dnstcp.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385
  1. /*
  2. * dnstcp - serve dns via tcp
  3. */
  4. #include <u.h>
  5. #include <libc.h>
  6. #include <ip.h>
  7. #include "dns.h"
  8. char *LOG;
  9. int cachedb = 1;
  10. char *caller = "";
  11. char *dbfile;
  12. int debug;
  13. uchar ipaddr[IPaddrlen]; /* my ip address */
  14. int inside;
  15. char *logfile = "dns";
  16. int maxage = 60;
  17. char mntpt[Maxpath];
  18. int needrefresh;
  19. ulong now;
  20. int resolver;
  21. int testing;
  22. int traceactivity;
  23. char *zonerefreshprogram;
  24. static int readmsg(int, uchar*, int);
  25. static void reply(int, DNSmsg*, Request*);
  26. static void dnzone(DNSmsg*, DNSmsg*, Request*);
  27. static void getcaller(char*);
  28. static void refreshmain(char*);
  29. void
  30. usage(void)
  31. {
  32. fprint(2, "usage: %s [-rR] [-f ndb-file] [-x netmtpt]\n", argv0);
  33. exits("usage");
  34. }
  35. void
  36. main(int argc, char *argv[])
  37. {
  38. int len, errflags;
  39. uchar buf[512];
  40. char tname[32];
  41. char *err, *ext = "";
  42. Request req;
  43. DNSmsg reqmsg, repmsg;
  44. ARGBEGIN{
  45. case 'd':
  46. debug++;
  47. break;
  48. case 'f':
  49. dbfile = EARGF(usage());
  50. break;
  51. case 'r':
  52. resolver = 1;
  53. break;
  54. case 'R':
  55. norecursion = 1;
  56. break;
  57. case 'x':
  58. ext = EARGF(usage());
  59. break;
  60. default:
  61. usage();
  62. break;
  63. }ARGEND
  64. if(debug < 2)
  65. debug = 0;
  66. if(argc > 0)
  67. getcaller(argv[0]);
  68. dninit();
  69. snprint(mntpt, sizeof mntpt, "/net%s", ext);
  70. if(myipaddr(ipaddr, mntpt) < 0)
  71. sysfatal("can't read my ip address");
  72. syslog(0, logfile, "dnstcp call from %s to %I", caller, ipaddr);
  73. db2cache(1);
  74. memset(&req, 0, sizeof req);
  75. setjmp(req.mret);
  76. req.isslave = 0;
  77. procsetname("main loop");
  78. /* loop on requests */
  79. for(;; putactivity(0)){
  80. now = time(0);
  81. memset(&repmsg, 0, sizeof repmsg);
  82. alarm(10*60*1000);
  83. len = readmsg(0, buf, sizeof buf);
  84. alarm(0);
  85. if(len <= 0)
  86. break;
  87. getactivity(&req, 0);
  88. req.aborttime = now + 15*Min;
  89. errflags = 0;
  90. memset(&reqmsg, 0, sizeof reqmsg);
  91. err = convM2DNS(buf, len, &reqmsg, &errflags);
  92. if(err){
  93. /* first bytes in buf are source IP addr */
  94. syslog(0, logfile, "server: input error: %s from %I",
  95. err, buf);
  96. break;
  97. }
  98. if (errflags == 0)
  99. if(reqmsg.qdcount < 1){
  100. syslog(0, logfile,
  101. "server: no questions from %I", buf);
  102. break;
  103. } else if(reqmsg.flags & Fresp){
  104. syslog(0, logfile,
  105. "server: reply not request from %I", buf);
  106. break;
  107. } else if((reqmsg.flags & Omask) != Oquery){
  108. syslog(0, logfile, "server: op %d from %I",
  109. reqmsg.flags & Omask, buf);
