dnstcp.c 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <ip.h>
  4. #include "dns.h"
  5. enum
  6. {
  7. Maxpath= 128,
  8. };
  9. char *logfile = "dns";
  10. char *dbfile;
  11. int debug;
  12. int cachedb = 1;
  13. int testing;
  14. int traceactivity;
  15. int needrefresh;
  16. int resolver;
  17. char mntpt[Maxpath];
  18. char *caller = "";
  19. ulong now;
  20. int maxage;
  21. uchar ipaddr[IPaddrlen]; /* my ip address */
  22. char *LOG;
  23. char *zonerefreshprogram;
  24. static int readmsg(int, uchar*, int);
  25. static void reply(int, DNSmsg*, Request*);
  26. static void dnzone(DNSmsg*, DNSmsg*, Request*);
  27. static void getcaller(char*);
  28. static void refreshmain(char*);
  29. void
  30. usage(void)
  31. {
  32. fprint(2, "usage: %s [-rR] [-f ndb-file] [-x netmtpt]\n", argv0);
  33. exits("usage");
  34. }
  35. void
  36. main(int argc, char *argv[])
  37. {
  38. int len;
  39. Request req;
  40. DNSmsg reqmsg, repmsg;
  41. uchar buf[512];
  42. char tname[32];
  43. char *err;
  44. char *ext = "";
  45. ARGBEGIN{
  46. case 'R':
  47. norecursion = 1;
  48. break;
  49. case 'd':
  50. debug++;
  51. break;
  52. case 'f':
  53. dbfile = EARGF(usage());
  54. break;
  55. case 'r':
  56. resolver = 1;
  57. break;
  58. case 'x':
  59. ext = EARGF(usage());
  60. break;
  61. default:
  62. usage();
  63. break;
  64. }ARGEND
  65. if(debug < 2)
  66. debug = 0;
  67. if(argc > 0)
  68. getcaller(argv[0]);
  69. dninit();
  70. snprint(mntpt, sizeof(mntpt), "/net%s", ext);
  71. if(myipaddr(ipaddr, mntpt) < 0)
  72. sysfatal("can't read my ip address");
  73. syslog(0, logfile, "dnstcp call from %s to %I", caller, ipaddr);
  74. db2cache(1);
  75. setjmp(req.mret);
  76. req.isslave = 0;
  77. /* loop on requests */
  78. for(;; putactivity(0)){
  79. now = time(0);
  80. memset(&repmsg, 0, sizeof(repmsg));
  81. alarm(10*60*1000);
  82. len = readmsg(0, buf, sizeof(buf));
  83. alarm(0);
  84. if(len <= 0)
  85. break;
  86. getactivity(&req, 0);
  87. req.aborttime = now + 15*Min;
  88. err = convM2DNS(buf, len, &reqmsg);
  89. if(err){
  90. syslog(0, logfile, "server: input error: %s from %I", err, buf);
  91. break;
  92. }
  93. if(reqmsg.qdcount < 1){
  94. syslog(0, logfile, "server: no questions from %I", buf);
  95. break;
  96. }
  97. if(reqmsg.flags & Fresp){
  98. syslog(0, logfile, "server: reply not request from %I", buf);
  99. break;
  100. }
  101. if((reqmsg.flags & Omask) != Oquery){
  102. syslog(0, logfile, "server: op %d from %I", reqmsg.flags & Omask, buf);
  103. break;
  104. }
  105. if(debug)
  106. syslog(0, logfile, "[%d] %d: serve (%s) %d %s %s",
  107. getpid(),
  108. req.id, caller,
