/*
Technitium DNS Server
Copyright (C) 2024 Shreyas Zare (shreyas@technitium.com)
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
using DnsServerCore.Dns.ResourceRecords;
using DnsServerCore.Dns.Trees;
using DnsServerCore.Dns.Zones;
using System;
using System.Collections.Generic;
using System.IO;
using System.Text;
using System.Threading;
using TechnitiumLibrary.Net;
using TechnitiumLibrary.Net.Dns;
using TechnitiumLibrary.Net.Dns.EDnsOptions;
using TechnitiumLibrary.Net.Dns.ResourceRecords;
namespace DnsServerCore.Dns.ZoneManagers
{
public sealed class CacheZoneManager : DnsCache
{
#region variables
public const uint FAILURE_RECORD_TTL = 10u;
public const uint NEGATIVE_RECORD_TTL = 300u;
public const uint MINIMUM_RECORD_TTL = 10u;
public const uint MAXIMUM_RECORD_TTL = 7 * 24 * 60 * 60;
public const uint SERVE_STALE_TTL = 3 * 24 * 60 * 60; //3 days serve stale ttl as per https://www.rfc-editor.org/rfc/rfc8767.html suggestion
public const uint SERVE_STALE_ANSWER_TTL = 30; //as per https://www.rfc-editor.org/rfc/rfc8767.html suggestion
public const uint SERVE_STALE_RESET_TTL = 30; //as per https://www.rfc-editor.org/rfc/rfc8767.html suggestion
const uint SERVE_STALE_MIN_RESET_TTL = 10;
const uint SERVE_STALE_MAX_RESET_TTL = 900;
readonly DnsServer _dnsServer;
readonly CacheZoneTree _root = new CacheZoneTree();
uint _serveStaleResetTtl = SERVE_STALE_RESET_TTL;
long _maximumEntries;
long _totalEntries;
#endregion
#region constructor
public CacheZoneManager(DnsServer dnsServer)
: base(FAILURE_RECORD_TTL, NEGATIVE_RECORD_TTL, MINIMUM_RECORD_TTL, MAXIMUM_RECORD_TTL, SERVE_STALE_TTL, SERVE_STALE_ANSWER_TTL)
{
_dnsServer = dnsServer;
}
#endregion
#region protected
protected override void CacheRecords(IReadOnlyList resourceRecords, NetworkAddress eDnsClientSubnet, DnsDatagramMetadata responseMetadata)
{
List dnameRecords = null;
//read and set glue records from base class; also collect any DNAME records found
foreach (DnsResourceRecord resourceRecord in resourceRecords)
{
IReadOnlyList glueRecords = GetGlueRecordsFrom(resourceRecord);
IReadOnlyList rrsigRecords = GetRRSIGRecordsFrom(resourceRecord);
IReadOnlyList nsecRecords = GetNSECRecordsFrom(resourceRecord);
CacheRecordInfo rrInfo = resourceRecord.GetCacheRecordInfo();
rrInfo.GlueRecords = glueRecords;
rrInfo.RRSIGRecords = rrsigRecords;
rrInfo.NSECRecords = nsecRecords;
rrInfo.EDnsClientSubnet = eDnsClientSubnet;
rrInfo.ResponseMetadata = responseMetadata;
if (glueRecords is not null)
{
foreach (DnsResourceRecord glueRecord in glueRecords)
{
IReadOnlyList glueRRSIGRecords = GetRRSIGRecordsFrom(glueRecord);
if (glueRRSIGRecords is not null)
glueRecord.GetCacheRecordInfo().RRSIGRecords = glueRRSIGRecords;
}
}
if (nsecRecords is not null)
{
foreach (DnsResourceRecord nsecRecord in nsecRecords)
{
IReadOnlyList nsecRRSIGRecords = GetRRSIGRecordsFrom(nsecRecord);
if (nsecRRSIGRecords is not null)
nsecRecord.GetCacheRecordInfo().RRSIGRecords = nsecRRSIGRecords;
}
}
if (resourceRecord.Type == DnsResourceRecordType.DNAME)
{
if (dnameRecords is null)
dnameRecords = new List(1);
dnameRecords.Add(resourceRecord);
}
}
if (resourceRecords.Count == 1)
{
DnsResourceRecord resourceRecord = resourceRecords[0];
CacheZone zone = _root.GetOrAdd(resourceRecord.Name, delegate (string key)
{
return new CacheZone(resourceRecord.Name, 1);
});
if (zone.SetRecords(resourceRecord.Type, resourceRecords, _dnsServer.ServeStale))
Interlocked.Increment(ref _totalEntries);
}
else
{
Dictionary>> groupedByDomainRecords = DnsResourceRecord.GroupRecords(resourceRecords);
bool serveStale = _dnsServer.ServeStale;
int addedEntries = 0;
//add grouped records
foreach (KeyValuePair>> groupedByTypeRecords in groupedByDomainRecords)
{
if (dnameRecords is not null)
{
bool foundSynthesizedCNAME = false;
foreach (DnsResourceRecord dnameRecord in dnameRecords)
{
if (groupedByTypeRecords.Key.EndsWith("." + dnameRecord.Name, StringComparison.OrdinalIgnoreCase))
{
foundSynthesizedCNAME = true;
break;
}
}
if (foundSynthesizedCNAME)
continue; //do not cache synthesized CNAME
}
CacheZone zone = _root.GetOrAdd(groupedByTypeRecords.Key, delegate (string key)
{
return new CacheZone(groupedByTypeRecords.Key, groupedByTypeRecords.Value.Count);
});
foreach (KeyValuePair> groupedRecords in groupedByTypeRecords.Value)
{
if (zone.SetRecords(groupedRecords.Key, groupedRecords.Value, serveStale))
addedEntries++;
}
}
if (addedEntries > 0)
Interlocked.Add(ref _totalEntries, addedEntries);
}
}
#endregion
#region private
private static IReadOnlyList AddDSRecordsTo(CacheZone delegation, bool serveStale, IReadOnlyList nsRecords, NetworkAddress eDnsClientSubnet, bool advancedForwardingClientSubnet)
{
IReadOnlyList records = delegation.QueryRecords(DnsResourceRecordType.DS, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((records.Count > 0) && (records[0].Type == DnsResourceRecordType.DS))
{
List newNSRecords = new List(nsRecords.Count + records.Count);
newNSRecords.AddRange(nsRecords);
newNSRecords.AddRange(records);
return newNSRecords;
}
//no DS records found check for NSEC records
IReadOnlyList nsecRecords = nsRecords[0].GetCacheRecordInfo().NSECRecords;
if (nsecRecords is not null)
{
List newNSRecords = new List(nsRecords.Count + nsecRecords.Count);
newNSRecords.AddRange(nsRecords);
newNSRecords.AddRange(nsecRecords);
return newNSRecords;
}
//found nothing; return original NS records
return nsRecords;
}
private static void AddRRSIGRecords(IReadOnlyList answer, out IReadOnlyList newAnswer, out IReadOnlyList newAuthority)
{
List newAnswerList = new List(answer.Count * 2);
List newAuthorityList = null;
foreach (DnsResourceRecord record in answer)
{
if (record.Type == DnsResourceRecordType.RRSIG)
continue; //skip RRSIG to avoid duplicates
newAnswerList.Add(record);
CacheRecordInfo rrInfo = record.GetCacheRecordInfo();
IReadOnlyList rrsigRecords = rrInfo.RRSIGRecords;
if (rrsigRecords is not null)
{
newAnswerList.AddRange(rrsigRecords);
foreach (DnsResourceRecord rrsigRecord in rrsigRecords)
{
if (!DnsRRSIGRecordData.IsWildcard(rrsigRecord))
continue;
//add NSEC/NSEC3 for the wildcard proof
if (newAuthorityList is null)
newAuthorityList = new List(2);
IReadOnlyList nsecRecords = rrInfo.NSECRecords;
if (nsecRecords is not null)
{
foreach (DnsResourceRecord nsecRecord in nsecRecords)
{
newAuthorityList.Add(nsecRecord);
IReadOnlyList nsecRRSIGRecords = nsecRecord.GetCacheRecordInfo().RRSIGRecords;
if (nsecRRSIGRecords is not null)
newAuthorityList.AddRange(nsecRRSIGRecords);
}
}
}
}
}
newAnswer = newAnswerList;
newAuthority = newAuthorityList;
}
private void ResolveCNAME(DnsQuestionRecord question, DnsResourceRecord lastCNAME, bool serveStale, NetworkAddress eDnsClientSubnet, bool advancedForwardingClientSubnet, List answerRecords)
{
int queryCount = 0;
do
{
string cnameDomain = (lastCNAME.RDATA as DnsCNAMERecordData).Domain;
if (lastCNAME.Name.Equals(cnameDomain, StringComparison.OrdinalIgnoreCase))
break; //loop detected
if (!_root.TryGet(cnameDomain, out CacheZone cacheZone))
break;
IReadOnlyList records = cacheZone.QueryRecords(question.Type, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if (records.Count < 1)
break;
DnsResourceRecord lastRR = records[records.Count - 1];
if (lastRR.Type != DnsResourceRecordType.CNAME)
{
answerRecords.AddRange(records);
break;
}
foreach (DnsResourceRecord answerRecord in answerRecords)
{
if (answerRecord.Type != DnsResourceRecordType.CNAME)
continue;
if (answerRecord.RDATA.Equals(lastRR.RDATA))
return; //loop detected
}
answerRecords.AddRange(records);
lastCNAME = lastRR;
}
while (++queryCount < DnsServer.MAX_CNAME_HOPS);
}
private bool DoDNAMESubstitution(DnsQuestionRecord question, IReadOnlyList answer, bool serveStale, NetworkAddress eDnsClientSubnet, bool advancedForwardingClientSubnet, out IReadOnlyList newAnswer)
{
DnsResourceRecord dnameRR = answer[0];
string result = (dnameRR.RDATA as DnsDNAMERecordData).Substitute(question.Name, dnameRR.Name);
if (DnsClient.IsDomainNameValid(result))
{
DnsResourceRecord cnameRR = new DnsResourceRecord(question.Name, DnsResourceRecordType.CNAME, question.Class, dnameRR.TTL, new DnsCNAMERecordData(result));