  110. break;
  111. }
  112. if(debug)
  113. syslog(0, logfile, "[%d] %d: serve (%s) %d %s %s",
  114. getpid(), req.id, caller,
  115. reqmsg.id, reqmsg.qd->owner->name,
  116. rrname(reqmsg.qd->type, tname, sizeof tname));
  117. /* loop through each question */
  118. while(reqmsg.qd) {
  119. memset(&repmsg, 0, sizeof repmsg);
  120. if(reqmsg.qd->type == Taxfr)
  121. dnzone(&reqmsg, &repmsg, &req);
  122. else {
  123. dnserver(&reqmsg, &repmsg, &req, buf, errflags);
  124. reply(1, &repmsg, &req);
  125. rrfreelist(repmsg.qd);
  126. rrfreelist(repmsg.an);
  127. rrfreelist(repmsg.ns);
  128. rrfreelist(repmsg.ar);
  129. }
  130. }
  131. rrfreelist(reqmsg.qd);
  132. rrfreelist(reqmsg.an);
  133. rrfreelist(reqmsg.ns);
  134. rrfreelist(reqmsg.ar);
  135. if(req.isslave){
  136. putactivity(0);
  137. _exits(0);
  138. }
  139. }
  140. refreshmain(mntpt);
  141. }
  142. static int
  143. readmsg(int fd, uchar *buf, int max)
  144. {
  145. int n;
  146. uchar x[2];
  147. if(readn(fd, x, 2) != 2)
  148. return -1;
  149. n = (x[0]<<8) | x[1];
  150. if(n > max)
  151. return -1;
  152. if(readn(fd, buf, n) != n)
  153. return -1;
  154. return n;
  155. }
  156. static void
  157. reply(int fd, DNSmsg *rep, Request *req)
  158. {
  159. int len, rv;
  160. char tname[32];
  161. uchar buf[4096];
  162. RR *rp;
  163. if(debug){
  164. syslog(0, logfile, "%d: reply (%s) %s %s %ux",
  165. req->id, caller,
  166. rep->qd->owner->name,
  167. rrname(rep->qd->type, tname, sizeof tname),
  168. rep->flags);
  169. for(rp = rep->an; rp; rp = rp->next)
  170. syslog(0, logfile, "an %R", rp);
  171. for(rp = rep->ns; rp; rp = rp->next)
  172. syslog(0, logfile, "ns %R", rp);
  173. for(rp = rep->ar; rp; rp = rp->next)
  174. syslog(0, logfile, "ar %R", rp);
  175. }
  176. len = convDNS2M(rep, buf+2, sizeof(buf) - 2);
  177. if(len <= 0)
  178. abort(); /* "dnserver: converting reply" */
  179. buf[0] = len>>8;
  180. buf[1] = len;
  181. rv = write(fd, buf, len+2);
  182. if(rv != len+2){
  183. syslog(0, logfile, "[%d] sending reply: %d instead of %d",
  184. getpid(), rv, len+2);
  185. exits(0);
  186. }
  187. }
  188. /*
  189. * Hash table for domain names. The hash is based only on the
  190. * first element of the domain name.
  191. */
  192. extern DN *ht[HTLEN];
  193. static int
  194. numelem(char *name)
  195. {
  196. int i;
  197. i = 1;
  198. for(; *name; name++)
  199. if(*name == '.')
  200. i++;
  201. return i;
  202. }
  203. int
  204. inzone(DN *dp, char *name, int namelen, int depth)
  205. {
  206. int n;
  207. if(dp->name == 0)
  208. return 0;
  209. if(numelem(dp->name) != depth)
  210. return 0;
  211. n = strlen(dp->name);
  212. if(n < namelen)
  213. return 0;
  214. if(strcmp(name, dp->name + n - namelen) != 0)
  215. return 0;
  216. if(n > namelen && dp->name[n - namelen - 1] != '.')
