147. int fd;
  148. struct list_head list;
  149. time_t last_request_time;
  150. atomic_t refcnt;
  151. const char *dns_group;
  152. uint32_t server_flags;
  153. struct nftset_ipset_rules *ipset_nftset_rule;
  154. };
  155. struct dns_server_post_context {
  156. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  157. unsigned char *inpacket;
  158. int inpacket_maxlen;
  159. int inpacket_len;
  160. unsigned char packet_buff[DNS_PACKSIZE];
  161. unsigned int packet_maxlen;
  162. struct dns_request *request;
  163. struct dns_packet *packet;
  164. int ip_num;
  165. const unsigned char *ip_addr[MAX_IP_NUM];
  166. dns_type_t qtype;
  167. int do_cache;
  168. int do_reply;
  169. int do_ipset;
  170. int do_log_result;
  171. int reply_ttl;
  172. int cache_ttl;
  173. int no_check_add_ip;
  174. int do_audit;
  175. int do_force_soa;
  176. int skip_notify_count;
  177. int select_all_best_ip;
  178. int no_release_parent;
  179. };
  180. typedef enum dns_server_client_status {
  181. DNS_SERVER_CLIENT_STATUS_INIT = 0,
  182. DNS_SERVER_CLIENT_STATUS_CONNECTING,
  183. DNS_SERVER_CLIENT_STATUS_CONNECTIONLESS,
  184. DNS_SERVER_CLIENT_STATUS_CONNECTED,
  185. DNS_SERVER_CLIENT_STATUS_DISCONNECTED,
  186. } dns_server_client_status;
  187. struct dns_server_conn_udp {
  188. struct dns_server_conn_head head;
  189. socklen_t addr_len;
  190. struct sockaddr_storage addr;
  191. };
  192. struct dns_server_conn_tcp_server {
  193. struct dns_server_conn_head head;
  194. };
  195. struct dns_server_conn_tls_server {
  196. struct dns_server_conn_head head;
  197. SSL_CTX *ssl_ctx;
  198. };
  199. struct dns_server_conn_tcp_client {
  200. struct dns_server_conn_head head;
  201. struct dns_conn_buf recvbuff;
  202. struct dns_conn_buf sndbuff;
  203. socklen_t addr_len;
  204. struct sockaddr_storage addr;
  205. socklen_t localaddr_len;
  206. struct sockaddr_storage localaddr;
  207. int conn_idle_timeout;
  208. dns_server_client_status status;
  209. };
  210. struct dns_server_conn_tls_client {
  211. struct dns_server_conn_tcp_client tcp;
  212. SSL *ssl;
  213. int ssl_want_write;
  214. pthread_mutex_t ssl_lock;
  215. };
  216. /* ip address lists of domain */
  217. struct dns_ip_address {
  218. struct hlist_node node;
  219. int hitnum;
  220. unsigned long recv_tick;
  221. int ping_time;
  222. dns_type_t addr_type;
  223. char cname[DNS_MAX_CNAME_LEN];
  224. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  225. };
  226. struct dns_request_pending_list {
  227. pthread_mutex_t request_list_lock;
  228. unsigned short qtype;
  229. char domain[DNS_MAX_CNAME_LEN];
  230. uint32_t server_flags;
  231. char dns_group_name[DNS_GROUP_NAME_LEN];
  232. struct list_head request_list;
  233. struct hlist_node node;
  234. };
  235. struct dns_request_domain_rule {
  236. struct dns_rule *rules[DOMAIN_RULE_MAX];
  237. int is_sub_rule[DOMAIN_RULE_MAX];
  238. };
  239. typedef DNS_CHILD_POST_RESULT (*child_request_callback)(struct dns_request *request, struct dns_request *child_request,
  240. int is_first_resp);
  241. struct dns_request_https {
  242. char domain[DNS_MAX_CNAME_LEN];
  243. char target[DNS_MAX_CNAME_LEN];
  244. int ttl;
  245. int priority;
  246. char alpn[DNS_MAX_ALPN_LEN];
  247. int alpn_len;
  248. int port;
  249. char ech[DNS_MAX_ECH_LEN];
  250. int ech_len;
  251. };
  252. struct dns_request {
  253. atomic_t refcnt;
  254. struct dns_server_conn_head *conn;
  255. struct dns_conf_group *conf;
  256. uint32_t server_flags;
  257. char dns_group_name[DNS_GROUP_NAME_LEN];
  258. /* dns request list */
  259. struct list_head list;
  260. struct list_head pending_list;
  261. /* dns request timeout check list */
  262. struct list_head check_list;
  263. /* dns query */
  264. char domain[DNS_MAX_CNAME_LEN];
  265. dns_type_t qtype;
  266. int qclass;
  267. unsigned long send_tick;
  268. unsigned short id;
  269. unsigned short rcode;
  270. unsigned short ss_family;
  271. char remote_server_fail;
  272. char skip_qtype_soa;
  273. union {
  274. struct sockaddr_in in;
  275. struct sockaddr_in6 in6;
  276. struct sockaddr addr;
  277. };
  278. socklen_t addr_len;
  279. struct sockaddr_storage localaddr;
  280. int has_ecs;
  281. struct dns_opt_ecs ecs;
  282. int edns0_do;
  283. struct dns_request_https *https_svcb;
  284. dns_result_callback result_callback;
  285. void *user_ptr;
  286. int has_ping_result;
  287. int has_ping_tcp;
  288. int has_ptr;
  289. char ptr_hostname[DNS_MAX_CNAME_LEN];
  290. int has_cname;
  291. char cname[DNS_MAX_CNAME_LEN];
  292. int ttl_cname;
  293. int has_ip;
  294. int ping_time;
  295. int ip_ttl;
  296. unsigned char ip_addr[DNS_RR_AAAA_LEN];
  297. int ip_addr_type;
  298. struct dns_soa soa;
  299. int has_soa;
  300. int force_soa;
  301. int is_mdns_lookup;
  302. struct dns_srv_records *srv_records;
  303. atomic_t notified;
  304. atomic_t do_callback;
  305. atomic_t adblock;
  306. atomic_t soa_num;
  307. /* send original raw packet to server/client like proxy */
  308. int passthrough;
  309. int request_wait;
  310. int prefetch;
  311. int prefetch_flags;
  312. int dualstack_selection;
  313. int dualstack_selection_force_soa;
  314. int dualstack_selection_query;
  315. int dualstack_selection_ping_time;
  316. int dualstack_selection_has_ip;
  317. struct dns_request *dualstack_request;
  318. int no_serve_expired;
  319. pthread_mutex_t ip_map_lock;
  320. struct dns_request *child_request;
  321. struct dns_request *parent_request;
  322. child_request_callback child_callback;
  323. atomic_t ip_map_num;
  324. DECLARE_HASHTABLE(ip_map, 4);
  325. struct dns_request_domain_rule domain_rule;
  326. int skip_domain_rule;
  327. const struct dns_domain_check_orders *check_order_list;
  328. int check_order;
  329. enum response_mode_type response_mode;
  330. struct dns_request_pending_list *request_pending_list;
  331. int no_select_possible_ip;
  332. int no_cache_cname;
  333. int no_cache;
  334. int no_ipalias;
  335. int has_cname_loop;
  336. void *private_data;
  337. };
  338. /* dns server data */
  339. struct dns_server {
  340. atomic_t run;
  341. int epoll_fd;
  342. int event_fd;
  343. struct list_head conn_list;
  344. pid_t cache_save_pid;
  345. time_t cache_save_time;
  346. /* dns request list */
  347. pthread_mutex_t request_list_lock;
  348. struct list_head request_list;
  349. atomic_t request_num;
  350. DECLARE_HASHTABLE(request_pending, 4);
  351. pthread_mutex_t request_pending_lock;
  352. struct neighbor_cache neighbor_cache;
  353. struct local_addr_cache local_addr_cache;
  354. };
  355. static int is_server_init;
  356. static struct dns_server server;
  357. static tlog_log *dns_audit;
  358. static int is_ipv6_ready;
  359. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype,
  360. struct dns_server_query_option *server_query_option, int prefetch_flags);
  361. static int _dns_server_get_answer(struct dns_server_post_context *context);
  362. static void _dns_server_request_get(struct dns_request *request);
  363. static void _dns_server_request_release(struct dns_request *request);
  364. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete);
  365. static int _dns_server_request_complete(struct dns_request *request);
  366. static int _dns_server_reply_passthrough(struct dns_server_post_context *context);
  367. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event);
  368. static int _dns_request_post(struct dns_server_post_context *context);
  369. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context);
  370. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule);
  371. static int _dns_server_get_local_ttl(struct dns_request *request);
  372. static const char *_dns_server_get_request_server_groupname(struct dns_request *request);
  373. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len);
  374. static int _dns_server_update_request_connection_timeout(struct dns_server_conn_head *conn, int timeout);
  375. static int _dns_server_cache_save(int check_lock);
  376. int dns_is_ipv6_ready(void)
  377. {
  378. return is_ipv6_ready;
  379. }
  380. static void _dns_server_wakeup_thread(void)
  381. {
  382. uint64_t u = 1;
  383. int unused __attribute__((unused));
  384. unused = write(server.event_fd, &u, sizeof(u));
  385. }
  386. static int _dns_server_forward_request(unsigned char *inpacket, int inpacket_len)
  387. {
  388. return -1;
  389. }
  390. static int _dns_server_has_bind_flag(struct dns_request *request, uint32_t flag)
  391. {
  392. if (request->server_flags & flag) {
  393. return 0;
  394. }
  395. return -1;
  396. }
  397. static void *_dns_server_get_bind_ipset_nftset_rule(struct dns_request *request, enum domain_rule type)
  398. {
  399. if (request->conn == NULL) {
  400. return NULL;
  401. }
  402. if (request->conn->ipset_nftset_rule == NULL) {
  403. return NULL;
  404. }
  405. switch (type) {
  406. case DOMAIN_RULE_IPSET:
  407. return request->conn->ipset_nftset_rule->ipset;
  408. case DOMAIN_RULE_IPSET_IPV4:
  409. return request->conn->ipset_nftset_rule->ipset_ip;
  410. case DOMAIN_RULE_IPSET_IPV6:
  411. return request->conn->ipset_nftset_rule->ipset_ip6;
  412. case DOMAIN_RULE_NFTSET_IP:
  413. return request->conn->ipset_nftset_rule->nftset_ip;
  414. case DOMAIN_RULE_NFTSET_IP6:
  415. return request->conn->ipset_nftset_rule->nftset_ip6;
  416. default:
  417. break;
  418. }
  419. return NULL;
  420. }
  421. static int _dns_server_get_conf_ttl(struct dns_request *request, int ttl)
  422. {
  423. int rr_ttl = request->conf->dns_rr_ttl;
  424. int rr_ttl_min = request->conf->dns_rr_ttl_min;
  425. int rr_ttl_max = request->conf->dns_rr_ttl_max;
  426. if (request->is_mdns_lookup) {
  427. rr_ttl_min = DNS_SERVER_ADDR_TTL;
  428. }
  429. struct dns_ttl_rule *ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  430. if (ttl_rule != NULL) {
  431. if (ttl_rule->ttl > 0) {
  432. rr_ttl = ttl_rule->ttl;
  433. }
  434. /* make domain rule ttl high priority */
  435. if (ttl_rule->ttl_min > 0) {
  436. rr_ttl_min = ttl_rule->ttl_min;
  437. if (request->conf->dns_rr_ttl_max <= rr_ttl_min && request->conf->dns_rr_ttl_max > 0) {
  438. rr_ttl_max = rr_ttl_min;
  439. }
  440. }
  441. if (ttl_rule->ttl_max > 0) {
  442. rr_ttl_max = ttl_rule->ttl_max;
  443. if (request->conf->dns_rr_ttl_min >= rr_ttl_max && request->conf->dns_rr_ttl_min > 0 &&
  444. ttl_rule->ttl_min <= 0) {
  445. rr_ttl_min = rr_ttl_max;
  446. }
  447. }
  448. }
  449. if (rr_ttl > 0) {
  450. return rr_ttl;
  451. }
  452. /* make rr_ttl_min first priority */
  453. if (rr_ttl_max < rr_ttl_min && rr_ttl_max > 0) {
  454. rr_ttl_max = rr_ttl_min;
  455. }
  456. if (rr_ttl_max > 0 && ttl >= rr_ttl_max) {
  457. ttl = rr_ttl_max;
  458. } else if (rr_ttl_min > 0 && ttl <= rr_ttl_min) {
  459. ttl = rr_ttl_min;
  460. }
  461. return ttl;
  462. }
  463. static int _dns_server_get_reply_ttl(struct dns_request *request, int ttl)
  464. {
  465. int reply_ttl = ttl;
  466. if ((request->passthrough == 0 || request->passthrough == 2) && dns_conf_cachesize > 0 &&
  467. request->check_order_list->orders[0].type != DOMAIN_CHECK_NONE) {
  468. reply_ttl = request->conf->dns_serve_expired_reply_ttl;
  469. if (reply_ttl < 2) {
  470. reply_ttl = 2;
  471. }
  472. }
  473. int rr_ttl = _dns_server_get_conf_ttl(request, ttl);
  474. if (reply_ttl > rr_ttl) {
  475. reply_ttl = rr_ttl;
  476. }
  477. return reply_ttl;
  478. }
  479. static int _dns_server_epoll_ctl(struct dns_server_conn_head *head, int op, uint32_t events)
  480. {
  481. struct epoll_event event;
  482. memset(&event, 0, sizeof(event));
  483. event.events = events;
  484. event.data.ptr = head;
  485. if (epoll_ctl(server.epoll_fd, op, head->fd, &event) != 0) {
  486. return -1;
  487. }
  488. return 0;
  489. }
  490. static void *_dns_server_get_dns_rule_ext(struct dns_request_domain_rule *domain_rule, enum domain_rule rule)
  491. {
  492. if (rule >= DOMAIN_RULE_MAX || domain_rule == NULL) {
  493. return NULL;
  494. }
  495. return domain_rule->rules[rule];
  496. }
  497. static int _dns_server_is_dns_rule_extract_match_ext(struct dns_request_domain_rule *domain_rule, enum domain_rule rule)
  498. {
  499. if (rule >= DOMAIN_RULE_MAX || domain_rule == NULL) {
  500. return 0;
  501. }
  502. return domain_rule->is_sub_rule[rule] == 0;
  503. }
  504. static void *_dns_server_get_dns_rule(struct dns_request *request, enum domain_rule rule)
  505. {
  506. if (request == NULL) {
  507. return NULL;
  508. }
  509. return _dns_server_get_dns_rule_ext(&request->domain_rule, rule);
  510. }
  511. static int _dns_server_is_dns_rule_extract_match(struct dns_request *request, enum domain_rule rule)
  512. {
  513. if (request == NULL) {
  514. return 0;
  515. }
  516. return _dns_server_is_dns_rule_extract_match_ext(&request->domain_rule, rule);
  517. }
  518. static int _dns_server_is_dns64_request(struct dns_request *request)
  519. {
  520. if (request->qtype != DNS_T_AAAA) {
  521. return 0;
  522. }
  523. if (request->dualstack_selection_query == 1) {
  524. return 0;
  525. }
  526. if (dns_conf_dns_dns64.prefix_len <= 0) {
  527. return 0;
  528. }
  529. return 1;
  530. }
  531. static void _dns_server_set_dualstack_selection(struct dns_request *request)
  532. {
  533. struct dns_rule_flags *rule_flag = NULL;
  534. if (request->dualstack_selection_query || is_ipv6_ready == 0) {
  535. request->dualstack_selection = 0;
  536. return;
  537. }
  538. if ((request->prefetch_flags & PREFETCH_FLAGS_NO_DUALSTACK) != 0 ||
  539. (request->prefetch_flags & PREFETCH_FLAGS_EXPIRED) != 0) {
  540. request->dualstack_selection = 0;
  541. return;
  542. }
  543. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  544. if (rule_flag) {
  545. if (rule_flag->flags & DOMAIN_FLAG_DUALSTACK_SELECT) {
  546. request->dualstack_selection = 1;
  547. return;
  548. }
  549. if (rule_flag->is_flag_set & DOMAIN_FLAG_DUALSTACK_SELECT) {
  550. request->dualstack_selection = 0;
  551. return;
  552. }
  553. }
  554. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_DUALSTACK_SELECTION) == 0) {
  555. request->dualstack_selection = 0;
  556. return;
  557. }
  558. request->dualstack_selection = request->conf->dualstack_ip_selection;
  559. }
  560. static int _dns_server_is_return_soa_qtype(struct dns_request *request, dns_type_t qtype)
  561. {
  562. struct dns_rule_flags *rule_flag = NULL;
  563. unsigned int flags = 0;
  564. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_SOA) == 0) {
  565. /* when both has no rule SOA and force AAAA soa, force AAAA soa has high priority */
  566. if (qtype == DNS_T_AAAA && _dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0) {
  567. return 1;
  568. }
  569. return 0;
  570. }
  571. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  572. if (rule_flag) {
  573. flags = rule_flag->flags;
  574. if (flags & DOMAIN_FLAG_ADDR_SOA) {
  575. return 1;
  576. }
  577. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  578. request->skip_qtype_soa = 1;
  579. return 0;
  580. }
  581. switch (qtype) {
  582. case DNS_T_A:
  583. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA) {
  584. return 1;
  585. }
  586. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  587. request->skip_qtype_soa = 1;
  588. return 0;
  589. }
  590. break;
  591. case DNS_T_AAAA:
  592. if (flags & DOMAIN_FLAG_ADDR_IPV6_SOA) {
  593. return 1;
  594. }
  595. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  596. request->skip_qtype_soa = 1;
  597. return 0;
  598. }
  599. break;
  600. case DNS_T_HTTPS:
  601. if (flags & DOMAIN_FLAG_ADDR_HTTPS_SOA) {
  602. return 1;
  603. }
  604. if (flags & DOMAIN_FLAG_ADDR_HTTPS_IGN) {
  605. request->skip_qtype_soa = 1;
  606. return 0;
  607. }
  608. break;
  609. default:
  610. break;
  611. }
  612. }
  613. if (qtype == DNS_T_AAAA) {
  614. if (_dns_server_has_bind_flag(request, BIND_FLAG_FORCE_AAAA_SOA) == 0 || request->conf->force_AAAA_SOA == 1) {
  615. return 1;
  616. }
  617. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] != NULL &&
  618. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] == NULL) {
  619. return 1;
  620. }
  621. } else if (qtype == DNS_T_A) {
  622. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] != NULL &&
  623. request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] == NULL) {
  624. return 1;
  625. }
  626. } else if (qtype == DNS_T_HTTPS) {
  627. if (request->domain_rule.rules[DOMAIN_RULE_HTTPS] == NULL) {
  628. return 1;
  629. }
  630. }
  631. return 0;
  632. }
  633. static int _dns_server_is_return_soa(struct dns_request *request)
  634. {
  635. return _dns_server_is_return_soa_qtype(request, request->qtype);
  636. }
  637. static void _dns_server_post_context_init(struct dns_server_post_context *context, struct dns_request *request)
  638. {
  639. memset(context, 0, sizeof(*context));
  640. context->packet = (struct dns_packet *)(context->packet_buff);
  641. context->packet_maxlen = sizeof(context->packet_buff);
  642. context->inpacket = (unsigned char *)(context->inpacket_buff);
  643. context->inpacket_maxlen = sizeof(context->inpacket_buff);
  644. context->qtype = request->qtype;
  645. context->request = request;
  646. }
  647. static void _dns_server_context_add_ip(struct dns_server_post_context *context, const unsigned char *ip_addr)
  648. {
  649. if (context->ip_num < MAX_IP_NUM) {
  650. context->ip_addr[context->ip_num] = ip_addr;
  651. }
  652. context->ip_num++;
  653. }
  654. static void _dns_server_post_context_init_from(struct dns_server_post_context *context, struct dns_request *request,
  655. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len)
  656. {
  657. memset(context, 0, sizeof(*context));
  658. context->packet = packet;
  659. context->packet_maxlen = sizeof(context->packet_buff);
  660. context->inpacket = inpacket;
  661. context->inpacket_len = inpacket_len;
  662. context->inpacket_maxlen = sizeof(context->inpacket);
  663. context->qtype = request->qtype;
  664. context->request = request;
  665. }
  666. static struct dns_ip_address *_dns_ip_address_get(struct dns_request *request, unsigned char *addr,
  667. dns_type_t addr_type)
  668. {
  669. uint32_t key = 0;
  670. struct dns_ip_address *addr_map = NULL;
  671. struct dns_ip_address *addr_tmp = NULL;
  672. int addr_len = 0;
  673. if (addr_type == DNS_T_A) {
  674. addr_len = DNS_RR_A_LEN;
  675. } else if (addr_type == DNS_T_AAAA) {
  676. addr_len = DNS_RR_AAAA_LEN;
  677. } else {
  678. return NULL;
  679. }
  680. /* store the ip address and the number of hits */
  681. key = jhash(addr, addr_len, 0);
  682. key = jhash(&addr_type, sizeof(addr_type), key);
  683. pthread_mutex_lock(&request->ip_map_lock);
  684. hash_for_each_possible(request->ip_map, addr_tmp, node, key)
  685. {
  686. if (addr_type != addr_tmp->addr_type) {
  687. continue;
  688. }
  689. if (memcmp(addr_tmp->ip_addr, addr, addr_len) != 0) {
  690. continue;
  691. }
  692. addr_map = addr_tmp;
  693. break;
  694. }
  695. pthread_mutex_unlock(&request->ip_map_lock);
  696. return addr_map;
  697. }
  698. static void _dns_server_audit_log(struct dns_server_post_context *context)
  699. {
  700. char req_host[MAX_IP_LEN];
  701. char req_result[1024] = {0};
  702. char *ip_msg = req_result;
  703. char req_time[MAX_IP_LEN] = {0};
  704. struct tlog_time tm;
  705. int i = 0;
  706. int j = 0;
  707. int rr_count = 0;
  708. struct dns_rrs *rrs = NULL;
  709. char name[DNS_MAX_CNAME_LEN] = {0};
  710. int ttl = 0;
  711. int len = 0;
  712. int left_len = sizeof(req_result);
  713. int total_len = 0;
  714. int ip_num = 0;
  715. struct dns_request *request = context->request;
  716. int has_soa = request->has_soa;
  717. if (dns_audit == NULL || !dns_conf_audit_enable || context->do_audit == 0) {
  718. return;
  719. }
  720. if (request->conn == NULL) {
  721. return;
  722. }
  723. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  724. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  725. for (i = 0; i < rr_count && rrs && left_len > 0; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  726. switch (rrs->type) {
  727. case DNS_T_A: {
  728. unsigned char ipv4_addr[4];
  729. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  730. continue;
  731. }
  732. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  733. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  734. continue;
  735. }
  736. const char *fmt = "%d.%d.%d.%d";
  737. if (ip_num > 0) {
  738. fmt = ", %d.%d.%d.%d";
  739. }
  740. len =
  741. snprintf(ip_msg + total_len, left_len, fmt, ipv4_addr[0], ipv4_addr[1], ipv4_addr[2], ipv4_addr[3]);
  742. ip_num++;
  743. has_soa = 0;
  744. } break;
  745. case DNS_T_AAAA: {
  746. unsigned char ipv6_addr[16];
  747. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  748. continue;
  749. }
  750. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  751. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  752. continue;
  753. }
  754. const char *fmt = "%s";
  755. if (ip_num > 0) {
  756. fmt = ", %s";
  757. }
  758. req_host[0] = '\0';
  759. inet_ntop(AF_INET6, ipv6_addr, req_host, sizeof(req_host));
  760. len = snprintf(ip_msg + total_len, left_len, fmt, req_host);
  761. ip_num++;
  762. has_soa = 0;
  763. } break;
  764. case DNS_T_SOA: {
  765. if (ip_num == 0) {
  766. has_soa = 1;
  767. }
  768. } break;
  769. default:
  770. continue;
  771. }
  772. if (len < 0 || len >= left_len) {
  773. left_len = 0;
  774. break;
  775. }
  776. left_len -= len;
  777. total_len += len;
  778. }
  779. }
  780. if (has_soa && ip_num == 0) {
  781. if (!dns_conf_audit_log_SOA) {
  782. return;
  783. }
  784. if (request->dualstack_selection_force_soa) {
  785. snprintf(req_result, left_len, "dualstack soa");
  786. } else {
  787. snprintf(req_result, left_len, "soa");
  788. }
  789. }
  790. get_host_by_addr(req_host, sizeof(req_host), &request->addr);
  791. tlog_localtime(&tm);
  792. if (req_host[0] == '\0') {
  793. safe_strncpy(req_host, "API", MAX_IP_LEN);
  794. }
  795. if (dns_conf_audit_syslog == 0) {
  796. snprintf(req_time, sizeof(req_time), "[%.4d-%.2d-%.2d %.2d:%.2d:%.2d,%.3d] ", tm.year, tm.mon, tm.mday, tm.hour,
  797. tm.min, tm.sec, tm.usec / 1000);
  798. }
  799. tlog_printf(dns_audit, "%s%s query %s, type %d, time %lums, speed: %.1fms, result %s\n", req_time, req_host,
  800. request->domain, request->qtype, get_tick_count() - request->send_tick,
  801. ((float)request->ping_time) / 10, req_result);
  802. }
  803. static void _dns_rrs_result_log(struct dns_server_post_context *context, struct dns_ip_address *addr_map)
  804. {
  805. struct dns_request *request = context->request;
  806. if (context->do_log_result == 0 || addr_map == NULL) {
  807. return;
  808. }
  809. if (addr_map->addr_type == DNS_T_A) {
  810. tlog(TLOG_INFO, "result: %s, id: %d, index: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->id,
  811. context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0], addr_map->ip_addr[1],
  812. addr_map->ip_addr[2], addr_map->ip_addr[3]);
  813. } else if (addr_map->addr_type == DNS_T_AAAA) {
  814. tlog(TLOG_INFO,
  815. "result: %s, id: %d, index: %d, rtt: %.1f ms, "
  816. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  817. request->domain, request->id, context->ip_num, ((float)addr_map->ping_time) / 10, addr_map->ip_addr[0],
  818. addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3], addr_map->ip_addr[4],
  819. addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7], addr_map->ip_addr[8],
  820. addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11], addr_map->ip_addr[12],
  821. addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  822. }
  823. }
  824. static int _dns_rrs_add_all_best_ip(struct dns_server_post_context *context)
  825. {
  826. struct dns_ip_address *addr_map = NULL;
  827. struct dns_ip_address *added_ip_addr = NULL;
  828. struct hlist_node *tmp = NULL;
  829. struct dns_request *request = context->request;
  830. unsigned long bucket = 0;
  831. char *domain = NULL;
  832. int ret = 0;
  833. int ignore_speed = 0;
  834. int maxhit = 0;
  835. if (context->select_all_best_ip == 0 || context->ip_num >= request->conf->dns_max_reply_ip_num) {
  836. return 0;
  837. }
  838. domain = request->domain;
  839. /* add CNAME record */
  840. if (request->has_cname) {
  841. domain = request->cname;
  842. }
  843. /* add fasted ip address at first place of dns RR */
  844. if (request->has_ip) {
  845. added_ip_addr = _dns_ip_address_get(request, request->ip_addr, request->qtype);
  846. _dns_rrs_result_log(context, added_ip_addr);
  847. }
  848. if (request->passthrough == 2) {
  849. ignore_speed = 1;
  850. }
  851. while (true) {
  852. pthread_mutex_lock(&request->ip_map_lock);
  853. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  854. {
  855. if (context->ip_num >= request->conf->dns_max_reply_ip_num) {
  856. break;
  857. }
  858. if (context->qtype != addr_map->addr_type) {
  859. continue;
  860. }
  861. if (addr_map == added_ip_addr) {
  862. continue;
  863. }
  864. if (addr_map->hitnum > maxhit) {
  865. maxhit = addr_map->hitnum;
  866. }
  867. if (addr_map->ping_time < 0 && ignore_speed == 0) {
  868. continue;
  869. }
  870. if (addr_map->hitnum < maxhit && ignore_speed == 1) {
  871. continue;
  872. }
  873. /* if ping time is larger than 5ms, check again. */
  874. if (addr_map->ping_time - request->ping_time >= 50) {
  875. int ttl_range = request->ping_time + request->ping_time / 10 + 5;
  876. if ((ttl_range < addr_map->ping_time) && addr_map->ping_time >= 100 && ignore_speed == 0) {
  877. continue;
  878. }
  879. }
  880. _dns_server_context_add_ip(context, addr_map->ip_addr);
  881. if (addr_map->addr_type == DNS_T_A) {
  882. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  883. } else if (addr_map->addr_type == DNS_T_AAAA) {
  884. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, addr_map->ip_addr);
  885. }
  886. _dns_rrs_result_log(context, addr_map);
  887. }
  888. pthread_mutex_unlock(&request->ip_map_lock);
  889. if (context->ip_num <= 0 && ignore_speed == 0) {
  890. ignore_speed = 1;
  891. } else {
  892. break;
  893. }
  894. }
  895. return ret;
  896. }
  897. static void _dns_server_setup_soa(struct dns_request *request)
  898. {
  899. struct dns_soa *soa = NULL;
  900. soa = &request->soa;
  901. safe_strncpy(soa->mname, "a.gtld-servers.net", DNS_MAX_CNAME_LEN);
  902. safe_strncpy(soa->rname, "nstld.verisign-grs.com", DNS_MAX_CNAME_LEN);
  903. soa->serial = 1800;
  904. soa->refresh = 1800;
  905. soa->retry = 900;
  906. soa->expire = 604800;
  907. soa->minimum = 86400;
  908. }
  909. static int _dns_server_add_srv(struct dns_server_post_context *context)
  910. {
  911. struct dns_request *request = context->request;
  912. struct dns_srv_records *srv_records = request->srv_records;
  913. struct dns_srv_record *srv_record = NULL;
  914. int ret = 0;
  915. if (srv_records == NULL) {
  916. return 0;
  917. }
  918. list_for_each_entry(srv_record, &srv_records->list, list)
  919. {
  920. ret = dns_add_SRV(context->packet, DNS_RRS_AN, request->domain, request->ip_ttl, srv_record->priority,
  921. srv_record->weight, srv_record->port, srv_record->host);
  922. if (ret != 0) {
  923. return -1;
  924. }
  925. }
  926. return 0;
  927. }
  928. static int _dns_add_rrs_HTTPS(struct dns_server_post_context *context)
  929. {
  930. struct dns_request *request = context->request;
  931. struct dns_request_https *https_svcb = request->https_svcb;
  932. int ret = 0;
  933. struct dns_rr_nested param;
  934. if (https_svcb == NULL || request->qtype != DNS_T_HTTPS) {
  935. return 0;
  936. }
  937. ret = dns_add_HTTPS_start(&param, context->packet, DNS_RRS_AN, https_svcb->domain, https_svcb->ttl,
  938. https_svcb->priority, https_svcb->target);
  939. if (ret != 0) {
  940. return ret;
  941. }
  942. if (https_svcb->alpn[0] != '\0' && https_svcb->alpn_len > 0) {
  943. ret = dns_HTTPS_add_alpn(&param, https_svcb->alpn, https_svcb->alpn_len);
  944. if (ret != 0) {
  945. return ret;
  946. }
  947. }
  948. if (https_svcb->port != 0) {
  949. ret = dns_HTTPS_add_port(&param, https_svcb->port);
  950. if (ret != 0) {
  951. return ret;
  952. }
  953. }
  954. if (request->has_ip) {
  955. unsigned char *addr[1];
  956. addr[0] = request->ip_addr;
  957. if (request->ip_addr_type == DNS_T_A) {
  958. ret = dns_HTTPS_add_ipv4hint(&param, addr, 1);
  959. }
  960. }
  961. if (https_svcb->ech_len > 0) {
  962. ret = dns_HTTPS_add_ech(&param, https_svcb->ech, https_svcb->ech_len);
  963. if (ret != 0) {
  964. return ret;
  965. }
  966. }
  967. if (request->has_ip) {
  968. unsigned char *addr[1];
  969. addr[0] = request->ip_addr;
  970. if (request->ip_addr_type == DNS_T_AAAA) {
  971. ret = dns_HTTPS_add_ipv6hint(&param, addr, 1);
  972. }
  973. }
  974. dns_add_HTTPS_end(&param);
  975. return 0;
  976. }
  977. static int _dns_add_rrs(struct dns_server_post_context *context)
  978. {
  979. struct dns_request *request = context->request;
  980. int ret = 0;
  981. int has_soa = request->has_soa;
  982. char *domain = request->domain;
  983. if (request->has_ptr) {
  984. /* add PTR record */
  985. ret = dns_add_PTR(context->packet, DNS_RRS_AN, request->domain, request->ip_ttl, request->ptr_hostname);
  986. }
  987. /* add CNAME record */
  988. if (request->has_cname && context->do_force_soa == 0) {
  989. ret |= dns_add_CNAME(context->packet, DNS_RRS_AN, request->domain, request->ttl_cname, request->cname);
  990. domain = request->cname;
  991. }
  992. if (request->https_svcb != NULL) {
  993. ret = _dns_add_rrs_HTTPS(context);
  994. }
  995. /* add A record */
  996. if (request->has_ip && context->do_force_soa == 0) {
  997. _dns_server_context_add_ip(context, request->ip_addr);
  998. if (context->qtype == DNS_T_A) {
  999. ret |= dns_add_A(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  1000. tlog(TLOG_DEBUG, "result: %s, rtt: %.1f ms, %d.%d.%d.%d", request->domain, ((float)request->ping_time) / 10,
  1001. request->ip_addr[0], request->ip_addr[1], request->ip_addr[2], request->ip_addr[3]);
  1002. }
  1003. /* add AAAA record */
  1004. if (context->qtype == DNS_T_AAAA) {
  1005. ret |= dns_add_AAAA(context->packet, DNS_RRS_AN, domain, request->ip_ttl, request->ip_addr);
  1006. tlog(TLOG_DEBUG,
  1007. "result: %s, rtt: %.1f ms, "
  1008. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1009. request->domain, ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1],
  1010. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5],
  1011. request->ip_addr[6], request->ip_addr[7], request->ip_addr[8], request->ip_addr[9],
  1012. request->ip_addr[10], request->ip_addr[11], request->ip_addr[12], request->ip_addr[13],
  1013. request->ip_addr[14], request->ip_addr[15]);
  1014. }
  1015. }
  1016. if (context->do_force_soa == 0) {
  1017. ret |= _dns_rrs_add_all_best_ip(context);
  1018. }
  1019. if (context->qtype == DNS_T_A || context->qtype == DNS_T_AAAA) {
  1020. if (context->ip_num > 0) {
  1021. has_soa = 0;
  1022. }
  1023. }
  1024. /* add SOA record */
  1025. if (has_soa) {
  1026. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  1027. tlog(TLOG_DEBUG, "result: %s, qtype: %d, return SOA", request->domain, context->qtype);
  1028. } else if (context->do_force_soa == 1) {
  1029. _dns_server_setup_soa(request);
  1030. ret |= dns_add_SOA(context->packet, DNS_RRS_NS, domain, request->ip_ttl, &request->soa);
  1031. }
  1032. if (request->has_ecs) {
  1033. ret |= dns_add_OPT_ECS(context->packet, &request->ecs);
  1034. }
  1035. if (request->srv_records != NULL) {
  1036. ret |= _dns_server_add_srv(context);
  1037. }
  1038. if (request->rcode != DNS_RC_NOERROR) {
  1039. tlog(TLOG_INFO, "result: %s, qtype: %d, rtcode: %d, id: %d", domain, context->qtype, request->rcode,
  1040. request->id);
  1041. }
  1042. return ret;
  1043. }
  1044. static int _dns_setup_dns_packet(struct dns_server_post_context *context)
  1045. {
  1046. struct dns_head head;
  1047. struct dns_request *request = context->request;
  1048. int ret = 0;
  1049. memset(&head, 0, sizeof(head));
  1050. head.id = request->id;
  1051. head.qr = DNS_QR_ANSWER;
  1052. head.opcode = DNS_OP_QUERY;
  1053. head.rd = 1;
  1054. head.ra = 1;
  1055. head.aa = 0;
  1056. head.tc = 0;
  1057. head.rcode = request->rcode;
  1058. /* init a new DNS packet */
  1059. ret = dns_packet_init(context->packet, context->packet_maxlen, &head);
  1060. if (ret != 0) {
  1061. return -1;
  1062. }
  1063. if (request->domain[0] == '\0') {
  1064. return 0;
  1065. }
  1066. /* add request domain */
  1067. ret = dns_add_domain(context->packet, request->domain, context->qtype, request->qclass);
  1068. if (ret != 0) {
  1069. return -1;
  1070. }
  1071. /* add RECORDs */
  1072. ret = _dns_add_rrs(context);
  1073. if (ret != 0) {
  1074. return -1;
  1075. }
  1076. return 0;
  1077. }
  1078. static int _dns_setup_dns_raw_packet(struct dns_server_post_context *context)
  1079. {
  1080. /* encode to binary data */
  1081. int encode_len = dns_encode(context->inpacket, context->inpacket_maxlen, context->packet);
  1082. if (encode_len <= 0) {
  1083. tlog(TLOG_DEBUG, "encode raw packet failed for %s", context->request->domain);
  1084. return -1;
  1085. }
  1086. context->inpacket_len = encode_len;
  1087. return 0;
  1088. }
  1089. static void _dns_server_conn_release(struct dns_server_conn_head *conn)
  1090. {
  1091. if (conn == NULL) {
  1092. return;
  1093. }
  1094. int refcnt = atomic_dec_return(&conn->refcnt);
  1095. if (refcnt) {
  1096. if (refcnt < 0) {
  1097. BUG("BUG: refcnt is %d, type = %d", refcnt, conn->type);
  1098. }
  1099. return;
  1100. }
  1101. if (conn->fd > 0) {
  1102. close(conn->fd);
  1103. conn->fd = -1;
  1104. }
  1105. if (conn->type == DNS_CONN_TYPE_TLS_CLIENT || conn->type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  1106. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  1107. if (tls_client->ssl != NULL) {
  1108. SSL_free(tls_client->ssl);
  1109. tls_client->ssl = NULL;
  1110. }
  1111. pthread_mutex_destroy(&tls_client->ssl_lock);
  1112. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER || conn->type == DNS_CONN_TYPE_HTTPS_SERVER) {
  1113. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  1114. if (tls_server->ssl_ctx != NULL) {
  1115. SSL_CTX_free(tls_server->ssl_ctx);
  1116. tls_server->ssl_ctx = NULL;
  1117. }
  1118. }
  1119. list_del_init(&conn->list);
  1120. free(conn);
  1121. }
  1122. static void _dns_server_conn_get(struct dns_server_conn_head *conn)
  1123. {
  1124. if (conn == NULL) {
  1125. return;
  1126. }
  1127. if (atomic_inc_return(&conn->refcnt) <= 0) {
  1128. BUG("BUG: client ref is invalid.");
  1129. }
  1130. }
  1131. static int _dns_server_reply_tcp_to_buffer(struct dns_server_conn_tcp_client *tcpclient, void *packet, int len)
  1132. {
  1133. if ((int)sizeof(tcpclient->sndbuff.buf) - tcpclient->sndbuff.size < len) {
  1134. return -1;
  1135. }
  1136. memcpy(tcpclient->sndbuff.buf + tcpclient->sndbuff.size, packet, len);
  1137. tcpclient->sndbuff.size += len;
  1138. if (tcpclient->head.fd <= 0) {
  1139. return -1;
  1140. }
  1141. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN | EPOLLOUT) != 0) {
  1142. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  1143. return -1;
  1144. }
  1145. return 0;
  1146. }
  1147. static int _dns_server_reply_http_error(struct dns_server_conn_tcp_client *tcpclient, int code, const char *code_msg,
  1148. const char *message)
  1149. {
  1150. int send_len = 0;
  1151. int http_len = 0;
  1152. unsigned char data[DNS_IN_PACKSIZE];
  1153. int msg_len = strlen(message);
  1154. http_len = snprintf((char *)data, DNS_IN_PACKSIZE,
  1155. "HTTP/1.1 %d %s\r\n"
  1156. "Content-Length: %d\r\n"
  1157. "\r\n"
  1158. "%s\r\n",
  1159. code, code_msg, msg_len + 2, message);
  1160. send_len = _dns_server_tcp_socket_send(tcpclient, data, http_len);
  1161. if (send_len < 0) {
  1162. if (errno == EAGAIN) {
  1163. /* save data to buffer, and retry when EPOLLOUT is available */
  1164. return _dns_server_reply_tcp_to_buffer(tcpclient, data, http_len);
  1165. }
  1166. return -1;
  1167. } else if (send_len < http_len) {
  1168. /* save remain data to buffer, and retry when EPOLLOUT is available */
  1169. return _dns_server_reply_tcp_to_buffer(tcpclient, data + send_len, http_len - send_len);
  1170. }
  1171. return 0;
  1172. }
  1173. static int _dns_server_reply_https(struct dns_request *request, struct dns_server_conn_tcp_client *tcpclient,
  1174. void *packet, unsigned short len)
  1175. {
  1176. int send_len = 0;
  1177. int http_len = 0;
  1178. unsigned char inpacket_data[DNS_IN_PACKSIZE];
  1179. unsigned char *inpacket = inpacket_data;
  1180. if (len > sizeof(inpacket_data)) {
  1181. tlog(TLOG_ERROR, "packet size is invalid.");
  1182. return -1;
  1183. }
  1184. http_len = snprintf((char *)inpacket, DNS_IN_PACKSIZE,
  1185. "HTTP/1.1 200 OK\r\n"
  1186. "Content-Type: application/dns-message\r\n"
  1187. "Content-Length: %d\r\n"
  1188. "\r\n",
  1189. len);
  1190. memcpy(inpacket + http_len, packet, len);
  1191. http_len += len;
  1192. send_len = _dns_server_tcp_socket_send(tcpclient, inpacket, http_len);
  1193. if (send_len < 0) {
  1194. if (errno == EAGAIN) {
  1195. /* save data to buffer, and retry when EPOLLOUT is available */
  1196. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket, http_len);
  1197. }
  1198. return -1;
  1199. } else if (send_len < http_len) {
  1200. /* save remain data to buffer, and retry when EPOLLOUT is available */
  1201. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket + send_len, http_len - send_len);
  1202. }
  1203. return 0;
  1204. }
  1205. static int _dns_server_reply_tcp(struct dns_request *request, struct dns_server_conn_tcp_client *tcpclient,
  1206. void *packet, unsigned short len)
  1207. {
  1208. int send_len = 0;
  1209. unsigned char inpacket_data[DNS_IN_PACKSIZE];
  1210. unsigned char *inpacket = inpacket_data;
  1211. if (len > sizeof(inpacket_data) - 2) {
  1212. tlog(TLOG_ERROR, "packet size is invalid.");
  1213. return -1;
  1214. }
  1215. /* TCP query format
  1216. * | len (short) | dns query data |
  1217. */
  1218. *((unsigned short *)(inpacket)) = htons(len);
  1219. memcpy(inpacket + 2, packet, len);
  1220. len += 2;
  1221. send_len = _dns_server_tcp_socket_send(tcpclient, inpacket, len);
  1222. if (send_len < 0) {
  1223. if (errno == EAGAIN) {
  1224. /* save data to buffer, and retry when EPOLLOUT is available */
  1225. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket, len);
  1226. }
  1227. return -1;
  1228. } else if (send_len < len) {
  1229. /* save remain data to buffer, and retry when EPOLLOUT is available */
  1230. return _dns_server_reply_tcp_to_buffer(tcpclient, inpacket + send_len, len - send_len);
  1231. }
  1232. return 0;
  1233. }
  1234. static int _dns_server_reply_udp(struct dns_request *request, struct dns_server_conn_udp *udpserver,
  1235. unsigned char *inpacket, int inpacket_len)
  1236. {
  1237. int send_len = 0;
  1238. struct iovec iovec[1];
  1239. struct msghdr msg;
  1240. struct cmsghdr *cmsg;
  1241. char msg_control[64];
  1242. if (atomic_read(&server.run) == 0 || inpacket == NULL || inpacket_len <= 0) {
  1243. return -1;
  1244. }
  1245. iovec[0].iov_base = inpacket;
  1246. iovec[0].iov_len = inpacket_len;
  1247. memset(msg_control, 0, sizeof(msg_control));
  1248. msg.msg_iov = iovec;
  1249. msg.msg_iovlen = 1;
  1250. msg.msg_control = msg_control;
  1251. msg.msg_controllen = sizeof(msg_control);
  1252. msg.msg_flags = 0;
  1253. msg.msg_name = &request->addr;
  1254. msg.msg_namelen = request->addr_len;
  1255. cmsg = CMSG_FIRSTHDR(&msg);
  1256. if (request->localaddr.ss_family == AF_INET) {
  1257. struct sockaddr_in *s4 = (struct sockaddr_in *)&request->localaddr;
  1258. cmsg->cmsg_level = SOL_IP;
  1259. cmsg->cmsg_type = IP_PKTINFO;
  1260. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
  1261. msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo));
  1262. struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  1263. memset(pktinfo, 0, sizeof(*pktinfo));
  1264. pktinfo->ipi_spec_dst = s4->sin_addr;
  1265. } else if (request->localaddr.ss_family == AF_INET6) {
  1266. struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&request->localaddr;
  1267. cmsg->cmsg_level = IPPROTO_IPV6;
  1268. cmsg->cmsg_type = IPV6_PKTINFO;
  1269. cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
  1270. msg.msg_controllen = CMSG_SPACE(sizeof(struct in6_pktinfo));
  1271. struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  1272. memset(pktinfo, 0, sizeof(*pktinfo));
  1273. pktinfo->ipi6_addr = s6->sin6_addr;
  1274. } else {
  1275. goto use_send;
  1276. }
  1277. send_len = sendmsg(udpserver->head.fd, &msg, 0);
  1278. if (send_len == inpacket_len) {
  1279. return 0;
  1280. }
  1281. use_send:
  1282. send_len = sendto(udpserver->head.fd, inpacket, inpacket_len, 0, &request->addr, request->addr_len);
  1283. if (send_len != inpacket_len) {
  1284. tlog(TLOG_DEBUG, "send failed, %s", strerror(errno));
  1285. return -1;
  1286. }
  1287. return 0;
  1288. }
  1289. static int _dns_reply_inpacket(struct dns_request *request, unsigned char *inpacket, int inpacket_len)
  1290. {
  1291. struct dns_server_conn_head *conn = request->conn;
  1292. int ret = 0;
  1293. if (conn == NULL) {
  1294. tlog(TLOG_ERROR, "client is invalid, domain: %s", request->domain);
  1295. return -1;
  1296. }
  1297. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  1298. ret = _dns_server_reply_udp(request, (struct dns_server_conn_udp *)conn, inpacket, inpacket_len);
  1299. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  1300. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1301. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT) {
  1302. ret = _dns_server_reply_tcp(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1303. } else if (conn->type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  1304. ret = _dns_server_reply_https(request, (struct dns_server_conn_tcp_client *)conn, inpacket, inpacket_len);
  1305. } else {
  1306. ret = -1;
  1307. }
  1308. return ret;
  1309. }
  1310. static inline int _dns_server_expired_cache_ttl(struct dns_cache *cache, int serve_expired_ttl)
  1311. {
  1312. return cache->info.insert_time + cache->info.ttl + serve_expired_ttl - time(NULL);
  1313. }
  1314. static int _dns_cache_is_specify_packet(int qtype)
  1315. {
  1316. switch (qtype) {
  1317. case DNS_T_PTR:
  1318. case DNS_T_HTTPS:
  1319. case DNS_T_TXT:
  1320. case DNS_T_SRV:
  1321. break;
  1322. default:
  1323. return -1;
  1324. break;
  1325. }
  1326. return 0;
  1327. }
  1328. static int _dns_server_get_cache_timeout(struct dns_request *request, struct dns_cache_key *cache_key, int ttl)
  1329. {
  1330. int timeout = 0;
  1331. int prefetch_time = 0;
  1332. int is_serve_expired = request->conf->dns_serve_expired;
  1333. if (request->rcode != DNS_RC_NOERROR) {
  1334. return ttl + 1;
  1335. }
  1336. if (request->is_mdns_lookup == 1) {
  1337. return ttl + 1;
  1338. }
  1339. if (request->conf->dns_prefetch) {
  1340. prefetch_time = 1;
  1341. }
  1342. if ((request->prefetch_flags & PREFETCH_FLAGS_NOPREFETCH)) {
  1343. prefetch_time = 0;
  1344. }
  1345. if (request->edns0_do == 1) {
  1346. prefetch_time = 0;
  1347. }
  1348. if (request->no_serve_expired) {
  1349. is_serve_expired = 0;
  1350. }
  1351. if (prefetch_time == 1) {
  1352. if (is_serve_expired) {
  1353. timeout = request->conf->dns_serve_expired_prefetch_time;
  1354. if (timeout == 0) {
  1355. timeout = request->conf->dns_serve_expired_ttl / 2;
  1356. if (timeout == 0 || timeout > EXPIRED_DOMAIN_PREFETCH_TIME) {
  1357. timeout = EXPIRED_DOMAIN_PREFETCH_TIME;
  1358. }
  1359. }
  1360. if ((request->prefetch_flags & PREFETCH_FLAGS_EXPIRED) == 0) {
  1361. timeout += ttl;
  1362. } else if (cache_key != NULL) {
  1363. struct dns_cache *old_cache = dns_cache_lookup(cache_key);
  1364. if (old_cache) {
  1365. time_t next_ttl = _dns_server_expired_cache_ttl(old_cache, request->conf->dns_serve_expired_ttl) -
  1366. old_cache->info.ttl + ttl;
  1367. if (next_ttl < timeout) {
  1368. timeout = next_ttl;
  1369. }
  1370. dns_cache_release(old_cache);
  1371. }
  1372. }
  1373. } else {
  1374. timeout = ttl - 3;
  1375. }
  1376. } else {
  1377. timeout = ttl;
  1378. if (is_serve_expired) {
  1379. timeout += request->conf->dns_serve_expired_ttl;
  1380. }
  1381. timeout += 3;
  1382. }
  1383. if (timeout <= 0) {
  1384. timeout = 1;
  1385. }
  1386. return timeout;
  1387. }
  1388. static int _dns_server_request_update_cache(struct dns_request *request, int speed, dns_type_t qtype,
  1389. struct dns_cache_data *cache_data, int cache_ttl)
  1390. {
  1391. int ttl = 0;
  1392. int ret = -1;
  1393. if (qtype != DNS_T_A && qtype != DNS_T_AAAA && qtype != DNS_T_HTTPS) {
  1394. goto errout;
  1395. }
  1396. if (cache_ttl > 0) {
  1397. ttl = cache_ttl;
  1398. } else {
  1399. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1400. }
  1401. tlog(TLOG_DEBUG, "cache %s qtype: %d ttl: %d\n", request->domain, qtype, ttl);
  1402. /* if doing prefetch, update cache only */
  1403. struct dns_cache_key cache_key;
  1404. cache_key.dns_group_name = request->dns_group_name;
  1405. cache_key.domain = request->domain;
  1406. cache_key.qtype = request->qtype;
  1407. cache_key.query_flag = request->server_flags;
  1408. if (request->prefetch) {
  1409. /* no prefetch for mdns request */
  1410. if (request->is_mdns_lookup) {
  1411. ret = 0;
  1412. goto errout;
  1413. }
  1414. if (dns_cache_replace(&cache_key, request->rcode, ttl, speed,
  1415. _dns_server_get_cache_timeout(request, &cache_key, ttl),
  1416. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_data) != 0) {
  1417. ret = 0;
  1418. goto errout;
  1419. }
  1420. } else {
  1421. /* insert result to cache */
  1422. if (dns_cache_insert(&cache_key, request->rcode, ttl, speed, _dns_server_get_cache_timeout(request, NULL, ttl),
  1423. cache_data) != 0) {
  1424. ret = -1;
  1425. goto errout;
  1426. }
  1427. }
  1428. return 0;
  1429. errout:
  1430. if (cache_data) {
  1431. dns_cache_data_put(cache_data);
  1432. }
  1433. return ret;
  1434. }
  1435. static int _dns_cache_cname_packet(struct dns_server_post_context *context)
  1436. {
  1437. struct dns_packet *packet = context->packet;
  1438. struct dns_packet *cname_packet = NULL;
  1439. int ret = -1;
  1440. int i = 0;
  1441. int j = 0;
  1442. int rr_count = 0;
  1443. int ttl = 0;
  1444. int speed = 0;
  1445. unsigned char packet_buff[DNS_PACKSIZE];
  1446. unsigned char inpacket_buff[DNS_IN_PACKSIZE];
  1447. int inpacket_len = 0;
  1448. struct dns_cache_data *cache_packet = NULL;
  1449. struct dns_rrs *rrs = NULL;
  1450. char name[DNS_MAX_CNAME_LEN] = {0};
  1451. cname_packet = (struct dns_packet *)packet_buff;
  1452. int has_result = 0;
  1453. struct dns_request *request = context->request;
  1454. if (request->has_cname == 0 || request->no_cache_cname == 1 || request->no_cache == 1) {
  1455. return 0;
  1456. }
  1457. /* init a new DNS packet */
  1458. ret = dns_packet_init(cname_packet, DNS_PACKSIZE, &packet->head);
  1459. if (ret != 0) {
  1460. return -1;
  1461. }
  1462. /* add request domain */
  1463. ret = dns_add_domain(cname_packet, request->cname, context->qtype, DNS_C_IN);
  1464. if (ret != 0) {
  1465. return -1;
  1466. }
  1467. for (j = 1; j < DNS_RRS_OPT && context->packet; j++) {
  1468. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1469. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1470. switch (rrs->type) {
  1471. case DNS_T_A: {
  1472. unsigned char ipv4_addr[4];
  1473. if (dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv4_addr) != 0) {
  1474. continue;
  1475. }
  1476. if (strncasecmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1477. continue;
  1478. }
  1479. ret = dns_add_A(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv4_addr);
  1480. if (ret != 0) {
  1481. return -1;
  1482. }
  1483. has_result = 1;
  1484. } break;
  1485. case DNS_T_AAAA: {
  1486. unsigned char ipv6_addr[16];
  1487. if (dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, ipv6_addr) != 0) {
  1488. continue;
  1489. }
  1490. if (strncasecmp(request->cname, name, DNS_MAX_CNAME_LEN - 1) != 0) {
  1491. continue;
  1492. }
  1493. ret = dns_add_AAAA(cname_packet, DNS_RRS_AN, request->cname, ttl, ipv6_addr);
  1494. if (ret != 0) {
  1495. return -1;
  1496. }
  1497. has_result = 1;
  1498. } break;
  1499. case DNS_T_SOA: {
  1500. struct dns_soa soa;
  1501. if (dns_get_SOA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, &soa) != 0) {
  1502. continue;
  1503. }
  1504. ret = dns_add_SOA(cname_packet, DNS_RRS_AN, request->cname, ttl, &soa);
  1505. if (ret != 0) {
  1506. return -1;
  1507. }
  1508. has_result = 1;
  1509. break;
  1510. }
  1511. default:
  1512. continue;
  1513. }
  1514. }
  1515. }
  1516. if (has_result == 0) {
  1517. return 0;
  1518. }
  1519. inpacket_len = dns_encode(inpacket_buff, DNS_IN_PACKSIZE, cname_packet);
  1520. if (inpacket_len <= 0) {
  1521. return -1;
  1522. }
  1523. if (context->qtype != DNS_T_A && context->qtype != DNS_T_AAAA) {
  1524. return -1;
  1525. }
  1526. cache_packet = dns_cache_new_data_packet(inpacket_buff, inpacket_len);
  1527. if (cache_packet == NULL) {
  1528. goto errout;
  1529. }
  1530. ttl = _dns_server_get_conf_ttl(request, request->ip_ttl);
  1531. speed = request->ping_time;
  1532. tlog(TLOG_DEBUG, "Cache CNAME: %s, qtype: %d, speed: %d", request->cname, request->qtype, speed);
  1533. /* if doing prefetch, update cache only */
  1534. struct dns_cache_key cache_key;
  1535. cache_key.dns_group_name = request->dns_group_name;
  1536. cache_key.domain = request->cname;
  1537. cache_key.qtype = context->qtype;
  1538. cache_key.query_flag = request->server_flags;
  1539. if (request->prefetch) {
  1540. if (dns_cache_replace(&cache_key, request->rcode, ttl, speed,
  1541. _dns_server_get_cache_timeout(request, &cache_key, ttl),
  1542. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_packet) != 0) {
  1543. ret = 0;
  1544. goto errout;
  1545. }
  1546. } else {
  1547. /* insert result to cache */
  1548. if (dns_cache_insert(&cache_key, request->rcode, ttl, speed, _dns_server_get_cache_timeout(request, NULL, ttl),
  1549. cache_packet) != 0) {
  1550. ret = -1;
  1551. goto errout;
  1552. }
  1553. }
  1554. return 0;
  1555. errout:
  1556. if (cache_packet) {
  1557. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  1558. }
  1559. return ret;
  1560. }
  1561. static int _dns_cache_packet(struct dns_server_post_context *context)
  1562. {
  1563. struct dns_request *request = context->request;
  1564. int ret = -1;
  1565. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1566. if (cache_packet == NULL) {
  1567. goto errout;
  1568. }
  1569. /* if doing prefetch, update cache only */
  1570. struct dns_cache_key cache_key;
  1571. cache_key.dns_group_name = request->dns_group_name;
  1572. cache_key.domain = request->domain;
  1573. cache_key.qtype = context->qtype;
  1574. cache_key.query_flag = request->server_flags;
  1575. if (request->prefetch) {
  1576. /* no prefetch for mdns request */
  1577. if (request->is_mdns_lookup) {
  1578. ret = 0;
  1579. goto errout;
  1580. }
  1581. if (dns_cache_replace(&cache_key, request->rcode, request->ip_ttl, -1,
  1582. _dns_server_get_cache_timeout(request, &cache_key, request->ip_ttl),
  1583. !(request->prefetch_flags & PREFETCH_FLAGS_EXPIRED), cache_packet) != 0) {
  1584. ret = 0;
  1585. goto errout;
  1586. }
  1587. } else {
  1588. /* insert result to cache */
  1589. if (dns_cache_insert(&cache_key, request->rcode, request->ip_ttl, -1,
  1590. _dns_server_get_cache_timeout(request, NULL, request->ip_ttl), cache_packet) != 0) {
  1591. ret = -1;
  1592. goto errout;
  1593. }
  1594. }
  1595. return 0;
  1596. errout:
  1597. if (cache_packet) {
  1598. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  1599. }
  1600. return ret;
  1601. }
  1602. static int _dns_result_callback(struct dns_server_post_context *context)
  1603. {
  1604. struct dns_result result;
  1605. char ip[DNS_MAX_CNAME_LEN];
  1606. unsigned int ping_time = -1;
  1607. struct dns_request *request = context->request;
  1608. if (request->result_callback == NULL) {
  1609. return 0;
  1610. }
  1611. if (atomic_inc_return(&request->do_callback) != 1) {
  1612. return 0;
  1613. }
  1614. ip[0] = 0;
  1615. memset(&result, 0, sizeof(result));
  1616. ping_time = request->ping_time;
  1617. result.domain = request->domain;
  1618. result.rtcode = request->rcode;
  1619. result.addr_type = request->qtype;
  1620. result.ip = ip;
  1621. result.has_soa = request->has_soa | context->do_force_soa;
  1622. result.ping_time = ping_time;
  1623. result.ip_num = 0;
  1624. if (request->has_ip != 0 && context->do_force_soa == 0) {
  1625. for (int i = 0; i < context->ip_num && i < MAX_IP_NUM; i++) {
  1626. result.ip_addr[i] = context->ip_addr[i];
  1627. result.ip_num++;
  1628. }
  1629. if (request->qtype == DNS_T_A) {
  1630. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  1631. request->ip_addr[3]);
  1632. } else if (request->qtype == DNS_T_AAAA) {
  1633. snprintf(ip, sizeof(ip), "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1634. request->ip_addr[0], request->ip_addr[1], request->ip_addr[2], request->ip_addr[3],
  1635. request->ip_addr[4], request->ip_addr[5], request->ip_addr[6], request->ip_addr[7],
  1636. request->ip_addr[8], request->ip_addr[9], request->ip_addr[10], request->ip_addr[11],
  1637. request->ip_addr[12], request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  1638. }
  1639. }
  1640. return request->result_callback(&result, request->user_ptr);
  1641. }
  1642. static int _dns_cache_specify_packet(struct dns_server_post_context *context)
  1643. {
  1644. if (_dns_cache_is_specify_packet(context->qtype) != 0) {
  1645. return 0;
  1646. }
  1647. return _dns_cache_packet(context);
  1648. }
  1649. static int _dns_cache_try_keep_old_cache(struct dns_request *request)
  1650. {
  1651. struct dns_cache_key cache_key;
  1652. cache_key.dns_group_name = request->dns_group_name;
  1653. cache_key.domain = request->domain;
  1654. cache_key.qtype = request->qtype;
  1655. cache_key.query_flag = request->server_flags;
  1656. return dns_cache_update_timer(&cache_key, DNS_SERVER_TMOUT_TTL);
  1657. }
  1658. static int _dns_cache_reply_packet(struct dns_server_post_context *context)
  1659. {
  1660. struct dns_request *request = context->request;
  1661. int speed = -1;
  1662. if (context->do_cache == 0 || request->no_cache == 1) {
  1663. return 0;
  1664. }
  1665. if (context->packet->head.rcode == DNS_RC_SERVFAIL || context->packet->head.rcode == DNS_RC_NXDOMAIN ||
  1666. context->packet->head.rcode == DNS_RC_NOTIMP) {
  1667. context->reply_ttl = DNS_SERVER_FAIL_TTL;
  1668. /* Do not cache record if cannot connect to remote */
  1669. if (request->remote_server_fail == 0 && context->packet->head.rcode == DNS_RC_SERVFAIL) {
  1670. /* Try keep old cache if server fail */
  1671. _dns_cache_try_keep_old_cache(request);
  1672. return 0;
  1673. }
  1674. if (context->packet->head.rcode == DNS_RC_NOTIMP) {
  1675. return 0;
  1676. }
  1677. return _dns_cache_packet(context);
  1678. }
  1679. if (context->qtype != DNS_T_AAAA && context->qtype != DNS_T_A && context->qtype != DNS_T_HTTPS) {
  1680. return _dns_cache_specify_packet(context);
  1681. }
  1682. struct dns_cache_data *cache_packet = dns_cache_new_data_packet(context->inpacket, context->inpacket_len);
  1683. if (cache_packet == NULL) {
  1684. return -1;
  1685. }
  1686. speed = request->ping_time;
  1687. if (context->do_force_soa) {
  1688. speed = -1;
  1689. }
  1690. if (_dns_server_request_update_cache(request, speed, context->qtype, cache_packet, context->cache_ttl) != 0) {
  1691. tlog(TLOG_WARN, "update packet cache failed.");
  1692. }
  1693. _dns_cache_cname_packet(context);
  1694. return 0;
  1695. }
  1696. static void _dns_server_add_ipset_nftset(struct dns_request *request, struct dns_ipset_rule *ipset_rule,
  1697. struct dns_nftset_rule *nftset_rule, const unsigned char addr[], int addr_len,
  1698. int ipset_timeout_value, int nftset_timeout_value)
  1699. {
  1700. if (ipset_rule != NULL) {
  1701. /* add IPV4 to ipset */
  1702. if (addr_len == DNS_RR_A_LEN) {
  1703. tlog(TLOG_DEBUG, "IPSET-MATCH: domain: %s, ipset: %s, IP: %d.%d.%d.%d", request->domain,
  1704. ipset_rule->ipsetname, addr[0], addr[1], addr[2], addr[3]);
  1705. ipset_add(ipset_rule->ipsetname, addr, DNS_RR_A_LEN, ipset_timeout_value);
  1706. } else if (addr_len == DNS_RR_AAAA_LEN) {
  1707. tlog(TLOG_DEBUG,
  1708. "IPSET-MATCH: domain: %s, ipset: %s, IP: "
  1709. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1710. request->domain, ipset_rule->ipsetname, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6],
  1711. addr[7], addr[8], addr[9], addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  1712. ipset_add(ipset_rule->ipsetname, addr, DNS_RR_AAAA_LEN, ipset_timeout_value);
  1713. }
  1714. }
  1715. if (nftset_rule != NULL) {
  1716. /* add IPV4 to ipset */
  1717. if (addr_len == DNS_RR_A_LEN) {
  1718. tlog(TLOG_DEBUG, "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: %d.%d.%d.%d", request->domain,
  1719. nftset_rule->familyname, nftset_rule->nfttablename, nftset_rule->nftsetname, addr[0], addr[1], addr[2],
  1720. addr[3]);
  1721. nftset_add(nftset_rule->familyname, nftset_rule->nfttablename, nftset_rule->nftsetname, addr, DNS_RR_A_LEN,
  1722. nftset_timeout_value);
  1723. } else if (addr_len == DNS_RR_AAAA_LEN) {
  1724. tlog(TLOG_DEBUG,
  1725. "NFTSET-MATCH: domain: %s, nftset: %s %s %s, IP: "
  1726. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  1727. request->domain, nftset_rule->familyname, nftset_rule->nfttablename, nftset_rule->nftsetname, addr[0],
  1728. addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9], addr[10], addr[11],
  1729. addr[12], addr[13], addr[14], addr[15]);
  1730. nftset_add(nftset_rule->familyname, nftset_rule->nfttablename, nftset_rule->nftsetname, addr,
  1731. DNS_RR_AAAA_LEN, nftset_timeout_value);
  1732. }
  1733. }
  1734. }
  1735. static int _dns_server_setup_ipset_nftset_packet(struct dns_server_post_context *context)
  1736. {
  1737. int ttl = 0;
  1738. struct dns_request *request = context->request;
  1739. char name[DNS_MAX_CNAME_LEN] = {0};
  1740. int rr_count = 0;
  1741. int timeout_value = 0;
  1742. int ipset_timeout_value = 0;
  1743. int nftset_timeout_value = 0;
  1744. int i = 0;
  1745. int j = 0;
  1746. struct dns_conf_group *conf;
  1747. struct dns_rrs *rrs = NULL;
  1748. struct dns_ipset_rule *rule = NULL;
  1749. struct dns_ipset_rule *ipset_rule = NULL;
  1750. struct dns_ipset_rule *ipset_rule_v4 = NULL;
  1751. struct dns_ipset_rule *ipset_rule_v6 = NULL;
  1752. struct dns_nftset_rule *nftset_ip = NULL;
  1753. struct dns_nftset_rule *nftset_ip6 = NULL;
  1754. struct dns_rule_flags *rule_flags = NULL;
  1755. int check_no_speed_rule = 0;
  1756. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_IPSET) == 0) {
  1757. return 0;
  1758. }
  1759. if (context->do_ipset == 0) {
  1760. return 0;
  1761. }
  1762. if (context->ip_num <= 0) {
  1763. return 0;
  1764. }
  1765. if (request->ping_time < 0 && request->has_ip > 0 && request->passthrough == 0) {
  1766. check_no_speed_rule = 1;
  1767. }
  1768. conf = request->conf;
  1769. /* check ipset rule */
  1770. rule_flags = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  1771. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IGN) == 0) {
  1772. ipset_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET);
  1773. if (ipset_rule == NULL) {
  1774. ipset_rule = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET);
  1775. }
  1776. if (ipset_rule == NULL && check_no_speed_rule && conf->ipset_nftset.ipset_no_speed.inet_enable) {
  1777. ipset_rule_v4 = &conf->ipset_nftset.ipset_no_speed.inet;
  1778. }
  1779. }
  1780. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV4_IGN) == 0) {
  1781. ipset_rule_v4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1782. if (ipset_rule_v4 == NULL) {
  1783. ipset_rule_v4 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV4);
  1784. }
  1785. if (ipset_rule_v4 == NULL && check_no_speed_rule && conf->ipset_nftset.ipset_no_speed.ipv4_enable) {
  1786. ipset_rule_v4 = &conf->ipset_nftset.ipset_no_speed.ipv4;
  1787. }
  1788. }
  1789. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_IPSET_IPV6_IGN) == 0) {
  1790. ipset_rule_v6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1791. if (ipset_rule_v6 == NULL) {
  1792. ipset_rule_v6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_IPSET_IPV6);
  1793. }
  1794. if (ipset_rule_v6 == NULL && check_no_speed_rule && conf->ipset_nftset.ipset_no_speed.ipv6_enable) {
  1795. ipset_rule_v6 = &conf->ipset_nftset.ipset_no_speed.ipv6;
  1796. }
  1797. }
  1798. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP_IGN) == 0) {
  1799. nftset_ip = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP);
  1800. if (nftset_ip == NULL) {
  1801. nftset_ip = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP);
  1802. }
  1803. if (nftset_ip == NULL && check_no_speed_rule && conf->ipset_nftset.nftset_no_speed.ip_enable) {
  1804. nftset_ip = &conf->ipset_nftset.nftset_no_speed.ip;
  1805. }
  1806. }
  1807. if (!rule_flags || (rule_flags->flags & DOMAIN_FLAG_NFTSET_IP6_IGN) == 0) {
  1808. nftset_ip6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1809. if (nftset_ip6 == NULL) {
  1810. nftset_ip6 = _dns_server_get_bind_ipset_nftset_rule(request, DOMAIN_RULE_NFTSET_IP6);
  1811. }
  1812. if (nftset_ip6 == NULL && check_no_speed_rule && conf->ipset_nftset.nftset_no_speed.ip6_enable) {
  1813. nftset_ip6 = &conf->ipset_nftset.nftset_no_speed.ip6;
  1814. }
  1815. }
  1816. if (!(ipset_rule || ipset_rule_v4 || ipset_rule_v6 || nftset_ip || nftset_ip6)) {
  1817. return 0;
  1818. }
  1819. timeout_value = request->ip_ttl * 3;
  1820. if (timeout_value == 0) {
  1821. timeout_value = _dns_server_get_conf_ttl(request, 0) * 3;
  1822. }
  1823. if (conf->ipset_nftset.ipset_timeout_enable) {
  1824. ipset_timeout_value = timeout_value;
  1825. }
  1826. if (conf->ipset_nftset.nftset_timeout_enable) {
  1827. nftset_timeout_value = timeout_value;
  1828. }
  1829. for (j = 1; j < DNS_RRS_OPT; j++) {
  1830. rrs = dns_get_rrs_start(context->packet, j, &rr_count);
  1831. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(context->packet, rrs)) {
  1832. switch (rrs->type) {
  1833. case DNS_T_A: {
  1834. unsigned char addr[4];
  1835. if (context->qtype != DNS_T_A) {
  1836. break;
  1837. }
  1838. /* get A result */
  1839. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1840. rule = ipset_rule_v4 ? ipset_rule_v4 : ipset_rule;
  1841. _dns_server_add_ipset_nftset(request, rule, nftset_ip, addr, DNS_RR_A_LEN, ipset_timeout_value,
  1842. nftset_timeout_value);
  1843. } break;
  1844. case DNS_T_AAAA: {
  1845. unsigned char addr[16];
  1846. if (context->qtype != DNS_T_AAAA) {
  1847. /* ignore non-matched query type */
  1848. break;
  1849. }
  1850. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  1851. rule = ipset_rule_v6 ? ipset_rule_v6 : ipset_rule;
  1852. _dns_server_add_ipset_nftset(request, rule, nftset_ip6, addr, DNS_RR_AAAA_LEN, ipset_timeout_value,
  1853. nftset_timeout_value);
  1854. } break;
  1855. case DNS_T_HTTPS: {
  1856. char target[DNS_MAX_CNAME_LEN] = {0};
  1857. struct dns_https_param *p = NULL;
  1858. int priority = 0;
  1859. int ret = dns_get_HTTPS_svcparm_start(rrs, &p, name, DNS_MAX_CNAME_LEN, &ttl, &priority, target,
  1860. DNS_MAX_CNAME_LEN);
  1861. if (ret != 0) {
  1862. tlog(TLOG_WARN, "get HTTPS svcparm failed");
  1863. return -1;
  1864. }
  1865. for (; p; p = dns_get_HTTPS_svcparm_next(rrs, p)) {
  1866. switch (p->key) {
  1867. case DNS_HTTPS_T_IPV4HINT: {
  1868. unsigned char *addr;
  1869. for (int k = 0; k < p->len / 4; k++) {
  1870. addr = p->value + k * 4;
  1871. rule = ipset_rule_v4 ? ipset_rule_v4 : ipset_rule;
  1872. _dns_server_add_ipset_nftset(request, rule, nftset_ip, addr, DNS_RR_A_LEN,
  1873. ipset_timeout_value, nftset_timeout_value);
  1874. }
  1875. } break;
  1876. case DNS_HTTPS_T_IPV6HINT: {
  1877. unsigned char *addr;
  1878. for (int k = 0; k < p->len / 16; k++) {
  1879. addr = p->value + k * 16;
  1880. rule = ipset_rule_v6 ? ipset_rule_v6 : ipset_rule;
  1881. _dns_server_add_ipset_nftset(request, rule, nftset_ip6, addr, DNS_RR_AAAA_LEN,
  1882. ipset_timeout_value, nftset_timeout_value);
  1883. }
  1884. } break;
  1885. default:
  1886. break;
  1887. }
  1888. }
  1889. } break;
  1890. default:
  1891. break;
  1892. }
  1893. }
  1894. }
  1895. return 0;
  1896. }
  1897. static int _dns_result_child_post(struct dns_server_post_context *context)
  1898. {
  1899. struct dns_request *request = context->request;
  1900. struct dns_request *parent_request = request->parent_request;
  1901. DNS_CHILD_POST_RESULT child_ret = DNS_CHILD_POST_FAIL;
  1902. /* not a child request */
  1903. if (parent_request == NULL) {
  1904. return 0;
  1905. }
  1906. if (request->child_callback) {
  1907. int is_first_resp = context->no_release_parent;
  1908. child_ret = request->child_callback(parent_request, request, is_first_resp);
  1909. }
  1910. if (context->do_reply == 1 && child_ret == DNS_CHILD_POST_SUCCESS) {
  1911. struct dns_server_post_context parent_context;
  1912. _dns_server_post_context_init(&parent_context, parent_request);
  1913. parent_context.do_cache = context->do_cache;
  1914. parent_context.do_ipset = context->do_ipset;
  1915. parent_context.do_force_soa = context->do_force_soa;
  1916. parent_context.do_audit = context->do_audit;
  1917. parent_context.do_reply = context->do_reply;
  1918. parent_context.reply_ttl = context->reply_ttl;
  1919. parent_context.cache_ttl = context->cache_ttl;
  1920. parent_context.skip_notify_count = context->skip_notify_count;
  1921. parent_context.select_all_best_ip = 1;
  1922. parent_context.no_release_parent = context->no_release_parent;
  1923. _dns_request_post(&parent_context);
  1924. _dns_server_reply_all_pending_list(parent_request, &parent_context);
  1925. }
  1926. if (context->no_release_parent == 0) {
  1927. tlog(TLOG_DEBUG, "query %s with child %s done", parent_request->domain, request->domain);
  1928. request->parent_request = NULL;
  1929. parent_request->request_wait--;
  1930. _dns_server_request_release(parent_request);
  1931. }
  1932. if (child_ret == DNS_CHILD_POST_FAIL) {
  1933. return -1;
  1934. }
  1935. return 0;
  1936. }
  1937. static int _dns_request_update_id_ttl(struct dns_server_post_context *context)
  1938. {
  1939. int ttl = context->reply_ttl;
  1940. struct dns_request *request = context->request;
  1941. if (request->conf->dns_rr_ttl_reply_max > 0) {
  1942. if (request->ip_ttl > request->conf->dns_rr_ttl_reply_max && ttl == 0) {
  1943. ttl = request->ip_ttl;
  1944. }
  1945. if (ttl > request->conf->dns_rr_ttl_reply_max) {
  1946. ttl = request->conf->dns_rr_ttl_reply_max;
  1947. }
  1948. if (ttl == 0) {
  1949. ttl = request->conf->dns_rr_ttl_reply_max;
  1950. }
  1951. }
  1952. if (ttl == 0) {
  1953. ttl = request->ip_ttl;
  1954. if (ttl == 0) {
  1955. ttl = _dns_server_get_conf_ttl(request, ttl);
  1956. }
  1957. }
  1958. struct dns_update_param param;
  1959. param.id = request->id;
  1960. param.cname_ttl = ttl;
  1961. param.ip_ttl = ttl;
  1962. if (dns_packet_update(context->inpacket, context->inpacket_len, &param) != 0) {
  1963. tlog(TLOG_DEBUG, "update packet info failed.");
  1964. }
  1965. return 0;
  1966. }
  1967. static int _dns_request_post(struct dns_server_post_context *context)
  1968. {
  1969. struct dns_request *request = context->request;
  1970. char clientip[DNS_MAX_CNAME_LEN] = {0};
  1971. int ret = 0;
  1972. tlog(TLOG_DEBUG, "reply %s qtype: %d, rcode: %d, reply: %d", request->domain, request->qtype,
  1973. context->packet->head.rcode, context->do_reply);
  1974. /* init a new DNS packet */
  1975. ret = _dns_setup_dns_packet(context);
  1976. if (ret != 0) {
  1977. tlog(TLOG_ERROR, "setup dns packet failed.");
  1978. return -1;
  1979. }
  1980. ret = _dns_setup_dns_raw_packet(context);
  1981. if (ret != 0) {
  1982. tlog(TLOG_ERROR, "set dns raw packet failed.");
  1983. return -1;
  1984. }
  1985. /* cache reply packet */
  1986. ret = _dns_cache_reply_packet(context);
  1987. if (ret != 0) {
  1988. tlog(TLOG_WARN, "cache packet for %s failed.", request->domain);
  1989. }
  1990. /* setup ipset */
  1991. _dns_server_setup_ipset_nftset_packet(context);
  1992. /* reply child request */
  1993. _dns_result_child_post(context);
  1994. if (context->do_reply == 0) {
  1995. return 0;
  1996. }
  1997. if (context->skip_notify_count == 0) {
  1998. if (atomic_inc_return(&request->notified) != 1) {
  1999. tlog(TLOG_DEBUG, "skip reply %s %d", request->domain, request->qtype);
  2000. return 0;
  2001. }
  2002. }
  2003. /* log audit log */
  2004. _dns_server_audit_log(context);
  2005. /* reply API callback */
  2006. _dns_result_callback(context);
  2007. if (request->conn == NULL) {
  2008. return 0;
  2009. }
  2010. ret = _dns_request_update_id_ttl(context);
  2011. if (ret != 0) {
  2012. tlog(TLOG_ERROR, "update packet ttl failed.");
  2013. return -1;
  2014. }
  2015. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  2016. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype, request->id,
  2017. request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  2018. get_tick_count() - request->send_tick);
  2019. ret = _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  2020. if (ret != 0) {
  2021. tlog(TLOG_DEBUG, "reply raw packet to client failed.");
  2022. return -1;
  2023. }
  2024. return 0;
  2025. }
  2026. static int _dns_server_reply_SOA(int rcode, struct dns_request *request)
  2027. {
  2028. /* return SOA record */
  2029. request->rcode = rcode;
  2030. if (request->ip_ttl <= 0) {
  2031. request->ip_ttl = DNS_SERVER_SOA_TTL;
  2032. }
  2033. _dns_server_setup_soa(request);
  2034. struct dns_server_post_context context;
  2035. _dns_server_post_context_init(&context, request);
  2036. context.do_audit = 1;
  2037. context.do_reply = 1;
  2038. context.do_force_soa = 1;
  2039. _dns_request_post(&context);
  2040. return 0;
  2041. }
  2042. static int _dns_server_reply_all_pending_list(struct dns_request *request, struct dns_server_post_context *context)
  2043. {
  2044. struct dns_request_pending_list *pending_list = NULL;
  2045. struct dns_request *req = NULL;
  2046. struct dns_request *tmp = NULL;
  2047. int ret = 0;
  2048. if (request->request_pending_list == NULL) {
  2049. return 0;
  2050. }
  2051. pthread_mutex_lock(&server.request_pending_lock);
  2052. pending_list = request->request_pending_list;
  2053. request->request_pending_list = NULL;
  2054. hlist_del_init(&pending_list->node);
  2055. pthread_mutex_unlock(&server.request_pending_lock);
  2056. pthread_mutex_lock(&pending_list->request_list_lock);
  2057. list_del_init(&request->pending_list);
  2058. list_for_each_entry_safe(req, tmp, &(pending_list->request_list), pending_list)
  2059. {
  2060. struct dns_server_post_context context_pending;
  2061. _dns_server_post_context_init_from(&context_pending, req, context->packet, context->inpacket,
  2062. context->inpacket_len);
  2063. req->dualstack_selection = request->dualstack_selection;
  2064. req->dualstack_selection_query = request->dualstack_selection_query;
  2065. req->dualstack_selection_force_soa = request->dualstack_selection_force_soa;
  2066. req->dualstack_selection_has_ip = request->dualstack_selection_has_ip;
  2067. req->dualstack_selection_ping_time = request->dualstack_selection_ping_time;
  2068. req->ping_time = request->ping_time;
  2069. _dns_server_get_answer(&context_pending);
  2070. context_pending.do_cache = 0;
  2071. context_pending.do_audit = context->do_audit;
  2072. context_pending.do_reply = context->do_reply;
  2073. context_pending.do_force_soa = context->do_force_soa;
  2074. context_pending.do_ipset = 0;
  2075. context_pending.reply_ttl = request->ip_ttl;
  2076. context_pending.no_release_parent = 0;
  2077. _dns_server_reply_passthrough(&context_pending);
  2078. req->request_pending_list = NULL;
  2079. list_del_init(&req->pending_list);
  2080. _dns_server_request_release_complete(req, 0);
  2081. }
  2082. pthread_mutex_unlock(&pending_list->request_list_lock);
  2083. free(pending_list);
  2084. return ret;
  2085. }
  2086. static void _dns_server_need_append_mdns_local_cname(struct dns_request *request)
  2087. {
  2088. if (request->is_mdns_lookup == 0) {
  2089. return;
  2090. }
  2091. if (request->has_cname != 0) {
  2092. return;
  2093. }
  2094. if (request->domain[0] == '\0') {
  2095. return;
  2096. }
  2097. if (strstr(request->domain, ".") != NULL) {
  2098. return;
  2099. }
  2100. request->has_cname = 1;
  2101. snprintf(request->cname, sizeof(request->cname), "%.*s.%s",
  2102. (int)(sizeof(request->cname) - sizeof(DNS_SERVER_GROUP_LOCAL) - 1), request->domain,
  2103. DNS_SERVER_GROUP_LOCAL);
  2104. return;
  2105. }
  2106. static void _dns_server_check_complete_dualstack(struct dns_request *request, struct dns_request *dualstack_request)
  2107. {
  2108. if (dualstack_request == NULL || request == NULL) {
  2109. return;
  2110. }
  2111. if (dualstack_request->qtype == DNS_T_A && request->conf->dns_dualstack_ip_allow_force_AAAA == 0) {
  2112. return;
  2113. }
  2114. if (dualstack_request->ping_time > 0) {
  2115. return;
  2116. }
  2117. if (dualstack_request->dualstack_selection_query == 1) {
  2118. return;
  2119. }
  2120. if (request->ping_time <= (request->conf->dns_dualstack_ip_selection_threshold * 10)) {
  2121. return;
  2122. }
  2123. dualstack_request->dualstack_selection_has_ip = request->has_ip;
  2124. dualstack_request->dualstack_selection_ping_time = request->ping_time;
  2125. dualstack_request->dualstack_selection_force_soa = 1;
  2126. _dns_server_request_complete(dualstack_request);
  2127. }
  2128. static int _dns_server_force_dualstack(struct dns_request *request)
  2129. {
  2130. /* for dualstack request as first pending request, check if need to choose another request*/
  2131. if (request->dualstack_request) {
  2132. struct dns_request *dualstack_request = request->dualstack_request;
  2133. request->dualstack_selection_has_ip = dualstack_request->has_ip;
  2134. request->dualstack_selection_ping_time = dualstack_request->ping_time;
  2135. request->dualstack_selection = 1;
  2136. /* if another request still waiting for ping, force complete another request */
  2137. _dns_server_check_complete_dualstack(request, dualstack_request);
  2138. }
  2139. if (request->dualstack_selection_ping_time < 0 || request->dualstack_selection == 0) {
  2140. return -1;
  2141. }
  2142. if (request->has_soa || request->rcode != DNS_RC_NOERROR) {
  2143. return -1;
  2144. }
  2145. if (request->dualstack_selection_has_ip == 0) {
  2146. return -1;
  2147. }
  2148. if (request->ping_time > 0) {
  2149. if (request->dualstack_selection_ping_time + (request->conf->dns_dualstack_ip_selection_threshold * 10) >
  2150. request->ping_time) {
  2151. return -1;
  2152. }
  2153. }
  2154. if (request->qtype == DNS_T_A && request->conf->dns_dualstack_ip_allow_force_AAAA == 0) {
  2155. return -1;
  2156. }
  2157. /* if ipv4 is fasting than ipv6, add ipv4 to cache, and return SOA for AAAA request */
  2158. tlog(TLOG_INFO, "result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d", request->domain,
  2159. request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id, request->ping_time,
  2160. request->dualstack_selection_ping_time);
  2161. request->dualstack_selection_force_soa = 1;
  2162. return 0;
  2163. }
  2164. static int _dns_server_request_complete_with_all_IPs(struct dns_request *request, int with_all_ips)
  2165. {
  2166. int ttl = 0;
  2167. struct dns_server_post_context context;
  2168. if (request->rcode == DNS_RC_SERVFAIL || request->rcode == DNS_RC_NXDOMAIN) {
  2169. ttl = DNS_SERVER_FAIL_TTL;
  2170. }
  2171. if (request->ip_ttl == 0) {
  2172. request->ip_ttl = ttl;
  2173. }
  2174. if (request->prefetch == 1) {
  2175. return 0;
  2176. }
  2177. if (atomic_inc_return(&request->notified) != 1) {
  2178. return 0;
  2179. }
  2180. if (request->has_ip != 0 && request->passthrough == 0) {
  2181. request->has_soa = 0;
  2182. if (request->has_ping_result == 0 && request->ip_ttl > DNS_SERVER_TMOUT_TTL) {
  2183. request->ip_ttl = DNS_SERVER_TMOUT_TTL;
  2184. }
  2185. ttl = request->ip_ttl;
  2186. }
  2187. if (_dns_server_force_dualstack(request) == 0) {
  2188. goto out;
  2189. }
  2190. _dns_server_need_append_mdns_local_cname(request);
  2191. if (request->has_soa) {
  2192. tlog(TLOG_INFO, "result: %s, qtype: %d, SOA", request->domain, request->qtype);
  2193. } else {
  2194. if (request->qtype == DNS_T_A) {
  2195. tlog(TLOG_INFO, "result: %s, qtype: %d, rtt: %.1f ms, %d.%d.%d.%d", request->domain, request->qtype,
  2196. ((float)request->ping_time) / 10, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  2197. request->ip_addr[3]);
  2198. } else if (request->qtype == DNS_T_AAAA) {
  2199. tlog(TLOG_INFO,
  2200. "result: %s, qtype: %d, rtt: %.1f ms, "
  2201. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2202. request->domain, request->qtype, ((float)request->ping_time) / 10, request->ip_addr[0],
  2203. request->ip_addr[1], request->ip_addr[2], request->ip_addr[3], request->ip_addr[4],
  2204. request->ip_addr[5], request->ip_addr[6], request->ip_addr[7], request->ip_addr[8],
  2205. request->ip_addr[9], request->ip_addr[10], request->ip_addr[11], request->ip_addr[12],
  2206. request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  2207. }
  2208. if (request->rcode == DNS_RC_SERVFAIL && request->has_ip) {
  2209. request->rcode = DNS_RC_NOERROR;
  2210. }
  2211. }
  2212. out:
  2213. _dns_server_post_context_init(&context, request);
  2214. context.do_cache = 1;
  2215. context.do_ipset = 1;
  2216. context.do_force_soa = request->dualstack_selection_force_soa | request->force_soa;
  2217. context.do_audit = 1;
  2218. context.do_reply = 1;
  2219. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  2220. context.skip_notify_count = 1;
  2221. context.select_all_best_ip = with_all_ips;
  2222. context.no_release_parent = 1;
  2223. _dns_request_post(&context);
  2224. return _dns_server_reply_all_pending_list(request, &context);
  2225. }
  2226. static int _dns_server_request_complete(struct dns_request *request)
  2227. {
  2228. return _dns_server_request_complete_with_all_IPs(request, 0);
  2229. }
  2230. static int _dns_ip_address_check_add(struct dns_request *request, char *cname, unsigned char *addr,
  2231. dns_type_t addr_type, int ping_time, struct dns_ip_address **out_addr_map)
  2232. {
  2233. uint32_t key = 0;
  2234. struct dns_ip_address *addr_map = NULL;
  2235. int addr_len = 0;
  2236. if (ping_time == 0) {
  2237. ping_time = -1;
  2238. }
  2239. if (addr_type == DNS_T_A) {
  2240. addr_len = DNS_RR_A_LEN;
  2241. } else if (addr_type == DNS_T_AAAA) {
  2242. addr_len = DNS_RR_AAAA_LEN;
  2243. } else {
  2244. return -1;
  2245. }
  2246. /* store the ip address and the number of hits */
  2247. key = jhash(addr, addr_len, 0);
  2248. key = jhash(&addr_type, sizeof(addr_type), key);
  2249. pthread_mutex_lock(&request->ip_map_lock);
  2250. hash_for_each_possible(request->ip_map, addr_map, node, key)
  2251. {
  2252. if (addr_map->addr_type != addr_type) {
  2253. continue;
  2254. }
  2255. if (memcmp(addr_map->ip_addr, addr, addr_len) != 0) {
  2256. continue;
  2257. }
  2258. addr_map->hitnum++;
  2259. addr_map->recv_tick = get_tick_count();
  2260. pthread_mutex_unlock(&request->ip_map_lock);
  2261. return -1;
  2262. }
  2263. atomic_inc(&request->ip_map_num);
  2264. addr_map = malloc(sizeof(*addr_map));
  2265. if (addr_map == NULL) {
  2266. pthread_mutex_unlock(&request->ip_map_lock);
  2267. tlog(TLOG_ERROR, "malloc addr map failed");
  2268. return -1;
  2269. }
  2270. memset(addr_map, 0, sizeof(*addr_map));
  2271. addr_map->addr_type = addr_type;
  2272. addr_map->hitnum = 1;
  2273. addr_map->recv_tick = get_tick_count();
  2274. addr_map->ping_time = ping_time;
  2275. memcpy(addr_map->ip_addr, addr, addr_len);
  2276. if (request->conf->dns_force_no_cname == 0) {
  2277. safe_strncpy(addr_map->cname, cname, DNS_MAX_CNAME_LEN);
  2278. }
  2279. hash_add(request->ip_map, &addr_map->node, key);
  2280. pthread_mutex_unlock(&request->ip_map_lock);
  2281. if (out_addr_map != NULL) {
  2282. *out_addr_map = addr_map;
  2283. }
  2284. return 0;
  2285. }
  2286. static void _dns_server_request_remove_all(void)
  2287. {
  2288. struct dns_request *request = NULL;
  2289. struct dns_request *tmp = NULL;
  2290. LIST_HEAD(remove_list);
  2291. pthread_mutex_lock(&server.request_list_lock);
  2292. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  2293. {
  2294. list_add_tail(&request->check_list, &remove_list);
  2295. _dns_server_request_get(request);
  2296. }
  2297. pthread_mutex_unlock(&server.request_list_lock);
  2298. list_for_each_entry_safe(request, tmp, &remove_list, check_list)
  2299. {
  2300. _dns_server_request_complete(request);
  2301. _dns_server_request_release(request);
  2302. }
  2303. }
  2304. static void _dns_server_select_possible_ipaddress(struct dns_request *request)
  2305. {
  2306. int maxhit = 0;
  2307. unsigned long bucket = 0;
  2308. unsigned long max_recv_tick = 0;
  2309. struct dns_ip_address *addr_map = NULL;
  2310. struct dns_ip_address *maxhit_addr_map = NULL;
  2311. struct dns_ip_address *last_recv_addr_map = NULL;
  2312. struct dns_ip_address *selected_addr_map = NULL;
  2313. struct hlist_node *tmp = NULL;
  2314. if (atomic_read(&request->notified) > 0) {
  2315. return;
  2316. }
  2317. if (request->no_select_possible_ip != 0) {
  2318. return;
  2319. }
  2320. if (request->ping_time > 0) {
  2321. return;
  2322. }
  2323. /* Return the most likely correct IP address */
  2324. /* Returns the IP with the most hits, or the last returned record is considered to be the most likely
  2325. * correct. */
  2326. pthread_mutex_lock(&request->ip_map_lock);
  2327. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  2328. {
  2329. if (addr_map->addr_type != request->qtype) {
  2330. continue;
  2331. }
  2332. if (addr_map->recv_tick - request->send_tick > max_recv_tick) {
  2333. max_recv_tick = addr_map->recv_tick - request->send_tick;
  2334. last_recv_addr_map = addr_map;
  2335. }
  2336. if (addr_map->hitnum > maxhit) {
  2337. maxhit = addr_map->hitnum;
  2338. maxhit_addr_map = addr_map;
  2339. }
  2340. }
  2341. pthread_mutex_unlock(&request->ip_map_lock);
  2342. if (maxhit_addr_map && maxhit > 1) {
  2343. selected_addr_map = maxhit_addr_map;
  2344. } else if (last_recv_addr_map) {
  2345. selected_addr_map = last_recv_addr_map;
  2346. }
  2347. if (selected_addr_map == NULL) {
  2348. return;
  2349. }
  2350. tlog(TLOG_DEBUG, "select best ip address, %s", request->domain);
  2351. switch (request->qtype) {
  2352. case DNS_T_A: {
  2353. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_A_LEN);
  2354. request->ip_ttl = request->conf->dns_rr_ttl_min > 0 ? request->conf->dns_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  2355. tlog(TLOG_DEBUG, "possible result: %s, rcode: %d, hitnum: %d, %d.%d.%d.%d", request->domain, request->rcode,
  2356. selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1], request->ip_addr[2],
  2357. request->ip_addr[3]);
  2358. } break;
  2359. case DNS_T_AAAA: {
  2360. memcpy(request->ip_addr, selected_addr_map->ip_addr, DNS_RR_AAAA_LEN);
  2361. request->ip_ttl = request->conf->dns_rr_ttl_min > 0 ? request->conf->dns_rr_ttl_min : DNS_SERVER_TMOUT_TTL;
  2362. tlog(TLOG_DEBUG,
  2363. "possible result: %s, rcode: %d, hitnum: %d, "
  2364. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  2365. request->domain, request->rcode, selected_addr_map->hitnum, request->ip_addr[0], request->ip_addr[1],
  2366. request->ip_addr[2], request->ip_addr[3], request->ip_addr[4], request->ip_addr[5], request->ip_addr[6],
  2367. request->ip_addr[7], request->ip_addr[8], request->ip_addr[9], request->ip_addr[10], request->ip_addr[11],
  2368. request->ip_addr[12], request->ip_addr[13], request->ip_addr[14], request->ip_addr[15]);
  2369. } break;
  2370. default:
  2371. break;
  2372. }
  2373. }
  2374. static void _dns_server_delete_request(struct dns_request *request)
  2375. {
  2376. if (atomic_read(&request->notified) == 0) {
  2377. _dns_server_request_complete(request);
  2378. }
  2379. if (request->conn) {
  2380. _dns_server_conn_release(request->conn);
  2381. }
  2382. pthread_mutex_destroy(&request->ip_map_lock);
  2383. if (request->https_svcb) {
  2384. free(request->https_svcb);
  2385. }
  2386. memset(request, 0, sizeof(*request));
  2387. free(request);
  2388. atomic_dec(&server.request_num);
  2389. }
  2390. static void _dns_server_complete_with_multi_ipaddress(struct dns_request *request)
  2391. {
  2392. struct dns_server_post_context context;
  2393. int do_reply = 0;
  2394. if (atomic_read(&request->ip_map_num) > 0) {
  2395. request->has_soa = 0;
  2396. }
  2397. if (atomic_inc_return(&request->notified) == 1) {
  2398. do_reply = 1;
  2399. _dns_server_force_dualstack(request);
  2400. }
  2401. if (request->passthrough && do_reply == 0) {
  2402. return;
  2403. }
  2404. _dns_server_need_append_mdns_local_cname(request);
  2405. _dns_server_post_context_init(&context, request);
  2406. context.do_cache = 1;
  2407. context.do_ipset = 1;
  2408. context.do_reply = do_reply;
  2409. context.do_log_result = 1;
  2410. context.select_all_best_ip = 1;
  2411. context.skip_notify_count = 1;
  2412. context.do_force_soa = request->dualstack_selection_force_soa | request->force_soa;
  2413. _dns_request_post(&context);
  2414. _dns_server_reply_all_pending_list(request, &context);
  2415. }
  2416. static void _dns_server_request_release_complete(struct dns_request *request, int do_complete)
  2417. {
  2418. struct dns_ip_address *addr_map = NULL;
  2419. struct hlist_node *tmp = NULL;
  2420. unsigned long bucket = 0;
  2421. pthread_mutex_lock(&server.request_list_lock);
  2422. int refcnt = atomic_dec_return(&request->refcnt);
  2423. if (refcnt) {
  2424. pthread_mutex_unlock(&server.request_list_lock);
  2425. if (refcnt < 0) {
  2426. BUG("BUG: refcnt is %d, domain %s, qtype %d", refcnt, request->domain, request->qtype);
  2427. }
  2428. return;
  2429. }
  2430. list_del_init(&request->list);
  2431. list_del_init(&request->check_list);
  2432. pthread_mutex_unlock(&server.request_list_lock);
  2433. pthread_mutex_lock(&server.request_pending_lock);
  2434. list_del_init(&request->pending_list);
  2435. pthread_mutex_unlock(&server.request_pending_lock);
  2436. if (do_complete) {
  2437. /* Select max hit ip address, and return to client */
  2438. _dns_server_select_possible_ipaddress(request);
  2439. _dns_server_complete_with_multi_ipaddress(request);
  2440. }
  2441. if (request->parent_request != NULL) {
  2442. _dns_server_request_release(request->parent_request);
  2443. request->parent_request = NULL;
  2444. }
  2445. atomic_inc(&request->refcnt);
  2446. smartdns_plugin_func_server_complete_request(request);
  2447. if (atomic_dec_return(&request->refcnt) > 0) {
  2448. /* plugin may hold request. */
  2449. return;
  2450. }
  2451. pthread_mutex_lock(&request->ip_map_lock);
  2452. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  2453. {
  2454. hash_del(&addr_map->node);
  2455. free(addr_map);
  2456. }
  2457. pthread_mutex_unlock(&request->ip_map_lock);
  2458. _dns_server_delete_request(request);
  2459. }
  2460. static void _dns_server_request_release(struct dns_request *request)
  2461. {
  2462. _dns_server_request_release_complete(request, 1);
  2463. }
  2464. static void _dns_server_request_get(struct dns_request *request)
  2465. {
  2466. if (atomic_inc_return(&request->refcnt) <= 0) {
  2467. BUG("BUG: request ref is invalid, %s", request->domain);
  2468. }
  2469. }
  2470. struct sockaddr *dns_server_request_get_remote_addr(struct dns_request *request)
  2471. {
  2472. return &request->addr;
  2473. }
  2474. struct sockaddr *dns_server_request_get_local_addr(struct dns_request *request)
  2475. {
  2476. return (struct sockaddr *)&request->localaddr;
  2477. }
  2478. const char *dns_server_request_get_group_name(struct dns_request *request)
  2479. {
  2480. return request->dns_group_name;
  2481. }
  2482. const char *dns_server_request_get_domain(struct dns_request *request)
  2483. {
  2484. return request->domain;
  2485. }
  2486. int dns_server_request_get_qtype(struct dns_request *request)
  2487. {
  2488. return request->qtype;
  2489. }
  2490. int dns_server_request_get_qclass(struct dns_request *request)
  2491. {
  2492. return request->qclass;
  2493. }
  2494. int dns_server_request_get_id(struct dns_request *request)
  2495. {
  2496. return request->id;
  2497. }
  2498. int dns_server_request_get_rcode(struct dns_request *request)
  2499. {
  2500. return request->rcode;
  2501. }
  2502. void dns_server_request_get(struct dns_request *request)
  2503. {
  2504. _dns_server_request_get(request);
  2505. }
  2506. void dns_server_request_put(struct dns_request *request)
  2507. {
  2508. _dns_server_request_release(request);
  2509. }
  2510. void dns_server_request_set_private(struct dns_request *request, void *private_data)
  2511. {
  2512. request->private_data = private_data;
  2513. }
  2514. void *dns_server_request_get_private(struct dns_request *request)
  2515. {
  2516. return request->private_data;
  2517. }
  2518. static int _dns_server_set_to_pending_list(struct dns_request *request)
  2519. {
  2520. struct dns_request_pending_list *pending_list = NULL;
  2521. struct dns_request_pending_list *pending_list_tmp = NULL;
  2522. uint32_t key = 0;
  2523. int ret = -1;
  2524. if (request->qtype != DNS_T_A && request->qtype != DNS_T_AAAA) {
  2525. return ret;
  2526. }
  2527. key = hash_string(request->domain);
  2528. key = hash_string_initval(request->dns_group_name, key);
  2529. key = jhash(&(request->qtype), sizeof(request->qtype), key);
  2530. key = jhash(&(request->server_flags), sizeof(request->server_flags), key);
  2531. pthread_mutex_lock(&server.request_pending_lock);
  2532. hash_for_each_possible(server.request_pending, pending_list_tmp, node, key)
  2533. {
  2534. if (request->qtype != pending_list_tmp->qtype) {
  2535. continue;
  2536. }
  2537. if (request->server_flags != pending_list_tmp->server_flags) {
  2538. continue;
  2539. }
  2540. if (strcmp(request->dns_group_name, pending_list_tmp->dns_group_name) != 0) {
  2541. continue;
  2542. }
  2543. if (strncmp(request->domain, pending_list_tmp->domain, DNS_MAX_CNAME_LEN) != 0) {
  2544. continue;
  2545. }
  2546. pending_list = pending_list_tmp;
  2547. break;
  2548. }
  2549. if (pending_list == NULL) {
  2550. pending_list = malloc(sizeof(*pending_list));
  2551. if (pending_list == NULL) {
  2552. ret = -1;
  2553. goto out;
  2554. }
  2555. memset(pending_list, 0, sizeof(*pending_list));
  2556. pthread_mutex_init(&pending_list->request_list_lock, NULL);
  2557. INIT_LIST_HEAD(&pending_list->request_list);
  2558. INIT_HLIST_NODE(&pending_list->node);
  2559. pending_list->qtype = request->qtype;
  2560. pending_list->server_flags = request->server_flags;
  2561. safe_strncpy(pending_list->domain, request->domain, DNS_MAX_CNAME_LEN);
  2562. safe_strncpy(pending_list->dns_group_name, request->dns_group_name, DNS_GROUP_NAME_LEN);
  2563. hash_add(server.request_pending, &pending_list->node, key);
  2564. request->request_pending_list = pending_list;
  2565. } else {
  2566. ret = 0;
  2567. }
  2568. if (ret == 0) {
  2569. _dns_server_request_get(request);
  2570. }
  2571. list_add_tail(&request->pending_list, &pending_list->request_list);
  2572. out:
  2573. pthread_mutex_unlock(&server.request_pending_lock);
  2574. return ret;
  2575. }
  2576. static struct dns_request *_dns_server_new_request(void)
  2577. {
  2578. struct dns_request *request = NULL;
  2579. request = malloc(sizeof(*request));
  2580. if (request == NULL) {
  2581. tlog(TLOG_ERROR, "malloc request failed.\n");
  2582. goto errout;
  2583. }
  2584. memset(request, 0, sizeof(*request));
  2585. pthread_mutex_init(&request->ip_map_lock, NULL);
  2586. atomic_set(&request->adblock, 0);
  2587. atomic_set(&request->soa_num, 0);
  2588. atomic_set(&request->ip_map_num, 0);
  2589. atomic_set(&request->refcnt, 0);
  2590. atomic_set(&request->notified, 0);
  2591. atomic_set(&request->do_callback, 0);
  2592. request->ping_time = -1;
  2593. request->prefetch = 0;
  2594. request->dualstack_selection = 0;
  2595. request->dualstack_selection_ping_time = -1;
  2596. request->rcode = DNS_RC_SERVFAIL;
  2597. request->conn = NULL;
  2598. request->qclass = DNS_C_IN;
  2599. request->result_callback = NULL;
  2600. request->conf = dns_server_get_default_rule_group();
  2601. request->check_order_list = &dns_conf_default_check_orders;
  2602. request->response_mode = dns_conf_default_response_mode;
  2603. INIT_LIST_HEAD(&request->list);
  2604. INIT_LIST_HEAD(&request->pending_list);
  2605. INIT_LIST_HEAD(&request->check_list);
  2606. hash_init(request->ip_map);
  2607. _dns_server_request_get(request);
  2608. atomic_add(1, &server.request_num);
  2609. return request;
  2610. errout:
  2611. return NULL;
  2612. }
  2613. static void _dns_server_ping_result(struct ping_host_struct *ping_host, const char *host, FAST_PING_RESULT result,
  2614. struct sockaddr *addr, socklen_t addr_len, int seqno, int ttl, struct timeval *tv,
  2615. int error, void *userptr)
  2616. {
  2617. struct dns_request *request = userptr;
  2618. int may_complete = 0;
  2619. int threshold = 100;
  2620. struct dns_ip_address *addr_map = NULL;
  2621. int last_rtt = request->ping_time;
  2622. if (request == NULL) {
  2623. return;
  2624. }
  2625. if (result == PING_RESULT_END) {
  2626. _dns_server_request_release(request);
  2627. fast_ping_stop(ping_host);
  2628. return;
  2629. } else if (result == PING_RESULT_TIMEOUT) {
  2630. tlog(TLOG_DEBUG, "ping %s timeout", host);
  2631. goto out;
  2632. return;
  2633. } else if (result == PING_RESULT_ERROR) {
  2634. if (addr->sa_family != AF_INET6) {
  2635. return;
  2636. }
  2637. if (is_ipv6_ready) {
  2638. if (error == EADDRNOTAVAIL || errno == EACCES) {
  2639. is_ipv6_ready = 0;
  2640. tlog(TLOG_ERROR, "IPV6 is not ready, disable all ipv6 feature, recheck after %ds",
  2641. IPV6_READY_CHECK_TIME);
  2642. }
  2643. }
  2644. return;
  2645. }
  2646. int rtt = tv->tv_sec * 10000 + tv->tv_usec / 100;
  2647. if (rtt == 0) {
  2648. rtt = 1;
  2649. }
  2650. if (result == PING_RESULT_RESPONSE) {
  2651. tlog(TLOG_DEBUG, "from %s: seq=%d time=%d, lasttime=%d id=%d", host, seqno, rtt, last_rtt, request->id);
  2652. } else {
  2653. tlog(TLOG_DEBUG, "from %s: seq=%d timeout, id=%d", host, seqno, request->id);
  2654. }
  2655. switch (addr->sa_family) {
  2656. case AF_INET: {
  2657. struct sockaddr_in *addr_in = NULL;
  2658. addr_in = (struct sockaddr_in *)addr;
  2659. addr_map = _dns_ip_address_get(request, (unsigned char *)&addr_in->sin_addr.s_addr, DNS_T_A);
  2660. if (addr_map) {
  2661. addr_map->ping_time = rtt;
  2662. }
  2663. if (request->ping_time > rtt || request->ping_time == -1) {
  2664. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, 4);
  2665. request->ip_addr_type = DNS_T_A;
  2666. request->ping_time = rtt;
  2667. request->has_cname = 0;
  2668. request->has_ip = 1;
  2669. if (addr_map && addr_map->cname[0] != 0) {
  2670. request->has_cname = 1;
  2671. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2672. } else {
  2673. request->has_cname = 0;
  2674. }
  2675. }
  2676. if (request->qtype == DNS_T_AAAA && request->dualstack_selection) {
  2677. if (request->ping_time < 0 && request->has_soa == 0) {
  2678. return;
  2679. }
  2680. }
  2681. if (request->qtype == DNS_T_A || request->qtype == DNS_T_HTTPS) {
  2682. request->has_ping_result = 1;
  2683. }
  2684. } break;
  2685. case AF_INET6: {
  2686. struct sockaddr_in6 *addr_in6 = NULL;
  2687. addr_in6 = (struct sockaddr_in6 *)addr;
  2688. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  2689. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr + 12, DNS_T_A);
  2690. if (addr_map) {
  2691. addr_map->ping_time = rtt;
  2692. }
  2693. if (request->ping_time > rtt || request->ping_time == -1) {
  2694. request->ping_time = rtt;
  2695. request->has_cname = 0;
  2696. request->has_ip = 1;
  2697. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr + 12, 4);
  2698. request->ip_addr_type = DNS_T_A;
  2699. if (addr_map && addr_map->cname[0] != 0) {
  2700. request->has_cname = 1;
  2701. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2702. } else {
  2703. request->has_cname = 0;
  2704. }
  2705. }
  2706. if (request->qtype == DNS_T_A || request->qtype == DNS_T_HTTPS) {
  2707. request->has_ping_result = 1;
  2708. }
  2709. } else {
  2710. addr_map = _dns_ip_address_get(request, addr_in6->sin6_addr.s6_addr, DNS_T_AAAA);
  2711. if (addr_map) {
  2712. addr_map->ping_time = rtt;
  2713. }
  2714. if (request->ping_time > rtt || request->ping_time == -1) {
  2715. request->ping_time = rtt;
  2716. request->has_cname = 0;
  2717. request->has_ip = 1;
  2718. memcpy(request->ip_addr, addr_in6->sin6_addr.s6_addr, 16);
  2719. request->ip_addr_type = DNS_T_AAAA;
  2720. if (addr_map && addr_map->cname[0] != 0) {
  2721. request->has_cname = 1;
  2722. safe_strncpy(request->cname, addr_map->cname, DNS_MAX_CNAME_LEN);
  2723. } else {
  2724. request->has_cname = 0;
  2725. }
  2726. }
  2727. if (request->qtype == DNS_T_AAAA || request->qtype == DNS_T_HTTPS) {
  2728. request->has_ping_result = 1;
  2729. }
  2730. }
  2731. } break;
  2732. default:
  2733. break;
  2734. }
  2735. out:
  2736. /* If the ping delay is less than the threshold, the result is returned */
  2737. if (request->ping_time > 0) {
  2738. if (request->ping_time < threshold) {
  2739. may_complete = 1;
  2740. } else if (request->ping_time < (int)(get_tick_count() - request->send_tick)) {
  2741. may_complete = 1;
  2742. }
  2743. }
  2744. /* Get first ping result */
  2745. if (request->response_mode == DNS_RESPONSE_MODE_FIRST_PING_IP && last_rtt == -1 && request->ping_time > 0) {
  2746. may_complete = 1;
  2747. }
  2748. if (may_complete && request->has_ping_result == 1) {
  2749. _dns_server_request_complete(request);
  2750. }
  2751. }
  2752. static int _dns_server_ping(struct dns_request *request, PING_TYPE type, char *ip, int timeout)
  2753. {
  2754. if (fast_ping_start(type, ip, 1, 0, timeout, _dns_server_ping_result, request) == NULL) {
  2755. return -1;
  2756. }
  2757. return 0;
  2758. }
  2759. static int _dns_server_check_speed(struct dns_request *request, char *ip)
  2760. {
  2761. char tcp_ip[DNS_MAX_CNAME_LEN] = {0};
  2762. int port = 80;
  2763. int type = DOMAIN_CHECK_NONE;
  2764. int order = request->check_order;
  2765. int ping_timeout = DNS_PING_TIMEOUT;
  2766. unsigned long now = get_tick_count();
  2767. if (order >= DOMAIN_CHECK_NUM || request->check_order_list == NULL) {
  2768. return -1;
  2769. }
  2770. if (request->passthrough) {
  2771. return -1;
  2772. }
  2773. ping_timeout = ping_timeout - (now - request->send_tick);
  2774. if (ping_timeout > DNS_PING_TIMEOUT) {
  2775. ping_timeout = DNS_PING_TIMEOUT;
  2776. } else if (ping_timeout < 200) {
  2777. ping_timeout = 200;
  2778. }
  2779. port = request->check_order_list->orders[order].tcp_port;
  2780. type = request->check_order_list->orders[order].type;
  2781. switch (type) {
  2782. case DOMAIN_CHECK_ICMP:
  2783. tlog(TLOG_DEBUG, "ping %s with icmp, order: %d, timeout: %d", ip, order, ping_timeout);
  2784. return _dns_server_ping(request, PING_TYPE_ICMP, ip, ping_timeout);
  2785. break;
  2786. case DOMAIN_CHECK_TCP:
  2787. snprintf(tcp_ip, sizeof(tcp_ip), "%s:%d", ip, port);
  2788. tlog(TLOG_DEBUG, "ping %s with tcp, order: %d, timeout: %d", tcp_ip, order, ping_timeout);
  2789. return _dns_server_ping(request, PING_TYPE_TCP, tcp_ip, ping_timeout);
  2790. break;
  2791. default:
  2792. break;
  2793. }
  2794. return -1;
  2795. }
  2796. static void _dns_server_neighbor_cache_free_item(struct neighbor_cache_item *item)
  2797. {
  2798. hash_del(&item->node);
  2799. list_del_init(&item->list);
  2800. free(item);
  2801. atomic_dec(&server.neighbor_cache.cache_num);
  2802. }
  2803. static void _dns_server_neighbor_cache_free_last_used_item(void)
  2804. {
  2805. struct neighbor_cache_item *item = NULL;
  2806. if (atomic_read(&server.neighbor_cache.cache_num) < DNS_SERVER_NEIGHBOR_CACHE_MAX_NUM) {
  2807. return;
  2808. }
  2809. item = list_last_entry(&server.neighbor_cache.list, struct neighbor_cache_item, list);
  2810. if (item == NULL) {
  2811. return;
  2812. }
  2813. _dns_server_neighbor_cache_free_item(item);
  2814. }
  2815. static struct neighbor_cache_item *_dns_server_neighbor_cache_get_item(const uint8_t *net_addr, int net_addr_len)
  2816. {
  2817. struct neighbor_cache_item *item = NULL;
  2818. uint32_t key = 0;
  2819. key = jhash(net_addr, net_addr_len, 0);
  2820. hash_for_each_possible(server.neighbor_cache.cache, item, node, key)
  2821. {
  2822. if (item->ip_addr_len != net_addr_len) {
  2823. continue;
  2824. }
  2825. if (memcmp(item->ip_addr, net_addr, net_addr_len) == 0) {
  2826. break;
  2827. }
  2828. }
  2829. return item;
  2830. }
  2831. static int _dns_server_neighbor_cache_add(const uint8_t *net_addr, int net_addr_len, const uint8_t *mac)
  2832. {
  2833. struct neighbor_cache_item *item = NULL;
  2834. uint32_t key = 0;
  2835. if (net_addr_len > DNS_RR_AAAA_LEN) {
  2836. return -1;
  2837. }
  2838. item = _dns_server_neighbor_cache_get_item(net_addr, net_addr_len);
  2839. if (item == NULL) {
  2840. item = malloc(sizeof(*item));
  2841. memset(item, 0, sizeof(*item));
  2842. if (item == NULL) {
  2843. return -1;
  2844. }
  2845. INIT_LIST_HEAD(&item->list);
  2846. INIT_HLIST_NODE(&item->node);
  2847. }
  2848. memcpy(item->ip_addr, net_addr, net_addr_len);
  2849. item->ip_addr_len = net_addr_len;
  2850. item->last_update_time = time(NULL);
  2851. if (mac == NULL) {
  2852. item->has_mac = 0;
  2853. } else {
  2854. memcpy(item->mac, mac, 6);
  2855. item->has_mac = 1;
  2856. }
  2857. key = jhash(net_addr, net_addr_len, 0);
  2858. hash_del(&item->node);
  2859. hash_add(server.neighbor_cache.cache, &item->node, key);
  2860. list_del_init(&item->list);
  2861. list_add(&item->list, &server.neighbor_cache.list);
  2862. atomic_inc(&server.neighbor_cache.cache_num);
  2863. _dns_server_neighbor_cache_free_last_used_item();
  2864. return 0;
  2865. }
  2866. static int _dns_server_neighbors_callback(const uint8_t *net_addr, int net_addr_len, const uint8_t mac[6], void *arg)
  2867. {
  2868. struct neighbor_enum_args *args = arg;
  2869. _dns_server_neighbor_cache_add(net_addr, net_addr_len, mac);
  2870. if (net_addr_len != args->netaddr_len) {
  2871. return 0;
  2872. }
  2873. if (memcmp(net_addr, args->netaddr, net_addr_len) != 0) {
  2874. return 0;
  2875. }
  2876. args->group_mac = dns_server_rule_group_mac_get(mac);
  2877. return 1;
  2878. }
  2879. static int _dns_server_neighbor_cache_is_valid(struct neighbor_cache_item *item)
  2880. {
  2881. if (item == NULL) {
  2882. return -1;
  2883. }
  2884. time_t now = time(NULL);
  2885. if (item->last_update_time + DNS_SERVER_NEIGHBOR_CACHE_TIMEOUT < now) {
  2886. return -1;
  2887. }
  2888. if (item->has_mac) {
  2889. return 0;
  2890. }
  2891. if (item->last_update_time + DNS_SERVER_NEIGHBOR_CACHE_NOMAC_TIMEOUT < now) {
  2892. return -1;
  2893. }
  2894. return 0;
  2895. }
  2896. static struct dns_client_rules *_dns_server_get_client_rules_by_mac(uint8_t *netaddr, int netaddr_len)
  2897. {
  2898. struct client_roue_group_mac *group_mac = NULL;
  2899. struct neighbor_cache_item *item = NULL;
  2900. int family = AF_UNSPEC;
  2901. int ret = 0;
  2902. struct neighbor_enum_args args;
  2903. if (dns_conf_client_rule.mac_num == 0) {
  2904. return NULL;
  2905. }
  2906. item = _dns_server_neighbor_cache_get_item(netaddr, netaddr_len);
  2907. if (_dns_server_neighbor_cache_is_valid(item) == 0) {
  2908. if (item->has_mac == 0) {
  2909. return NULL;
  2910. }
  2911. group_mac = dns_server_rule_group_mac_get(item->mac);
  2912. if (group_mac != NULL) {
  2913. return group_mac->rules;
  2914. }
  2915. }
  2916. if (netaddr_len == 4) {
  2917. family = AF_INET;
  2918. } else if (netaddr_len == 16) {
  2919. family = AF_INET6;
  2920. }
  2921. args.group_mac = group_mac;
  2922. args.netaddr = netaddr;
  2923. args.netaddr_len = netaddr_len;
  2924. ret = netlink_get_neighbors(family, _dns_server_neighbors_callback, &args);
  2925. if (ret < 0) {
  2926. goto add_cache;
  2927. }
  2928. if (ret != 1 || args.group_mac == NULL) {
  2929. goto add_cache;
  2930. }
  2931. return args.group_mac->rules;
  2932. add_cache:
  2933. _dns_server_neighbor_cache_add(netaddr, netaddr_len, NULL);
  2934. return NULL;
  2935. }
  2936. static struct dns_client_rules *_dns_server_get_client_rules(struct sockaddr_storage *addr, socklen_t addr_len)
  2937. {
  2938. prefix_t prefix;
  2939. radix_node_t *node = NULL;
  2940. uint8_t *netaddr = NULL;
  2941. struct dns_client_rules *client_rules = NULL;
  2942. int netaddr_len = 0;
  2943. switch (addr->ss_family) {
  2944. case AF_INET: {
  2945. struct sockaddr_in *addr_in = NULL;
  2946. addr_in = (struct sockaddr_in *)addr;
  2947. netaddr = (unsigned char *)&(addr_in->sin_addr.s_addr);
  2948. netaddr_len = 4;
  2949. } break;
  2950. case AF_INET6: {
  2951. struct sockaddr_in6 *addr_in6 = NULL;
  2952. addr_in6 = (struct sockaddr_in6 *)addr;
  2953. if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
  2954. netaddr = addr_in6->sin6_addr.s6_addr + 12;
  2955. netaddr_len = 4;
  2956. } else {
  2957. netaddr = addr_in6->sin6_addr.s6_addr;
  2958. netaddr_len = 16;
  2959. }
  2960. } break;
  2961. default:
  2962. return NULL;
  2963. break;
  2964. }
  2965. client_rules = _dns_server_get_client_rules_by_mac(netaddr, netaddr_len);
  2966. if (client_rules != NULL) {
  2967. return client_rules;
  2968. }
  2969. if (prefix_from_blob(netaddr, netaddr_len, netaddr_len * 8, &prefix) == NULL) {
  2970. return NULL;
  2971. }
  2972. node = radix_search_best(dns_conf_client_rule.rule, &prefix);
  2973. if (node == NULL) {
  2974. return NULL;
  2975. }
  2976. client_rules = node->data;
  2977. return client_rules;
  2978. }
  2979. static struct dns_ip_rules *_dns_server_ip_rule_get(struct dns_request *request, unsigned char *addr, int addr_len,
  2980. dns_type_t addr_type)
  2981. {
  2982. prefix_t prefix;
  2983. radix_node_t *node = NULL;
  2984. struct dns_ip_rules *rule = NULL;
  2985. if (request->conf == NULL) {
  2986. return NULL;
  2987. }
  2988. /* Match IP address rules */
  2989. if (prefix_from_blob(addr, addr_len, addr_len * 8, &prefix) == NULL) {
  2990. return NULL;
  2991. }
  2992. switch (prefix.family) {
  2993. case AF_INET:
  2994. node = radix_search_best(request->conf->address_rule.ipv4, &prefix);
  2995. break;
  2996. case AF_INET6:
  2997. node = radix_search_best(request->conf->address_rule.ipv6, &prefix);
  2998. break;
  2999. default:
  3000. break;
  3001. }
  3002. if (node == NULL) {
  3003. return NULL;
  3004. }
  3005. if (node->data == NULL) {
  3006. return NULL;
