2 dns.cpp - based on the firedns library Copyright (C) 2002 Ian Gulliver
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of version 2 of the GNU General Public License as
6 published by the Free Software Foundation.
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
13 You should have received a copy of the GNU General Public License
14 along with this program; if not, write to the Free Software
15 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
25 #include <sys/types.h>
26 #include <sys/socket.h>
34 #include <sys/types.h>
35 #include <sys/socket.h>
36 #include <netinet/in.h>
37 #include <arpa/inet.h>
42 #include "helperfuncs.h"
43 #include "socketengine.h"
45 extern InspIRCd* ServerInstance;
46 extern ServerConfig* Config;
49 enum QueryType { DNS_QRY_A = 1, DNS_QRY_PTR = 12 };
50 enum QueryFlags1 { FLAGS1_MASK_RD = 0x01, FLAGS1_MASK_TC = 0x02, FLAGS1_MASK_AA = 0x04, FLAGS1_MASK_OPCODE = 0x78, FLAGS1_MASK_QR = 0x80 };
51 enum QueryFlags2 { FLAGS2_MASK_RCODE = 0x0F, FLAGS2_MASK_Z = 0x70, FLAGS2_MASK_RA = 0x80 };
55 typedef std::map<int,s_connection*> connlist;
56 typedef connlist::iterator connlist_iter;
59 struct in_addr servers4[8];
81 unsigned int rdlength;
94 unsigned char payload[512];
98 void *dns_align(void *inp) {
100 int offby = ((char *)p - (char *)0) % (sizeof(void *) > sizeof(long) ? sizeof(void *) : sizeof(long));
102 return p + ((sizeof(void *) > sizeof(long) ? sizeof(void *) : sizeof(long)) - offby);
108 * Optimized by brain, these were using integer division and modulus.
109 * We can use logic shifts and logic AND to replace these even divisions
110 * and multiplications, it should be a bit faster (probably not noticably,
111 * but of course, more impressive). Also made these inline.
114 inline void dns_fill_rr(s_rr_middle* rr, const unsigned char *input) {
115 rr->type = (QueryType)((input[0] << 8) + input[1]);
116 rr->_class = (input[2] << 8) + input[3];
117 rr->ttl = (input[4] << 24) + (input[5] << 16) + (input[6] << 8) + input[7];
118 rr->rdlength = (input[8] << 8) + input[9];
121 inline void dns_fill_header(s_header *header, const unsigned char *input, const int l) {
122 header->id[0] = input[0];
123 header->id[1] = input[1];
124 header->flags1 = input[2];
125 header->flags2 = input[3];
126 header->qdcount = (input[4] << 8) + input[5];
127 header->ancount = (input[6] << 8) + input[7];
128 header->nscount = (input[8] << 8) + input[9];
129 header->arcount = (input[10] << 8) + input[11];
130 memcpy(header->payload,&input[12],l);
133 inline void dns_empty_header(unsigned char *output, const s_header *header, const int l) {
134 output[0] = header->id[0];
135 output[1] = header->id[1];
136 output[2] = header->flags1;
137 output[3] = header->flags2;
138 output[4] = header->qdcount >> 8;
139 output[5] = header->qdcount & 0xFF;
140 output[6] = header->ancount >> 8;
141 output[7] = header->ancount & 0xFF;
142 output[8] = header->nscount >> 8;
143 output[9] = header->nscount & 0xFF;
144 output[10] = header->arcount >> 8;
145 output[11] = header->arcount & 0xFF;
146 memcpy(&output[12],header->payload,l);
149 void dns_close(int fd) { /* close query */
151 ServerInstance->SE->DelFd(fd);
153 log(DEBUG,"DNS: dns_close on fd %d",fd);
154 if (fd == lastcreate) {
163 void DNS::dns_init() {
173 srand((unsigned int) TIME);
174 memset(servers4,'\0',sizeof(in_addr) * 8);
175 f = fopen("/etc/resolv.conf","r");
