resolved-dns-server.c revision 571370c1555d2aa697733479a50957aff024bbcb
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2014 Lennart Poettering
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include "alloc-util.h"
#include "resolved-dns-server.h"
#include "resolved-resolv-conf.h"
#include "siphash24.h"
#include "string-table.h"
#include "string-util.h"
/* After how much time to repeat classic DNS requests */
/* The amount of time to wait before retrying with a full feature set */
/* The number of times we will attempt a certain feature set before degrading */
#define DNS_SERVER_FEATURE_RETRY_ATTEMPTS 3
int dns_server_new(
Manager *m,
Link *l,
int family,
const union in_addr_union *in_addr) {
DnsServer *s;
assert(m);
return -EAFNOSUPPORT;
if (l) {
if (l->n_dns_servers >= LINK_DNS_SERVERS_MAX)
return -E2BIG;
} else {
if (m->n_dns_servers >= MANAGER_DNS_SERVERS_MAX)
return -E2BIG;
}
if (!s)
return -ENOMEM;
s->n_ref = 1;
s->manager = m;
switch (type) {
case DNS_SERVER_LINK:
s->link = l;
l->n_dns_servers++;
break;
case DNS_SERVER_SYSTEM:
m->n_dns_servers++;
break;
case DNS_SERVER_FALLBACK:
m->n_dns_servers++;
break;
default:
assert_not_reached("Unknown server type");
}
s->linked = true;
/* A new DNS server that isn't fallback is added and the one
* we used so far was a fallback one? Then let's try to pick
* the new one */
if (type != DNS_SERVER_FALLBACK &&
m->current_dns_server &&
if (ret)
*ret = s;
return 0;
}
if (!s)
return NULL;
s->n_ref ++;
return s;
}
if (!s)
return NULL;
s->n_ref --;
if (s->n_ref > 0)
return NULL;
free(s);
return NULL;
}
void dns_server_unlink(DnsServer *s) {
assert(s);
/* This removes the specified server from the linked list of
* servers, but any server might still stay around if it has
* refs, for example from an ongoing transaction. */
if (!s->linked)
return;
switch (s->type) {
case DNS_SERVER_LINK:
break;
case DNS_SERVER_SYSTEM:
s->manager->n_dns_servers--;
break;
case DNS_SERVER_FALLBACK:
s->manager->n_dns_servers--;
break;
}
s->linked = false;
if (s->manager->current_dns_server == s)
dns_server_unref(s);
}
void dns_server_move_back_and_unmark(DnsServer *s) {
assert(s);
if (!s->marked)
return;
s->marked = false;
if (!s->linked || !s->servers_next)
return;
/* Move us to the end of the list, so that the order is
* strictly kept, if we are not at the end anyway. */
switch (s->type) {
case DNS_SERVER_LINK:
break;
case DNS_SERVER_SYSTEM:
break;
case DNS_SERVER_FALLBACK:
break;
default:
assert_not_reached("Unknown server type");
}
}
void dns_server_packet_received(DnsServer *s, DnsServerFeatureLevel level, usec_t rtt, size_t size) {
assert(s);
if (level == DNS_SERVER_FEATURE_LEVEL_LARGE) {
/* Even if we successfully receive a reply to a
request announcing support for large packets, that
does not mean we can necessarily receive large
packets. */
}
} else if (s->verified_feature_level < level) {
s->verified_feature_level = level;
}
if (s->possible_feature_level == level)
s->n_failed_attempts = 0;
/* Remember the size of the largest UDP packet we received from a server,
we know that we can always announce support for packets with at least
this size. */
if (s->received_udp_packet_max < size)
s->received_udp_packet_max = size;
}
}
assert(s);
if (s->possible_feature_level == level)
s->n_failed_attempts ++;
if (s->resend_timeout > usec)
return;
}
assert(s);
if (s->possible_feature_level != level)
return;
/* Invoked whenever we get a FORMERR, SERVFAIL or NOTIMP rcode from a server. This is an immediate trigger for
* us to go one feature level down. Except when we are already at TCP or UDP level, in which case there's no
* point in changing, under the assumption that packet failures are caused by packet contents, not by used
* transport. */
return;
s->n_failed_attempts = (unsigned) -1;
}
void dns_server_packet_rrsig_missing(DnsServer *s) {
assert(s);
log_warning("DNS server %s does not augment replies with RRSIG records, DNSSEC not available.", strna(ip));
s->rrsig_missing = true;
}
static bool dns_server_grace_period_expired(DnsServer *s) {
assert(s);
if (s->verified_usec == 0)
return false;
return false;
s->features_grace_period_usec = MIN(s->features_grace_period_usec * 2, DNS_SERVER_FEATURE_GRACE_PERIOD_MAX_USEC);
return true;
}
assert(s);
if (s->possible_feature_level != DNS_SERVER_FEATURE_LEVEL_BEST &&
s->n_failed_attempts = 0;
s->verified_usec = 0;
s->rrsig_missing = false;
} else if (s->possible_feature_level <= s->verified_feature_level)
else if (s->n_failed_attempts >= DNS_SERVER_FEATURE_RETRY_ATTEMPTS) {
/* Switch one feature level down. Except when we are at TCP already, in which case we try UDP
* again. Thus, if a DNS server is not responding we'll keep toggling between UDP and TCP until it
* responds on one of them. Note that we generally prefer UDP over TCP (which is why it is at a higher
* feature level), but many DNS servers support lack TCP support. */
else {
s->possible_feature_level --;
}
s->n_failed_attempts = 0;
s->verified_usec = 0;
log_warning("Using degraded feature set (%s) for DNS server %s",
}
return s->possible_feature_level;
}
bool edns_do;
int r;
/* Fix the OPT field in the packet to match our current feature level. */
if (r < 0)
return r;
return 0;
if (level >= DNS_SERVER_FEATURE_LEVEL_LARGE)
else
}
const DnsServer *s = p;
assert(s);
}
static int dns_server_compare_func(const void *a, const void *b) {
const DnsServer *x = a, *y = b;
return -1;
return 1;
}
const struct hash_ops dns_server_hash_ops = {
};
if (!first)
return;
}
if (!first)
return;
}
if (!first)
return;
}
DnsServer *s;
return s;
return NULL;
}
assert(m);
switch (t) {
case DNS_SERVER_SYSTEM:
return m->dns_servers;
case DNS_SERVER_FALLBACK:
return m->fallback_dns_servers;
default:
return NULL;
}
}
assert(m);
if (m->current_dns_server == s)
return s;
if (s) {
}
m->current_dns_server = dns_server_ref(s);
if (m->unicast_scope)
return s;
}
Link *l;
assert(m);
/* Try to read updates resolv.conf */
/* If no DNS server was chose so far, pick the first one */
if (!m->current_dns_server)
manager_set_dns_server(m, m->dns_servers);
if (!m->current_dns_server) {
bool found = false;
Iterator i;
/* No DNS servers configured, let's see if there are
* any on any links. If not, we use the fallback
* servers */
HASHMAP_FOREACH(l, m->links, i)
if (l->dns_servers) {
found = true;
break;
}
if (!found)
}
return m->current_dns_server;
}
void manager_next_dns_server(Manager *m) {
assert(m);
/* If there's currently no DNS server set, then the next
* manager_get_dns_server() will find one */
if (!m->current_dns_server)
return;
/* Change to the next one, but make sure to follow the linked
* list only if the server is still linked. */
return;
}
/* If there was no next one, then start from the beginning of
* the list */
else
manager_set_dns_server(m, m->dns_servers);
}
static const char* const dns_server_feature_level_table[_DNS_SERVER_FEATURE_LEVEL_MAX] = {
[DNS_SERVER_FEATURE_LEVEL_TCP] = "TCP",
[DNS_SERVER_FEATURE_LEVEL_UDP] = "UDP",
[DNS_SERVER_FEATURE_LEVEL_EDNS0] = "UDP+EDNS0",
[DNS_SERVER_FEATURE_LEVEL_DO] = "UDP+EDNS0+DO",
[DNS_SERVER_FEATURE_LEVEL_LARGE] = "UDP+EDNS0+DO+LARGE",
};