  3007. }
  3008. rule = node->data;
  3009. return rule;
  3010. }
  3011. static int _dns_server_ip_rule_check(struct dns_request *request, struct dns_ip_rules *ip_rules, int result_flag)
  3012. {
  3013. struct ip_rule_flags *rule_flags = NULL;
  3014. if (ip_rules == NULL) {
  3015. goto rule_not_found;
  3016. }
  3017. rule_flags = container_of(ip_rules->rules[IP_RULE_FLAGS], struct ip_rule_flags, head);
  3018. if (rule_flags != NULL) {
  3019. if (rule_flags->flags & IP_RULE_FLAG_BOGUS) {
  3020. request->rcode = DNS_RC_NXDOMAIN;
  3021. request->has_soa = 1;
  3022. request->force_soa = 1;
  3023. _dns_server_setup_soa(request);
  3024. goto nxdomain;
  3025. }
  3026. /* blacklist-ip */
  3027. if (rule_flags->flags & IP_RULE_FLAG_BLACKLIST) {
  3028. if (result_flag & DNSSERVER_FLAG_BLACKLIST_IP) {
  3029. goto match;
  3030. }
  3031. }
  3032. /* ignore-ip */
  3033. if (rule_flags->flags & IP_RULE_FLAG_IP_IGNORE) {
  3034. goto skip;
  3035. }
  3036. }
  3037. if (ip_rules->rules[IP_RULE_ALIAS] != NULL) {
  3038. goto match;
  3039. }
  3040. rule_not_found:
  3041. if (result_flag & DNSSERVER_FLAG_WHITELIST_IP) {
  3042. if (rule_flags == NULL) {
  3043. goto skip;
  3044. }
  3045. if (!(rule_flags->flags & IP_RULE_FLAG_WHITELIST)) {
  3046. goto skip;
  3047. }
  3048. }
  3049. return -1;
  3050. skip:
  3051. return -2;
  3052. nxdomain:
  3053. return -3;
  3054. match:
  3055. if (request->rcode == DNS_RC_SERVFAIL) {
  3056. request->rcode = DNS_RC_NXDOMAIN;
  3057. }
  3058. return 0;
  3059. }
  3060. static int _dns_server_process_ip_alias(struct dns_request *request, struct dns_iplist_ip_addresses *alias,
  3061. unsigned char **paddrs, int *paddr_num, int max_paddr_num, int addr_len)
  3062. {
  3063. int addr_num = 0;
  3064. if (alias == NULL) {
  3065. return 0;
  3066. }
  3067. if (request == NULL) {
  3068. return -1;
  3069. }
  3070. if (alias->ipaddr_num <= 0) {
  3071. return 0;
  3072. }
  3073. for (int i = 0; i < alias->ipaddr_num && i < max_paddr_num; i++) {
  3074. if (alias->ipaddr[i].addr_len != addr_len) {
  3075. continue;
  3076. }
  3077. paddrs[i] = alias->ipaddr[i].addr;
  3078. addr_num++;
  3079. }
  3080. *paddr_num = addr_num;
  3081. return 0;
  3082. }
  3083. static int _dns_server_process_ip_rule(struct dns_request *request, unsigned char *addr, int addr_len,
  3084. dns_type_t addr_type, int result_flag, struct dns_iplist_ip_addresses **alias)
  3085. {
  3086. struct dns_ip_rules *ip_rules = NULL;
  3087. int ret = 0;
  3088. ip_rules = _dns_server_ip_rule_get(request, addr, addr_len, addr_type);
  3089. ret = _dns_server_ip_rule_check(request, ip_rules, result_flag);
  3090. if (ret != 0) {
  3091. return ret;
  3092. }
  3093. if (ip_rules->rules[IP_RULE_ALIAS] && alias != NULL) {
  3094. if (request->no_ipalias == 0) {
  3095. struct ip_rule_alias *rule = container_of(ip_rules->rules[IP_RULE_ALIAS], struct ip_rule_alias, head);
  3096. *alias = &rule->ip_alias;
  3097. if (alias == NULL) {
  3098. return 0;
  3099. }
  3100. }
  3101. /* need process ip alias */
  3102. return -1;
  3103. }
  3104. return 0;
  3105. }
  3106. static int _dns_server_is_adblock_ipv6(const unsigned char addr[16])
  3107. {
  3108. int i = 0;
  3109. for (i = 0; i < 15; i++) {
  3110. if (addr[i]) {
  3111. return -1;
  3112. }
  3113. }
  3114. if (addr[15] == 0 || addr[15] == 1) {
  3115. return 0;
  3116. }
  3117. return -1;
  3118. }
  3119. static int _dns_server_process_answer_A_IP(struct dns_request *request, char *cname, unsigned char addr[4], int ttl,
  3120. unsigned int result_flag)
  3121. {
  3122. char ip[DNS_MAX_CNAME_LEN] = {0};
  3123. int ip_check_result = 0;
  3124. unsigned char *paddrs[MAX_IP_NUM];
  3125. int paddr_num = 0;
  3126. struct dns_iplist_ip_addresses *alias = NULL;
  3127. paddrs[paddr_num] = addr;
  3128. paddr_num = 1;
  3129. /* ip rule check */
  3130. ip_check_result = _dns_server_process_ip_rule(request, addr, 4, DNS_T_A, result_flag, &alias);
  3131. if (ip_check_result == 0) {
  3132. /* match */
  3133. return -1;
  3134. } else if (ip_check_result == -2 || ip_check_result == -3) {
  3135. /* skip, nxdomain */
  3136. return ip_check_result;
  3137. }
  3138. int ret = _dns_server_process_ip_alias(request, alias, paddrs, &paddr_num, MAX_IP_NUM, DNS_RR_A_LEN);
  3139. if (ret != 0) {
  3140. return ret;
  3141. }
  3142. for (int i = 0; i < paddr_num; i++) {
  3143. unsigned char *paddr = paddrs[i];
  3144. if (atomic_read(&request->ip_map_num) == 0) {
  3145. request->has_ip = 1;
  3146. request->ip_addr_type = DNS_T_A;
  3147. memcpy(request->ip_addr, paddr, DNS_RR_A_LEN);
  3148. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3149. if (cname[0] != 0 && request->has_cname == 0 && request->conf->dns_force_no_cname == 0) {
  3150. request->has_cname = 1;
  3151. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  3152. }
  3153. } else {
  3154. if (ttl < request->ip_ttl) {
  3155. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3156. }
  3157. }
  3158. /* Ad blocking result */
  3159. if (paddr[0] == 0 || paddr[0] == 127) {
  3160. /* If half of the servers return the same result, then ignore this address */
  3161. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3162. request->rcode = DNS_RC_NOERROR;
  3163. return -1;
  3164. }
  3165. }
  3166. /* add this ip to request */
  3167. if (_dns_ip_address_check_add(request, cname, paddr, DNS_T_A, 0, NULL) != 0) {
  3168. return -1;
  3169. }
  3170. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", paddr[0], paddr[1], paddr[2], paddr[3]);
  3171. /* start ping */
  3172. _dns_server_request_get(request);
  3173. if (_dns_server_check_speed(request, ip) != 0) {
  3174. _dns_server_request_release(request);
  3175. }
  3176. }
  3177. return 0;
  3178. }
  3179. static int _dns_server_process_answer_AAAA_IP(struct dns_request *request, char *cname, unsigned char addr[16], int ttl,
  3180. unsigned int result_flag)
  3181. {
  3182. char ip[DNS_MAX_CNAME_LEN] = {0};
  3183. int ip_check_result = 0;
  3184. unsigned char *paddrs[MAX_IP_NUM];
  3185. struct dns_iplist_ip_addresses *alias = NULL;
  3186. int paddr_num = 0;
  3187. paddrs[paddr_num] = addr;
  3188. paddr_num = 1;
  3189. ip_check_result = _dns_server_process_ip_rule(request, addr, 16, DNS_T_AAAA, result_flag, &alias);
  3190. if (ip_check_result == 0) {
  3191. /* match */
  3192. return -1;
  3193. } else if (ip_check_result == -2 || ip_check_result == -3) {
  3194. /* skip, nxdomain */
  3195. return ip_check_result;
  3196. }
  3197. int ret = _dns_server_process_ip_alias(request, alias, paddrs, &paddr_num, MAX_IP_NUM, DNS_RR_AAAA_LEN);
  3198. if (ret != 0) {
  3199. return ret;
  3200. }
  3201. for (int i = 0; i < paddr_num; i++) {
  3202. unsigned char *paddr = paddrs[i];
  3203. if (atomic_read(&request->ip_map_num) == 0) {
  3204. request->has_ip = 1;
  3205. request->ip_addr_type = DNS_T_AAAA;
  3206. memcpy(request->ip_addr, paddr, DNS_RR_AAAA_LEN);
  3207. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3208. if (cname[0] != 0 && request->has_cname == 0 && request->conf->dns_force_no_cname == 0) {
  3209. request->has_cname = 1;
  3210. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  3211. }
  3212. } else {
  3213. if (ttl < request->ip_ttl) {
  3214. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3215. }
  3216. }
  3217. /* Ad blocking result */
  3218. if (_dns_server_is_adblock_ipv6(paddr) == 0) {
  3219. /* If half of the servers return the same result, then ignore this address */
  3220. if (atomic_inc_return(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3221. request->rcode = DNS_RC_NOERROR;
  3222. return -1;
  3223. }
  3224. }
  3225. /* add this ip to request */
  3226. if (_dns_ip_address_check_add(request, cname, paddr, DNS_T_AAAA, 0, NULL) != 0) {
  3227. return -1;
  3228. }
  3229. snprintf(ip, sizeof(ip), "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]", paddr[0],
  3230. paddr[1], paddr[2], paddr[3], paddr[4], paddr[5], paddr[6], paddr[7], paddr[8], paddr[9], paddr[10],
  3231. paddr[11], paddr[12], paddr[13], paddr[14], paddr[15]);
  3232. /* start ping */
  3233. _dns_server_request_get(request);
  3234. if (_dns_server_check_speed(request, ip) != 0) {
  3235. _dns_server_request_release(request);
  3236. }
  3237. }
  3238. return 0;
  3239. }
  3240. static int _dns_server_process_answer_A(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  3241. char *cname, unsigned int result_flag)
  3242. {
  3243. int ttl = 0;
  3244. unsigned char addr[4];
  3245. char name[DNS_MAX_CNAME_LEN] = {0};
  3246. if (request->qtype != DNS_T_A) {
  3247. return -1;
  3248. }
  3249. /* get A result */
  3250. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  3251. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl, addr[0], addr[1], addr[2], addr[3]);
  3252. /* if domain is not match */
  3253. if (strncasecmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncasecmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  3254. return -1;
  3255. }
  3256. _dns_server_request_get(request);
  3257. int ret = _dns_server_process_answer_A_IP(request, cname, addr, ttl, result_flag);
  3258. _dns_server_request_release(request);
  3259. return ret;
  3260. }
  3261. static int _dns_server_process_answer_AAAA(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  3262. char *cname, unsigned int result_flag)
  3263. {
  3264. unsigned char addr[16];
  3265. char name[DNS_MAX_CNAME_LEN] = {0};
  3266. int ttl = 0;
  3267. if (request->qtype != DNS_T_AAAA) {
  3268. /* ignore non-matched query type */
  3269. return -1;
  3270. }
  3271. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  3272. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  3273. name, ttl, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8], addr[9], addr[10],
  3274. addr[11], addr[12], addr[13], addr[14], addr[15]);
  3275. /* if domain is not match */
  3276. if (strncmp(name, domain, DNS_MAX_CNAME_LEN) != 0 && strncmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  3277. return -1;
  3278. }
  3279. _dns_server_request_get(request);
  3280. int ret = _dns_server_process_answer_AAAA_IP(request, cname, addr, ttl, result_flag);
  3281. _dns_server_request_release(request);
  3282. return ret;
  3283. }
  3284. static int _dns_server_process_answer_HTTPS(struct dns_rrs *rrs, struct dns_request *request, const char *domain,
  3285. char *cname, unsigned int result_flag)
  3286. {
  3287. int ttl = 0;
  3288. int ret = -1;
  3289. char name[DNS_MAX_CNAME_LEN] = {0};
  3290. char target[DNS_MAX_CNAME_LEN] = {0};
  3291. struct dns_https_param *p = NULL;
  3292. int priority = 0;
  3293. struct dns_request_https *https_svcb;
  3294. int no_ipv4 = 0;
  3295. int no_ipv6 = 0;
  3296. struct dns_https_record_rule *https_record_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_HTTPS);
  3297. if (https_record_rule) {
  3298. if (https_record_rule->filter.no_ipv4hint) {
  3299. no_ipv4 = 1;
  3300. }
  3301. if (https_record_rule->filter.no_ipv6hint) {
  3302. no_ipv6 = 1;
  3303. }
  3304. }
  3305. ret = dns_get_HTTPS_svcparm_start(rrs, &p, name, DNS_MAX_CNAME_LEN, &ttl, &priority, target, DNS_MAX_CNAME_LEN);
  3306. if (ret != 0) {
  3307. tlog(TLOG_WARN, "get HTTPS svcparm failed");
  3308. return -1;
  3309. }
  3310. https_svcb = request->https_svcb;
  3311. if (https_svcb == 0) {
  3312. /* ignore non-matched query type */
  3313. tlog(TLOG_WARN, "https svcb not set");
  3314. return -1;
  3315. }
  3316. tlog(TLOG_DEBUG, "domain: %s HTTPS: %s TTL: %d priority: %d", name, target, ttl, priority);
  3317. https_svcb->ttl = ttl;
  3318. https_svcb->priority = priority;
  3319. safe_strncpy(https_svcb->target, target, sizeof(https_svcb->target));
  3320. safe_strncpy(https_svcb->domain, name, sizeof(https_svcb->domain));
  3321. request->ip_ttl = ttl;
  3322. _dns_server_request_get(request);
  3323. for (; p; p = dns_get_HTTPS_svcparm_next(rrs, p)) {
  3324. switch (p->key) {
  3325. case DNS_HTTPS_T_MANDATORY: {
  3326. } break;
  3327. case DNS_HTTPS_T_ALPN: {
  3328. memcpy(https_svcb->alpn, p->value, sizeof(https_svcb->alpn));
  3329. https_svcb->alpn_len = p->len;
  3330. } break;
  3331. case DNS_HTTPS_T_NO_DEFAULT_ALPN: {
  3332. } break;
  3333. case DNS_HTTPS_T_PORT: {
  3334. int port = *(unsigned short *)(p->value);
  3335. https_svcb->port = ntohs(port);
  3336. } break;
  3337. case DNS_HTTPS_T_IPV4HINT: {
  3338. struct dns_rule_address_IPV4 *address_ipv4 = NULL;
  3339. if (_dns_server_is_return_soa_qtype(request, DNS_T_A) || no_ipv4 == 1) {
  3340. break;
  3341. }
  3342. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_ADDR) == 0) {
  3343. break;
  3344. }
  3345. address_ipv4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV4);
  3346. if (address_ipv4 != NULL) {
  3347. memcpy(request->ip_addr, address_ipv4->ipv4_addr, DNS_RR_A_LEN);
  3348. request->has_ip = 1;
  3349. request->ip_addr_type = DNS_T_A;
  3350. break;
  3351. }
  3352. for (int k = 0; k < p->len / 4; k++) {
  3353. _dns_server_process_answer_A_IP(request, cname, p->value + k * 4, ttl, result_flag);
  3354. }
  3355. } break;
  3356. case DNS_HTTPS_T_ECH: {
  3357. if (p->len > sizeof(https_svcb->ech)) {
  3358. tlog(TLOG_WARN, "ech too long");
  3359. break;
  3360. }
  3361. memcpy(https_svcb->ech, p->value, p->len);
  3362. https_svcb->ech_len = p->len;
  3363. } break;
  3364. case DNS_HTTPS_T_IPV6HINT: {
  3365. struct dns_rule_address_IPV6 *address_ipv6 = NULL;
  3366. if (_dns_server_is_return_soa_qtype(request, DNS_T_AAAA) || no_ipv6 == 1) {
  3367. break;
  3368. }
  3369. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_ADDR) == 0) {
  3370. break;
  3371. }
  3372. address_ipv6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV6);
  3373. if (address_ipv6 != NULL) {
  3374. memcpy(request->ip_addr, address_ipv6->ipv6_addr, DNS_RR_AAAA_LEN);
  3375. request->has_ip = 1;
  3376. request->ip_addr_type = DNS_T_AAAA;
  3377. break;
  3378. }
  3379. for (int k = 0; k < p->len / 16; k++) {
  3380. _dns_server_process_answer_AAAA_IP(request, cname, p->value + k * 16, ttl, result_flag);
  3381. }
  3382. } break;
  3383. }
  3384. }
  3385. _dns_server_request_release(request);
  3386. return 0;
  3387. }
  3388. static int _dns_server_process_answer(struct dns_request *request, const char *domain, struct dns_packet *packet,
  3389. unsigned int result_flag, int *need_passthrouh)
  3390. {
  3391. int ttl = 0;
  3392. char name[DNS_MAX_CNAME_LEN] = {0};
  3393. char cname[DNS_MAX_CNAME_LEN] = {0};
  3394. int rr_count = 0;
  3395. int i = 0;
  3396. int j = 0;
  3397. struct dns_rrs *rrs = NULL;
  3398. int ret = 0;
  3399. int is_skip = 0;
  3400. int has_result = 0;
  3401. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  3402. if (request->rcode == DNS_RC_SERVFAIL) {
  3403. request->rcode = packet->head.rcode;
  3404. request->remote_server_fail = 1;
  3405. }
  3406. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  3407. if (request->remote_server_fail == 0) {
  3408. return DNS_CLIENT_ACTION_DROP;
  3409. }
  3410. return DNS_CLIENT_ACTION_UNDEFINE;
  3411. }
  3412. /* when QTYPE is HTTPS, check if support */
  3413. if (request->qtype == DNS_T_HTTPS) {
  3414. int https_svcb_record_num = 0;
  3415. for (j = 1; j < DNS_RRS_OPT; j++) {
  3416. rrs = dns_get_rrs_start(packet, j, &rr_count);
  3417. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  3418. switch (rrs->type) {
  3419. case DNS_T_HTTPS: {
  3420. https_svcb_record_num++;
  3421. if (https_svcb_record_num <= 1) {
  3422. continue;
  3423. }
  3424. /* CURRENT NOT SUPPORT MUTI HTTPS RECORD */
  3425. *need_passthrouh = 1;
  3426. return DNS_CLIENT_ACTION_OK;
  3427. }
  3428. }
  3429. }
  3430. }
  3431. }
  3432. for (j = 1; j < DNS_RRS_OPT; j++) {
  3433. rrs = dns_get_rrs_start(packet, j, &rr_count);
  3434. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  3435. has_result = 1;
  3436. switch (rrs->type) {
  3437. case DNS_T_A: {
  3438. ret = _dns_server_process_answer_A(rrs, request, domain, cname, result_flag);
  3439. if (ret == -1) {
  3440. break;
  3441. } else if (ret == -2) {
  3442. is_skip = 1;
  3443. continue;
  3444. } else if (ret == -3) {
  3445. return -1;
  3446. }
  3447. request->rcode = packet->head.rcode;
  3448. } break;
  3449. case DNS_T_AAAA: {
  3450. ret = _dns_server_process_answer_AAAA(rrs, request, domain, cname, result_flag);
  3451. if (ret == -1) {
  3452. break;
  3453. } else if (ret == -2) {
  3454. is_skip = 1;
  3455. continue;
  3456. } else if (ret == -3) {
  3457. return -1;
  3458. }
  3459. request->rcode = packet->head.rcode;
  3460. } break;
  3461. case DNS_T_NS: {
  3462. char nsname[DNS_MAX_CNAME_LEN];
  3463. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, nsname, DNS_MAX_CNAME_LEN);
  3464. tlog(TLOG_DEBUG, "NS: %s ttl: %d nsname: %s\n", name, ttl, nsname);
  3465. } break;
  3466. case DNS_T_CNAME: {
  3467. char domain_name[DNS_MAX_CNAME_LEN] = {0};
  3468. char domain_cname[DNS_MAX_CNAME_LEN] = {0};
  3469. dns_get_CNAME(rrs, domain_name, DNS_MAX_CNAME_LEN, &ttl, domain_cname, DNS_MAX_CNAME_LEN);
  3470. if (strncasecmp(domain_name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  3471. strncasecmp(domain_name, cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  3472. continue;
  3473. }
  3474. safe_strncpy(cname, domain_cname, DNS_MAX_CNAME_LEN);
  3475. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  3476. tlog(TLOG_DEBUG, "name: %s ttl: %d cname: %s\n", domain_name, ttl, cname);
  3477. } break;
  3478. case DNS_T_HTTPS: {
  3479. ret = _dns_server_process_answer_HTTPS(rrs, request, domain, cname, result_flag);
  3480. if (ret == -1) {
  3481. break;
  3482. } else if (ret == -2) {
  3483. continue;
  3484. }
  3485. request->rcode = packet->head.rcode;
  3486. if (request->has_ip == 0) {
  3487. request->passthrough = 1;
  3488. _dns_server_request_complete(request);
  3489. }
  3490. } break;
  3491. case DNS_T_SOA: {
  3492. /* if DNS64 enabled, skip check SOA. */
  3493. if (_dns_server_is_dns64_request(request)) {
  3494. break;
  3495. }
  3496. request->has_soa = 1;
  3497. if (request->rcode != DNS_RC_NOERROR) {
  3498. request->rcode = packet->head.rcode;
  3499. }
  3500. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  3501. tlog(TLOG_DEBUG,
  3502. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, "
  3503. "expire: "
  3504. "%d, minimum: %d",
  3505. domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  3506. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  3507. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3508. int soa_num = atomic_inc_return(&request->soa_num);
  3509. if ((soa_num >= ((int)ceilf((float)dns_server_alive_num() / 3) + 1) || soa_num > 4) &&
  3510. atomic_read(&request->ip_map_num) <= 0) {
  3511. request->ip_ttl = ttl;
  3512. _dns_server_request_complete(request);
  3513. }
  3514. } break;
  3515. default:
  3516. tlog(TLOG_DEBUG, "%s, qtype: %d, rrstype = %d", name, rrs->type, j);
  3517. break;
  3518. }
  3519. }
  3520. }
  3521. request->remote_server_fail = 0;
  3522. if (request->rcode == DNS_RC_SERVFAIL && is_skip == 0) {
  3523. request->rcode = packet->head.rcode;
  3524. }
  3525. if (has_result == 0 && request->rcode == DNS_RC_NOERROR && packet->head.tc == 1) {
  3526. tlog(TLOG_DEBUG, "result is truncated, %s qtype: %d, rcode: %d, id: %d, retry.", domain, request->qtype,
  3527. packet->head.rcode, packet->head.id);
  3528. return DNS_CLIENT_ACTION_RETRY;
  3529. }
  3530. return DNS_CLIENT_ACTION_OK;
  3531. }
  3532. static int _dns_server_passthrough_rule_check(struct dns_request *request, const char *domain,
  3533. struct dns_packet *packet, unsigned int result_flag, int *pttl)
  3534. {
  3535. int ttl = 0;
  3536. char name[DNS_MAX_CNAME_LEN] = {0};
  3537. char cname[DNS_MAX_CNAME_LEN];
  3538. int rr_count = 0;
  3539. int i = 0;
  3540. int j = 0;
  3541. struct dns_rrs *rrs = NULL;
  3542. int ip_check_result = 0;
  3543. if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
  3544. if (request->rcode == DNS_RC_SERVFAIL) {
  3545. request->rcode = packet->head.rcode;
  3546. request->remote_server_fail = 1;
  3547. }
  3548. tlog(TLOG_DEBUG, "inquery failed, %s, rcode = %d, id = %d\n", domain, packet->head.rcode, packet->head.id);
  3549. return 0;
  3550. }
  3551. for (j = 1; j < DNS_RRS_OPT; j++) {
  3552. rrs = dns_get_rrs_start(packet, j, &rr_count);
  3553. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  3554. switch (rrs->type) {
  3555. case DNS_T_A: {
  3556. unsigned char addr[4];
  3557. int ttl_tmp = 0;
  3558. if (request->qtype != DNS_T_A) {
  3559. /* ignore non-matched query type */
  3560. if (request->dualstack_selection == 0) {
  3561. break;
  3562. }
  3563. }
  3564. _dns_server_request_get(request);
  3565. /* get A result */
  3566. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  3567. /* if domain is not match */
  3568. if (strncasecmp(name, domain, DNS_MAX_CNAME_LEN) != 0 &&
  3569. strncasecmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  3570. _dns_server_request_release(request);
  3571. continue;
  3572. }
  3573. tlog(TLOG_DEBUG, "domain: %s TTL: %d IP: %d.%d.%d.%d", name, ttl_tmp, addr[0], addr[1], addr[2],
  3574. addr[3]);
  3575. /* ip rule check */
  3576. ip_check_result = _dns_server_process_ip_rule(request, addr, 4, DNS_T_A, result_flag, NULL);
  3577. if (ip_check_result == 0 || ip_check_result == -2 || ip_check_result == -3) {
  3578. /* match, skip, nxdomain */
  3579. _dns_server_request_release(request);
  3580. return 0;
  3581. }
  3582. /* Ad blocking result */
  3583. if (addr[0] == 0 || addr[0] == 127) {
  3584. /* If half of the servers return the same result, then ignore this address */
  3585. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3586. _dns_server_request_release(request);
  3587. return 0;
  3588. }
  3589. }
  3590. ttl = _dns_server_get_conf_ttl(request, ttl_tmp);
  3591. _dns_server_request_release(request);
  3592. } break;
  3593. case DNS_T_AAAA: {
  3594. unsigned char addr[16];
  3595. int ttl_tmp = 0;
  3596. if (request->qtype != DNS_T_AAAA) {
  3597. /* ignore non-matched query type */
  3598. break;
  3599. }
  3600. _dns_server_request_get(request);
  3601. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl_tmp, addr);
  3602. /* if domain is not match */
  3603. if (strncasecmp(name, domain, DNS_MAX_CNAME_LEN) != 0 &&
  3604. strncasecmp(cname, name, DNS_MAX_CNAME_LEN) != 0) {
  3605. _dns_server_request_release(request);
  3606. continue;
  3607. }
  3608. tlog(TLOG_DEBUG,
  3609. "domain: %s TTL: %d IP: "
  3610. "%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x",
  3611. name, ttl_tmp, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7], addr[8],
  3612. addr[9], addr[10], addr[11], addr[12], addr[13], addr[14], addr[15]);
  3613. ip_check_result = _dns_server_process_ip_rule(request, addr, 16, DNS_T_AAAA, result_flag, NULL);
  3614. if (ip_check_result == 0 || ip_check_result == -2 || ip_check_result == -3) {
  3615. /* match, skip, nxdomain */
  3616. _dns_server_request_release(request);
  3617. return 0;
  3618. }
  3619. /* Ad blocking result */
  3620. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  3621. /* If half of the servers return the same result, then ignore this address */
  3622. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3623. _dns_server_request_release(request);
  3624. return 0;
  3625. }
  3626. }
  3627. ttl = _dns_server_get_conf_ttl(request, ttl_tmp);
  3628. _dns_server_request_release(request);
  3629. } break;
  3630. case DNS_T_CNAME: {
  3631. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  3632. } break;
  3633. default:
  3634. if (ttl == 0) {
  3635. /* Get TTL */
  3636. char tmpname[DNS_MAX_CNAME_LEN];
  3637. char tmpbuf[DNS_MAX_CNAME_LEN];
  3638. dns_get_CNAME(rrs, tmpname, DNS_MAX_CNAME_LEN, &ttl, tmpbuf, DNS_MAX_CNAME_LEN);
  3639. if (request->ip_ttl == 0) {
  3640. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3641. }
  3642. }
  3643. break;
  3644. }
  3645. }
  3646. }
  3647. request->remote_server_fail = 0;
  3648. if (request->rcode == DNS_RC_SERVFAIL) {
  3649. request->rcode = packet->head.rcode;
  3650. }
  3651. *pttl = ttl;
  3652. return -1;
  3653. }
  3654. static int _dns_server_get_answer(struct dns_server_post_context *context)
  3655. {
  3656. int i = 0;
  3657. int j = 0;
  3658. int ttl = 0;
  3659. struct dns_rrs *rrs = NULL;
  3660. int rr_count = 0;
  3661. struct dns_request *request = context->request;
  3662. struct dns_packet *packet = context->packet;
  3663. for (j = 1; j < DNS_RRS_OPT; j++) {
  3664. rrs = dns_get_rrs_start(packet, j, &rr_count);
  3665. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  3666. switch (rrs->type) {
  3667. case DNS_T_A: {
  3668. unsigned char addr[4];
  3669. char name[DNS_MAX_CNAME_LEN] = {0};
  3670. struct dns_ip_address *addr_map = NULL;
  3671. if (request->qtype != DNS_T_A) {
  3672. continue;
  3673. }
  3674. /* get A result */
  3675. dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  3676. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  3677. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  3678. continue;
  3679. }
  3680. if (context->no_check_add_ip == 0 &&
  3681. _dns_ip_address_check_add(request, name, addr, DNS_T_A, request->ping_time, &addr_map) != 0) {
  3682. continue;
  3683. }
  3684. _dns_server_context_add_ip(context, addr_map->ip_addr);
  3685. if (request->has_ip == 1) {
  3686. continue;
  3687. }
  3688. memcpy(request->ip_addr, addr, DNS_RR_A_LEN);
  3689. /* add this ip to request */
  3690. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3691. request->has_ip = 1;
  3692. request->rcode = packet->head.rcode;
  3693. } break;
  3694. case DNS_T_AAAA: {
  3695. unsigned char addr[16];
  3696. char name[DNS_MAX_CNAME_LEN] = {0};
  3697. struct dns_ip_address *addr_map = NULL;
  3698. if (request->qtype != DNS_T_AAAA) {
  3699. /* ignore non-matched query type */
  3700. continue;
  3701. }
  3702. dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
  3703. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  3704. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  3705. continue;
  3706. }
  3707. if (context->no_check_add_ip == 0 &&
  3708. _dns_ip_address_check_add(request, name, addr, DNS_T_AAAA, request->ping_time, &addr_map) != 0) {
  3709. continue;
  3710. }
  3711. _dns_server_context_add_ip(context, addr_map->ip_addr);
  3712. if (request->has_ip == 1) {
  3713. continue;
  3714. }
  3715. memcpy(request->ip_addr, addr, DNS_RR_AAAA_LEN);
  3716. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3717. request->has_ip = 1;
  3718. request->rcode = packet->head.rcode;
  3719. } break;
  3720. case DNS_T_NS: {
  3721. char cname[DNS_MAX_CNAME_LEN];
  3722. char name[DNS_MAX_CNAME_LEN] = {0};
  3723. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  3724. tlog(TLOG_DEBUG, "NS: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  3725. } break;
  3726. case DNS_T_CNAME: {
  3727. char cname[DNS_MAX_CNAME_LEN];
  3728. char name[DNS_MAX_CNAME_LEN] = {0};
  3729. if (request->conf->dns_force_no_cname) {
  3730. continue;
  3731. }
  3732. dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
  3733. tlog(TLOG_DEBUG, "name: %s, ttl: %d, cname: %s\n", name, ttl, cname);
  3734. if (strncasecmp(name, request->domain, DNS_MAX_CNAME_LEN - 1) != 0 &&
  3735. strncasecmp(name, request->cname, DNS_MAX_CNAME_LEN - 1) != 0) {
  3736. continue;
  3737. }
  3738. safe_strncpy(request->cname, cname, DNS_MAX_CNAME_LEN);
  3739. request->ttl_cname = _dns_server_get_conf_ttl(request, ttl);
  3740. request->has_cname = 1;
  3741. } break;
  3742. case DNS_T_SOA: {
  3743. char name[DNS_MAX_CNAME_LEN] = {0};
  3744. request->has_soa = 1;
  3745. if (request->rcode != DNS_RC_NOERROR) {
  3746. request->rcode = packet->head.rcode;
  3747. }
  3748. dns_get_SOA(rrs, name, 128, &ttl, &request->soa);
  3749. tlog(TLOG_DEBUG,
  3750. "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, "
  3751. "expire: "
  3752. "%d, minimum: %d",
  3753. request->domain, request->qtype, request->soa.mname, request->soa.rname, request->soa.serial,
  3754. request->soa.refresh, request->soa.retry, request->soa.expire, request->soa.minimum);
  3755. request->ip_ttl = _dns_server_get_conf_ttl(request, ttl);
  3756. } break;
  3757. default:
  3758. break;
  3759. }
  3760. }
  3761. }
  3762. return 0;
  3763. }
  3764. static int _dns_server_reply_passthrough(struct dns_server_post_context *context)
  3765. {
  3766. struct dns_request *request = context->request;
  3767. if (atomic_inc_return(&request->notified) != 1) {
  3768. return 0;
  3769. }
  3770. _dns_server_get_answer(context);
  3771. _dns_cache_reply_packet(context);
  3772. if (_dns_server_setup_ipset_nftset_packet(context) != 0) {
  3773. tlog(TLOG_DEBUG, "setup ipset failed.");
  3774. }
  3775. _dns_result_callback(context);
  3776. _dns_server_audit_log(context);
  3777. /* reply child request */
  3778. _dns_result_child_post(context);
  3779. if (request->conn && context->do_reply == 1) {
  3780. char clientip[DNS_MAX_CNAME_LEN] = {0};
  3781. /* When passthrough, modify the id to be the id of the client request. */
  3782. int ret = _dns_request_update_id_ttl(context);
  3783. if (ret != 0) {
  3784. tlog(TLOG_ERROR, "update packet ttl failed.");
  3785. return -1;
  3786. }
  3787. _dns_reply_inpacket(request, context->inpacket, context->inpacket_len);
  3788. tlog(TLOG_INFO, "result: %s, client: %s, qtype: %d, id: %d, group: %s, time: %lums", request->domain,
  3789. get_host_by_addr(clientip, sizeof(clientip), (struct sockaddr *)&request->addr), request->qtype,
  3790. request->id, request->dns_group_name[0] != '\0' ? request->dns_group_name : "default",
  3791. get_tick_count() - request->send_tick);
  3792. }
  3793. return _dns_server_reply_all_pending_list(request, context);
  3794. }
  3795. static void _dns_server_query_end(struct dns_request *request)
  3796. {
  3797. int ip_num = 0;
  3798. int request_wait = 0;
  3799. struct dns_conf_group *conf = request->conf;
  3800. /* if mdns request timeout */
  3801. if (request->is_mdns_lookup == 1 && request->rcode == DNS_RC_SERVFAIL) {
  3802. request->rcode = DNS_RC_NOERROR;
  3803. request->force_soa = 1;
  3804. request->ip_ttl = _dns_server_get_conf_ttl(request, DNS_SERVER_ADDR_TTL);
  3805. }
  3806. pthread_mutex_lock(&request->ip_map_lock);
  3807. ip_num = atomic_read(&request->ip_map_num);
  3808. request_wait = request->request_wait;
  3809. request->request_wait--;
  3810. pthread_mutex_unlock(&request->ip_map_lock);
  3811. /* Not need to wait check result if only has one ip address */
  3812. if (ip_num <= 1 && request_wait == 1) {
  3813. if (request->dualstack_selection_query == 1) {
  3814. if ((conf->ipset_nftset.ipset_no_speed.ipv4_enable || conf->ipset_nftset.nftset_no_speed.ip_enable ||
  3815. conf->ipset_nftset.ipset_no_speed.ipv6_enable || conf->ipset_nftset.nftset_no_speed.ip6_enable) &&
  3816. dns_conf_dns_dns64.prefix_len == 0) {
  3817. /* if speed check fail enabled, we need reply quickly, otherwise wait for ping result.*/
  3818. _dns_server_request_complete(request);
  3819. }
  3820. goto out;
  3821. }
  3822. if (request->dualstack_selection_has_ip && request->dualstack_selection_ping_time > 0) {
  3823. goto out;
  3824. }
  3825. request->has_ping_result = 1;
  3826. _dns_server_request_complete(request);
  3827. }
  3828. out:
  3829. _dns_server_request_release(request);
  3830. }
  3831. static int dns_server_dualstack_callback(const struct dns_result *result, void *user_ptr)
  3832. {
  3833. struct dns_request *request = (struct dns_request *)user_ptr;
  3834. tlog(TLOG_DEBUG, "dualstack result: domain: %s, ip: %s, type: %d, ping: %d, rcode: %d", result->domain, result->ip,
  3835. result->addr_type, result->ping_time, result->rtcode);
  3836. if (request == NULL) {
  3837. return -1;
  3838. }
  3839. if (result->rtcode == DNS_RC_NOERROR && result->ip[0] != 0) {
  3840. request->dualstack_selection_has_ip = 1;
  3841. }
  3842. request->dualstack_selection_ping_time = result->ping_time;
  3843. _dns_server_query_end(request);
  3844. return 0;
  3845. }
  3846. static void _dns_server_passthrough_may_complete(struct dns_request *request)
  3847. {
  3848. const unsigned char *addr;
  3849. if (request->passthrough != 2) {
  3850. return;
  3851. }
  3852. if (request->has_ip == 0 && request->has_soa == 0) {
  3853. return;
  3854. }
  3855. if (request->qtype == DNS_T_A && request->has_ip == 1) {
  3856. /* Ad blocking result */
  3857. addr = request->ip_addr;
  3858. if (addr[0] == 0 || addr[0] == 127) {
  3859. /* If half of the servers return the same result, then ignore this address */
  3860. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3861. return;
  3862. }
  3863. }
  3864. }
  3865. if (request->qtype == DNS_T_AAAA && request->has_ip == 1) {
  3866. addr = request->ip_addr;
  3867. if (_dns_server_is_adblock_ipv6(addr) == 0) {
  3868. /* If half of the servers return the same result, then ignore this address */
  3869. if (atomic_read(&request->adblock) <= (dns_server_alive_num() / 2 + dns_server_alive_num() % 2)) {
  3870. return;
  3871. }
  3872. }
  3873. }
  3874. _dns_server_request_complete_with_all_IPs(request, 1);
  3875. }
  3876. static int _dns_server_resolve_callback_reply_passthrough(struct dns_request *request, const char *domain,
  3877. struct dns_packet *packet, unsigned char *inpacket,
  3878. int inpacket_len, unsigned int result_flag)
  3879. {
  3880. struct dns_server_post_context context;
  3881. int ttl = 0;
  3882. int ret = 0;
  3883. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  3884. if (ret == 0) {
  3885. return 0;
  3886. }
  3887. ttl = _dns_server_get_conf_ttl(request, ttl);
  3888. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  3889. context.do_cache = 1;
  3890. context.do_audit = 1;
  3891. context.do_reply = 1;
  3892. context.do_ipset = 1;
  3893. context.reply_ttl = ttl;
  3894. return _dns_server_reply_passthrough(&context);
  3895. }
  3896. static int dns_server_resolve_callback(const char *domain, dns_result_type rtype, struct dns_server_info *server_info,
  3897. struct dns_packet *packet, unsigned char *inpacket, int inpacket_len,
  3898. void *user_ptr)
  3899. {
  3900. struct dns_request *request = user_ptr;
  3901. int ret = 0;
  3902. int need_passthrouh = 0;
  3903. unsigned long result_flag = dns_client_server_result_flag(server_info);
  3904. if (request == NULL) {
  3905. return -1;
  3906. }
  3907. if (rtype == DNS_QUERY_RESULT) {
  3908. tlog(TLOG_DEBUG, "query result from server %s:%d, type: %d, domain: %s qtype: %d rcode: %d, id: %d",
  3909. dns_client_get_server_ip(server_info), dns_client_get_server_port(server_info),
  3910. dns_client_get_server_type(server_info), domain, request->qtype, packet->head.rcode, request->id);
  3911. if (request->passthrough == 1 && atomic_read(&request->notified) == 0) {
  3912. return _dns_server_resolve_callback_reply_passthrough(request, domain, packet, inpacket, inpacket_len,
  3913. result_flag);
  3914. }
  3915. if (request->prefetch == 0 && request->response_mode == DNS_RESPONSE_MODE_FASTEST_RESPONSE &&
  3916. atomic_read(&request->notified) == 0) {
  3917. struct dns_server_post_context context;
  3918. int ttl = 0;
  3919. ret = _dns_server_passthrough_rule_check(request, domain, packet, result_flag, &ttl);
  3920. if (ret != 0) {
  3921. _dns_server_post_context_init_from(&context, request, packet, inpacket, inpacket_len);
  3922. context.do_cache = 1;
  3923. context.do_audit = 1;
  3924. context.do_reply = 1;
  3925. context.do_ipset = 1;
  3926. context.reply_ttl = _dns_server_get_reply_ttl(request, ttl);
  3927. context.cache_ttl = _dns_server_get_conf_ttl(request, ttl);
  3928. request->ip_ttl = context.cache_ttl;
  3929. context.no_check_add_ip = 1;
  3930. _dns_server_reply_passthrough(&context);
  3931. request->cname[0] = 0;
  3932. request->has_ip = 0;
