2020-08-19 19:39:25 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2021-04-01 04:54:38 +00:00
|
|
|
package resolver
|
2020-08-19 19:39:25 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2020-09-23 20:21:52 +00:00
|
|
|
"context"
|
2020-08-19 19:39:25 +00:00
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
2021-07-15 16:11:12 +00:00
|
|
|
"fmt"
|
2021-06-23 04:53:43 +00:00
|
|
|
"io"
|
2021-07-15 16:11:12 +00:00
|
|
|
"io/ioutil"
|
2020-08-19 19:39:25 +00:00
|
|
|
"math/rand"
|
|
|
|
"net"
|
2021-07-15 16:11:12 +00:00
|
|
|
"net/http"
|
2022-04-18 19:50:26 +00:00
|
|
|
"net/url"
|
2021-07-22 17:14:46 +00:00
|
|
|
"runtime"
|
2021-07-26 03:40:37 +00:00
|
|
|
"sort"
|
2021-10-15 02:39:11 +00:00
|
|
|
"strconv"
|
2021-07-15 16:11:12 +00:00
|
|
|
"strings"
|
2020-08-19 19:39:25 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2021-04-02 02:31:55 +00:00
|
|
|
dns "golang.org/x/net/dns/dnsmessage"
|
2022-04-19 04:58:00 +00:00
|
|
|
"tailscale.com/envknob"
|
2021-10-15 02:39:11 +00:00
|
|
|
"tailscale.com/hostinfo"
|
2022-04-14 21:15:54 +00:00
|
|
|
"tailscale.com/net/dns/publicdns"
|
2022-04-18 19:50:26 +00:00
|
|
|
"tailscale.com/net/dnscache"
|
2022-07-25 03:08:42 +00:00
|
|
|
"tailscale.com/net/netaddr"
|
2022-01-03 18:49:56 +00:00
|
|
|
"tailscale.com/net/neterror"
|
2021-07-15 16:11:12 +00:00
|
|
|
"tailscale.com/net/netns"
|
2021-12-01 04:39:12 +00:00
|
|
|
"tailscale.com/net/tsdial"
|
2021-08-03 13:56:31 +00:00
|
|
|
"tailscale.com/types/dnstype"
|
2020-08-19 19:39:25 +00:00
|
|
|
"tailscale.com/types/logger"
|
2022-07-25 03:08:42 +00:00
|
|
|
"tailscale.com/types/nettype"
|
ipn/ipnlocal, net/dns*, util/cloudenv: specialize DNS config on Google Cloud
This does three things:
* If you're on GCP, it adds a *.internal DNS split route to the
metadata server, so we never break GCP DNS names. This lets people
have some Tailscale nodes on GCP and some not (e.g. laptops at home)
without having to add a Tailnet-wide *.internal DNS route.
If you already have such a route, though, it won't overwrite it.
* If the 100.100.100.100 DNS forwarder has nowhere to forward to,
it forwards it to the GCP metadata IP, which forwards to 8.8.8.8.
This means there are never errNoUpstreams ("upstream nameservers not set")
errors on GCP due to e.g. mangled /etc/resolv.conf (GCP default VMs
don't have systemd-resolved, so it's likely a DNS supremacy fight)
* makes the DNS fallback mechanism use the GCP metadata IP as a
fallback before our hosted HTTP-based fallbacks
I created a default GCP VM from their web wizard. It has no
systemd-resolved.
I then made its /etc/resolv.conf be empty and deleted its GCP
hostnames in /etc/hosts.
I then logged in to a tailnet with no global DNS settings.
With this, tailscaled writes /etc/resolv.conf (direct mode, as no
systemd-resolved) and sets it to 100.100.100.100, which then has
regular DNS via the metadata IP and *.internal DNS via the metadata IP
as well. If the tailnet configures explicit DNS servers, those are used
instead, except for *.internal.
This also adds a new util/cloudenv package based on version/distro
where the cloud type is only detected once. We'll likely expand it in
the future for other clouds, doing variants of this change for other
popular cloud environments.
Fixes #4911
RELNOTES=Google Cloud DNS improvements
Change-Id: I19f3c2075983669b2b2c0f29a548da8de373c7cf
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-06-29 20:19:34 +00:00
|
|
|
"tailscale.com/util/cloudenv"
|
2021-04-02 02:31:55 +00:00
|
|
|
"tailscale.com/util/dnsname"
|
2021-06-23 04:53:43 +00:00
|
|
|
"tailscale.com/wgengine/monitor"
|
2020-08-19 19:39:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// headerBytes is the number of bytes in a DNS message header.
|
|
|
|
const headerBytes = 12
|
|
|
|
|
2022-04-22 22:01:55 +00:00
|
|
|
// dnsFlagTruncated is set in the flags word when the packet is truncated.
|
|
|
|
const dnsFlagTruncated = 0x200
|
|
|
|
|
|
|
|
// truncatedFlagSet returns true if the DNS packet signals that it has
|
|
|
|
// been truncated. False is also returned if the packet was too small
|
|
|
|
// to be valid.
|
|
|
|
func truncatedFlagSet(pkt []byte) bool {
|
|
|
|
if len(pkt) < headerBytes {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return (binary.BigEndian.Uint16(pkt[2:4]) & dnsFlagTruncated) != 0
|
|
|
|
}
|
|
|
|
|
2020-08-19 19:39:25 +00:00
|
|
|
const (
|
|
|
|
// responseTimeout is the maximal amount of time to wait for a DNS response.
|
|
|
|
responseTimeout = 5 * time.Second
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
// dohTransportTimeout is how long to keep idle HTTP
|
|
|
|
// connections open to DNS-over-HTTPs servers. This is pretty
|
|
|
|
// arbitrary.
|
|
|
|
dohTransportTimeout = 30 * time.Second
|
2021-07-26 03:40:37 +00:00
|
|
|
|
2022-04-19 04:58:00 +00:00
|
|
|
// dohTransportTimeout is how much of a head start to give a DoH query
|
|
|
|
// that was upgraded from a well-known public DNS provider's IP before
|
|
|
|
// normal UDP mode is attempted as a fallback.
