You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

dns.c 28KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "contrib/librdns/rdns.h"
  17. #include "config.h"
  18. #include "dns.h"
  19. #include "rspamd.h"
  20. #include "utlist.h"
  21. #include "contrib/librdns/rdns.h"
  22. #include "contrib/librdns/dns_private.h"
  23. #include "contrib/librdns/rdns_ev.h"
  24. #include "unix-std.h"
  25. #include <unicode/uidna.h>
  26. static const gchar *M = "rspamd dns";
  27. static struct rdns_upstream_elt* rspamd_dns_select_upstream (const char *name,
  28. size_t len, void *ups_data);
  29. static struct rdns_upstream_elt* rspamd_dns_select_upstream_retransmit (
  30. const char *name,
  31. size_t len,
  32. struct rdns_upstream_elt *prev_elt,
  33. void *ups_data);
  34. static void rspamd_dns_upstream_ok (struct rdns_upstream_elt *elt,
  35. void *ups_data);
  36. static void rspamd_dns_upstream_fail (struct rdns_upstream_elt *elt,
  37. void *ups_data, const gchar *reason);
  38. static unsigned int rspamd_dns_upstream_count (void *ups_data);
  39. static struct rdns_upstream_context rspamd_ups_ctx = {
  40. .select = rspamd_dns_select_upstream,
  41. .select_retransmit = rspamd_dns_select_upstream_retransmit,
  42. .ok = rspamd_dns_upstream_ok,
  43. .fail = rspamd_dns_upstream_fail,
  44. .count = rspamd_dns_upstream_count,
  45. .data = NULL
  46. };
  47. struct rspamd_dns_request_ud {
  48. struct rspamd_async_session *session;
  49. dns_callback_type cb;
  50. gpointer ud;
  51. rspamd_mempool_t *pool;
  52. struct rspamd_task *task;
  53. struct rspamd_symcache_item *item;
  54. struct rdns_request *req;
  55. struct rdns_reply *reply;
  56. };
  57. struct rspamd_dns_fail_cache_entry {
  58. const char *name;
  59. gint32 namelen;
  60. enum rdns_request_type type;
  61. };
  62. static const gint8 ascii_dns_table[128]={
  63. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  64. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
  65. /* HYPHEN-MINUS..FULL STOP */
  66. -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 1, 1, -1,
  67. /* 0..9 digits */
  68. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1, -1,
  69. /* LATIN CAPITAL LETTER A..LATIN CAPITAL LETTER Z */
  70. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  71. /* _ */
  72. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, 1,
  73. /* LATIN SMALL LETTER A..LATIN SMALL LETTER Z */
  74. -1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
  75. 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, -1, -1, -1, -1, -1
  76. };
  77. static guint
  78. rspamd_dns_fail_hash (gconstpointer ptr)
  79. {
  80. struct rspamd_dns_fail_cache_entry *elt =
  81. (struct rspamd_dns_fail_cache_entry *)ptr;
  82. /* We don't care about type when doing hashing */
  83. return rspamd_cryptobox_fast_hash (elt->name, elt->namelen,
  84. rspamd_hash_seed ());
  85. }
  86. static gboolean
  87. rspamd_dns_fail_equal (gconstpointer p1, gconstpointer p2)
  88. {
  89. struct rspamd_dns_fail_cache_entry *e1 = (struct rspamd_dns_fail_cache_entry *)p1,
  90. *e2 = (struct rspamd_dns_fail_cache_entry *)p2;
  91. if (e1->type == e2->type && e1->namelen == e2->namelen) {
  92. return memcmp (e1->name, e2->name, e1->namelen) == 0;
  93. }
  94. return FALSE;
  95. }
  96. static void
  97. rspamd_dns_fin_cb (gpointer arg)
  98. {
  99. struct rspamd_dns_request_ud *reqdata = (struct rspamd_dns_request_ud *)arg;
  100. if (reqdata->item) {
  101. rspamd_symcache_set_cur_item (reqdata->task, reqdata->item);
  102. }
  103. if (reqdata->reply) {
  104. reqdata->cb (reqdata->reply, reqdata->ud);
  105. }
  106. else {
  107. struct rdns_reply fake_reply;
  108. memset (&fake_reply, 0, sizeof (fake_reply));
  109. fake_reply.code = RDNS_RC_TIMEOUT;
  110. fake_reply.request = reqdata->req;
  111. fake_reply.resolver = reqdata->req->resolver;
  112. fake_reply.requested_name = reqdata->req->requested_names[0].name;
  113. reqdata->cb (&fake_reply, reqdata->ud);
  114. }
  115. rdns_request_release (reqdata->req);
  116. if (reqdata->item) {
  117. rspamd_symcache_item_async_dec_check (reqdata->task,
  118. reqdata->item, M);
  119. }
  120. if (reqdata->pool == NULL) {
  121. g_free (reqdata);
  122. }
  123. }
  124. static void
  125. rspamd_dns_callback (struct rdns_reply *reply, gpointer ud)
  126. {
  127. struct rspamd_dns_request_ud *reqdata = ud;
  128. reqdata->reply = reply;
  129. if (reqdata->session) {
  130. if (reply->code == RDNS_RC_SERVFAIL &&
  131. reqdata->task &&
  132. reqdata->task->resolver->fails_cache) {
  133. /* Add to cache... */
  134. const gchar *name = reqdata->req->requested_names[0].name;
  135. gchar *target;
  136. gsize namelen;
  137. struct rspamd_dns_fail_cache_entry *nentry;
  138. /* Allocate in a single entry to allow further free in a single call */
  139. namelen = strlen (name);
  140. nentry = g_malloc (sizeof (nentry) + namelen + 1);
  141. target = ((gchar *)nentry) + sizeof (nentry);
  142. rspamd_strlcpy (target, name, namelen + 1);
  143. nentry->type = reqdata->req->requested_names[0].type;
  144. nentry->name = target;
  145. nentry->namelen = namelen;
  146. /* Rdns request is retained there */
  147. rspamd_lru_hash_insert (reqdata->task->resolver->fails_cache,
  148. nentry, rdns_request_retain (reply->request),
  149. reqdata->task->task_timestamp,
  150. reqdata->task->resolver->fails_cache_time);
  151. }
  152. /*
  153. * Ref event to avoid double unref by
  154. * event removing
  155. */
  156. rdns_request_retain (reply->request);
  157. rspamd_session_remove_event (reqdata->session,
  158. rspamd_dns_fin_cb, reqdata);
  159. }
  160. else {
  161. reqdata->cb (reply, reqdata->ud);
  162. if (reqdata->pool == NULL) {
  163. g_free (reqdata);
  164. }
  165. }
  166. }
  167. struct rspamd_dns_request_ud *
  168. rspamd_dns_resolver_request (struct rspamd_dns_resolver *resolver,
  169. struct rspamd_async_session *session,
  170. rspamd_mempool_t *pool,
  171. dns_callback_type cb,
  172. gpointer ud,
  173. enum rdns_request_type type,
  174. const char *name)
  175. {
  176. struct rdns_request *req;
  177. struct rspamd_dns_request_ud *reqdata = NULL;
  178. guint nlen = strlen (name);
  179. gchar *real_name = NULL;
  180. g_assert (resolver != NULL);
  181. if (resolver->r == NULL) {
  182. return NULL;
  183. }
  184. if (nlen == 0 || nlen > DNS_D_MAXNAME) {
  185. return NULL;
  186. }
  187. if (session && rspamd_session_blocked (session)) {
  188. return NULL;
  189. }
  190. if (rspamd_str_has_8bit (name, nlen)) {
  191. /* Convert to idna using libicu as it follows all the standards */
  192. real_name = rspamd_dns_resolver_idna_convert_utf8 (resolver, pool,
  193. name, nlen, &nlen);
  194. if (real_name == NULL) {
  195. return NULL;
  196. }
  197. name = real_name;
  198. }
  199. /* Name is now in ASCII only */
  200. for (gsize i = 0; i < nlen; i ++) {
  201. if (ascii_dns_table[((unsigned int)name[i]) & 0x7F] == -1) {
  202. /* Invalid DNS name requested */
  203. if (!pool) {
  204. g_free (real_name);
  205. }
  206. return NULL;
  207. }
  208. }
  209. if (pool != NULL) {
  210. reqdata =
  211. rspamd_mempool_alloc0 (pool, sizeof (struct rspamd_dns_request_ud));
  212. }
  213. else {
  214. reqdata = g_malloc0 (sizeof (struct rspamd_dns_request_ud));
  215. }
  216. reqdata->pool = pool;
  217. reqdata->session = session;
  218. reqdata->cb = cb;
  219. reqdata->ud = ud;
  220. req = rdns_make_request_full (resolver->r, rspamd_dns_callback, reqdata,
  221. resolver->request_timeout, resolver->max_retransmits, 1, name,
  222. type);
  223. reqdata->req = req;
  224. if (session) {
  225. if (req != NULL) {
  226. rspamd_session_add_event (session,
  227. (event_finalizer_t) rspamd_dns_fin_cb,
  228. reqdata,
  229. M);
  230. }
  231. }
  232. if (req == NULL) {
  233. if (pool == NULL) {
  234. g_free (reqdata);
  235. g_free (real_name);
  236. }
  237. return NULL;
  238. }
  239. if (real_name && pool == NULL) {
  240. g_free (real_name);
  241. }
  242. return reqdata;
  243. }
  244. struct rspamd_dns_cached_delayed_cbdata {
  245. struct rspamd_task *task;
  246. dns_callback_type cb;
  247. gpointer ud;
  248. ev_timer tm;
  249. struct rdns_request *req;
  250. };
  251. static void
  252. rspamd_fail_cache_cb (EV_P_ ev_timer *w, int revents)
  253. {
  254. struct rspamd_dns_cached_delayed_cbdata *cbd =
  255. (struct rspamd_dns_cached_delayed_cbdata *)w->data;
  256. struct rdns_reply fake_reply;
  257. ev_timer_stop (EV_A_ w);
  258. memset (&fake_reply, 0, sizeof (fake_reply));
  259. fake_reply.code = RDNS_RC_SERVFAIL;
  260. fake_reply.request = cbd->req;
  261. fake_reply.resolver = cbd->req->resolver;
  262. fake_reply.requested_name = cbd->req->requested_names[0].name;
  263. cbd->cb (&fake_reply, cbd->ud);
  264. rdns_request_release (cbd->req);
  265. }
  266. static gboolean
  267. make_dns_request_task_common (struct rspamd_task *task,
  268. dns_callback_type cb,
  269. gpointer ud,
  270. enum rdns_request_type type,
  271. const char *name,
  272. gboolean forced)
  273. {
  274. struct rspamd_dns_request_ud *reqdata;
  275. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  276. return FALSE;
  277. }
  278. if (task->resolver->fails_cache) {
  279. /* Search in failures cache */
  280. struct rspamd_dns_fail_cache_entry search;
  281. struct rdns_request *req;
  282. search.name = name;
  283. search.namelen = strlen (name);
  284. search.type = type;
  285. if ((req = rspamd_lru_hash_lookup (task->resolver->fails_cache,
  286. &search, task->task_timestamp)) != NULL) {
  287. /*
  288. * We need to reply with SERVFAIL again to the API, so add a special
  289. * timer, uh-oh, and fire it
  290. */
  291. struct rspamd_dns_cached_delayed_cbdata *cbd =
  292. rspamd_mempool_alloc0 (task->task_pool, sizeof (*cbd));
  293. ev_timer_init (&cbd->tm, rspamd_fail_cache_cb, 0.0, 0.0);
  294. cbd->task = task;
  295. cbd->cb = cb;
  296. cbd->ud = ud;
  297. cbd->req = rdns_request_retain (req);
  298. cbd->tm.data = cbd;
  299. return TRUE;
  300. }
  301. }
  302. reqdata = rspamd_dns_resolver_request (
  303. task->resolver, task->s, task->task_pool, cb, ud,
  304. type, name);
  305. if (reqdata) {
  306. task->dns_requests ++;
  307. reqdata->task = task;
  308. reqdata->item = rspamd_symcache_get_cur_item (task);
  309. if (reqdata->item) {
  310. /* We are inside some session */
  311. rspamd_symcache_item_async_inc (task, reqdata->item, M);
  312. }
  313. if (!forced && task->dns_requests >= task->cfg->dns_max_requests) {
  314. msg_info_task ("stop resolving on reaching %ud requests",
  315. task->dns_requests);
  316. }
  317. return TRUE;
  318. }
  319. return FALSE;
  320. }
  321. gboolean
  322. rspamd_dns_resolver_request_task (struct rspamd_task *task,
  323. dns_callback_type cb,
  324. gpointer ud,
  325. enum rdns_request_type type,
  326. const char *name)
  327. {
  328. return make_dns_request_task_common (task, cb, ud, type, name, FALSE);
  329. }
  330. gboolean
  331. rspamd_dns_resolver_request_task_forced (struct rspamd_task *task,
  332. dns_callback_type cb,
  333. gpointer ud,
  334. enum rdns_request_type type,
  335. const char *name)
  336. {
  337. return make_dns_request_task_common (task, cb, ud, type, name, TRUE);
  338. }
  339. static void rspamd_rnds_log_bridge (
  340. void *log_data,
  341. enum rdns_log_level level,
  342. const char *function,
  343. const char *format,
  344. va_list args)
  345. {
  346. rspamd_logger_t *logger = log_data;
  347. rspamd_common_logv (logger, (GLogLevelFlags)level, "rdns", NULL,
  348. function, format, args);
  349. }
  350. static void
  351. rspamd_dns_server_init (struct upstream *up, guint idx, gpointer ud)
  352. {
  353. struct rspamd_dns_resolver *r = ud;
  354. rspamd_inet_addr_t *addr;
  355. void *serv;
  356. struct rdns_upstream_elt *elt;
  357. addr = rspamd_upstream_addr_next (up);
  358. if (r->cfg) {
  359. serv = rdns_resolver_add_server (r->r, rspamd_inet_address_to_string (addr),
