1 /* dnsmasq is Copyright (c) 2000-2009 Simon Kelley
2
3 This program is free software; you can redistribute it and/or modify
4 it under the terms of the GNU General Public License as published by
5 the Free Software Foundation; version 2 dated June, 1991, or
6 (at your option) version 3 dated 29 June, 2007.
7
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
12
13 You should have received a copy of the GNU General Public License
14 along with this program. If not, see <http://www.gnu.org/licenses/>.
15 */
16
17 #include "dnsmasq.h"
18
19 static struct frec *lookup_frec(unsigned short id, unsigned int crc);
20 static struct frec *lookup_frec_by_sender(unsigned short id,
21 union mysockaddr *addr,
22 unsigned int crc);
23 static unsigned short get_id(int force, unsigned short force_id, unsigned int crc);
24 static void free_frec(struct frec *f);
25 static struct randfd *allocate_rfd(int family);
26
27 /* Send a UDP packet with its source address set as "source"
28 unless nowild is true, when we just send it with the kernel default */
send_from(int fd,int nowild,char * packet,size_t len,union mysockaddr * to,struct all_addr * source,unsigned int iface)29 static void send_from(int fd, int nowild, char *packet, size_t len,
30 union mysockaddr *to, struct all_addr *source,
31 unsigned int iface)
32 {
33 struct msghdr msg;
34 struct iovec iov[1];
35 union {
36 struct cmsghdr align; /* this ensures alignment */
37 #if defined(HAVE_LINUX_NETWORK)
38 char control[CMSG_SPACE(sizeof(struct in_pktinfo))];
39 #elif defined(IP_SENDSRCADDR)
40 char control[CMSG_SPACE(sizeof(struct in_addr))];
41 #endif
42 #ifdef HAVE_IPV6
43 char control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
44 #endif
45 } control_u;
46
47 iov[0].iov_base = packet;
48 iov[0].iov_len = len;
49
50 msg.msg_control = NULL;
51 msg.msg_controllen = 0;
52 msg.msg_flags = 0;
53 msg.msg_name = to;
54 msg.msg_namelen = sa_len(to);
55 msg.msg_iov = iov;
56 msg.msg_iovlen = 1;
57
58 if (!nowild)
59 {
60 struct cmsghdr *cmptr;
61 msg.msg_control = &control_u;
62 msg.msg_controllen = sizeof(control_u);
63 cmptr = CMSG_FIRSTHDR(&msg);
64
65 if (to->sa.sa_family == AF_INET)
66 {
67 #if defined(HAVE_LINUX_NETWORK)
68 struct in_pktinfo *pkt = (struct in_pktinfo *)CMSG_DATA(cmptr);
69 pkt->ipi_ifindex = 0;
70 pkt->ipi_spec_dst = source->addr.addr4;
71 msg.msg_controllen = cmptr->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
72 cmptr->cmsg_level = SOL_IP;
73 cmptr->cmsg_type = IP_PKTINFO;
74 #elif defined(IP_SENDSRCADDR)
75 struct in_addr *a = (struct in_addr *)CMSG_DATA(cmptr);
76 *a = source->addr.addr4;
77 msg.msg_controllen = cmptr->cmsg_len = CMSG_LEN(sizeof(struct in_addr));
78 cmptr->cmsg_level = IPPROTO_IP;
79 cmptr->cmsg_type = IP_SENDSRCADDR;
80 #endif
81 }
82 else
83 #ifdef HAVE_IPV6
84 {
85 struct in6_pktinfo *pkt = (struct in6_pktinfo *)CMSG_DATA(cmptr);
86 pkt->ipi6_ifindex = iface; /* Need iface for IPv6 to handle link-local addrs */
87 pkt->ipi6_addr = source->addr.addr6;
88 msg.msg_controllen = cmptr->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
89 cmptr->cmsg_type = IPV6_PKTINFO;
90 cmptr->cmsg_level = IPV6_LEVEL;
91 }
92 #else
93 iface = 0; /* eliminate warning */
94 #endif
95 }
96
97 retry:
98 if (sendmsg(fd, &msg, 0) == -1)
99 {
100 /* certain Linux kernels seem to object to setting the source address in the IPv6 stack
101 by returning EINVAL from sendmsg. In that case, try again without setting the
102 source address, since it will nearly alway be correct anyway. IPv6 stinks. */
103 if (errno == EINVAL && msg.msg_controllen)
104 {
105 msg.msg_controllen = 0;
106 goto retry;
107 }
108 if (retry_send())
109 goto retry;
110 }
111 }
112
search_servers(time_t now,struct all_addr ** addrpp,unsigned short qtype,char * qdomain,int * type,char ** domain)113 static unsigned short search_servers(time_t now, struct all_addr **addrpp,
114 unsigned short qtype, char *qdomain, int *type, char **domain)
115
116 {
117 /* If the query ends in the domain in one of our servers, set
118 domain to point to that name. We find the largest match to allow both
119 domain.org and sub.domain.org to exist. */
120
121 unsigned int namelen = strlen(qdomain);
122 unsigned int matchlen = 0;
123 struct server *serv;
124 unsigned short flags = 0;
125
126 for (serv = daemon->servers; serv; serv=serv->next)
127 /* domain matches take priority over NODOTS matches */
128 if ((serv->flags & SERV_FOR_NODOTS) && *type != SERV_HAS_DOMAIN && !strchr(qdomain, '.') && namelen != 0)
129 {
130 unsigned short sflag = serv->addr.sa.sa_family == AF_INET ? F_IPV4 : F_IPV6;
131 *type = SERV_FOR_NODOTS;
132 if (serv->flags & SERV_NO_ADDR)
133 flags = F_NXDOMAIN;
134 else if (serv->flags & SERV_LITERAL_ADDRESS)
135 {
136 if (sflag & qtype)
137 {
