| /* dnssd-proxy.c |
| * |
| * Copyright (c) 2018-2024 Apple Inc. All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * https://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| * This is a Discovery Proxy module for the SRP gateway. |
| * |
| * The motivation here is that it makes sense to co-locate the SRP relay and the Discovery Proxy because |
| * these functions are likely to co-exist on the same node, listening on the same port. For homenet-style |
| * name resolution, we need a DNS proxy that implements DNSSD Discovery Proxy for local queries, but |
| * forwards other queries to an ISP resolver. The SRP gateway is already expecting to do this. |
| * This module implements the functions required to allow the SRP gateway to also do Discovery Relay. |
| * |
| * The Discovery Proxy relies on Apple's DNS-SD library and the mDNSResponder DNSSD server, which is included |
| * in Apple's open source mDNSResponder package, available here: |
| * |
| * https://opensource.apple.com/tarballs/mDNSResponder/ |
| */ |
| |
| #ifndef __APPLE_USE_RFC_3542 |
| #define __APPLE_USE_RFC_3542 |
| #endif // #ifndef __APPLE_USE_RFC_3542 |
| |
| #include <stdlib.h> |
| #include <string.h> |
| #include <stdio.h> |
| #include <unistd.h> |
| #include <errno.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <fcntl.h> |
| #include <sys/time.h> |
| #include <ctype.h> |
| #include <sys/types.h> |
| #include <ifaddrs.h> |
| #include <net/if.h> |
| #include <stdarg.h> |
| #include <notify.h> |
| #ifdef IOLOOP_MACOS |
| #include <AssertMacros.h> |
| #include <SystemConfiguration/SystemConfiguration.h> |
| #endif // #ifdef IOLOOP_MACOS |
| |
| #include "dns_sd.h" |
| #include "srp.h" |
| #include "dns-msg.h" |
| #include "srp-crypto.h" |
| #include "ioloop.h" |
| #include "dso-utils.h" |
| #include "dso.h" |
| #include "srp-tls.h" |
| #include "config-parse.h" |
| #include "srp-mdns-proxy.h" |
| #include "dnssd-proxy.h" |
| #include "srp-tls.h" |
| #include "srp-gw.h" |
| #include "srp-proxy.h" |
| #include "cti-services.h" |
| #include "route.h" |
| #include "srp-replication.h" |
| #if THREAD_DEVICE |
| # include "state-machine.h" |
| # include "service-publisher.h" |
| #endif |
| #if SRP_FEATURE_NAT64 |
| #include "dns_sd_private.h" |
| #include "nat64-macos.h" |
| #endif |
| #include "advertising_proxy_services.h" |
| #include "srp-dnssd.h" |
| |
| #define RESPONSE_WINDOW_MSECS 800 |
| #define RESPONSE_WINDOW_USECS (RESPONSE_WINDOW_MSECS * 1000) // 800ms in microseconds. |
| |
| extern srp_server_t *srp_servers; |
| #define SERIAL(x) ((x) == NULL ? 0 : (x)->serial) |
| |
| // When do we build dnssd-proxy? |
| // 1. When we are integrating dnssd-proxy into srp-mdns-proxy: SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY == 1 |
| // 2. When we are building standalone dnssd-proxy: !defined(BUILD_SRP_MDNS_PROXY) || (BUILD_SRP_MDNS_PROXY == 0) |
| // When do we not build dnssd-proxy? |
| // 3. When we are building srp-mdns-proxy without dnssd-proxy: other than the two cases above. |
| #if (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) || (!defined(BUILD_SRP_MDNS_PROXY) || (BUILD_SRP_MDNS_PROXY == 0)) |
| |
| // Enumerate the list of interfaces, map them to interface indexes, give each one a name |
| // Have a tree of subdomains for matching |
| |
| // Structures |
| |
| typedef struct interface_addr interface_addr_t; |
| struct interface_addr { |
| interface_addr_t *next; |
| addr_t addr, mask; |
| }; |
| |
| typedef struct dp_interface dp_interface_t; |
| struct dp_interface { |
| int ifindex; // The interface index (for use with sendmsg() and recvmsg(). |
| bool no_push; // If true, don't set up DNS Push for this domain |
| char *NONNULL name; // The name of the interface |
| interface_addr_t *NULLABLE addresses; // Addresses on this interface. |
| }; |
| |
| typedef struct hardwired hardwired_t; |
| struct hardwired { |
| hardwired_t *NULLABLE next; |
| uint16_t type; |
| char *NONNULL name; |
| char *NONNULL fullname; |
| uint8_t *NULLABLE rdata; |
| uint16_t rdlen; |
| }; |
| |
| typedef struct question question_t; |
| typedef struct answer answer_t; |
| typedef struct served_domain served_domain_t; |
| struct served_domain { |
| served_domain_t *NULLABLE next; // Active configurations, used for identifying a domain that matches |
| char *NONNULL domain; // The domain name of the interface, represented as a text string. |
| char *NONNULL domain_ld; // The same name, with a leading dot (if_domain_lp == if_domain + 1) |
| dns_name_t *NONNULL domain_name; // The domain name, parsed into labels. |
| hardwired_t *NULLABLE hardwired_responses; // Hardwired responses for this interface. |
| dp_interface_t *NULLABLE interface; // Interface to which this domain applies (may be NULL). |
| question_t *NULLABLE questions; // Questions that have been asked in the served domain. |
| }; |
| |
| // There are two ways that a dnssd_query_t can be created. One is that a DNS datagram comes in that's a DNS |
| // query. In this case, we create the query, ask the question, generate a single DNS response, send it, and |
| // the dnssd query is finished. We could optimize retransmissions, but currently do not. UDP queries can |
| // happen either over a TCP connection or a UDP connection--the behavior is the same in either case. The |
| // other way is that it can be a DNS Push subscribe. A DNS Push subscribe query is finished either when the |
| // connection dies, or when we get a corresponding unsubscribe. |
| |
| // For DNS Push queries, there is an "activity" object which tracks a particular subscription. Each activity |
| // can hold a reference to the comm_t. A disconnect from the comm_t should cancel all activities. Otherwise, |
| // the lifecycle of activities should not affect the comm_t. |
| |
| // For DNS queries, a disconnect should cancel every query associated with the connection. This is complicated |
| // by the fact that we are not tracking outstanding queries--the query survives because the dnssd_txn_t object |
| // holds a reference to it; when the txn_t goes away, the connection will have no remaining references. |
| |
| // In order to make this work, dnssd_query_t objects are tracked per connection. Dnssd_query_t objects do not |
| // hold a reference to their comm_t, but rather to their tracker. |
| |
| // When a connection drops, the tracker object gets a disconnect callback, which triggers it to cancel out any |
| // remaining DNS transactions, and to cancel the associated DSO object. Cancelling the DSO object cancels all |
| // of the activities on that object; each activity is a dnssd_query_t object. Consequently, the tracker does |
| // not directly track DSO activities. |
| |
| // In order to follow RFC 7766, the tracker keeps an idle timer going. If no DNS messages have been received |
| // on a connection for that amount of time, the tracker closes the connection; when the disconnect event arrives, |
| // the tracker is collected. If there is a DSO object on the tracker, the tracker is not responsible for tracking |
| // idle state. |
| |
| typedef enum { |
| dp_tracker_session_none, |
| dp_tracker_session_push, |
| dp_tracker_session_srpl |
| } dp_tracker_session_type_t; |
| |
| int cur_tracker_serial; |
| typedef struct dnssd_query dnssd_query_t; |
| typedef struct dp_tracker { |
| int ref_count; |
| int serial; |
| comm_t *connection; |
| dnssd_query_t *dns_queries; |
| dso_state_t *dso; |
| wakeup_t *idle_timeout; |
| dp_tracker_session_type_t session_type; |
| } dp_tracker_t; |
| |
| struct answer { |
| answer_t *next; // List of answers to a question. |
| char *fullname; // Name returned in callback. |
| uint8_t *rdata; // Rdata returned in callback (wire format). |
| uint32_t interface_index; // Interface index returned in callback. |
| uint32_t ttl; // Time-to-live returned in callback (probably not useful for LLQ). |
| uint16_t rrtype; // Resource record type returned in callback. |
| uint16_t rrclass; // Resource record class returned in callback. |
| uint16_t rdlen; // Length of resource record data returned in callback. |
| }; |
| |
| static int cur_question_serial; |
| struct question { |
| question_t *next; // List of questions that are being asked. |
| served_domain_t *served_domain; |
| dnssd_query_t *queries; // dnssd queries that are asking this question. |
| dnssd_txn_t *txn; // Subordinate DNSServiceRef for this question |
| char *name; // The name we are looking up. |
| answer_t *answers; // Answers this question has received. |
| int64_t start_time; // When this question was started. |
| int serviceFlags; // Service flags to use with this question. |
| int ref_count; // Reference count. |
| int serial; |
| uint32_t interface_index; // Which interface the query should use. |
| uint16_t type; // The type. |
| uint16_t qclass; // The class. |
| bool no_data; // True if "no such record" is received or all data gets removed |
| }; |
| |
| static int cur_query_serial; |
| struct dnssd_query { |
| int ref_count; |
| int serial; |
| dp_tracker_t *tracker; // Tracks the connection that delivered this query. |
| dnssd_query_t *next; // For DNS queries, tracks other queries on the same connection, if any. |
| wakeup_t *wakeup; |
| dns_name_pointer_t enclosing_domain_pointer; |
| |
| message_t *message; |
| dso_state_t *dso; // If this is a DNS Push query, the DSO state associated with it. |
| dso_activity_t *activity; |
| int num_questions; // In case of a multi-question query, how many questions were asked |
| bool is_edns0; |
| dns_towire_state_t towire; |
| uint8_t *p_dso_length; // Where to store the DSO length just before we write out a push notification. |
| dns_wire_t *response; |
| dns_message_t *response_msg; // In case we need to decompose the message to construct a multi-answer message. |
| size_t data_size; // Size of the data payload of the response. |
| dnssd_query_t *question_next; // Linked list of queries on the question this query is subscribed to. |
| question_t *question; // Question asked by this query pointing to a cache entry. |
| bool satisfied; // If true, this query has gotten an answer. Only relevant for straight DNS. |
| bool canceled; // If true, dnssd_query_cancel has been called on this query, so don't cancel it again. |
| }; |
| |
| // Structure that is used to setup the mDNS discovery for dnssd-proxy. |
| struct dnssd_proxy_advertisements { |
| wakeup_t *wakeup_timer; // Used to setup a timer to advertise records repeatedly until it succeeds. |
| dnssd_txn_t *txn; // Contains event loop. |
| DNSServiceRef service_ref; // Shared DNSServiceRef for all registering operation. |
| DNSRecordRef ns_record_ref; // Used to update the advertised NS record. |
| DNSRecordRef ptr_record_ref; // Used to update the advertised PTR record. |
| char *domain_to_advertise; // The domain to be advertised in NS and PTR records. |
| srp_server_t *server_state; |
| SCDynamicStoreContext sc_context; |
| }; |
| |
| #if SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| // Structure that is used to advertise the push discovery service in .local domain. |
| struct dnssd_dp_proxy_advertisements { |
| wakeup_t *wakeup_timer; // Used to setup a timer to advertise push service repeatedly until it succeeds. |
| dnssd_txn_t *txn; // The event loop. |
| DNSServiceRef service_ref; // DNSServiceRef to register the service. |
| srp_server_t *server_state; |
| }; |
| #endif |
| |
| // Configuration file settings |
| |
| uint16_t dnssd_proxy_udp_port; |
| uint16_t dnssd_proxy_tcp_port; |
| uint16_t dnssd_proxy_tls_port; |
| const char *my_name = "discoveryproxy.home.arpa."; |
| char *listen_addrs[MAX_ADDRS]; |
| int num_listen_addrs; |
| char *publish_addrs[MAX_ADDRS]; |
| int num_publish_addrs; |
| char *tls_cacert_filename; |
| char *tls_cert_filename = "/etc/dnssd-proxy/server.crt"; |
| char *tls_key_filename = "/etc/dnssd-proxy/server.key"; |
| |
| comm_t *dnssd_proxy_listeners[4 + MAX_ADDRS]; |
| int dnssd_proxy_num_listeners; |
| question_t *questions_without_domain; // Questions that aren't in a served domain |
| served_domain_t *served_domains; |
| int num_push_sessions; // Number of connections from DNS Push clients |
| int dp_num_outstanding_queries; |
| int num_push_sessions_dropped_for_load; |
| int num_queries_dropped_for_load; |
| |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| dnssd_txn_t *shared_discovery_txn; |
| #endif // SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| wakeup_t *discovery_restart_wakeup; |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static char uuid_name[DNS_MAX_NAME_SIZE + 1]; |
| static char my_name_buf[DNS_MAX_NAME_SIZE + 1]; |
| static CFStringRef sc_dynamic_store_key_host_name; |
| static char local_host_name[DNS_MAX_NAME_SIZE + 1]; |
| static char local_host_name_dot_local[DNS_MAX_NAME_SIZE + 1]; |
| #endif // #if (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| |
| #if THREAD_BORDER_ROUTER && SRP_FEATURE_SRP_COMBINED_DNSSD_PROXY |
| extern char *thread_interface_name; |
| #endif // THREAD_BORDER_ROUTER && SRP_FEATURE_COMBINED_DNSSD_PROXY |
| |
| // Globals |
| |
| const char push_subscription_activity_type[] = "push subscription"; |
| |
| static const char local_suffix[] = ".local."; |
| |
| bool tls_fail = false; // Command line argument, for testing. |
| |
| // Macros |
| |
| #define THREAD_DOMAIN "thread.home.arpa." |
| // "openthread." will change in the future once we have a way to get thread network ID |
| #define THREAD_DOMAIN_WITH_ID "openthread." THREAD_DOMAIN |
| #define DEFAULT_SERVICE_ARPA_DOMAIN "default.service.arpa." |
| #define HOME_NET_DOMAIN "home.arpa." |
| #define DOT_HOME_NET_DOMAIN ".home.arpa." |
| #define DOT_LOCAL_DOMAIN "local." |
| #define LOCAL "local." |
| #define DOT_LOCAL ".local." |
| #define IPV4_REVERSE_LOOKUP_DOMAIN "in-addr.arpa." |
| #define IPV6_REVERSE_LOOKUP_DOMAIN "ip6.arpa." |
| #define SRV_TYPE_FOR_AUTOMATIC_BROWSING_DOMAIN "lb._dns-sd._udp" |
| #define TOWIRE_CHECK(note, towire, func) { func; if ((towire)->error != 0 && failnote == NULL) failnote = (note); } |
| #define BUSY_RETRY_DELAY_MS (5 * 60 * 1000) // Five minutes. |
| #define MAX_DSO_CONNECTIONS 15 // Should be enough for a typical home network, assuming more hosts -> more BRs |
| |
| // RFC8766 says for us to clamp the TTL on proxied mDNS records to 10s. In practice this appears to be much |
| // too short, because if the DNSSD server (e.g. mDNSResponder) is doing an LLQ, this results in a refresh |
| // interval of <10s, which is kind of painful. |
| #define RFC8766_TTL_CLAMP 300 |
| |
| #define VALIDATE_TRACKER_CONNECTION_NON_NULL() \ |
| do { \ |
| if (query->tracker == NULL) { \ |
| ERROR("[Q%d] query->tracker NULL for query!", SERIAL(query)); \ |
| return; \ |
| } \ |
| if (query->tracker->connection == NULL) { \ |
| ERROR("[Q%d][TRK%d] query->tracker->connection NULL", SERIAL(query), SERIAL(query->tracker)); \ |
| return; \ |
| } \ |
| } while (false) |
| |
| #ifdef SRP_TEST_SERVER |
| extern void (*srp_test_dso_message_finished)(void *context, message_t *message, dso_state_t *dso); |
| extern ready_callback_t srp_test_dnssd_tls_listener_ready; |
| extern void *srp_test_tls_listener_context; |
| #endif |
| |
| // Forward references |
| |
| static void dns_push_start(dnssd_query_t *query); |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static void served_domain_free(served_domain_t *const served_domain); |
| #endif |
| |
| static served_domain_t *NULLABLE |
| new_served_domain(dp_interface_t *const NULLABLE interface, const char * NONNULL domain); |
| |
| #if STUB_ROUTER |
| static served_domain_t *NULLABLE |
| find_served_domain(const char *const NONNULL domain); |
| |
| static bool |
| string_ends_with(const char *const NONNULL str, const char *const NONNULL suffix); |
| #endif // STUB_ROUTER |
| |
| static void dp_query_towire_reset(dnssd_query_t *query); |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static served_domain_t *NONNULL |
| add_new_served_domain_with_interface(const char *const NONNULL name, |
| const addr_t *const NULLABLE address, const addr_t *const NULLABLE mask);; |
| |
| #if STUB_ROUTER |
| static bool |
| dnssd_hardwired_add_or_remove_address_in_domain(const char *const NONNULL name, |
| const char *const NONNULL domain_to_change, const addr_t *const NONNULL address, const bool add); |
| #endif // STUB_ROUTER |
| |
| static bool |
| dnssd_hardwired_setup_dns_push_for_domain(served_domain_t *const NONNULL served_domain); |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| #if STUB_ROUTER |
| static bool |
| start_timer_to_advertise(dnssd_proxy_advertisements_t *NONNULL context, |
| const char *const NULLABLE domain_to_advertise, const uint32_t interval); |
| #endif |
| |
| static bool |
| interface_process_addr_change(dp_interface_t *const NONNULL interface, const addr_t *const NONNULL address, |
| const addr_t *const NONNULL mask, const enum interface_address_change event_type); |
| |
| static void dns_question_callback(DNSServiceRef UNUSED sdRef, DNSServiceFlags flags, uint32_t UNUSED interfaceIndex, |
| DNSServiceErrorType errorCode, const char *fullname, uint16_t rrtype, |
| uint16_t rrclass, uint16_t rdlen, const void *rdata, uint32_t ttl, void *context); |
| static void dns_push_callback(void *context, void *event_context, dso_state_t *dso, dso_event_type_t eventType); |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| static void dp_setup_shared_discovery_txn(void); |
| #endif |
| static void dp_query_reply_from_cache(question_t *question, dnssd_query_t *query, bool remove); |
| static void dp_handle_server_disconnect(void *UNUSED context, int status); |
| static void dp_question_answers_free(question_t *question); |
| static void question_finalize(question_t *question); |
| |
| // For debugging |
| static wakeup_t *connection_dropper; |
| extern dso_state_t *dso_connections; |
| static void dp_drop_connections(void *UNUSED context); |
| #ifdef SRP_TEST_SERVER |
| served_domain_t *NULLABLE last_freed_domain; |
| #endif |
| |
| static void |
| dp_question_context_release(void *context) |
| { |
| question_t *question = context; |
| RELEASE_HERE(question, question); |
| } |
| |
| static DNSServiceErrorType |
| dp_start_question(question_t *question, bool dns64) |
| { |
| DNSServiceErrorType err; |
| DNSServiceRef sdref; |
| size_t len; |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| char *np; |
| |
| // If a query has a served domain, query->question->name is the subdomain of the served domain that is |
| // being queried; otherwise query->question->name is the whole name. |
| if (question->served_domain != NULL) { |
| len = strlen(question->name); |
| if (question->served_domain->interface != NULL) { |
| if (len + sizeof local_suffix > sizeof name) { |
| ERROR("[QU%d] question name %s is too long for .local.", SERIAL(question), name); |
| return kDNSServiceErr_BadParam; |
| } |
| memcpy(name, question->name, len); |
| memcpy(&name[len], local_suffix, sizeof local_suffix); |
| } else { |
| size_t dlen = strlen(question->served_domain->domain_ld) + 1; |
| if (len + dlen > sizeof name) { |
| ERROR("[QU%d] question name %s is too long for %s.", SERIAL(question), name, question->served_domain->domain); |
| return kDNSServiceErr_BadParam; |
| } |
| memcpy(name, question->name, len); |
| memcpy(&name[len], question->served_domain->domain_ld, dlen); |
| } |
| np = name; |
| } else { |
| np = question->name; |
| } |
| |
| int shared_connection_flag = 0; |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| dp_setup_shared_discovery_txn(); |
| if (shared_discovery_txn != NULL) { |
| sdref = shared_discovery_txn->sdref; |
| shared_connection_flag = kDNSServiceFlagsShareConnection; |
| } |
| #endif // SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| |
| uint32_t question_interface = question->interface_index; |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| if (question_interface == kDNSServiceInterfaceIndexInfra) { |
| int ret = -1; |
| #if STUB_ROUTER |
| ret = route_get_current_infra_interface_index(); |
| #else |
| static unsigned en0_ifindex = 0; |
| if (en0_ifindex == 0) { |
| en0_ifindex = if_nametoindex("en0"); |
| if (en0_ifindex == 0) { |
| ERROR("getting en0 ifindex failed!"); |
| } |
| } |
| if (en0_ifindex != 0) { |
| ret = en0_ifindex; |
| } |
| #endif // STUB_ROUTER |
| // If we don't have an infrastructure interface, refuse the query. |
| if (ret < 0) { |
| return kDNSServiceErr_Refused; |
| } |
| question_interface = ret; |
| } |
| #endif // SRP_FEATURE_LOCAL_DISCOVERY |
| |
| #if SRP_FEATURE_NAT64 |
| const DNSServiceAttribute *attr = NULL; |
| if (dns64 && (question->type == dns_rrtype_aaaa) && (question->qclass == dns_qclass_in)) { |
| attr = &kDNSServiceAttributeAAAAFallback; |
| } |
| err = dns_service_query_record_wa(srp_servers, &sdref, question->serviceFlags | shared_connection_flag, |
| question_interface, np, question->type, |
| question->qclass, attr, dns_question_callback, question); |
| #else |
| (void)dns64; |
| err = dns_service_query_record(srp_servers, &sdref, question->serviceFlags | shared_connection_flag, question_interface, np, |
| question->type, question->qclass, dns_question_callback, question); |
| #endif |
| if (err != kDNSServiceErr_NoError) { |
| ERROR("[QU%d] DNSServiceQueryRecord failed for '%s': %d", SERIAL(question), np, err); |
| } else { |
| INFO("[QU%d] txn %p new sdref %p", SERIAL(question), question->txn, sdref); |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTION |
| question->txn = ioloop_dnssd_txn_add_subordinate(sdref, dp_question_context_release, NULL); |
| #else |
| question->txn = dns_service_ioloop_txn_add(srp_servers, sdref, question, dp_question_context_release, dp_handle_server_disconnect); |
| #endif // SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| RETAIN_HERE(question, question); // For the callback |
| #if SRP_FEATURE_NAT64 |
| INFO("[QU%d] DNSServiceQueryRecordWithAttribute started for '" PRI_S_SRP "': %d", SERIAL(question), np, err); |
| #else |
| INFO("[QU%d] DNSServiceQueryRecord started for '" PRI_S_SRP "': %d", SERIAL(question), np, err); |
| #endif // SRP_FEATURE_NAT64 |
| } |
| return err; |
| } |
| |
| static bool |
| dp_iterate_questions_on_list(question_t *list, bool (*callback)(question_t *question, void *context), void *context) |
| { |
| for (question_t *question = list; question; question = question->next) { |
| if (callback(question, context)) { |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| static bool |
| dp_iterate_questions(bool (*callback)(question_t *question, void *context), void *context) |
| { |
| if (dp_iterate_questions_on_list(questions_without_domain, callback, context)) { |
| return true; |
| } |
| |
| for (served_domain_t *domain = served_domains; domain != NULL; domain = domain->next) { |
| if (dp_iterate_questions_on_list(domain->questions, callback, context)) { |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| static bool |
| dp_restart_question(question_t *question, void *context) |
| { |
| bool dns64 = *((bool *)context); |
| if (question->txn == NULL) { |
| dp_start_question(question, dns64); |
| } |
| return false; |
| } |
| |
| static void |
| dp_restart_all_questions(void *UNUSED context) |
| { |
| bool dns64 = false; |
| #if SRP_FEATURE_NAT64 |
| if (srp_servers->srp_nat64_enabled) { |
| dns64 = nat64_is_active(); |
| } |
| #endif |
| dp_iterate_questions(dp_restart_question, &dns64); |
| } |
| |
| static bool |
| dp_void_question(question_t *question, void *UNUSED context) |
| { |
| if (question->txn != NULL) { |
| INFO("[QU%d] question->txn = %p", SERIAL(question), question->txn); |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| question->txn->sdref = NULL; |
| #else |
| ioloop_dnssd_txn_cancel(question->txn); |
| #endif |
| ioloop_dnssd_txn_release(question->txn); |
| question->txn = NULL; |
| } |
| if (question->answers != NULL) { |
| dnssd_query_t *next, *query = question->queries; |
| while(query != NULL) { |
| next = query->question_next; |
| if (query->dso != NULL) { |
| dp_query_reply_from_cache(question, query, true); |
| } |
| query = next; |
| } |
| dp_question_answers_free(question); |
| } |
| |
| return false; |
| } |
| |
| // NULLs out all outstanding questions (after an mDNSResponder crash). These pointers are rendered invalid when the |
| // parent transaction is deallocated, so this should not result in any leaks. |
| static void |
| dp_void_all_questions(void) |
| { |
| dp_iterate_questions(dp_void_question, NULL); |
| } |
| |
| static void |
| dp_handle_server_disconnect(void *UNUSED context, int status) |
| { |
| INFO("status %d", status); |
| dp_void_all_questions(); |
| if (discovery_restart_wakeup == NULL) { |
| discovery_restart_wakeup = ioloop_wakeup_create(); |
| } |
| if (discovery_restart_wakeup != NULL) { |
| // Try to reconnect to mDNSResponder after a second. |
| ioloop_add_wake_event(discovery_restart_wakeup, NULL, dp_restart_all_questions, NULL, 1000); |
| } |
| } |
| |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| static void |
| dp_setup_shared_discovery_txn(void) |
| { |
| if (shared_discovery_txn == NULL) { |
| DNSServiceRef sdref; |
| int err = DNSServiceCreateConnection(&sdref); |
| if (err != kDNSServiceErr_NoError) { |
| return false; |
| } |
| shared_discovery_txn = ioloop_dnssd_txn_add(sdref, NULL, NULL, dp_handle_server_disconnect); |
| if (shared_discovery_txn == NULL) { |
| ERROR("unable to create shared connection for registration."); |
| DNSServiceRefDeallocate(sdref); |
| return false; |
| } |
| INFO("shared_discovery_txn = %p sdref = %p", shared_discovery_txn, sdref); |
| } |
| } |
| #endif // SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| |
| void |
| dp_start_dropping(void) |
| { |
| if (connection_dropper == NULL) { |
| connection_dropper = ioloop_wakeup_create(); |
| if (connection_dropper == NULL) { |
| ERROR("can't create connection dropper."); |
| return; |
| } |
| } |
| ioloop_add_wake_event(connection_dropper, NULL, dp_drop_connections, NULL, 90 * 1000); |
| } |
| |
| static void |
| dp_drop_connections(void *UNUSED context) |
| { |
| for (dso_state_t *dso = dso_connections; dso != NULL; dso = dso->next) { |
| if (dso->cb == dns_push_callback) { |
| dp_tracker_t *tracker = dso->context; |
| INFO("dropping connection for " PRI_S_SRP ".", dso->remote_name); |
| if (tracker->connection != NULL) { |
| ioloop_comm_cancel(tracker->connection); |
| } |
| } |
| } |
| dp_start_dropping(); |
| } |
| |
| static void |
| dp_tracker_finalize(dp_tracker_t *tracker) |
| { |
| // At this point tracker should have nothing attached to it that we need to get rid of, except maybe the |
| // wakeup timer. |
| if (tracker->idle_timeout != NULL) { |
| ioloop_wakeup_release(tracker->idle_timeout); |
| } |
| // The only case where tracker->connection should still exist at this point is when the connection turned |
| // out to be an srp replication connection. |
| if (tracker->connection) { |
| ioloop_comm_release(tracker->connection); |
| } |
| free(tracker); |
| } |
| |
| static void |
| dp_answer_free(answer_t *answer) |
| { |
| if (answer != NULL) { |
| free(answer->fullname); |
| free(answer); |
| } |
| } |
| |
| static void |
| dp_question_answers_free(question_t *question) |
| { |
| // De-allocate answers |
| answer_t *answer = question->answers; |
| answer_t *next; |
| while (answer != NULL) { |
| next = answer->next; |
| dp_answer_free(answer); |
| answer = next; |
| } |
| question->answers = NULL; |
| } |
| |
| // The finalize function will deallocate answers associated with the question, |
| // remove question from the question list and deallocate the question. |
| static void |
| question_finalize(question_t *question) |
| { |
| INFO("[QU%d] type %d class %d " PRI_S_SRP, SERIAL(question), question->type, question->qclass, question->name); |
| dp_question_answers_free(question); |
| free(question->name); |
| free(question); |
| } |
| |
| static void |
| dp_question_cancel(question_t *question) |
| { |
| if (question->txn != NULL) { |
| INFO("[QU%d] question->txn = %p sdref=%p", SERIAL(question), question->txn, question->txn->sdref); |
| ioloop_dnssd_txn_cancel(question->txn); |
| ioloop_dnssd_txn_release(question->txn); |