  360. rspamd_inet_address_get_port (addr), 0, r->cfg->dns_io_per_server);
  361. }
  362. else {
  363. serv = rdns_resolver_add_server (r->r, rspamd_inet_address_to_string (addr),
  364. rspamd_inet_address_get_port (addr), 0, 8);
  365. }
  366. g_assert (serv != NULL);
  367. elt = rspamd_mempool_alloc0 (r->cfg->cfg_pool, sizeof (*elt));
  368. elt->server = serv;
  369. elt->lib_data = up;
  370. rspamd_upstream_set_data (up, elt);
  371. }
  372. static void
  373. rspamd_dns_server_reorder (struct upstream *up, guint idx, gpointer ud)
  374. {
  375. struct rspamd_dns_resolver *r = ud;
  376. rspamd_upstream_set_weight (up, rspamd_upstreams_count (r->ups) - idx + 1);
  377. }
  378. static bool
  379. rspamd_dns_resolv_conf_on_server (struct rdns_resolver *resolver,
  380. const char *name, unsigned int port,
  381. int priority, unsigned int io_cnt, void *ud)
  382. {
  383. struct rspamd_dns_resolver *dns_resolver = ud;
  384. struct rspamd_config *cfg;
  385. rspamd_inet_addr_t *addr;
  386. gint test_fd;
  387. cfg = dns_resolver->cfg;
  388. msg_info_config ("parsed nameserver %s from resolv.conf", name);
  389. /* Try to open a connection */
  390. if (!rspamd_parse_inet_address (&addr, name, strlen (name),
  391. RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  392. msg_warn_config ("cannot parse nameserver address %s", name);
  393. return FALSE;
  394. }
  395. rspamd_inet_address_set_port (addr, port);
  396. test_fd = rspamd_inet_address_connect (addr, SOCK_DGRAM, TRUE);
  397. if (test_fd == -1 && (errno != EINTR || errno != ECONNREFUSED || errno != ECONNRESET)) {
  398. msg_info_config ("cannot open connection to nameserver at address %s: %s",
  399. name, strerror (errno));
  400. rspamd_inet_address_free (addr);
  401. return FALSE;
  402. }
  403. rspamd_inet_address_free (addr);
  404. close (test_fd);
  405. return rspamd_upstreams_add_upstream (dns_resolver->ups, name, port,
  406. RSPAMD_UPSTREAM_PARSE_NAMESERVER,
  407. NULL);
  408. }
  409. static void
  410. rspamd_process_fake_reply (struct rspamd_config *cfg,
  411. struct rspamd_dns_resolver *dns_resolver,
  412. const ucl_object_t *cur_arr)
  413. {
  414. const ucl_object_t *cur;
  415. ucl_object_iter_t it;
  416. it = ucl_object_iterate_new (cur_arr);
  417. while ((cur = ucl_object_iterate_safe (it, true))) {
  418. const ucl_object_t *type_obj, *name_obj, *code_obj, *replies_obj;
  419. enum rdns_request_type rtype = RDNS_REQUEST_A;
  420. enum dns_rcode rcode = RDNS_RC_NOERROR;
  421. struct rdns_reply_entry *replies = NULL;
  422. const gchar *name = NULL;
  423. if (ucl_object_type (cur) != UCL_OBJECT) {
  424. continue;
  425. }
  426. name_obj = ucl_object_lookup (cur, "name");
  427. if (name_obj == NULL ||
  428. (name = ucl_object_tostring (name_obj)) == NULL) {
  429. msg_err_config ("no name for fake dns reply");
  430. continue;
  431. }
  432. type_obj = ucl_object_lookup (cur, "type");
  433. if (type_obj) {
  434. rtype = rdns_type_fromstr (ucl_object_tostring (type_obj));
  435. if (rtype == RDNS_REQUEST_INVALID) {
  436. msg_err_config ("invalid type for %s: %s", name,
  437. ucl_object_tostring (type_obj));
  438. continue;
  439. }
  440. }
  441. code_obj = ucl_object_lookup_any (cur, "code", "rcode", NULL);
  442. if (code_obj) {
  443. rcode = rdns_rcode_fromstr (ucl_object_tostring (code_obj));
  444. if (rcode == RDNS_RC_INVALID) {
  445. msg_err_config ("invalid rcode for %s: %s", name,
  446. ucl_object_tostring (code_obj));
  447. continue;
  448. }
  449. }
  450. if (rcode == RDNS_RC_NOERROR) {
  451. /* We want replies to be set for this rcode */
  452. replies_obj = ucl_object_lookup (cur, "replies");
  453. if (replies_obj == NULL || ucl_object_type (replies_obj) != UCL_ARRAY) {
  454. msg_err_config ("invalid replies for fake DNS record %s", name);
  455. continue;
  456. }
  457. ucl_object_iter_t rep_it;
  458. const ucl_object_t *rep_obj;
  459. rep_it = ucl_object_iterate_new (replies_obj);
  460. while ((rep_obj = ucl_object_iterate_safe (rep_it, true))) {
  461. const gchar *str_rep = ucl_object_tostring (rep_obj);
  462. struct rdns_reply_entry *rep;
  463. gchar **svec;
  464. if (str_rep == NULL) {
  465. msg_err_config ("invalid reply element for fake DNS record %s",
  466. name);
  467. continue;
  468. }
  469. rep = calloc (1, sizeof (*rep));
  470. g_assert (rep != NULL);
  471. rep->type = rtype;
  472. rep->ttl = 0;
  473. switch (rtype) {
  474. case RDNS_REQUEST_A:
  475. if (inet_pton (AF_INET, str_rep, &rep->content.a.addr) != 1) {
  476. msg_err_config ("invalid A reply element for fake "
  477. "DNS record %s: %s",
  478. name, str_rep);
  479. free (rep);
  480. }
  481. else {
  482. DL_APPEND (replies, rep);
  483. }
  484. break;
  485. case RDNS_REQUEST_NS:
  486. rep->content.ns.name = strdup (str_rep);
  487. DL_APPEND (replies, rep);
  488. break;
  489. case RDNS_REQUEST_PTR:
  490. rep->content.ptr.name = strdup (str_rep);
  491. DL_APPEND (replies, rep);
  492. break;
  493. case RDNS_REQUEST_MX:
  494. svec = g_strsplit_set (str_rep, " :", -1);
  495. if (svec && svec[0] && svec[1]) {
  496. rep->content.mx.priority = strtoul (svec[0], NULL, 10);
  497. rep->content.mx.name = strdup (svec[1]);
  498. DL_APPEND (replies, rep);
  499. }
  500. else {
  501. msg_err_config ("invalid MX reply element for fake "
  502. "DNS record %s: %s",
  503. name, str_rep);
  504. free (rep);
  505. }
  506. g_strfreev (svec);
  507. break;
  508. case RDNS_REQUEST_TXT:
  509. rep->content.txt.data = strdup (str_rep);
  510. DL_APPEND (replies, rep);
  511. break;
  512. case RDNS_REQUEST_SOA:
  513. svec = g_strsplit_set (str_rep, " :", -1);
  514. /* 7 elements */
  515. if (svec && svec[0] && svec[1] && svec[2] &&
  516. svec[3] && svec[4] && svec[5] && svec[6]) {
  517. rep->content.soa.mname = strdup (svec[0]);
  518. rep->content.soa.admin = strdup (svec[1]);
  519. rep->content.soa.serial = strtoul (svec[2], NULL, 10);
  520. rep->content.soa.refresh = strtol (svec[3], NULL, 10);
  521. rep->content.soa.retry = strtol (svec[4], NULL, 10);
  522. rep->content.soa.expire = strtol (svec[5], NULL, 10);
  523. rep->content.soa.minimum = strtoul (svec[6], NULL, 10);
  524. DL_APPEND (replies, rep);
  525. }
  526. else {
  527. msg_err_config ("invalid MX reply element for fake "
  528. "DNS record %s: %s",
  529. name, str_rep);
  530. free (rep);
  531. }
  532. g_strfreev (svec);
  533. break;
  534. case RDNS_REQUEST_AAAA:
  535. if (inet_pton (AF_INET6, str_rep, &rep->content.aaa.addr) != 1) {
  536. msg_err_config ("invalid AAAA reply element for fake "
  537. "DNS record %s: %s",
  538. name, str_rep);
  539. free (rep);
  540. }
  541. else {
  542. DL_APPEND (replies, rep);
  543. }
  544. case RDNS_REQUEST_SRV:
  545. default:
  546. msg_err_config ("invalid or unsupported reply element "
  547. "for fake DNS record %s(%s): %s",
  548. name, rdns_str_from_type (rtype), str_rep);
  549. free (rep);
  550. break;
  551. }
  552. }
  553. ucl_object_iterate_free (rep_it);
  554. if (replies) {
  555. struct rdns_reply_entry *tmp_entry;
  556. guint i = 0;
  557. DL_COUNT (replies, tmp_entry, i);
  558. msg_info_config ("added fake record: %s(%s); %d replies", name,
  559. rdns_str_from_type (rtype), i);
  560. rdns_resolver_set_fake_reply (dns_resolver->r,
  561. name, rtype, rcode, replies);
  562. }
  563. else {
  564. msg_warn_config ("record %s has no replies, not adding",
  565. name);
  566. }
  567. }
  568. else {
  569. /* This entry returns some non valid code, no replies are possible */
  570. replies_obj = ucl_object_lookup (cur, "replies");
  571. if (replies_obj) {
  572. msg_warn_config ("replies are set for non-successful return "
  573. "code for %s(%s), they will be ignored", name, rdns_str_from_type (rtype));
  574. }
  575. rdns_resolver_set_fake_reply (dns_resolver->r,
  576. name, rtype, rcode, NULL);
  577. }
  578. }
  579. ucl_object_iterate_free (it);
  580. }
  581. static bool
  582. rspamd_dns_read_hosts_file (struct rspamd_config *cfg,
  583. struct rspamd_dns_resolver *dns_resolver,
  584. const gchar *fname)
  585. {
  586. gchar *linebuf = NULL;
  587. gsize buflen = 0;
  588. gssize r;
  589. FILE *fp;
  590. guint nadded = 0;
  591. fp = fopen (fname, "r");
  592. if (fp == NULL) {
  593. /* Hack to reduce noise */
  594. if (strcmp (fname, "/etc/hosts") == 0) {
  595. msg_info_config ("cannot open hosts file %s: %s", fname,
  596. strerror (errno));
  597. }
  598. else {
  599. msg_err_config ("cannot open hosts file %s: %s", fname,
  600. strerror (errno));
  601. }
  602. return false;
  603. }
  604. while ((r = getline (&linebuf, &buflen, fp)) > 0) {
  605. if (linebuf[0] == '#' || g_ascii_isspace (linebuf[0])) {
  606. /* Skip comment or empty line */
  607. continue;
  608. }
  609. g_strchomp (linebuf);
  610. gchar **elts = g_strsplit_set (linebuf, " \t\v", -1);
  611. rspamd_inet_addr_t *addr;
  612. if (!rspamd_parse_inet_address (&addr, elts[0], strlen (elts[0]),
  613. RSPAMD_INET_ADDRESS_PARSE_REMOTE|RSPAMD_INET_ADDRESS_PARSE_NO_UNIX)) {
  614. msg_warn_config ("bad hosts file line: %s; cannot parse address", linebuf);
  615. }
  616. else {
  617. /* Add all FQDN + aliases if any */
  618. gchar **cur_name = &elts[1];
  619. while (*cur_name) {
  620. if (strlen (*cur_name) == 0) {
  621. cur_name ++;
  622. continue;
  623. }
  624. if (*cur_name[0] == '#') {
  625. /* Start of the comment */
  626. break;
  627. }
  628. struct rdns_reply_entry *rep;
  629. rep = calloc (1, sizeof (*rep));
  630. g_assert (rep != NULL);
  631. rep->ttl = 0;
  632. if (rspamd_inet_address_get_af (addr) == AF_INET) {
  633. socklen_t unused;
  634. const struct sockaddr_in *sin = (const struct sockaddr_in *)
  635. rspamd_inet_address_get_sa (addr, &unused);
  636. rep->type = RDNS_REQUEST_A;
  637. memcpy (&rep->content.a.addr, &sin->sin_addr,
  638. sizeof (rep->content.a.addr));
  639. }
  640. else {
  641. socklen_t unused;
  642. const struct sockaddr_in6 *sin6 = (const struct sockaddr_in6 *)
  643. rspamd_inet_address_get_sa (addr, &unused);
  644. rep->type = RDNS_REQUEST_AAAA;
  645. memcpy (&rep->content.aaa.addr, &sin6->sin6_addr,
  646. sizeof (rep->content.aaa.addr));
  647. }
  648. rep->next = NULL;
  649. rep->prev = rep;
  650. rdns_resolver_set_fake_reply (dns_resolver->r,
  651. g_strdup (*cur_name), rep->type, RDNS_RC_NOERROR, rep);
  652. msg_debug_config ("added fake record %s -> %s from hosts file %s",
  653. *cur_name, rspamd_inet_address_to_string (addr), fname);
  654. cur_name ++;
  655. nadded ++;
  656. }
  657. rspamd_inet_address_free (addr);
  658. }
  659. g_strfreev (elts);
  660. }
  661. msg_info_config ("processed host file %s; %d records added", fname, nadded);
  662. fclose (fp);
  663. return true;
  664. }
  665. static void
  666. rspamd_dns_resolver_config_ucl (struct rspamd_config *cfg,
  667. struct rspamd_dns_resolver *dns_resolver,
  668. const ucl_object_t *dns_section)
  669. {
  670. const ucl_object_t *fake_replies, *fails_cache_size, *fails_cache_time,
  671. *hosts;
  672. static const ev_tstamp default_fails_cache_time = 10.0;
  673. /* Process fake replies */
  674. fake_replies = ucl_object_lookup_any (dns_section, "fake_records",
  675. "fake_replies", NULL);
  676. if (fake_replies && ucl_object_type (fake_replies) == UCL_ARRAY) {
  677. const ucl_object_t *cur_arr;
  678. DL_FOREACH (fake_replies, cur_arr) {
  679. rspamd_process_fake_reply (cfg, dns_resolver, cur_arr);
  680. }
  681. }
  682. hosts = ucl_object_lookup (dns_section, "hosts");
  683. if (hosts == NULL) {
  684. /* Read normal `/etc/hosts` file */
  685. rspamd_dns_read_hosts_file (cfg, dns_resolver, "/etc/hosts");
  686. }
  687. else if (ucl_object_type (hosts) == UCL_NULL) {
  688. /* Do nothing, hosts are explicitly disabled */
  689. }
  690. else if (ucl_object_type (hosts) == UCL_STRING) {
  691. if (!rspamd_dns_read_hosts_file (cfg, dns_resolver, ucl_object_tostring (hosts))) {
  692. msg_err_config ("cannot read hosts file %s", ucl_object_tostring (hosts));
  693. }
  694. }
  695. else if (ucl_object_type (hosts) == UCL_ARRAY) {
  696. const ucl_object_t *cur;
  697. ucl_object_iter_t it = NULL;
  698. while ((cur = ucl_object_iterate (hosts, &it, true)) != NULL) {
  699. if (!rspamd_dns_read_hosts_file (cfg, dns_resolver, ucl_object_tostring (cur))) {
  700. msg_err_config ("cannot read hosts file %s", ucl_object_tostring (cur));
  701. }
  702. }
  703. }
  704. else {
  705. msg_err_config ("invalid type for hosts parameter: %s",
  706. ucl_object_type_to_string (ucl_object_type (hosts)));
  707. }
  708. fails_cache_size = ucl_object_lookup (dns_section, "fails_cache_size");
  709. if (fails_cache_size && ucl_object_type (fails_cache_size) == UCL_INT) {
  710. dns_resolver->fails_cache_time = default_fails_cache_time;
  711. fails_cache_time = ucl_object_lookup (dns_section, "fails_cache_time");
  712. if (fails_cache_time) {
  713. dns_resolver->fails_cache_time = ucl_object_todouble (fails_cache_time);
  714. }
  715. dns_resolver->fails_cache = rspamd_lru_hash_new_full (
  716. ucl_object_toint (fails_cache_size),
  717. g_free, (GDestroyNotify)rdns_request_release,
  718. rspamd_dns_fail_hash, rspamd_dns_fail_equal);
  719. }
  720. }
  721. struct rspamd_dns_resolver *
  722. rspamd_dns_resolver_init (rspamd_logger_t *logger,
  723. struct ev_loop *ev_base,
  724. struct rspamd_config *cfg)
  725. {
  726. struct rspamd_dns_resolver *dns_resolver;
  727. dns_resolver = g_malloc0 (sizeof (struct rspamd_dns_resolver));
  728. dns_resolver->event_loop = ev_base;
  729. if (cfg != NULL) {
  730. dns_resolver->request_timeout = cfg->dns_timeout;
  731. dns_resolver->max_retransmits = cfg->dns_retransmits;
  732. }
  733. else {
  734. dns_resolver->request_timeout = 1;
  735. dns_resolver->max_retransmits = 2;
  736. }
  737. /* IDN translation is performed in Rspamd now */
  738. dns_resolver->r = rdns_resolver_new (RDNS_RESOLVER_NOIDN);
  739. UErrorCode uc_err = U_ZERO_ERROR;
  740. dns_resolver->uidna = uidna_openUTS46 (UIDNA_DEFAULT, &uc_err);
  741. g_assert (!U_FAILURE (uc_err));
  742. rdns_bind_libev (dns_resolver->r, dns_resolver->event_loop);
  743. if (cfg != NULL) {
  744. rdns_resolver_set_log_level (dns_resolver->r, cfg->log_level);
  745. dns_resolver->cfg = cfg;
  746. rdns_resolver_set_dnssec (dns_resolver->r, cfg->enable_dnssec);
  747. if (cfg->nameservers == NULL) {
  748. /* Parse resolv.conf */
  749. dns_resolver->ups = rspamd_upstreams_create (cfg->ups_ctx);
  750. rspamd_upstreams_set_flags (dns_resolver->ups,
  751. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  752. rspamd_upstreams_set_rotation (dns_resolver->ups,
  753. RSPAMD_UPSTREAM_MASTER_SLAVE);
  754. if (!rdns_resolver_parse_resolv_conf_cb (dns_resolver->r,
  755. "/etc/resolv.conf",
  756. rspamd_dns_resolv_conf_on_server,
  757. dns_resolver)) {
  758. msg_err ("cannot parse resolv.conf and no nameservers defined, "
  759. "so no ways to resolve addresses");
  760. rdns_resolver_release (dns_resolver->r);
  761. dns_resolver->r = NULL;
  762. return dns_resolver;
  763. }
  764. /* Use normal resolv.conf rules */
  765. rspamd_upstreams_foreach (dns_resolver->ups, rspamd_dns_server_reorder,
  766. dns_resolver);
  767. }
  768. else {
  769. dns_resolver->ups = rspamd_upstreams_create (cfg->ups_ctx);
  770. rspamd_upstreams_set_flags (dns_resolver->ups,
  771. RSPAMD_UPSTREAM_FLAG_NORESOLVE);
  772. if (!rspamd_upstreams_from_ucl (dns_resolver->ups, cfg->nameservers,
  773. 53, dns_resolver)) {
  774. msg_err_config ("cannot parse DNS nameservers definitions");
  775. rdns_resolver_release (dns_resolver->r);
  776. dns_resolver->r = NULL;
  777. return dns_resolver;
  778. }
  779. }
  780. rspamd_upstreams_foreach (dns_resolver->ups, rspamd_dns_server_init,
  781. dns_resolver);
  782. rdns_resolver_set_upstream_lib (dns_resolver->r, &rspamd_ups_ctx,
  783. dns_resolver->ups);
  784. cfg->dns_resolver = dns_resolver;
  785. if (cfg->rcl_obj) {
  786. /* Configure additional options */
  787. const ucl_object_t *opts_section, *dns_section, *tmp;
  788. opts_section = ucl_object_lookup (cfg->rcl_obj, "options");
  789. if (opts_section) {
  790. /* TODO: implement a more simple merge logic */
  791. DL_FOREACH (opts_section, tmp) {
  792. dns_section = ucl_object_lookup (opts_section, "dns");
  793. if (dns_section) {
  794. rspamd_dns_resolver_config_ucl (cfg, dns_resolver,
  795. dns_section);
  796. }
  797. }
  798. }
  799. }
  800. }
  801. rdns_resolver_set_logger (dns_resolver->r, rspamd_rnds_log_bridge, logger);
  802. rdns_resolver_init (dns_resolver->r);
  803. return dns_resolver;
  804. }
  805. void
  806. rspamd_dns_resolver_deinit (struct rspamd_dns_resolver *resolver)
  807. {
  808. if (resolver) {
  809. if (resolver->r) {
  810. rdns_resolver_release (resolver->r);
  811. }
  812. if (resolver->ups) {
  813. rspamd_upstreams_destroy (resolver->ups);
  814. }
  815. if (resolver->fails_cache) {
  816. rspamd_lru_hash_destroy (resolver->fails_cache);
  817. }
  818. uidna_close (resolver->uidna);
  819. g_free (resolver);
  820. }
  821. }
  822. static struct rdns_upstream_elt*
  823. rspamd_dns_select_upstream (const char *name,
  824. size_t len, void *ups_data)
  825. {
  826. struct upstream_list *ups = ups_data;
  827. struct upstream *up;
  828. up = rspamd_upstream_get (ups, RSPAMD_UPSTREAM_ROUND_ROBIN, name, len);
  829. if (up) {
  830. msg_debug ("select %s", rspamd_upstream_name (up));
  831. return rspamd_upstream_get_data (up);
  832. }
  833. return NULL;
  834. }
  835. static struct rdns_upstream_elt*
  836. rspamd_dns_select_upstream_retransmit (
  837. const char *name,
  838. size_t len,
  839. struct rdns_upstream_elt *prev_elt,
  840. void *ups_data)
  841. {
  842. struct upstream_list *ups = ups_data;
  843. struct upstream *up;
  844. if (prev_elt) {
  845. up = rspamd_upstream_get_except (ups, (struct upstream *)prev_elt->lib_data,
  846. RSPAMD_UPSTREAM_MASTER_SLAVE, name, len);
  847. }
  848. else {
  849. up = rspamd_upstream_get_forced (ups, RSPAMD_UPSTREAM_RANDOM, name, len);
  850. }
  851. if (up) {
  852. msg_debug ("select forced %s", rspamd_upstream_name (up));
  853. return rspamd_upstream_get_data (up);
  854. }
  855. return NULL;
  856. }
  857. static void
  858. rspamd_dns_upstream_ok (struct rdns_upstream_elt *elt,
  859. void *ups_data)
  860. {
  861. struct upstream *up = elt->lib_data;
  862. rspamd_upstream_ok (up);
  863. }
  864. static void
  865. rspamd_dns_upstream_fail (struct rdns_upstream_elt *elt,
  866. void *ups_data, const gchar *reason)
  867. {
  868. struct upstream *up = elt->lib_data;
  869. rspamd_upstream_fail (up, FALSE, reason);
  870. }
  871. static unsigned int
  872. rspamd_dns_upstream_count (void *ups_data)
  873. {
  874. struct upstream_list *ups = ups_data;
  875. return rspamd_upstreams_alive (ups);
  876. }
  877. gchar*
  878. rspamd_dns_resolver_idna_convert_utf8 (struct rspamd_dns_resolver *resolver,
  879. rspamd_mempool_t *pool,
  880. const char *name,
  881. gint namelen,
  882. guint *outlen)
  883. {
  884. if (resolver == NULL || resolver->uidna == NULL || name == NULL
  885. || namelen > DNS_D_MAXNAME) {
  886. return NULL;
  887. }
  888. guint dest_len;
  889. UErrorCode uc_err = U_ZERO_ERROR;
  890. UIDNAInfo info = UIDNA_INFO_INITIALIZER;
  891. /* Calculate length required */
  892. dest_len = uidna_nameToASCII_UTF8 (resolver->uidna, name, namelen,
  893. NULL, 0, &info, &uc_err);
  894. if (uc_err == U_BUFFER_OVERFLOW_ERROR) {
  895. gchar *dest;
  896. if (pool) {
  897. dest = rspamd_mempool_alloc (pool, dest_len + 1);
  898. }
  899. else {
  900. dest = g_malloc (dest_len + 1);
  901. }
  902. uc_err = U_ZERO_ERROR;
  903. dest_len = uidna_nameToASCII_UTF8 (resolver->uidna, name, namelen,
  904. dest, dest_len + 1, &info, &uc_err);
  905. if (U_FAILURE (uc_err)) {
  906. if (!pool) {
  907. g_free (dest);
  908. }
  909. return NULL;
  910. }
  911. dest[dest_len] = '\0';
  912. if (outlen) {
  913. *outlen = dest_len;
  914. }
  915. return dest;
  916. }
  917. return NULL;
  918. }