178 while (fgets(buf,1024,f) != NULL) {
179 if (strncmp(buf,"nameserver",10) == 0) {
181 while (buf[i] == ' ' || buf[i] == '\t')
184 if (dns_aton4_s(&buf[i],&addr4) != NULL)
185 memcpy(&servers4[i4++],&addr4,sizeof(in_addr));
192 void DNS::dns_init_2(const char* dnsserver)
196 srand((unsigned int) TIME);
197 memset(servers4,'\0',sizeof(in_addr) * 8);
198 if (dns_aton4_s(dnsserver,&addr4) != NULL)
199 memcpy(&servers4[i4++],&addr4,sizeof(in_addr));
203 static int dns_send_requests(const s_header *h, const s_connection *s, const int l)
207 unsigned char payload[sizeof(s_header)];
209 dns_empty_header(payload,h,l);
214 /* otherwise send via standard ipv4 boringness */
215 memset(&addr4,0,sizeof(addr4));
216 memcpy(&addr4.sin_addr,&servers4[i],sizeof(addr4.sin_addr));
217 addr4.sin_family = AF_INET;
218 addr4.sin_port = htons(53);
219 if (sendto(s->fd, payload, l + 12, 0, (sockaddr *) &addr4, sizeof(addr4)) == -1)
227 static s_connection *dns_add_query(s_header *h) { /* build DNS query, add to list */
229 s_connection * s = new s_connection;
230 int id = rand() % 65536;
232 /* set header flags */
233 h->id[0] = s->id[0] = id >> 8; /* verified by dns_getresult_s() */
234 h->id[1] = s->id[1] = id & 0xFF;
235 h->flags1 = 0 | FLAGS1_MASK_RD;
242 /* turn off want_list by default */
245 /* try to create ipv6 or ipv4 socket */
246 s->fd = socket(PF_INET, SOCK_DGRAM, 0);
248 if (fcntl(s->fd, F_SETFL, O_NONBLOCK) != 0) {
256 memset(&addr,0,sizeof(addr));
257 addr.sin_family = AF_INET;
259 addr.sin_addr.s_addr = INADDR_ANY;
260 if (bind(s->fd,(sockaddr *)&addr,sizeof(addr)) != 0) {
270 /* create new connection object, add to linked list */
271 if (connections.find(s->fd) == connections.end())
272 connections[s->fd] = s;
274 if (wantclose == 1) {
275 shutdown(lastcreate,2);
283 static int dns_build_query_payload(const char * const name, const unsigned short rr, const unsigned short _class, unsigned char * const payload) {
285 const char * tempchr, * tempchr2;
291 /* split name up into labels, create query */
292 while ((tempchr = strchr(tempchr2,'.')) != NULL) {
293 l = tempchr - tempchr2;
294 if (payloadpos + l + 1 > 507)
296 payload[payloadpos++] = l;
297 memcpy(&payload[payloadpos],tempchr2,l);
299 tempchr2 = &tempchr[1];
301 l = strlen(tempchr2);
303 if (payloadpos + l + 2 > 507)
305 payload[payloadpos++] = l;
306 memcpy(&payload[payloadpos],tempchr2,l);
308 payload[payloadpos++] = '\0';
310 if (payloadpos > 508)
313 memcpy(&payload[payloadpos],&l,2);
315 memcpy(&payload[payloadpos + 2],&l,2);
316 return payloadpos + 4;
319 in_addr* DNS::dns_aton4(const char * const ipstring) { /* ascii to numeric: convert string to static 4part IP addr struct */
321 return dns_aton4_s(ipstring,&ip);
324 in_addr* DNS::dns_aton4_r(const char *ipstring) { /* ascii to numeric (reentrant): convert string to new 4part IP addr struct */
327 if(dns_aton4_s(ipstring,ip) == NULL) {
334 in_addr* DNS::dns_aton4_s(const char *ipstring, in_addr *ip) { /* ascii to numeric (buffered): convert string to given 4part IP addr struct */
335 inet_aton(ipstring,ip);
339 int DNS::dns_getip4(const char *name) { /* build, add and send A query; retrieve result with dns_getresult() */
347 l = dns_build_query_payload(name,DNS_QRY_A,1,(unsigned char *)&h.payload);
350 s = dns_add_query(&h);
355 if (dns_send_requests(&h,s,l) == -1)