| question->txn = NULL; |
| } |
| |
| // Remove the question from its list. |
| question_t **questions, *q_cur; |
| if (question->served_domain != NULL) { |
| questions = &question->served_domain->questions; |
| } else { |
| questions = &questions_without_domain; |
| } |
| while (*questions != NULL ) { |
| q_cur = *questions; |
| if (q_cur == question) { |
| *questions = q_cur->next; |
| break; |
| } else { |
| questions = &q_cur->next; |
| } |
| } |
| // If this was the last question, see if the served domain is still on the served domain list; if not, |
| // this is the last reference, so free it. |
| if (question->served_domain != NULL && question->served_domain->questions == NULL) { |
| served_domain_t *served_domain; |
| for (served_domain = served_domains; served_domain; served_domain = served_domain->next) { |
| if (served_domain == question->served_domain) { |
| break; |
| } |
| } |
| if (served_domain == NULL) { |
| served_domain_free(question->served_domain); |
| } |
| } |
| RELEASE_HERE(question, question); // Release from the list. |
| } |
| |
| // Called when the last reference on the query has been released. |
| static void |
| dnssd_query_finalize(void *context) |
| { |
| dnssd_query_t *query = context; |
| if (query->tracker != NULL) { |
| RELEASE_HERE(query->tracker, dp_tracker); |
| query->tracker = NULL; |
| } |
| if (query->message != NULL) { |
| ioloop_message_release(query->message); |
| query->message = NULL; |
| } |
| if (query->wakeup != NULL) { |
| ioloop_wakeup_release(query->wakeup); |
| query->wakeup = NULL; |
| } |
| if (query->response != NULL) { |
| free(query->response); |
| query->response = NULL; |
| } |
| if (query->response_msg != NULL) { |
| dns_message_free(query->response_msg); |
| query->response_msg = NULL; |
| } |
| if (query->question != NULL) { |
| RELEASE_HERE(query->question, question); |
| query->question = NULL; |
| } |
| free(query); |
| dp_num_outstanding_queries--; |
| } |
| |
| // Remove any finished queries from the question cache query list. |
| static void |
| dp_question_cache_remove_queries(question_t *question) |
| { |
| // Convenience |
| if (question == NULL) { |
| return; |
| } |
| |
| dnssd_query_t **pptr = &(question->queries); |
| RETAIN_HERE(question, question); |
| if (question->queries != NULL) { |
| while (*pptr != NULL) { |
| dnssd_query_t *cquery = *pptr; |
| if (cquery->satisfied) { |
| *pptr = cquery->question_next; |
| RELEASE_HERE(cquery, dnssd_query); |
| } else { |
| pptr = &cquery->question_next; |
| } |
| } |
| if (question->queries == NULL) { |
| dp_question_cancel(question); |
| } |
| } |
| RELEASE_HERE(question, question); |
| } |
| |
| static void |
| dp_tracker_context_release(void *context) |
| { |
| dp_tracker_t *tracker = context; |
| RELEASE_HERE(tracker, dp_tracker); |
| } |
| |
| static void |
| dp_tracker_went_away(dp_tracker_t *tracker) |
| { |
| // Reduce the number of outstanding connections (should never go below zero). |
| if (tracker->session_type == dp_tracker_session_push) { |
| if (--num_push_sessions < 0) { |
| FAULT("DNS Push connection count went negative"); |
| num_push_sessions = 0; |
| } else { |
| INFO("[TRK%d][DSO%d][C%d] dso connection count dropped: %d", SERIAL(tracker), SERIAL(tracker->dso), SERIAL(tracker->connection), num_push_sessions); |
| } |
| } |
| } |
| |
| static void |
| dp_tracker_idle(void *context) |
| { |
| dp_tracker_t *tracker = context; |
| // Shouldn't be NULL. |
| if (tracker->connection != NULL) { |
| comm_t *connection = tracker->connection; |
| INFO("[TRK%d][DSO%d][C%d] tracker for connection " PRI_S_SRP " has gone idle.", |
| SERIAL(tracker), SERIAL(tracker->dso), SERIAL(connection), connection->name); |
| |
| // If the connection is already disconnected, it's already released its reference to the tracker. If not, |
| // the release below will release tracker as a side effect. So in case tracker survives, clear the |
| // connection pointer. |
| tracker->connection = NULL; |
| // The POSIX ioloop just hands us the "listener", which we do not want to cancel. |
| if (!connection->is_listener) { |
| ioloop_comm_cancel(connection); |
| } |
| ioloop_comm_release(connection); |
| } |
| } |
| |
| static void |
| dp_tracker_idle_after(dp_tracker_t *tracker, int seconds, dnssd_query_t *query) |
| { |
| if (tracker->connection != NULL && !tracker->connection->is_listener && |
| tracker->dso == NULL && (query == NULL || |
| (tracker->dns_queries == NULL || |
| (tracker->dns_queries == query && query->next == NULL)))) |
| { |
| if (tracker->idle_timeout == NULL) { |
| tracker->idle_timeout = ioloop_wakeup_create(); |
| } |
| if (tracker->idle_timeout == NULL) { |
| ERROR("[TRK%d] no memory for idle timeout", SERIAL(tracker)); |
| } else { |
| ioloop_add_wake_event(tracker->idle_timeout, tracker, dp_tracker_idle, dp_tracker_context_release, seconds * MSEC_PER_SEC); |
| RETAIN_HERE(tracker, dp_tracker); |
| } |
| } |
| } |
| |
| static bool |
| dp_same_message(message_t *a, message_t *b) |
| { |
| // Code commented out below catches retransmissions, but right now this won't work and we'll leak queries, |
| // so saving it for rdar://111808637 (dnssd-proxy is way too complicated) |
| if (a == b /* || (a != NULL && b != NULL && a->wire.id == b->wire.id) */ ) { |
| return true; |
| } |
| return false; |
| } |
| |
| // Called at any time (prior to release!) to cancel a query. |
| static void |
| dnssd_query_cancel(dnssd_query_t *query) |
| { |
| INFO("[Q%d][QU%d] " PRI_S_SRP PUB_S_SRP PUB_S_SRP, SERIAL(query), SERIAL(query->question), |
| query->question == NULL ? "<null>" : query->question->name, |
| query->question == NULL ? "" : ((query->question->served_domain |
| ? (query->question->served_domain->interface |
| ? DOT_LOCAL |
| : query->question->served_domain->domain_ld) |
| : "")), |
| query->canceled ? " canceled" : ""); |
| // Avoid double-cancellation |
| if (query->canceled) { |
| return; |
| } |
| // Retain the query for the duration of dnssd_query_cancel so that it doesn't get finalized while we are working on it. |
| RETAIN_HERE(query, dnssd_query); |
| query->canceled = true; // prevent double-cancellation |
| if (query->tracker != NULL) { |
| dp_tracker_t *tracker = query->tracker; |
| |
| // Retain the tracker so it doesn't get released while we are working on it. |
| RETAIN_HERE(tracker, dp_tracker); |
| |
| if (query->dso == NULL) { |
| bool unsatisfied = false; |
| for (dnssd_query_t *list_query = tracker->dns_queries; list_query != NULL; list_query = list_query->next) { |
| if (dp_same_message(query->message, list_query->message)) { |
| if (!query->satisfied) { |
| unsatisfied = true; |
| } |
| } |
| } |
| |
| if (!unsatisfied) { |
| // Scan the list freeing all queries relating to the message attached to the query that's been canceled. |
| // A UDP message will never have any other queries, but TCP connections can have multiple messages. |
| for (dnssd_query_t **qp = &tracker->dns_queries; *qp != NULL; ) { |
| dnssd_query_t *list_query = *qp; |
| |
| // Release the current query either if it's the query that's being canceled, or this is a UDP message. |
| if (dp_same_message(query->message, list_query->message)) { |
| *qp = list_query->next; |
| |
| // This might release the query, but we know that the tracker holds a reference to it, so |
| // we don't need another reference to it. |
| if (list_query->wakeup != NULL) { |
| ioloop_wakeup_release(list_query->wakeup); |
| list_query->wakeup = NULL; |
| } |
| |
| // Release this query's reference to the tracker |
| RELEASE_HERE(tracker, dp_tracker); |
| list_query->tracker = NULL; |
| |
| // The tracker was holding a reference to the query. |
| RELEASE_HERE(list_query, dnssd_query); |
| } else { |
| qp = &list_query->next; |
| } |
| } |
| } |
| } else { |
| // For DNS Push queries, drop the activity, which will release the query. |
| if (query->activity != NULL && query->dso != NULL) { |
| dso_activity_t *activity = query->activity; |
| dso_state_t *dso = query->dso; |
| dso_drop_activity(dso, activity); |
| query->activity = NULL; |
| } |
| // Now release the reference the query had on the tracker. |
| query->tracker = NULL; |
| RELEASE_HERE(tracker, dp_tracker); |
| } |
| |
| // For TCP connections, wait for it to become idle before closing. |
| if (tracker->connection != NULL && tracker->dns_queries == NULL) { |
| if (tracker->connection->tcp_stream) { |
| dp_tracker_idle_after(tracker, 15, query); |
| } else { |
| #if UDP_LISTENER_USES_CONNECTION_GROUPS |
| ioloop_comm_cancel(tracker->connection); |
| #else |
| ioloop_comm_release(tracker->connection); |
| tracker->connection = NULL; |
| #endif |
| } |
| } |
| |
| // Release the reference we retained on entry. |
| RELEASE_HERE(tracker, dp_tracker); |
| } else { |
| if (query->wakeup != NULL) { |
| ioloop_wakeup_release(query->wakeup); |
| query->wakeup = NULL; |
| } |
| } |
| query->satisfied = true; |
| RELEASE_HERE(query, dnssd_query); |
| } |
| |
| static void |
| dp_query_track(dp_tracker_t *tracker, dnssd_query_t *query) |
| { |
| dnssd_query_t **qp = &tracker->dns_queries; |
| |
| while (*qp != NULL) { |
| if (*qp == query) { |
| ERROR("[Q%d][TRK%d] query is already being tracked.", SERIAL(query), SERIAL(query->tracker)); |
| return; |
| } |
| qp = &(*qp)->next; |
| } |
| *qp = query; |
| RETAIN_HERE(query, dnssd_query); |
| } |
| |
| static void |
| dp_tracker_disconnected(comm_t *UNUSED connection, void *context, int UNUSED error) |
| { |
| dp_tracker_t *tracker = context; |
| dnssd_query_t *dns_queries = tracker->dns_queries, **qp, *query; |
| comm_t *tracker_connection = tracker->connection; |
| tracker->connection = NULL; |
| tracker->dns_queries = NULL; |
| |
| INFO("[TRK%d][DSO%d][C%d] queries %p", SERIAL(tracker), SERIAL(tracker->dso), SERIAL(tracker_connection), dns_queries); |
| |
| // If there is a DSO state outstanding on the tracker, cancel any activities connected to it. |
| if (tracker->dso != NULL) { |
| dso_activity_t *activity = tracker->dso->activities; |
| while (activity != NULL) { |
| dso_drop_activity(tracker->dso, tracker->dso->activities); |
| // Failsafe in case dso_drop_activity for some reason doesn't drop the activity. |
| if (tracker->dso->activities == activity) { |
| break; |
| } |
| activity = tracker->dso->activities; |
| } |
| dso_state_cancel(tracker->dso); |
| dp_tracker_went_away(tracker); |
| tracker->session_type = dp_tracker_session_none; |
| tracker->dso = NULL; |
| } |
| |
| // We probably still have the connection object at this point, so we should release it, which could |
| // in turn finalize the tracker. |
| if (tracker_connection != NULL) { |
| ioloop_comm_release(tracker_connection); |
| tracker->connection = NULL; |
| } |
| |
| // If dns_queries is non-null, tracker still exists, but it might go away when we cancel the last |
| // query. |
| qp = &dns_queries; |
| while (*qp != NULL) { |
| query = *qp; |
| *qp = query->next; |
| RELEASE_HERE(query, dnssd_query); |
| } |
| } |
| |
| static void |
| dns_push_cancel(dso_activity_t *activity) |
| { |
| dnssd_query_t *query = (dnssd_query_t *)activity->context; |
| INFO("[Q%d][QU%d] " PUB_S_SRP, SERIAL(query), SERIAL(query->question), activity->name); |
| // We can either get here because the dso object is being finalized, or because the activity is being dropped. |
| // In the former case, we need to cancel the query. In the latter case, we've been called as a result of |
| // dnssd_query_cancel calling dso_drop_activity. dnssd_query_cancel sets query->activity to NULL before dropping |
| // it, so we mustn't call back in to dnssd_query_cancel. |
| if (query->activity != NULL) { |
| query->activity = NULL; |
| query->satisfied = true; |
| dp_question_cache_remove_queries(query->question); |
| dnssd_query_cancel(query); |
| } |
| // The activity held a reference to the query. |
| RELEASE_HERE(query, dnssd_query); |
| } |
| |
| static void |
| dp_tracker_not_idle(dp_tracker_t *tracker) |
| { |
| if (tracker->idle_timeout) { |
| ioloop_cancel_wake_event(tracker->idle_timeout); |
| } |
| } |
| |
| static served_domain_t * |
| dp_served(dns_name_t *name, char *buf, size_t bufsize) |
| { |
| served_domain_t *sdt; |
| dns_label_t *lim; |
| |
| for (sdt = served_domains; sdt; sdt = sdt->next) { |
| if ((lim = dns_name_subdomain_of(name, sdt->domain_name))) { |
| dns_name_print_to_limit(name, lim, buf, bufsize); |
| return sdt; |
| } |
| } |
| return NULL; |
| } |
| |
| static bool |
| is_in_local_domain(const dns_name_t *const NONNULL name) |
| { |
| const dns_label_t *prev_root_label; |
| const dns_label_t *root_label; |
| |
| for (prev_root_label = NULL, root_label = name; |
| root_label->next != NULL; |
| prev_root_label = root_label, root_label = root_label->next) |
| ; |
| |
| if (prev_root_label == NULL) { |
| return false; |
| } |
| |
| #define LOCAL_DOMAIN_LABEL "local" |
| if (prev_root_label->len != strlen(LOCAL_DOMAIN_LABEL)) { |
| return false; |
| } |
| |
| if (!dns_labels_equal(prev_root_label->data, LOCAL_DOMAIN_LABEL, strlen(LOCAL_DOMAIN_LABEL))) { |
| return false; |
| } |
| #undef LOCAL_DOMAIN_LABEL |
| |
| return true; |
| } |
| |
| // Utility function to find "local" on the end of a string of labels. |
| static bool |
| truncate_local(dns_name_t *name) |
| { |
| dns_label_t *lp, *prev, *prevprev; |
| |
| prevprev = prev = NULL; |
| // Find the root label. |
| for (lp = name; lp && lp->len; lp = lp->next) { |
| prevprev = prev; |
| prev = lp; |
| } |
| if (lp && prev && prevprev) { |
| if (prev->len == 5 && dns_labels_equal(prev->data, "local", 5)) { |
| dns_name_free(prev); |
| prevprev->next = NULL; |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| static bool |
| dp_query_add_data_to_response(dnssd_query_t *query, const char *fullname, uint16_t rrtype, uint16_t rrclass, |
| uint16_t rdlen, const void *rdata, int32_t ttl, const bool hardwired_response, |
| bool dont_elide, uint16_t *counter) |
| { |
| bool record_added; |
| dns_towire_state_t *towire = &query->towire; |
| const char *failnote = NULL; |
| const uint8_t *rd = rdata; |
| char pbuf[DNS_MAX_NAME_SIZE + 1]; |
| char rbuf[DNS_MAX_NAME_SIZE + 1]; |
| uint8_t *revert = query->towire.p; // Remember where we were in case there's no room. |
| question_t *question = query->question; |
| |
| // Only do the translation if: |
| // 1. We serve the domain. |
| // 2. The response we will add does not come from our hardwired response set. |
| const bool translate = (question->served_domain != NULL) && (!hardwired_response); |
| |
| if (rdlen == 0) { |
| INFO("[Q%d][QU%d] eliding zero-length response for " PRI_S_SRP " " PUB_S_SRP " %d", |
| SERIAL(query), SERIAL(question), fullname, dns_rrtype_to_string(rrtype), rrclass); |
| record_added = false; |
| goto exit; |
| } |
| // Don't send A records for 127.* nor AAAA records for ::1 |
| if (dont_elide) { |
| } else if (rrtype == dns_rrtype_a && rdlen == 4) { |
| // Should use IN_LINKLOCAL and IN_LOOPBACK macros here, but for some reason they are not present on |
| // OpenWRT. |
| if (rd[0] == 127) { |
| IPv4_ADDR_GEN_SRP(rd, rd_buf); |
| INFO("[Q%d][QU%d] eliding localhost response for " PRI_S_SRP ": " PRI_IPv4_ADDR_SRP, |
| SERIAL(query), SERIAL(question), fullname, IPv4_ADDR_PARAM_SRP(rd, rd_buf)); |
| record_added = false; |
| goto exit; |
| } |
| if (rd[0] == 169 && rd[1] == 254) { |
| IPv4_ADDR_GEN_SRP(rd, rd_buf); |
| INFO("[Q%d][QU%d] eliding link-local response for " PRI_S_SRP ": " PRI_IPv4_ADDR_SRP, |
| SERIAL(query), SERIAL(question), fullname, IPv4_ADDR_PARAM_SRP(rd, rd_buf)); |
| record_added = false; |
| goto exit; |
| } |
| } else if (rrtype == dns_rrtype_aaaa && rdlen == 16) { |
| struct in6_addr addr = *(struct in6_addr *)rdata; |
| if (IN6_IS_ADDR_LOOPBACK(&addr)) { |
| SEGMENTED_IPv6_ADDR_GEN_SRP(rdata, rdata_buf); |
| INFO("[Q%d][QU%d] eliding localhost response for " PRI_S_SRP ": " PRI_SEGMENTED_IPv6_ADDR_SRP, |
| SERIAL(query), SERIAL(question), fullname, SEGMENTED_IPv6_ADDR_PARAM_SRP(rdata, rdata_buf)); |
| record_added = false; |
| goto exit; |
| } |
| if (IN6_IS_ADDR_LINKLOCAL(&addr)) { |
| SEGMENTED_IPv6_ADDR_GEN_SRP(rdata, rdata_buf); |
| INFO("[Q%d][QU%d] eliding link-local response for " PRI_S_SRP ": " PRI_SEGMENTED_IPv6_ADDR_SRP, |
| SERIAL(query), SERIAL(question), fullname, SEGMENTED_IPv6_ADDR_PARAM_SRP(rdata, rdata_buf)); |
| record_added = false; |
| goto exit; |
| } |
| } |
| INFO("survived for rrtype " PUB_S_SRP " rdlen %d", dns_rrtype_to_string(rrtype), rdlen); |
| |
| if (query->dso != NULL) { |
| dns_push_start(query); |
| } |
| // Rewrite the domain if it's .local. |
| if (question->served_domain != NULL) { |
| TOWIRE_CHECK("concatenate_name_to_wire", towire, |
| dns_concatenate_name_to_wire(towire, NULL, question->name, question->served_domain->domain)); |
| INFO("[Q%d][QU%d] " PUB_S_SRP " answer: type " PUB_S_SRP " class %02d " PRI_S_SRP "." PRI_S_SRP, SERIAL(query), SERIAL(question), |
| query->dso != NULL ? "PUSH" : "DNS ", dns_rrtype_to_string(rrtype), rrclass, question->name, question->served_domain->domain); |
| } else { |
| TOWIRE_CHECK("compress_name_to_wire", towire, dns_concatenate_name_to_wire(towire, NULL, NULL, question->name)); |
| INFO("[Q%d][QU%d] " PUB_S_SRP " answer: type " PUB_S_SRP " class %02d " PRI_S_SRP " (p)", |
| SERIAL(query), SERIAL(question), query->dso != NULL ? "push" : " dns", dns_rrtype_to_string(rrtype), rrclass, question->name); |
| } |
| TOWIRE_CHECK("rrtype", towire, dns_u16_to_wire(towire, rrtype)); |
| TOWIRE_CHECK("rrclass", towire, dns_u16_to_wire(towire, rrclass)); |
| TOWIRE_CHECK("ttl", towire, dns_ttl_to_wire(towire, ttl)); |
| |
| // If necessary, correct domain names inside of rrdata. |
| dns_rr_t answer; |
| dns_name_t *name; |
| unsigned offp = 0; |
| |
| answer.type = rrtype; |
| answer.qclass = rrclass; |
| if (dns_rdata_parse_data(&answer, rdata, &offp, rdlen, rdlen, 0)) { |
| switch(rrtype) { |
| case dns_rrtype_cname: |
| case dns_rrtype_ptr: |
| case dns_rrtype_ns: |
| case dns_rrtype_md: |
| case dns_rrtype_mf: |
| case dns_rrtype_mb: |
| case dns_rrtype_mg: |
| case dns_rrtype_mr: |
| case dns_rrtype_nsap_ptr: |
| case dns_rrtype_dname: |
| name = answer.data.ptr.name; |
| TOWIRE_CHECK("rdlength begin", towire, dns_rdlength_begin(towire)); |
| break; |
| case dns_rrtype_srv: |
| name = answer.data.srv.name; |
| TOWIRE_CHECK("rdlength begin", towire, dns_rdlength_begin(towire)); |
| TOWIRE_CHECK("answer.data.srv.priority", towire, dns_u16_to_wire(towire, answer.data.srv.priority)); |
| TOWIRE_CHECK("answer.data.srv.weight", towire, dns_u16_to_wire(towire, answer.data.srv.weight)); |
| TOWIRE_CHECK("answer.data.srv.port", towire, dns_u16_to_wire(towire, answer.data.srv.port)); |
| break; |
| default: |
| INFO("[Q%d][QU%d] record type " PUB_S_SRP " not translated", SERIAL(query), SERIAL(question), dns_rrtype_to_string(rrtype)); |
| dns_rrdata_free(&answer); |
| goto raw; |
| } |
| |
| dns_name_print(name, rbuf, sizeof rbuf); |
| |
| if (translate && is_in_local_domain(name)) { |
| // If the response requires the translation from <served domain> to ".local." and the response ends in |
| // ".local.", truncate it. |
| truncate_local(name); |
| dns_name_print(name, pbuf, sizeof pbuf); |
| TOWIRE_CHECK("concatenate_name_to_wire 2", towire, |
| dns_concatenate_name_to_wire(towire, name, NULL, question->served_domain->domain)); |
| INFO("[Q%d][QU%d] translating " PRI_S_SRP " to " PRI_S_SRP " . " PRI_S_SRP, |
| SERIAL(query), SERIAL(question), rbuf, pbuf, question->served_domain->domain); |
| } else { |
| TOWIRE_CHECK("concatenate_name_to_wire 2", towire, |
| dns_concatenate_name_to_wire(towire, name, NULL, NULL)); |
| INFO("[Q%d][QU%d] compressing " PRI_S_SRP, SERIAL(query), SERIAL(question), rbuf); |
| } |
| |
| dns_name_free(name); |
| dns_rdlength_end(towire); |
| } else { |
| ERROR("[Q%d][QU%d] rdata from mDNSResponder didn't parse!!", SERIAL(query), SERIAL(question)); |
| raw: |
| TOWIRE_CHECK("rdlen", towire, dns_u16_to_wire(towire, rdlen)); |
| TOWIRE_CHECK("rdata", towire, dns_rdata_raw_data_to_wire(towire, rdata, rdlen)); |
| } |
| |
| if (towire->truncated || failnote) { |
| ERROR("[Q%d][QU%d] RR ADD FAIL: " PUB_S_SRP, SERIAL(query), SERIAL(question), failnote); |
| query->towire.p = revert; |
| record_added = false; |
| goto exit; |
| } |
| |
| record_added = true; |
| if (counter != NULL && query->dso == NULL) { |
| *counter = htons(ntohs(*counter) + 1); |
| } |
| exit: |
| return record_added; |
| } |
| |
| static void |
| dnssd_hardwired_add(served_domain_t *sdt, |
| const char *name, const char *domain, size_t rdlen, const uint8_t *rdata, uint16_t type) |
| { |
| hardwired_t *hp, **hrp; |
| size_t namelen = strlen(name); |
| size_t domainlen = strlen(domain); |
| size_t total = sizeof *hp; |
| uint8_t *trailer; |
| total += rdlen; // Space for RDATA |
| total += namelen; // Space for name |
| total += 1; // NUL |
| total += namelen;// space for FQDN |
| total += domainlen; |
| total += 1; // NUL |
| |
| hp = calloc(1, total + 4); |
| if (hp == NULL) { |
| ERROR("no memory for %s %s", name, domain); |
| return; |
| } |
| trailer = ((uint8_t *)hp) + total; |
| memcpy(trailer, "abcd", 4); |
| hp->rdata = (uint8_t *)(hp + 1); |
| hp->rdlen = rdlen; |
| memcpy(hp->rdata, rdata, rdlen); |
| hp->name = (char *)hp->rdata + rdlen; |
| memcpy(hp->name, name, namelen); |
| hp->name[namelen] = '\0'; |
| hp->fullname = hp->name + namelen + 1; |
| if (namelen != 0) { |
| snprintf(hp->fullname, namelen + domainlen + 1, "%s%s", name, domain); |
| } else { |
| memcpy(hp->fullname, domain, domainlen); |
| hp->fullname[domainlen] = '\0'; |
| } |
| if (hp->fullname + strlen(hp->fullname) + 1 != (char *)hp + total) { |
| ERROR("%p != %p", hp->fullname + strlen(hp->fullname) + 1, ((char *)hp) + total); |
| return; |
| } |
| if (memcmp(trailer, "abcd", 4)) { |
| ERROR("ran off the end."); |
| return; |
| } |
| hp->type = type; |
| hp->next = NULL; |
| |
| // Store this new hardwired_t at the end of the list unless a hardwired_t with the same name |
| // is already on the list. If it is, splice it in. |
| for (hrp = &sdt->hardwired_responses; *hrp != NULL; hrp = &(*hrp)->next) { |
| hardwired_t *old = *hrp; |
| if (old->type != hp->type) { |
| continue; |
| } |
| if (strcasecmp(old->fullname, hp->fullname) != 0) { |
| continue; |
| } |
| // The same name and type |
| bool superseded; |
| switch (type) { |
| case dns_rrtype_a: |
| case dns_rrtype_aaaa: |
| case dns_rrtype_ns: |
| case dns_rrtype_ptr: |
| superseded = false; |
| break; |
| default: |
| // dns_rrtype_soa |
| // dns_rrtype_srv |
| superseded = true; |
| break; |
| } |
| |
| if (superseded) { |
| INFO("superseding " PRI_S_SRP " name " PRI_S_SRP " type %d rdlen %d", old->fullname, |
| old->name, old->type, old->rdlen); |
| hp->next = old->next; |
| free(old); |
| } else { |
| INFO("inserting before " PRI_S_SRP " name " PRI_S_SRP " type %d rdlen %d", old->fullname, |
| old->name, old->type, old->rdlen); |
| hp->next = old; |
| } |
| break; |
| } |
| *hrp = hp; |
| |
| INFO("fullname " PRI_S_SRP " name " PRI_S_SRP " type %d rdlen %d", |
| hp->fullname, hp->name, hp->type, hp->rdlen); |
| } |
| |
| #if STUB_ROUTER |
| static bool |
| dnssd_hardwired_remove_record(served_domain_t *const NONNULL sdt, const char *const NONNULL name, const char *const NONNULL domain, size_t rdlen, |
| const void *const NULLABLE rdata, uint16_t type) |
| { |
| bool removed; |
| hardwired_t *prev = NULL; |
| hardwired_t *current; |
| char full_name[DNS_MAX_NAME_SIZE + 1]; |
| |
| int bytes_written = snprintf(full_name, sizeof(full_name), "%s%s", name, domain); |
| require_action_quiet(bytes_written > 0 && (size_t)bytes_written < sizeof(full_name), exit, removed = false; |
| ERROR("snprintf truncates the string - name length: %zu, domain length: %zu, buffer length: %zu", |
| strlen(name), strlen(domain), sizeof(full_name)) |
| ); |
| |
| for (current = sdt->hardwired_responses; current != NULL; prev = current, current = current->next) { |
| if (current->type != type) { |
| continue; |
| } |
| if (rdata != NULL && current->rdlen != rdlen) { |
| continue; |
| } |
| if (strcasecmp(current->fullname, full_name) != 0) { |
| continue; |
| } |
| if (rdata != NULL && memcmp(current->rdata, rdata, rdlen) != 0) { |
| continue; |
| } |
| // record found |
| break; |
| } |
| require_action_quiet(current != NULL, exit, removed = false; |
| ERROR("no matching hardwired_t found - record name: " PUB_S_SRP ", record type: %d", full_name, type)); |
| |
| if (prev != NULL) { |
| prev->next = current->next; |
| } else { |
| sdt->hardwired_responses = current->next; |
| } |
| free(current); |
| |
| removed = true; |
| exit: |
| return removed; |
| } |
| |
| static bool |
| dnssd_hardwired_add_or_remove_addr_record(served_domain_t *const NONNULL sdt, const addr_t *const NONNULL addr, |
| const char *const NONNULL name, bool add) |
| { |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| bool succeeded; |
| |
| memset(&towire, 0, sizeof towire); |
| towire.message = &wire; |
| towire.p = wire.data; |
| towire.lim = towire.p + sizeof wire.data; |
| |
| const void *rdata_ptr; |
| size_t addr_len; |
| uint16_t addr_type; |
| if (addr->sa.sa_family == AF_INET) { |
| rdata_ptr = &addr->sin.sin_addr; |
| addr_len = sizeof(addr->sin.sin_addr); |
| addr_type = dns_rrtype_a; |
| } else { // addr.sa.sa_family == AF_INET6 |
| rdata_ptr = &addr->sin6.sin6_addr; |
| addr_len = sizeof(addr->sin6.sin6_addr); |
| addr_type = dns_rrtype_aaaa; |
| } |
| dns_rdata_raw_data_to_wire(&towire, rdata_ptr, addr_len); |
| |
| if (add) { |
| dnssd_hardwired_add(sdt, name, name[0] == '\0' ? sdt->domain : sdt->domain_ld, towire.p - wire.data, wire.data, |
| addr_type); |
| succeeded = true; |
| } else { |
| succeeded = dnssd_hardwired_remove_record(sdt, name, name[0] == '\0' ? sdt->domain : sdt->domain_ld, |
| towire.p - wire.data, wire.data, addr_type); |
| } |
| |
| return succeeded; |
| } |
| |
| static bool |
| dnssd_hardwired_add_or_remove_address_in_domain(const char *const NONNULL name, |
| const char *const NONNULL domain_to_change, const addr_t *const NONNULL address, const bool add) |
| { |
| bool succeeded; |
| |
| served_domain_t *served_domain = find_served_domain(domain_to_change); |
| require_action_quiet(served_domain != NULL, exit, succeeded = false; |
| ERROR("could not find served domain with the specified domain name - domain name: " PRI_S_SRP, domain_to_change) |
| ); |
| |
| succeeded = dnssd_hardwired_add_or_remove_addr_record(served_domain, address, name, add); |
| require_action_quiet(succeeded, exit, succeeded = false; |
| ERROR("failed to " PUB_S_SRP " address record - domain name: " PRI_S_SRP, |
| domain_to_change, add ? "add" : "remove") |
| ); |
| |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| dnssd_hardwired_generate_ptr_name(const addr_t *const NONNULL addr, const addr_t *const NONNULL mask, |
| char *name_buf, size_t buf_size) |
| { |
| char *name_ptr = name_buf; |
| const char *const name_limit = name_ptr + buf_size; |
| int bytes_written; |
| bool succeeded; |
| |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| bytes_written = snprintf(name_ptr, name_limit - name_ptr, SRV_TYPE_FOR_AUTOMATIC_BROWSING_DOMAIN); |
| require_action_quiet(bytes_written > 0 && bytes_written < name_limit - name_ptr, exit, succeeded = false; |
| ERROR("snprintf truncates the string - bytes_written: %d, limit: %zd", bytes_written, name_limit - name_ptr)); |
| name_ptr += bytes_written; |
| |
| |
| if (addr->sa.sa_family == AF_INET) { |
| const uint32_t subnet = (ntohl(addr->sin.sin_addr.s_addr) & ntohl(mask->sin.sin_addr.s_addr)); |
| bytes_written = snprintf(name_ptr, name_limit - name_ptr, ".%u.%u.%u.%u", |
| subnet & 0xFFU, (subnet >> 8) & 0xFFU, (subnet >> 16) & 0xFFU, (subnet >> 24) & 0xFFU); |
| require_action(bytes_written > 0 && bytes_written < name_limit - name_ptr, exit, succeeded = false); |
| // Remember to increase the name_ptr by bytes_written bytes if name_ptr is used later. |
| |
| } else if (addr->sa.sa_family == AF_INET6) { |
| const uint8_t *const addr_bytes = addr->sin6.sin6_addr.s6_addr; |
| const uint8_t *const mask_bytes = mask->sin6.sin6_addr.s6_addr; |
| for (int i = 15; i >= 0; i--) { |