  109. reqmsg.id,
  110. reqmsg.qd->owner->name,
  111. rrname(reqmsg.qd->type, tname, sizeof tname));
  112. /* loop through each question */
  113. while(reqmsg.qd){
  114. if(reqmsg.qd->type == Taxfr){
  115. dnzone(&reqmsg, &repmsg, &req);
  116. } else {
  117. dnserver(&reqmsg, &repmsg, &req);
  118. reply(1, &repmsg, &req);
  119. rrfreelist(repmsg.qd);
  120. rrfreelist(repmsg.an);
  121. rrfreelist(repmsg.ns);
  122. rrfreelist(repmsg.ar);
  123. }
  124. }
  125. rrfreelist(reqmsg.qd);
  126. rrfreelist(reqmsg.an);
  127. rrfreelist(reqmsg.ns);
  128. rrfreelist(reqmsg.ar);
  129. if(req.isslave){
  130. putactivity(0);
  131. _exits(0);
  132. }
  133. }
  134. refreshmain(mntpt);
  135. }
  136. static int
  137. readmsg(int fd, uchar *buf, int max)
  138. {
  139. int n;
  140. uchar x[2];
  141. if(readn(fd, x, 2) != 2)
  142. return -1;
  143. n = (x[0]<<8) | x[1];
  144. if(n > max)
  145. return -1;
  146. if(readn(fd, buf, n) != n)
  147. return -1;
  148. return n;
  149. }
  150. static void
  151. reply(int fd, DNSmsg *rep, Request *req)
  152. {
  153. int len, rv;
  154. char tname[32];
  155. uchar buf[4096];
  156. RR *rp;
  157. if(debug){
  158. syslog(0, logfile, "%d: reply (%s) %s %s %ux",
  159. req->id, caller,
  160. rep->qd->owner->name,
  161. rrname(rep->qd->type, tname, sizeof tname),
  162. rep->flags);
  163. for(rp = rep->an; rp; rp = rp->next)
  164. syslog(0, logfile, "an %R", rp);
  165. for(rp = rep->ns; rp; rp = rp->next)
  166. syslog(0, logfile, "ns %R", rp);
  167. for(rp = rep->ar; rp; rp = rp->next)
  168. syslog(0, logfile, "ar %R", rp);
  169. }
  170. len = convDNS2M(rep, buf+2, sizeof(buf) - 2);
  171. if(len <= 0)
  172. abort(); /* "dnserver: converting reply" */;
  173. buf[0] = len>>8;
  174. buf[1] = len;
  175. rv = write(fd, buf, len+2);
  176. if(rv != len+2){
  177. syslog(0, logfile, "[%d] sending reply: %d instead of %d", getpid(), rv, len+2);
  178. exits(0);
  179. }
  180. }
  181. /*
  182. * Hash table for domain names. The hash is based only on the
  183. * first element of the domain name.
  184. */
  185. extern DN *ht[HTLEN];
  186. static int
  187. numelem(char *name)
  188. {
  189. int i;
  190. i = 1;
  191. for(; *name; name++)
  192. if(*name == '.')
  193. i++;
  194. return i;
  195. }
  196. int
  197. inzone(DN *dp, char *name, int namelen, int depth)
  198. {
  199. int n;
  200. if(dp->name == 0)
  201. return 0;
  202. if(numelem(dp->name) != depth)
  203. return 0;
  204. n = strlen(dp->name);
  205. if(n < namelen)
  206. return 0;
  207. if(strcmp(name, dp->name + n - namelen) != 0)
  208. return 0;
  209. if(n > namelen && dp->name[n - namelen - 1] != '.')
