2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2021-08-03 15:31:20 +00:00
|
|
|
|
|
|
|
package resolver
|
|
|
|
|
|
|
|
import (
|
2023-09-07 20:27:50 +00:00
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"encoding/binary"
|
2022-04-18 19:50:26 +00:00
|
|
|
"flag"
|
2021-08-03 15:31:20 +00:00
|
|
|
"fmt"
|
2023-09-07 20:27:50 +00:00
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"net/netip"
|
|
|
|
"os"
|
2021-08-03 15:31:20 +00:00
|
|
|
"reflect"
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
"slices"
|
2021-08-03 15:31:20 +00:00
|
|
|
"strings"
|
2023-09-07 20:27:50 +00:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
2021-08-03 15:31:20 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-09-19 00:34:33 +00:00
|
|
|
dns "golang.org/x/net/dns/dnsmessage"
|
2023-10-03 20:26:38 +00:00
|
|
|
"tailscale.com/control/controlknobs"
|
2023-09-07 20:27:50 +00:00
|
|
|
"tailscale.com/envknob"
|
2024-07-29 17:48:46 +00:00
|
|
|
"tailscale.com/health"
|
2023-09-07 20:27:50 +00:00
|
|
|
"tailscale.com/net/netmon"
|
|
|
|
"tailscale.com/net/tsdial"
|
2021-08-03 13:56:31 +00:00
|
|
|
"tailscale.com/types/dnstype"
|
2021-08-03 15:31:20 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func (rr resolverAndDelay) String() string {
|
2021-08-03 13:56:31 +00:00
|
|
|
return fmt.Sprintf("%v+%v", rr.name, rr.startDelay)
|
2021-08-03 15:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestResolversWithDelays(t *testing.T) {
|
|
|
|
// query
|
2022-05-03 21:41:58 +00:00
|
|
|
q := func(ss ...string) (ipps []*dnstype.Resolver) {
|
2022-04-19 04:58:00 +00:00
|
|
|
for _, host := range ss {
|
2022-05-03 21:41:58 +00:00
|
|
|
ipps = append(ipps, &dnstype.Resolver{Addr: host})
|
2021-08-03 15:31:20 +00:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// output
|
|
|
|
o := func(ss ...string) (rr []resolverAndDelay) {
|
|
|
|
for _, s := range ss {
|
|
|
|
var d time.Duration
|
2022-03-19 19:42:46 +00:00
|
|
|
s, durStr, hasPlus := strings.Cut(s, "+")
|
|
|
|
if hasPlus {
|
2021-08-03 15:31:20 +00:00
|
|
|
var err error
|
2022-03-19 19:42:46 +00:00
|
|
|
d, err = time.ParseDuration(durStr)
|
2021-08-03 15:31:20 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("parsing duration in %q: %v", s, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rr = append(rr, resolverAndDelay{
|
2022-05-03 21:41:58 +00:00
|
|
|
name: &dnstype.Resolver{Addr: s},
|
2021-08-03 15:31:20 +00:00
|
|
|
startDelay: d,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
2022-05-03 21:41:58 +00:00
|
|
|
in []*dnstype.Resolver
|
2021-08-03 15:31:20 +00:00
|
|
|
want []resolverAndDelay
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "unknown-no-delays",
|
2022-04-19 04:58:00 +00:00
|
|
|
in: q("1.2.3.4", "2.3.4.5"),
|
|
|
|
want: o("1.2.3.4", "2.3.4.5"),
|
2021-08-03 15:31:20 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "google-all-ipv4",
|
2022-04-19 04:58:00 +00:00
|
|
|
in: q("8.8.8.8", "8.8.4.4"),
|
|
|
|
want: o("https://dns.google/dns-query", "8.8.8.8+0.5s", "8.8.4.4+0.7s"),
|
2021-08-03 15:31:20 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "google-only-ipv6",
|
2022-04-19 04:58:00 +00:00
|
|
|
in: q("2001:4860:4860::8888", "2001:4860:4860::8844"),
|
|
|
|
want: o("https://dns.google/dns-query", "2001:4860:4860::8888+0.5s", "2001:4860:4860::8844+0.7s"),
|
2021-08-03 15:31:20 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "google-all-four",
|
2022-04-19 04:58:00 +00:00
|
|
|
in: q("8.8.8.8", "8.8.4.4", "2001:4860:4860::8888", "2001:4860:4860::8844"),
|
|
|
|
want: o("https://dns.google/dns-query", "8.8.8.8+0.5s", "8.8.4.4+0.7s", "2001:4860:4860::8888+0.5s", "2001:4860:4860::8844+0.7s"),
|
