| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/dns/dns_response.h" | |
| 6 | |
| 7 #include "base/big_endian.h" | |
| 8 #include "base/strings/string_util.h" | |
| 9 #include "base/sys_byteorder.h" | |
| 10 #include "net/base/address_list.h" | |
| 11 #include "net/base/dns_util.h" | |
| 12 #include "net/base/io_buffer.h" | |
| 13 #include "net/base/net_errors.h" | |
| 14 #include "net/dns/dns_protocol.h" | |
| 15 #include "net/dns/dns_query.h" | |
| 16 | |
| 17 namespace net { | |
| 18 | |
| 19 DnsResourceRecord::DnsResourceRecord() { | |
| 20 } | |
| 21 | |
| 22 DnsResourceRecord::~DnsResourceRecord() { | |
| 23 } | |
| 24 | |
| 25 DnsRecordParser::DnsRecordParser() : packet_(NULL), length_(0), cur_(0) { | |
| 26 } | |
| 27 | |
| 28 DnsRecordParser::DnsRecordParser(const void* packet, | |
| 29 size_t length, | |
| 30 size_t offset) | |
| 31 : packet_(reinterpret_cast<const char*>(packet)), | |
| 32 length_(length), | |
| 33 cur_(packet_ + offset) { | |
| 34 DCHECK_LE(offset, length); | |
| 35 } | |
| 36 | |
| 37 unsigned DnsRecordParser::ReadName(const void* const vpos, | |
| 38 std::string* out) const { | |
| 39 const char* const pos = reinterpret_cast<const char*>(vpos); | |
| 40 DCHECK(packet_); | |
| 41 DCHECK_LE(packet_, pos); | |
| 42 DCHECK_LE(pos, packet_ + length_); | |
| 43 | |
| 44 const char* p = pos; | |
| 45 const char* end = packet_ + length_; | |
| 46 // Count number of seen bytes to detect loops. | |
| 47 unsigned seen = 0; | |
| 48 // Remember how many bytes were consumed before first jump. | |
| 49 unsigned consumed = 0; | |
| 50 | |
| 51 if (pos >= end) | |
| 52 return 0; | |
| 53 | |
| 54 if (out) { | |
| 55 out->clear(); | |
| 56 out->reserve(dns_protocol::kMaxNameLength); | |
| 57 } | |
| 58 | |
| 59 for (;;) { | |
| 60 // The first two bits of the length give the type of the length. It's | |
| 61 // either a direct length or a pointer to the remainder of the name. | |
| 62 switch (*p & dns_protocol::kLabelMask) { | |
| 63 case dns_protocol::kLabelPointer: { | |
| 64 if (p + sizeof(uint16) > end) | |
| 65 return 0; | |
| 66 if (consumed == 0) { | |
| 67 consumed = p - pos + sizeof(uint16); | |
| 68 if (!out) | |
| 69 return consumed; // If name is not stored, that's all we need. | |
| 70 } | |
| 71 seen += sizeof(uint16); | |
| 72 // If seen the whole packet, then we must be in a loop. | |
| 73 if (seen > length_) | |
| 74 return 0; | |
| 75 uint16 offset; | |
| 76 base::ReadBigEndian<uint16>(p, &offset); | |
| 77 offset &= dns_protocol::kOffsetMask; | |
| 78 p = packet_ + offset; | |
| 79 if (p >= end) | |
| 80 return 0; | |
| 81 break; | |
| 82 } | |
| 83 case dns_protocol::kLabelDirect: { | |
| 84 uint8 label_len = *p; | |
| 85 ++p; | |
| 86 // Note: root domain (".") is NOT included. | |
| 87 if (label_len == 0) { | |
| 88 if (consumed == 0) { | |
| 89 consumed = p - pos; | |
| 90 } // else we set |consumed| before first jump | |
| 91 return consumed; | |
| 92 } | |
