tun2proxy/src/virtdns.rs

280 lines
8.8 KiB
Rust
Raw Normal View History

use hashlink::linked_hash_map::RawEntryMut;
use hashlink::LruCache;
2023-03-23 21:32:01 +01:00
use smoltcp::wire::Ipv4Cidr;
use std::collections::HashMap;
2023-03-23 21:32:01 +01:00
use std::convert::{TryFrom, TryInto};
use std::net::{IpAddr, Ipv4Addr, Ipv6Addr};
use std::str::FromStr;
2023-03-23 21:32:01 +01:00
use std::time::{Duration, Instant};
const DNS_TTL: u8 = 30; // TTL in DNS replies in seconds
const MAPPING_TIMEOUT: u64 = 60; // Mapping timeout in seconds
#[derive(Eq, PartialEq, Debug)]
#[allow(dead_code, clippy::upper_case_acronyms)]
enum DnsRecordType {
A = 1,
AAAA = 28,
}
#[derive(Eq, PartialEq, Debug)]
#[allow(dead_code)]
enum DnsClass {
IN = 1,
}
struct NameCacheEntry {
name: String,
expiry: Instant,
}
pub struct VirtualDns {
lru_cache: LruCache<IpAddr, NameCacheEntry>,
2023-03-23 21:32:01 +01:00
name_to_ip: HashMap<String, IpAddr>,
network_addr: IpAddr,
broadcast_addr: IpAddr,
2023-03-23 13:24:33 +01:00
next_addr: IpAddr,
}
impl Default for VirtualDns {
fn default() -> Self {
2023-03-23 13:24:33 +01:00
let start_addr = Ipv4Addr::from_str("198.18.0.0").unwrap();
let cidr = Ipv4Cidr::new(start_addr.into(), 15);
2023-03-23 21:32:01 +01:00
Self {
next_addr: start_addr.into(),
2023-03-23 21:32:01 +01:00
name_to_ip: Default::default(),
network_addr: IpAddr::try_from(cidr.network().address().into_address()).unwrap(),
broadcast_addr: IpAddr::try_from(cidr.broadcast().unwrap().into_address()).unwrap(),
lru_cache: LruCache::new_unbounded(),
}
}
}
impl VirtualDns {
pub fn new() -> Self {
Default::default()
}
pub fn receive_query(&mut self, data: &[u8]) -> Option<Vec<u8>> {
if data.len() < 17 {
return None;
}
// bit 1: Message is a query (0)
// bits 2 - 5: Standard query opcode (0)
// bit 6: Unused
// bit 7: Message is not truncated (0)
// bit 8: Recursion desired (1)
let is_supported_query = (data[2] & 0b11111011) == 0b00000001;
let num_queries = (data[4] as u16) << 8 | data[5] as u16;
if !is_supported_query || num_queries != 1 {
return None;
}
let result = VirtualDns::parse_qname(data, 12);
2023-03-23 21:32:01 +01:00
let (qname, offset) = result?;
if offset + 3 >= data.len() {
return None;
}
let qtype = (data[offset] as u16) << 8 | data[offset + 1] as u16;
let qclass = (data[offset + 2] as u16) << 8 | data[offset + 3] as u16;
if qtype != DnsRecordType::A as u16 && qtype != DnsRecordType::AAAA as u16
|| qclass != DnsClass::IN as u16
{
return None;
}
log::info!("DNS query: {}", qname);
let mut response = Vec::<u8>::new();
response.extend(&data[0..offset + 4]);
response[2] |= 0x80; // Message is a response
response[3] |= 0x80; // Recursion available
2023-03-23 21:32:01 +01:00
// Record count of the answer section:
// We only send an answer record for A queries, assuming that IPv4 is supported everywhere.
// This way, we do not have to handle two IP spaces for the virtual DNS feature.
response[6] = 0;
response[7] = if qtype == DnsRecordType::A as u16 {
1
} else {
0
2023-03-23 21:32:01 +01:00
};
2023-03-23 21:32:01 +01:00
// Zero count of other sections:
// authority section
response[8] = 0;
response[9] = 0;
2023-03-23 21:32:01 +01:00
// additional section
response[10] = 0;
response[11] = 0;
2023-03-23 21:32:01 +01:00
if qtype == DnsRecordType::A as u16 {
if let Some(ip) = self.allocate_ip(qname) {
response.extend(&[
0xc0, 0x0c, // Question name pointer
0, 1, // Record type: A
0, 1, // Class: IN
2023-03-23 21:32:01 +01:00
0, 0, 0, DNS_TTL, // TTL
0, 4, // Data length: 4 bytes
]);
2023-03-23 13:24:33 +01:00
match ip as IpAddr {
IpAddr::V4(ip) => response.extend(ip.octets().as_ref()),
IpAddr::V6(ip) => response.extend(ip.octets().as_ref()),
};
2023-03-23 21:32:01 +01:00
} else {
log::error!("Virtual IP space for DNS exhausted");
response[7] = 0; // No answers
// Set rcode to SERVFAIL
response[3] &= 0xf0;
response[3] |= 2;
}
} else {
response[7] = 0; // No answers
}
Some(response)
}
2023-03-24 14:31:22 +08:00
fn increment_ip(addr: IpAddr) -> Option<IpAddr> {
2023-03-23 13:24:33 +01:00
let mut ip_bytes = match addr as IpAddr {
IpAddr::V4(ip) => Vec::<u8>::from(ip.octets()),
IpAddr::V6(ip) => Vec::<u8>::from(ip.octets()),
};
2023-03-23 21:32:01 +01:00
// Traverse bytes from right to left and stop when we can add one.
for j in 0..ip_bytes.len() {
let i = ip_bytes.len() - 1 - j;
if ip_bytes[i] != 255 {
2023-03-23 21:32:01 +01:00
// We can add 1 without carry and are done.
ip_bytes[i] += 1;
break;
} else {
2023-03-23 21:32:01 +01:00
// Zero this byte and carry over to the next one.
ip_bytes[i] = 0;
}
}
2023-03-24 14:31:22 +08:00
let addr = if addr.is_ipv4() {
let bytes: [u8; 4] = ip_bytes.as_slice().try_into().ok()?;
IpAddr::V4(Ipv4Addr::from(bytes))
} else {
2023-03-24 14:31:22 +08:00
let bytes: [u8; 16] = ip_bytes.as_slice().try_into().ok()?;
IpAddr::V6(Ipv6Addr::from(bytes))
2023-03-24 14:31:22 +08:00
};
Some(addr)
}
// This is to be called whenever we receive or send a packet on the socket
// which connects the tun interface to the client, so existing IP address to name
// mappings to not expire as long as the connection is active.
pub fn touch_ip(&mut self, addr: &IpAddr) -> bool {
match self.lru_cache.get_mut(addr) {
None => false,
Some(entry) => {
entry.expiry = Instant::now() + Duration::from_secs(MAPPING_TIMEOUT);
true
}
}
}
pub fn resolve_ip(&mut self, addr: &IpAddr) -> Option<&String> {
match self.lru_cache.get(addr) {
None => None,
Some(entry) => Some(&entry.name),
}
}
2023-03-23 21:32:01 +01:00
fn allocate_ip(&mut self, name: String) -> Option<IpAddr> {
let now = Instant::now();
loop {
let p = self.lru_cache.iter().next();
if p.is_none() {
break;
}
let (ip, entry) = p.unwrap();
if now > entry.expiry {
let name = entry.name.clone();
self.lru_cache.remove(&ip.clone());
self.name_to_ip.remove(&name);
continue;
2023-03-23 21:32:01 +01:00
}
break;
}
2023-03-23 21:32:01 +01:00
if let Some(ip) = self.name_to_ip.get(&name) {
2023-03-24 13:43:44 +01:00
let result = Some(*ip);
self.touch_ip(&ip.clone());
return result;
2023-03-23 21:32:01 +01:00
}
let started_at = self.next_addr;
loop {
if let RawEntryMut::Vacant(vacant) =
self.lru_cache.raw_entry_mut().from_key(&self.next_addr)
2023-03-23 21:32:01 +01:00
{
let expiry = Instant::now() + Duration::from_secs(MAPPING_TIMEOUT);
vacant.insert(
2023-03-23 21:32:01 +01:00
self.next_addr,
NameCacheEntry {
name: name.clone(),
expiry,
},
);
// e.insert(name.clone());
self.name_to_ip.insert(name, self.next_addr);
2023-03-23 21:32:01 +01:00
return Some(self.next_addr);
}
2023-03-24 14:31:22 +08:00
self.next_addr = Self::increment_ip(self.next_addr)?;
2023-03-23 21:32:01 +01:00
if self.next_addr == self.broadcast_addr {
// Wrap around.
self.next_addr = self.network_addr;
}
if self.next_addr == started_at {
return None;
}
}
}
2023-03-25 01:39:46 +01:00
/// Parse a non-root DNS qname at a specific offset and return the name along with its size.
2023-03-23 21:32:01 +01:00
/// DNS packet parsing should be continued after the name.
fn parse_qname(data: &[u8], mut offset: usize) -> Option<(String, usize)> {
2023-03-23 21:32:01 +01:00
// Since we only parse qnames and qnames can't point anywhere,
// we do not support pointers. (0xC0 is a bitmask for pointer detection.)
let label_type = data[offset] & 0xC0;
if label_type != 0x00 {
return None;
}
2023-03-23 21:32:01 +01:00
let mut qname = String::from("");
loop {
if offset >= data.len() {
return None;
}
let label_len = data[offset];
if label_len == 0 {
2023-03-25 01:39:46 +01:00
if qname.is_empty() {
return None;
}
offset += 1;
break;
}
2023-03-25 01:39:46 +01:00
if !qname.is_empty() {
qname.push('.');
}
for _ in 0..label_len {
offset += 1;
if offset >= data.len() {
return None;
}
qname.push(data[offset] as char);
}
offset += 1;
}
Some((qname, offset))
}
}