2021-08-03 15:31:20 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "quad9-one-v4-one-v6",
|
2022-04-19 04:58:00 +00:00
|
|
|
in: q("9.9.9.9", "2620:fe::fe"),
|
|
|
|
want: o("https://dns.quad9.net/dns-query", "9.9.9.9+0.5s", "2620:fe::fe+0.5s"),
|
2022-09-06 18:15:30 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "nextdns-ipv6-expand",
|
|
|
|
in: q("2a07:a8c0::c3:a884"),
|
|
|
|
want: o("https://dns.nextdns.io/c3a884"),
|
2022-09-08 22:54:29 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "nextdns-doh-input",
|
|
|
|
in: q("https://dns.nextdns.io/c3a884"),
|
|
|
|
want: o("https://dns.nextdns.io/c3a884"),
|
2021-08-03 15:31:20 +00:00
|
|
|
},
|
2023-06-23 00:47:36 +00:00
|
|
|
{
|
|
|
|
name: "controld-ipv6-expand",
|
|
|
|
in: q("2606:1a40:0:6:7b5b:5949:35ad:0"),
|
|
|
|
want: o("https://dns.controld.com/hyq3ipr2ct"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "controld-doh-input",
|
|
|
|
in: q("https://dns.controld.com/hyq3ipr2ct"),
|
|
|
|
want: o("https://dns.controld.com/hyq3ipr2ct"),
|
|
|
|
},
|
2021-08-03 15:31:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got := resolversWithDelays(tt.in)
|
|
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
|
|
t.Errorf("got %v; want %v", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2021-09-19 00:34:33 +00:00
|
|
|
|
|
|
|
func TestGetRCode(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
packet []byte
|
|
|
|
want dns.RCode
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "empty",
|
|
|
|
packet: []byte{},
|
|
|
|
want: dns.RCode(5),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "too-short",
|
|
|
|
packet: []byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
|
|
|
want: dns.RCode(5),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "noerror",
|
|
|
|
packet: []byte{0xC4, 0xFE, 0x81, 0xA0, 0x00, 0x01, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01},
|
|
|
|
want: dns.RCode(0),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "refused",
|
|
|
|
packet: []byte{0xee, 0xa1, 0x81, 0x05, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01},
|
|
|
|
want: dns.RCode(5),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "nxdomain",
|
|
|
|
packet: []byte{0x34, 0xf4, 0x81, 0x83, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01},
|
|
|
|
want: dns.RCode(3),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got := getRCode(tt.packet)
|
|
|
|
if got != tt.want {
|
|
|
|
t.Errorf("got %d; want %d", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2021-10-15 02:39:11 +00:00
|
|
|
|
2022-04-18 19:50:26 +00:00
|
|
|
var testDNS = flag.Bool("test-dns", false, "run tests that require a working DNS server")
|
|
|
|
|
|
|
|
func TestGetKnownDoHClientForProvider(t *testing.T) {
|
|
|
|
var fwd forwarder
|
|
|
|
c, ok := fwd.getKnownDoHClientForProvider("https://dns.google/dns-query")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("not found")
|
|
|
|
}
|
|
|
|
if !*testDNS {
|
|
|
|
t.Skip("skipping without --test-dns")
|
|
|
|
}
|
|
|
|
res, err := c.Head("https://dns.google/")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer res.Body.Close()
|
|
|
|
t.Logf("Got: %+v", res)
|
|
|
|
}
|
|
|
|
|
2021-12-19 03:03:38 +00:00
|
|
|
func BenchmarkNameFromQuery(b *testing.B) {
|
|
|
|
builder := dns.NewBuilder(nil, dns.Header{})
|
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: dns.MustNewName("foo.example."),
|
|
|
|
Type: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
})
|
|
|
|
msg, err := builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
b.Fatal(err)
|
|
|
|
}
|
|
|
|
b.ResetTimer()
|
|
|
|
b.ReportAllocs()
|
2024-04-16 20:15:13 +00:00
|
|
|
for range b.N {
|
2024-08-08 20:41:08 +00:00
|
|
|
_, _, err := nameFromQuery(msg)