|
|
|
|
dohHeadStart = 500 * time.Millisecond
|
|
|
|
|
2021-07-26 03:40:37 +00:00
|
|
|
// wellKnownHostBackupDelay is how long to artificially delay upstream
|
|
|
|
// DNS queries to the "fallback" DNS server IP for a known provider
|
|
|
|
// (e.g. how long to wait to query Google's 8.8.4.4 after 8.8.8.8).
|
|
|
|
wellKnownHostBackupDelay = 200 * time.Millisecond
|
2020-08-19 19:39:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var errNoUpstreams = errors.New("upstream nameservers not set")
|
|
|
|
|
|
|
|
// txid identifies a DNS transaction.
|
|
|
|
//
|
|
|
|
// As the standard DNS Request ID is only 16 bits, we extend it:
|
|
|
|
// the lower 32 bits are the zero-extended bits of the DNS Request ID;
|
|
|
|
// the upper 32 bits are the CRC32 checksum of the first question in the request.
|
|
|
|
// This makes probability of txid collision negligible.
|
|
|
|
type txid uint64
|
|
|
|
|
|
|
|
// getTxID computes the txid of the given DNS packet.
|
|
|
|
func getTxID(packet []byte) txid {
|
|
|
|
if len(packet) < headerBytes {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
dnsid := binary.BigEndian.Uint16(packet[0:2])
|
2021-08-06 15:46:33 +00:00
|
|
|
// Previously, we hashed the question and combined it with the original txid
|
|
|
|
// which was useful when concurrent queries were multiplexed on a single
|
|
|
|
// local source port. We encountered some situations where the DNS server
|
|
|
|
// canonicalizes the question in the response (uppercase converted to
|
|
|
|
// lowercase in this case), which resulted in responses that we couldn't
|
|
|
|
// match to the original request due to hash mismatches.
|
|
|
|
return txid(dnsid)
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2021-09-19 00:34:33 +00:00
|
|
|
func getRCode(packet []byte) dns.RCode {
|
|
|
|
if len(packet) < headerBytes {
|
|
|
|
// treat invalid packets as a refusal
|
|
|
|
return dns.RCode(5)
|
|
|
|
}
|
|
|
|
// get bottom 4 bits of 3rd byte
|
|
|
|
return dns.RCode(packet[3] & 0x0F)
|
|
|
|
}
|
|
|
|
|
2021-06-24 14:36:23 +00:00
|
|
|
// clampEDNSSize attempts to limit the maximum EDNS response size. This is not
|
|
|
|
// an exhaustive solution, instead only easy cases are currently handled in the
|
|
|
|
// interest of speed and reduced complexity. Only OPT records at the very end of
|
|
|
|
// the message with no option codes are addressed.
|
|
|
|
// TODO: handle more situations if we discover that they happen often
|
|
|
|
func clampEDNSSize(packet []byte, maxSize uint16) {
|
|
|
|
// optFixedBytes is the size of an OPT record with no option codes.
|
|
|
|
const optFixedBytes = 11
|
|
|
|
const edns0Version = 0
|
|
|
|
|
|
|
|
if len(packet) < headerBytes+optFixedBytes {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
arCount := binary.BigEndian.Uint16(packet[10:12])
|
|
|
|
if arCount == 0 {
|
|
|
|
// OPT shows up in an AR, so there must be no OPT
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-07-27 23:23:07 +00:00
|
|
|
// https://datatracker.ietf.org/doc/html/rfc6891#section-6.1.2
|
2021-06-24 14:36:23 +00:00
|
|
|
opt := packet[len(packet)-optFixedBytes:]
|
|
|
|
|
|
|
|
if opt[0] != 0 {
|
|
|
|
// OPT NAME must be 0 (root domain)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if dns.Type(binary.BigEndian.Uint16(opt[1:3])) != dns.TypeOPT {
|
|
|
|
// Not an OPT record
|
|
|
|
return
|
|
|
|
}
|
|
|
|
requestedSize := binary.BigEndian.Uint16(opt[3:5])
|
|
|
|
// Ignore extended RCODE in opt[5]
|
|
|
|
if opt[6] != edns0Version {
|
|
|
|
// Be conservative and don't touch unknown versions.
|
|
|
|
return
|
|
|
|
}
|
2021-07-27 23:23:07 +00:00
|
|
|
// Ignore flags in opt[6:9]
|
|
|
|
if binary.BigEndian.Uint16(opt[9:11]) != 0 {
|
2021-06-24 14:36:23 +00:00
|
|
|
// RDLEN must be 0 (no variable length data). We're at the end of the
|
|
|
|
// packet so this should be 0 anyway)..
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if requestedSize <= maxSize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clamp the maximum size
|
|
|
|
binary.BigEndian.PutUint16(opt[3:5], maxSize)
|
|
|
|
}
|
|
|
|
|
2021-04-02 02:31:55 +00:00
|
|
|
type route struct {
|
2021-06-23 04:53:43 +00:00
|
|
|
Suffix dnsname.FQDN
|
2021-07-26 03:40:37 +00:00
|
|
|
Resolvers []resolverAndDelay
|
|
|
|
}
|
|
|
|
|
|
|
|
// resolverAndDelay is an upstream DNS resolver and a delay for how
|
|
|
|
// long to wait before querying it.
|
|
|
|
type resolverAndDelay struct {
|
2021-08-03 13:56:31 +00:00
|
|
|
// name is the upstream resolver.
|
2022-05-03 21:41:58 +00:00
|
|
|
name *dnstype.Resolver
|
2021-07-26 03:40:37 +00:00
|
|
|
|
|
|
|
// startDelay is an amount to delay this resolver at
|
|
|
|
// start. It's used when, say, there are four Google or
|
|
|
|
// Cloudflare DNS IPs (two IPv4 + two IPv6) and we don't want
|
|
|
|
// to race all four at once.
|
|
|
|
startDelay time.Duration
|
2021-04-02 02:31:55 +00:00
|
|
|
}
|
|
|
|
|
2020-08-19 19:39:25 +00:00
|
|
|
// forwarder forwards DNS packets to a number of upstream nameservers.
|
|
|
|
type forwarder struct {
|
2021-06-23 04:53:43 +00:00
|
|
|
logf logger.Logf
|
|
|
|
linkMon *monitor.Mon
|
2021-12-01 04:39:12 +00:00
|
|
|
linkSel ForwardLinkSelector // TODO(bradfitz): remove this when tsdial.Dialer absords it
|
|
|
|
dialer *tsdial.Dialer
|
2021-07-22 17:14:46 +00:00
|
|
|
dohSem chan struct{}
|
2021-06-23 04:53:43 +00:00
|
|
|
|
|
|
|
ctx context.Context // good until Close
|
|
|
|
ctxCancel context.CancelFunc // closes ctx
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
mu sync.Mutex // guards following
|
|
|
|
|
2021-08-03 13:56:31 +00:00
|
|
|
dohClient map[string]*http.Client // urlBase -> client
|
2021-07-15 16:11:12 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// routes are per-suffix resolvers to use, with
|
|
|
|
// the most specific routes first.
|
|
|
|
routes []route
|
2022-06-30 02:32:41 +00:00
|
|
|
// cloudHostFallback are last resort resolvers to use if no per-suffix
|
|
|
|
// resolver matches. These are only populated on cloud hosts where the
|
|
|
|
// platform provides a well-known recursive resolver.
|
|
|
|
//
|
|
|
|
// That is, if we're running on GCP or AWS where there's always a well-known
|
|
|
|
// IP of a recursive resolver, return that rather than having callers return
|
|
|
|
// errNoUpstreams. This fixes both normal 100.100.100.100 resolution when
|
|
|
|
// /etc/resolv.conf is missing/corrupt, and the peerapi ExitDNS stub
|
|
|
|
// resolver lookup.
|
|
|
|
cloudHostFallback []resolverAndDelay
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
rand.Seed(time.Now().UnixNano())
|
|
|
|
}
|
|
|
|
|
2021-10-15 02:39:11 +00:00
|
|
|
func maxDoHInFlight(goos string) int {
|
|
|
|
if goos != "ios" {
|
|
|
|
return 1000 // effectively unlimited
|
|
|
|
}
|
|
|
|
// iOS < 15 limits the memory to 15MB for NetworkExtensions.
|
|
|
|
// iOS >= 15 gives us 50MB.
|
|
|
|
// See: https://tailscale.com/blog/go-linker/
|
|
|
|
ver := hostinfo.GetOSVersion()
|
|
|
|
if ver == "" {
|
|
|
|
// Unknown iOS version, be cautious.
|
|
|
|
return 10
|
|
|
|
}
|
2022-03-19 19:42:46 +00:00
|
|
|
major, _, ok := strings.Cut(ver, ".")
|
|
|
|
if !ok {
|
2021-10-15 02:39:11 +00:00
|
|
|
// Unknown iOS version, be cautious.
|
|
|
|
return 10
|
|
|
|
}
|
|
|
|
if m, err := strconv.Atoi(major); err != nil || m < 15 {
|
|
|
|
return 10
|
2021-07-22 17:14:46 +00:00
|
|
|
}
|
2021-10-15 02:39:11 +00:00
|
|
|
return 1000
|
|
|
|
}
|
|
|
|
|
2022-04-14 20:27:59 +00:00
|
|
|
func newForwarder(logf logger.Logf, linkMon *monitor.Mon, linkSel ForwardLinkSelector, dialer *tsdial.Dialer) *forwarder {
|
2021-06-23 04:53:43 +00:00
|
|
|
f := &forwarder{
|
2022-04-14 20:27:59 +00:00
|
|
|
logf: logger.WithPrefix(logf, "forward: "),
|
|
|
|
linkMon: linkMon,
|
|
|
|
linkSel: linkSel,
|
|
|
|
dialer: dialer,
|
|
|
|
dohSem: make(chan struct{}, maxDoHInFlight(runtime.GOOS)),
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
f.ctx, f.ctxCancel = context.WithCancel(context.Background())
|
|
|
|
return f
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
func (f *forwarder) Close() error {
|
|
|
|
f.ctxCancel()
|
|
|
|
return nil
|
2021-03-12 16:39:43 +00:00
|
|
|
}
|
|
|
|
|
2022-04-19 04:58:00 +00:00
|
|
|
// resolversWithDelays maps from a set of DNS server names to a slice of a type
|
|
|
|
// that included a startDelay, upgrading any well-known DoH (DNS-over-HTTP)
|
|
|
|
// servers in the process, insert a DoH lookup first before UDP fallbacks.
|
2022-05-03 21:41:58 +00:00
|
|
|
func resolversWithDelays(resolvers []*dnstype.Resolver) []resolverAndDelay {
|
2022-04-19 04:58:00 +00:00
|
|
|
rr := make([]resolverAndDelay, 0, len(resolvers)+2)
|
2021-07-26 03:40:37 +00:00
|
|
|
|
2022-04-19 04:58:00 +00:00
|
|
|
// Add the known DoH ones first, starting immediately.
|
|
|
|
didDoH := map[string]bool{}
|
2021-08-03 13:56:31 +00:00
|
|
|
for _, r := range resolvers {
|
2022-04-19 04:58:00 +00:00
|
|
|
ipp, ok := r.IPPort()
|
|
|
|
if !ok {
|
|
|
|
continue
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
2022-07-25 03:08:42 +00:00
|
|
|
dohBase, ok := publicdns.KnownDoH()[ipp.Addr()]
|
2022-04-19 04:58:00 +00:00
|
|
|
if !ok || didDoH[dohBase] {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
didDoH[dohBase] = true
|
2022-05-03 21:41:58 +00:00
|
|
|
rr = append(rr, resolverAndDelay{name: &dnstype.Resolver{Addr: dohBase}})
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
|
|
|
|
2022-04-19 04:58:00 +00:00
|
|
|
type hostAndFam struct {
|
|
|
|
host string // some arbitrary string representing DNS host (currently the DoH base)
|
|
|
|
bits uint8 // either 32 or 128 for IPv4 vs IPv6s address family
|
|
|
|
}
|
2021-07-26 03:40:37 +00:00
|
|
|
done := map[hostAndFam]int{}
|
2022-04-19 04:58:00 +00:00
|
|
|
for _, r := range resolvers {
|
|
|
|
ipp, ok := r.IPPort()
|
|
|
|
if !ok {
|
|
|
|
// Pass non-IP ones through unchanged, without delay.