138 flags = sflag;
139 if (serv->addr.sa.sa_family == AF_INET)
140 *addrpp = (struct all_addr *)&serv->addr.in.sin_addr;
141 #ifdef HAVE_IPV6
142 else
143 *addrpp = (struct all_addr *)&serv->addr.in6.sin6_addr;
144 #endif
145 }
146 else if (!flags || (flags & F_NXDOMAIN))
147 flags = F_NOERR;
148 }
149 }
150 else if (serv->flags & SERV_HAS_DOMAIN)
151 {
152 unsigned int domainlen = strlen(serv->domain);
153 char *matchstart = qdomain + namelen - domainlen;
154 if (namelen >= domainlen &&
155 hostname_isequal(matchstart, serv->domain) &&
156 domainlen >= matchlen &&
157 (domainlen == 0 || namelen == domainlen || *(serv->domain) == '.' || *(matchstart-1) == '.' ))
158 {
159 unsigned short sflag = serv->addr.sa.sa_family == AF_INET ? F_IPV4 : F_IPV6;
160 *type = SERV_HAS_DOMAIN;
161 *domain = serv->domain;
162 matchlen = domainlen;
163 if (serv->flags & SERV_NO_ADDR)
164 flags = F_NXDOMAIN;
165 else if (serv->flags & SERV_LITERAL_ADDRESS)
166 {
167 if (sflag & qtype)
168 {
169 flags = sflag;
170 if (serv->addr.sa.sa_family == AF_INET)
171 *addrpp = (struct all_addr *)&serv->addr.in.sin_addr;
172 #ifdef HAVE_IPV6
173 else
174 *addrpp = (struct all_addr *)&serv->addr.in6.sin6_addr;
175 #endif
176 }
177 else if (!flags || (flags & F_NXDOMAIN))
178 flags = F_NOERR;
179 }
180 }
181 }
182
183 if (flags == 0 && !(qtype & F_BIGNAME) &&
184 (daemon->options & OPT_NODOTS_LOCAL) && !strchr(qdomain, '.') && namelen != 0)
185 /* don't forward simple names, make exception for NS queries and empty name. */
186 flags = F_NXDOMAIN;
187
188 if (flags == F_NXDOMAIN && check_for_local_domain(qdomain, now))
189 flags = F_NOERR;
190
191 if (flags)
192 {
193 int logflags = 0;
194
195 if (flags == F_NXDOMAIN || flags == F_NOERR)
196 logflags = F_NEG | qtype;
197
198 log_query(logflags | flags | F_CONFIG | F_FORWARD, qdomain, *addrpp, NULL);
199 }
200
201 return flags;
202 }
203
forward_query(int udpfd,union mysockaddr * udpaddr,struct all_addr * dst_addr,unsigned int dst_iface,HEADER * header,size_t plen,time_t now,struct frec * forward)204 static int forward_query(int udpfd, union mysockaddr *udpaddr,
205 struct all_addr *dst_addr, unsigned int dst_iface,
206 HEADER *header, size_t plen, time_t now, struct frec *forward)
207 {
208 char *domain = NULL;
209 int type = 0;
210 struct all_addr *addrp = NULL;
211 unsigned int crc = questions_crc(header, plen, daemon->namebuff);
212 unsigned short flags = 0;
213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL);
214 struct server *start = NULL;
215
216 /* may be no servers available. */
217 if (!daemon->servers)
218 forward = NULL;
219 else if (forward || (forward = lookup_frec_by_sender(ntohs(header->id), udpaddr, crc)))
220 {
221 /* retry on existing query, send to all available servers */
222 domain = forward->sentto->domain;
223 forward->sentto->failed_queries++;
224 if (!(daemon->options & OPT_ORDER))
225 {
226 forward->forwardall = 1;
227 daemon->last_server = NULL;
228 }
229 type = forward->sentto->flags & SERV_TYPE;
230 if (!(start = forward->sentto->next))
231 start = daemon->servers; /* at end of list, recycle */
232 header->id = htons(forward->new_id);
233 }
234 else
235 {
236 if (gotname)
237 flags = search_servers(now, &addrp, gotname, daemon->namebuff, &type, &domain);
238
239 if (!flags && !(forward = get_new_frec(now, NULL)))
240 /* table full - server failure. */
241 flags = F_NEG;
242
243 if (forward)
244 {
245 /* force unchanging id for signed packets */
246 int is_sign;
247 find_pseudoheader(header, plen, NULL, NULL, &is_sign);
248
249 forward->source = *udpaddr;
250 forward->dest = *dst_addr;
251 forward->iface = dst_iface;
252 forward->orig_id = ntohs(header->id);
253 forward->new_id = get_id(is_sign, forward->orig_id, crc);
254 forward->fd = udpfd;
255 forward->crc = crc;
256 forward->forwardall = 0;
257 header->id = htons(forward->new_id);
258
259 /* In strict_order mode, or when using domain specific servers
260 always try servers in the order specified in resolv.conf,
261 otherwise, use the one last known to work. */
262
263 if (type != 0 || (daemon->options & OPT_ORDER))
264 start = daemon->servers;
265 else if (!(start = daemon->last_server) ||
266 daemon->forwardcount++ > FORWARD_TEST ||
267 difftime(now, daemon->forwardtime) > FORWARD_TIME)
268 {
269 start = daemon->servers;
270 forward->forwardall = 1;
271 daemon->forwardcount = 0;
272 daemon->forwardtime = now;
273 }
274 }
275 }
276
277 /* check for send errors here (no route to host)
278 if we fail to send to all nameservers, send back an error
279 packet straight away (helps modem users when offline) */
280
281 if (!flags && forward)
282 {
283 struct server *firstsentto = start;
284 int forwarded = 0;
285
286 while (1)
287 {
288 /* only send to servers dealing with our domain.