|
2021-12-19 03:03:38 +00:00
|
|
|
if err != nil {
|
|
|
|
b.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-07-08 13:22:50 +00:00
|
|
|
|
|
|
|
// Reproduces https://github.com/tailscale/tailscale/issues/2533
|
|
|
|
// Fixed by https://github.com/tailscale/tailscale/commit/f414a9cc01f3264912513d07c0244ff4f3e4ba54
|
|
|
|
//
|
|
|
|
// NOTE: fuzz tests act like unit tests when run without `-fuzz`
|
|
|
|
func FuzzClampEDNSSize(f *testing.F) {
|
|
|
|
// Empty DNS packet
|
|
|
|
f.Add([]byte{
|
|
|
|
// query id
|
|
|
|
0x12, 0x34,
|
|
|
|
// flags: standard query, recurse
|
|
|
|
0x01, 0x20,
|
|
|
|
// num questions
|
|
|
|
0x00, 0x00,
|
|
|
|
// num answers
|
|
|
|
0x00, 0x00,
|
|
|
|
// num authority RRs
|
|
|
|
0x00, 0x00,
|
|
|
|
// num additional RRs
|
|
|
|
0x00, 0x00,
|
|
|
|
})
|
|
|
|
|
|
|
|
// Empty OPT
|
|
|
|
f.Add([]byte{
|
|
|
|
// header
|
|
|
|
0xaf, 0x66, 0x01, 0x20, 0x00, 0x01, 0x00, 0x00,
|
|
|
|
0x00, 0x00, 0x00, 0x01,
|
|
|
|
// query
|
|
|
|
0x06, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x03, 0x63, 0x6f,
|
|
|
|
0x6d, 0x00, 0x00, 0x01, 0x00, 0x01,
|
|
|
|
// OPT
|
|
|
|
0x00, // name: <root>
|
|
|
|
0x00, 0x29, // type: OPT
|
|
|
|
0x10, 0x00, // UDP payload size
|
|
|
|
0x00, // higher bits in extended RCODE
|
|
|
|
0x00, // EDNS0 version
|
|
|
|
0x80, 0x00, // "Z" field
|
|
|
|
0x00, 0x00, // data length
|
|
|
|
})
|
|
|
|
|
|
|
|
// Query for "google.com"
|
|
|
|
f.Add([]byte{
|
|
|
|
// header
|
|
|
|
0xaf, 0x66, 0x01, 0x20, 0x00, 0x01, 0x00, 0x00,
|
|
|
|
0x00, 0x00, 0x00, 0x01,
|
|
|
|
// query
|
|
|
|
0x06, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x03, 0x63, 0x6f,
|
|
|
|
0x6d, 0x00, 0x00, 0x01, 0x00, 0x01,
|
|
|
|
// OPT
|
|
|
|
0x00, 0x00, 0x29, 0x10, 0x00, 0x00, 0x00, 0x80, 0x00, 0x00,
|
|
|
|
0x0c, 0x00, 0x0a, 0x00, 0x08, 0x62, 0x18, 0x1a, 0xcb, 0x19,
|
|
|
|
0xd7, 0xee, 0x23,
|
|
|
|
})
|
|
|
|
|
|
|
|
f.Fuzz(func(t *testing.T, data []byte) {
|
|
|
|
clampEDNSSize(data, maxResponseBytes)
|
|
|
|
})
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
type testDNSServerOptions struct {
|
|
|
|
SkipUDP bool
|
|
|
|
SkipTCP bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func runDNSServer(tb testing.TB, opts *testDNSServerOptions, response []byte, onRequest func(bool, []byte)) (port uint16) {
|
|
|
|
if opts != nil && opts.SkipUDP && opts.SkipTCP {
|
|
|
|
tb.Fatal("cannot skip both UDP and TCP servers")
|
|
|
|
}
|
|
|
|
|
2023-09-07 20:27:50 +00:00
|
|
|
tcpResponse := make([]byte, len(response)+2)
|
|
|
|
binary.BigEndian.PutUint16(tcpResponse, uint16(len(response)))
|
|
|
|
copy(tcpResponse[2:], response)
|
|
|
|
|
|
|
|
// Repeatedly listen until we can get the same port.
|
|
|
|
const tries = 25
|
|
|
|
var (
|
|
|
|
tcpLn *net.TCPListener
|
|
|
|
udpLn *net.UDPConn
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
for try := 0; try < tries; try++ {
|
|
|
|
if tcpLn != nil {
|
|
|
|
tcpLn.Close()
|
|
|
|
tcpLn = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
tcpLn, err = net.ListenTCP("tcp4", &net.TCPAddr{
|
|
|
|
IP: net.IPv4(127, 0, 0, 1),
|
|
|
|
Port: 0, // Choose one
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
tb.Fatal(err)
|
|
|
|
}
|
|
|
|
udpLn, err = net.ListenUDP("udp4", &net.UDPAddr{
|
|
|
|
IP: net.IPv4(127, 0, 0, 1),
|
|
|
|
Port: tcpLn.Addr().(*net.TCPAddr).Port,
|
|
|
|
})
|
|
|
|
if err == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if tcpLn == nil || udpLn == nil {
|
|
|
|
if tcpLn != nil {
|
|
|
|
tcpLn.Close()
|
|
|
|
}
|
|
|
|
if udpLn != nil {
|
|
|
|
udpLn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Skip instead of being fatal to avoid flaking on extremely
|
|
|
|
// heavily-loaded CI systems.
