X-Git-Url: https://git.distorted.org.uk/~mdw/adns/blobdiff_plain/ec477b9e0921b754a2edcee988d16a6339be1708..e576be5096ae358bebe2e9b6ad07c49f74aef616:/src/reply.c?ds=sidebyside diff --git a/src/reply.c b/src/reply.c index 6aacd2b..337d3f8 100644 --- a/src/reply.c +++ b/src/reply.c @@ -1,38 +1,68 @@ -/**/ +/* + * reply.c + * - main handling and parsing routine for received datagrams + */ +/* + * This file is part of adns, which is Copyright (C) 1997, 1998 Ian Jackson + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2, or (at your option) + * any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software Foundation, + * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + */ #include "internal.h" -typedef enum { - rcode_noerror, - rcode_formaterror, - rcode_serverfail, - rcode_nxdomain, - rcode_notimp, - rcode_refused -} dns_rcode; - -void adns__procdgram(adns_state ads, const byte *dgram, int len, int serv) { - unsigned char *rpp; +static void cname_recurse(adns_state ads, adns_query qu, adns_queryflags xflags) { + abort(); /* FIXME */ +} + +void adns__procdgram(adns_state ads, const byte *dgram, int dglen, + int serv, struct timeval now) { + int cbyte, rrstart, wantedrrs, rri, foundsoa, foundns; + int id, f1, f2, qdcount, ancount, nscount, arcount, flg_ra, flg_rd, flg_tc, opcode; + int rrtype, rrclass, rdlength, rdstart, ownermatched, ownerstart; + int anstart, nsstart, arstart; + int currentrrs; + adns_query qu, nqu; + dns_rcode rcode; + adns_status st; - if (len<12) { - adns__diag(ads,serv,"received datagram too short for message header (%d)",len); + if (dglen>3; + flg_tc= f1&0x20; + flg_rd= f1&0x01; + flg_ra= f2&0x80; + rcode= (f1&0x0f); + + if (flg_qr) { adns__diag(ads,serv,"server sent us a query, not a response"); return; } - if (f1&0x70) { - adns__diag(ads,serv,"server sent us unknown opcode %d (wanted 0=QUERY)", - (f1>>4)&0x70); + if (opcode) { + adns__diag(ads,serv,"server sent us unknown opcode %d (wanted 0=QUERY)",opcode); return; } if (!qdcount) { @@ -43,42 +73,215 @@ void adns__procdgram(adns_state ads, const byte *dgram, int len, int serv) { qdcount); return; } - for (qu= ads->timew; qu= nqu; qu++) { + for (qu= ads->timew.head; qu; qu= nqu) { nqu= qu->next; if (qu->id != id) continue; - if (len < qu->querylen) continue; - if (memcmp(qu->querymsg+12,rpp,qu->querylen-12)) continue; + if (dglen < qu->querylen) continue; + if (memcmp(qu->querymsg+DNS_HDRSIZE,dgram+DNS_HDRSIZE,qu->querylen-DNS_HDRSIZE)) + continue; break; } + assert(qu->cnameoff == -1); + anstart= qu->querylen; if (!qu) { adns__debug(ads,serv,"reply not found (id=%02x)",id); return; } - if (!(f2&0x80)) { - adns__diag(ads,serv,"server is not willing to do recursive lookups for us"); - adns__query_fail(ads,qu,adns_s_norecurse); - return; - } - if (!(f1&0x01)) { - adns__diag(ads,serv,"server thinks we didn't ask for recursive lookup"); + + LIST_UNLINK(ads->timew,qu); + /* We're definitely going to do something with this query now */ + + switch (rcode) { + case rcode_noerror: + case rcode_nxdomain: + break; + case rcode_formaterror: + adns__warn(ads,serv,qu,"server cannot understand our query (Format Error)"); adns__query_fail(ads,qu,adns_s_serverfaulty); return; + case rcode_servfail: + adns__query_fail(ads,qu,adns_s_servfail); + return; + case rcode_notimp: + adns__warn(ads,serv,qu,"server claims not to implement our query"); + adns__query_fail(ads,qu,adns_s_notimplemented); + return; + case rcode_refused: + adns__warn(ads,serv,qu,"server refused our query"); + adns__query_fail(ads,qu,adns_s_refused); + return; + default: + adns__warn(ads,serv,qu,"server gave unknown response code %d",rcode); + adns__query_fail(ads,qu,adns_s_reasonunknown); + return; } - switch (f1&0x0f) { - case 0: /* NOERROR */ - break; - case 1: /* Format error */ - adns__diag(ads,serv,"server cannot understand our query (Format Error)"); - adns__query_fail(ads,qu,adns_s_serverfaulty); + + /* Now, take a look at the answer section, and see if it is complete. + * If it has any CNAMEs we stuff them in the answer. + */ + wantedrrs= 0; + for (rri= 0; rricname_dgram >= 0) { + st= adns__findrr(ads,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + qu->cname_dgram,qu->cname_dglen,qu->cname_begin, &ownermatched); + } else { + st= adns__findrr(ads,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + qu->querymsg,qu->querylen,DNS_HDRSIZE, &ownermatched); + } + if (st) adns__query_fail(ads,qu,st); + if (rrtype == -1) goto x_truncated; + + if (rrclass != DNS_CLASS_IN) { + adns__diag(ads,serv,qu,"ignoring answer RR with wrong class %d (expected IN=%d)", + rrclass,DNS_CLASS_IN); + continue; + } + if (!ownermatched) { + if (ads->iflags & adns_if_debug) { + adns__debug(ads,serv,qu,"ignoring RR with an unexpected owner %s", + adns__diag_domain(ads,serv,&qu->vb,qu->flags, + dgram,dglen,rrstart,dglen)); + } + continue; + } + if (rrtype == adns_r_cname && + (qu->typei->type & adns__rrt_typemask) != adns_r_cname) { + if (!qu->cname_str) { /* Ignore second and subsequent CNAMEs */ + qu->cname_begin= rdstart; + qu->cname_dgram= dgram; + qu->cname_dglen= dglen; + st= adns__parse_domain(ads,serv,&qu->vb,qu->flags, + dgram,dglen, &rdstart,rdstart+rdlength); + if (!vb.used) goto x_truncated; + if (st) { adns__query_fail(ads,qu,st); return; } + qu->answer->cname= adns__savestring(qu); + if (!qu->answer->cname) return; + /* If we find the answer section truncated after this point we restart + * the query at the CNAME; if beforehand then we obviously have to use + * TCP. If there is no truncation we can use the whole answer if + * it contains the relevant info. + */ + } else { + adns__debug(ads,serv,qu,"ignoring duplicate CNAME (%s, as well as %s)", + adns__diag_domain(ads,serv,&qu->vb,qu->flags, + dgram,dglen, rdstart,rdstart+rdlength), + qu->cname_str); + } + } else if (rrtype == (qu->typei->type & adns__rrt_typemask)) { + wantedrrs++; + } else { + adns__debug(ads,serv,qu,"ignoring answer RR with irrelevant type %d",rrtype); + } + } + + /* If we got here then the answer section is intact. */ + nsstart= cbyte; + + if (!wantedrrs) { + /* Oops, NODATA or NXDOMAIN or perhaps a referral (which would be a problem) */ + + if (rcode == rcode_nxdomain) { + adns__query_finish(ads,qu,adns_s_nxdomain); + return; + } + + /* RFC2308: NODATA has _either_ a SOA _or_ _no_ NS records in authority section */ + foundsoa= 0; foundns= 0; + for (rri= 0; rricname_dgram == dgram) { cname_recurse(ads,qu,0); return; } + + /* Bloody hell, I thought we asked for recursion ? */ + if (flg_rd) { + adns__diag(ads,serv,qu,"server thinks we didn't ask for recursive lookup"); + } + if (!flg_ra) { + adns__diag(ads,serv,qu,"server is not willing to do recursive lookups for us"); + adns__query_fail(ads,qu,adns_s_norecurse); + } else { + adns__diag(ads,serv,qu,"server claims to do recursion, but gave us a referral"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + } return; - case 2: /* Server failure */ - adns__query_fail(ads,qu,adns_s_serverfailure); + } + + /* Now, we have some RRs which we wanted. */ + + qu->ans->rrs= adns__alloc_interim(qu,qu->typei->rrsz*wantedrrs); + if (!qu->ans->rrs) return; + + cbyte= anstart; + arstart= -1; + for (rri=0; rricname_dgram >= 0) { + st= adns__findrr(ads,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + qu->cname_dgram,qu->cname_dglen,qu->cname_begin, &ownermatched); + } else { + st= adns__findrr(ads,serv, dgram,dglen,&cbyte, + &rrtype,&rrclass,&rdlength,&rdstart, + qu->querymsg,qu->querylen,DNS_HDRSIZE, &ownermatched); + } + assert(!st); assert(rrtype != -1); + if (rrclass != DNS_CLASS_IN || + rrtype != (qu->typei->type & adns__rrt_typemask) || + !ownermatched) + continue; + assert(qu->ans->nrrstypei->parse(ads,qu,serv, + dgram,dglen, &rdstart,rdstart+rdlength, + qu->ans->rrs.bytes+qu->ans->nrrs*quj->typei->rrsz); + if (st) { adns__query_fail(ads,qu,st); return; } + if (rdstart==-1) goto x_truncated; + } + + /* This may have generated some child queries ... */ + if (qu->children.head) { + qu->state= query_child; + LIST_LINK_TAIL(ads->childw,qu); return; - case 3: /* Name Error */ - - qr= f1&0x80; - - - adns__diag(ads,serv,"received datagram size %d",len); + } + adns__query_finish(ads,qu,adns_s_ok); + return; + + x_truncated: + if (!flg_tc) { + adns__diag(ads,serv,qu,"server sent datagram which points outside itself"); + adns__query_fail(ads,qu,adns_s_serverfaulty); + return; + } + if (qu->cname_dgram) { cname_recurse(ads,qu,adns_qf_usevc); return; } + adns__reset_cnameonly(ads,qu); + qu->flags |= adns_qf_usevc; + adns__query_udp(ads,qu,now); }