  3933. request->has_cname = 0;
  3934. request->has_ping_result = 0;
  3935. request->has_soa = 0;
  3936. request->has_ptr = 0;
  3937. request->ping_time = -1;
  3938. request->ip_ttl = 0;
  3939. }
  3940. }
  3941. ret = _dns_server_process_answer(request, domain, packet, result_flag, &need_passthrouh);
  3942. if (ret == 0 && need_passthrouh == 1 && atomic_read(&request->notified) == 0) {
  3943. /* not supported record, passthrouth */
  3944. request->passthrough = 1;
  3945. return _dns_server_resolve_callback_reply_passthrough(request, domain, packet, inpacket, inpacket_len,
  3946. result_flag);
  3947. }
  3948. _dns_server_passthrough_may_complete(request);
  3949. return ret;
  3950. } else if (rtype == DNS_QUERY_ERR) {
  3951. tlog(TLOG_ERROR, "request failed, %s", domain);
  3952. return -1;
  3953. } else {
  3954. _dns_server_query_end(request);
  3955. }
  3956. return 0;
  3957. }
  3958. static int _dns_server_get_inet_by_addr(struct sockaddr_storage *localaddr, struct sockaddr_storage *addr, int family)
  3959. {
  3960. struct ifaddrs *ifaddr = NULL;
  3961. struct ifaddrs *ifa = NULL;
  3962. char ethname[16] = {0};
  3963. if (getifaddrs(&ifaddr) == -1) {
  3964. return -1;
  3965. }
  3966. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  3967. if (ifa->ifa_addr == NULL) {
  3968. continue;
  3969. }
  3970. if (localaddr->ss_family != ifa->ifa_addr->sa_family) {
  3971. continue;
  3972. }
  3973. switch (ifa->ifa_addr->sa_family) {
  3974. case AF_INET: {
  3975. struct sockaddr_in *addr_in_1 = NULL;
  3976. struct sockaddr_in *addr_in_2 = NULL;
  3977. addr_in_1 = (struct sockaddr_in *)ifa->ifa_addr;
  3978. addr_in_2 = (struct sockaddr_in *)localaddr;
  3979. if (memcmp(&(addr_in_1->sin_addr.s_addr), &(addr_in_2->sin_addr.s_addr), 4) != 0) {
  3980. continue;
  3981. }
  3982. } break;
  3983. case AF_INET6: {
  3984. struct sockaddr_in6 *addr_in6_1 = NULL;
  3985. struct sockaddr_in6 *addr_in6_2 = NULL;
  3986. addr_in6_1 = (struct sockaddr_in6 *)ifa->ifa_addr;
  3987. addr_in6_2 = (struct sockaddr_in6 *)localaddr;
  3988. if (IN6_IS_ADDR_V4MAPPED(&addr_in6_1->sin6_addr)) {
  3989. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr + 12;
  3990. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr + 12;
  3991. if (memcmp(addr1, addr2, 4) != 0) {
  3992. continue;
  3993. }
  3994. } else {
  3995. unsigned char *addr1 = addr_in6_1->sin6_addr.s6_addr;
  3996. unsigned char *addr2 = addr_in6_2->sin6_addr.s6_addr;
  3997. if (memcmp(addr1, addr2, 16) != 0) {
  3998. continue;
  3999. }
  4000. }
  4001. } break;
  4002. default:
  4003. continue;
  4004. break;
  4005. }
  4006. safe_strncpy(ethname, ifa->ifa_name, sizeof(ethname));
  4007. break;
  4008. }
  4009. if (ethname[0] == '\0') {
  4010. goto errout;
  4011. }
  4012. for (ifa = ifaddr; ifa != NULL; ifa = ifa->ifa_next) {
  4013. if (ifa->ifa_addr == NULL) {
  4014. continue;
  4015. }
  4016. if (ifa->ifa_addr->sa_family != family) {
  4017. continue;
  4018. }
  4019. if (strncmp(ethname, ifa->ifa_name, sizeof(ethname)) != 0) {
  4020. continue;
  4021. }
  4022. if (family == AF_INET) {
  4023. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in));
  4024. } else if (family == AF_INET6) {
  4025. memcpy(addr, ifa->ifa_addr, sizeof(struct sockaddr_in6));
  4026. }
  4027. break;
  4028. }
  4029. if (ifa == NULL) {
  4030. goto errout;
  4031. }
  4032. freeifaddrs(ifaddr);
  4033. return 0;
  4034. errout:
  4035. if (ifaddr) {
  4036. freeifaddrs(ifaddr);
  4037. }
  4038. return -1;
  4039. }
  4040. static int _dns_server_reply_request_eth_ip(struct dns_request *request)
  4041. {
  4042. struct sockaddr_in *addr_in = NULL;
  4043. struct sockaddr_in6 *addr_in6 = NULL;
  4044. struct sockaddr_storage *localaddr = NULL;
  4045. struct sockaddr_storage localaddr_buff;
  4046. localaddr = &request->localaddr;
  4047. /* address /domain/ rule */
  4048. switch (request->qtype) {
  4049. case DNS_T_A:
  4050. if (localaddr->ss_family != AF_INET) {
  4051. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET) != 0) {
  4052. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4053. return 0;
  4054. }
  4055. localaddr = &localaddr_buff;
  4056. }
  4057. addr_in = (struct sockaddr_in *)localaddr;
  4058. memcpy(request->ip_addr, &addr_in->sin_addr.s_addr, DNS_RR_A_LEN);
  4059. break;
  4060. case DNS_T_AAAA:
  4061. if (localaddr->ss_family != AF_INET6) {
  4062. if (_dns_server_get_inet_by_addr(localaddr, &localaddr_buff, AF_INET6) != 0) {
  4063. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4064. return 0;
  4065. }
  4066. localaddr = &localaddr_buff;
  4067. }
  4068. addr_in6 = (struct sockaddr_in6 *)localaddr;
  4069. memcpy(request->ip_addr, &addr_in6->sin6_addr.s6_addr, DNS_RR_AAAA_LEN);
  4070. break;
  4071. default:
  4072. goto out;
  4073. break;
  4074. }
  4075. request->rcode = DNS_RC_NOERROR;
  4076. request->ip_ttl = dns_conf_local_ttl;
  4077. request->has_ip = 1;
  4078. struct dns_server_post_context context;
  4079. _dns_server_post_context_init(&context, request);
  4080. context.do_reply = 1;
  4081. _dns_request_post(&context);
  4082. return 0;
  4083. out:
  4084. return -1;
  4085. }
  4086. static int _dns_server_process_ptrs(struct dns_request *request)
  4087. {
  4088. uint32_t key = 0;
  4089. struct dns_ptr *ptr = NULL;
  4090. struct dns_ptr *ptr_tmp = NULL;
  4091. key = hash_string(request->domain);
  4092. hash_for_each_possible(dns_ptr_table.ptr, ptr_tmp, node, key)
  4093. {
  4094. if (strncmp(ptr_tmp->ptr_domain, request->domain, DNS_MAX_PTR_LEN) != 0) {
  4095. continue;
  4096. }
  4097. ptr = ptr_tmp;
  4098. break;
  4099. }
  4100. if (ptr == NULL) {
  4101. goto errout;
  4102. }
  4103. request->has_ptr = 1;
  4104. safe_strncpy(request->ptr_hostname, ptr->hostname, DNS_MAX_CNAME_LEN);
  4105. return 0;
  4106. errout:
  4107. return -1;
  4108. }
  4109. static void _dns_server_set_request_mdns(struct dns_request *request)
  4110. {
  4111. if (dns_conf_mdns_lookup != 1) {
  4112. return;
  4113. }
  4114. request->is_mdns_lookup = 1;
  4115. }
  4116. static int _dns_server_parser_addr_from_apra(const char *arpa, unsigned char *addr, int *addr_len, int max_addr_len)
  4117. {
  4118. int high, low;
  4119. char *endptr = NULL;
  4120. if (arpa == NULL || addr == NULL || addr_len == NULL || max_addr_len < 4) {
  4121. return -1;
  4122. }
  4123. int ret = sscanf(arpa, "%hhd.%hhd.%hhd.%hhd.in-addr.arpa", &addr[3], &addr[2], &addr[1], &addr[0]);
  4124. if (ret == 4 && strstr(arpa, ".in-addr.arpa") != NULL) {
  4125. *addr_len = 4;
  4126. return 0;
  4127. }
  4128. if (max_addr_len != 16) {
  4129. return -1;
  4130. }
  4131. for (int i = 15; i >= 0; i--) {
  4132. low = strtol(arpa, &endptr, 16);
  4133. if (endptr == NULL || *endptr != '.' || *endptr == '\0') {
  4134. return -1;
  4135. }
  4136. arpa = endptr + 1;
  4137. high = strtol(arpa, &endptr, 16);
  4138. if (endptr == NULL || *endptr != '.' || *endptr == '\0') {
  4139. return -1;
  4140. }
  4141. arpa = endptr + 1;
  4142. addr[i] = (high << 4) | low;
  4143. }
  4144. if (strstr(arpa, "ip6.arpa") == NULL) {
  4145. return -1;
  4146. }
  4147. *addr_len = 16;
  4148. return 0;
  4149. }
  4150. static int _dns_server_is_private_address(const unsigned char *addr, int addr_len)
  4151. {
  4152. if (addr_len == 4) {
  4153. if (addr[0] == 10 || (addr[0] == 172 && addr[1] >= 16 && addr[1] <= 31) || (addr[0] == 192 && addr[1] == 168)) {
  4154. return 0;
  4155. }
  4156. } else if (addr_len == 16) {
  4157. if (addr[0] == 0xfe && addr[1] == 0x80) {
  4158. return 0;
  4159. }
  4160. }
  4161. return -1;
  4162. }
  4163. static void _dns_server_local_addr_cache_add(unsigned char *netaddr, int netaddr_len, int prefix_len)
  4164. {
  4165. prefix_t prefix;
  4166. struct local_addr_cache_item *addr_cache_item = NULL;
  4167. radix_node_t *node = NULL;
  4168. if (prefix_from_blob(netaddr, netaddr_len, prefix_len, &prefix) == NULL) {
  4169. return;
  4170. }
  4171. node = radix_lookup(server.local_addr_cache.addr, &prefix);
  4172. if (node == NULL) {
  4173. goto errout;
  4174. }
  4175. if (node->data == NULL) {
  4176. addr_cache_item = malloc(sizeof(struct local_addr_cache_item));
  4177. if (addr_cache_item == NULL) {
  4178. return;
  4179. }
  4180. memset(addr_cache_item, 0, sizeof(struct local_addr_cache_item));
  4181. } else {
  4182. addr_cache_item = node->data;
  4183. }
  4184. addr_cache_item->ip_addr_len = netaddr_len;
  4185. memcpy(addr_cache_item->ip_addr, netaddr, netaddr_len);
  4186. addr_cache_item->mask_len = prefix_len;
  4187. node->data = addr_cache_item;
  4188. return;
  4189. errout:
  4190. if (addr_cache_item) {
  4191. free(addr_cache_item);
  4192. }
  4193. return;
  4194. }
  4195. static void _dns_server_local_addr_cache_del(unsigned char *netaddr, int netaddr_len, int prefix_len)
  4196. {
  4197. radix_node_t *node = NULL;
  4198. prefix_t prefix;
  4199. if (prefix_from_blob(netaddr, netaddr_len, prefix_len, &prefix) == NULL) {
  4200. return;
  4201. }
  4202. node = radix_search_exact(server.local_addr_cache.addr, &prefix);
  4203. if (node == NULL) {
  4204. return;
  4205. }
  4206. if (node->data != NULL) {
  4207. free(node->data);
  4208. }
  4209. node->data = NULL;
  4210. radix_remove(server.local_addr_cache.addr, node);
  4211. }
  4212. static void _dns_server_process_local_addr_cache(int fd_netlink, struct epoll_event *event, unsigned long now)
  4213. {
  4214. char buffer[1024 * 8];
  4215. struct iovec iov = {buffer, sizeof(buffer)};
  4216. struct sockaddr_nl sa;
  4217. struct msghdr msg;
  4218. struct nlmsghdr *nh;
  4219. memset(&msg, 0, sizeof(msg));
  4220. msg.msg_name = &sa;
  4221. msg.msg_namelen = sizeof(sa);
  4222. msg.msg_iov = &iov;
  4223. msg.msg_iovlen = 1;
  4224. while (1) {
  4225. ssize_t len = recvmsg(fd_netlink, &msg, 0);
  4226. if (len == -1) {
  4227. break;
  4228. }
  4229. for (nh = (struct nlmsghdr *)buffer; NLMSG_OK(nh, len); nh = NLMSG_NEXT(nh, len)) {
  4230. if (nh->nlmsg_type == NLMSG_DONE) {
  4231. break;
  4232. }
  4233. if (nh->nlmsg_type == NLMSG_ERROR) {
  4234. break;
  4235. }
  4236. if (nh->nlmsg_type != RTM_NEWADDR && nh->nlmsg_type != RTM_DELADDR) {
  4237. continue;
  4238. }
  4239. struct ifaddrmsg *ifa = (struct ifaddrmsg *)NLMSG_DATA(nh);
  4240. struct rtattr *rth = IFA_RTA(ifa);
  4241. int rtl = IFA_PAYLOAD(nh);
  4242. while (rtl && RTA_OK(rth, rtl)) {
  4243. if (rth->rta_type == IFA_ADDRESS) {
  4244. unsigned char *netaddr = RTA_DATA(rth);
  4245. int netaddr_len = 0;
  4246. if (ifa->ifa_family == AF_INET) {
  4247. netaddr_len = 4;
  4248. } else if (ifa->ifa_family == AF_INET6) {
  4249. netaddr_len = 16;
  4250. } else {
  4251. continue;
  4252. }
  4253. if (nh->nlmsg_type == RTM_NEWADDR) {
  4254. _dns_server_local_addr_cache_add(netaddr, netaddr_len, netaddr_len * 8);
  4255. _dns_server_local_addr_cache_add(netaddr, netaddr_len, ifa->ifa_prefixlen);
  4256. } else {
  4257. _dns_server_local_addr_cache_del(netaddr, netaddr_len, netaddr_len * 8);
  4258. _dns_server_local_addr_cache_del(netaddr, netaddr_len, ifa->ifa_prefixlen);
  4259. }
  4260. }
  4261. rth = RTA_NEXT(rth, rtl);
  4262. }
  4263. }
  4264. }
  4265. }
  4266. static int _dns_server_process_local_ptr(struct dns_request *request)
  4267. {
  4268. unsigned char ptr_addr[16];
  4269. int ptr_addr_len = 0;
  4270. int found = 0;
  4271. prefix_t prefix;
  4272. radix_node_t *node = NULL;
  4273. struct local_addr_cache_item *addr_cache_item = NULL;
  4274. if (_dns_server_parser_addr_from_apra(request->domain, ptr_addr, &ptr_addr_len, sizeof(ptr_addr)) != 0) {
  4275. /* Determine if the smartdns service is in effect. */
  4276. if (strncasecmp(request->domain, "smartdns", sizeof("smartdns")) != 0) {
  4277. return -1;
  4278. }
  4279. found = 1;
  4280. goto out;
  4281. }
  4282. if (dns_conf_local_ptr_enable == 0) {
  4283. goto out;
  4284. }
  4285. if (prefix_from_blob(ptr_addr, ptr_addr_len, ptr_addr_len * 8, &prefix) == NULL) {
  4286. goto out;
  4287. }
  4288. node = radix_search_best(server.local_addr_cache.addr, &prefix);
  4289. if (node == NULL) {
  4290. goto out;
  4291. }
  4292. if (node->data == NULL) {
  4293. goto out;
  4294. }
  4295. addr_cache_item = node->data;
  4296. if (addr_cache_item->mask_len == ptr_addr_len * 8) {
  4297. found = 1;
  4298. goto out;
  4299. }
  4300. if (dns_conf_mdns_lookup) {
  4301. _dns_server_set_request_mdns(request);
  4302. goto errout;
  4303. }
  4304. out:
  4305. if (found == 0 && _dns_server_is_private_address(ptr_addr, ptr_addr_len) == 0) {
  4306. request->has_soa = 1;
  4307. _dns_server_setup_soa(request);
  4308. goto clear;
  4309. }
  4310. if (found == 0) {
  4311. goto errout;
  4312. }
  4313. char full_hostname[DNS_MAX_CNAME_LEN];
  4314. if (dns_conf_server_name[0] == 0) {
  4315. char hostname[DNS_MAX_CNAME_LEN];
  4316. char domainname[DNS_MAX_CNAME_LEN];
  4317. /* get local domain name */
  4318. if (getdomainname(domainname, DNS_MAX_CNAME_LEN - 1) == 0) {
  4319. /* check domain is valid */
  4320. if (strncmp(domainname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  4321. domainname[0] = '\0';
  4322. }
  4323. }
  4324. if (gethostname(hostname, DNS_MAX_CNAME_LEN - 1) == 0) {
  4325. /* check hostname is valid */
  4326. if (strncmp(hostname, "(none)", DNS_MAX_CNAME_LEN - 1) == 0) {
  4327. hostname[0] = '\0';
  4328. }
  4329. }
  4330. if (hostname[0] != '\0' && domainname[0] != '\0') {
  4331. snprintf(full_hostname, sizeof(full_hostname), "%.64s.%.128s", hostname, domainname);
  4332. } else if (hostname[0] != '\0') {
  4333. safe_strncpy(full_hostname, hostname, DNS_MAX_CNAME_LEN);
  4334. } else {
  4335. safe_strncpy(full_hostname, "smartdns", DNS_MAX_CNAME_LEN);
  4336. }
  4337. } else {
  4338. /* return configured server name */
  4339. safe_strncpy(full_hostname, dns_conf_server_name, DNS_MAX_CNAME_LEN);
  4340. }
  4341. request->has_ptr = 1;
  4342. safe_strncpy(request->ptr_hostname, full_hostname, DNS_MAX_CNAME_LEN);
  4343. clear:
  4344. return 0;
  4345. errout:
  4346. return -1;
  4347. }
  4348. static int _dns_server_get_local_ttl(struct dns_request *request)
  4349. {
  4350. struct dns_ttl_rule *ttl_rule;
  4351. /* get domain rule flag */
  4352. ttl_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_TTL);
  4353. if (ttl_rule != NULL) {
  4354. if (ttl_rule->ttl > 0) {
  4355. return ttl_rule->ttl;
  4356. }
  4357. }
  4358. if (dns_conf_local_ttl > 0) {
  4359. return dns_conf_local_ttl;
  4360. }
  4361. if (request->conf->dns_rr_ttl > 0) {
  4362. return request->conf->dns_rr_ttl;
  4363. }
  4364. if (request->conf->dns_rr_ttl_min > 0) {
  4365. return request->conf->dns_rr_ttl_min;
  4366. }
  4367. return DNS_SERVER_ADDR_TTL;
  4368. }
  4369. static int _dns_server_process_ptr(struct dns_request *request)
  4370. {
  4371. if (_dns_server_process_ptrs(request) == 0) {
  4372. goto reply_exit;
  4373. }
  4374. if (_dns_server_process_local_ptr(request) == 0) {
  4375. goto reply_exit;
  4376. }
  4377. return -1;
  4378. reply_exit:
  4379. request->rcode = DNS_RC_NOERROR;
  4380. request->ip_ttl = _dns_server_get_local_ttl(request);
  4381. struct dns_server_post_context context;
  4382. _dns_server_post_context_init(&context, request);
  4383. context.do_reply = 1;
  4384. context.do_audit = 0;
  4385. context.do_cache = 1;
  4386. _dns_request_post(&context);
  4387. return 0;
  4388. }
  4389. static int _dns_server_process_DDR(struct dns_request *request)
  4390. {
  4391. return _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4392. }
  4393. static int _dns_server_process_srv(struct dns_request *request)
  4394. {
  4395. struct dns_srv_records *srv_records = dns_server_get_srv_record(request->domain);
  4396. if (srv_records == NULL) {
  4397. return -1;
  4398. }
  4399. request->rcode = DNS_RC_NOERROR;
  4400. request->ip_ttl = _dns_server_get_local_ttl(request);
  4401. request->srv_records = srv_records;
  4402. struct dns_server_post_context context;
  4403. _dns_server_post_context_init(&context, request);
  4404. context.do_audit = 1;
  4405. context.do_reply = 1;
  4406. context.do_cache = 0;
  4407. context.do_force_soa = 0;
  4408. _dns_request_post(&context);
  4409. return 0;
  4410. }
  4411. static int _dns_server_process_svcb(struct dns_request *request)
  4412. {
  4413. if (strncasecmp("_dns.resolver.arpa", request->domain, DNS_MAX_CNAME_LEN) == 0) {
  4414. return _dns_server_process_DDR(request);
  4415. }
  4416. return -1;
  4417. }
  4418. static void _dns_server_log_rule(const char *domain, enum domain_rule rule_type, unsigned char *rule_key,
  4419. int rule_key_len)
  4420. {
  4421. char rule_name[DNS_MAX_CNAME_LEN];
  4422. if (rule_key_len <= 0) {
  4423. return;
  4424. }
  4425. reverse_string(rule_name, (char *)rule_key, rule_key_len, 1);
  4426. rule_name[rule_key_len] = 0;
  4427. tlog(TLOG_INFO, "RULE-MATCH, type: %d, domain: %s, rule: %s", rule_type, domain, rule_name);
  4428. }
  4429. static void _dns_server_update_rule_by_flags(struct dns_request_domain_rule *request_domain_rule)
  4430. {
  4431. struct dns_rule_flags *rule_flag = (struct dns_rule_flags *)request_domain_rule->rules[0];
  4432. unsigned int flags = 0;
  4433. if (rule_flag == NULL) {
  4434. return;
  4435. }
  4436. flags = rule_flag->flags;
  4437. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  4438. request_domain_rule->rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  4439. request_domain_rule->rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  4440. }
  4441. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  4442. request_domain_rule->rules[DOMAIN_RULE_ADDRESS_IPV4] = NULL;
  4443. }
  4444. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  4445. request_domain_rule->rules[DOMAIN_RULE_ADDRESS_IPV6] = NULL;
  4446. }
  4447. if (flags & DOMAIN_FLAG_ADDR_HTTPS_IGN) {
  4448. request_domain_rule->rules[DOMAIN_RULE_HTTPS] = NULL;
  4449. }
  4450. if (flags & DOMAIN_FLAG_IPSET_IGN) {
  4451. request_domain_rule->rules[DOMAIN_RULE_IPSET] = NULL;
  4452. }
  4453. if (flags & DOMAIN_FLAG_IPSET_IPV4_IGN) {
  4454. request_domain_rule->rules[DOMAIN_RULE_IPSET_IPV4] = NULL;
  4455. }
  4456. if (flags & DOMAIN_FLAG_IPSET_IPV6_IGN) {
  4457. request_domain_rule->rules[DOMAIN_RULE_IPSET_IPV6] = NULL;
  4458. }
  4459. if (flags & DOMAIN_FLAG_NFTSET_IP_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  4460. request_domain_rule->rules[DOMAIN_RULE_NFTSET_IP] = NULL;
  4461. }
  4462. if (flags & DOMAIN_FLAG_NFTSET_IP6_IGN || flags & DOMAIN_FLAG_NFTSET_INET_IGN) {
  4463. request_domain_rule->rules[DOMAIN_RULE_NFTSET_IP6] = NULL;
  4464. }
  4465. if (flags & DOMAIN_FLAG_NAMESERVER_IGNORE) {
  4466. request_domain_rule->rules[DOMAIN_RULE_NAMESERVER] = NULL;
  4467. }
  4468. }
  4469. static int _dns_server_get_rules(unsigned char *key, uint32_t key_len, int is_subkey, void *value, void *arg)
  4470. {
  4471. struct rule_walk_args *walk_args = arg;
  4472. struct dns_request_domain_rule *request_domain_rule = walk_args->args;
  4473. struct dns_domain_rule *domain_rule = value;
  4474. int i = 0;
  4475. if (domain_rule == NULL) {
  4476. return 0;
  4477. }
  4478. if (domain_rule->sub_rule_only != domain_rule->root_rule_only) {
  4479. /* only subkey rule */
  4480. if (domain_rule->sub_rule_only == 1 && is_subkey == 0) {
  4481. return 0;
  4482. }
  4483. /* only root key rule */
  4484. if (domain_rule->root_rule_only == 1 && is_subkey == 1) {
  4485. return 0;
  4486. }
  4487. }
  4488. if (walk_args->rule_index >= 0) {
  4489. i = walk_args->rule_index;
  4490. } else {
  4491. i = 0;
  4492. }
  4493. for (; i < DOMAIN_RULE_MAX; i++) {
  4494. if (domain_rule->rules[i] == NULL) {
  4495. if (walk_args->rule_index >= 0) {
  4496. break;
  4497. }
  4498. continue;
  4499. }
  4500. request_domain_rule->rules[i] = domain_rule->rules[i];
  4501. request_domain_rule->is_sub_rule[i] = is_subkey;
  4502. walk_args->key[i] = key;
  4503. walk_args->key_len[i] = key_len;
  4504. if (walk_args->rule_index >= 0) {
  4505. break;
  4506. }
  4507. }
  4508. /* update rules by flags */
  4509. _dns_server_update_rule_by_flags(request_domain_rule);
  4510. return 0;
  4511. }
  4512. static void _dns_server_get_domain_rule_by_domain_ext(struct dns_conf_group *conf,
  4513. struct dns_request_domain_rule *request_domain_rule,
  4514. int rule_index, const char *domain, int out_log)
  4515. {
  4516. int domain_len = 0;
  4517. char domain_key[DNS_MAX_CNAME_LEN];
  4518. struct rule_walk_args walk_args;
  4519. int matched_key_len = DNS_MAX_CNAME_LEN;
  4520. unsigned char matched_key[DNS_MAX_CNAME_LEN];
  4521. int i = 0;
  4522. memset(&walk_args, 0, sizeof(walk_args));
  4523. walk_args.args = request_domain_rule;
  4524. walk_args.rule_index = rule_index;
  4525. /* reverse domain string */
  4526. domain_len = strlen(domain);
  4527. if (domain_len >= (int)sizeof(domain_key) - 3) {
  4528. return;
  4529. }
  4530. reverse_string(domain_key + 1, domain, domain_len, 1);
  4531. domain_key[domain_len + 1] = '.';
  4532. domain_key[0] = '.';
  4533. domain_len += 2;
  4534. domain_key[domain_len] = 0;
  4535. /* find domain rule */
  4536. art_substring_walk(&conf->domain_rule.tree, (unsigned char *)domain_key, domain_len, _dns_server_get_rules,
  4537. &walk_args);
  4538. if (likely(dns_conf_log_level > TLOG_DEBUG) || out_log == 0) {
  4539. return;
  4540. }
  4541. if (walk_args.rule_index >= 0) {
  4542. i = walk_args.rule_index;
  4543. } else {
  4544. i = 0;
  4545. }
  4546. /* output log rule */
  4547. for (; i < DOMAIN_RULE_MAX; i++) {
  4548. if (walk_args.key[i] == NULL) {
  4549. if (walk_args.rule_index >= 0) {
  4550. break;
  4551. }
  4552. continue;
  4553. }
  4554. matched_key_len = walk_args.key_len[i];
  4555. if (walk_args.key_len[i] >= sizeof(matched_key)) {
  4556. continue;
  4557. }
  4558. memcpy(matched_key, walk_args.key[i], walk_args.key_len[i]);
  4559. matched_key_len--;
  4560. matched_key[matched_key_len] = 0;
  4561. _dns_server_log_rule(domain, i, matched_key, matched_key_len);
  4562. if (walk_args.rule_index >= 0) {
  4563. break;
  4564. }
  4565. }
  4566. }
  4567. static void _dns_server_get_domain_rule_by_domain(struct dns_request *request, const char *domain, int out_log)
  4568. {
  4569. if (request->skip_domain_rule != 0) {
  4570. return;
  4571. }
  4572. if (request->conf == NULL) {
  4573. return;
  4574. }
  4575. _dns_server_get_domain_rule_by_domain_ext(request->conf, &request->domain_rule, -1, domain, out_log);
  4576. request->skip_domain_rule = 1;
  4577. }
  4578. static void _dns_server_get_domain_rule(struct dns_request *request)
  4579. {
  4580. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULES) == 0) {
  4581. return;
  4582. }
  4583. _dns_server_get_domain_rule_by_domain(request, request->domain, 1);
  4584. }
  4585. static int _dns_server_pre_process_server_flags(struct dns_request *request)
  4586. {
  4587. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0) {
  4588. request->no_cache = 1;
  4589. }
  4590. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_IP_ALIAS) == 0) {
  4591. request->no_ipalias = 1;
  4592. }
  4593. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_PREFETCH) == 0) {
  4594. request->prefetch_flags |= PREFETCH_FLAGS_NOPREFETCH;
  4595. }
  4596. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_SERVE_EXPIRED) == 0) {
  4597. request->no_serve_expired = 1;
  4598. }
  4599. if (request->qtype == DNS_T_HTTPS && _dns_server_has_bind_flag(request, BIND_FLAG_FORCE_HTTPS_SOA) == 0) {
  4600. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  4601. return 0;
  4602. }
  4603. return -1;
  4604. }
  4605. static int _dns_server_pre_process_rule_flags(struct dns_request *request)
  4606. {
  4607. struct dns_rule_flags *rule_flag = NULL;
  4608. unsigned int flags = 0;
  4609. int rcode = DNS_RC_NOERROR;
  4610. /* get domain rule flag */
  4611. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  4612. if (rule_flag != NULL) {
  4613. flags = rule_flag->flags;
  4614. }
  4615. if (flags & DOMAIN_FLAG_NO_SERVE_EXPIRED) {
  4616. request->no_serve_expired = 1;
  4617. }
  4618. if (flags & DOMAIN_FLAG_NO_CACHE) {
  4619. request->no_cache = 1;
  4620. }
  4621. if (flags & DOMAIN_FLAG_ENABLE_CACHE) {
  4622. request->no_cache = 0;
  4623. }
  4624. if (flags & DOMAIN_FLAG_NO_IPALIAS) {
  4625. request->no_ipalias = 1;
  4626. }
  4627. if (flags & DOMAIN_FLAG_ADDR_IGN) {
  4628. /* ignore this domain */
  4629. goto skip_soa_out;
  4630. }
  4631. /* return specific type of address */
  4632. switch (request->qtype) {
  4633. case DNS_T_A:
  4634. if (flags & DOMAIN_FLAG_ADDR_IPV4_IGN) {
  4635. /* ignore this domain for A request */
  4636. goto skip_soa_out;
  4637. }
  4638. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] != NULL) {
  4639. goto skip_soa_out;
  4640. }
  4641. if (_dns_server_is_return_soa(request)) {
  4642. /* if AAAA exists, return SOA with NOERROR*/
  4643. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] != NULL) {
  4644. goto soa;
  4645. }
  4646. /* if AAAA not exists, return SOA with NXDOMAIN */
  4647. if (_dns_server_is_return_soa_qtype(request, DNS_T_AAAA)) {
  4648. rcode = DNS_RC_NXDOMAIN;
  4649. }
  4650. goto soa;
  4651. }
  4652. goto out;
  4653. break;
  4654. case DNS_T_AAAA:
  4655. if (flags & DOMAIN_FLAG_ADDR_IPV6_IGN) {
  4656. /* ignore this domain for A request */
  4657. goto skip_soa_out;
  4658. }
  4659. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] != NULL) {
  4660. goto skip_soa_out;
  4661. }
  4662. if (_dns_server_is_return_soa(request)) {
  4663. /* if A exists, return SOA with NOERROR*/
  4664. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] != NULL) {
  4665. goto soa;
  4666. }
  4667. /* if A not exists, return SOA with NXDOMAIN */
  4668. if (_dns_server_is_return_soa_qtype(request, DNS_T_A)) {
  4669. rcode = DNS_RC_NXDOMAIN;
  4670. }
  4671. goto soa;
  4672. }
  4673. if (flags & DOMAIN_FLAG_ADDR_IPV4_SOA && request->dualstack_selection) {
  4674. /* if IPV4 return SOA and dualstack-selection enabled, set request dualstack disable */
  4675. request->dualstack_selection = 0;
  4676. }
  4677. goto out;
  4678. break;
  4679. case DNS_T_HTTPS:
  4680. if (flags & DOMAIN_FLAG_ADDR_HTTPS_IGN) {
  4681. /* ignore this domain for A request */
  4682. goto skip_soa_out;
  4683. }
  4684. if (_dns_server_is_return_soa(request)) {
  4685. /* if HTTPS exists, return SOA with NOERROR*/
  4686. if (request->domain_rule.rules[DOMAIN_RULE_HTTPS] != NULL) {
  4687. goto soa;
  4688. }
  4689. if (_dns_server_is_return_soa_qtype(request, DNS_T_A) &&
  4690. _dns_server_is_return_soa_qtype(request, DNS_T_AAAA)) {
  4691. /* return SOA for HTTPS request */
  4692. rcode = DNS_RC_NXDOMAIN;
  4693. goto soa;
  4694. }
  4695. }
  4696. if (request->domain_rule.rules[DOMAIN_RULE_HTTPS] != NULL) {
  4697. goto skip_soa_out;
  4698. }
  4699. goto out;
  4700. break;
  4701. default:
  4702. goto out;
  4703. break;
  4704. }
  4705. if (_dns_server_is_return_soa(request)) {
  4706. goto soa;
  4707. }
  4708. skip_soa_out:
  4709. request->skip_qtype_soa = 1;
  4710. out:
  4711. return -1;
  4712. soa:
  4713. /* return SOA */
  4714. _dns_server_reply_SOA(rcode, request);
  4715. return 0;
  4716. }
  4717. static int _dns_server_address_generate_order(int orders[], int order_num, int max_order_count)
  4718. {
  4719. int i = 0;
  4720. int j = 0;
  4721. int k = 0;
  4722. unsigned int seed = time(NULL);
  4723. for (i = 0; i < order_num && i < max_order_count; i++) {
  4724. orders[i] = i;
  4725. }
  4726. for (i = 0; i < order_num && max_order_count; i++) {
  4727. k = rand_r(&seed) % order_num;
  4728. j = rand_r(&seed) % order_num;
  4729. if (j == k) {
  4730. continue;
  4731. }
  4732. int temp = orders[j];
  4733. orders[j] = orders[k];
  4734. orders[k] = temp;
  4735. }
  4736. return 0;
  4737. }
  4738. static int _dns_server_process_address(struct dns_request *request)
  4739. {
  4740. struct dns_rule_address_IPV4 *address_ipv4 = NULL;
  4741. struct dns_rule_address_IPV6 *address_ipv6 = NULL;
  4742. int orders[DNS_MAX_REPLY_IP_NUM];
  4743. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_ADDR) == 0) {
  4744. goto errout;
  4745. }
  4746. /* address /domain/ rule */
  4747. switch (request->qtype) {
  4748. case DNS_T_A:
  4749. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV4] == NULL) {
  4750. goto errout;
  4751. }
  4752. address_ipv4 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV4);
  4753. if (address_ipv4 == NULL) {
  4754. goto errout;
  4755. }
  4756. _dns_server_address_generate_order(orders, address_ipv4->addr_num, DNS_MAX_REPLY_IP_NUM);
  4757. memcpy(request->ip_addr, address_ipv4->ipv4_addr[orders[0]], DNS_RR_A_LEN);
  4758. for (int i = 1; i < address_ipv4->addr_num; i++) {
  4759. int index = orders[i];
  4760. if (index >= address_ipv4->addr_num) {
  4761. continue;
  4762. }
  4763. _dns_ip_address_check_add(request, request->cname, address_ipv4->ipv4_addr[index], DNS_T_A, 1, NULL);
  4764. }
  4765. break;
  4766. case DNS_T_AAAA:
  4767. if (request->domain_rule.rules[DOMAIN_RULE_ADDRESS_IPV6] == NULL) {
  4768. goto errout;
  4769. }
  4770. address_ipv6 = _dns_server_get_dns_rule(request, DOMAIN_RULE_ADDRESS_IPV6);
  4771. if (address_ipv6 == NULL) {
  4772. goto errout;
  4773. }
  4774. _dns_server_address_generate_order(orders, address_ipv6->addr_num, DNS_MAX_REPLY_IP_NUM);
  4775. memcpy(request->ip_addr, address_ipv6->ipv6_addr[orders[0]], DNS_RR_AAAA_LEN);
  4776. for (int i = 1; i < address_ipv6->addr_num; i++) {
  4777. int index = orders[i];
  4778. if (index >= address_ipv6->addr_num) {
  4779. continue;
  4780. }
  4781. _dns_ip_address_check_add(request, request->cname, address_ipv6->ipv6_addr[index], DNS_T_AAAA, 1, NULL);
  4782. }
  4783. break;
  4784. default:
  4785. goto errout;
  4786. break;
  4787. }
  4788. request->rcode = DNS_RC_NOERROR;
  4789. request->ip_ttl = _dns_server_get_local_ttl(request);
  4790. request->has_ip = 1;
  4791. struct dns_server_post_context context;
  4792. _dns_server_post_context_init(&context, request);
  4793. context.do_reply = 1;
  4794. context.do_audit = 1;
  4795. context.do_ipset = 1;
  4796. context.select_all_best_ip = 1;
  4797. _dns_request_post(&context);
  4798. return 0;
  4799. errout:
  4800. return -1;
  4801. }
  4802. static struct dns_request *_dns_server_new_child_request(struct dns_request *request, const char *domain,
  4803. dns_type_t qtype, child_request_callback child_callback)
  4804. {
  4805. struct dns_request *child_request = NULL;
  4806. child_request = _dns_server_new_request();
  4807. if (child_request == NULL) {
  4808. tlog(TLOG_ERROR, "malloc failed.\n");
  4809. goto errout;
  4810. }
  4811. child_request->server_flags = request->server_flags;
  4812. safe_strncpy(child_request->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  4813. safe_strncpy(child_request->domain, domain, sizeof(child_request->domain));
  4814. child_request->prefetch = request->prefetch;
  4815. child_request->prefetch_flags = request->prefetch_flags;
  4816. child_request->child_callback = child_callback;
  4817. child_request->parent_request = request;
  4818. child_request->qtype = qtype;
  4819. child_request->qclass = request->qclass;
  4820. child_request->conf = request->conf;
  4821. if (request->has_ecs) {
  4822. memcpy(&child_request->ecs, &request->ecs, sizeof(child_request->ecs));
  4823. child_request->has_ecs = request->has_ecs;
  4824. }
  4825. _dns_server_request_get(request);
  4826. /* reference count is 1 hold by parent request */
  4827. request->child_request = child_request;
  4828. _dns_server_get_domain_rule(child_request);
  4829. return child_request;
  4830. errout:
  4831. if (child_request) {
  4832. _dns_server_request_release(child_request);
  4833. }
  4834. return NULL;
  4835. }
  4836. static int _dns_server_request_copy(struct dns_request *request, struct dns_request *from)
  4837. {
  4838. unsigned long bucket = 0;
  4839. struct dns_ip_address *addr_map = NULL;
  4840. struct hlist_node *tmp = NULL;
  4841. uint32_t key = 0;
  4842. int addr_len = 0;
  4843. request->rcode = from->rcode;
  4844. if (from->has_ip) {
  4845. request->has_ip = 1;
  4846. request->ip_ttl = _dns_server_get_conf_ttl(request, from->ip_ttl);
  4847. request->ping_time = from->ping_time;
  4848. memcpy(request->ip_addr, from->ip_addr, sizeof(request->ip_addr));
  4849. }
  4850. if (from->has_cname) {
  4851. request->has_cname = 1;
  4852. request->ttl_cname = from->ttl_cname;
  4853. safe_strncpy(request->cname, from->cname, sizeof(request->cname));
  4854. }
  4855. if (from->has_soa) {
  4856. request->has_soa = 1;
  4857. memcpy(&request->soa, &from->soa, sizeof(request->soa));
  4858. }
  4859. pthread_mutex_lock(&request->ip_map_lock);
  4860. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  4861. {
  4862. hash_del(&addr_map->node);
  4863. free(addr_map);
  4864. }
  4865. pthread_mutex_unlock(&request->ip_map_lock);
  4866. pthread_mutex_lock(&from->ip_map_lock);
  4867. hash_for_each_safe(from->ip_map, bucket, tmp, addr_map, node)
  4868. {
  4869. struct dns_ip_address *new_addr_map = NULL;
  4870. if (addr_map->addr_type == DNS_T_A) {
  4871. addr_len = DNS_RR_A_LEN;
  4872. } else if (addr_map->addr_type == DNS_T_AAAA) {
  4873. addr_len = DNS_RR_AAAA_LEN;
  4874. } else {
  4875. continue;
  4876. }
  4877. new_addr_map = malloc(sizeof(struct dns_ip_address));
  4878. if (new_addr_map == NULL) {
  4879. tlog(TLOG_ERROR, "malloc failed.\n");
  4880. pthread_mutex_unlock(&from->ip_map_lock);
  4881. return -1;
  4882. }
  4883. memcpy(new_addr_map, addr_map, sizeof(struct dns_ip_address));
  4884. new_addr_map->ping_time = addr_map->ping_time;
  4885. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  4886. key = jhash(&addr_map->addr_type, sizeof(addr_map->addr_type), key);
  4887. pthread_mutex_lock(&request->ip_map_lock);
  4888. hash_add(request->ip_map, &new_addr_map->node, key);
  4889. pthread_mutex_unlock(&request->ip_map_lock);
  4890. }
  4891. pthread_mutex_unlock(&from->ip_map_lock);
  4892. return 0;
  4893. }
  4894. static DNS_CHILD_POST_RESULT _dns_server_process_cname_callback(struct dns_request *request,
  4895. struct dns_request *child_request, int is_first_resp)
  4896. {
  4897. _dns_server_request_copy(request, child_request);
  4898. if (child_request->rcode == DNS_RC_NOERROR && request->conf->dns_force_no_cname == 0 &&
  4899. child_request->has_soa == 0) {
  4900. safe_strncpy(request->cname, child_request->domain, sizeof(request->cname));
  4901. request->has_cname = 1;
  4902. request->ttl_cname = _dns_server_get_conf_ttl(request, child_request->ip_ttl);
  4903. }
  4904. return DNS_CHILD_POST_SUCCESS;
  4905. }
  4906. static int _dns_server_process_cname_pre(struct dns_request *request)
  4907. {
  4908. struct dns_cname_rule *cname = NULL;
  4909. struct dns_rule_flags *rule_flag = NULL;
  4910. struct dns_request_domain_rule domain_rule;
  4911. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  4912. return 0;
  4913. }
  4914. if (request->has_cname_loop == 1) {
  4915. return 0;
  4916. }
  4917. /* get domain rule flag */
  4918. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  4919. if (rule_flag != NULL) {
  4920. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  4921. return 0;
  4922. }
  4923. }
  4924. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  4925. if (cname == NULL) {
  4926. return 0;
  4927. }
  4928. request->skip_domain_rule = 0;
  4929. /* copy child rules */
  4930. memcpy(&domain_rule, &request->domain_rule, sizeof(domain_rule));
  4931. memset(&request->domain_rule, 0, sizeof(request->domain_rule));
  4932. _dns_server_get_domain_rule_by_domain(request, cname->cname, 0);
  4933. request->domain_rule.rules[DOMAIN_RULE_CNAME] = domain_rule.rules[DOMAIN_RULE_CNAME];
  4934. request->domain_rule.is_sub_rule[DOMAIN_RULE_CNAME] = domain_rule.is_sub_rule[DOMAIN_RULE_CNAME];
  4935. request->no_select_possible_ip = 1;
  4936. request->no_cache_cname = 1;
  4937. safe_strncpy(request->cname, cname->cname, sizeof(request->cname));
  4938. return 0;
  4939. }
  4940. static int _dns_server_process_cname(struct dns_request *request)
  4941. {
  4942. struct dns_cname_rule *cname = NULL;
  4943. const char *child_group_name = NULL;
  4944. int ret = 0;
  4945. struct dns_rule_flags *rule_flag = NULL;
  4946. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_CNAME) == 0) {
  4947. return 0;
  4948. }
  4949. if (request->has_cname_loop == 1) {
  4950. return 0;
  4951. }
  4952. /* get domain rule flag */
  4953. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  4954. if (rule_flag != NULL) {
  4955. if (rule_flag->flags & DOMAIN_FLAG_CNAME_IGN) {
  4956. return 0;
  4957. }
  4958. }
  4959. cname = _dns_server_get_dns_rule(request, DOMAIN_RULE_CNAME);
  4960. if (cname == NULL) {
  4961. return 0;
  4962. }
  4963. tlog(TLOG_INFO, "query %s with cname %s", request->domain, cname->cname);
  4964. struct dns_request *child_request =
  4965. _dns_server_new_child_request(request, cname->cname, request->qtype, _dns_server_process_cname_callback);
  4966. if (child_request == NULL) {
  4967. tlog(TLOG_ERROR, "malloc failed.\n");
  4968. return -1;
  4969. }
  4970. /* check cname rule loop */
  4971. struct dns_request *check_request = child_request->parent_request;
  4972. struct dns_cname_rule *child_cname = _dns_server_get_dns_rule(child_request, DOMAIN_RULE_CNAME);
  4973. /* sub domain rule*/
  4974. if (child_cname != NULL && strncasecmp(child_request->domain, child_cname->cname, DNS_MAX_CNAME_LEN) == 0) {
  4975. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  4976. child_request->has_cname_loop = 1;
  4977. }
  4978. /* loop rule */
  4979. while (check_request != NULL && child_cname != NULL) {
  4980. struct dns_cname_rule *check_cname = _dns_server_get_dns_rule(check_request, DOMAIN_RULE_CNAME);
  4981. if (check_cname == NULL) {
  4982. break;
  4983. }
  4984. if (strstr(child_request->domain, check_request->domain) != NULL &&
  4985. check_request != child_request->parent_request) {
  4986. child_request->domain_rule.rules[DOMAIN_RULE_CNAME] = NULL;
  4987. child_request->has_cname_loop = 1;
  4988. break;
  4989. }
  4990. check_request = check_request->parent_request;
  4991. }
  4992. child_group_name = _dns_server_get_request_server_groupname(child_request);
  4993. if (child_group_name) {
  4994. /* reset dns group and setup child request domain group again when do query.*/
  4995. child_request->dns_group_name[0] = '\0';
  4996. }
  4997. request->request_wait++;
  4998. ret = _dns_server_do_query(child_request, 0);
  4999. if (ret != 0) {
  5000. request->request_wait--;
  5001. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  5002. goto errout;
  5003. }
  5004. _dns_server_request_release_complete(child_request, 0);
  5005. return 1;
  5006. errout:
  5007. if (child_request) {
  5008. request->child_request = NULL;
  5009. _dns_server_request_release(child_request);
  5010. }
  5011. return -1;
  5012. }
  5013. static enum DNS_CHILD_POST_RESULT
  5014. _dns_server_process_dns64_callback(struct dns_request *request, struct dns_request *child_request, int is_first_resp)
  5015. {
  5016. unsigned long bucket = 0;
  5017. struct dns_ip_address *addr_map = NULL;
  5018. struct hlist_node *tmp = NULL;
  5019. uint32_t key = 0;
  5020. int addr_len = 0;
  5021. if (request->has_ip == 1) {
  5022. if (memcmp(request->ip_addr, dns_conf_dns_dns64.prefix, 12) != 0) {
  5023. return DNS_CHILD_POST_SKIP;
  5024. }
  5025. }
  5026. if (child_request->qtype != DNS_T_A) {
  5027. return DNS_CHILD_POST_FAIL;
  5028. }
  5029. if (child_request->has_cname == 1) {
  5030. safe_strncpy(request->cname, child_request->cname, sizeof(request->cname));
  5031. request->has_cname = 1;
  5032. request->ttl_cname = child_request->ttl_cname;
  5033. }
  5034. if (child_request->has_ip == 0) {
  5035. if (child_request->has_soa) {
  5036. memcpy(&request->soa, &child_request->soa, sizeof(struct dns_soa));
  5037. request->has_soa = 1;
  5038. return DNS_CHILD_POST_SUCCESS;
  5039. }
  5040. if (request->has_soa == 0) {
  5041. _dns_server_setup_soa(request);
  5042. request->has_soa = 1;
  5043. }
  5044. return DNS_CHILD_POST_FAIL;
  5045. }
  5046. memcpy(request->ip_addr, dns_conf_dns_dns64.prefix, 16);
  5047. memcpy(request->ip_addr + 12, child_request->ip_addr, 4);
  5048. request->ip_ttl = child_request->ip_ttl;
  5049. request->has_ip = 1;
  5050. request->has_soa = 0;
  5051. request->rcode = child_request->rcode;
  5052. pthread_mutex_lock(&request->ip_map_lock);
  5053. hash_for_each_safe(request->ip_map, bucket, tmp, addr_map, node)
  5054. {
  5055. hash_del(&addr_map->node);
  5056. free(addr_map);
  5057. }
  5058. pthread_mutex_unlock(&request->ip_map_lock);
  5059. pthread_mutex_lock(&child_request->ip_map_lock);
  5060. hash_for_each_safe(child_request->ip_map, bucket, tmp, addr_map, node)
  5061. {
  5062. struct dns_ip_address *new_addr_map = NULL;
  5063. if (addr_map->addr_type == DNS_T_A) {
  5064. addr_len = DNS_RR_A_LEN;
  5065. } else {
  5066. continue;
  5067. }
  5068. new_addr_map = malloc(sizeof(struct dns_ip_address));
  5069. if (new_addr_map == NULL) {
  5070. tlog(TLOG_ERROR, "malloc failed.\n");
  5071. pthread_mutex_unlock(&child_request->ip_map_lock);
  5072. return DNS_CHILD_POST_FAIL;
  5073. }
  5074. memset(new_addr_map, 0, sizeof(struct dns_ip_address));
  5075. new_addr_map->addr_type = DNS_T_AAAA;
  5076. addr_len = DNS_RR_AAAA_LEN;
  5077. memcpy(new_addr_map->ip_addr, dns_conf_dns_dns64.prefix, 16);
  5078. memcpy(new_addr_map->ip_addr + 12, addr_map->ip_addr, 4);
  5079. new_addr_map->ping_time = addr_map->ping_time;
  5080. key = jhash(new_addr_map->ip_addr, addr_len, 0);
  5081. key = jhash(&new_addr_map->addr_type, sizeof(new_addr_map->addr_type), key);
  5082. pthread_mutex_lock(&request->ip_map_lock);
  5083. hash_add(request->ip_map, &new_addr_map->node, key);
  5084. pthread_mutex_unlock(&request->ip_map_lock);
  5085. }
  5086. pthread_mutex_unlock(&child_request->ip_map_lock);
  5087. if (request->dualstack_selection == 1) {
  5088. return DNS_CHILD_POST_NO_RESPONSE;
  5089. }
  5090. return DNS_CHILD_POST_SUCCESS;
  5091. }
  5092. static int _dns_server_process_dns64(struct dns_request *request)
  5093. {
  5094. if (_dns_server_is_dns64_request(request) == 0) {
  5095. return 0;
  5096. }
  5097. tlog(TLOG_DEBUG, "query %s with dns64", request->domain);
  5098. struct dns_request *child_request =
  5099. _dns_server_new_child_request(request, request->domain, DNS_T_A, _dns_server_process_dns64_callback);
  5100. if (child_request == NULL) {
  5101. tlog(TLOG_ERROR, "malloc failed.\n");
  5102. return -1;
  5103. }
  5104. request->request_wait++;
  5105. int ret = _dns_server_do_query(child_request, 0);
  5106. if (ret != 0) {
  5107. request->request_wait--;
  5108. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, request->qtype);
  5109. goto errout;
  5110. }
  5111. _dns_server_request_release_complete(child_request, 0);
  5112. return 1;
  5113. errout:
  5114. if (child_request) {
  5115. request->child_request = NULL;
  5116. _dns_server_request_release(child_request);
  5117. }
  5118. return -1;
  5119. }
  5120. static int _dns_server_process_https_svcb(struct dns_request *request)
  5121. {
  5122. struct dns_https_record_rule *https_record_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_HTTPS);
  5123. if (request->qtype != DNS_T_HTTPS) {
  5124. return 0;
  5125. }
  5126. if (request->https_svcb != NULL) {
  5127. return 0;
  5128. }
  5129. request->https_svcb = malloc(sizeof(*request->https_svcb));
  5130. if (request->https_svcb == NULL) {
  5131. return -1;
  5132. }
  5133. memset(request->https_svcb, 0, sizeof(*request->https_svcb));
  5134. if (https_record_rule == NULL) {
  5135. return 0;
  5136. }
  5137. if (https_record_rule->record.enable == 0) {
  5138. return 0;
  5139. }
  5140. safe_strncpy(request->https_svcb->domain, request->domain, sizeof(request->https_svcb->domain));
  5141. safe_strncpy(request->https_svcb->target, https_record_rule->record.target, sizeof(request->https_svcb->target));
  5142. request->https_svcb->priority = https_record_rule->record.priority;
  5143. request->https_svcb->port = https_record_rule->record.port;
  5144. memcpy(request->https_svcb->ech, https_record_rule->record.ech, https_record_rule->record.ech_len);
  5145. request->https_svcb->ech_len = https_record_rule->record.ech_len;
  5146. memcpy(request->https_svcb->alpn, https_record_rule->record.alpn, sizeof(request->https_svcb->alpn));
  5147. request->https_svcb->alpn_len = https_record_rule->record.alpn_len;
  5148. if (https_record_rule->record.has_ipv4) {
  5149. memcpy(request->ip_addr, https_record_rule->record.ipv4_addr, DNS_RR_A_LEN);
  5150. request->ip_addr_type = DNS_T_A;
  5151. request->has_ip = 1;
  5152. } else if (https_record_rule->record.has_ipv6) {
  5153. memcpy(request->ip_addr, https_record_rule->record.ipv6_addr, DNS_RR_AAAA_LEN);
  5154. request->ip_addr_type = DNS_T_AAAA;
  5155. request->has_ip = 1;
  5156. }
  5157. request->rcode = DNS_RC_NOERROR;
  5158. return -1;
  5159. }
  5160. static int _dns_server_qtype_soa(struct dns_request *request)
  5161. {
  5162. if (request->skip_qtype_soa || request->conf->soa_table == NULL) {
  5163. return -1;
  5164. }
  5165. if (request->qtype >= 0 && request->qtype <= MAX_QTYPE_NUM) {
  5166. int offset = request->qtype / 8;
  5167. int bit = request->qtype % 8;
  5168. if ((request->conf->soa_table[offset] & (1 << bit)) == 0) {
  5169. return -1;
  5170. }
  5171. }
  5172. _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  5173. tlog(TLOG_DEBUG, "force qtype %d soa", request->qtype);
  5174. return 0;
  5175. }
  5176. static void _dns_server_process_speed_rule(struct dns_request *request)
  5177. {
  5178. struct dns_domain_check_orders *check_order = NULL;
  5179. struct dns_response_mode_rule *response_mode = NULL;
  5180. /* get speed check mode */
  5181. check_order = _dns_server_get_dns_rule(request, DOMAIN_RULE_CHECKSPEED);
  5182. if (check_order != NULL) {
  5183. request->check_order_list = check_order;
  5184. }
  5185. /* get response mode */
  5186. response_mode = _dns_server_get_dns_rule(request, DOMAIN_RULE_RESPONSE_MODE);
  5187. if (response_mode != NULL) {
  5188. request->response_mode = response_mode->mode;
  5189. } else {
  5190. request->response_mode = request->conf->dns_response_mode;
  5191. }
  5192. }
  5193. static int _dns_server_get_expired_ttl_reply(struct dns_request *request, struct dns_cache *dns_cache)
  5194. {
  5195. int ttl = dns_cache_get_ttl(dns_cache);
  5196. if (ttl > 0) {
  5197. return ttl;
  5198. }
  5199. return request->conf->dns_serve_expired_reply_ttl;
  5200. }
  5201. static int _dns_server_process_cache_packet(struct dns_request *request, struct dns_cache *dns_cache)
  5202. {
  5203. int ret = -1;
  5204. struct dns_cache_packet *cache_packet = NULL;
  5205. if (dns_cache->info.qtype != request->qtype) {
  5206. goto out;
  5207. }
  5208. cache_packet = (struct dns_cache_packet *)dns_cache_get_data(dns_cache);
  5209. if (cache_packet == NULL) {
  5210. goto out;
  5211. }
  5212. int do_ipset = (dns_cache_get_ttl(dns_cache) == 0);
  5213. if (dns_cache_is_visited(dns_cache) == 0) {
  5214. do_ipset = 1;
  5215. }
  5216. struct dns_server_post_context context;
  5217. _dns_server_post_context_init(&context, request);
  5218. context.inpacket = cache_packet->data;
  5219. context.inpacket_len = cache_packet->head.size;
  5220. request->ping_time = dns_cache->info.speed;
  5221. if (dns_decode(context.packet, context.packet_maxlen, cache_packet->data, cache_packet->head.size) != 0) {
  5222. tlog(TLOG_ERROR, "decode cache failed, %d, %d", context.packet_maxlen, context.inpacket_len);
  5223. goto out;
  5224. }
  5225. /* Check if records in cache contain DNSSEC, if not exist, skip cache */
  5226. if (request->passthrough == 1) {
  5227. if ((dns_get_OPT_option(context.packet) & DNS_OPT_FLAG_DO) == 0 && request->edns0_do == 1) {
  5228. goto out;
  5229. }
  5230. }
  5231. request->rcode = context.packet->head.rcode;
  5232. context.do_cache = 0;
  5233. context.do_ipset = do_ipset;
  5234. context.do_audit = 1;
  5235. context.do_reply = 1;
  5236. context.reply_ttl = _dns_server_get_expired_ttl_reply(request, dns_cache);
  5237. ret = _dns_server_reply_passthrough(&context);
  5238. out:
  5239. if (cache_packet) {
  5240. dns_cache_data_put((struct dns_cache_data *)cache_packet);
  5241. }
  5242. return ret;
  5243. }
  5244. static int _dns_server_process_cache_data(struct dns_request *request, struct dns_cache *dns_cache)
  5245. {
  5246. int ret = -1;
  5247. request->ping_time = dns_cache->info.speed;
  5248. ret = _dns_server_process_cache_packet(request, dns_cache);
  5249. if (ret != 0) {
  5250. goto out;
  5251. }
  5252. return 0;
  5253. out:
  5254. return -1;
  5255. }
  5256. static int _dns_server_process_cache(struct dns_request *request)
  5257. {
  5258. struct dns_cache *dns_cache = NULL;
  5259. struct dns_cache *dualstack_dns_cache = NULL;
  5260. int ret = -1;
  5261. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_CACHE) == 0) {
  5262. goto out;
  5263. }
  5264. struct dns_cache_key cache_key;
  5265. cache_key.dns_group_name = request->dns_group_name;
  5266. cache_key.domain = request->domain;
  5267. cache_key.qtype = request->qtype;
  5268. cache_key.query_flag = request->server_flags;
  5269. dns_cache = dns_cache_lookup(&cache_key);
  5270. if (dns_cache == NULL) {
  5271. goto out;
  5272. }
  5273. if (request->qtype != dns_cache->info.qtype) {
  5274. goto out;
  5275. }
  5276. if (request->qtype == DNS_T_A && request->conf->dns_dualstack_ip_allow_force_AAAA == 0) {
  5277. goto reply_cache;
  5278. }
  5279. if (request->qtype != DNS_T_A && request->qtype != DNS_T_AAAA) {
  5280. goto reply_cache;
  5281. }
  5282. if (request->dualstack_selection) {
  5283. int dualstack_qtype = 0;
  5284. if (request->qtype == DNS_T_A) {
  5285. dualstack_qtype = DNS_T_AAAA;
  5286. } else if (request->qtype == DNS_T_AAAA) {
  5287. dualstack_qtype = DNS_T_A;
  5288. } else {
  5289. goto reply_cache;
  5290. }
  5291. cache_key.qtype = dualstack_qtype;
  5292. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  5293. if (dualstack_dns_cache == NULL && request->cname[0] != '\0') {
  5294. cache_key.domain = request->cname;
  5295. dualstack_dns_cache = dns_cache_lookup(&cache_key);
  5296. }
  5297. if (dualstack_dns_cache && (dualstack_dns_cache->info.speed > 0)) {
  5298. if ((dualstack_dns_cache->info.speed + (request->conf->dns_dualstack_ip_selection_threshold * 10)) <
  5299. dns_cache->info.speed ||
  5300. dns_cache->info.speed < 0) {
  5301. tlog(TLOG_DEBUG, "cache result: %s, qtype: %d, force %s preferred, id: %d, time1: %d, time2: %d",
  5302. request->domain, request->qtype, request->qtype == DNS_T_AAAA ? "IPv4" : "IPv6", request->id,
  5303. dns_cache->info.speed, dualstack_dns_cache->info.speed);
  5304. request->ip_ttl = _dns_server_get_expired_ttl_reply(request, dualstack_dns_cache);
  5305. ret = _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  5306. goto out_update_cache;
  5307. }
  5308. }
  5309. }
  5310. reply_cache:
  5311. if (dns_cache_get_ttl(dns_cache) <= 0 && request->no_serve_expired == 1) {
  5312. goto out;
  5313. }
  5314. ret = _dns_server_process_cache_data(request, dns_cache);
  5315. if (ret != 0) {
  5316. goto out;
  5317. }
  5318. out_update_cache:
  5319. if (dns_cache_get_ttl(dns_cache) == 0) {
  5320. struct dns_server_query_option dns_query_options;
  5321. int prefetch_flags = 0;
  5322. dns_query_options.server_flags = request->server_flags;
  5323. dns_query_options.dns_group_name = request->dns_group_name;
  5324. if (request->conn == NULL) {
  5325. dns_query_options.server_flags = dns_cache_get_query_flag(dns_cache);
  5326. dns_query_options.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  5327. }
  5328. dns_query_options.ecs_enable_flag = 0;
  5329. if (request->has_ecs) {
  5330. dns_query_options.ecs_enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  5331. memcpy(&dns_query_options.ecs_dns, &request->ecs, sizeof(dns_query_options.ecs_dns));
  5332. }
  5333. if (request->edns0_do) {
  5334. dns_query_options.ecs_enable_flag |= DNS_QUEY_OPTION_EDNS0_DO;
  5335. prefetch_flags |= PREFETCH_FLAGS_NOPREFETCH;
  5336. }
  5337. _dns_server_prefetch_request(request->domain, request->qtype, &dns_query_options, prefetch_flags);
  5338. } else {
  5339. dns_cache_update(dns_cache);
  5340. }
  5341. out:
  5342. if (dns_cache) {
  5343. dns_cache_release(dns_cache);
  5344. }
  5345. if (dualstack_dns_cache) {
  5346. dns_cache_release(dualstack_dns_cache);
  5347. dualstack_dns_cache = NULL;
  5348. }
  5349. return ret;
  5350. }
  5351. void dns_server_check_ipv6_ready(void)
  5352. {
  5353. static int do_get_conf = 0;
  5354. static int is_icmp_check_set;
  5355. static int is_tcp_check_set;
  5356. if (do_get_conf == 0) {
  5357. if (dns_conf_has_icmp_check == 1) {
  5358. is_icmp_check_set = 1;
  5359. }
  5360. if (dns_conf_has_tcp_check == 1) {
  5361. is_tcp_check_set = 1;
  5362. }
  5363. if (is_icmp_check_set == 0) {
  5364. tlog(TLOG_INFO, "ICMP ping is disabled, no ipv6 icmp check feature");
  5365. }
  5366. do_get_conf = 1;
  5367. }
  5368. if (is_icmp_check_set) {
  5369. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_ICMP, "2001::", 1, 0, 100, NULL, NULL);
  5370. if (check_ping) {
  5371. fast_ping_stop(check_ping);
  5372. is_ipv6_ready = 1;
  5373. return;
  5374. }
  5375. if (errno == EADDRNOTAVAIL) {
  5376. is_ipv6_ready = 0;
  5377. return;
  5378. }
  5379. }
  5380. if (is_tcp_check_set) {
  5381. struct ping_host_struct *check_ping = fast_ping_start(PING_TYPE_TCP, "2001::", 1, 0, 100, NULL, NULL);
  5382. if (check_ping) {
  5383. fast_ping_stop(check_ping);
  5384. is_ipv6_ready = 1;
  5385. return;
  5386. }
  5387. if (errno == EADDRNOTAVAIL) {
  5388. is_ipv6_ready = 0;
  5389. return;
  5390. }
  5391. }
  5392. }
  5393. static void _dns_server_request_set_client(struct dns_request *request, struct dns_server_conn_head *conn)
  5394. {
  5395. request->conn = conn;
  5396. request->server_flags = conn->server_flags;
  5397. _dns_server_conn_get(conn);
  5398. }
  5399. static int _dns_server_request_set_client_rules(struct dns_request *request, struct dns_client_rules *client_rule)
  5400. {
  5401. if (client_rule == NULL) {
  5402. if (_dns_server_has_bind_flag(request, BIND_FLAG_ACL) == 0 || dns_conf_acl_enable) {
  5403. request->send_tick = get_tick_count();
  5404. request->rcode = DNS_RC_REFUSED;
  5405. request->no_cache = 1;
  5406. return -1;
  5407. }
  5408. return 0;
  5409. }
  5410. tlog(TLOG_DEBUG, "match client rule.");
  5411. if (client_rule->rules[CLIENT_RULE_GROUP]) {
  5412. struct client_rule_group *group = (struct client_rule_group *)client_rule->rules[CLIENT_RULE_GROUP];
  5413. if (group && group->group_name[0] != '\0') {
  5414. safe_strncpy(request->dns_group_name, group->group_name, sizeof(request->dns_group_name));
  5415. }
  5416. }
  5417. if (client_rule->rules[CLIENT_RULE_FLAGS]) {
  5418. struct client_rule_flags *flags = (struct client_rule_flags *)client_rule->rules[CLIENT_RULE_FLAGS];
  5419. if (flags) {
  5420. request->server_flags = flags->flags;
  5421. }
  5422. }
  5423. return 0;
  5424. }
  5425. static void _dns_server_request_set_id(struct dns_request *request, unsigned short id)
  5426. {
  5427. request->id = id;
  5428. }
  5429. static int _dns_server_request_set_client_addr(struct dns_request *request, struct sockaddr_storage *from,
  5430. socklen_t from_len)
  5431. {
  5432. switch (from->ss_family) {
  5433. case AF_INET:
  5434. memcpy(&request->in, from, from_len);
  5435. request->addr_len = from_len;
  5436. break;
  5437. case AF_INET6:
  5438. memcpy(&request->in6, from, from_len);
  5439. request->addr_len = from_len;
  5440. break;
  5441. default:
  5442. return -1;
  5443. break;
  5444. }
  5445. return 0;
  5446. }
  5447. static void _dns_server_request_set_callback(struct dns_request *request, dns_result_callback callback, void *user_ptr)
  5448. {
  5449. request->result_callback = callback;
  5450. request->user_ptr = user_ptr;
  5451. }
  5452. static int _dns_server_process_smartdns_domain(struct dns_request *request)
  5453. {
  5454. struct dns_rule_flags *rule_flag = NULL;
  5455. unsigned int flags = 0;
  5456. /* get domain rule flag */
  5457. rule_flag = _dns_server_get_dns_rule(request, DOMAIN_RULE_FLAGS);
  5458. if (rule_flag == NULL) {
  5459. return -1;
  5460. }
  5461. if (_dns_server_is_dns_rule_extract_match(request, DOMAIN_RULE_FLAGS) == 0) {
  5462. return -1;
  5463. }
  5464. flags = rule_flag->flags;
  5465. if (!(flags & DOMAIN_FLAG_SMARTDNS_DOMAIN)) {
  5466. return -1;
  5467. }
  5468. return _dns_server_reply_request_eth_ip(request);
  5469. }
  5470. static int _dns_server_process_ptr_query(struct dns_request *request)
  5471. {
  5472. if (request->qtype != DNS_T_PTR) {
  5473. return -1;
  5474. }
  5475. if (_dns_server_process_ptr(request) == 0) {
  5476. return 0;
  5477. }
  5478. request->passthrough = 1;
  5479. return -1;
  5480. }
  5481. static int _dns_server_process_special_query(struct dns_request *request)
  5482. {
  5483. int ret = 0;
  5484. switch (request->qtype) {
  5485. case DNS_T_PTR:
  5486. break;
  5487. case DNS_T_SRV:
  5488. ret = _dns_server_process_srv(request);
  5489. if (ret == 0) {
  5490. goto clean_exit;
  5491. } else {
  5492. /* pass to upstream server */
  5493. request->passthrough = 1;
  5494. }
  5495. case DNS_T_HTTPS:
  5496. break;
  5497. case DNS_T_SVCB:
  5498. ret = _dns_server_process_svcb(request);
  5499. if (ret == 0) {
  5500. goto clean_exit;
  5501. } else {
  5502. /* pass to upstream server */
  5503. request->passthrough = 1;
  5504. }
  5505. break;
  5506. case DNS_T_A:
  5507. break;
  5508. case DNS_T_AAAA:
  5509. break;
  5510. default:
  5511. tlog(TLOG_DEBUG, "unsupported qtype: %d, domain: %s", request->qtype, request->domain);
  5512. request->passthrough = 1;
  5513. /* pass request to upstream server */
  5514. break;
  5515. }
  5516. return -1;
  5517. clean_exit:
  5518. return 0;
  5519. }
  5520. static const char *_dns_server_get_request_server_groupname(struct dns_request *request)
  5521. {
  5522. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_RULE_NAMESERVER) == 0) {
  5523. return NULL;
  5524. }
  5525. /* Get the nameserver rule */
  5526. if (request->domain_rule.rules[DOMAIN_RULE_NAMESERVER]) {
  5527. struct dns_nameserver_rule *nameserver_rule = _dns_server_get_dns_rule(request, DOMAIN_RULE_NAMESERVER);
  5528. return nameserver_rule->group_name;
  5529. }
  5530. return NULL;
  5531. }
  5532. static void _dns_server_check_set_passthrough(struct dns_request *request)
  5533. {
  5534. if (request->check_order_list->orders[0].type == DOMAIN_CHECK_NONE) {
  5535. request->passthrough = 1;
  5536. }
  5537. if (_dns_server_has_bind_flag(request, BIND_FLAG_NO_SPEED_CHECK) == 0) {
  5538. request->passthrough = 1;
  5539. }
  5540. if (is_ipv6_ready == 0 && request->qtype == DNS_T_AAAA) {
  5541. request->passthrough = 1;
  5542. }
  5543. if (request->passthrough == 1) {
  5544. request->dualstack_selection = 0;
  5545. }
  5546. if (request->passthrough == 1 &&
  5547. (request->qtype == DNS_T_A || request->qtype == DNS_T_AAAA || request->qtype == DNS_T_HTTPS) &&
  5548. request->edns0_do == 0) {
  5549. request->passthrough = 2;
  5550. }
  5551. }
  5552. static int _dns_server_process_host(struct dns_request *request)
  5553. {
  5554. uint32_t key = 0;
  5555. struct dns_hosts *host = NULL;
  5556. struct dns_hosts *host_tmp = NULL;
  5557. int dns_type = request->qtype;
  5558. if (dns_hosts_record_num <= 0) {
  5559. return -1;
  5560. }
  5561. key = hash_string_case(request->domain);
  5562. key = jhash(&dns_type, sizeof(dns_type), key);
  5563. hash_for_each_possible(dns_hosts_table.hosts, host_tmp, node, key)
  5564. {
  5565. if (host_tmp->dns_type != dns_type) {
  5566. continue;
  5567. }
  5568. if (strncasecmp(host_tmp->domain, request->domain, DNS_MAX_CNAME_LEN) != 0) {
  5569. continue;
  5570. }
  5571. host = host_tmp;
  5572. break;
  5573. }
  5574. if (host == NULL) {
  5575. return -1;
  5576. }
  5577. if (host->is_soa) {
  5578. request->has_soa = 1;
  5579. return _dns_server_reply_SOA(DNS_RC_NOERROR, request);
  5580. }
  5581. switch (request->qtype) {
  5582. case DNS_T_A:
  5583. memcpy(request->ip_addr, host->ipv4_addr, DNS_RR_A_LEN);
  5584. break;
  5585. case DNS_T_AAAA:
  5586. memcpy(request->ip_addr, host->ipv6_addr, DNS_RR_AAAA_LEN);
  5587. break;
  5588. default:
  5589. goto errout;
  5590. break;
  5591. }
  5592. request->rcode = DNS_RC_NOERROR;
  5593. request->ip_ttl = dns_conf_local_ttl;
  5594. request->has_ip = 1;
  5595. struct dns_server_post_context context;
  5596. _dns_server_post_context_init(&context, request);
  5597. context.do_reply = 1;
  5598. context.do_audit = 1;
  5599. _dns_request_post(&context);
  5600. return 0;
  5601. errout:
  5602. return -1;
  5603. }
  5604. static int _dns_server_setup_query_option(struct dns_request *request, struct dns_query_options *options)
  5605. {
  5606. options->enable_flag = 0;
  5607. if (request->has_ecs) {
  5608. memcpy(&options->ecs_dns, &request->ecs, sizeof(options->ecs_dns));
  5609. options->enable_flag |= DNS_QUEY_OPTION_ECS_DNS;
  5610. }
  5611. if (request->edns0_do) {
  5612. options->enable_flag |= DNS_QUEY_OPTION_EDNS0_DO;
  5613. }
  5614. options->conf_group_name = request->dns_group_name;
  5615. return 0;
  5616. }
  5617. static void _dns_server_mdns_query_setup_server_group(struct dns_request *request, const char **group_name)
  5618. {
  5619. if (request->is_mdns_lookup == 0 || group_name == NULL) {
  5620. return;
  5621. }
  5622. *group_name = DNS_SERVER_GROUP_MDNS;
  5623. return;
  5624. }
  5625. static int _dns_server_mdns_query_setup(struct dns_request *request, const char *server_group_name,
  5626. char **request_domain, char *domain_buffer, int domain_buffer_len)
  5627. {
  5628. if (dns_conf_mdns_lookup != 1) {
  5629. return 0;
  5630. }
  5631. switch (request->qtype) {
  5632. case DNS_T_A:
  5633. case DNS_T_AAAA:
  5634. case DNS_T_SRV:
  5635. if (request->domain[0] != '\0' && strstr(request->domain, ".") == NULL) {
  5636. snprintf(domain_buffer, domain_buffer_len, "%s.%s", request->domain, DNS_SERVER_GROUP_LOCAL);
  5637. *request_domain = domain_buffer;
  5638. _dns_server_set_request_mdns(request);
  5639. }
  5640. if (server_group_name != NULL && strncmp(server_group_name, DNS_SERVER_GROUP_MDNS, DNS_GROUP_NAME_LEN) == 0) {
  5641. _dns_server_set_request_mdns(request);
  5642. }
  5643. break;
  5644. default:
  5645. break;
  5646. }
  5647. return 0;
  5648. }
  5649. static int _dns_server_query_dualstack(struct dns_request *request)
  5650. {
  5651. int ret = -1;
  5652. struct dns_request *request_dualstack = NULL;
  5653. dns_type_t qtype = request->qtype;
  5654. if (request->dualstack_selection == 0) {
  5655. return 0;
  5656. }
  5657. if (qtype == DNS_T_A) {
  5658. qtype = DNS_T_AAAA;
  5659. } else if (qtype == DNS_T_AAAA) {
  5660. qtype = DNS_T_A;
  5661. } else {
  5662. return 0;
  5663. }
  5664. request_dualstack = _dns_server_new_request();
  5665. if (request_dualstack == NULL) {
  5666. tlog(TLOG_ERROR, "malloc failed.\n");
  5667. goto errout;
  5668. }
  5669. request_dualstack->server_flags = request->server_flags;
  5670. safe_strncpy(request_dualstack->dns_group_name, request->dns_group_name, sizeof(request->dns_group_name));
  5671. safe_strncpy(request_dualstack->domain, request->domain, sizeof(request->domain));
  5672. request_dualstack->qtype = qtype;
  5673. request_dualstack->dualstack_selection_query = 1;
  5674. request_dualstack->has_cname_loop = request->has_cname_loop;
  5675. request_dualstack->prefetch = request->prefetch;
  5676. request_dualstack->prefetch_flags = request->prefetch_flags;
  5677. request_dualstack->conf = request->conf;
  5678. _dns_server_request_get(request);
  5679. request_dualstack->dualstack_request = request;
  5680. _dns_server_request_set_callback(request_dualstack, dns_server_dualstack_callback, request);
  5681. request->request_wait++;
  5682. ret = _dns_server_do_query(request_dualstack, 0);
  5683. if (ret != 0) {
  5684. request->request_wait--;
  5685. tlog(TLOG_ERROR, "do query %s type %d failed.\n", request->domain, qtype);
  5686. goto errout;
  5687. }
  5688. _dns_server_request_release(request_dualstack);
  5689. return ret;
  5690. errout:
  5691. if (request_dualstack) {
  5692. _dns_server_request_set_callback(request_dualstack, NULL, NULL);
  5693. _dns_server_request_release(request_dualstack);
  5694. }
  5695. _dns_server_request_release(request);
  5696. return ret;
  5697. }
  5698. static int _dns_server_setup_request_conf_pre(struct dns_request *request)
  5699. {
  5700. struct dns_conf_group *rule_group = NULL;
  5701. struct dns_request_domain_rule domain_rule;
  5702. if (request->skip_domain_rule != 0 && request->conf) {
  5703. return 0;
  5704. }
  5705. rule_group = dns_server_get_rule_group(request->dns_group_name);
  5706. if (rule_group == NULL) {
  5707. return -1;
  5708. }
  5709. request->conf = rule_group;
  5710. memset(&domain_rule, 0, sizeof(domain_rule));
  5711. _dns_server_get_domain_rule_by_domain_ext(rule_group, &domain_rule, DOMAIN_RULE_GROUP, request->domain, 1);
  5712. if (domain_rule.rules[DOMAIN_RULE_GROUP] == NULL) {
  5713. return 0;
  5714. }
  5715. struct dns_group_rule *group_rule = _dns_server_get_dns_rule_ext(&domain_rule, DOMAIN_RULE_GROUP);
  5716. if (group_rule == NULL) {
  5717. return 0;
  5718. }
  5719. rule_group = dns_server_get_rule_group(group_rule->group_name);
  5720. if (rule_group == NULL) {
  5721. return 0;
  5722. }
  5723. request->conf = rule_group;
  5724. safe_strncpy(request->dns_group_name, rule_group->group_name, sizeof(request->dns_group_name));
  5725. tlog(TLOG_DEBUG, "domain %s match group %s", request->domain, rule_group->group_name);
  5726. return 0;
  5727. }
  5728. static int _dns_server_setup_request_conf(struct dns_request *request)
  5729. {
  5730. struct dns_conf_group *rule_group = NULL;
  5731. rule_group = dns_server_get_rule_group(request->dns_group_name);
  5732. if (rule_group == NULL) {
  5733. return -1;
  5734. }
  5735. request->conf = rule_group;
  5736. request->check_order_list = &rule_group->check_orders;
  5737. return 0;
  5738. }
  5739. static int _dns_server_do_query(struct dns_request *request, int skip_notify_event)
  5740. {
  5741. int ret = -1;
  5742. const char *server_group_name = NULL;
  5743. const char *dns_group = NULL;
  5744. struct dns_query_options options;
  5745. char *request_domain = request->domain;
  5746. char domain_buffer[DNS_MAX_CNAME_LEN * 2];
  5747. if (request->conn) {
  5748. dns_group = request->conn->dns_group;
  5749. }
  5750. request->send_tick = get_tick_count();
  5751. if (_dns_server_setup_request_conf_pre(request) != 0) {
  5752. goto errout;
  5753. }
  5754. /* lookup domain rule */
  5755. _dns_server_get_domain_rule(request);
  5756. if (request->dns_group_name[0] == '\0') {
  5757. if (dns_group) {
  5758. safe_strncpy(request->dns_group_name, dns_group, sizeof(request->dns_group_name));
  5759. }
  5760. }
  5761. server_group_name = _dns_server_get_request_server_groupname(request);
  5762. if (server_group_name == NULL) {
  5763. server_group_name = request->dns_group_name;
  5764. }
  5765. if (_dns_server_setup_request_conf(request) != 0) {
  5766. goto errout;
  5767. }
  5768. if (_dns_server_mdns_query_setup(request, server_group_name, &request_domain, domain_buffer,
  5769. sizeof(domain_buffer)) != 0) {
  5770. goto errout;
  5771. }
  5772. if (_dns_server_process_cname_pre(request) != 0) {
  5773. goto errout;
  5774. }
  5775. _dns_server_set_dualstack_selection(request);
  5776. if (_dns_server_process_special_query(request) == 0) {
  5777. goto clean_exit;
  5778. }
  5779. if (_dns_server_pre_process_server_flags(request) == 0) {
  5780. goto clean_exit;
  5781. }
  5782. /* process domain flag */
  5783. if (_dns_server_pre_process_rule_flags(request) == 0) {
  5784. goto clean_exit;
  5785. }
  5786. /* process domain address */
  5787. if (_dns_server_process_address(request) == 0) {
  5788. goto clean_exit;
  5789. }
  5790. if (_dns_server_process_https_svcb(request) != 0) {
  5791. goto clean_exit;
  5792. }
  5793. if (_dns_server_process_smartdns_domain(request) == 0) {
  5794. goto clean_exit;
  5795. }
  5796. if (_dns_server_process_host(request) == 0) {
  5797. goto clean_exit;
  5798. }
  5799. /* process qtype soa */
  5800. if (_dns_server_qtype_soa(request) == 0) {
  5801. goto clean_exit;
  5802. }
  5803. /* process speed check rule */
  5804. _dns_server_process_speed_rule(request);
  5805. /* check and set passthrough */
  5806. _dns_server_check_set_passthrough(request);
  5807. /* process cache */
  5808. if (request->prefetch == 0 && request->dualstack_selection_query == 0) {
  5809. if (_dns_server_process_cache(request) == 0) {
  5810. goto clean_exit;
  5811. }
  5812. }
  5813. /* process ptr */
  5814. if (_dns_server_process_ptr_query(request) == 0) {
  5815. goto clean_exit;
  5816. }
  5817. ret = _dns_server_set_to_pending_list(request);
  5818. if (ret == 0) {
  5819. goto clean_exit;
  5820. }
  5821. if (_dns_server_process_cname(request) != 0) {
  5822. goto clean_exit;
  5823. }
  5824. // setup options
  5825. _dns_server_setup_query_option(request, &options);
  5826. _dns_server_mdns_query_setup_server_group(request, &server_group_name);
  5827. pthread_mutex_lock(&server.request_list_lock);
  5828. if (list_empty(&server.request_list) && skip_notify_event == 1) {
  5829. _dns_server_wakeup_thread();
  5830. }
  5831. list_add_tail(&request->list, &server.request_list);
  5832. pthread_mutex_unlock(&server.request_list_lock);
  5833. if (_dns_server_process_dns64(request) != 0) {
  5834. goto errout;
  5835. }
  5836. // Get reference for DNS query
  5837. request->request_wait++;
  5838. _dns_server_request_get(request);
  5839. if (dns_client_query(request_domain, request->qtype, dns_server_resolve_callback, request, server_group_name,
  5840. &options) != 0) {
  5841. request->request_wait--;
  5842. _dns_server_request_release(request);
  5843. tlog(TLOG_DEBUG, "send dns request failed.");
  5844. goto errout;
  5845. }
  5846. /* When the dual stack ip preference is enabled, both A and AAAA records are requested. */
  5847. _dns_server_query_dualstack(request);
  5848. clean_exit:
  5849. return 0;
  5850. errout:
  5851. request = NULL;
  5852. return ret;
  5853. }
  5854. static int _dns_server_check_request_supported(struct dns_request *request, struct dns_packet *packet)
  5855. {
  5856. if (request->qclass != DNS_C_IN) {
  5857. return -1;
  5858. }
  5859. if (packet->head.opcode != DNS_OP_QUERY) {
  5860. return -1;
  5861. }
  5862. return 0;
  5863. }
  5864. static int _dns_server_parser_request(struct dns_request *request, struct dns_packet *packet)
  5865. {
  5866. struct dns_rrs *rrs = NULL;
  5867. int rr_count = 0;
  5868. int i = 0;
  5869. int ret = 0;
  5870. int qclass = 0;
  5871. int qtype = DNS_T_ALL;
  5872. char domain[DNS_MAX_CNAME_LEN];
  5873. if (packet->head.qr != DNS_QR_QUERY) {
  5874. goto errout;
  5875. }
  5876. /* get request domain and request qtype */
  5877. rrs = dns_get_rrs_start(packet, DNS_RRS_QD, &rr_count);
  5878. if (rr_count > 1 || rr_count <= 0) {
  5879. goto errout;
  5880. }
  5881. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  5882. ret = dns_get_domain(rrs, domain, sizeof(domain), &qtype, &qclass);
  5883. if (ret != 0) {
  5884. goto errout;
  5885. }
  5886. // Only support one question.
  5887. safe_strncpy(request->domain, domain, sizeof(request->domain));
  5888. request->qtype = qtype;
  5889. break;
  5890. }
  5891. request->qclass = qclass;
  5892. if (_dns_server_check_request_supported(request, packet) != 0) {
  5893. goto errout;
  5894. }
  5895. if ((dns_get_OPT_option(packet) & DNS_OPT_FLAG_DO) && packet->head.ad == 1) {
  5896. request->edns0_do = 1;
  5897. }
  5898. /* get request opts */
  5899. rr_count = 0;
  5900. rrs = dns_get_rrs_start(packet, DNS_RRS_OPT, &rr_count);
  5901. if (rr_count <= 0) {
  5902. return 0;
  5903. }
  5904. for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
  5905. switch (rrs->type) {
  5906. case DNS_OPT_T_TCP_KEEPALIVE: {
  5907. unsigned short idle_timeout = 0;
  5908. ret = dns_get_OPT_TCP_KEEPALIVE(rrs, &idle_timeout);
  5909. if (idle_timeout == 0 || ret != 0) {
  5910. continue;
  5911. }
  5912. tlog(TLOG_DEBUG, "set tcp connection timeout to %u", idle_timeout);
  5913. _dns_server_update_request_connection_timeout(request->conn, idle_timeout / 10);
  5914. } break;
  5915. case DNS_OPT_T_ECS:
  5916. ret = dns_get_OPT_ECS(rrs, &request->ecs);
  5917. if (ret != 0) {
  5918. continue;
  5919. }
  5920. request->has_ecs = 1;
  5921. default:
  5922. break;
  5923. }
  5924. }
  5925. return 0;
  5926. errout:
  5927. request->rcode = DNS_RC_NOTIMP;
  5928. return -1;
  5929. }
  5930. static int _dns_server_reply_format_error(struct dns_request *request, struct dns_server_conn_head *conn,
  5931. unsigned char *inpacket, int inpacket_len, struct sockaddr_storage *local,
  5932. socklen_t local_len, struct sockaddr_storage *from, socklen_t from_len)
  5933. {
  5934. unsigned char packet_buff[DNS_PACKSIZE];
  5935. struct dns_packet *packet = (struct dns_packet *)packet_buff;
  5936. int decode_len = 0;
  5937. int need_release = 0;
  5938. int ret = -1;
  5939. if (request == NULL) {
  5940. decode_len = dns_decode_head_only(packet, DNS_PACKSIZE, inpacket, inpacket_len);
  5941. if (decode_len < 0) {
  5942. ret = -1;
  5943. goto out;
  5944. }
  5945. request = _dns_server_new_request();
  5946. if (request == NULL) {
  5947. ret = -1;
  5948. goto out;
  5949. }
  5950. need_release = 1;
  5951. memcpy(&request->localaddr, local, local_len);
  5952. _dns_server_request_set_client(request, conn);
  5953. _dns_server_request_set_client_addr(request, from, from_len);
  5954. _dns_server_request_set_id(request, packet->head.id);
  5955. }
  5956. request->rcode = DNS_RC_FORMERR;
  5957. request->no_cache = 1;
  5958. request->send_tick = get_tick_count();
  5959. ret = 0;
  5960. out:
  5961. if (request && need_release) {
  5962. _dns_server_request_release(request);
  5963. }
  5964. return ret;
  5965. }
  5966. static int _dns_server_recv(struct dns_server_conn_head *conn, unsigned char *inpacket, int inpacket_len,
  5967. struct sockaddr_storage *local, socklen_t local_len, struct sockaddr_storage *from,
  5968. socklen_t from_len)
  5969. {
  5970. int decode_len = 0;
  5971. int ret = -1;
  5972. unsigned char packet_buff[DNS_PACKSIZE];
  5973. char name[DNS_MAX_CNAME_LEN];
  5974. struct dns_packet *packet = (struct dns_packet *)packet_buff;
  5975. struct dns_request *request = NULL;
  5976. struct dns_client_rules *client_rules = NULL;
  5977. /* decode packet */
  5978. tlog(TLOG_DEBUG, "recv query packet from %s, len = %d, type = %d",
  5979. get_host_by_addr(name, sizeof(name), (struct sockaddr *)from), inpacket_len, conn->type);
  5980. decode_len = dns_decode(packet, DNS_PACKSIZE, inpacket, inpacket_len);
  5981. if (decode_len < 0) {
  5982. tlog(TLOG_DEBUG, "decode failed.\n");
  5983. ret = RECV_ERROR_INVALID_PACKET;
  5984. if (dns_save_fail_packet) {
  5985. dns_packet_save(dns_save_fail_packet_dir, "server", name, inpacket, inpacket_len);
  5986. }
  5987. goto errout;
  5988. }
  5989. if (smartdns_plugin_func_server_recv(packet, inpacket, inpacket_len, local, local_len, from, from_len) != 0) {
  5990. return 0;
  5991. }
  5992. tlog(TLOG_DEBUG,
  5993. "request qdcount = %d, ancount = %d, nscount = %d, nrcount = %d, len = %d, id = %d, tc = %d, rd = %d, "
  5994. "ra = "
  5995. "%d, rcode = %d\n",
  5996. packet->head.qdcount, packet->head.ancount, packet->head.nscount, packet->head.nrcount, inpacket_len,
  5997. packet->head.id, packet->head.tc, packet->head.rd, packet->head.ra, packet->head.rcode);
  5998. client_rules = _dns_server_get_client_rules(from, from_len);
  5999. request = _dns_server_new_request();
  6000. if (request == NULL) {
  6001. tlog(TLOG_ERROR, "malloc failed.\n");
  6002. goto errout;
  6003. }
  6004. memcpy(&request->localaddr, local, local_len);
  6005. _dns_server_request_set_client(request, conn);
  6006. _dns_server_request_set_client_addr(request, from, from_len);
  6007. _dns_server_request_set_id(request, packet->head.id);
  6008. if (_dns_server_parser_request(request, packet) != 0) {
  6009. tlog(TLOG_DEBUG, "parser request failed.");
  6010. ret = RECV_ERROR_INVALID_PACKET;
  6011. goto errout;
  6012. }
  6013. tlog(TLOG_DEBUG, "query %s from %s, qtype: %d, id: %d, query-num: %ld", request->domain, name, request->qtype,
  6014. request->id, atomic_read(&server.request_num));
  6015. if (atomic_read(&server.request_num) > dns_conf_max_query_limit && dns_conf_max_query_limit > 0) {
  6016. static time_t last_log_time = 0;
  6017. time_t now = time(NULL);
  6018. if (now - last_log_time > 120) {
  6019. last_log_time = now;
  6020. tlog(TLOG_WARN, "maximum number of dns queries reached, max: %d", dns_conf_max_query_limit);
  6021. }
  6022. request->rcode = DNS_RC_REFUSED;
  6023. ret = 0;
  6024. goto errout;
  6025. }
  6026. ret = _dns_server_request_set_client_rules(request, client_rules);
  6027. if (ret != 0) {
  6028. ret = 0;
  6029. goto errout;
  6030. }
  6031. ret = _dns_server_do_query(request, 1);
  6032. if (ret != 0) {
  6033. tlog(TLOG_DEBUG, "do query %s failed.\n", request->domain);
  6034. goto errout;
  6035. }
  6036. _dns_server_request_release_complete(request, 0);
  6037. return ret;
  6038. errout:
  6039. if (ret == RECV_ERROR_INVALID_PACKET) {
  6040. if (_dns_server_reply_format_error(request, conn, inpacket, inpacket_len, local, local_len, from, from_len) ==
  6041. 0) {
  6042. ret = 0;
  6043. }
  6044. }
  6045. if (request) {
  6046. request->send_tick = get_tick_count();
  6047. request->no_cache = 1;
  6048. _dns_server_forward_request(inpacket, inpacket_len);
  6049. _dns_server_request_release(request);
  6050. }
  6051. return ret;
  6052. }
  6053. static int _dns_server_setup_server_query_options(struct dns_request *request,
  6054. struct dns_server_query_option *server_query_option)
  6055. {
  6056. if (server_query_option == NULL) {
  6057. return 0;
  6058. }
  6059. request->server_flags = server_query_option->server_flags;
  6060. if (server_query_option->dns_group_name) {
  6061. safe_strncpy(request->dns_group_name, server_query_option->dns_group_name, DNS_GROUP_NAME_LEN);
  6062. }
  6063. if (server_query_option->ecs_enable_flag & DNS_QUEY_OPTION_ECS_DNS) {
  6064. request->has_ecs = 1;
  6065. memcpy(&request->ecs, &server_query_option->ecs_dns, sizeof(request->ecs));
  6066. }
  6067. if (server_query_option->ecs_enable_flag & DNS_QUEY_OPTION_EDNS0_DO) {
  6068. request->edns0_do = 1;
  6069. }
  6070. return 0;
  6071. }
  6072. static int _dns_server_prefetch_request(char *domain, dns_type_t qtype,
  6073. struct dns_server_query_option *server_query_option, int prefetch_flag)
  6074. {
  6075. int ret = -1;
  6076. struct dns_request *request = NULL;
  6077. request = _dns_server_new_request();
  6078. if (request == NULL) {
  6079. tlog(TLOG_ERROR, "malloc failed.\n");
  6080. goto errout;
  6081. }
  6082. request->prefetch = 1;
  6083. request->prefetch_flags = prefetch_flag;
  6084. safe_strncpy(request->domain, domain, sizeof(request->domain));
  6085. request->qtype = qtype;
  6086. _dns_server_setup_server_query_options(request, server_query_option);
  6087. ret = _dns_server_do_query(request, 0);
  6088. if (ret != 0) {
  6089. tlog(TLOG_DEBUG, "prefetch do query %s failed.\n", request->domain);
  6090. goto errout;
  6091. }
  6092. _dns_server_request_release(request);
  6093. return ret;
  6094. errout:
  6095. if (request) {
  6096. _dns_server_request_release(request);
  6097. }
  6098. return ret;
  6099. }
  6100. int dns_server_query(const char *domain, int qtype, struct dns_server_query_option *server_query_option,
  6101. dns_result_callback callback, void *user_ptr)
  6102. {
  6103. int ret = -1;
  6104. struct dns_request *request = NULL;
  6105. request = _dns_server_new_request();
  6106. if (request == NULL) {
  6107. tlog(TLOG_ERROR, "malloc failed.\n");
  6108. goto errout;
  6109. }
  6110. safe_strncpy(request->domain, domain, sizeof(request->domain));
  6111. request->qtype = qtype;
  6112. _dns_server_setup_server_query_options(request, server_query_option);
  6113. _dns_server_request_set_callback(request, callback, user_ptr);
  6114. ret = _dns_server_do_query(request, 0);
  6115. if (ret != 0) {
  6116. tlog(TLOG_DEBUG, "do query %s failed.\n", domain);
  6117. goto errout;
  6118. }
  6119. _dns_server_request_release_complete(request, 0);
  6120. return ret;
  6121. errout:
  6122. if (request) {
  6123. _dns_server_request_set_callback(request, NULL, NULL);
  6124. _dns_server_request_release(request);
  6125. }
  6126. return ret;
  6127. }
  6128. static int _dns_server_process_udp_one(struct dns_server_conn_udp *udpconn, struct epoll_event *event,
  6129. unsigned long now)
  6130. {
  6131. int len = 0;
  6132. unsigned char inpacket[DNS_IN_PACKSIZE];
  6133. struct sockaddr_storage from;
  6134. socklen_t from_len = sizeof(from);
  6135. struct sockaddr_storage local;
  6136. socklen_t local_len = sizeof(local);
  6137. struct msghdr msg;
  6138. struct iovec iov;
  6139. char ans_data[4096];
  6140. struct cmsghdr *cmsg = NULL;
  6141. memset(&msg, 0, sizeof(msg));
  6142. iov.iov_base = (char *)inpacket;
  6143. iov.iov_len = sizeof(inpacket);
  6144. msg.msg_name = &from;
  6145. msg.msg_namelen = sizeof(from);
  6146. msg.msg_iov = &iov;
  6147. msg.msg_iovlen = 1;
  6148. msg.msg_control = ans_data;
  6149. msg.msg_controllen = sizeof(ans_data);
  6150. len = recvmsg(udpconn->head.fd, &msg, MSG_DONTWAIT);
  6151. if (len < 0) {
  6152. if (errno == EAGAIN || errno == EWOULDBLOCK) {
  6153. return -2;
  6154. }
  6155. tlog(TLOG_ERROR, "recvfrom failed, %s\n", strerror(errno));
  6156. return -1;
  6157. }
  6158. from_len = msg.msg_namelen;
  6159. for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
  6160. if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO) {
  6161. const struct in_pktinfo *pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
  6162. unsigned char *addr = (unsigned char *)&pktinfo->ipi_addr.s_addr;
  6163. fill_sockaddr_by_ip(addr, sizeof(in_addr_t), 0, (struct sockaddr *)&local, &local_len);
  6164. } else if (cmsg->cmsg_level == IPPROTO_IPV6 && cmsg->cmsg_type == IPV6_PKTINFO) {
  6165. const struct in6_pktinfo *pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  6166. unsigned char *addr = (unsigned char *)pktinfo->ipi6_addr.s6_addr;
  6167. fill_sockaddr_by_ip(addr, sizeof(struct in6_addr), 0, (struct sockaddr *)&local, &local_len);
  6168. }
  6169. }
  6170. return _dns_server_recv(&udpconn->head, inpacket, len, &local, local_len, &from, from_len);
  6171. }
  6172. static int _dns_server_process_udp(struct dns_server_conn_udp *udpconn, struct epoll_event *event, unsigned long now)
  6173. {
  6174. int count = 0;
  6175. while (count < 32) {
  6176. int ret = _dns_server_process_udp_one(udpconn, event, now);
  6177. if (ret != 0) {
  6178. if (ret == -2) {
  6179. return 0;
  6180. }
  6181. return ret;
  6182. }
  6183. count++;
  6184. }
  6185. return 0;
  6186. }
  6187. static void _dns_server_client_touch(struct dns_server_conn_head *conn)
  6188. {
  6189. time(&conn->last_request_time);
  6190. }
  6191. static int _dns_server_client_close(struct dns_server_conn_head *conn)
  6192. {
  6193. if (conn->fd > 0) {
  6194. _dns_server_epoll_ctl(conn, EPOLL_CTL_DEL, 0);
  6195. close(conn->fd);
  6196. conn->fd = -1;
  6197. }
  6198. list_del_init(&conn->list);
  6199. _dns_server_conn_release(conn);
  6200. return 0;
  6201. }
  6202. static int _dns_server_update_request_connection_timeout(struct dns_server_conn_head *conn, int timeout)
  6203. {
  6204. if (conn == NULL) {
  6205. return -1;
  6206. }
  6207. if (timeout == 0) {
  6208. return 0;
  6209. }
  6210. switch (conn->type) {
  6211. case DNS_CONN_TYPE_TCP_CLIENT: {
  6212. struct dns_server_conn_tcp_client *tcpclient = (struct dns_server_conn_tcp_client *)conn;
  6213. tcpclient->conn_idle_timeout = timeout;
  6214. } break;
  6215. case DNS_CONN_TYPE_TLS_CLIENT:
  6216. case DNS_CONN_TYPE_HTTPS_CLIENT: {
  6217. struct dns_server_conn_tls_client *tlsclient = (struct dns_server_conn_tls_client *)conn;
  6218. tlsclient->tcp.conn_idle_timeout = timeout;
  6219. } break;
  6220. default:
  6221. break;
  6222. }
  6223. return 0;
  6224. }
  6225. static int _dns_server_tcp_accept(struct dns_server_conn_tcp_server *tcpserver, struct epoll_event *event,
  6226. unsigned long now)
  6227. {
  6228. struct sockaddr_storage addr;
  6229. struct dns_server_conn_tcp_client *tcpclient = NULL;
  6230. socklen_t addr_len = sizeof(addr);
  6231. int fd = -1;
  6232. fd = accept4(tcpserver->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  6233. if (fd < 0) {
  6234. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  6235. return -1;
  6236. }
  6237. tcpclient = malloc(sizeof(*tcpclient));
  6238. if (tcpclient == NULL) {
  6239. tlog(TLOG_ERROR, "malloc for tcpclient failed.");
  6240. goto errout;
  6241. }
  6242. memset(tcpclient, 0, sizeof(*tcpclient));
  6243. tcpclient->head.fd = fd;
  6244. tcpclient->head.type = DNS_CONN_TYPE_TCP_CLIENT;
  6245. tcpclient->head.server_flags = tcpserver->head.server_flags;
  6246. tcpclient->head.dns_group = tcpserver->head.dns_group;
  6247. tcpclient->head.ipset_nftset_rule = tcpserver->head.ipset_nftset_rule;
  6248. tcpclient->conn_idle_timeout = dns_conf_tcp_idle_time;
  6249. atomic_set(&tcpclient->head.refcnt, 0);
  6250. memcpy(&tcpclient->addr, &addr, addr_len);
  6251. tcpclient->addr_len = addr_len;
  6252. tcpclient->localaddr_len = sizeof(struct sockaddr_storage);
  6253. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  6254. tlog(TLOG_ERROR, "epoll ctl failed.");
  6255. return -1;
  6256. }
  6257. if (getsocket_inet(tcpclient->head.fd, (struct sockaddr *)&tcpclient->localaddr, &tcpclient->localaddr_len) != 0) {
  6258. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  6259. goto errout;
  6260. }
  6261. _dns_server_client_touch(&tcpclient->head);
  6262. list_add(&tcpclient->head.list, &server.conn_list);
  6263. _dns_server_conn_get(&tcpclient->head);
  6264. set_sock_keepalive(fd, 30, 3, 5);
  6265. return 0;
  6266. errout:
  6267. if (fd > 0) {
  6268. close(fd);
  6269. }
  6270. if (tcpclient) {
  6271. free(tcpclient);
  6272. }
  6273. return -1;
  6274. }
  6275. static ssize_t _ssl_read(struct dns_server_conn_tls_client *conn, void *buff, int num)
  6276. {
  6277. ssize_t ret = 0;
  6278. if (conn == NULL || buff == NULL) {
  6279. return SSL_ERROR_SYSCALL;
  6280. }
  6281. pthread_mutex_lock(&conn->ssl_lock);
  6282. ret = SSL_read(conn->ssl, buff, num);
  6283. pthread_mutex_unlock(&conn->ssl_lock);
  6284. return ret;
  6285. }
  6286. static ssize_t _ssl_write(struct dns_server_conn_tls_client *conn, const void *buff, int num)
  6287. {
  6288. ssize_t ret = 0;
  6289. if (conn == NULL || buff == NULL || conn->ssl == NULL) {
  6290. return SSL_ERROR_SYSCALL;
  6291. }
  6292. pthread_mutex_lock(&conn->ssl_lock);
  6293. ret = SSL_write(conn->ssl, buff, num);
  6294. pthread_mutex_unlock(&conn->ssl_lock);
  6295. return ret;
  6296. }
  6297. static int _ssl_get_error(struct dns_server_conn_tls_client *conn, int ret)
  6298. {
  6299. int err = 0;
  6300. if (conn == NULL || conn->ssl == NULL) {
  6301. return SSL_ERROR_SYSCALL;
  6302. }
  6303. pthread_mutex_lock(&conn->ssl_lock);
  6304. err = SSL_get_error(conn->ssl, ret);
  6305. pthread_mutex_unlock(&conn->ssl_lock);
  6306. return err;
  6307. }
  6308. static int _ssl_do_accept(struct dns_server_conn_tls_client *conn)
  6309. {
  6310. int err = 0;
  6311. if (conn == NULL || conn->ssl == NULL) {
  6312. return SSL_ERROR_SYSCALL;
  6313. }
  6314. pthread_mutex_lock(&conn->ssl_lock);
  6315. err = SSL_accept(conn->ssl);
  6316. pthread_mutex_unlock(&conn->ssl_lock);
  6317. return err;
  6318. }
  6319. static int _dns_server_socket_ssl_send(struct dns_server_conn_tls_client *tls_client, const void *buf, int num)
  6320. {
  6321. int ret = 0;
  6322. int ssl_ret = 0;
  6323. unsigned long ssl_err = 0;
  6324. if (tls_client->ssl == NULL) {
  6325. errno = EINVAL;
  6326. return -1;
  6327. }
  6328. if (num < 0) {
  6329. errno = EINVAL;
  6330. return -1;
  6331. }
  6332. ret = _ssl_write(tls_client, buf, num);
  6333. if (ret > 0) {
  6334. return ret;
  6335. }
  6336. ssl_ret = _ssl_get_error(tls_client, ret);
  6337. switch (ssl_ret) {
  6338. case SSL_ERROR_NONE:
  6339. case SSL_ERROR_ZERO_RETURN:
  6340. return 0;
  6341. break;
  6342. case SSL_ERROR_WANT_READ:
  6343. errno = EAGAIN;
  6344. ret = -SSL_ERROR_WANT_READ;
  6345. break;
  6346. case SSL_ERROR_WANT_WRITE:
  6347. errno = EAGAIN;
  6348. ret = -SSL_ERROR_WANT_WRITE;
  6349. break;
  6350. case SSL_ERROR_SSL:
  6351. ssl_err = ERR_get_error();
  6352. int ssl_reason = ERR_GET_REASON(ssl_err);
  6353. if (ssl_reason == SSL_R_UNINITIALIZED || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN ||
  6354. ssl_reason == SSL_R_BAD_LENGTH || ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT ||
  6355. ssl_reason == SSL_R_BAD_WRITE_RETRY) {
  6356. errno = EAGAIN;
  6357. return -1;
  6358. }
  6359. tlog(TLOG_ERROR, "SSL write fail error no: %s(%d)\n", ERR_reason_error_string(ssl_err), ssl_reason);
  6360. errno = EFAULT;
  6361. ret = -1;
  6362. break;
  6363. case SSL_ERROR_SYSCALL:
  6364. tlog(TLOG_DEBUG, "SSL syscall failed, %s", strerror(errno));
  6365. return ret;
  6366. default:
  6367. errno = EFAULT;
  6368. ret = -1;
  6369. break;
  6370. }
  6371. return ret;
  6372. }
  6373. static int _dns_server_socket_ssl_recv(struct dns_server_conn_tls_client *tls_client, void *buf, int num)
  6374. {
  6375. ssize_t ret = 0;
  6376. int ssl_ret = 0;
  6377. unsigned long ssl_err = 0;
  6378. if (tls_client->ssl == NULL) {
  6379. errno = EFAULT;
  6380. return -1;
  6381. }
  6382. ret = _ssl_read(tls_client, buf, num);
  6383. if (ret > 0) {
  6384. return ret;
  6385. }
  6386. ssl_ret = _ssl_get_error(tls_client, ret);
  6387. switch (ssl_ret) {
  6388. case SSL_ERROR_NONE:
  6389. case SSL_ERROR_ZERO_RETURN:
  6390. return 0;
  6391. break;
  6392. case SSL_ERROR_WANT_READ:
  6393. errno = EAGAIN;
  6394. ret = -SSL_ERROR_WANT_READ;
  6395. break;
  6396. case SSL_ERROR_WANT_WRITE:
  6397. errno = EAGAIN;
  6398. ret = -SSL_ERROR_WANT_WRITE;
  6399. break;
  6400. case SSL_ERROR_SSL:
  6401. ssl_err = ERR_get_error();
  6402. int ssl_reason = ERR_GET_REASON(ssl_err);
  6403. if (ssl_reason == SSL_R_UNINITIALIZED) {
  6404. errno = EAGAIN;
  6405. return -1;
  6406. }
  6407. if (ssl_reason == SSL_R_SHUTDOWN_WHILE_IN_INIT || ssl_reason == SSL_R_PROTOCOL_IS_SHUTDOWN) {
  6408. return 0;
  6409. }
  6410. #ifdef SSL_R_UNEXPECTED_EOF_WHILE_READING
  6411. if (ssl_reason == SSL_R_UNEXPECTED_EOF_WHILE_READING) {
  6412. return 0;
  6413. }
  6414. #endif
  6415. tlog(TLOG_DEBUG, "SSL read fail error no: %s(%lx), reason: %d\n", ERR_reason_error_string(ssl_err), ssl_err,
  6416. ssl_reason);
  6417. errno = EFAULT;
  6418. ret = -1;
  6419. break;
  6420. case SSL_ERROR_SYSCALL:
  6421. if (errno == 0) {
  6422. return 0;
  6423. }
  6424. ret = -1;
  6425. return ret;
  6426. default:
  6427. errno = EFAULT;
  6428. ret = -1;
  6429. break;
  6430. }
  6431. return ret;
  6432. }
  6433. static int _dns_server_ssl_poll_event(struct dns_server_conn_tls_client *tls_client, int ssl_ret)
  6434. {
  6435. struct epoll_event fd_event;
  6436. memset(&fd_event, 0, sizeof(fd_event));
  6437. if (ssl_ret == SSL_ERROR_WANT_READ) {
  6438. fd_event.events = EPOLLIN;
  6439. } else if (ssl_ret == SSL_ERROR_WANT_WRITE) {
  6440. fd_event.events = EPOLLOUT | EPOLLIN;
  6441. } else {
  6442. goto errout;
  6443. }
  6444. fd_event.data.ptr = tls_client;
  6445. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->tcp.head.fd, &fd_event) != 0) {
  6446. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  6447. goto errout;
  6448. }
  6449. return 0;
  6450. errout:
  6451. return -1;
  6452. }
  6453. static int _dns_server_tcp_socket_send(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  6454. {
  6455. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  6456. return send(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  6457. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  6458. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6459. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)tcp_client;
  6460. tls_client->ssl_want_write = 0;
  6461. int ret = _dns_server_socket_ssl_send(tls_client, data, data_len);
  6462. if (ret < 0 && errno == EAGAIN) {
  6463. if (_dns_server_ssl_poll_event(tls_client, SSL_ERROR_WANT_WRITE) == 0) {
  6464. errno = EAGAIN;
  6465. }
  6466. }
  6467. return ret;
  6468. } else {
  6469. return -1;
  6470. }
  6471. }
  6472. static int _dns_server_tcp_socket_recv(struct dns_server_conn_tcp_client *tcp_client, void *data, int data_len)
  6473. {
  6474. if (tcp_client->head.type == DNS_CONN_TYPE_TCP_CLIENT) {
  6475. return recv(tcp_client->head.fd, data, data_len, MSG_NOSIGNAL);
  6476. } else if (tcp_client->head.type == DNS_CONN_TYPE_TLS_CLIENT ||
  6477. tcp_client->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6478. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)tcp_client;
  6479. int ret = _dns_server_socket_ssl_recv(tls_client, data, data_len);
  6480. if (ret == -SSL_ERROR_WANT_WRITE && errno == EAGAIN) {
  6481. if (_dns_server_ssl_poll_event(tls_client, SSL_ERROR_WANT_WRITE) == 0) {
  6482. errno = EAGAIN;
  6483. tls_client->ssl_want_write = 1;
  6484. }
  6485. }
  6486. return ret;
  6487. } else {
  6488. return -1;
  6489. }
  6490. }
  6491. static int _dns_server_tcp_recv(struct dns_server_conn_tcp_client *tcpclient)
  6492. {
  6493. ssize_t len = 0;
  6494. /* Receive data */
  6495. while (tcpclient->recvbuff.size < (int)sizeof(tcpclient->recvbuff.buf)) {
  6496. if (tcpclient->recvbuff.size == (int)sizeof(tcpclient->recvbuff.buf)) {
  6497. return 0;
  6498. }
  6499. len = _dns_server_tcp_socket_recv(tcpclient, tcpclient->recvbuff.buf + tcpclient->recvbuff.size,
  6500. sizeof(tcpclient->recvbuff.buf) - tcpclient->recvbuff.size);
  6501. if (len < 0) {
  6502. if (errno == EAGAIN) {
  6503. return RECV_ERROR_AGAIN;
  6504. }
  6505. if (errno == ECONNRESET) {
  6506. return RECV_ERROR_CLOSE;
  6507. }
  6508. if (errno == ETIMEDOUT) {
  6509. return RECV_ERROR_CLOSE;
  6510. }
  6511. tlog(TLOG_DEBUG, "recv failed, %s\n", strerror(errno));
  6512. return RECV_ERROR_FAIL;
  6513. } else if (len == 0) {
  6514. return RECV_ERROR_CLOSE;
  6515. }
  6516. tcpclient->recvbuff.size += len;
  6517. }
  6518. return 0;
  6519. }
  6520. static int _dns_server_tcp_process_one_request(struct dns_server_conn_tcp_client *tcpclient)
  6521. {
  6522. unsigned short request_len = 0;
  6523. int total_len = tcpclient->recvbuff.size;
  6524. int proceed_len = 0;
  6525. unsigned char *request_data = NULL;
  6526. int ret = RECV_ERROR_FAIL;
  6527. int len = 0;
  6528. struct http_head *http_head = NULL;
  6529. uint8_t *http_decode_data = NULL;
  6530. char *base64_query = NULL;
  6531. /* Handling multiple requests */
  6532. for (;;) {
  6533. ret = RECV_ERROR_FAIL;
  6534. if (tcpclient->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6535. if ((total_len - proceed_len) <= 0) {
  6536. ret = RECV_ERROR_AGAIN;
  6537. goto out;
  6538. }
  6539. http_head = http_head_init(4096);
  6540. if (http_head == NULL) {
  6541. goto out;
  6542. }
  6543. len = http_head_parse(http_head, (char *)tcpclient->recvbuff.buf, tcpclient->recvbuff.size);
  6544. if (len < 0) {
  6545. if (len == -1) {
  6546. ret = 0;
  6547. goto out;
  6548. }
  6549. tlog(TLOG_DEBUG, "parser http header failed.");
  6550. goto errout;
  6551. }
  6552. if (http_head_get_method(http_head) == HTTP_METHOD_POST) {
  6553. const char *content_type = http_head_get_fields_value(http_head, "Content-Type");
  6554. if (content_type == NULL ||
  6555. strncasecmp(content_type, "application/dns-message", sizeof("application/dns-message")) != 0) {
  6556. tlog(TLOG_DEBUG, "content type not supported, %s", content_type);
  6557. goto errout;
  6558. }
  6559. request_len = http_head_get_data_len(http_head);
  6560. if (request_len >= len) {
  6561. tlog(TLOG_DEBUG, "request length is invalid.");
  6562. goto errout;
  6563. }
  6564. request_data = (unsigned char *)http_head_get_data(http_head);
  6565. } else if (http_head_get_method(http_head) == HTTP_METHOD_GET) {
  6566. const char *path = http_head_get_url(http_head);
  6567. if (path == NULL || strncasecmp(path, "/dns-query", sizeof("/dns-query")) != 0) {
  6568. tlog(TLOG_DEBUG, "path not supported, %s", path);
  6569. goto errout;
  6570. }
  6571. const char *dns_query = http_head_get_params_value(http_head, "dns");
  6572. if (dns_query == NULL) {
  6573. tlog(TLOG_DEBUG, "query is null.");
  6574. goto errout;
  6575. }
  6576. if (base64_query == NULL) {
  6577. base64_query = malloc(DNS_IN_PACKSIZE);
  6578. if (base64_query == NULL) {
  6579. tlog(TLOG_DEBUG, "malloc failed.");
  6580. goto errout;
  6581. }
  6582. }
  6583. if (urldecode(base64_query, DNS_IN_PACKSIZE, dns_query) < 0) {
  6584. tlog(TLOG_DEBUG, "urldecode query failed.");
  6585. goto errout;
  6586. }
  6587. if (http_decode_data == NULL) {
  6588. http_decode_data = malloc(DNS_IN_PACKSIZE);
  6589. if (http_decode_data == NULL) {
  6590. tlog(TLOG_DEBUG, "malloc failed.");
  6591. goto errout;
  6592. }
  6593. }
  6594. int decode_len = SSL_base64_decode_ext(base64_query, http_decode_data, DNS_IN_PACKSIZE, 1, 1);
  6595. if (decode_len <= 0) {
  6596. tlog(TLOG_DEBUG, "decode query failed.");
  6597. goto errout;
  6598. }
  6599. request_len = decode_len;
  6600. request_data = http_decode_data;
  6601. } else {
  6602. tlog(TLOG_DEBUG, "http method is invalid.");
  6603. goto errout;
  6604. }
  6605. proceed_len += len;
  6606. } else {
  6607. if ((total_len - proceed_len) <= (int)sizeof(unsigned short)) {
  6608. ret = RECV_ERROR_AGAIN;
  6609. goto out;
  6610. }
  6611. /* Get record length */
  6612. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len);
  6613. request_len = ntohs(*((unsigned short *)(request_data)));
  6614. if (request_len >= sizeof(tcpclient->recvbuff.buf)) {
  6615. tlog(TLOG_DEBUG, "request length is invalid.");
  6616. goto errout;
  6617. }
  6618. if (request_len > (total_len - proceed_len - sizeof(unsigned short))) {
  6619. ret = RECV_ERROR_AGAIN;
  6620. goto out;
  6621. }
  6622. request_data = (unsigned char *)(tcpclient->recvbuff.buf + proceed_len + sizeof(unsigned short));
  6623. proceed_len += sizeof(unsigned short) + request_len;
  6624. }
  6625. /* process one record */
  6626. ret = _dns_server_recv(&tcpclient->head, request_data, request_len, &tcpclient->localaddr,
  6627. tcpclient->localaddr_len, &tcpclient->addr, tcpclient->addr_len);
  6628. if (ret != 0) {
  6629. goto errout;
  6630. }
  6631. if (http_head != NULL) {
  6632. http_head_destroy(http_head);
  6633. http_head = NULL;
  6634. }
  6635. }
  6636. out:
  6637. if (total_len > proceed_len && proceed_len > 0) {
  6638. memmove(tcpclient->recvbuff.buf, tcpclient->recvbuff.buf + proceed_len, total_len - proceed_len);
  6639. }
  6640. tcpclient->recvbuff.size -= proceed_len;
  6641. errout:
  6642. if (http_head) {
  6643. http_head_destroy(http_head);
  6644. }
  6645. if (http_decode_data) {
  6646. free(http_decode_data);
  6647. }
  6648. if (base64_query) {
  6649. free(base64_query);
  6650. }
  6651. if ((ret == RECV_ERROR_FAIL || ret == RECV_ERROR_INVALID_PACKET) &&
  6652. tcpclient->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6653. _dns_server_reply_http_error(tcpclient, 400, "Bad Request", "Bad Request");
  6654. }
  6655. return ret;
  6656. }
  6657. static int _dns_server_tcp_process_requests(struct dns_server_conn_tcp_client *tcpclient)
  6658. {
  6659. int recv_ret = 0;
  6660. int request_ret = 0;
  6661. int is_eof = 0;
  6662. for (;;) {
  6663. recv_ret = _dns_server_tcp_recv(tcpclient);
  6664. if (recv_ret < 0) {
  6665. if (recv_ret == RECV_ERROR_CLOSE) {
  6666. return RECV_ERROR_CLOSE;
  6667. }
  6668. if (tcpclient->recvbuff.size > 0) {
  6669. is_eof = RECV_ERROR_AGAIN;
  6670. } else {
  6671. return RECV_ERROR_FAIL;
  6672. }
  6673. }
  6674. request_ret = _dns_server_tcp_process_one_request(tcpclient);
  6675. if (request_ret < 0) {
  6676. /* failed */
  6677. tlog(TLOG_DEBUG, "process one request failed.");
  6678. return RECV_ERROR_FAIL;
  6679. }
  6680. if (request_ret == RECV_ERROR_AGAIN && is_eof == RECV_ERROR_AGAIN) {
  6681. /* failed or remote shutdown */
  6682. return RECV_ERROR_FAIL;
  6683. }
  6684. if (recv_ret == RECV_ERROR_AGAIN && request_ret == RECV_ERROR_AGAIN) {
  6685. /* process complete */
  6686. return 0;
  6687. }
  6688. }
  6689. return 0;
  6690. }
  6691. static int _dns_server_tls_want_write(struct dns_server_conn_tcp_client *tcpclient)
  6692. {
  6693. if (tcpclient->head.type == DNS_CONN_TYPE_TLS_CLIENT || tcpclient->head.type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6694. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)tcpclient;
  6695. if (tls_client->ssl_want_write == 1) {
  6696. return 1;
  6697. }
  6698. }
  6699. return 0;
  6700. }
  6701. static int _dns_server_tcp_send(struct dns_server_conn_tcp_client *tcpclient)
  6702. {
  6703. int len = 0;
  6704. while (tcpclient->sndbuff.size > 0 || _dns_server_tls_want_write(tcpclient) == 1) {
  6705. len = _dns_server_tcp_socket_send(tcpclient, tcpclient->sndbuff.buf, tcpclient->sndbuff.size);
  6706. if (len < 0) {
  6707. if (errno == EAGAIN) {
  6708. return RECV_ERROR_AGAIN;
  6709. }
  6710. return RECV_ERROR_FAIL;
  6711. } else if (len == 0) {
  6712. break;
  6713. }
  6714. tcpclient->sndbuff.size -= len;
  6715. }
  6716. if (_dns_server_epoll_ctl(&tcpclient->head, EPOLL_CTL_MOD, EPOLLIN) != 0) {
  6717. tlog(TLOG_ERROR, "epoll ctl failed.");
  6718. return -1;
  6719. }
  6720. return 0;
  6721. }
  6722. static int _dns_server_process_tcp(struct dns_server_conn_tcp_client *dnsserver, struct epoll_event *event,
  6723. unsigned long now)
  6724. {
  6725. int ret = 0;
  6726. if (event->events & EPOLLIN) {
  6727. ret = _dns_server_tcp_process_requests(dnsserver);
  6728. if (ret != 0) {
  6729. _dns_server_client_close(&dnsserver->head);
  6730. if (ret == RECV_ERROR_CLOSE) {
  6731. return 0;
  6732. }
  6733. tlog(TLOG_DEBUG, "process tcp request failed.");
  6734. return RECV_ERROR_FAIL;
  6735. }
  6736. }
  6737. if (event->events & EPOLLOUT) {
  6738. if (_dns_server_tcp_send(dnsserver) != 0) {
  6739. _dns_server_client_close(&dnsserver->head);
  6740. tlog(TLOG_DEBUG, "send tcp failed.");
  6741. return RECV_ERROR_FAIL;
  6742. }
  6743. }
  6744. return 0;
  6745. }
  6746. static int _dns_server_tls_accept(struct dns_server_conn_tls_server *tls_server, struct epoll_event *event,
  6747. unsigned long now)
  6748. {
  6749. struct sockaddr_storage addr;
  6750. struct dns_server_conn_tls_client *tls_client = NULL;
  6751. socklen_t addr_len = sizeof(addr);
  6752. int fd = -1;
  6753. SSL *ssl = NULL;
  6754. fd = accept4(tls_server->head.fd, (struct sockaddr *)&addr, &addr_len, SOCK_NONBLOCK | SOCK_CLOEXEC);
  6755. if (fd < 0) {
  6756. tlog(TLOG_ERROR, "accept failed, %s", strerror(errno));
  6757. return -1;
  6758. }
  6759. tls_client = malloc(sizeof(*tls_client));
  6760. if (tls_client == NULL) {
  6761. tlog(TLOG_ERROR, "malloc for tls_client failed.");
  6762. goto errout;
  6763. }
  6764. memset(tls_client, 0, sizeof(*tls_client));
  6765. tls_client->tcp.head.fd = fd;
  6766. if (tls_server->head.type == DNS_CONN_TYPE_TLS_SERVER) {
  6767. tls_client->tcp.head.type = DNS_CONN_TYPE_TLS_CLIENT;
  6768. } else if (tls_server->head.type == DNS_CONN_TYPE_HTTPS_SERVER) {
  6769. tls_client->tcp.head.type = DNS_CONN_TYPE_HTTPS_CLIENT;
  6770. } else {
  6771. tlog(TLOG_ERROR, "invalid http server type.");
  6772. goto errout;
  6773. }
  6774. tls_client->tcp.head.server_flags = tls_server->head.server_flags;
  6775. tls_client->tcp.head.dns_group = tls_server->head.dns_group;
  6776. tls_client->tcp.head.ipset_nftset_rule = tls_server->head.ipset_nftset_rule;
  6777. tls_client->tcp.conn_idle_timeout = dns_conf_tcp_idle_time;
  6778. atomic_set(&tls_client->tcp.head.refcnt, 0);
  6779. memcpy(&tls_client->tcp.addr, &addr, addr_len);
  6780. tls_client->tcp.addr_len = addr_len;
  6781. tls_client->tcp.localaddr_len = sizeof(struct sockaddr_storage);
  6782. if (_dns_server_epoll_ctl(&tls_client->tcp.head, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  6783. tlog(TLOG_ERROR, "epoll ctl failed.");
  6784. return -1;
  6785. }
  6786. if (getsocket_inet(tls_client->tcp.head.fd, (struct sockaddr *)&tls_client->tcp.localaddr,
  6787. &tls_client->tcp.localaddr_len) != 0) {
  6788. tlog(TLOG_ERROR, "get local addr failed, %s", strerror(errno));
  6789. goto errout;
  6790. }
  6791. ssl = SSL_new(tls_server->ssl_ctx);
  6792. if (ssl == NULL) {
  6793. tlog(TLOG_ERROR, "SSL_new failed.");
  6794. goto errout;
  6795. }
  6796. if (SSL_set_fd(ssl, fd) != 1) {
  6797. tlog(TLOG_ERROR, "SSL_set_fd failed.");
  6798. goto errout;
  6799. }
  6800. tls_client->ssl = ssl;
  6801. tls_client->tcp.status = DNS_SERVER_CLIENT_STATUS_CONNECTING;
  6802. pthread_mutex_init(&tls_client->ssl_lock, NULL);
  6803. _dns_server_client_touch(&tls_client->tcp.head);
  6804. list_add(&tls_client->tcp.head.list, &server.conn_list);
  6805. _dns_server_conn_get(&tls_client->tcp.head);
  6806. set_sock_keepalive(fd, 30, 3, 5);
  6807. return 0;
  6808. errout:
  6809. if (fd > 0) {
  6810. close(fd);
  6811. }
  6812. if (ssl) {
  6813. SSL_free(ssl);
  6814. }
  6815. if (tls_client) {
  6816. free(tls_client);
  6817. }
  6818. return -1;
  6819. }
  6820. static int _dns_server_process_tls(struct dns_server_conn_tls_client *tls_client, struct epoll_event *event,
  6821. unsigned long now)
  6822. {
  6823. int ret = 0;
  6824. int ssl_ret = 0;
  6825. struct epoll_event fd_event;
  6826. if (tls_client->tcp.status == DNS_SERVER_CLIENT_STATUS_CONNECTING) {
  6827. /* do SSL hand shake */
  6828. ret = _ssl_do_accept(tls_client);
  6829. if (ret <= 0) {
  6830. memset(&fd_event, 0, sizeof(fd_event));
  6831. ssl_ret = _ssl_get_error(tls_client, ret);
  6832. if (_dns_server_ssl_poll_event(tls_client, ssl_ret) == 0) {
  6833. return 0;
  6834. }
  6835. if (ssl_ret != SSL_ERROR_SYSCALL) {
  6836. unsigned long ssl_err = ERR_get_error();
  6837. int ssl_reason = ERR_GET_REASON(ssl_err);
  6838. char name[DNS_MAX_CNAME_LEN];
  6839. tlog(TLOG_DEBUG, "Handshake with %s failed, error no: %s(%d, %d, %d)\n",
  6840. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tls_client->tcp.addr),
  6841. ERR_reason_error_string(ssl_err), ret, ssl_ret, ssl_reason);
  6842. ret = 0;
  6843. }
  6844. goto errout;
  6845. }
  6846. tls_client->tcp.status = DNS_SERVER_CLIENT_STATUS_CONNECTED;
  6847. memset(&fd_event, 0, sizeof(fd_event));
  6848. fd_event.events = EPOLLIN | EPOLLOUT;
  6849. fd_event.data.ptr = tls_client;
  6850. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_MOD, tls_client->tcp.head.fd, &fd_event) != 0) {
  6851. tlog(TLOG_ERROR, "epoll ctl failed, %s", strerror(errno));
  6852. goto errout;
  6853. }
  6854. }
  6855. return _dns_server_process_tcp((struct dns_server_conn_tcp_client *)tls_client, event, now);
  6856. errout:
  6857. _dns_server_client_close(&tls_client->tcp.head);
  6858. return ret;
  6859. }
  6860. static int _dns_server_process(struct dns_server_conn_head *conn, struct epoll_event *event, unsigned long now)
  6861. {
  6862. int ret = 0;
  6863. _dns_server_client_touch(conn);
  6864. _dns_server_conn_get(conn);
  6865. if (conn->type == DNS_CONN_TYPE_UDP_SERVER) {
  6866. struct dns_server_conn_udp *udpconn = (struct dns_server_conn_udp *)conn;
  6867. ret = _dns_server_process_udp(udpconn, event, now);
  6868. } else if (conn->type == DNS_CONN_TYPE_TCP_SERVER) {
  6869. struct dns_server_conn_tcp_server *tcpserver = (struct dns_server_conn_tcp_server *)conn;
  6870. ret = _dns_server_tcp_accept(tcpserver, event, now);
  6871. } else if (conn->type == DNS_CONN_TYPE_TCP_CLIENT) {
  6872. struct dns_server_conn_tcp_client *tcpclient = (struct dns_server_conn_tcp_client *)conn;
  6873. ret = _dns_server_process_tcp(tcpclient, event, now);
  6874. if (ret != 0) {
  6875. char name[DNS_MAX_CNAME_LEN];
  6876. tlog(TLOG_DEBUG, "process TCP packet from %s failed.",
  6877. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tcpclient->addr));
  6878. }
  6879. } else if (conn->type == DNS_CONN_TYPE_TLS_SERVER || conn->type == DNS_CONN_TYPE_HTTPS_SERVER) {
  6880. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  6881. ret = _dns_server_tls_accept(tls_server, event, now);
  6882. } else if (conn->type == DNS_CONN_TYPE_TLS_CLIENT || conn->type == DNS_CONN_TYPE_HTTPS_CLIENT) {
  6883. struct dns_server_conn_tls_client *tls_client = (struct dns_server_conn_tls_client *)conn;
  6884. ret = _dns_server_process_tls(tls_client, event, now);
  6885. if (ret != 0) {
  6886. char name[DNS_MAX_CNAME_LEN];
  6887. tlog(TLOG_DEBUG, "process TLS packet from %s failed.",
  6888. get_host_by_addr(name, sizeof(name), (struct sockaddr *)&tls_client->tcp.addr));
  6889. }
  6890. } else {
  6891. tlog(TLOG_ERROR, "unsupported dns server type %d", conn->type);
  6892. _dns_server_client_close(conn);
  6893. ret = -1;
  6894. }
  6895. _dns_server_conn_release(conn);
  6896. if (ret == RECV_ERROR_INVALID_PACKET) {
  6897. ret = 0;
  6898. }
  6899. return ret;
  6900. }
  6901. static int _dns_server_second_ping_check(struct dns_request *request)
  6902. {
  6903. struct dns_ip_address *addr_map = NULL;
  6904. unsigned long bucket = 0;
  6905. char ip[DNS_MAX_CNAME_LEN] = {0};
  6906. int ret = -1;
  6907. if (request->has_ping_result) {
  6908. return ret;
  6909. }
  6910. /* start tcping */
  6911. pthread_mutex_lock(&request->ip_map_lock);
  6912. hash_for_each(request->ip_map, bucket, addr_map, node)
  6913. {
  6914. switch (addr_map->addr_type) {
  6915. case DNS_T_A: {
  6916. _dns_server_request_get(request);
  6917. snprintf(ip, sizeof(ip), "%d.%d.%d.%d", addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2],
  6918. addr_map->ip_addr[3]);
  6919. ret = _dns_server_check_speed(request, ip);
  6920. if (ret != 0) {
  6921. _dns_server_request_release(request);
  6922. }
  6923. } break;
  6924. case DNS_T_AAAA: {
  6925. _dns_server_request_get(request);
  6926. snprintf(ip, sizeof(ip), "[%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x:%.2x%.2x]",
  6927. addr_map->ip_addr[0], addr_map->ip_addr[1], addr_map->ip_addr[2], addr_map->ip_addr[3],
  6928. addr_map->ip_addr[4], addr_map->ip_addr[5], addr_map->ip_addr[6], addr_map->ip_addr[7],
  6929. addr_map->ip_addr[8], addr_map->ip_addr[9], addr_map->ip_addr[10], addr_map->ip_addr[11],
  6930. addr_map->ip_addr[12], addr_map->ip_addr[13], addr_map->ip_addr[14], addr_map->ip_addr[15]);
  6931. ret = _dns_server_check_speed(request, ip);
  6932. if (ret != 0) {
  6933. _dns_server_request_release(request);
  6934. }
  6935. } break;
  6936. default:
  6937. break;
  6938. }
  6939. }
  6940. pthread_mutex_unlock(&request->ip_map_lock);
  6941. return ret;
  6942. }
  6943. static dns_cache_tmout_action_t _dns_server_prefetch_domain(struct dns_conf_group *conf_group,
  6944. struct dns_cache *dns_cache)
  6945. {
  6946. /* If there are still hits, continue pre-fetching */
  6947. struct dns_server_query_option server_query_option;
  6948. int hitnum = dns_cache_hitnum_dec_get(dns_cache);
  6949. if (hitnum <= 0) {
  6950. return DNS_CACHE_TMOUT_ACTION_DEL;
  6951. }
  6952. /* start prefetch domain */
  6953. tlog(TLOG_DEBUG, "prefetch by cache %s, qtype %d, ttl %d, hitnum %d", dns_cache->info.domain, dns_cache->info.qtype,
  6954. dns_cache->info.ttl, hitnum);
  6955. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  6956. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  6957. server_query_option.ecs_enable_flag = 0;
  6958. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, &server_query_option,
  6959. PREFETCH_FLAGS_NO_DUALSTACK) != 0) {
  6960. tlog(TLOG_ERROR, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  6961. return DNS_CACHE_TMOUT_ACTION_RETRY;
  6962. }
  6963. return DNS_CACHE_TMOUT_ACTION_OK;
  6964. }
  6965. static dns_cache_tmout_action_t _dns_server_prefetch_expired_domain(struct dns_conf_group *conf_group,
  6966. struct dns_cache *dns_cache)
  6967. {
  6968. time_t ttl = _dns_server_expired_cache_ttl(dns_cache, conf_group->dns_serve_expired_ttl);
  6969. if (ttl <= 1) {
  6970. return DNS_CACHE_TMOUT_ACTION_DEL;
  6971. }
  6972. /* start prefetch domain */
  6973. tlog(TLOG_DEBUG,
  6974. "expired domain, total %d, prefetch by cache %s, qtype %d, ttl %llu, rcode %d, insert time %llu replace time "
  6975. "%llu",
  6976. dns_cache_total_num(), dns_cache->info.domain, dns_cache->info.qtype, (unsigned long long)ttl,
  6977. dns_cache->info.rcode, (unsigned long long)dns_cache->info.insert_time,
  6978. (unsigned long long)dns_cache->info.replace_time);
  6979. struct dns_server_query_option server_query_option;
  6980. server_query_option.dns_group_name = dns_cache_get_dns_group_name(dns_cache);
  6981. server_query_option.server_flags = dns_cache_get_query_flag(dns_cache);
  6982. server_query_option.ecs_enable_flag = 0;
  6983. if (_dns_server_prefetch_request(dns_cache->info.domain, dns_cache->info.qtype, &server_query_option,
  6984. PREFETCH_FLAGS_EXPIRED) != 0) {
  6985. tlog(TLOG_DEBUG, "prefetch domain %s, qtype %d, failed.", dns_cache->info.domain, dns_cache->info.qtype);
  6986. return DNS_CACHE_TMOUT_ACTION_RETRY;
  6987. }
  6988. return DNS_CACHE_TMOUT_ACTION_OK;
  6989. }
  6990. static dns_cache_tmout_action_t _dns_server_cache_expired(struct dns_cache *dns_cache)
  6991. {
  6992. if (dns_cache->info.rcode != DNS_RC_NOERROR) {
  6993. return DNS_CACHE_TMOUT_ACTION_DEL;
  6994. }
  6995. struct dns_conf_group *conf_group = dns_server_get_rule_group(dns_cache->info.dns_group_name);
  6996. if (conf_group->dns_prefetch == 1) {
  6997. if (conf_group->dns_serve_expired == 1) {
  6998. return _dns_server_prefetch_expired_domain(conf_group, dns_cache);
  6999. } else {
  7000. return _dns_server_prefetch_domain(conf_group, dns_cache);
  7001. }
  7002. }
  7003. return DNS_CACHE_TMOUT_ACTION_DEL;
  7004. }
  7005. static void _dns_server_tcp_idle_check(void)
  7006. {
  7007. struct dns_server_conn_head *conn = NULL;
  7008. struct dns_server_conn_head *tmp = NULL;
  7009. time_t now = 0;
  7010. time(&now);
  7011. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  7012. {
  7013. if (conn->type != DNS_CONN_TYPE_TCP_CLIENT && conn->type != DNS_CONN_TYPE_TLS_CLIENT &&
  7014. conn->type != DNS_CONN_TYPE_HTTPS_CLIENT) {
  7015. continue;
  7016. }
  7017. struct dns_server_conn_tcp_client *tcpclient = (struct dns_server_conn_tcp_client *)conn;
  7018. if (tcpclient->conn_idle_timeout <= 0) {
  7019. continue;
  7020. }
  7021. if (conn->last_request_time > now - tcpclient->conn_idle_timeout) {
  7022. continue;
  7023. }
  7024. _dns_server_client_close(conn);
  7025. }
  7026. }
  7027. #ifdef TEST
  7028. static void _dns_server_check_need_exit(void)
  7029. {
  7030. static int parent_pid = 0;
  7031. if (parent_pid == 0) {
  7032. parent_pid = getppid();
  7033. }
  7034. if (parent_pid != getppid()) {
  7035. tlog(TLOG_WARN, "parent process exit, exit too.");
  7036. dns_server_stop();
  7037. }
  7038. }
  7039. #else
  7040. #define _dns_server_check_need_exit()
  7041. #endif
  7042. static void _dns_server_save_cache_to_file(void)
  7043. {
  7044. time_t now;
  7045. int check_time = dns_conf_cache_checkpoint_time;
  7046. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0 || dns_conf_cache_checkpoint_time <= 0) {
  7047. return;
  7048. }
  7049. time(&now);
  7050. if (server.cache_save_pid > 0) {
  7051. int ret = waitpid(server.cache_save_pid, NULL, WNOHANG);
  7052. if (ret == server.cache_save_pid) {
  7053. server.cache_save_pid = 0;
  7054. } else if (ret < 0) {
  7055. tlog(TLOG_ERROR, "waitpid failed, errno %d, error info '%s'", errno, strerror(errno));
  7056. server.cache_save_pid = 0;
  7057. } else {
  7058. if (now - 30 > server.cache_save_time) {
  7059. kill(server.cache_save_pid, SIGKILL);
  7060. }
  7061. return;
  7062. }
  7063. }
  7064. if (check_time < 120) {
  7065. check_time = 120;
  7066. }
  7067. if (now - check_time < server.cache_save_time) {
  7068. return;
  7069. }
  7070. /* server is busy, skip*/
  7071. pthread_mutex_lock(&server.request_list_lock);
  7072. if (list_empty(&server.request_list) != 0) {
  7073. pthread_mutex_unlock(&server.request_list_lock);
  7074. return;
  7075. }
  7076. pthread_mutex_unlock(&server.request_list_lock);
  7077. server.cache_save_time = now;
  7078. int pid = fork();
  7079. if (pid == 0) {
  7080. /* child process */
  7081. for (int i = 3; i < 1024; i++) {
  7082. close(i);
  7083. }
  7084. tlog_setlevel(TLOG_OFF);
  7085. _dns_server_cache_save(1);
  7086. _exit(0);
  7087. } else if (pid < 0) {
  7088. tlog(TLOG_DEBUG, "fork failed, errno %d, error info '%s'", errno, strerror(errno));
  7089. return;
  7090. }
  7091. server.cache_save_pid = pid;
  7092. }
  7093. static void _dns_server_period_run_second(void)
  7094. {
  7095. static unsigned int sec = 0;
  7096. sec++;
  7097. _dns_server_tcp_idle_check();
  7098. _dns_server_check_need_exit();
  7099. if (sec % IPV6_READY_CHECK_TIME == 0 && is_ipv6_ready == 0) {
  7100. dns_server_check_ipv6_ready();
  7101. }
  7102. if (sec % 60 == 0) {
  7103. if (dns_server_check_update_hosts() == 0) {
  7104. tlog(TLOG_INFO, "Update host file data");
  7105. }
  7106. }
  7107. _dns_server_save_cache_to_file();
  7108. }
  7109. static void _dns_server_period_run(unsigned int msec)
  7110. {
  7111. struct dns_request *request = NULL;
  7112. struct dns_request *tmp = NULL;
  7113. LIST_HEAD(check_list);
  7114. if ((msec % 10) == 0) {
  7115. _dns_server_period_run_second();
  7116. }
  7117. unsigned long now = get_tick_count();
  7118. pthread_mutex_lock(&server.request_list_lock);
  7119. list_for_each_entry_safe(request, tmp, &server.request_list, list)
  7120. {
  7121. /* Need to use tcping detection speed */
  7122. int check_order = request->check_order + 1;
  7123. if (atomic_read(&request->ip_map_num) == 0 || request->has_soa) {
  7124. continue;
  7125. }
  7126. if (request->send_tick < now - (check_order * DNS_PING_CHECK_INTERVAL) && request->has_ping_result == 0) {
  7127. _dns_server_request_get(request);
  7128. list_add_tail(&request->check_list, &check_list);
  7129. request->check_order++;
  7130. }
  7131. }
  7132. pthread_mutex_unlock(&server.request_list_lock);
  7133. list_for_each_entry_safe(request, tmp, &check_list, check_list)
  7134. {
  7135. _dns_server_second_ping_check(request);
  7136. list_del_init(&request->check_list);
  7137. _dns_server_request_release(request);
  7138. }
  7139. }
  7140. static void _dns_server_close_socket(void)
  7141. {
  7142. struct dns_server_conn_head *conn = NULL;
  7143. struct dns_server_conn_head *tmp = NULL;
  7144. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  7145. {
  7146. _dns_server_client_close(conn);
  7147. }
  7148. }
  7149. static void _dns_server_close_socket_server(void)
  7150. {
  7151. struct dns_server_conn_head *conn = NULL;
  7152. struct dns_server_conn_head *tmp = NULL;
  7153. list_for_each_entry_safe(conn, tmp, &server.conn_list, list)
  7154. {
  7155. switch (conn->type) {
  7156. case DNS_CONN_TYPE_HTTPS_SERVER:
  7157. case DNS_CONN_TYPE_TLS_SERVER: {
  7158. struct dns_server_conn_tls_server *tls_server = (struct dns_server_conn_tls_server *)conn;
  7159. if (tls_server->ssl_ctx) {
  7160. SSL_CTX_free(tls_server->ssl_ctx);
  7161. tls_server->ssl_ctx = NULL;
  7162. }
  7163. _dns_server_client_close(conn);
  7164. break;
  7165. }
  7166. case DNS_CONN_TYPE_UDP_SERVER:
  7167. case DNS_CONN_TYPE_TCP_SERVER:
  7168. _dns_server_client_close(conn);
  7169. break;
  7170. default:
  7171. break;
  7172. }
  7173. }
  7174. }
  7175. int dns_server_run(void)
  7176. {
  7177. struct epoll_event events[DNS_MAX_EVENTS + 1];
  7178. int num = 0;
  7179. int i = 0;
  7180. unsigned long now = {0};
  7181. unsigned long last = {0};
  7182. unsigned int msec = 0;
  7183. int sleep = 100;
  7184. int sleep_time = 0;
  7185. unsigned long expect_time = 0;
  7186. sleep_time = sleep;
  7187. now = get_tick_count() - sleep;
  7188. last = now;
  7189. expect_time = now + sleep;
  7190. while (atomic_read(&server.run)) {
  7191. now = get_tick_count();
  7192. if (sleep_time > 0) {
  7193. sleep_time -= now - last;
  7194. if (sleep_time <= 0) {
  7195. sleep_time = 0;
  7196. }
  7197. int cnt = sleep_time / sleep;
  7198. msec -= cnt;
  7199. expect_time -= cnt * sleep;
  7200. sleep_time -= cnt * sleep;
  7201. }
  7202. if (now >= expect_time) {
  7203. msec++;
  7204. if (last != now) {
  7205. _dns_server_period_run(msec);
  7206. }
  7207. sleep_time = sleep - (now - expect_time);
  7208. if (sleep_time < 0) {
  7209. sleep_time = 0;
  7210. expect_time = now;
  7211. }
  7212. /* When server is idle, the sleep time is 1000ms, to reduce CPU usage */
  7213. pthread_mutex_lock(&server.request_list_lock);
  7214. if (list_empty(&server.request_list)) {
  7215. int cnt = 10 - (msec % 10) - 1;
  7216. sleep_time += sleep * cnt;
  7217. msec += cnt;
  7218. /* sleep to next second */
  7219. expect_time += sleep * cnt;
  7220. }
  7221. pthread_mutex_unlock(&server.request_list_lock);
  7222. expect_time += sleep;
  7223. }
  7224. last = now;
  7225. num = epoll_wait(server.epoll_fd, events, DNS_MAX_EVENTS, sleep_time);
  7226. if (num < 0) {
  7227. usleep(100000);
  7228. continue;
  7229. }
  7230. if (num == 0) {
  7231. continue;
  7232. }
  7233. for (i = 0; i < num; i++) {
  7234. struct epoll_event *event = &events[i];
  7235. /* read event */
  7236. if (unlikely(event->data.fd == server.event_fd)) {
  7237. uint64_t value;
  7238. int unused __attribute__((unused));
  7239. unused = read(server.event_fd, &value, sizeof(uint64_t));
  7240. continue;
  7241. }
  7242. if (unlikely(event->data.fd == server.local_addr_cache.fd_netlink)) {
  7243. _dns_server_process_local_addr_cache(event->data.fd, event, now);
  7244. continue;
  7245. }
  7246. struct dns_server_conn_head *conn_head = event->data.ptr;
  7247. if (conn_head == NULL) {
  7248. tlog(TLOG_ERROR, "invalid fd\n");
  7249. continue;
  7250. }
  7251. if (_dns_server_process(conn_head, event, now) != 0) {
  7252. tlog(TLOG_DEBUG, "dns server process failed.");
  7253. }
  7254. }
  7255. }
  7256. _dns_server_close_socket_server();
  7257. close(server.epoll_fd);
  7258. server.epoll_fd = -1;
  7259. return 0;
  7260. }
  7261. static struct addrinfo *_dns_server_getaddr(const char *host, const char *port, int type, int protocol)
  7262. {
  7263. struct addrinfo hints;
  7264. struct addrinfo *result = NULL;
  7265. memset(&hints, 0, sizeof(hints));
  7266. hints.ai_family = AF_UNSPEC;
  7267. hints.ai_socktype = type;
  7268. hints.ai_protocol = protocol;
  7269. hints.ai_flags = AI_PASSIVE;
  7270. const int s = getaddrinfo(host, port, &hints, &result);
  7271. if (s != 0) {
  7272. const char *error_str;
  7273. if (s == EAI_SYSTEM) {
  7274. error_str = strerror(errno);
  7275. } else {
  7276. error_str = gai_strerror(s);
  7277. }
  7278. tlog(TLOG_ERROR, "get addr info failed. %s.\n", error_str);
  7279. goto errout;
  7280. }
  7281. return result;
  7282. errout:
  7283. if (result) {
  7284. freeaddrinfo(result);
  7285. }
  7286. return NULL;
  7287. }
  7288. int dns_server_start(void)
  7289. {
  7290. struct dns_server_conn_head *conn = NULL;
  7291. list_for_each_entry(conn, &server.conn_list, list)
  7292. {
  7293. if (conn->fd <= 0) {
  7294. continue;
  7295. }
  7296. if (_dns_server_epoll_ctl(conn, EPOLL_CTL_ADD, EPOLLIN) != 0) {
  7297. tlog(TLOG_ERROR, "epoll ctl failed.");
  7298. return -1;
  7299. }
  7300. }
  7301. return 0;
  7302. }
  7303. static int _dns_create_socket(const char *host_ip, int type)
  7304. {
  7305. int fd = -1;
  7306. struct addrinfo *gai = NULL;
  7307. char port_str[16];
  7308. char ip[MAX_IP_LEN];
  7309. char host_ip_device[MAX_IP_LEN * 2];
  7310. int port = 0;
  7311. char *host = NULL;
  7312. int optval = 1;
  7313. int yes = 1;
  7314. const int priority = SOCKET_PRIORITY;
  7315. const int ip_tos = SOCKET_IP_TOS;
  7316. const char *ifname = NULL;
  7317. safe_strncpy(host_ip_device, host_ip, sizeof(host_ip_device));
  7318. ifname = strstr(host_ip_device, "@");
  7319. if (ifname) {
  7320. *(char *)ifname = '\0';
  7321. ifname++;
  7322. }
  7323. if (parse_ip(host_ip_device, ip, &port) == 0) {
  7324. host = ip;
  7325. }
  7326. if (port <= 0) {
  7327. port = DEFAULT_DNS_PORT;
  7328. }
  7329. snprintf(port_str, sizeof(port_str), "%d", port);
  7330. gai = _dns_server_getaddr(host, port_str, type, 0);
  7331. if (gai == NULL) {
  7332. tlog(TLOG_ERROR, "get address failed.");
  7333. goto errout;
  7334. }
  7335. fd = socket(gai->ai_family, gai->ai_socktype, gai->ai_protocol);
  7336. if (fd < 0) {
  7337. tlog(TLOG_ERROR, "create socket failed, family = %d, type = %d, proto = %d, %s\n", gai->ai_family,
  7338. gai->ai_socktype, gai->ai_protocol, strerror(errno));
  7339. goto errout;
  7340. }
  7341. if (type == SOCK_STREAM) {
  7342. if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)) != 0) {
  7343. tlog(TLOG_ERROR, "set socket opt failed.");
  7344. goto errout;
  7345. }
  7346. /* enable TCP_FASTOPEN */
  7347. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &optval, sizeof(optval));
  7348. setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &yes, sizeof(yes));
  7349. } else {
  7350. setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &optval, sizeof(optval));
  7351. setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, &optval, sizeof(optval));
  7352. }
  7353. setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &priority, sizeof(priority));
  7354. setsockopt(fd, IPPROTO_IP, IP_TOS, &ip_tos, sizeof(ip_tos));
  7355. if (dns_socket_buff_size > 0) {
  7356. setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &dns_socket_buff_size, sizeof(dns_socket_buff_size));
  7357. setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &dns_socket_buff_size, sizeof(dns_socket_buff_size));
  7358. }
  7359. if (ifname != NULL) {
  7360. struct ifreq ifr;
  7361. memset(&ifr, 0, sizeof(struct ifreq));
  7362. safe_strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
  7363. ioctl(fd, SIOCGIFINDEX, &ifr);
  7364. if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, (void *)&ifr, sizeof(struct ifreq)) < 0) {
  7365. tlog(TLOG_ERROR, "bind socket to device %s failed, %s\n", ifr.ifr_name, strerror(errno));
  7366. goto errout;
  7367. }
  7368. }
  7369. if (bind(fd, gai->ai_addr, gai->ai_addrlen) != 0) {
  7370. tlog(TLOG_ERROR, "bind service %s failed, %s\n", host_ip, strerror(errno));
  7371. goto errout;
  7372. }
  7373. if (type == SOCK_STREAM) {
  7374. if (listen(fd, 256) != 0) {
  7375. tlog(TLOG_ERROR, "listen failed.\n");
  7376. goto errout;
  7377. }
  7378. }
  7379. fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC);
  7380. freeaddrinfo(gai);
  7381. return fd;
  7382. errout:
  7383. if (fd > 0) {
  7384. close(fd);
  7385. }
  7386. if (gai) {
  7387. freeaddrinfo(gai);
  7388. }
  7389. tlog(TLOG_ERROR, "add server failed, host-ip: %s, type: %d", host_ip, type);
  7390. return -1;
  7391. }
  7392. static int _dns_server_set_flags(struct dns_server_conn_head *head, struct dns_bind_ip *bind_ip)
  7393. {
  7394. time(&head->last_request_time);
  7395. head->server_flags = bind_ip->flags;
  7396. head->dns_group = bind_ip->group;
  7397. head->ipset_nftset_rule = &bind_ip->nftset_ipset_rule;
  7398. atomic_set(&head->refcnt, 0);
  7399. list_add(&head->list, &server.conn_list);
  7400. return 0;
  7401. }
  7402. static int _dns_server_socket_udp(struct dns_bind_ip *bind_ip)
  7403. {
  7404. const char *host_ip = NULL;
  7405. struct dns_server_conn_udp *conn = NULL;
  7406. int fd = -1;
  7407. host_ip = bind_ip->ip;
  7408. conn = malloc(sizeof(struct dns_server_conn_udp));
  7409. if (conn == NULL) {
  7410. goto errout;
  7411. }
  7412. INIT_LIST_HEAD(&conn->head.list);
  7413. fd = _dns_create_socket(host_ip, SOCK_DGRAM);
  7414. if (fd <= 0) {
  7415. goto errout;
  7416. }
  7417. conn->head.type = DNS_CONN_TYPE_UDP_SERVER;
  7418. conn->head.fd = fd;
  7419. _dns_server_set_flags(&conn->head, bind_ip);
  7420. _dns_server_conn_get(&conn->head);
  7421. return 0;
  7422. errout:
  7423. if (conn) {
  7424. free(conn);
  7425. conn = NULL;
  7426. }
  7427. if (fd > 0) {
  7428. close(fd);
  7429. }
  7430. return -1;
  7431. }
  7432. static int _dns_server_socket_tcp(struct dns_bind_ip *bind_ip)
  7433. {
  7434. const char *host_ip = NULL;
  7435. struct dns_server_conn_tcp_server *conn = NULL;
  7436. int fd = -1;
  7437. const int on = 1;
  7438. host_ip = bind_ip->ip;
  7439. conn = malloc(sizeof(struct dns_server_conn_tcp_server));
  7440. if (conn == NULL) {
  7441. goto errout;
  7442. }
  7443. INIT_LIST_HEAD(&conn->head.list);
  7444. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  7445. if (fd <= 0) {
  7446. goto errout;
  7447. }
  7448. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  7449. conn->head.type = DNS_CONN_TYPE_TCP_SERVER;
  7450. conn->head.fd = fd;
  7451. _dns_server_set_flags(&conn->head, bind_ip);
  7452. _dns_server_conn_get(&conn->head);
  7453. return 0;
  7454. errout:
  7455. if (conn) {
  7456. free(conn);
  7457. conn = NULL;
  7458. }
  7459. if (fd > 0) {
  7460. close(fd);
  7461. }
  7462. return -1;
  7463. }
  7464. static int _dns_server_socket_tls_ssl_pass_callback(char *buf, int size, int rwflag, void *userdata)
  7465. {
  7466. struct dns_bind_ip *bind_ip = userdata;
  7467. if (bind_ip->ssl_cert_key_pass == NULL || bind_ip->ssl_cert_key_pass[0] == '\0') {
  7468. return 0;
  7469. }
  7470. safe_strncpy(buf, bind_ip->ssl_cert_key_pass, size);
  7471. return strlen(buf);
  7472. }
  7473. static int _dns_server_socket_tls(struct dns_bind_ip *bind_ip, DNS_CONN_TYPE conn_type)
  7474. {
  7475. const char *host_ip = NULL;
  7476. const char *ssl_cert_file = NULL;
  7477. const char *ssl_cert_key_file = NULL;
  7478. struct dns_server_conn_tls_server *conn = NULL;
  7479. int fd = -1;
  7480. const SSL_METHOD *method = NULL;
  7481. SSL_CTX *ssl_ctx = NULL;
  7482. const int on = 1;
  7483. host_ip = bind_ip->ip;
  7484. ssl_cert_file = bind_ip->ssl_cert_file;
  7485. ssl_cert_key_file = bind_ip->ssl_cert_key_file;
  7486. if (ssl_cert_file == NULL || ssl_cert_key_file == NULL) {
  7487. tlog(TLOG_WARN, "no cert or cert key file");
  7488. goto errout;
  7489. }
  7490. if (ssl_cert_file[0] == '\0' || ssl_cert_key_file[0] == '\0') {
  7491. tlog(TLOG_WARN, "no cert or cert key file");
  7492. goto errout;
  7493. }
  7494. conn = malloc(sizeof(struct dns_server_conn_tls_server));
  7495. if (conn == NULL) {
  7496. goto errout;
  7497. }
  7498. INIT_LIST_HEAD(&conn->head.list);
  7499. fd = _dns_create_socket(host_ip, SOCK_STREAM);
  7500. if (fd <= 0) {
  7501. goto errout;
  7502. }
  7503. setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &on, sizeof(on));
  7504. #if (OPENSSL_VERSION_NUMBER >= 0x10100000L)
  7505. method = TLS_server_method();
  7506. if (method == NULL) {
  7507. goto errout;
  7508. }
  7509. #else
  7510. method = SSLv23_server_method();
  7511. #endif
  7512. ssl_ctx = SSL_CTX_new(method);
  7513. if (ssl_ctx == NULL) {
  7514. goto errout;
  7515. }
  7516. SSL_CTX_set_session_cache_mode(ssl_ctx,
  7517. SSL_SESS_CACHE_BOTH | SSL_SESS_CACHE_NO_INTERNAL | SSL_SESS_CACHE_NO_AUTO_CLEAR);
  7518. SSL_CTX_set_default_passwd_cb(ssl_ctx, _dns_server_socket_tls_ssl_pass_callback);
  7519. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, bind_ip);
  7520. /* Set the key and cert */
  7521. if (ssl_cert_file[0] != '\0' && SSL_CTX_use_certificate_chain_file(ssl_ctx, ssl_cert_file) <= 0) {
  7522. tlog(TLOG_ERROR, "load cert %s failed, %s", ssl_cert_file, ERR_error_string(ERR_get_error(), NULL));
  7523. goto errout;
  7524. }
  7525. if (ssl_cert_key_file[0] != '\0' &&
  7526. SSL_CTX_use_PrivateKey_file(ssl_ctx, ssl_cert_key_file, SSL_FILETYPE_PEM) <= 0) {
  7527. tlog(TLOG_ERROR, "load cert key %s failed, %s", ssl_cert_key_file, ERR_error_string(ERR_get_error(), NULL));
  7528. goto errout;
  7529. }
  7530. conn->head.type = conn_type;
  7531. conn->head.fd = fd;
  7532. conn->ssl_ctx = ssl_ctx;
  7533. _dns_server_set_flags(&conn->head, bind_ip);
  7534. _dns_server_conn_get(&conn->head);
  7535. return 0;
  7536. errout:
  7537. if (ssl_ctx) {
  7538. SSL_CTX_free(ssl_ctx);
  7539. ssl_ctx = NULL;
  7540. }
  7541. if (conn) {
  7542. free(conn);
  7543. conn = NULL;
  7544. }
  7545. if (fd > 0) {
  7546. close(fd);
  7547. }
  7548. return -1;
  7549. }
  7550. static int _dns_server_socket(void)
  7551. {
  7552. int i = 0;
  7553. for (i = 0; i < dns_conf_bind_ip_num; i++) {
  7554. struct dns_bind_ip *bind_ip = &dns_conf_bind_ip[i];
  7555. switch (bind_ip->type) {
  7556. case DNS_BIND_TYPE_UDP:
  7557. if (_dns_server_socket_udp(bind_ip) != 0) {
  7558. goto errout;
  7559. }
  7560. break;
  7561. case DNS_BIND_TYPE_TCP:
  7562. if (_dns_server_socket_tcp(bind_ip) != 0) {
  7563. goto errout;
  7564. }
  7565. break;
  7566. case DNS_BIND_TYPE_HTTPS:
  7567. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_HTTPS_SERVER) != 0) {
  7568. goto errout;
  7569. }
  7570. break;
  7571. case DNS_BIND_TYPE_TLS:
  7572. if (_dns_server_socket_tls(bind_ip, DNS_CONN_TYPE_TLS_SERVER) != 0) {
  7573. goto errout;
  7574. }
  7575. break;
  7576. default:
  7577. break;
  7578. }
  7579. }
  7580. return 0;
  7581. errout:
  7582. return -1;
  7583. }
  7584. static int _dns_server_audit_syslog(struct tlog_log *log, const char *buff, int bufflen)
  7585. {
  7586. syslog(LOG_INFO, "%.*s", bufflen, buff);
  7587. return 0;
  7588. }
  7589. static int _dns_server_audit_init(void)
  7590. {
  7591. char *audit_file = SMARTDNS_AUDIT_FILE;
  7592. unsigned int tlog_flag = 0;
  7593. if (dns_conf_audit_enable == 0) {
  7594. return 0;
  7595. }
  7596. if (dns_conf_audit_file[0] != 0) {
  7597. audit_file = dns_conf_audit_file;
  7598. }
  7599. if (dns_conf_audit_syslog) {
  7600. tlog_flag |= TLOG_SEGMENT;
  7601. }
  7602. dns_audit = tlog_open(audit_file, dns_conf_audit_size, dns_conf_audit_num, 0, tlog_flag);
  7603. if (dns_audit == NULL) {
  7604. return -1;
  7605. }
  7606. if (dns_conf_audit_syslog) {
  7607. tlog_reg_output_func(dns_audit, _dns_server_audit_syslog);
  7608. }
  7609. if (dns_conf_audit_file_mode > 0) {
  7610. tlog_set_permission(dns_audit, dns_conf_audit_file_mode, dns_conf_audit_file_mode);
  7611. }
  7612. if (dns_conf_audit_console != 0) {
  7613. tlog_logscreen(dns_audit, 1);
  7614. }
  7615. return 0;
  7616. }
  7617. static void _dns_server_neighbor_cache_remove_all(void)
  7618. {
  7619. struct neighbor_cache_item *item = NULL;
  7620. struct hlist_node *tmp = NULL;
  7621. unsigned long bucket = 0;
  7622. hash_for_each_safe(server.neighbor_cache.cache, bucket, tmp, item, node)
  7623. {
  7624. _dns_server_neighbor_cache_free_item(item);
  7625. }
  7626. pthread_mutex_destroy(&server.neighbor_cache.lock);
  7627. }
  7628. static int _dns_server_neighbor_cache_init(void)
  7629. {
  7630. hash_init(server.neighbor_cache.cache);
  7631. INIT_LIST_HEAD(&server.neighbor_cache.list);
  7632. atomic_set(&server.neighbor_cache.cache_num, 0);
  7633. pthread_mutex_init(&server.neighbor_cache.lock, NULL);
  7634. return 0;
  7635. }
  7636. static void _dns_server_local_addr_cache_item_free(radix_node_t *node, void *cbctx)
  7637. {
  7638. struct local_addr_cache_item *cache_item = NULL;
  7639. if (node == NULL) {
  7640. return;
  7641. }
  7642. if (node->data == NULL) {
  7643. return;
  7644. }
  7645. cache_item = node->data;
  7646. free(cache_item);
  7647. node->data = NULL;
  7648. }
  7649. static int _dns_server_local_addr_cache_destroy(void)
  7650. {
  7651. if (server.local_addr_cache.addr) {
  7652. Destroy_Radix(server.local_addr_cache.addr, _dns_server_local_addr_cache_item_free, NULL);
  7653. server.local_addr_cache.addr = NULL;
  7654. }
  7655. if (server.local_addr_cache.fd_netlink > 0) {
  7656. close(server.local_addr_cache.fd_netlink);
  7657. server.local_addr_cache.fd_netlink = -1;
  7658. }
  7659. return 0;
  7660. }
  7661. static int _dns_server_local_addr_cache_init(void)
  7662. {
  7663. int fd = 0;
  7664. struct sockaddr_nl sa;
  7665. server.local_addr_cache.fd_netlink = -1;
  7666. server.local_addr_cache.addr = NULL;
  7667. if (dns_conf_local_ptr_enable == 0) {
  7668. return 0;
  7669. }
  7670. fd = socket(AF_NETLINK, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, NETLINK_ROUTE);
  7671. if (fd < 0) {
  7672. tlog(TLOG_WARN, "create netlink socket failed, %s", strerror(errno));
  7673. goto errout;
  7674. }
  7675. memset(&sa, 0, sizeof(sa));
  7676. sa.nl_family = AF_NETLINK;
  7677. sa.nl_groups = RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_IFADDR;
  7678. if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) == -1) {
  7679. tlog(TLOG_WARN, "bind netlink socket failed, %s", strerror(errno));
  7680. goto errout;
  7681. }
  7682. struct epoll_event event;
  7683. memset(&event, 0, sizeof(event));
  7684. event.events = EPOLLIN | EPOLLERR;
  7685. event.data.fd = fd;
  7686. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_ADD, fd, &event) != 0) {
  7687. tlog(TLOG_ERROR, "set eventfd failed, %s\n", strerror(errno));
  7688. goto errout;
  7689. }
  7690. server.local_addr_cache.fd_netlink = fd;
  7691. server.local_addr_cache.addr = New_Radix();
  7692. struct {
  7693. struct nlmsghdr nh;
  7694. struct rtgenmsg gen;
  7695. } request;
  7696. memset(&request, 0, sizeof(request));
  7697. request.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtgenmsg));
  7698. request.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_DUMP;
  7699. request.nh.nlmsg_type = RTM_GETADDR;
  7700. request.gen.rtgen_family = AF_UNSPEC;
  7701. if (send(fd, &request, request.nh.nlmsg_len, 0) < 0) {
  7702. tlog(TLOG_WARN, "send netlink request failed, %s", strerror(errno));
  7703. goto errout;
  7704. }
  7705. return 0;
  7706. errout:
  7707. if (fd > 0) {
  7708. close(fd);
  7709. }
  7710. return -1;
  7711. }
  7712. static int _dns_server_cache_init(void)
  7713. {
  7714. if (dns_cache_init(dns_conf_cachesize, dns_conf_cache_max_memsize, _dns_server_cache_expired) != 0) {
  7715. tlog(TLOG_ERROR, "init cache failed.");
  7716. return -1;
  7717. }
  7718. const char *dns_cache_file = dns_conf_get_cache_dir();
  7719. if (dns_conf_cache_persist == 2) {
  7720. uint64_t freespace = get_free_space(dns_cache_file);
  7721. if (freespace >= CACHE_AUTO_ENABLE_SIZE) {
  7722. tlog(TLOG_INFO, "auto enable cache persist.");
  7723. dns_conf_cache_persist = 1;
  7724. }
  7725. }
  7726. if (dns_conf_cachesize <= 0 || dns_conf_cache_persist == 0) {
  7727. return 0;
  7728. }
  7729. if (dns_cache_load(dns_cache_file) != 0) {
  7730. tlog(TLOG_WARN, "Load cache failed.");
  7731. return 0;
  7732. }
  7733. return 0;
  7734. }
  7735. static int _dns_server_cache_save(int check_lock)
  7736. {
  7737. const char *dns_cache_file = dns_conf_get_cache_dir();
  7738. if (dns_conf_cache_persist == 0 || dns_conf_cachesize <= 0) {
  7739. if (access(dns_cache_file, F_OK) == 0) {
  7740. unlink(dns_cache_file);
  7741. }
  7742. return 0;
  7743. }
  7744. if (dns_cache_save(dns_cache_file, check_lock) != 0) {
  7745. tlog(TLOG_WARN, "save cache failed.");
  7746. return -1;
  7747. }
  7748. return 0;
  7749. }
  7750. static int _dns_server_init_wakeup_event(void)
  7751. {
  7752. int fdevent = -1;
  7753. fdevent = eventfd(0, EFD_CLOEXEC | EFD_NONBLOCK);
  7754. if (fdevent < 0) {
  7755. tlog(TLOG_ERROR, "create eventfd failed, %s\n", strerror(errno));
  7756. goto errout;
  7757. }
  7758. struct epoll_event event;
  7759. memset(&event, 0, sizeof(event));
  7760. event.events = EPOLLIN | EPOLLERR;
  7761. event.data.fd = fdevent;
  7762. if (epoll_ctl(server.epoll_fd, EPOLL_CTL_ADD, fdevent, &event) != 0) {
  7763. tlog(TLOG_ERROR, "set eventfd failed, %s\n", strerror(errno));
  7764. goto errout;
  7765. }
  7766. server.event_fd = fdevent;
  7767. return 0;
  7768. errout:
  7769. return -1;
  7770. }
  7771. int dns_server_init(void)
  7772. {
  7773. pthread_attr_t attr;
  7774. int epollfd = -1;
  7775. int ret = -1;
  7776. _dns_server_check_need_exit();
  7777. if (is_server_init == 1) {
  7778. return -1;
  7779. }
  7780. if (server.epoll_fd > 0) {
  7781. return -1;
  7782. }
  7783. if (_dns_server_audit_init() != 0) {
  7784. tlog(TLOG_ERROR, "init audit failed.");
  7785. goto errout;
  7786. }
  7787. memset(&server, 0, sizeof(server));
  7788. pthread_attr_init(&attr);
  7789. INIT_LIST_HEAD(&server.conn_list);
  7790. time(&server.cache_save_time);
  7791. atomic_set(&server.request_num, 0);
  7792. pthread_mutex_init(&server.request_list_lock, NULL);
  7793. INIT_LIST_HEAD(&server.request_list);
  7794. epollfd = epoll_create1(EPOLL_CLOEXEC);
  7795. if (epollfd < 0) {
  7796. tlog(TLOG_ERROR, "create epoll failed, %s\n", strerror(errno));
  7797. goto errout;
  7798. }
  7799. ret = _dns_server_socket();
  7800. if (ret != 0) {
  7801. tlog(TLOG_ERROR, "create server socket failed.\n");
  7802. goto errout;
  7803. }
  7804. server.epoll_fd = epollfd;
  7805. atomic_set(&server.run, 1);
  7806. if (dns_server_start() != 0) {
  7807. tlog(TLOG_ERROR, "start service failed.\n");
  7808. goto errout;
  7809. }
  7810. dns_server_check_ipv6_ready();
  7811. tlog(TLOG_INFO, "%s",
  7812. (is_ipv6_ready) ? "IPV6 is ready, enable IPV6 features"
  7813. : "IPV6 is not ready or speed check is disabled, disable IPV6 features");
  7814. if (_dns_server_init_wakeup_event() != 0) {
  7815. tlog(TLOG_ERROR, "init wakeup event failed.");
  7816. goto errout;
  7817. }
  7818. if (_dns_server_cache_init() != 0) {
  7819. tlog(TLOG_ERROR, "init dns cache filed.");
  7820. goto errout;
  7821. }
  7822. if (_dns_server_local_addr_cache_init() != 0) {
  7823. tlog(TLOG_WARN, "init local addr cache failed, disable local ptr.");
  7824. dns_conf_local_ptr_enable = 0;
  7825. }
  7826. if (_dns_server_neighbor_cache_init() != 0) {
  7827. tlog(TLOG_ERROR, "init neighbor cache failed.");
  7828. goto errout;
  7829. }
  7830. is_server_init = 1;
  7831. return 0;
  7832. errout:
  7833. atomic_set(&server.run, 0);
  7834. if (epollfd) {
  7835. close(epollfd);
  7836. }
  7837. _dns_server_close_socket();
  7838. pthread_mutex_destroy(&server.request_list_lock);
  7839. return -1;
  7840. }
  7841. void dns_server_stop(void)
  7842. {
  7843. atomic_set(&server.run, 0);
  7844. _dns_server_wakeup_thread();
  7845. }
  7846. void dns_server_exit(void)
  7847. {
  7848. if (is_server_init == 0) {
  7849. return;
  7850. }
  7851. if (server.event_fd > 0) {
  7852. close(server.event_fd);
  7853. server.event_fd = -1;
  7854. }
  7855. if (server.cache_save_pid > 0) {
  7856. kill(server.cache_save_pid, SIGKILL);
  7857. server.cache_save_pid = 0;
  7858. }
  7859. _dns_server_close_socket();
  7860. _dns_server_local_addr_cache_destroy();
  7861. _dns_server_neighbor_cache_remove_all();
  7862. _dns_server_cache_save(0);
  7863. _dns_server_request_remove_all();
  7864. pthread_mutex_destroy(&server.request_list_lock);
  7865. dns_cache_destroy();
  7866. is_server_init = 0;
  7867. }