|
|
|
|
// (e.g. DNS-over-ExitDNS when using an exit node)
|
|
|
|
rr = append(rr, resolverAndDelay{name: r})
|
|
|
|
continue
|
|
|
|
}
|
2022-07-25 03:08:42 +00:00
|
|
|
ip := ipp.Addr()
|
2021-07-26 03:40:37 +00:00
|
|
|
var startDelay time.Duration
|
2022-04-19 04:58:00 +00:00
|
|
|
if host, ok := publicdns.KnownDoH()[ip]; ok {
|
|
|
|
// We already did the DoH query early. These
|
|
|
|
startDelay = dohHeadStart
|
2022-07-25 03:08:42 +00:00
|
|
|
key := hostAndFam{host, uint8(ip.BitLen())}
|
2022-04-19 04:58:00 +00:00
|
|
|
if done[key] > 0 {
|
|
|
|
startDelay += wellKnownHostBackupDelay
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
2022-04-19 04:58:00 +00:00
|
|
|
done[key]++
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
2022-04-19 04:58:00 +00:00
|
|
|
rr = append(rr, resolverAndDelay{
|
2021-08-03 13:56:31 +00:00
|
|
|
name: r,
|
2021-07-26 03:40:37 +00:00
|
|
|
startDelay: startDelay,
|
2022-04-19 04:58:00 +00:00
|
|
|
})
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
|
|
|
return rr
|
|
|
|
}
|
|
|
|
|
2022-06-30 02:32:41 +00:00
|
|
|
var (
|
|
|
|
cloudResolversOnce sync.Once
|
|
|
|
cloudResolversLazy []resolverAndDelay
|
|
|
|
)
|
|
|
|
|
|
|
|
func cloudResolvers() []resolverAndDelay {
|
|
|
|
cloudResolversOnce.Do(func() {
|
|
|
|
if ip := cloudenv.Get().ResolverIP(); ip != "" {
|
|
|
|
cloudResolver := []*dnstype.Resolver{{Addr: ip}}
|
|
|
|
cloudResolversLazy = resolversWithDelays(cloudResolver)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
return cloudResolversLazy
|
|
|
|
}
|
|
|
|
|
2021-07-26 03:40:37 +00:00
|
|
|
// setRoutes sets the routes to use for DNS forwarding. It's called by
|
|
|
|
// Resolver.SetConfig on reconfig.
|
|
|
|
//
|
|
|
|
// The memory referenced by routesBySuffix should not be modified.
|
2022-05-03 21:41:58 +00:00
|
|
|
func (f *forwarder) setRoutes(routesBySuffix map[dnsname.FQDN][]*dnstype.Resolver) {
|
2021-07-26 03:40:37 +00:00
|
|
|
routes := make([]route, 0, len(routesBySuffix))
|
2022-06-30 02:32:41 +00:00
|
|
|
|
|
|
|
cloudHostFallback := cloudResolvers()
|
2021-08-03 13:56:31 +00:00
|
|
|
for suffix, rs := range routesBySuffix {
|
2022-06-30 02:32:41 +00:00
|
|
|
if suffix == "." && len(rs) == 0 && len(cloudHostFallback) > 0 {
|
|
|
|
routes = append(routes, route{
|
|
|
|
Suffix: suffix,
|
|
|
|
Resolvers: cloudHostFallback,
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
routes = append(routes, route{
|
|
|
|
Suffix: suffix,
|
|
|
|
Resolvers: resolversWithDelays(rs),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if cloudenv.Get().HasInternalTLD() && len(cloudHostFallback) > 0 {
|
|
|
|
if _, ok := routesBySuffix["internal."]; !ok {
|
|
|
|
routes = append(routes, route{
|
|
|
|
Suffix: "internal.",
|
|
|
|
Resolvers: cloudHostFallback,
|
|
|
|
})
|
|
|
|
}
|
2021-07-26 03:40:37 +00:00
|
|
|
}
|
2022-06-30 02:32:41 +00:00
|
|
|
|
2021-07-26 03:40:37 +00:00
|
|
|
// Sort from longest prefix to shortest.
|
|
|
|
sort.Slice(routes, func(i, j int) bool {
|
|
|
|
return routes[i].Suffix.NumLabels() > routes[j].Suffix.NumLabels()
|
|
|
|
})
|
|
|
|
|
2020-08-19 19:39:25 +00:00
|
|
|
f.mu.Lock()
|
2021-06-23 04:53:43 +00:00
|
|
|
defer f.mu.Unlock()
|
2021-04-02 02:31:55 +00:00
|
|
|
f.routes = routes
|
2022-06-30 02:32:41 +00:00
|
|
|
f.cloudHostFallback = cloudHostFallback
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2022-07-25 03:08:42 +00:00
|
|
|
var stdNetPacketListener nettype.PacketListenerWithNetIP = nettype.MakePacketListenerWithNetIP(new(net.ListenConfig))
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2022-07-25 03:08:42 +00:00
|
|
|
func (f *forwarder) packetListener(ip netaddr.IP) (nettype.PacketListenerWithNetIP, error) {
|
2021-06-23 04:53:43 +00:00
|
|
|
if f.linkSel == nil || initListenConfig == nil {
|
|
|
|
return stdNetPacketListener, nil
|
|
|
|
}
|
|
|
|
linkName := f.linkSel.PickLink(ip)
|
|
|
|
if linkName == "" {
|
|
|
|
return stdNetPacketListener, nil
|
|
|
|
}
|
|
|
|
lc := new(net.ListenConfig)
|
|
|
|
if err := initListenConfig(lc, f.linkMon, linkName); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-07-25 03:08:42 +00:00
|
|
|
return nettype.MakePacketListenerWithNetIP(lc), nil
|
2021-06-23 04:53:43 +00:00
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2022-04-18 19:50:26 +00:00
|
|
|
// getKnownDoHClientForProvider returns an HTTP client for a specific DoH
|
|
|
|
// provider named by its DoH base URL (like "https://dns.google/dns-query").
|
|
|
|
//
|
|
|
|
// The returned client race/Happy Eyeballs dials all IPs for urlBase (usually
|
|
|
|
// 4), as statically known by the publicdns package.
