Newer
Older
/* Copyright (C) 2014 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <libknot/descriptor.h>
#include <libknot/rrtype/rdname.h>
#include <libknot/processing/requestor.h>
#include <libknot/dnssec/random.h>
#include "lib/layer/iterate.h"
#define DEBUG_MSG(fmt, ...) fprintf(stderr, "[qiter] " fmt, ## __VA_ARGS__)
/*! \brief Fetch NS record address from additionals. */
static int glue_ns_addr(const knot_pkt_t *pkt, struct sockaddr_storage *addr, const knot_dname_t *name, uint16_t type)
{
const knot_pktsection_t *ar = knot_pkt_section(pkt, KNOT_ADDITIONAL);
for (unsigned i = 0; i < ar->count; ++i) {
const knot_rrset_t *rr = knot_pkt_rr(ar, i);
if (rr->type == type && knot_dname_is_equal(name, rr->owner)) {
return kr_rrset_to_addr(addr, rr);
static int set_zone_cut(struct kr_rplan *rplan, knot_pkt_t *pkt, const knot_rrset_t *rr)
static const uint16_t type_list[] = { KNOT_RRTYPE_A, KNOT_RRTYPE_AAAA };
/* Set zone cut to given name server. */
const knot_dname_t *ns_name = knot_ns_name(&rr->rrs, 0);
kr_set_zone_cut(&rplan->zone_cut, rr->owner, ns_name);
/* Check if we can find a valid address in glue / cache */
for (unsigned i = 0; i < sizeof(type_list)/sizeof(uint16_t); ++i) {
/* Find address in the additionals (optional). */
int ret = glue_ns_addr(pkt, &rplan->zone_cut.addr, ns_name, type_list[i]);
if (ret == KNOT_EOK) {
/* Query for address records (if not glue). */
for (unsigned i = 0; i < sizeof(type_list)/sizeof(uint16_t); ++i) {
(void) kr_rplan_push(rplan, rplan->zone_cut.ns, KNOT_CLASS_IN, type_list[i]);
}
static void follow_cname_chain(const knot_dname_t **cname, const knot_rrset_t *rr,
{
/* Follow chain from SNAME. */
if (knot_dname_is_equal(rr->owner, *cname)) {
*cname = knot_cname_name(&rr->rrs);
/*! \brief Result updates the original query response. */
static int update_answer(knot_pkt_t *answer, const knot_rrset_t *rr)
knot_rrset_t *rr_copy = knot_rrset_copy(rr, &answer->mm);
}
/* Write copied RR to the result packet. */
int ret = knot_pkt_put(answer, KNOT_COMPR_HINT_NONE, rr_copy, KNOT_PF_FREE);
if (ret != KNOT_EOK) {
knot_rrset_free(&rr_copy, &answer->mm);
knot_wire_set_tc(answer->wire);
}
/* Free just the allocated container. */
mm_free(&answer->mm, rr_copy);
return KNOT_EOK;
static int update_zone_cut(knot_pkt_t *pkt, struct kr_rplan *rplan, const knot_rrset_t *rr)
int ret = KNOT_EOK;
if (rr->type == KNOT_RRTYPE_A || rr->type == KNOT_RRTYPE_AAAA) {
if (knot_dname_is_equal(rplan->zone_cut.ns, rr->owner)) {
ret = kr_rrset_to_addr(&rplan->zone_cut.addr, rr);
}
} else if (rr->type == KNOT_RRTYPE_NS) {
/* Authority MUST be at/below the authority of the nameserver, otherwise
* possible cache injection attempt. */
if (!knot_dname_in(rplan->zone_cut.name, rr->owner)) {
DEBUG_MSG("NS in query outside of its authority => rejecting\n");
return KNOT_EMALF;
}
/* Set the first nameserver address, rest will be cached. */
if (!knot_dname_is_equal(rr->owner, rplan->zone_cut.name)) {
ret = set_zone_cut(rplan, pkt, rr);
return ret;
static int resolve_referral(knot_pkt_t *pkt, struct kr_layer_param *param)
/* Update current zone cut from NS records. */
const knot_pktsection_t *ns = knot_pkt_section(pkt, KNOT_AUTHORITY);
for (unsigned i = 0; i < ns->count; ++i) {
const knot_rrset_t *rr = knot_pkt_rr(ns, i);
if (rr->type != KNOT_RRTYPE_NS) {
continue;
}
int ret = update_zone_cut(pkt, param->rplan, rr);
if (ret != KNOT_EOK) {
static int resolve_auth(knot_pkt_t *pkt, struct kr_layer_param *param)
knot_pkt_t *answer = param->answer;
struct kr_query *cur = kr_rplan_current(param->rplan);
return KNOT_NS_PROC_FAIL;
/* Authoritative response for minimized QNAME.