List list = new List(5)
{
dnameRR,
cnameRR
};
ResolveCNAME(question, cnameRR, serveStale, eDnsClientSubnet, advancedForwardingClientSubnet, list);
newAnswer = list;
return true;
}
else
{
newAnswer = answer;
return false;
}
}
private List GetAdditionalRecords(IReadOnlyList refRecords, bool serveStale, bool dnssecOk, NetworkAddress eDnsClientSubnet, bool advancedForwardingClientSubnet)
{
List additionalRecords = new List();
foreach (DnsResourceRecord refRecord in refRecords)
{
switch (refRecord.Type)
{
case DnsResourceRecordType.NS:
if (refRecord.RDATA is DnsNSRecordData ns)
ResolveAdditionalRecords(refRecord, ns.NameServer, serveStale, dnssecOk, eDnsClientSubnet, advancedForwardingClientSubnet, additionalRecords);
break;
case DnsResourceRecordType.MX:
if (refRecord.RDATA is DnsMXRecordData mx)
ResolveAdditionalRecords(refRecord, mx.Exchange, serveStale, dnssecOk, eDnsClientSubnet, advancedForwardingClientSubnet, additionalRecords);
break;
case DnsResourceRecordType.SRV:
if (refRecord.RDATA is DnsSRVRecordData srv)
ResolveAdditionalRecords(refRecord, srv.Target, serveStale, dnssecOk, eDnsClientSubnet, advancedForwardingClientSubnet, additionalRecords);
break;
case DnsResourceRecordType.SVCB:
case DnsResourceRecordType.HTTPS:
if (refRecord.RDATA is DnsSVCBRecordData svcb)
{
string targetName = svcb.TargetName;
if (svcb.SvcPriority == 0)
{
//For AliasMode SVCB RRs, a TargetName of "." indicates that the service is not available or does not exist [draft-ietf-dnsop-svcb-https-12]
if ((targetName.Length == 0) || targetName.Equals(refRecord.Name, StringComparison.OrdinalIgnoreCase))
break;
}
else
{
//For ServiceMode SVCB RRs, if TargetName has the value ".", then the owner name of this record MUST be used as the effective TargetName [draft-ietf-dnsop-svcb-https-12]
if (targetName.Length == 0)
targetName = refRecord.Name;
}
ResolveAdditionalRecords(refRecord, targetName, serveStale, dnssecOk, eDnsClientSubnet, advancedForwardingClientSubnet, additionalRecords);
}
break;
}
}
return additionalRecords;
}
private void ResolveAdditionalRecords(DnsResourceRecord refRecord, string domain, bool serveStale, bool dnssecOk, NetworkAddress eDnsClientSubnet, bool advancedForwardingClientSubnet, List additionalRecords)
{
IReadOnlyList glueRecords = refRecord.GetCacheRecordInfo().GlueRecords;
if (glueRecords is not null)
{
bool added = false;
foreach (DnsResourceRecord glueRecord in glueRecords)
{
if (!glueRecord.IsStale)
{
added = true;
additionalRecords.Add(glueRecord);
if (dnssecOk)
{
IReadOnlyList rrsigRecords = glueRecord.GetCacheRecordInfo().RRSIGRecords;
if (rrsigRecords is not null)
additionalRecords.AddRange(rrsigRecords);
}
}
}
if (added)
return;
}
int count = 0;
while ((count++ < DnsServer.MAX_CNAME_HOPS) && _root.TryGet(domain, out CacheZone cacheZone))
{
if (((refRecord.Type == DnsResourceRecordType.SVCB) || (refRecord.Type == DnsResourceRecordType.HTTPS)) && ((refRecord.RDATA as DnsSVCBRecordData).SvcPriority == 0))
{
//resolve SVCB/HTTPS for Alias mode refRecord
IReadOnlyList records = cacheZone.QueryRecords(refRecord.Type, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((records.Count > 0) && (records[0].Type == refRecord.Type) && (records[0].RDATA is DnsSVCBRecordData svcb))
{
additionalRecords.AddRange(records);
string targetName = svcb.TargetName;
if (svcb.SvcPriority == 0)
{
//Alias mode
if ((targetName.Length == 0) || targetName.Equals(records[0].Name, StringComparison.OrdinalIgnoreCase))
break; //For AliasMode SVCB RRs, a TargetName of "." indicates that the service is not available or does not exist [draft-ietf-dnsop-svcb-https-12]
foreach (DnsResourceRecord additionalRecord in additionalRecords)
{
if (additionalRecord.Name.Equals(targetName, StringComparison.OrdinalIgnoreCase))
return; //loop detected
}
//continue to resolve SVCB/HTTPS further
domain = targetName;
refRecord = records[0];
continue;
}
else
{
//Service mode
if (targetName.Length > 0)
{
//continue to resolve A/AAAA for target name
domain = targetName;
refRecord = records[0];
continue;
}
//resolve A/AAAA below
}
}
}
bool hasA = false;
bool hasAAAA = false;
if ((refRecord.Type == DnsResourceRecordType.SRV) || (refRecord.Type == DnsResourceRecordType.SVCB) || (refRecord.Type == DnsResourceRecordType.HTTPS))
{
foreach (DnsResourceRecord additionalRecord in additionalRecords)
{
if (additionalRecord.Name.Equals(domain, StringComparison.OrdinalIgnoreCase))
{
switch (additionalRecord.Type)
{
case DnsResourceRecordType.A:
hasA = true;
break;
case DnsResourceRecordType.AAAA:
hasAAAA = true;
break;
}
}
if (hasA && hasAAAA)
break;
}
}
if (!hasA)
{
IReadOnlyList records = cacheZone.QueryRecords(DnsResourceRecordType.A, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((records.Count > 0) && (records[0].Type == DnsResourceRecordType.A))
additionalRecords.AddRange(records);
}
if (!hasAAAA)
{
IReadOnlyList records = cacheZone.QueryRecords(DnsResourceRecordType.AAAA, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((records.Count > 0) && (records[0].Type == DnsResourceRecordType.AAAA))
additionalRecords.AddRange(records);
}
break;
}
}
private int RemoveExpiredRecordsInternal(bool serveStale, long minimumEntriesToRemove)
{
int removedEntries = 0;
foreach (CacheZone zone in _root)
{
removedEntries += zone.RemoveExpiredRecords(serveStale);
if (zone.IsEmpty)
_root.TryRemove(zone.Name, out _); //remove empty zone
if ((minimumEntriesToRemove > 0) && (removedEntries >= minimumEntriesToRemove))
break;
}
if (removedEntries > 0)
{
long totalEntries = Interlocked.Add(ref _totalEntries, -removedEntries);
if (totalEntries < 0)
Interlocked.Add(ref _totalEntries, -totalEntries);
}
return removedEntries;
}
private int RemoveLeastUsedRecordsInternal(DateTime cutoff, long minimumEntriesToRemove)
{
int removedEntries = 0;
foreach (CacheZone zone in _root)
{
removedEntries += zone.RemoveLeastUsedRecords(cutoff);
if (zone.IsEmpty)
_root.TryRemove(zone.Name, out _); //remove empty zone
if ((minimumEntriesToRemove > 0) && (removedEntries >= minimumEntriesToRemove))
break;
}
if (removedEntries > 0)
{
long totalEntries = Interlocked.Add(ref _totalEntries, -removedEntries);
if (totalEntries < 0)
Interlocked.Add(ref _totalEntries, -totalEntries);
}
return removedEntries;
}
#endregion
#region public
public override void RemoveExpiredRecords()
{
bool serveStale = _dnsServer.ServeStale;
//remove expired records/expired stale records
RemoveExpiredRecordsInternal(serveStale, 0);
if (_maximumEntries < 1)
return; //cache limit feature disabled
//find minimum entries to remove
long minimumEntriesToRemove = _totalEntries - _maximumEntries;
if (minimumEntriesToRemove < 1)
return; //no need to remove
//remove stale records if they exist
if (serveStale)
minimumEntriesToRemove -= RemoveExpiredRecordsInternal(false, minimumEntriesToRemove);
if (minimumEntriesToRemove < 1)
return; //task completed
//remove least recently used records
for (int seconds = 86400; seconds > 0; seconds /= 2)
{
DateTime cutoff = DateTime.UtcNow.AddSeconds(-seconds);
minimumEntriesToRemove -= RemoveLeastUsedRecordsInternal(cutoff, minimumEntriesToRemove);
if (minimumEntriesToRemove < 1)
break; //task completed
}
}
public void DeleteEDnsClientSubnetData()
{
int removedEntries = 0;
foreach (CacheZone zone in _root)
{
removedEntries += zone.DeleteEDnsClientSubnetData();
if (zone.IsEmpty)
_root.TryRemove(zone.Name, out _); //remove empty zone
}
if (removedEntries > 0)
{
long totalEntries = Interlocked.Add(ref _totalEntries, -removedEntries);
if (totalEntries < 0)
Interlocked.Add(ref _totalEntries, -totalEntries);
}
}
public override void Flush()
{
_root.Clear();
long totalEntries = _totalEntries;
totalEntries = Interlocked.Add(ref _totalEntries, -totalEntries);
if (totalEntries < 0)
Interlocked.Add(ref _totalEntries, -totalEntries);
}
public bool DeleteZone(string domain)
{
if (_root.TryRemoveTree(domain, out _, out int removedEntries))
{
if (removedEntries > 0)
{
long totalEntries = Interlocked.Add(ref _totalEntries, -removedEntries);
if (totalEntries < 0)
