2020-08-19 19:39:25 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2021-04-01 04:54:38 +00:00
|
|
|
package resolver
|
2020-08-19 19:39:25 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2020-09-23 20:21:52 +00:00
|
|
|
"context"
|
2020-08-19 19:39:25 +00:00
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
2021-07-15 16:11:12 +00:00
|
|
|
"fmt"
|
2020-08-19 19:39:25 +00:00
|
|
|
"hash/crc32"
|
2021-06-23 04:53:43 +00:00
|
|
|
"io"
|
2021-07-15 16:11:12 +00:00
|
|
|
"io/ioutil"
|
2020-08-19 19:39:25 +00:00
|
|
|
"math/rand"
|
|
|
|
"net"
|
2021-07-15 16:11:12 +00:00
|
|
|
"net/http"
|
2021-07-22 17:14:46 +00:00
|
|
|
"runtime"
|
2021-07-15 16:11:12 +00:00
|
|
|
"strings"
|
2020-08-19 19:39:25 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2021-04-02 02:31:55 +00:00
|
|
|
dns "golang.org/x/net/dns/dnsmessage"
|
2020-08-19 19:39:25 +00:00
|
|
|
"inet.af/netaddr"
|
2021-07-15 16:11:12 +00:00
|
|
|
"tailscale.com/net/netns"
|
2020-08-19 19:39:25 +00:00
|
|
|
"tailscale.com/types/logger"
|
2021-04-02 02:31:55 +00:00
|
|
|
"tailscale.com/util/dnsname"
|
2021-06-23 04:53:43 +00:00
|
|
|
"tailscale.com/wgengine/monitor"
|
2020-08-19 19:39:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// headerBytes is the number of bytes in a DNS message header.
|
|
|
|
const headerBytes = 12
|
|
|
|
|
|
|
|
const (
|
|
|
|
// responseTimeout is the maximal amount of time to wait for a DNS response.
|
|
|
|
responseTimeout = 5 * time.Second
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
// dohTransportTimeout is how long to keep idle HTTP
|
|
|
|
// connections open to DNS-over-HTTPs servers. This is pretty
|
|
|
|
// arbitrary.
|
|
|
|
dohTransportTimeout = 30 * time.Second
|
2020-08-19 19:39:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var errNoUpstreams = errors.New("upstream nameservers not set")
|
|
|
|
|
|
|
|
// txid identifies a DNS transaction.
|
|
|
|
//
|
|
|
|
// As the standard DNS Request ID is only 16 bits, we extend it:
|
|
|
|
// the lower 32 bits are the zero-extended bits of the DNS Request ID;
|
|
|
|
// the upper 32 bits are the CRC32 checksum of the first question in the request.
|
|
|
|
// This makes probability of txid collision negligible.
|
|
|
|
type txid uint64
|
|
|
|
|
|
|
|
// getTxID computes the txid of the given DNS packet.
|
|
|
|
func getTxID(packet []byte) txid {
|
|
|
|
if len(packet) < headerBytes {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
dnsid := binary.BigEndian.Uint16(packet[0:2])
|
|
|
|
qcount := binary.BigEndian.Uint16(packet[4:6])
|
|
|
|
if qcount == 0 {
|
|
|
|
return txid(dnsid)
|
|
|
|
}
|
|
|
|
|
|
|
|
offset := headerBytes
|
|
|
|
for i := uint16(0); i < qcount; i++ {
|
|
|
|
// Note: this relies on the fact that names are not compressed in questions,
|
|
|
|
// so they are guaranteed to end with a NUL byte.
|
|
|
|
//
|
|
|
|
// Justification:
|
|
|
|
// RFC 1035 doesn't seem to explicitly prohibit compressing names in questions,
|
|
|
|
// but this is exceedingly unlikely to be done in practice. A DNS request
|
|
|
|
// with multiple questions is ill-defined (which questions do the header flags apply to?)
|
|
|
|
// and a single question would have to contain a pointer to an *answer*,
|
|
|
|
// which would be excessively smart, pointless (an answer can just as well refer to the question)
|
|
|
|
// and perhaps even prohibited: a draft RFC (draft-ietf-dnsind-local-compression-05) states:
|
|
|
|
//
|
|
|
|
// > It is important that these pointers always point backwards.
|
|
|
|
//
|
|
|
|
// This is said in summarizing RFC 1035, although that phrase does not appear in the original RFC.
