You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

dns.c 28KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "contrib/librdns/rdns.h"
  17. #include "config.h"
  18. #include "dns.h"
  19. #include "rspamd.h"
  20. #include "utlist.h"
  21. #include "contrib/librdns/rdns.h"
  22. #include "contrib/librdns/dns_private.h"
  23. #include "contrib/librdns/rdns_ev.h"
  24. #include "unix-std.h"
  25. #include <unicode/uidna.h>
  26. static const gchar *M = "rspamd dns";
  27. static struct rdns_upstream_elt* rspamd_dns_select_upstream (const char *name,
  28. size_t len, void *ups_data);
  29. static struct rdns_upstream_elt* rspamd_dns_select_upstream_retransmit (
  30. const char *name,
  31. size_t len,
  32. struct rdns_upstream_elt *prev_elt,
  33. void *ups_data);
  34. static void rspamd_dns_upstream_ok (struct rdns_upstream_elt *elt,
  35. void *ups_data);
  36. static void rspamd_dns_upstream_fail (struct rdns_upstream_elt *elt,
  37. void *ups_data, const gchar *reason);
  38. static unsigned int rspamd_dns_upstream_count (void *ups_data);
  39. static struct rdns_upstream_context rspamd_ups_ctx = {
  40. .select = rspamd_dns_select_upstream,
  41. .select_retransmit = rspamd_dns_select_upstream_retransmit,
  42. .ok = rspamd_dns_upstream_ok,
  43. .fail = rspamd_dns_upstream_fail,
  44. .count = rspamd_dns_upstream_count,
  45. .data = NULL
  46. };
  47. struct rspamd_dns_request_ud {
  48. struct rspamd_async_session *session;
  49. dns_callback_type cb;
  50. gpointer ud;
  51. rspamd_mempool_t *pool;
  52. struct rspamd_task *task;
  53. struct rspamd_symcache_item *item;
  54. struct rdns_request *req;
  55. struct rdns_reply *reply;
  56. };
  57. struct rspamd_dns_fail_cache_entry {
  58. const char *name;
  59. gint32 namelen;
  60. enum rdns_request_type type;
  61. };
  62. static const gint8 ascii_dns_table[128]={
  63. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  64. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  65. /* HYPHEN-MINUS..FULL STOP */
  66. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 1, 1, -1,
  67. /* 0..9 digits */
  68. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1, -1,
  69. /* LATIN CAPITAL LETTER A..LATIN CAPITAL LETTER Z */
  70. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  71. /* _ */
  72. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, 1,
  73. /* LATIN SMALL LETTER A..LATIN SMALL LETTER Z */
  74. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  75. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1
  76. };
  77. static guint
  78. rspamd_dns_fail_hash (gconstpointer ptr)
  79. {
  80. struct rspamd_dns_fail_cache_entry *elt =
  81. (struct rspamd_dns_fail_cache_entry *)ptr;
  82. /* We don't care about type when doing hashing */
  83. return rspamd_cryptobox_fast_hash (elt->name, elt->namelen,
  84. rspamd_hash_seed ());
  85. }
  86. static gboolean
  87. rspamd_dns_fail_equal (gconstpointer p1, gconstpointer p2)
  88. {
  89. struct rspamd_dns_fail_cache_entry *e1 = (struct rspamd_dns_fail_cache_entry *)p1,
  90. *e2 = (struct rspamd_dns_fail_cache_entry *)p2;
  91. if (e1->type == e2->type && e1->namelen == e2->namelen) {
  92. return memcmp (e1->name, e2->name, e1->namelen) == 0;
  93. }
  94. return FALSE;
  95. }
  96. static void
  97. rspamd_dns_fin_cb (gpointer arg)
  98. {
  99. struct rspamd_dns_request_ud *reqdata = (struct rspamd_dns_request_ud *)arg;
  100. if (reqdata->item) {
  101. rspamd_symcache_set_cur_item (reqdata->task, reqdata->item);
  102. }
  103. if (reqdata->reply) {
  104. reqdata->cb (reqdata->reply, reqdata->ud);
  105. }
  106. else {
  107. struct rdns_reply fake_reply;
  108. memset (&fake_reply, 0, sizeof (fake_reply));
  109. fake_reply.code = RDNS_RC_TIMEOUT;
  110. fake_reply.request = reqdata->req;
  111. fake_reply.resolver = reqdata->req->resolver;
  112. fake_reply.requested_name = reqdata->req->requested_names[0].name;
  113. reqdata->cb (&fake_reply, reqdata->ud);
  114. }
  115. rdns_request_release (reqdata->req);
