2018-11-28 05:40:56 -07:00
|
|
|
package dnsforward
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"reflect"
|
2018-11-30 03:17:34 -07:00
|
|
|
"strings"
|
2018-11-28 05:40:56 -07:00
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
|
|
|
|
"github.com/joomcode/errorx"
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
)
|
|
|
|
|
2018-12-05 02:52:23 -07:00
|
|
|
// Server is the main way to start a DNS server.
|
|
|
|
//
|
2018-11-28 05:40:56 -07:00
|
|
|
// Example:
|
2018-12-05 02:52:23 -07:00
|
|
|
// s := dnsforward.Server{}
|
|
|
|
// err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine
|
|
|
|
// err := s.Reconfigure(ServerConfig{UDPListenAddr: &net.UDPAddr{Port: 53535}}) // will reconfigure running DNS server to listen on UDP port 53535
|
|
|
|
// err := s.Stop() // will stop listening on port 53535 and cancel all goroutines
|
|
|
|
// err := s.Start(nil) // will start listening again, on port 53535, in a goroutine
|
2018-11-28 05:40:56 -07:00
|
|
|
//
|
|
|
|
// The zero Server is empty and ready for use.
|
|
|
|
type Server struct {
|
|
|
|
udpListen *net.UDPConn
|
|
|
|
|
|
|
|
dnsFilter *dnsfilter.Dnsfilter
|
|
|
|
|
|
|
|
cache cache
|
|
|
|
|
|
|
|
sync.RWMutex
|
|
|
|
ServerConfig
|
|
|
|
}
|
|
|
|
|
2018-11-28 07:55:01 -07:00
|
|
|
// uncomment this block to have tracing of locks
|
|
|
|
/*
|
|
|
|
func (s *Server) Lock() {
|
|
|
|
pc := make([]uintptr, 10) // at least 1 entry needed
|
|
|
|
runtime.Callers(2, pc)
|
|
|
|
f := runtime.FuncForPC(pc[0])
|
|
|
|
file, line := f.FileLine(pc[0])
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> Lock() -> in progress\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
s.RWMutex.Lock()
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> Lock() -> done\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
}
|
|
|
|
func (s *Server) RLock() {
|
|
|
|
pc := make([]uintptr, 10) // at least 1 entry needed
|
|
|
|
runtime.Callers(2, pc)
|
|
|
|
f := runtime.FuncForPC(pc[0])
|
|
|
|
file, line := f.FileLine(pc[0])
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> RLock() -> in progress\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
s.RWMutex.RLock()
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> RLock() -> done\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
}
|
|
|
|
func (s *Server) Unlock() {
|
|
|
|
pc := make([]uintptr, 10) // at least 1 entry needed
|
|
|
|
runtime.Callers(2, pc)
|
|
|
|
f := runtime.FuncForPC(pc[0])
|
|
|
|
file, line := f.FileLine(pc[0])
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> Unlock() -> in progress\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
s.RWMutex.Unlock()
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> Unlock() -> done\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
}
|
|
|
|
func (s *Server) RUnlock() {
|
|
|
|
pc := make([]uintptr, 10) // at least 1 entry needed
|
|
|
|
runtime.Callers(2, pc)
|
|
|
|
f := runtime.FuncForPC(pc[0])
|
|
|
|
file, line := f.FileLine(pc[0])
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> RUnlock() -> in progress\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
s.RWMutex.RUnlock()
|
|
|
|
fmt.Fprintf(os.Stderr, "%s:%d %s() -> RUnlock() -> done\n", path.Base(file), line, path.Base(f.Name()))
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
2018-11-28 08:24:04 -07:00
|
|
|
type FilteringConfig struct {
|
2018-11-30 03:35:22 -07:00
|
|
|
ProtectionEnabled bool `yaml:"protection_enabled"`
|
|
|
|
FilteringEnabled bool `yaml:"filtering_enabled"`
|
|
|
|
BlockedResponseTTL uint32 `yaml:"blocked_response_ttl"` // if 0, then default is used (3600)
|
|
|
|
|
|
|
|
dnsfilter.Config `yaml:",inline"`
|
2018-11-28 08:24:04 -07:00
|
|
|
}
|
|
|
|
|
2018-11-28 05:40:56 -07:00
|
|
|
// The zero ServerConfig is empty and ready for use.
|
|
|
|
type ServerConfig struct {
|
2018-11-30 03:35:22 -07:00
|
|
|
UDPListenAddr *net.UDPAddr // if nil, then default is is used (port 53 on *)
|
|
|
|
Upstreams []Upstream
|
|
|
|
Filters []dnsfilter.Filter
|
2018-11-28 08:24:04 -07:00
|
|
|
|
|
|
|
FilteringConfig
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
var defaultValues = ServerConfig{
|
2018-11-30 03:35:22 -07:00
|
|
|
UDPListenAddr: &net.UDPAddr{Port: 53},
|
|
|
|
FilteringConfig: FilteringConfig{BlockedResponseTTL: 3600},
|
2018-11-28 05:40:56 -07:00
|
|
|
Upstreams: []Upstream{
|
|
|
|
//// dns over HTTPS
|
2018-12-05 02:57:14 -07:00
|
|
|
// &dnsOverHTTPS{address: "https://1.1.1.1/dns-query"},
|
|
|
|
// &dnsOverHTTPS{address: "https://dns.google.com/experimental"},
|
|
|
|
// &dnsOverHTTPS{address: "https://doh.cleanbrowsing.org/doh/security-filter/"},
|
|
|
|
// &dnsOverHTTPS{address: "https://dns10.quad9.net/dns-query"},
|
|
|
|
// &dnsOverHTTPS{address: "https://doh.powerdns.org"},
|
|
|
|
// &dnsOverHTTPS{address: "https://doh.securedns.eu/dns-query"},
|
2018-11-28 05:40:56 -07:00
|
|
|
|
|
|
|
//// dns over TLS
|
2018-12-05 02:57:14 -07:00
|
|
|
// &dnsOverTLS{address: "tls://8.8.8.8:853"},
|
|
|
|
// &dnsOverTLS{address: "tls://8.8.4.4:853"},
|
|
|
|
// &dnsOverTLS{address: "tls://1.1.1.1:853"},
|
|
|
|
// &dnsOverTLS{address: "tls://1.0.0.1:853"},
|
2018-11-28 05:40:56 -07:00
|
|
|
|
|
|
|
//// plainDNS
|
2018-12-05 02:57:14 -07:00
|
|
|
&plainDNS{address: "8.8.8.8:53"},
|
|
|
|
&plainDNS{address: "8.8.4.4:53"},
|
|
|
|
&plainDNS{address: "1.1.1.1:53"},
|
|
|
|
&plainDNS{address: "1.0.0.1:53"},
|
2018-11-28 05:40:56 -07:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// packet loop
|
|
|
|
//
|
|
|
|
func (s *Server) packetLoop() {
|
|
|
|
log.Printf("Entering packet handle loop")
|
|
|
|
b := make([]byte, dns.MaxMsgSize)
|
|
|
|
for {
|
|
|
|
s.RLock()
|
|
|
|
conn := s.udpListen
|
|
|
|
s.RUnlock()
|
|
|
|
if conn == nil {
|
|
|
|
log.Printf("udp socket has disappeared, exiting loop")
|
|
|
|
break
|
|
|
|
}
|
|
|
|
n, addr, err := conn.ReadFrom(b)
|
|
|
|
// documentation says to handle the packet even if err occurs, so do that first
|
|
|
|
if n > 0 {
|
|
|
|
// make a copy of all bytes because ReadFrom() will overwrite contents of b on next call
|
|
|
|
// we need the contents to survive the call because we're handling them in goroutine
|
|
|
|
p := make([]byte, n)
|
|
|
|
copy(p, b)
|
|
|
|
go s.handlePacket(p, addr, conn) // ignore errors
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if isConnClosed(err) {
|
|
|
|
log.Printf("ReadFrom() returned because we're reading from a closed connection, exiting loop")
|
2018-11-28 07:55:01 -07:00
|
|
|
// don't try to nullify s.udpListen here, because s.udpListen could be already re-bound to listen
|
2018-11-28 05:40:56 -07:00
|
|
|
break
|
|
|
|
}
|
|
|
|
log.Printf("Got error when reading from udp listen: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Control functions
|
|
|
|
//
|
|
|
|
|
|
|
|
func (s *Server) Start(config *ServerConfig) error {
|
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
|
|
|
if config != nil {
|
|
|
|
s.ServerConfig = *config
|
|
|
|
}
|
|
|
|
// TODO: handle being called Start() second time after Stop()
|
|
|
|
if s.udpListen == nil {
|
|
|
|
log.Printf("Creating UDP socket")
|
|
|
|
var err error
|
|
|
|
addr := s.UDPListenAddr
|
|
|
|
if addr == nil {
|
|
|
|
addr = defaultValues.UDPListenAddr
|
|
|
|
}
|
|
|
|
s.udpListen, err = net.ListenUDP("udp", addr)
|
|
|
|
if err != nil {
|
2018-11-28 06:28:28 -07:00
|
|
|
s.udpListen = nil
|
2018-11-28 05:40:56 -07:00
|
|
|
return errorx.Decorate(err, "Couldn't listen to UDP socket")
|
|
|
|
}
|
|
|
|
log.Println(s.udpListen.LocalAddr(), s.UDPListenAddr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.dnsFilter == nil {
|
|
|
|
log.Printf("Creating dnsfilter")
|
2018-12-03 02:51:37 -07:00
|
|
|
s.dnsFilter = dnsfilter.New(&s.Config)
|
2018-11-30 03:51:15 -07:00
|
|
|
// add rules only if they are enabled
|
|
|
|
if s.FilteringEnabled {
|
|
|
|
s.dnsFilter.AddRules(s.Filters)
|
|
|
|
}
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
go s.packetLoop()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) Stop() error {
|
|
|
|
s.Lock()
|
|
|
|
defer s.Unlock()
|
|
|
|
if s.udpListen != nil {
|
|
|
|
err := s.udpListen.Close()
|
2018-11-28 06:28:28 -07:00
|
|
|
s.udpListen = nil
|
2018-11-28 05:40:56 -07:00
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't close UDP listening socket")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-28 06:43:50 -07:00
|
|
|
func (s *Server) IsRunning() bool {
|
|
|
|
s.RLock()
|
|
|
|
isRunning := true
|
|
|
|
if s.udpListen == nil {
|
|
|
|
isRunning = false
|
|
|
|
}
|
|
|
|
s.RUnlock()
|
|
|
|
return isRunning
|
|
|
|
}
|
|
|
|
|
2018-11-28 05:40:56 -07:00
|
|
|
//
|
|
|
|
// Server reconfigure
|
|
|
|
//
|
|
|
|
|
|
|
|
func (s *Server) reconfigureListenAddr(new ServerConfig) error {
|
|
|
|
oldAddr := s.UDPListenAddr
|
|
|
|
if oldAddr == nil {
|
|
|
|
oldAddr = defaultValues.UDPListenAddr
|
|
|
|
}
|
|
|
|
newAddr := new.UDPListenAddr
|
|
|
|
if newAddr == nil {
|
|
|
|
newAddr = defaultValues.UDPListenAddr
|
|
|
|
}
|
|
|
|
if newAddr.Port == 0 {
|
|
|
|
return errorx.IllegalArgument.New("new port cannot be 0")
|
|
|
|
}
|
|
|
|
if reflect.DeepEqual(oldAddr, newAddr) {
|
|
|
|
// do nothing, the addresses are exactly the same
|
|
|
|
log.Printf("Not going to rebind because addresses are same: %v -> %v", oldAddr, newAddr)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// rebind, using a strategy:
|
|
|
|
// * if ports are different, bind new first, then close old
|
|
|
|
// * if ports are same, close old first, then bind new
|
|
|
|
var newListen *net.UDPConn
|
|
|
|
var err error
|
|
|
|
if oldAddr.Port != newAddr.Port {
|
|
|
|
log.Printf("Rebinding -- ports are different so bind first then close")
|
|
|
|
newListen, err = net.ListenUDP("udp", newAddr)
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't bind to %v", newAddr)
|
|
|
|
}
|
2018-11-28 06:26:33 -07:00
|
|
|
s.Lock()
|
2018-11-28 05:40:56 -07:00
|
|
|
if s.udpListen != nil {
|
2018-11-28 06:26:33 -07:00
|
|
|
err = s.udpListen.Close()
|
2018-11-28 06:28:28 -07:00
|
|
|
s.udpListen = nil
|
2018-11-28 06:26:33 -07:00
|
|
|
}
|
|
|
|
s.Unlock()
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't close UDP listening socket")
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
log.Printf("Rebinding -- ports are same so close first then bind")
|
2018-11-28 06:26:33 -07:00
|
|
|
s.Lock()
|
2018-11-28 05:40:56 -07:00
|
|
|
if s.udpListen != nil {
|
2018-11-28 06:26:33 -07:00
|
|
|
err = s.udpListen.Close()
|
2018-11-28 06:28:28 -07:00
|
|
|
s.udpListen = nil
|
2018-11-28 06:26:33 -07:00
|
|
|
}
|
|
|
|
s.Unlock()
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't close UDP listening socket")
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
newListen, err = net.ListenUDP("udp", newAddr)
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't bind to %v", newAddr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
s.Lock()
|
|
|
|
s.udpListen = newListen
|
|
|
|
s.UDPListenAddr = new.UDPListenAddr
|
|
|
|
s.Unlock()
|
|
|
|
log.Println(s.udpListen.LocalAddr(), s.UDPListenAddr)
|
|
|
|
|
|
|
|
go s.packetLoop() // the old one has quit, use new one
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-28 08:14:12 -07:00
|
|
|
func (s *Server) reconfigureBlockedResponseTTL(new ServerConfig) {
|
|
|
|
newVal := new.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
if newVal == 0 {
|
2018-11-28 08:14:12 -07:00
|
|
|
newVal = defaultValues.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
2018-11-28 08:14:12 -07:00
|
|
|
oldVal := s.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
if oldVal == 0 {
|
2018-11-28 08:14:12 -07:00
|
|
|
oldVal = defaultValues.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
if newVal != oldVal {
|
2018-11-28 08:14:12 -07:00
|
|
|
s.BlockedResponseTTL = new.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) reconfigureUpstreams(new ServerConfig) {
|
|
|
|
newVal := new.Upstreams
|
|
|
|
if len(newVal) == 0 {
|
|
|
|
newVal = defaultValues.Upstreams
|
|
|
|
}
|
|
|
|
oldVal := s.Upstreams
|
|
|
|
if len(oldVal) == 0 {
|
|
|
|
oldVal = defaultValues.Upstreams
|
|
|
|
}
|
|
|
|
if reflect.DeepEqual(newVal, oldVal) {
|
|
|
|
// they're exactly the same, do nothing
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.Upstreams = new.Upstreams
|
|
|
|
}
|
|
|
|
|
2018-11-30 03:51:15 -07:00
|
|
|
func (s *Server) reconfigureFiltering(new ServerConfig) {
|
2018-11-28 05:40:56 -07:00
|
|
|
newFilters := new.Filters
|
|
|
|
if len(newFilters) == 0 {
|
|
|
|
newFilters = defaultValues.Filters
|
|
|
|
}
|
|
|
|
oldFilters := s.Filters
|
|
|
|
if len(oldFilters) == 0 {
|
|
|
|
oldFilters = defaultValues.Filters
|
|
|
|
}
|
2018-11-30 03:51:15 -07:00
|
|
|
|
|
|
|
needUpdate := false
|
|
|
|
if !reflect.DeepEqual(newFilters, oldFilters) {
|
|
|
|
needUpdate = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(new.FilteringConfig, s.FilteringConfig) {
|
|
|
|
needUpdate = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if !needUpdate {
|
|
|
|
// nothing to do, everything is same
|
2018-11-28 05:40:56 -07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-11-30 03:51:15 -07:00
|
|
|
// TODO: instead of creating new dnsfilter, change existing one's settings and filters
|
2018-11-30 03:47:26 -07:00
|
|
|
dnsFilter := dnsfilter.New(&new.Config) // sets safebrowsing, safesearch and parental
|
2018-11-30 03:48:53 -07:00
|
|
|
|
|
|
|
// add rules only if they are enabled
|
|
|
|
if new.FilteringEnabled {
|
|
|
|
dnsFilter.AddRules(newFilters)
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
s.Lock()
|
|
|
|
oldDnsFilter := s.dnsFilter
|
|
|
|
s.dnsFilter = dnsFilter
|
2018-11-30 03:51:15 -07:00
|
|
|
s.FilteringConfig = new.FilteringConfig
|
2018-11-28 05:40:56 -07:00
|
|
|
s.Unlock()
|
|
|
|
|
|
|
|
oldDnsFilter.Destroy()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) Reconfigure(new ServerConfig) error {
|
2018-11-28 08:14:12 -07:00
|
|
|
s.reconfigureBlockedResponseTTL(new)
|
2018-11-28 05:40:56 -07:00
|
|
|
s.reconfigureUpstreams(new)
|
2018-11-30 03:51:15 -07:00
|
|
|
s.reconfigureFiltering(new)
|
2018-11-28 05:40:56 -07:00
|
|
|
|
|
|
|
err := s.reconfigureListenAddr(new)
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't reconfigure to new listening address %+v", new.UDPListenAddr)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// packet handling functions
|
|
|
|
//
|
|
|
|
|
|
|
|
func (s *Server) handlePacket(p []byte, addr net.Addr, conn *net.UDPConn) {
|
|
|
|
// log.Printf("Got packet %d bytes from %s: %v", len(p), addr, p)
|
|
|
|
msg := dns.Msg{}
|
|
|
|
err := msg.Unpack(p)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("failed to unpack DNS packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// DNS packet byte format is valid
|
|
|
|
//
|
|
|
|
// any errors below here require a response to client
|
|
|
|
// log.Printf("Unpacked: %v", msg.String())
|
|
|
|
if len(msg.Question) != 1 {
|
|
|
|
log.Printf("Got invalid number of questions: %v", len(msg.Question))
|
|
|
|
err := s.respondWithServerFailure(&msg, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Couldn't respond to UDP packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-30 04:04:17 -07:00
|
|
|
// use dnsfilter before cache -- changed settings or filters would require cache invalidation otherwise
|
2018-11-30 03:17:34 -07:00
|
|
|
host := strings.TrimSuffix(msg.Question[0].Name, ".")
|
2018-11-28 05:40:56 -07:00
|
|
|
res, err := s.dnsFilter.CheckHost(host)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("dnsfilter failed to check host '%s': %s", host, err)
|
|
|
|
err := s.respondWithServerFailure(&msg, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Couldn't respond to UDP packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
} else if res.IsFiltered {
|
|
|
|
log.Printf("Host %s is filtered, reason - '%s', matched rule: '%s'", host, res.Reason, res.Rule)
|
|
|
|
err := s.respondWithNXDomain(&msg, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Couldn't respond to UDP packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-30 04:04:17 -07:00
|
|
|
{
|
|
|
|
val, ok := s.cache.Get(&msg)
|
|
|
|
if ok && val != nil {
|
|
|
|
err = s.respond(val, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
if isConnClosed(err) {
|
|
|
|
// ignore this error, the connection was closed and that's ok
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Printf("Couldn't respond to UDP packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-28 05:40:56 -07:00
|
|
|
// TODO: replace with single-socket implementation
|
|
|
|
upstream := s.chooseUpstream()
|
|
|
|
reply, err := upstream.Exchange(&msg)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("talking to upstream failed for host '%s': %s", host, err)
|
|
|
|
err := s.respondWithServerFailure(&msg, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
if isConnClosed(err) {
|
|
|
|
// ignore this error, the connection was closed and that's ok
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Printf("Couldn't respond to UDP packet with server failure: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if reply == nil {
|
|
|
|
log.Printf("SHOULD NOT HAPPEN upstream returned empty message for host '%s'. Request is %v", host, msg.String())
|
|
|
|
err := s.respondWithServerFailure(&msg, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("Couldn't respond to UDP packet with should not happen: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = s.respond(reply, addr, conn)
|
|
|
|
if err != nil {
|
|
|
|
if isConnClosed(err) {
|
|
|
|
// ignore this error, the connection was closed and that's ok
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Printf("Couldn't respond to UDP packet: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
s.cache.Set(reply)
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// packet sending functions
|
|
|
|
//
|
|
|
|
|
|
|
|
func (s *Server) respond(resp *dns.Msg, addr net.Addr, conn *net.UDPConn) error {
|
|
|
|
// log.Printf("Replying to %s with %s", addr, resp)
|
|
|
|
resp.Compress = true
|
|
|
|
bytes, err := resp.Pack()
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "Couldn't convert message into wire format")
|
|
|
|
}
|
|
|
|
n, err := conn.WriteTo(bytes, addr)
|
|
|
|
if n == 0 && isConnClosed(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if n != len(bytes) {
|
|
|
|
return fmt.Errorf("WriteTo() returned with %d != %d", n, len(bytes))
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return errorx.Decorate(err, "WriteTo() returned error")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) respondWithServerFailure(request *dns.Msg, addr net.Addr, conn *net.UDPConn) error {
|
|
|
|
resp := dns.Msg{}
|
|
|
|
resp.SetRcode(request, dns.RcodeServerFailure)
|
|
|
|
return s.respond(&resp, addr, conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) respondWithNXDomain(request *dns.Msg, addr net.Addr, conn *net.UDPConn) error {
|
|
|
|
resp := dns.Msg{}
|
|
|
|
resp.SetRcode(request, dns.RcodeNameError)
|
|
|
|
resp.Ns = s.genSOA(request)
|
|
|
|
return s.respond(&resp, addr, conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) genSOA(request *dns.Msg) []dns.RR {
|
|
|
|
zone := ""
|
|
|
|
if len(request.Question) > 0 {
|
|
|
|
zone = request.Question[0].Name
|
|
|
|
}
|
|
|
|
|
|
|
|
soa := dns.SOA{
|
|
|
|
// values copied from verisign's nonexistent .com domain
|
|
|
|
// their exact values are not important in our use case because they are used for domain transfers between primary/secondary DNS servers
|
|
|
|
Refresh: 1800,
|
|
|
|
Retry: 900,
|
|
|
|
Expire: 604800,
|
|
|
|
Minttl: 86400,
|
|
|
|
// copied from AdGuard DNS
|
|
|
|
Ns: "fake-for-negative-caching.adguard.com.",
|
|
|
|
Serial: 100500,
|
|
|
|
// rest is request-specific
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: zone,
|
|
|
|
Rrtype: dns.TypeSOA,
|
2018-11-28 08:14:12 -07:00
|
|
|
Ttl: s.BlockedResponseTTL,
|
2018-11-28 05:40:56 -07:00
|
|
|
Class: dns.ClassINET,
|
|
|
|
},
|
|
|
|
Mbox: "hostmaster.", // zone will be appended later if it's not empty or "."
|
|
|
|
}
|
|
|
|
if soa.Hdr.Ttl == 0 {
|
2018-11-28 08:14:12 -07:00
|
|
|
soa.Hdr.Ttl = defaultValues.BlockedResponseTTL
|
2018-11-28 05:40:56 -07:00
|
|
|
}
|
|
|
|
if len(zone) > 0 && zone[0] != '.' {
|
|
|
|
soa.Mbox += zone
|
|
|
|
}
|
|
|
|
return []dns.RR{&soa}
|
|
|
|
}
|