/* * Functions for MDNS resolving. */ /* * Copyright (c) 2016 Christian Huitema * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include "config.h" #include "debug.h" #include "context.h" #include "general.h" #include "gldns/pkthdr.h" #include "util-internal.h" #include "mdns.h" #ifdef HAVE_MDNS_SUPPORT #ifdef USE_WINSOCK typedef u_short sa_family_t; #define _getdns_EWOULDBLOCK (WSAGetLastError() == WSATRY_AGAIN ||\ WSAGetLastError() == WSAEWOULDBLOCK) #define _getdns_EINPROGRESS (WSAGetLastError() == WSAEINPROGRESS) #else #define _getdns_EWOULDBLOCK (errno == EAGAIN || errno == EWOULDBLOCK) #define _getdns_EINPROGRESS (errno == EINPROGRESS) #endif uint64_t _getdns_get_time_as_uintt64(); /* * Constants defined in RFC 6762 */ #define MDNS_MCAST_IPV4_LONG 0xE00000FB /* 224.0.0.251 */ #define MDNS_MCAST_PORT 5353 /* * TODO: When we start supporting IPv6 with MDNS, need to define this: * static uint8_t mdns_mcast_ipv6[] = { * 0xFF, 0x02, 0, 0, 0, 0, 0, 0, * 0, 0, 0, 0, 0, 0, 0, 0xFB }; */ static uint8_t mdns_suffix_dot_local[] = { 5, 'l', 'o', 'c', 'a', 'l', 0 }; static uint8_t mdns_suffix_254_169_in_addr_arpa[] = { 3, '2', '5', '4', 3, '1', '6', '9', 7, 'i', 'n', '-', 'a', 'd', 'd', 'r', 4, 'a', 'r', 'p', 'a', 0 }; static uint8_t mdns_suffix_8_e_f_ip6_arpa[] = { 1, '8', 1, 'e', 1, 'f', 7, 'i', 'p', 'v', '6', 4, 'a', 'r', 'p', 'a', 0 }; static uint8_t mdns_suffix_9_e_f_ip6_arpa[] = { 1, '9', 1, 'e', 1, 'f', 7, 'i', 'p', 'v', '6', 4, 'a', 'r', 'p', 'a', 0 }; static uint8_t mdns_suffix_a_e_f_ip6_arpa[] = { 1, 'a', 1, 'e', 1, 'f', 7, 'i', 'p', 'v', '6', 4, 'a', 'r', 'p', 'a', 0 }; static uint8_t mdns_suffix_b_e_f_ip6_arpa[] = { 1, 'b', 1, 'e', 1, 'f', 7, 'i', 'p', 'v', '6', 4, 'a', 'r', 'p', 'a', 0 }; /* TODO: actualy delete what is required.. */ static void mdns_cleanup(getdns_network_req *netreq) { DEBUG_MDNS("%s %-35s: MSG: %p\n", MDNS_DEBUG_CLEANUP, __FUNCTION__, netreq); getdns_dns_req *dnsreq = netreq->owner; GETDNS_CLEAR_EVENT(dnsreq->loop, &netreq->event); GETDNS_NULL_FREE(dnsreq->context->mf, netreq->tcp.read_buf); } void _getdns_cancel_mdns_request(getdns_network_req *netreq) { mdns_cleanup(netreq); if (netreq->fd >= 0) { #ifdef USE_WINSOCK closesocket(netreq->fd); #else close(netreq->fd); #endif } } static void mdns_timeout_cb(void *userarg) { getdns_network_req *netreq = (getdns_network_req *)userarg; DEBUG_MDNS("%s %-35s: MSG: %p\n", MDNS_DEBUG_CLEANUP, __FUNCTION__, netreq); /* TODO: do we need a retry logic here? */ /* Check the required cleanup */ mdns_cleanup(netreq); if (netreq->fd >= 0) #ifdef USE_WINSOCK closesocket(netreq->fd); #else close(netreq->fd); #endif netreq->state = NET_REQ_TIMED_OUT; if (netreq->owner->user_callback) { netreq->debug_end_time = _getdns_get_time_as_uintt64(); (void)_getdns_context_request_timed_out(netreq->owner); } else _getdns_check_dns_req_complete(netreq->owner); } /**************************/ /* UDP callback functions */ /**************************/ static void mdns_udp_read_cb(void *userarg) { getdns_network_req *netreq = (getdns_network_req *)userarg; getdns_dns_req *dnsreq = netreq->owner; ssize_t read; DEBUG_MDNS("%s %-35s: MSG: %p \n", MDNS_DEBUG_READ, __FUNCTION__, netreq); GETDNS_CLEAR_EVENT(dnsreq->loop, &netreq->event); read = recvfrom(netreq->fd, (void *)netreq->response, netreq->max_udp_payload_size + 1, /* If read == max_udp_payload_size * then all is good. If read == * max_udp_payload_size + 1, then * we receive more then requested! * i.e. overflow */ 0, NULL, NULL); if (read == -1 && _getdns_EWOULDBLOCK) return; if (read < GLDNS_HEADER_SIZE) return; /* Not DNS */ if (GLDNS_ID_WIRE(netreq->response) != netreq->query_id) return; /* Cache poisoning attempt ;) */ // TODO: check whether EDNS server cookies are required for MDNS // TODO: check that the source address originates from the local network. // TODO: check TTL = 255 #ifdef USE_WINSOCK closesocket(netreq->fd); #else close(netreq->fd); #endif /* * TODO: how to handle an MDNS response with TC bit set? * Ignore it for now, as we do not support any kind of TCP fallback * for basic MDNS. */ netreq->response_len = read; netreq->debug_end_time = _getdns_get_time_as_uintt64(); netreq->state = NET_REQ_FINISHED; _getdns_check_dns_req_complete(dnsreq); } static void mdns_udp_write_cb(void *userarg) { getdns_network_req *netreq = (getdns_network_req *)userarg; getdns_dns_req *dnsreq = netreq->owner; size_t pkt_len = netreq->response - netreq->query; struct sockaddr_in mdns_mcast_v4; int ttl = 255; int r; DEBUG_MDNS("%s %-35s: MSG: %p \n", MDNS_DEBUG_WRITE, __FUNCTION__, netreq); GETDNS_CLEAR_EVENT(dnsreq->loop, &netreq->event); netreq->debug_start_time = _getdns_get_time_as_uintt64(); netreq->debug_udp = 1; netreq->query_id = (uint16_t) arc4random(); GLDNS_ID_SET(netreq->query, netreq->query_id); /* do we need to handle options valid in the MDNS context? */ /* Probably no need for TSIG in MDNS */ /* Always use multicast address */ mdns_mcast_v4.sin_family = AF_INET; mdns_mcast_v4.sin_port = htons(MDNS_MCAST_PORT); mdns_mcast_v4.sin_addr.s_addr = htonl(MDNS_MCAST_IPV4_LONG); /* Set TTL=255 for compliance with RFC 6762 */ r = setsockopt(netreq->fd, IPPROTO_IP, IP_TTL, (const char *)&ttl, sizeof(ttl)); if (r != 0 || (ssize_t)pkt_len != sendto( netreq->fd, (const void *)netreq->query, pkt_len, 0, (struct sockaddr *)&mdns_mcast_v4, sizeof(mdns_mcast_v4))) { #ifdef USE_WINSOCK closesocket(netreq->fd); #else close(netreq->fd); #endif return; } GETDNS_SCHEDULE_EVENT( dnsreq->loop, netreq->fd, dnsreq->context->timeout, getdns_eventloop_event_init(&netreq->event, netreq, mdns_udp_read_cb, NULL, mdns_timeout_cb)); } /* * MDNS Request Submission */ getdns_return_t _getdns_submit_mdns_request(getdns_network_req *netreq) { DEBUG_MDNS("%s %-35s: MSG: %p TYPE: %d\n", MDNS_DEBUG_ENTRY, __FUNCTION__, netreq, netreq->request_type); int fd = -1; getdns_dns_req *dnsreq = netreq->owner; /* Open the UDP socket required for the request */ if ((fd = socket( AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1) return -1; /* TODO: do we need getdns_sock_nonblock(fd); */ /* Schedule the MDNS request */ netreq->fd = fd; GETDNS_CLEAR_EVENT(dnsreq->loop, &netreq->event); GETDNS_SCHEDULE_EVENT( dnsreq->loop, netreq->fd, dnsreq->context->timeout, getdns_eventloop_event_init(&netreq->event, netreq, NULL, mdns_udp_write_cb, mdns_timeout_cb)); return GETDNS_RETURN_GOOD; } /* * MDNS name space management */ static int mdns_suffix_compare(register const uint8_t *d1, register const uint8_t *d2) { int ret = 0; uint8_t *d1_head = (uint8_t *) d1; uint8_t *d1_current; uint8_t *d2_current; int is_matching = 0; int part_length; int i; uint8_t c; /* Skip the first name part, since we want at least one label before the suffix */ if (*d1_head != 0) d1_head += *d1_head + 1; while (*d1_head != 0) { /* check whether we have a match at this point */ d1_current = d1_head; d2_current = (uint8_t *) d2; is_matching = 0; /* compare length and value of all successive labels */ while (*d1_current == *d2_current) { part_length = *d1_current; if (part_length == 0) { /* We have reached the top label, there is a match */ ret = 1; break; } /* The label's lengths are matching, check the content */ is_matching = 1; d1_current++; d2_current++; for (i = 0; i < part_length; i++) { c = d1_current[i]; if (isupper(c)) c = tolower(c); if (c != d2_current[i]) { is_matching = 0; break; } } /* move the pointers to the next label */ if (is_matching) { d1_current += part_length; d2_current += part_length; } } /* if no match found yet, move to the next label of d1 */ if (is_matching) break; else d1_head += *d1_head + 1; } return ret; } getdns_return_t _getdns_mdns_namespace_check( getdns_dns_req *dnsreq) { getdns_return_t ret = GETDNS_RETURN_GENERIC_ERROR; /* Checking the prefixes defined in RFC 6762 */ if (mdns_suffix_compare(dnsreq->name, mdns_suffix_dot_local) || mdns_suffix_compare(dnsreq->name, mdns_suffix_254_169_in_addr_arpa) || mdns_suffix_compare(dnsreq->name, mdns_suffix_8_e_f_ip6_arpa) || mdns_suffix_compare(dnsreq->name, mdns_suffix_9_e_f_ip6_arpa) || mdns_suffix_compare(dnsreq->name, mdns_suffix_a_e_f_ip6_arpa) || mdns_suffix_compare(dnsreq->name, mdns_suffix_b_e_f_ip6_arpa)) ret = GETDNS_RETURN_GOOD; return ret; } #endif /* HAVE_MDNS_SUPPORT */