summaryrefslogtreecommitdiff
path: root/src/dns.cpp
diff options
context:
space:
mode:
authorbrain <brain@e03df62e-2008-0410-955e-edbf42e46eb7>2005-04-01 17:08:31 +0000
committerbrain <brain@e03df62e-2008-0410-955e-edbf42e46eb7>2005-04-01 17:08:31 +0000
commitade5e948783377dfb7820f8ba8957fe9ae0e3147 (patch)
treefbf21b8743670d3b17488ad38bc84fac3cd776ff /src/dns.cpp
parentf326e475e311bf0fa211ccd052ba38d8235efa12 (diff)
Added nonblocking dns
*** BUG BUG BUG - If dns is slow, things will go wrong!!!! do not use this on a live net without accepting the risk involved! *** Will be fixed by next commit. git-svn-id: http://svn.inspircd.org/repository/trunk/inspircd@938 e03df62e-2008-0410-955e-edbf42e46eb7
Diffstat (limited to 'src/dns.cpp')
-rw-r--r--src/dns.cpp716
1 files changed, 716 insertions, 0 deletions
diff --git a/src/dns.cpp b/src/dns.cpp
new file mode 100644
index 000000000..ffde3f2a1
--- /dev/null
+++ b/src/dns.cpp
@@ -0,0 +1,716 @@
+/*
+dns.cpp - based on the dns library Copyright (C) 2002 Ian Gulliver
+
+This program is free software; you can redistribute it and/or modify
+it under the terms of version 2 of the GNU General Public License as
+published by the Free Software Foundation.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with this program; if not, write to the Free Software
+Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+*/
+
+#define _DNS_C
+
+#include <string>
+#include <stdlib.h>
+#include <time.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <sys/time.h>
+#include <string.h>
+#include <unistd.h>
+#include <stdio.h>
+#include <errno.h>
+#include <fcntl.h>
+#include "dns.h"
+
+static const char tagstring[] = "$Id$";
+
+#define max(a,b) (a > b ? a : b)
+#define DNS_MAX 8 /* max number of nameservers used */
+#define DNS_CONFIG_FBCK "/etc/resolv.conf" /* fallback config file */
+#define DNS_PORT 53 /* DNS well known port */
+#define DNS_QRY_A 1 /* name to IP address */
+#define DNS_QRY_AAAA 28 /* name to IP6 address */
+#define DNS_QRY_PTR 12 /* IP address to name */
+#define DNS_QRY_MX 15 /* name to MX */
+#define DNS_QRY_TXT 16 /* name to TXT */
+#define DNS_QRY_CNAME 5
+
+#define DNS_ALIGN (sizeof(void *) > sizeof(long) ? sizeof(void *) : sizeof(long))
+#define DNS_TRIES 3
+#define RESULTSIZE 1024
+#define min(a,b) (a < b ? a : b)
+
+static struct in_addr servers4[DNS_MAX]; /* up to DNS_MAX nameservers; populated by dns_init() */
+static int i4; /* actual count of nameservers; set by dns_init() */
+
+static int initdone = 0; /* to ensure dns_init() only runs once (on the first call) */
+static int wantclose = 0;
+static int lastcreate = -1;
+
+struct s_connection { /* open DNS query */
+ struct s_connection *next; /* next in list */
+ unsigned char id[2];
+ unsigned int _class;
+ unsigned int type;
+ int want_list;
+ int fd; /* file descriptor returned from sockets */
+};
+
+struct s_rr_middle {
+ unsigned int type;
+ unsigned int _class;
+ unsigned long ttl;
