5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
30 #include <arpa/inet.h>
31 #include <netinet/in.h>
33 #define CONNMAN_API_SUBJECT_TO_CHANGE
34 #include <connman/plugin.h>
35 #include <connman/resolver.h>
36 #include <connman/notifier.h>
37 #include <connman/log.h>
41 #if __BYTE_ORDER == __LITTLE_ENDIAN
56 } __attribute__ ((packed));
57 #elif __BYTE_ORDER == __BIG_ENDIAN
72 } __attribute__ ((packed));
74 #error "Unknown byte order"
87 struct sockaddr_in sin;
99 static GSList *server_list = NULL;
100 static GSList *request_list = NULL;
101 static guint16 request_id = 0x0000;
103 static GIOChannel *listener_channel = NULL;
104 static guint listener_watch = 0;
106 static struct request_data *find_request(guint16 id)
110 for (list = request_list; list; list = list->next) {
111 struct request_data *req = list->data;
113 if (req->dstid == id || req->altid == id)
120 static struct server_data *find_server(const char *interface,
121 const char *domain, const char *server)
125 DBG("interface %s server %s", interface, server);
127 for (list = server_list; list; list = list->next) {
128 struct server_data *data = list->data;
130 if (data->interface == NULL || data->server == NULL)
133 if (g_str_equal(data->interface, interface) == TRUE &&
134 g_str_equal(data->server, server) == TRUE) {
135 if (domain == NULL) {
136 if (data->domain == NULL)
141 if (g_str_equal(data->domain, domain) == TRUE)
149 static gboolean server_event(GIOChannel *channel, GIOCondition condition,
152 struct server_data *data = user_data;
153 struct request_data *req;
154 unsigned char buf[4096];
155 struct domain_hdr *hdr = (void *) &buf;
158 if (condition & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) {
159 connman_error("Error with server channel");
164 sk = g_io_channel_unix_get_fd(channel);
166 len = recv(sk, buf, sizeof(buf), 0);
170 DBG("Received %d bytes (id 0x%04x)", len, buf[0] | buf[1] << 8);
172 req = find_request(buf[0] | buf[1] << 8);
176 DBG("id 0x%04x rcode %d", hdr->id, hdr->rcode);
178 buf[0] = req->srcid & 0xff;
179 buf[1] = req->srcid >> 8;
183 if (hdr->rcode == 0 || req->resp == NULL) {
187 req->resp = g_try_malloc(len);
188 if (req->resp == NULL)
191 memcpy(req->resp, buf, len);
195 if (hdr->rcode > 0 && req->numresp < req->numserv)
198 if (req->timeout > 0)
199 g_source_remove(req->timeout);
201 request_list = g_slist_remove(request_list, req);
203 sk = g_io_channel_unix_get_fd(listener_channel);
205 err = sendto(sk, req->resp, req->resplen, 0,
206 (struct sockaddr *) &req->sin, req->len);
214 static struct server_data *create_server(const char *interface,
215 const char *domain, const char *server)
217 struct server_data *data;
218 struct sockaddr_in sin;
221 DBG("interface %s server %s", interface, server);
223 sk = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
225 connman_error("Failed to create server %s socket", server);
229 if (interface != NULL) {
230 if (setsockopt(sk, SOL_SOCKET, SO_BINDTODEVICE,
231 interface, strlen(interface) + 1) < 0) {
232 connman_error("Failed to bind server %s "
240 memset(&sin, 0, sizeof(sin));
241 sin.sin_family = AF_INET;
242 sin.sin_port = htons(53);
243 sin.sin_addr.s_addr = inet_addr(server);
245 if (connect(sk, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
246 connman_error("Failed to connect server %s", server);
251 data = g_try_new0(struct server_data, 1);
253 connman_error("Failed to allocate server %s data", server);
258 data->channel = g_io_channel_unix_new(sk);
259 if (data->channel == NULL) {
260 connman_error("Failed to create server %s channel", server);
266 g_io_channel_set_close_on_unref(data->channel, TRUE);
268 data->watch = g_io_add_watch(data->channel, G_IO_IN,
271 data->interface = g_strdup(interface);
272 data->domain = g_strdup(domain);
273 data->server = g_strdup(server);
275 /* Enable new servers by default */
276 data->enabled = TRUE;
278 connman_info("Adding DNS server %s", data->server);
283 static void destroy_server(struct server_data *data)
285 DBG("interface %s server %s", data->interface, data->server);
288 g_source_remove(data->watch);
290 g_io_channel_unref(data->channel);
292 connman_info("Removing DNS server %s", data->server);
294 g_free(data->server);
295 g_free(data->domain);
296 g_free(data->interface);
300 static int dnsproxy_append(const char *interface, const char *domain,
303 struct server_data *data;
305 DBG("interface %s server %s", interface, server);
307 if (g_str_equal(server, "127.0.0.1") == TRUE)
310 data = create_server(interface, domain, server);
314 server_list = g_slist_append(server_list, data);
319 static int dnsproxy_remove(const char *interface, const char *domain,
322 struct server_data *data;
324 DBG("interface %s server %s", interface, server);
326 if (g_str_equal(server, "127.0.0.1") == TRUE)
329 data = find_server(interface, domain, server);
333 server_list = g_slist_remove(server_list, data);
335 destroy_server(data);
340 static struct connman_resolver dnsproxy_resolver = {
342 .priority = CONNMAN_RESOLVER_PRIORITY_HIGH,
343 .append = dnsproxy_append,
344 .remove = dnsproxy_remove,
347 static void dnsproxy_offline_mode(connman_bool_t enabled)
351 DBG("enabled %d", enabled);
353 for (list = server_list; list; list = list->next) {
354 struct server_data *data = list->data;
356 if (enabled == FALSE) {
357 connman_info("Enabling DNS server %s", data->server);
358 data->enabled = TRUE;
360 connman_info("Disabling DNS server %s", data->server);
361 data->enabled = FALSE;
366 static void dnsproxy_default_changed(struct connman_service *service)
371 DBG("service %p", service);
373 if (service == NULL) {
374 /* When no services are active, then disable DNS proxying */
375 dnsproxy_offline_mode(TRUE);
379 interface = connman_service_get_interface(service);
380 if (interface == NULL)
383 for (list = server_list; list; list = list->next) {
384 struct server_data *data = list->data;
386 if (g_strcmp0(data->interface, interface) == 0) {
387 connman_info("Enabling DNS server %s", data->server);
388 data->enabled = TRUE;
390 connman_info("Disabling DNS server %s", data->server);
391 data->enabled = FALSE;
398 static struct connman_notifier dnsproxy_notifier = {
400 .default_changed = dnsproxy_default_changed,
401 .offline_mode = dnsproxy_offline_mode,
404 static int parse_request(unsigned char *buf, int len,
405 char *name, unsigned int size)
407 struct domain_hdr *hdr = (void *) buf;
408 uint16_t qdcount = ntohs(hdr->qdcount);
409 uint16_t arcount = ntohs(hdr->arcount);
411 char *last_label = NULL;
413 unsigned int remain, used = 0;
418 DBG("id 0x%04x qr %d opcode %d qdcount %d arcount %d",
419 hdr->id, hdr->qr, hdr->opcode,
422 if (hdr->qr != 0 || qdcount != 1)
425 memset(name, 0, size);
435 last_label = (char *) (ptr + 1);
441 if (used + len + 1 > size)
444 strncat(name, (char *) (ptr + 1), len);
453 if (arcount && remain >= 9 && last_label[4] == 0 &&
454 last_label[5] == 0 && last_label[6] == 0x29) {
455 uint16_t edns0_bufsize;
457 edns0_bufsize = last_label[7] << 8 | last_label[8];
459 DBG("EDNS0 buffer size %u", edns0_bufsize);
461 /* This is an evil hack until full TCP support has been
464 * Somtimes the EDNS0 request gets send with a too-small
465 * buffer size. Since glibc doesn't seem to crash when it
466 * gets a response biffer then it requested, just bump
467 * the buffer size up to 4KiB.
469 if (edns0_bufsize < 0x1000) {
470 last_label[7] = 0x10;
471 last_label[8] = 0x00;
475 DBG("query %s (%d labels)", name, label_count);
480 static void send_response(int sk, unsigned char *buf, int len,
481 const struct sockaddr *to, socklen_t tolen)
483 struct domain_hdr *hdr = (void *) buf;
489 DBG("id 0x%04x qr %d opcode %d", hdr->id, hdr->qr, hdr->opcode);
498 err = sendto(sk, buf, len, 0, to, tolen);
501 static int append_query(unsigned char *buf, unsigned int size,
502 const char *query, const char *domain)
504 unsigned char *ptr = buf;
507 DBG("query %s domain %s", query, domain);
509 offset = (char *) query;
510 while (offset != NULL) {
513 tmp = strchr(offset, '.');
515 if (strlen(offset) == 0)
517 *ptr = strlen(offset);
518 memcpy(ptr + 1, offset, strlen(offset));
519 ptr += strlen(offset) + 1;
524 memcpy(ptr + 1, offset, tmp - offset);
525 ptr += tmp - offset + 1;
530 offset = (char *) domain;
531 while (offset != NULL) {
534 tmp = strchr(offset, '.');
536 if (strlen(offset) == 0)
538 *ptr = strlen(offset);
539 memcpy(ptr + 1, offset, strlen(offset));
540 ptr += strlen(offset) + 1;
545 memcpy(ptr + 1, offset, tmp - offset);
546 ptr += tmp - offset + 1;
556 static gboolean request_timeout(gpointer user_data)
558 struct request_data *req = user_data;
560 DBG("id 0x%04x", req->srcid);
562 request_list = g_slist_remove(request_list, req);
564 if (req->resplen > 0 && req->resp != NULL) {
567 sk = g_io_channel_unix_get_fd(listener_channel);
569 err = sendto(sk, req->resp, req->resplen, 0,
570 (struct sockaddr *) &req->sin, req->len);
579 static gboolean listener_event(GIOChannel *channel, GIOCondition condition,
583 unsigned char buf[768];
585 struct request_data *req;
586 struct sockaddr_in sin;
587 socklen_t size = sizeof(sin);
590 if (condition & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) {
591 connman_error("Error with listener channel");
596 sk = g_io_channel_unix_get_fd(channel);
598 memset(&sin, 0, sizeof(sin));
599 len = recvfrom(sk, buf, sizeof(buf), 0,
600 (struct sockaddr *) &sin, &size);
604 DBG("Received %d bytes (id 0x%04x)", len, buf[0] | buf[1] << 8);
606 err = parse_request(buf, len, query, sizeof(query));
607 if (err < 0 || g_slist_length(server_list) == 0) {
608 send_response(sk, buf, len, (struct sockaddr *) &sin, size);
612 req = g_try_new0(struct request_data, 1);
616 memcpy(&req->sin, &sin, sizeof(sin));
620 if (request_id == 0x0000 || request_id == 0xffff)
623 req->srcid = buf[0] | (buf[1] << 8);
624 req->dstid = request_id;
625 req->altid = request_id + 1;
627 buf[0] = req->dstid & 0xff;
628 buf[1] = req->dstid >> 8;
630 request_list = g_slist_append(request_list, req);
633 req->timeout = g_timeout_add_seconds(5, request_timeout, req);
635 for (list = server_list; list; list = list->next) {
636 struct server_data *data = list->data;
638 DBG("server %s domain %s enabled %d",
639 data->server, data->domain, data->enabled);
641 if (data->enabled == FALSE)
644 sk = g_io_channel_unix_get_fd(data->channel);
646 err = send(sk, buf, len, 0);
650 if (data->domain != NULL) {
651 unsigned char alt[1024];
652 struct domain_hdr *hdr = (void *) &alt;
655 domlen = strlen(data->domain) + 1;
659 alt[0] = req->altid & 0xff;
660 alt[1] = req->altid >> 8;
662 memcpy(alt + 2, buf + 2, 10);
663 hdr->qdcount = htons(1);
665 altlen = append_query(alt + 12, sizeof(alt) - 12,
666 query, data->domain);
672 memcpy(alt + altlen, buf + altlen - domlen,
673 len - altlen + domlen);
675 err = send(sk, alt, len + domlen + 1, 0);
684 static int create_listener(void)
686 const char *ifname = "lo";
687 struct sockaddr_in sin;
692 sk = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
694 connman_error("Failed to create listener socket");
698 //setsockopt(sk, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt));
699 //setsockopt(sk, SOL_IP, IP_PKTINFO, &opt, sizeof(opt));
701 if (setsockopt(sk, SOL_SOCKET, SO_BINDTODEVICE,
702 ifname, strlen(ifname) + 1) < 0) {
703 connman_error("Failed to bind listener interface");
708 memset(&sin, 0, sizeof(sin));
709 sin.sin_family = AF_INET;
710 sin.sin_port = htons(53);
711 sin.sin_addr.s_addr = inet_addr("127.0.0.1");
712 //sin.sin_addr.s_addr = INADDR_ANY;
714 if (bind(sk, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
715 connman_error("Failed to bind listener socket");
720 listener_channel = g_io_channel_unix_new(sk);
721 if (listener_channel == NULL) {
722 connman_error("Failed to create listener channel");
727 g_io_channel_set_close_on_unref(listener_channel, TRUE);
729 listener_watch = g_io_add_watch(listener_channel, G_IO_IN,
730 listener_event, NULL);
732 connman_resolver_append("lo", NULL, "127.0.0.1");
737 static void destroy_listener(void)
743 connman_resolver_remove_all("lo");
745 if (listener_watch > 0)
746 g_source_remove(listener_watch);
748 for (list = request_list; list; list = list->next) {
749 struct request_data *req = list->data;
751 DBG("Dropping request (id 0x%04x -> 0x%04x)",
752 req->srcid, req->dstid);
759 g_slist_free(request_list);
762 g_io_channel_unref(listener_channel);
765 static int dnsproxy_init(void)
769 err = create_listener();
773 err = connman_resolver_register(&dnsproxy_resolver);
777 err = connman_notifier_register(&dnsproxy_notifier);
784 connman_resolver_unregister(&dnsproxy_resolver);
792 static void dnsproxy_exit(void)
794 connman_notifier_unregister(&dnsproxy_notifier);
796 connman_resolver_unregister(&dnsproxy_resolver);
801 CONNMAN_PLUGIN_DEFINE(dnsproxy, "DNS proxy resolver plugin", VERSION,
802 CONNMAN_PLUGIN_PRIORITY_DEFAULT, dnsproxy_init, dnsproxy_exit)