|
|
|
|
tb.Skipf("failed to listen on same port for TCP/UDP after %d tries", tries)
|
|
|
|
}
|
|
|
|
|
|
|
|
port = uint16(tcpLn.Addr().(*net.TCPAddr).Port)
|
|
|
|
|
|
|
|
handleConn := func(conn net.Conn) {
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
// Read the length header, then the buffer
|
|
|
|
var length uint16
|
|
|
|
if err := binary.Read(conn, binary.BigEndian, &length); err != nil {
|
|
|
|
tb.Logf("error reading length header: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
req := make([]byte, length)
|
|
|
|
n, err := io.ReadFull(conn, req)
|
|
|
|
if err != nil {
|
|
|
|
tb.Logf("error reading query: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
req = req[:n]
|
|
|
|
onRequest(true, req)
|
|
|
|
|
|
|
|
// Write response
|
|
|
|
if _, err := conn.Write(tcpResponse); err != nil {
|
|
|
|
tb.Logf("error writing response: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
2023-10-03 20:26:38 +00:00
|
|
|
|
|
|
|
if opts == nil || !opts.SkipTCP {
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
for {
|
|
|
|
conn, err := tcpLn.Accept()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
go handleConn(conn)
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
2023-10-03 20:26:38 +00:00
|
|
|
}()
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
|
|
|
handleUDP := func(addr netip.AddrPort, req []byte) {
|
|
|
|
onRequest(false, req)
|
|
|
|
if _, err := udpLn.WriteToUDPAddrPort(response, addr); err != nil {
|
|
|
|
tb.Logf("error writing response: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
if opts == nil || !opts.SkipUDP {
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
for {
|
|
|
|
buf := make([]byte, 65535)
|
|
|
|
n, addr, err := udpLn.ReadFromUDPAddrPort(buf)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
buf = buf[:n]
|
|
|
|
go handleUDP(addr, buf)
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
2023-10-03 20:26:38 +00:00
|
|
|
}()
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
|
|
|
tb.Cleanup(func() {
|
|
|
|
tcpLn.Close()
|
|
|
|
udpLn.Close()
|
|
|
|
tb.Logf("waiting for listeners to finish...")
|
|
|
|
wg.Wait()
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
func enableDebug(tb testing.TB) {
|
2023-09-07 20:27:50 +00:00
|
|
|
const debugKnob = "TS_DEBUG_DNS_FORWARD_SEND"
|
|
|
|
oldVal := os.Getenv(debugKnob)
|
|
|
|
envknob.Setenv(debugKnob, "true")
|
2023-10-03 20:26:38 +00:00
|
|
|
tb.Cleanup(func() { envknob.Setenv(debugKnob, oldVal) })
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
func makeLargeResponse(tb testing.TB, domain string) (request, response []byte) {
|
|
|
|
name := dns.MustNewName(domain)
|
2023-09-07 20:27:50 +00:00
|
|
|
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
builder := dns.NewBuilder(nil, dns.Header{Response: true})
|
2023-10-03 20:26:38 +00:00
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: name,
|
|
|
|
Type: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
})
|
|
|
|
builder.StartAnswers()
|
2024-04-16 20:15:13 +00:00
|
|
|
for i := range 120 {
|
2023-10-03 20:26:38 +00:00
|
|
|
builder.AResource(dns.ResourceHeader{
|
2023-09-07 20:27:50 +00:00
|
|
|
Name: name,
|
|
|
|
Class: dns.ClassINET,
|
2023-10-03 20:26:38 +00:00
|
|
|
TTL: 300,
|
|
|
|
}, dns.AResource{
|
|
|
|
A: [4]byte{127, 0, 0, byte(i)},
|
2023-09-07 20:27:50 +00:00
|
|
|
})
|
2023-10-03 20:26:38 +00:00
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
var err error
|
|
|
|
response, err = builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
tb.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(response) <= maxResponseBytes {
|
|
|
|
tb.Fatalf("got len(largeResponse)=%d, want > %d", len(response), maxResponseBytes)
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Our request is a single A query for the domain in the answer, above.
