2009-08-16 12:30:26 +00:00
/*
2014-06-01 06:46:42 +00:00
* Copyright ( c ) 2006 - 2014 Erik Ekman < yarrick @ kryo . se > ,
* 2006 - 2009 Bjorn Andersson < flex @ kryo . se >
2009-08-16 12:30:26 +00:00
*
2014-08-07 19:14:10 +00:00
* Permission to use , copy , modify , and / or distribute this software for any
2009-08-16 12:30:26 +00:00
* purpose with or without fee is hereby granted , provided that the above
* copyright notice and this permission notice appear in all copies .
*
* THE SOFTWARE IS PROVIDED " AS IS " AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS . IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL , DIRECT , INDIRECT , OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE , DATA OR PROFITS , WHETHER IN AN
* ACTION OF CONTRACT , NEGLIGENCE OR OTHER TORTIOUS ACTION , ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE .
*/
2009-09-20 15:11:14 +00:00
# include <ctype.h>
2009-08-16 12:30:26 +00:00
# include <stdio.h>
# include <stdint.h>
# include <stdlib.h>
# include <string.h>
2014-05-29 16:37:40 +00:00
# include <strings.h>
2009-08-16 12:30:26 +00:00
# include <signal.h>
# include <unistd.h>
# include <sys/param.h>
# include <sys/time.h>
# include <fcntl.h>
# include <zlib.h>
# include <time.h>
# ifdef WINDOWS32
# include "windows.h"
# else
2015-08-05 17:33:50 +00:00
# include <arpa/nameser.h>
2011-04-23 18:55:59 +00:00
# ifdef ANDROID
# include "android_dns.h"
# endif
2009-08-16 12:30:26 +00:00
# ifdef DARWIN
2009-09-19 08:32:57 +00:00
# define BIND_8_COMPAT
# include <arpa/nameser_compat.h>
2009-08-16 12:30:26 +00:00
# endif
# include <grp.h>
# include <pwd.h>
# include <netdb.h>
# endif
# include "common.h"
# include "encoding.h"
# include "dns.h"
# include "login.h"
# include "tun.h"
# include "version.h"
# include "client.h"
2009-09-20 21:10:44 +00:00
static void handshake_lazyoff ( int dns_fd ) ;
2009-08-16 12:30:26 +00:00
static int running ;
static const char * password ;
2014-02-05 21:36:53 +00:00
static struct sockaddr_storage nameserv ;
2014-06-16 20:26:01 +00:00
static int nameserv_len ;
2015-06-28 20:41:54 +00:00
static struct sockaddr_storage raw_serv ;
static int raw_serv_len ;
2009-08-16 12:30:26 +00:00
static const char * topdomain ;
static uint16_t rand_seed ;
/* Current up/downstream IP packet */
static struct packet outpkt ;
static struct packet inpkt ;
2009-09-20 21:10:44 +00:00
int outchunkresent = 0 ;
2009-08-16 12:30:26 +00:00
/* My userid at the server */
static char userid ;
2009-12-29 20:00:57 +00:00
static char userid_char ; /* used when sending (lowercase) */
static char userid_char2 ; /* also accepted when receiving (uppercase) */
2009-08-16 12:30:26 +00:00
/* DNS id for next packet */
static uint16_t chunkid ;
2009-09-20 21:10:44 +00:00
static uint16_t chunkid_prev ;
static uint16_t chunkid_prev2 ;
2009-08-16 12:30:26 +00:00
/* The encoder used for data packets
* Defaults to Base32 , can be changed after handshake */
2017-03-11 23:04:26 +00:00
const static struct encoder * dataenc = & base32_ops ;
2014-06-01 06:34:18 +00:00
2009-09-20 15:11:14 +00:00
/* The encoder to use for downstream data */
static char downenc = ' ' ;
2014-06-01 06:34:18 +00:00
2009-09-20 15:11:14 +00:00
/* set query type to send */
2009-12-29 20:00:57 +00:00
static unsigned short do_qtype = T_UNSET ;
2009-08-16 12:30:26 +00:00
/* My connection mode */
static enum connection conn ;
2009-12-29 20:00:57 +00:00
static int selecttimeout ; /* RFC says timeout minimum 5sec */
static int lazymode ;
static long send_ping_soon ;
static time_t lastdownstreamtime ;
static long send_query_sendcnt = - 1 ;
static long send_query_recvcnt = 0 ;
static int hostname_maxlen = 0xFF ;
2009-09-20 21:10:44 +00:00
2009-08-16 12:30:26 +00:00
void
client_init ( )
{
running = 1 ;
2009-09-20 15:11:14 +00:00
rand_seed = ( ( unsigned int ) rand ( ) ) & 0xFFFF ;
2009-09-20 21:10:44 +00:00
send_ping_soon = 1 ; /* send ping immediately after startup */
2009-08-16 12:30:26 +00:00
conn = CONN_DNS_NULL ;
2009-09-20 21:10:44 +00:00
chunkid = ( ( unsigned int ) rand ( ) ) & 0xFFFF ;
chunkid_prev = 0 ;
chunkid_prev2 = 0 ;
outpkt . len = 0 ;
outpkt . seqno = 0 ;
outpkt . fragment = 0 ;
outchunkresent = 0 ;
inpkt . len = 0 ;
inpkt . seqno = 0 ;
inpkt . fragment = 0 ;
2009-08-16 12:30:26 +00:00
}
void
client_stop ( )
{
running = 0 ;
}
enum connection
client_get_conn ( )
{
return conn ;
}
void
2014-02-05 21:36:53 +00:00
client_set_nameserver ( struct sockaddr_storage * addr , int addrlen )
2009-08-16 12:30:26 +00:00
{
2014-02-05 21:36:53 +00:00
memcpy ( & nameserv , addr , addrlen ) ;
2014-06-16 20:26:01 +00:00
nameserv_len = addrlen ;
2009-08-16 12:30:26 +00:00
}
void
client_set_topdomain ( const char * cp )
{
topdomain = cp ;
}
void
client_set_password ( const char * cp )
{
password = cp ;
}
2014-06-09 16:55:27 +00:00
int
2014-06-09 16:11:16 +00:00
client_set_qtype ( char * qtype )
2009-09-20 15:11:14 +00:00
{
if ( ! strcasecmp ( qtype , " NULL " ) )
2020-08-01 15:19:37 +00:00
do_qtype = T_NULL ;
2014-06-09 18:05:29 +00:00
else if ( ! strcasecmp ( qtype , " PRIVATE " ) )
do_qtype = T_PRIVATE ;
2009-09-20 15:11:14 +00:00
else if ( ! strcasecmp ( qtype , " CNAME " ) )
do_qtype = T_CNAME ;
else if ( ! strcasecmp ( qtype , " A " ) )
do_qtype = T_A ;
else if ( ! strcasecmp ( qtype , " MX " ) )
do_qtype = T_MX ;
2009-12-29 20:00:57 +00:00
else if ( ! strcasecmp ( qtype , " SRV " ) )
do_qtype = T_SRV ;
2009-09-20 15:11:14 +00:00
else if ( ! strcasecmp ( qtype , " TXT " ) )
do_qtype = T_TXT ;
2014-06-09 16:55:27 +00:00
return ( do_qtype = = T_UNSET ) ;
2009-09-20 15:11:14 +00:00
}
2009-12-29 20:00:57 +00:00
char *
2014-06-09 16:11:16 +00:00
client_get_qtype ( )
2009-12-29 20:00:57 +00:00
{
char * c = " UNDEFINED " ;
if ( do_qtype = = T_NULL ) c = " NULL " ;
2014-06-09 18:05:29 +00:00
else if ( do_qtype = = T_PRIVATE ) c = " PRIVATE " ;
2009-12-29 20:00:57 +00:00
else if ( do_qtype = = T_CNAME ) c = " CNAME " ;
else if ( do_qtype = = T_A ) c = " A " ;
else if ( do_qtype = = T_MX ) c = " MX " ;
else if ( do_qtype = = T_SRV ) c = " SRV " ;
else if ( do_qtype = = T_TXT ) c = " TXT " ;
return c ;
}
2009-09-20 15:11:14 +00:00
void
2014-06-09 16:11:16 +00:00
client_set_downenc ( char * encoding )
2009-09-20 15:11:14 +00:00
{
if ( ! strcasecmp ( encoding , " base32 " ) )
downenc = ' T ' ;
else if ( ! strcasecmp ( encoding , " base64 " ) )
downenc = ' S ' ;
2009-12-29 20:00:57 +00:00
else if ( ! strcasecmp ( encoding , " base64u " ) )
downenc = ' U ' ;
else if ( ! strcasecmp ( encoding , " base128 " ) )
downenc = ' V ' ;
2009-09-20 15:11:14 +00:00
else if ( ! strcasecmp ( encoding , " raw " ) )
downenc = ' R ' ;
}
2014-06-01 06:34:18 +00:00
void
2009-09-20 21:10:44 +00:00
client_set_selecttimeout ( int select_timeout )
{
selecttimeout = select_timeout ;
}
void
2009-09-20 21:10:46 +00:00
client_set_lazymode ( int lazy_mode )
{
lazymode = lazy_mode ;
2009-09-20 21:10:44 +00:00
}
2009-12-29 20:00:57 +00:00
void
client_set_hostname_maxlen ( int i )
{
if ( i < = 0xFF )
hostname_maxlen = i ;
}
2009-08-16 12:30:26 +00:00
const char *
client_get_raw_addr ( )
{
2015-06-28 20:41:54 +00:00
return format_addr ( & raw_serv , raw_serv_len ) ;
2009-08-16 12:30:26 +00:00
}
static void
send_query ( int fd , char * hostname )
{
char packet [ 4096 ] ;
struct query q ;
size_t len ;
2009-09-20 21:10:44 +00:00
chunkid_prev2 = chunkid_prev ;
chunkid_prev = chunkid ;
2009-09-20 15:11:14 +00:00
chunkid + = 7727 ;
if ( chunkid = = 0 )
/* 0 is used as "no-query" in iodined.c */
chunkid = 7727 ;
q . id = chunkid ;
q . type = do_qtype ;
2009-08-16 12:30:26 +00:00
len = dns_encode ( packet , sizeof ( packet ) , & q , QR_QUERY , hostname , strlen ( hostname ) ) ;
2009-09-20 15:11:14 +00:00
if ( len < 1 ) {
warnx ( " dns_encode doesn't fit " ) ;
return ;
}
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
#if 0
fprintf ( stderr , " Sendquery: id %5d name[0] '%c' \n " , q . id , hostname [ 0 ] ) ;
# endif
2014-06-16 20:26:01 +00:00
sendto ( fd , packet , len , 0 , ( struct sockaddr * ) & nameserv , nameserv_len ) ;
2009-12-29 20:00:57 +00:00
/* There are DNS relays that time out quickly but don't send anything
back on timeout .
And there are relays where , in lazy mode , our new query apparently
_replaces_ our previous query , and we get no answers at all in
lazy mode while legacy immediate - ping - pong works just fine .
Here we detect and fix these situations .
