ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/res.c
Revision: 4449
Committed: Mon Aug 11 15:46:56 2014 UTC (11 years ago) by michael
Content type: text/x-csrc
File size: 21806 byte(s)
Log Message:
- res.c: removed "try A if AAAA failed" logic

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3     *
4     * Copyright (c) 1997-2014 ircd-hybrid development team
5     *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 3322 /*! \file res.c
23 michael 2916 * \brief ircd resolver functions
24     * \version $Id$
25     */
26    
27     /*
28 michael 4311 * A rewrite of Darren Reed's original res.c As there is nothing
29     * left of Darren's original code, this is now licensed by the hybrid group.
30 adx 30 * (Well, some of the function names are the same, and bits of the structs..)
31     * You can use it where it is useful, free even. Buy us a beer and stuff.
32     *
33     * The authors takes no responsibility for any damage or loss
34     * of property which results from the use of this software.
35     *
36     * July 1999 - Rewrote a bunch of stuff here. Change hostent builder code,
37     * added callbacks and reference counting of returned hostents.
38     * --Bleep (Thomas Helvey <tomh@inxpress.net>)
39     *
40     * This was all needlessly complicated for irc. Simplified. No more hostent
41 michael 4311 * All we really care about is the IP -> hostname mappings. That's all.
42 adx 30 *
43     * Apr 28, 2003 --cryogen and Dianora
44     */
45    
46     #include "stdinc.h"
47 michael 1011 #include "list.h"
48 adx 30 #include "client.h"
49     #include "event.h"
50     #include "irc_string.h"
51     #include "ircd.h"
52     #include "numeric.h"
53 michael 982 #include "rng_mt.h"
54 adx 30 #include "fdlist.h"
55     #include "s_bsd.h"
56 michael 1309 #include "log.h"
57 michael 3347 #include "misc.h"
58 adx 30 #include "send.h"
59     #include "memory.h"
60 michael 1654 #include "mempool.h"
61 michael 3322 #include "res.h"
62     #include "reslib.h"
63 adx 30
64     #if (CHAR_BIT != 8)
65 michael 2916 #error this code needs to be able to address individual octets
66 adx 30 #endif
67    
68     static PF res_readreply;
69    
70 michael 4311 #define MAXPACKET 1024 /**< rfc says 512 but we expand names so ... */
71     #define AR_TTL 600 /**< TTL in seconds for dns cache entries */
72 adx 30
73 michael 4311 /*
74     * RFC 1104/1105 wasn't very helpful about what these fields
75 adx 30 * should be named, so for now, we'll just name them this way.
76 michael 4311 * We probably should look at what named calls them or something.
77 adx 30 */
78     #define TYPE_SIZE (size_t)2
79     #define CLASS_SIZE (size_t)2
80     #define TTL_SIZE (size_t)4
81     #define RDLENGTH_SIZE (size_t)2
82     #define ANSWER_FIXED_SIZE (TYPE_SIZE + CLASS_SIZE + TTL_SIZE + RDLENGTH_SIZE)
83    
84 michael 2916 typedef enum
85 adx 30 {
86 michael 4311 REQ_IDLE, /**< We're doing not much at all */
87     REQ_PTR, /**< Looking up a PTR */
88     REQ_A, /**< Looking up an A, possibly because AAAA failed */
89     REQ_AAAA, /**< Looking up an AAAA */
90     REQ_CNAME /**< We got a CNAME in response, we better get a real answer next */
91 adx 30 } request_state;
92    
93 michael 2916 struct reslist
94 adx 30 {
95 michael 4423 dlink_node node; /**< Doubly linked list node. */
96     int id; /**< Request ID (from request header). */
97     int sent; /**< Number of requests sent */
98     request_state state; /**< State the resolver machine is in */
99     char type; /**< Current request type. */
100     char retries; /**< Retry counter */
101     unsigned int sends; /**< Number of sends (>1 means resent). */
102     time_t sentat; /**< Timestamp we last sent this request. */
103     time_t timeout; /**< When this request times out. */
104     struct irc_ssaddr addr; /**< Address for this request. */
105     char name[RFC1035_MAX_DOMAIN_LENGTH + 1]; /**< Hostname for this request. */
106     size_t namelength; /**< Actual hostname length. */
107     dns_callback_fnc callback; /**< Callback function on completion. */
108     void *callback_ctx; /**< Context pointer for callback. */
109 adx 30 };
110    
111     static fde_t ResolverFileDescriptor;
112 michael 3235 static dlink_list request_list;
113     static mp_pool_t *dns_pool;
114 adx 30
115    
116 michael 4311 /*
117     * rem_request - remove a request from the list.
118     * This must also free any memory that has been allocated for
119     * temporary storage of DNS results.
120     */
121     static void
122     rem_request(struct reslist *request)
123     {
124     dlinkDelete(&request->node, &request_list);
125     mp_pool_release(request);
126     }
127    
128 adx 30 /*
129 michael 4311 * make_request - Create a DNS request record for the server.
130     */
131     static struct reslist *
132     make_request(dns_callback_fnc callback, void *ctx)
133     {
134     struct reslist *request = mp_pool_get(dns_pool);
135    
136     request->sentat = CurrentTime;
137     request->retries = 2;
138     request->timeout = 4; /* Start at 4 and exponential inc. */
139     request->state = REQ_IDLE;
140     request->callback = callback;
141     request->callback_ctx = ctx;
142    
143     dlinkAdd(request, &request->node, &request_list);
144     return request;
145     }
146    
147     /*
148 adx 30 * int
149     * res_ourserver(inp)
150     * looks up "inp" in irc_nsaddr_list[]
151     * returns:
152     * 0 : not found
153     * >0 : found
154     * author:
155     * paul vixie, 29may94
156     * revised for ircd, cryogen(stu) may03
157     */
158     static int
159 michael 2916 res_ourserver(const struct irc_ssaddr *inp)
160 adx 30 {
161 michael 992 const struct sockaddr_in6 *v6;
162     const struct sockaddr_in6 *v6in = (const struct sockaddr_in6 *)inp;
163     const struct sockaddr_in *v4;
164 michael 2916 const struct sockaddr_in *v4in = (const struct sockaddr_in *)inp;
165 adx 30
166 michael 3297 for (unsigned int i = 0; i < irc_nscount; ++i)
167 adx 30 {
168 michael 3235 const struct irc_ssaddr *srv = &irc_nsaddr_list[i];
169 michael 992 v6 = (const struct sockaddr_in6 *)srv;
170     v4 = (const struct sockaddr_in *)srv;
171 adx 30
172 michael 4311 /*
173     * Could probably just memcmp(srv, inp, srv.ss_len) here
174 adx 30 * but we'll air on the side of caution - stu
175     */
176     switch (srv->ss.ss_family)
177     {
178     case AF_INET6:
179     if (srv->ss.ss_family == inp->ss.ss_family)
180     if (v6->sin6_port == v6in->sin6_port)
181 michael 1346 if (!memcmp(&v6->sin6_addr.s6_addr, &v6in->sin6_addr.s6_addr,
182     sizeof(struct in6_addr)))
183 michael 1124 return 1;
184 adx 30 break;
185     case AF_INET:
186     if (srv->ss.ss_family == inp->ss.ss_family)
187     if (v4->sin_port == v4in->sin_port)
188 michael 1346 if (v4->sin_addr.s_addr == v4in->sin_addr.s_addr)
189 michael 1124 return 1;
190 adx 30 break;
191     default:
192     break;
193     }
194     }
195    
196 michael 1124 return 0;
197 adx 30 }
198    
199     /*
200     * start_resolver - do everything we need to read the resolv.conf file
201     * and initialize the resolver file descriptor if needed
202     */
203     static void
204     start_resolver(void)
205     {
206     irc_res_init();
207    
208     if (!ResolverFileDescriptor.flags.open)
209     {
210     if (comm_open(&ResolverFileDescriptor, irc_nsaddr_list[0].ss.ss_family,
211 michael 4448 SOCK_DGRAM, 0, "UDP resolver socket") == -1)
212 adx 30 return;
213    
214     /* At the moment, the resolver FD data is global .. */
215 michael 3298 comm_setselect(&ResolverFileDescriptor, COMM_SELECT_READ, res_readreply, NULL, 0);
216 adx 30 }
217     }
218    
219     /*
220     * restart_resolver - reread resolv.conf, reopen socket
221     */
222     void
223     restart_resolver(void)
224     {
225     fd_close(&ResolverFileDescriptor);
226     start_resolver();
227     }
228    
229     /*
230 michael 2916 * delete_resolver_queries - cleanup outstanding queries
231 adx 30 * for which there no longer exist clients or conf lines.