  217. return 0;
  218. return 1;
  219. }
  220. static void
  221. dnzone(DNSmsg *reqp, DNSmsg *repp, Request *req)
  222. {
  223. DN *dp, *ndp;
  224. RR r, *rp;
  225. int h, depth, found, nlen;
  226. memset(repp, 0, sizeof(*repp));
  227. repp->id = reqp->id;
  228. repp->qd = reqp->qd;
  229. reqp->qd = reqp->qd->next;
  230. repp->qd->next = 0;
  231. repp->flags = Fauth | Fresp | Oquery;
  232. if(!norecursion)
  233. repp->flags |= Fcanrec;
  234. dp = repp->qd->owner;
  235. /* send the soa */
  236. repp->an = rrlookup(dp, Tsoa, NOneg);
  237. reply(1, repp, req);
  238. if(repp->an == 0)
  239. goto out;
  240. rrfreelist(repp->an);
  241. repp->an = nil;
  242. nlen = strlen(dp->name);
  243. /* construct a breadth first search of the name space (hard with a hash) */
  244. repp->an = &r;
  245. for(depth = numelem(dp->name); ; depth++){
  246. found = 0;
  247. for(h = 0; h < HTLEN; h++)
  248. for(ndp = ht[h]; ndp; ndp = ndp->next)
  249. if(inzone(ndp, dp->name, nlen, depth)){
  250. for(rp = ndp->rr; rp; rp = rp->next){
  251. /* there shouldn't be negatives, but just in case */
  252. if(rp->negative)
  253. continue;
  254. /* don't send an soa's, ns's are enough */
  255. if(rp->type == Tsoa)
  256. continue;
  257. r = *rp;
  258. r.next = 0;
  259. reply(1, repp, req);
  260. }
  261. found = 1;
  262. }
  263. if(!found)
  264. break;
  265. }
  266. /* resend the soa */
  267. repp->an = rrlookup(dp, Tsoa, NOneg);
  268. reply(1, repp, req);
  269. rrfreelist(repp->an);
  270. repp->an = nil;
  271. out:
  272. rrfree(repp->qd);
  273. repp->qd = nil;
  274. }
  275. static void
  276. getcaller(char *dir)
  277. {
  278. int fd, n;
  279. static char remote[128];
  280. snprint(remote, sizeof(remote), "%s/remote", dir);
  281. fd = open(remote, OREAD);
  282. if(fd < 0)
  283. return;
  284. n = read(fd, remote, sizeof(remote)-1);
  285. close(fd);
  286. if(n <= 0)
  287. return;
  288. if(remote[n-1] == '\n')
  289. n--;
  290. remote[n] = 0;
  291. caller = remote;
  292. }
  293. static void
  294. refreshmain(char *net)
  295. {
  296. int fd;
  297. char file[128];
  298. snprint(file, sizeof(file), "%s/dns", net);
  299. if(debug)
  300. syslog(0, logfile, "refreshing %s", file);
  301. fd = open(file, ORDWR);
  302. if(fd < 0){
  303. syslog(0, logfile, "can't refresh %s", file);
  304. return;
  305. }
  306. fprint(fd, "refresh");
  307. close(fd);
  308. }
  309. /*
  310. * the following varies between dnsdebug and dns
  311. */
  312. void
  313. logreply(int id, uchar *addr, DNSmsg *mp)
  314. {
  315. RR *rp;
  316. syslog(0, LOG, "%d: rcvd %I flags:%s%s%s%s%s", id, addr,
  317. mp->flags & Fauth ? " auth" : "",
  318. mp->flags & Ftrunc ? " trunc" : "",
  319. mp->flags & Frecurse ? " rd" : "",
  320. mp->flags & Fcanrec ? " ra" : "",
  321. mp->flags & (Fauth|Rname) == (Fauth|Rname) ?
  322. " nx" : "");
  323. for(rp = mp->qd; rp != nil; rp = rp->next)
  324. syslog(0, LOG, "%d: rcvd %I qd %s", id, addr, rp->owner->name);
  325. for(rp = mp->an; rp != nil; rp = rp->next)
  326. syslog(0, LOG, "%d: rcvd %I an %R", id, addr, rp);
  327. for(rp = mp->ns; rp != nil; rp = rp->next)
  328. syslog(0, LOG, "%d: rcvd %I ns %R", id, addr, rp);
  329. for(rp = mp->ar; rp != nil; rp = rp->next)
  330. syslog(0, LOG, "%d: rcvd %I ar %R", id, addr, rp);
  331. }
  332. void
  333. logsend(int id, int subid, uchar *addr, char *sname, char *rname, int type)
  334. {
  335. char buf[12];
  336. syslog(0, LOG, "%d.%d: sending to %I/%s %s %s",
  337. id, subid, addr, sname, rname, rrname(type, buf, sizeof buf));
  338. }
  339. RR*
  340. getdnsservers(int class)
  341. {
  342. return dnsservers(class);
  343. }