( Can ' t very well do this anywhere else ; this is the only place
we ' ll reliably get to in such situations . )
*/
if ( send_query_sendcnt > = 0 & & send_query_sendcnt < 100 & & lazymode ) {
send_query_sendcnt + + ;
if ( ( send_query_sendcnt > 6 & & send_query_recvcnt < = 0 ) | |
( send_query_sendcnt > 10 & &
4 * send_query_recvcnt < send_query_sendcnt ) ) {
if ( selecttimeout > 1 ) {
warnx ( " Receiving too few answers. Setting interval to 1 (-I1) " ) ;
selecttimeout = 1 ;
/* restart counting */
send_query_sendcnt = 0 ;
send_query_recvcnt = 0 ;
} else if ( lazymode ) {
warnx ( " Receiving too few answers. Will try to switch lazy mode off, but that may not always work any more. Start with -L0 next time on this network. " ) ;
lazymode = 0 ;
selecttimeout = 1 ;
handshake_lazyoff ( fd ) ;
}
}
}
2009-08-16 12:30:26 +00:00
}
static void
2020-07-24 19:17:18 +00:00
send_raw ( int fd , char * buf , int buflen , int cmd )
2009-08-16 12:30:26 +00:00
{
char packet [ 4096 ] ;
int len ;
len = MIN ( sizeof ( packet ) - RAW_HDR_LEN , buflen ) ;
memcpy ( packet , raw_header , RAW_HDR_LEN ) ;
if ( len ) {
memcpy ( & packet [ RAW_HDR_LEN ] , buf , len ) ;
}
len + = RAW_HDR_LEN ;
2020-07-24 19:17:18 +00:00
packet [ RAW_HDR_CMD ] = cmd | ( userid & 0x0F ) ;
2009-08-16 12:30:26 +00:00
sendto ( fd , packet , len , 0 , ( struct sockaddr * ) & raw_serv , sizeof ( raw_serv ) ) ;
}
static void
send_raw_data ( int dns_fd )
{
2020-07-24 19:17:18 +00:00
send_raw ( dns_fd , outpkt . data , outpkt . len , RAW_HDR_CMD_DATA ) ;
2009-09-20 21:10:44 +00:00
outpkt . len = 0 ;
2009-08-16 12:30:26 +00:00
}
static void
send_packet ( int fd , char cmd , const char * data , const size_t datalen )
{
char buf [ 4096 ] ;
buf [ 0 ] = cmd ;
2014-06-01 06:34:18 +00:00
2009-12-29 20:00:57 +00:00
build_hostname ( buf + 1 , sizeof ( buf ) - 1 , data , datalen , topdomain ,
2017-03-11 23:04:26 +00:00
& base32_ops , hostname_maxlen ) ;
2009-08-16 12:30:26 +00:00
send_query ( fd , buf ) ;
}
2017-03-11 10:36:54 +00:00
static inline int is_sending ( void )
2009-08-16 12:30:26 +00:00
{
return ( outpkt . len ! = 0 ) ;
}
static void
send_chunk ( int fd )
{
char buf [ 4096 ] ;
int avail ;
int code ;
char * p ;
2009-12-29 20:00:57 +00:00
static int datacmc = 0 ;
char * datacmcchars = " abcdefghijklmnopqrstuvwxyz0123456789 " ;
2009-08-16 12:30:26 +00:00
p = outpkt . data ;
p + = outpkt . offset ;
avail = outpkt . len - outpkt . offset ;
2009-12-29 20:00:57 +00:00
/* Note: must be same, or smaller than send_fragsize_probe() */
outpkt . sentlen = build_hostname ( buf + 5 , sizeof ( buf ) - 5 , p , avail ,
topdomain , dataenc , hostname_maxlen ) ;
2009-08-16 12:30:26 +00:00
/* Build upstream data header (see doc/proto_xxxxxxxx.txt) */
2009-09-20 21:10:44 +00:00
buf [ 0 ] = userid_char ; /* First byte is hex userid */
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
code = ( ( outpkt . seqno & 7 ) < < 2 ) | ( ( outpkt . fragment & 15 ) > > 2 ) ;
buf [ 1 ] = b32_5to8 ( code ) ; /* Second byte is 3 bits seqno, 2 upper bits fragment count */
2009-09-20 21:10:44 +00:00
code = ( ( outpkt . fragment & 3 ) < < 3 ) | ( inpkt . seqno & 7 ) ;
2009-08-16 12:30:26 +00:00
buf [ 2 ] = b32_5to8 ( code ) ; /* Third byte is 2 bits lower fragment count, 3 bits downstream packet seqno */
2009-09-20 21:10:44 +00:00
code = ( ( inpkt . fragment & 15 ) < < 1 ) | ( outpkt . sentlen = = avail ) ;
2009-08-16 12:30:26 +00:00
buf [ 3 ] = b32_5to8 ( code ) ; /* Fourth byte is 4 bits downstream fragment count, 1 bit last frag flag */
2009-12-29 20:00:57 +00:00
buf [ 4 ] = datacmcchars [ datacmc ] ; /* Fifth byte is data-CMC */
datacmc + + ;
if ( datacmc > = 36 )
datacmc = 0 ;
2014-06-01 06:34:18 +00:00
2009-09-20 21:10:44 +00:00
#if 0
fprintf ( stderr , " Send: down %d/%d up %d/%d, %d bytes \n " ,
inpkt . seqno , inpkt . fragment , outpkt . seqno , outpkt . fragment ,
outpkt . sentlen ) ;
# endif
2009-08-16 12:30:26 +00:00
send_query ( fd , buf ) ;
}
static void
send_ping ( int fd )
{
if ( conn = = CONN_DNS_NULL ) {
char data [ 4 ] ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
data [ 0 ] = userid ;
2009-09-20 21:10:44 +00:00
data [ 1 ] = ( ( inpkt . seqno & 7 ) < < 4 ) | ( inpkt . fragment & 15 ) ;
2009-08-16 12:30:26 +00:00
data [ 2 ] = ( rand_seed > > 8 ) & 0xff ;
data [ 3 ] = ( rand_seed > > 0 ) & 0xff ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
rand_seed + + ;
2009-09-20 21:10:44 +00:00
#if 0
fprintf ( stderr , " Send: down %d/%d (ping) \n " ,
inpkt . seqno , inpkt . fragment ) ;
# endif
2009-09-20 15:11:14 +00:00
send_packet ( fd , ' p ' , data , sizeof ( data ) ) ;
2009-08-16 12:30:26 +00:00
} else {
2020-07-24 19:17:18 +00:00
send_raw ( fd , NULL , 0 , RAW_HDR_CMD_PING ) ;
2009-08-16 12:30:26 +00:00
}
}
2009-09-21 20:06:30 +00:00
static void
2009-12-29 20:00:57 +00:00
write_dns_error ( struct query * q , int ignore_some_errors )
/* This is called from:
1. handshake_waitdns ( ) when already checked that reply fits to our
latest query .
2. tunnel_dns ( ) when already checked that reply is for our ping or data
packet , but not necessarily the most recent ( SERVFAIL mostly comes
after long delay ) .
So ignorable errors are never printed .
*/
2009-09-21 20:06:30 +00:00
{
if ( ! q ) return ;
switch ( q - > rcode ) {
case NOERROR : /* 0 */
2009-12-29 20:00:57 +00:00
if ( ! ignore_some_errors )
warnx ( " Got reply without error, but also without question and/or answer " ) ;
2009-09-21 20:06:30 +00:00
break ;
case FORMERR : /* 1 */
warnx ( " Got FORMERR as reply: server does not understand our request " ) ;
break ;
case SERVFAIL : /* 2 */
2009-12-29 20:00:57 +00:00
if ( ! ignore_some_errors )
warnx ( " Got SERVFAIL as reply: server failed or recursion timeout " ) ;
2009-09-21 20:06:30 +00:00
break ;
case NXDOMAIN : /* 3 */
warnx ( " Got NXDOMAIN as reply: domain does not exist " ) ;
break ;
case NOTIMP : /* 4 */
warnx ( " Got NOTIMP as reply: server does not support our request " ) ;
break ;
case REFUSED : /* 5 */
warnx ( " Got REFUSED as reply " ) ;
break ;
default :
warnx ( " Got RCODE %u as reply " , q - > rcode ) ;
break ;
}
}
2009-08-16 12:30:26 +00:00
static int
2009-12-29 20:00:57 +00:00
dns_namedec ( char * outdata , int outdatalen , char * buf , int buflen )
/* Decodes *buf to *outdata.
* * buf WILL be changed by undotify .
* Note : buflen must be _exactly_ strlen ( buf ) before undotifying .
* ( undotify of reduced - len won ' t copy \ 0 , base - X decode will decode too much . )
* Returns # bytes usefully filled in outdata .
*/
{
size_t outdatalenu = outdatalen ;
switch ( buf [ 0 ] ) {
case ' h ' : /* Hostname with base32 */
case ' H ' :
/* Need 1 byte H, 3 bytes ".xy", >=1 byte data */
if ( buflen < 5 )
return 0 ;
/* this also does undotify */
return unpack_data ( outdata , outdatalen , buf + 1 , buflen - 4 ,
2017-03-11 23:04:26 +00:00
& base32_ops ) ;
2009-12-29 20:00:57 +00:00
case ' i ' : /* Hostname++ with base64 */
case ' I ' :
/* Need 1 byte I, 3 bytes ".xy", >=1 byte data */
if ( buflen < 5 )
return 0 ;
/* this also does undotify */
return unpack_data ( outdata , outdatalen , buf + 1 , buflen - 4 ,
2017-03-11 23:04:26 +00:00
& base64_ops ) ;
2009-12-29 20:00:57 +00:00
case ' j ' : /* Hostname++ with base64u */
case ' J ' :
/* Need 1 byte J, 3 bytes ".xy", >=1 byte data */
if ( buflen < 5 )
return 0 ;
/* this also does undotify */
return unpack_data ( outdata , outdatalen , buf + 1 , buflen - 4 ,
2017-03-11 23:04:26 +00:00
& base64u_ops ) ;
2009-12-29 20:00:57 +00:00
case ' k ' : /* Hostname++ with base128 */
case ' K ' :
/* Need 1 byte J, 3 bytes ".xy", >=1 byte data */
if ( buflen < 5 )
return 0 ;
/* this also does undotify */
return unpack_data ( outdata , outdatalen , buf + 1 , buflen - 4 ,
2017-03-11 23:04:26 +00:00
& base128_ops ) ;
2009-12-29 20:00:57 +00:00
case ' t ' : /* plain base32(Thirty-two) from TXT */
case ' T ' :
if ( buflen < 2 )
return 0 ;
2017-03-11 23:04:26 +00:00
return base32_ops . decode ( outdata , & outdatalenu , buf + 1 , buflen - 1 ) ;
2009-12-29 20:00:57 +00:00
case ' s ' : /* plain base64(Sixty-four) from TXT */
case ' S ' :
if ( buflen < 2 )
return 0 ;
2017-03-11 23:04:26 +00:00
return base64_ops . decode ( outdata , & outdatalenu , buf + 1 , buflen - 1 ) ;
2009-12-29 20:00:57 +00:00
case ' u ' : /* plain base64u (Underscore) from TXT */
case ' U ' :
if ( buflen < 2 )
return 0 ;
2017-03-11 23:04:26 +00:00
return base64_ops . decode ( outdata , & outdatalenu , buf + 1 , buflen - 1 ) ;
2009-12-29 20:00:57 +00:00
case ' v ' : /* plain base128 from TXT */
case ' V ' :
if ( buflen < 2 )
return 0 ;
2017-03-11 23:04:26 +00:00
return base128_ops . decode ( outdata , & outdatalenu , buf + 1 , buflen - 1 ) ;
2009-12-29 20:00:57 +00:00
case ' r ' : /* Raw binary from TXT */
case ' R ' :
/* buflen>=1 already checked */
buflen - - ;
buflen = MIN ( buflen , outdatalen ) ;
memcpy ( outdata , buf + 1 , buflen ) ;
return buflen ;
default :
warnx ( " Received unsupported encoding " ) ;
return 0 ;
}
/* notreached */
return 0 ;
}
static int
read_dns_withq ( int dns_fd , int tun_fd , char * buf , int buflen , struct query * q )
/* FIXME: tun_fd needed for raw handling */
/* Returns -1 on receive error or decode error, including DNS error replies.
Returns 0 on replies that could be correct but are useless , and are not
DNS error replies .
Returns > 0 on correct replies ; value is # valid bytes in * buf .
*/
2009-08-16 12:30:26 +00:00
{
2014-02-05 21:36:53 +00:00
struct sockaddr_storage from ;
2009-08-16 12:30:26 +00:00
char data [ 64 * 1024 ] ;
socklen_t addrlen ;
int r ;
2014-02-05 21:36:53 +00:00
addrlen = sizeof ( from ) ;
2014-06-01 06:34:18 +00:00
if ( ( r = recvfrom ( dns_fd , data , sizeof ( data ) , 0 ,
2009-09-20 21:10:44 +00:00
( struct sockaddr * ) & from , & addrlen ) ) < 0 ) {
2009-08-16 12:30:26 +00:00
warn ( " recvfrom " ) ;
2009-09-20 21:10:44 +00:00
return - 1 ;
2009-08-16 12:30:26 +00:00
}
if ( conn = = CONN_DNS_NULL ) {
int rv ;
2009-09-20 21:10:44 +00:00
if ( r < = 0 )
/* useless packet */
return 0 ;
2009-08-16 12:30:26 +00:00
2009-09-20 21:10:44 +00:00
rv = dns_decode ( buf , buflen , q , QR_ANSWER , data , r ) ;
if ( rv < = 0 )
return rv ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
if ( q - > type = = T_CNAME | | q - > type = = T_TXT )
/* CNAME can also be returned from an A question */
2009-09-20 15:11:14 +00:00
{
/*
* buf is a hostname or txt stream that we still need to
* decode to binary
2014-06-01 06:34:18 +00:00
*
2009-09-20 15:11:14 +00:00
* also update rv with the number of valid bytes
2014-06-01 06:34:18 +00:00
*
2009-09-20 15:11:14 +00:00
* data is unused here , and will certainly hold the smaller binary
*/
2009-12-29 20:00:57 +00:00
rv = dns_namedec ( data , sizeof ( data ) , buf , rv ) ;
2009-09-20 15:11:14 +00:00
2009-12-29 20:00:57 +00:00
rv = MIN ( rv , buflen ) ;
if ( rv > 0 )
2009-09-20 15:11:14 +00:00
memcpy ( buf , data , rv ) ;
2009-12-29 20:00:57 +00:00
} else if ( q - > type = = T_MX | | q - > type = = T_SRV ) {
/* buf is like "Hname.com\0Hanother.com\0\0" */
int buftotal = rv ; /* idx of last \0 */
int bufoffset = 0 ;
int dataoffset = 0 ;
int thispartlen , dataspace , datanew ;
while ( 1 ) {
thispartlen = strlen ( buf ) ;
thispartlen = MIN ( thispartlen , buftotal - bufoffset ) ;
dataspace = sizeof ( data ) - dataoffset ;
if ( thispartlen < = 0 | | dataspace < = 0 )
2009-09-20 15:11:14 +00:00
break ;
2009-12-29 20:00:57 +00:00
datanew = dns_namedec ( data + dataoffset , dataspace ,
buf + bufoffset , thispartlen ) ;
if ( datanew < = 0 )
2009-09-20 15:11:14 +00:00
break ;
2009-12-29 20:00:57 +00:00
bufoffset + = thispartlen + 1 ;
dataoffset + = datanew ;
2009-09-20 15:11:14 +00:00
}
2009-12-29 20:00:57 +00:00
rv = dataoffset ;
rv = MIN ( rv , buflen ) ;
if ( rv > 0 )
memcpy ( buf , data , rv ) ;
2009-09-20 15:11:14 +00:00
}
2009-08-16 12:30:26 +00:00
return rv ;
} else { /* CONN_RAW_UDP */
unsigned long datalen ;
char buf [ 64 * 1024 ] ;
/* minimum length */
if ( r < RAW_HDR_LEN ) return 0 ;
/* should start with header */
if ( memcmp ( data , raw_header , RAW_HDR_IDENT_LEN ) ) return 0 ;
/* should be my user id */
if ( RAW_HDR_GET_USR ( data ) ! = userid ) return 0 ;
2009-12-29 20:00:57 +00:00
if ( RAW_HDR_GET_CMD ( data ) = = RAW_HDR_CMD_DATA | |
RAW_HDR_GET_CMD ( data ) = = RAW_HDR_CMD_PING )
lastdownstreamtime = time ( NULL ) ;
/* should be data packet */
if ( RAW_HDR_GET_CMD ( data ) ! = RAW_HDR_CMD_DATA ) return 0 ;
2009-08-16 12:30:26 +00:00
r - = RAW_HDR_LEN ;
datalen = sizeof ( buf ) ;
if ( uncompress ( ( uint8_t * ) buf , & datalen , ( uint8_t * ) & data [ RAW_HDR_LEN ] , r ) = = Z_OK ) {
write_tun ( tun_fd , buf , datalen ) ;
}
2009-12-29 20:00:57 +00:00
/* don't process any further */
2009-08-16 12:30:26 +00:00
return 0 ;
}
}
2009-12-29 20:00:57 +00:00
static int
handshake_waitdns ( int dns_fd , char * buf , int buflen , char c1 , char c2 , int timeout )
/* Wait for DNS reply fitting to our latest query and returns it.
Returns length of reply = # bytes used in buf .
Returns 0 if fitting reply happens to be useless .
Returns - 2 on ( at least ) DNS error that fits to our latest query ,
error message already printed .
Returns - 3 on timeout ( given in seconds ) .
Returns - 1 on other errors .
Timeout is restarted when " wrong " ( previous / delayed ) replies are received ,
so effective timeout may be longer than specified .
2009-09-20 21:10:44 +00:00
*/
{
struct query q ;
2009-12-29 20:00:57 +00:00
int r , rv ;
fd_set fds ;
struct timeval tv ;
while ( 1 ) {
tv . tv_sec = timeout ;
tv . tv_usec = 0 ;
FD_ZERO ( & fds ) ;
FD_SET ( dns_fd , & fds ) ;
r = select ( dns_fd + 1 , & fds , NULL , NULL , & tv ) ;
2009-09-20 21:10:44 +00:00
2009-12-29 20:00:57 +00:00
if ( r < 0 )
return - 1 ; /* select error */
if ( r = = 0 )
return - 3 ; /* select timeout */
2009-09-20 21:10:44 +00:00
2009-12-29 20:00:57 +00:00
q . id = 0 ;
q . name [ 0 ] = ' \0 ' ;
rv = read_dns_withq ( dns_fd , 0 , buf , buflen , & q ) ;
if ( q . id ! = chunkid | | ( q . name [ 0 ] ! = c1 & & q . name [ 0 ] ! = c2 ) ) {
#if 0
fprintf ( stderr , " Ignoring unfitting reply id %d starting with '%c' \n " , q . id , q . name [ 0 ] ) ;
# endif
continue ;
}
/* if still here: reply matches our latest query */
/* Non-recursive DNS servers (such as [a-m].root-servers.net)
return no answer , but only additional and authority records .
Can ' t explicitly test for that here , just assume that
NOERROR is such situation . Only trigger on the very first
requests ( Y or V , depending if - T given ) .
*/
if ( rv < 0 & & q . rcode = = NOERROR & &
( q . name [ 0 ] = = ' Y ' | | q . name [ 0 ] = = ' y ' | |
q . name [ 0 ] = = ' V ' | | q . name [ 0 ] = = ' v ' ) ) {
fprintf ( stderr , " Got empty reply. This nameserver may not be resolving recursively, use another. \n " ) ;
fprintf ( stderr , " Try \" iodine [options] ns.%s %s \" first, it might just work. \n " ,
topdomain , topdomain ) ;
return - 2 ;
}
/* If we get an immediate SERVFAIL on the handshake query
we ' re waiting for , wait a while before sending the next .
SERVFAIL reliably happens during fragsize autoprobe , but
mostly long after we ' ve moved along to some other queries .
However , some DNS relays , once they throw a SERVFAIL , will
for several seconds apply it immediately to _any_ new query
for the same topdomain . When this happens , waiting a while
is the only option that works .
*/
if ( rv < 0 & & q . rcode = = SERVFAIL )
sleep ( 1 ) ;
if ( rv < 0 ) {
write_dns_error ( & q , 1 ) ;
return - 2 ;
}
/* rv either 0 or >0, return it as is. */
return rv ;
2009-09-21 20:06:30 +00:00
}
2009-12-29 20:00:57 +00:00
/* not reached */
return - 1 ;
2009-09-20 21:10:44 +00:00
}
2009-08-16 12:30:26 +00:00
static int
tunnel_tun ( int tun_fd , int dns_fd )
{
unsigned long outlen ;
unsigned long inlen ;
char out [ 64 * 1024 ] ;
char in [ 64 * 1024 ] ;
ssize_t read ;
if ( ( read = read_tun ( tun_fd , in , sizeof ( in ) ) ) < = 0 )
return - 1 ;
2009-09-20 21:10:44 +00:00
/* We may be here only to empty the tun device; then return -1
to force continue in select loop . */
if ( is_sending ( ) )
return - 1 ;
2009-08-16 12:30:26 +00:00
outlen = sizeof ( out ) ;
inlen = read ;
compress2 ( ( uint8_t * ) out , & outlen , ( uint8_t * ) in , inlen , 9 ) ;
memcpy ( outpkt . data , out , MIN ( outlen , sizeof ( outpkt . data ) ) ) ;
outpkt . sentlen = 0 ;
outpkt . offset = 0 ;
2009-09-20 21:10:44 +00:00
outpkt . seqno = ( outpkt . seqno + 1 ) & 7 ;
2009-08-16 12:30:26 +00:00
outpkt . len = outlen ;
outpkt . fragment = 0 ;
2009-09-20 21:10:44 +00:00
outchunkresent = 0 ;
2009-08-16 12:30:26 +00:00
if ( conn = = CONN_DNS_NULL ) {
send_chunk ( dns_fd ) ;
2009-09-20 21:10:44 +00:00
send_ping_soon = 0 ;
2009-08-16 12:30:26 +00:00
} else {
send_raw_data ( dns_fd ) ;
}
return read ;
}
static int
tunnel_dns ( int tun_fd , int dns_fd )
{
2009-09-20 21:10:44 +00:00
static long packrecv = 0 ;
static long packrecv_oos = 0 ;
2009-12-29 20:00:57 +00:00
static long packrecv_servfail = 0 ;
2009-09-20 21:10:44 +00:00
int up_ack_seqno ;
int up_ack_fragment ;
int new_down_seqno ;
int new_down_fragment ;
struct query q ;
2009-08-16 12:30:26 +00:00
unsigned long datalen ;
char buf [ 64 * 1024 ] ;
2009-09-20 21:10:44 +00:00
int read ;
int send_something_now = 0 ;
2009-08-16 12:30:26 +00:00
2009-09-21 20:06:30 +00:00
memset ( q . name , 0 , sizeof ( q . name ) ) ;
read = read_dns_withq ( dns_fd , tun_fd , buf , sizeof ( buf ) , & q ) ;
2009-12-29 20:00:57 +00:00
if ( conn ! = CONN_DNS_NULL )
return 1 ; /* everything already done */
#if 0
fprintf ( stderr , " Recv: id %5d name[0]='%c' \n " ,
q . id , q . name [ 0 ] ) ;
# endif
/* Don't process anything that isn't data for us; usually error
replies from fragsize probes etc . However a sequence of those ,
mostly 1 sec apart , will continuously break the > = 2 - second select
timeout , which means we won ' t send a proper ping for a while .
So make select a bit faster , < 1 sec . */
2009-09-21 20:06:30 +00:00
if ( q . name [ 0 ] ! = ' P ' & & q . name [ 0 ] ! = ' p ' & &
2009-12-29 20:00:57 +00:00
q . name [ 0 ] ! = userid_char & & q . name [ 0 ] ! = userid_char2 ) {
send_ping_soon = 700 ;
2009-09-21 20:06:30 +00:00
return - 1 ; /* nothing done */
2009-12-29 20:00:57 +00:00
}
2009-09-21 20:06:30 +00:00
if ( read < 2 ) {
2009-09-20 21:10:44 +00:00
/* Maybe SERVFAIL etc. Send ping to get things back in order,
but wait a bit to prevent fast ping - pong loops . */
2009-12-29 20:00:57 +00:00
if ( read < 0 )
write_dns_error ( & q , 0 ) ;
if ( read < 0 & & q . rcode = = SERVFAIL & & lazymode & &
selecttimeout > 1 ) {
if ( packrecv < 500 & & packrecv_servfail < 4 ) {
packrecv_servfail + + ;
warnx ( " Hmm, that's %ld. Your data should still go through... " , packrecv_servfail ) ;
} else if ( packrecv < 500 & & packrecv_servfail = = 4 ) {
packrecv_servfail + + ;
warnx ( " I think %ld is too many. Setting interval to 1 to hopefully reduce SERVFAILs. But just ignore them if data still comes through. (Use -I1 next time on this network.) " , packrecv_servfail ) ;
selecttimeout = 1 ;
send_query_sendcnt = 0 ;
send_query_recvcnt = 0 ;
} else if ( packrecv > = 500 & & packrecv_servfail > 0 ) {
warnx ( " (Sorry, stopped counting; try -I1 if you experience hiccups.) " ) ;
packrecv_servfail = 0 ;
}
}
2020-07-24 17:04:50 +00:00
/* read == 1 happens with "QMEM" illegal replies, caused by
2009-12-29 20:00:57 +00:00
heavy reordering , or after short disconnections when
data - CMC has looped around into the " duplicate " values .
All these cases are helped by faster pinging . */
#if 0
if ( read = = 1 )
fprintf ( stderr , " q=%c id %5d 1-byte illegal \" QMEM \" reply \n " , q . name [ 0 ] , q . id ) ;
# endif
2009-09-20 21:10:44 +00:00
send_ping_soon = 900 ;
return - 1 ; /* nothing done */
}
2009-08-16 12:30:26 +00:00
2009-09-20 21:10:44 +00:00
if ( read = = 5 & & ! strncmp ( " BADIP " , buf , 5 ) ) {
warnx ( " BADIP: Server rejected sender IP address (maybe iodined -c will help), or server kicked us due to timeout. Will exit if no downstream data is received in 60 seconds. " ) ;
return - 1 ; /* nothing done */
2009-08-16 12:30:26 +00:00
}
2009-09-20 21:10:44 +00:00
if ( send_ping_soon ) {
send_something_now = 1 ;
send_ping_soon = 0 ;
}
2009-08-16 12:30:26 +00:00
2009-09-20 21:10:44 +00:00
/* Decode the data header, update seqno and frag;
already checked read > = 2
Note that buf [ ] gets overwritten when down - pkt complete */
new_down_seqno = ( buf [ 1 ] > > 5 ) & 7 ;
new_down_fragment = ( buf [ 1 ] > > 1 ) & 15 ;
up_ack_seqno = ( buf [ 0 ] > > 4 ) & 7 ;
up_ack_fragment = buf [ 0 ] & 15 ;
#if 0
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " Recv: id %5d down %d/%d up %d/%d, %d bytes \n " ,
q . id , new_down_seqno , new_down_fragment , up_ack_seqno ,
2009-09-20 21:10:44 +00:00
up_ack_fragment , read ) ;
# endif
/* Downstream data traffic */
if ( read > 2 & & new_down_seqno ! = inpkt . seqno & &
recent_seqno ( inpkt . seqno , new_down_seqno ) ) {
/* This is the previous seqno, or a bit earlier.