| 93 if (p + label_len >= end) | |
| 94 return 0; // Truncated or missing label. | |
| 95 if (out) { | |
| 96 if (!out->empty()) | |
| 97 out->append("."); | |
| 98 out->append(p, label_len); | |
| 99 } | |
| 100 p += label_len; | |
| 101 seen += 1 + label_len; | |
| 102 break; | |
| 103 } | |
| 104 default: | |
| 105 // unhandled label type | |
| 106 return 0; | |
| 107 } | |
| 108 } | |
| 109 } | |
| 110 | |
| 111 bool DnsRecordParser::ReadRecord(DnsResourceRecord* out) { | |
| 112 DCHECK(packet_); | |
| 113 size_t consumed = ReadName(cur_, &out->name); | |
| 114 if (!consumed) | |
| 115 return false; | |
| 116 base::BigEndianReader reader(cur_ + consumed, | |
| 117 packet_ + length_ - (cur_ + consumed)); | |
| 118 uint16 rdlen; | |
| 119 if (reader.ReadU16(&out->type) && | |
| 120 reader.ReadU16(&out->klass) && | |
| 121 reader.ReadU32(&out->ttl) && | |
| 122 reader.ReadU16(&rdlen) && | |
| 123 reader.ReadPiece(&out->rdata, rdlen)) { | |
| 124 cur_ = reader.ptr(); | |
| 125 return true; | |
| 126 } | |
| 127 return false; | |
| 128 } | |
| 129 | |
| 130 bool DnsRecordParser::SkipQuestion() { | |
| 131 size_t consumed = ReadName(cur_, NULL); | |
| 132 if (!consumed) | |
| 133 return false; | |
| 134 | |
| 135 const char* next = cur_ + consumed + 2 * sizeof(uint16); // QTYPE + QCLASS | |
| 136 if (next > packet_ + length_) | |
| 137 return false; | |
| 138 | |
| 139 cur_ = next; | |
| 140 | |
| 141 return true; | |
| 142 } | |
| 143 | |
| 144 DnsResponse::DnsResponse() | |
| 145 : io_buffer_(new IOBufferWithSize(dns_protocol::kMaxUDPSize + 1)) { | |
| 146 } | |
| 147 | |
| 148 DnsResponse::DnsResponse(size_t length) | |
| 149 : io_buffer_(new IOBufferWithSize(length)) { | |
| 150 } | |
| 151 | |
| 152 DnsResponse::DnsResponse(const void* data, | |
| 153 size_t length, | |
| 154 size_t answer_offset) | |
| 155 : io_buffer_(new IOBufferWithSize(length)), | |
| 156 parser_(io_buffer_->data(), length, answer_offset) { | |
| 157 DCHECK(data); | |
| 158 memcpy(io_buffer_->data(), data, length); | |
| 159 } | |
| 160 | |
| 161 DnsResponse::~DnsResponse() { | |
| 162 } | |
| 163 | |
| 164 bool DnsResponse::InitParse(int nbytes, const DnsQuery& query) { | |
| 165 DCHECK_GE(nbytes, 0); | |
| 166 // Response includes query, it should be at least that size. | |
| 167 if (nbytes < query.io_buffer()->size() || nbytes >= io_buffer_->size()) | |
| 168 return false; | |
| 169 | |
| 170 // Match the query id. | |
| 171 if (base::NetToHost16(header()->id) != query.id()) | |
| 172 return false; | |
| 173 | |
| 174 // Match question count. | |
| 175 if (base::NetToHost16(header()->qdcount) != 1) | |
| 176 return false; | |
| 177 | |
| 178 // Match the question section. | |
| 179 const size_t hdr_size = sizeof(dns_protocol::Header); | |
| 180 const base::StringPiece question = query.question(); | |
| 181 if (question != base::StringPiece(io_buffer_->data() + hdr_size, | |
| 182 question.size())) { | |
| 183 return false; | |
| 184 } | |
| 185 | |