  116. if (reqdata->item) {
  117. rspamd_symcache_item_async_dec_check (reqdata->task,
  118. reqdata->item, M);
  119. }
  120. if (reqdata->pool == NULL) {
  121. g_free (reqdata);
  122. }
  123. }
  124. static void
  125. rspamd_dns_callback (struct rdns_reply *reply, gpointer ud)
  126. {
  127. struct rspamd_dns_request_ud *reqdata = ud;
  128. reqdata->reply = reply;
  129. if (reqdata->session) {
  130. if (reply->code == RDNS_RC_SERVFAIL &&
  131. reqdata->task &&
  132. reqdata->task->resolver->fails_cache) {
  133. /* Add to cache... */
  134. const gchar *name = reqdata->req->requested_names[0].name;
  135. gchar *target;
  136. gsize namelen;
  137. struct rspamd_dns_fail_cache_entry *nentry;
  138. /* Allocate in a single entry to allow further free in a single call */
  139. namelen = strlen (name);
  140. nentry = g_malloc (sizeof (nentry) + namelen + 1);
  141. target = ((gchar *)nentry) + sizeof (nentry);
  142. rspamd_strlcpy (target, name, namelen + 1);
  143. nentry->type = reqdata->req->requested_names[0].type;
  144. nentry->name = target;
  145. nentry->namelen = namelen;
  146. /* Rdns request is retained there */
  147. rspamd_lru_hash_insert (reqdata->task->resolver->fails_cache,
  148. nentry, rdns_request_retain (reply->request),
  149. reqdata->task->task_timestamp,
  150. reqdata->task->resolver->fails_cache_time);
  151. }
  152. /*
  153. * Ref event to avoid double unref by
  154. * event removing
  155. */
  156. rdns_request_retain (reply->request);
  157. rspamd_session_remove_event (reqdata->session,
  158. rspamd_dns_fin_cb, reqdata);
  159. }
  160. else {
  161. reqdata->cb (reply, reqdata->ud);
  162. if (reqdata->pool == NULL) {
  163. g_free (reqdata);
  164. }
  165. }
  166. }
  167. struct rspamd_dns_request_ud *
  168. rspamd_dns_resolver_request (struct rspamd_dns_resolver *resolver,
  169. struct rspamd_async_session *session,
  170. rspamd_mempool_t *pool,
  171. dns_callback_type cb,
  172. gpointer ud,
  173. enum rdns_request_type type,
  174. const char *name)
  175. {
  176. struct rdns_request *req;
  177. struct rspamd_dns_request_ud *reqdata = NULL;
  178. guint nlen = strlen (name);
  179. gchar *real_name = NULL;
  180. g_assert (resolver != NULL);
  181. if (resolver->r == NULL) {
  182. return NULL;
  183. }
  184. if (nlen == 0 || nlen > DNS_D_MAXNAME) {
  185. return NULL;
  186. }
  187. if (session && rspamd_session_blocked (session)) {
  188. return NULL;
  189. }
  190. if (rspamd_str_has_8bit (name, nlen)) {
  191. /* Convert to idna using libicu as it follows all the standards */
  192. real_name = rspamd_dns_resolver_idna_convert_utf8 (resolver, pool,
  193. name, nlen, &nlen);
  194. if (real_name == NULL) {
  195. return NULL;
  196. }
  197. name = real_name;
  198. }
  199. /* Name is now in ASCII only */
  200. for (gsize i = 0; i < nlen; i ++) {
  201. if (ascii_dns_table[((unsigned int)name[i]) & 0x7F] == -1) {
  202. /* Invalid DNS name requested */
  203. if (!pool) {
  204. g_free (real_name);
  205. }
  206. return NULL;
  207. }
  208. }
  209. if (pool != NULL) {
  210. reqdata =
  211. rspamd_mempool_alloc0 (pool, sizeof (struct rspamd_dns_request_ud));
  212. }
  213. else {
  214. reqdata = g_malloc0 (sizeof (struct rspamd_dns_request_ud));
  215. }
  216. reqdata->pool = pool;
  217. reqdata->session = session;
  218. reqdata->cb = cb;
  219. reqdata->ud = ud;
  220. req = rdns_make_request_full (resolver->r, rspamd_dns_callback, reqdata,
  221. resolver->request_timeout, resolver->max_retransmits, 1, name,
  222. type);
  223. reqdata->req = req;
  224. if (session) {
  225. if (req != NULL) {
  226. rspamd_session_add_event (session,
  227. (event_finalizer_t) rspamd_dns_fin_cb,
  228. reqdata,
  229. M);
  230. }
  231. }
  232. if (req == NULL) {
  233. if (pool == NULL) {
  234. g_free (reqdata);
  235. g_free (real_name);
  236. }
  237. return NULL;
  238. }
  239. if (real_name && pool == NULL) {
  240. g_free (real_name);
  241. }
  242. return reqdata;
  243. }
  244. struct rspamd_dns_cached_delayed_cbdata {
  245. struct rspamd_task *task;
  246. dns_callback_type cb;
  247. gpointer ud;
  248. ev_timer tm;
  249. struct rdns_request *req;
  250. };
  251. static void
  252. rspamd_fail_cache_cb (EV_P_ ev_timer *w, int revents)
  253. {
  254. struct rspamd_dns_cached_delayed_cbdata *cbd =
  255. (struct rspamd_dns_cached_delayed_cbdata *)w->data;
  256. struct rdns_reply fake_reply;
  257. ev_timer_stop (EV_A_ w);
  258. memset (&fake_reply, 0, sizeof (fake_reply));
  259. fake_reply.code = RDNS_RC_SERVFAIL;
  260. fake_reply.request = cbd->req;
  261. fake_reply.resolver = cbd->req->resolver;
  262. fake_reply.requested_name = cbd->req->requested_names[0].name;
  263. cbd->cb (&fake_reply, cbd->ud);
  264. rdns_request_release (cbd->req);
  265. }
  266. static gboolean
  267. make_dns_request_task_common (struct rspamd_task *task,
  268. dns_callback_type cb,
  269. gpointer ud,
  270. enum rdns_request_type type,
  271. const char *name,
  272. gboolean forced)
  273. {
  274. struct rspamd_dns_request_ud *reqdata;
  275. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  276. return FALSE;
  277. }
  278. if (task->resolver->fails_cache) {
  279. /* Search in failures cache */
  280. struct rspamd_dns_fail_cache_entry search;
  281. struct rdns_request *req;
  282. search.name = name;
  283. search.namelen = strlen (name);
  284. search.type = type;
  285. if ((req = rspamd_lru_hash_lookup (task->resolver->fails_cache,
  286. &search, task->task_timestamp)) != NULL) {
  287. /*
  288. * We need to reply with SERVFAIL again to the API, so add a special
  289. * timer, uh-oh, and fire it
  290. */
  291. struct rspamd_dns_cached_delayed_cbdata *cbd =
  292. rspamd_mempool_alloc0 (task->task_pool, sizeof (*cbd));
  293. ev_timer_init (&cbd->tm, rspamd_fail_cache_cb, 0.0, 0.0);
  294. cbd->task = task;
  295. cbd->cb = cb;
  296. cbd->ud = ud;
  297. cbd->req = rdns_request_retain (req);
  298. cbd->tm.data = cbd;
  299. return TRUE;
  300. }
  301. }
  302. reqdata = rspamd_dns_resolver_request (
  303. task->resolver, task->s, task->task_pool, cb, ud,
  304. type, name);
  305. if (reqdata) {
  306. task->dns_requests ++;
  307. reqdata->task = task;
  308. reqdata->item = rspamd_symcache_get_cur_item (task);
  309. if (reqdata->item) {
  310. /* We are inside some session */
  311. rspamd_symcache_item_async_inc (task, reqdata->item, M);
  312. }
  313. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  314. msg_info_task ("stop resolving on reaching %ud requests",
  315. task->dns_requests);
  316. }
  317. return TRUE;
  318. }
  319. return FALSE;
  320. }
  321. gboolean
  322. rspamd_dns_resolver_request_task (struct rspamd_task *task,
  323. dns_callback_type cb,
  324. gpointer ud,
  325. enum rdns_request_type type,
  326. const char *name)
  327. {
  328. return make_dns_request_task_common (task, cb, ud, type, name, FALSE);
  329. }
  330. gboolean
  331. rspamd_dns_resolver_request_task_forced (struct rspamd_task *task,
  332. dns_callback_type cb,
  333. gpointer ud,
  334. enum rdns_request_type type,
  335. const char *name)
  336. {
  337. return make_dns_request_task_common (task, cb, ud, type, name, TRUE);
  338. }
  339. static void rspamd_rnds_log_bridge (
  340. void *log_data,
  341. enum rdns_log_level level,
  342. const char *function,
  343. const char *format,
  344. va_list args)
  345. {
  346. rspamd_logger_t *logger = log_data;
  347. rspamd_common_logv (logger, (GLogLevelFlags)level, "rdns", NULL,
  348. function, format, args);
  349. }
  350. static void
  351. rspamd_dns_server_init (struct upstream *up, guint idx, gpointer ud)
  352. {
  353. struct rspamd_dns_resolver *r = ud;
  354. rspamd_inet_addr_t *addr;
  355. void *serv;
  356. struct rdns_upstream_elt *elt;
  357. addr = rspamd_upstream_addr_next (up);
  358. if (r->cfg) {
  359. serv = rdns_resolver_add_server (r->r, rspamd_inet_address_to_string (addr),
  360. rspamd_inet_address_get_port (addr), 0, r->cfg->dns_io_per_server);
  361. }
  362. else {
  363. serv = rdns_resolver_add_server (r->r, rspamd_inet_address_to_string (addr),
  364. rspamd_inet_address_get_port (addr), 0, 8);
  365. }
  366. g_assert (serv != NULL);
  367. elt = rspamd_mempool_alloc0 (r->cfg->cfg_pool, sizeof (*elt));
  368. elt->server = serv;
  369. elt->lib_data = up;
  370. rspamd_upstream_set_data (up, elt);
  371. }
  372. static void
  373. rspamd_dns_server_reorder (struct upstream *up, guint idx, gpointer ud)
  374. {
  375. struct rspamd_dns_resolver *r = ud;
  376. rspamd_upstream_set_weight (up, rspamd_upstreams_count (r->ups) - idx + 1);
  377. }
  378. static bool
  379. rspamd_dns_resolv_conf_on_server (struct rdns_resolver *resolver,
  380. const char *name, unsigned int port,
  381. int priority, unsigned int io_cnt, void *ud)
  382. {
  383. struct rspamd_dns_resolver *dns_resolver = ud;
  384. struct rspamd_config *cfg;
  385. rspamd_inet_addr_t *addr;
  386. gint test_fd;
  387. cfg = dns_resolver->cfg;
  388. msg_info_config ("parsed nameserver %s from resolv.conf", name);
  389. /* Try to open a connection */
  390. if (!rspamd_parse_inet_address (&addr, name, strlen (name),
  391. RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  392. msg_warn_config ("cannot parse nameserver address %s", name);
  393. return FALSE;
  394. }
  395. rspamd_inet_address_set_port (addr, port);
  396. test_fd = rspamd_inet_address_connect (addr, SOCK_DGRAM, TRUE);
  397. if (test_fd == -1 && (errno != EINTR || errno != ECONNREFUSED || errno != ECONNRESET)) {
  398. msg_info_config ("cannot open connection to nameserver at address %s: %s",
  399. name, strerror (errno));
  400. rspamd_inet_address_free (addr);
  401. return FALSE;
  402. }
  403. rspamd_inet_address_free (addr);
  404. close (test_fd);
  405. return rspamd_upstreams_add_upstream (dns_resolver->ups, name, port,
  406. RSPAMD_UPSTREAM_PARSE_NAMESERVER,
  407. NULL);
  408. }
  409. static void
  410. rspamd_process_fake_reply (struct rspamd_config *cfg,
  411. struct rspamd_dns_resolver *dns_resolver,
  412. const ucl_object_t *cur_arr)
  413. {
  414. const ucl_object_t *cur;
  415. ucl_object_iter_t it;
  416. it = ucl_object_iterate_new (cur_arr);
  417. while ((cur = ucl_object_iterate_safe (it, true))) {
  418. const ucl_object_t *type_obj, *name_obj, *code_obj, *replies_obj;
  419. enum rdns_request_type rtype = RDNS_REQUEST_A;
  420. enum dns_rcode rcode = RDNS_RC_NOERROR;
  421. struct rdns_reply_entry *replies = NULL;
  422. const gchar *name = NULL;
  423. if (ucl_object_type (cur) != UCL_OBJECT) {
  424. continue;
  425. }
  426. name_obj = ucl_object_lookup (cur, "name");
  427. if (name_obj == NULL ||
  428. (name = ucl_object_tostring (name_obj)) == NULL) {
  429. msg_err_config ("no name for fake dns reply");
  430. continue;
  431. }
  432. type_obj = ucl_object_lookup (cur, "type");
  433. if (type_obj) {
  434. rtype = rdns_type_fromstr (ucl_object_tostring (type_obj));
  435. if (rtype == RDNS_REQUEST_INVALID) {
  436. msg_err_config ("invalid type for %s: %s", name,
  437. ucl_object_tostring (type_obj));
  438. continue;
  439. }
  440. }
  441. code_obj = ucl_object_lookup_any (cur, "code", "rcode", NULL);
  442. if (code_obj) {
  443. rcode = rdns_rcode_fromstr (ucl_object_tostring (code_obj));
  444. if (rcode == RDNS_RC_INVALID) {
  445. msg_err_config ("invalid rcode for %s: %s", name,
  446. ucl_object_tostring (code_obj));
  447. continue;
  448. }
  449. }
  450. if (rcode == RDNS_RC_NOERROR) {
  451. /* We want replies to be set for this rcode */
  452. replies_obj = ucl_object_lookup (cur, "replies");
  453. if (replies_obj == NULL || ucl_object_type (replies_obj) != UCL_ARRAY) {
  454. msg_err_config ("invalid replies for fake DNS record %s", name);
  455. continue;
  456. }
  457. ucl_object_iter_t rep_it;
  458. const ucl_object_t *rep_obj;
  459. rep_it = ucl_object_iterate_new (replies_obj);
  460. while ((rep_obj = ucl_object_iterate_safe (rep_it, true))) {
  461. const gchar *str_rep = ucl_object_tostring (rep_obj);
