Class: Dnsruby::PacketSender

Inherits:
Object
  • Object
show all
Defined in:
lib/Dnsruby/PacketSender.rb

Overview

:nodoc: all

Constant Summary collapse

@@authoritative_cache =
Cache.new
@@recursive_cache =
Cache.new

Instance Attribute Summary collapse

Class Method Summary collapse

Instance Method Summary collapse

Constructor Details

#initialize(*args) ⇒ PacketSender

Can take a hash with the following optional keys :

  • :server

  • :port

  • :use_tcp

  • :ignore_truncation

  • :src_address

  • :src_port

  • :udp_size

  • :tsig

  • :packet_timeout

  • :recurse



143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
# File 'lib/Dnsruby/PacketSender.rb', line 143

def initialize(*args)
  arg=args[0]
  @packet_timeout = Resolver::DefaultPacketTimeout
  @port = Resolver::DefaultPort
  @udp_size = Resolver::DefaultUDPSize
  @dnssec = Resolver::DefaultDnssec
  @use_tcp = false
  @tsig = nil
  @ignore_truncation = false
  @src_address        = '0.0.0.0'
  @src_port        = [0]
  @recurse = true
  
  if (arg==nil)
    # Get default config
    config = Config.new
    #        @server = config.nameserver[0]
  elsif (arg.kind_of?String)
    @server=arg
  elsif (arg.kind_of?Name)
    @server=arg
  elsif (arg.kind_of?Hash)
    arg.keys.each do |attr|
      begin
        send(attr.to_s+"=", arg[attr])
      rescue Exception
        Dnsruby.log.error{"Argument #{attr} not valid\n"}
      end
      #        end
    end
  end
  #Check server is IP
  @server=Config.resolve_server(@server)

  #      ResolverRegister::register_single_resolver(self)
end

Instance Attribute Details

#dnssecObject

Use DNSSEC for this PacketSender dnssec defaults to ON



96
97
98
# File 'lib/Dnsruby/PacketSender.rb', line 96

def dnssec
  @dnssec
end

#ignore_truncationObject

Don’t worry if the response is truncated - return it anyway.

Defaults to false



74
75
76
# File 'lib/Dnsruby/PacketSender.rb', line 74

def ignore_truncation
  @ignore_truncation
end

#packet_timeoutObject

Returns the value of attribute packet_timeout.



56
57
58
# File 'lib/Dnsruby/PacketSender.rb', line 56

def packet_timeout
  @packet_timeout
end

#portObject

The port on the resolver to send queries to.

Defaults to 53



61
62
63
# File 'lib/Dnsruby/PacketSender.rb', line 61

def port
  @port
end

#recurseObject

should the Recursion Desired bit be set on queries?

Defaults to true



84
85
86
# File 'lib/Dnsruby/PacketSender.rb', line 84

def recurse
  @recurse
end

#serverObject

The address of the resolver to send queries to



92
93
94
# File 'lib/Dnsruby/PacketSender.rb', line 92

def server
  @server
end

#src_addressObject

The source address to send queries from

Defaults to localhost



79
80
81
# File 'lib/Dnsruby/PacketSender.rb', line 79

def src_address
  @src_address
end

#tsigObject

The TSIG record to sign/verify messages with



69
70
71
# File 'lib/Dnsruby/PacketSender.rb', line 69

def tsig
  @tsig
end

#udp_sizeObject

The max UDP packet size

Defaults to 512



89
90
91
# File 'lib/Dnsruby/PacketSender.rb', line 89

def udp_size
  @udp_size
end

#use_tcpObject

Use TCP rather than UDP as the transport.

Defaults to false



66
67
68
# File 'lib/Dnsruby/PacketSender.rb', line 66

def use_tcp
  @use_tcp
end

Class Method Details

.cache(query, response) ⇒ Object



24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
# File 'lib/Dnsruby/PacketSender.rb', line 24

def PacketSender.cache(query, response)
  return if response.cached
  # ONLY cache the response if it is not an update response
  question = query.question()[0]
  if (query.do_caching && (query.class != Update) &&
        (question.qtype != Types.AXFR) && (question.qtype != Types.IXFR) &&
        (response.rcode == RCode.NOERROR) &&(!response.tsig) &&
        (query.class != Update) &&
        (response.header.ancount > 0))
    ## @TODO@ What about TSIG-signed responses?
    # Don't cache any packets with "*" in the query name! (RFC1034 sec 4.3.3)
    if (!question.qname.to_s.include?"*")
      # Now cache response RRSets
      if (query.header.rd)
        PacketSender.cache_recursive(response);
      else
        PacketSender.cache_authoritative(response);
      end
    end
  end
end

.cache_authoritative(answer) ⇒ Object



45
46
47
48
# File 'lib/Dnsruby/PacketSender.rb', line 45

def PacketSender.cache_authoritative(answer)
  return if !answer.header.aa
  @@authoritative_cache.add(answer)
end

.cache_recursive(answer) ⇒ Object



49
50
51
# File 'lib/Dnsruby/PacketSender.rb', line 49

def PacketSender.cache_recursive(answer)
  @@recursive_cache.add(answer)
end

.clear_cachesObject



52
53
54
55
# File 'lib/Dnsruby/PacketSender.rb', line 52

def PacketSender.clear_caches
  @@recursive_cache.clear
  @@authoritative_cache.clear
end

Instance Method Details

#add_opt_rr(packet) ⇒ Object



530
531
532
533
534
535
536
# File 'lib/Dnsruby/PacketSender.rb', line 530

def add_opt_rr(packet)
  Dnsruby.log.debug{";; Adding EDNS extension with UDP packetsize  #{udp_packet_size}.\n"}
  # RFC 3225
  optrr = RR::OPT.new(udp_packet_size)

  packet.add_additional(optrr)
end

#add_src_port(p) ⇒ Object

Can be a single Fixnum or a Range or an Array If an invalid port is selected (one reserved by IANA), then an ArgumentError will be raised. “0” means “any valid port” - this is only a viable option if it is the only port in the list. An ArgumentError will be raised if “0” is added to an existing set of source ports.

res.add_src_port(60000)
res.add_src_port([60001,60005,60010])
res.add_src_port(60015..60115)


409
410
411
412
413
414
415
416
417
418
419
# File 'lib/Dnsruby/PacketSender.rb', line 409

def add_src_port(p)
  if (Resolver.check_port(p, @src_port))
    a = Resolver.get_ports_from(p)
    a.each do |x|
      if ((@src_port.length > 0) && (x == 0))
        raise ArgumentError.new("src_port of 0 only allowed as only src_port value (currently #{@src_port.length} values")
      end
      @src_port.push(x)
    end
  end
end

#check_response(response, response_bytes, query, client_queue, client_query_id, tcp) ⇒ Object



441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
# File 'lib/Dnsruby/PacketSender.rb', line 441

def check_response(response, response_bytes, query, client_queue, client_query_id, tcp)
  # @TODO@ Should send_raw avoid this?
  if (!query.send_raw)
    if (!check_tsig(query, response, response_bytes))
      # Should send error back up to Resolver here, and then NOT QUERY AGAIN!!!
      return TsigError.new
      #          return false
    end
    # Should check that question section is same as question that was sent! RFC 5452
    # If it's not an update...
    if (query.class == Update)
      # @TODO@!!
    else
      if ((response.question.size == 0) ||
            (response.question[0].qname.labels != query.question[0].qname.labels) ||
            (response.question[0].qtype != query.question[0].qtype) ||
            (response.question[0].qclass != query.question[0].qclass) ||
            (response.question.length != query.question.length) ||
            (response.header.id != query.header.id))
        TheLog.info("Incorrect packet returned : #{response.to_s}")
        return false
      end
    end
  end
  if (response.header.tc && !tcp && !@ignore_truncation)
    # Try to resend over tcp
    Dnsruby.log.debug{"Truncated - resending over TCP"}
    # @TODO@ Are the query options used correctly here? DNSSEC in particular...
#        query.send_raw = true # Make sure that the packet is not messed with.
    send_async(query, client_queue, client_query_id, true)
    return false
  end
  return true
end

