iodine/dnsd.c

424 lines
7.7 KiB
C
Raw Normal View History

2006-06-05 18:47:09 +00:00
/*
* Copyright (c) 2006 Bjorn Andersson <flex@kryo.se>, Erik Ekman <yarrick@kryo.se>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <arpa/nameser.h>
#include <netdb.h>
#include <time.h>
#include <err.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <ctype.h>
2006-06-06 15:34:45 +00:00
#include <sys/stat.h>
#include <fcntl.h>
2006-06-05 18:47:09 +00:00
#include "dns.h"
static int host2dns(const char *, char *, int);
struct sockaddr_in peer;
char topdomain[256];
2006-06-05 21:59:57 +00:00
// Current IP packet
int packetlen;
2006-06-05 22:36:05 +00:00
char activepacket[4096];
2006-06-06 02:27:10 +00:00
int outid;
2006-06-05 22:36:05 +00:00
int outbuflen;
char outbuf[64*1024];
2006-06-06 12:36:12 +00:00
char delayed_q_name[256];
short delayed_q_type;
short delayed_q_id;
struct sockaddr_in delayed_q_from;
int delayed_q_fromlen;
2006-06-05 21:59:57 +00:00
2006-06-05 18:47:09 +00:00
static int
readname(char *packet, char *dst, char *src)
{
char l;
int len;
int offset;
len = 0;
while(*src) {
l = *src++;
len++;
if(l & 0x80 && l & 0x40) {
offset = ((src[-1] & 0x3f) << 8) | src[0];
readname(packet, dst, packet + offset);
dst += strlen(dst);
break;
}
while(l) {
*dst++ = *src++;
l--;
len++;
}
*dst++ = '.';
}
*dst = '\0';
src++;
len++;
return len;
}
#define READNAME(packet, dst, src) (src) += readname((packet), (dst), (src));
#define READSHORT(dst, src) \
(dst) = ntohs(*(short*)(src)); (src)+=2;
#define READLONG(dst, src) \
(dst) = ntohl(*(long*)(src)); (src)+=4;
#define READDATA(dst, src, len) \
memcpy((dst), (src), (len)); (src)+=(len);
int
open_dnsd(const char *domain)
{
int fd;
int flag;
struct sockaddr_in addr;
bzero(&addr, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_port = htons(53);
addr.sin_addr.s_addr = htonl(INADDR_ANY);
fd = socket(AF_INET, SOCK_DGRAM, 0);
if(fd < 0) {
warn("socket");
return 0;
}
flag = 1;
#ifdef SO_REUSEPORT
setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &flag, sizeof(flag));
#endif
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag));
if(bind(fd, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
warn("bind");
return 0;
}
printf("Opened UDP socket\n");
2006-06-05 21:59:57 +00:00
// Save top domain used
strncpy(topdomain, domain, sizeof(topdomain) - 2);
topdomain[sizeof(topdomain) - 1] = 0;
packetlen = 0;
2006-06-06 12:36:12 +00:00
delayed_q_type = 0;
delayed_q_id = 0;
delayed_q_fromlen = 0;
2006-06-05 18:47:09 +00:00
return fd;
}
void
close_dnsd(int fd)
{
close(fd);
}
static int
host2dns(const char *host, char *buffer, int size)
{
char *h;
char *p;
char *word;
h = strdup(host);
memset(buffer, 0, size);
p = buffer;
word = strtok(h, ".");
while(word) {
*p++ = (char)strlen(word);
memcpy(p, word, strlen(word));
p += strlen(word);
word = strtok(NULL, ".");
}
*p++ = 0;
free(h);
return p - buffer;
}
2006-06-05 22:36:05 +00:00
int
dnsd_haspacket()
{
return (outbuflen > 0);
}
2006-06-06 12:36:12 +00:00
int
dnsd_hasack()
{
return (delayed_q_id != 0);
}
2006-06-05 22:36:05 +00:00
void
dnsd_queuepacket(const char *buf, const int buflen)
{
memcpy(outbuf, buf, buflen);
outbuflen = buflen;
2006-06-06 02:27:10 +00:00
outid++;
2006-06-05 22:36:05 +00:00
}
2006-06-05 18:47:09 +00:00
static void
2006-06-06 12:36:12 +00:00
dnsd_send(int fd, char *name, short type, short id, struct sockaddr_in from)
2006-06-05 18:47:09 +00:00
{
int len;
char *p;
char buf[1024];
2006-06-06 00:17:28 +00:00
HEADER *header;
2006-06-05 18:47:09 +00:00
memset(buf, 0, sizeof(buf));
len = 0;
header = (HEADER*)buf;
2006-06-06 02:27:10 +00:00
header->id = htons(id);
2006-06-05 18:47:09 +00:00
header->qr = 1;
header->opcode = 0;
header->aa = 1;
header->tc = 0;
header->rd = 0;
header->ra = 0;
2006-06-06 02:27:10 +00:00
header->qdcount = htons(1);
header->ancount = htons(1);
2006-06-05 18:47:09 +00:00
p = buf + sizeof(HEADER);
2006-06-06 02:27:10 +00:00
p += host2dns(name, p, strlen(name));
PUTSHORT(type, p);
2006-06-05 18:47:09 +00:00
PUTSHORT(C_IN, p);
2006-06-06 02:27:10 +00:00
p += host2dns(name, p, strlen(name));
PUTSHORT(type, p);
PUTSHORT(C_IN, p);
PUTLONG(0, p);
2006-06-05 18:47:09 +00:00
2006-06-06 02:27:10 +00:00
if(outbuflen > 0) {
printf("%d\n", outid);
PUTSHORT(outbuflen, p);
memcpy(p, outbuf, outbuflen);
p += outbuflen;
} else {
PUTSHORT(0, p);
}
2006-06-06 00:07:25 +00:00
2006-06-05 18:47:09 +00:00
len = p - buf;
2006-06-06 00:39:29 +00:00
printf("Responding with %d\n", len);
2006-06-05 18:47:09 +00:00
sendto(fd, buf, len, 0, (struct sockaddr*)&from, sizeof(from));
2006-06-05 23:49:18 +00:00
outbuflen = 0;
2006-06-05 18:47:09 +00:00
}
2006-06-06 12:36:12 +00:00
void
dnsd_forceack(int fd)
{
dnsd_send(fd, delayed_q_name, delayed_q_type, delayed_q_id, delayed_q_from);
delayed_q_id = 0;
}
2006-06-06 15:34:45 +00:00
struct packet
{
int len;
int offset;
char data[64*1024];
};
static int
decodepacket(const char *name, struct packet *packet)
{
int r;
int len;
int last;
char *dp;
char *domain;
const char *np;
len = 0;
last = (name[0] == '1');
domain = strstr(name, topdomain);
if (domain) {
np = name + 1;
dp = packet->data + packet->offset;
while(np < domain) {
if(*np == '.') {
np++;
continue;
}
sscanf(np, "%02X", &r);
*dp++ = (char)r;
np+=2;
len++;
}
packet->len += len;
packet->offset += len;
}
if(last) {
int fd;
char fname[256];
static int num = 0;
snprintf(fname, 256, "moo%d", num++);
fd = open(fname, O_WRONLY | O_CREAT, S_IRGRP);
write(fd, packet->data, packet->len);
close(fd);
packet->len = packet->offset = 0;
}
return len;
}
struct packet packetbuf;
2006-06-05 18:47:09 +00:00
int
dnsd_read(int fd, char *buf, int buflen)
{
int r;
2006-06-05 20:05:11 +00:00
short id;
2006-06-05 18:47:09 +00:00
short type;
short class;
short qdcount;
char *data;
char name[255];
HEADER *header;
socklen_t addrlen;
char packet[64*1024];
struct sockaddr_in from;
2006-06-05 21:59:57 +00:00
char lastblock;
char *np;
char *domainstart;
int namelen;
char *packetp;
int datalen;
2006-06-05 18:47:09 +00:00
addrlen = sizeof(struct sockaddr);
r = recvfrom(fd, packet, sizeof(packet), 0, (struct sockaddr*)&from, &addrlen);
printf("Read %d bytes DNS query from %s\n", r, inet_ntoa(from.sin_addr));
if(r == -1) {
perror("recvfrom");
} else {
header = (HEADER*)packet;
2006-06-05 20:05:11 +00:00
id = ntohs(header->id);
2006-06-05 18:47:09 +00:00
data = packet + sizeof(HEADER);
if(!header->qr) {
qdcount = ntohs(header->qdcount);
2006-06-06 02:27:10 +00:00
if(qdcount == 1) {
2006-06-05 18:47:09 +00:00
bzero(name, sizeof(name));
READNAME(packet, name, data);
READSHORT(type, data);
READSHORT(class, data);
2006-06-06 12:36:12 +00:00
if (dnsd_haspacket()) {
dnsd_send(fd, name, type, id, from);
} else {
// Store needed info about delayed response
strncpy(delayed_q_name, name, 256);
delayed_q_type = type;
delayed_q_id = id;
delayed_q_fromlen = addrlen;
memcpy((struct sockaddr*)&delayed_q_from, (struct sockaddr*)&from, addrlen);
}
2006-06-06 15:34:45 +00:00
r = decodepacket(name, &packetbuf);
if(r < 10)
r = 0;
printf("r is %d\n", r);
memcpy(buf, packetbuf.data, r);
return r;
2006-06-06 02:27:10 +00:00
2006-06-05 21:59:57 +00:00
lastblock = name[0] - '0';
np = name;
np++; // skip first byte, it has only fragmentation info
domainstart = strstr(np, topdomain);
if (!domainstart) {
fprintf(stderr, "Resolved domain does not end with %s! Ignoring packet\n", topdomain);
return 0;
}
namelen = (int) domainstart - (int) np;
*domainstart = '\0';
packetp = activepacket;
packetp += packetlen;
while (np < domainstart && packetlen < sizeof(activepacket)) {
if (*np == '.') {
np++;
}
sscanf(np, "%02X", &r);
*packetp = r & 0xFF;
np += 2;
packetp++;
packetlen++;
}
2006-06-05 23:56:32 +00:00
if (lastblock && packetlen < 2) {
2006-06-05 23:46:42 +00:00
// Skipping ping packet
2006-06-05 23:56:32 +00:00
packetlen = 0;
2006-06-05 23:46:42 +00:00
return 0;
}
2006-06-05 21:59:57 +00:00
if (lastblock) {
datalen = MIN(packetlen, buflen);
memcpy(buf, activepacket, datalen);
packetlen = 0;
printf("Got full packet, returning %d bytes!\n", datalen);
return datalen;
} else {
return 0;
}
2006-06-05 18:47:09 +00:00
}
}
}
return 0;
}