* NODATA => may be empty non-terminal, retry (found zone cut)
* NOERROR => found zone cut, retry
* NXDOMAIN => parent is zone cut, terminate
*/
const knot_pktsection_t *an = knot_pkt_section(pkt, KNOT_ANSWER);
bool is_minimized = (!knot_dname_is_equal(knot_pkt_qname(pkt), cur->sname));
bool is_noerror = (knot_wire_get_rcode(pkt->wire) == KNOT_RCODE_NOERROR);
if (is_minimized && is_noerror) {
cur->flags |= QUERY_NO_MINIMIZE;
return KNOT_NS_PROC_DONE;
}
bool update_orig_answer = (cur == kr_rplan_last(param->rplan));
/* Process answer records. */
const knot_dname_t *cname = cur->sname;
for (unsigned i = 0; i < an->count; ++i) {
/* Update original answer or current zone cut. */
if (update_orig_answer && knot_pkt_qtype(pkt) == cur->stype) {
if (update_answer(answer, rr) != KNOT_EOK) {
return KNOT_NS_PROC_FAIL;
}
} else {
if (update_zone_cut(pkt, param->rplan, rr) != KNOT_EOK) {
return KNOT_NS_PROC_FAIL;
}
/* Check canonical name. */
}
/* Follow canonical name as next SNAME. */
if (cname != cur->sname) {
struct kr_query *next = kr_rplan_push(param->rplan, cname,
return KNOT_NS_PROC_FAIL;
kr_rplan_pop(param->rplan, cur);
/* Authoritative answer to original response => DONE. */
if (update_orig_answer) {
knot_wire_set_rcode(answer->wire, knot_wire_get_rcode(pkt->wire));
} else {
/* Side-lookup, update authority. */
/* TODO: store zone-cut in query for side lookups */
cur = kr_rplan_current(param->rplan);
namedb_txn_t *txn = kr_rplan_txn_acquire(param->rplan, NAMEDB_RDONLY);
kr_find_zone_cut(¶m->rplan->zone_cut, cur->sname, txn, cur->timestamp.tv_sec);
return KNOT_NS_PROC_DONE;
}
/*! \brief Error handling, RFC1034 5.3.3, 4d. */
static int resolve_error(knot_pkt_t *pkt, struct kr_layer_param *param, int errcode)
DEBUG_MSG("resolution error => %s\n", knot_strerror(errcode));
return KNOT_NS_PROC_FAIL;
/*! \brief Return minimized QNAME/QTYPE for current zone cut. */
static const knot_dname_t *minimized_qname(struct kr_query *query, struct kr_zonecut *cut, uint16_t *qtype)
const knot_dname_t *qname = query->sname;
if (query->flags & QUERY_NO_MINIMIZE) {
return qname;
}
/* Minimize name to contain current zone cut + 1 label. */
int cut_labels = knot_dname_labels(cut->name, NULL);
int qname_labels = knot_dname_labels(qname, NULL);
while(qname_labels > cut_labels + 1) {
qname = knot_wire_next_label(qname, NULL);
qname_labels -= 1;
}
/* Hide QTYPE if minimized. */
if (qname != query->sname) {
*qtype = KNOT_RRTYPE_NS;
}
return qname;
}
/*! \brief Answer is paired to query. */
static bool is_answer_to_query(const knot_pkt_t *answer, struct kr_rplan *rplan)
struct kr_query *expect = kr_rplan_current(rplan);
if (expect == NULL) {
return -1;
}
uint16_t qtype = expect->stype;
const knot_dname_t *qname = minimized_qname(expect, &rplan->zone_cut, &qtype);
return expect->id == knot_wire_get_id(answer->wire) &&
expect->sclass == knot_pkt_qclass(answer) &&
qtype == knot_pkt_qtype(answer) &&
knot_dname_is_equal(qname, knot_pkt_qname(answer));
/* State-less single resolution iteration step, not needed. */
static int reset(knot_layer_t *ctx) { return KNOT_NS_PROC_FULL; }
static int finish(knot_layer_t *ctx) { return KNOT_NS_PROC_NOOP; }
/* Set resolution context and parameters. */
static int begin(knot_layer_t *ctx, void *module_param)
{
ctx->data = module_param;
return reset(ctx);
}
static int prepare_query(knot_layer_t *ctx, knot_pkt_t *pkt)
{
assert(pkt && ctx);
struct kr_layer_param *param = ctx->data;
struct kr_query *cur = kr_rplan_current(param->rplan);
if (cur == NULL || ctx->state == KNOT_NS_PROC_DONE) {
return ctx->state;
/* Minimize QNAME (if possible). */
struct kr_zonecut *zone_cut = ¶m->rplan->zone_cut;
uint16_t qtype = cur->stype;
const knot_dname_t *qname = minimized_qname(cur, zone_cut, &qtype);
/* Form a query for the authoritative. */
knot_pkt_clear(pkt);
int ret = knot_pkt_put_question(pkt, qname, cur->sclass, qtype);
if (ret != KNOT_EOK) {
return KNOT_NS_PROC_FAIL;
cur->id = knot_random_uint16_t();
knot_wire_set_id(pkt->wire, cur->id);
/* Declare EDNS0 support. */
knot_rrset_t opt_rr;
ret = knot_edns_init(&opt_rr, KR_EDNS_PAYLOAD, 0, KR_EDNS_VERSION, &pkt->mm);
if (ret != KNOT_EOK) {
return KNOT_NS_PROC_FAIL;
}
knot_pkt_begin(pkt, KNOT_ADDITIONAL);
ret = knot_pkt_put(pkt, KNOT_COMPR_HINT_NONE, &opt_rr, KNOT_PF_FREE);
if (ret != KNOT_EOK) {
knot_rrset_clear(&opt_rr, &pkt->mm);
return KNOT_NS_PROC_FAIL;
}
char name_str[KNOT_DNAME_MAXLEN], zonecut_str[KNOT_DNAME_MAXLEN], ns_str[KNOT_DNAME_MAXLEN], type_str[16];
knot_dname_to_str(ns_str, zone_cut->ns, sizeof(ns_str));
knot_dname_to_str(zonecut_str, zone_cut->name, sizeof(zonecut_str));
knot_dname_to_str(name_str, qname, sizeof(name_str));
knot_rrtype_to_string(qtype, type_str, sizeof(type_str));
DEBUG_MSG("query '%s %s' zone cut '%s' nameserver '%s'\n", name_str, type_str, zonecut_str, ns_str);
return KNOT_NS_PROC_MORE;
/*! \brief Resolve input query or continue resolution with followups.
*
* This roughly corresponds to RFC1034, 5.3.3 4a-d.
*/
static int resolve(knot_layer_t *ctx, knot_pkt_t *pkt)
{
assert(pkt && ctx);
struct kr_layer_param *param = ctx->data;
/* Check for packet processing errors first. */
if (pkt->parsed < pkt->size) {
/* Is this the droid we're looking for? */
if (!is_answer_to_query(pkt, param->rplan)) {
DEBUG_MSG("ignoring mismatching response\n");
return KNOT_NS_PROC_MORE;
/* Truncated response. */
if (knot_wire_get_tc(pkt->wire)) {
DEBUG_MSG("truncated response, failover to TCP\n");
struct kr_query *cur = kr_rplan_current(param->rplan);
if (cur) {
cur->flags |= QUERY_TCP;
}
return KNOT_NS_PROC_DONE;
}
/* TODO: classify response type
* 1. authoritative, noerror/nxdomain
* cname chain => update current sname
* qname is current ns => update ns address
* qname is tail => original query
* 2. referral, update current zone cut
*/
/* Check response code. */
switch(knot_wire_get_rcode(pkt->wire)) {
case KNOT_RCODE_NOERROR:
case KNOT_RCODE_NXDOMAIN:
break; /* OK */
default:
/* Is the answer authoritative? */
if (knot_wire_get_aa(pkt->wire)) {
state = resolve_auth(pkt, param);
} else {
state = resolve_referral(pkt, param);
/*! \brief Module implementation. */
static const knot_layer_api_t LAYER_ITERATE_MODULE = {
&begin,
&reset,
&finish,
&resolve,
&prepare_query,
NULL
const knot_layer_api_t *layer_iterate_module(void)
{
return &LAYER_ITERATE_MODULE;
}