  210. return 0;
  211. return 1;
  212. }
  213. static void
  214. dnzone(DNSmsg *reqp, DNSmsg *repp, Request *req)
  215. {
  216. DN *dp, *ndp;
  217. RR r, *rp;
  218. int h, depth, found, nlen;
  219. memset(repp, 0, sizeof(*repp));
  220. repp->id = reqp->id;
  221. repp->qd = reqp->qd;
  222. reqp->qd = reqp->qd->next;
  223. repp->qd->next = 0;
  224. repp->flags = Fauth | Fresp | Oquery;
  225. if(!norecursion)
  226. repp->flags |= Fcanrec;
  227. dp = repp->qd->owner;
  228. /* send the soa */
  229. repp->an = rrlookup(dp, Tsoa, NOneg);
  230. reply(1, repp, req);
  231. if(repp->an == 0)
  232. goto out;
  233. rrfreelist(repp->an);
  234. nlen = strlen(dp->name);
  235. /* construct a breadth first search of the name space (hard with a hash) */
  236. repp->an = &r;
  237. for(depth = numelem(dp->name); ; depth++){
  238. found = 0;
  239. for(h = 0; h < HTLEN; h++)
  240. for(ndp = ht[h]; ndp; ndp = ndp->next)
  241. if(inzone(ndp, dp->name, nlen, depth)){
  242. for(rp = ndp->rr; rp; rp = rp->next){
  243. /* there shouldn't be negatives, but just in case */
  244. if(rp->negative)
  245. continue;
  246. /* don't send an soa's, ns's are enough */
  247. if(rp->type == Tsoa)
  248. continue;
  249. r = *rp;
  250. r.next = 0;
  251. reply(1, repp, req);
  252. }
  253. found = 1;
  254. }
  255. if(!found)
  256. break;
  257. }
  258. /* resend the soa */
  259. repp->an = rrlookup(dp, Tsoa, NOneg);
  260. reply(1, repp, req);
  261. rrfreelist(repp->an);
  262. out:
  263. rrfree(repp->qd);
  264. }
  265. static void
  266. getcaller(char *dir)
  267. {
  268. int fd, n;
  269. static char remote[128];
  270. snprint(remote, sizeof(remote), "%s/remote", dir);
  271. fd = open(remote, OREAD);
  272. if(fd < 0)
  273. return;
  274. n = read(fd, remote, sizeof(remote)-1);
  275. close(fd);
  276. if(n <= 0)
  277. return;
  278. if(remote[n-1] == '\n')
  279. n--;
  280. remote[n] = 0;
  281. caller = remote;
  282. }
  283. static void
  284. refreshmain(char *net)
  285. {
  286. int fd;
  287. char file[128];
  288. snprint(file, sizeof(file), "%s/dns", net);
  289. if(debug)
  290. syslog(0, logfile, "refreshing %s", file);
  291. fd = open(file, ORDWR);
  292. if(fd < 0){
  293. syslog(0, logfile, "can't refresh %s", file);
  294. return;
  295. }
  296. fprint(fd, "refresh");
  297. close(fd);
  298. }
  299. /*
  300. * the following varies between dnsdebug and dns
  301. */
  302. void
  303. logreply(int id, uchar *addr, DNSmsg *mp)
  304. {
  305. RR *rp;
  306. syslog(0, LOG, "%d: rcvd %I flags:%s%s%s%s%s", id, addr,
  307. mp->flags & Fauth ? " auth" : "",
  308. mp->flags & Ftrunc ? " trunc" : "",
  309. mp->flags & Frecurse ? " rd" : "",
  310. mp->flags & Fcanrec ? " ra" : "",
  311. mp->flags & (Fauth|Rname) == (Fauth|Rname) ?
  312. " nx" : "");
  313. for(rp = mp->qd; rp != nil; rp = rp->next)
  314. syslog(0, LOG, "%d: rcvd %I qd %s", id, addr, rp->owner->name);
  315. for(rp = mp->an; rp != nil; rp = rp->next)
  316. syslog(0, LOG, "%d: rcvd %I an %R", id, addr, rp);
  317. for(rp = mp->ns; rp != nil; rp = rp->next)
  318. syslog(0, LOG, "%d: rcvd %I ns %R", id, addr, rp);
  319. for(rp = mp->ar; rp != nil; rp = rp->next)
  320. syslog(0, LOG, "%d: rcvd %I ar %R", id, addr, rp);
  321. }
  322. void
  323. logsend(int id, int subid, uchar *addr, char *sname, char *rname, int type)
  324. {
  325. char buf[12];
  326. syslog(0, LOG, "%d.%d: sending to %I/%s %s %s",
  327. id, subid, addr, sname, rname, rrname(type, buf, sizeof buf));
  328. }
  329. RR*
  330. getdnsservers(int class)
  331. {
  332. return dnsservers(class);
  333. }