| for (int shift = 0; shift < 8; shift += 4) { |
| bytes_written = snprintf(name_ptr, name_limit - name_ptr, ".%x", |
| (addr_bytes[i] >> shift) & (mask_bytes[i] >> shift) & 15); |
| require_action_quiet(bytes_written > 0 && bytes_written < name_limit - name_ptr, exit, succeeded = false; |
| ERROR("snprintf truncates the string - bytes_written: %d, limit: %zd", |
| bytes_written, name_limit - name_ptr) |
| ); |
| name_ptr += bytes_written; |
| } |
| } |
| |
| } else { |
| FAULT("skipping address type other than IPv4/IPv6 - type: %u", addr->sa.sa_family); |
| succeeded = false; |
| goto exit; |
| } |
| |
| succeeded = true; |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| dnssd_hardwired_add_or_remove_ptr_record(served_domain_t *const NONNULL sdt, const addr_t *const NONNULL addr, |
| const addr_t *const NONNULL mask, bool add) |
| { |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| bool succeeded; |
| |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| succeeded = dnssd_hardwired_generate_ptr_name(addr, mask, name, sizeof(name)); |
| if (!succeeded) { |
| INFO("address is not eligible to construct PTR record"); |
| goto exit; |
| } |
| |
| for (served_domain_t *if_domain = served_domains; if_domain != NULL; if_domain = if_domain->next) { |
| if (if_domain->interface == NULL || if_domain->interface->ifindex == 0) { |
| continue; |
| } |
| RESET; |
| INFO(PUB_S_SRP " PTR from " PRI_S_SRP " to " PRI_S_SRP, add ? "Adding" : "Removing", name, if_domain->domain); |
| dns_full_name_to_wire(NULL, &towire, if_domain->domain); |
| |
| if (add) { |
| dnssd_hardwired_add(sdt, name, sdt->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_ptr); |
| succeeded = true; |
| } else { |
| succeeded = dnssd_hardwired_remove_record(sdt, name, sdt->domain_ld, towire.p - wire.data, wire.data, |
| dns_rrtype_ptr); |
| } |
| } |
| |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| dnssd_hardwired_add_or_remove_ptr_in_domain(const char *const NONNULL domain_to_change, |
| const addr_t *const NONNULL address, const addr_t *const NONNULL mask, const bool add) |
| { |
| bool succeeded; |
| |
| served_domain_t *served_domain = find_served_domain(domain_to_change); |
| require_action_quiet(served_domain != NULL, exit, succeeded = false; |
| ERROR("could not find served domain with the specified domain name - domain name: " PRI_S_SRP, domain_to_change) |
| ); |
| |
| succeeded = dnssd_hardwired_add_or_remove_ptr_record(served_domain, address, mask, add); |
| require_action_quiet(succeeded, exit, succeeded = false; |
| ERROR("failed to " PUB_S_SRP " address record - domain name: " PRI_S_SRP, |
| add ? "adding" : "removing", domain_to_change) |
| ); |
| |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| is_valid_address_to_publish(const addr_t *const NONNULL address) |
| { |
| bool is_valid = true; |
| |
| if (address->sa.sa_family == AF_INET) { |
| const struct in_addr *const ipv4_address = &(address->sin.sin_addr); |
| const bool is_linklocal = is_in_addr_link_local(ipv4_address); |
| const bool is_loopback = is_in_addr_loopback(ipv4_address); |
| |
| if (is_linklocal || is_loopback) { |
| IPv4_ADDR_GEN_SRP(&ipv4_address, ipv4_address_buf); |
| INFO("ignoring the address for interface - address: " PRI_IPv4_ADDR_SRP ", address type: " PUB_S_SRP ".", |
| IPv4_ADDR_PARAM_SRP(&ipv4_address, ipv4_address_buf), is_linklocal ? "link local" : "loopback"); |
| is_valid = false; |
| } |
| |
| } else if (address->sa.sa_family == AF_INET6) { |
| const struct in6_addr *const ipv6_address = &(address->sin6.sin6_addr); |
| const bool is_linklocal = IN6_IS_ADDR_LINKLOCAL(ipv6_address); |
| const bool is_loopback = IN6_IS_ADDR_LOOPBACK(ipv6_address); |
| |
| if (is_linklocal || is_loopback) { |
| IPv6_ADDR_GEN_SRP(ipv6_address->s6_addr, ipv6_address_buf); |
| INFO("ignoring the address for interface - address: " PRI_IPv6_ADDR_SRP ", address type: " PUB_S_SRP ".", |
| IPv6_ADDR_PARAM_SRP(ipv6_address->s6_addr, ipv6_address_buf), is_linklocal ? "link local" : "loopback"); |
| is_valid = false; |
| } |
| |
| } else { |
| // It is possible that MAC address is added for the interface, so ignore it. |
| INFO("Non IPv4/IPv6 address added for the interface - sa_family: %u", address->sa.sa_family); |
| is_valid = false; |
| } |
| |
| return is_valid; |
| } |
| |
| static bool |
| dnssd_hardwired_process_addr_change(const addr_t *const NONNULL addr, const addr_t *const NONNULL mask, const bool add) |
| { |
| bool succeeded; |
| |
| if (!is_valid_address_to_publish(addr)) { |
| succeeded = true; |
| goto exit; |
| } |
| |
| // Update the <local host name>.home.arpa. address mapping. |
| succeeded = dnssd_hardwired_add_or_remove_address_in_domain("", my_name, addr, add); |
| if (!succeeded) { |
| ERROR("failed to update address record for domain - domain: " PRI_S_SRP, my_name); |
| goto exit; |
| } |
| |
| // Update the <local host name>.<Thread ID>.thread.home.arpa. address mapping. |
| succeeded = dnssd_hardwired_add_or_remove_address_in_domain(local_host_name, THREAD_DOMAIN_WITH_ID, addr, add); |
| if (!succeeded) { |
| ERROR("failed to update address record for domain - domain: " PUB_S_SRP, THREAD_DOMAIN_WITH_ID); |
| goto exit; |
| } |
| |
| // Update the default.service.arpa. address mapping. |
| succeeded = dnssd_hardwired_add_or_remove_address_in_domain(local_host_name, DEFAULT_SERVICE_ARPA_DOMAIN, addr, add); |
| if (!succeeded) { |
| ERROR("failed to update address record for domain - domain: " PUB_S_SRP, DEFAULT_SERVICE_ARPA_DOMAIN); |
| goto exit; |
| } |
| |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| // Update the default.service.arpa. address mapping. |
| succeeded = dnssd_hardwired_add_or_remove_address_in_domain(local_host_name, DOT_LOCAL_DOMAIN, addr, add); |
| if (!succeeded) { |
| ERROR("failed to update address record for domain - domain: " PUB_S_SRP, LOCAL); |
| goto exit; |
| } |
| #endif |
| |
| // Setup the "_lb.dns-sd" |
| // Update the "reverse mapping from address to browsing domain" for each eligible served domain under IPv6 or IPv4 |
| // reverse lookup domain. |
| if (addr->sa.sa_family == AF_INET6) { |
| succeeded = dnssd_hardwired_add_or_remove_ptr_in_domain(IPV6_REVERSE_LOOKUP_DOMAIN, addr, mask, add); |
| } else if (addr->sa.sa_family == AF_INET) { |
| succeeded = dnssd_hardwired_add_or_remove_ptr_in_domain(IPV4_REVERSE_LOOKUP_DOMAIN, addr, mask, add); |
| } else { |
| char buf[INET6_ADDRSTRLEN]; |
| IOLOOP_NTOP(addr, buf); |
| INFO("Skipping non IPv6/IPv4 address - addr:" PRI_S_SRP, buf); |
| succeeded = true; |
| } |
| |
| exit: |
| return succeeded; |
| } |
| |
| static void |
| dnssd_hardwired_lbdomains_setup(void) |
| { |
| served_domain_t *ipv6, *ipv4; |
| #if (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| // When dnssd-proxy is combined with srp-mdns-proxy, IPv4 and IPv6 reverse look up domain is set from the begining. |
| ipv4 = find_served_domain(IPV4_REVERSE_LOOKUP_DOMAIN); |
| ipv6 = find_served_domain(IPV6_REVERSE_LOOKUP_DOMAIN); |
| #else // #if (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| ipv4 = new_served_domain(NULL, IPV4_REVERSE_LOOKUP_DOMAIN); |
| ipv6 = new_served_domain(NULL, IPV6_REVERSE_LOOKUP_DOMAIN); |
| #endif // #if (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| require_action_quiet(ipv4 != NULL && ipv6 != NULL, exit, ERROR("cannot find/create new served domain")); |
| |
| for (served_domain_t *addr_domain = served_domains; addr_domain; addr_domain = addr_domain->next) { |
| dp_interface_t *interface = addr_domain->interface; |
| interface_addr_t *ifaddr; |
| if (interface == NULL) { |
| INFO("Domain " PRI_S_SRP " has no interface", addr_domain->domain); |
| continue; |
| } |
| INFO("Interface " PUB_S_SRP, interface->name); |
| // Add lb domain support for link domain |
| for (ifaddr = interface->addresses; ifaddr != NULL; ifaddr = ifaddr->next) { |
| // Do not publish link-local or loopback address |
| if (!is_valid_address_to_publish(&ifaddr->addr)) { |
| continue; |
| } |
| |
| if (ifaddr->addr.sa.sa_family == AF_INET) { |
| dnssd_hardwired_add_or_remove_ptr_record(ipv4, &ifaddr->addr, &ifaddr->mask, true); |
| } else if (ifaddr->addr.sa.sa_family == AF_INET6) { |
| dnssd_hardwired_add_or_remove_ptr_record(ipv6, &ifaddr->addr, &ifaddr->mask, true); |
| } else { |
| char buf[INET6_ADDRSTRLEN]; |
| IOLOOP_NTOP(&ifaddr->addr, buf); |
| INFO("Skipping " PRI_S_SRP, buf); |
| } |
| } |
| } |
| exit: |
| return; |
| } |
| #endif |
| |
| static void |
| dnssd_hardwired_setup(void) |
| { |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| served_domain_t *sdt; |
| #if STUB_ROUTER |
| dns_name_t *my_name_parsed = my_name == NULL ? NULL : dns_pres_name_parse(my_name); |
| #endif |
| |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| // For each interface, set up the hardwired names. |
| for (sdt = served_domains; sdt; sdt = sdt->next) { |
| if (sdt->interface == NULL) { |
| continue; |
| } |
| |
| // SRV |
| // _dns-llq._udp |
| // _dns-llq-tls._tcp |
| // _dns-update._udp |
| // _dns-update-tls._udp |
| // We deny the presence of support for LLQ, because we only support DNS Push |
| RESET; |
| dnssd_hardwired_add(sdt, "_dns-llq._udp", sdt->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| dnssd_hardwired_add(sdt, "_dns-llq-tls._tcp", sdt->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| |
| // We deny the presence of support for DNS Update, because a Discovery Proxy zone is stateless. |
| dnssd_hardwired_add(sdt, "_dns-update._udp", sdt->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| dnssd_hardwired_add(sdt, "_dns-update-tls._tcp", sdt->domain_ld, towire.p - wire.data, wire.data, |
| dns_rrtype_srv); |
| |
| // Until we set up the DNS Push listener, we deny its existence. If TLS is ready to go, this will be |
| // overwritten immediately; otherwise it will be overwritten when the TLS key has been generated and signed. |
| dnssd_hardwired_add(sdt, "_dns-push-tls._tcp", sdt->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| |
| #if STUB_ROUTER |
| char namebuf[DNS_MAX_NAME_SIZE + 1]; |
| const char *local_name; |
| addr_t addr; |
| |
| // If my_name wasn't set, or if my_name is in this interface's domain, we need to answer |
| // for it when queried. |
| if (my_name == NULL || my_name_parsed != NULL) { |
| const char *local_domain = NULL; |
| if (my_name == NULL) { |
| local_name = "ns"; |
| local_domain = sdt->domain_ld; |
| } else { |
| dns_name_t *lim; |
| local_name = NULL; |
| |
| // See if my_name is a subdomain of this interface's domain |
| if ((lim = dns_name_subdomain_of(my_name_parsed, sdt->domain_name)) != NULL) { |
| dns_name_print_to_limit(my_name_parsed, lim, namebuf, sizeof namebuf); |
| local_name = namebuf; |
| dns_name_free(my_name_parsed); |
| my_name_parsed = NULL; |
| if (local_name[0] == '\0') { |
| local_domain = sdt->domain; |
| } else { |
| local_domain = sdt->domain_ld; |
| } |
| } |
| } |
| if (local_name != NULL) { |
| for (int i = 0; i < num_publish_addrs; i++) { |
| RESET; |
| memset(&addr, 0, sizeof addr); |
| getipaddr(&addr, publish_addrs[i]); |
| if (addr.sa.sa_family == AF_INET) { |
| // A |
| // ns |
| dns_rdata_raw_data_to_wire(&towire, &addr.sin.sin_addr, sizeof addr.sin.sin_addr); |
| dnssd_hardwired_add(sdt, local_name, local_domain, towire.p - wire.data, wire.data, |
| dns_rrtype_a); |
| } else { |
| // AAAA |
| RESET; |
| dns_rdata_raw_data_to_wire(&towire, &addr.sin6.sin6_addr, sizeof addr.sin6.sin6_addr); |
| dnssd_hardwired_add(sdt, local_name, local_domain, towire.p - wire.data, wire.data, |
| dns_rrtype_aaaa); |
| } |
| } |
| } |
| } |
| #endif // STUB_ROUTER |
| |
| // NS |
| RESET; |
| #if STUB_ROUTER |
| if (string_ends_with(sdt->domain, THREAD_DOMAIN)) { |
| // For served domain in the THREAD_DOMAIN, set the NS record to the local host name: |
| // For example, openthread.thread.home.arpa. NS Office.local. |
| // XXX is this right? |
| require_quiet(local_host_name_dot_local[0] != 0, exit); |
| dns_full_name_to_wire(NULL, &towire, local_host_name_dot_local); |
| } else |
| #endif |
| if (uuid_name[0] != 0) { |
| dns_name_to_wire(NULL, &towire, uuid_name); |
| dns_full_name_to_wire(NULL, &towire, sdt->domain); |
| } else { |
| dns_name_to_wire(NULL, &towire, "ns"); |
| dns_full_name_to_wire(NULL, &towire, sdt->domain); |
| } |
| dnssd_hardwired_add(sdt, "", sdt->domain, towire.p - wire.data, wire.data, dns_rrtype_ns); |
| |
| // SOA (piggybacking on what we already did for NS, which starts the same. |
| dns_name_to_wire(NULL, &towire, "postmaster"); |
| dns_full_name_to_wire(NULL, &towire, sdt->domain); |
| dns_u32_to_wire(&towire, 0); // serial |
| dns_ttl_to_wire(&towire, 7200); // refresh |
| dns_ttl_to_wire(&towire, 3600); // retry |
| dns_ttl_to_wire(&towire, 86400); // expire |
| dns_ttl_to_wire(&towire, 120); // minimum |
| dnssd_hardwired_add(sdt, "", sdt->domain, towire.p - wire.data, wire.data, dns_rrtype_soa); |
| } |
| |
| // Setup hardwired response A/AAAA record for <local host name>.home.arpa. |
| #if SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| #if STUB_ROUTER |
| // When dnssd-proxy is combined with srp-mdns-proxy, we get the address from the interface address list not from the |
| // config file, so we search through the served domains for all available address. |
| if (my_name_parsed != NULL) { |
| dns_name_free(my_name_parsed); |
| my_name_parsed = NULL; |
| } |
| |
| require_action_quiet(my_name != NULL, exit, ERROR("Failed to get my_name and unable to set hardwired response")); |
| served_domain_t *const my_name_served_domain = find_served_domain(my_name); |
| require_action_quiet(my_name_served_domain != NULL, exit, |
| ERROR("Failed to find my_name domain - my_name: " PRI_S_SRP, my_name)); |
| |
| served_domain_t *const thread_served_domain = find_served_domain(THREAD_DOMAIN_WITH_ID); |
| require_action(thread_served_domain != NULL, exit, |
| ERROR("Failed to find thread domain - domain: " PUB_S_SRP, THREAD_DOMAIN_WITH_ID)); |
| |
| served_domain_t *const default_service_arpa_domain = find_served_domain(DEFAULT_SERVICE_ARPA_DOMAIN); |
| require_action(default_service_arpa_domain != NULL, exit, |
| ERROR("Failed to find thread domain - domain: " PUB_S_SRP, DEFAULT_SERVICE_ARPA_DOMAIN)); |
| |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| served_domain_t *const dot_local_domain = find_served_domain(DOT_LOCAL_DOMAIN); |
| require_action(dot_local_domain != NULL, exit, |
| ERROR("Failed to find thread domain - domain: " PUB_S_SRP, DOT_LOCAL_DOMAIN)); |
| #endif |
| for (const served_domain_t *domain = served_domains; domain != NULL; domain = domain->next) { |
| if (domain->interface == NULL) { |
| continue; |
| } |
| for (const interface_addr_t *if_addrs = domain->interface->addresses; if_addrs != NULL; |
| if_addrs = if_addrs->next) { |
| const addr_t *const if_addr = &if_addrs->addr; |
| // Only publish routable IP address. |
| if (!is_valid_address_to_publish(if_addr)) { |
| continue; |
| } |
| |
| RESET; |
| uint16_t rr_type; |
| if (if_addr->sa.sa_family == AF_INET) { |
| dns_rdata_raw_data_to_wire(&towire, &if_addr->sin.sin_addr, sizeof(if_addr->sin.sin_addr)); |
| rr_type = dns_rrtype_a; |
| } else if (if_addr->sa.sa_family == AF_INET6) { |
| dns_rdata_raw_data_to_wire(&towire, &if_addr->sin6.sin6_addr, sizeof(if_addr->sin6.sin6_addr)); |
| rr_type = dns_rrtype_aaaa; |
| } else { |
| ERROR("Non IPv4/IPv6 address in interface addresses - sa_family: %u", if_addr->sa.sa_family); |
| continue; |
| } |
| |
| // <local host name>.home.arpa. A/AAAA <IP address> |
| dnssd_hardwired_add(my_name_served_domain, "", my_name_served_domain->domain, towire.p - wire.data, |
| wire.data, rr_type); |
| |
| // <local host name>.openthread.thread.home.arpa. A/AAAA <IP address> |
| dnssd_hardwired_add(thread_served_domain, local_host_name, thread_served_domain->domain_ld, |
| towire.p - wire.data, wire.data, rr_type); |
| |
| // <local host name>.default.service.arpa. A/AAAA <IP address> |
| dnssd_hardwired_add(default_service_arpa_domain, local_host_name, default_service_arpa_domain->domain_ld, |
| towire.p - wire.data, wire.data, rr_type); |
| |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| // <local host name>.local. A/AAAA <IP address> |
| dnssd_hardwired_add(dot_local_domain, local_host_name, dot_local_domain->domain_ld, |
| towire.p - wire.data, wire.data, rr_type); |
| #endif |
| } |
| } |
| #endif |
| #else // SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| if (my_name_parsed != NULL) { |
| dns_name_free(my_name_parsed); |
| my_name_parsed = NULL; |
| |
| sdt = new_served_domain(NULL, my_name); |
| if (sdt == NULL) { |
| ERROR("Unable to allocate domain for %s", my_name); |
| } else { |
| for (int i = 0; i < num_publish_addrs; i++) { |
| // AAAA |
| // A |
| RESET; |
| memset(&addr, 0, sizeof addr); |
| getipaddr(&addr, publish_addrs[i]); |
| if (addr.sa.sa_family == AF_INET) { |
| dns_rdata_raw_data_to_wire(&towire, &addr.sin.sin_addr, sizeof addr.sin.sin_addr); |
| dnssd_hardwired_add(sdt, "", sdt->domain, towire.p - wire.data, wire.data, dns_rrtype_a); |
| } else { |
| dns_rdata_raw_data_to_wire(&towire, &addr.sin6.sin6_addr, sizeof addr.sin6.sin6_addr); |
| dnssd_hardwired_add(sdt, "", sdt->domain, towire.p - wire.data, wire.data, dns_rrtype_aaaa); |
| } |
| } |
| } |
| } |
| #endif // SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| |
| #if STUB_ROUTER |
| // Setup _lb._udp.<reversed IP address> PTR record for the domain we are advertising, for example: |
| // _lb._udp.0.0.168.192.in-addr.arpa. PTR my-discovery-proxy-en0.home.arpa. |
| dnssd_hardwired_lbdomains_setup(); |
| |
| exit: |
| #endif |
| return; |
| } |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static void |
| dnssd_hardwired_clear(void) |
| { |
| INFO("Clearing all hardwired response"); |
| for (served_domain_t *domain = served_domains; domain != NULL; domain = domain->next) { |
| hardwired_t *hardwired_responses = domain->hardwired_responses; |
| if (hardwired_responses == NULL) { |
| continue; |
| } |
| |
| domain->hardwired_responses = NULL; |
| hardwired_t *next_response; |
| for (hardwired_t *response = hardwired_responses; response != NULL; response = next_response) { |
| next_response = response->next; |
| free(response); |
| } |
| } |
| } |
| |
| static void |
| dnssd_hardwired_push_setup(void) |
| { |
| // For each interface, set up the hardwired names. |
| for (served_domain_t *sdt = served_domains; sdt; sdt = sdt->next) { |
| if (sdt->interface == NULL) { |
| continue; |
| } |
| |
| if (!sdt->interface->no_push) { |
| // SRV |
| // _dns-push-tls._tcp |
| // _dns-query-tls._udp |
| dnssd_hardwired_setup_dns_push_for_domain(sdt); |
| } |
| } |
| } |
| |
| static void |
| dnssd_hardwired_deny_service_existence_for_served_domain(served_domain_t *const NONNULL served_domain) |
| { |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| RESET; |
| // We deny the presence of support for LLQ, because we only support DNS Push. |
| dnssd_hardwired_add(served_domain, "_dns-llq._udp", served_domain->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| dnssd_hardwired_add(served_domain, "_dns-llq-tls._tcp", served_domain->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| |
| // We deny the presence of support for DNS Update, because a Discovery Proxy zone is stateless. |
| dnssd_hardwired_add(served_domain, "_dns-update._udp", served_domain->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| dnssd_hardwired_add(served_domain, "_dns-update-tls._tcp", served_domain->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| |
| // We deny the presence of support for UDP with TLS, because we have not implemented DTLS (datagram TLS). |
| dnssd_hardwired_add(served_domain, "_dns-query-tls._udp", served_domain->domain_ld, towire.p - wire.data, wire.data, dns_rrtype_srv); |
| |
| // We deny the presence of "lb._dns-sd._udp" for the served domain, to avoid the response like: |
| // lb._dns-sd._udp.openthread.thread.home.arpa. PTR openthread.thread.home.arpa. |
| dnssd_hardwired_add(served_domain, SRV_TYPE_FOR_AUTOMATIC_BROWSING_DOMAIN, served_domain->domain_ld, |
| towire.p - wire.data, wire.data, dns_rrtype_ptr); |
| dnssd_hardwired_add(served_domain, "b._dns-sd._udp", served_domain->domain_ld, |
| towire.p - wire.data, wire.data, dns_rrtype_ptr); |
| dnssd_hardwired_add(served_domain, "db._dns-sd._udp", served_domain->domain_ld, |
| towire.p - wire.data, wire.data, dns_rrtype_ptr); |
| } |
| |
| static bool |
| dnssd_hardwired_setup_for_served_domain(served_domain_t *const NONNULL served_domain) |
| { |
| bool succeeded = false; |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| require_action_quiet(served_domain->interface != NULL, exit, succeeded = false; |
| ERROR("only domain with usable interface can setup hardwired response - domain name: " PRI_S_SRP, |
| served_domain->domain) |
| ); |
| |
| // deny the existence of the following services: |
| // _dns-llq._udp |
| // _dns-llq-tls._tcp |
| // _dns-update._udp |
| dnssd_hardwired_deny_service_existence_for_served_domain(served_domain); |
| |
| // Setup NS record for this served domain. |
| RESET; |
| #if STUB_ROUTER |
| if (string_ends_with(served_domain->domain, THREAD_DOMAIN)) { |
| // If the response requires the translation from <served domain> to ".local." and the response ends in |
| // ".local.", truncate it. |
| require_action_quiet(local_host_name_dot_local[0] != 0, exit, succeeded = false); |
| dns_full_name_to_wire(NULL, &towire, local_host_name_dot_local); |
| } else |
| #endif |
| if (uuid_name[0] != 0) { |
| dns_name_to_wire(NULL, &towire, uuid_name); |
| dns_full_name_to_wire(NULL, &towire, served_domain->domain); |
| } else { |
| dns_name_to_wire(NULL, &towire, "ns"); |
| dns_full_name_to_wire(NULL, &towire, served_domain->domain); |
| } |
| dnssd_hardwired_add(served_domain, "", served_domain->domain, towire.p - wire.data, wire.data, dns_rrtype_ns); |
| |
| // Setup SOA record for this served domain. (piggybacking on what we already did for NS, which starts the same.) |
| dns_name_to_wire(NULL, &towire, "postmaster"); |
| dns_full_name_to_wire(NULL, &towire, served_domain->domain); |
| dns_u32_to_wire(&towire, 0); // serial |
| dns_ttl_to_wire(&towire, 7200); // refresh |
| dns_ttl_to_wire(&towire, 3600); // retry |
| dns_ttl_to_wire(&towire, 86400); // expire |
| dns_ttl_to_wire(&towire, 120); // minimum |
| dnssd_hardwired_add(served_domain, "", served_domain->domain, towire.p - wire.data, wire.data, dns_rrtype_soa); |
| |
| // Setup DNS push |
| if (served_domain->interface == NULL || !served_domain->interface->no_push) { |
| succeeded = dnssd_hardwired_setup_dns_push_for_domain(served_domain); |
| if (!succeeded) { |
| ERROR("failed to setup DNS push service for hardwired response - domain: " PRI_S_SRP, |
| served_domain->domain); |
| goto exit; |
| } |
| } |
| succeeded = true; |
| |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| dnssd_hardwired_setup_dns_push_for_domain(served_domain_t *const NONNULL served_domain) |
| { |
| bool succeeded; |
| |
| require_action_quiet(served_domain->interface != NULL && !served_domain->interface->no_push, exit, succeeded = false; |
| ERROR("the associated interface does not enable DNS push - domain: " PRI_S_SRP, served_domain->domain)); |
| |
| require_action_quiet(my_name != NULL, exit, succeeded = false; ERROR("my_name is not set")); |
| |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| #define RESET \ |
| memset(&towire, 0, sizeof towire); \ |
| towire.message = &wire; \ |
| towire.p = wire.data; \ |
| towire.lim = towire.p + sizeof wire.data |
| |
| RESET; |
| dns_u16_to_wire(&towire, 0); // priority |
| dns_u16_to_wire(&towire, 0); // weight |
| dns_u16_to_wire(&towire, 853); // port |
| |
| #if STUB_ROUTER |
| if (string_ends_with(served_domain->domain, THREAD_DOMAIN)) { |
| // If the served domain is subdomain of "thread.home.arpa.", use name <local host name>.local for the DNS push |
| // service. Currently we only support DNS push in "thread.home.arpa." domain in local subnet, so DNS push |
| // service for "thread.home.arpa." will be registered with a name in ".local.". |
| require_action_quiet(local_host_name_dot_local[0] != 0, exit, succeeded = false); |
| dns_full_name_to_wire(NULL, &towire, local_host_name_dot_local); |
| } else |
| #endif |
| if (uuid_name[0] != 0) { |
| // Use <local host name>.<domain> |
| dns_name_to_wire(NULL, &towire, uuid_name); |
| dns_full_name_to_wire(NULL, &towire, served_domain->domain); |
| } else { |
| // Use name ns.<served domain>. |
| dns_name_to_wire(NULL, &towire, "ns"); |
| dns_full_name_to_wire(NULL, &towire, served_domain->domain); |
| } |
| |
| dnssd_hardwired_add(served_domain, "_dns-push-tls._tcp", served_domain->domain_ld, towire.p - wire.data, wire.data, |
| dns_rrtype_srv); |
| |
| succeeded = true; |
| exit: |
| return succeeded; |
| } |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| static bool |
| embiggen(dnssd_query_t *query) |
| { |
| dns_wire_t *nr = malloc(query->data_size + DNS_DATA_SIZE + DNS_HEADER_SIZE); // increments wire size by DNS_DATA_SIZE |
| if (nr == NULL) { |
| return false; |
| } |
| memcpy(nr, query->response, query->data_size + DNS_HEADER_SIZE); |
| query->data_size += DNS_DATA_SIZE; |
| size_t len = query->towire.p - &query->response->data[0]; |
| query->towire.p = &nr->data[0] + len; |
| query->towire.lim = &nr->data[0] + query->data_size; |
| query->towire.p_rdlength = NULL; |
| query->towire.p_opt = NULL; |
| query->towire.message = nr; |
| free(query->response); |
| query->response = nr; |
| return true; |
| } |
| |
| static void |
| dp_move_rrs(dns_rr_t *first_section, unsigned *p_first_count, dns_rr_t *source_section, unsigned source_count, unsigned count, bool rdata_present) |
| { |
| unsigned first_count = *p_first_count; |
| |
| // Copy the rrs into the combined section. |
| for (unsigned i = 0; i < source_count; i++) { |
| // Skip this RR if there's already another one just like it in the section (most likely to happen |
| // with authority records. |
| bool duplicate = false; |
| for (unsigned j = 0; j < first_count; j++) { |
| if (dns_rrs_equal(&first_section[j], &source_section[i], rdata_present)) { |
| duplicate = true; |
| break; |
| } |
| } |
| if (duplicate) { |
| continue; |
| } |
| |
| // Only if there is space... |
| if (first_count < count) { |
| first_section[first_count] = source_section[i]; |
| first_count++; |
| source_section[i].type = dns_invalid_rr; |
| } else { |
| ERROR("first_count %d unexpectedly equal to count %d with i = %d", first_count, count, i); |
| } |
| } |
| *p_first_count = first_count; |
| } |
| |
| static dnssd_query_t * |
| dp_dns_queries_finished(dnssd_query_t *answered_query) |
| { |
| dns_message_t *first_message = NULL; |
| unsigned qdcount = 0, ancount = 0, nscount = 0, arcount = 0; |
| unsigned first_qdcount, first_ancount, first_nscount, first_arcount; |
| dnssd_query_t *first_query = NULL; |
| dp_tracker_t *tracker = answered_query->tracker; |
| |
| // response_query will be set to NULL if we don't want anything sent yet, to query if query is the |
| // only query or if there's an error in this function, or to the query that holds the aggregate response |
| // otherwise. |
| dnssd_query_t *response_query = answered_query; |
| const char *name = answered_query->question != NULL ? answered_query->question->name : "(null)"; |
| |
| require_action_quiet(tracker != NULL, exit, |
| dns_rcode_set(answered_query->response, dns_rcode_servfail); |
| ERROR("NULL tracker on " PRI_S_SRP, name)); |
| require_action_quiet(tracker->dns_queries != NULL, exit, |
| dns_rcode_set(answered_query->response, dns_rcode_servfail); |
| ERROR("NULL tracker->dns_queries on " PRI_S_SRP, name)); |
| |
| // The usual case, there's only one question in the DNS message, so we can just |
| // return the answer now. |
| if (answered_query->num_questions == 1) { |
| goto exit; |
| } |
| |
| // Otherwise, we have more than one query, so see if any remain unsatisfied. |
| int satisfied = 0; |
| for (dnssd_query_t *match = tracker->dns_queries; match != NULL; match = match->next) { |
| // It's possible we could creep in here without actually generating one of the responses, |
