You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

dns.c 29KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "contrib/librdns/rdns.h"
  17. #include "config.h"
  18. #include "dns.h"
  19. #include "rspamd.h"
  20. #include "utlist.h"
  21. #include "contrib/libev/ev.h"
  22. #include "contrib/librdns/rdns.h"
  23. #include "contrib/librdns/dns_private.h"
  24. #include "contrib/librdns/rdns_ev.h"
  25. #include "unix-std.h"
  26. #include <unicode/uidna.h>
  27. static const char *M = "rspamd dns";
  28. static struct rdns_upstream_elt *rspamd_dns_select_upstream(const char *name,
  29. size_t len, void *ups_data);
  30. static struct rdns_upstream_elt *rspamd_dns_select_upstream_retransmit(
  31. const char *name,
  32. size_t len,
  33. struct rdns_upstream_elt *prev_elt,
  34. void *ups_data);
  35. static void rspamd_dns_upstream_ok(struct rdns_upstream_elt *elt,
  36. void *ups_data);
  37. static void rspamd_dns_upstream_fail(struct rdns_upstream_elt *elt,
  38. void *ups_data, const char *reason);
  39. static unsigned int rspamd_dns_upstream_count(void *ups_data);
  40. static struct rdns_upstream_context rspamd_ups_ctx = {
  41. .select = rspamd_dns_select_upstream,
  42. .select_retransmit = rspamd_dns_select_upstream_retransmit,
  43. .ok = rspamd_dns_upstream_ok,
  44. .fail = rspamd_dns_upstream_fail,
  45. .count = rspamd_dns_upstream_count,
  46. .data = NULL};
  47. struct rspamd_dns_request_ud {
  48. struct rspamd_async_session *session;
  49. dns_callback_type cb;
  50. gpointer ud;
  51. rspamd_mempool_t *pool;
  52. struct rspamd_task *task;
  53. struct rspamd_symcache_dynamic_item *item;
  54. struct rdns_request *req;
  55. struct rdns_reply *reply;
  56. };
  57. struct rspamd_dns_fail_cache_entry {
  58. const char *name;
  59. int32_t namelen;
  60. enum rdns_request_type type;
  61. };
  62. static const int8_t ascii_dns_table[128] = {
  63. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  64. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  65. /* HYPHEN-MINUS..FULL STOP */
  66. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 1, 1, -1,
  67. /* 0..9 digits */
  68. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1, -1,
  69. /* LATIN CAPITAL LETTER A..LATIN CAPITAL LETTER Z */
  70. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  71. /* _ */
  72. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, 1,
  73. /* LATIN SMALL LETTER A..LATIN SMALL LETTER Z */
  74. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  75. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1};
  76. static unsigned int
  77. rspamd_dns_fail_hash(gconstpointer ptr)
  78. {
  79. struct rspamd_dns_fail_cache_entry *elt =
  80. (struct rspamd_dns_fail_cache_entry *) ptr;
  81. /* We don't care about type when doing hashing */
  82. return rspamd_cryptobox_fast_hash(elt->name, elt->namelen,
  83. rspamd_hash_seed());
  84. }
  85. static gboolean
  86. rspamd_dns_fail_equal(gconstpointer p1, gconstpointer p2)
  87. {
  88. struct rspamd_dns_fail_cache_entry *e1 = (struct rspamd_dns_fail_cache_entry *) p1,
  89. *e2 = (struct rspamd_dns_fail_cache_entry *) p2;
  90. if (e1->type == e2->type && e1->namelen == e2->namelen) {
  91. return memcmp(e1->name, e2->name, e1->namelen) == 0;
  92. }
  93. return FALSE;
  94. }
  95. static void
  96. rspamd_dns_fin_cb(gpointer arg)
  97. {
  98. struct rspamd_dns_request_ud *reqdata = (struct rspamd_dns_request_ud *) arg;
  99. if (reqdata->item) {
  100. rspamd_symcache_set_cur_item(reqdata->task, reqdata->item);
  101. }
  102. if (reqdata->reply) {
  103. reqdata->cb(reqdata->reply, reqdata->ud);
  104. }
  105. else {
  106. struct rdns_reply fake_reply;
  107. memset(&fake_reply, 0, sizeof(fake_reply));
  108. fake_reply.code = RDNS_RC_TIMEOUT;
  109. fake_reply.request = reqdata->req;
  110. fake_reply.resolver = reqdata->req->resolver;
  111. fake_reply.requested_name = reqdata->req->requested_names[0].name;
  112. reqdata->cb(&fake_reply, reqdata->ud);
