mirror of
https://github.com/safing/portmaster
synced 2025-09-05 03:59:11 +00:00
Implement review suggestions
Fix local. resolving in Firefox
This commit is contained in:
parent
e369a9484a
commit
047352f9b5
9 changed files with 57 additions and 52 deletions
|
@ -45,14 +45,14 @@ func Gateways() []net.IP {
|
||||||
}()
|
}()
|
||||||
// logic
|
// logic
|
||||||
|
|
||||||
newGateways := make([]net.IP, 0)
|
gateways = make([]net.IP, 0)
|
||||||
var decoded []byte
|
var decoded []byte
|
||||||
|
|
||||||
// open file
|
// open file
|
||||||
route, err := os.Open("/proc/net/route")
|
route, err := os.Open("/proc/net/route")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warningf("environment: could not read /proc/net/route: %s", err)
|
log.Warningf("environment: could not read /proc/net/route: %s", err)
|
||||||
return newGateways
|
return gateways
|
||||||
}
|
}
|
||||||
defer route.Close()
|
defer route.Close()
|
||||||
|
|
||||||
|
@ -77,7 +77,7 @@ func Gateways() []net.IP {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
gate := net.IPv4(decoded[3], decoded[2], decoded[1], decoded[0])
|
gate := net.IPv4(decoded[3], decoded[2], decoded[1], decoded[0])
|
||||||
newGateways = append(newGateways, gate)
|
gateways = append(gateways, gate)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ func Gateways() []net.IP {
|
||||||
v6route, err := os.Open("/proc/net/ipv6_route")
|
v6route, err := os.Open("/proc/net/ipv6_route")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warningf("environment: could not read /proc/net/ipv6_route: %s", err)
|
log.Warningf("environment: could not read /proc/net/ipv6_route: %s", err)
|
||||||
return newGateways
|
return gateways
|
||||||
}
|
}
|
||||||
defer v6route.Close()
|
defer v6route.Close()
|
||||||
|
|
||||||
|
@ -110,11 +110,11 @@ func Gateways() []net.IP {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
gate := net.IP(decoded)
|
gate := net.IP(decoded)
|
||||||
newGateways = append(newGateways, gate)
|
gateways = append(gateways, gate)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return newGateways
|
return gateways
|
||||||
}
|
}
|
||||||
|
|
||||||
// Nameservers returns the currently active nameservers.
|
// Nameservers returns the currently active nameservers.
|
||||||
|
|
|
@ -2,7 +2,6 @@ package netenv
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -111,30 +110,13 @@ var (
|
||||||
captivePortalLock sync.Mutex
|
captivePortalLock sync.Mutex
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// CaptivePortal holds information about a detected captive portal.
|
||||||
type CaptivePortal struct {
|
type CaptivePortal struct {
|
||||||
URL string
|
URL string
|
||||||
Domain string
|
Domain string
|
||||||
IP net.IP
|
IP net.IP
|
||||||
}
|
}
|
||||||
|
|
||||||
// IPasRR returns the captive portal IP as a DNS resource record.
|
|
||||||
func (p *CaptivePortal) IPasRR() (rr dns.RR, err error) {
|
|
||||||
switch {
|
|
||||||
case p.IP == nil:
|
|
||||||
return nil, errors.New("no portal IP present")
|
|
||||||
case p.Domain == "":
|
|
||||||
return nil, errors.New("no portal domain present")
|
|
||||||
case p.IP.To4() != nil:
|
|
||||||
rr, err = dns.NewRR(p.Domain + " 17 IN A " + p.IP.String())
|
|
||||||
default:
|
|
||||||
rr, err = dns.NewRR(p.Domain + " 17 IN AAAA " + p.IP.String())
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return rr, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
var onlineStatusValue int32
|
var onlineStatusValue int32
|
||||||
onlineStatus = &onlineStatusValue
|
onlineStatus = &onlineStatusValue
|
||||||
|
|
|
@ -152,7 +152,7 @@ func NewConnectionFromFirstPacket(pkt packet.Packet) *Connection {
|
||||||
|
|
||||||
// check if destination IP is the captive portal's IP
|
// check if destination IP is the captive portal's IP
|
||||||
portal := netenv.GetCaptivePortal()
|
portal := netenv.GetCaptivePortal()
|
||||||
if portal.IP != nil && pkt.Info().Dst.Equal(portal.IP) {
|
if pkt.Info().Dst.Equal(portal.IP) {
|
||||||
scope = portal.Domain
|
scope = portal.Domain
|
||||||
entity.Domain = portal.Domain
|
entity.Domain = portal.Domain
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
package netutils
|
package netutils
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
"regexp"
|
"regexp"
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
|
@ -56,3 +58,24 @@ func IsValidFqdn(fqdn string) bool {
|
||||||
_, ok := dns.IsDomainName(fqdn)
|
_, ok := dns.IsDomainName(fqdn)
|
||||||
return ok
|
return ok
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// IPsToRRs transforms the given IPs to resource records.
|
||||||
|
func IPsToRRs(domain string, ips []net.IP) ([]dns.RR, error) {
|
||||||
|
records := make([]dns.RR, 0, len(ips))
|
||||||
|
var rr dns.RR
|
||||||
|
var err error
|
||||||
|
|
||||||
|
for _, ip := range ips {
|
||||||
|
if ip.To4() != nil {
|
||||||
|
rr, err = dns.NewRR(fmt.Sprintf("%s 17 IN A %s", domain, ip))
|
||||||
|
} else {
|
||||||
|
rr, err = dns.NewRR(fmt.Sprintf("%s 17 IN AAAA %s", domain, ip))
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create record for %s: %w", ip, err)
|
||||||
|
}
|
||||||
|
records = append(records, rr)
|
||||||
|
}
|
||||||
|
|
||||||
|
return records, nil
|
||||||
|
}
|
|
@ -24,6 +24,10 @@ func init() {
|
||||||
func prep() error {
|
func prep() error {
|
||||||
intel.SetReverseResolver(ResolveIPAndValidate)
|
intel.SetReverseResolver(ResolveIPAndValidate)
|
||||||
|
|
||||||
|
if err := prepEnvResolver(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
return prepConfig()
|
return prepConfig()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -261,6 +261,8 @@ resolveLoop:
|
||||||
case errors.Is(err, ErrBlocked):
|
case errors.Is(err, ErrBlocked):
|
||||||
// some resolvers might also block
|
// some resolvers might also block
|
||||||
return nil, err
|
return nil, err
|
||||||
|
case errors.Is(err, ErrContinue):
|
||||||
|
continue
|
||||||
case netenv.GetOnlineStatus() == netenv.StatusOffline &&
|
case netenv.GetOnlineStatus() == netenv.StatusOffline &&
|
||||||
!netenv.IsConnectivityDomain(q.FQDN):
|
!netenv.IsConnectivityDomain(q.FQDN):
|
||||||
log.Tracer(ctx).Debugf("resolver: not resolving %s, device is offline", q.FQDN)
|
log.Tracer(ctx).Debugf("resolver: not resolving %s, device is offline", q.FQDN)
|
||||||
|
|
|
@ -2,7 +2,6 @@ package resolver
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
|
||||||
"net"
|
"net"
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
|
@ -19,8 +18,15 @@ var (
|
||||||
Source: ServerSourceEnv,
|
Source: ServerSourceEnv,
|
||||||
Conn: &envResolverConn{},
|
Conn: &envResolverConn{},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
localSOA dns.RR
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func prepEnvResolver() (err error) {
|
||||||
|
localSOA, err = dns.NewRR("local. 17 IN SOA localhost. none.localhost. 17 17 17 17 17")
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
type envResolverConn struct{}
|
type envResolverConn struct{}
|
||||||
|
|
||||||
func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error) {
|
func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error) {
|
||||||
|
@ -29,14 +35,22 @@ func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error
|
||||||
|
|
||||||
// check for matching name
|
// check for matching name
|
||||||
switch q.FQDN {
|
switch q.FQDN {
|
||||||
|
case "local.":
|
||||||
|
// Firefox requests the SOA request for local. before resolving any local. domains.
|
||||||
|
// Others might be doing this too. We guessed this behaviour, weren't able to find docs.
|
||||||
|
if q.QType == dns.Type(dns.TypeSOA) {
|
||||||
|
return er.makeRRCache(q, []dns.RR{localSOA}), nil
|
||||||
|
}
|
||||||
|
return nil, ErrNotFound
|
||||||
|
|
||||||
case netenv.SpecialCaptivePortalDomain:
|
case netenv.SpecialCaptivePortalDomain:
|
||||||
if portal.IP != nil {
|
if portal.IP != nil {
|
||||||
rr, err := portal.IPasRR()
|
records, err := netutils.IPsToRRs(q.FQDN, []net.IP{portal.IP})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warningf("nameserver: failed to create captive portal response to %s: %s", q.FQDN, err)
|
log.Warningf("nameserver: failed to create captive portal response to %s: %s", q.FQDN, err)
|
||||||
return nil, ErrNotFound
|
return nil, ErrNotFound
|
||||||
}
|
}
|
||||||
return er.makeRRCache(q, []dns.RR{rr}), nil
|
return er.makeRRCache(q, records), nil
|
||||||
}
|
}
|
||||||
return nil, ErrNotFound
|
return nil, ErrNotFound
|
||||||
|
|
||||||
|
@ -45,7 +59,7 @@ func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error
|
||||||
if len(routers) == 0 {
|
if len(routers) == 0 {
|
||||||
return nil, ErrNotFound
|
return nil, ErrNotFound
|
||||||
}
|
}
|
||||||
records, err := ipsToRRs(q.FQDN, routers)
|
records, err := netutils.IPsToRRs(q.FQDN, routers)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warningf("nameserver: failed to create gateway response to %s: %s", q.FQDN, err)
|
log.Warningf("nameserver: failed to create gateway response to %s: %s", q.FQDN, err)
|
||||||
return nil, ErrNotFound
|
return nil, ErrNotFound
|
||||||
|
@ -73,23 +87,3 @@ func (er *envResolverConn) ReportFailure() {}
|
||||||
func (er *envResolverConn) IsFailing() bool {
|
func (er *envResolverConn) IsFailing() bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func ipsToRRs(domain string, ips []net.IP) ([]dns.RR, error) {
|
|
||||||
var records []dns.RR
|
|
||||||
var rr dns.RR
|
|
||||||
var err error
|
|
||||||
|
|
||||||
for _, ip := range ips {
|
|
||||||
if ip.To4() != nil {
|
|
||||||
rr, err = dns.NewRR(domain + " 17 IN A " + ip.String())
|
|
||||||
} else {
|
|
||||||
rr, err = dns.NewRR(domain + " 17 IN AAAA " + ip.String())
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to create record for %s: %w", ip, err)
|
|
||||||
}
|
|
||||||
records = append(records, rr)
|
|
||||||
}
|
|
||||||
|
|
||||||
return records, nil
|
|
||||||
}
|
|
||||||
|
|
|
@ -32,6 +32,6 @@ func TestResolveIPAndValidate(t *testing.T) {
|
||||||
testReverse(t, "1.1.1.1", "one.one.one.one.", "")
|
testReverse(t, "1.1.1.1", "one.one.one.one.", "")
|
||||||
testReverse(t, "2606:4700:4700::1111", "one.one.one.one.", "")
|
testReverse(t, "2606:4700:4700::1111", "one.one.one.one.", "")
|
||||||
|
|
||||||
testReverse(t, "93.184.216.34", "example.com.", "record does not exist: 34.216.184.93.in-addr.arpa.PTR")
|
testReverse(t, "93.184.216.34", "example.com.", "record could not be found: 34.216.184.93.in-addr.arpa.PTR")
|
||||||
testReverse(t, "185.199.109.153", "sites.github.io.", "record does not exist: 153.109.199.185.in-addr.arpa.PTR")
|
testReverse(t, "185.199.109.153", "sites.github.io.", "record could not be found: 153.109.199.185.in-addr.arpa.PTR")
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue