dnstcp.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <ip.h>
  4. #include "dns.h"
  5. enum
  6. {
  7. Maxpath= 128,
  8. };
  9. char *logfile = "dns";
  10. char *dbfile;
  11. int debug;
  12. int cachedb = 1;
  13. int testing;
  14. int needrefresh;
  15. int resolver;
  16. char mntpt[Maxpath];
  17. char *caller = "";
  18. ulong now;
  19. int maxage;
  20. uchar ipaddr[IPaddrlen]; /* my ip address */
  21. char *LOG;
  22. char *zonerefreshprogram;
  23. static int readmsg(int, uchar*, int);
  24. static void reply(int, DNSmsg*, Request*);
  25. static void dnzone(DNSmsg*, DNSmsg*, Request*);
  26. static void getcaller(char*);
  27. static void refreshmain(char*);
  28. void
  29. main(int argc, char *argv[])
  30. {
  31. int len;
  32. Request req;
  33. DNSmsg reqmsg, repmsg;
  34. uchar buf[512];
  35. char tname[32];
  36. char *err;
  37. char *ext = "";
  38. ARGBEGIN{
  39. case 'd':
  40. debug++;
  41. break;
  42. case 'f':
  43. dbfile = ARGF();
  44. break;
  45. case 'r':
  46. resolver = 1;
  47. break;
  48. case 'x':
  49. ext = ARGF();
  50. break;
  51. }ARGEND
  52. if(debug < 2)
  53. debug = 0;
  54. if(argc > 0)
  55. getcaller(argv[0]);
  56. dninit();
  57. snprint(mntpt, sizeof(mntpt), "/net%s", ext);
  58. if(myipaddr(ipaddr, mntpt) < 0)
  59. sysfatal("can't read my ip address");
  60. syslog(0, logfile, "dnstcp call from %s to %I", caller, ipaddr);
  61. db2cache(1);
  62. setjmp(req.mret);
  63. req.isslave = 0;
  64. /* loop on requests */
  65. for(;; putactivity()){
  66. now = time(0);
  67. memset(&repmsg, 0, sizeof(repmsg));
  68. alarm(10*60*1000);
  69. len = readmsg(0, buf, sizeof(buf));
  70. alarm(0);
  71. if(len <= 0)
  72. break;
  73. getactivity(&req);
  74. req.aborttime = now + 15*Min;
  75. err = convM2DNS(buf, len, &reqmsg);
  76. if(err){
  77. syslog(0, logfile, "server: input error: %s from %I", err, buf);
  78. break;
  79. }
  80. if(reqmsg.qdcount < 1){
  81. syslog(0, logfile, "server: no questions from %I", buf);
  82. break;
  83. }
  84. if(reqmsg.flags & Fresp){
  85. syslog(0, logfile, "server: reply not request from %I", buf);
  86. break;
  87. }
  88. if((reqmsg.flags & Omask) != Oquery){
  89. syslog(0, logfile, "server: op %d from %I", reqmsg.flags & Omask, buf);
  90. break;
  91. }
  92. if(debug)
  93. syslog(0, logfile, "%d: serve (%s) %d %s %s",
  94. req.id, caller,
  95. reqmsg.id,
  96. reqmsg.qd->owner->name,
  97. rrname(reqmsg.qd->type, tname, sizeof tname));
  98. /* loop through each question */
  99. while(reqmsg.qd){
  100. if(reqmsg.qd->type == Taxfr){
  101. dnzone(&reqmsg, &repmsg, &req);
  102. } else {
  103. dnserver(&reqmsg, &repmsg, &req);
  104. reply(1, &repmsg, &req);
  105. rrfreelist(repmsg.qd);
  106. rrfreelist(repmsg.an);
  107. rrfreelist(repmsg.ns);
  108. rrfreelist(repmsg.ar);
  109. }
  110. }
  111. rrfreelist(reqmsg.qd);
  112. rrfreelist(reqmsg.an);
  113. rrfreelist(reqmsg.ns);
  114. rrfreelist(reqmsg.ar);
  115. if(req.isslave){
  116. putactivity();
  117. _exits(0);
  118. }
  119. }
  120. refreshmain(mntpt);
  121. }
  122. static int
  123. readmsg(int fd, uchar *buf, int max)
  124. {
  125. int n;
  126. uchar x[2];
  127. if(readn(fd, x, 2) != 2)
  128. return -1;
  129. n = (x[0]<<8) | x[1];
  130. if(n > max)
  131. return -1;
  132. if(readn(fd, buf, n) != n)
  133. return -1;
  134. return n;
  135. }
  136. static void
  137. reply(int fd, DNSmsg *rep, Request *req)
  138. {
  139. int len, rv;
  140. char tname[32];
  141. uchar buf[4096];
  142. RR *rp;
  143. if(debug){
  144. syslog(0, logfile, "%d: reply (%s) %s %s %ux",
  145. req->id, caller,
  146. rep->qd->owner->name,
  147. rrname(rep->qd->type, tname, sizeof tname),
  148. rep->flags);
  149. for(rp = rep->an; rp; rp = rp->next)
  150. syslog(0, logfile, "an %R", rp);
  151. for(rp = rep->ns; rp; rp = rp->next)
  152. syslog(0, logfile, "ns %R", rp);
  153. for(rp = rep->ar; rp; rp = rp->next)
  154. syslog(0, logfile, "ar %R", rp);
  155. }
  156. len = convDNS2M(rep, buf+2, sizeof(buf) - 2);
  157. if(len <= 0)
  158. abort(); /* "dnserver: converting reply" */;
  159. buf[0] = len>>8;
  160. buf[1] = len;
  161. rv = write(fd, buf, len+2);
  162. if(rv != len+2){
  163. syslog(0, logfile, "sending reply: %d instead of %d", rv, len+2);
  164. exits(0);
  165. }
  166. }
  167. /*
  168. * Hash table for domain names. The hash is based only on the
  169. * first element of the domain name.
  170. */
  171. extern DN *ht[HTLEN];
  172. static int
  173. numelem(char *name)
  174. {
  175. int i;
  176. i = 1;
  177. for(; *name; name++)
  178. if(*name == '.')
  179. i++;
  180. return i;
  181. }
  182. int
  183. inzone(DN *dp, char *name, int namelen, int depth)
  184. {
  185. int n;
  186. if(dp->name == 0)
  187. return 0;
  188. if(numelem(dp->name) != depth)
  189. return 0;
  190. n = strlen(dp->name);
  191. if(n < namelen)
  192. return 0;
  193. if(strcmp(name, dp->name + n - namelen) != 0)
  194. return 0;
  195. if(n > namelen && dp->name[n - namelen - 1] != '.')
  196. return 0;
  197. return 1;
  198. }
  199. static void
  200. dnzone(DNSmsg *reqp, DNSmsg *repp, Request *req)
  201. {
  202. DN *dp, *ndp;
  203. RR r, *rp;
  204. int h, depth, found, nlen;
  205. memset(repp, 0, sizeof(*repp));
  206. repp->id = reqp->id;
  207. repp->flags = Fauth | Fresp | Fcanrec | Oquery;
  208. repp->qd = reqp->qd;
  209. reqp->qd = reqp->qd->next;
  210. repp->qd->next = 0;
  211. dp = repp->qd->owner;
  212. /* send the soa */
  213. repp->an = rrlookup(dp, Tsoa, NOneg);
  214. reply(1, repp, req);
  215. if(repp->an == 0)
  216. goto out;
  217. rrfreelist(repp->an);
  218. nlen = strlen(dp->name);
  219. /* construct a breadth first search of the name space (hard with a hash) */
  220. repp->an = &r;
  221. for(depth = numelem(dp->name); ; depth++){
  222. found = 0;
  223. for(h = 0; h < HTLEN; h++)
  224. for(ndp = ht[h]; ndp; ndp = ndp->next)
  225. if(inzone(ndp, dp->name, nlen, depth)){
  226. for(rp = ndp->rr; rp; rp = rp->next){
  227. /* there shouldn't be negatives, but just in case */
  228. if(rp->negative)
  229. continue;
  230. /* don't send an soa's, ns's are enough */
  231. if(rp->type == Tsoa)
  232. continue;
  233. r = *rp;
  234. r.next = 0;
  235. reply(1, repp, req);
  236. }
  237. found = 1;
  238. }
  239. if(!found)
  240. break;
  241. }
  242. /* resend the soa */
  243. repp->an = rrlookup(dp, Tsoa, NOneg);
  244. reply(1, repp, req);
  245. rrfreelist(repp->an);
  246. out:
  247. rrfree(repp->qd);
  248. }
  249. static void
  250. getcaller(char *dir)
  251. {
  252. int fd, n;
  253. static char remote[128];
  254. snprint(remote, sizeof(remote), "%s/remote", dir);
  255. fd = open(remote, OREAD);
  256. if(fd < 0)
  257. return;
  258. n = read(fd, remote, sizeof(remote)-1);
  259. close(fd);
  260. if(n <= 0)
  261. return;
  262. if(remote[n-1] == '\n')
  263. n--;
  264. remote[n] = 0;
  265. caller = remote;
  266. }
  267. static void
  268. refreshmain(char *net)
  269. {
  270. int fd;
  271. char file[128];
  272. snprint(file, sizeof(file), "%s/dns", net);
  273. if(debug)
  274. syslog(0, logfile, "refreshing %s", file);
  275. fd = open(file, ORDWR);
  276. if(fd < 0){
  277. syslog(0, logfile, "can't refresh %s", file);
  278. return;
  279. }
  280. fprint(fd, "refresh");
  281. close(fd);
  282. }
  283. /*
  284. * the following varies between dnsdebug and dns
  285. */
  286. void
  287. logreply(int id, uchar *addr, DNSmsg *mp)
  288. {
  289. RR *rp;
  290. syslog(0, LOG, "%d: rcvd %I flags:%s%s%s%s%s", id, addr,
  291. mp->flags & Fauth ? " auth" : "",
  292. mp->flags & Ftrunc ? " trunc" : "",
  293. mp->flags & Frecurse ? " rd" : "",
  294. mp->flags & Fcanrec ? " ra" : "",
  295. mp->flags & (Fauth|Rname) == (Fauth|Rname) ?
  296. " nx" : "");
  297. for(rp = mp->qd; rp != nil; rp = rp->next)
  298. syslog(0, LOG, "%d: rcvd %I qd %s", id, addr, rp->owner->name);
  299. for(rp = mp->an; rp != nil; rp = rp->next)
  300. syslog(0, LOG, "%d: rcvd %I an %R", id, addr, rp);
  301. for(rp = mp->ns; rp != nil; rp = rp->next)
  302. syslog(0, LOG, "%d: rcvd %I ns %R", id, addr, rp);
  303. for(rp = mp->ar; rp != nil; rp = rp->next)
  304. syslog(0, LOG, "%d: rcvd %I ar %R", id, addr, rp);
  305. }
  306. void
  307. logsend(int id, int subid, uchar *addr, char *sname, char *rname, int type)
  308. {
  309. char buf[12];
  310. syslog(0, LOG, "%d.%d: sending to %I/%s %s %s",
  311. id, subid, addr, sname, rname, rrname(type, buf, sizeof buf));
  312. }
  313. RR*
  314. getdnsservers(int class)
  315. {
  316. return dnsservers(class);
  317. }