  113. }
  114. rdns_request_release(reqdata->req);
  115. if (reqdata->item) {
  116. rspamd_symcache_item_async_dec_check(reqdata->task,
  117. reqdata->item, M);
  118. }
  119. if (reqdata->pool == NULL) {
  120. g_free(reqdata);
  121. }
  122. }
  123. static void
  124. rspamd_dns_callback(struct rdns_reply *reply, gpointer ud)
  125. {
  126. struct rspamd_dns_request_ud *reqdata = ud;
  127. reqdata->reply = reply;
  128. if (reqdata->session) {
  129. if (reply->code == RDNS_RC_SERVFAIL &&
  130. reqdata->task &&
  131. reqdata->task->resolver->fails_cache) {
  132. /* Add to cache... */
  133. const char *name = reqdata->req->requested_names[0].name;
  134. char *target;
  135. gsize namelen;
  136. struct rspamd_dns_fail_cache_entry *nentry;
  137. /* Allocate in a single entry to allow further free in a single call */
  138. namelen = strlen(name);
  139. nentry = g_malloc(sizeof(nentry) + namelen + 1);
  140. target = ((char *) nentry) + sizeof(nentry);
  141. rspamd_strlcpy(target, name, namelen + 1);
  142. nentry->type = reqdata->req->requested_names[0].type;
  143. nentry->name = target;
  144. nentry->namelen = namelen;
  145. /* Rdns request is retained there */
  146. rspamd_lru_hash_insert(reqdata->task->resolver->fails_cache,
  147. nentry, rdns_request_retain(reply->request),
  148. reqdata->task->task_timestamp,
  149. reqdata->task->resolver->fails_cache_time);
  150. }
  151. /*
  152. * Ref event to avoid double unref by
  153. * event removing
  154. */
  155. rdns_request_retain(reply->request);
  156. rspamd_session_remove_event(reqdata->session,
  157. rspamd_dns_fin_cb, reqdata);
  158. }
  159. else {
  160. reqdata->cb(reply, reqdata->ud);
  161. if (reqdata->pool == NULL) {
  162. g_free(reqdata);
  163. }
  164. }
  165. }
  166. struct rspamd_dns_request_ud *
  167. rspamd_dns_resolver_request(struct rspamd_dns_resolver *resolver,
  168. struct rspamd_async_session *session,
  169. rspamd_mempool_t *pool,
  170. dns_callback_type cb,
  171. gpointer ud,
  172. enum rdns_request_type type,
  173. const char *name)
  174. {
  175. struct rdns_request *req;
  176. struct rspamd_dns_request_ud *reqdata = NULL;
  177. unsigned int nlen = strlen(name);
  178. char *real_name = NULL;
  179. g_assert(resolver != NULL);
  180. if (resolver->r == NULL) {
  181. return NULL;
  182. }
  183. if (nlen == 0 || nlen > DNS_D_MAXNAME) {
  184. return NULL;
  185. }
  186. if (session && rspamd_session_blocked(session)) {
  187. return NULL;
  188. }
  189. if (rspamd_str_has_8bit(name, nlen)) {
  190. /* Convert to idna using libicu as it follows all the standards */
  191. real_name = rspamd_dns_resolver_idna_convert_utf8(resolver, pool,
  192. name, nlen, &nlen);
  193. if (real_name == NULL) {
  194. return NULL;
  195. }
  196. name = real_name;
  197. }
  198. /* Name is now in ASCII only */
  199. for (gsize i = 0; i < nlen; i++) {
  200. if (ascii_dns_table[((unsigned int) name[i]) & 0x7F] == -1) {
  201. /* Invalid DNS name requested */
  202. if (!pool) {
  203. g_free(real_name);
  204. }
  205. return NULL;
  206. }
  207. }
  208. if (pool != NULL) {
  209. reqdata =
  210. rspamd_mempool_alloc0(pool, sizeof(struct rspamd_dns_request_ud));
  211. }
  212. else {
  213. reqdata = g_malloc0(sizeof(struct rspamd_dns_request_ud));
  214. }
  215. reqdata->pool = pool;
  216. reqdata->session = session;
  217. reqdata->cb = cb;
  218. reqdata->ud = ud;
  219. req = rdns_make_request_full(resolver->r, rspamd_dns_callback, reqdata,
  220. resolver->request_timeout, resolver->max_retransmits, 1, name,
  221. type);
  222. reqdata->req = req;
  223. if (session) {
  224. if (req != NULL) {
  225. rspamd_session_add_event(session,
  226. (event_finalizer_t) rspamd_dns_fin_cb,
  227. reqdata,
  228. M);
  229. }
  230. }
  231. if (req == NULL) {
  232. if (pool == NULL) {
  233. g_free(reqdata);
  234. g_free(real_name);
  235. }
  236. return NULL;
  237. }
  238. if (real_name && pool == NULL) {
  239. g_free(real_name);
  240. }
  241. return reqdata;
  242. }
  243. struct rspamd_dns_cached_delayed_cbdata {
  244. struct rspamd_task *task;
  245. dns_callback_type cb;
  246. gpointer ud;
  247. ev_timer tm;
  248. struct rdns_request *req;
  249. };
  250. static void
  251. rspamd_fail_cache_cb(EV_P_ ev_timer *w, int revents)
  252. {
  253. struct rspamd_dns_cached_delayed_cbdata *cbd =
  254. (struct rspamd_dns_cached_delayed_cbdata *) w->data;
  255. struct rdns_reply fake_reply;
  256. ev_timer_stop(EV_A_ w);
  257. memset(&fake_reply, 0, sizeof(fake_reply));
  258. fake_reply.code = RDNS_RC_SERVFAIL;
  259. fake_reply.request = cbd->req;
  260. fake_reply.resolver = cbd->req->resolver;
  261. fake_reply.requested_name = cbd->req->requested_names[0].name;
  262. cbd->cb(&fake_reply, cbd->ud);
  263. rdns_request_release(cbd->req);
  264. }
  265. static gboolean
  266. make_dns_request_task_common(struct rspamd_task *task,
  267. dns_callback_type cb,
  268. gpointer ud,
  269. enum rdns_request_type type,
  270. const char *name,
  271. gboolean forced)
  272. {
  273. struct rspamd_dns_request_ud *reqdata;
  274. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  275. return FALSE;
  276. }
  277. if (task->resolver->fails_cache) {
  278. /* Search in failures cache */
  279. struct rspamd_dns_fail_cache_entry search;
  280. struct rdns_request *req;
  281. search.name = name;
  282. search.namelen = strlen(name);
  283. search.type = type;
  284. if ((req = rspamd_lru_hash_lookup(task->resolver->fails_cache,
  285. &search, task->task_timestamp)) != NULL) {
  286. /*
  287. * We need to reply with SERVFAIL again to the API, so add a special
  288. * timer, uh-oh, and fire it
  289. */
  290. struct rspamd_dns_cached_delayed_cbdata *cbd =
  291. rspamd_mempool_alloc0(task->task_pool, sizeof(*cbd));
  292. ev_timer_init(&cbd->tm, rspamd_fail_cache_cb, 0.0, 0.0);
  293. cbd->task = task;
  294. cbd->cb = cb;
  295. cbd->ud = ud;
  296. cbd->req = rdns_request_retain(req);
  297. cbd->tm.data = cbd;
  298. return TRUE;
  299. }
  300. }
  301. reqdata = rspamd_dns_resolver_request(
  302. task->resolver, task->s, task->task_pool, cb, ud,
  303. type, name);
  304. if (reqdata) {
  305. task->dns_requests++;
  306. reqdata->task = task;
  307. reqdata->item = rspamd_symcache_get_cur_item(task);
  308. if (reqdata->item) {
  309. /* We are inside some session */
  310. rspamd_symcache_item_async_inc(task, reqdata->item, M);
  311. }
  312. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  313. msg_info_task("stop resolving on reaching %ud requests",
  314. task->dns_requests);
  315. }
  316. return TRUE;
  317. }
  318. return FALSE;
  319. }
  320. gboolean
  321. rspamd_dns_resolver_request_task(struct rspamd_task *task,
  322. dns_callback_type cb,
  323. gpointer ud,
  324. enum rdns_request_type type,
  325. const char *name)
  326. {
  327. return make_dns_request_task_common(task, cb, ud, type, name, FALSE);
  328. }
  329. gboolean
  330. rspamd_dns_resolver_request_task_forced(struct rspamd_task *task,
  331. dns_callback_type cb,
  332. gpointer ud,
  333. enum rdns_request_type type,
  334. const char *name)
  335. {
  336. return make_dns_request_task_common(task, cb, ud, type, name, TRUE);
  337. }
  338. static void rspamd_rnds_log_bridge(
  339. void *log_data,
  340. enum rdns_log_level level,
  341. const char *function,
  342. const char *format,
  343. va_list args)
  344. {
  345. rspamd_logger_t *logger = log_data;
  346. rspamd_common_logv(logger, (GLogLevelFlags) level, "rdns", NULL,
  347. function, format, args);
  348. }
  349. static void
  350. rspamd_dns_server_init(struct upstream *up, unsigned int idx, gpointer ud)
  351. {
  352. struct rspamd_dns_resolver *r = ud;
  353. rspamd_inet_addr_t *addr;
  354. void *serv;
  355. struct rdns_upstream_elt *elt;
  356. addr = rspamd_upstream_addr_next(up);
  357. if (r->cfg) {
  358. serv = rdns_resolver_add_server(r->r, rspamd_inet_address_to_string(addr),
  359. rspamd_inet_address_get_port(addr), 0, r->cfg->dns_io_per_server);
  360. elt = rspamd_mempool_alloc0(r->cfg->cfg_pool, sizeof(*elt));
  361. elt->server = serv;
  362. elt->lib_data = up;
  363. rspamd_upstream_set_data(up, elt);
  364. }
  365. else {
  366. serv = rdns_resolver_add_server(r->r, rspamd_inet_address_to_string(addr),
  367. rspamd_inet_address_get_port(addr), 0, 8);
  368. }
  369. g_assert(serv != NULL);
  370. }
  371. static void
  372. rspamd_dns_server_reorder(struct upstream *up, unsigned int idx, gpointer ud)
  373. {
  374. struct rspamd_dns_resolver *r = ud;
  375. rspamd_upstream_set_weight(up, rspamd_upstreams_count(r->ups) - idx + 1);
  376. }
  377. static bool
  378. rspamd_dns_resolv_conf_on_server(struct rdns_resolver *resolver,
  379. const char *name, unsigned int port,
  380. int priority, unsigned int io_cnt, void *ud)
  381. {
  382. struct rspamd_dns_resolver *dns_resolver = ud;
  383. struct rspamd_config *cfg;
  384. rspamd_inet_addr_t *addr;
  385. int test_fd;
  386. cfg = dns_resolver->cfg;
  387. msg_info_config("parsed nameserver %s from resolv.conf", name);
  388. /* Try to open a connection */
  389. if (!rspamd_parse_inet_address(&addr, name, strlen(name),
  390. RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  391. msg_warn_config("cannot parse nameserver address %s", name);
  392. return FALSE;
  393. }
  394. rspamd_inet_address_set_port(addr, port);
  395. test_fd = rspamd_inet_address_connect(addr, SOCK_DGRAM, TRUE);
  396. if (test_fd == -1 && (errno != EINTR || errno != ECONNREFUSED || errno != ECONNRESET)) {
  397. msg_info_config("cannot open connection to nameserver at address %s: %s",
  398. name, strerror(errno));
  399. rspamd_inet_address_free(addr);
  400. return FALSE;
  401. }
  402. rspamd_inet_address_free(addr);
  403. close(test_fd);
  404. return rspamd_upstreams_add_upstream(dns_resolver->ups, name, port,
  405. RSPAMD_UPSTREAM_PARSE_NAMESERVER,
  406. NULL);
  407. }
  408. static void
  409. rspamd_process_fake_reply(struct rspamd_config *cfg,
  410. struct rspamd_dns_resolver *dns_resolver,
  411. const ucl_object_t *cur_arr)
  412. {
  413. const ucl_object_t *cur;
  414. ucl_object_iter_t it;
  415. it = ucl_object_iterate_new(cur_arr);
  416. while ((cur = ucl_object_iterate_safe(it, true))) {
  417. const ucl_object_t *type_obj, *name_obj, *code_obj, *replies_obj;
  418. enum rdns_request_type rtype = RDNS_REQUEST_A;
  419. enum dns_rcode rcode = RDNS_RC_NOERROR;
  420. struct rdns_reply_entry *replies = NULL;
  421. const char *name = NULL;
  422. if (ucl_object_type(cur) != UCL_OBJECT) {
  423. continue;
  424. }
  425. name_obj = ucl_object_lookup(cur, "name");
  426. if (name_obj == NULL ||
  427. (name = ucl_object_tostring(name_obj)) == NULL) {
  428. msg_err_config("no name for fake dns reply");
  429. continue;
  430. }
  431. type_obj = ucl_object_lookup(cur, "type");
  432. if (type_obj) {
  433. rtype = rdns_type_fromstr(ucl_object_tostring(type_obj));
  434. if (rtype == RDNS_REQUEST_INVALID) {
  435. msg_err_config("invalid type for %s: %s", name,
  436. ucl_object_tostring(type_obj));
  437. continue;
  438. }
  439. }
  440. code_obj = ucl_object_lookup_any(cur, "code", "rcode", NULL);
  441. if (code_obj) {
  442. rcode = rdns_rcode_fromstr(ucl_object_tostring(code_obj));
  443. if (rcode == RDNS_RC_INVALID) {
  444. msg_err_config("invalid rcode for %s: %s", name,
  445. ucl_object_tostring(code_obj));
  446. continue;
  447. }
  448. }
  449. if (rcode == RDNS_RC_NOERROR) {
  450. /* We want replies to be set for this rcode */
  451. replies_obj = ucl_object_lookup(cur, "replies");
  452. if (replies_obj == NULL || ucl_object_type(replies_obj) != UCL_ARRAY) {
  453. msg_err_config("invalid replies for fake DNS record %s", name);
  454. continue;
  455. }
  456. ucl_object_iter_t rep_it;
  457. const ucl_object_t *rep_obj;
  458. rep_it = ucl_object_iterate_new(replies_obj);
  459. while ((rep_obj = ucl_object_iterate_safe(rep_it, true))) {
  460. const char *str_rep = ucl_object_tostring(rep_obj);
  461. struct rdns_reply_entry *rep;
  462. char **svec;
  463. if (str_rep == NULL) {
  464. msg_err_config("invalid reply element for fake DNS record %s",
  465. name);
  466. continue;
  467. }
  468. rep = calloc(1, sizeof(*rep));
  469. g_assert(rep != NULL);
  470. rep->type = rtype;
  471. rep->ttl = 0;
  472. switch (rtype) {
  473. case RDNS_REQUEST_A:
  474. if (inet_pton(AF_INET, str_rep, &rep->content.a.addr) != 1) {
  475. msg_err_config("invalid A reply element for fake "
  476. "DNS record %s: %s",
  477. name, str_rep);
  478. free(rep);
  479. }
  480. else {
  481. DL_APPEND(replies, rep);
  482. }
  483. break;
  484. case RDNS_REQUEST_NS:
  485. rep->content.ns.name = strdup(str_rep);
  486. DL_APPEND(replies, rep);
  487. break;
  488. case RDNS_REQUEST_PTR:
  489. rep->content.ptr.name = strdup(str_rep);
  490. DL_APPEND(replies, rep);
  491. break;
  492. case RDNS_REQUEST_MX:
  493. svec = g_strsplit_set(str_rep, " :", -1);
  494. if (svec && svec[0] && svec[1]) {
  495. rep->content.mx.priority = strtoul(svec[0], NULL, 10);
  496. rep->content.mx.name = strdup(svec[1]);
  497. DL_APPEND(replies, rep);
  498. }
  499. else {
  500. msg_err_config("invalid MX reply element for fake "
  501. "DNS record %s: %s",
  502. name, str_rep);
  503. free(rep);
  504. }
  505. g_strfreev(svec);
  506. break;
  507. case RDNS_REQUEST_TXT:
  508. rep->content.txt.data = strdup(str_rep);
  509. DL_APPEND(replies, rep);
  510. break;
  511. case RDNS_REQUEST_SOA:
  512. svec = g_strsplit_set(str_rep, " :", -1);
  513. /* 7 elements */
  514. if (svec && svec[0] && svec[1] && svec[2] &&
  515. svec[3] && svec[4] && svec[5] && svec[6]) {
  516. rep->content.soa.mname = strdup(svec[0]);
  517. rep->content.soa.admin = strdup(svec[1]);
  518. rep->content.soa.serial = strtoul(svec[2], NULL, 10);
  519. rep->content.soa.refresh = strtol(svec[3], NULL, 10);
  520. rep->content.soa.retry = strtol(svec[4], NULL, 10);
  521. rep->content.soa.expire = strtol(svec[5], NULL, 10);
  522. rep->content.soa.minimum = strtoul(svec[6], NULL, 10);
  523. DL_APPEND(replies, rep);
  524. }
  525. else {
  526. msg_err_config("invalid MX reply element for fake "
  527. "DNS record %s: %s",
  528. name, str_rep);
  529. free(rep);
  530. }
  531. g_strfreev(svec);
  532. break;
  533. case RDNS_REQUEST_AAAA:
  534. if (inet_pton(AF_INET6, str_rep, &rep->content.aaa.addr) != 1) {
  535. msg_err_config("invalid AAAA reply element for fake "
  536. "DNS record %s: %s",
  537. name, str_rep);
  538. free(rep);
  539. }
  540. else {
  541. DL_APPEND(replies, rep);
  542. }
  543. break;
  544. case RDNS_REQUEST_SRV:
  545. default:
  546. msg_err_config("invalid or unsupported reply element "
  547. "for fake DNS record %s(%s): %s",
  548. name, rdns_str_from_type(rtype), str_rep);
  549. free(rep);
  550. break;
  551. }
  552. }
  553. ucl_object_iterate_free(rep_it);
  554. if (replies) {
  555. struct rdns_reply_entry *tmp_entry;
  556. unsigned int i = 0;
  557. DL_COUNT(replies, tmp_entry, i);
  558. msg_info_config("added fake record: %s(%s); %d replies", name,
  559. rdns_str_from_type(rtype), i);
  560. rdns_resolver_set_fake_reply(dns_resolver->r,
  561. name, rtype, rcode, replies);
  562. }
  563. else {
  564. msg_warn_config("record %s has no replies, not adding",
  565. name);
  566. }
  567. }
  568. else {
  569. /* This entry returns some non valid code, no replies are possible */
  570. replies_obj = ucl_object_lookup(cur, "replies");
  571. if (replies_obj) {
  572. msg_warn_config("replies are set for non-successful return "
  573. "code for %s(%s), they will be ignored",
  574. name, rdns_str_from_type(rtype));
  575. }
  576. rdns_resolver_set_fake_reply(dns_resolver->r,
  577. name, rtype, rcode, NULL);
  578. }
  579. }
  580. ucl_object_iterate_free(it);
  581. }
  582. static bool
  583. rspamd_dns_read_hosts_file(struct rspamd_config *cfg,
  584. struct rspamd_dns_resolver *dns_resolver,
  585. const char *fname)
  586. {
  587. char *linebuf = NULL;
  588. gsize buflen = 0;
  589. gssize r;
  590. FILE *fp;
  591. unsigned int nadded = 0;
  592. fp = fopen(fname, "r");
  593. if (fp == NULL) {
  594. /* Hack to reduce noise */
  595. if (strcmp(fname, "/etc/hosts") == 0) {
  596. msg_info_config("cannot open hosts file %s: %s", fname,
  597. strerror(errno));
  598. }
  599. else {
  600. msg_err_config("cannot open hosts file %s: %s", fname,
  601. strerror(errno));
  602. }
  603. return false;
  604. }
  605. while ((r = getline(&linebuf, &buflen, fp)) > 0) {
  606. if (linebuf[0] == '#' || g_ascii_isspace(linebuf[0])) {
  607. /* Skip comment or empty line */
  608. continue;
  609. }
  610. g_strchomp(linebuf);
  611. char **elts = g_strsplit_set(linebuf, " \t\v", -1);
  612. rspamd_inet_addr_t *addr;
  613. if (!rspamd_parse_inet_address(&addr, elts[0], strlen(elts[0]),
  614. RSPAMD_INET_ADDRESS_PARSE_REMOTE | RSPAMD_INET_ADDRESS_PARSE_NO_UNIX)) {
  615. msg_warn_config("bad hosts file line: %s; cannot parse address", linebuf);
  616. }
  617. else {
  618. /* Add all FQDN + aliases if any */
  619. char **cur_name = &elts[1];
  620. while (*cur_name) {
  621. if (strlen(*cur_name) == 0) {
  622. cur_name++;
  623. continue;
  624. }
  625. if (*cur_name[0] == '#') {
  626. /* Start of the comment */
  627. break;
  628. }
  629. struct rdns_reply_entry *rep;
  630. rep = calloc(1, sizeof(*rep));
  631. g_assert(rep != NULL);
  632. rep->ttl = 0;
  633. if (rspamd_inet_address_get_af(addr) == AF_INET) {
  634. socklen_t unused;
  635. const struct sockaddr_in *sin = (const struct sockaddr_in *)
  636. rspamd_inet_address_get_sa(addr, &unused);
  637. rep->type = RDNS_REQUEST_A;
  638. memcpy(&rep->content.a.addr, &sin->sin_addr,
  639. sizeof(rep->content.a.addr));
  640. }
  641. else {
  642. socklen_t unused;
  643. const struct sockaddr_in6 *sin6 = (const struct sockaddr_in6 *)
  644. rspamd_inet_address_get_sa(addr, &unused);
  645. rep->type = RDNS_REQUEST_AAAA;
  646. memcpy(&rep->content.aaa.addr, &sin6->sin6_addr,
  647. sizeof(rep->content.aaa.addr));
  648. }
  649. rep->next = NULL;
  650. rep->prev = rep;
  651. rdns_resolver_set_fake_reply(dns_resolver->r,
  652. *cur_name, rep->type, RDNS_RC_NOERROR, rep);
  653. msg_debug_config("added fake record %s -> %s from hosts file %s",
  654. *cur_name, rspamd_inet_address_to_string(addr), fname);
  655. cur_name++;
  656. nadded++;
  657. }
  658. rspamd_inet_address_free(addr);
  659. }
  660. g_strfreev(elts);
  661. }
  662. if (linebuf) {
  663. free(linebuf);
  664. }
  665. msg_info_config("processed host file %s; %d records added", fname, nadded);
  666. fclose(fp);
  667. return true;
  668. }
  669. static void
  670. rspamd_dns_resolver_config_ucl(struct rspamd_config *cfg,
  671. struct rspamd_dns_resolver *dns_resolver,
  672. const ucl_object_t *dns_section)
  673. {
  674. const ucl_object_t *fake_replies, *fails_cache_size, *fails_cache_time,
  675. *hosts;
  676. static const ev_tstamp default_fails_cache_time = 10.0;
  677. /* Process fake replies */
  678. fake_replies = ucl_object_lookup_any(dns_section, "fake_records",
  679. "fake_replies", NULL);
  680. if (fake_replies && ucl_object_type(fake_replies) == UCL_ARRAY) {
  681. const ucl_object_t *cur_arr;
  682. DL_FOREACH(fake_replies, cur_arr)
  683. {
  684. rspamd_process_fake_reply(cfg, dns_resolver, cur_arr);
  685. }
  686. }
  687. hosts = ucl_object_lookup(dns_section, "hosts");
  688. if (hosts == NULL) {
  689. /* Read normal `/etc/hosts` file */
  690. rspamd_dns_read_hosts_file(cfg, dns_resolver, "/etc/hosts");
  691. }
  692. else if (ucl_object_type(hosts) == UCL_NULL) {
  693. /* Do nothing, hosts are explicitly disabled */
  694. }
  695. else if (ucl_object_type(hosts) == UCL_STRING) {
  696. if (!rspamd_dns_read_hosts_file(cfg, dns_resolver, ucl_object_tostring(hosts))) {
  697. msg_err_config("cannot read hosts file %s", ucl_object_tostring(hosts));
  698. }
  699. }
  700. else if (ucl_object_type(hosts) == UCL_ARRAY) {
  701. const ucl_object_t *cur;
  702. ucl_object_iter_t it = NULL;
  703. while ((cur = ucl_object_iterate(hosts, &it, true)) != NULL) {
  704. if (!rspamd_dns_read_hosts_file(cfg, dns_resolver, ucl_object_tostring(cur))) {
  705. msg_err_config("cannot read hosts file %s", ucl_object_tostring(cur));
  706. }
  707. }
  708. }
  709. else {
  710. msg_err_config("invalid type for hosts parameter: %s",
  711. ucl_object_type_to_string(ucl_object_type(hosts)));
  712. }
  713. fails_cache_size = ucl_object_lookup(dns_section, "fails_cache_size");
  714. if (fails_cache_size && ucl_object_type(fails_cache_size) == UCL_INT) {
  715. dns_resolver->fails_cache_time = default_fails_cache_time;
  716. fails_cache_time = ucl_object_lookup(dns_section, "fails_cache_time");
  717. if (fails_cache_time) {
  718. dns_resolver->fails_cache_time = ucl_object_todouble(fails_cache_time);
  719. }
  720. dns_resolver->fails_cache = rspamd_lru_hash_new_full(
  721. ucl_object_toint(fails_cache_size),
  722. g_free, (GDestroyNotify) rdns_request_release,
  723. rspamd_dns_fail_hash, rspamd_dns_fail_equal);
  724. }
  725. }
  726. struct rspamd_dns_resolver *
  727. rspamd_dns_resolver_init(rspamd_logger_t *logger,
  728. struct ev_loop *ev_base,
  729. struct rspamd_config *cfg)
  730. {
  731. struct rspamd_dns_resolver *dns_resolver;
  732. dns_resolver = g_malloc0(sizeof(struct rspamd_dns_resolver));
  733. dns_resolver->event_loop = ev_base;
  734. if (cfg != NULL) {
  735. dns_resolver->request_timeout = cfg->dns_timeout;
  736. dns_resolver->max_retransmits = cfg->dns_retransmits;
  737. }
  738. else {
  739. dns_resolver->request_timeout = 1;
  740. dns_resolver->max_retransmits = 2;
  741. }
  742. /* IDN translation is performed in Rspamd now */
  743. dns_resolver->r = rdns_resolver_new(RDNS_RESOLVER_NOIDN);
  744. UErrorCode uc_err = U_ZERO_ERROR;
  745. dns_resolver->uidna = uidna_openUTS46(UIDNA_DEFAULT, &uc_err);
  746. g_assert(!U_FAILURE(uc_err));
  747. rdns_bind_libev(dns_resolver->r, dns_resolver->event_loop);
  748. if (cfg != NULL) {
  749. rdns_resolver_set_log_level(dns_resolver->r, cfg->log_level);
  750. dns_resolver->cfg = cfg;
  751. rdns_resolver_set_dnssec(dns_resolver->r, cfg->enable_dnssec);
  752. if (cfg->nameservers == NULL) {
  753. /* Parse resolv.conf */
  754. dns_resolver->ups = rspamd_upstreams_create(cfg->ups_ctx);
  755. rspamd_upstreams_set_flags(dns_resolver->ups,
  756. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  757. rspamd_upstreams_set_rotation(dns_resolver->ups,
  758. RSPAMD_UPSTREAM_MASTER_SLAVE);
  759. if (!rdns_resolver_parse_resolv_conf_cb(dns_resolver->r,
  760. "/etc/resolv.conf",
  761. rspamd_dns_resolv_conf_on_server,
  762. dns_resolver)) {
  763. msg_err("cannot parse resolv.conf and no nameservers defined, "
  764. "so no ways to resolve addresses");
  765. rdns_resolver_release(dns_resolver->r);
  766. dns_resolver->r = NULL;
  767. return dns_resolver;
  768. }
  769. /* Use normal resolv.conf rules */
  770. rspamd_upstreams_foreach(dns_resolver->ups, rspamd_dns_server_reorder,
  771. dns_resolver);
  772. }
  773. else {
  774. dns_resolver->ups = rspamd_upstreams_create(cfg->ups_ctx);
  775. rspamd_upstreams_set_flags(dns_resolver->ups,
  776. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  777. if (!rspamd_upstreams_from_ucl(dns_resolver->ups, cfg->nameservers,
  778. 53, dns_resolver)) {
  779. msg_err_config("cannot parse DNS nameservers definitions");
  780. rdns_resolver_release(dns_resolver->r);
  781. dns_resolver->r = NULL;
  782. return dns_resolver;
  783. }
  784. }
  785. rspamd_upstreams_foreach(dns_resolver->ups, rspamd_dns_server_init,
  786. dns_resolver);
  787. rdns_resolver_set_upstream_lib(dns_resolver->r, &rspamd_ups_ctx,
  788. dns_resolver->ups);
  789. cfg->dns_resolver = dns_resolver;
  790. if (cfg->cfg_ucl_obj) {
  791. /* Configure additional options */
  792. const ucl_object_t *opts_section, *dns_section, *tmp;
  793. opts_section = ucl_object_lookup(cfg->cfg_ucl_obj, "options");
  794. if (opts_section) {
  795. /* TODO: implement a more simple merge logic */
  796. DL_FOREACH(opts_section, tmp)
  797. {
  798. dns_section = ucl_object_lookup(opts_section, "dns");
  799. if (dns_section) {
  800. rspamd_dns_resolver_config_ucl(cfg, dns_resolver,
  801. dns_section);
  802. }
  803. }
  804. }
  805. }
  806. }
  807. rdns_resolver_set_logger(dns_resolver->r, rspamd_rnds_log_bridge, logger);
  808. rdns_resolver_init(dns_resolver->r);
  809. return dns_resolver;
  810. }
  811. void rspamd_dns_resolver_deinit(struct rspamd_dns_resolver *resolver)
  812. {
  813. if (resolver) {
  814. if (resolver->r) {
  815. rdns_resolver_release(resolver->r);
  816. }
  817. if (resolver->ups) {
  818. rspamd_upstreams_destroy(resolver->ups);
  819. }
  820. if (resolver->fails_cache) {
  821. rspamd_lru_hash_destroy(resolver->fails_cache);
  822. }
  823. uidna_close(resolver->uidna);
  824. g_free(resolver);
  825. }
  826. }
  827. static struct rdns_upstream_elt *
  828. rspamd_dns_select_upstream(const char *name,
  829. size_t len, void *ups_data)
  830. {
  831. struct upstream_list *ups = ups_data;
  832. struct upstream *up;
  833. up = rspamd_upstream_get(ups, RSPAMD_UPSTREAM_ROUND_ROBIN, name, len);
  834. if (up) {
  835. msg_debug("select %s", rspamd_upstream_name(up));
  836. return rspamd_upstream_get_data(up);
  837. }
  838. return NULL;
  839. }
  840. static struct rdns_upstream_elt *
  841. rspamd_dns_select_upstream_retransmit(
  842. const char *name,
  843. size_t len,
  844. struct rdns_upstream_elt *prev_elt,
  845. void *ups_data)
  846. {
  847. struct upstream_list *ups = ups_data;
  848. struct upstream *up;
  849. if (prev_elt) {
  850. up = rspamd_upstream_get_except(ups, (struct upstream *) prev_elt->lib_data,
  851. RSPAMD_UPSTREAM_MASTER_SLAVE, name, len);
  852. }
  853. else {
  854. up = rspamd_upstream_get_forced(ups, RSPAMD_UPSTREAM_RANDOM, name, len);
  855. }
  856. if (up) {
  857. msg_debug("select forced %s", rspamd_upstream_name(up));
  858. return rspamd_upstream_get_data(up);
  859. }
  860. return NULL;
  861. }
  862. static void
  863. rspamd_dns_upstream_ok(struct rdns_upstream_elt *elt,
  864. void *ups_data)
  865. {
  866. struct upstream *up = elt->lib_data;
  867. rspamd_upstream_ok(up);
  868. }
  869. static void
  870. rspamd_dns_upstream_fail(struct rdns_upstream_elt *elt,
  871. void *ups_data, const char *reason)
  872. {
  873. struct upstream *up = elt->lib_data;
  874. rspamd_upstream_fail(up, FALSE, reason);
  875. }
  876. static unsigned int
  877. rspamd_dns_upstream_count(void *ups_data)
  878. {
  879. struct upstream_list *ups = ups_data;
  880. return rspamd_upstreams_alive(ups);
  881. }
  882. char *
  883. rspamd_dns_resolver_idna_convert_utf8(struct rspamd_dns_resolver *resolver,
  884. rspamd_mempool_t *pool,
  885. const char *name,
  886. int namelen,
  887. unsigned int *outlen)
  888. {
  889. if (resolver == NULL || resolver->uidna == NULL || name == NULL || namelen > DNS_D_MAXNAME) {
  890. return NULL;
  891. }
  892. unsigned int dest_len;
  893. UErrorCode uc_err = U_ZERO_ERROR;
  894. UIDNAInfo info = UIDNA_INFO_INITIALIZER;
  895. /* Calculate length required */
  896. dest_len = uidna_nameToASCII_UTF8(resolver->uidna, name, namelen,
  897. NULL, 0, &info, &uc_err);
  898. if (uc_err == U_BUFFER_OVERFLOW_ERROR) {
  899. char *dest;
  900. if (pool) {
  901. dest = rspamd_mempool_alloc(pool, dest_len + 1);
  902. }
  903. else {
  904. dest = g_malloc(dest_len + 1);
  905. }
  906. uc_err = U_ZERO_ERROR;
  907. dest_len = uidna_nameToASCII_UTF8(resolver->uidna, name, namelen,
  908. dest, dest_len + 1, &info, &uc_err);
  909. if (U_FAILURE(uc_err)) {
  910. if (!pool) {
  911. g_free(dest);
  912. }
  913. return NULL;
  914. }
  915. dest[dest_len] = '\0';
  916. if (outlen) {
  917. *outlen = dest_len;
  918. }
  919. return dest;
  920. }
  921. return NULL;
  922. }