Probably out - of - sequence dupe due to unreliable
intermediary DNS . Don ' t get distracted , but send
ping quickly to get things back in order .
Ping will send our current seqno idea .
If it ' s really a new packet that skipped multiple seqnos
( why ? ? ) , server will re - send and drop a few times and
eventually everything will work again . */
read = 2 ;
send_ping_soon = 500 ;
/* Still process upstream ack, if any */
}
2009-12-29 20:00:57 +00:00
if ( ! ( packrecv & 0x1000000 ) )
packrecv + + ;
send_query_recvcnt + + ; /* overflow doesn't matter */
2009-09-20 21:10:44 +00:00
2009-12-29 20:00:57 +00:00
/* Don't process any non-recent stuff any further.
No need to remember more than 3 ids : in practice any older replies
arrive after new / current replies , and whatever data the old replies
have , it has become useless in the mean time .
Actually , ever since iodined is replying to both the original query
and the last dupe , this hardly triggers any more .
*/
2009-09-20 21:10:44 +00:00
if ( q . id ! = chunkid & & q . id ! = chunkid_prev & & q . id ! = chunkid_prev2 ) {
packrecv_oos + + ;
#if 0
fprintf ( stderr , " q=%c Packs received = %8ld Out-of-sequence = %8ld \n " , q . name [ 0 ] , packrecv , packrecv_oos ) ;
# endif
2009-12-29 20:00:57 +00:00
if ( lazymode & & packrecv < 1000 & & packrecv_oos = = 5 ) {
if ( selecttimeout > 1 )
warnx ( " Hmm, getting some out-of-sequence DNS replies. Setting interval to 1 (use -I1 next time on this network). If data traffic still has large hiccups, try if -L0 works better. " ) ;
else
warnx ( " Hmm, getting some out-of-sequence DNS replies. If data traffic often has large hiccups, try running with -L0 . " ) ;
2009-09-20 21:10:44 +00:00
selecttimeout = 1 ;
2009-12-29 20:00:57 +00:00
send_query_sendcnt = 0 ;
send_query_recvcnt = 0 ;
2009-08-16 12:30:26 +00:00
}
2009-09-20 21:10:44 +00:00
if ( send_something_now ) {
send_ping ( dns_fd ) ;
send_ping_soon = 0 ;
}
return - 1 ; /* nothing done */
}
#if 0
fprintf ( stderr , " q=%c Packs received = %8ld Out-of-sequence = %8ld \n " , q . name [ 0 ] , packrecv , packrecv_oos ) ;
# endif
/* Okay, we have a recent downstream packet */
lastdownstreamtime = time ( NULL ) ;
/* In lazy mode, we shouldn't get much replies to our most-recent
2009-12-29 20:00:57 +00:00
query , only during heavy data transfer . Since this means the server
2009-09-20 21:10:44 +00:00
doesn ' t have any packets left , send one relatively fast ( but not
too fast , to avoid runaway ping - pong loops . . ) */
if ( q . id = = chunkid & & lazymode ) {
if ( ! send_ping_soon | | send_ping_soon > 900 )
send_ping_soon = 900 ;
}
if ( read = = 2 & & new_down_seqno ! = inpkt . seqno & &
! recent_seqno ( inpkt . seqno , new_down_seqno ) ) {
/* This is a seqno that we didn't see yet, but it has
no data any more . Possible since iodined will send
fitting packs just once and not wait for ack .
Real data got lost , or will arrive shortly .
Update our idea of the seqno , and drop any waiting
old pack . Send ping to get things back on track . */
inpkt . seqno = new_down_seqno ;
inpkt . fragment = new_down_fragment ;
2009-08-16 12:30:26 +00:00
inpkt . len = 0 ;
2009-09-20 21:10:44 +00:00
send_ping_soon = 500 ;
}
while ( read > 2 ) {
/* "if" with easy exit */
if ( new_down_seqno ! = inpkt . seqno ) {
/* New packet (and not dupe of recent; checked above) */
/* Forget any old packet, even if incomplete */
inpkt . seqno = new_down_seqno ;
inpkt . fragment = new_down_fragment ; /* hopefully 0 */
inpkt . len = 0 ;
} else if ( inpkt . fragment = = 0 & & new_down_fragment = = 0 & &
inpkt . len = = 0 ) {
/* Weird situation: we probably got a no-data reply
for this seqno ( see above ) , and the actual data
is following now . */
/* okay, nothing to do here, just so that next else-if
doesn ' t trigger */
} else if ( new_down_fragment < = inpkt . fragment ) {
/* Same packet but duplicate fragment, ignore.
If the server didn ' t get our ack for it , the next
ping or chunk will do that . */
send_ping_soon = 500 ;
break ;
} else if ( new_down_fragment > inpkt . fragment + 1 ) {
/* Quite impossible. We missed a fragment, but the
server got our ack for it and is sending the next
fragment already . Don ' t handle it but let server
re - send and drop . */
send_ping_soon = 500 ;
break ;
}
inpkt . fragment = new_down_fragment ;
datalen = MIN ( read - 2 , sizeof ( inpkt . data ) - inpkt . len ) ;
/* we are here only when read > 2, so datalen "always" >=1 */
/* Skip 2 byte data header and append to packet */
memcpy ( & inpkt . data [ inpkt . len ] , & buf [ 2 ] , datalen ) ;
inpkt . len + = datalen ;
if ( buf [ 1 ] & 1 ) { /* If last fragment flag is set */
/* Uncompress packet and send to tun */
/* RE-USES buf[] */
datalen = sizeof ( buf ) ;
if ( uncompress ( ( uint8_t * ) buf , & datalen , ( uint8_t * ) inpkt . data , inpkt . len ) = = Z_OK ) {
write_tun ( tun_fd , buf , datalen ) ;
}
inpkt . len = 0 ;
/* Keep .seqno and .fragment as is, so that we won't
reassemble from duplicate fragments */
}
/* Send anything to ack the received seqno/frag, and get more */
if ( inpkt . len = = 0 ) {
/* was last frag; wait just a trifle because our
tun will probably return TCP - ack immediately .
5 msec = 200 DNSreq / sec */
send_ping_soon = 5 ;
} else {
/* server certainly has more data */
send_something_now = 1 ;
}
2020-08-01 15:29:49 +00:00
break ;
2009-09-20 21:10:44 +00:00
}
/* NOTE: buf[] was overwritten when down-packet complete */
/* Upstream data traffic */
if ( is_sending ( ) ) {
/* already checked read>=2 */
#if 0
fprintf ( stderr , " Got ack for %d,%d - expecting %d,%d - id=%d cur=%d prev=%d prev2=%d \n " ,
up_ack_seqno , up_ack_fragment , outpkt . seqno , outpkt . fragment ,
q . id , chunkid , chunkid_prev , chunkid_prev2 ) ;
# endif
if ( up_ack_seqno = = outpkt . seqno & &
up_ack_fragment = = outpkt . fragment ) {
/* Okay, previously sent fragment has arrived */
outpkt . offset + = outpkt . sentlen ;
if ( outpkt . offset > = outpkt . len ) {
/* Packet completed */
outpkt . offset = 0 ;
outpkt . len = 0 ;
outpkt . sentlen = 0 ;
outchunkresent = 0 ;
/* Normally, server still has a query in queue,
but sometimes not . So send a ping .
( Comment this out and you ' ll see occasional
hiccups . )
But since the server often still has a
query and we can expect a TCP - ack returned
from our tun device quickly in many cases ,
don ' t be too fast .
20 msec still is 50 DNSreq / second . . . */
if ( ! send_ping_soon | | send_ping_soon > 20 )
send_ping_soon = 20 ;
} else {
/* More to send */
outpkt . fragment + + ;
outchunkresent = 0 ;
send_chunk ( dns_fd ) ;
send_ping_soon = 0 ;
send_something_now = 0 ;
}
}
/* else: Some wrong fragment has arrived, or old fragment is
acked again , mostly by ping responses .
Don ' t resend chunk , usually not needed ; select loop will
re - send on timeout ( 1 sec if is_sending ( ) ) . */
2009-08-16 12:30:26 +00:00
}
2009-09-20 21:10:44 +00:00
/* Send ping if we didn't send anything yet */
if ( send_something_now ) {
2009-08-16 12:30:26 +00:00
send_ping ( dns_fd ) ;
2009-09-20 21:10:44 +00:00
send_ping_soon = 0 ;
}
2009-08-16 12:30:26 +00:00
return read ;
}
int
client_tunnel ( int tun_fd , int dns_fd )
{
struct timeval tv ;
fd_set fds ;
int rv ;
int i ;
rv = 0 ;
2009-09-20 21:10:44 +00:00
lastdownstreamtime = time ( NULL ) ;
2009-12-29 20:00:57 +00:00
send_query_sendcnt = 0 ; /* start counting now */
2009-08-16 12:30:26 +00:00
while ( running ) {
2009-09-20 21:10:44 +00:00
tv . tv_sec = selecttimeout ;
2009-08-16 12:30:26 +00:00
tv . tv_usec = 0 ;
2009-09-20 21:10:44 +00:00
if ( is_sending ( ) ) {
/* fast timeout for retransmits */
tv . tv_sec = 1 ;
tv . tv_usec = 0 ;
}
if ( send_ping_soon ) {
tv . tv_sec = 0 ;
tv . tv_usec = send_ping_soon * 1000 ;
}
2009-08-16 12:30:26 +00:00
FD_ZERO ( & fds ) ;
2009-09-20 21:10:44 +00:00
if ( ! is_sending ( ) | | outchunkresent > = 2 ) {
/* If re-sending upstream data, chances are that
we ' re several seconds behind already and TCP
will start filling tun buffer with ( useless )
retransmits .
Get up - to - date fast by simply dropping stuff ,
that ' s what TCP is designed to handle . */
2009-08-16 12:30:26 +00:00
FD_SET ( tun_fd , & fds ) ;
}
FD_SET ( dns_fd , & fds ) ;
i = select ( MAX ( tun_fd , dns_fd ) + 1 , & fds , NULL , NULL , & tv ) ;
2009-09-20 21:10:44 +00:00
if ( lastdownstreamtime + 60 < time ( NULL ) ) {
warnx ( " No downstream data received in 60 seconds, shutting down. " ) ;
running = 0 ;
}
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
if ( running = = 0 )
break ;
2014-06-01 06:34:18 +00:00
if ( i < 0 )
2009-08-16 12:30:26 +00:00
err ( 1 , " select " ) ;
2009-09-20 21:10:44 +00:00
if ( i = = 0 ) {
/* timeout */
if ( is_sending ( ) ) {
/* Re-send current fragment; either frag
or ack probably dropped somewhere .
But problem : no cache - miss - counter ,
so hostname will be identical .
Just drop whole packet after 3 retries ,
and TCP retransmit will solve it .
NOTE : tun dropping above should be
> = ( value_here - 1 ) */
if ( outchunkresent < 3 ) {
outchunkresent + + ;
send_chunk ( dns_fd ) ;
} else {
outpkt . offset = 0 ;
outpkt . len = 0 ;
outpkt . sentlen = 0 ;
outchunkresent = 0 ;
send_ping ( dns_fd ) ;
}
} else {
send_ping ( dns_fd ) ;
}
send_ping_soon = 0 ;
2009-08-16 12:30:26 +00:00
} else {
2009-09-20 21:10:44 +00:00
2009-08-16 12:30:26 +00:00
if ( FD_ISSET ( tun_fd , & fds ) ) {
if ( tunnel_tun ( tun_fd , dns_fd ) < = 0 )
continue ;
2009-09-20 21:10:44 +00:00
/* Returns -1 on error OR when quickly
dropping data in case of DNS congestion ;
we need to _not_ do tunnel_dns ( ) then .
If chunk sent , sets send_ping_soon = 0. */
2009-08-16 12:30:26 +00:00
}
if ( FD_ISSET ( dns_fd , & fds ) ) {
if ( tunnel_dns ( tun_fd , dns_fd ) < = 0 )
continue ;
2014-06-01 06:34:18 +00:00
}
2009-08-16 12:30:26 +00:00
}
}
return rv ;
}
static void
send_login ( int fd , char * login , int len )
{
char data [ 19 ] ;
memset ( data , 0 , sizeof ( data ) ) ;
data [ 0 ] = userid ;
memcpy ( & data [ 1 ] , login , MIN ( len , 16 ) ) ;
data [ 17 ] = ( rand_seed > > 8 ) & 0xff ;
data [ 18 ] = ( rand_seed > > 0 ) & 0xff ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
rand_seed + + ;
2009-09-20 15:11:14 +00:00
send_packet ( fd , ' l ' , data , sizeof ( data ) ) ;
2009-08-16 12:30:26 +00:00
}
static void
send_fragsize_probe ( int fd , int fragsize )
{
char probedata [ 256 ] ;
char buf [ 4096 ] ;
2009-09-20 15:11:14 +00:00
/*
* build a large query domain which is random and maximum size ,
* will also take up maximal space in the return packet
*/
memset ( probedata , MAX ( 1 , rand_seed & 0xff ) , sizeof ( probedata ) ) ;
probedata [ 1 ] = MAX ( 1 , ( rand_seed > > 8 ) & 0xff ) ;
2009-08-16 12:30:26 +00:00
rand_seed + + ;
2009-12-29 20:00:57 +00:00
/* Note: must either be same, or larger, than send_chunk() */
build_hostname ( buf + 5 , sizeof ( buf ) - 5 , probedata , sizeof ( probedata ) ,
topdomain , dataenc , hostname_maxlen ) ;
2009-08-16 12:30:26 +00:00
fragsize & = 2047 ;
buf [ 0 ] = ' r ' ; /* Probe downstream fragsize packet */
buf [ 1 ] = b32_5to8 ( ( userid < < 1 ) | ( ( fragsize > > 10 ) & 1 ) ) ;
buf [ 2 ] = b32_5to8 ( ( fragsize > > 5 ) & 31 ) ;
buf [ 3 ] = b32_5to8 ( fragsize & 31 ) ;
2009-12-29 20:00:57 +00:00
buf [ 4 ] = ' d ' ; /* dummy to match send_chunk() */
2009-08-16 12:30:26 +00:00
send_query ( fd , buf ) ;
}
static void
send_set_downstream_fragsize ( int fd , int fragsize )
{
char data [ 5 ] ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
data [ 0 ] = userid ;
data [ 1 ] = ( fragsize & 0xff00 ) > > 8 ;
data [ 2 ] = ( fragsize & 0x00ff ) ;
data [ 3 ] = ( rand_seed > > 8 ) & 0xff ;
data [ 4 ] = ( rand_seed > > 0 ) & 0xff ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
rand_seed + + ;
2009-09-20 15:11:14 +00:00
send_packet ( fd , ' n ' , data , sizeof ( data ) ) ;
2009-08-16 12:30:26 +00:00
}
2014-06-01 06:34:18 +00:00
static void
2009-08-16 12:30:26 +00:00
send_version ( int fd , uint32_t version )
{
char data [ 6 ] ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
data [ 0 ] = ( version > > 24 ) & 0xff ;
data [ 1 ] = ( version > > 16 ) & 0xff ;
data [ 2 ] = ( version > > 8 ) & 0xff ;
data [ 3 ] = ( version > > 0 ) & 0xff ;
data [ 4 ] = ( rand_seed > > 8 ) & 0xff ;
data [ 5 ] = ( rand_seed > > 0 ) & 0xff ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
rand_seed + + ;
2009-12-29 20:00:57 +00:00
send_packet ( fd , ' v ' , data , sizeof ( data ) ) ;
2009-08-16 12:30:26 +00:00
}
2020-07-24 18:18:07 +00:00
/* Add lower 15 bits of rand seed as base32,
* followed by a dot and the tunnel domain and send */
static void
send_handshake_query ( int fd , char * prefix )
{
char buf [ 300 ] ;
char cmc_dot [ 5 ] ;
cmc_dot [ 0 ] = b32_5to8 ( ( rand_seed > > 10 ) & 0x1f ) ;
cmc_dot [ 1 ] = b32_5to8 ( ( rand_seed > > 5 ) & 0x1f ) ;
cmc_dot [ 2 ] = b32_5to8 ( ( rand_seed ) & 0x1f ) ;
cmc_dot [ 3 ] = ' . ' ;
cmc_dot [ 4 ] = 0 ;
rand_seed + + ;
buf [ 0 ] = 0 ;
strncat ( buf , prefix , 60 ) ; /* 63 - space for 3 CMC bytes */
strcat ( buf , cmc_dot ) ;
2020-07-25 13:43:43 +00:00
strncat ( buf , topdomain , sizeof ( buf ) - strlen ( buf ) - 1 ) ;
2020-07-24 18:18:07 +00:00
send_query ( fd , buf ) ;
}
2009-08-16 12:30:26 +00:00
static void
2020-07-24 19:17:18 +00:00
send_raw_udp_login ( int dns_fd , int seed )
2009-08-16 12:30:26 +00:00
{
char buf [ 16 ] ;
login_calculate ( buf , 16 , password , seed + 1 ) ;
2020-07-24 19:17:18 +00:00
send_raw ( dns_fd , buf , sizeof ( buf ) , RAW_HDR_CMD_LOGIN ) ;
2009-08-16 12:30:26 +00:00
}
static void
2017-03-11 07:41:07 +00:00
send_upenctest ( int fd , const char * s )
2009-12-29 20:00:57 +00:00
/* NOTE: String may be at most 63-4=59 chars to fit in 1 dns chunk. */
2009-08-16 12:30:26 +00:00
{
2009-12-29 20:00:57 +00:00
char buf [ 512 ] = " z___ " ;
2014-06-01 06:34:18 +00:00
2009-12-29 20:00:57 +00:00
buf [ 1 ] = b32_5to8 ( ( rand_seed > > 10 ) & 0x1f ) ;
buf [ 2 ] = b32_5to8 ( ( rand_seed > > 5 ) & 0x1f ) ;
2020-07-24 17:02:41 +00:00
buf [ 3 ] = b32_5to8 ( ( rand_seed ) & 0x1f ) ;
2009-12-29 20:00:57 +00:00
rand_seed + + ;
2018-10-01 01:04:15 +00:00
strncat ( buf , s , 128 ) ;
strncat ( buf , " . " , 2 ) ;
2009-12-29 20:00:57 +00:00
strncat ( buf , topdomain , 512 - strlen ( buf ) ) ;
send_query ( fd , buf ) ;
}
static void
2020-07-24 18:18:07 +00:00
send_downenctest ( int fd , char downenc , int variant )
2009-12-29 20:00:57 +00:00
{
2020-07-24 18:18:07 +00:00
char prefix [ 4 ] = " y__ " ;
prefix [ 1 ] = tolower ( downenc ) ;
prefix [ 2 ] = b32_5to8 ( variant ) ;
2009-12-29 20:00:57 +00:00
2020-07-24 18:18:07 +00:00
/* Use send_query directly if we ever send more data here. */
send_handshake_query ( fd , prefix ) ;
2009-08-16 12:30:26 +00:00
}
2009-09-20 21:10:44 +00:00
static void
2020-07-24 19:17:18 +00:00
send_lazy_switch ( int fd )
2009-09-20 21:10:44 +00:00
{
2020-07-24 18:49:39 +00:00
char sw_lazy [ ] = { ' o ' , b32_5to8 ( userid ) , ' i ' , 0 } ;
2009-09-20 21:10:44 +00:00
if ( lazymode )
2020-07-24 18:49:39 +00:00
sw_lazy [ 2 ] = ' l ' ;
2009-09-20 21:10:44 +00:00
2020-07-24 18:49:39 +00:00
send_handshake_query ( fd , sw_lazy ) ;
2009-09-20 21:10:44 +00:00
}
2009-08-16 12:30:26 +00:00
static int
handshake_version ( int dns_fd , int * seed )
{
2009-09-20 21:10:44 +00:00
char hex [ ] = " 0123456789abcdef " ;
char hex2 [ ] = " 0123456789ABCDEF " ;
2009-08-16 12:30:26 +00:00
char in [ 4096 ] ;
uint32_t payload ;
int i ;
int read ;
for ( i = 0 ; running & & i < 5 ; i + + ) {
2014-04-24 14:03:47 +00:00
send_version ( dns_fd , PROTOCOL_VERSION ) ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' v ' , ' V ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( read > = 9 ) {
payload = ( ( ( in [ 4 ] & 0xff ) < < 24 ) |
( ( in [ 5 ] & 0xff ) < < 16 ) |
( ( in [ 6 ] & 0xff ) < < 8 ) |
( ( in [ 7 ] & 0xff ) ) ) ;
if ( strncmp ( " VACK " , in , 4 ) = = 0 ) {
* seed = payload ;
userid = in [ 8 ] ;
userid_char = hex [ userid & 15 ] ;
userid_char2 = hex2 [ userid & 15 ] ;
2014-04-24 14:03:47 +00:00
fprintf ( stderr , " Version ok, both using protocol v 0x%08x. You are user #%d \n " ,
PROTOCOL_VERSION , userid ) ;
2012-02-06 19:28:42 +00:00
return 0 ;
} else if ( strncmp ( " VNAK " , in , 4 ) = = 0 ) {
2014-06-01 06:34:18 +00:00
warnx ( " You use protocol v 0x%08x, server uses v 0x%08x. Giving up " ,
2014-04-24 14:03:47 +00:00
PROTOCOL_VERSION , payload ) ;
2012-02-06 19:28:42 +00:00
return 1 ;
} else if ( strncmp ( " VFUL " , in , 4 ) = = 0 ) {
warnx ( " Server full, all %d slots are taken. Try again later " , payload ) ;
return 1 ;
}
} else if ( read > 0 )
warnx ( " did not receive proper login challenge " ) ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " Retrying version check... \n " ) ;
}
2009-09-20 15:11:14 +00:00
warnx ( " couldn't connect to server (maybe other -T options will work) " ) ;
2009-08-16 12:30:26 +00:00
return 1 ;
}
static int
handshake_login ( int dns_fd , int seed )
{
char in [ 4096 ] ;
char login [ 16 ] ;
char server [ 65 ] ;
char client [ 65 ] ;
int mtu ;
int i ;
int read ;
login_calculate ( login , 16 , password , seed ) ;
2014-06-01 06:34:18 +00:00
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-08-16 12:30:26 +00:00
send_login ( dns_fd , login , 16 ) ;
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' l ' , ' L ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
int netmask ;
if ( strncmp ( " LNAK " , in , 4 ) = = 0 ) {
fprintf ( stderr , " Bad password \n " ) ;
return 1 ;
2018-12-29 05:25:11 +00:00
} else if ( strncmp ( " BADIP " , in , 5 ) = = 0 ) {
warnx ( " BADIP: Server rejected sender IP address (maybe iodined -c will help) " ) ;
return 1 ;
2012-02-06 19:28:42 +00:00
} else if ( sscanf ( in , " %64[^-]-%64[^-]-%d-%d " ,
server , client , & mtu , & netmask ) = = 4 ) {
server [ 64 ] = 0 ;
client [ 64 ] = 0 ;
if ( tun_setip ( client , server , netmask ) = = 0 & &
tun_setmtu ( mtu ) = = 0 ) {
fprintf ( stderr , " Server tunnel IP is %s \n " , server ) ;
return 0 ;
2009-08-16 12:30:26 +00:00
} else {
2012-02-06 19:28:42 +00:00
errx ( 4 , " Failed to set IP and MTU " ) ;
2009-08-16 12:30:26 +00:00
}
2012-02-06 19:28:42 +00:00
} else {
fprintf ( stderr , " Received bad handshake \n " ) ;
2009-08-16 12:30:26 +00:00
}
2012-02-06 19:28:42 +00:00
}
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " Retrying login... \n " ) ;
}
warnx ( " couldn't login to server " ) ;
return 1 ;
}
static int
handshake_raw_udp ( int dns_fd , int seed )
{
struct timeval tv ;
2020-07-24 18:35:37 +00:00
char get_ip [ ] = { ' i ' , b32_5to8 ( userid ) , 0 } ;
2009-08-16 12:30:26 +00:00
char in [ 4096 ] ;
fd_set fds ;
int i ;
int r ;
int len ;
2015-06-28 20:41:54 +00:00
int got_addr ;
memset ( & raw_serv , 0 , sizeof ( raw_serv ) ) ;
got_addr = 0 ;
2009-08-16 12:30:26 +00:00
2020-07-24 19:01:38 +00:00
fprintf ( stderr , " Requesting server address to attempt raw UDP mode (skip with -r) " ) ;
fflush ( stderr ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 3 ; i + + ) {
2009-08-16 12:30:26 +00:00
2020-07-24 18:35:37 +00:00
send_handshake_query ( dns_fd , get_ip ) ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
len = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' i ' , ' I ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( len = = 5 & & in [ 0 ] = = ' I ' ) {
2015-06-28 20:41:54 +00:00
/* Received IPv4 address */
struct sockaddr_in * raw4_serv = ( struct sockaddr_in * ) & raw_serv ;
raw4_serv - > sin_family = AF_INET ;
memcpy ( & raw4_serv - > sin_addr , & in [ 1 ] , sizeof ( struct in_addr ) ) ;
raw4_serv - > sin_port = htons ( 53 ) ;
raw_serv_len = sizeof ( struct sockaddr_in ) ;
got_addr = 1 ;
break ;
}
if ( len = = 17 & & in [ 0 ] = = ' I ' ) {
/* Received IPv6 address */
struct sockaddr_in6 * raw6_serv = ( struct sockaddr_in6 * ) & raw_serv ;
raw6_serv - > sin6_family = AF_INET6 ;
memcpy ( & raw6_serv - > sin6_addr , & in [ 1 ] , sizeof ( struct in6_addr ) ) ;
raw6_serv - > sin6_port = htons ( 53 ) ;
raw_serv_len = sizeof ( struct sockaddr_in6 ) ;
got_addr = 1 ;
2012-02-06 19:28:42 +00:00
break ;
}
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " . " ) ;
fflush ( stderr ) ;
2009-08-16 12:30:26 +00:00
}
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " \n " ) ;
if ( ! running )
return 0 ;
2014-06-01 06:34:18 +00:00
2015-06-28 20:41:54 +00:00
if ( ! got_addr ) {