|
2023-10-03 20:26:38 +00:00
|
|
|
builder = dns.NewBuilder(nil, dns.Header{})
|
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: dns.MustNewName(domain),
|
|
|
|
Type: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
2023-09-07 20:27:50 +00:00
|
|
|
})
|
2023-10-03 20:26:38 +00:00
|
|
|
request, err = builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
tb.Fatal(err)
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
2023-10-03 20:26:38 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
func runTestQuery(tb testing.TB, request []byte, modify func(*forwarder), ports ...uint16) ([]byte, error) {
|
2023-10-03 20:26:38 +00:00
|
|
|
netMon, err := netmon.New(tb.Logf)
|
2023-09-07 20:27:50 +00:00
|
|
|
if err != nil {
|
2023-10-03 20:26:38 +00:00
|
|
|
tb.Fatal(err)
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var dialer tsdial.Dialer
|
|
|
|
dialer.SetNetMon(netMon)
|
|
|
|
|
2024-07-29 17:48:46 +00:00
|
|
|
fwd := newForwarder(tb.Logf, netMon, nil, &dialer, new(health.Tracker), nil)
|
2023-10-03 20:26:38 +00:00
|
|
|
if modify != nil {
|
|
|
|
modify(fwd)
|
|
|
|
}
|
2023-09-07 20:27:50 +00:00
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
resolvers := make([]resolverAndDelay, len(ports))
|
|
|
|
for i, port := range ports {
|
|
|
|
resolvers[i].name = &dnstype.Resolver{Addr: fmt.Sprintf("127.0.0.1:%d", port)}
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
|
|
|
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
rpkt := packet{
|
|
|
|
bs: request,
|
|
|
|
family: "tcp",
|
|
|
|
addr: netip.MustParseAddrPort("127.0.0.1:12345"),
|
|
|
|
}
|
|
|
|
|
|
|
|
rchan := make(chan packet, 1)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
tb.Cleanup(cancel)
|
2024-10-07 22:08:22 +00:00
|
|
|
err = fwd.forwardWithDestChan(ctx, rpkt, rchan, resolvers...)
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
select {
|
|
|
|
case res := <-rchan:
|
|
|
|
return res.bs, err
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, ctx.Err()
|
|
|
|
}
|
2023-10-03 20:26:38 +00:00
|
|
|
}
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
// makeTestRequest returns a new TypeA request for the given domain.
|
|
|
|
func makeTestRequest(tb testing.TB, domain string) []byte {
|
|
|
|
tb.Helper()
|
|
|
|
name := dns.MustNewName(domain)
|
|
|
|
builder := dns.NewBuilder(nil, dns.Header{})
|
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: name,
|
|
|
|
Type: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
})
|
|
|
|
request, err := builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
tb.Fatal(err)
|
|
|
|
}
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
// makeTestResponse returns a new Type A response for the given domain,
|
|
|
|
// with the specified status code and zero or more addresses.
|
|
|
|
func makeTestResponse(tb testing.TB, domain string, code dns.RCode, addrs ...netip.Addr) []byte {
|
|
|
|
tb.Helper()
|
|
|
|
name := dns.MustNewName(domain)
|
|
|
|
builder := dns.NewBuilder(nil, dns.Header{
|
|
|
|
Response: true,
|
|
|
|
Authoritative: true,
|
|
|
|
RCode: code,
|
|
|
|
})
|
|
|
|
builder.StartQuestions()
|
|
|
|
q := dns.Question{
|
|
|
|
Name: name,
|
|
|
|
Type: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
}
|
|
|
|
builder.Question(q)
|
|
|
|
if len(addrs) > 0 {
|
|
|
|
builder.StartAnswers()
|
|
|
|
for _, addr := range addrs {
|
|
|
|
builder.AResource(dns.ResourceHeader{
|
|
|
|
Name: q.Name,
|
|
|
|
Class: q.Class,
|
|
|
|
TTL: 120,
|
|
|
|
}, dns.AResource{
|
|
|
|
A: addr.As4(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
response, err := builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
tb.Fatal(err)
|
|
|
|
}
|
|
|
|
return response
|
|
|
|
}
|
|
|
|
|
|
|
|
func mustRunTestQuery(tb testing.TB, request []byte, modify func(*forwarder), ports ...uint16) []byte {
|
|
|
|
resp, err := runTestQuery(tb, request, modify, ports...)
|
2023-09-07 20:27:50 +00:00
|
|
|
if err != nil {
|
2023-10-03 20:26:38 +00:00
|
|
|
tb.Fatalf("error making request: %v", err)
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
2023-10-03 20:26:38 +00:00
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwarderTCPFallback(t *testing.T) {
|
|
|
|
enableDebug(t)
|
|
|
|
|
|
|
|
const domain = "large-dns-response.tailscale.com."
|
|
|
|
|
|
|
|
// Make a response that's very large, containing a bunch of localhost addresses.
|
|
|
|
request, largeResponse := makeLargeResponse(t, domain)
|
|
|
|
|
2023-10-04 01:24:53 +00:00
|
|
|
var sawTCPRequest atomic.Bool
|
2023-10-03 20:26:38 +00:00
|
|
|
port := runDNSServer(t, nil, largeResponse, func(isTCP bool, gotRequest []byte) {
|
|
|
|
if isTCP {
|
|
|
|
t.Logf("saw TCP request")
|
|
|
|
sawTCPRequest.Store(true)
|
|
|
|
} else {
|
|
|
|
t.Logf("saw UDP request")
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(request, gotRequest) {
|
|
|
|
t.Errorf("invalid request\ngot: %+v\nwant: %+v", gotRequest, request)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
resp := mustRunTestQuery(t, request, nil, port)
|
2023-09-07 20:27:50 +00:00
|
|
|
if !bytes.Equal(resp, largeResponse) {
|
|
|
|
t.Errorf("invalid response\ngot: %+v\nwant: %+v", resp, largeResponse)
|
|
|
|
}
|
|
|
|
if !sawTCPRequest.Load() {
|
|
|
|
t.Errorf("DNS server never saw TCP request")
|
|
|
|
}
|
2023-10-04 01:24:53 +00:00
|
|
|
|
|
|
|
// NOTE: can't assert that we see a UDP request here since we might
|
|
|
|
// race and run the TCP query first. We test the UDP codepath in
|
|
|
|
// TestForwarderTCPFallbackDisabled below, though.
|
2023-09-07 20:27:50 +00:00
|
|
|
}
|
2023-10-03 20:26:38 +00:00
|
|
|
|
|
|
|
// Test to ensure that if the UDP listener is unresponsive, we always make a
|
|
|
|
// TCP request even if we never get a response.
|
|
|
|
func TestForwarderTCPFallbackTimeout(t *testing.T) {
|
|
|
|
enableDebug(t)
|
|
|
|
|
|
|
|
const domain = "large-dns-response.tailscale.com."
|
|
|
|
|
|
|
|
// Make a response that's very large, containing a bunch of localhost addresses.
|
|
|
|
request, largeResponse := makeLargeResponse(t, domain)
|
|
|
|
|
|
|
|
var sawTCPRequest atomic.Bool
|
|
|
|
opts := &testDNSServerOptions{SkipUDP: true}
|
|
|
|
port := runDNSServer(t, opts, largeResponse, func(isTCP bool, gotRequest []byte) {
|
|
|
|
if isTCP {
|
|
|
|
t.Logf("saw TCP request")
|
|
|
|
sawTCPRequest.Store(true)
|
|
|
|
} else {
|
|
|
|
t.Error("saw unexpected UDP request")
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(request, gotRequest) {
|
|
|
|
t.Errorf("invalid request\ngot: %+v\nwant: %+v", gotRequest, request)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
resp := mustRunTestQuery(t, request, nil, port)
|
2023-10-03 20:26:38 +00:00
|
|
|
if !bytes.Equal(resp, largeResponse) {
|
|
|
|
t.Errorf("invalid response\ngot: %+v\nwant: %+v", resp, largeResponse)
|
|
|
|
}
|
|
|
|
if !sawTCPRequest.Load() {
|
|
|
|
t.Errorf("DNS server never saw TCP request")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwarderTCPFallbackDisabled(t *testing.T) {
|
|
|
|
enableDebug(t)
|
|
|
|
|
|
|
|
const domain = "large-dns-response.tailscale.com."
|
|
|
|
|
|
|
|
// Make a response that's very large, containing a bunch of localhost addresses.
|
|
|
|
request, largeResponse := makeLargeResponse(t, domain)
|
|
|
|
|
|
|
|
var sawUDPRequest atomic.Bool
|
|
|
|
port := runDNSServer(t, nil, largeResponse, func(isTCP bool, gotRequest []byte) {
|
|
|
|
if isTCP {
|
|
|
|
t.Error("saw unexpected TCP request")
|
|
|
|
} else {
|
|
|
|
t.Logf("saw UDP request")
|
|
|
|
sawUDPRequest.Store(true)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(request, gotRequest) {
|
|
|
|
t.Errorf("invalid request\ngot: %+v\nwant: %+v", gotRequest, request)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
resp := mustRunTestQuery(t, request, func(fwd *forwarder) {
|
2023-10-03 20:26:38 +00:00
|
|
|
// Disable retries for this test.
|
|
|
|
fwd.controlKnobs = &controlknobs.Knobs{}
|
|
|
|
fwd.controlKnobs.DisableDNSForwarderTCPRetries.Store(true)
|
2024-10-07 22:08:22 +00:00
|
|
|
}, port)
|
2023-10-03 20:26:38 +00:00
|
|
|
|
|
|
|
wantResp := append([]byte(nil), largeResponse[:maxResponseBytes]...)
|
|
|
|
|
|
|
|
// Set the truncated flag on the expected response, since that's what we expect.
|
|
|
|
flags := binary.BigEndian.Uint16(wantResp[2:4])
|
|
|
|
flags |= dnsFlagTruncated
|
|
|
|
binary.BigEndian.PutUint16(wantResp[2:4], flags)
|
|
|
|
|
|
|
|
if !bytes.Equal(resp, wantResp) {
|
|
|
|
t.Errorf("invalid response\ngot (%d): %+v\nwant (%d): %+v", len(resp), resp, len(wantResp), wantResp)
|
|
|
|
}
|
|
|
|
if !sawUDPRequest.Load() {
|
|
|
|
t.Errorf("DNS server never saw UDP request")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test to ensure that we propagate DNS errors
|
|
|
|
func TestForwarderTCPFallbackError(t *testing.T) {
|
|
|
|
enableDebug(t)
|
|
|
|
|
|
|
|
const domain = "error-response.tailscale.com."
|
|
|
|
|
|
|
|
// Our response is a SERVFAIL
|
2024-10-07 22:08:22 +00:00
|
|
|
response := makeTestResponse(t, domain, dns.RCodeServerFailure)
|
2023-10-03 20:26:38 +00:00
|
|
|
|
|
|
|
// Our request is a single A query for the domain in the answer, above.
|
2024-10-07 22:08:22 +00:00
|
|
|
request := makeTestRequest(t, domain)
|
2023-10-03 20:26:38 +00:00
|
|
|
|
|
|
|
var sawRequest atomic.Bool
|
|
|
|
port := runDNSServer(t, nil, response, func(isTCP bool, gotRequest []byte) {
|
|
|
|
sawRequest.Store(true)
|
|
|
|
if !bytes.Equal(request, gotRequest) {
|
|
|
|
t.Errorf("invalid request\ngot: %+v\nwant: %+v", gotRequest, request)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
resp, err := runTestQuery(t, request, nil, port)
|
2023-10-03 20:26:38 +00:00
|
|
|
if !sawRequest.Load() {
|
|
|
|
t.Error("did not see DNS request")
|
|
|
|
}
|
2024-10-04 20:11:46 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("wanted nil, got %v", err)
|
|
|
|
}
|
|
|
|
var parser dns.Parser
|
|
|
|
respHeader, err := parser.Start(resp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("parser.Start() failed: %v", err)
|
|
|
|
}
|
|
|
|
if got, want := respHeader.RCode, dns.RCodeServerFailure; got != want {
|
|
|
|
t.Errorf("wanted %v, got %v", want, got)
|
2023-10-03 20:26:38 +00:00
|
|
|
}
|
|
|
|
}
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
// Test to ensure that if we have more than one resolver, and at least one of them
|
|
|
|
// returns a successful response, we propagate it.
|
|
|
|
func TestForwarderWithManyResolvers(t *testing.T) {
|
|
|
|
enableDebug(t)
|
|
|
|
|
|
|
|
const domain = "example.com."
|
|
|
|
request := makeTestRequest(t, domain)
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
responses [][]byte // upstream responses
|
|
|
|
wantResponses [][]byte // we should receive one of these from the forwarder
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Success",
|
|
|
|
responses: [][]byte{ // All upstream servers returned successful, but different, response.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.2")),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.3")),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{ // We may forward whichever response is received first.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.2")),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.3")),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ServFail",
|
|
|
|
responses: [][]byte{ // All upstream servers returned a SERVFAIL.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ServFail+Success",
|
|
|
|
responses: [][]byte{ // All upstream servers fail except for one.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{ // We should forward the successful response.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "NXDomain",
|
|
|
|
responses: [][]byte{ // All upstream servers returned NXDOMAIN.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "NXDomain+Success",
|
|
|
|
responses: [][]byte{ // All upstream servers returned NXDOMAIN except for one.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{ // However, only SERVFAIL are considered to be errors. Therefore, we may forward any response.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Refused",
|
|
|
|
responses: [][]byte{ // All upstream servers return different failures.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{ // Refused is not considered to be an error and can be forwarded.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeSuccess, netip.MustParseAddr("127.0.0.1")),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "MixFail",
|
|
|
|
responses: [][]byte{ // All upstream servers return different failures.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeServerFailure),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
},
|
|
|
|
wantResponses: [][]byte{ // Both NXDomain and Refused can be forwarded.
|
|
|
|
makeTestResponse(t, domain, dns.RCodeNameError),
|
|
|
|
makeTestResponse(t, domain, dns.RCodeRefused),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
ports := make([]uint16, len(tt.responses))
|
|
|
|
for i := range tt.responses {
|
|
|
|
ports[i] = runDNSServer(t, nil, tt.responses[i], func(isTCP bool, gotRequest []byte) {})
|
|
|
|
}
|
|
|
|
gotResponse, err := runTestQuery(t, request, nil, ports...)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("wanted nil, got %v", err)
|
|
|
|
}
|
|
|
|
responseOk := slices.ContainsFunc(tt.wantResponses, func(wantResponse []byte) bool {
|
|
|
|
return slices.Equal(gotResponse, wantResponse)
|
|
|
|
})
|
|
|
|
if !responseOk {
|
|
|
|
t.Errorf("invalid response\ngot: %+v\nwant: %+v", gotResponse, tt.wantResponses[0])
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
// mdnsResponder at minimum has an expectation that NXDOMAIN must include the
|
|
|
|
// question, otherwise it will penalize our server (#13511).
|
|
|
|
func TestNXDOMAINIncludesQuestion(t *testing.T) {
|
|
|
|
var domain = "lb._dns-sd._udp.example.org."
|
|
|
|
|
|
|
|
// Our response is a NXDOMAIN
|
|
|
|
response := func() []byte {
|
|
|
|
name := dns.MustNewName(domain)
|
|
|
|
|
|
|
|
builder := dns.NewBuilder(nil, dns.Header{
|
|
|
|
Response: true,
|
|
|
|
RCode: dns.RCodeNameError,
|
|
|
|
})
|
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: name,
|
|
|
|
Type: dns.TypePTR,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
})
|
|
|
|
response, err := builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
return response
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Our request is a single PTR query for the domain in the answer, above.
|
|
|
|
request := func() []byte {
|
|
|
|
builder := dns.NewBuilder(nil, dns.Header{})
|
|
|
|
builder.StartQuestions()
|
|
|
|
builder.Question(dns.Question{
|
|
|
|
Name: dns.MustNewName(domain),
|
|
|
|
Type: dns.TypePTR,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
})
|
|
|
|
request, err := builder.Finish()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
return request
|
|
|
|
}()
|
|
|
|
|
|
|
|
port := runDNSServer(t, nil, response, func(isTCP bool, gotRequest []byte) {
|
|
|
|
})
|
|
|
|
|
2024-10-07 22:08:22 +00:00
|
|
|
res, err := runTestQuery(t, request, nil, port)
|
net/dns/resolver: fix dns-sd NXDOMAIN responses from quad-100
mdnsResponder at least as of macOS Sequoia does not find NXDOMAIN
responses to these dns-sd PTR queries acceptable unless they include the
question section in the response. This was found debugging #13511, once
we turned on additional diagnostic reporting from mdnsResponder we
witnessed:
```
Received unacceptable 12-byte response from 100.100.100.100 over UDP via utun6/27 -- id: 0x7F41 (32577), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 0/0/0/0,
```
If the response includes a question section, the resposnes are
acceptable, e.g.:
```
Received acceptable 59-byte response from 8.8.8.8 over UDP via en0/17 -- id: 0x2E55 (11861), flags: 0x8183 (R/Query, RD, RA, NXDomain), counts: 1/0/0/0,
```
This may be contributing to an issue under diagnosis in #13511 wherein
some combination of conditions results in mdnsResponder no longer
answering DNS queries correctly to applications on the system for
extended periods of time (multiple minutes), while dig against quad-100
provides correct responses for those same domains. If additional debug
logging is enabled in mdnsResponder we see it reporting:
```
Penalizing server 100.100.100.100 for 60 seconds
```
It is also possible that the reason that macOS & iOS never "stopped
spamming" these queries is that they have never been replied to with
acceptable responses. It is not clear if this special case handling of
dns-sd PTR queries was ever beneficial, and given this evidence may have
always been harmful. If we subsequently observe that the queries settle
down now that they have acceptable responses, we should remove these
special cases - making upstream queries very occasionally isn't a lot of
battery, so we should be better off having to maintain less special
cases and avoid bugs of this class.
Updates #2442
Updates #3025
Updates #3363
Updates #3594
Updates #13511
Signed-off-by: James Tucker <james@tailscale.com>
2024-09-19 00:57:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !slices.Equal(res, response) {
|
|
|
|
t.Errorf("invalid response\ngot: %+v\nwant: %+v", res, response)
|
|
|
|
}
|
|
|
|
}
|