| 186 // Construct the parser. | |
| 187 parser_ = DnsRecordParser(io_buffer_->data(), | |
| 188 nbytes, | |
| 189 hdr_size + question.size()); | |
| 190 return true; | |
| 191 } | |
| 192 | |
| 193 bool DnsResponse::InitParseWithoutQuery(int nbytes) { | |
| 194 DCHECK_GE(nbytes, 0); | |
| 195 | |
| 196 size_t hdr_size = sizeof(dns_protocol::Header); | |
| 197 | |
| 198 if (nbytes < static_cast<int>(hdr_size) || nbytes >= io_buffer_->size()) | |
| 199 return false; | |
| 200 | |
| 201 parser_ = DnsRecordParser( | |
| 202 io_buffer_->data(), nbytes, hdr_size); | |
| 203 | |
| 204 unsigned qdcount = base::NetToHost16(header()->qdcount); | |
| 205 for (unsigned i = 0; i < qdcount; ++i) { | |
| 206 if (!parser_.SkipQuestion()) { | |
| 207 parser_ = DnsRecordParser(); // Make parser invalid again. | |
| 208 return false; | |
| 209 } | |
| 210 } | |
| 211 | |
| 212 return true; | |
| 213 } | |
| 214 | |
| 215 bool DnsResponse::IsValid() const { | |
| 216 return parser_.IsValid(); | |
| 217 } | |
| 218 | |
| 219 uint16 DnsResponse::flags() const { | |
| 220 DCHECK(parser_.IsValid()); | |
| 221 return base::NetToHost16(header()->flags) & ~(dns_protocol::kRcodeMask); | |
| 222 } | |
| 223 | |
| 224 uint8 DnsResponse::rcode() const { | |
| 225 DCHECK(parser_.IsValid()); | |
| 226 return base::NetToHost16(header()->flags) & dns_protocol::kRcodeMask; | |
| 227 } | |
| 228 | |
| 229 unsigned DnsResponse::answer_count() const { | |
| 230 DCHECK(parser_.IsValid()); | |
| 231 return base::NetToHost16(header()->ancount); | |
| 232 } | |
| 233 | |
| 234 unsigned DnsResponse::additional_answer_count() const { | |
| 235 DCHECK(parser_.IsValid()); | |
| 236 return base::NetToHost16(header()->arcount); | |
| 237 } | |
| 238 | |
| 239 base::StringPiece DnsResponse::qname() const { | |
| 240 DCHECK(parser_.IsValid()); | |
| 241 // The response is HEADER QNAME QTYPE QCLASS ANSWER. | |
| 242 // |parser_| is positioned at the beginning of ANSWER, so the end of QNAME is | |
| 243 // two uint16s before it. | |
| 244 const size_t hdr_size = sizeof(dns_protocol::Header); | |
| 245 const size_t qname_size = parser_.GetOffset() - 2 * sizeof(uint16) - hdr_size; | |
| 246 return base::StringPiece(io_buffer_->data() + hdr_size, qname_size); | |
| 247 } | |
| 248 | |
| 249 uint16 DnsResponse::qtype() const { | |
| 250 DCHECK(parser_.IsValid()); | |
| 251 // QTYPE starts where QNAME ends. | |
| 252 const size_t type_offset = parser_.GetOffset() - 2 * sizeof(uint16); | |
| 253 uint16 type; | |
| 254 base::ReadBigEndian<uint16>(io_buffer_->data() + type_offset, &type); | |
| 255 return type; | |
| 256 } | |
| 257 | |
| 258 std::string DnsResponse::GetDottedName() const { | |
| 259 return DNSDomainToString(qname()); | |
| 260 } | |
| 261 | |
| 262 DnsRecordParser DnsResponse::Parser() const { | |
| 263 DCHECK(parser_.IsValid()); | |
| 264 // Return a copy of the parser. | |
| 265 return parser_; | |
| 266 } | |
| 267 | |
| 268 const dns_protocol::Header* DnsResponse::header() const { | |
