]> git.proxmox.com Git - systemd.git/blame - src/resolve/resolved-dns-packet.h
Imported Upstream version 228
[systemd.git] / src / resolve / resolved-dns-packet.h
CommitLineData
5eef597e
MP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3#pragma once
4
5/***
6 This file is part of systemd.
7
8 Copyright 2014 Lennart Poettering
9
10 systemd is free software; you can redistribute it and/or modify it
11 under the terms of the GNU Lesser General Public License as published by
12 the Free Software Foundation; either version 2.1 of the License, or
13 (at your option) any later version.
14
15 systemd is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 Lesser General Public License for more details.
19
20 You should have received a copy of the GNU Lesser General Public License
21 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 ***/
23
7035cd9e
MP
24#include <netinet/udp.h>
25#include <netinet/ip.h>
5eef597e
MP
26
27#include "macro.h"
28#include "sparse-endian.h"
29#include "hashmap.h"
30#include "in-addr-util.h"
31
32typedef struct DnsPacketHeader DnsPacketHeader;
33typedef struct DnsPacket DnsPacket;
34
35#include "resolved-dns-rr.h"
36#include "resolved-dns-question.h"
37#include "resolved-dns-answer.h"
38#include "resolved-def.h"
39
40typedef enum DnsProtocol {
41 DNS_PROTOCOL_DNS,
42 DNS_PROTOCOL_MDNS,
43 DNS_PROTOCOL_LLMNR,
44 _DNS_PROTOCOL_MAX,
45 _DNS_PROTOCOL_INVALID = -1
46} DnsProtocol;
47
48struct DnsPacketHeader {
49 uint16_t id;
50 be16_t flags;
51 be16_t qdcount;
52 be16_t ancount;
53 be16_t nscount;
54 be16_t arcount;
55};
56
57#define DNS_PACKET_HEADER_SIZE sizeof(DnsPacketHeader)
7035cd9e 58#define UDP_PACKET_HEADER_SIZE (sizeof(struct iphdr) + sizeof(struct udphdr))
5eef597e
MP
59
60/* The various DNS protocols deviate in how large a packet can grow,
61 but the TCP transport has a 16bit size field, hence that appears to
62 be the absolute maximum. */
63#define DNS_PACKET_SIZE_MAX 0xFFFF
64
65/* RFC 1035 say 512 is the maximum, for classic unicast DNS */
66#define DNS_PACKET_UNICAST_SIZE_MAX 512
67
68#define DNS_PACKET_SIZE_START 512
69
70struct DnsPacket {
71 int n_ref;
72 DnsProtocol protocol;
73 size_t size, allocated, rindex;
74 void *_data; /* don't access directly, use DNS_PACKET_DATA()! */
75 Hashmap *names; /* For name compression */
76
77 /* Parsed data */
78 DnsQuestion *question;
79 DnsAnswer *answer;
80
d9dfd233 81 /* Packet reception metadata */
5eef597e
MP
82 int ifindex;
83 int family, ipproto;
84 union in_addr_union sender, destination;
85 uint16_t sender_port, destination_port;
86 uint32_t ttl;
87
88 bool extracted;
13d276d0 89 bool refuse_compression;
5eef597e
MP
90};
91
92static inline uint8_t* DNS_PACKET_DATA(DnsPacket *p) {
93 if (_unlikely_(!p))
94 return NULL;
95
96 if (p->_data)
97 return p->_data;
98
99 return ((uint8_t*) p) + ALIGN(sizeof(DnsPacket));
100}
101
102#define DNS_PACKET_HEADER(p) ((DnsPacketHeader*) DNS_PACKET_DATA(p))
103#define DNS_PACKET_ID(p) DNS_PACKET_HEADER(p)->id
104#define DNS_PACKET_QR(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 15) & 1)
105#define DNS_PACKET_OPCODE(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 11) & 15)
7035cd9e 106#define DNS_PACKET_AA(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 10) & 1)
5eef597e 107#define DNS_PACKET_TC(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 9) & 1)
7035cd9e
MP
108#define DNS_PACKET_RD(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 8) & 1)
109#define DNS_PACKET_RA(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 7) & 1)
110#define DNS_PACKET_AD(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 5) & 1)
111#define DNS_PACKET_CD(p) ((be16toh(DNS_PACKET_HEADER(p)->flags) >> 4) & 1)
112#define DNS_PACKET_RCODE(p) (be16toh(DNS_PACKET_HEADER(p)->flags) & 15)
113
114/* LLMNR defines some bits differently */
115#define DNS_PACKET_LLMNR_C(p) DNS_PACKET_AA(p)
116#define DNS_PACKET_LLMNR_T(p) DNS_PACKET_RD(p)
117
5eef597e
MP
118#define DNS_PACKET_QDCOUNT(p) be16toh(DNS_PACKET_HEADER(p)->qdcount)
119#define DNS_PACKET_ANCOUNT(p) be16toh(DNS_PACKET_HEADER(p)->ancount)
120#define DNS_PACKET_NSCOUNT(p) be16toh(DNS_PACKET_HEADER(p)->nscount)
121#define DNS_PACKET_ARCOUNT(p) be16toh(DNS_PACKET_HEADER(p)->arcount)
122
123#define DNS_PACKET_MAKE_FLAGS(qr, opcode, aa, tc, rd, ra, ad, cd, rcode) \
13d276d0
MP
124 (((uint16_t) !!(qr) << 15) | \
125 ((uint16_t) ((opcode) & 15) << 11) | \
126 ((uint16_t) !!(aa) << 10) | /* on LLMNR: c */ \
127 ((uint16_t) !!(tc) << 9) | \
128 ((uint16_t) !!(rd) << 8) | /* on LLMNR: t */ \
129 ((uint16_t) !!(ra) << 7) | \
130 ((uint16_t) !!(ad) << 5) | \
131 ((uint16_t) !!(cd) << 4) | \
132 ((uint16_t) ((rcode) & 15)))
5eef597e
MP
133
134static inline unsigned DNS_PACKET_RRCOUNT(DnsPacket *p) {
135 return
136 (unsigned) DNS_PACKET_ANCOUNT(p) +
137 (unsigned) DNS_PACKET_NSCOUNT(p) +
138 (unsigned) DNS_PACKET_ARCOUNT(p);
139}
140
141int dns_packet_new(DnsPacket **p, DnsProtocol protocol, size_t mtu);
142int dns_packet_new_query(DnsPacket **p, DnsProtocol protocol, size_t mtu);
143
144DnsPacket *dns_packet_ref(DnsPacket *p);
145DnsPacket *dns_packet_unref(DnsPacket *p);
146
147DEFINE_TRIVIAL_CLEANUP_FUNC(DnsPacket*, dns_packet_unref);
148
149int dns_packet_validate(DnsPacket *p);
150int dns_packet_validate_reply(DnsPacket *p);
151int dns_packet_validate_query(DnsPacket *p);
152
153int dns_packet_append_blob(DnsPacket *p, const void *d, size_t sz, size_t *start);
154int dns_packet_append_uint8(DnsPacket *p, uint8_t v, size_t *start);
155int dns_packet_append_uint16(DnsPacket *p, uint16_t v, size_t *start);
156int dns_packet_append_uint32(DnsPacket *p, uint32_t v, size_t *start);
157int dns_packet_append_string(DnsPacket *p, const char *s, size_t *start);
158int dns_packet_append_label(DnsPacket *p, const char *s, size_t l, size_t *start);
159int dns_packet_append_name(DnsPacket *p, const char *name,
160 bool allow_compression, size_t *start);
161int dns_packet_append_key(DnsPacket *p, const DnsResourceKey *key, size_t *start);
162int dns_packet_append_rr(DnsPacket *p, const DnsResourceRecord *rr, size_t *start);
163
164int dns_packet_read(DnsPacket *p, size_t sz, const void **ret, size_t *start);
165int dns_packet_read_blob(DnsPacket *p, void *d, size_t sz, size_t *start);
166int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start);
167int dns_packet_read_uint16(DnsPacket *p, uint16_t *ret, size_t *start);
168int dns_packet_read_uint32(DnsPacket *p, uint32_t *ret, size_t *start);
169int dns_packet_read_string(DnsPacket *p, char **ret, size_t *start);
170int dns_packet_read_name(DnsPacket *p, char **ret,
171 bool allow_compression, size_t *start);
172int dns_packet_read_key(DnsPacket *p, DnsResourceKey **ret, size_t *start);
173int dns_packet_read_rr(DnsPacket *p, DnsResourceRecord **ret, size_t *start);
174
175void dns_packet_rewind(DnsPacket *p, size_t idx);
176
177int dns_packet_skip_question(DnsPacket *p);
178int dns_packet_extract(DnsPacket *p);
179
180enum {
181 DNS_RCODE_SUCCESS = 0,
182 DNS_RCODE_FORMERR = 1,
183 DNS_RCODE_SERVFAIL = 2,
184 DNS_RCODE_NXDOMAIN = 3,
185 DNS_RCODE_NOTIMP = 4,
186 DNS_RCODE_REFUSED = 5,
187 DNS_RCODE_YXDOMAIN = 6,
188 DNS_RCODE_YXRRSET = 7,
189 DNS_RCODE_NXRRSET = 8,
190 DNS_RCODE_NOTAUTH = 9,
191 DNS_RCODE_NOTZONE = 10,
192 DNS_RCODE_BADVERS = 16,
193 DNS_RCODE_BADSIG = 16, /* duplicate value! */
194 DNS_RCODE_BADKEY = 17,
195 DNS_RCODE_BADTIME = 18,
196 DNS_RCODE_BADMODE = 19,
197 DNS_RCODE_BADNAME = 20,
198 DNS_RCODE_BADALG = 21,
199 DNS_RCODE_BADTRUNC = 22,
200 _DNS_RCODE_MAX_DEFINED
201};
202
203const char* dns_rcode_to_string(int i) _const_;
204int dns_rcode_from_string(const char *s) _pure_;
205
206const char* dns_protocol_to_string(DnsProtocol p) _const_;
207DnsProtocol dns_protocol_from_string(const char *s) _pure_;
208
209#define LLMNR_MULTICAST_IPV4_ADDRESS ((struct in_addr) { .s_addr = htobe32(224U << 24 | 252U) })
210#define LLMNR_MULTICAST_IPV6_ADDRESS ((struct in6_addr) { .s6_addr = { 0xFF, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x03 } })
211
212#define DNSKEY_FLAG_ZONE_KEY (1u << 8)
213#define DNSKEY_FLAG_SEP (1u << 0)
214
215static inline uint16_t dnskey_to_flags(const DnsResourceRecord *rr) {
216 return (rr->dnskey.zone_key_flag * DNSKEY_FLAG_ZONE_KEY |
217 rr->dnskey.sep_flag * DNSKEY_FLAG_SEP);
218}
219
220/* http://tools.ietf.org/html/rfc4034#appendix-A.1 */
221enum {
222 DNSSEC_ALGORITHM_RSAMD5 = 1,
223 DNSSEC_ALGORITHM_DH,
224 DNSSEC_ALGORITHM_DSA,
225 DNSSEC_ALGORITHM_ECC,
226 DNSSEC_ALGORITHM_RSASHA1,
7035cd9e
MP
227 DNSSEC_ALGORITHM_DSA_NSEC3_SHA1,
228 DNSSEC_ALGORITHM_RSASHA1_NSEC3_SHA1,
5eef597e
MP
229 DNSSEC_ALGORITHM_INDIRECT = 252,
230 DNSSEC_ALGORITHM_PRIVATEDNS,
231 DNSSEC_ALGORITHM_PRIVATEOID,
232 _DNSSEC_ALGORITHM_MAX_DEFINED
233};
234
235const char* dnssec_algorithm_to_string(int i) _const_;
236int dnssec_algorithm_from_string(const char *s) _pure_;
237
238static inline uint64_t SD_RESOLVED_FLAGS_MAKE(DnsProtocol protocol, int family) {
239
240 /* Converts a protocol + family into a flags field as used in queries */
241
13d276d0
MP
242 switch (protocol) {
243 case DNS_PROTOCOL_DNS:
5eef597e
MP
244 return SD_RESOLVED_DNS;
245
13d276d0 246 case DNS_PROTOCOL_LLMNR:
5eef597e
MP
247 return family == AF_INET6 ? SD_RESOLVED_LLMNR_IPV6 : SD_RESOLVED_LLMNR_IPV4;
248
13d276d0
MP
249 default:
250 break;
251 }
252
5eef597e
MP
253 return 0;
254}