+ unsigned int rdlength;
+};
+
+#define DNS_POINTER_VALUE 0xc000
+
+static s_connection *connection_head = NULL; /* linked list of open DNS queries; populated by dns_add_query(), decimated by dns_getresult_s() */
+
+struct s_header { /* DNS query header */
+ unsigned char id[2];
+ unsigned int flags1;
+#define FLAGS1_MASK_QR 0x80
+#define FLAGS1_MASK_OPCODE 0x78 /* bitshift right 3 */
+#define FLAGS1_MASK_AA 0x04
+#define FLAGS1_MASK_TC 0x02
+#define FLAGS1_MASK_RD 0x01
+ unsigned int flags2;
+#define FLAGS2_MASK_RA 0x80
+#define FLAGS2_MASK_Z 0x70
+#define FLAGS2_MASK_RCODE 0x0f
+ unsigned int qdcount;
+ unsigned int ancount;
+ unsigned int nscount;
+ unsigned int arcount;
+ unsigned char payload[512]; /* DNS question, populated by dns_build_query_payload() */
+};
+
+void *dns_align(void *inp) {
+ char *p = (char*)inp;
+ int offby = ((char *)p - (char *)0) % DNS_ALIGN;
+ if (offby != 0)
+ return p + (DNS_ALIGN - offby);
+ else
+ return p;
+}
+
+/*
+ * These little hacks are here to avoid alignment and type sizing issues completely by doing manual copies
+ */
+void dns_fill_rr(s_rr_middle* rr, const unsigned char *input) {
+ rr->type = input[0] * 256 + input[1];
+ rr->_class = input[2] * 256 + input[3];
+ rr->ttl = input[4] * 16777216 + input[5] * 65536 + input[6] * 256 + input[7];
+ rr->rdlength = input[8] * 256 + input[9];
+}
+
+void dns_fill_header(s_header *header, const unsigned char *input, const int l) {
+ header->id[0] = input[0];
+ header->id[1] = input[1];
+ header->flags1 = input[2];
+ header->flags2 = input[3];
+ header->qdcount = input[4] * 256 + input[5];
+ header->ancount = input[6] * 256 + input[7];
+ header->nscount = input[8] * 256 + input[9];
+ header->arcount = input[10] * 256 + input[11];
+ memcpy(header->payload,&input[12],l);
+}
+
+void dns_empty_header(unsigned char *output, const s_header *header, const int l) {
+ output[0] = header->id[0];
+ output[1] = header->id[1];
+ output[2] = header->flags1;
+ output[3] = header->flags2;
+ output[4] = header->qdcount / 256;
+ output[5] = header->qdcount % 256;
+ output[6] = header->ancount / 256;
+ output[7] = header->ancount % 256;
+ output[8] = header->nscount / 256;
+ output[9] = header->nscount % 256;
+ output[10] = header->arcount / 256;
+ output[11] = header->arcount % 256;
+ memcpy(&output[12],header->payload,l);
+}
+
+void dns_close(int fd) { /* close query */
+ if (fd == lastcreate) {
+ wantclose = 1;
+ return;
+ }
+ close(fd);
+ return;
+}
+
+void DNS::dns_init() { /* on first call only: populates servers4 struct with up to DNS_MAX nameserver IP addresses from /etc/resolv.conf */
+ FILE *f;
+ int i;
+ in_addr addr4;
+ char buf[1024];
+ if (initdone == 1)
+ return;
+ i4 = 0;
+
+ initdone = 1;
+ srand((unsigned int) time(NULL));
+ memset(servers4,'\0',sizeof(in_addr) * DNS_MAX);
+ f = fopen(DNS_CONFIG_FBCK,"r");
+ if (f == NULL)
+ return;
+ while (fgets(buf,1024,f) != NULL) {
+ if (strncmp(buf,"nameserver",10) == 0) {
+ i = 10;
+ while (buf[i] == ' ' || buf[i] == '\t')
+ i++;
+ if (i4 < DNS_MAX) {
+ if (dns_aton4_s(&buf[i],&addr4) != NULL)
+ memcpy(&servers4[i4++],&addr4,sizeof(in_addr));
+ }
+ }
+ }
+ fclose(f);
+
+}
+
+void DNS::dns_init_2(const char* dnsserver) { /* populates servers4 struct with address from the given parameter */
+ FILE *f;
+ int i;
+ in_addr addr4;
+ char buf[1024];
+ if (initdone == 1)
+ return;
+ i4 = 0;
+
+ initdone = 1;
+ srand((unsigned int) time(NULL));
+ memset(servers4,'\0',sizeof(in_addr) * DNS_MAX);
+ if (dns_aton4_s(dnsserver,&addr4) != NULL)
+ memcpy(&servers4[i4++],&addr4,sizeof(in_addr));
+}
+
+
+static int dns_send_requests(const s_header *h, const s_connection *s, const int l) { /* send DNS query */
+ int i;
+ sockaddr_in addr4;
+ unsigned char payload[sizeof(s_header)];
+
+ dns_empty_header(payload,h,l);
+
+
+ for (i = 0; i < i4; i++) {
+ /* otherwise send via standard ipv4 boringness */
+ memset(&addr4,0,sizeof(addr4));
+ memcpy(&addr4.sin_addr,&servers4[i],sizeof(addr4.sin_addr));
+ addr4.sin_family = AF_INET;
+ addr4.sin_port = htons(DNS_PORT);
+ sendto(s->fd, payload, l + 12, 0, (sockaddr *) &addr4, sizeof(addr4));
+ }
+
+ return 0;
+}
+
+static s_connection *dns_add_query(s_header *h) { /* build DNS query, add to list */
+ s_connection * s;
+
+ s = new s_connection;
+
+ /* set header flags */
+ h->id[0] = s->id[0] = rand() % 255; /* verified by dns_getresult_s() */
+ h->id[1] = s->id[1] = rand() % 255;
+ h->flags1 = 0 | FLAGS1_MASK_RD;
+ h->flags2 = 0;
+ h->qdcount = 1;
+ h->ancount = 0;
+ h->nscount = 0;
+ h->arcount = 0;
+
+ /* turn off want_list by default */
+ s->want_list = 0;
+
+ /* try to create ipv6 or ipv4 socket */
+ s->fd = socket(PF_INET, SOCK_DGRAM, 0);
+ if (s->fd != -1) {
+ if (fcntl(s->fd, F_SETFL, O_NONBLOCK) != 0) {
+ close(s->fd);
+ s->fd = -1;
+ }
+ }
+ if (s->fd != -1) {
+ sockaddr_in addr;
+ memset(&addr,0,sizeof(addr));
+ addr.sin_family = AF_INET;
+ addr.sin_port = 0;
+ addr.sin_addr.s_addr = INADDR_ANY;
+ if (bind(s->fd,(sockaddr *)&addr,sizeof(addr)) != 0) {
+ close(s->fd);
+ s->fd = -1;
+ }
+ }
+ if (s->fd == -1) {
+ free(s);
+ return NULL;
+ }
+ /* create new connection object, add to linked list */
+ s->next = connection_head;
+ connection_head = s;
+
+ if (wantclose == 1) {
+ close(lastcreate);
+ wantclose = 0;
+ }
+ lastcreate = s->fd;
+ return s;
+}
+
+static int dns_build_query_payload(const char * const name, const unsigned short rr, const unsigned short _class, unsigned char * const payload) {
+ short payloadpos;
+ const char * tempchr, * tempchr2;
+ unsigned short l;
+
+ payloadpos = 0;
+ tempchr2 = name;
+
+ /* split name up into labels, create query */
+ while ((tempchr = strchr(tempchr2,'.')) != NULL) {
+ l = tempchr - tempchr2;
+ if (payloadpos + l + 1 > 507)
+ return -1;
+ payload[payloadpos++] = l;
+ memcpy(&payload[payloadpos],tempchr2,l);
+ payloadpos += l;
+ tempchr2 = &tempchr[1];
+ }
+ l = strlen(tempchr2);
+ if (l) {
+ if (payloadpos + l + 2 > 507)
+ return -1;
+ payload[payloadpos++] = l;
+ memcpy(&payload[payloadpos],tempchr2,l);
+ payloadpos += l;
+ payload[payloadpos++] = '\0';
+ }
+ if (payloadpos > 508)
+ return -1;
+ l = htons(rr);
+ memcpy(&payload[payloadpos],&l,2);
+ l = htons(_class);
+ memcpy(&payload[payloadpos + 2],&l,2);
+ return payloadpos + 4;
+}
+
+in_addr* DNS::dns_aton4(const char * const ipstring) { /* ascii to numeric: convert string to static 4part IP addr struct */
+ in_addr ip;
+ return dns_aton4_s(ipstring,&ip);
+}
+
+in_addr* DNS::dns_aton4_r(const char *ipstring) { /* ascii to numeric (reentrant): convert string to new 4part IP addr struct */
+ in_addr* ip;
+ ip = new in_addr;
+ if(dns_aton4_s(ipstring,ip) == NULL) {
+ free(ip);
+ return NULL;
+ }
+ return ip;
+}
+
+in_addr* DNS::dns_aton4_s(const char *ipstring, in_addr *ip) { /* ascii to numeric (buffered): convert string to given 4part IP addr struct */
+ unsigned char *myip;
+ int i,part = 0;
+ myip = (unsigned char *)ip;
+
+ memset(myip,'\0',4);
+ for (i = 0; i < 16; i++) {
+ switch (ipstring[i]) {
+ case '\0':
+ if (part != 3)
+ return NULL;
+ return ip;
+ break;
+ case '0':
+ case '1':
+ case '2':
+ case '3':
+ case '4':
+ case '5':
+ case '6':
+ case '7':
+ case '8':
+ case '9':
+ if (myip[part] > 25)
+ return NULL;
+ myip[part] *= 10;
+ if (myip[part] == 250 && ipstring[i] - '0' > 6)
+ return NULL;
+ myip[part] += ipstring[i] - '0';
+ break;
+ case '.':
+ if (part == 3)
+ return ip;
+ else
+ part++;
+ break;
+ default:
+ if (part == 3)
+ return ip;
+ else
+ return NULL;
+ break;
+ }
+ }
+ if (part == 3)
+ return ip;
+ else
+ return NULL;
+}
+
+int DNS::dns_getip4(const char *name) { /* build, add and send A query; retrieve result with dns_getresult() */
+ s_header h;
+ s_connection *s;
+ int l;
+
+ dns_init();
+
+
+ l = dns_build_query_payload(name,DNS_QRY_A,1,(unsigned char *)&h.payload);
+ if (l == -1)
+ return -1;
+ s = dns_add_query(&h);
+ if (s == NULL)
+ return -1;
+ s->_class = 1;
+ s->type = DNS_QRY_A;
+ if (dns_send_requests(&h,s,l) == -1)
+ return -1;
+
+ return s->fd;
+}
+
+int DNS::dns_getip4list(const char *name) { /* build, add and send A query; retrieve result with dns_getresult() */
+ s_header h;
+ s_connection *s;
+ int l;
+
+ dns_init();
+
+
+ l = dns_build_query_payload(name,DNS_QRY_A,1,(unsigned char *)&h.payload);
+ if (l == -1)
+ return -1;
+ s = dns_add_query(&h);
+ if (s == NULL)
+ return -1;
+ s->_class = 1;
+ s->type = DNS_QRY_A;
+ s->want_list = 1;
+ if (dns_send_requests(&h,s,l) == -1)
+ return -1;
+
+ return s->fd;
+}
+
+int DNS::dns_getname4(const in_addr *ip) { /* build, add and send PTR query; retrieve result with dns_getresult() */
+ char query[512];
+ s_header h;
+ s_connection * s;
+ unsigned char *c;
+ int l;
+
+ dns_init();
+
+ c = (unsigned char *)&ip->s_addr;
+
+ sprintf(query,"%d.%d.%d.%d.in-addr.arpa",c[3],c[2],c[1],c[0]);
+
+ l = dns_build_query_payload(query,DNS_QRY_PTR,1,(unsigned char *)&h.payload);
+ if (l == -1)
+ return -1;
+ s = dns_add_query(&h);
+ if (s == NULL)
+ return -1;
+ s->_class = 1;
+ s->type = DNS_QRY_PTR;
+ if (dns_send_requests(&h,s,l) == -1)
+ return -1;
+
+ return s->fd;
+}
+
+char* DNS::dns_ntoa4(const in_addr * const ip) { /* numeric to ascii: convert 4part IP addr struct to static string */
+ static char result[256];
+ return dns_ntoa4_s(ip,result);
+}
+
+char* DNS::dns_ntoa4_r(const in_addr *ip) { /* numeric to ascii (reentrant): convert 4part IP addr struct to new string */
+ char *result;
+ result = new char[256];
+ return dns_ntoa4_s(ip,result);
+}
+
+char* DNS::dns_ntoa4_s(const in_addr *ip, char *result) { /* numeric to ascii (buffered): convert 4part IP addr struct to given string */
+ unsigned char *m;
+ m = (unsigned char *)&ip->s_addr;
+ sprintf(result,"%d.%d.%d.%d",m[0],m[1],m[2],m[3]);
+ return result;
+}
+
+char* DNS::dns_getresult(const int fd) { /* retrieve result of DNS query */
+ static char result[RESULTSIZE];
+ return dns_getresult_s(fd,result);
+}
+
+char* DNS::dns_getresult_r(const int fd) { /* retrieve result of DNS query (reentrant) */
+ char *result;
+ result = new char[RESULTSIZE];
+ if(dns_getresult_s(fd,result) == NULL) {
+ free(result);
+ return NULL;
+ }
+ return result;
+}
+
+char* DNS::dns_getresult_s(const int fd, char *result) { /* retrieve result of DNS query (buffered) */
+ s_header h;
+ s_connection *c, *prev;
+ int l,i,q,curanswer,o;
+ s_rr_middle rr;
+ unsigned char buffer[sizeof(s_header)];
+ unsigned short p;
+
+ prev = NULL;
+ c = connection_head;
+ while (c != NULL) { /* find query in list of open queries */
+ if (c->fd == fd)
+ break;
+ prev = c;
+ c = c->next;
+ }
+ if (c == NULL) {
+ return NULL; /* query not found */
+ }
+ /* query found-- pull from list: */
+ if (prev != NULL)
+ prev->next = c->next;
+ else
+ connection_head = c->next;
+
+ l = recv(c->fd,buffer,sizeof(s_header),0);
+ dns_close(c->fd);
+ if (l < 12) {
+ free(c);
+ return NULL;
+ }
+ dns_fill_header(&h,buffer,l - 12);
+ if (c->id[0] != h.id[0] || c->id[1] != h.id[1]) {
+ free(c);
+ return NULL; /* ID mismatch */
+ }
+ if ((h.flags1 & FLAGS1_MASK_QR) == 0) {
+ free(c);
+ return NULL;
+ }
+ if ((h.flags1 & FLAGS1_MASK_OPCODE) != 0) {
+ free(c);
+ return NULL;
+ }
+ if ((h.flags2 & FLAGS2_MASK_RCODE) != 0) {
+ free(c);
+ return NULL;
+ }
+ if (h.ancount < 1) { /* no sense going on if we don't have any answers */
+ free(c);
+ return NULL;
+ }
+ /* skip queries */
+ i = 0;
+ q = 0;
+ l -= 12;
+ while (q < h.qdcount && i < l) {
+ if (h.payload[i] > 63) { /* pointer */
+ i += 6; /* skip pointer, _class and type */
+ q++;
+ } else { /* label */
+ if (h.payload[i] == 0) {
+ q++;
+ i += 5; /* skip nil, _class and type */
+ } else
+ i += h.payload[i] + 1; /* skip length and label */
+ }
+ }
+ /* &h.payload[i] should now be the start of the first response */
+ curanswer = 0;
+ while (curanswer < h.ancount) {
+ q = 0;
+ while (q == 0 && i < l) {
+ if (h.payload[i] > 63) { /* pointer */
+ i += 2; /* skip pointer */
+ q = 1;
+ } else { /* label */
+ if (h.payload[i] == 0) {
+ i++;
+ q = 1;
+ } else
+ i += h.payload[i] + 1; /* skip length and label */
+ }
+ }
+ if (l - i < 10) {
+ free(c);
+ return NULL;
+ }
+ dns_fill_rr(&rr,&h.payload[i]);
+ i += 10;
+ if (rr.type != c->type) {
+ curanswer++;
+ i += rr.rdlength;
+ continue;
+ }
+ if (rr._class != c->_class) {
+ curanswer++;
+ i += rr.rdlength;
+ continue;
+ }
+ break;
+ }
+ if (curanswer == h.ancount)
+ return NULL;
+ if (i + rr.rdlength > l)
+ return NULL;
+ if (rr.rdlength > 1023)
+ return NULL;
+
+ switch (rr.type) {
+ case DNS_QRY_PTR:
+ o = 0;
+ q = 0;
+ while (q == 0 && i < l && o + 256 < 1023) {
+ if (h.payload[i] > 63) { /* pointer */
+ memcpy(&p,&h.payload[i],2);
+ i = ntohs(p) - DNS_POINTER_VALUE - 12;
+ } else { /* label */
+ if (h.payload[i] == 0)
+ q = 1;
+ else {
+ result[o] = '\0';
+ if (o != 0)
+ result[o++] = '.';
+ memcpy(&result[o],&h.payload[i + 1],h.payload[i]);
+ o += h.payload[i];
+ i += h.payload[i] + 1;
+ }
+ }
+ }
+ result[o] = '\0';
+ break;
+ case DNS_QRY_A:
+ if (c->want_list) {
+ dns_ip4list *alist = (dns_ip4list *) result; /* we have to trust that this is aligned */
+ while ((char *)alist - (char *)result < 700) {
+ if (rr.type != DNS_QRY_A)
+ break;
+ if (rr._class != 1)
+ break;
+ if (rr.rdlength != 4) {
+ free(c);
+ return NULL;
+ }
+ memcpy(&alist->ip,&h.payload[i],4);
+ if (++curanswer >= h.ancount)
+ break;
+ i += rr.rdlength;
+ {
+ /* skip next name */
+ q = 0;
+ while (q == 0 && i < l) {
+ if (h.payload[i] > 63) { /* pointer */
+ i += 2; /* skip pointer */
+ q = 1;
+ } else { /* label */
+ if (h.payload[i] == 0) {
+ i++;
+ q = 1;
+ } else
+ i += h.payload[i] + 1; /* skip length and label */
+ }
+ }
+ }
+ if (l - i < 10) {
+ free(c);
+ return NULL;
+ }
+ dns_fill_rr(&rr,&h.payload[i]);
+ i += 10;
+ alist->next = (dns_ip4list *) dns_align(((char *) alist) + sizeof(dns_ip4list));
+ alist = alist->next;
+ alist->next = NULL;
+ }
+ alist->next = NULL;
+ break;
+ }
+ goto defaultcase;
+ break;
+ default:
+ defaultcase:
+ memcpy(result,&h.payload[i],rr.rdlength);
+ result[rr.rdlength] = '\0';
+ break;
+ }
+ free(c);
+ return result;
+}
+
+DNS::DNS()
+{
+ dns_init();
+}
+
+DNS::DNS(std::string dnsserver)
+{
+ dns_init_2(dnsserver.c_str());
+}
+
+DNS::~DNS()
+{
+}
+
+bool DNS::ReverseLookup(std::string ip)
+{
+ binip = dns_aton4(ip.c_str());
+ if (binip == NULL) {
+ fprintf(stderr,"invalid IP address.\n");
+ return 2;
+ }
+ this->fd = dns_getname4(binip);
+}
+
+bool DNS::ForwardLookup(std::string host)
+{
+}
+
+bool DNS::HasResult()
+{
+ fd_set fds;
+ FD_ZERO(&fds);
+ FD_SET(this->fd,&fds);
+ timeval tvs;
+ tvs.tv_usec = 0;
+ tvs.tv_sec = 0;
+ int result = select(this->fd+1, &fds, NULL, NULL, &tvs);
+ return (result > 0);
+}
+
+std::string DNS::GetResult()
+{
+ result = dns_getresult(this->fd);
+ if (result) {
+ return result;
+ } else {
+ return "";
+ }
+}