| // in which case we should definitely fail at this point. |
| require_action_quiet(match->response != NULL, |
| exit, |
| ERROR("null response on match query"); |
| dns_rcode_set(response_query->response, dns_rcode_servfail)); |
| if (match->message == answered_query->message) { |
| if (!match->satisfied) { |
| response_query = NULL; // More answers coming. |
| goto exit; |
| } |
| satisfied++; |
| } |
| } |
| if (satisfied != answered_query->num_questions) { |
| response_query = NULL; |
| goto exit; |
| } |
| // All queries have been satisfied. |
| |
| // Parse all of the messages (this is gross--later on we should just never convert to wire format until |
| // we get here. |
| for (dnssd_query_t *source = tracker->dns_queries; source != NULL; source = source->next) { |
| if (source->message == answered_query->message) { |
| // This should never fail, but... |
| require_action_quiet(dns_wire_parse(&source->response_msg, source->response, |
| (unsigned)(source->towire.p - source->response->data) + DNS_HEADER_SIZE, false), |
| exit, |
| dns_rcode_set(response_query->response, dns_rcode_servfail)); |
| |
| if (first_query == NULL) { |
| first_query = source; |
| first_message = first_query->response_msg; |
| first_qdcount = first_message->qdcount; |
| first_ancount = first_message->ancount; |
| first_nscount = first_message->nscount; |
| first_arcount = first_message->arcount; |
| } |
| qdcount += source->response_msg->qdcount; |
| ancount += source->response_msg->ancount; |
| nscount += source->response_msg->nscount; |
| arcount += source->response_msg->arcount; |
| } |
| } |
| |
| // Copy records from the response. |
| for (int i = 0; i < 4; i++) { |
| dns_rr_t *section, **first_section = NULL, **source_section = NULL; |
| unsigned section_count = 0, source_count = 0, *first_count = NULL; |
| |
| // Start with the second message, since the first is already populated. |
| for (dnssd_query_t *source = tracker->dns_queries; |
| source != NULL && answered_query->message == source->message ; source = source->next) |
| { |
| #define SECTION_CASE(index, counter_name, section_name) \ |
| case index: \ |
| first_section = &first_message->section_name; \ |
| source_section = &source->response_msg->section_name; \ |
| section_count = counter_name; \ |
| source_count = source->response_msg->counter_name; \ |
| first_count = &first_message->counter_name; \ |
| break |
| |
| switch (i) { |
| SECTION_CASE(0, qdcount, questions); |
| SECTION_CASE(1, ancount, answers); |
| SECTION_CASE(2, nscount, authority); |
| SECTION_CASE(3, arcount, additional); |
| } |
| |
| // If this is the first matching query, expand the current section to be able to fit all of the data we're |
| // copying in, and then copy the data from the first section. |
| if (first_section == source_section) { |
| section = calloc(section_count, sizeof(*section)); |
| require_action_quiet(section != NULL, exit, |
| dns_rcode_set(answered_query->response, dns_rcode_servfail); |
| ERROR("Unable to allocate memory for query response section on " PRI_S_SRP, name)); |
| memcpy(section, *first_section, source_count * sizeof(*section)); |
| memset(*first_section, 0, source_count * sizeof(*section)); // NULL out any pointers |
| free(*first_section); |
| *first_section = section; |
| } else { |
| dp_move_rrs(*first_section, first_count, *source_section, source_count, section_count, i != 0); |
| } |
| } |
| } |
| |
| // Use the response in the first query to turn the answer to wire format. |
| redo_message: |
| dp_query_towire_reset(first_query); |
| dns_message_rrs_to_wire(&first_query->towire, first_query->response_msg); |
| if (first_query->towire.truncated) { |
| if (first_query->tracker->connection->tcp_stream) { |
| if (embiggen(first_query)) { |
| first_query->towire.error = false; |
| first_query->towire.truncated = false; |
| goto redo_message; |
| } |
| } |
| } |
| first_query->response->qdcount = htons(first_message->qdcount); |
| first_query->response->ancount = htons(first_message->ancount); |
| first_query->response->nscount = htons(first_message->nscount); |
| first_query->response->arcount = htons(first_message->arcount); |
| response_query = first_query; |
| |
| exit: |
| return response_query; |
| } |
| |
| static void |
| dp_query_send_dns_response(dnssd_query_t *query, const char *context_description) |
| { |
| struct iovec iov; |
| dns_towire_state_t *towire = &query->towire; |
| const char *failnote = NULL; |
| uint8_t *revert = towire->p; |
| uint16_t tc = towire->truncated ? dns_flags_tc : 0; |
| uint16_t bitfield = ntohs(query->response->bitfield); |
| uint16_t mask = 0; |
| int rcode = dns_rcode_get(query->response); |
| question_t *question = query->question; |
| |
| // Mark this query as complete. |
| query->satisfied = true; |
| |
| VALIDATE_TRACKER_CONNECTION_NON_NULL(); |
| |
| // Send an SOA record if it's a .local query. |
| if (question->served_domain != NULL && question->served_domain->interface != NULL && |
| !towire->truncated && (question->type != dns_rrtype_soa || question->name[0] != '\0')) |
| { |
| redo: |
| // DNSSD Hybrid, Section 6.1. |
| TOWIRE_CHECK("&query->enclosing_domain_pointer 1", towire, |
| dns_pointer_to_wire(NULL, towire, &query->enclosing_domain_pointer)); |
| TOWIRE_CHECK("dns_rrtype_soa", towire, |
| dns_u16_to_wire(towire, dns_rrtype_soa)); |
| TOWIRE_CHECK("dns_qclass_in", towire, |
| dns_u16_to_wire(towire, dns_qclass_in)); |
| TOWIRE_CHECK("ttl", towire, dns_ttl_to_wire(towire, 3600)); |
| TOWIRE_CHECK("rdlength_begin ", towire, dns_rdlength_begin(towire)); |
| if (0) { |
| #if STUB_ROUTER |
| } else if (srp_servers->stub_router_enabled && my_name != NULL) { |
| TOWIRE_CHECK(my_name, towire, dns_full_name_to_wire(NULL, towire, my_name)); |
| #endif |
| } else if (uuid_name[0] != 0) { |
| TOWIRE_CHECK("uuid_name", towire, dns_name_to_wire(NULL, towire, uuid_name)); |
| TOWIRE_CHECK("&query->enclosing_domain_pointer 2", towire, |
| dns_pointer_to_wire(NULL, towire, &query->enclosing_domain_pointer)); |
| } else { |
| TOWIRE_CHECK("\"ns\"", towire, dns_name_to_wire(NULL, towire, "ns")); |
| TOWIRE_CHECK("&query->enclosing_domain_pointer 2", towire, |
| dns_pointer_to_wire(NULL, towire, &query->enclosing_domain_pointer)); |
| } |
| TOWIRE_CHECK("\"postmaster\"", towire, |
| dns_name_to_wire(NULL, towire, "postmaster")); |
| TOWIRE_CHECK("&query->enclosing_domain_pointer 3", towire, |
| dns_pointer_to_wire(NULL, towire, &query->enclosing_domain_pointer)); |
| TOWIRE_CHECK("serial", towire,dns_u32_to_wire(towire, 0)); // serial |
| TOWIRE_CHECK("refresh", towire, dns_ttl_to_wire(towire, 7200)); // refresh |
| TOWIRE_CHECK("retry", towire, dns_ttl_to_wire(towire, 3600)); // retry |
| TOWIRE_CHECK("expire", towire, dns_ttl_to_wire(towire, 86400)); // expire |
| TOWIRE_CHECK("minimum", towire, dns_ttl_to_wire(towire, 120)); // minimum |
| dns_rdlength_end(towire); |
| if (towire->truncated) { |
| query->towire.p = revert; |
| if (query->tracker->connection->tcp_stream) { |
| if (embiggen(query)) { |
| query->towire.error = 0; |
| towire->truncated = false; |
| goto redo; |
| } |
| } else { |
| tc = dns_flags_tc; |
| } |
| } else { |
| query->response->nscount = htons(1); |
| } |
| |
| // Response is authoritative and not recursive. |
| authoritative: |
| mask = ~dns_flags_ra; |
| bitfield = bitfield | dns_flags_aa | tc; |
| bitfield = bitfield & mask; |
| } else { |
| // Response is recursive and not authoritative. |
| if (question->type != dns_rrtype_soa) { |
| mask = ~dns_flags_aa; |
| bitfield = bitfield | dns_flags_ra | tc; |
| bitfield = bitfield & mask; |
| } else { |
| goto authoritative; |
| } |
| } |
| |
| INFO("[Q%d][QU%d][QID %x] ->p %p ->lim %p len %zd rcode %d " PUB_S_SRP, SERIAL(query), SERIAL(question), |
| ntohs(query->message->wire.id), query->towire.p, &query->towire.message->data[0], |
| query->towire.p - &query->towire.message->data[0], dns_rcode_get(query->response), context_description); |
| |
| // In the case that we get an error looking something up, we return that error immediately on the query that failed, |
| // rather than trying to assemble a complete answer. In returning the error, we cancel any outstanding queries. |
| dnssd_query_t *send_query; |
| |
| if (!towire->error && rcode == dns_rcode_noerror) { |
| // It's possible that we got a query with qdcount > 1. In this case, we are going to marshal all of the |
| // answers from the responses we've constructed into a new response and send it after all of the queries |
| // have responses. So at this point, if we don't have all the responses yet, there's no point in adding |
| // the edns0 option. If we do, dp_dns_update_queries_finished will marshal all the answers into one |
| // message and after that we can add the edns0 option. If there's only one query, this is a no-op. |
| send_query = dp_dns_queries_finished(query); |
| if (send_query == NULL) { |
| #ifdef DNSSD_PROXY_DUMP_TRACKER_QUERIES |
| if (query->tracker == NULL) { |
| ERROR("[Q%d] query->tracker is NULL", SERIAL(query)); |
| } else { |
| char logbuf[200]; |
| char *lbp = logbuf; |
| char *lbend = logbuf + sizeof(logbuf); |
| char *lbrestart; |
| bool print_last = true; |
| if (query->tracker->connection != NULL && query->tracker->connection->tcp_stream) { |
| int len = snprintf(logbuf, sizeof(logbuf), "[Q%d] TCP %d: ", SERIAL(query), query->num_questions); |
| lbrestart = logbuf + len; |
| } else { |
| int len = snprintf(logbuf, sizeof(logbuf), "[Q%d] UDP %p %d: ", SERIAL(query), query->num_questions); |
| lbrestart = logbuf + len; |
| } |
| lbp = logbuf + strlen(logbuf); |
| for (dnssd_query_t *list_query = query->tracker->dns_queries; |
| list_query != NULL; list_query = list_query->next) |
| { |
| if (list_query->message != query->message) { |
| continue; |
| } |
| int len = snprintf(lbp, lbend - lbp, "%p%s ", list_query, list_query->satisfied ? "+" : "="); |
| if (lbp + len < lbend) { |
| lbp += len; |
| print_last = true; |
| } else { |
| *lbp = 0; |
| INFO("[Q%d] " PUB_S_SRP, SERIAL(query), logbuf); |
| lbp = lbrestart; |
| *lbp = 0; |
| print_last = false; |
| } |
| } |
| if (print_last) { |
| INFO("[Q%d] " PUB_S_SRP, SERIAL(query), logbuf); |
| } |
| } |
| #endif // DNSSD_PROXY_DUMP_TRACKER_QUERIES |
| return; |
| } |
| if (dns_rcode_get(send_query->response) != dns_rcode_noerror) { |
| rcode = dns_rcode_get(send_query->response); |
| } |
| |
| towire = &send_query->towire; |
| revert = towire->p; |
| } else { |
| send_query = query; |
| } |
| |
| // Not authentic, checking not disabled. |
| mask = ~(dns_flags_rd | dns_flags_ad | dns_flags_cd); |
| bitfield = bitfield & mask; |
| send_query->response->bitfield = htons(bitfield); |
| |
| // This is a response |
| dns_qr_set(send_query->response, dns_qr_response); |
| |
| // If we got a failure from dp_dns_queries_finished(), skip adding the opt RR and checking for a towire error. |
| if (rcode == dns_rcode_noerror) { |
| // Send an OPT RR if we got one |
| // XXX reserve space so we can always send an OPT RR? |
| if (send_query->is_edns0) { |
| redo_edns0: |
| TOWIRE_CHECK("Root label", towire, dns_u8_to_wire(towire, 0)); // Root label |
| TOWIRE_CHECK("dns_rrtype_opt", towire, dns_u16_to_wire(towire, dns_rrtype_opt)); |
| TOWIRE_CHECK("UDP Payload size", towire, dns_u16_to_wire(towire, 4096)); // UDP Payload size |
| TOWIRE_CHECK("extended-rcode", towire, dns_u8_to_wire(towire, 0)); // extended-rcode |
| TOWIRE_CHECK("EDNS version 0", towire, dns_u8_to_wire(towire, 0)); // EDNS version 0 |
| TOWIRE_CHECK("No extended flags", towire, dns_u16_to_wire(towire, 0)); // No extended flags |
| TOWIRE_CHECK("No payload", towire, dns_u16_to_wire(towire, 0)); // No payload |
| if (towire->truncated) { |
| send_query->towire.p = revert; |
| if (send_query->tracker->connection->tcp_stream) { |
| if (embiggen(send_query)) { |
| send_query->towire.error = false; |
| send_query->towire.truncated = false; |
| goto redo_edns0; |
| } |
| } |
| } else { |
| #if SRP_FEATURE_NAT64 |
| send_query->response->arcount = htons(ntohs(send_query->response->arcount) + 1); |
| #else |
| send_query->response->arcount = htons(1); |
| #endif |
| } |
| } |
| |
| if (towire->error) { |
| ERROR("[Q%d][QU%d][QID%x] failed on %s", SERIAL(query), SERIAL(question), ntohs(send_query->message->wire.id), failnote); |
| if (tc == dns_flags_tc) { |
| dns_rcode_set(send_query->response, dns_rcode_noerror); |
| } else { |
| dns_rcode_set(send_query->response, dns_rcode_servfail); |
| } |
| } else { |
| // No error. |
| dns_rcode_set(send_query->response, dns_rcode_noerror); |
| } |
| } else { |
| dns_rcode_set(send_query->response, rcode); |
| } |
| |
| iov.iov_len = (send_query->towire.p - (uint8_t *)send_query->response); |
| iov.iov_base = send_query->response; |
| INFO("[Q%d][QU%d] (len %zd)", SERIAL(query), SERIAL(question), iov.iov_len); |
| |
| ioloop_send_message(send_query->tracker->connection, send_query->message, &iov, 1); |
| |
| // Cancel the send_query. |
| dnssd_query_cancel(send_query); |
| } |
| |
| static void |
| dp_query_towire_reset(dnssd_query_t *query) |
| { |
| query->towire.p = &query->response->data[0]; // We start storing RR data here. |
| query->towire.lim = &query->response->data[0] + query->data_size; // This is the limit to how much we can store. |
| query->towire.message = query->response; |
| query->towire.p_rdlength = NULL; |
| query->towire.p_opt = NULL; |
| query->p_dso_length = NULL; |
| } |
| |
| static void |
| dns_push_start(dnssd_query_t *query) |
| { |
| const char *failnote = NULL; |
| |
| // If we don't have a dso header yet, start one. |
| if (query->p_dso_length == NULL) { |
| memset(query->response, 0, (sizeof *query->response) - DNS_DATA_SIZE); |
| dns_opcode_set(query->response, dns_opcode_dso); |
| // This is a unidirectional DSO message, which is marked as a query |
| dns_qr_set(query->response, dns_qr_query); |
| // No error cuz not a response. |
| dns_rcode_set(query->response, dns_rcode_noerror); |
| |
| TOWIRE_CHECK("kDSOType_DNSPushUpdate", &query->towire, |
| dns_u16_to_wire(&query->towire, kDSOType_DNSPushUpdate)); |
| if (query->towire.p + 2 > query->towire.lim) { |
| ERROR("[Q%d] No room for dso length in DNS Push notification message.", SERIAL(query)); |
| dp_query_towire_reset(query); |
| return; |
| } |
| query->p_dso_length = query->towire.p; |
| query->towire.p += 2; |
| } |
| if (failnote != NULL) { |
| ERROR("[Q%d] couldn't start update: %s", SERIAL(query), failnote); |
| } |
| } |
| |
| static void |
| dp_push_response(dnssd_query_t *query, dns_rr_t *original_question) |
| { |
| struct iovec iov; |
| question_t *question = query->question; |
| char nbuf[DNS_MAX_NAME_SIZE_ESCAPED + 1]; |
| char *name = "<null question name>"; |
| if (question != NULL) { |
| name = question->name; |
| } else if (original_question != NULL) { |
| dns_name_print(original_question->name, nbuf, sizeof(nbuf)); |
| name = nbuf; |
| } |
| |
| VALIDATE_TRACKER_CONNECTION_NON_NULL(); |
| |
| if (query->p_dso_length != NULL) { |
| int16_t dso_length = query->towire.p - query->p_dso_length - 2; |
| iov.iov_len = (query->towire.p - (uint8_t *)query->response); |
| iov.iov_base = query->response; |
| INFO("[Q%d][QU%d] " PRI_S_SRP " (len %zd)", SERIAL(query), SERIAL(question), name, iov.iov_len); |
| |
| query->towire.p = query->p_dso_length; |
| dns_u16_to_wire(&query->towire, dso_length); |
| ioloop_send_message(query->tracker->connection, query->message, &iov, 1); |
| dp_query_towire_reset(query); |
| } |
| } |
| |
| static bool |
| dnssd_hardwired_response(dnssd_query_t *query, DNSServiceQueryRecordReply UNUSED callback) |
| { |
| hardwired_t *hp; |
| question_t *question = query->question; |
| const char *response_type = NULL; |
| uint8_t v4mapped[12] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xff, 0xff }; |
| |
| // If the question is for our uuid name in a domain we're authoritative for, respond with the IP address that |
| // the question was received on. |
| if (!strcasecmp(question->name, uuid_name) && (question->type == dns_rrtype_a || question->type == dns_rrtype_aaaa)) { |
| addr_t *local = NULL; |
| if (query->message != NULL) { |
| local = &query->message->local; |
| } else { |
| local = &query->dso->transport->local; |
| } |
| |
| // If it's an IPv4 address we can respond with an A record. |
| if (question->type == dns_rrtype_a && local->sa.sa_family == AF_INET) { |
| dp_query_add_data_to_response(query, question->name, question->type, dns_qclass_in, 4, |
| &local->sin.sin_addr, 300, true, true, &query->response->ancount); |
| response_type = "local host IPv4 address"; |
| } |
| // If it's an IPv4-mapped IPv6 address, we can respond with an A record |
| else if (local->sa.sa_family == AF_INET6 && question->type == dns_rrtype_a && |
| !memcmp(&local->sin6.sin6_addr, v4mapped, sizeof(v4mapped))) |
| { |
| dp_query_add_data_to_response(query, question->name, question->type, dns_qclass_in, 4, |
| ((uint8_t *)&local->sin6.sin6_addr) + 12, 3600, true, true, |
| &query->response->ancount); |
| response_type = "local host v4-mapped address"; |
| } |
| // If it's an IPv6 address and NOT a v4-mapped address, we can respond with an AAAA record. |
| else if (local->sa.sa_family == AF_INET6 && question->type == dns_rrtype_aaaa && |
| memcmp(&local->sin6.sin6_addr, v4mapped, sizeof(v4mapped))) |
| { |
| struct in6_addr response = local->sin6.sin6_addr; |
| bool address_is_usable = false; |
| // If it's not a synthesized anycast or rloc address, we can just use it. |
| if (!is_thread_mesh_synthetic_address(&response)) { |
| address_is_usable = true; |
| response_type = "local host IPv6 address"; |
| } else { |
| // Otherwise, we need to find the mesh-local address and respond with that. |
| srp_server_t *server_state = srp_servers; |
| #if SRP_TEST_SERVER |
| for (; !address_is_usable && server_state != NULL; server_state = server_state->next) |
| #endif |
| { |
| if (0) { |
| #if STUB_ROUTER |
| } else if (server_state->stub_router_enabled) { |
| route_state_t *route_state = server_state->route_state; |
| if (route_state->thread_interface_name != NULL) { |
| for (interface_address_state_t *address = route_state->interface_addresses; |
| !address_is_usable && address != NULL; address = address->next) |
| { |
| // Wrong interface or wrong type of address |
| if (strcmp(address->name, route_state->thread_interface_name) || |
| address->addr.sa.sa_family != AF_INET6) |
| { |
| continue; |
| } |
| if (!is_thread_mesh_synthetic_or_link_local(&address->addr.sin6.sin6_addr)) |
| { |
| memcpy(&response, &address->addr.sin6.sin6_addr, sizeof(response)); |
| response_type = "thread interface address"; |
| address_is_usable = true; |
| } |
| } |
| if (address_is_usable == false) { |
| response_type = "no usable address on thread interface"; |
| } |
| } else { |
| address_is_usable = false; |
| response_type = "thread interface name unknown"; |
| } |
| #endif |
| } else { |
| // For thread device, the only thing that can work is the ML-EID. |
| if (service_publisher_get_ml_eid(server_state->service_publisher, &response)) { |
| address_is_usable = true; |
| response_type = "thread device ML-EID"; |
| } else { |
| response_type = "thread ML-EID not known"; |
| } |
| } |
| } |
| } |
| if (address_is_usable) { |
| SEGMENTED_IPv6_ADDR_GEN_SRP(&response, response_buf); |
| INFO(PUB_S_SRP " IN AAAA " PRI_SEGMENTED_IPv6_ADDR_SRP " " PUB_S_SRP, question->name, |
| SEGMENTED_IPv6_ADDR_PARAM_SRP(&response, response_buf), response_type); |
| dp_query_add_data_to_response(query, question->name, question->type, dns_qclass_in, 16, |
| &response, 300, true, true, &query->response->ancount); |
| } |
| } |
| } else { |
| for (hp = query->question->served_domain->hardwired_responses; hp; hp = hp->next) { |
| if ((query->question->type == hp->type || query->question->type == dns_rrtype_any) && |
| query->question->qclass == dns_qclass_in && !strcasecmp(hp->name, query->question->name)) |
| { |
| if (query->dso != NULL) { |
| // Since hardwired response is set by the dnssd-proxy itself, do not do ".local" translation. |
| dp_query_add_data_to_response(query, hp->fullname, hp->type, dns_qclass_in, hp->rdlen, hp->rdata, |
| 3600, true, false, NULL); |
| } else { |
| // Store the response |
| if (!query->towire.truncated) { |
| // Since hardwired response is set by the dnssd-proxy itself, do not do ".local" translation. |
| dp_query_add_data_to_response(query, hp->fullname, hp->type, dns_qclass_in, |
| hp->rdlen, hp->rdata, 3600, true, false, |
| &query->response->ancount); |
| } |
| } |
| response_type = "hardwired"; |
| } |
| } |
| } |
| if (response_type != NULL) { |
| return true; |
| } |
| return false; |
| } |
| |
| #if SRP_FEATURE_NAT64 |
| static void |
| dp_query_append_nat64_prefix_records(dnssd_query_t *query) |
| { |
| // 192.0.0.170 and 192.0.0.171 are reserved IPv4 addresses for ipv4only.arpa. |
| // See <https://tools.ietf.org/html/rfc7050#section-8.2>. |
| const uint8_t ipv4_addrs[2][4] = { |
| {192, 0, 0, 170}, |
| {192, 0, 0, 171} |
| }; |
| uint8_t rdata[16] = {0}; |
| |
| VALIDATE_TRACKER_CONNECTION_NON_NULL(); |
| |
| const struct in6_addr *prefix = nat64_get_ipv6_prefix(); |
| memcpy(rdata, prefix->s6_addr, sizeof(rdata)); |
| for (size_t i = 0; i < countof(ipv4_addrs);) { |
| memcpy(&rdata[12], ipv4_addrs[i], 4); |
| uint8_t *revert = query->towire.p; |
| dp_query_add_data_to_response(query, "ipv4only.arpa.", dns_rrtype_aaaa, query->question->qclass, |
| (uint16_t)sizeof(rdata), rdata, RFC8766_TTL_CLAMP, true, false, |
| &query->response->arcount); |
| if (query->towire.truncated) { |
| query->towire.p = revert; |
| if (query->tracker->connection->tcp_stream) { |
| if (embiggen(query)) { |
| query->towire.truncated = false; |
| query->towire.error = false; |
| continue; |
| } else { |
| dns_rcode_set(query->response, dns_rcode_servfail); |
| } |
| } |
| return; |
| } |
| i++; |
| } |
| } |
| #endif // SRP_FEATURE_NAT64 |
| |
| static void |
| dns_query_answer_process(DNSServiceFlags flags, DNSServiceErrorType errorCode, |
| const char *fullname, uint16_t rrtype, uint16_t rrclass, |
| uint16_t rdlen, const void *rdata, uint32_t ttl, dnssd_query_t *query, bool send) |
| { |
| question_t *question = query->question; |
| |
| INFO("[Q%d][QU%d] " PRI_S_SRP PUB_S_SRP PUB_S_SRP " %d %x %d %p", SERIAL(query), SERIAL(question), |
| fullname, (flags & kDNSServiceFlagsMoreComing) ? " m " : " ", dns_rrtype_to_string(rrtype), rrclass, rdlen, |
| errorCode, query); |
| |
| VALIDATE_TRACKER_CONNECTION_NON_NULL(); |
| |
| if (errorCode == kDNSServiceErr_NoError) { |
| #if SRP_FEATURE_NAT64 |
| const bool aaaa_query_got_a_record = (question->type == dns_rrtype_aaaa) && (rrtype == dns_rrtype_a); |
| if (srp_servers->srp_nat64_enabled && (ntohs(query->response->arcount) != 0) && !aaaa_query_got_a_record) { |
| return; |
| } |
| #endif |
| re_add: |
| if (send) { |
| uint16_t *counter = &query->response->ancount; |
| #if SRP_FEATURE_NAT64 |
| if (srp_servers->srp_nat64_enabled && aaaa_query_got_a_record) { |
| counter = &query->response->arcount; |
| } |
| #endif |
| uint8_t *revert = query->towire.p; |
| dp_query_add_data_to_response(query, fullname, rrtype, rrclass, rdlen, rdata, |
| ttl > RFC8766_TTL_CLAMP ? RFC8766_TTL_CLAMP : ttl, false, false, counter); |
| if (query->towire.truncated) { |
| query->towire.p = revert; |
| if (query->tracker->connection->tcp_stream) { |
| if (embiggen(query)) { |
| query->towire.truncated = false; |
| query->towire.error = false; |
| goto re_add; |
| } else { |
| dns_rcode_set(query->response, dns_rcode_servfail); |
| dp_query_send_dns_response(query, "failed embiggen"); |
| return; |
| } |
| } |
| } |
| } |
| // If there isn't more coming, send the response now |
| if (!(flags & kDNSServiceFlagsMoreComing) || query->towire.truncated) { |
| // When we get a CNAME response, we may not get the record it points to with the MoreComing |
| // flag set, so don't respond yet. |
| if (question->type != dns_rrtype_cname && rrtype == dns_rrtype_cname) { |
| INFO("[Q%d][QU%d] not responding yet because CNAME.", SERIAL(query), SERIAL(question)); |
| } else { |
| #if SRP_FEATURE_NAT64 |
| if (srp_servers->srp_nat64_enabled && (ntohs(query->response->arcount) != 0)) { |
| dp_query_append_nat64_prefix_records(query); |
| } |
| #endif |
| dp_query_send_dns_response(query, "normal success"); |
| } |
| } |
| } else if (errorCode == kDNSServiceErr_NoSuchRecord) { |
| // If we get "no such record," we can't really do much except return the answer. |
| dp_query_send_dns_response(query, "no such record"); |
| } else { |
| dns_rcode_set(query->response, dns_rcode_servfail); |
| dp_query_send_dns_response(query, "unhandled error"); |
| } |
| } |
| |
| // answer_match is to decide if an answer matches the one requested to be removed. |
| // Based on rfc8765 |
| // Remove all RRsets from a name in all classes: |
| // TTL = 0xFFFFFFFE, RDLEN = 0, CLASS = 255 (ANY). |
| // Remove all RRsets from a name in given class: |
| // TTL = 0xFFFFFFFE, RDLEN = 0, CLASS gives class, TYPE = 255 (ANY). |
| // Remove specified RRset from a name in given class: |
| // TTL = 0xFFFFFFFE, RDLEN = 0, |
| // CLASS and TYPE specify the RRset being removed. |
| // Remove an individual RR from a name: |
| // TTL = 0xFFFFFFFF, |
| // CLASS, TYPE, RDLEN, and RDATA specify the RR being removed. |
| static bool |
| answer_match(const answer_t *answer, uint32_t rdlen, const char *fullname, uint16_t rrtype, uint16_t rrclass, const void *rdata) |
| { |
| return (((rrclass == dns_qclass_any) || (rrclass == answer->rrclass)) && |
| ((rrtype == dns_rrtype_any) || (rrtype == answer->rrtype)) && |
| ((rdlen == 0) || ((rdlen == answer->rdlen) && (memcmp(answer->rdata, rdata, rdlen) == 0))) && |
| (!strcmp(answer->fullname, fullname)) |
| ); |
| } |
| |
| static void |
| dns_push_query_answer_process(DNSServiceFlags flags, DNSServiceErrorType errorCode, |
| const char *fullname, uint16_t rrtype, uint16_t rrclass, |
| uint16_t rdlen, const void *rdata, uint32_t ttl, dnssd_query_t *query, bool send); |
| |
| // This is the callback for both dns query and dns push query results. |
| static void |
| dns_question_callback(DNSServiceRef UNUSED sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, |
| DNSServiceErrorType errorCode, const char *fullname, uint16_t rrtype, uint16_t rrclass, |
| uint16_t rdlen, const void *rdata, uint32_t ttl, void *context) |
| { |
| question_t *question = context; |
| dnssd_query_t *query, *next; |
| bool send = true; |
| |
| // For dns push query, insert or remove answer from the question cache depending on the flags |
| // For dns query (dso==NULL), add answer when receiving callback to the question |
| if (errorCode == kDNSServiceErr_NoError) { |
| if (flags & kDNSServiceFlagsAdd) { |
| // Eliminate duplicates (appears on more than one interface) |
| for (answer_t *answer = question->answers; answer != NULL; answer = answer->next) { |
| if (answer_match(answer, rdlen, fullname, rrtype, rrclass, rdata)) { |
| INFO("[QU%d] duplicate answer in cache - name: " PRI_S_SRP ", rrtype: " PUB_S_SRP |
| ", rrclass: " PUB_S_SRP ", rdlen: %u." PUB_S_SRP, SERIAL(question), |
| fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, |
| (flags & kDNSServiceFlagsMoreComing) ? " more coming" : " done"); |
| send = false; |
| break; |
| } |
| } |
| if (send) { |
| // Add the extra space rdlen stores rdata at the end |
| answer_t *answer = calloc(1, sizeof(*answer) + rdlen); |
| if (answer == NULL) { |
| ERROR("[QU%d] unable to allocate memory for answer - name: " PRI_S_SRP ", rrtype: " PUB_S_SRP |
| ", rrclass: " PUB_S_SRP ", rdlen: %u.", SERIAL(question), |
| fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen); |
| return; |
| } |
| answer->fullname = strdup(fullname); |
| if (answer->fullname == NULL) { |
| ERROR("[QU%d] strdup failed to copy the answer name: " PRI_S_SRP, SERIAL(question), fullname); |
| free(answer); |
| return; |
| } |
| answer->interface_index = interfaceIndex; |
| answer->ttl = ttl; |
| answer->rrtype = rrtype; |
| answer->rrclass = rrclass; |
| answer->rdlen = rdlen; |
| answer->rdata = (uint8_t *)(answer + 1); |
| memcpy(answer->rdata, rdata, rdlen); |
| answer->next = NULL; |
| // Insert answer at the tail |
| answer_t **tail = &(question->answers); |
| while (*tail != NULL) { |
| tail = &((*tail)->next); |
| } |
| *tail = answer; |
| // Received data; reset no_data flag. |
| question->no_data = false; |
| INFO("[QU%d] add answer to cache - name: " PRI_S_SRP ", rrtype: " PUB_S_SRP |
| ", rrclass: " PUB_S_SRP ", rdlen: %u." PUB_S_SRP, SERIAL(question), |
| fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, |
| (flags & kDNSServiceFlagsMoreComing) ? " more coming" : " done"); |
| } |
| } else { |
| // Remove |
| answer_t **answer = &(question->answers); |
| answer_t *cur = NULL; |
| bool matched = false; |
| while (*answer != NULL) { |
| cur = *answer; |
| if (answer_match(cur, rdlen, fullname, rrtype, rrclass, rdata)) { |
| INFO("[QU%d] remove answer from cache - " |
| "name: " PRI_S_SRP ", rrtype: " PUB_S_SRP ", rrclass: " PUB_S_SRP ", rdlen: %u." PUB_S_SRP, |
| SERIAL(question), fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, |
| (flags & kDNSServiceFlagsMoreComing) ? " more coming" : " done"); |
| *answer = cur->next; |
| dp_answer_free(cur); |
| matched = true; |
| // If individual RR to be removed, get out of the loop once the RR has been removed |
| if (rdlen != 0) { |
| break; |
| } |
| } else { |
| answer = &cur->next; |
| } |
| } |
| if (!matched) { |
| INFO("[Q%d] remove not found in cache - name: " PRI_S_SRP |
| ", rrtype: " PUB_S_SRP ", rrclass: " PUB_S_SRP ", rdlen: %u." PUB_S_SRP, SERIAL(question), |
| fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, |
| (flags & kDNSServiceFlagsMoreComing) ? " more coming" : " done"); |
| } |
| if (*answer == NULL) { |
| // All the answers get removed; set no_data flag. |
| question->no_data = true; |
| } |
| } |
| } else if (errorCode == kDNSServiceErr_NoSuchRecord) { |
| INFO("[QU%d] no data - name: " PRI_S_SRP ", rrtype: " PUB_S_SRP |
| ", rrclass: " PUB_S_SRP ", rdlen: %u." PUB_S_SRP, SERIAL(question), fullname, dns_rrtype_to_string(rrtype), |
| dns_qclass_to_string(rrclass), rdlen, (flags & kDNSServiceFlagsMoreComing) ? " more coming" : " done"); |
| question->no_data = true; |
| } else if (errorCode == kDNSServiceErr_ServiceNotRunning || errorCode == kDNSServiceErr_DefunctConnection) { |
| #if SRP_FEATURE_DNSSD_PROXY_SHARED_CONNECTIONS |
| if (shared_discovery_txn != NULL) { |
| ioloop_dnssd_txn_cancel(shared_discovery_txn); |
| ioloop_dnssd_txn_release(shared_discovery_txn); |
| shared_discovery_txn = NULL; |
| dp_handle_server_disconnect(NULL, errorCode); |
| } |
| #else |
| ioloop_dnssd_txn_cancel(question->txn); |
| ioloop_dnssd_txn_release(question->txn); |
| question->txn = NULL; |
| dp_handle_server_disconnect(NULL, errorCode); |
| #endif |
| return; // This doesn't count as a result. |
| } |
| query = question->queries; |
| while(query != NULL) { |
| next = query->question_next; |
| if (query->dso != NULL) { |
| dns_push_query_answer_process(flags, errorCode, fullname, rrtype, rrclass, |
| rdlen, rdata, ttl, query, send); |
| } else { |
| dns_query_answer_process(flags, errorCode, fullname, rrtype, rrclass, |
| rdlen, rdata, ttl, query, send); |
| } |
| query = next; |
| } |
| dp_question_cache_remove_queries(question); |
| } |
| |
| static void |
| dp_query_wakeup(void *context) |
| { |
| dnssd_query_t *query = context; |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| size_t namelen = strlen(query->question->name); |
| question_t *question = query->question; |
| |
| if (question->answers != NULL) { |
| FAULT("[Q%d][QU%d] answers present, but dp_query_wakeup reached for name " PRI_S_SRP, |
| SERIAL(query), SERIAL(question), question->name); |
| } else { |
| question->no_data = true; |
| } |
| |
| // Should never happen. |
| if (namelen + (question->served_domain |
| ? (question->served_domain->interface != NULL |
| ? sizeof local_suffix |
| // XXX why are we checking this but not copying in the served domain name below? |
| : strlen(question->served_domain->domain_ld) + 1) |
| : 0) > sizeof name) { |
| ERROR("[Q%d][QU%d] no space to construct name.", SERIAL(query), SERIAL(question)); |
| dnssd_query_cancel(query); |
| return; |
| } |
| |
| memcpy(name, question->name, namelen + 1); |
| if (question->served_domain != NULL) { |
| memcpy(name + namelen, local_suffix, sizeof(local_suffix)); |
| } |
| RETAIN_HERE(query, dnssd_query); |
| dp_query_send_dns_response(query, "query wakeup"); |
| dp_question_cache_remove_queries(question); |
| RELEASE_HERE(query, dnssd_query); |
| } |
| |
| // Search asked question in the cache; if not existing, create one. |
| static question_t * |
| dp_query_question_cache_copy(dns_rr_t *search_term, bool *new) |
| { |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| served_domain_t *sdt = dp_served(search_term->name, name, sizeof(name)); |
| |
| if (sdt == NULL) { |
| dns_name_print(search_term->name, name, sizeof name); |
| } |
| question_t **questions, *ret = NULL; |
| question_t *new_question = NULL; |
| // if the query is in served domain, lookup in served_domain->questions |
| // otherwise lookup in the out-of-domain question cache |
| if (sdt != NULL) { |
| questions = &sdt->questions; |
| } else { |
| questions = &questions_without_domain; |
| } |
| *new = false; |
| while (*questions != NULL) { |
| question_t *question = *questions; |
| if (search_term->type == question->type && |
| search_term->qclass == question->qclass && |
| !strcmp(name, question->name)) |
| { |
| ret = question; |
| break; |
| } |
| questions = &question->next; |
| } |
| |
| // If no cache entry was found, create one |
| if (*questions == NULL) { |
| new_question = calloc(1, sizeof(*new_question)); |
| require_action_quiet(new_question != NULL, exit, |
| ERROR("Unable to allocate memory for question entry on " PRI_S_SRP, name)); |
| new_question->name = strdup(name); |
| require_action_quiet(new_question->name != NULL, exit, |
| ERROR("unable to allocate memory for question name on " PRI_S_SRP, name)); |
| new_question->type = search_term->type; |
| new_question->qclass = search_term->qclass; |
| new_question->start_time = srp_utime(); |
| new_question->answers = NULL; |
| new_question->served_domain = sdt; |
| new_question->queries = NULL; |
| new_question->no_data = false; |
| new_question->serial = ++cur_question_serial; |
| |
| if (sdt != NULL && sdt->interface != NULL) { |
| new_question->interface_index = sdt->interface->ifindex; |
| new_question->serviceFlags = kDNSServiceFlagsForceMulticast; |
| } else { |
| new_question->interface_index = kDNSServiceInterfaceIndexAny; |
| new_question->serviceFlags = kDNSServiceFlagsReturnIntermediates; |
| } |
| |
| // Link the new_question to the question list. |
| new_question->next = *questions; |
| *questions = new_question; |
| RETAIN_HERE(*questions, question); // retain |
| |
| // Successfully created a new question, which will be the returned question. |
| ret = new_question; |
| new_question = NULL; |
| *new = true; |
| } |
| exit: |
| if (new_question != NULL) { |
| RELEASE_HERE(new_question, question); |
| } |
| if (ret != NULL) { |
| RETAIN_HERE(ret, question); |
| } |
| return ret; |
| } |
| |
| // Look for answers in the cache for the current query. Remove flag is used when mDNSResponder connection is broken, to signal to |
| // DNS Push clients only that the records previously sent should be discarded. |
| static void |
| dp_query_reply_from_cache(question_t *question, dnssd_query_t *query, bool remove) |
| { |
| // For dns query, if no_data is flagged or it's been six seconds since the question |
| // was started and there is still no answer yet, we should also respond immediately. |
| // [DNS Discovery Proxy RFC, RFC 8766, Section 5.6] |
| // Note that six seconds as stated in RFC8766 is probably too long, currently we're using 800ms. |
| if (query->dso == NULL && |
| (question->no_data == true || |
| (question->answers == NULL && |
| srp_utime() - question->start_time > RESPONSE_WINDOW_USECS))) |
| { |
| INFO("[Q%d][QU%d] no data for question - type %d class %d " PRI_S_SRP, |
| SERIAL(query), SERIAL(question), question->type, question->qclass, question->name); |
| dns_query_answer_process(0, kDNSServiceErr_NoSuchRecord, question->name, |
| question->type, question->qclass, 0, |
| NULL, 0, query, true); |
| dp_question_cache_remove_queries(question); |
| return; |
| } |
| // answers are available for the question being asked |
| if (question->answers != NULL) { |
| INFO("[Q%d][QU%d] reply from cache for question - type %d class %d " PRI_S_SRP, |
| SERIAL(query), SERIAL(question), question->type, question->qclass, question->name); |
| DNSServiceFlags flags; |
| answer_t *answer = question->answers; |
| while (answer != NULL) { |
| if (remove) { |
| flags = 0; |
| } else { |
| flags = kDNSServiceFlagsAdd; |
| } |
| |
| answer_t *next = answer->next; |
| if (next != NULL) { |
| flags |= kDNSServiceFlagsMoreComing; |
| } |
| if (query->dso == NULL) { |
| if (!remove) { |
| dns_query_answer_process(flags, kDNSServiceErr_NoError, answer->fullname, |
| answer->rrtype, answer->rrclass, answer->rdlen, |
| answer->rdata, answer->ttl, query, true); |
| } |
| } else { |
| dns_push_query_answer_process(flags, kDNSServiceErr_NoError, answer->fullname, |
| answer->rrtype, answer->rrclass, answer->rdlen, |
| answer->rdata, answer->ttl, query, true); |
| } |
| answer = next; |
| } |
| dp_question_cache_remove_queries(question); |
| } |
| } |
| |
| static void |
| dp_query_context_release(void *context) |
| { |
| dnssd_query_t *query = context; |
| RELEASE_HERE(query, dnssd_query); |
| } |
| |
| static bool |
| dp_query_start(dnssd_query_t *query, int *rcode, bool *hardwired, bool dns64) |
| { |
| bool local = false; |
| question_t *question = query->question; |
| |
| if (question->served_domain != NULL) { |
| if (dnssd_hardwired_response(query, dns_question_callback)) { |
| *rcode = dns_rcode_noerror; // indicate that we already sent the response |
| *hardwired = true; |
| INFO("[Q%d] hardwired response", SERIAL(query)); |
| return true; |
| } |
| local = true; |
| } |
| |
| // If we get an SOA query for record that's under a zone cut we're authoritative for, which |
| // is the case of query->served_domain->interface != NULL, then answer with a negative response that includes |
| // our authority records, rather than waiting for the query to time out. |
| if (question->served_domain != NULL && question->served_domain->interface != NULL && !question->name[0]) { |
| // If this isn't a DNS Push query, we can signal that there is no data. Otherwise we just never send an answer since |
| // we will never have one. |
| if (query->dso == NULL) { |
| *hardwired = true; |
| } |
| return true; |
| } |
| |
| // Check if DNSServiceQueryRecord call needs to be made |
| if (question->txn == NULL) { |
| int ret = dp_start_question(question, dns64); |
| if (ret == kDNSServiceErr_Refused) { |
| *rcode = dns_rcode_servfail; |
| INFO("question was refused"); |
| } else if (ret != kDNSServiceErr_NoError) { |
| *rcode = dns_rcode_servfail; |
| INFO("[Q%d] couldn't start question", SERIAL(query)); |
| return false; |
| } |
| } else { |
| if (question->answers != NULL || question->no_data) { |
| INFO("[Q%d] answering immediately from cache", SERIAL(query)); |
| *rcode = dns_rcode_noerror; |
| return true; |
| } |
| } |
| |
| // If this isn't a DNS Push subscription, we need to respond quickly with as much data as we have. It |
| // turns out that dig gives us a second, but also that responses seem to come back in on the order of a |
| // millisecond, so we'll wait 100ms. |
| if (query->dso == NULL && local) { |
| // [DNS Discovery Proxy RFC, RFC 8766, Section 5.6, Answer Aggregation] |
| |
| // RFC8766 asks us to wait six seconds, but this is probably too long. Most likely we will have all |
| // our answers much sooner than that, and waiting this long means that we have to keep state for |
| // this long; when there are a lot of queries coming in, that can amount to too much state, causing |
| // us to drop requests we could easily have answered. |
| if (query->wakeup == NULL) { |
| query->wakeup = ioloop_wakeup_create(); |
| if (query->wakeup == NULL) { |
| *rcode = dns_rcode_servfail; |
| return false; |
| } |
| } |
| ioloop_add_wake_event(query->wakeup, query, dp_query_wakeup, dp_query_context_release, RESPONSE_WINDOW_MSECS /* ms */); |
| RETAIN_HERE(query, dnssd_query); |
| } |
| |
| INFO("[Q%d] waiting for wakeup or response", SERIAL(query)); |
| return true; |
| } |
| |
| static dnssd_query_t * |
| dp_query_create(dp_tracker_t *tracker, dns_rr_t *question, message_t *message, dso_state_t *dso, int *rcode) |
| { |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| served_domain_t *sdt = dp_served(question->name, name, sizeof name); |
| int xid = message == NULL ? 0 : ntohs(message->wire.id); |
| |
| dnssd_query_t *query = calloc(1,sizeof *query); |
| require_action_quiet(query != NULL, exit, *rcode = dns_rcode_servfail; |
| ERROR("Unable to allocate memory for query on " PRI_S_SRP, name)); |
| RETAIN_HERE(query, dnssd_query); // for the caller |
| query->serial = ++cur_query_serial; |
| |
| // If it's a query for a name served by the local discovery proxy, do an mDNS lookup. |
| if (sdt != NULL) { |
| INFO("[Q%d][QID%x] msg %p " PUB_S_SRP " question: type %d class %d " PRI_S_SRP "." PRI_S_SRP " -> " |
| PRI_S_SRP DOT_LOCAL, SERIAL(query), xid, message, dso != NULL ? "push" : " dns", |
| question->type, question->qclass, name, sdt->domain, name); |
| } else { |
| dns_name_print(question->name, name, sizeof name); |
| INFO("[Q%d][QID%x] msg %p " PUB_S_SRP " question: type %d class %d " PRI_S_SRP, SERIAL(query), xid, |
| message, dso != NULL ? "push" : " dns", question->type, question->qclass, name); |
| } |
| |
| query->response = malloc(sizeof *query->response); |
| require_action_quiet(query->response != NULL, exit, *rcode = dns_rcode_servfail; |
| ERROR("[Q%d] Unable to allocate memory for query response on " PRI_S_SRP, |
| SERIAL(query), name)); |
| |
| query->data_size = DNS_DATA_SIZE; |
| |
| // Zero out the DNS header, but not the data. |
| memset(query->response, 0, DNS_HEADER_SIZE); |
| |
| // Name now contains the name we want mDNSResponder to look up. |
| |
| // The only thing holding a reference to query is its tracker. |
| query->tracker = tracker; |
| RETAIN_HERE(query->tracker, dp_tracker); |
| |
| // Remember whether this is a long-lived query. |
| query->dso = dso; |
| |
| // Retain the question, as we will need it to send a response. |
| if (message != NULL) { |
| query->message = message; |
| ioloop_message_retain(query->message); |
| } |
| |
| // Start writing the response |
| dp_query_towire_reset(query); |
| |
| bool new_entry; |
| query->question = dp_query_question_cache_copy(question, &new_entry); |
| require_action_quiet(query->question != NULL, exit, *rcode = dns_rcode_servfail); |
| |
| // add the query to the list of queries that are asking this question. |
| dnssd_query_t **qr = &(query->question->queries); |
| while (*qr != NULL) { |
| qr = &(*qr)->question_next; |
| } |
| *qr = query; |
| // Question query list holds a reference to the query. |
| RETAIN_HERE(*qr, dnssd_query); |
| INFO("[Q%d][QID%x] msg %p " PUB_S_SRP " cache entry for question: type %d class %d " PRI_S_SRP, SERIAL(query), |
| xid, query->message, new_entry ? "new" : " existing", question->type, question->qclass, name); |
| *rcode = dns_rcode_noerror; |
| dp_num_outstanding_queries++; |
| |
| exit: |
| if (*rcode != dns_rcode_noerror && query != NULL) { |
| RELEASE_HERE(query, dnssd_query); |
| query = NULL; |
| } |
| return query; |
| } |
| |
| |
| static void |
| dns_push_query_answer_process(DNSServiceFlags flags, DNSServiceErrorType errorCode, |
| const char *fullname, uint16_t rrtype, uint16_t rrclass, |
| uint16_t rdlen, const void *rdata, uint32_t ttl, dnssd_query_t *query, bool send) |
| { |
| uint8_t *revert = query->towire.p; |
| |
| VALIDATE_TRACKER_CONNECTION_NON_NULL(); |
| |
| // From DNSSD-Hybrid, for mDNS queries: |
| // If we have cached answers, respond immediately, because we probably have all the answers. |
| // If we don't have cached answers, respond as soon as we get an answer (presumably more-coming will be false). |
| |
| // The spec says to not query if we have cached answers. We trust the DNSServiceQueryRecord call to handle this. |
| |
| // If we switch to using a single connection to mDNSResponder, we could have !more-coming trigger a flush of |
| // all outstanding queries that aren't waiting on a time trigger. This is because more-coming isn't |
| // query-specific |
| |
| INFO("[Q%d] PUSH " PRI_S_SRP " %d %d %x %d %p", SERIAL(query), fullname, rrtype, rrclass, rdlen, errorCode, query); |
| |
| // query_state_waiting means that we're answering a regular DNS question |
| if (errorCode == kDNSServiceErr_NoError) { |
| if (send) { |
| const void *rdata_to_send; |
| uint32_t ttl_to_send; |
| // If kDNSServiceFlagsAdd is set, it's an add, otherwise a delete. |
| re_add: |
| if (flags & kDNSServiceFlagsAdd) { |
| rdata_to_send = rdata; |
| ttl_to_send = ttl; |
| INFO("[Q%d] DNS Push adding record - " |
| "name: " PRI_S_SRP ", rrtype: " PUB_S_SRP ", rrclass: " PUB_S_SRP ", rdlen: %u, ttl: %u.", |
| SERIAL(query), fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, ttl_to_send); |
| } else { |
| // See <https://tools.ietf.org/html/rfc8765#section-6.3.1>. |
| #define TTL_TO_REMOVE_INDIVIDUAL_RECORDS 0xFFFFFFFF |
| #define TTL_TO_REMOVE_MULTIPLE_RECORDS 0xFFFFFFFE |
| if (rdlen == 0) { |
| // Remove specified RRset from a name in given class: |
| // TTL = 0xFFFFFFFE, RDLEN = 0, |
| // CLASS and TYPE specify the RRset being removed. |
| rdata_to_send = NULL; |
| ttl_to_send = TTL_TO_REMOVE_MULTIPLE_RECORDS; |
| } else { |
| // Remove an individual RR from a name: |
| // TTL = 0xFFFFFFFF, |
| // CLASS, TYPE, RDLEN, and RDATA specify the RR being removed. |
| rdata_to_send = rdata; |
| ttl_to_send = TTL_TO_REMOVE_INDIVIDUAL_RECORDS; |
| } |
| INFO("[Q%d] DNS Push removing record - " |
| "name: " PRI_S_SRP ", rrtype: " PUB_S_SRP ", rrclass: " PUB_S_SRP ", rdlen: %u, ttl: 0x%X.", |
| SERIAL(query), fullname, dns_rrtype_to_string(rrtype), dns_qclass_to_string(rrclass), rdlen, ttl_to_send); |
| } |
| |
| // Do the update. |
| dp_query_add_data_to_response(query, fullname, rrtype, rrclass, rdlen, rdata_to_send, |
| ttl_to_send, false, false, NULL); |
| |
| if (query->towire.truncated) { |
| query->towire.truncated = false; |
| query->towire.p = revert; |
| query->towire.error = 0; |
| dp_push_response(query, NULL); |
| dns_push_start(query); |
| goto re_add; |
| } |
| } |
| // If there isn't more coming, send a DNS Push notification now. |
| // XXX If enough comes to fill the response, send the message. |
| if (!(flags & kDNSServiceFlagsMoreComing)) { |
| dp_push_response(query, NULL); |
| } |
| } else if (errorCode != kDNSServiceErr_NoSuchRecord) { // Do nothing if kDNSServiceErr_NoSuchRecord is received. |
| ERROR("[Q%d] unexpected error code %d", SERIAL(query), errorCode); |
| dnssd_query_cancel(query); |
| } |
| } |
| |
| static void |
| dns_push_subscribe(dp_tracker_t *tracker, const dns_wire_t *header, dso_state_t *dso, dns_rr_t *question, |
| const char *activity_name, const char * UNUSED opcode_name) |
| { |
| int rcode; |
| dnssd_query_t *query = dp_query_create(tracker, question, NULL, dso, &rcode); |
| |
| if (!query) { |
| dso_simple_response(tracker->connection, NULL, header, rcode); |
| return; |
| } |
| |
| dso_activity_t *activity = dso_add_activity(dso, activity_name, push_subscription_activity_type, query, |
| dns_push_cancel); |
| RETAIN_HERE(query, dnssd_query); // The activity holds a reference to the query. |
| query->activity = activity; |
| bool dns64 = false; |
| #if SRP_FEATURE_NAT64 |
| if (srp_servers->srp_nat64_enabled) { |
| dns64 = nat64_is_active(); |
| } |
| #endif |
| bool hardwired = false; |
| if (!dp_query_start(query, &rcode, &hardwired, dns64)) { |
| dso_simple_response(tracker->connection, NULL, header, rcode); |
| dp_question_cache_remove_queries(query->question); |
| dnssd_query_cancel(query); |
| } else { |
| char nbuf[DNS_MAX_NAME_SIZE + 1]; |
| dns_name_print(question->name, nbuf, sizeof(nbuf)); |
| // The push subscribe can be considered a success at this point. |
| dso_simple_response(tracker->connection, NULL, header, dns_rcode_noerror); |
| if (hardwired) { |
| INFO("[DSO%d][Q%d] hardwired response for " PRI_S_SRP " %d %d", |
| SERIAL(dso), SERIAL(query), nbuf, question->type, question->qclass); |
| dp_push_response(query, question); |
| } else if (query->question != NULL) { |
| INFO("[DSO%d][Q%d][QU%d] replying from cache for " PRI_S_SRP " %d %d", |
| SERIAL(dso), SERIAL(query), SERIAL(query->question), nbuf, question->type, question->qclass); |
| dp_query_reply_from_cache(query->question, query, false); |
| } |
| } |
| |
| // dp_query_create() returned the query retained; when we added the query to the activity, we retained it again; |
| // if something went wrong, the second retain was released, but whether or not something went wrong, we can now |
| // safely release the initial retain. |
| RELEASE_HERE(query, dnssd_query); |
| } |
| |
| static void |
| dns_push_reconfirm(comm_t *comm, const dns_wire_t *header, dso_state_t *dso) |
| { |
| dns_rr_t question; |
| char name[DNS_MAX_NAME_SIZE + 1]; |
| uint16_t rdlen; |
| memset(&question, 0, sizeof(question)); |
| |
| // The TLV offset should always be pointing into the message. |
| unsigned offp = (unsigned)(dso->primary.payload - &header->data[0]); |
| unsigned len = offp + dso->primary.length; |
| dp_tracker_t *tracker = comm->context; |
| |
| // Parse the name, rrtype and class. We say there's no rdata even though there is |
| // because there's no ttl and also we want the raw rdata, not parsed rdata. |
| if (!dns_rr_parse(&question, header->data, len, &offp, false, false) || |
| !dns_u16_parse(header->data, len, &offp, &rdlen)) |
| { |
| dso_simple_response(comm, NULL, header, dns_rcode_formerr); |
| ERROR("[DSO%d][C%d][TRK%d] RR parse from %s failed", |
| SERIAL(dso), SERIAL(comm), SERIAL(tracker), dso->remote_name); |
| goto out; |
| } |
| if (rdlen + offp != len) { |
| dso_simple_response(comm, NULL, header, dns_rcode_formerr); |
| ERROR("[DSO%d][C%d][TRK%d] RRdata parse from %s failed: length mismatch (%d != %d)", |
| SERIAL(dso), SERIAL(comm), SERIAL(tracker), dso->remote_name, rdlen + offp, len); |
| goto out; |
| } |
| |
| if ((dp_served(question.name, name, sizeof name))) { |
| size_t name_len = strlen(name); |
| if (name_len + sizeof local_suffix > sizeof name) { |
| dso_simple_response(comm, NULL, header, dns_rcode_formerr); |
| ERROR("[DSO%d][C%d][TRK%d] name is too long for .local suffix: %s", SERIAL(dso), SERIAL(comm), SERIAL(tracker), name); |
| goto out; |
| } |
| memcpy(&name[name_len], local_suffix, sizeof local_suffix); |
| } else { |
| dns_name_print(question.name, &name[8], sizeof name - 8); |
| } |
| // transmogrify name. |
| DNSServiceReconfirmRecord(0, kDNSServiceInterfaceIndexAny, name, |
| question.type, question.qclass, rdlen, &header->data[offp]); |
| dso_simple_response(comm, NULL, header, dns_rcode_noerror); |
| out: |
| dns_rrdata_free(&question); |
| dns_name_free(question.name); |
| } |
| |
| static void |
| dns_push_unsubscribe(dso_activity_t *activity) |
| { |
| dnssd_query_t *query = activity->context; |
| dnssd_query_cancel(query); |
| // No response, unsubscribe is unidirectional. |
| } |
| |
| static void |
| dns_push_subscription_change(const char *opcode_name, dp_tracker_t *tracker, const dns_wire_t *header, dso_state_t *dso) |
| { |
| // type-in-hex/class-in-hex/name-to-subscribe |
| char activity_name[5]; |
| dso_activity_t *activity; |
| |
| // The TLV offset should always be pointing into the message. |
| unsigned offp = (unsigned)(dso->primary.payload - &header->data[0]); |
| unsigned len = offp + dso->primary.length; |
| // Get the question |
| dns_rr_t question; |
| uint16_t subscribe_xid = ntohs(header->id); |
| char nbuf[DNS_MAX_NAME_SIZE + 1]; |
| |
| memset(&question, 0, sizeof(question)); |
| if (dso->primary.opcode == kDSOType_DNSPushSubscribe) { |
| if (!dns_rr_parse(&question, header->data, offp + dso->primary.length, &offp, false, false)) { |
| dso_simple_response(tracker->connection, NULL, header, dns_rcode_formerr); |
| ERROR("[DSO%d][TRK%d] RR parse for %s from %s failed", SERIAL(dso), SERIAL(tracker), dso->remote_name, opcode_name); |
| goto out; |
| } |
| dns_name_print(question.name, nbuf, sizeof(nbuf)); |
| } else { |
| // Unsubscribes are unidirectional, so no response can be sent |
| if (!dns_u16_parse(header->data, offp + dso->primary.length, &offp, &subscribe_xid)) { |
| ERROR("unable to get subscribe xid from primary"); |
| goto out; |
| } |
| const char none[] = "none"; |
| memcpy(nbuf, none, sizeof(none)); |
| } |
| if (offp != len) { |
| if (dso->primary.opcode == kDSOType_DNSPushSubscribe) { |
| dso_simple_response(tracker->connection, NULL, header, dns_rcode_formerr); |
| } |
| ERROR("DNS push " PUB_S_SRP " parse from %s failed: length mismatch (%d != %d)", |
| dso->primary.opcode == kDSOType_DNSPushSubscribe ? "subscribe" : "unsubscribe", |
| dso->remote_name, offp, len); |
| goto out; |
| } |
| |
| // Concoct an activity name. The subscribe transaction ID is required to be unique and is used by the |
| // protocol to identify the subscription, so we can just use that. |
| snprintf(activity_name, sizeof(activity_name), "%04x", subscribe_xid); |
| |
| activity = dso_find_activity(dso, activity_name, push_subscription_activity_type, NULL); |
| if (activity == NULL) { |
| // Unsubscribe with no activity means no work to do; just return noerror. |
| if (dso->primary.opcode != kDSOType_DNSPushSubscribe) { |
| ERROR("[DSO%d][TRK%d] " PUB_S_SRP " for " PRI_S_SRP " (" PUB_S_SRP ") when no subscription exists.", |
| SERIAL(dso), SERIAL(tracker), opcode_name, nbuf, activity_name); |
| } else { |
| INFO("[DSO%d][TRK%d] " PUB_S_SRP " for " PRI_S_SRP " (" PUB_S_SRP ") type %d.", |
| SERIAL(dso), SERIAL(tracker), opcode_name, nbuf, activity_name, question.type); |
| // In this case we have a push subscribe for which no subscription exists, which means we can do it. |
| dns_push_subscribe(tracker, header, dso, &question, activity_name, opcode_name); |
| } |
| } else { |
| // We should never get two subscribes with the same transaction id. |
| if (dso->primary.opcode == kDSOType_DNSPushSubscribe) { |
| ERROR("[DSO%d][TRK%d] " PUB_S_SRP " for " PRI_S_SRP " (" PUB_S_SRP ") " |
| "xid %d when subscription already exists.", SERIAL(dso), SERIAL(tracker), |
| opcode_name, nbuf, activity_name, subscribe_xid); |
| dso_simple_response(tracker->connection, NULL, header, dns_rcode_refused); |
| } |
| // Otherwise cancel the subscription. |
| else { |
| dnssd_query_t *query = activity->context; |
| char *question_name = query->question != NULL ? query->question->name : nbuf; |
| INFO("[DSO%d][TRK%d] " PUB_S_SRP " for " PRI_S_SRP " (" PUB_S_SRP ") type %d.", |
| SERIAL(dso), SERIAL(tracker), opcode_name, question_name, activity_name, question.type); |
| dns_push_unsubscribe(activity); |
| } |
| } |
| out: |
| dns_rrdata_free(&question); |
| dns_name_free(question.name); |
| } |
| |
| static bool |
| dso_limit(dp_tracker_t *tracker, message_t *message, dp_tracker_session_type_t session_type) |
| { |
| if (num_push_sessions == MAX_DSO_CONNECTIONS) { |
| // We are too busy. Return a retry-delay response. |
| INFO("[TRK%d] no more DNS Push connections allowed--sending retry-delay: %d", SERIAL(tracker), num_push_sessions); |
| dso_retry_delay_response(tracker->connection, message, &message->wire, dns_rcode_servfail, BUSY_RETRY_DELAY_MS); |
| |
| num_push_sessions_dropped_for_load++; |
| // Cancel the connection after five seconds |
| dp_tracker_idle_after(tracker, 5, NULL); |
| return true; |
| } |
| |
| // Count this as a DSO connection. |
| (num_push_sessions)++; |
| INFO("[TRK%d] new DNS Push connection, count is now %d", SERIAL(tracker), num_push_sessions); |
| |
| tracker->session_type = session_type; |
| return false; |
| } |
| |
| static void dso_message(dp_tracker_t *tracker, message_t *message, dso_state_t *dso) |
| { |
| // For the first DSO message we get on a connection, see if we already have too many connections of |
| // the same type. We track SRP replication and DNS Push separately, because we don't want a surfeit of |
| // DNS Push messages to prevent replication from working. A surfeit of SRP Replication connections is |
| // less likely, and less problematic. |
| if (tracker->session_type == dp_tracker_session_none) { |
| if (dso->primary.opcode != kDSOType_SRPLSession) { |
| if (dso_limit(tracker, message, dp_tracker_session_push)) { |
| return; |
| } |
| } |
| } |
| |
| switch(dso->primary.opcode) { |
| case kDSOType_DNSPushSubscribe: |
| dns_push_subscription_change("DNS Push Subscribe", tracker, &message->wire, dso); |
| break; |
| case kDSOType_DNSPushUnsubscribe: |
| dns_push_subscription_change("DNS Push Unsubscribe", tracker, &message->wire, dso); |
| break; |
| |
| case kDSOType_DNSPushReconfirm: |
| dns_push_reconfirm(tracker->connection, &message->wire, dso); |
| break; |
| |
| case kDSOType_DNSPushUpdate: |
| INFO("[DSO%d][TRK%d] bogus push update message %d", SERIAL(dso), SERIAL(tracker), dso->primary.opcode); |
| dso_state_cancel(dso); |
| break; |
| |
| #if SRP_FEATURE_REPLICATION |
| case kDSOType_SRPLSession: |
| if (dso->activities != NULL) { |
| dso_state_cancel(dso); |
| ERROR("[DSO%d][TRK%d][C%d] " PRI_S_SRP ": SRP Replication session start received on a connection that is already doing DNS Push.", |
| SERIAL(dso), SERIAL(tracker), SERIAL(tracker->connection), tracker->connection->name); |
| return; |
| } |
| #ifdef SRP_TEST_SERVER |
| srpl_dso_server_message(tracker->connection, message, dso, (srp_server_t*)tracker->connection->srp_server); |
| #else |
| srpl_dso_server_message(tracker->connection, message, dso, srp_servers); |
| #endif |
| break; |
| #endif |
| |
| default: |
| INFO("[DSO%d][TRK%d] unexpected primary TLV %d", SERIAL(dso), SERIAL(tracker), dso->primary.opcode); |
| dso_simple_response(tracker->connection, NULL, &message->wire, dns_rcode_dsotypeni); |
| break; |
| } |
| // XXX free the message if we didn't consume it. |
| #ifdef SRP_TEST_SERVER |
| if (srp_test_dso_message_finished != NULL) { |
| srp_test_dso_message_finished(srp_test_tls_listener_context, message, dso); |
| } |
| #endif |
| } |
| |
| static void |
| dp_keepalive_response_send(dso_keepalive_context_t *keepalive_event, dso_state_t *dso) |
| { |
| uint8_t dsobuf[SRPL_KEEPALIVE_MESSAGE_LENGTH]; |
| dns_towire_state_t towire; |
| struct iovec iov; |
| uint16_t *p_dso_length; |
| dso_message_t state; |
| |
| if (dso->transport == NULL) { |
| ERROR("dso state " PRI_S_SRP " has no transport", dso->remote_name); |
| return; |
| } |
| |
| memset(&towire, 0, sizeof(towire)); |
| towire.p = &dsobuf[DNS_HEADER_SIZE]; |
| towire.lim = towire.p + (sizeof(dsobuf) - DNS_HEADER_SIZE); |
| towire.message = (dns_wire_t *)dsobuf; |
| towire.p_rdlength = NULL; |
| towire.p_opt = NULL; |
| p_dso_length = NULL; |
| |
| dso_make_message(&state, dsobuf, sizeof(dsobuf), dso, false /* unidirectional */, true /* response */, |
| keepalive_event->xid, dns_rcode_noerror, dso->transport); |
| dns_u16_to_wire(&towire, kDSOType_Keepalive); |
| dns_rdlength_begin(&towire); |
| dns_u32_to_wire(&towire, keepalive_event->inactivity_timeout); // Idle timeout (we are never idle) |
| dns_u32_to_wire(&towire, keepalive_event->keepalive_interval); // Keepalive timeout |
| dns_rdlength_end(&towire); |
| if (towire.error) { |
| ERROR("ran out of message space at " PUB_S_SRP ", :%d", __FILE__, towire.line); |
| return; |
| } |
| memset(&iov, 0, sizeof(iov)); |
| iov.iov_len = towire.p - dsobuf; |
| iov.iov_base = dsobuf; |
| if (!ioloop_send_message(dso->transport, NULL, &iov, 1)) { |
| INFO("send failed"); |
| return; |
| } |
| |
| INFO("sent %zd byte response Keepalive, xid %02x%02x (was %04x), to " PRI_S_SRP, |
| iov.iov_len, dsobuf[0], dsobuf[1], keepalive_event->xid, dso->transport->name); |
| } |
| |
| static void |
| dns_push_callback(void *context, void *event_context, dso_state_t *dso, dso_event_type_t eventType) |
| { |
| dso_keepalive_context_t *keepalive_context; |
| message_t *message; |
| switch(eventType) |
| { |
| case kDSOEventType_DNSMessage: |
| // We shouldn't get here because we already handled any DNS messages |
| message = event_context; |
| INFO("[DSO%d] DNS Message (opcode=%d) received from " PRI_S_SRP, SERIAL(dso), dns_opcode_get(&message->wire), |
| dso->remote_name); |
| break; |
| case kDSOEventType_DNSResponse: |
| // We shouldn't get here because we already handled any DNS messages |
| message = event_context; |
| INFO("[DSO%d] DNS Response (opcode=%d) received from " PRI_S_SRP, SERIAL(dso), dns_opcode_get(&message->wire), |
| dso->remote_name); |
| break; |
| case kDSOEventType_DSOMessage: |
| INFO("[DSO%d] DSO Message (Primary TLV=%d) received from " PRI_S_SRP, |
| SERIAL(dso), dso->primary.opcode, dso->remote_name); |
| message = event_context; |
| dso_message((dp_tracker_t *)context, message, dso); |
| break; |
| case kDSOEventType_DSOResponse: |
| INFO("[DSO%d] DSO Response (Primary TLV=%d) received from " PRI_S_SRP, |
| SERIAL(dso), dso->primary.opcode, dso->remote_name); |
| break; |
| |
| case kDSOEventType_Finalize: |
| INFO("[DSO%d] Finalize", SERIAL(dso)); |
| break; |
| |
| case kDSOEventType_Connected: |
| INFO("[DSO%d] Connected to " PRI_S_SRP, SERIAL(dso), dso->remote_name); |
| break; |
| |
| case kDSOEventType_ConnectFailed: |
| INFO("[DSO%d] Connection to " PRI_S_SRP " failed", SERIAL(dso), dso->remote_name); |
| break; |
| |
| case kDSOEventType_Disconnected: |
| INFO("[DSO%d] Connection to " PRI_S_SRP " disconnected", SERIAL(dso), dso->remote_name); |
| break; |
| case kDSOEventType_ShouldReconnect: |
| INFO("[DSO%d] Connection to " PRI_S_SRP " should reconnect (not for a server)", SERIAL(dso), dso->remote_name); |
| break; |
| case kDSOEventType_Inactive: |
| INFO("[DSO%d] Inactivity timer went off, closing connection.", SERIAL(dso)); |
| break; |
| case kDSOEventType_Keepalive: |
| INFO("[DSO%d] should send a keepalive now.", SERIAL(dso)); |
| break; |
| case kDSOEventType_KeepaliveRcvd: |
| keepalive_context = event_context; |
| keepalive_context->send_response = false; |
| INFO("[DSO%d] " PRI_S_SRP ": keepalive received, xid %04x.", SERIAL(dso), dso->transport->name, keepalive_context->xid); |
| |
| // If we are the server, we have to send a response to the keepalive. |
| if (dso->is_server) { |
| dp_keepalive_response_send(keepalive_context, dso); |
| } |
| break; |
| case kDSOEventType_RetryDelay: |
| INFO("[DSO%d] keepalive received.", SERIAL(dso)); |
| break; |
| } |
| } |
| |
| static bool |
| dp_dns_query(dp_tracker_t *tracker, message_t *message, dns_rr_t *question, int num_questions) |
| { |
| int rcode; |
| |
| // Limit outstanding queries if we don't have shared connection support |
| if (dp_num_outstanding_queries >= 256) { |
| num_queries_dropped_for_load++; |
| dso_simple_response(tracker->connection, message, &message->wire, dns_rcode_servfail); |
| ERROR("[TRK%d][QID %x] dropping query because there are too many", SERIAL(tracker), ntohs(message->wire.id)); |
| return false; |
| } |
| |
| |
| dnssd_query_t *query = dp_query_create(tracker, question, message, NULL, &rcode); |
| const char *failnote = NULL; |
| if (!query) { |
| ERROR("[TRK%d][QID %x] query create failed", SERIAL(tracker), ntohs(message->wire.id)); |
| dso_simple_response(tracker->connection, message, &message->wire, rcode); |
| return false; |
| } |
| query->num_questions = num_questions; |
| |
| dns_rcode_set(query->response, dns_rcode_noerror); |
| |
| // For DNS queries, we need to return the question. |
| query->response->qdcount = htons(1); |
| if (query->question->served_domain != NULL) { |
| TOWIRE_CHECK("name", &query->towire, dns_name_to_wire(NULL, &query->towire, query->question->name)); |
| TOWIRE_CHECK("enclosing_domain", &query->towire, |
| dns_full_name_to_wire(&query->enclosing_domain_pointer, |
| &query->towire, query->question->served_domain->domain)); |
| } else { |
| TOWIRE_CHECK("full name", &query->towire, dns_full_name_to_wire(NULL, &query->towire, query->question->name)); |
| } |
| TOWIRE_CHECK("TYPE", &query->towire, dns_u16_to_wire(&query->towire, question->type)); // TYPE |
| TOWIRE_CHECK("CLASS", &query->towire, dns_u16_to_wire(&query->towire, question->qclass)); // CLASS |
| if (failnote != NULL) { |
| ERROR("[TRK%d][QID %x] failure encoding question: " PUB_S_SRP, SERIAL(tracker), ntohs(message->wire.id), failnote); |
| goto fail; |
| } |
| |
| // Set message ID. |
| query->towire.message->id = message->wire.id; |
| |
| // We should check for OPT RR, but for now assume it's there. |
| query->is_edns0 = true; |
| |
| bool dns64 = false; |
| #if SRP_FEATURE_NAT64 |
| if (srp_servers->srp_nat64_enabled) { |
| dns64 = nat64_is_active(); |
| } |
| #endif |
| dp_query_track(tracker, query); |
| bool hardwired = false; |
| if (dp_query_start(query, &rcode, &hardwired, dns64)) { |
| // If query->question isn't NULL, we need to reply from cache |
| if (hardwired) { |
| INFO("[Q%d][TRK%d] hardwired reply", SERIAL(query), SERIAL(tracker)); |
| dp_query_send_dns_response(query, "hardwired"); |
| dp_question_cache_remove_queries(query->question); |
| RELEASE_HERE(query->question, question); |
| query->question = NULL; |
| } else if (query->question != NULL) { |
| INFO("[Q%d][TRK%d] replying from cache", SERIAL(query), SERIAL(tracker)); |
| dp_query_reply_from_cache(query->question, query, false); |
| dp_question_cache_remove_queries(query->question); |
| } else { |
| INFO("[Q%d][TRK%d] not replying from cache", SERIAL(query), SERIAL(tracker)); |
| } |
| } else { |
| INFO("[Q%d][TRK%d][QID %x] query start failed", SERIAL(query), SERIAL(tracker), ntohs(message->wire.id)); |
| fail: |
| dso_simple_response(tracker->connection, message, &message->wire, rcode); |
| query->satisfied = true; |
| dp_question_cache_remove_queries(query->question); |
| dnssd_query_cancel(query); |
| RELEASE_HERE(query, dnssd_query); |
| return false; |
| } |
| // Query is returned retained, and dp_query_track retains it, so we always need to release the reference here. |
| RELEASE_HERE(query, dnssd_query); |
| return true; |
| } |
| |
| static void |
| dp_tracker_dso_cleanup(void *UNUSED context) |
| { |
| dso_cleanup(false); |
| } |
| |
| static bool |
| dp_tracker_dso_state_change(const dso_life_cycle_t cycle, void *const context, dso_state_t *const dso) |
| { |
| if (cycle == dso_life_cycle_cancel) { |
| dp_tracker_t *tracker = context; |
| if (tracker->dso != NULL) { |
| tracker->dso = NULL; |
| if (tracker->connection != NULL) { |
| tracker->connection->dso = NULL; |
| ioloop_comm_cancel(tracker->connection); |
| } |
| for (dnssd_query_t *query = tracker->dns_queries; query != NULL; query = query->next) { |
| if (query->dso == dso) { |
| query->dso = NULL; |
| } |
| if (query->activity != NULL) { |
| query->activity = NULL; |
| // Release the activity's reference to the query. |
| RELEASE_HERE(query, dnssd_query); |
| } |
| } |
| } |
| ioloop_run_async(dp_tracker_dso_cleanup, NULL); |
| return true; |
| } |
| return false; |
| } |
| |
| static void |
| dnssd_proxy_dns_evaluate(comm_t *comm, message_t *message, dp_tracker_t *tracker) |
| { |
| dns_rr_t question; |
| unsigned offset = 0; |
| |
| if (tracker == NULL) { |
| tracker = calloc(1, sizeof(*tracker)); |
| if (tracker == NULL) { |
| ERROR("[C%d] " PRI_S_SRP ": no memory for a connection tracker object!", SERIAL(comm), comm->name); |
| goto fail; |
| } |
| tracker->connection = comm; |
| tracker->serial = ++cur_tracker_serial; |
| ioloop_comm_retain(tracker->connection); |
| if (comm->tcp_stream) { |
| ioloop_comm_context_set(comm, tracker, dp_tracker_context_release); |
| RETAIN_HERE(tracker, dp_tracker); // connection has a reference. |
| } |
| if (!comm->is_listener) { |
| ioloop_comm_disconnect_callback_set(comm, dp_tracker_disconnected); |
| } |
| } |
| RETAIN_HERE(tracker, dp_tracker); // For the function. |
| |
| // Drop incoming responses--we're a server, so we only accept queries. |
| if (dns_qr_get(&message->wire) == dns_qr_response) { |
| INFO("[TRK%d][C%d] " PRI_S_SRP ": dropping unexpected response", SERIAL(tracker), SERIAL(comm), comm->name); |
| goto fail; |
| } |
| |
| // If this is a DSO message, see if we have a session yet. |
| switch(dns_opcode_get(&message->wire)) { |
| case dns_opcode_dso: |
| if (!comm->tcp_stream) { |
| ERROR("[TRK%d][C%d] " PRI_S_SRP ": DSO message received on non-tcp socket.", SERIAL(tracker), SERIAL(comm), comm->name); |
| dso_simple_response(comm, message, &message->wire, dns_rcode_notimp); |
| goto fail; |
| } |
| |
| if (!tracker->dso) { |
| tracker->dso = dso_state_create(true, 2, comm->name, dns_push_callback, tracker, |
| dp_tracker_dso_state_change, comm); |
| if (!tracker->dso) { |
| ERROR("[TRK%d][C%d] " PRI_S_SRP ": Unable to create a dso context.", SERIAL(tracker), SERIAL(comm), comm->name); |
| dso_simple_response(comm, message, &message->wire, dns_rcode_servfail); |
| goto fail; |
| } |
| comm->dso = tracker->dso; |
| } |
| dp_tracker_not_idle(tracker); |
| dso_message_received(comm->dso, (uint8_t *)&message->wire, message->length, message); |
| break; |
| |
| case dns_opcode_query: { |
| int num_questions = ntohs(message->wire.qdcount); |
| |
| // Some Matter accessories will send queries with more than one question, and if we don't answer these |
| // queries, automations fail. So even though this is a bit weird, we need to answer the queries. |
| for (int i = 0; i < num_questions; i++) { |
| memset(&question, 0, sizeof(question)); |
| if (!dns_rr_parse(&question, message->wire.data, message->length - DNS_HEADER_SIZE, &offset, false, false)) { |
| ERROR("[TRK%d][C%d] " PRI_S_SRP ": rr parse failed.", SERIAL(tracker), SERIAL(comm), comm->name); |
| dso_simple_response(comm, message, &message->wire, dns_rcode_formerr); |
| goto fail; |
| } |
| bool success = dp_dns_query(tracker, message, &question, num_questions); |
| dns_rrdata_free(&question); |
| dns_name_free(question.name); |
| if (!success) { |
| dnssd_query_t *next = NULL, *match = NULL; |
| for (dnssd_query_t *query = tracker->dns_queries; query != NULL; query = next) { |
| next = query->next; |
| if (dp_same_message(query->message, message)) { |
| query->satisfied = true; |
| dp_question_cache_remove_queries(query->question); |
| if (match == NULL) { |
| match = query; |
| RETAIN_HERE(match, dnssd_query); |
| } |
| } |
| } |
| if (match != NULL) { |
| dnssd_query_cancel(match); |
| RELEASE_HERE(match, dnssd_query); |
| } |
| goto out; |
| } |
| } |
| dp_tracker_not_idle(tracker); |
| break; |
| } |
| // No support for other opcodes yet. |
| default: |
| dso_simple_response(comm, message, &message->wire, dns_rcode_notimp); |
| break; |
| } |
| goto out; |
| fail: |
| // For connected connections, if we exit unexpectedly, we need to cancel the connection. |
| if (comm->tcp_stream) { |
| ioloop_comm_cancel(tracker->connection); |
| } |
| out: |
| if (tracker != NULL) { |
| RELEASE_HERE(tracker, dp_tracker); // For the function. |
| } |
| } |
| |
| void |
| dns_proxy_input_for_server(comm_t *comm, srp_server_t *server_state, message_t *message, void *context) |
| { |
| char buf[INET6_ADDRSTRLEN]; |
| const char *remote_name = buf; |
| if (comm->tcp_stream) { |
| remote_name = comm->name; |
| } else { |
| IOLOOP_NTOP(&message->src, buf); |
| } |
| dp_tracker_t *tracker = comm->context; |
| INFO("[C%d][TRK%d][QID %x] Received a new DNS message - src: " PRI_S_SRP ", message length: %u bytes.", |
| SERIAL(comm), SERIAL(tracker), ntohs(message->wire.id), remote_name, message->length); |
| |
| |
| dnssd_proxy_dns_evaluate(comm, message, context); |
| } |
| |
| static void |
| dns_proxy_input(comm_t *comm, message_t *message, void *context) |
| { |
| dns_proxy_input_for_server(comm, srp_servers, message, context); |
| } |
| |
| // usage is only called when we are building standalone dnssd-proxy, not the combined one. |
| #if (!SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| static int |
| usage(const char *progname) |
| { |
| ERROR("usage: %s", progname); |
| ERROR("ex: dnssd-proxy"); |
| return 1; |
| } |
| #endif // #if (!SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) |
| |
| // Called whenever we get a connection. |
| static void UNUSED |
| connected(comm_t *comm) |
| { |
| INFO("[C%d] connection from " PRI_S_SRP, SERIAL(comm), comm->name); |
| return; |
| } |
| |
| static served_domain_t *NULLABLE |
| new_served_domain(dp_interface_t *const NULLABLE interface, const char *const NONNULL domain) |
| { |
| served_domain_t *sdt = calloc(1, sizeof *sdt); |
| if (sdt == NULL) { |
| ERROR("Unable to allocate served domain %s", domain); |
| return NULL; |
| } |
| size_t domain_len = strlen(domain); |
| sdt->domain_ld = malloc(domain_len + 2); |
| if (sdt->domain_ld == NULL) { |
| ERROR("Unable to allocate served domain name %s", domain); |
| free(sdt); |
| return NULL; |
| } |
| sdt->domain_ld[0] = '.'; |
| sdt->domain = sdt->domain_ld + 1; |
| memcpy(sdt->domain, domain, domain_len + 1); |
| sdt->domain_name = dns_pres_name_parse(sdt->domain); |
| sdt->interface = interface; |
| if (sdt->domain_name == NULL) { |
| if (interface != NULL) { |
| ERROR("invalid domain name for interface %s: %s", interface->name, sdt->domain); |
| } else { |
| ERROR("invalid domain name: %s", sdt->domain); |
| } |
| free(sdt); |
| return NULL; |
| } |
| sdt->next = served_domains; |
| served_domains = sdt; |
| |
| INFO("new served domain created - domain name: " PRI_S_SRP, sdt->domain); |
| return sdt; |
| } |
| |
| #if STUB_ROUTER |
| static served_domain_t *NULLABLE |
| find_served_domain(const char *const NONNULL domain) |
| { |
| served_domain_t *current; |
| for (current = served_domains; current != NULL; current = current->next) { |
| if (strcasecmp(domain, current->domain) == 0) { |
| break; |
| } |
| } |
| |
| return current; |
| } |
| #endif |
| |
| // served domain can only go away when combined with srp-mdns-proxy and interface going up and down. |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static void |
| served_domain_free(served_domain_t *const served_domain) |
| { |
| INFO("served domain removed - domain name: " PRI_S_SRP, served_domain->domain); |
| |
| // free struct interface *NULLABLE interface |
| if (served_domain->interface != NULL) { |
| interface_addr_t *current = served_domain->interface->addresses; |
| interface_addr_t *next; |
| for (;current != NULL; current = next) { |
| next = current->next; |
| free(current); |
| } |
| if (served_domain->interface->name != NULL) { |
| free(served_domain->interface->name); |
| } |
| free(served_domain->interface); |
| } |
| |
| // free hardwired_t *NULLABLE hardwired_responses |
| if (served_domain->hardwired_responses != NULL) { |
| hardwired_t *current = served_domain->hardwired_responses; |
| hardwired_t *next; |
| for (; current != NULL; current = next) { |
| next = current->next; |
| free(current); |
| } |
| } |
| |
| // free dns_name_t *NONNULL domain_name; |
| if (served_domain->domain_name != NULL) { |
| dns_name_free(served_domain->domain_name); |
| } |
| |
| // free char *NONNULL domain_ld; |
| free(served_domain->domain_ld); |
| |
| #ifdef SRP_TEST_SERVER |
| last_freed_domain = served_domain; |
| #endif |
| |
| // free served_domain_t * |
| free(served_domain); |
| } |
| |
| static void |
| delete_served_domain(served_domain_t *const served_domain) |
| { |
| if (served_domain->questions == NULL) { |
| served_domain_free(served_domain); |
| } |
| } |
| |
| #if STUB_ROUTER |
| served_domain_t * |
| delete_served_domain_by_interface_name(const char *const NONNULL interface_name) |
| { |
| served_domain_t *current; |
| served_domain_t *prev = NULL; |
| for(current= served_domains; current != NULL; prev = current, current = current->next) { |
| if (current->interface == NULL) { |
| continue; |
| } |
| if (strcmp(interface_name, current->interface->name) != 0) { |
| continue; |
| } |
| |
| INFO("served domain deleted with interface - " |
| "domain: " PRI_S_SRP ", interface name: " PUB_S_SRP, current->domain, interface_name); |
| |
| // Since we are removing the entire served domain and the interface, the addresses that are associated with |
| // this interface will also be removed. Therefore, any hardwired response that contains these addresses should |
| // also be removed. |
| for (interface_addr_t *address = current->interface->addresses; address != NULL; address = address->next) { |
| dnssd_hardwired_process_addr_change(&address->addr, &address->mask, false); |
| } |
| |
| if (prev == NULL) { |
| served_domains = current->next; |
| } else { |
| prev->next = current->next; |
| } |
| |
| delete_served_domain(current); |
| break; |
| } |
| |
| return current; |
| } |
| #endif // STUB_ROUTER |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| // Dynamic interface detection... |
| // This is called whenever a new interface address is encountered. |
| |
| void |
| dnssd_proxy_ifaddr_callback(srp_server_t *UNUSED server_state, void *UNUSED context, const char *name, |
| const addr_t *address, const addr_t *mask, uint32_t UNUSED flags, |
| enum interface_address_change event_type) |
| { |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| bool is_new_interface = true; |
| #endif |
| bool succeeded; |
| const char *const action = (event_type == interface_address_added ? "Adding" : "Removing"); |
| |
| if (event_type == interface_address_unchanged) { |
| goto exit; |
| } |
| |
| int interface_index = if_nametoindex(name); |
| if (address->sa.sa_family == AF_INET) { |
| IPv4_ADDR_GEN_SRP((const uint8_t *)&address->sin.sin_addr, addr_buf); |
| IPv4_ADDR_GEN_SRP((const uint8_t *)&mask->sin.sin_addr, mask_buf); |
| INFO("Interface " PUB_S_SRP " address " PRI_IPv4_ADDR_SRP " mask " PRI_IPv4_ADDR_SRP " index %d " PUB_S_SRP, |
| name, IPv4_ADDR_PARAM_SRP((const uint8_t *)&address->sin.sin_addr, addr_buf), |
| IPv4_ADDR_PARAM_SRP((const uint8_t *)&mask->sin.sin_addr, mask_buf), interface_index, |
| event_type == interface_address_added ? "added" : "removed"); |
| } else if (address->sa.sa_family == AF_INET6) { |
| IPv6_ADDR_GEN_SRP((const uint8_t *)&address->sin6.sin6_addr, addr_buf); |
| IPv6_ADDR_GEN_SRP((const uint8_t *)&mask->sin6.sin6_addr, mask_buf); |
| INFO("Interface " PUB_S_SRP " address " PRI_IPv6_ADDR_SRP " mask " PRI_IPv6_ADDR_SRP " index %d " PUB_S_SRP, |
| name, IPv6_ADDR_PARAM_SRP((const uint8_t *)&address->sin6.sin6_addr, addr_buf), |
| IPv6_ADDR_PARAM_SRP((const uint8_t *)&mask->sin6.sin6_addr, mask_buf), interface_index, |
| event_type == interface_address_added ? "added" : "removed"); |
| } else { |
| INFO("Interface " PUB_S_SRP " address type %d index %d " PUB_S_SRP, name, address->sa.sa_family, interface_index, |
| event_type == interface_address_added ? "added" : "removed"); |
| INFO("ignoring non IP address"); |
| goto exit; |
| } |
| |
| #if THREAD_BORDER_ROUTER && SRP_FEATURE_COMBINED_DNSSD_PROXY |
| // Ignore Thread interface |
| bool is_valid_address = thread_interface_name == NULL || strcmp(thread_interface_name, name) != 0; |
| if (!is_valid_address) { |
| INFO("skipping thread interface address"); |
| goto exit; |
| } |
| #endif |
| |
| // Add/remove the address from the corresponding served domain. |
| served_domain_t **sp = &served_domains; |
| while (*sp != NULL) { |
| served_domain_t *current = *sp; |
| // Only change the served domain that owns the current interface and address. |
| if (current->interface == NULL || current->interface->ifindex == 0 || |
| strcmp(current->interface->name, name) != 0) { |
| goto again; |
| } |
| |
| INFO(PUB_S_SRP " address from the served domain - domain: " PRI_S_SRP, action, current->domain); |
| succeeded = interface_process_addr_change(current->interface, address, mask, event_type); |
| require_action_quiet(succeeded, exit, ERROR("failed to " PUB_S_SRP " new interface address", action)); |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| is_new_interface = false; |
| |
| // if interface loses all usable IP addresses, the interface has gone, remove this interface and the |
| // corresponding served domain. |
| if (event_type == interface_address_deleted) { |
| if (current->interface->addresses == NULL) { |
| INFO("Removing served domain with 0 address - domain: " PRI_S_SRP ", interface name: " PUB_S_SRP, |
| current->domain, current->interface->name); |
| *sp = current->next; |
| delete_served_domain(current); |
| continue; |
| } |
| } |
| #else // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| if (current->interface->addresses == NULL) { |
| current->interface->ifindex = 0; |
| } |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| again: |
| sp = &(*sp)->next; |
| } |
| |
| // We will only create new served domain from dnssd_proxy_ifaddr_callback if the callback gets called from |
| // srp-mdns-proxy. |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| if (event_type == interface_address_added && is_new_interface) { |
| served_domain_t *const new_served_domain = add_new_served_domain_with_interface(name, address, mask); |
| require_action_quiet(new_served_domain != NULL, exit, |
| ERROR("failed to add new served domain ""- interface name: " PUB_S_SRP, name)); |
| |
| bool hardwired_set = dnssd_hardwired_setup_for_served_domain(new_served_domain); |
| if (!hardwired_set) { |
| ERROR("failed to setup hardwired response for newly created served domain - domain: " PRI_S_SRP, name); |
| delete_served_domain(new_served_domain); |
| } |
| INFO("New served domain created and hardwired response created - domain: " PRI_S_SRP, |
| new_served_domain->domain); |
| } |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| #if STUB_ROUTER |
| // Added or removed address will possibly need hardwired response to be updated. |
| dnssd_hardwired_process_addr_change(address, mask, event_type == interface_address_added); |
| #endif |
| |
| exit: |
| return; |
| } |
| |
| #if !SRP_FEATURE_DYNAMIC_CONFIGURATION |
| // Config file parsing... |
| static bool |
| interface_handler(void * UNUSED context, const char * UNUSED filename, char **hunks, int UNUSED num_hunks, |
| int UNUSED lineno) |
| { |
| dp_interface_t *interface = calloc(1, sizeof *interface); |
| if (interface == NULL) { |
| ERROR("Unable to allocate interface %s", hunks[1]); |
| return false; |
| } |
| |
| interface->name = strdup(hunks[1]); |
| if (interface->name == NULL) { |
| ERROR("Unable to allocate interface name %s", hunks[1]); |
| free(interface); |
| return false; |
| } |
| |
| if (!strcmp(hunks[0], "nopush")) { |
| interface->no_push = true; |
| } |
| |
| if (new_served_domain(interface, hunks[2]) == NULL) { |
| free(interface->name); |
| free(interface); |
| return false; |
| } |
| return true; |
| } |
| |
| static bool |
| port_handler(void * UNUSED context, const char * UNUSED filename, char **hunks, int UNUSED num_hunks, int UNUSED lineno) |
| { |
| char *ep = NULL; |
| long port = strtol(hunks[1], &ep, 10); |
| if (port < 0 || port > 65535 || *ep != 0) { |
| ERROR("Invalid port number: %s", hunks[1]); |
| return false; |
| } |
| if (!strcmp(hunks[0], "udp-port")) { |
| dnssd_proxy_udp_port = port; |
| } else if (!strcmp(hunks[0], "tcp-port")) { |
| dnssd_proxy_tcp_port = port; |
| } else if (!strcmp(hunks[0], "tls-port")) { |
| dnssd_proxy_tls_port = port; |
| } |
| return true; |
| } |
| |
| static bool |
| config_string_handler(char **ret, const char * UNUSED filename, const char *string, int UNUSED lineno, bool tdot, |
| bool ldot) |
| { |
| char *s; |
| int add_trailing_dot = 0; |
| int add_leading_dot = ldot ? 1 : 0; |
| size_t len = strlen(string); |
| |
| // Space for NUL and leading dot. |
| if (tdot && len > 0 && string[len - 1] != '.') { |
| add_trailing_dot = 1; |
| } |
| s = malloc(strlen(string) + add_leading_dot + add_trailing_dot + 1); |
| if (s == NULL) { |
| ERROR("Unable to allocate domain name %s", string); |
| return false; |
| } |
| *ret = s; |
| if (ldot) { |
| *s++ = '.'; |
| } |
| memcpy(s, string, len + add_leading_dot + add_trailing_dot + 1); |
| if (add_trailing_dot) { |
| s[len] = '.'; |
| s[len + 1] = 0; |
| } |
| return true; |
| } |
| |
| static bool |
| my_name_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| static char *new_name = NULL; |
| if (new_name != NULL) { |
| free(new_name); |
| my_name = NULL; |
| new_name = NULL; |
| } |
| if (!config_string_handler(&new_name, filename, hunks[1], lineno, false, false)) { |
| return false; |
| } |
| my_name = new_name; |
| size_t len = strlen(my_name); |
| size_t bigger = sizeof(DOT_HOME_NET_DOMAIN) > sizeof(DOT_LOCAL) ? sizeof(DOT_HOME_NET_DOMAIN) : sizeof(DOT_LOCAL); |
| if (len >= sizeof(local_host_name) - bigger) { |
| ERROR("truncating local hostname %s", my_name); |
| return false; |
| } |
| |
| // Set up existing local host name with .local. suffix |
| snprintf(local_host_name_dot_local, sizeof(local_host_name_dot_local), "%s" DOT_LOCAL, my_name); |
| |
| // Set up existing local host name with .home.net. suffix |
| snprintf(local_host_name, sizeof(local_host_name), "%s" DOT_HOME_NET_DOMAIN, my_name); |
| return true; |
| } |
| |
| static bool |
| listen_addr_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| if (num_listen_addrs == MAX_ADDRS) { |
| ERROR("Only %d IPv4 listen addresses can be configured.", MAX_ADDRS); |
| return false; |
| } |
| return config_string_handler(&listen_addrs[num_listen_addrs++], filename, hunks[1], lineno, false, false); |
| } |
| |
| static bool |
| publish_addr_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| if (num_publish_addrs == MAX_ADDRS) { |
| ERROR("Only %d addresses can be published.", MAX_ADDRS); |
| return false; |
| } |
| return config_string_handler(&publish_addrs[num_publish_addrs++], filename, hunks[1], lineno, false, false); |
| } |
| |
| static bool |
| tls_key_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| return config_string_handler(&tls_key_filename, filename, hunks[1], lineno, false, false); |
| } |
| |
| static bool |
| tls_cert_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| return config_string_handler(&tls_cert_filename, filename, hunks[1], lineno, false, false); |
| } |
| |
| static bool |
| tls_cacert_handler(void * UNUSED context, const char *filename, char **hunks, int UNUSED num_hunks, int lineno) |
| { |
| return config_string_handler(&tls_cacert_filename, filename, hunks[1], lineno, false, false); |
| } |
| |
| config_file_verb_t dp_verbs[] = { |
| { "interface", 3, 3, interface_handler }, // interface <name> <domain> |
| { "nopush", 3, 3, interface_handler }, // nopush <name> <domain> |
| { "udp-port", 2, 2, port_handler }, // udp-port <number> |
| { "tcp-port", 2, 2, port_handler }, // tcp-port <number> |
| { "tls-port", 2, 2, port_handler }, // tls-port <number> |
| { "my-name", 2, 2, my_name_handler }, // my-name <domain name> |
| { "tls-key", 2, 2, tls_key_handler }, // tls-key <filename> |
| { "tls-cert", 2, 2, tls_cert_handler }, // tls-cert <filename> |
| { "tls-cacert", 2, 2, tls_cacert_handler }, // tls-cacert <filename> |
| { "listen-addr", 2, 2, listen_addr_handler }, // listen-addr <IP address> |
| { "publish-addr", 2, 2, publish_addr_handler } // publish-addr <IP address> |
| }; |
| #define NUMCFVERBS ((sizeof dp_verbs) / sizeof (config_file_verb_t)) |
| #endif // !SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| static wakeup_t *tls_listener_wakeup; |
| static int tls_listener_index; |
| static void dnssd_tls_listener_restart(comm_t *NONNULL listener, void *NULLABLE context); |
| |
| static void dnssd_tls_key_change_notification_send(void) |
| { |
| static int dnssd_tls_change_notification_token = NOTIFY_TOKEN_INVALID; |
| |
| if (dnssd_tls_change_notification_token == NOTIFY_TOKEN_INVALID) { |
| uint32_t notifyStatus = notify_register_check(kDNSSDAdvertisingProxyTLSKeyUpdateNotification, |
| &dnssd_tls_change_notification_token); |
| if (notifyStatus != NOTIFY_STATUS_OK) { |
| dnssd_tls_change_notification_token = NOTIFY_TOKEN_INVALID; |
| ERROR("notify_register_check(%s) failed with %u", kDNSSDAdvertisingProxyTLSKeyUpdateNotification, notifyStatus); |
| return; |
| } |
| } |
| |
| if (dnssd_tls_change_notification_token != NOTIFY_TOKEN_INVALID) { |
| uint32_t notifyStatus = notify_post(kDNSSDAdvertisingProxyTLSKeyUpdateNotification); |
| if (notifyStatus != NOTIFY_STATUS_OK) { |
| ERROR("notify_post(%s) %u", kDNSSDAdvertisingProxyTLSKeyUpdateNotification, notifyStatus); |
| notify_cancel(dnssd_tls_change_notification_token); |
| dnssd_tls_change_notification_token = NOTIFY_TOKEN_INVALID; |
| } |
| } |
| } |
| |
| static void |
| dnssd_tls_listener_ready(void *UNUSED context, uint16_t port) |
| { |
| #ifdef SRP_TEST_SERVER |
| if (srp_test_dnssd_tls_listener_ready != NULL) { |
| srp_test_dnssd_tls_listener_ready(srp_test_tls_listener_context, port); |
| } |
| #else |
| (void)context; |
| (void)port; |
| #endif |
| } |
| |
| static void dnssd_tls_listener_listen(void *context, bool init_daemon) |
| { |
| addr_t addr; |
| INFO("starting DoT listener"); |
| memset(&addr, 0, sizeof(addr)); |
| addr.sa.sa_family = AF_UNSPEC; |
| #ifndef NOT_HAVE_SA_LEN |
| addr.sa.sa_len = sizeof(addr.sin6); |
| #endif |
| addr.sin6.sin6_port = htons(dnssd_proxy_tls_port); |
| #ifndef EXCLUDE_TLS |
| dnssd_proxy_listeners[tls_listener_index] = |
| ioloop_listener_create(true, true, init_daemon, NULL, 0, &addr, NULL, "DNS over TLS", |
| dns_proxy_input, NULL, dnssd_tls_listener_restart, dnssd_tls_listener_ready, |
| NULL, srp_tls_configure, 0, context); |
| #else |
| dnssd_proxy_listeners[tls_listener_index] = |
| ioloop_listener_create(true, true, init_daemon, NULL, 0, &addr, NULL, "DNS over TLS", |
| dns_proxy_input, NULL, dnssd_tls_listener_restart, dnssd_tls_listener_ready, |
| NULL, NULL, 0, context); |
| #endif |
| if (dnssd_proxy_listeners[tls_listener_index] == NULL) { |
| ERROR("DNS Push listener: fail."); |
| goto exit; |
| } |
| |
| // Notify about intial key update |
| dnssd_tls_key_change_notification_send(); |
| |
| // Schedule a wake up timer to rotate the expired TLS certificate. |
| schedule_tls_certificate_rotation(&tls_listener_wakeup, dnssd_proxy_listeners[tls_listener_index]); |
| exit: |
| return; |
| } |
| |
| static void dnssd_tls_listener_relisten(void *context) |
| { |
| dnssd_tls_listener_listen(context, false); |
| } |
| |
| static void |
| dnssd_tls_listener_restart(comm_t *UNUSED in_listener, void *context) |
| { |
| const bool doing_rotation = dnssd_proxy_listeners[tls_listener_index]->tls_rotation_ready; |
| ioloop_listener_release(dnssd_proxy_listeners[tls_listener_index]); |
| dnssd_proxy_listeners[tls_listener_index] = NULL; |
| |
| if (doing_rotation) { |
| const bool succeeded = srp_tls_init(); |
| if (!succeeded) { |
| FAULT("srp_tls_init failed."); |
| return; |
| } |
| |
| // Send TLS key update notification |
| dnssd_tls_key_change_notification_send(); |
| dnssd_tls_listener_listen(NULL, false); |
| } else { |
| INFO("Creation of TLS listener failed; reattempting in 10s."); |
| |
| if (tls_listener_wakeup == NULL) { |
| tls_listener_wakeup = ioloop_wakeup_create(); |
| if (tls_listener_wakeup == NULL) { |
| ERROR("Unable to allocate wakeup in order to re-attempt TLS listener creation."); |
| return; |
| } |
| } |
| ioloop_add_wake_event(tls_listener_wakeup, context, dnssd_tls_listener_relisten, NULL, 10 * MSEC_PER_SEC); |
| } |
| } |
| |
| static void |
| dnssd_push_setup(void) |
| { |
| tls_listener_index = dnssd_proxy_num_listeners++; |
| dnssd_tls_listener_listen(NULL, true); |
| |
| // Only set hardwired response when dynamic configuration is enabled. Dynamic configuration |
| // sets up hardwired response when new address of the interface is added. |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION // not set hardwired response for now |
| dnssd_hardwired_push_setup(); |
| #endif // !SRP_FEATURE_DYNAMIC_CONFIGURATION |
| } |
| |
| #if (!SRP_FEATURE_CAN_GENERATE_TLS_CERT) |
| |
| // Start a key generation or cert signing program. Arguments are key=value pairs. |
| // Arguments that can be constant should be <"key=value", NULL>. Arguments that |
| // have a variable component should be <"key", value">. References to arguments |
| // will be held, except that if the rhs of the pair is variable, memory is allocated |
| // to store the key=value pair, so the neither the key nor the value is retained. |
| // The callback is called when the program exits. |
| |
| static void |
| keyprogram_start(const char *program, subproc_callback_t callback, ...) |
| { |
| #define MAX_SUBPROC_VARS 3 |
| size_t lens[MAX_SUBPROC_VARS]; |
| char *vars[MAX_SUBPROC_VARS]; |
| int num_vars = 0; |
| char *argv[MAX_SUBPROC_ARGS + 1]; |
| int argc = 0; |
| va_list vl; |
| int i; |
| subproc_t *subproc = NULL; |
| |
| va_start(vl, callback); |
| while (true) { |
| char *vname, *value; |
| char *arg; |
| |
| vname = va_arg(vl, char *); |
| if (vname == NULL) { |
| break; |
| } |
| value = va_arg(vl, char *); |
| |
| if (argc >= MAX_SUBPROC_ARGS) { |
| ERROR("keyprogram_start: too many arguments."); |
| } |
| |
| if (value == NULL) { |
| arg = vname; |
| } else { |
| if (num_vars >= MAX_SUBPROC_VARS) { |
| ERROR("Too many variable args: %s %s", vname, value); |
| goto out; |
| } |
| lens[num_vars] = strlen(vname) + strlen(value) + 2; |
| vars[num_vars] = malloc(lens[num_vars]); |
| if (vars[num_vars] == NULL) { |
| ERROR("No memory for variable key=value %s %s", vname, value); |
| goto out; |
| } |
| snprintf(vars[num_vars], lens[num_vars], "%s=%s", vname, value); |
| arg = vars[num_vars]; |
| num_vars++; |
| } |
| argv[argc++] = arg; |
| } |
| argv[argc] = NULL; |
| subproc = ioloop_subproc(program, argv, argc, callback, NULL, NULL); |
| if (subproc != NULL) { |
| ioloop_subproc_run_sync(subproc); |
| ioloop_subproc_release(subproc); |
| } |
| out: |
| for (i = 0; i < num_vars; i++) { |
| free(vars[i]); |
| } |
| } |
| |
| static bool |
| finished_okay(const char *context, int status, const char *error) |
| { |
| // If we get an error, something failed before the program had been successfully started. |
| if (error != NULL) { |
| ERROR("%s failed on startup: %s", context, error); |
| } |
| |
| // The key file generation process completed |
| else if (WIFEXITED(status)) { |
| if (WEXITSTATUS(status) != 0) { |
| ERROR("%s program exited with status %d", context, status); |
| // And that means we don't have DNS Push--sorry! |
| } else { |
| return true; |
| } |
| } else if (WIFSIGNALED(status)) { |
| ERROR("%s program exited on signal %d", context, WTERMSIG(status)); |
| // And that means we don't have DNS Push--sorry! |
| } else if (WIFSTOPPED(status)) { |
| ERROR("%s program stopped on signal %d", context, WSTOPSIG(status)); |
| // And that means we don't have DNS Push--sorry! |
| } else { |
| ERROR("%s program exit status unknown: %d", context, status); |
| // And that means we don't have DNS Push--sorry! |
| } |
| return false; |
| } |
| |
| // Called after the cert has been generated. |
| static void |
| certfile_finished_callback(void *NULLABLE context, int status, const char *error) |
| { |
| (void)context; |
| |
| // If we were able to generate a cert, we can start DNS Push service and start advertising it. |
| if (finished_okay("Certificate signing", status, error)) { |
| int i = dnssd_proxy_num_listeners; |
| |
| dnssd_push_setup(); |
| |
| for (; i < dnssd_proxy_num_listeners; i++) { |
| INFO("Started " PUB_S_SRP, dnssd_proxy_listeners[i]->name); |
| } |
| } |
| } |
| |
| // Called after the key has been generated. |
| static void |
| keyfile_finished_callback(void *context, int status, const char *error) |
| { |
| (void)context; |
| if (finished_okay("Keyfile generation", status, error)) { |
| INFO("Keyfile generation completed."); |
| |
| // XXX dates need to not be constant!!! |
| keyprogram_start(CERTWRITE_PROGRAM, certfile_finished_callback, |
| "selfsign=1", NULL, "issuer_key", tls_key_filename, "issuer_name=CN", my_name, |
| "not_before=20210825000000", NULL, "not_after=20230824235959", NULL, "is_ca=1", NULL, |
| "max_pathlen=0", NULL, "output_file", tls_cert_filename, NULL); |
| } |
| |
| } |
| #endif // #if (SRP_FEATURE_CAN_GENERATE_TLS_CERT) |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static served_domain_t *NONNULL |
| add_new_served_domain_with_interface(const char *const NONNULL name, |
| const addr_t *const NULLABLE address, const addr_t *const NULLABLE mask) |
| { |
| dp_interface_t *new_interface = NULL; |
| served_domain_t *served_domain = NULL; |
| bool local_only_interface = !strcmp(LOCAL_ONLY_PSEUDO_INTERFACE, name); |
| bool locally_served_interface = !local_only_interface && !strcmp(ALL_LOCALS_PSEUDO_INTERFACE, name); |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| bool infrastructure_interface = !locally_served_interface && !strcmp(INFRASTRUCTURE_PSEUDO_INTERFACE, name); |
| #endif |
| bool succeeded; |
| |
| new_interface = calloc(1, sizeof(*new_interface)); |
| require_action_quiet(new_interface != NULL, exit, succeeded = false; |
| ERROR("calloc failed - name: " PRI_S_SRP ", allocate size: %lu", name, sizeof(*new_interface))); |
| |
| new_interface->name = strdup(name); |
| require_action_quiet(new_interface->name != NULL, exit, succeeded = false; |
| ERROR("strdup failed to copy interface name - interface name: " PRI_S_SRP, name)); |
| |
| if (local_only_interface) { |
| new_interface->ifindex = kDNSServiceInterfaceIndexLocalOnly; |
| } else if (locally_served_interface) { |
| new_interface->ifindex = kDNSServiceInterfaceIndexAny; |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| } else if (infrastructure_interface) { |
| new_interface->ifindex = kDNSServiceInterfaceIndexInfra; |
| #endif |
| } else { |
| new_interface->ifindex = if_nametoindex(name); |
| } |
| |
| // Enable DNS push by default. |
| new_interface->no_push = false; |
| |
| if (address != NULL) { |
| require_action_quiet(mask != NULL, exit, succeeded = false); |
| |
| new_interface->addresses = calloc(1, sizeof(*new_interface->addresses)); |
| require_action_quiet(new_interface->addresses != NULL, exit, succeeded = false; |
| ERROR("calloc failed - allocated size: %lu", sizeof(*new_interface->addresses))); |
| new_interface->addresses->addr = *address; |
| new_interface->addresses->mask = *mask; |
| } |
| |
| char *per_interface_served_domain; |
| #if STUB_ROUTER |
| char served_domain_buffer[DNS_MAX_NAME_SIZE]; |
| #endif |
| if (local_only_interface) { |
| // All queries sent to <Thread ID>.thread.home.arpa. will only be proxied to local only interface. |
| per_interface_served_domain = THREAD_DOMAIN_WITH_ID; |
| } else if (locally_served_interface) { |
| per_interface_served_domain = DEFAULT_SERVICE_ARPA_DOMAIN; |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| } else if (infrastructure_interface) { |
| per_interface_served_domain = DOT_LOCAL_DOMAIN; |
| #endif |
| } else { |
| #if STUB_ROUTER |
| int bytes_written = snprintf(served_domain_buffer, sizeof(served_domain_buffer), |
| "%s-%s." HOME_NET_DOMAIN, local_host_name, name); |
| require_action_quiet(bytes_written > 0 && (size_t)bytes_written < sizeof(served_domain_buffer), exit, |
| succeeded = false; |
| ERROR("snprintf failed - local host name: " PRI_S_SRP ", interface name: " PUB_S_SRP |
| ", name buffer size: %lu", my_name, name, sizeof(served_domain_buffer)) |
| ); |
| per_interface_served_domain = served_domain_buffer; |
| #else |
| ERROR("unexpected served domain " PRI_S_SRP, name); |
| succeeded = false; |
| goto exit; |
| #endif |
| } |
| |
| served_domain = new_served_domain(new_interface, per_interface_served_domain); |
| require_action_quiet(served_domain != NULL, exit, succeeded = false; |
| ERROR("new_served_domain failed - interface name: " PUB_S_SRP ", served domain: " PRI_S_SRP, |
| name, per_interface_served_domain) |
| ); |
| |
| succeeded = true; |
| INFO("new served domain added with interface - served domain: " PUB_S_SRP ", interface name: " PUB_S_SRP, |
| per_interface_served_domain, name); |
| exit: |
| if (!succeeded) { |
| if (new_interface != NULL) { |
| if (new_interface->addresses != NULL) { |
| verify_action(new_interface->addresses->next == NULL, |
| ERROR("multiple addresses added for this new interface")); |
| free(new_interface->addresses); |
| } |
| if (new_interface->name != NULL) { |
| free(new_interface->name); |
| } |
| free(new_interface); |
| } |
| } |
| |
| return served_domain; |
| } |
| #endif // !SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| static bool |
| interface_addr_t_equal(const interface_addr_t *const NONNULL a, const interface_addr_t *const NONNULL b) |
| { |
| bool equal; |
| const addr_t *const a_addr = &a->addr; |
| const addr_t *const a_mask = &a->mask; |
| const addr_t *const b_addr = &b->addr; |
| const addr_t *const b_mask = &b->mask; |
| |
| if (a_addr->sa.sa_family != b_addr->sa.sa_family) { |
| equal = false; |
| goto exit; |
| } |
| |
| require_action_quiet(a_addr->sa.sa_family == a_mask->sa.sa_family, exit, equal = false; |
| ERROR("A address and mask are not in the same sa_family - address family: %d, mask family: %d", |
| a_addr->sa.sa_family, a_mask->sa.sa_family) |
| ); |
| |
| require_action_quiet(b_addr->sa.sa_family == b_mask->sa.sa_family, exit, equal = false; |
| ERROR("B address and mask are no in the same sa_family - address family: %d, mask family: %d", |
| b_addr->sa.sa_family, b_mask->sa.sa_family) |
| ); |
| |
| if (a_addr->sa.sa_family == AF_INET) { |
| if (a_addr->sin.sin_addr.s_addr != b_addr->sin.sin_addr.s_addr) { |
| equal = false; |
| goto exit; |
| } |
| |
| if (a_mask->sin.sin_addr.s_addr != b_mask->sin.sin_addr.s_addr) { |
| equal = false; |
| goto exit; |
| } |
| } else { // a_addr->sa.sa_family == AF_INET6 |
| if (memcmp(&a_addr->sin6.sin6_addr, &b_addr->sin6.sin6_addr, sizeof(a_addr->sin6.sin6_addr)) != 0) { |
| equal = false; |
| goto exit; |
| } |
| |
| if (memcmp(&a_mask->sin6.sin6_addr, &b_mask->sin6.sin6_addr, sizeof(a_mask->sin6.sin6_addr)) != 0) { |
| equal = false; |
| goto exit; |
| } |
| } |
| |
| equal = true; |
| exit: |
| return equal; |
| } |
| |
| static bool |
| interface_add_new_address(dp_interface_t *const NONNULL interface, const addr_t *const NONNULL address, |
| const addr_t *const NONNULL mask) |
| { |
| bool succeeded; |
| |
| interface_addr_t *new_if_addr = calloc(1, sizeof(*new_if_addr)); |
| require_action_quiet(new_if_addr != NULL, exit, succeeded = false; |
| ERROR("calloc failed - allocated size: %zu", sizeof(*new_if_addr))); |
| new_if_addr->addr = *address; |
| new_if_addr->mask = *mask; |
| new_if_addr->next = NULL; |
| |
| interface_addr_t **ap; |
| |
| for (ap = &interface->addresses; *ap != NULL; ap = &(*ap)->next) |
| ; |
| |
| *ap = new_if_addr; |
| succeeded = true;; |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| interface_remove_old_address(dp_interface_t *const NONNULL interface, const addr_t *const NONNULL address, |
| const addr_t *const NONNULL mask) |
| { |
| bool succeeded; |
| interface_addr_t addr_to_remove = {NULL, *address, *mask}; |
| interface_addr_t **ap; |
| interface_addr_t *current; |
| |
| for (ap = &interface->addresses; *ap != NULL; ap = &(*ap)->next) { |
| if (interface_addr_t_equal(*ap, &addr_to_remove)) { |
| break; |
| } |
| } |
| if (*ap == NULL) { |
| INFO("address not found in the interface address list - interface name: " PUB_S_SRP, interface->name); |
| succeeded = false; |
| goto exit; |
| } |
| current = *ap; |
| *ap = current->next; |
| free(current); |
| |
| succeeded = true; |
| exit: |
| return succeeded; |
| } |
| |
| static bool |
| interface_process_addr_change(dp_interface_t *const NONNULL interface, const addr_t *const NONNULL address, |
| const addr_t *const NONNULL mask, const enum interface_address_change event_type) |
| { |
| bool succeeded; |
| |
| require_action_quiet(event_type != interface_address_unchanged, exit, succeeded = false; |
| INFO("no address change event happens")); |
| |
| if (event_type == interface_address_added) { |
| succeeded = interface_add_new_address(interface, address, mask); |
| } else { // event_type == interface_address_removed |
| succeeded = interface_remove_old_address(interface, address, mask); |
| } |
| |
| INFO("address added/removed successfully - event: " PUB_S_SRP, |
| event_type == interface_address_added ? "added" : "removed"); |
| |
| exit: |
| return succeeded; |
| } |
| |
| static void |
| towire_init(dns_wire_t * const NONNULL wire_ptr, dns_towire_state_t * const NONNULL towire_ptr) |
| { |
| memset(wire_ptr, 0, sizeof(*wire_ptr)); |
| memset(towire_ptr, 0, sizeof(*towire_ptr)); |
| towire_ptr->message = wire_ptr; |
| towire_ptr->lim = &wire_ptr->data[DNS_DATA_SIZE]; |
| towire_ptr->p = wire_ptr->data; |
| } |
| |
| #if STUB_ROUTER |
| static bool |
| string_ends_with(const char *const NONNULL str, const char *const NONNULL suffix) |
| { |
| size_t str_len = strlen(str); |
| size_t suffix_len = strlen(suffix); |
| bool ret; |
| |
| if (str_len < suffix_len) { |
| ret = false; |
| goto exit; |
| } |
| |
| if (strcmp(str + (str_len-suffix_len), suffix) != 0) { |
| ret = false; |
| goto exit; |
| } |
| |
| ret = true; |
| exit: |
| return ret; |
| } |
| #endif |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| #if STUB_ROUTER |
| static bool |
| served_domain_change_domain_name(void) |
| { |
| bool succeeded = true; |
| |
| served_domain_t *next; |
| for (served_domain_t *current = served_domains; current != NULL; current = next) { |
| next = current->next; |
| if (!string_ends_with(current->domain, HOME_NET_DOMAIN)) { |
| continue; |
| } |
| // Skip local only interface because only served domain <Thread ID>.thread.home.arpa. does not contain domain |
| // string. |
| if (current->interface != NULL && strcmp(LOCAL_ONLY_PSEUDO_INTERFACE, current->interface->name) == 0) { |
| continue; |
| } |
| |
| // Constructs new served domain name. |
| char *new_served_domain_name; |
| char new_served_domain_buff[DNS_MAX_NAME_SIZE]; |
| |
| if (0) { |
| } else if (current->interface != NULL) { // <local host name>-<interface name>.home.arpa. |
| const dp_interface_t *const interface = current->interface; |
| int bytes_written = snprintf(new_served_domain_buff, sizeof(new_served_domain_buff), |
| "%s-%s." HOME_NET_DOMAIN, local_host_name, interface->name); |
| require_action_quiet(bytes_written > 0 && (size_t)bytes_written < sizeof(new_served_domain_buff), exit, |
| succeeded = false; ERROR("snprintf failed")); |
| new_served_domain_name = new_served_domain_buff; |
| } else { // <local host name>.home.arpa. |
| int bytes_written = snprintf(new_served_domain_buff, sizeof(new_served_domain_buff), |
| "%s." HOME_NET_DOMAIN, local_host_name); |
| require_action_quiet(bytes_written > 0 && (size_t)bytes_written < sizeof(new_served_domain_buff), exit, |
| succeeded = false; ERROR("snprintf failed")); |
| new_served_domain_name = new_served_domain_buff; |
| } |
| |
| INFO("Updating served domain from " PRI_S_SRP " to " PRI_S_SRP, current->domain, new_served_domain_name); |
| |
| // Free the old served domain name. |
| free(current->domain_ld); |
| dns_name_free(current->domain_name); |
| |
| // Set the new served domain name. |
| size_t domain_len = strlen(new_served_domain_name); |
| current->domain_ld = malloc(domain_len + 2); |
| require_action_quiet(current->domain_ld != NULL, for_loop_exit, succeeded = false; |
| ERROR("malloc failed - allocated length: %zu", domain_len + 2)); |
| current->domain_ld[0] = '.'; |
| current->domain = current->domain_ld + 1; |
| memcpy(current->domain, new_served_domain_name, domain_len); |
| current->domain[domain_len] = '\0'; |
| |
| current->domain_name = dns_pres_name_parse(current->domain); |
| require_action_quiet(current->domain_name != NULL, for_loop_exit, succeeded = false; |
| ERROR("failed to create parsed DNS name - domain name to be parsed: " PRI_S_SRP, current->domain) |
| ); |
| |
| for_loop_exit: |
| if (!succeeded) { |
| delete_served_domain(current); |
| } |
| } |
| |
| exit: |
| return succeeded; |
| } |
| #endif // STUB_ROUTER |
| |
| static bool |
| served_domain_process_name_change(void) |
| { |
| bool succeeded; |
| |
| // Deletes all hardwired response set in the served domain. |
| dnssd_hardwired_clear(); |
| |
| #if STUB_ROUTER |
| // Since local host name changes, we need to reflect the change in the served domain name. |
| succeeded = served_domain_change_domain_name(); |
| require_action_quiet(succeeded, exit, ERROR("served_domain_change_domain_name failed")); |
| #endif |
| |
| // Re-set the hardwired response |
| dnssd_hardwired_setup(); |
| |
| // Re-set the DNS push hardwired response |
| dnssd_hardwired_push_setup(); |
| |
| succeeded = true; |
| #if STUB_ROUTER |
| exit: |
| #endif |
| return succeeded; |
| } |
| |
| static bool |
| initialize_uuid_name(srp_server_t *UNUSED server_state) |
| { |
| char *s; |
| uint64_t uuid = srp_random64(); |
| static const char letters[] = "0123456789abcdefghijklmnopqrstuvwxyz"; |
| static int letlen = sizeof(letters) - 1; |
| s = uuid_name; |
| *s++ = 'u'; // So that it always starts with a letter. |
| while (s < uuid_name + sizeof(uuid_name) - 1 && uuid != 0) { |
| *s++ = letters[uuid % letlen]; |
| uuid /= letlen; |
| } |
| *s++ = 0; |
| return true; |
| } |
| |
| static bool |
| update_my_name(CFStringRef local_host_name_cfstr) |
| { |
| bool succeeded; |
| size_t name_length; |
| |
| if (local_host_name_cfstr == NULL) { |
| // If we are a thread device and not a stub router, make up a hostname for the remote server in case we need it. |
| char localhost[] = "localhost."; |
| name_length = sizeof(localhost); |
| memcpy(local_host_name, localhost, name_length); |
| memcpy(local_host_name_dot_local, localhost, name_length); |
| memcpy(my_name_buf, localhost, name_length); |
| } else { |
| // local host name to c string. |
| succeeded = CFStringGetCString(local_host_name_cfstr, local_host_name, sizeof(local_host_name), |
| kCFStringEncodingUTF8); |
| require_action_quiet(succeeded, exit, succeeded = false; |
| ERROR("CFStringGetCString failed - local host name: " PRI_S_SRP, |
| CFStringGetCStringPtr(local_host_name_cfstr, kCFStringEncodingUTF8)) |
| ); |
| name_length = strlen(local_host_name); |
| |
| // Validate the local host name. |
| for (size_t i = 0; i < name_length; i++) { |
| char ch = local_host_name[i]; |
| bool is_valid_char = isalnum(ch) || (ch == '-'); |
| require_action_quiet(is_valid_char, exit, succeeded = false; |
| ERROR("invalid DNS name - name: " PUB_S_SRP, local_host_name)); |
| } |
| |
| require_action_quiet(name_length + sizeof(DOT_HOME_NET_DOMAIN) <= sizeof(my_name_buf), |
| exit, |
| succeeded = false; |
| ERROR("generated name too long: " PUB_S_SRP DOT_HOME_NET_DOMAIN, local_host_name)); |
| |
| // Update existing local host name in my_name. |
| memcpy(my_name_buf, local_host_name, name_length); |
| memcpy(my_name_buf + name_length, DOT_HOME_NET_DOMAIN, sizeof(DOT_HOME_NET_DOMAIN)); |
| |
| // Update existing local host name with .local suffix. |
| int bytes_written = snprintf(local_host_name_dot_local, sizeof(local_host_name_dot_local), "%s" DOT_LOCAL, local_host_name); |
| if (bytes_written < 0 || (size_t) bytes_written > sizeof(local_host_name_dot_local)) { |
| ERROR("snprintf failed - name length: %lu, max: %lu", strlen(local_host_name) + sizeof(DOT_LOCAL), |
| sizeof(local_host_name_dot_local)); |
| succeeded = false; |
| goto exit; |
| } |
| } |
| my_name = my_name_buf; |
| |
| succeeded = true; |
| INFO(PUB_S_SRP " my_name: " PRI_S_SRP ", local host name: " PRI_S_SRP, my_name == NULL ? "initialized" : "updated", |
| my_name, local_host_name_dot_local); |
| |
| exit: |
| return succeeded; |
| } |
| |
| // Gets called when name change event happens |
| static void |
| monitor_name_changes_callback(SCDynamicStoreRef store, CFArrayRef changed_keys, void *context) |
| { |
| bool succeeded; |
| CFStringRef local_host_name_cfstring = NULL; |
| dnssd_proxy_advertisements_t *advertisements = context; |
| |
| // Check if name changes. |
| CFRange range = {0, CFArrayGetCount(changed_keys)}; |
| const bool host_name_changed = CFArrayContainsValue(changed_keys, range, sc_dynamic_store_key_host_name); |
| if (!host_name_changed) { |
| goto exit; |
| } |
| |
| // Get the new local host name. |
| local_host_name_cfstring = SCDynamicStoreCopyLocalHostName(store); |
| require_action_quiet(local_host_name_cfstring != NULL, exit, ERROR("failed to get updated local host name")); |
| |
| // Update the old my_name |
| succeeded = update_my_name(local_host_name_cfstring); |
| require_action_quiet(succeeded, exit, ERROR("failed to update my name")); |
| |
| // With the new local host name, update the served domains and hardwired response. |
| succeeded = served_domain_process_name_change(); |
| require_action_quiet(succeeded, exit, ERROR("failed to process name change for served domains")); |
| |
| if (advertisements->txn != NULL) { |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| towire_init(&wire, &towire); |
| dns_full_name_to_wire(NULL, &towire, local_host_name_dot_local); |
| |
| DNSServiceErrorType err = DNSServiceUpdateRecord(advertisements->service_ref, advertisements->ns_record_ref, 0, |
| towire.p - wire.data, wire.data, 0); |
| if (err != kDNSServiceErr_NoError) { |
| ERROR("DNSServiceUpdateRecord failed to update NS record to new name - name: " PRI_S_SRP, |
| local_host_name_dot_local); |
| } |
| |
| INFO("Updating record - new NS record rdata: " PRI_S_SRP, local_host_name_dot_local); |
| } |
| |
| exit: |
| if (local_host_name_cfstring != NULL) { |
| CFRelease(local_host_name_cfstring); |
| } |
| return; |
| } |
| |
| static bool |
| monitor_name_changes(dnssd_proxy_advertisements_t *advertisements) |
| { |
| bool succeeded; |
| SCDynamicStoreRef store = NULL; |
| const void *monitored_keys[1]; |
| CFArrayRef monitored_keys_array = NULL; |
| |
| // Set the callback function for name change event. |
| store = SCDynamicStoreCreate(kCFAllocatorDefault, CFSTR("dnssd-proxy:watch for name change events"), |
| monitor_name_changes_callback, &advertisements->sc_context); |
| require_action_quiet(store != NULL, exit, succeeded = false; ERROR("failed to create SCDynamicStoreRef")); |
| |
| // Set the key to be monitored, which is host name |
| sc_dynamic_store_key_host_name = SCDynamicStoreKeyCreateHostNames(kCFAllocatorDefault); |
| require_action_quiet(sc_dynamic_store_key_host_name != NULL, exit, succeeded = false; |
| ERROR("failed to create SCDynamicStoreKey for host name")); |
| |
| monitored_keys[0] = sc_dynamic_store_key_host_name; |
| monitored_keys_array = CFArrayCreate(kCFAllocatorDefault, monitored_keys, countof(monitored_keys), |
| &kCFTypeArrayCallBacks); |
| require_action_quiet(monitored_keys_array != NULL, exit, succeeded = false; |
| ERROR("failed to create CFArrayRef for monitored keys")); |
| |
| succeeded = SCDynamicStoreSetNotificationKeys(store, monitored_keys_array, NULL); |
| require_action_quiet(succeeded, exit, ERROR("SCDynamicStoreSetNotificationKeys failed")); |
| |
| succeeded = SCDynamicStoreSetDispatchQueue(store, dispatch_get_main_queue()); |
| require_action_quiet(succeeded, exit, ERROR("SCDynamicStoreSetDispatchQueue failed")); |
| |
| succeeded = true; |
| INFO("Start to monitor local host name changes"); |
| exit: |
| if (!succeeded) { |
| if (store != NULL) { |
| CFRelease(store); |
| } |
| } |
| if (monitored_keys_array != NULL) { |
| CFRelease(monitored_keys_array); |
| } |
| return succeeded; |
| } |
| |
| static bool |
| initialize_my_name_and_monitoring(srp_server_t *server_state) |
| { |
| bool succeeded; |
| CFStringRef local_host_name_cfstring = NULL; |
| |
| // Set notification from configd. |
| succeeded = monitor_name_changes(server_state->dnssd_proxy_advertisements); |
| require_action_quiet(succeeded, exit, ERROR("failed to monitor name changes")); |
| |
| // Get the initial local host name |
| local_host_name_cfstring = SCDynamicStoreCopyLocalHostName(NULL); |
| require_action_quiet(local_host_name != NULL, exit, succeeded = false; ERROR("failed to get local host name")); |
| |
| succeeded = update_my_name(local_host_name_cfstring); |
| require_action_quiet(succeeded, exit, ERROR("failed to update myname")); |
| |
| exit: |
| if (local_host_name_cfstring != NULL) { |
| CFRelease(local_host_name_cfstring); |
| } |
| return succeeded; |
| } |
| |
| #ifndef SRP_TEST_SERVER |
| static bool |
| configure_dnssd_proxy(void) |
| { |
| dnssd_proxy_udp_port= 53; |
| dnssd_proxy_tcp_port = 53; |
| dnssd_proxy_tls_port = 853; |
| return true; |
| } |
| #endif // SRP_TEST_SERVER |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| static bool |
| start_dnssd_proxy_listener(void) |
| { |
| bool succeeded; |
| |
| #if STUB_ROUTER |
| #ifndef NOT_HAVE_SA_LEN |
| # define SA_LEN_INIT addr.sa.sa_len = sizeof(addr.sin6) |
| #else |
| # define SA_LEN_INIT |
| #endif // NOT_HAVE_SA_LEN |
| #define INIT_ADDR_T(PORT) \ |
| do { \ |
| memset(&addr, 0, sizeof(addr)); \ |
| addr.sa.sa_family = AF_UNSPEC; \ |
| addr.sin6.sin6_port = htons(PORT); \ |
| SA_LEN_INIT; \ |
| } while (false) |
| |
| addr_t addr; |
| |
| INIT_ADDR_T(dnssd_proxy_udp_port); |
| dnssd_proxy_listeners[dnssd_proxy_num_listeners] = |
| ioloop_listener_create(false, false, true, NULL, 0, &addr, NULL, "DNS over UDP", dns_proxy_input, |
| NULL, NULL, NULL, NULL, NULL, 0, NULL); |
| require_action_quiet(dnssd_proxy_listeners[dnssd_proxy_num_listeners] != NULL, exit, succeeded = false; |
| ERROR("failed to start UDP listener - listener index: %d", dnssd_proxy_num_listeners)); |
| dnssd_proxy_num_listeners++; |
| |
| INIT_ADDR_T(dnssd_proxy_tcp_port); |
| dnssd_proxy_listeners[dnssd_proxy_num_listeners] = |
| ioloop_listener_create(true, false, true, NULL, 0, &addr, NULL, "DNS over TCP", dns_proxy_input, |
| NULL, NULL, NULL, NULL, NULL, 0, NULL); |
| require_action_quiet(dnssd_proxy_listeners[dnssd_proxy_num_listeners] != NULL, exit, succeeded = false; |
| ERROR("failed to start TCP listener - listener index: %d", dnssd_proxy_num_listeners)); |
| dnssd_proxy_num_listeners++; |
| #endif // STUB_ROUTER |
| |
| dnssd_push_setup(); |
| |
| for (int i = 0; i < dnssd_proxy_num_listeners; i++) { |
| INFO("listener started - name: " PUB_S_SRP, dnssd_proxy_listeners[i]->name); |
| } |
| |
| succeeded = true; |
| goto exit; |
| |
| exit: |
| return succeeded; |
| } |
| |
| #define ADVERTISEMENT_RETRY_TIMER 10 * MSEC_PER_SEC |
| |
| #if STUB_ROUTER |
| static void |
| advertisements_finalize(void *context) |
| { |
| dnssd_proxy_advertisements_t *advertisements_context = context; |
| advertisements_context->txn = NULL; |
| } |
| |
| static void |
| advertisements_failed(void *UNUSED context, int status) |
| { |
| ERROR("%d", status); |
| } |
| |
| static void |
| advertisements_callback(DNSServiceRef sd_ref, DNSRecordRef record_ref, DNSServiceFlags UNUSED flags, |
| DNSServiceErrorType error, void *context) |
| { |
| dnssd_proxy_advertisements_t *advertisements_context = context; |
| |
| if (error == kDNSServiceErr_NoError) { |
| const char * const description = record_ref == advertisements_context->ns_record_ref ? "NS" : "PTR"; |
| INFO("record registered successfully - registered: " PUB_S_SRP, description); |
| } else if (error == kDNSServiceErr_ServiceNotRunning) { |
| // The record is not being advertised because mDNSResponder stopped running for some reason (like crashes), |
| // in which case, we will stop the previous DNSService operation and start a new one 10s later. |
| |
| // Release the previous DNSServiceRef. |
| if (advertisements_context->service_ref != sd_ref) { |
| ERROR("Invalid DNSServiceRef - context->service_ref: %p, sd_ref: %p", advertisements_context->service_ref, |
| sd_ref); |
| } |
| if (advertisements_context->txn != NULL) { |
| ioloop_dnssd_txn_cancel(advertisements_context->txn); |
| ioloop_dnssd_txn_release(advertisements_context->txn); |
| advertisements_context->txn = NULL; |
| } |
| advertisements_context->service_ref = NULL; |
| |
| // Restart the advertisement. |
| bool succeeded = start_timer_to_advertise(advertisements_context, NULL, ADVERTISEMENT_RETRY_TIMER); |
| if (!succeeded) { |
| ERROR("start_timer_to_advertise failed"); |
| } else { |
| INFO("mDNSResponder stopped running, preparing to re-advertise the PTR and NS records"); |
| } |
| } else { |
| ERROR("record not registered - error: %d", error); |
| } |
| } |
| |
| static void |
| advertise_dnssd_proxy_callback(void *NONNULL context) |
| { |
| DNSServiceErrorType err; |
| bool succeeded; |
| bool dns_service_initialized = false; |
| dns_wire_t wire; |
| dns_towire_state_t towire; |
| dnssd_proxy_advertisements_t *advertisement_context = context; |
| srp_server_t *server_state = advertisement_context->server_state; |
| const char *const domain_to_advertise = advertisement_context->domain_to_advertise; |
| |
| INFO("Start advertising lb._dns-sd._udp.local. PTR and openthread.thread.home.arpa.local NS records"); |
| |
| // Create DNSServiceRef |
| err = DNSServiceCreateConnection(&advertisement_context->service_ref); |
| if (err != kDNSServiceErr_NoError) { |
| ERROR("DNSServiceCreateConnection failed"); |
| succeeded = false; |
| goto exit; |
| } |
| dns_service_initialized = true; |
| |
| // Setup lb._dns-sd._udp.local. PTR openthread.thread.home.arpa. |
| towire_init(&wire, &towire); |
| dns_full_name_to_wire(NULL, &towire, domain_to_advertise); |
| |
| err = DNSServiceRegisterRecord(advertisement_context->service_ref, &advertisement_context->ptr_record_ref, |
| kDNSServiceFlagsShared, server_state->advertise_interface, AUTOMATIC_BROWSING_DOMAIN, |
| kDNSServiceType_PTR, kDNSServiceClass_IN, towire.p - wire.data, wire.data, 0, |
| advertisements_callback, advertisement_context); |
| if (err != kDNSServiceErr_NoError) { |
| ERROR("DNSServiceRegisterRecord failed - record: " PUB_S_SRP " PTR " PRI_S_SRP, AUTOMATIC_BROWSING_DOMAIN, |
| domain_to_advertise); |
| succeeded = false; |
| goto exit; |
| } |
| |
| // Setup openthread.thread.home.arpa. NS <local host name>.local. |
| towire_init(&wire, &towire); |
| dns_full_name_to_wire(NULL, &towire, local_host_name_dot_local); |
| |
| err = DNSServiceRegisterRecord(advertisement_context->service_ref, &advertisement_context->ns_record_ref, |
| kDNSServiceFlagsShared | kDNSServiceFlagsForceMulticast, |
| server_state->advertise_interface, domain_to_advertise, kDNSServiceType_NS, |
| kDNSServiceClass_IN, towire.p - wire.data, wire.data, 0, |
| advertisements_callback, advertisement_context); |
| if (err != kDNSServiceErr_NoError) { |
| ERROR("DNSServiceRegisterRecord failed - record: " PUB_S_SRP " NS " PRI_S_SRP, domain_to_advertise, |
| local_host_name_dot_local); |
| succeeded = false; |
| goto exit; |
| } |
| |
| // Start the running loop |
| advertisement_context->txn = ioloop_dnssd_txn_add(advertisement_context->service_ref, advertisement_context, |
| advertisements_finalize, advertisements_failed); |
| if (advertisement_context->txn == NULL) { |
| ERROR("ioloop_dnssd_txn_add failed"); |
| succeeded = false; |
| goto exit; |
| } |
| |
| INFO("Advertising records - " PUB_S_SRP " PTR " PRI_S_SRP ", " PRI_S_SRP " NS " PRI_S_SRP, |
| AUTOMATIC_BROWSING_DOMAIN, domain_to_advertise, domain_to_advertise, local_host_name_dot_local); |
| succeeded = true; |
| exit: |
| if (!succeeded) { |
| if (dns_service_initialized) { |
| DNSServiceRefDeallocate(advertisement_context->service_ref); |
| advertisement_context->service_ref = NULL; |
| } |
| if (err == kDNSServiceErr_ServiceNotRunning) { |
| ERROR("mDNSResponder is not running yet when trying to advertise PTR and NS records, try again 10s later"); |
| // advertise_dnssd_proxy_callback will be called again 10s later, since we did not cancel the timer. |
| } else { |
| // Other kDNSServiceErr, should be impossible. If it happens, give up advertising the records. |
| ioloop_cancel_wake_event(advertisement_context->wakeup_timer); |
| } |
| } else { |
| // Since we registered successfully, there is no need to trigger another timer to set the records. |
| // Stop the timer. |
| ioloop_cancel_wake_event(advertisement_context->wakeup_timer); |
| } |
| } |
| |
| static bool |
| start_timer_to_advertise(dnssd_proxy_advertisements_t *NONNULL context, |
| const char *const NULLABLE domain_to_advertise, const uint32_t interval) |
| { |
| bool succeeded; |
| |
| // Only create timer once. |
| if (context->wakeup_timer == NULL) { |
| context->wakeup_timer = ioloop_wakeup_create(); |
| if (context->wakeup_timer == NULL) { |
| succeeded = false; |
| goto exit; |
| } |
| } |
| |
| // Only copy advertised domain once. |
| if (context->domain_to_advertise == NULL) { |
| if (domain_to_advertise == NULL) { |
| succeeded = false; |
| goto exit; |
| } |
| |
| context->domain_to_advertise = strdup(domain_to_advertise); |
| if (context->domain_to_advertise == NULL) { |
| succeeded = false; |
| goto exit; |
| } |
| } |
| |
| // Start the timer, finalize callback is not necessary here because the context should always be available. |
| succeeded = ioloop_add_wake_event(context->wakeup_timer, context, advertise_dnssd_proxy_callback, NULL, interval); |
| if (!succeeded) { |
| goto exit; |
| } |
| |
| succeeded = true; |
| exit: |
| if (!succeeded) { |
| if (context->domain_to_advertise != NULL) { |
| free(context->domain_to_advertise); |
| context->domain_to_advertise = NULL; |
| } |
| if (context->wakeup_timer != NULL) { |
| ioloop_wakeup_release(context->wakeup_timer); |
| context->wakeup_timer = NULL; |
| } |
| } |
| return succeeded; |
| } |
| |
| #if SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| |
| static bool |
| start_timer_to_advertise_dnssd_dp_proxy(dnssd_dp_proxy_advertisements_t *context, uint32_t interval); |
| |
| static void |
| dp_advertisements_finalize(void *const context) |
| { |
| dnssd_dp_proxy_advertisements_t *advertisements_context = context; |
| advertisements_context->txn = NULL; |
| } |
| |
| static void |
| dp_advertisements_failed(void *const UNUSED context, const int status) |
| { |
| ERROR("push service advertisement failed -- error: %d", status); |
| } |
| |
| static void |
| dp_advertisements_callback(const DNSServiceRef UNUSED sd_ref, const DNSServiceFlags UNUSED flags, |
| const DNSServiceErrorType error, const char *const name, const char *const reg_type, |
| const char *const domain, void *const context) |
| { |
| dnssd_dp_proxy_advertisements_t *const ads_ctx = context; |
| if (error == kDNSServiceErr_NoError) { |
| INFO("Push service registered successfully -- %s.%s%s", name, reg_type, domain); |
| } else if (error == kDNSServiceErr_ServiceNotRunning) { |
| if (ads_ctx->txn != NULL) { |
| ioloop_dnssd_txn_cancel(ads_ctx->txn); |
| ioloop_dnssd_txn_forget(&ads_ctx->txn); |
| } |
| ads_ctx->service_ref = NULL; |
| |
| const bool succeeded = start_timer_to_advertise_dnssd_dp_proxy(ads_ctx, ADVERTISEMENT_RETRY_TIMER); |
| if (!succeeded) { |
| ERROR("start_timer_to_advertise_dnssd_dp_proxy failed"); |
| } else { |
| INFO("mDNSResponder stopped running, preparing to re-advertise DNS push service"); |
| } |
| } else { |
| ERROR("Push service not registered -- error: %d", error); |
| } |
| } |
| |
| static void |
| advertise_dnssd_dp_proxy_callback(void *const context) |
| { |
| DNSServiceRef service_ref = NULL; |
| dnssd_txn_t *txn = NULL; |
| dnssd_dp_proxy_advertisements_t *const advertisement_context = context; |
| srp_server_t *const server_state = advertisement_context->server_state; |
| int bytes_written = 0; |
| |
| // Construct ,_local,_openthread#thread#home#arpa |
| const char *domains_support_push[] = { |
| DOT_LOCAL_DOMAIN, |
| THREAD_BROWSING_DOMAIN, |
| }; |
| char subtype_domains[256]; |
| size_t current_len = 0; |
| for (size_t i = 0; i < countof(domains_support_push); i++) { |
| const char *const domain_supports_push = domains_support_push[i]; |
| const size_t len = strlen(domain_supports_push); |
| char subtype_domain[128]; |
| // Convert domain name like `_openthread.thread.home.arpa` to `_openthread#thread#home#arpa`. |
| require_quiet(len < sizeof(subtype_domain), exit); |
| for (size_t j = 0; j < len + 1; j++) { |
| if (domain_supports_push[j] == '.') { |
| subtype_domain[j] = '#'; |
| } else { |
| subtype_domain[j] = domain_supports_push[j]; |
| } |
| } |
| // Remove the trailing '#'. |
| if (subtype_domain[len - 1] == '#') { |
| subtype_domain[len - 1] = '\0'; |
| } |
| |
| bytes_written = snprintf(subtype_domains + current_len, sizeof(subtype_domains) - current_len, ",_%s", |
| subtype_domain); |
| require_quiet((bytes_written > 0) && ((size_t)bytes_written < (sizeof(subtype_domains) - current_len)), exit); |
| current_len += bytes_written; |
| } |
| |
| // Construct _dnssd-dp._tcp,_local,_openthread#thread#home#arpa with subtype. |
| char reg_type[128]; |
| bytes_written = snprintf(reg_type, sizeof(reg_type), "_dnssd-dp._tcp%s", subtype_domains); |
| require_quiet((bytes_written > 0) && ((size_t)bytes_written < sizeof(reg_type)), exit); |
| |
| // Construct service instance name like: p128-undulw2d1vktd1 |
| const uint8_t priority = 128; |
| const char * const random_identifier = uuid_name; |
| char name[128]; |
| bytes_written = snprintf(name, sizeof(name), "p%03d-%s", priority, random_identifier); |
| require_quiet((bytes_written > 0) && ((size_t)bytes_written < sizeof(name)), exit); |
| |
| const uint16_t dp_port = dnssd_proxy_tls_port; |
| |
| // The registered PTRs will be like: |
| // _openthread#thread#home#arpa._sub._dnssd-dp._tcp.local PTR p128-undulw2d1vktd1._dnssd-dp._tcp.local |
| // _local._sub._dnssd-dp._tcp.local PTR p128-undulw2d1vktd1._dnssd-dp._tcp.local |
| const DNSServiceErrorType dnsssd_err = DNSServiceRegister(&service_ref, 0, server_state->advertise_interface, name, |
| reg_type, DOT_LOCAL_DOMAIN, NULL, htons(dp_port), 0, NULL, dp_advertisements_callback, context); |
| require_action_quiet(dnsssd_err == kDNSServiceErr_NoError, exit, |
| ERROR("DNSServiceRegisterRecord failed -- error: %d", dnsssd_err)); |
| |
| txn = ioloop_dnssd_txn_add(service_ref, advertisement_context, dp_advertisements_finalize, |
| dp_advertisements_failed); |
| require_quiet(txn != NULL, exit); |
| |
| advertisement_context->service_ref = service_ref; |
| service_ref = NULL; |
| advertisement_context->txn = txn; |
| txn = NULL; |
| INFO("Advertising push discovery service -- reg_type: %s.%s, service instance name: %s._dnssd-dp._tcp.%s", |
| reg_type, DOT_LOCAL_DOMAIN, name, DOT_LOCAL_DOMAIN); |
| |
| exit: |
| DNSServiceRefSourceForget(&service_ref); |
| if (txn != NULL) { |
| ioloop_dnssd_txn_cancel(txn); |
| ioloop_dnssd_txn_forget(&txn); |
| } |
| } |
| |
| static bool |
| start_timer_to_advertise_dnssd_dp_proxy(dnssd_dp_proxy_advertisements_t *const context, const uint32_t interval) |
| { |
| bool succeeded; |
| wakeup_t *wakeup_timer = context->wakeup_timer; |
| |
| if (wakeup_timer == NULL) { |
| wakeup_timer = ioloop_wakeup_create(); |
| } else { |
| ioloop_wakeup_retain(wakeup_timer); |
| } |
| require_action_quiet(wakeup_timer != NULL, exit, succeeded = false); |
| |
| succeeded = ioloop_add_wake_event(wakeup_timer, context, advertise_dnssd_dp_proxy_callback, NULL, interval); |
| require_quiet(succeeded, exit); |
| |
| if (context->wakeup_timer == NULL) { |
| context->wakeup_timer = wakeup_timer; |
| wakeup_timer = NULL; |
| } |
| |
| exit: |
| ioloop_wakeup_forget(&wakeup_timer); |
| return succeeded; |
| } |
| |
| static bool |
| advertise_dnssd_dp_proxy(srp_server_t *const server_state) |
| { |
| return start_timer_to_advertise_dnssd_dp_proxy(server_state->dnssd_dp_proxy_advertisements, |
| ADVERTISEMENT_RETRY_TIMER); |
| } |
| |
| static bool |
| is_eligible_to_provide_push_discovery_service(void) |
| { |
| return true; |
| } |
| |
| #endif // SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| |
| #endif // STUB_ROUTER |
| |
| #if SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| # if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| static bool |
| served_domain_init(srp_server_t *server_state) |
| { |
| bool succeeded; |
| served_domain_t *my_name_served_domain = NULL; |
| served_domain_t *ipv6 = NULL; |
| served_domain_t *ipv4 = NULL; |
| served_domain_t *thread_served_domain = NULL; |
| served_domain_t *default_service_arpa_domain = NULL; |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| served_domain_t *dot_local_domain = NULL; |
| #endif |
| |
| // <local host name>.home.arpa. |
| my_name_served_domain = new_served_domain(NULL, my_name); |
| require_action_quiet(my_name_served_domain != NULL, exit, succeeded = false; |
| ERROR("failed to create new served domain - domain name: " PUB_S_SRP, my_name)); |
| |
| #if STUB_ROUTER |
| if (server_state->stub_router_enabled) { |
| // ip6.arpa. |
| // in-addr.arpa. |
| ipv6 = new_served_domain(NULL, IPV6_REVERSE_LOOKUP_DOMAIN); |
| ipv4 = new_served_domain(NULL, IPV4_REVERSE_LOOKUP_DOMAIN); |
| require_action_quiet(ipv6 != NULL && ipv4 != NULL, exit, succeeded = false; |
| ERROR("failed to create new served domain for reverse look up - domain name: " PUB_S_SRP ", " PUB_S_SRP, |
| IPV6_REVERSE_LOOKUP_DOMAIN, IPV4_REVERSE_LOOKUP_DOMAIN) |
| ); |
| } |
| #else |
| (void)server_state; |
| #endif |
| |
| // THREAD_BROWSING_DOMAIN |
| // It will be served by kDNSServiceInterfaceIndexLocalOnly, which is a pseudo interface. |
| thread_served_domain = add_new_served_domain_with_interface(LOCAL_ONLY_PSEUDO_INTERFACE, NULL, NULL); |
| require_action_quiet(thread_served_domain != NULL, exit, succeeded = false); |
| bool hardwired_set = dnssd_hardwired_setup_for_served_domain(thread_served_domain); |
| require_action_quiet(hardwired_set, exit, succeeded = false); |
| |
| // default.service.arpa |
| // For Thread 1.3.0, default.service.arpa has to return all locally-discoverable services |
| default_service_arpa_domain = add_new_served_domain_with_interface(ALL_LOCALS_PSEUDO_INTERFACE, NULL, NULL); |
| require_action_quiet(default_service_arpa_domain != NULL, exit, succeeded = false); |
| hardwired_set = dnssd_hardwired_setup_for_served_domain(default_service_arpa_domain); |
| require_action_quiet(hardwired_set, exit, succeeded = false); |
| |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| // local |
| // discovery proxy for the infrastructure interface |
| dot_local_domain = add_new_served_domain_with_interface(INFRASTRUCTURE_PSEUDO_INTERFACE, NULL, NULL); |
| require_action_quiet(dot_local_domain != NULL, exit, succeeded = false); |
| hardwired_set = dnssd_hardwired_setup_for_served_domain(dot_local_domain); |
| require_action_quiet(hardwired_set, exit, succeeded = false); |
| #endif |
| |
| succeeded = true; |
| exit: |
| if (!succeeded) { |
| if (thread_served_domain != NULL) { |
| delete_served_domain(thread_served_domain); |
| } |
| if (default_service_arpa_domain != NULL) { |
| delete_served_domain(default_service_arpa_domain); |
| } |
| #if SRP_FEATURE_LOCAL_DISCOVERY |
| if (dot_local_domain != NULL) { |
| delete_served_domain(dot_local_domain); |
| } |
| #endif |
| if (ipv4 != NULL) { |
| delete_served_domain(ipv4); |
| } |
| if (ipv6 != NULL) { |
| delete_served_domain(ipv6); |
| } |
| if (my_name_served_domain != NULL) { |
| delete_served_domain(my_name_served_domain); |
| } |
| } |
| return succeeded; |
| } |
| # endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| #endif // SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| |
| bool |
| init_dnssd_proxy(srp_server_t *server_state) |
| { |
| bool succeeded; |
| dnssd_proxy_advertisements_t *advertisements = server_state->dnssd_proxy_advertisements; |
| if (advertisements == NULL) { |
| advertisements = calloc(1, sizeof(*advertisements)); |
| require_action_quiet(advertisements != NULL, exit, |
| succeeded = false; |
| ERROR("no memory for advertisements")); |
| server_state->dnssd_proxy_advertisements = advertisements; |
| advertisements->server_state = server_state; |
| advertisements->sc_context.info = advertisements; |
| } |
| |
| #if STUB_ROUTER |
| #if SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| if (is_eligible_to_provide_push_discovery_service()) { |
| dnssd_dp_proxy_advertisements_t *dp_ads = server_state->dnssd_dp_proxy_advertisements; |
| if (dp_ads == NULL) { |
| dp_ads = calloc(1, sizeof(*dp_ads)); |
| require_action_quiet(dp_ads != NULL, exit, |
| succeeded = false; ERROR("no memory for push discovery service advertisements")); |
| server_state->dnssd_dp_proxy_advertisements = dp_ads; |
| dp_ads->server_state = server_state; |
| } |
| } |
| #endif // SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| #endif // STUB_ROUTER |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| succeeded = configure_dnssd_proxy(); |
| require_action_quiet(succeeded, exit, ERROR("configure_dnssd_proxy failed")); |
| |
| |
| succeeded = initialize_my_name_and_monitoring(server_state); |
| |
| require_action_quiet(succeeded, exit, ERROR("initialize_my_name_and_monitoring failed")); |
| succeeded = initialize_uuid_name(server_state); |
| require_action_quiet(succeeded, exit, ERROR("initialize_uuid_name failed")); |
| #if STUB_ROUTER |
| if (!server_state->stub_router_enabled) { |
| served_domain_process_name_change(); |
| } |
| #endif |
| |
| #else // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| // Read the config file |
| succeeded = config_parse(NULL, "/etc/dnssd-proxy.cf", dp_verbs, NUMCFVERBS); |
| require_action_quiet(succeeded, |
| exit,); |
| |
| // Insist that we have at least one address we're listening on. |
| succeeded = !(num_listen_addrs == 0 && num_publish_addrs == 0); |
| require_action_quiet(succeeded, |
| exit, |
| ERROR("Please configure at least one my-ipv4-addr and/or one my-ipv6-addr.")); |
| |
| ioloop_map_interface_addresses(server_state, NULL, &served_domains, dnssd_proxy_ifaddr_callback); |
| |
| // Set up hardwired answers |
| dnssd_hardwired_setup(); |
| #endif // SRP_FEATURE_DYNAMIC_CONFIGURATION |
| |
| succeeded = srp_tls_init(); |
| require_action_quiet(succeeded, exit, ERROR("srp_tls_init failed.")); |
| |
| #if !SRP_FEATURE_CAN_GENERATE_TLS_CERT |
| // The tls_fail flag allows us to run the proxy in such a way that TLS connections will fail. |
| // This is never what you want in production, but is useful for testing. |
| if (!tls_fail) { |
| if (access(tls_key_filename, R_OK) < 0) { |
| keyprogram_start(GENKEY_PROGRAM, keyfile_finished_callback, |
| "type=rsa", NULL, "rsa_keysize=4096", NULL, "filename", tls_key_filename, NULL); |
| } else if (access(tls_cert_filename, R_OK) < 0) { |
| keyfile_finished_callback(NULL, 0, NULL); |
| } |
| require_action_quiet(access(tls_key_filename, R_OK) >= 0, exit, ERROR("failed to create tls listener key.")); |
| require_action_quiet(access(tls_cert_filename, R_OK) >= 0, exit, ERROR("failed to create tls listener cert.")); |
| |
| require_action_quiet(srp_tls_server_init(NULL, tls_cert_filename, tls_key_filename), |
| exit, ERROR("srp_tls_server_init failed.")); |
| require_action_quiet(srp_tls_client_init(), exit, ERROR("srp_tls_client_init failed.")); |
| } |
| #endif |
| |
| succeeded = start_dnssd_proxy_listener(); |
| require_action_quiet(succeeded, exit, ERROR("start_dnssd_proxy_listener failed")); |
| |
| #if STUB_ROUTER |
| if (server_state->stub_router_enabled) { |
| #if SRP_FEATURE_DISCOVERY_PROXY_SERVER |
| if (server_state->dnssd_dp_proxy_advertisements != NULL) { |
| succeeded = advertise_dnssd_dp_proxy(server_state); |
| require_action_quiet(succeeded, exit, ERROR("advertise_dnssd_dp_proxy failed")); |
| } |
| #endif |
| } |
| #endif |
| |
| #if SRP_FEATURE_DYNAMIC_CONFIGURATION |
| succeeded = served_domain_init(server_state); |
| #endif |
| |
| exit: |
| return succeeded; |
| } |
| |
| #if !SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| int |
| main(int argc, char **argv) |
| { |
| int i; |
| bool log_stderr = false; |
| |
| dnssd_proxy_udp_port = dnssd_proxy_tcp_port = 53; |
| dnssd_proxy_tls_port = 853; |
| |
| // Parse command line arguments |
| for (i = 1; i < argc; i++) { |
| if (!strcmp(argv[i], "--tls-fail")) { |
| tls_fail = true; |
| } else if (!strcmp(argv[i], "--log-stderr")) { |
| log_stderr = true; |
| } else { |
| return usage(argv[0]); |
| } |
| } |
| |
| OPENLOG("dnssd-proxy", log_stderr); |
| |
| if (!ioloop_init()) { |
| return 1; |
| } |
| |
| init_dnssd_proxy(); |
| |
| ioloop(); |
| } |
| #endif // #if !SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY |
| |
| #endif // (SRP_FEATURE_COMBINED_SRP_DNSSD_PROXY) || (!defined(BUILD_SRP_MDNS_PROXY) || (BUILD_SRP_MDNS_PROXY == 0)) |
| |
| // Local Variables: |
| // mode: C |
| // tab-width: 4 |
| // c-file-style: "bsd" |
| // c-basic-offset: 4 |
| // fill-column: 108 |
| // indent-tabs-mode: nil |
| // End: |