Implement review suggestions

Fix local. resolving in Firefox
This commit is contained in:
Daniel 2020-07-15 13:59:56 +02:00
parent e369a9484a
commit 047352f9b5
9 changed files with 57 additions and 52 deletions

View file

@ -45,14 +45,14 @@ func Gateways() []net.IP {
}() }()
// logic // logic
newGateways := make([]net.IP, 0) gateways = make([]net.IP, 0)
var decoded []byte var decoded []byte
// open file // open file
route, err := os.Open("/proc/net/route") route, err := os.Open("/proc/net/route")
if err != nil { if err != nil {
log.Warningf("environment: could not read /proc/net/route: %s", err) log.Warningf("environment: could not read /proc/net/route: %s", err)
return newGateways return gateways
} }
defer route.Close() defer route.Close()
@ -77,7 +77,7 @@ func Gateways() []net.IP {
continue continue
} }
gate := net.IPv4(decoded[3], decoded[2], decoded[1], decoded[0]) gate := net.IPv4(decoded[3], decoded[2], decoded[1], decoded[0])
newGateways = append(newGateways, gate) gateways = append(gateways, gate)
} }
} }
@ -85,7 +85,7 @@ func Gateways() []net.IP {
v6route, err := os.Open("/proc/net/ipv6_route") v6route, err := os.Open("/proc/net/ipv6_route")
if err != nil { if err != nil {
log.Warningf("environment: could not read /proc/net/ipv6_route: %s", err) log.Warningf("environment: could not read /proc/net/ipv6_route: %s", err)
return newGateways return gateways
} }
defer v6route.Close() defer v6route.Close()
@ -110,11 +110,11 @@ func Gateways() []net.IP {
continue continue
} }
gate := net.IP(decoded) gate := net.IP(decoded)
newGateways = append(newGateways, gate) gateways = append(gateways, gate)
} }
} }
return newGateways return gateways
} }
// Nameservers returns the currently active nameservers. // Nameservers returns the currently active nameservers.

View file

@ -2,7 +2,6 @@ package netenv
import ( import (
"context" "context"
"errors"
"io/ioutil" "io/ioutil"
"net" "net"
"net/http" "net/http"
@ -111,30 +110,13 @@ var (
captivePortalLock sync.Mutex captivePortalLock sync.Mutex
) )
// CaptivePortal holds information about a detected captive portal.
type CaptivePortal struct { type CaptivePortal struct {
URL string URL string
Domain string Domain string
IP net.IP IP net.IP
} }
// IPasRR returns the captive portal IP as a DNS resource record.
func (p *CaptivePortal) IPasRR() (rr dns.RR, err error) {
switch {
case p.IP == nil:
return nil, errors.New("no portal IP present")
case p.Domain == "":
return nil, errors.New("no portal domain present")
case p.IP.To4() != nil:
rr, err = dns.NewRR(p.Domain + " 17 IN A " + p.IP.String())
default:
rr, err = dns.NewRR(p.Domain + " 17 IN AAAA " + p.IP.String())
}
if err != nil {
return nil, err
}
return rr, nil
}
func init() { func init() {
var onlineStatusValue int32 var onlineStatusValue int32
onlineStatus = &onlineStatusValue onlineStatus = &onlineStatusValue

View file

@ -152,7 +152,7 @@ func NewConnectionFromFirstPacket(pkt packet.Packet) *Connection {
// check if destination IP is the captive portal's IP // check if destination IP is the captive portal's IP
portal := netenv.GetCaptivePortal() portal := netenv.GetCaptivePortal()
if portal.IP != nil && pkt.Info().Dst.Equal(portal.IP) { if pkt.Info().Dst.Equal(portal.IP) {
scope = portal.Domain scope = portal.Domain
entity.Domain = portal.Domain entity.Domain = portal.Domain
} }

View file

@ -1,6 +1,8 @@
package netutils package netutils
import ( import (
"fmt"
"net"
"regexp" "regexp"
"github.com/miekg/dns" "github.com/miekg/dns"
@ -56,3 +58,24 @@ func IsValidFqdn(fqdn string) bool {
_, ok := dns.IsDomainName(fqdn) _, ok := dns.IsDomainName(fqdn)
return ok return ok
} }
// IPsToRRs transforms the given IPs to resource records.
func IPsToRRs(domain string, ips []net.IP) ([]dns.RR, error) {
records := make([]dns.RR, 0, len(ips))
var rr dns.RR
var err error
for _, ip := range ips {
if ip.To4() != nil {
rr, err = dns.NewRR(fmt.Sprintf("%s 17 IN A %s", domain, ip))
} else {
rr, err = dns.NewRR(fmt.Sprintf("%s 17 IN AAAA %s", domain, ip))
}
if err != nil {
return nil, fmt.Errorf("failed to create record for %s: %w", ip, err)
}
records = append(records, rr)
}
return records, nil
}

View file

@ -24,6 +24,10 @@ func init() {
func prep() error { func prep() error {
intel.SetReverseResolver(ResolveIPAndValidate) intel.SetReverseResolver(ResolveIPAndValidate)
if err := prepEnvResolver(); err != nil {
return err
}
return prepConfig() return prepConfig()
} }

View file

@ -261,6 +261,8 @@ resolveLoop:
case errors.Is(err, ErrBlocked): case errors.Is(err, ErrBlocked):
// some resolvers might also block // some resolvers might also block
return nil, err return nil, err
case errors.Is(err, ErrContinue):
continue
case netenv.GetOnlineStatus() == netenv.StatusOffline && case netenv.GetOnlineStatus() == netenv.StatusOffline &&
!netenv.IsConnectivityDomain(q.FQDN): !netenv.IsConnectivityDomain(q.FQDN):
log.Tracer(ctx).Debugf("resolver: not resolving %s, device is offline", q.FQDN) log.Tracer(ctx).Debugf("resolver: not resolving %s, device is offline", q.FQDN)

View file

@ -2,7 +2,6 @@ package resolver
import ( import (
"context" "context"
"fmt"
"net" "net"
"github.com/miekg/dns" "github.com/miekg/dns"
@ -19,8 +18,15 @@ var (
Source: ServerSourceEnv, Source: ServerSourceEnv,
Conn: &envResolverConn{}, Conn: &envResolverConn{},
} }
localSOA dns.RR
) )
func prepEnvResolver() (err error) {
localSOA, err = dns.NewRR("local. 17 IN SOA localhost. none.localhost. 17 17 17 17 17")
return err
}
type envResolverConn struct{} type envResolverConn struct{}
func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error) { func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error) {
@ -29,14 +35,22 @@ func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error
// check for matching name // check for matching name
switch q.FQDN { switch q.FQDN {
case "local.":
// Firefox requests the SOA request for local. before resolving any local. domains.
// Others might be doing this too. We guessed this behaviour, weren't able to find docs.
if q.QType == dns.Type(dns.TypeSOA) {
return er.makeRRCache(q, []dns.RR{localSOA}), nil
}
return nil, ErrNotFound
case netenv.SpecialCaptivePortalDomain: case netenv.SpecialCaptivePortalDomain:
if portal.IP != nil { if portal.IP != nil {
rr, err := portal.IPasRR() records, err := netutils.IPsToRRs(q.FQDN, []net.IP{portal.IP})
if err != nil { if err != nil {
log.Warningf("nameserver: failed to create captive portal response to %s: %s", q.FQDN, err) log.Warningf("nameserver: failed to create captive portal response to %s: %s", q.FQDN, err)
return nil, ErrNotFound return nil, ErrNotFound
} }
return er.makeRRCache(q, []dns.RR{rr}), nil return er.makeRRCache(q, records), nil
} }
return nil, ErrNotFound return nil, ErrNotFound
@ -45,7 +59,7 @@ func (er *envResolverConn) Query(ctx context.Context, q *Query) (*RRCache, error
if len(routers) == 0 { if len(routers) == 0 {
return nil, ErrNotFound return nil, ErrNotFound
} }
records, err := ipsToRRs(q.FQDN, routers) records, err := netutils.IPsToRRs(q.FQDN, routers)
if err != nil { if err != nil {
log.Warningf("nameserver: failed to create gateway response to %s: %s", q.FQDN, err) log.Warningf("nameserver: failed to create gateway response to %s: %s", q.FQDN, err)
return nil, ErrNotFound return nil, ErrNotFound
@ -73,23 +87,3 @@ func (er *envResolverConn) ReportFailure() {}
func (er *envResolverConn) IsFailing() bool { func (er *envResolverConn) IsFailing() bool {
return false return false
} }
func ipsToRRs(domain string, ips []net.IP) ([]dns.RR, error) {
var records []dns.RR
var rr dns.RR
var err error
for _, ip := range ips {
if ip.To4() != nil {
rr, err = dns.NewRR(domain + " 17 IN A " + ip.String())
} else {
rr, err = dns.NewRR(domain + " 17 IN AAAA " + ip.String())
}
if err != nil {
return nil, fmt.Errorf("failed to create record for %s: %w", ip, err)
}
records = append(records, rr)
}
return records, nil
}

View file

@ -32,6 +32,6 @@ func TestResolveIPAndValidate(t *testing.T) {
testReverse(t, "1.1.1.1", "one.one.one.one.", "") testReverse(t, "1.1.1.1", "one.one.one.one.", "")
testReverse(t, "2606:4700:4700::1111", "one.one.one.one.", "") testReverse(t, "2606:4700:4700::1111", "one.one.one.one.", "")
testReverse(t, "93.184.216.34", "example.com.", "record does not exist: 34.216.184.93.in-addr.arpa.PTR") testReverse(t, "93.184.216.34", "example.com.", "record could not be found: 34.216.184.93.in-addr.arpa.PTR")
testReverse(t, "185.199.109.153", "sites.github.io.", "record does not exist: 153.109.199.185.in-addr.arpa.PTR") testReverse(t, "185.199.109.153", "sites.github.io.", "record could not be found: 153.109.199.185.in-addr.arpa.PTR")
} }