|
|
|
|
// Additionally, (https://cr.yp.to/djbdns/notes.html) states:
|
|
|
|
//
|
|
|
|
// > The precise rule is that a name can be compressed if it is a response owner name,
|
|
|
|
// > the name in NS data, the name in CNAME data, the name in PTR data, the name in MX data,
|
|
|
|
// > or one of the names in SOA data.
|
|
|
|
namebytes := bytes.IndexByte(packet[offset:], 0)
|
|
|
|
// ... | name | NUL | type | class
|
|
|
|
// ?? 1 2 2
|
|
|
|
offset = offset + namebytes + 5
|
|
|
|
if len(packet) < offset {
|
|
|
|
// Corrupt packet; don't crash.
|
|
|
|
return txid(dnsid)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hash := crc32.ChecksumIEEE(packet[headerBytes:offset])
|
|
|
|
return (txid(hash) << 32) | txid(dnsid)
|
|
|
|
}
|
|
|
|
|
2021-06-24 14:36:23 +00:00
|
|
|
// clampEDNSSize attempts to limit the maximum EDNS response size. This is not
|
|
|
|
// an exhaustive solution, instead only easy cases are currently handled in the
|
|
|
|
// interest of speed and reduced complexity. Only OPT records at the very end of
|
|
|
|
// the message with no option codes are addressed.
|
|
|
|
// TODO: handle more situations if we discover that they happen often
|
|
|
|
func clampEDNSSize(packet []byte, maxSize uint16) {
|
|
|
|
// optFixedBytes is the size of an OPT record with no option codes.
|
|
|
|
const optFixedBytes = 11
|
|
|
|
const edns0Version = 0
|
|
|
|
|
|
|
|
if len(packet) < headerBytes+optFixedBytes {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
arCount := binary.BigEndian.Uint16(packet[10:12])
|
|
|
|
if arCount == 0 {
|
|
|
|
// OPT shows up in an AR, so there must be no OPT
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
opt := packet[len(packet)-optFixedBytes:]
|
|
|
|
|
|
|
|
if opt[0] != 0 {
|
|
|
|
// OPT NAME must be 0 (root domain)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if dns.Type(binary.BigEndian.Uint16(opt[1:3])) != dns.TypeOPT {
|
|
|
|
// Not an OPT record
|
|
|
|
return
|
|
|
|
}
|
|
|
|
requestedSize := binary.BigEndian.Uint16(opt[3:5])
|
|
|
|
// Ignore extended RCODE in opt[5]
|
|
|
|
if opt[6] != edns0Version {
|
|
|
|
// Be conservative and don't touch unknown versions.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Ignore flags in opt[7:9]
|
|
|
|
if binary.BigEndian.Uint16(opt[10:12]) != 0 {
|
|
|
|
// RDLEN must be 0 (no variable length data). We're at the end of the
|
|
|
|
// packet so this should be 0 anyway)..
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if requestedSize <= maxSize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clamp the maximum size
|
|
|
|
binary.BigEndian.PutUint16(opt[3:5], maxSize)
|
|
|
|
}
|
|
|
|
|
2021-04-02 02:31:55 +00:00
|
|
|
type route struct {
|
2021-06-23 04:53:43 +00:00
|
|
|
Suffix dnsname.FQDN
|
|
|
|
Resolvers []netaddr.IPPort
|
2021-04-02 02:31:55 +00:00
|
|
|
}
|
|
|
|
|
2020-08-19 19:39:25 +00:00
|
|
|
// forwarder forwards DNS packets to a number of upstream nameservers.
|
|
|
|
type forwarder struct {
|
2021-06-23 04:53:43 +00:00
|
|
|
logf logger.Logf
|
|
|
|
linkMon *monitor.Mon
|
|
|
|
linkSel ForwardLinkSelector
|
2021-07-22 17:14:46 +00:00
|
|
|
dohSem chan struct{}
|
2021-06-23 04:53:43 +00:00
|
|
|
|
|
|
|
ctx context.Context // good until Close
|
|
|
|
ctxCancel context.CancelFunc // closes ctx
|
2020-08-19 19:39:25 +00:00
|
|
|
|
|
|
|
// responses is a channel by which responses are returned.
|
2021-04-01 06:06:47 +00:00
|
|
|
responses chan packet
|
2021-06-23 04:53:43 +00:00
|
|
|
|
|
|
|
mu sync.Mutex // guards following
|
|
|
|
|
2021-07-15 16:11:12 +00:00
|
|
|
dohClient map[netaddr.IP]*http.Client
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// routes are per-suffix resolvers to use, with
|
|
|
|
// the most specific routes first.
