mirror of
https://github.com/safing/portmaster
synced 2025-04-10 22:19:11 +00:00
* Move portbase into monorepo * Add new simple module mgr * [WIP] Switch to new simple module mgr * Add StateMgr and more worker variants * [WIP] Switch more modules * [WIP] Switch more modules * [WIP] swtich more modules * [WIP] switch all SPN modules * [WIP] switch all service modules * [WIP] Convert all workers to the new module system * [WIP] add new task system to module manager * [WIP] Add second take for scheduling workers * [WIP] Add FIXME for bugs in new scheduler * [WIP] Add minor improvements to scheduler * [WIP] Add new worker scheduler * [WIP] Fix more bug related to new module system * [WIP] Fix start handing of the new module system * [WIP] Improve startup process * [WIP] Fix minor issues * [WIP] Fix missing subsystem in settings * [WIP] Initialize managers in constructor * [WIP] Move module event initialization to constrictors * [WIP] Fix setting for enabling and disabling the SPN module * [WIP] Move API registeration into module construction * [WIP] Update states mgr for all modules * [WIP] Add CmdLine operation support * Add state helper methods to module group and instance * Add notification and module status handling to status package * Fix starting issues * Remove pilot widget and update security lock to new status data * Remove debug logs * Improve http server shutdown * Add workaround for cleanly shutting down firewall+netquery * Improve logging * Add syncing states with notifications for new module system * Improve starting, stopping, shutdown; resolve FIXMEs/TODOs * [WIP] Fix most unit tests * Review new module system and fix minor issues * Push shutdown and restart events again via API * Set sleep mode via interface * Update example/template module * [WIP] Fix spn/cabin unit test * Remove deprecated UI elements * Make log output more similar for the logging transition phase * Switch spn hub and observer cmds to new module system * Fix log sources * Make worker mgr less error prone * Fix tests and minor issues * Fix observation hub * Improve shutdown and restart handling * Split up big connection.go source file * Move varint and dsd packages to structures repo * Improve expansion test * Fix linter warnings * Fix interception module on windows * Fix linter errors --------- Co-authored-by: Vladimir Stoilov <vladimir@safing.io>
306 lines
7.9 KiB
Go
306 lines
7.9 KiB
Go
package resolver
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"strings"
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
"github.com/safing/portmaster/base/log"
|
|
"github.com/safing/portmaster/service/netenv"
|
|
)
|
|
|
|
// Domain Scopes.
|
|
var (
|
|
// Localhost Domain
|
|
// Handling: Respond with 127.0.0.1 and ::1 to A and AAAA queries, respectively.
|
|
// See RFC6761.
|
|
localhostDomain = ".localhost."
|
|
|
|
// Invalid Domain
|
|
// Handling: Always respond with NXDOMAIN.
|
|
// See RFC6761.
|
|
invalidDomain = ".invalid."
|
|
|
|
// Internal Special-Use Domain
|
|
// Used by Portmaster for special addressing.
|
|
internalSpecialUseDomains = []string{
|
|
"." + InternalSpecialUseDomain,
|
|
}
|
|
|
|
// Multicast DNS
|
|
// Handling: Send to nameservers with matching search scope, then MDNS
|
|
// See RFC6762.
|
|
multicastDomains = []string{
|
|
".local.",
|
|
".254.169.in-addr.arpa.",
|
|
".8.e.f.ip6.arpa.",
|
|
".9.e.f.ip6.arpa.",
|
|
".a.e.f.ip6.arpa.",
|
|
".b.e.f.ip6.arpa.",
|
|
}
|
|
|
|
// Special-Use Domain Names
|
|
// Handling: Send to nameservers with matching search scope, then local and system assigned nameservers
|
|
// IANA Ref: https://www.iana.org/assignments/special-use-domain-names
|
|
specialUseDomains = []string{
|
|
// RFC8375: Designated for non-unique use in residential home networks.
|
|
".home.arpa.",
|
|
|
|
// RFC6762 (Appendix G): Non-official, but officially listed, private use domains.
|
|
".intranet.",
|
|
".internal.",
|
|
".private.",
|
|
".corp.",
|
|
".home.",
|
|
".lan.",
|
|
|
|
// RFC6761: IPv4 private-address reverse-mapping domains.
|
|
".10.in-addr.arpa.",
|
|
".16.172.in-addr.arpa.",
|
|
".17.172.in-addr.arpa.",
|
|
".18.172.in-addr.arpa.",
|
|
".19.172.in-addr.arpa.",
|
|
".20.172.in-addr.arpa.",
|
|
".21.172.in-addr.arpa.",
|
|
".22.172.in-addr.arpa.",
|
|
".23.172.in-addr.arpa.",
|
|
".24.172.in-addr.arpa.",
|
|
".25.172.in-addr.arpa.",
|
|
".26.172.in-addr.arpa.",
|
|
".27.172.in-addr.arpa.",
|
|
".28.172.in-addr.arpa.",
|
|
".29.172.in-addr.arpa.",
|
|
".30.172.in-addr.arpa.",
|
|
".31.172.in-addr.arpa.",
|
|
".168.192.in-addr.arpa.",
|
|
|
|
// RFC4193: IPv6 private-address reverse-mapping domains.
|
|
".d.f.ip6.arpa.",
|
|
".c.f.ip6.arpa.",
|
|
|
|
// RFC6761: Special use domains for documentation and testing.
|
|
".example.",
|
|
".example.com.",
|
|
".example.net.",
|
|
".example.org.",
|
|
".test.",
|
|
}
|
|
|
|
// Special-Service Domain Names
|
|
// Handling: Send to nameservers with matching search scope, then local and system assigned nameservers.
|
|
specialServiceDomains = []string{
|
|
// RFC7686: Tor Hidden Services, https://www.torproject.org/
|
|
".onion.",
|
|
|
|
// I2P: Fully encrypted private network layer, https://geti2p.net/
|
|
".i2p.",
|
|
|
|
// Lokinet: Internal services on the decentralised network, https://lokinet.org/
|
|
".loki.",
|
|
|
|
// Namecoin: Blockchain based nameservice, https://www.namecoin.org/
|
|
".bit.",
|
|
|
|
// Ethereum Name Service (ENS): naming system based on the Ethereum blockchain, https://ens.domains/
|
|
".eth.",
|
|
|
|
// Unstoppable Domains: NFT based domain names, https://unstoppabledomains.com/
|
|
".888.",
|
|
".bitcoin.",
|
|
".coin.",
|
|
".crypto.",
|
|
".dao.",
|
|
".nft.",
|
|
".wallet.",
|
|
".x.",
|
|
".zil.",
|
|
|
|
// EmerDNS: Domain name registration on EmerCoin, https://emercoin.com/en/emerdns/
|
|
".bazar.",
|
|
".coin.",
|
|
".emc.",
|
|
".lib.",
|
|
|
|
// OpenNIC TLDs: Democratic alternative to ICANN, https://www.opennic.org/
|
|
".bbs.",
|
|
".chan.",
|
|
".dyn.",
|
|
".free.",
|
|
".fur.",
|
|
".geek.",
|
|
".glue.",
|
|
".gopher.",
|
|
".indy.",
|
|
".libre.",
|
|
".neo.",
|
|
".null.",
|
|
".o.",
|
|
".oss.",
|
|
".oz.",
|
|
".parody.",
|
|
".pirate.",
|
|
|
|
// NewNations: TLDs for countries/regions without a ccTLD, http://new-nations.net/
|
|
".ku.",
|
|
".te.",
|
|
".ti.",
|
|
".uu.",
|
|
}
|
|
)
|
|
|
|
func domainInScope(dotPrefixedFQDN string, scopeList []string) bool {
|
|
for _, scope := range scopeList {
|
|
if strings.HasSuffix(dotPrefixedFQDN, scope) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// GetResolversInScope returns all resolvers that are in scope the resolve the given query and options.
|
|
func GetResolversInScope(ctx context.Context, q *Query) (selected []*Resolver, primarySource string, tryAll bool) { //nolint:gocognit // TODO
|
|
resolversLock.RLock()
|
|
defer resolversLock.RUnlock()
|
|
|
|
// Internal use domains
|
|
if domainInScope(q.dotPrefixedFQDN, internalSpecialUseDomains) {
|
|
return envResolvers, ServerSourceEnv, false
|
|
}
|
|
|
|
// Special connectivity domains
|
|
if netenv.IsConnectivityDomain(q.FQDN) && len(systemResolvers) > 0 {
|
|
selected = addResolvers(ctx, q, selected, systemResolvers)
|
|
if len(selected) == 0 {
|
|
selected = addResolvers(ctx, q, selected, localResolvers)
|
|
selected = addResolvers(ctx, q, selected, globalResolvers)
|
|
}
|
|
return selected, ServerSourceOperatingSystem, false
|
|
}
|
|
|
|
// Prioritize search scopes
|
|
for _, scope := range localScopes {
|
|
if strings.HasSuffix(q.dotPrefixedFQDN, scope.Domain) {
|
|
selected = addResolvers(ctx, q, selected, scope.Resolvers)
|
|
}
|
|
}
|
|
|
|
// Handle multicast domains
|
|
if domainInScope(q.dotPrefixedFQDN, multicastDomains) {
|
|
selected = addResolvers(ctx, q, selected, mDNSResolvers)
|
|
selected = addResolvers(ctx, q, selected, localResolvers)
|
|
selected = addResolvers(ctx, q, selected, systemResolvers)
|
|
return selected, ServerSourceMDNS, true
|
|
}
|
|
|
|
// Special use domains
|
|
if domainInScope(q.dotPrefixedFQDN, specialUseDomains) ||
|
|
domainInScope(q.dotPrefixedFQDN, specialServiceDomains) {
|
|
selected = addResolvers(ctx, q, selected, localResolvers)
|
|
return selected, "special", true
|
|
}
|
|
|
|
// Global domains
|
|
selected = addResolvers(ctx, q, selected, globalResolvers)
|
|
return selected, ServerSourceConfigured, false
|
|
}
|
|
|
|
func addResolvers(ctx context.Context, q *Query, selected []*Resolver, addResolvers []*Resolver) []*Resolver {
|
|
addNextResolver:
|
|
for _, resolver := range addResolvers {
|
|
// check for compliance
|
|
if err := resolver.checkCompliance(ctx, q); err != nil {
|
|
log.Tracer(ctx).Tracef("skipping non-compliant resolver %s: %s", resolver.Info.DescriptiveName(), err)
|
|
continue
|
|
}
|
|
|
|
// deduplicate
|
|
for _, selectedResolver := range selected {
|
|
if selectedResolver.Info.ID() == resolver.Info.ID() {
|
|
continue addNextResolver
|
|
}
|
|
}
|
|
|
|
// the domains from the configured resolvers should not be resolved with the same resolvers
|
|
if resolver.Info.Source == ServerSourceConfigured && resolver.Info.IP == nil {
|
|
if _, ok := resolverInitDomains[q.FQDN]; ok {
|
|
continue addNextResolver
|
|
}
|
|
}
|
|
|
|
// add compliant and unique resolvers to selected resolvers
|
|
selected = append(selected, resolver)
|
|
}
|
|
return selected
|
|
}
|
|
|
|
var (
|
|
errInsecureProtocol = errors.New("insecure protocols disabled")
|
|
errAssignedServer = errors.New("assigned (dhcp) nameservers disabled")
|
|
errMulticastDNS = errors.New("multicast DNS disabled")
|
|
errOutOfScope = errors.New("query out of scope for resolver")
|
|
)
|
|
|
|
func (q *Query) checkCompliance() error {
|
|
// RFC6761 - always respond with nxdomain
|
|
if strings.HasSuffix(q.dotPrefixedFQDN, invalidDomain) {
|
|
return ErrNotFound
|
|
}
|
|
|
|
// RFC6761 - respond with 127.0.0.1 and ::1 to A and AAAA queries respectively, else nxdomain
|
|
if strings.HasSuffix(q.dotPrefixedFQDN, localhostDomain) {
|
|
switch uint16(q.QType) {
|
|
case dns.TypeA, dns.TypeAAAA:
|
|
return ErrLocalhost
|
|
default:
|
|
return ErrNotFound
|
|
}
|
|
}
|
|
|
|
// special TLDs
|
|
if dontResolveSpecialDomains() &&
|
|
domainInScope(q.dotPrefixedFQDN, specialServiceDomains) {
|
|
return ErrSpecialDomainsDisabled
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (resolver *Resolver) checkCompliance(_ context.Context, q *Query) error {
|
|
if noInsecureProtocols() {
|
|
switch resolver.Info.Type {
|
|
case ServerTypeDNS:
|
|
return errInsecureProtocol
|
|
case ServerTypeTCP:
|
|
return errInsecureProtocol
|
|
case ServerTypeDoT:
|
|
// compliant
|
|
case ServerTypeDoH:
|
|
// compliant
|
|
case ServerTypeEnv:
|
|
// compliant (data is sourced from local network only and is highly limited)
|
|
default:
|
|
return errInsecureProtocol
|
|
}
|
|
}
|
|
|
|
if noAssignedNameservers() {
|
|
if resolver.Info.Source == ServerSourceOperatingSystem {
|
|
return errAssignedServer
|
|
}
|
|
}
|
|
|
|
if noMulticastDNS() {
|
|
if resolver.Info.Source == ServerSourceMDNS {
|
|
return errMulticastDNS
|
|
}
|
|
}
|
|
|
|
// Check if the resolver should only be used for the search scopes.
|
|
if resolver.SearchOnly && !domainInScope(q.dotPrefixedFQDN, resolver.Search) {
|
|
return errOutOfScope
|
|
}
|
|
|
|
return nil
|
|
}
|