289 domain may be NULL, in which case server->domain
290 must be NULL also. */
291
292 if (type == (start->flags & SERV_TYPE) &&
293 (type != SERV_HAS_DOMAIN || hostname_isequal(domain, start->domain)) &&
294 !(start->flags & SERV_LITERAL_ADDRESS))
295 {
296 int fd;
297
298 /* find server socket to use, may need to get random one. */
299 if (start->sfd)
300 fd = start->sfd->fd;
301 else
302 {
303 #ifdef HAVE_IPV6
304 if (start->addr.sa.sa_family == AF_INET6)
305 {
306 if (!forward->rfd6 &&
307 !(forward->rfd6 = allocate_rfd(AF_INET6)))
308 break;
309 daemon->rfd_save = forward->rfd6;
310 fd = forward->rfd6->fd;
311 }
312 else
313 #endif
314 {
315 if (!forward->rfd4 &&
316 !(forward->rfd4 = allocate_rfd(AF_INET)))
317 break;
318 daemon->rfd_save = forward->rfd4;
319 fd = forward->rfd4->fd;
320 }
321
322 #ifdef ANDROID
323 // Mark the socket so it goes out on the correct network. Note
324 // that we never clear the mark, only re-set it the next time we
325 // allocate a new random fd. This is because we buffer DNS
326 // queries (in daemon->srv_save, daemon->packet_len) and socket
327 // file descriptors (in daemon->rfd_save) with the expectation of
328 // being able to use them again.
329 //
330 // Server fds are marked separately in allocate_sfd.
331 setsockopt(fd, SOL_SOCKET, SO_MARK, &start->mark, sizeof(start->mark));
332 #endif
333 }
334
335 if (sendto(fd, (char *)header, plen, 0,
336 &start->addr.sa,
337 sa_len(&start->addr)) == -1)
338 {
339 if (retry_send())
340 continue;
341 }
342 else
343 {
344 /* Keep info in case we want to re-send this packet */
345 daemon->srv_save = start;
346 daemon->packet_len = plen;
347
348 if (!gotname)
349 strcpy(daemon->namebuff, "query");
350 if (start->addr.sa.sa_family == AF_INET)
351 log_query(F_SERVER | F_IPV4 | F_FORWARD, daemon->namebuff,
352 (struct all_addr *)&start->addr.in.sin_addr, NULL);
353 #ifdef HAVE_IPV6
354 else
355 log_query(F_SERVER | F_IPV6 | F_FORWARD, daemon->namebuff,
356 (struct all_addr *)&start->addr.in6.sin6_addr, NULL);
357 #endif
358 start->queries++;
359 forwarded = 1;
360 forward->sentto = start;
361 if (!forward->forwardall)
362 break;
363 forward->forwardall++;
364 }
365 }
366
367 if (!(start = start->next))
368 start = daemon->servers;
369
370 if (start == firstsentto)
371 break;
372 }
373
374 if (forwarded)
375 return 1;
376
377 /* could not send on, prepare to return */
378 header->id = htons(forward->orig_id);
379 free_frec(forward); /* cancel */
380 }
381
382 /* could not send on, return empty answer or address if known for whole domain */
383 if (udpfd != -1)
384 {
385 plen = setup_reply(header, plen, addrp, flags, daemon->local_ttl);
386 send_from(udpfd, daemon->options & OPT_NOWILD, (char *)header, plen, udpaddr, dst_addr, dst_iface);
387 }
388
389 return 0;
390 }
391
process_reply(HEADER * header,time_t now,struct server * server,size_t n)392 static size_t process_reply(HEADER *header, time_t now,
393 struct server *server, size_t n)
394 {
395 unsigned char *pheader, *sizep;
396 int munged = 0, is_sign;
397 size_t plen;
398
399 /* If upstream is advertising a larger UDP packet size
400 than we allow, trim it so that we don't get overlarge
401 requests for the client. We can't do this for signed packets. */
402
403 if ((pheader = find_pseudoheader(header, n, &plen, &sizep, &is_sign)) && !is_sign)
404 {
405 unsigned short udpsz;
406 unsigned char *psave = sizep;
407
408 GETSHORT(udpsz, sizep);
409 if (udpsz > daemon->edns_pktsz)
410 PUTSHORT(daemon->edns_pktsz, psave);
411 }
412
413 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN))
414 return n;
415
416 /* Complain loudly if the upstream server is non-recursive. */
417 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 &&
418 server && !(server->flags & SERV_WARNED_RECURSIVE))
419 {
420 prettyprint_addr(&server->addr, daemon->namebuff);
421 my_syslog(LOG_WARNING, _("nameserver %s refused to do a recursive query"), daemon->namebuff);
422 if (!(daemon->options & OPT_LOG))
423 server->flags |= SERV_WARNED_RECURSIVE;
424 }
425
426 if (daemon->bogus_addr && header->rcode != NXDOMAIN &&
427 check_for_bogus_wildcard(header, n, daemon->namebuff, daemon->bogus_addr, now))
428 {
429 munged = 1;
430 header->rcode = NXDOMAIN;
431 header->aa = 0;
432 }
433 else
434 {
435 if (header->rcode == NXDOMAIN &&
436 extract_request(header, n, daemon->namebuff, NULL) &&
437 check_for_local_domain(daemon->namebuff, now))
438 {
439 /* if we forwarded a query for a locally known name (because it was for
440 an unknown type) and the answer is NXDOMAIN, convert that to NODATA,
441 since we know that the domain exists, even if upstream doesn't */
442 munged = 1;
443 header->aa = 1;
444 header->rcode = NOERROR;
445 }
446
447 if (extract_addresses(header, n, daemon->namebuff, now))
448 {
449 my_syslog(LOG_WARNING, _("possible DNS-rebind attack detected"));
450 munged = 1;
451 }
452 }
453
454 /* do this after extract_addresses. Ensure NODATA reply and remove
455 nameserver info. */
456
457 if (munged)
458 {
459 header->ancount = htons(0);
460 header->nscount = htons(0);
461 header->arcount = htons(0);
462 }
463
464 /* the bogus-nxdomain stuff, doctor and NXDOMAIN->NODATA munging can all elide
465 sections of the packet. Find the new length here and put back pseudoheader
466 if it was removed. */
467 return resize_packet(header, n, pheader, plen);
468 }
469
470 /* sets new last_server */
reply_query(int fd,int family,time_t now)471 void reply_query(int fd, int family, time_t now)
472 {
473 /* packet from peer server, extract data for cache, and send to
474 original requester */
475 HEADER *header;
476 union mysockaddr serveraddr;
477 struct frec *forward;
478 socklen_t addrlen = sizeof(serveraddr);
479 ssize_t n = recvfrom(fd, daemon->packet, daemon->edns_pktsz, 0, &serveraddr.sa, &addrlen);
480 size_t nn;
481 struct server *server;
482
483 /* packet buffer overwritten */
484 daemon->srv_save = NULL;
485
486 /* Determine the address of the server replying so that we can mark that as good */
487 serveraddr.sa.sa_family = family;
488 #ifdef HAVE_IPV6
489 if (serveraddr.sa.sa_family == AF_INET6)
490 serveraddr.in6.sin6_flowinfo = 0;
491 #endif
492
493 /* spoof check: answer must come from known server, */
494 for (server = daemon->servers; server; server = server->next)
495 if (!(server->flags & (SERV_LITERAL_ADDRESS | SERV_NO_ADDR)) &&
496 sockaddr_isequal(&server->addr, &serveraddr))
497 break;
498
499 header = (HEADER *)daemon->packet;
500
501 if (!server ||
502 n < (int)sizeof(HEADER) || !header->qr ||
503 !(forward = lookup_frec(ntohs(header->id), questions_crc(header, n, daemon->namebuff))))
504 return;
505
506 server = forward->sentto;
507
508 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
509 !(daemon->options & OPT_ORDER) &&
510 forward->forwardall == 0)
511 /* for broken servers, attempt to send to another one. */
512 {
513 unsigned char *pheader;
514 size_t plen;
515 int is_sign;
516
517 /* recreate query from reply */
518 pheader = find_pseudoheader(header, (size_t)n, &plen, NULL, &is_sign);
519 if (!is_sign)
520 {
521 header->ancount = htons(0);
522 header->nscount = htons(0);
523 header->arcount = htons(0);
524 if ((nn = resize_packet(header, (size_t)n, pheader, plen)))
525 {
526 header->qr = 0;
527 header->tc = 0;
528 forward_query(-1, NULL, NULL, 0, header, nn, now, forward);
529 return;
530 }
531 }
532 }
533
534 if ((forward->sentto->flags & SERV_TYPE) == 0)
535 {
536 if (header->rcode == SERVFAIL || header->rcode == REFUSED)
537 server = NULL;
538 else
539 {
540 struct server *last_server;
541
542 /* find good server by address if possible, otherwise assume the last one we sent to */
543 for (last_server = daemon->servers; last_server; last_server = last_server->next)
544 if (!(last_server->flags & (SERV_LITERAL_ADDRESS | SERV_HAS_DOMAIN | SERV_FOR_NODOTS | SERV_NO_ADDR)) &&
545 sockaddr_isequal(&last_server->addr, &serveraddr))
546 {
547 server = last_server;
548 break;
549 }
550 }
551 if (!(daemon->options & OPT_ALL_SERVERS))
552 daemon->last_server = server;
553 }
554
555 /* If the answer is an error, keep the forward record in place in case
556 we get a good reply from another server. Kill it when we've
557 had replies from all to avoid filling the forwarding table when
558 everything is broken */
559 if (forward->forwardall == 0 || --forward->forwardall == 1 ||
560 (header->rcode != REFUSED && header->rcode != SERVFAIL))
561 {
562 if ((nn = process_reply(header, now, server, (size_t)n)))
563 {
564 header->id = htons(forward->orig_id);
565 header->ra = 1; /* recursion if available */
566 send_from(forward->fd, daemon->options & OPT_NOWILD, daemon->packet, nn,
567 &forward->source, &forward->dest, forward->iface);
568 }
569 free_frec(forward); /* cancel */
570 }
571 }
572
573
receive_query(struct listener * listen,time_t now)574 void receive_query(struct listener *listen, time_t now)
575 {
576 HEADER *header = (HEADER *)daemon->packet;
577 union mysockaddr source_addr;
578 unsigned short type;
579 struct all_addr dst_addr;
580 struct in_addr netmask, dst_addr_4;
581 size_t m;
582 ssize_t n;
583 int if_index = 0;
584 struct iovec iov[1];
585 struct msghdr msg;
586 struct cmsghdr *cmptr;
587 union {
588 struct cmsghdr align; /* this ensures alignment */
589 #ifdef HAVE_IPV6
590 char control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
591 #endif
592 #if defined(HAVE_LINUX_NETWORK)
593 char control[CMSG_SPACE(sizeof(struct in_pktinfo))];
594 #elif defined(IP_RECVDSTADDR)
595 char control[CMSG_SPACE(sizeof(struct in_addr)) +
596 CMSG_SPACE(sizeof(struct sockaddr_dl))];
597 #endif
598 } control_u;
599
600 /* packet buffer overwritten */
601 daemon->srv_save = NULL;
602
603 if (listen->family == AF_INET && (daemon->options & OPT_NOWILD))
604 {
605 dst_addr_4 = listen->iface->addr.in.sin_addr;
606 netmask = listen->iface->netmask;
607 }
608 else
609 {
610 dst_addr_4.s_addr = 0;
611 netmask.s_addr = 0;
612 }
613
614 iov[0].iov_base = daemon->packet;
615 iov[0].iov_len = daemon->edns_pktsz;
616
617 msg.msg_control = control_u.control;
618 msg.msg_controllen = sizeof(control_u);
619 msg.msg_flags = 0;
620 msg.msg_name = &source_addr;
621 msg.msg_namelen = sizeof(source_addr);
622 msg.msg_iov = iov;
623 msg.msg_iovlen = 1;
624
625 if ((n = recvmsg(listen->fd, &msg, 0)) == -1)
626 return;
627
628 if (n < (int)sizeof(HEADER) ||
629 (msg.msg_flags & MSG_TRUNC) ||
630 header->qr)
631 return;
632
633 source_addr.sa.sa_family = listen->family;
634 #ifdef HAVE_IPV6
635 if (listen->family == AF_INET6)
636 source_addr.in6.sin6_flowinfo = 0;
637 #endif
638
639 if (!(daemon->options & OPT_NOWILD))
640 {
641 struct ifreq ifr;
642
643 if (msg.msg_controllen < sizeof(struct cmsghdr))
644 return;
645
646 #if defined(HAVE_LINUX_NETWORK)
647 if (listen->family == AF_INET)
648 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
649 if (cmptr->cmsg_level == SOL_IP && cmptr->cmsg_type == IP_PKTINFO)
650 {
651 dst_addr_4 = dst_addr.addr.addr4 = ((struct in_pktinfo *)CMSG_DATA(cmptr))->ipi_spec_dst;
652 if_index = ((struct in_pktinfo *)CMSG_DATA(cmptr))->ipi_ifindex;
653 }
654 #elif defined(IP_RECVDSTADDR) && defined(IP_RECVIF)
655 if (listen->family == AF_INET)
656 {
657 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
658 if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVDSTADDR)
659 dst_addr_4 = dst_addr.addr.addr4 = *((struct in_addr *)CMSG_DATA(cmptr));
660 else if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVIF)
661 if_index = ((struct sockaddr_dl *)CMSG_DATA(cmptr))->sdl_index;
662 }
663 #endif
664
665 #ifdef HAVE_IPV6
666 if (listen->family == AF_INET6)
667 {
668 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
669 if (cmptr->cmsg_level == IPV6_LEVEL && cmptr->cmsg_type == IPV6_PKTINFO)
670 {
671 dst_addr.addr.addr6 = ((struct in6_pktinfo *)CMSG_DATA(cmptr))->ipi6_addr;
672 if_index =((struct in6_pktinfo *)CMSG_DATA(cmptr))->ipi6_ifindex;
673 }
674 }
675 #endif
676
677 /* enforce available interface configuration */
678
679 if (!indextoname(listen->fd, if_index, ifr.ifr_name) ||
680 !iface_check(listen->family, &dst_addr, ifr.ifr_name, &if_index))
681 return;
682
683 if (listen->family == AF_INET &&
684 (daemon->options & OPT_LOCALISE) &&
685 ioctl(listen->fd, SIOCGIFNETMASK, &ifr) == -1)
686 return;
687
688 netmask = ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr;
689 }
690
691 if (extract_request(header, (size_t)n, daemon->namebuff, &type))
692 {
693 char types[20];
694
695 querystr(types, type);
696
697 if (listen->family == AF_INET)
698 log_query(F_QUERY | F_IPV4 | F_FORWARD, daemon->namebuff,
699 (struct all_addr *)&source_addr.in.sin_addr, types);
700 #ifdef HAVE_IPV6
701 else
702 log_query(F_QUERY | F_IPV6 | F_FORWARD, daemon->namebuff,
703 (struct all_addr *)&source_addr.in6.sin6_addr, types);
704 #endif
705 }
706
707 m = answer_request (header, ((char *) header) + PACKETSZ, (size_t)n,
708 dst_addr_4, netmask, now);
709 if (m >= 1)
710 {
711 send_from(listen->fd, daemon->options & OPT_NOWILD, (char *)header,
712 m, &source_addr, &dst_addr, if_index);
713 daemon->local_answer++;
714 }
715 else if (forward_query(listen->fd, &source_addr, &dst_addr, if_index,
716 header, (size_t)n, now, NULL))
717 daemon->queries_forwarded++;
718 else
719 daemon->local_answer++;
720 }
721
722 /* The daemon forks before calling this: it should deal with one connection,
723 blocking as neccessary, and then return. Note, need to be a bit careful
724 about resources for debug mode, when the fork is suppressed: that's
725 done by the caller. */
tcp_request(int confd,time_t now,struct in_addr local_addr,struct in_addr netmask)726 unsigned char *tcp_request(int confd, time_t now,
727 struct in_addr local_addr, struct in_addr netmask)
728 {
729 int size = 0;
730 size_t m;
731 unsigned short qtype, gotname;
732 unsigned char c1, c2;
733 /* Max TCP packet + slop */
734 unsigned char *packet = whine_malloc(65536 + MAXDNAME + RRFIXEDSZ);
735 HEADER *header;
736 struct server *last_server;
737
738 while (1)
739 {
740 if (!packet ||
741 !read_write(confd, &c1, 1, 1) || !read_write(confd, &c2, 1, 1) ||
742 !(size = c1 << 8 | c2) ||
743 !read_write(confd, packet, size, 1))
744 return packet;
745
746 if (size < (int)sizeof(HEADER))
747 continue;
748
749 header = (HEADER *)packet;
750
751 if ((gotname = extract_request(header, (unsigned int)size, daemon->namebuff, &qtype)))
752 {
753 union mysockaddr peer_addr;
754 socklen_t peer_len = sizeof(union mysockaddr);
755
756 if (getpeername(confd, (struct sockaddr *)&peer_addr, &peer_len) != -1)
757 {
758 char types[20];
759
760 querystr(types, qtype);
761
762 if (peer_addr.sa.sa_family == AF_INET)
763 log_query(F_QUERY | F_IPV4 | F_FORWARD, daemon->namebuff,
764 (struct all_addr *)&peer_addr.in.sin_addr, types);
765 #ifdef HAVE_IPV6
766 else
767 log_query(F_QUERY | F_IPV6 | F_FORWARD, daemon->namebuff,
768 (struct all_addr *)&peer_addr.in6.sin6_addr, types);
769 #endif
770 }
771 }
772
773 /* m > 0 if answered from cache */
774 m = answer_request(header, ((char *) header) + 65536, (unsigned int)size,
775 local_addr, netmask, now);
776
777 /* Do this by steam now we're not in the select() loop */
778 check_log_writer(NULL);
779
780 if (m == 0)
781 {
782 unsigned short flags = 0;
783 struct all_addr *addrp = NULL;
784 int type = 0;
785 char *domain = NULL;
786
787 if (gotname)
788 flags = search_servers(now, &addrp, gotname, daemon->namebuff, &type, &domain);
789
790 if (type != 0 || (daemon->options & OPT_ORDER) || !daemon->last_server)
791 last_server = daemon->servers;
792 else
793 last_server = daemon->last_server;
794
795 if (!flags && last_server)
796 {
797 struct server *firstsendto = NULL;
798 unsigned int crc = questions_crc(header, (unsigned int)size, daemon->namebuff);
799
800 /* Loop round available servers until we succeed in connecting to one.
801 Note that this code subtley ensures that consecutive queries on this connection
802 which can go to the same server, do so. */
803 while (1)
804 {
805 if (!firstsendto)
806 firstsendto = last_server;
807 else
808 {
809 if (!(last_server = last_server->next))
810 last_server = daemon->servers;
811
812 if (last_server == firstsendto)
813 break;
814 }
815
816 /* server for wrong domain */
817 if (type != (last_server->flags & SERV_TYPE) ||
818 (type == SERV_HAS_DOMAIN && !hostname_isequal(domain, last_server->domain)))
819 continue;
820
821 if ((last_server->tcpfd == -1) &&
822 (last_server->tcpfd = socket(last_server->addr.sa.sa_family, SOCK_STREAM, 0)) != -1 &&
823 (!local_bind(last_server->tcpfd, &last_server->source_addr,
824 last_server->interface, last_server->mark, 1) ||
825 connect(last_server->tcpfd, &last_server->addr.sa, sa_len(&last_server->addr)) == -1))
826 {
827 close(last_server->tcpfd);
828 last_server->tcpfd = -1;
829 }
830
831 if (last_server->tcpfd == -1)
832 continue;
833
834 c1 = size >> 8;
835 c2 = size;
836
837 if (!read_write(last_server->tcpfd, &c1, 1, 0) ||
838 !read_write(last_server->tcpfd, &c2, 1, 0) ||
839 !read_write(last_server->tcpfd, packet, size, 0) ||
840 !read_write(last_server->tcpfd, &c1, 1, 1) ||
841 !read_write(last_server->tcpfd, &c2, 1, 1))
842 {
843 close(last_server->tcpfd);
844 last_server->tcpfd = -1;
845 continue;
846 }
847
848 m = (c1 << 8) | c2;
849 if (!read_write(last_server->tcpfd, packet, m, 1))
850 return packet;
851
852 if (!gotname)
853 strcpy(daemon->namebuff, "query");
854 if (last_server->addr.sa.sa_family == AF_INET)
855 log_query(F_SERVER | F_IPV4 | F_FORWARD, daemon->namebuff,
856 (struct all_addr *)&last_server->addr.in.sin_addr, NULL);
857 #ifdef HAVE_IPV6
858 else
859 log_query(F_SERVER | F_IPV6 | F_FORWARD, daemon->namebuff,
860 (struct all_addr *)&last_server->addr.in6.sin6_addr, NULL);
861 #endif
862
863 /* There's no point in updating the cache, since this process will exit and
864 lose the information after a few queries. We make this call for the alias and
865 bogus-nxdomain side-effects. */
866 /* If the crc of the question section doesn't match the crc we sent, then
867 someone might be attempting to insert bogus values into the cache by
868 sending replies containing questions and bogus answers. */
869 if (crc == questions_crc(header, (unsigned int)m, daemon->namebuff))
870 m = process_reply(header, now, last_server, (unsigned int)m);
871
872 break;
873 }
874 }
875
876 /* In case of local answer or no connections made. */
877 if (m == 0)
878 m = setup_reply(header, (unsigned int)size, addrp, flags, daemon->local_ttl);
879 }
880
881 check_log_writer(NULL);
882
883 c1 = m>>8;
884 c2 = m;
885 if (!read_write(confd, &c1, 1, 0) ||
886 !read_write(confd, &c2, 1, 0) ||
887 !read_write(confd, packet, m, 0))
888 return packet;
889 }
890 }
891
allocate_frec(time_t now)892 static struct frec *allocate_frec(time_t now)
893 {
894 struct frec *f;
895
896 if ((f = (struct frec *)whine_malloc(sizeof(struct frec))))
897 {
898 f->next = daemon->frec_list;
899 f->time = now;
900 f->sentto = NULL;
901 f->rfd4 = NULL;
902 #ifdef HAVE_IPV6
903 f->rfd6 = NULL;
904 #endif
905 daemon->frec_list = f;
906 }
907
908 return f;
909 }
910
allocate_rfd(int family)911 static struct randfd *allocate_rfd(int family)
912 {
913 static int finger = 0;
914 int i;
915
916 /* limit the number of sockets we have open to avoid starvation of
917 (eg) TFTP. Once we have a reasonable number, randomness should be OK */
918
919 for (i = 0; i < RANDOM_SOCKS; i++)
920 if (daemon->randomsocks[i].refcount == 0)
921 {
922 if ((daemon->randomsocks[i].fd = random_sock(family)) == -1)
923 break;
924
925 daemon->randomsocks[i].refcount = 1;
926 daemon->randomsocks[i].family = family;
927 return &daemon->randomsocks[i];
928 }
929
930 /* No free ones or cannot get new socket, grab an existing one */
931 for (i = 0; i < RANDOM_SOCKS; i++)
932 {
933 int j = (i+finger) % RANDOM_SOCKS;
934 if (daemon->randomsocks[j].refcount != 0 &&
935 daemon->randomsocks[j].family == family &&
936 daemon->randomsocks[j].refcount != 0xffff)
937 {
938 finger = j;
939 daemon->randomsocks[j].refcount++;
940 return &daemon->randomsocks[j];
941 }
942 }
943
944 return NULL; /* doom */
945 }
946
free_frec(struct frec * f)947 static void free_frec(struct frec *f)
948 {
949 if (f->rfd4 && --(f->rfd4->refcount) == 0)
950 close(f->rfd4->fd);
951
952 f->rfd4 = NULL;
953 f->sentto = NULL;
954
955 #ifdef HAVE_IPV6
956 if (f->rfd6 && --(f->rfd6->refcount) == 0)
957 close(f->rfd6->fd);
958
959 f->rfd6 = NULL;
960 #endif
961 }
962
963 /* if wait==NULL return a free or older than TIMEOUT record.
964 else return *wait zero if one available, or *wait is delay to
965 when the oldest in-use record will expire. Impose an absolute
966 limit of 4*TIMEOUT before we wipe things (for random sockets) */
get_new_frec(time_t now,int * wait)967 struct frec *get_new_frec(time_t now, int *wait)
968 {
969 struct frec *f, *oldest, *target;
970 int count;
971
972 if (wait)
973 *wait = 0;
974
975 for (f = daemon->frec_list, oldest = NULL, target = NULL, count = 0; f; f = f->next, count++)
976 if (!f->sentto)
977 target = f;
978 else
979 {
980 if (difftime(now, f->time) >= 4*TIMEOUT)
981 {
982 free_frec(f);
983 target = f;
984 }
985
986 if (!oldest || difftime(f->time, oldest->time) <= 0)
987 oldest = f;
988 }
989
990 if (target)
991 {
992 target->time = now;
993 return target;
994 }
995
996 /* can't find empty one, use oldest if there is one
997 and it's older than timeout */
998 if (oldest && ((int)difftime(now, oldest->time)) >= TIMEOUT)
999 {
1000 /* keep stuff for twice timeout if we can by allocating a new
1001 record instead */
1002 if (difftime(now, oldest->time) < 2*TIMEOUT &&
1003 count <= daemon->ftabsize &&
1004 (f = allocate_frec(now)))
1005 return f;
1006
1007 if (!wait)
1008 {
1009 free_frec(oldest);
1010 oldest->time = now;
1011 }
1012 return oldest;
1013 }
1014
1015 /* none available, calculate time 'till oldest record expires */
1016 if (count > daemon->ftabsize)
1017 {
1018 if (oldest && wait)
1019 *wait = oldest->time + (time_t)TIMEOUT - now;
1020 return NULL;
1021 }
1022
1023 if (!(f = allocate_frec(now)) && wait)
1024 /* wait one second on malloc failure */
1025 *wait = 1;
1026
1027 return f; /* OK if malloc fails and this is NULL */
1028 }
1029
1030 /* crc is all-ones if not known. */
lookup_frec(unsigned short id,unsigned int crc)1031 static struct frec *lookup_frec(unsigned short id, unsigned int crc)
1032 {
1033 struct frec *f;
1034
1035 for(f = daemon->frec_list; f; f = f->next)
1036 if (f->sentto && f->new_id == id &&
1037 (f->crc == crc || crc == 0xffffffff))
1038 return f;
1039
1040 return NULL;
1041 }
1042
lookup_frec_by_sender(unsigned short id,union mysockaddr * addr,unsigned int crc)1043 static struct frec *lookup_frec_by_sender(unsigned short id,
1044 union mysockaddr *addr,
1045 unsigned int crc)
1046 {
1047 struct frec *f;
1048
1049 for(f = daemon->frec_list; f; f = f->next)
1050 if (f->sentto &&
1051 f->orig_id == id &&
1052 f->crc == crc &&
1053 sockaddr_isequal(&f->source, addr))
1054 return f;
1055
1056 return NULL;
1057 }
1058
1059 /* A server record is going away, remove references to it */
server_gone(struct server * server)1060 void server_gone(struct server *server)
1061 {
1062 struct frec *f;
1063
1064 for (f = daemon->frec_list; f; f = f->next)
1065 if (f->sentto && f->sentto == server)
1066 free_frec(f);
1067
1068 if (daemon->last_server == server)
1069 daemon->last_server = NULL;
1070
1071 if (daemon->srv_save == server)
1072 daemon->srv_save = NULL;
1073 }
1074
1075 /* return unique random ids.
1076 For signed packets we can't change the ID without breaking the
1077 signing, so we keep the same one. In this case force is set, and this
1078 routine degenerates into killing any conflicting forward record. */
get_id(int force,unsigned short force_id,unsigned int crc)1079 static unsigned short get_id(int force, unsigned short force_id, unsigned int crc)
1080 {
1081 unsigned short ret = 0;
1082
1083 if (force)
1084 {
1085 struct frec *f = lookup_frec(force_id, crc);
1086 if (f)
1087 free_frec(f); /* free */
1088 ret = force_id;
1089 }
1090 else do
1091 ret = rand16();
1092 while (lookup_frec(ret, crc));
1093
1094 return ret;
1095 }
1096
1097
1098
1099
1100
1101