  462. struct rdns_reply_entry *rep;
  463. gchar **svec;
  464. if (str_rep == NULL) {
  465. msg_err_config ("invalid reply element for fake DNS record %s",
  466. name);
  467. continue;
  468. }
  469. rep = calloc (1, sizeof (*rep));
  470. g_assert (rep != NULL);
  471. rep->type = rtype;
  472. rep->ttl = 0;
  473. switch (rtype) {
  474. case RDNS_REQUEST_A:
  475. if (inet_pton (AF_INET, str_rep, &rep->content.a.addr) != 1) {
  476. msg_err_config ("invalid A reply element for fake "
  477. "DNS record %s: %s",
  478. name, str_rep);
  479. free (rep);
  480. }
  481. else {
  482. DL_APPEND (replies, rep);
  483. }
  484. break;
  485. case RDNS_REQUEST_NS:
  486. rep->content.ns.name = strdup (str_rep);
  487. DL_APPEND (replies, rep);
  488. break;
  489. case RDNS_REQUEST_PTR:
  490. rep->content.ptr.name = strdup (str_rep);
  491. DL_APPEND (replies, rep);
  492. break;
  493. case RDNS_REQUEST_MX:
  494. svec = g_strsplit_set (str_rep, " :", -1);
  495. if (svec && svec[0] && svec[1]) {
  496. rep->content.mx.priority = strtoul (svec[0], NULL, 10);
  497. rep->content.mx.name = strdup (svec[1]);
  498. DL_APPEND (replies, rep);
  499. }
  500. else {
  501. msg_err_config ("invalid MX reply element for fake "
  502. "DNS record %s: %s",
  503. name, str_rep);
  504. free (rep);
  505. }
  506. g_strfreev (svec);
  507. break;
  508. case RDNS_REQUEST_TXT:
  509. rep->content.txt.data = strdup (str_rep);
  510. DL_APPEND (replies, rep);
  511. break;
  512. case RDNS_REQUEST_SOA:
  513. svec = g_strsplit_set (str_rep, " :", -1);
  514. /* 7 elements */
  515. if (svec && svec[0] && svec[1] && svec[2] &&
  516. svec[3] && svec[4] && svec[5] && svec[6]) {
  517. rep->content.soa.mname = strdup (svec[0]);
  518. rep->content.soa.admin = strdup (svec[1]);
  519. rep->content.soa.serial = strtoul (svec[2], NULL, 10);
  520. rep->content.soa.refresh = strtol (svec[3], NULL, 10);
  521. rep->content.soa.retry = strtol (svec[4], NULL, 10);
  522. rep->content.soa.expire = strtol (svec[5], NULL, 10);
  523. rep->content.soa.minimum = strtoul (svec[6], NULL, 10);
  524. DL_APPEND (replies, rep);
  525. }
  526. else {
  527. msg_err_config ("invalid MX reply element for fake "
  528. "DNS record %s: %s",
  529. name, str_rep);
  530. free (rep);
  531. }
  532. g_strfreev (svec);
  533. break;
  534. case RDNS_REQUEST_AAAA:
  535. if (inet_pton (AF_INET6, str_rep, &rep->content.aaa.addr) != 1) {
  536. msg_err_config ("invalid AAAA reply element for fake "
  537. "DNS record %s: %s",
  538. name, str_rep);
  539. free (rep);
  540. }
  541. else {
  542. DL_APPEND (replies, rep);
  543. }
  544. case RDNS_REQUEST_SRV:
  545. default:
  546. msg_err_config ("invalid or unsupported reply element "
  547. "for fake DNS record %s(%s): %s",
  548. name, rdns_str_from_type (rtype), str_rep);
  549. free (rep);
  550. break;
  551. }
  552. }
  553. ucl_object_iterate_free (rep_it);
  554. if (replies) {
  555. struct rdns_reply_entry *tmp_entry;
  556. guint i = 0;
  557. DL_COUNT (replies, tmp_entry, i);
  558. msg_info_config ("added fake record: %s(%s); %d replies", name,
  559. rdns_str_from_type (rtype), i);
  560. rdns_resolver_set_fake_reply (dns_resolver->r,
  561. name, rtype, rcode, replies);
  562. }
  563. else {
  564. msg_warn_config ("record %s has no replies, not adding",
  565. name);
  566. }
  567. }
  568. else {
  569. /* This entry returns some non valid code, no replies are possible */
  570. replies_obj = ucl_object_lookup (cur, "replies");
  571. if (replies_obj) {
  572. msg_warn_config ("replies are set for non-successful return "
  573. "code for %s(%s), they will be ignored", name, rdns_str_from_type (rtype));
  574. }
  575. rdns_resolver_set_fake_reply (dns_resolver->r,
  576. name, rtype, rcode, NULL);
  577. }
  578. }
  579. ucl_object_iterate_free (it);
  580. }
  581. static bool
  582. rspamd_dns_read_hosts_file (struct rspamd_config *cfg,
  583. struct rspamd_dns_resolver *dns_resolver,
  584. const gchar *fname)
  585. {
  586. gchar *linebuf = NULL;
  587. gsize buflen = 0;
  588. gssize r;
  589. FILE *fp;
  590. guint nadded = 0;
  591. fp = fopen (fname, "r");
  592. if (fp == NULL) {
  593. /* Hack to reduce noise */
  594. if (strcmp (fname, "/etc/hosts") == 0) {
  595. msg_info_config ("cannot open hosts file %s: %s", fname,
  596. strerror (errno));
  597. }
  598. else {
  599. msg_err_config ("cannot open hosts file %s: %s", fname,
  600. strerror (errno));
  601. }
  602. return false;
  603. }
  604. while ((r = getline (&linebuf, &buflen, fp)) > 0) {
  605. if (linebuf[0] == '#' || g_ascii_isspace (linebuf[0])) {
  606. /* Skip comment or empty line */
  607. continue;
  608. }
  609. g_strchomp (linebuf);
  610. gchar **elts = g_strsplit_set (linebuf, " \t\v", -1);
  611. rspamd_inet_addr_t *addr;
  612. if (!rspamd_parse_inet_address (&addr, elts[0], strlen (elts[0]),
  613. RSPAMD_INET_ADDRESS_PARSE_REMOTE|RSPAMD_INET_ADDRESS_PARSE_NO_UNIX)) {
  614. msg_warn_config ("bad hosts file line: %s; cannot parse address", linebuf);
  615. }
  616. else {
  617. /* Add all FQDN + aliases if any */
  618. gchar **cur_name = &elts[1];
  619. while (*cur_name) {
  620. if (strlen (*cur_name) == 0) {
  621. cur_name ++;
  622. continue;
  623. }
  624. if (*cur_name[0] == '#') {
  625. /* Start of the comment */
  626. break;
  627. }
  628. struct rdns_reply_entry *rep;
  629. rep = calloc (1, sizeof (*rep));
  630. g_assert (rep != NULL);
  631. rep->ttl = 0;
  632. if (rspamd_inet_address_get_af (addr) == AF_INET) {
  633. socklen_t unused;
  634. const struct sockaddr_in *sin = (const struct sockaddr_in *)
  635. rspamd_inet_address_get_sa (addr, &unused);
  636. rep->type = RDNS_REQUEST_A;
  637. memcpy (&rep->content.a.addr, &sin->sin_addr,
  638. sizeof (rep->content.a.addr));
  639. }
  640. else {
  641. socklen_t unused;
  642. const struct sockaddr_in6 *sin6 = (const struct sockaddr_in6 *)
  643. rspamd_inet_address_get_sa (addr, &unused);
  644. rep->type = RDNS_REQUEST_AAAA;
  645. memcpy (&rep->content.aaa.addr, &sin6->sin6_addr,
  646. sizeof (rep->content.aaa.addr));
  647. }
  648. rep->next = NULL;
  649. rep->prev = rep;
  650. rdns_resolver_set_fake_reply (dns_resolver->r,
  651. *cur_name, rep->type, RDNS_RC_NOERROR, rep);
  652. msg_debug_config ("added fake record %s -> %s from hosts file %s",
  653. *cur_name, rspamd_inet_address_to_string (addr), fname);
  654. cur_name ++;
  655. nadded ++;
  656. }
  657. rspamd_inet_address_free (addr);
  658. }
  659. g_strfreev (elts);
  660. }
  661. if (linebuf) {
  662. free (linebuf);
  663. }
  664. msg_info_config ("processed host file %s; %d records added", fname, nadded);
  665. fclose (fp);
  666. return true;
  667. }
  668. static void
  669. rspamd_dns_resolver_config_ucl (struct rspamd_config *cfg,
  670. struct rspamd_dns_resolver *dns_resolver,
  671. const ucl_object_t *dns_section)
  672. {
  673. const ucl_object_t *fake_replies, *fails_cache_size, *fails_cache_time,
  674. *hosts;
  675. static const ev_tstamp default_fails_cache_time = 10.0;
  676. /* Process fake replies */
  677. fake_replies = ucl_object_lookup_any (dns_section, "fake_records",
  678. "fake_replies", NULL);
  679. if (fake_replies && ucl_object_type (fake_replies) == UCL_ARRAY) {
  680. const ucl_object_t *cur_arr;
  681. DL_FOREACH (fake_replies, cur_arr) {
  682. rspamd_process_fake_reply (cfg, dns_resolver, cur_arr);
  683. }
  684. }
  685. hosts = ucl_object_lookup (dns_section, "hosts");
  686. if (hosts == NULL) {
  687. /* Read normal `/etc/hosts` file */
  688. rspamd_dns_read_hosts_file (cfg, dns_resolver, "/etc/hosts");
  689. }
  690. else if (ucl_object_type (hosts) == UCL_NULL) {
  691. /* Do nothing, hosts are explicitly disabled */
  692. }
  693. else if (ucl_object_type (hosts) == UCL_STRING) {
  694. if (!rspamd_dns_read_hosts_file (cfg, dns_resolver, ucl_object_tostring (hosts))) {
  695. msg_err_config ("cannot read hosts file %s", ucl_object_tostring (hosts));
  696. }
  697. }
  698. else if (ucl_object_type (hosts) == UCL_ARRAY) {
  699. const ucl_object_t *cur;
  700. ucl_object_iter_t it = NULL;
  701. while ((cur = ucl_object_iterate (hosts, &it, true)) != NULL) {
  702. if (!rspamd_dns_read_hosts_file (cfg, dns_resolver, ucl_object_tostring (cur))) {
  703. msg_err_config ("cannot read hosts file %s", ucl_object_tostring (cur));
  704. }
  705. }
  706. }
  707. else {
  708. msg_err_config ("invalid type for hosts parameter: %s",
  709. ucl_object_type_to_string (ucl_object_type (hosts)));
  710. }
  711. fails_cache_size = ucl_object_lookup (dns_section, "fails_cache_size");
  712. if (fails_cache_size && ucl_object_type (fails_cache_size) == UCL_INT) {
  713. dns_resolver->fails_cache_time = default_fails_cache_time;
  714. fails_cache_time = ucl_object_lookup (dns_section, "fails_cache_time");
  715. if (fails_cache_time) {
  716. dns_resolver->fails_cache_time = ucl_object_todouble (fails_cache_time);
  717. }
  718. dns_resolver->fails_cache = rspamd_lru_hash_new_full (
  719. ucl_object_toint (fails_cache_size),
  720. g_free, (GDestroyNotify)rdns_request_release,
  721. rspamd_dns_fail_hash, rspamd_dns_fail_equal);
  722. }
  723. }
  724. struct rspamd_dns_resolver *
  725. rspamd_dns_resolver_init (rspamd_logger_t *logger,
  726. struct ev_loop *ev_base,
  727. struct rspamd_config *cfg)
  728. {
  729. struct rspamd_dns_resolver *dns_resolver;
  730. dns_resolver = g_malloc0 (sizeof (struct rspamd_dns_resolver));
  731. dns_resolver->event_loop = ev_base;
  732. if (cfg != NULL) {
  733. dns_resolver->request_timeout = cfg->dns_timeout;
  734. dns_resolver->max_retransmits = cfg->dns_retransmits;
  735. }
  736. else {
  737. dns_resolver->request_timeout = 1;
  738. dns_resolver->max_retransmits = 2;
  739. }
  740. /* IDN translation is performed in Rspamd now */
  741. dns_resolver->r = rdns_resolver_new (RDNS_RESOLVER_NOIDN);
  742. UErrorCode uc_err = U_ZERO_ERROR;
  743. dns_resolver->uidna = uidna_openUTS46 (UIDNA_DEFAULT, &uc_err);
  744. g_assert (!U_FAILURE (uc_err));
  745. rdns_bind_libev (dns_resolver->r, dns_resolver->event_loop);
  746. if (cfg != NULL) {
  747. rdns_resolver_set_log_level (dns_resolver->r, cfg->log_level);
  748. dns_resolver->cfg = cfg;
  749. rdns_resolver_set_dnssec (dns_resolver->r, cfg->enable_dnssec);
  750. if (cfg->nameservers == NULL) {
  751. /* Parse resolv.conf */
  752. dns_resolver->ups = rspamd_upstreams_create (cfg->ups_ctx);
  753. rspamd_upstreams_set_flags (dns_resolver->ups,
  754. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  755. rspamd_upstreams_set_rotation (dns_resolver->ups,
  756. RSPAMD_UPSTREAM_MASTER_SLAVE);
  757. if (!rdns_resolver_parse_resolv_conf_cb (dns_resolver->r,
  758. "/etc/resolv.conf",
  759. rspamd_dns_resolv_conf_on_server,
  760. dns_resolver)) {
  761. msg_err ("cannot parse resolv.conf and no nameservers defined, "
  762. "so no ways to resolve addresses");
  763. rdns_resolver_release (dns_resolver->r);
  764. dns_resolver->r = NULL;
  765. return dns_resolver;
  766. }
  767. /* Use normal resolv.conf rules */
  768. rspamd_upstreams_foreach (dns_resolver->ups, rspamd_dns_server_reorder,
  769. dns_resolver);
  770. }
  771. else {
  772. dns_resolver->ups = rspamd_upstreams_create (cfg->ups_ctx);
  773. rspamd_upstreams_set_flags (dns_resolver->ups,
  774. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  775. if (!rspamd_upstreams_from_ucl (dns_resolver->ups, cfg->nameservers,
  776. 53, dns_resolver)) {
  777. msg_err_config ("cannot parse DNS nameservers definitions");
  778. rdns_resolver_release (dns_resolver->r);
  779. dns_resolver->r = NULL;
  780. return dns_resolver;
  781. }
  782. }
  783. rspamd_upstreams_foreach (dns_resolver->ups, rspamd_dns_server_init,
  784. dns_resolver);
  785. rdns_resolver_set_upstream_lib (dns_resolver->r, &rspamd_ups_ctx,
  786. dns_resolver->ups);
  787. cfg->dns_resolver = dns_resolver;
  788. if (cfg->rcl_obj) {
  789. /* Configure additional options */
  790. const ucl_object_t *opts_section, *dns_section, *tmp;
  791. opts_section = ucl_object_lookup (cfg->rcl_obj, "options");
  792. if (opts_section) {
  793. /* TODO: implement a more simple merge logic */
  794. DL_FOREACH (opts_section, tmp) {
  795. dns_section = ucl_object_lookup (opts_section, "dns");
  796. if (dns_section) {
  797. rspamd_dns_resolver_config_ucl (cfg, dns_resolver,
  798. dns_section);
  799. }
  800. }
  801. }
  802. }
  803. }
  804. rdns_resolver_set_logger (dns_resolver->r, rspamd_rnds_log_bridge, logger);
  805. rdns_resolver_init (dns_resolver->r);
  806. return dns_resolver;
  807. }
  808. void
  809. rspamd_dns_resolver_deinit (struct rspamd_dns_resolver *resolver)
  810. {
  811. if (resolver) {
  812. if (resolver->r) {
  813. rdns_resolver_release (resolver->r);
  814. }
  815. if (resolver->ups) {
  816. rspamd_upstreams_destroy (resolver->ups);
  817. }
  818. if (resolver->fails_cache) {
  819. rspamd_lru_hash_destroy (resolver->fails_cache);
  820. }
  821. uidna_close (resolver->uidna);
  822. g_free (resolver);
  823. }
  824. }
  825. static struct rdns_upstream_elt*
  826. rspamd_dns_select_upstream (const char *name,
  827. size_t len, void *ups_data)
  828. {
  829. struct upstream_list *ups = ups_data;
  830. struct upstream *up;
  831. up = rspamd_upstream_get (ups, RSPAMD_UPSTREAM_ROUND_ROBIN, name, len);
  832. if (up) {
  833. msg_debug ("select %s", rspamd_upstream_name (up));
  834. return rspamd_upstream_get_data (up);
  835. }
  836. return NULL;
  837. }
  838. static struct rdns_upstream_elt*
  839. rspamd_dns_select_upstream_retransmit (
  840. const char *name,
  841. size_t len,
  842. struct rdns_upstream_elt *prev_elt,
  843. void *ups_data)
  844. {
  845. struct upstream_list *ups = ups_data;
  846. struct upstream *up;
  847. if (prev_elt) {
  848. up = rspamd_upstream_get_except (ups, (struct upstream *)prev_elt->lib_data,
  849. RSPAMD_UPSTREAM_MASTER_SLAVE, name, len);
  850. }
  851. else {
  852. up = rspamd_upstream_get_forced (ups, RSPAMD_UPSTREAM_RANDOM, name, len);
  853. }
  854. if (up) {
  855. msg_debug ("select forced %s", rspamd_upstream_name (up));
  856. return rspamd_upstream_get_data (up);
  857. }
  858. return NULL;
  859. }
  860. static void
  861. rspamd_dns_upstream_ok (struct rdns_upstream_elt *elt,
  862. void *ups_data)
  863. {
  864. struct upstream *up = elt->lib_data;
  865. rspamd_upstream_ok (up);
  866. }
  867. static void
  868. rspamd_dns_upstream_fail (struct rdns_upstream_elt *elt,
  869. void *ups_data, const gchar *reason)
  870. {
  871. struct upstream *up = elt->lib_data;
  872. rspamd_upstream_fail (up, FALSE, reason);
  873. }
  874. static unsigned int
  875. rspamd_dns_upstream_count (void *ups_data)
  876. {
  877. struct upstream_list *ups = ups_data;
  878. return rspamd_upstreams_alive (ups);
  879. }
  880. gchar*
  881. rspamd_dns_resolver_idna_convert_utf8 (struct rspamd_dns_resolver *resolver,
  882. rspamd_mempool_t *pool,
  883. const char *name,
  884. gint namelen,
  885. guint *outlen)
  886. {
  887. if (resolver == NULL || resolver->uidna == NULL || name == NULL
  888. || namelen > DNS_D_MAXNAME) {
  889. return NULL;
  890. }
  891. guint dest_len;
  892. UErrorCode uc_err = U_ZERO_ERROR;
  893. UIDNAInfo info = UIDNA_INFO_INITIALIZER;
  894. /* Calculate length required */
  895. dest_len = uidna_nameToASCII_UTF8 (resolver->uidna, name, namelen,
  896. NULL, 0, &info, &uc_err);
  897. if (uc_err == U_BUFFER_OVERFLOW_ERROR) {
  898. gchar *dest;
  899. if (pool) {
  900. dest = rspamd_mempool_alloc (pool, dest_len + 1);
  901. }
  902. else {
  903. dest = g_malloc (dest_len + 1);
  904. }
  905. uc_err = U_ZERO_ERROR;
  906. dest_len = uidna_nameToASCII_UTF8 (resolver->uidna, name, namelen,
  907. dest, dest_len + 1, &info, &uc_err);
  908. if (U_FAILURE (uc_err)) {
  909. if (!pool) {
  910. g_free (dest);
  911. }
  912. return NULL;
  913. }
  914. dest[dest_len] = '\0';
  915. if (outlen) {
  916. *outlen = dest_len;
  917. }
  918. return dest;
  919. }
  920. return NULL;
  921. }