|
|
|
|
func (f *forwarder) getKnownDoHClientForProvider(urlBase string) (c *http.Client, ok bool) {
|
2021-07-15 16:11:12 +00:00
|
|
|
f.mu.Lock()
|
|
|
|
defer f.mu.Unlock()
|
2021-08-03 13:56:31 +00:00
|
|
|
if c, ok := f.dohClient[urlBase]; ok {
|
2022-04-18 19:50:26 +00:00
|
|
|
return c, true
|
2021-07-15 16:11:12 +00:00
|
|
|
}
|
2022-04-18 19:50:26 +00:00
|
|
|
allIPs := publicdns.DoHIPsOfBase()[urlBase]
|
|
|
|
if len(allIPs) == 0 {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
dohURL, err := url.Parse(urlBase)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false
|
2021-07-15 16:11:12 +00:00
|
|
|
}
|
2021-11-18 20:18:02 +00:00
|
|
|
nsDialer := netns.NewDialer(f.logf)
|
2022-04-18 19:50:26 +00:00
|
|
|
dialer := dnscache.Dialer(nsDialer.DialContext, &dnscache.Resolver{
|
|
|
|
SingleHost: dohURL.Hostname(),
|
|
|
|
SingleHostStaticResult: allIPs,
|
|
|
|
})
|
2021-07-15 16:11:12 +00:00
|
|
|
c = &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
IdleConnTimeout: dohTransportTimeout,
|
|
|
|
DialContext: func(ctx context.Context, netw, addr string) (net.Conn, error) {
|
|
|
|
if !strings.HasPrefix(netw, "tcp") {
|
|
|
|
return nil, fmt.Errorf("unexpected network %q", netw)
|
|
|
|
}
|
2022-04-18 19:50:26 +00:00
|
|
|
return dialer(ctx, netw, addr)
|
2021-07-15 16:11:12 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2022-04-18 19:50:26 +00:00
|
|
|
if f.dohClient == nil {
|
|
|
|
f.dohClient = map[string]*http.Client{}
|
|
|
|
}
|
2021-08-03 13:56:31 +00:00
|
|
|
f.dohClient[urlBase] = c
|
2022-04-18 19:50:26 +00:00
|
|
|
return c, true
|
2021-07-15 16:11:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const dohType = "application/dns-message"
|
|
|
|
|
2021-07-22 17:14:46 +00:00
|
|
|
func (f *forwarder) releaseDoHSem() { <-f.dohSem }
|
|
|
|
|
2021-07-15 16:11:12 +00:00
|
|
|
func (f *forwarder) sendDoH(ctx context.Context, urlBase string, c *http.Client, packet []byte) ([]byte, error) {
|
2021-07-22 17:14:46 +00:00
|
|
|
// Bound the number of HTTP requests in flight. This primarily
|
|
|
|
// matters for iOS where we're very memory constrained and
|
|
|
|
// HTTP requests are heavier on iOS where we don't include
|
|
|
|
// HTTP/2 for binary size reasons (as binaries on iOS linked
|
|
|
|
// with Go code cost memory proportional to the binary size,
|
|
|
|
// for reasons not fully understood).
|
|
|
|
select {
|
|
|
|
case f.dohSem <- struct{}{}:
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, ctx.Err()
|
|
|
|
}
|
|
|
|
defer f.releaseDoHSem()
|
|
|
|
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdDoH.Add(1)
|
2021-07-15 16:11:12 +00:00
|
|
|
req, err := http.NewRequestWithContext(ctx, "POST", urlBase, bytes.NewReader(packet))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
req.Header.Set("Content-Type", dohType)
|
|
|
|
// Note: we don't currently set the Accept header (which is
|
|
|
|
// only a SHOULD in the spec) as iOS doesn't use HTTP/2 and
|
|
|
|
// we'd rather save a few bytes on outgoing requests when
|
|
|
|
// empirically no provider cares about the Accept header's
|
|
|
|
// absence.
|
|
|
|
|
|
|
|
hres, err := c.Do(req)
|
|
|
|
if err != nil {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdDoHErrorTransport.Add(1)
|
2021-07-15 16:11:12 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer hres.Body.Close()
|
|
|
|
if hres.StatusCode != 200 {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdDoHErrorStatus.Add(1)
|
2021-07-15 16:11:12 +00:00
|
|
|
return nil, errors.New(hres.Status)
|
|
|
|
}
|
|
|
|
if ct := hres.Header.Get("Content-Type"); ct != dohType {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdDoHErrorCT.Add(1)
|
2021-07-15 16:11:12 +00:00
|
|
|
return nil, fmt.Errorf("unexpected response Content-Type %q", ct)
|
|
|
|
}
|
2021-11-26 22:43:38 +00:00
|
|
|
res, err := ioutil.ReadAll(hres.Body)
|
|
|
|
if err != nil {
|
|
|
|
metricDNSFwdDoHErrorBody.Add(1)
|
|
|
|
}
|
2022-04-22 22:01:55 +00:00
|
|
|
if truncatedFlagSet(res) {
|
|
|
|
metricDNSFwdTruncated.Add(1)
|
|
|
|
}
|
2021-11-26 22:43:38 +00:00
|
|
|
return res, err
|
2021-07-15 16:11:12 +00:00
|
|
|
}
|
|
|
|
|
2022-04-19 04:58:00 +00:00
|
|
|
var verboseDNSForward = envknob.Bool("TS_DEBUG_DNS_FORWARD_SEND")
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// send sends packet to dst. It is best effort.
|
|
|
|
//
|
|
|
|
// send expects the reply to have the same txid as txidOut.
|
2022-04-19 04:58:00 +00:00
|
|
|
func (f *forwarder) send(ctx context.Context, fq *forwardQuery, rr resolverAndDelay) (ret []byte, err error) {
|
|
|
|
if verboseDNSForward {
|
|
|
|
f.logf("forwarder.send(%q) ...", rr.name.Addr)
|
|
|
|
defer func() {
|
|
|
|
f.logf("forwarder.send(%q) = %v, %v", rr.name.Addr, len(ret), err)
|
|
|
|
}()
|
|
|
|
}
|
2021-08-03 13:56:31 +00:00
|
|
|
if strings.HasPrefix(rr.name.Addr, "http://") {
|
2021-12-01 04:39:12 +00:00
|
|
|
return f.sendDoH(ctx, rr.name.Addr, f.dialer.PeerAPIHTTPClient(), fq.packet)
|
2021-08-03 13:56:31 +00:00
|
|
|
}
|
|
|
|
if strings.HasPrefix(rr.name.Addr, "https://") {
|
2022-04-19 04:58:00 +00:00
|
|
|
// Only known DoH providers are supported currently. Specifically, we
|
|
|
|
// only support DoH providers where we can TCP connect to them on port
|
|
|
|
// 443 at the same IP address they serve normal UDP DNS from (1.1.1.1,
|
|
|
|
// 8.8.8.8, 9.9.9.9, etc.) That's why OpenDNS and custon DoH providers
|
|
|
|
// aren't currently supported. There's no backup DNS resolution path for
|
|
|
|
// them.
|
|
|
|
urlBase := rr.name.Addr
|
|
|
|
if hc, ok := f.getKnownDoHClientForProvider(urlBase); ok {
|
|
|
|
return f.sendDoH(ctx, urlBase, hc, fq.packet)
|
|
|
|
}
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdErrorType.Add(1)
|
2022-04-19 04:58:00 +00:00
|
|
|
return nil, fmt.Errorf("arbitrary https:// resolvers not supported yet")
|
2021-08-03 13:56:31 +00:00
|
|
|
}
|
|
|
|
if strings.HasPrefix(rr.name.Addr, "tls://") {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdErrorType.Add(1)
|
2021-08-03 13:56:31 +00:00
|
|
|
return nil, fmt.Errorf("tls:// resolvers not supported yet")
|
|
|
|
}
|
2022-04-22 22:01:55 +00:00
|
|
|
|
|
|
|
return f.sendUDP(ctx, fq, rr)
|
|
|
|
}
|
|
|
|
|
2022-06-15 23:19:05 +00:00
|
|
|
var errServerFailure = errors.New("response code indicates server issue")
|
|
|
|
|
2022-04-22 22:01:55 +00:00
|
|
|
func (f *forwarder) sendUDP(ctx context.Context, fq *forwardQuery, rr resolverAndDelay) (ret []byte, err error) {
|
2022-04-19 04:58:00 +00:00
|
|
|
ipp, ok := rr.name.IPPort()
|
|
|
|
if !ok {
|
|
|
|
metricDNSFwdErrorType.Add(1)
|
|
|
|
return nil, fmt.Errorf("unrecognized resolver type %q", rr.name.Addr)
|
2021-07-15 16:11:12 +00:00
|
|
|
}
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDP.Add(1)
|
2022-04-22 22:01:55 +00:00
|
|
|
|
2022-07-25 03:08:42 +00:00
|
|
|
ln, err := f.packetListener(ipp.Addr())
|
2021-06-23 04:53:43 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-07-25 03:08:42 +00:00
|
|
|
|
|
|
|
// Specify the exact UDP family to work around https://github.com/golang/go/issues/52264
|
|
|
|
udpFam := "udp4"
|
|
|
|
if ipp.Addr().Is6() {
|
|
|
|
udpFam = "udp6"
|
|
|
|
}
|
|
|
|
conn, err := ln.ListenPacket(ctx, udpFam, ":0")
|
2021-06-23 04:53:43 +00:00
|
|
|
if err != nil {
|
|
|
|
f.logf("ListenPacket failed: %v", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer conn.Close()
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-07-25 22:43:49 +00:00
|
|
|
fq.closeOnCtxDone.Add(conn)
|
|
|
|
defer fq.closeOnCtxDone.Remove(conn)
|
2021-06-07 21:16:07 +00:00
|
|
|
|
2022-07-25 03:08:42 +00:00
|
|
|
if _, err := conn.WriteToUDPAddrPort(fq.packet, ipp); err != nil {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPErrorWrite.Add(1)
|
2021-06-23 04:53:43 +00:00
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
2021-06-07 21:16:07 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPWrote.Add(1)
|
2021-06-07 21:16:07 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// The 1 extra byte is to detect packet truncation.
|
|
|
|
out := make([]byte, maxResponseBytes+1)
|
|
|
|
n, _, err := conn.ReadFrom(out)
|
|
|
|
if err != nil {
|
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
2022-01-03 18:49:56 +00:00
|
|
|
if neterror.PacketWasTruncated(err) {
|
2021-06-23 04:53:43 +00:00
|
|
|
err = nil
|
|
|
|
} else {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPErrorRead.Add(1)
|
2021-06-23 04:53:43 +00:00
|
|
|
return nil, err
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
truncated := n > maxResponseBytes
|
|
|
|
if truncated {
|
|
|
|
n = maxResponseBytes
|
|
|
|
}
|
|
|
|
if n < headerBytes {
|
|
|
|
f.logf("recv: packet too small (%d bytes)", n)
|
|
|
|
}
|
|
|
|
out = out[:n]
|
|
|
|
txid := getTxID(out)
|
2021-07-25 22:43:49 +00:00
|
|
|
if txid != fq.txid {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPErrorTxID.Add(1)
|
2021-06-23 04:53:43 +00:00
|
|
|
return nil, errors.New("txid doesn't match")
|
|
|
|
}
|
2021-09-19 00:34:33 +00:00
|
|
|
rcode := getRCode(out)
|
|
|
|
// don't forward transient errors back to the client when the server fails
|
|
|
|
if rcode == dns.RCodeServerFailure {
|
|
|
|
f.logf("recv: response code indicating server failure: %d", rcode)
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPErrorServer.Add(1)
|
2022-06-15 23:19:05 +00:00
|
|
|
return nil, errServerFailure
|
2021-09-19 00:34:33 +00:00
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
if truncated {
|
2022-04-22 22:01:55 +00:00
|
|
|
// Set the truncated bit if it wasn't already.
|
2021-06-23 04:53:43 +00:00
|
|
|
flags := binary.BigEndian.Uint16(out[2:4])
|
|
|
|
flags |= dnsFlagTruncated
|
|
|
|
binary.BigEndian.PutUint16(out[2:4], flags)
|
|
|
|
|
|
|
|
// TODO(#2067): Remove any incomplete records? RFC 1035 section 6.2
|
|
|
|
// states that truncation should head drop so that the authority
|
|
|
|
// section can be preserved if possible. However, the UDP read with
|
|
|
|
// a too-small buffer has already dropped the end, so that's the
|
|
|
|
// best we can do.
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2022-04-22 22:01:55 +00:00
|
|
|
if truncatedFlagSet(out) {
|
|
|
|
metricDNSFwdTruncated.Add(1)
|
|
|
|
}
|
|
|
|
|
2021-06-24 14:36:23 +00:00
|
|
|
clampEDNSSize(out, maxResponseBytes)
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdUDPSuccess.Add(1)
|
2021-06-23 04:53:43 +00:00
|
|
|
return out, nil
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// resolvers returns the resolvers to use for domain.
|
2021-07-26 03:40:37 +00:00
|
|
|
func (f *forwarder) resolvers(domain dnsname.FQDN) []resolverAndDelay {
|
2021-06-23 04:53:43 +00:00
|
|
|
f.mu.Lock()
|
|
|
|
routes := f.routes
|
2022-06-30 02:32:41 +00:00
|
|
|
cloudHostFallback := f.cloudHostFallback
|
2021-06-23 04:53:43 +00:00
|
|
|
f.mu.Unlock()
|
|
|
|
for _, route := range routes {
|
|
|
|
if route.Suffix == "." || route.Suffix.Contains(domain) {
|
2022-06-30 02:32:41 +00:00
|
|
|
return route.Resolvers
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
}
|
2022-06-30 02:32:41 +00:00
|
|
|
return cloudHostFallback // or nil if no fallback
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2021-07-25 22:43:49 +00:00
|
|
|
// forwardQuery is information and state about a forwarded DNS query that's
|
|
|
|
// being sent to 1 or more upstreams.
|
|
|
|
//
|
|
|
|
// In the case of racing against multiple equivalent upstreams
|
|
|
|
// (e.g. Google or CloudFlare's 4 DNS IPs: 2 IPv4 + 2 IPv6), this type
|
|
|
|
// handles racing them more intelligently than just blasting away 4
|
|
|
|
// queries at once.
|
|
|
|
type forwardQuery struct {
|
|
|
|
txid txid
|
|
|
|
packet []byte
|
|
|
|
|
|
|
|
// closeOnCtxDone lets send register values to Close if the
|
|
|
|
// caller's ctx expires. This avoids send from allocating its
|
|
|
|
// own waiting goroutine to interrupt the ReadFrom, as memory
|
|
|
|
// is tight on iOS and we want the number of pending DNS
|
|
|
|
// lookups to be bursty without too much associated
|
|
|
|
// goroutine/memory cost.
|
|
|
|
closeOnCtxDone *closePool
|
|
|
|
|
|
|
|
// TODO(bradfitz): add race delay state:
|
|
|
|
// mu sync.Mutex
|
|
|
|
// ...
|
|
|
|
}
|
|
|
|
|
2021-12-18 23:11:01 +00:00
|
|
|
// forwardWithDestChan forwards the query to all upstream nameservers
|
|
|
|
// and waits for the first response.
|
2021-11-23 17:58:34 +00:00
|
|
|
//
|
|
|
|
// It either sends to responseChan and returns nil, or returns a
|
|
|
|
// non-nil error (without sending to the channel).
|
|
|
|
//
|
2021-11-29 22:18:09 +00:00
|
|
|
// If resolvers is non-empty, it's used explicitly (notably, for exit
|
|
|
|
// node DNS proxy queries), otherwise f.resolvers is used.
|
|
|
|
func (f *forwarder) forwardWithDestChan(ctx context.Context, query packet, responseChan chan<- packet, resolvers ...resolverAndDelay) error {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwd.Add(1)
|
2021-04-02 02:31:55 +00:00
|
|
|
domain, err := nameFromQuery(query.bs)
|
|
|
|
if err != nil {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdErrorName.Add(1)
|
2021-04-02 02:31:55 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-04-19 17:58:52 +00:00
|
|
|
// Guarantee that the ctx we use below is done when this function returns.
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2021-10-06 22:01:48 +00:00
|
|
|
// Drop DNS service discovery spam, primarily for battery life
|
2021-10-08 12:57:16 +00:00
|
|
|
// on mobile. Things like Spotify on iOS generate this traffic,
|
|
|
|
// when browsing for LAN devices. But even when filtering this
|
|
|
|
// out, playing on Sonos still works.
|
|
|
|
if hasRDNSBonjourPrefix(domain) {
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdDropBonjour.Add(1)
|
2021-12-18 23:37:40 +00:00
|
|
|
res, err := nxDomainResponse(query)
|
|
|
|
if err != nil {
|
|
|
|
f.logf("error parsing bonjour query: %v", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return ctx.Err()
|
|
|
|
case responseChan <- res:
|
|
|
|
return nil
|
|
|
|
}
|
2021-10-06 22:01:48 +00:00
|
|
|
}
|
|
|
|
|
2021-12-21 21:52:50 +00:00
|
|
|
if fl, ok := fwdLogAtomic.Load().(*fwdLog); ok {
|
|
|
|
fl.addName(string(domain))
|
|
|
|
}
|
|
|
|
|
2021-06-24 14:36:23 +00:00
|
|
|
clampEDNSSize(query.bs, maxResponseBytes)
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-11-23 17:58:34 +00:00
|
|
|
if len(resolvers) == 0 {
|
2021-11-29 22:18:09 +00:00
|
|
|
resolvers = f.resolvers(domain)
|
|
|
|
if len(resolvers) == 0 {
|
|
|
|
metricDNSFwdErrorNoUpstream.Add(1)
|
|
|
|
return errNoUpstreams
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
2021-04-02 02:31:55 +00:00
|
|
|
|
2021-07-25 22:43:49 +00:00
|
|
|
fq := &forwardQuery{
|
|
|
|
txid: getTxID(query.bs),
|
|
|
|
packet: query.bs,
|
|
|
|
closeOnCtxDone: new(closePool),
|
|
|
|
}
|
|
|
|
defer fq.closeOnCtxDone.Close()
|
2021-06-23 04:53:43 +00:00
|
|
|
|
2022-04-19 17:58:52 +00:00
|
|
|
resc := make(chan []byte, 1) // it's fine buffered or not
|
|
|
|
errc := make(chan error, 1) // it's fine buffered or not too
|
2021-08-03 13:56:31 +00:00
|
|
|
for i := range resolvers {
|
|
|
|
go func(rr *resolverAndDelay) {
|
2021-07-26 03:40:37 +00:00
|
|
|
if rr.startDelay > 0 {
|
|
|
|
timer := time.NewTimer(rr.startDelay)
|
|
|
|
select {
|
|
|
|
case <-timer.C:
|
|
|
|
case <-ctx.Done():
|
|
|
|
timer.Stop()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2021-08-03 13:56:31 +00:00
|
|
|
resb, err := f.send(ctx, fq, *rr)
|
2021-06-23 04:53:43 +00:00
|
|
|
if err != nil {
|
2022-04-19 17:58:52 +00:00
|
|
|
select {
|
|
|
|
case errc <- err:
|
|
|
|
case <-ctx.Done():
|
2021-06-23 04:53:43 +00:00
|
|
|
}
|
|
|
|
return
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
select {
|
|
|
|
case resc <- resb:
|
2022-04-19 17:58:52 +00:00
|
|
|
case <-ctx.Done():
|
2021-06-23 04:53:43 +00:00
|
|
|
}
|
2021-08-03 13:56:31 +00:00
|
|
|
}(&resolvers[i])
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
|
|
|
|
2022-04-19 17:58:52 +00:00
|
|
|
var firstErr error
|
|
|
|
var numErr int
|
|
|
|
for {
|
2021-06-23 04:53:43 +00:00
|
|
|
select {
|
2022-04-19 17:58:52 +00:00
|
|
|
case v := <-resc:
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
metricDNSFwdErrorContext.Add(1)
|
|
|
|
return ctx.Err()
|
|
|
|
case responseChan <- packet{v, query.addr}:
|
|
|
|
metricDNSFwdSuccess.Add(1)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
case err := <-errc:
|
|
|
|
if firstErr == nil {
|
|
|
|
firstErr = err
|
|
|
|
}
|
|
|
|
numErr++
|
|
|
|
if numErr == len(resolvers) {
|
2022-06-15 23:19:05 +00:00
|
|
|
if firstErr == errServerFailure {
|
|
|
|
res, err := servfailResponse(query)
|
|
|
|
if err != nil {
|
|
|
|
f.logf("building servfail response: %v", err)
|
|
|
|
return firstErr
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
metricDNSFwdErrorContext.Add(1)
|
|
|
|
metricDNSFwdErrorContextGotError.Add(1)
|
|
|
|
case responseChan <- res:
|
|
|
|
}
|
|
|
|
}
|
2022-04-19 17:58:52 +00:00
|
|
|
return firstErr
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
case <-ctx.Done():
|
2021-11-26 22:43:38 +00:00
|
|
|
metricDNSFwdErrorContext.Add(1)
|
2022-04-19 17:58:52 +00:00
|
|
|
if firstErr != nil {
|
|
|
|
metricDNSFwdErrorContextGotError.Add(1)
|
|
|
|
return firstErr
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
return ctx.Err()
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
var initListenConfig func(_ *net.ListenConfig, _ *monitor.Mon, tunName string) error
|
2021-04-02 02:31:55 +00:00
|
|
|
|
|
|
|
// nameFromQuery extracts the normalized query name from bs.
|
2021-04-09 22:24:47 +00:00
|
|
|
func nameFromQuery(bs []byte) (dnsname.FQDN, error) {
|
2021-04-02 02:31:55 +00:00
|
|
|
var parser dns.Parser
|
|
|
|
|
|
|
|
hdr, err := parser.Start(bs)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if hdr.Response {
|
|
|
|
return "", errNotQuery
|
|
|
|
}
|
|
|
|
|
|
|
|
q, err := parser.Question()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
n := q.Name.Data[:q.Name.Length]
|
2021-04-09 22:24:47 +00:00
|
|
|
return dnsname.ToFQDN(rawNameToLower(n))
|
2021-04-02 02:31:55 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
|
2021-12-18 23:37:40 +00:00
|
|
|
// nxDomainResponse returns an NXDomain DNS reply for the provided request.
|
|
|
|
func nxDomainResponse(req packet) (res packet, err error) {
|
|
|
|
p := dnsParserPool.Get().(*dnsParser)
|
|
|
|
defer dnsParserPool.Put(p)
|
|
|
|
|
|
|
|
if err := p.parseQuery(req.bs); err != nil {
|
|
|
|
return packet{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
h := p.Header
|
|
|
|
h.Response = true
|
|
|
|
h.RecursionAvailable = h.RecursionDesired
|
|
|
|
h.RCode = dns.RCodeNameError
|
|
|
|
b := dns.NewBuilder(nil, h)
|
|
|
|
// TODO(bradfitz): should we add an SOA record in the Authority
|
|
|
|
// section too? (for the nxdomain negative caching TTL)
|
|
|
|
// For which zone? Does iOS care?
|
|
|
|
res.bs, err = b.Finish()
|
|
|
|
res.addr = req.addr
|
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2022-06-15 23:19:05 +00:00
|
|
|
// servfailResponse returns a SERVFAIL error reply for the provided request.
|
|
|
|
func servfailResponse(req packet) (res packet, err error) {
|
|
|
|
p := dnsParserPool.Get().(*dnsParser)
|
|
|
|
defer dnsParserPool.Put(p)
|
|
|
|
|
|
|
|
if err := p.parseQuery(req.bs); err != nil {
|
|
|
|
return packet{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
h := p.Header
|
|
|
|
h.Response = true
|
|
|
|
h.Authoritative = true
|
|
|
|
h.RCode = dns.RCodeServerFailure
|
|
|
|
b := dns.NewBuilder(nil, h)
|
|
|
|
b.StartQuestions()
|
|
|
|
b.Question(p.Question)
|
|
|
|
res.bs, err = b.Finish()
|
|
|
|
res.addr = req.addr
|
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// closePool is a dynamic set of io.Closers to close as a group.
|
|
|
|
// It's intended to be Closed at most once.
|
|
|
|
//
|
|
|
|
// The zero value is ready for use.
|
|
|
|
type closePool struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
m map[io.Closer]bool
|
|
|
|
closed bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Add(c io.Closer) {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
c.Close()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if p.m == nil {
|
|
|
|
p.m = map[io.Closer]bool{}
|
|
|
|
}
|
|
|
|
p.m[c] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Remove(c io.Closer) {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
delete(p.m, c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Close() error {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
p.closed = true
|
|
|
|
for c := range p.m {
|
|
|
|
c.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|