232     */
233     void
234 michael 992 delete_resolver_queries(const void *vptr)
235 adx 30 {
236 michael 3235 dlink_node *ptr = NULL, *ptr_next = NULL;
237 adx 30
238 michael 3235 DLINK_FOREACH_SAFE(ptr, ptr_next, request_list.head)
239 adx 30 {
240 michael 997 struct reslist *request = ptr->data;
241    
242     if (request->callback_ctx == vptr)
243     rem_request(request);
244 adx 30 }
245     }
246    
247     /*
248     * send_res_msg - sends msg to all nameservers found in the "_res" structure.
249     * This should reflect /etc/resolv.conf. We will get responses
250     * which arent needed but is easier than checking to see if nameserver
251 michael 4298 * isn't present. Returns number of messages successfully sent to
252 adx 30 * nameservers or -1 if no successful sends.
253     */
254     static int
255 michael 3297 send_res_msg(const char *msg, int len, unsigned int rcount)
256 adx 30 {
257     int sent = 0;
258 michael 3297 unsigned int max_queries = IRCD_MIN(irc_nscount, rcount);
259 adx 30
260     /* RES_PRIMARY option is not implemented
261     * if (res.options & RES_PRIMARY || 0 == max_queries)
262     */
263     if (max_queries == 0)
264     max_queries = 1;
265    
266 michael 3297 for (unsigned int i = 0; i < max_queries; ++i)
267 adx 30 {
268 michael 2916 if (sendto(ResolverFileDescriptor.fd, msg, len, 0,
269     (struct sockaddr*)&(irc_nsaddr_list[i]),
270     irc_nsaddr_list[i].ss_len) == len)
271 adx 30 ++sent;
272     }
273    
274 michael 1124 return sent;
275 adx 30 }
276    
277     /*
278     * find_id - find a dns request id (id is determined by dn_mkquery)
279     */
280     static struct reslist *
281     find_id(int id)
282     {
283 michael 1124 dlink_node *ptr = NULL;
284 adx 30
285     DLINK_FOREACH(ptr, request_list.head)
286     {
287 michael 1124 struct reslist *request = ptr->data;
288 adx 30
289     if (request->id == id)
290 michael 1124 return request;
291 adx 30 }
292    
293 michael 1124 return NULL;
294 adx 30 }
295    
296 michael 2916 /*
297 michael 4311 * query_name - generate a query based on class, type and name.
298 adx 30 */
299 michael 4311 static void
300     query_name(const char *name, int query_class, int type,
301     struct reslist *request)
302 adx 30 {
303 michael 4311 char buf[MAXPACKET];
304     int request_len = 0;
305 adx 30
306 michael 4311 memset(buf, 0, sizeof(buf));
307 adx 30
308 michael 4311 if ((request_len = irc_res_mkquery(name, query_class, type,
309     (unsigned char *)buf, sizeof(buf))) > 0)
310     {
311     HEADER *header = (HEADER *)buf;
312    
313     /*
314     * Generate an unique id.
315     * NOTE: we don't have to worry about converting this to and from
316     * network byte order, the nameserver does not interpret this value
317     * and returns it unchanged.
