dns/xfr.go

262 lines
5.9 KiB
Go
Raw Normal View History

2013-05-13 00:15:52 +10:00
// Copyright 2011 Miek Gieben. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
2011-03-17 02:21:35 +11:00
package dns
2013-10-03 05:35:13 +10:00
import (
"net"
"time"
)
2013-10-11 06:01:35 +11:00
// Envelope is used when doing a transfer with a remote server.
type Envelope struct {
2012-12-02 18:41:49 +11:00
RR []RR // The set of RRs in the answer section of the AXFR reply message.
Error error // If something went wrong, this contains the error.
}
2013-10-03 05:35:13 +10:00
type Transfer struct {
Conn
2013-10-11 06:01:35 +11:00
DialTimeout time.Duration // net.DialTimeout (ns), defaults to 2 * 1e9
ReadTimeout time.Duration // net.Conn.SetReadTimeout value for connections (ns), defaults to 2 * 1e9
WriteTimeout time.Duration // net.Conn.SetWriteTimeout value for connections (ns), defaults to 2 * 1e9
timersOnly bool
2013-10-03 05:35:13 +10:00
}
// In performs a [AI]XFR request (depends on the message's Qtype). It returns
// a channel of *Envelope on which the replies from the server are sent.
// At the end of the transfer the channel is closed.
// The messages are TSIG checked if needed, no other post-processing is performed.
// The caller must dissect the returned messages.
2012-08-28 03:48:58 +10:00
//
// Basic use pattern for receiving an AXFR:
//
2012-08-28 04:58:58 +10:00
// // m contains the AXFR request
2013-10-03 05:35:13 +10:00
// t := new(dns.Transfer)
// c, e := t.In(m, "127.0.0.1:53")
// for env := range c
// // ... deal with env.RR or env.Error
2012-08-28 03:48:58 +10:00
// }
2013-10-03 05:35:13 +10:00
func (t *Transfer) In(q *Msg, a string, env chan *Envelope) (err error) {
co := new(Conn)
timeout := dnsTimeout
if t.DialTimeout != 0 {
timeout = t.DialTimeout
}
co.Conn, err = net.DialTimeout("tcp", a, timeout)
if err != nil {
return err
}
2013-10-11 06:01:35 +11:00
if q.Question[0].Qtype == TypeAXFR {
go t.InAxfr(q.Id, env)
return nil
}
if q.Question[0].Qtype == TypeIXFR {
go t.InAxfr(q.Id, env)
return nil
}
return nil // TODO(miek): some error
}
func (t *Transfer) InAxfr(id uint16, c chan *Envelope) {
first := true
defer t.Close()
defer close(c)
for {
in, err := t.ReadMsg()
if err != nil {
c <- &Envelope{nil, err}
return
}
if id != q.Id {
c <- &Envelope{in.Answer, ErrId}
return
}
if first {
if !checkSOA(in, true) {
c <- &Envelope{in.Answer, ErrSoa}
return
}
first = !first
// only one answer that is SOA, receive more
if len(in.Answer) == 1 {
w.tsigTimersOnly = true
c <- &Envelope{in.Answer, nil}
continue
}
}
if !first {
w.tsigTimersOnly = true // Subsequent envelopes use this.
if checkSOA(in, false) {
c <- &Envelope{in.Answer, nil}
return
}
c <- &Envelope{in.Answer, nil}
}
}
panic("dns: not reached")
}
2013-10-03 05:35:13 +10:00
// re-read 'n stuff must be pushed down
timeout = dnsTimeout
if t.ReadTimeout != 0 {
timeout = t.ReadTimeout
}
co.SetReadDeadline(time.Now().Add(dnsTimeout))
timeout = dnsTimeout
if t.WriteTimeout != 0 {
timeout = t.WriteTimeout
}
co.SetWriteDeadline(time.Now().Add(dnsTimeout))
defer co.Close()
return nil
}
2013-10-11 06:01:35 +11:00
func (t *Transfer) Out(w ResponseWriter, q *Msg, a string) (chan *Envelope, error) {
ch := make(chan *Envelope)
return ch, nil
2013-10-03 05:35:13 +10:00
}
// ReadMsg reads a message from the transfer connection t.
func (t *Transfer) ReadMsg() (*Msg, error) {
m := new(Msg)
p := make([]byte, MaxMsgSize)
2013-10-11 06:01:35 +11:00
n, err := t.Read(p)
2013-10-03 05:35:13 +10:00
if err != nil && n == 0 {
return nil, err
2011-09-12 06:10:04 +10:00
}
2013-10-03 05:35:13 +10:00
p = p[:n]
if err := m.Unpack(p); err != nil {
return nil, err
2011-04-19 06:08:12 +10:00
}
2013-10-03 05:35:13 +10:00
if ts := m.IsTsig(); t != nil {
if _, ok := t.TsigSecret[ts.Hdr.Name]; !ok {
return m, ErrSecret
}
// Need to work on the original message p, as that was used to calculate the tsig.
2013-10-11 06:01:35 +11:00
err = TsigVerify(p, t.TsigSecret[ts.Hdr.Name], t.requestMAC, t.timersOnly)
2013-10-03 05:35:13 +10:00
}
return m, err
}
// WriteMsg write a message throught the transfer connection t.
func (t *Transfer) WriteMsg(m *Msg) (err error) {
var out []byte
if ts := m.IsTsig(); t != nil {
if _, ok := t.TsigSecret[ts.Hdr.Name]; !ok {
return ErrSecret
}
2013-10-11 06:01:35 +11:00
out, t.requestMAC, err = TsigGenerate(m, t.TsigSecret[ts.Hdr.Name], t.requestMAC, t.timersOnly)
2013-10-03 05:35:13 +10:00
} else {
out, err = m.Pack()
}
if err != nil {
return err
}
2013-10-11 06:01:35 +11:00
if _, err = t.Write(out); err != nil {
2013-10-03 05:35:13 +10:00
return err
}
return nil
}
/*
2011-04-18 17:58:15 +10:00
func (w *reply) ixfrIn(q *Msg, c chan *Envelope) {
2011-03-22 01:44:51 +11:00
var serial uint32 // The first serial seen is the current server serial
first := true
2012-08-23 18:33:33 +10:00
defer w.conn.Close()
defer close(c)
2011-03-22 01:44:51 +11:00
for {
2012-08-07 04:34:09 +10:00
in, err := w.receive()
2011-09-12 06:10:04 +10:00
if err != nil {
c <- &Envelope{in.Answer, err}
2011-09-12 06:10:04 +10:00
return
}
if q.Id != in.Id {
c <- &Envelope{in.Answer, ErrId}
2011-03-22 01:44:51 +11:00
return
}
if first {
// A single SOA RR signals "no changes"
2013-10-03 05:35:13 +10:00
if len(in.Answer) == 1 && checkSOA(in, true) {
c <- &Envelope{in.Answer, nil}
2011-09-12 06:10:04 +10:00
return
2011-03-22 01:44:51 +11:00
}
// Check if the returned answer is ok
2013-10-03 05:35:13 +10:00
if !checkSOA(in, true) {
c <- &Envelope{in.Answer, ErrSoa}
2011-03-22 01:44:51 +11:00
return
}
// This serial is important
serial = in.Answer[0].(*SOA).Serial
2011-03-22 01:44:51 +11:00
first = !first
}
// Now we need to check each message for SOA records, to see what we need to do
if !first {
2011-09-12 06:10:04 +10:00
w.tsigTimersOnly = true
// If the last record in the IXFR contains the servers' SOA, we should quit
if v, ok := in.Answer[len(in.Answer)-1].(*SOA); ok {
2011-09-12 06:10:04 +10:00
if v.Serial == serial {
c <- &Envelope{in.Answer, nil}
2011-09-12 06:10:04 +10:00
return
}
}
c <- &Envelope{in.Answer, nil}
2011-03-22 01:44:51 +11:00
}
}
panic("dns: not reached")
2011-03-19 00:13:42 +11:00
}
2011-09-12 01:24:52 +10:00
2013-10-11 06:01:35 +11:00
/*
func checkFirstSOA(in *Msg) bool {
2011-03-22 02:28:13 +11:00
if len(in.Answer) > 0 {
2013-10-11 06:01:35 +11:00
return in.Answer[0].Header().Rrtype == TypeSOA
}
return false
}
func checkLastSOA(in *Msg) bool {
if len(in.Answer) > 0 {
return in.Answer[len(in.Answer)-1].Header().Rrtype == TypeSOA
2011-03-22 02:28:13 +11:00
}
return false
}
2012-08-28 16:14:12 +10:00
2013-10-11 06:01:35 +11:00
/*
func TransferOut(w ResponseWriter, q *Msg, c chan *Envelope, e *error) error {
2012-08-28 17:27:55 +10:00
switch q.Question[0].Qtype {
2011-11-03 09:06:54 +11:00
case TypeAXFR, TypeIXFR:
go xfrOut(w, q, c, e)
2012-08-28 17:27:55 +10:00
return nil
2011-09-12 06:10:04 +10:00
default:
2012-09-13 05:13:57 +10:00
return nil
2011-09-10 22:59:21 +10:00
}
2012-10-10 17:56:34 +11:00
panic("dns: not reached")
2011-09-10 22:59:21 +10:00
}
// TODO(mg): count the RRs and the resulting size.
func xfrOut(w ResponseWriter, req *Msg, c chan *Envelope, e *error) {
2012-08-28 04:58:58 +10:00
rep := new(Msg)
rep.SetReply(req)
2012-09-06 00:31:48 +10:00
rep.Authoritative = true
2012-08-28 04:58:58 +10:00
for x := range c {
2012-08-28 16:14:12 +10:00
// assume it fits
2012-08-28 04:58:58 +10:00
rep.Answer = append(rep.Answer, x.RR...)
if err := w.WriteMsg(rep); e != nil {
2012-08-28 17:27:55 +10:00
*e = err
return
}
2012-08-28 21:12:55 +10:00
w.TsigTimersOnly(true)
2012-08-28 04:58:58 +10:00
rep.Answer = nil
}
}
*/