| 269 return reinterpret_cast<const dns_protocol::Header*>(io_buffer_->data()); | |
| 270 } | |
| 271 | |
| 272 DnsResponse::Result DnsResponse::ParseToAddressList( | |
| 273 AddressList* addr_list, | |
| 274 base::TimeDelta* ttl) const { | |
| 275 DCHECK(IsValid()); | |
| 276 // DnsTransaction already verified that |response| matches the issued query. | |
| 277 // We still need to determine if there is a valid chain of CNAMEs from the | |
| 278 // query name to the RR owner name. | |
| 279 // We err on the side of caution with the assumption that if we are too picky, | |
| 280 // we can always fall back to the system getaddrinfo. | |
| 281 | |
| 282 // Expected owner of record. No trailing dot. | |
| 283 std::string expected_name = GetDottedName(); | |
| 284 | |
| 285 uint16 expected_type = qtype(); | |
| 286 DCHECK(expected_type == dns_protocol::kTypeA || | |
| 287 expected_type == dns_protocol::kTypeAAAA); | |
| 288 | |
| 289 size_t expected_size = (expected_type == dns_protocol::kTypeAAAA) | |
| 290 ? kIPv6AddressSize : kIPv4AddressSize; | |
| 291 | |
| 292 uint32 ttl_sec = kuint32max; | |
| 293 IPAddressList ip_addresses; | |
| 294 DnsRecordParser parser = Parser(); | |
| 295 DnsResourceRecord record; | |
| 296 unsigned ancount = answer_count(); | |
| 297 for (unsigned i = 0; i < ancount; ++i) { | |
| 298 if (!parser.ReadRecord(&record)) | |
| 299 return DNS_MALFORMED_RESPONSE; | |
| 300 | |
| 301 if (record.type == dns_protocol::kTypeCNAME) { | |
| 302 // Following the CNAME chain, only if no addresses seen. | |
| 303 if (!ip_addresses.empty()) | |
| 304 return DNS_CNAME_AFTER_ADDRESS; | |
| 305 | |
| 306 if (base::strcasecmp(record.name.c_str(), expected_name.c_str()) != 0) | |
| 307 return DNS_NAME_MISMATCH; | |
| 308 | |
| 309 if (record.rdata.size() != | |
| 310 parser.ReadName(record.rdata.begin(), &expected_name)) | |
| 311 return DNS_MALFORMED_CNAME; | |
| 312 | |
| 313 ttl_sec = std::min(ttl_sec, record.ttl); | |
| 314 } else if (record.type == expected_type) { | |
| 315 if (record.rdata.size() != expected_size) | |
| 316 return DNS_SIZE_MISMATCH; | |
| 317 | |
| 318 if (base::strcasecmp(record.name.c_str(), expected_name.c_str()) != 0) | |
| 319 return DNS_NAME_MISMATCH; | |
| 320 | |
| 321 ttl_sec = std::min(ttl_sec, record.ttl); | |
| 322 ip_addresses.push_back(IPAddressNumber(record.rdata.begin(), | |
| 323 record.rdata.end())); | |
| 324 } | |
| 325 } | |
| 326 | |
| 327 // TODO(szym): Extract TTL for NODATA results. http://crbug.com/115051 | |
| 328 | |
| 329 // getcanonname in eglibc returns the first owner name of an A or AAAA RR. | |
| 330 // If the response passed all the checks so far, then |expected_name| is it. | |
| 331 *addr_list = AddressList::CreateFromIPAddressList(ip_addresses, | |
| 332 expected_name); | |
| 333 *ttl = base::TimeDelta::FromSeconds(ttl_sec); | |
| 334 return DNS_PARSE_OK; | |
| 335 } | |
| 336 | |
| 337 } // namespace net | |
| OLD | NEW |