318     */
319     do
320     header->id = (header->id + genrand_int32()) & 0xFFFF;
321     while (find_id(header->id));
322    
323     request->id = header->id;
324     ++request->sends;
325    
326     request->sent += send_res_msg(buf, request_len, request->sends);
327     }
328 adx 30 }
329    
330     /*
331     * do_query_name - nameserver lookup name
332     */
333     static void
334 michael 992 do_query_name(dns_callback_fnc callback, void *ctx, const char *name,
335 adx 30 struct reslist *request, int type)
336     {
337 michael 4408 char host_name[RFC1035_MAX_DOMAIN_LENGTH + 1];
338 adx 30
339 michael 998 strlcpy(host_name, name, sizeof(host_name));
340 adx 30
341     if (request == NULL)
342     {
343 michael 4408 request = make_request(callback, ctx);
344     request->type = type;
345     request->namelength = strlcpy(request->name, host_name, sizeof(request->name));
346 adx 30 }
347    
348     request->type = type;
349     query_name(host_name, C_IN, type, request);
350     }
351    
352     /*
353     * do_query_number - Use this to do reverse IP# lookups.
354     */
355     static void
356 michael 992 do_query_number(dns_callback_fnc callback, void *ctx,
357     const struct irc_ssaddr *addr,
358 adx 30 struct reslist *request)
359     {
360 michael 3298 char ipbuf[128] = "";
361 michael 985
362 adx 30 if (addr->ss.ss_family == AF_INET)
363     {
364 michael 992 const struct sockaddr_in *v4 = (const struct sockaddr_in *)addr;
365 michael 3298 const unsigned char *cp = (const unsigned char *)&v4->sin_addr.s_addr;
366 adx 30
367 michael 1124 snprintf(ipbuf, sizeof(ipbuf), "%u.%u.%u.%u.in-addr.arpa.",
368     (unsigned int)(cp[3]), (unsigned int)(cp[2]),
369     (unsigned int)(cp[1]), (unsigned int)(cp[0]));
370 adx 30 }
371     else if (addr->ss.ss_family == AF_INET6)
372     {
373 michael 992 const struct sockaddr_in6 *v6 = (const struct sockaddr_in6 *)addr;
374 michael 3298 const unsigned char *cp = (const unsigned char *)&v6->sin6_addr.s6_addr;
375 adx 30
376 michael 1124 snprintf(ipbuf, sizeof(ipbuf),
377     "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x."
378     "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.ip6.arpa.",
379     (unsigned int)(cp[15] & 0xf), (unsigned int)(cp[15] >> 4),
380     (unsigned int)(cp[14] & 0xf), (unsigned int)(cp[14] >> 4),
381     (unsigned int)(cp[13] & 0xf), (unsigned int)(cp[13] >> 4),
382     (unsigned int)(cp[12] & 0xf), (unsigned int)(cp[12] >> 4),
383     (unsigned int)(cp[11] & 0xf), (unsigned int)(cp[11] >> 4),
384     (unsigned int)(cp[10] & 0xf), (unsigned int)(cp[10] >> 4),
385     (unsigned int)(cp[9] & 0xf), (unsigned int)(cp[9] >> 4),
386     (unsigned int)(cp[8] & 0xf), (unsigned int)(cp[8] >> 4),
387     (unsigned int)(cp[7] & 0xf), (unsigned int)(cp[7] >> 4),
388     (unsigned int)(cp[6] & 0xf), (unsigned int)(cp[6] >> 4),
389     (unsigned int)(cp[5] & 0xf), (unsigned int)(cp[5] >> 4),
390     (unsigned int)(cp[4] & 0xf), (unsigned int)(cp[4] >> 4),
391     (unsigned int)(cp[3] & 0xf), (unsigned int)(cp[3] >> 4),
392     (unsigned int)(cp[2] & 0xf), (unsigned int)(cp[2] >> 4),
393     (unsigned int)(cp[1] & 0xf), (unsigned int)(cp[1] >> 4),
394     (unsigned int)(cp[0] & 0xf), (unsigned int)(cp[0] >> 4));
395 adx 30 }
396 michael 4415
397 adx 30 if (request == NULL)
398     {
399 michael 992 request = make_request(callback, ctx);
400 adx 30 request->type = T_PTR;
401     memcpy(&request->addr, addr, sizeof(struct irc_ssaddr));
402     }
403    
404     query_name(ipbuf, C_IN, T_PTR, request);
405     }
406    
407     /*
408 michael 4311 * gethost_byname_type - get host address from name
409     *
410 adx 30 */
411 michael 4311 void