|
|
|
|
routes []route
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
rand.Seed(time.Now().UnixNano())
|
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
func newForwarder(logf logger.Logf, responses chan packet, linkMon *monitor.Mon, linkSel ForwardLinkSelector) *forwarder {
|
2021-07-22 17:14:46 +00:00
|
|
|
maxDoHInFlight := 1000 // effectively unlimited
|
|
|
|
if runtime.GOOS == "ios" {
|
|
|
|
// No HTTP/2 on iOS yet (for size reasons), so DoH is
|
|
|
|
// pricier.
|
|
|
|
maxDoHInFlight = 10
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
f := &forwarder{
|
2020-08-19 19:39:25 +00:00
|
|
|
logf: logger.WithPrefix(logf, "forward: "),
|
2021-06-23 04:53:43 +00:00
|
|
|
linkMon: linkMon,
|
|
|
|
linkSel: linkSel,
|
2020-08-19 19:39:25 +00:00
|
|
|
responses: responses,
|
2021-07-22 17:14:46 +00:00
|
|
|
dohSem: make(chan struct{}, maxDoHInFlight),
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
f.ctx, f.ctxCancel = context.WithCancel(context.Background())
|
|
|
|
return f
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
func (f *forwarder) Close() error {
|
|
|
|
f.ctxCancel()
|
|
|
|
return nil
|
2021-03-12 16:39:43 +00:00
|
|
|
}
|
|
|
|
|
2021-04-02 02:31:55 +00:00
|
|
|
func (f *forwarder) setRoutes(routes []route) {
|
2020-08-19 19:39:25 +00:00
|
|
|
f.mu.Lock()
|
2021-06-23 04:53:43 +00:00
|
|
|
defer f.mu.Unlock()
|
2021-04-02 02:31:55 +00:00
|
|
|
f.routes = routes
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
var stdNetPacketListener packetListener = new(net.ListenConfig)
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
type packetListener interface {
|
|
|
|
ListenPacket(ctx context.Context, network, address string) (net.PacketConn, error)
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
func (f *forwarder) packetListener(ip netaddr.IP) (packetListener, error) {
|
|
|
|
if f.linkSel == nil || initListenConfig == nil {
|
|
|
|
return stdNetPacketListener, nil
|
|
|
|
}
|
|
|
|
linkName := f.linkSel.PickLink(ip)
|
|
|
|
if linkName == "" {
|
|
|
|
return stdNetPacketListener, nil
|
|
|
|
}
|
|
|
|
lc := new(net.ListenConfig)
|
|
|
|
if err := initListenConfig(lc, f.linkMon, linkName); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return lc, nil
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-07-15 16:11:12 +00:00
|
|
|
func (f *forwarder) getDoHClient(ip netaddr.IP) (urlBase string, c *http.Client, ok bool) {
|
|
|
|
urlBase, ok = knownDoH[ip]
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
f.mu.Lock()
|
|
|
|
defer f.mu.Unlock()
|
|
|
|
if c, ok := f.dohClient[ip]; ok {
|
|
|
|
return urlBase, c, true
|
|
|
|
}
|
|
|
|
if f.dohClient == nil {
|
|
|
|
f.dohClient = map[netaddr.IP]*http.Client{}
|
|
|
|
}
|
|
|
|
nsDialer := netns.NewDialer()
|
|
|
|
c = &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
IdleConnTimeout: dohTransportTimeout,
|
|
|
|
DialContext: func(ctx context.Context, netw, addr string) (net.Conn, error) {
|
|
|
|
if !strings.HasPrefix(netw, "tcp") {
|
|
|
|
return nil, fmt.Errorf("unexpected network %q", netw)
|
|
|
|
}
|
2021-07-21 19:43:06 +00:00
|
|
|
c, err := nsDialer.DialContext(ctx, "tcp", net.JoinHostPort(ip.String(), "443"))
|
|
|
|
// If v4 failed, try an equivalent v6 also in the time remaining.
|
|
|
|
if err != nil && ctx.Err() == nil {
|
|
|
|
if ip6, ok := dohV6(urlBase); ok && ip.Is4() {
|
|
|
|
if c6, err := nsDialer.DialContext(ctx, "tcp", net.JoinHostPort(ip6.String(), "443")); err == nil {
|
|
|
|
return c6, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return c, err
|
2021-07-15 16:11:12 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
f.dohClient[ip] = c
|
|
|
|
return urlBase, c, true
|
|
|
|
}
|
|
|
|
|
|
|
|
const dohType = "application/dns-message"
|
|
|
|
|
2021-07-22 17:14:46 +00:00
|
|
|
func (f *forwarder) releaseDoHSem() { <-f.dohSem }
|
|
|
|
|
2021-07-15 16:11:12 +00:00
|
|
|
func (f *forwarder) sendDoH(ctx context.Context, urlBase string, c *http.Client, packet []byte) ([]byte, error) {
|
2021-07-22 17:14:46 +00:00
|
|
|
// Bound the number of HTTP requests in flight. This primarily
|
|
|
|
// matters for iOS where we're very memory constrained and
|
|
|
|
// HTTP requests are heavier on iOS where we don't include
|
|
|
|
// HTTP/2 for binary size reasons (as binaries on iOS linked
|
|
|
|
// with Go code cost memory proportional to the binary size,
|
|
|
|
// for reasons not fully understood).
|
|
|
|
select {
|
|
|
|
case f.dohSem <- struct{}{}:
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, ctx.Err()
|
|
|
|
}
|
|
|
|
defer f.releaseDoHSem()
|
|
|
|
|
2021-07-15 16:11:12 +00:00
|
|
|
req, err := http.NewRequestWithContext(ctx, "POST", urlBase, bytes.NewReader(packet))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
req.Header.Set("Content-Type", dohType)
|
|
|
|
// Note: we don't currently set the Accept header (which is
|
|
|
|
// only a SHOULD in the spec) as iOS doesn't use HTTP/2 and
|
|
|
|
// we'd rather save a few bytes on outgoing requests when
|
|
|
|
// empirically no provider cares about the Accept header's
|
|
|
|
// absence.
|
|
|
|
|
|
|
|
hres, err := c.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer hres.Body.Close()
|
|
|
|
if hres.StatusCode != 200 {
|
|
|
|
return nil, errors.New(hres.Status)
|
|
|
|
}
|
|
|
|
if ct := hres.Header.Get("Content-Type"); ct != dohType {
|
|
|
|
return nil, fmt.Errorf("unexpected response Content-Type %q", ct)
|
|
|
|
}
|
|
|
|
return ioutil.ReadAll(hres.Body)
|
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// send sends packet to dst. It is best effort.
|
|
|
|
//
|
|
|
|
// send expects the reply to have the same txid as txidOut.
|
|
|
|
//
|
|
|
|
// The provided closeOnCtxDone lets send register values to Close if
|
|
|
|
// the caller's ctx expires. This avoids send from allocating its own
|
|
|
|
// waiting goroutine to interrupt the ReadFrom, as memory is tight on
|
|
|
|
// iOS and we want the number of pending DNS lookups to be bursty
|
|
|
|
// without too much associated goroutine/memory cost.
|
|
|
|
func (f *forwarder) send(ctx context.Context, txidOut txid, closeOnCtxDone *closePool, packet []byte, dst netaddr.IPPort) ([]byte, error) {
|
2021-07-15 16:11:12 +00:00
|
|
|
// Upgrade known DNS IPs to DoH (DNS-over-HTTPs).
|
|
|
|
if urlBase, dc, ok := f.getDoHClient(dst.IP()); ok {
|
|
|
|
res, err := f.sendDoH(ctx, urlBase, dc, packet)
|
|
|
|
if err == nil || ctx.Err() != nil {
|
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
f.logf("DoH error from %v: %v", dst.IP, err)
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
|
|
|
|
ln, err := f.packetListener(dst.IP())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
conn, err := ln.ListenPacket(ctx, "udp", ":0")
|
|
|
|
if err != nil {
|
|
|
|
f.logf("ListenPacket failed: %v", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer conn.Close()
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
closeOnCtxDone.Add(conn)
|
|
|
|
defer closeOnCtxDone.Remove(conn)
|
2021-06-07 21:16:07 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
if _, err := conn.WriteTo(packet, dst.UDPAddr()); err != nil {
|
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
2021-06-07 21:16:07 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-06-07 21:16:07 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// The 1 extra byte is to detect packet truncation.
|
|
|
|
out := make([]byte, maxResponseBytes+1)
|
|
|
|
n, _, err := conn.ReadFrom(out)
|
|
|
|
if err != nil {
|
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
if packetWasTruncated(err) {
|
|
|
|
err = nil
|
|
|
|
} else {
|
|
|
|
return nil, err
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
truncated := n > maxResponseBytes
|
|
|
|
if truncated {
|
|
|
|
n = maxResponseBytes
|
|
|
|
}
|
|
|
|
if n < headerBytes {
|
|
|
|
f.logf("recv: packet too small (%d bytes)", n)
|
|
|
|
}
|
|
|
|
out = out[:n]
|
|
|
|
txid := getTxID(out)
|
|
|
|
if txid != txidOut {
|
|
|
|
return nil, errors.New("txid doesn't match")
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
if truncated {
|
|
|
|
const dnsFlagTruncated = 0x200
|
|
|
|
flags := binary.BigEndian.Uint16(out[2:4])
|
|
|
|
flags |= dnsFlagTruncated
|
|
|
|
binary.BigEndian.PutUint16(out[2:4], flags)
|
|
|
|
|
|
|
|
// TODO(#2067): Remove any incomplete records? RFC 1035 section 6.2
|
|
|
|
// states that truncation should head drop so that the authority
|
|
|
|
// section can be preserved if possible. However, the UDP read with
|
|
|
|
// a too-small buffer has already dropped the end, so that's the
|
|
|
|
// best we can do.
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-24 14:36:23 +00:00
|
|
|
clampEDNSSize(out, maxResponseBytes)
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
return out, nil
|
|
|
|
}
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
// resolvers returns the resolvers to use for domain.
|
|
|
|
func (f *forwarder) resolvers(domain dnsname.FQDN) []netaddr.IPPort {
|
|
|
|
f.mu.Lock()
|
|
|
|
routes := f.routes
|
|
|
|
f.mu.Unlock()
|
|
|
|
for _, route := range routes {
|
|
|
|
if route.Suffix == "." || route.Suffix.Contains(domain) {
|
|
|
|
return route.Resolvers
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
return nil
|
2020-08-19 19:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// forward forwards the query to all upstream nameservers and returns the first response.
|
2021-04-01 06:06:47 +00:00
|
|
|
func (f *forwarder) forward(query packet) error {
|
2021-04-02 02:31:55 +00:00
|
|
|
domain, err := nameFromQuery(query.bs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-04-01 06:06:47 +00:00
|
|
|
txid := getTxID(query.bs)
|
2021-06-24 14:36:23 +00:00
|
|
|
clampEDNSSize(query.bs, maxResponseBytes)
|
2020-08-19 19:39:25 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
resolvers := f.resolvers(domain)
|
2021-04-02 02:31:55 +00:00
|
|
|
if len(resolvers) == 0 {
|
2020-08-19 19:39:25 +00:00
|
|
|
return errNoUpstreams
|
|
|
|
}
|
2021-04-02 02:31:55 +00:00
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
closeOnCtxDone := new(closePool)
|
|
|
|
defer closeOnCtxDone.Close()
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(f.ctx, responseTimeout)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
resc := make(chan []byte, 1)
|
|
|
|
var (
|
|
|
|
mu sync.Mutex
|
|
|
|
firstErr error
|
|
|
|
)
|
|
|
|
|
|
|
|
for _, ipp := range resolvers {
|
|
|
|
go func(ipp netaddr.IPPort) {
|
|
|
|
resb, err := f.send(ctx, txid, closeOnCtxDone, query.bs, ipp)
|
|
|
|
if err != nil {
|
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
|
|
|
if firstErr == nil {
|
|
|
|
firstErr = err
|
|
|
|
}
|
|
|
|
return
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
select {
|
|
|
|
case resc <- resb:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}(ipp)
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
select {
|
|
|
|
case v := <-resc:
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return ctx.Err()
|
|
|
|
case f.responses <- packet{v, query.addr}:
|
|
|
|
return nil
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
case <-ctx.Done():
|
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
|
|
|
if firstErr != nil {
|
|
|
|
return firstErr
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
return ctx.Err()
|
2020-09-23 20:21:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-23 04:53:43 +00:00
|
|
|
var initListenConfig func(_ *net.ListenConfig, _ *monitor.Mon, tunName string) error
|
2021-04-02 02:31:55 +00:00
|
|
|
|
|
|
|
// nameFromQuery extracts the normalized query name from bs.
|
2021-04-09 22:24:47 +00:00
|
|
|
func nameFromQuery(bs []byte) (dnsname.FQDN, error) {
|
2021-04-02 02:31:55 +00:00
|
|
|
var parser dns.Parser
|
|
|
|
|
|
|
|
hdr, err := parser.Start(bs)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if hdr.Response {
|
|
|
|
return "", errNotQuery
|
|
|
|
}
|
|
|
|
|
|
|
|
q, err := parser.Question()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
n := q.Name.Data[:q.Name.Length]
|
2021-04-09 22:24:47 +00:00
|
|
|
return dnsname.ToFQDN(rawNameToLower(n))
|
2021-04-02 02:31:55 +00:00
|
|
|
}
|
2021-06-23 04:53:43 +00:00
|
|
|
|
|
|
|
// closePool is a dynamic set of io.Closers to close as a group.
|
|
|
|
// It's intended to be Closed at most once.
|
|
|
|
//
|
|
|
|
// The zero value is ready for use.
|
|
|
|
type closePool struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
m map[io.Closer]bool
|
|
|
|
closed bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Add(c io.Closer) {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
c.Close()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if p.m == nil {
|
|
|
|
p.m = map[io.Closer]bool{}
|
|
|
|
}
|
|
|
|
p.m[c] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Remove(c io.Closer) {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
delete(p.m, c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *closePool) Close() error {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
if p.closed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
p.closed = true
|
|
|
|
for c := range p.m {
|
|
|
|
c.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
var knownDoH = map[netaddr.IP]string{}
|
|
|
|
|
2021-07-21 19:43:06 +00:00
|
|
|
var dohIPsOfBase = map[string][]netaddr.IP{}
|
|
|
|
|
|
|
|
func addDoH(ipStr, base string) {
|
|
|
|
ip := netaddr.MustParseIP(ipStr)
|
|
|
|
knownDoH[ip] = base
|
|
|
|
dohIPsOfBase[base] = append(dohIPsOfBase[base], ip)
|
|
|
|
}
|
|
|
|
|
|
|
|
func dohV6(base string) (ip netaddr.IP, ok bool) {
|
|
|
|
for _, ip := range dohIPsOfBase[base] {
|
|
|
|
if ip.Is6() {
|
|
|
|
return ip, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ip, false
|
|
|
|
}
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
func init() {
|
|
|
|
// Cloudflare
|
|
|
|
addDoH("1.1.1.1", "https://cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("1.0.0.1", "https://cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1111", "https://cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1001", "https://cloudflare-dns.com/dns-query")
|
|
|
|
|
|
|
|
// Cloudflare -Malware
|
2021-07-21 19:24:19 +00:00
|
|
|
addDoH("1.1.1.2", "https://security.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("1.0.0.2", "https://security.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1112", "https://security.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1002", "https://security.cloudflare-dns.com/dns-query")
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
// Cloudflare -Malware -Adult
|
2021-07-21 19:24:19 +00:00
|
|
|
addDoH("1.1.1.3", "https://family.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("1.0.0.3", "https://family.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1113", "https://family.cloudflare-dns.com/dns-query")
|
|
|
|
addDoH("2606:4700:4700::1003", "https://family.cloudflare-dns.com/dns-query")
|
2021-07-15 16:11:12 +00:00
|
|
|
|
|
|
|
// Google
|
|
|
|
addDoH("8.8.8.8", "https://dns.google/dns-query")
|
|
|
|
addDoH("8.8.4.4", "https://dns.google/dns-query")
|
|
|
|
addDoH("2001:4860:4860::8888", "https://dns.google/dns-query")
|
|
|
|
addDoH("2001:4860:4860::8844", "https://dns.google/dns-query")
|
|
|
|
|
|
|
|
// OpenDNS
|
|
|
|
// TODO(bradfitz): OpenDNS is unique amongst this current set in that
|
|
|
|
// its DoH DNS names resolve to different IPs than its normal DNS
|
|
|
|
// IPs. Support that later. For now we assume that they're the same.
|
|
|
|
// addDoH("208.67.222.222", "https://doh.opendns.com/dns-query")
|
|
|
|
// addDoH("208.67.220.220", "https://doh.opendns.com/dns-query")
|
|
|
|
// addDoH("208.67.222.123", "https://doh.familyshield.opendns.com/dns-query")
|
|
|
|
// addDoH("208.67.220.123", "https://doh.familyshield.opendns.com/dns-query")
|
|
|
|
|
|
|
|
// Quad9
|
|
|
|
addDoH("9.9.9.9", "https://dns.quad9.net/dns-query")
|
|
|
|
addDoH("149.112.112.112", "https://dns.quad9.net/dns-query")
|
|
|
|
addDoH("2620:fe::fe", "https://dns.quad9.net/dns-query")
|
|
|
|
addDoH("2620:fe::fe:9", "https://dns.quad9.net/dns-query")
|
|
|
|
}
|