X-Git-Url: https://git.distorted.org.uk/~mdw/adns/blobdiff_plain/4353a5c47b202786905257e520fe570a570e67bc..f1e474dda132e6d9626bc9930fd9025616de81fb:/src/reply.c diff --git a/src/reply.c b/src/reply.c index 63b7033..14fc057 100644 --- a/src/reply.c +++ b/src/reply.c @@ -2,7 +2,256 @@ #include "internal.h" -void adns__procdgram(adns_state ads, const byte *dgram, int len, int serv) { - /* FIXME do something with incoming datagrams */ - adns__diag(ads,serv,"received datagram size %d",len); +static void cname_recurse(adns_state ads, adns_query qu, adns_queryflags xflags) { + abort(); /* FIXME */ +} + +void adns__procdgram(adns_state ads, const byte *dgram, int dglen, + int serv, struct timeval now) { + int cbyte, rrstart, wantedrrs, rri, foundsoa, foundns; + int id, f1, f2, qdcount, ancount, nscount, arcount, flg_ra, flg_tc; + int rrtype, rrclass, rdlength, rdstart, ownermatched, ownerstart; + int anstart, nsstart, arstart; + int currentrrs; + adns_query qu, nqu; + dns_rcode rcode; + adns_status st; += 0; + + if (dglen>4)&0x70); + return; + } + if (!qdcount) { + adns__diag(ads,serv,"server sent reply without quoting our question"); + return; + } else if (qdcount>1) { + adns__diag(ads,serv,"server claimed to answer %d questions with one message", + qdcount); + return; + } + for (qu= ads->timew.head; qu; qu= nqu) { + nqu= qu->next; + if (qu->id != id) continue; + if (dglen < qu->querylen) continue; + if (memcmp(qu->querymsg+DNS_HDRSIZE,dgram+DNS_HDRSIZE,qu->querylen-DNS_HDRSIZE)) + continue; + break; + } + assert(qu->cnameoff == -1); + anstart= qu->querylen; + if (!qu) { + adns__debug(ads,serv,"reply not found (id=%02x)",id); + return; + } + + LIST_UNLINK(ads->timew,qu); + /* We're definitely going to do something with this query now */ + + if (!(f1&0x01)) { + adns__diag(ads,serv,"server thinks we didn't ask for recursive lookup"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + return; + } + + rcode= (f1&0x0f); + switch (rcode) { + case rcode_noerror: + case rcode_nxdomain: + break; + case rcode_formaterror: + adns__warn(ads,serv,"server cannot understand our query (Format Error)"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + return; + case rcode_servfail: + adns__query_fail(ads,qu,adns_s_servfail); + return; + case rcode_notimp: + adns__warn(ads,serv,"server claims not to implement our query"); + adns__query_fail(ads,qu,adns_s_notimplemented); + return; + case rcode_refused: + adns__warn(ads,serv,"server refused our query"); + adns__query_fail(ads,qu,adns_s_refused); + return; + default: + adns__warn(ads,serv,"server gave unknown response code %d",rcode); + adns__query_fail(ads,qu,adns_s_reasonunknown); + return; + } + + /* Now, take a look at the answer section, and see if it is complete. + * If it has any CNAMEs we stuff them in the answer. + */ + wantedrrs= 0; + for (rri= 0; rricnameoff >= 0) { + st= adns__findrr(ads,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + dgram,dglen,qu->cnameoff, &ownermatched); + } else { + st= adns__get_rr_temp(ads,qu,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + qu->querymsg,qu->querylen,DNS_HDRSIZE, &ownermatched); + } + if (st) adns__query_fail(ads,qu,st); + if (rrtype == -1) goto x_truncated; + + if (rrclass != DNS_CLASS_IN) { + adns__diag(ads,serv,"ignoring answer RR with wrong class %d (expected IN=%d)", + rrclass,DNS_CLASS_IN); + continue; + } + if (!ownermatched) { + if (ads->iflags & adns_if_debug) { + st= adns__get_domain_temp(ads,qu,serv, dgram,dglen,&rrstart,dglen, &ownerstart); + if (st) + adns__debug(ads,serv, "ignoring RR with an irrelevant owner" + " whose format is bad, code %d",st); + else if (ownerstart>=0) + adns__debug(ads,serv, "ignoring RR with an irrelevant owner" + " \"%s\"", qu->ans.buf+ownerstart); + else + adns__debug(ads,serv,"ignoring RR with an irrelevant truncated owner"); + } + continue; + } + if (qu->cnameoff<0 && + (qu->typei->type & adns__rrt_typemask) != adns_r_cname && + rrtype == adns_r_cname) { /* Ignore second and subsequent CNAMEs */ + st= adns__get_domain_perm(ads,qu,serv, dgram,dglen, + &rdstart,rdstart+rdlength,&qu->cnameoff); + if (st) { adns__query_fail(ads,qu,st); return; } + if (qu->cnameoff==-1) goto x_truncated; + /* If we find the answer section truncated after this point we restart + * the query at the CNAME; if beforehand then we obviously have to use + * TCP. If there is no truncation we can use the whole answer if + * it contains the relevant info. + */ + } else if (rrtype == (qu->typei->type & adns__rrt_typemask)) { + wantedrrs++; + } else { + adns__debug(ads,serv,"ignoring answer RR with irrelevant type %d",rrtype); + } + } + + /* If we got here then the answer section is intact. */ + nsstart= cbyte; + + if (!wantedrrs) { + /* Oops, NODATA or NXDOMAIN or perhaps a referral (which would be a problem) */ + + if (rcode == rcode_nxdomain) { + adns__query_finish(ads,qu,adns_s_nxdomain); + return; + } + + /* RFC2308: NODATA has _either_ a SOA _or_ _no_ NS records in authority section */ + foundsoa= 0; foundns= 0; + for (rri= 0; rricnameoff != -1) { cname_recurse(ads,qu,0); return; } + + /* Bloody hell, I thought we asked for recursion ? */ + if (!flg_ra) { + adns__diag(ads,serv,"server is not willing to do recursive lookups for us"); + adns__query_fail(ads,qu,adns_s_norecurse); + return; + } + adns__diag(ads,serv,"server claims to do recursion, but gave us a referral"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + return; + } + + /* Now, we have some RRs which we wanted. */ + + qu->rrsoff= adns__vbuf_malloc(&qu->ans,qu->typei->rrsz*wantedrrs); + if (qu->rrsoff == -1) adns__query_fail(ads,qu,adns_s_nolocalmem); + + cbyte= anstart; + currentrrs= 0; + arstart= -1; + for (rri=0; rritypei->type & adns__rrt_typemask)) + continue; + assert(currentrrstypei->get_fn(ads,qu,serv, dgram,dglen, &rdstart,rdstart+rdlength, + nsstart,arcount,&arstart, qu->rrsoff,¤trrs); + if (st) { adns__query_fail(ads,qu,st); return; } + if (currentrrs==-1) goto x_truncated; + } + + /* This may have generated some child queries ... */ + if (qu->children.head) { + qu->state= query_child; + LIST_LINK_TAIL(ads->childw,qu); + return; + } + + adns__query_finish(ads,qu,adns_s_ok); + return; + +x_truncated: + if (!flg_tc) { + adns__diag(ads,serv,"server sent datagram which points outside itself"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + return; + } + if (qu->cnameoff != -1) { cname_recurse(ads,qu,adns_qf_usevc); return; } + qu->cnameoff= -1; + qu->rrsoff= -1; + ans= (adns_answer*)qu->ans.buf; + ans->nrrs= 0; + qu->ans.used= sizeof(adns_answer); + qu->flags |= adns_qf_usevc; + adns__query_udp(ads,qu,now); }