dnstcp.c 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. /*
  10. * dnstcp - serve dns via tcp
  11. */
  12. #include <u.h>
  13. #include <libc.h>
  14. #include <ip.h>
  15. #include "dns.h"
  16. Cfg cfg;
  17. char *caller = "";
  18. char *dbfile;
  19. int debug;
  20. uint8_t ipaddr[IPaddrlen]; /* my ip address */
  21. char *logfile = "dns";
  22. int maxage = 60*60;
  23. char mntpt[Maxpath];
  24. int needrefresh;
  25. uint32_t now;
  26. int64_t nowns;
  27. int testing;
  28. int traceactivity;
  29. char *zonerefreshprogram;
  30. static int readmsg(int, uint8_t*, int);
  31. static void reply(int, DNSmsg*, Request*);
  32. static void dnzone(DNSmsg*, DNSmsg*, Request*);
  33. static void getcaller(char*);
  34. static void refreshmain(char*);
  35. void
  36. usage(void)
  37. {
  38. fprint(2, "usage: %s [-rR] [-f ndb-file] [-x netmtpt] [conndir]\n", argv0);
  39. exits("usage");
  40. }
  41. void
  42. main(int argc, char *argv[])
  43. {
  44. int len, rcode;
  45. char tname[32];
  46. char *err, *ext = "";
  47. unsigned char buf[64*1024], callip[IPaddrlen];
  48. DNSmsg reqmsg, repmsg;
  49. Request req;
  50. alarm(2*60*1000);
  51. cfg.cachedb = 1;
  52. ARGBEGIN{
  53. case 'd':
  54. debug++;
  55. break;
  56. case 'f':
  57. dbfile = EARGF(usage());
  58. break;
  59. case 'r':
  60. cfg.resolver = 1;
  61. break;
  62. case 'R':
  63. norecursion = 1;
  64. break;
  65. case 'x':
  66. ext = EARGF(usage());
  67. break;
  68. default:
  69. usage();
  70. break;
  71. }ARGEND
  72. if(debug < 2)
  73. debug = 0;
  74. if(argc > 0)
  75. getcaller(argv[0]);
  76. cfg.inside = 1;
  77. dninit();
  78. snprint(mntpt, sizeof mntpt, "/net%s", ext);
  79. if(myipaddr(ipaddr, mntpt) < 0)
  80. sysfatal("can't read my ip address");
  81. dnslog("dnstcp call from %s to %I", caller, ipaddr);
  82. memset(callip, 0, sizeof callip);
  83. parseip(callip, caller);
  84. db2cache(1);
  85. memset(&req, 0, sizeof req);
  86. setjmp(req.mret);
  87. req.isslave = 0;
  88. procsetname("main loop");
  89. /* loop on requests */
  90. for(;; putactivity(0)){
  91. now = time(nil);
  92. memset(&repmsg, 0, sizeof repmsg);
  93. len = readmsg(0, buf, sizeof buf);
  94. if(len <= 0)
  95. break;
  96. getactivity(&req, 0);
  97. req.aborttime = timems() + S2MS(15*Min);
  98. rcode = 0;
  99. memset(&reqmsg, 0, sizeof reqmsg);
  100. err = convM2DNS(buf, len, &reqmsg, &rcode);
  101. if(err){
  102. dnslog("server: input error: %s from %s", err, caller);
  103. free(err);
  104. break;
  105. }
  106. if (rcode == 0)
  107. if(reqmsg.qdcount < 1){
  108. dnslog("server: no questions from %s", caller);
  109. break;
  110. } else if(reqmsg.flags & Fresp){
  111. dnslog("server: reply not request from %s",
  112. caller);
  113. break;
  114. } else if((reqmsg.flags & Omask) != Oquery){
  115. dnslog("server: op %d from %s",
  116. reqmsg.flags & Omask, caller);
  117. break;
  118. }
  119. if(debug)
  120. dnslog("[%d] %d: serve (%s) %d %s %s",
  121. getpid(), req.id, caller,
  122. reqmsg.id, reqmsg.qd->owner->name,
  123. rrname(reqmsg.qd->type, tname, sizeof tname));
  124. /* loop through each question */
  125. while(reqmsg.qd)
  126. if(reqmsg.qd->type == Taxfr)
  127. dnzone(&reqmsg, &repmsg, &req);
  128. else {
  129. dnserver(&reqmsg, &repmsg, &req, callip, rcode);
  130. reply(1, &repmsg, &req);
  131. rrfreelist(repmsg.qd);
  132. rrfreelist(repmsg.an);
  133. rrfreelist(repmsg.ns);
  134. rrfreelist(repmsg.ar);
  135. }
  136. rrfreelist(reqmsg.qd); /* qd will be nil */
  137. rrfreelist(reqmsg.an);
  138. rrfreelist(reqmsg.ns);
  139. rrfreelist(reqmsg.ar);
  140. if(req.isslave){
  141. putactivity(0);
  142. _exits(0);
  143. }
  144. }
  145. refreshmain(mntpt);
  146. }
  147. static int
  148. readmsg(int fd, uint8_t *buf, int max)
  149. {
  150. int n;
  151. uint8_t x[2];
  152. if(readn(fd, x, 2) != 2)
  153. return -1;
  154. n = x[0]<<8 | x[1];
  155. if(n > max)
  156. return -1;
  157. if(readn(fd, buf, n) != n)
  158. return -1;
  159. return n;
  160. }
  161. static void
  162. reply(int fd, DNSmsg *rep, Request *req)
  163. {
  164. int len, rv;
  165. char tname[32];
  166. uint8_t buf[64*1024];
  167. RR *rp;
  168. if(debug){
  169. dnslog("%d: reply (%s) %s %s %ux",
  170. req->id, caller,
  171. rep->qd->owner->name,
  172. rrname(rep->qd->type, tname, sizeof tname),
  173. rep->flags);
  174. for(rp = rep->an; rp; rp = rp->next)
  175. dnslog("an %R", rp);
  176. for(rp = rep->ns; rp; rp = rp->next)
  177. dnslog("ns %R", rp);
  178. for(rp = rep->ar; rp; rp = rp->next)
  179. dnslog("ar %R", rp);
  180. }
  181. len = convDNS2M(rep, buf+2, sizeof(buf) - 2);
  182. buf[0] = len>>8;
  183. buf[1] = len;
  184. rv = write(fd, buf, len+2);
  185. if(rv != len+2){
  186. dnslog("[%d] sending reply: %d instead of %d", getpid(), rv,
  187. len+2);
  188. exits(0);
  189. }
  190. }
  191. /*
  192. * Hash table for domain names. The hash is based only on the
  193. * first element of the domain name.
  194. */
  195. extern DN *ht[HTLEN];
  196. static int
  197. numelem(char *name)
  198. {
  199. int i;
  200. i = 1;
  201. for(; *name; name++)
  202. if(*name == '.')
  203. i++;
  204. return i;
  205. }
  206. int
  207. inzone(DN *dp, char *name, int namelen, int depth)
  208. {
  209. int n;
  210. if(dp->name == nil)
  211. return 0;
  212. if(numelem(dp->name) != depth)
  213. return 0;
  214. n = strlen(dp->name);
  215. if(n < namelen)
  216. return 0;
  217. if(strcmp(name, dp->name + n - namelen) != 0)
  218. return 0;
  219. if(n > namelen && dp->name[n - namelen - 1] != '.')
  220. return 0;
  221. return 1;
  222. }
  223. static void
  224. dnzone(DNSmsg *reqp, DNSmsg *repp, Request *req)
  225. {
  226. DN *dp, *ndp;
  227. RR r, *rp;
  228. int h, depth, found, nlen;
  229. memset(repp, 0, sizeof(*repp));
  230. repp->id = reqp->id;
  231. repp->qd = reqp->qd;
  232. reqp->qd = reqp->qd->next;
  233. repp->qd->next = 0;
  234. repp->flags = Fauth | Fresp | Oquery;
  235. if(!norecursion)
  236. repp->flags |= Fcanrec;
  237. dp = repp->qd->owner;
  238. /* send the soa */
  239. repp->an = rrlookup(dp, Tsoa, NOneg);
  240. reply(1, repp, req);
  241. if(repp->an == 0)
  242. goto out;
  243. rrfreelist(repp->an);
  244. repp->an = nil;
  245. nlen = strlen(dp->name);
  246. /* construct a breadth-first search of the name space (hard with a hash) */
  247. repp->an = &r;
  248. for(depth = numelem(dp->name); ; depth++){
  249. found = 0;
  250. for(h = 0; h < HTLEN; h++)
  251. for(ndp = ht[h]; ndp; ndp = ndp->next)
  252. if(inzone(ndp, dp->name, nlen, depth)){
  253. for(rp = ndp->rr; rp; rp = rp->next){
  254. /*
  255. * there shouldn't be negatives,
  256. * but just in case.
  257. * don't send any soa's,
  258. * ns's are enough.
  259. */
  260. if (rp->negative ||
  261. rp->type == Tsoa)
  262. continue;
  263. r = *rp;
  264. r.next = 0;
  265. reply(1, repp, req);
  266. }
  267. found = 1;
  268. }
  269. if(!found)
  270. break;
  271. }
  272. /* resend the soa */
  273. repp->an = rrlookup(dp, Tsoa, NOneg);
  274. reply(1, repp, req);
  275. rrfreelist(repp->an);
  276. repp->an = nil;
  277. out:
  278. rrfree(repp->qd);
  279. repp->qd = nil;
  280. }
  281. static void
  282. getcaller(char *dir)
  283. {
  284. int fd, n;
  285. static char remote[128];
  286. snprint(remote, sizeof(remote), "%s/remote", dir);
  287. fd = open(remote, OREAD);
  288. if(fd < 0)
  289. return;
  290. n = read(fd, remote, sizeof remote - 1);
  291. close(fd);
  292. if(n <= 0)
  293. return;
  294. if(remote[n-1] == '\n')
  295. n--;
  296. remote[n] = 0;
  297. caller = remote;
  298. }
  299. static void
  300. refreshmain(char *net)
  301. {
  302. int fd;
  303. char file[128];
  304. snprint(file, sizeof(file), "%s/dns", net);
  305. if(debug)
  306. dnslog("refreshing %s", file);
  307. fd = open(file, ORDWR);
  308. if(fd < 0)
  309. dnslog("can't refresh %s", file);
  310. else {
  311. fprint(fd, "refresh");
  312. close(fd);
  313. }
  314. }
  315. /*
  316. * the following varies between dnsdebug and dns
  317. */
  318. void
  319. logreply(int id, uint8_t *addr, DNSmsg *mp)
  320. {
  321. RR *rp;
  322. dnslog("%d: rcvd %I flags:%s%s%s%s%s", id, addr,
  323. mp->flags & Fauth? " auth": "",
  324. mp->flags & Ftrunc? " trunc": "",
  325. mp->flags & Frecurse? " rd": "",
  326. mp->flags & Fcanrec? " ra": "",
  327. (mp->flags & (Fauth|Rmask)) == (Fauth|Rname)? " nx": "");
  328. for(rp = mp->qd; rp != nil; rp = rp->next)
  329. dnslog("%d: rcvd %I qd %s", id, addr, rp->owner->name);
  330. for(rp = mp->an; rp != nil; rp = rp->next)
  331. dnslog("%d: rcvd %I an %R", id, addr, rp);
  332. for(rp = mp->ns; rp != nil; rp = rp->next)
  333. dnslog("%d: rcvd %I ns %R", id, addr, rp);
  334. for(rp = mp->ar; rp != nil; rp = rp->next)
  335. dnslog("%d: rcvd %I ar %R", id, addr, rp);
  336. }
  337. void
  338. logsend(int id, int subid, uint8_t *addr, char *sname, char *rname,
  339. int type)
  340. {
  341. char buf[12];
  342. dnslog("%d.%d: sending to %I/%s %s %s",
  343. id, subid, addr, sname, rname, rrname(type, buf, sizeof buf));
  344. }
  345. RR*
  346. getdnsservers(int class)
  347. {
  348. return dnsservers(class);
  349. }