412     gethost_byname_type(dns_callback_fnc callback, void *ctx, const char *name, int type)
413 adx 30 {
414 michael 4311 assert(name);
415     do_query_name(callback, ctx, name, NULL, type);
416     }
417 adx 30
418 michael 4311 /*
419     * gethost_byname - wrapper for _type - send T_AAAA first if IPV6 supported
420     */
421     void
422     gethost_byname(dns_callback_fnc callback, void *ctx, const char *name)
423     {
424     gethost_byname_type(callback, ctx, name, T_AAAA);
425     }
426 adx 30
427 michael 4311 /*
428     * gethost_byaddr - get host name from address
429     */
430     void
431     gethost_byaddr(dns_callback_fnc callback, void *ctx, const struct irc_ssaddr *addr)
432     {
433     do_query_number(callback, ctx, addr, NULL);
434 adx 30 }
435    
436     static void
437     resend_query(struct reslist *request)
438     {
439 michael 982 switch (request->type)
440 adx 30 {
441     case T_PTR:
442 michael 992 do_query_number(NULL, NULL, &request->addr, request);
443 adx 30 break;
444     case T_A:
445 michael 4449 case T_AAAA:
446 michael 992 do_query_name(NULL, NULL, request->name, request, request->type);
447 adx 30 break;
448     default:
449     break;
450     }
451     }
452    
453     /*
454     * proc_answer - process name server reply
455     */
456     static int
457 michael 1124 proc_answer(struct reslist *request, HEADER *header, char *buf, char *eob)
458 adx 30 {
459 michael 4408 char hostbuf[RFC1035_MAX_DOMAIN_LENGTH + 100]; /* working buffer */
460 adx 30 unsigned char *current; /* current position in buf */
461     int type; /* answer type */
462     int n; /* temp count */
463     int rd_length;
464     struct sockaddr_in *v4; /* conversion */
465     struct sockaddr_in6 *v6;
466 michael 4415
467 adx 30 current = (unsigned char *)buf + sizeof(HEADER);
468    
469     for (; header->qdcount > 0; --header->qdcount)
470     {
471     if ((n = irc_dn_skipname(current, (unsigned char *)eob)) < 0)
472     break;
473    
474 michael 1124 current += (size_t)n + QFIXEDSZ;
475 adx 30 }
476    
477     /*
478 michael 4298 * Process each answer sent to us blech.
479 adx 30 */
480     while (header->ancount > 0 && (char *)current < eob)
481     {
482     header->ancount--;
483    
484     n = irc_dn_expand((unsigned char *)buf, (unsigned char *)eob, current,
485     hostbuf, sizeof(hostbuf));
486    
487 michael 4298 if (n < 0 /* Broken message */ || n == 0 /* No more answers left */)
488 michael 1124 return 0;
489 adx 30
490 michael 4408 hostbuf[RFC1035_MAX_DOMAIN_LENGTH] = '\0';
491 adx 30
492 michael 4298 /*
493     * With Address arithmetic you have to be very anal
494 adx 30 * this code was not working on alpha due to that
495     * (spotted by rodder/jailbird/dianora)
496     */
497 michael 3298 current += (size_t)n;
498 adx 30
499     if (!(((char *)current + ANSWER_FIXED_SIZE) < eob))
500     break;
501    
502     type = irc_ns_get16(current);
503     current += TYPE_SIZE;
504     current += CLASS_SIZE;
505     current += TTL_SIZE;
506     rd_length = irc_ns_get16(current);
507     current += RDLENGTH_SIZE;
508    
509 michael 2916 /*
510     * Wait to set request->type until we verify this structure
511 adx 30 */
512     switch (type)
513     {
514     case T_A:
515     if (request->type != T_A)
516 michael 1124 return 0;
517 adx 30
518     /*
519 michael 3298 * Check for invalid rd_length or too many addresses
520 adx 30 */
521     if (rd_length != sizeof(struct in_addr))
522 michael 1124 return 0;
523    
524 adx 30 v4 = (struct sockaddr_in *)&request->addr;
525     request->addr.ss_len = sizeof(struct sockaddr_in);
526     v4->sin_family = AF_INET;
527     memcpy(&v4->sin_addr, current, sizeof(struct in_addr));
528 michael 1124 return 1;
529 adx 30 break;
530     case T_AAAA:
531     if (request->type != T_AAAA)
532 michael 1124 return 0;
533    
534 adx 30 if (rd_length != sizeof(struct in6_addr))
535 michael 1124 return 0;
536    
537 adx 30 request->addr.ss_len = sizeof(struct sockaddr_in6);
538     v6 = (struct sockaddr_in6 *)&request->addr;
539     v6->sin6_family = AF_INET6;
540     memcpy(&v6->sin6_addr, current, sizeof(struct in6_addr));
541 michael 1124 return 1;
542 adx 30 break;
543     case T_PTR:
544     if (request->type != T_PTR)
545 michael 1124 return 0;
546    
547 adx 30 n = irc_dn_expand((unsigned char *)buf, (unsigned char *)eob,
548 michael 3298 current, hostbuf, sizeof(hostbuf));
549 michael 4298 if (n < 0 /* Broken message */ || n == 0 /* No more answers left */)
550 michael 1124 return 0;
551 adx 30
552 michael 4408 request->namelength = strlcpy(request->name, hostbuf, sizeof(request->name));
553 michael 1124 return 1;
554 adx 30 break;
555 michael 4298 case T_CNAME: /* First check we already haven't started looking into a cname */
556 michael 2916 if (request->type != T_PTR)
557 michael 1124 return 0;
558 adx 30
559     if (request->state == REQ_CNAME)
560     {
561     n = irc_dn_expand((unsigned char *)buf, (unsigned char *)eob,
562     current, hostbuf, sizeof(hostbuf));
563    
564     if (n < 0)
565 michael 1124 return 0;
566     return 1;
567 adx 30 }
568    
569     request->state = REQ_CNAME;
570     current += rd_length;
571     break;
572 michael 2916
573 adx 30 default:
574     /* XXX I'd rather just throw away the entire bogus thing
575     * but its possible its just a broken nameserver with still
576     * valid answers. But lets do some rudimentary logging for now...
577     */
578 michael 1247 ilog(LOG_TYPE_IRCD, "irc_res.c bogus type %d", type);
579 adx 30 break;
580     }
581     }
582    
583 michael 1124 return 1;
584 adx 30 }
585    
586     /*
587     * res_readreply - read a dns reply from the nameserver and process it.
588     */
589     static void
590     res_readreply(fde_t *fd, void *data)
591     {
592 michael 4240 char buf[sizeof(HEADER) + MAXPACKET];
593 adx 30 HEADER *header;
594     struct reslist *request = NULL;
595 michael 4303 ssize_t rc = 0;
596 adx 30 socklen_t len = sizeof(struct irc_ssaddr);
597     struct irc_ssaddr lsin;
598    
599 michael 4317 while ((rc = recvfrom(fd->fd, buf, sizeof(buf), 0, (struct sockaddr *)&lsin, &len)) != -1)
600     {
601     if (rc <= (ssize_t)sizeof(HEADER))
602     continue;
603 adx 30
604 michael 4317 /*
605     * Check against possibly fake replies
606     */
607     if (!res_ourserver(&lsin))
608     continue;
609 michael 984
610 michael 4317 /*
611     * Convert DNS reply reader from Network byte order to CPU byte order.
612     */
613     header = (HEADER *)buf;
614     header->ancount = ntohs(header->ancount);
615     header->qdcount = ntohs(header->qdcount);
616     header->nscount = ntohs(header->nscount);
617     header->arcount = ntohs(header->arcount);
618 adx 30
619 michael 4317 /*
620     * Response for an id which we have already received an answer for
621     * just ignore this response.
622     */
623     if ((request = find_id(header->id)) == NULL)
624     continue;
625 michael 4237
626 michael 4449 if (header->rcode != NO_ERRORS || header->ancount == 0)
627 michael 4317 {
628 michael 4449 /*
629     * If a bad error was returned, stop here and don't
630     * send any more (no retries granted).
631     */
632     (*request->callback)(request->callback_ctx, NULL, NULL, 0);
633     rem_request(request);
634 michael 4317 continue;
635     }
636 adx 30
637 michael 4317 /*
638     * If this fails there was an error decoding the received packet.
639     * We only give it one shot. If it fails, just leave the client
640     * unresolved.
641     */
642     if (!proc_answer(request, header, buf, buf + rc))
643 db 155 {
644 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
645 michael 984 rem_request(request);
646 michael 4317 continue;
647 michael 984 }
648 michael 4317
649     if (request->type == T_PTR)
650 michael 984 {
651 michael 4408 if (request->namelength == 0)
652 michael 4317 {
653     /*
654     * Got a PTR response with no name, something bogus is happening
655     * don't bother trying again, the client address doesn't resolve
656     */
657 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
658 michael 4317 rem_request(request);
659     continue;
660     }
661    
662 michael 2916 /*
663 michael 4317 * Lookup the 'authoritative' name that we were given for the ip#.
664 adx 30 */
665 michael 4317 if (request->addr.ss.ss_family == AF_INET6)
666     gethost_byname_type(request->callback, request->callback_ctx, request->name, T_AAAA);
667     else
668 michael 4415 gethost_byname_type(request->callback, request->callback_ctx, request->name, T_A);
669 michael 4317 rem_request(request);
670 michael 984 }
671 michael 4317 else
672 adx 30 {
673     /*
674 michael 4317 * Got a name and address response, client resolved
675 adx 30 */
676 michael 4408 (*request->callback)(request->callback_ctx, &request->addr, request->name, request->namelength);
677 adx 30 rem_request(request);
678     }
679 michael 4316
680 michael 4317 continue;
681 adx 30 }
682 michael 4317
683     comm_setselect(fd, COMM_SELECT_READ, res_readreply, NULL, 0);
684 adx 30 }
685    
686     void
687     report_dns_servers(struct Client *source_p)
688     {
689 michael 3235 char ipaddr[HOSTIPLEN + 1] = "";
690 adx 30
691 michael 3297 for (unsigned int i = 0; i < irc_nscount; ++i)
692 adx 30 {
693 michael 1123 getnameinfo((struct sockaddr *)&(irc_nsaddr_list[i]),
694     irc_nsaddr_list[i].ss_len, ipaddr,
695     sizeof(ipaddr), NULL, 0, NI_NUMERICHOST);
696 michael 3109 sendto_one_numeric(source_p, &me, RPL_STATSALINE, ipaddr);
697 adx 30 }
698     }
699 michael 4311
700     /*
701     * timeout_query_list - Remove queries from the list which have been
702     * there too long without being resolved.
703     */
704     static time_t
705     timeout_query_list(void)
706     {
707     dlink_node *ptr = NULL, *ptr_next = NULL;
708     struct reslist *request = NULL;
709     time_t next_time = 0;
710     time_t timeout = 0;
711    
712     DLINK_FOREACH_SAFE(ptr, ptr_next, request_list.head)
713     {
714     request = ptr->data;
715     timeout = request->sentat + request->timeout;
716    
717     if (CurrentTime >= timeout)
718     {
719     if (--request->retries <= 0)
720     {
721 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
722 michael 4311 rem_request(request);
723     continue;
724     }
725     else
726     {
727     request->sentat = CurrentTime;
728     request->timeout += request->timeout;
729     resend_query(request);
730     }
731     }
732    
733     if (next_time == 0 || timeout < next_time)
734     next_time = timeout;
735     }
736    
737     return (next_time > CurrentTime) ? next_time : (CurrentTime + AR_TTL);
738     }
739    
740     /*
741     * timeout_resolver - check request list
742     */
743     static void
744 michael 4439 timeout_resolver(void *unused)
745 michael 4311 {
746     timeout_query_list();
747     }
748    
749     /*
750     * init_resolver - initialize resolver and resolver library
751     */
752     void
753     init_resolver(void)
754     {
755     static struct event event_timeout_resolver =
756     {
757     .name = "timeout_resolver",
758     .handler = timeout_resolver,
759     .when = 1
760     };
761    
762     dns_pool = mp_pool_new(sizeof(struct reslist), MP_CHUNK_SIZE_DNS);
763 michael 4420
764 michael 4311 start_resolver();
765     event_add(&event_timeout_resolver, NULL);
766     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision