mirror of
https://github.com/safing/portmaster
synced 2025-09-05 03:59:11 +00:00
Add support for DNS RRs SVCB and HTTP; improve DNS conn handling
This commit is contained in:
parent
cbb4a0f253
commit
9e4bdfb341
2 changed files with 65 additions and 26 deletions
|
@ -45,6 +45,7 @@ func filterDNSSection(
|
||||||
ip = v.AAAA
|
ip = v.AAAA
|
||||||
default:
|
default:
|
||||||
// add non A/AAAA entries
|
// add non A/AAAA entries
|
||||||
|
// TODO: Add support for dns.SVCB and dns.HTTPS
|
||||||
goodEntries = append(goodEntries, rr)
|
goodEntries = append(goodEntries, rr)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
@ -257,6 +258,32 @@ func UpdateIPsAndCNAMEs(q *resolver.Query, rrCache *resolver.RRCache, conn *netw
|
||||||
|
|
||||||
case *dns.AAAA:
|
case *dns.AAAA:
|
||||||
ips = append(ips, v.AAAA)
|
ips = append(ips, v.AAAA)
|
||||||
|
|
||||||
|
case *dns.SVCB:
|
||||||
|
if len(v.Target) >= 2 { // Ignore "" and ".".
|
||||||
|
cnames[v.Hdr.Name] = v.Target
|
||||||
|
}
|
||||||
|
for _, pair := range v.Value {
|
||||||
|
switch svcbParam := pair.(type) {
|
||||||
|
case *dns.SVCBIPv4Hint:
|
||||||
|
ips = append(ips, svcbParam.Hint...)
|
||||||
|
case *dns.SVCBIPv6Hint:
|
||||||
|
ips = append(ips, svcbParam.Hint...)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
case *dns.HTTPS:
|
||||||
|
if len(v.Target) >= 2 { // Ignore "" and ".".
|
||||||
|
cnames[v.Hdr.Name] = v.Target
|
||||||
|
}
|
||||||
|
for _, pair := range v.Value {
|
||||||
|
switch svcbParam := pair.(type) {
|
||||||
|
case *dns.SVCBIPv4Hint:
|
||||||
|
ips = append(ips, svcbParam.Hint...)
|
||||||
|
case *dns.SVCBIPv6Hint:
|
||||||
|
ips = append(ips, svcbParam.Hint...)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -8,6 +8,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
|
"golang.org/x/exp/slices"
|
||||||
|
|
||||||
"github.com/safing/portbase/log"
|
"github.com/safing/portbase/log"
|
||||||
"github.com/safing/portmaster/nameserver/nsutil"
|
"github.com/safing/portmaster/nameserver/nsutil"
|
||||||
|
@ -18,6 +19,13 @@ import (
|
||||||
var (
|
var (
|
||||||
openDNSRequests = make(map[string]*Connection) // key: <pid>/fqdn
|
openDNSRequests = make(map[string]*Connection) // key: <pid>/fqdn
|
||||||
openDNSRequestsLock sync.Mutex
|
openDNSRequestsLock sync.Mutex
|
||||||
|
|
||||||
|
supportedDomainToIPRecordTypes = []uint16{
|
||||||
|
dns.TypeA,
|
||||||
|
dns.TypeAAAA,
|
||||||
|
dns.TypeSVCB,
|
||||||
|
dns.TypeHTTPS,
|
||||||
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -30,6 +38,13 @@ const (
|
||||||
openDNSRequestLimit = 3 * time.Second
|
openDNSRequestLimit = 3 * time.Second
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// IsSupportDNSRecordType returns whether the given DSN RR type is supported
|
||||||
|
// by the network package, as in the requests are specially handled and can be
|
||||||
|
// "merged" into the resulting connection.
|
||||||
|
func IsSupportDNSRecordType(rrType uint16) bool {
|
||||||
|
return slices.Contains[[]uint16, uint16](supportedDomainToIPRecordTypes, rrType)
|
||||||
|
}
|
||||||
|
|
||||||
func getDNSRequestCacheKey(pid int, fqdn string, qType uint16) string {
|
func getDNSRequestCacheKey(pid int, fqdn string, qType uint16) string {
|
||||||
return strconv.Itoa(pid) + "/" + fqdn + dns.Type(qType).String()
|
return strconv.Itoa(pid) + "/" + fqdn + dns.Type(qType).String()
|
||||||
}
|
}
|
||||||
|
@ -39,28 +54,28 @@ func removeOpenDNSRequest(pid int, fqdn string) {
|
||||||
defer openDNSRequestsLock.Unlock()
|
defer openDNSRequestsLock.Unlock()
|
||||||
|
|
||||||
// Delete PID-specific requests.
|
// Delete PID-specific requests.
|
||||||
delete(openDNSRequests, getDNSRequestCacheKey(pid, fqdn, dns.TypeA))
|
for _, dnsType := range supportedDomainToIPRecordTypes {
|
||||||
delete(openDNSRequests, getDNSRequestCacheKey(pid, fqdn, dns.TypeAAAA))
|
delete(openDNSRequests, getDNSRequestCacheKey(pid, fqdn, dnsType))
|
||||||
|
}
|
||||||
|
|
||||||
// If process is known, also check for non-attributed requests.
|
// If process is known, also check for non-attributed requests.
|
||||||
if pid != process.UnidentifiedProcessID {
|
if pid != process.UnidentifiedProcessID {
|
||||||
delete(openDNSRequests, getDNSRequestCacheKey(process.UnidentifiedProcessID, fqdn, dns.TypeA))
|
for _, dnsType := range supportedDomainToIPRecordTypes {
|
||||||
delete(openDNSRequests, getDNSRequestCacheKey(process.UnidentifiedProcessID, fqdn, dns.TypeAAAA))
|
delete(openDNSRequests, getDNSRequestCacheKey(process.UnidentifiedProcessID, fqdn, dnsType))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// SaveOpenDNSRequest saves a dns request connection that was allowed to proceed.
|
// SaveOpenDNSRequest saves a dns request connection that was allowed to proceed.
|
||||||
func SaveOpenDNSRequest(q *resolver.Query, rrCache *resolver.RRCache, conn *Connection) {
|
func SaveOpenDNSRequest(q *resolver.Query, rrCache *resolver.RRCache, conn *Connection) {
|
||||||
// Only save requests that actually went out to reduce clutter.
|
// Only save requests that actually went out (or triggered an async resolve) to reduce clutter.
|
||||||
if rrCache == nil || rrCache.ServedFromCache {
|
if rrCache == nil || (rrCache.ServedFromCache && !rrCache.RequestingNew) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Try to "merge" A and AAAA requests into the resulting connection.
|
// Try to "merge" supported requests into the resulting connection.
|
||||||
// Save others immediately.
|
// Save others immediately.
|
||||||
switch uint16(q.QType) {
|
if !IsSupportDNSRecordType(uint16(q.QType)) {
|
||||||
case dns.TypeA, dns.TypeAAAA:
|
|
||||||
default:
|
|
||||||
conn.Save()
|
conn.Save()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -68,18 +83,12 @@ func SaveOpenDNSRequest(q *resolver.Query, rrCache *resolver.RRCache, conn *Conn
|
||||||
openDNSRequestsLock.Lock()
|
openDNSRequestsLock.Lock()
|
||||||
defer openDNSRequestsLock.Unlock()
|
defer openDNSRequestsLock.Unlock()
|
||||||
|
|
||||||
// Check if there is an existing open DNS requests for the same domain/type.
|
// Do not check for an existing open DNS request, as duplicates in such quick
|
||||||
// If so, save it now and replace it with the new request.
|
// succession are not worth keeping.
|
||||||
key := getDNSRequestCacheKey(conn.process.Pid, conn.Entity.Domain, uint16(q.QType))
|
// DNS queries are usually retried pretty quick.
|
||||||
if existingConn, ok := openDNSRequests[key]; ok {
|
|
||||||
// End previous request and save it.
|
|
||||||
existingConn.Lock()
|
|
||||||
existingConn.Ended = conn.Started
|
|
||||||
existingConn.Unlock()
|
|
||||||
existingConn.Save()
|
|
||||||
}
|
|
||||||
|
|
||||||
// Save to open dns requests.
|
// Save to open dns requests.
|
||||||
|
key := getDNSRequestCacheKey(conn.process.Pid, conn.Entity.Domain, uint16(q.QType))
|
||||||
openDNSRequests[key] = conn
|
openDNSRequests[key] = conn
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -103,12 +112,15 @@ func writeOpenDNSRequestsToDB() {
|
||||||
|
|
||||||
threshold := time.Now().Add(-openDNSRequestLimit).Unix()
|
threshold := time.Now().Add(-openDNSRequestLimit).Unix()
|
||||||
for id, conn := range openDNSRequests {
|
for id, conn := range openDNSRequests {
|
||||||
conn.Lock()
|
func() {
|
||||||
if conn.Ended < threshold {
|
conn.Lock()
|
||||||
conn.Save()
|
defer conn.Unlock()
|
||||||
delete(openDNSRequests, id)
|
|
||||||
}
|
if conn.Ended < threshold {
|
||||||
conn.Unlock()
|
conn.Save()
|
||||||
|
delete(openDNSRequests, id)
|
||||||
|
}
|
||||||
|
}()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue