// Copyright 2011 Miek Gieben. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // DNS server implementation. package dns import ( "io" "net" "time" ) type Handler interface { ServeDNS(w ResponseWriter, r *Msg) // IP based ACL mapping. The contains the string representation // of the IP address and a boolean saying it may connect (true) or not. } // A ResponseWriter interface is used by an DNS handler to // construct an DNS response. type ResponseWriter interface { // RemoteAddr returns the net.Addr of the client that sent the current request. RemoteAddr() net.Addr // Return the status of the Tsig (TsigNone, TsigVerified or TsigBad) TsigStatus() error // Write writes a reply back to the client. Write(*Msg) error } type conn struct { remoteAddr net.Addr // address of remote side handler Handler // request handler request []byte // bytes read _UDP *net.UDPConn // i/o connection if UDP was used _TCP *net.TCPConn // i/o connection if TCP was used hijacked bool // connection has been hijacked by hander TODO(mg) tsigSecret map[string]string // the tsig secrets } type response struct { conn *conn req *Msg tsigStatus error tsigTimersOnly bool tsigRequestMAC string } // ServeMux is an DNS request multiplexer. It matches the // zone name of each incoming request against a list of // registered patterns add calls the handler for the pattern // that most closely matches the zone name. type ServeMux struct { m map[string]Handler } // NewServeMux allocates and returns a new ServeMux. func NewServeMux() *ServeMux { return &ServeMux{make(map[string]Handler)} } // DefaultServeMux is the default ServeMux used by Serve. var DefaultServeMux = NewServeMux() // The HandlerFunc type is an adapter to allow the use of // ordinary functions as DNS handlers. If f is a function // with the appropriate signature, HandlerFunc(f) is a // Handler object that calls f. type HandlerFunc func(ResponseWriter, *Msg) // ServerDNS calls f(w, r) func (f HandlerFunc) ServeDNS(w ResponseWriter, r *Msg) { f(w, r) } // Refused is a helper handler that returns an answer with // RCODE = refused for every request. func Refused(w ResponseWriter, r *Msg) { m := new(Msg) m.SetRcode(r, RcodeRefused) w.Write(m) } // RefusedHandler returns HandlerFunc with Refused. func RefusedHandler() Handler { return HandlerFunc(Refused) } // Start a server on addresss and network speficied. Invoke handler // for any incoming queries. func ListenAndServe(addr string, network string, handler Handler) error { server := &Server{Addr: addr, Net: network, Handler: handler} return server.ListenAndServe() } // Start a server on addresss and network speficied. Use the tsig // secrets for Tsig validation. // Invoke handler for any incoming queries. func ListenAndServeTsig(addr string, network string, handler Handler, tsig map[string]string) error { server := &Server{Addr: addr, Net: network, Handler: handler, TsigSecret: tsig} return server.ListenAndServe() } func (mux *ServeMux) match(zone string) Handler { var h Handler var n = 0 for k, v := range mux.m { if !zoneMatch(k, zone) { continue } if h == nil || len(k) > n { n = len(k) h = v } } return h } func (mux *ServeMux) Handle(pattern string, handler Handler) { if pattern == "" { panic("dns: invalid pattern " + pattern) } // Should this go //if pattern[len(pattern)-1] != '.' { // no ending . // mux.m[pattern+"."] = handler //} else { mux.m[pattern] = handler } func (mux *ServeMux) HandleFunc(pattern string, handler func(ResponseWriter, *Msg)) { mux.Handle(pattern, HandlerFunc(handler)) } // ServeDNS dispatches the request to the handler whose // pattern most closely matches the request message. func (mux *ServeMux) ServeDNS(w ResponseWriter, request *Msg) { h := mux.match(request.Question[0].Name) if h == nil { h = RefusedHandler() } h.ServeDNS(w, request) } // Handle register the handler the given pattern // in the DefaultServeMux. The documentation for // ServeMux explains how patters are matched. func Handle(pattern string, handler Handler) { DefaultServeMux.Handle(pattern, handler) } func HandleFunc(pattern string, handler func(ResponseWriter, *Msg)) { DefaultServeMux.HandleFunc(pattern, handler) } // A Server defines parameters for running an DNS server. type Server struct { Addr string // address to listen on, ":dns" if empty Net string // if "tcp" it will invoke a TCP listener, otherwise an UDP one Handler Handler // handler to invoke, dns.DefaultServeMux if nil UDPSize int // default buffer to use to read incoming UDP messages ReadTimeout time.Duration // the net.Conn.SetReadTimeout value for new connections WriteTimeout time.Duration // the net.Conn.SetWriteTimeout value for new connections TsigSecret map[string]string // secret(s) for Tsig map[] } // ListenAndServe starts a nameserver on the configured addressin *Server. func (srv *Server) ListenAndServe() error { addr := srv.Addr if addr == "" { addr = ":domain" } switch srv.Net { case "tcp", "tcp4", "tcp6": a, e := net.ResolveTCPAddr(srv.Net, addr) if e != nil { return e } l, e := net.ListenTCP(srv.Net, a) if e != nil { return e } return srv.ServeTCP(l) case "udp", "udp4", "udp6": a, e := net.ResolveUDPAddr(srv.Net, addr) if e != nil { return e } l, e := net.ListenUDP(srv.Net, a) if e != nil { return e } return srv.ServeUDP(l) } return &Error{Err: "bad network"} } // ServeTCP starts a TCP listener for the server. // Each request is handled in a seperate goroutine. // with the Handler set in .... func (srv *Server) ServeTCP(l *net.TCPListener) error { defer l.Close() handler := srv.Handler if handler == nil { handler = DefaultServeMux } forever: for { rw, e := l.AcceptTCP() if e != nil { return e } if srv.ReadTimeout != 0 { rw.SetReadDeadline(time.Now().Add(srv.ReadTimeout)) } if srv.WriteTimeout != 0 { rw.SetWriteDeadline(time.Now().Add(srv.WriteTimeout)) } l := make([]byte, 2) n, err := rw.Read(l) if err != nil || n != 2 { continue } length, _ := unpackUint16(l, 0) if length == 0 { continue } m := make([]byte, int(length)) n, err = rw.Read(m[:int(length)]) if err != nil { continue } i := n for i < int(length) { j, err := rw.Read(m[i:int(length)]) if err != nil { continue forever } i += j } n = i d, err := newConn(rw, nil, rw.RemoteAddr(), m, handler, srv.TsigSecret) if err != nil { continue } go d.serve() } panic("not reached") } // ServeUDP starts a UDP listener for the server. // Each request is handled in a seperate goroutine, // with the Handler set in .... func (srv *Server) ServeUDP(l *net.UDPConn) error { defer l.Close() handler := srv.Handler if handler == nil { handler = DefaultServeMux } if srv.UDPSize == 0 { srv.UDPSize = UDPMsgSize } for { m := make([]byte, srv.UDPSize) n, a, e := l.ReadFromUDP(m) if e != nil { return e } m = m[:n] if srv.ReadTimeout != 0 { l.SetReadDeadline(time.Now().Add(srv.ReadTimeout)) } if srv.WriteTimeout != 0 { l.SetWriteDeadline(time.Now().Add(srv.WriteTimeout)) } d, err := newConn(nil, l, a, m, handler, srv.TsigSecret) if err != nil { continue } go d.serve() } panic("not reached") } func newConn(t *net.TCPConn, u *net.UDPConn, a net.Addr, buf []byte, handler Handler, tsig map[string]string) (*conn, error) { c := new(conn) c.handler = handler c._TCP = t c._UDP = u c.remoteAddr = a c.request = buf c.tsigSecret = tsig return c, nil } // Close the connection. func (c *conn) close() { switch { case c._UDP != nil: c._UDP.Close() c._UDP = nil case c._TCP != nil: c._TCP.Close() c._TCP = nil } } // Serve a new connection. func (c *conn) serve() { for { // Request has been read in ServeUDP or ServeTCP w := new(response) w.conn = c req := new(Msg) if !req.Unpack(c.request) { // Send a format error back x := new(Msg) x.SetRcodeFormatError(req) w.Write(x) break } w.tsigStatus = nil if req.IsTsig() { secret := req.Extra[len(req.Extra)-1].(*RR_TSIG).Hdr.Name if _, ok := w.conn.tsigSecret[secret]; !ok { w.tsigStatus = ErrKeyAlg } w.tsigStatus = TsigVerify(c.request, w.conn.tsigSecret[secret], "", false) w.tsigTimersOnly = false // Will this ever be true? w.tsigRequestMAC = req.Extra[len(req.Extra)-1].(*RR_TSIG).MAC } w.req = req c.handler.ServeDNS(w, w.req) // this does the writing back to the client if c.hijacked { return } break // TODO(mg) Why is this a loop anyway? } if c._TCP != nil { c.close() // Listen and Serve is closed then } } func (w *response) Write(m *Msg) error { //data []byte) (n int, err error) { data, ok := m.Pack() if !ok { return ErrPack } switch { case w.conn._UDP != nil: _, err := w.conn._UDP.WriteTo(data, w.conn.remoteAddr) if err != nil { return err } case w.conn._TCP != nil: if len(data) > MaxMsgSize { return ErrBuf } l := make([]byte, 2) l[0], l[1] = packUint16(uint16(len(data))) n, err := w.conn._TCP.Write(l) if err != nil { return err } if n != 2 { return io.ErrShortWrite } n, err = w.conn._TCP.Write(data) if err != nil { return err } i := n if i < len(data) { j, err := w.conn._TCP.Write(data[i:len(data)]) if err != nil { return err } i += j } n = i } return nil } // RemoteAddr implements the ResponseWriter.RemoteAddr method func (w *response) RemoteAddr() net.Addr { return w.conn.remoteAddr } // TsigStatus implements the ResponseWriter.TsigStatus method func (w *response) TsigStatus() error { return w.tsigStatus }