#check_tsig(query, response, response_bytes) ⇒ Object



476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
# File 'lib/Dnsruby/PacketSender.rb', line 476

def check_tsig(query, response, response_bytes)
  if (query.tsig)
    if (response.tsig)
      if !query.tsig.verify(query, response, response_bytes)
        # Discard packet and wait for correctly signed response
        Dnsruby.log.error{"TSIG authentication failed!"}
        return false
      end
    else
      # Treated as having format error and discarded (RFC2845, 4.6)
      Dnsruby.log.error{"Expecting TSIG signed response, but got unsigned response - discarding"}
      return false
    end
  elsif (response.tsig)
    # Error - signed response to unsigned query
    Dnsruby.log.error{"Signed response to unsigned query"}
    return false
  end
  return true
end

#closeObject



180
181
182
183
# File 'lib/Dnsruby/PacketSender.rb', line 180

def close
  # @TODO@ What about closing?
  # Any queries to complete? Sockets to close?
end

#get_next_src_portObject



422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
# File 'lib/Dnsruby/PacketSender.rb', line 422

def get_next_src_port
  #Different OSes have different interpretations of "random port" here.
  #Apparently, Linux will just give you the same port as last time, unless it is still
  #open, in which case you get n+1.
  #We need to determine an actual (random) number here, then ask the OS for it, and
  #continue until we get one.
  if (@src_port[0] == 0)
    candidate = -1
    # better to construct an array of all the ports we *can* use, and then just pick one at random!
    candidate = UNRESERVED_PORTS[rand(UNRESERVED_PORTS.length())]
    #        while (!(Resolver.port_in_range(candidate)))
    #          candidate = (rand(65535-1024) + 1024)
    #        end
    return candidate
  end
  pos = rand(@src_port.length)
  return @src_port[pos]
end

#make_query(name, type = Types.A, klass = Classes.IN, set_cd = @dnssec) ⇒ Object



497
498
499
500
501
502
503
504
505
# File 'lib/Dnsruby/PacketSender.rb', line 497

def make_query(name, type = Types.A, klass = Classes.IN, set_cd=@dnssec)
  msg = Message.new
  msg.header.rd = 1
  msg.add_question(name, type, klass)
  if (@dnssec)
    msg.header.cd = set_cd # We do our own validation by default
  end
  return msg
end

#make_query_packet(packet, use_tcp = @use_tcp) ⇒ Object

Prepare the packet for sending



508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
# File 'lib/Dnsruby/PacketSender.rb', line 508

def make_query_packet(packet, use_tcp = @use_tcp) #:nodoc: all
  if (!packet.send_raw) # Don't mess with this packet!
    if (packet.header.opcode == OpCode.QUERY || @recurse)
      packet.header.rd=@recurse
    end

    # @TODO@ Only do this if the packet has not been prepared already!
    if (@dnssec)
      prepare_for_dnssec(packet)
    
    elsif ((udp_packet_size > Resolver::DefaultUDPSize) && !use_tcp)
      #      if ((udp_packet_size > Resolver::DefaultUDPSize) && !use_tcp)
      add_opt_rr(packet)
    end
  end
  
  if (@tsig && !packet.signed?)
    @tsig.apply(packet)
  end
  return packet.encode
end

#prepare_for_dnssec(packet) ⇒ Object



538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
# File 'lib/Dnsruby/PacketSender.rb', line 538

def prepare_for_dnssec(packet)
  # RFC 4035
  Dnsruby.log.debug{";; Adding EDNS extension with UDP packetsize #{udp_packet_size} and DNS OK bit set\n"}
  optrr = RR::OPT.new(udp_packet_size)   # Decimal UDPpayload
  optrr.dnssec_ok=true

  if (packet.additional.rrset(packet.question()[0].qname, Types.OPT).rrs.length == 0)
    packet.add_additional(optrr)
  end

  packet.header.ad = false # RFC 4035 section 4.6

  # SHOULD SET CD HERE!!!
  if (packet.do_validation)
    packet.header.cd = true
  end

end

#send_async(*args) ⇒ Object

Asynchronously send a Message to the server. The send can be done using just Dnsruby. Support for EventMachine has been deprecated.

Dnsruby pure Ruby event loop :

A client_queue is supplied by the client, along with an optional client_query_id to identify the response. The client_query_id is generated, if not supplied, and returned to the client. When the response is known, the tuple (query_id, response_message, response_exception) is put in the queue for the client to process.

The query is sent synchronously in the caller’s thread. The select thread is then used to listen for and process the response (up to pushing it to the client_queue). The client thread is then used to retrieve the response and deal with it.

Takes :

  • msg - the message to send

  • client_queue - a Queue to push the response to, when it arrives

  • client_query_id - an optional ID to identify the query to the client

  • use_tcp - whether to use TCP (defaults to PacketSender.use_tcp)

Returns :

  • client_query_id - to identify the query response to the client. This ID is

generated if it is not passed in by the client

If the native Dsnruby networking layer is being used, then this method returns the client_query_id

id = res.send_async(msg, queue)
NOT SUPPORTED : id = res.send_async(msg, queue, use_tcp)
id = res.send_async(msg, queue, id)
id = res.send_async(msg, queue, id, use_tcp)

Use Message#send_raw to send the packet with an untouched header. Use Message#do_caching to tell dnsruby whether to check the cache before sending, and update the cache upon receiving a response. Use Message#do_validation to tell dnsruby whether or not to do DNSSEC validation for this particular packet (assuming SingleResolver#dnssec == true) Note that these options should not normally be used!



225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
# File 'lib/Dnsruby/PacketSender.rb', line 225

def send_async(*args) # msg, client_queue, client_query_id, use_tcp=@use_tcp)
  # @TODO@ Need to select a good Header ID here - see forgery-resilience RFC draft for details
  msg = args[0]
  client_query_id = nil
  client_queue = nil
  use_tcp = @use_tcp
  if (msg.kind_of?String)
    msg = Message.new(msg)
    if (@dnssec)
      msg.header.cd = @dnssec # we'll do our own validation by default
    end
  end
  if (args.length > 1)
    if (args[1].class==Queue)
      client_queue = args[1]
    elsif (args.length == 2)
      use_tcp = args[1]
    end
    if (args.length > 2)
      client_query_id = args[2]
      if (args.length > 3)
        use_tcp = args[3]
      end
    end
  end
  # Need to keep track of the request mac (if using tsig) so we can validate the response (RFC2845 4.1)
  #      #Are we using EventMachine or native Dnsruby?
  #      if (Resolver.eventmachine?)
  #        return send_eventmachine(query_packet, msg, client_query_id, client_queue, use_tcp)
  #      else
  if (!client_query_id)
    client_query_id = Time.now + rand(10000) # is this safe?!
  end
  
  query_packet = make_query_packet(msg, use_tcp)

  if (msg.do_caching && (msg.class != Update))
    # Check the cache!!
    cachedanswer = nil
    if (msg.header.rd)
      cachedanswer = @@recursive_cache.find(msg.question()[0].qname, msg.question()[0].type)
    else
      cachedanswer = @@authoritative_cache.find(msg.question()[0].qname, msg.question()[0].type)
    end
    if (cachedanswer)
      TheLog.debug("Sending cached answer to client\n")
      # @TODO@ Fix up the header - ID and flags
      cachedanswer.header.id = msg.header.id
      # If we can find the answer, send it to the client straight away
      # Post the result to the client using SelectThread
      st = SelectThread.instance
      st.push_response_to_select(client_query_id, client_queue, cachedanswer, msg, self)
      return client_query_id
    end
  end
  # Otherwise, run the query
  if (udp_packet_size < query_packet.length)
    Dnsruby.log.debug{"Query packet length exceeds max UDP packet size - using TCP"}
    use_tcp = true
  end
  send_dnsruby(query_packet, msg, client_query_id, client_queue, use_tcp)
  return client_query_id
  #      end
end

#send_dnsruby(query_bytes, query, client_query_id, client_queue, use_tcp) ⇒ Object

This method sends the packet using the built-in pure Ruby event loop, with no dependencies.



292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
# File 'lib/Dnsruby/PacketSender.rb', line 292

def send_dnsruby(query_bytes, query, client_query_id, client_queue, use_tcp) #:nodoc: all
  endtime = Time.now + @packet_timeout
  # First send the query (synchronously)
  st = SelectThread.instance
  socket = nil
  runnextportloop = true
  numtries = 0
  while (runnextportloop)do
    begin
      numtries += 1
      src_port = get_next_src_port
      if (use_tcp)
        begin
          socket = TCPSocket.new(@server, @port, @src_address, src_port)
        rescue Errno::EBADF=> e
          # Can't create a connection
          err=IOError.new("TCP connection error to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp}, exception = #{e.class}, #{e}")
          Dnsruby.log.error{"#{err}"}
          st.push_exception_to_select(client_query_id, client_queue, err, nil)
          return
        end
      else
        socket = nil
        # JRuby UDPSocket only takes 0 parameters - no IPv6 support in JRuby...
        if (/java/ =~ RUBY_PLATFORM )
          socket = UDPSocket.new()
        else
          ipv6 = @src_address =~ /:/
          socket = UDPSocket.new(ipv6 ? Socket::AF_INET6 : Socket::AF_INET)
        end
        socket.bind(@src_address, src_port)
        socket.connect(@server, @port)
      end
      runnextportloop = false
    rescue Exception => e
      if (socket!=nil)
        socket.close
      end
      # Try again if the error was EADDRINUSE and a random source port is used
      # Maybe try a max number of times?
      if ((e.class != Errno::EADDRINUSE) || (numtries > 50) ||
            ((e.class == Errno::EADDRINUSE) && (src_port == @src_port[0])))
        err=IOError.new("dnsruby can't connect to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp}, exception = #{e.class}, #{e}")
        Dnsruby.log.error{"#{err}"}
        st.push_exception_to_select(client_query_id, client_queue, err, nil)
        return
      end
    end
  end
  if (socket==nil)
    err=IOError.new("dnsruby can't connect to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp}")
    Dnsruby.log.error{"#{err}"}
    st.push_exception_to_select(client_query_id, client_queue, err, nil) 
    return
  end
  Dnsruby.log.debug{"Sending packet to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp} : #{query.question()[0].qname}, #{query.question()[0].qtype}"}
  #            print "#{Time.now} : Sending packet to #{@server} : #{query.question()[0].qname}, #{query.question()[0].qtype}\n"
  begin
    if (use_tcp)
      lenmsg = [query_bytes.length].pack('n')
      socket.send(lenmsg, 0)
    end
    socket.send(query_bytes, 0)
  rescue Exception => e
    socket.close
    err=IOError.new("Send failed to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp}, exception : #{e}")
    Dnsruby.log.error{"#{err}"}
    st.push_exception_to_select(client_query_id, client_queue, err, nil)
    return
  end
  
  # Then listen for the response
  query_settings = SelectThread::QuerySettings.new(query_bytes, query, @ignore_truncation, client_queue, client_query_id, socket, @server, @port, endtime, udp_packet_size, self)
  # The select thread will now wait for the response and send that or a timeout
  # back to the client_queue.
  st.add_to_select(query_settings)
  Dnsruby.log.debug{"Packet sent to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp} : #{query.question()[0].qname}, #{query.question()[0].qtype}"}
  #      print "Packet sent to #{@server}:#{@port} from #{@src_address}:#{src_port}, use_tcp=#{use_tcp} : #{query.question()[0].qname}, #{query.question()[0].qtype}\n"
end

#src_portObject

The source port to send queries from Returns either a single Fixnum or an Array e.g. “0”, or “[60001, 60002, 60007]”

Defaults to 0 - random port



377
378
379
380
381
382
# File 'lib/Dnsruby/PacketSender.rb', line 377

def src_port
  if (@src_port.length == 1)
    return @src_port[0]
  end
  return @src_port
end

#src_port=(p) ⇒ Object

Can be a single Fixnum or a Range or an Array If an invalid port is selected (one reserved by IANA), then an ArgumentError will be raised.

res.src_port=0
res.src_port=[60001,60005,60010]
res.src_port=60015..60115


392
393
394
395
# File 'lib/Dnsruby/PacketSender.rb', line 392

def src_port=(p)
  @src_port=[]
  add_src_port(p)
end

#udp_packet_sizeObject

Return the packet size to use for UDP



558
559
560
561
562
563
# File 'lib/Dnsruby/PacketSender.rb', line 558

def udp_packet_size
  # if @udp_size > DefaultUDPSize then we use EDNS and
  # @udp_size should be taken as the maximum packet_data length
  ret = (@udp_size > Resolver::DefaultUDPSize ? @udp_size : Resolver::DefaultUDPSize)
  return ret
end