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " Failed to get raw server IP, will use DNS mode. \n " ) ;
return 0 ;
}
2020-07-24 19:01:38 +00:00
fprintf ( stderr , " Server is at %s, trying raw login: (skip with -r) " ,
format_addr ( & raw_serv , raw_serv_len ) ) ;
2009-08-16 12:30:26 +00:00
fflush ( stderr ) ;
2014-06-01 06:34:18 +00:00
/* do login against port 53 on remote server
2009-08-16 12:30:26 +00:00
* based on the old seed . If reply received ,
* switch to raw udp mode */
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 4 ; i + + ) {
2009-08-16 12:30:26 +00:00
tv . tv_sec = i + 1 ;
tv . tv_usec = 0 ;
2020-07-24 19:17:18 +00:00
send_raw_udp_login ( dns_fd , seed ) ;
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
FD_ZERO ( & fds ) ;
FD_SET ( dns_fd , & fds ) ;
r = select ( dns_fd + 1 , & fds , NULL , NULL , & tv ) ;
2020-07-24 16:56:30 +00:00
if ( r > 0 ) {
2009-08-16 12:30:26 +00:00
/* recv() needed for windows, dont change to read() */
len = recv ( dns_fd , in , sizeof ( in ) , 0 ) ;
if ( len > = ( 16 + RAW_HDR_LEN ) ) {
char hash [ 16 ] ;
login_calculate ( hash , 16 , password , seed - 1 ) ;
if ( memcmp ( in , raw_header , RAW_HDR_IDENT_LEN ) = = 0
2014-06-01 06:34:18 +00:00
& & RAW_HDR_GET_CMD ( in ) = = RAW_HDR_CMD_LOGIN
2009-08-16 12:30:26 +00:00
& & memcmp ( & in [ RAW_HDR_LEN ] , hash , sizeof ( hash ) ) = = 0 ) {
fprintf ( stderr , " OK \n " ) ;
return 1 ;
}
}
}
fprintf ( stderr , " . " ) ;
fflush ( stderr ) ;
}
2014-06-01 06:34:18 +00:00
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " failed \n " ) ;
return 0 ;
}
static int
2017-03-11 07:41:07 +00:00
handshake_upenctest ( int dns_fd , const char * s )
2009-12-29 20:00:57 +00:00
/* NOTE: *s may be max 59 chars; must start with "aA" for case-swap check
Returns :
- 1 : case swap , no need for any further test : error printed ; or Ctrl - C
0 : not identical or error or timeout
1 : identical string returned
*/
2009-08-16 12:30:26 +00:00
{
char in [ 4096 ] ;
2009-12-29 20:00:57 +00:00
unsigned char * uin = ( unsigned char * ) in ;
2017-03-11 07:41:07 +00:00
const unsigned char * us = ( const unsigned char * ) s ;
2009-08-16 12:30:26 +00:00
int i ;
int read ;
2020-08-01 15:19:37 +00:00
int slen ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
slen = strlen ( s ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 3 ; i + + ) {
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
send_upenctest ( dns_fd , s ) ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' z ' , ' Z ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
if ( read = = - 2 )
return 0 ; /* hard error */
if ( read > 0 & & read < slen + 4 )
return 0 ; /* reply too short (chars dropped) */
if ( read > 0 ) {
int k ;
#if 0
/* in[56] = '@'; */
/* in[56] = '_'; */
/* if (in[29] == '\344') in[29] = 'a'; */
in [ read ] = ' \0 ' ;
fprintf ( stderr , " BounceReply: >%s< \n " , in ) ;
# endif
/* quick check if case swapped, to give informative error msg */
if ( in [ 4 ] = = ' A ' ) {
fprintf ( stderr , " DNS queries get changed to uppercase, keeping upstream codec Base32 \n " ) ;
return - 1 ;
}
if ( in [ 5 ] = = ' a ' ) {
fprintf ( stderr , " DNS queries get changed to lowercase, keeping upstream codec Base32 \n " ) ;
return - 1 ;
}
for ( k = 0 ; k < slen ; k + + ) {
if ( in [ k + 4 ] ! = s [ k ] ) {
/* Definitely not reliable */
if ( in [ k + 4 ] > = ' ' & & in [ k + 4 ] < = ' ~ ' & &
s [ k ] > = ' ' & & s [ k ] < = ' ~ ' ) {
fprintf ( stderr , " DNS query char '%c' gets changed into '%c' \n " ,
s [ k ] , in [ k + 4 ] ) ;
} else {
fprintf ( stderr , " DNS query char 0x%02X gets changed into 0x%02X \n " ,
( unsigned int ) us [ k ] ,
( unsigned int ) uin [ k + 4 ] ) ;
2009-08-16 12:30:26 +00:00
}
2009-12-29 20:00:57 +00:00
return 0 ;
}
}
/* if still here, then all okay */
return 1 ;
}
fprintf ( stderr , " Retrying upstream codec test... \n " ) ;
}
if ( ! running )
return - 1 ;
/* timeout */
return 0 ;
}
static int
handshake_upenc_autodetect ( int dns_fd )
/* Returns:
0 : keep Base32
1 : Base64 is okay
2 : Base64u is okay
3 : Base128 is okay
*/
{
/* Note: max 59 chars, must start with "aA".
pat64 : If 012 9 work , assume 3 - 8 are okay too .
RFC1035 par 2.3 .1 states that [ A - Z0 - 9 - ] allowed , but only
[ A - Z ] as first , and [ A - Z0 - 9 ] as last char _per label_ .
Test by having ' - ' as last char .
*/
2020-08-01 15:19:37 +00:00
const char * pat64 = " aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ+0129- " ;
const char * pat64u = " aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ_0129- " ;
const char * pat128a = " aA-Aaahhh-Drink-mal-ein-J \344 germeister- " ;
const char * pat128b = " aA-La-fl \373 te-na \357 ve-fran \347 aise-est-retir \351 - \340 -Cr \350 te " ;
const char * pat128c = " aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ " ;
const char * pat128d = " aA0123456789 \274 \275 \276 \277 "
" \300 \301 \302 \303 \304 \305 \306 \307 \310 \311 \312 \313 \314 \315 \316 \317 " ;
const char * pat128e = " aA "
" \320 \321 \322 \323 \324 \325 \326 \327 \330 \331 \332 \333 \334 \335 \336 \337 "
" \340 \341 \342 \343 \344 \345 \346 \347 \350 \351 \352 \353 \354 \355 \356 \357 "
" \360 \361 \362 \363 \364 \365 \366 \367 \370 \371 \372 \373 \374 \375 " ;
2009-12-29 20:00:57 +00:00
int res ;
/* Try Base128, starting very gently to not draw attention */
while ( 1 ) {
res = handshake_upenctest ( dns_fd , pat128a ) ;
if ( res < 0 ) {
/* DNS swaps case, msg already printed; or Ctrl-C */
return 0 ;
} else if ( res = = 0 ) {
/* Probably not okay, skip Base128 entirely */
break ;
}
res = handshake_upenctest ( dns_fd , pat128b ) ;
if ( res < 0 )
return 0 ;
else if ( res = = 0 )
break ;
/* if this works, we can test the real stuff */
res = handshake_upenctest ( dns_fd , pat128c ) ;
if ( res < 0 )
return 0 ;
else if ( res = = 0 )
break ;
res = handshake_upenctest ( dns_fd , pat128d ) ;
if ( res < 0 )
return 0 ;
else if ( res = = 0 )
break ;
res = handshake_upenctest ( dns_fd , pat128e ) ;
if ( res < 0 )
return 0 ;
else if ( res = = 0 )
break ;
/* if still here, then base128 works completely */
return 3 ;
}
/* Try Base64 (with plus sign) */
res = handshake_upenctest ( dns_fd , pat64 ) ;
if ( res < 0 ) {
/* DNS swaps case, msg already printed; or Ctrl-C */
return 0 ;
} else if ( res > 0 ) {
/* All okay, Base64 msg will be printed later */
return 1 ;
}
/* Try Base64u (with _u_nderscore) */
res = handshake_upenctest ( dns_fd , pat64u ) ;
if ( res < 0 ) {
/* DNS swaps case, msg already printed; or Ctrl-C */
return 0 ;
} else if ( res > 0 ) {
/* All okay, Base64u msg will be printed later */
return 2 ;
}
/* if here, then nonthing worked */
fprintf ( stderr , " Keeping upstream codec Base32 \n " ) ;
return 0 ;
}
static int
handshake_downenctest ( int dns_fd , char trycodec )
/* Returns:
0 : not identical or error or timeout
1 : identical string returned
*/
{
char in [ 4096 ] ;
int i ;
int read ;
char * s = DOWNCODECCHECK1 ;
2020-08-01 15:19:37 +00:00
int slen = DOWNCODECCHECK1_LEN ;
2009-12-29 20:00:57 +00:00
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 3 ; i + + ) {
2009-12-29 20:00:57 +00:00
2020-07-24 18:18:07 +00:00
send_downenctest ( dns_fd , trycodec , 1 ) ;
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' y ' , ' Y ' , i + 1 ) ;
if ( read = = - 2 )
return 0 ; /* hard error */
if ( read > 0 & & read ! = slen )
return 0 ; /* reply incorrect = unreliable */
if ( read > 0 ) {
int k ;
for ( k = 0 ; k < slen ; k + + ) {
if ( in [ k ] ! = s [ k ] ) {
/* Definitely not reliable */
return 0 ;
2009-08-16 12:30:26 +00:00
}
}
2009-12-29 20:00:57 +00:00
/* if still here, then all okay */
return 1 ;
2009-08-16 12:30:26 +00:00
}
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " Retrying downstream codec test... \n " ) ;
}
/* timeout */
return 0 ;
}
static char
handshake_downenc_autodetect ( int dns_fd )
/* Returns codec char (or ' ' if no advanced codec works) */
{
int base64ok = 0 ;
int base64uok = 0 ;
int base128ok = 0 ;
2014-06-09 18:05:29 +00:00
if ( do_qtype = = T_NULL | | do_qtype = = T_PRIVATE ) {
2009-12-29 20:00:57 +00:00
/* no other choice than raw */
fprintf ( stderr , " No alternative downstream codec available, using default (Raw) \n " ) ;
return ' ' ;
}
fprintf ( stderr , " Autodetecting downstream codec (use -O to override) \n " ) ;
/* Try Base64 */
if ( handshake_downenctest ( dns_fd , ' S ' ) )
base64ok = 1 ;
else if ( running & & handshake_downenctest ( dns_fd , ' U ' ) )
base64uok = 1 ;
/* Try Base128 only if 64 gives us some perspective */
if ( running & & ( base64ok | | base64uok ) ) {
if ( handshake_downenctest ( dns_fd , ' V ' ) )
base128ok = 1 ;
2009-08-16 12:30:26 +00:00
}
2009-12-29 20:00:57 +00:00
/* If 128 works, then TXT may give us Raw as well */
if ( running & & ( base128ok & & do_qtype = = T_TXT ) ) {
if ( handshake_downenctest ( dns_fd , ' R ' ) )
return ' R ' ;
}
if ( ! running )
return ' ' ;
if ( base128ok )
return ' V ' ;
if ( base64ok )
return ' S ' ;
if ( base64uok )
return ' U ' ;
fprintf ( stderr , " No advanced downstream codecs seem to work, using default (Base32) \n " ) ;
return ' ' ;
}
static int
handshake_qtypetest ( int dns_fd , int timeout )
/* Returns:
0 : doesn ' t work with this timeout
1 : works properly
*/
{
char in [ 4096 ] ;
int read ;
char * s = DOWNCODECCHECK1 ;
2020-08-01 15:19:37 +00:00
int slen = DOWNCODECCHECK1_LEN ;
2009-12-29 20:00:57 +00:00
int trycodec ;
int k ;
2014-06-09 18:05:29 +00:00
if ( do_qtype = = T_NULL | | do_qtype = = T_PRIVATE )
2009-12-29 20:00:57 +00:00
trycodec = ' R ' ;
else
trycodec = ' T ' ;
/* We could use 'Z' bouncing here, but 'Y' also tests that 0-255
2014-06-09 18:05:29 +00:00
byte values can be returned , which is needed for NULL / PRIVATE
to work . */
2009-12-29 20:00:57 +00:00
2020-07-24 18:18:07 +00:00
send_downenctest ( dns_fd , trycodec , 1 ) ;
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' y ' , ' Y ' , timeout ) ;
if ( read ! = slen )
return 0 ; /* incorrect */
for ( k = 0 ; k < slen ; k + + ) {
if ( in [ k ] ! = s [ k ] ) {
/* corrupted */
return 0 ;
}
}
/* if still here, then all okay */
return 1 ;
}
static int
handshake_qtype_numcvt ( int num )
{
switch ( num ) {
case 0 : return T_NULL ;
2014-06-09 18:05:29 +00:00
case 1 : return T_PRIVATE ;
case 2 : return T_TXT ;
case 3 : return T_SRV ;
case 4 : return T_MX ;
case 5 : return T_CNAME ;
case 6 : return T_A ;
2009-12-29 20:00:57 +00:00
}
return T_UNSET ;
}
static int
handshake_qtype_autodetect ( int dns_fd )
/* Returns:
0 : okay , do_qtype set
1 : problem , program exit
*/
{
int highestworking = 100 ;
int timeout ;
int qtypenum ;
fprintf ( stderr , " Autodetecting DNS query type (use -T to override) " ) ;
fflush ( stderr ) ;
/* Method: try all "interesting" qtypes with a 1-sec timeout, then try
all " still-interesting " qtypes with a 2 - sec timeout , etc .