Interlocked.Add(ref _totalEntries, -totalEntries);
}
return true;
}
return false;
}
public void ListSubDomains(string domain, List subDomains)
{
_root.ListSubDomains(domain, subDomains);
}
public void ListAllRecords(string domain, List records)
{
if (_root.TryGet(domain, out CacheZone zone))
zone.ListAllRecords(records);
}
public override DnsDatagram QueryClosestDelegation(DnsDatagram request)
{
string domain = request.Question[0].Name;
NetworkAddress eDnsClientSubnet = null;
bool advancedForwardingClientSubnet = false;
{
EDnsClientSubnetOptionData requestECS = request.GetEDnsClientSubnetOption();
if (requestECS is not null)
{
eDnsClientSubnet = new NetworkAddress(requestECS.Address, requestECS.SourcePrefixLength);
advancedForwardingClientSubnet = requestECS.AdvancedForwardingClientSubnet;
}
}
do
{
_ = _root.FindZone(domain, out _, out CacheZone delegation);
if (delegation is null)
return null;
//return closest name servers in delegation
IReadOnlyList closestAuthority = delegation.QueryRecords(DnsResourceRecordType.NS, false, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((closestAuthority.Count > 0) && (closestAuthority[0].Type == DnsResourceRecordType.NS))
{
if (request.DnssecOk)
{
if (closestAuthority[0].DnssecStatus != DnssecStatus.Disabled) //dont return records with disabled status
{
closestAuthority = AddDSRecordsTo(delegation, false, closestAuthority, eDnsClientSubnet, advancedForwardingClientSubnet);
IReadOnlyList additional = GetAdditionalRecords(closestAuthority, false, true, eDnsClientSubnet, advancedForwardingClientSubnet);
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, false, false, DnsResponseCode.NoError, request.Question, null, closestAuthority, additional);
}
}
else
{
IReadOnlyList additional = GetAdditionalRecords(closestAuthority, false, false, eDnsClientSubnet, advancedForwardingClientSubnet);
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, false, false, DnsResponseCode.NoError, request.Question, null, closestAuthority, additional);
}
}
domain = AuthZoneManager.GetParentZone(delegation.Name);
}
while (domain is not null);
//no cached delegation found
return null;
}
public override DnsDatagram Query(DnsDatagram request, bool serveStale = false, bool findClosestNameServers = false, bool resetExpiry = false)
{
DnsQuestionRecord question = request.Question[0];
NetworkAddress eDnsClientSubnet = null;
bool advancedForwardingClientSubnet = false;
{
EDnsClientSubnetOptionData requestECS = request.GetEDnsClientSubnetOption();
if (requestECS is not null)
{
eDnsClientSubnet = new NetworkAddress(requestECS.Address, requestECS.SourcePrefixLength);
advancedForwardingClientSubnet = requestECS.AdvancedForwardingClientSubnet;
}
}
CacheZone zone;
CacheZone closest = null;
CacheZone delegation = null;
if (findClosestNameServers)
{
zone = _root.FindZone(question.Name, out closest, out delegation);
}
else
{
if (!_root.TryGet(question.Name, out zone))
_ = _root.FindZone(question.Name, out closest, out _); //zone not found; attempt to find closest
}
bool dnssecOk = request.DnssecOk;
if (zone is not null)
{
//zone found
IReadOnlyList answer = zone.QueryRecords(question.Type, serveStale, false, eDnsClientSubnet, advancedForwardingClientSubnet);
if (answer.Count > 0)
{
//answer found in cache
DnsResourceRecord firstRR = answer[0];
if (firstRR.RDATA is DnsSpecialCacheRecordData dnsSpecialCacheRecord)
{
if (dnssecOk)
{
foreach (DnsResourceRecord originalAuthority in dnsSpecialCacheRecord.OriginalAuthority)
{
if (originalAuthority.DnssecStatus == DnssecStatus.Disabled)
goto beforeFindClosestNameServers; //dont return answer with disabled status
}
}
if (resetExpiry)
{
if (firstRR.IsStale)
firstRR.ResetExpiry(_serveStaleResetTtl); //reset expiry by 30 seconds so that resolver tries again only after 30 seconds as per RFC 8767
if (dnsSpecialCacheRecord.Authority is not null)
{
foreach (DnsResourceRecord record in dnsSpecialCacheRecord.Authority)
{
if (record.IsStale)
record.ResetExpiry(_serveStaleResetTtl); //reset expiry by 30 seconds so that resolver tries again only after 30 seconds as per RFC 8767
}
}
}
IReadOnlyList specialOptions;
if (firstRR.WasExpiryReset || firstRR.IsStale)
{
List newOptions = new List(dnsSpecialCacheRecord.EDnsOptions.Count + 1);
newOptions.AddRange(dnsSpecialCacheRecord.EDnsOptions);
if (dnsSpecialCacheRecord.RCODE == DnsResponseCode.NxDomain)
newOptions.Add(new EDnsOption(EDnsOptionCode.EXTENDED_DNS_ERROR, new EDnsExtendedDnsErrorOptionData(EDnsExtendedDnsErrorCode.StaleNxDomainAnswer, firstRR.Name.ToLowerInvariant() + " " + firstRR.Type.ToString() + " " + firstRR.Class.ToString())));
else
newOptions.Add(new EDnsOption(EDnsOptionCode.EXTENDED_DNS_ERROR, new EDnsExtendedDnsErrorOptionData(EDnsExtendedDnsErrorCode.StaleAnswer, firstRR.Name.ToLowerInvariant() + " " + firstRR.Type.ToString() + " " + firstRR.Class.ToString())));
specialOptions = newOptions;
}
else
{
specialOptions = dnsSpecialCacheRecord.EDnsOptions;
}
if (eDnsClientSubnet is not null)
{
EDnsClientSubnetOptionData requestECS = request.GetEDnsClientSubnetOption(true);
if (requestECS is not null)
{
NetworkAddress recordECS = firstRR.GetCacheRecordInfo().EDnsClientSubnet;
if (recordECS is not null)
{
EDnsOption[] ecsOption = EDnsClientSubnetOptionData.GetEDnsClientSubnetOption(requestECS.SourcePrefixLength, recordECS.PrefixLength, requestECS.Address);
if ((specialOptions is null) || (specialOptions.Count == 0))
{
specialOptions = ecsOption;
}
else
{
List newOptions = new List(specialOptions.Count + 1);
newOptions.AddRange(specialOptions);
newOptions.Add(ecsOption[0]);
specialOptions = newOptions;
}
}
}
}
if (dnssecOk)
{
bool authenticData;
switch (dnsSpecialCacheRecord.Type)
{
case DnsSpecialCacheRecordType.NegativeCache:
authenticData = true;
break;
default:
authenticData = false;
break;
}
if (request.CheckingDisabled)
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, authenticData, true, dnsSpecialCacheRecord.OriginalRCODE, request.Question, dnsSpecialCacheRecord.OriginalAnswer, dnsSpecialCacheRecord.OriginalAuthority, dnsSpecialCacheRecord.Additional, _dnsServer.UdpPayloadSize, EDnsHeaderFlags.DNSSEC_OK, specialOptions);
else
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, authenticData, false, dnsSpecialCacheRecord.RCODE, request.Question, null, dnsSpecialCacheRecord.Authority, null, _dnsServer.UdpPayloadSize, EDnsHeaderFlags.DNSSEC_OK, specialOptions);
}
else
{
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, false, request.CheckingDisabled, dnsSpecialCacheRecord.RCODE, request.Question, null, dnsSpecialCacheRecord.NoDnssecAuthority, null, request.EDNS is null ? ushort.MinValue : _dnsServer.UdpPayloadSize, EDnsHeaderFlags.None, specialOptions);
}
}
DnsResourceRecord lastRR = answer[answer.Count - 1];
if ((lastRR.Type != question.Type) && (lastRR.Type == DnsResourceRecordType.CNAME) && (question.Type != DnsResourceRecordType.ANY))
{
List newAnswers = new List(answer.Count + 3);
newAnswers.AddRange(answer);
ResolveCNAME(question, lastRR, serveStale, eDnsClientSubnet, advancedForwardingClientSubnet, newAnswers);
answer = newAnswers;
}
IReadOnlyList authority = null;
EDnsHeaderFlags ednsFlags = EDnsHeaderFlags.None;
if (dnssecOk)
{
//DNSSEC enabled
foreach (DnsResourceRecord record in answer)
{
if (record.DnssecStatus == DnssecStatus.Disabled)
goto beforeFindClosestNameServers; //dont return answer when status is disabled
}
//add RRSIG records
AddRRSIGRecords(answer, out answer, out authority);
ednsFlags = EDnsHeaderFlags.DNSSEC_OK;
}
IReadOnlyList additional = null;
switch (question.Type)
{
case DnsResourceRecordType.NS:
case DnsResourceRecordType.MX:
case DnsResourceRecordType.SRV:
case DnsResourceRecordType.SVCB:
case DnsResourceRecordType.HTTPS:
additional = GetAdditionalRecords(answer, serveStale, dnssecOk, eDnsClientSubnet, advancedForwardingClientSubnet);
break;
}
if (resetExpiry)
{
foreach (DnsResourceRecord record in answer)
{
if (record.IsStale)
record.ResetExpiry(_serveStaleResetTtl); //reset expiry by 30 seconds so that resolver tries again only after 30 seconds as per RFC 8767
}
if (additional is not null)
{
foreach (DnsResourceRecord record in additional)
{
if (record.IsStale)
record.ResetExpiry(_serveStaleResetTtl); //reset expiry by 30 seconds so that resolver tries again only after 30 seconds as per RFC 8767
}
}
}
IReadOnlyList options = null;
foreach (DnsResourceRecord record in answer)
{
if (record.WasExpiryReset || record.IsStale)
options = [new EDnsOption(EDnsOptionCode.EXTENDED_DNS_ERROR, new EDnsExtendedDnsErrorOptionData(EDnsExtendedDnsErrorCode.StaleAnswer, record.Name.ToLowerInvariant() + " " + record.Type.ToString() + " " + record.Class.ToString()))];
}
if (eDnsClientSubnet is not null)
{
EDnsClientSubnetOptionData requestECS = request.GetEDnsClientSubnetOption(true);
if (requestECS is not null)
{
NetworkAddress suitableECS = null;
foreach (DnsResourceRecord record in answer)
{
NetworkAddress recordECS = record.GetCacheRecordInfo().EDnsClientSubnet;
if (recordECS is not null)
{
if ((suitableECS is null) || (recordECS.PrefixLength > suitableECS.PrefixLength))
suitableECS = recordECS;
}
}
if (suitableECS is not null)
{
EDnsOption[] ecsOption = EDnsClientSubnetOptionData.GetEDnsClientSubnetOption(requestECS.SourcePrefixLength, suitableECS.PrefixLength, requestECS.Address);
if (options is null)
{
options = ecsOption;
}
else
{
List newOptions = new List(options.Count + 1);
newOptions.AddRange(options);
newOptions.Add(ecsOption[0]);
options = newOptions;
}
}
}
}
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, dnssecOk && (answer.Count > 0) && (answer[0].DnssecStatus == DnssecStatus.Secure), request.CheckingDisabled, DnsResponseCode.NoError, request.Question, answer, authority, additional, request.EDNS is null ? ushort.MinValue : _dnsServer.UdpPayloadSize, ednsFlags, options);
}
}
else
{
//zone not found
//check for DNAME in closest zone
if (closest is not null)
{
IReadOnlyList answer = closest.QueryRecords(DnsResourceRecordType.DNAME, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((answer.Count > 0) && (answer[0].Type == DnsResourceRecordType.DNAME))
{
DnsResponseCode rCode;
if (DoDNAMESubstitution(question, answer, serveStale, eDnsClientSubnet, advancedForwardingClientSubnet, out answer))
rCode = DnsResponseCode.NoError;
else
rCode = DnsResponseCode.YXDomain;
IReadOnlyList authority = null;
EDnsHeaderFlags ednsFlags = EDnsHeaderFlags.None;
if (dnssecOk)
{
//DNSSEC enabled
foreach (DnsResourceRecord record in answer)
{
if (record.DnssecStatus == DnssecStatus.Disabled)
goto beforeFindClosestNameServers; //dont return answer when status is disabled
}
//add RRSIG records
AddRRSIGRecords(answer, out answer, out authority);
ednsFlags = EDnsHeaderFlags.DNSSEC_OK;
}
if (resetExpiry)
{
foreach (DnsResourceRecord record in answer)
{
if (record.IsStale)
record.ResetExpiry(_serveStaleResetTtl); //reset expiry by 30 seconds so that resolver tries again only after 30 seconds as per RFC 8767
}
}
EDnsOption[] options = null;
foreach (DnsResourceRecord record in answer)
{
if (record.WasExpiryReset || record.IsStale)
options = [new EDnsOption(EDnsOptionCode.EXTENDED_DNS_ERROR, new EDnsExtendedDnsErrorOptionData(EDnsExtendedDnsErrorCode.StaleAnswer, record.Name.ToLowerInvariant() + " " + record.Type.ToString() + " " + record.Class.ToString()))];
}
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, dnssecOk && (answer.Count > 0) && (answer[0].DnssecStatus == DnssecStatus.Secure), request.CheckingDisabled, rCode, request.Question, answer, authority, null, request.EDNS is null ? ushort.MinValue : _dnsServer.UdpPayloadSize, ednsFlags, options);
}
}
}
//no answer in cache
beforeFindClosestNameServers:
//check for closest delegation if any
if (findClosestNameServers && (delegation is not null))
{
//return closest name servers in delegation
if (question.Type == DnsResourceRecordType.DS)
{
//find parent delegation
string domain = AuthZoneManager.GetParentZone(question.Name);
if (domain is null)
return null; //dont find NS for root
_ = _root.FindZone(domain, out _, out delegation);
if (delegation is null)
return null; //no cached delegation found
}
while (true)
{
IReadOnlyList closestAuthority = delegation.QueryRecords(DnsResourceRecordType.NS, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
if ((closestAuthority.Count > 0) && (closestAuthority[0].Type == DnsResourceRecordType.NS))
{
if (dnssecOk)
{
if (closestAuthority[0].DnssecStatus != DnssecStatus.Disabled) //dont return records with disabled status
{
closestAuthority = AddDSRecordsTo(delegation, serveStale, closestAuthority, eDnsClientSubnet, advancedForwardingClientSubnet);
IReadOnlyList additional = GetAdditionalRecords(closestAuthority, serveStale, true, eDnsClientSubnet, advancedForwardingClientSubnet);
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, closestAuthority[0].DnssecStatus == DnssecStatus.Secure, request.CheckingDisabled, DnsResponseCode.NoError, request.Question, null, closestAuthority, additional);
}
}
else
{
IReadOnlyList additional = GetAdditionalRecords(closestAuthority, serveStale, false, eDnsClientSubnet, advancedForwardingClientSubnet);
return new DnsDatagram(request.Identifier, true, DnsOpcode.StandardQuery, false, false, request.RecursionDesired, true, false, request.CheckingDisabled, DnsResponseCode.NoError, request.Question, null, closestAuthority, additional);
}
}
string domain = AuthZoneManager.GetParentZone(delegation.Name);
if (domain is null)
return null; //dont find NS for root
_ = _root.FindZone(domain, out _, out delegation);
if (delegation is null)
return null; //no cached delegation found
}
}
//no cached delegation found
return null;
}
public void LoadCacheZoneFile()
{
string cacheZoneFile = Path.Combine(_dnsServer.ConfigFolder, "cache.bin");
if (!File.Exists(cacheZoneFile))
return;
_dnsServer.LogManager?.Write("Loading DNS Cache from disk...");
using (FileStream fS = new FileStream(cacheZoneFile, FileMode.Open, FileAccess.Read))
{
BinaryReader bR = new BinaryReader(fS);
if (Encoding.ASCII.GetString(bR.ReadBytes(2)) != "CZ")
throw new InvalidDataException("CacheZoneManager format is invalid.");
int version = bR.ReadByte();
switch (version)
{
case 1:
int addedEntries = 0;
try
{
bool serveStale = _dnsServer.ServeStale;
while (bR.BaseStream.Position < bR.BaseStream.Length)
{
CacheZone zone = CacheZone.ReadFrom(bR, serveStale);
if (!zone.IsEmpty)
{
if (_root.TryAdd(zone.Name, zone))
addedEntries += zone.TotalEntries;
}
}
}
finally
{
if (addedEntries > 0)
Interlocked.Add(ref _totalEntries, addedEntries);
}
break;
default:
throw new InvalidDataException("CacheZoneManager format version not supported: " + version);
}
}
_dnsServer.LogManager?.Write("DNS Cache was loaded from disk successfully.");
}
public void SaveCacheZoneFile()
{
_dnsServer.LogManager?.Write("Saving DNS Cache to disk...");
string cacheZoneFile = Path.Combine(_dnsServer.ConfigFolder, "cache.bin");
using (FileStream fS = new FileStream(cacheZoneFile, FileMode.Create, FileAccess.Write))
{
BinaryWriter bW = new BinaryWriter(fS);
bW.Write(Encoding.ASCII.GetBytes("CZ")); //format
bW.Write((byte)1); //version
foreach (CacheZone zone in _root)
zone.WriteTo(bW);
}
_dnsServer.LogManager?.Write("DNS Cache was saved to disk successfully.");
}
public void DeleteCacheZoneFile()
{
string cacheZoneFile = Path.Combine(_dnsServer.ConfigFolder, "cache.bin");
if (File.Exists(cacheZoneFile))
File.Delete(cacheZoneFile);
}
#endregion
#region properties
public uint ServeStaleResetTtl
{
get { return _serveStaleResetTtl; }
set
{
if ((value < SERVE_STALE_MIN_RESET_TTL) || (value > SERVE_STALE_MAX_RESET_TTL))
throw new ArgumentOutOfRangeException(nameof(ServeStaleResetTtl), "Serve stale reset TTL must be between " + SERVE_STALE_MIN_RESET_TTL + " and " + SERVE_STALE_MAX_RESET_TTL + " seconds. Recommended value is 30 seconds.");
_serveStaleResetTtl = value;
}
}
public long MaximumEntries
{
get { return _maximumEntries; }
set
{
if (value < 0)
throw new ArgumentOutOfRangeException(nameof(MaximumEntries), "Invalid cache maximum entries value. Valid range is 0 and above.");
_maximumEntries = value;
}
}
public long TotalEntries
{ get { return _totalEntries; } }
#endregion
}
}