361 int DNS::dns_getip4list(const char *name) { /* build, add and send A query; retrieve result with dns_getresult() */
369 l = dns_build_query_payload(name,DNS_QRY_A,1,(unsigned char *)&h.payload);
372 s = dns_add_query(&h);
378 if (dns_send_requests(&h,s,l) == -1)
384 int DNS::dns_getname4(const in_addr *ip) { /* build, add and send PTR query; retrieve result with dns_getresult() */
391 c = (unsigned char *)&ip->s_addr;
393 sprintf(query,"%d.%d.%d.%d.in-addr.arpa",c[3],c[2],c[1],c[0]);
395 l = dns_build_query_payload(query,DNS_QRY_PTR,1,(unsigned char *)&h.payload);
398 s = dns_add_query(&h);
402 s->type = DNS_QRY_PTR;
403 if (dns_send_requests(&h,s,l) == -1)
409 char* DNS::dns_ntoa4(const in_addr * const ip) { /* numeric to ascii: convert 4part IP addr struct to static string */
411 return dns_ntoa4_s(ip,r);
414 char* DNS::dns_ntoa4_s(const in_addr *ip, char *r) { /* numeric to ascii (buffered): convert 4part IP addr struct to given string */
416 m = (unsigned char *)&ip->s_addr;
417 sprintf(r,"%d.%d.%d.%d",m[0],m[1],m[2],m[3]);
421 char* DNS::dns_getresult(const int cfd) { /* retrieve result of DNS query */
422 log(DEBUG,"DNS: dns_getresult with cfd=%d",cfd);
423 return dns_getresult_s(cfd,this->localbuf);
426 char* DNS::dns_getresult_s(const int cfd, char *res) { /* retrieve result of DNS query (buffered) */
429 int l, i, q, curanswer, o;
431 unsigned char buffer[sizeof(s_header)];
437 /* FireDNS used a linked list for this. How ugly (and slow). */
438 connlist_iter n_iter = connections.find(cfd);
439 if (n_iter == connections.end())
441 log(DEBUG,"DNS: got a response for a query we didnt send with fd=%d",cfd);
446 /* Remove the query from the list */
447 c = (s_connection*)n_iter->second;
448 /* We don't delete c here, because its done later when needed */
449 connections.erase(n_iter);
452 l = recv(c->fd,buffer,sizeof(s_header),0);
458 dns_fill_header(&h,buffer,l - 12);
459 if (c->id[0] != h.id[0] || c->id[1] != h.id[1]) {
460 log(DEBUG,"DNS: id mismatch on query");
462 return NULL; /* ID mismatch */
464 if ((h.flags1 & FLAGS1_MASK_QR) == 0) {
465 log(DEBUG,"DNS: didnt get a query result");
469 if ((h.flags1 & FLAGS1_MASK_OPCODE) != 0) {
470 log(DEBUG,"DNS: got an OPCODE and didnt want one");
474 if ((h.flags2 & FLAGS2_MASK_RCODE) != 0) {
475 log(DEBUG,"DNS lookup failed due to SERVFAIL");
479 if (h.ancount < 1) { /* no sense going on if we don't have any answers */
480 log(DEBUG,"DNS: no answers!");
488 while ((unsigned)q < h.qdcount && i < l) {
489 if (h.payload[i] > 63) { /* pointer */
490 i += 6; /* skip pointer, _class and type */
493 if (h.payload[i] == 0) {
495 i += 5; /* skip nil, _class and type */
497 i += h.payload[i] + 1; /* skip length and label */
500 /* &h.payload[i] should now be the start of the first response */
502 while ((unsigned)curanswer < h.ancount) {
504 while (q == 0 && i < l) {
505 if (h.payload[i] > 63) { /* pointer */
506 i += 2; /* skip pointer */
509 if (h.payload[i] == 0) {
513 i += h.payload[i] + 1; /* skip length and label */
520 dns_fill_rr(&rr,&h.payload[i]);
522 if (rr.type != c->type) {
527 if (rr._class != c->_class) {
534 if ((unsigned)curanswer == h.ancount)
536 if ((unsigned)i + rr.rdlength > (unsigned)l)
538 if (rr.rdlength > 1023)
543 log(DEBUG,"DNS: got a result of type DNS_QRY_PTR");
546 while (q == 0 && i < l && o + 256 < 1023) {
547 if (h.payload[i] > 63) { /* pointer */
548 memcpy(&p,&h.payload[i],2);
549 i = ntohs(p) - 0xC000 - 12;
551 if (h.payload[i] == 0)
557 memcpy(&res[o],&h.payload[i + 1],h.payload[i]);
559 i += h.payload[i] + 1;
566 log(DEBUG,"DNS: got a result of type DNS_QRY_A");
568 dns_ip4list *alist = (dns_ip4list *) res; /* we have to trust that this is aligned */
569 while ((char *)alist - (char *)res < 700) {
570 if (rr.type != DNS_QRY_A)
574 if (rr.rdlength != 4) {
578 memcpy(&alist->ip,&h.payload[i],4);
579 if ((unsigned)++curanswer >= h.ancount)
585 while (q == 0 && i < l) {
586 if (h.payload[i] > 63) { /* pointer */
587 i += 2; /* skip pointer */
590 if (h.payload[i] == 0) {
594 i += h.payload[i] + 1; /* skip length and label */
602 dns_fill_rr(&rr,&h.payload[i]);
604 alist->next = (dns_ip4list *) dns_align(((char *) alist) + sizeof(dns_ip4list));
615 log(DEBUG,"DNS: doing something with result 'default'");
616 memcpy(res,&h.payload[i],rr.rdlength);
617 res[rr.rdlength] = '\0';
627 log(DEBUG,"Create blank DNS");
630 DNS::DNS(std::string dnsserver)
632 dns_init_2(dnsserver.c_str());
633 log(DEBUG,"Create DNS");
636 void DNS::SetNS(std::string dnsserver)
638 dns_init_2(dnsserver.c_str());
646 bool DNS::ReverseLookup(std::string ip)
648 ServerInstance->stats->statsDns++;
649 binip = dns_aton4(ip.c_str());
654 this->myfd = dns_getname4(binip);
655 if (this->myfd == -1)
659 log(DEBUG,"DNS: ReverseLookup, fd=%d",this->myfd);
661 ServerInstance->SE->AddFd(this->myfd,true,X_ESTAB_DNS);
666 bool DNS::ForwardLookup(std::string host)
668 ServerInstance->stats->statsDns++;
669 this->myfd = dns_getip4(host.c_str());
670 if (this->myfd == -1)
674 log(DEBUG,"DNS: ForwardLookup, fd=%d",this->myfd);
676 ServerInstance->SE->AddFd(this->myfd,true,X_ESTAB_DNS);
681 bool DNS::HasResult(int fd)
683 return (fd == this->myfd);
686 /* Only the multithreaded dns uses this poll() based
687 * check now. As its in another thread we dont have
688 * to worry about its performance that much.
690 bool DNS::HasResult()
692 log(DEBUG,"DNS: HasResult, fd=%d",this->myfd);
694 polls.fd = this->myfd;
695 polls.events = POLLIN;
696 int ret = poll(&polls,1,1);
697 log(DEBUG,"DNS: Hasresult returning %d",ret);
706 std::string DNS::GetResult()
708 log(DEBUG,"DNS: GetResult()");
709 result = dns_getresult(this->myfd);
711 ServerInstance->stats->statsDnsGood++;
712 dns_close(this->myfd);
715 ServerInstance->stats->statsDnsBad++;
716 if (this->myfd != -1)
718 dns_close(this->myfd);
724 std::string DNS::GetResultIP()
727 log(DEBUG,"DNS: GetResultIP()");
728 result = dns_getresult(this->myfd);
729 if (this->myfd != -1)
731 dns_close(this->myfd);
735 ServerInstance->stats->statsDnsGood++;
736 unsigned char a = (unsigned)result[0];
737 unsigned char b = (unsigned)result[1];
738 unsigned char c = (unsigned)result[2];
739 unsigned char d = (unsigned)result[3];
740 snprintf(r,1024,"%u.%u.%u.%u",a,b,c,d);
745 ServerInstance->stats->statsDnsBad++;
746 log(DEBUG,"DANGER WILL ROBINSON! NXDOMAIN for forward lookup, but we got a reverse lookup!");
754 void* dns_task(void* arg)
756 userrec* u = (userrec*)arg;
757 log(DEBUG,"DNS thread for user %s",u->nick);
762 if (dns1.ReverseLookup(u->ip))
764 while (!dns1.HasResult())
768 host = dns1.GetResult();
771 if (dns2.ForwardLookup(host))
773 while (!dns2.HasResult())
777 ip = dns2.GetResultIP();
778 if (ip == std::string(u->ip))
780 if (host.length() < 160)
782 strcpy(u->host,host.c_str());
783 strcpy(u->dhost,host.c_str());