" Interesting " means : qtypes that ( are expected to ) have higher
bandwidth than what we know is working already ( highestworking ) .
Note that DNS relays may not immediately resolve the first ( NULL )
query in 1 sec , due to long recursive lookups , so we keep trying
to see if things will start working after a while .
*/
for ( timeout = 1 ; running & & timeout < = 3 ; timeout + + ) {
for ( qtypenum = 0 ; running & & qtypenum < highestworking ; qtypenum + + ) {
do_qtype = handshake_qtype_numcvt ( qtypenum ) ;
if ( do_qtype = = T_UNSET )
break ; /* this round finished */
fprintf ( stderr , " . " ) ;
fflush ( stderr ) ;
if ( handshake_qtypetest ( dns_fd , timeout ) ) {
/* okay */
highestworking = qtypenum ;
#if 0
fprintf ( stderr , " Type %s timeout %d works \n " ,
2014-06-09 16:11:16 +00:00
client_get_qtype ( ) , timeout ) ;
2009-12-29 20:00:57 +00:00
# endif
break ;
/* try others with longer timeout */
}
/* else: try next qtype with same timeout */
}
if ( highestworking = = 0 )
/* good, we have NULL; abort immediately */
break ;
}
fprintf ( stderr , " \n " ) ;
if ( ! running ) {
warnx ( " Stopped while autodetecting DNS query type (try setting manually with -T) " ) ;
return 1 ; /* problem */
}
/* finished */
do_qtype = handshake_qtype_numcvt ( highestworking ) ;
if ( do_qtype = = T_UNSET ) {
/* also catches highestworking still 100 */
warnx ( " No suitable DNS query type found. Are you connected to a network? " ) ;
warnx ( " If you expect very long roundtrip delays, use -T explicitly. " ) ;
warnx ( " (Also, connecting to an \" ancient \" version of iodined won't work.) " ) ;
return 1 ; /* problem */
}
/* "using qtype" message printed in handshake function */
return 0 ; /* okay */
}
static int
handshake_edns0_check ( int dns_fd )
/* Returns:
0 : EDNS0 not supported ; or Ctrl - C
1 : EDNS0 works
*/
{
char in [ 4096 ] ;
int i ;
int read ;
char * s = DOWNCODECCHECK1 ;
2020-08-01 15:19:37 +00:00
int slen = DOWNCODECCHECK1_LEN ;
2009-12-29 20:00:57 +00:00
char trycodec ;
if ( do_qtype = = T_NULL )
trycodec = ' R ' ;
else
trycodec = ' T ' ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 3 ; i + + ) {
2009-12-29 20:00:57 +00:00
2020-07-24 18:18:07 +00:00
send_downenctest ( dns_fd , trycodec , 1 ) ;
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' y ' , ' Y ' , i + 1 ) ;
if ( read = = - 2 )
return 0 ; /* hard error */
if ( read > 0 & & read ! = slen )
return 0 ; /* reply incorrect = unreliable */
if ( read > 0 ) {
int k ;
for ( k = 0 ; k < slen ; k + + ) {
if ( in [ k ] ! = s [ k ] ) {
/* Definitely not reliable */
return 0 ;
}
}
/* if still here, then all okay */
return 1 ;
}
fprintf ( stderr , " Retrying EDNS0 support test... \n " ) ;
}
/* timeout or Ctrl-C */
return 0 ;
2009-08-16 12:30:26 +00:00
}
static void
2009-12-29 20:00:57 +00:00
handshake_switch_codec ( int dns_fd , int bits )
2009-08-16 12:30:26 +00:00
{
2020-07-24 18:24:19 +00:00
char sw_codec [ ] = { ' s ' , b32_5to8 ( userid ) , b32_5to8 ( bits ) , 0 } ;
2009-08-16 12:30:26 +00:00
char in [ 4096 ] ;
int i ;
int read ;
2017-03-11 23:04:26 +00:00
const struct encoder * tempenc ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
if ( bits = = 5 )
2017-03-11 23:04:26 +00:00
tempenc = & base32_ops ;
2009-12-29 20:00:57 +00:00
else if ( bits = = 6 )
2017-03-11 23:04:26 +00:00
tempenc = & base64_ops ;
2009-12-29 20:00:57 +00:00
else if ( bits = = 26 ) /* "2nd" 6 bits per byte, with underscore */
2017-03-11 23:04:26 +00:00
tempenc = & base64u_ops ;
2009-12-29 20:00:57 +00:00
else if ( bits = = 7 )
2017-03-11 23:04:26 +00:00
tempenc = & base128_ops ;
2009-12-29 20:00:57 +00:00
else return ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " Switching upstream to codec %s \n " , tempenc - > name ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-08-16 12:30:26 +00:00
2020-07-24 18:24:19 +00:00
send_handshake_query ( dns_fd , sw_codec ) ;
2014-06-01 06:34:18 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' s ' , ' S ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
if ( strncmp ( " BADLEN " , in , 6 ) = = 0 ) {
fprintf ( stderr , " Server got bad message length. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADIP " , in , 5 ) = = 0 ) {
fprintf ( stderr , " Server rejected sender IP address. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADCODEC " , in , 8 ) = = 0 ) {
fprintf ( stderr , " Server rejected the selected codec. " ) ;
goto codec_revert ;
2009-08-16 12:30:26 +00:00
}
2012-02-06 19:28:42 +00:00
in [ read ] = 0 ; /* zero terminate */
fprintf ( stderr , " Server switched upstream to codec %s \n " , in ) ;
dataenc = tempenc ;
return ;
}
2009-12-29 20:00:57 +00:00
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " Retrying codec switch... \n " ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return ;
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " No reply from server on codec switch. " ) ;
2014-06-01 06:34:18 +00:00
codec_revert :
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " Falling back to upstream codec %s \n " , dataenc - > name ) ;
2009-08-16 12:30:26 +00:00
}
2009-09-20 15:11:14 +00:00
static void
handshake_switch_downenc ( int dns_fd )
{
2020-07-24 18:38:45 +00:00
char sw_downenc [ ] = { ' o ' , b32_5to8 ( userid ) , tolower ( downenc ) , 0 } ;
2009-09-20 15:11:14 +00:00
char in [ 4096 ] ;
int i ;
int read ;
char * dname ;
dname = " Base32 " ;
if ( downenc = = ' S ' )
dname = " Base64 " ;
2009-12-29 20:00:57 +00:00
else if ( downenc = = ' U ' )
dname = " Base64u " ;
else if ( downenc = = ' V ' )
dname = " Base128 " ;
2009-09-20 15:11:14 +00:00
else if ( downenc = = ' R ' )
dname = " Raw " ;
fprintf ( stderr , " Switching downstream to codec %s \n " , dname ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-09-20 15:11:14 +00:00
2020-07-24 18:38:45 +00:00
send_handshake_query ( dns_fd , sw_downenc ) ;
2009-09-20 15:11:14 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' o ' , ' O ' , i + 1 ) ;
2009-09-20 15:11:14 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
if ( strncmp ( " BADLEN " , in , 6 ) = = 0 ) {
fprintf ( stderr , " Server got bad message length. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADIP " , in , 5 ) = = 0 ) {
fprintf ( stderr , " Server rejected sender IP address. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADCODEC " , in , 8 ) = = 0 ) {
fprintf ( stderr , " Server rejected the selected codec. " ) ;
goto codec_revert ;
2009-09-20 15:11:14 +00:00
}
2012-02-06 19:28:42 +00:00
in [ read ] = 0 ; /* zero terminate */
fprintf ( stderr , " Server switched downstream to codec %s \n " , in ) ;
return ;
}
2009-12-29 20:00:57 +00:00
2009-09-20 15:11:14 +00:00
fprintf ( stderr , " Retrying codec switch... \n " ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return ;
2009-09-20 15:11:14 +00:00
fprintf ( stderr , " No reply from server on codec switch. " ) ;
2014-06-01 06:34:18 +00:00
codec_revert :
2009-12-29 20:00:57 +00:00
fprintf ( stderr , " Falling back to downstream codec Base32 \n " ) ;
2009-09-20 15:11:14 +00:00
}
2009-09-20 21:10:44 +00:00
static void
handshake_try_lazy ( int dns_fd )
{
char in [ 4096 ] ;
int i ;
int read ;
fprintf ( stderr , " Switching to lazy mode for low-latency \n " ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-09-20 21:10:44 +00:00
2020-07-24 19:17:18 +00:00
send_lazy_switch ( dns_fd ) ;
2009-09-20 21:10:44 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' o ' , ' O ' , i + 1 ) ;
2009-09-20 21:10:44 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
if ( strncmp ( " BADLEN " , in , 6 ) = = 0 ) {
fprintf ( stderr , " Server got bad message length. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADIP " , in , 5 ) = = 0 ) {
fprintf ( stderr , " Server rejected sender IP address. " ) ;
goto codec_revert ;
} else if ( strncmp ( " BADCODEC " , in , 8 ) = = 0 ) {
fprintf ( stderr , " Server rejected lazy mode. " ) ;
goto codec_revert ;
} else if ( strncmp ( " Lazy " , in , 4 ) = = 0 ) {
fprintf ( stderr , " Server switched to lazy mode \n " ) ;
lazymode = 1 ;
return ;
2009-09-20 21:10:44 +00:00
}
2012-02-06 19:28:42 +00:00
}
2009-12-29 20:00:57 +00:00
2009-09-20 21:10:44 +00:00
fprintf ( stderr , " Retrying lazy mode switch... \n " ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return ;
fprintf ( stderr , " No reply from server on lazy switch. " ) ;
2009-09-20 21:10:44 +00:00
2014-06-01 06:34:18 +00:00
codec_revert :
2009-09-20 21:10:44 +00:00
fprintf ( stderr , " Falling back to legacy mode \n " ) ;
lazymode = 0 ;
selecttimeout = 1 ;
}
static void
handshake_lazyoff ( int dns_fd )
/* Used in the middle of data transfer, timing is different and no error msgs */
{
char in [ 4096 ] ;
int i ;
int read ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-09-20 21:10:44 +00:00
2020-07-24 19:17:18 +00:00
send_lazy_switch ( dns_fd ) ;
2009-09-20 21:10:44 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' o ' , ' O ' , 1 ) ;
2009-09-20 21:10:44 +00:00
2012-02-06 19:28:42 +00:00
if ( read = = 9 & & strncmp ( " Immediate " , in , 9 ) = = 0 ) {
warnx ( " Server switched back to legacy mode. \n " ) ;
lazymode = 0 ;
selecttimeout = 1 ;
return ;
}
2009-09-20 21:10:44 +00:00
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return ;
warnx ( " No reply from server on legacy mode switch. \n " ) ;
2009-09-20 21:10:44 +00:00
}
2009-09-20 15:11:14 +00:00
static int
fragsize_check ( char * in , int read , int proposed_fragsize , int * max_fragsize )
/* Returns: 0: keep checking, 1: break loop (either okay or definitely wrong) */
{
int acked_fragsize = ( ( in [ 0 ] & 0xff ) < < 8 ) | ( in [ 1 ] & 0xff ) ;
2009-12-29 20:00:57 +00:00
int okay ;
int i ;
unsigned int v ;
2009-09-20 15:11:14 +00:00
if ( read > = 5 & & strncmp ( " BADIP " , in , 5 ) = = 0 ) {
fprintf ( stderr , " got BADIP (Try iodined -c).. \n " ) ;
fflush ( stderr ) ;
return 0 ; /* maybe temporary error */
}
if ( acked_fragsize ! = proposed_fragsize ) {
/*
* got ack for wrong fragsize , maybe late response for
* earlier query , or ack corrupted
*/
return 0 ;
}
if ( read ! = proposed_fragsize ) {
/*
* correctly acked fragsize but read too little ( or too
* much ) : this fragsize is definitely not reliable
*/
return 1 ;
}
/* here: read == proposed_fragsize == acked_fragsize */
/* test: */
/* in[123] = 123; */
2009-12-29 20:00:57 +00:00
if ( ( in [ 2 ] & 0xff ) ! = 107 ) {
fprintf ( stderr , " \n " ) ;
warnx ( " corruption at byte 2, this won't work. Try -O Base32, or other -T options. " ) ;
* max_fragsize = - 1 ;
return 1 ;
}
2009-09-20 15:11:14 +00:00
/* Check for corruption */
2009-12-29 20:00:57 +00:00
okay = 1 ;
v = in [ 3 ] & 0xff ;
2009-09-20 15:11:14 +00:00
2012-02-06 19:28:42 +00:00
for ( i = 3 ; i < read ; i + + , v = ( v + 107 ) & 0xff )
if ( ( in [ i ] & 0xff ) ! = v ) {
okay = 0 ;
break ;
}
2009-09-20 15:11:14 +00:00
2012-02-06 19:28:42 +00:00
if ( okay ) {
fprintf ( stderr , " %d ok.. " , acked_fragsize ) ;
fflush ( stderr ) ;
* max_fragsize = acked_fragsize ;
return 1 ;
} else {
if ( downenc ! = ' ' & & downenc ! = ' T ' ) {
fprintf ( stderr , " %d corrupted at %d.. (Try -O Base32) \n " , acked_fragsize , i ) ;
2009-09-20 15:11:14 +00:00
} else {
2012-02-06 19:28:42 +00:00
fprintf ( stderr , " %d corrupted at %d.. " , acked_fragsize , i ) ;
2009-09-20 15:11:14 +00:00
}
2012-02-06 19:28:42 +00:00
fflush ( stderr ) ;
return 1 ;
}
2009-09-20 15:11:14 +00:00
2009-12-29 20:00:57 +00:00
/* notreached */
2009-09-20 15:11:14 +00:00
return 1 ;
}
2009-08-16 12:30:26 +00:00
static int
handshake_autoprobe_fragsize ( int dns_fd )
{
char in [ 4096 ] ;
int i ;
int read ;
int proposed_fragsize = 768 ;
int range = 768 ;
2009-09-20 15:11:14 +00:00
int max_fragsize ;
2009-08-16 12:30:26 +00:00
max_fragsize = 0 ;
2014-06-01 06:34:18 +00:00
fprintf ( stderr , " Autoprobing max downstream fragment size... (skip with -m fragsize) \n " ) ;
2009-09-20 15:11:14 +00:00
while ( running & & range > 0 & & ( range > = 8 | | max_fragsize < 300 ) ) {
/* stop the slow probing early when we have enough bytes anyway */
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 3 ; i + + ) {
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
send_fragsize_probe ( dns_fd , proposed_fragsize ) ;
2009-08-16 12:30:26 +00:00
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' r ' , ' R ' , 1 ) ;
2014-06-01 06:34:18 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
/* We got a reply */
if ( fragsize_check ( in , read , proposed_fragsize , & max_fragsize ) = = 1 )
break ;
}
2009-12-29 20:00:57 +00:00
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " . " ) ;
fflush ( stderr ) ;
}
2009-12-29 20:00:57 +00:00
if ( max_fragsize < 0 )
break ;
2009-08-16 12:30:26 +00:00
range > > = 1 ;
if ( max_fragsize = = proposed_fragsize ) {
/* Try bigger */
proposed_fragsize + = range ;
} else {
/* Try smaller */
fprintf ( stderr , " %d not ok.. " , proposed_fragsize ) ;
fflush ( stderr ) ;
proposed_fragsize - = range ;
}
}
if ( ! running ) {
fprintf ( stderr , " \n " ) ;
2009-09-20 15:11:14 +00:00
warnx ( " stopped while autodetecting fragment size (Try setting manually with -m) " ) ;
2009-08-16 12:30:26 +00:00
return 0 ;
}
2009-09-20 15:11:14 +00:00
if ( max_fragsize < = 2 ) {
2009-12-29 20:00:57 +00:00
/* Tried all the way down to 2 and found no good size.
But we _did_ do all handshake before this , so there must
be some workable connection . */
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " \n " ) ;
2009-12-29 20:00:57 +00:00
warnx ( " found no accepted fragment size. " ) ;
warnx ( " try setting -M to 200 or lower, or try other -T or -O options. " ) ;
2009-08-16 12:30:26 +00:00
return 0 ;
}
2009-09-20 15:11:14 +00:00
/* data header adds 2 bytes */
fprintf ( stderr , " will use %d-2=%d \n " , max_fragsize , max_fragsize - 2 ) ;
2009-12-29 20:00:57 +00:00
/* need 1200 / 16frags = 75 bytes fragsize */
if ( max_fragsize < 82 ) {
fprintf ( stderr , " Note: this probably won't work well. \n " ) ;
fprintf ( stderr , " Try setting -M to 200 or lower, or try other DNS types (-T option). \n " ) ;
} else if ( max_fragsize < 202 & &
2014-06-09 18:05:29 +00:00
( do_qtype = = T_NULL | | do_qtype = = T_PRIVATE | | do_qtype = = T_TXT | |
2009-12-29 20:00:57 +00:00
do_qtype = = T_SRV | | do_qtype = = T_MX ) ) {
fprintf ( stderr , " Note: this isn't very much. \n " ) ;
fprintf ( stderr , " Try setting -M to 200 or lower, or try other DNS types (-T option). \n " ) ;
}
2009-09-20 15:11:14 +00:00
return max_fragsize - 2 ;
2009-08-16 12:30:26 +00:00
}
static void
handshake_set_fragsize ( int dns_fd , int fragsize )
{
char in [ 4096 ] ;
int i ;
int read ;
fprintf ( stderr , " Setting downstream fragment size to max %d... \n " , fragsize ) ;
2020-07-24 17:04:50 +00:00
for ( i = 0 ; running & & i < 5 ; i + + ) {
2009-08-16 12:30:26 +00:00
send_set_downstream_fragsize ( dns_fd , fragsize ) ;
2009-12-29 20:00:57 +00:00
read = handshake_waitdns ( dns_fd , in , sizeof ( in ) , ' n ' , ' N ' , i + 1 ) ;
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( read > 0 ) {
2009-08-16 12:30:26 +00:00
2012-02-06 19:28:42 +00:00
if ( strncmp ( " BADFRAG " , in , 7 ) = = 0 ) {
fprintf ( stderr , " Server rejected fragsize. Keeping default. " ) ;
return ;
} else if ( strncmp ( " BADIP " , in , 5 ) = = 0 ) {
fprintf ( stderr , " Server rejected sender IP address. \n " ) ;
2009-08-16 12:30:26 +00:00
return ;
}
2012-02-06 19:28:42 +00:00
2014-01-29 18:33:54 +00:00
/* The server returns the accepted fragsize:
accepted_fragsize = ( ( in [ 0 ] & 0xff ) < < 8 ) | ( in [ 1 ] & 0xff ) */
2012-02-06 19:28:42 +00:00
return ;
}
2009-12-29 20:00:57 +00:00
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " Retrying set fragsize... \n " ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return ;
2009-08-16 12:30:26 +00:00
fprintf ( stderr , " No reply from server when setting fragsize. Keeping default. \n " ) ;
}
int
client_handshake ( int dns_fd , int raw_mode , int autodetect_frag_size , int fragsize )
{
int seed ;
2009-12-29 20:00:57 +00:00
int upcodec ;
2009-08-16 12:30:26 +00:00
int r ;
2009-12-29 20:00:57 +00:00
dnsc_use_edns0 = 0 ;
/* qtype message printed in handshake function */
if ( do_qtype = = T_UNSET ) {
r = handshake_qtype_autodetect ( dns_fd ) ;
if ( r ) {
return r ;
}
}
2014-06-09 16:11:16 +00:00
fprintf ( stderr , " Using DNS type %s queries \n " , client_get_qtype ( ) ) ;
2009-12-29 20:00:57 +00:00
2009-08-16 12:30:26 +00:00
r = handshake_version ( dns_fd , & seed ) ;
if ( r ) {
return r ;
}
r = handshake_login ( dns_fd , seed ) ;
if ( r ) {
return r ;
}
if ( raw_mode & & handshake_raw_udp ( dns_fd , seed ) ) {
conn = CONN_RAW_UDP ;
2009-09-20 21:10:44 +00:00
selecttimeout = 20 ;
2009-08-16 12:30:26 +00:00
} else {
if ( raw_mode = = 0 ) {
fprintf ( stderr , " Skipping raw mode \n " ) ;
}
2009-12-29 20:00:57 +00:00
dnsc_use_edns0 = 1 ;
if ( handshake_edns0_check ( dns_fd ) & & running ) {
fprintf ( stderr , " Using EDNS0 extension \n " ) ;
} else if ( ! running ) {
return - 1 ;
} else {
fprintf ( stderr , " DNS relay does not support EDNS0 extension \n " ) ;
dnsc_use_edns0 = 0 ;
}
upcodec = handshake_upenc_autodetect ( dns_fd ) ;
if ( ! running )
return - 1 ;
if ( upcodec = = 1 ) {
handshake_switch_codec ( dns_fd , 6 ) ;
} else if ( upcodec = = 2 ) {
handshake_switch_codec ( dns_fd , 26 ) ;
} else if ( upcodec = = 3 ) {
handshake_switch_codec ( dns_fd , 7 ) ;
}
if ( ! running )
return - 1 ;
if ( downenc = = ' ' ) {
downenc = handshake_downenc_autodetect ( dns_fd ) ;
2009-08-16 12:30:26 +00:00
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return - 1 ;
2009-08-16 12:30:26 +00:00
2009-09-20 15:11:14 +00:00
if ( downenc ! = ' ' ) {
handshake_switch_downenc ( dns_fd ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return - 1 ;
2009-09-20 15:11:14 +00:00
2009-09-20 21:10:44 +00:00
if ( lazymode ) {
handshake_try_lazy ( dns_fd ) ;
}
2009-12-29 20:00:57 +00:00
if ( ! running )
return - 1 ;
2009-09-20 21:10:44 +00:00
2009-08-16 12:30:26 +00:00
if ( autodetect_frag_size ) {
fragsize = handshake_autoprobe_fragsize ( dns_fd ) ;
if ( ! fragsize ) {
return 1 ;
}
}
handshake_set_fragsize ( dns_fd , fragsize ) ;
2009-12-29 20:00:57 +00:00
if ( ! running )
return - 1 ;
2009-08-16 12:30:26 +00:00
}
return 0 ;
}