mirror of
https://github.com/m13253/dns-over-https.git
synced 2026-03-31 18:25:38 +00:00
Compare commits
48 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
12df47f45f | ||
|
|
450c10a594 | ||
|
|
e7c4450787 | ||
|
|
bd5ef5d61e | ||
|
|
ff0e9529cb | ||
|
|
627e2d639d | ||
|
|
7d5cf98d2b | ||
|
|
34adf40b36 | ||
|
|
b9c1bcaad2 | ||
|
|
47df06b6e2 | ||
|
|
1abba72898 | ||
|
|
ce656ac3f7 | ||
|
|
83f20767ea | ||
|
|
07db7ba200 | ||
|
|
cdb8599c9f | ||
|
|
236f7931e6 | ||
|
|
196207631b | ||
|
|
9562c2fe5c | ||
|
|
0a107be362 | ||
|
|
efa272bc52 | ||
|
|
36da908686 | ||
|
|
8b45c99dfc | ||
|
|
68c3f30d14 | ||
|
|
7c4b818967 | ||
|
|
57c956594f | ||
|
|
542585b1ec | ||
|
|
1819deb6c0 | ||
|
|
56973c827d | ||
|
|
c1be2ddd18 | ||
|
|
cb78b9b696 | ||
|
|
972d404ebc | ||
|
|
1be17bff4d | ||
|
|
ab2bf57995 | ||
|
|
06b700cb7e | ||
|
|
0e36d3b31b | ||
|
|
5723558934 | ||
|
|
2176e14e65 | ||
|
|
1be3052cda | ||
|
|
2b3a261247 | ||
|
|
5f96e35f29 | ||
|
|
8034d5417d | ||
|
|
b3f495e50f | ||
|
|
cefa3a6ba8 | ||
|
|
a81a7eff58 | ||
|
|
26d4cd413d | ||
|
|
fba928e4e4 | ||
|
|
78e40722e8 | ||
|
|
ebaaa7ff71 |
70
Changelog.md
Normal file
70
Changelog.md
Normal file
@@ -0,0 +1,70 @@
|
||||
# Changelog
|
||||
|
||||
This Changelog records major changes between versions.
|
||||
|
||||
Not all changes are recorded. Please check git log for details.
|
||||
|
||||
## Version 1.3.2
|
||||
|
||||
- Fix version string in HTTP User-Agent
|
||||
|
||||
## Version 1.3.1
|
||||
|
||||
- Fix the "address already in use" issue
|
||||
|
||||
## Version 1.3.0
|
||||
|
||||
- Breaking change: Add client / server support for multiple listen address
|
||||
The `listen` option in the configuration file is a list now
|
||||
|
||||
## Version 1.2.1
|
||||
|
||||
- Update protocol to IETF draft-07
|
||||
- Update installation documentations for Ubuntu / Debian
|
||||
|
||||
## Version 1.2.0
|
||||
|
||||
- Add installation documentations for Ubuntu / Debian
|
||||
- Include CloudFlare DOH server (1.1.1.1, 1.0.0.1) in default configuration
|
||||
- Fix a problem causing `go get` to fail due to relative paths
|
||||
- Add documentation about `/etc/hosts` preloading
|
||||
|
||||
## Version 1.1.4
|
||||
|
||||
- Add `no_cookies` option
|
||||
- Add documentation on privacy issues
|
||||
- Adapt for CloudFlare DNS service
|
||||
- Fix a problem causing a single network failure blocking future requests
|
||||
- Add experimental macOS support
|
||||
|
||||
## Version 1.1.3
|
||||
|
||||
- Unsupported Content-Type now generates HTTP error code 415
|
||||
|
||||
## Version 1.1.2
|
||||
|
||||
- Adapt to IETF protocol
|
||||
- Optimize for HTTP caches
|
||||
|
||||
## Version 1.1.1
|
||||
|
||||
- Adapt to IETF protocol
|
||||
- Optimize for HTTP caches
|
||||
- Add documentation for uninstallation instructions
|
||||
- Fix build issues
|
||||
|
||||
## Version 1.1.0
|
||||
|
||||
- Adpat to IETF protocol
|
||||
- Fix issues regarding to HTTP caching
|
||||
- Require Go 1.9 to build now
|
||||
- Fix systemd issue
|
||||
|
||||
## Version 1.0.1
|
||||
|
||||
- Fix build issues
|
||||
|
||||
## Version 1.0.0
|
||||
|
||||
- First release
|
||||
- Relicense as MIT license
|
||||
42
Makefile
42
Makefile
@@ -2,31 +2,51 @@
|
||||
|
||||
GOBUILD=go build
|
||||
GOGET=go get -d -v
|
||||
GOGET_UPDATE=go get -d -u -v
|
||||
PREFIX=/usr/local
|
||||
ifeq ($(shell uname),Darwin)
|
||||
CONFDIR=/usr/local/etc/dns-over-https
|
||||
else
|
||||
CONFDIR=/etc/dns-over-https
|
||||
endif
|
||||
|
||||
all: doh-client/doh-client doh-server/doh-server
|
||||
|
||||
clean:
|
||||
rm -f doh-client/doh-client doh-server/doh-server
|
||||
|
||||
install: doh-client/doh-client doh-server/doh-server
|
||||
install -Dm0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
||||
install -Dm0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||
[ -e "$(DESTDIR)/etc/dns-over-https/doh-client.conf" ] || install -Dm0644 doh-client/doh-client.conf "$(DESTDIR)/etc/dns-over-https/doh-client.conf"
|
||||
[ -e "$(DESTDIR)/etc/dns-over-https/doh-server.conf" ] || install -Dm0644 doh-server/doh-server.conf "$(DESTDIR)/etc/dns-over-https/doh-server.conf"
|
||||
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
||||
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
||||
install:
|
||||
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
||||
[ -e doh-server/doh-server ] || $(MAKE) doh-server/doh-server
|
||||
mkdir -p "$(DESTDIR)$(PREFIX)/bin/"
|
||||
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
||||
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
||||
if [ "`uname`" = "Linux" ]; then \
|
||||
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
||||
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
||||
elif [ "`uname`" = "Darwin" ]; then \
|
||||
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
||||
fi
|
||||
|
||||
uninstall:
|
||||
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
||||
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
||||
if [ "`uname`" = "Linux" ]; then \
|
||||
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
||||
elif [ "`uname`" = "Darwin" ]; then \
|
||||
$(MAKE) -C launchd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||
fi
|
||||
|
||||
deps:
|
||||
@# I am not sure if it is the correct way to keep the common library updated
|
||||
$(GOGET_UPDATE) github.com/m13253/dns-over-https/json-dns
|
||||
$(GOGET) ./doh-client ./doh-server
|
||||
|
||||
doh-client/doh-client: deps doh-client/client.go doh-client/config.go doh-client/main.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||
doh-client/doh-client: deps doh-client/client.go doh-client/config.go doh-client/google.go doh-client/ietf.go doh-client/main.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||
cd doh-client && $(GOBUILD)
|
||||
|
||||
doh-server/doh-server: deps doh-server/config.go doh-server/main.go doh-server/server.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||
doh-server/doh-server: deps doh-server/config.go doh-server/google.go doh-server/ietf.go doh-server/main.go doh-server/server.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||
cd doh-server && $(GOBUILD)
|
||||
|
||||
40
Readme.md
40
Readme.md
@@ -42,6 +42,14 @@ If it is OK, you will wee:
|
||||
|
||||
;; SERVER: 127.0.0.1#53(127.0.0.1)
|
||||
|
||||
### Uninstalling
|
||||
|
||||
To uninstall, type:
|
||||
|
||||
sudo make uninstall
|
||||
|
||||
The configuration files are kept at `/etc/dns-over-https`. Remove them manually if you want.
|
||||
|
||||
## Server Configuration
|
||||
|
||||
The following is a typical DNS-over-HTTPS architecture:
|
||||
@@ -64,25 +72,39 @@ you can host DNS-over-HTTPS along with other HTTPS services.
|
||||
|
||||
## DNSSEC
|
||||
|
||||
DNSSEC validation is not built-in. It is highly recommended that you install
|
||||
`unbound` or `bind` and pass results for them to validate DNS records.
|
||||
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
||||
default. However signature validation is not built-in. It is highly recommended
|
||||
that you install `unbound` or `bind` and pass results for them to validate DNS
|
||||
records.
|
||||
|
||||
If you are running a server without anycast, you probably want to enable EDNS0
|
||||
Client Subnet during your configuring `unbound` or `bind`.
|
||||
## EDNS0-Client-Subnet (GeoDNS)
|
||||
|
||||
DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of the
|
||||
client's IP address (/24 for IPv4, /48 for IPv6 by default) to the upstream
|
||||
server. This is useful for GeoDNS and CDNs to work, and is exactly the same
|
||||
configuration as most public DNS servers.
|
||||
|
||||
Keep in mind that /24 is not enough to track a single user, although it is
|
||||
precise enough to know the city where the user is located. If you think
|
||||
EDNS0-Client-Subnet is affecting your privacy, you can set `no_ecs = true` in
|
||||
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
||||
or software downloading speed.
|
||||
|
||||
If your server is backed by `unbound` or `bind`, you probably want to enable
|
||||
the EDNS0-Client-Subnet feature in their configuration files as well.
|
||||
|
||||
## Protocol compatibility
|
||||
|
||||
### Google DNS-over-HTTPS
|
||||
### Google DNS-over-HTTPS Protocol
|
||||
|
||||
DNS-over-HTTPS uses a protocol compatible to [Google DNS-over-HTTPS](https://developers.google.com/speed/public-dns/docs/dns-over-https),
|
||||
except for absolute expire time is preferred to relative TTL value. Refer to
|
||||
[json-dns/response.go](json-dns/response.go) for a complete description of the
|
||||
API.
|
||||
|
||||
### IETF DNS-over-HTTPS (Draft)
|
||||
### IETF DNS-over-HTTPS Protocol (Draft)
|
||||
|
||||
DNS-over-HTTPS uses a protocol compatible to [draft-ietf-doh-dns-over-https
|
||||
](https://github.com/dohwg/draft-ietf-doh-dns-over-https).
|
||||
DNS-over-HTTPS uses a protocol compatible to [draft-ietf-doh-dns-over-https](https://github.com/dohwg/draft-ietf-doh-dns-over-https).
|
||||
This protocol is in draft stage. Any incompatibility may be introduced before
|
||||
it is finished.
|
||||
|
||||
@@ -92,7 +114,7 @@ Currently supported features are:
|
||||
|
||||
- [X] IPv4 / IPv6
|
||||
- [X] EDNS0 large UDP packet (4 KiB by default)
|
||||
- [X] EDNS0 Client Subnet (/24 for IPv4, /48 for IPv6 by default)
|
||||
- [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
|
||||
|
||||
## License
|
||||
|
||||
|
||||
@@ -30,38 +30,57 @@ import (
|
||||
"net"
|
||||
"net/http"
|
||||
"net/http/cookiejar"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
"golang.org/x/net/http2"
|
||||
)
|
||||
|
||||
type Client struct {
|
||||
conf *config
|
||||
bootstrap []string
|
||||
udpServer *dns.Server
|
||||
tcpServer *dns.Server
|
||||
httpTransport *http.Transport
|
||||
httpClient *http.Client
|
||||
conf *config
|
||||
bootstrap []string
|
||||
udpServers []*dns.Server
|
||||
tcpServers []*dns.Server
|
||||
bootstrapResolver *net.Resolver
|
||||
cookieJar *cookiejar.Jar
|
||||
httpClientMux *sync.RWMutex
|
||||
httpTransport *http.Transport
|
||||
httpClient *http.Client
|
||||
}
|
||||
|
||||
type DNSRequest struct {
|
||||
response *http.Response
|
||||
reply *dns.Msg
|
||||
udpSize uint16
|
||||
ednsClientAddress net.IP
|
||||
ednsClientNetmask uint8
|
||||
err error
|
||||
}
|
||||
|
||||
func NewClient(conf *config) (c *Client, err error) {
|
||||
c = &Client{
|
||||
conf: conf,
|
||||
}
|
||||
c.udpServer = &dns.Server{
|
||||
Addr: conf.Listen,
|
||||
Net: "udp",
|
||||
Handler: dns.HandlerFunc(c.udpHandlerFunc),
|
||||
UDPSize: 4096,
|
||||
|
||||
udpH := dns.HandlerFunc(c.udpHandlerFunc)
|
||||
tcpH := dns.HandlerFunc(c.tcpHandlerFunc)
|
||||
for _, addr := range conf.Listen {
|
||||
c.udpServers = append(c.udpServers, &dns.Server{
|
||||
Addr: addr,
|
||||
Net: "udp",
|
||||
Handler: udpH,
|
||||
UDPSize: 4096,
|
||||
})
|
||||
c.tcpServers = append(c.tcpServers, &dns.Server{
|
||||
Addr: addr,
|
||||
Net: "tcp",
|
||||
Handler: tcpH,
|
||||
})
|
||||
}
|
||||
c.tcpServer = &dns.Server{
|
||||
Addr: conf.Listen,
|
||||
Net: "tcp",
|
||||
Handler: dns.HandlerFunc(c.tcpHandlerFunc),
|
||||
}
|
||||
bootResolver := net.DefaultResolver
|
||||
c.bootstrapResolver = net.DefaultResolver
|
||||
if len(conf.Bootstrap) != 0 {
|
||||
c.bootstrap = make([]string, len(conf.Bootstrap))
|
||||
for i, bootstrap := range conf.Bootstrap {
|
||||
@@ -74,7 +93,7 @@ func NewClient(conf *config) (c *Client, err error) {
|
||||
}
|
||||
c.bootstrap[i] = bootstrapAddr.String()
|
||||
}
|
||||
bootResolver = &net.Resolver{
|
||||
c.bootstrapResolver = &net.Resolver{
|
||||
PreferGo: true,
|
||||
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
|
||||
var d net.Dialer
|
||||
@@ -85,57 +104,75 @@ func NewClient(conf *config) (c *Client, err error) {
|
||||
},
|
||||
}
|
||||
}
|
||||
c.httpTransport = new(http.Transport)
|
||||
// Most CDNs require Cookie support to prevent DDoS attack.
|
||||
// Disabling Cookie does not effectively prevent tracking,
|
||||
// so I will leave it on to make anti-DDoS services happy.
|
||||
if !c.conf.NoCookies {
|
||||
c.cookieJar, err = cookiejar.New(nil)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
c.httpClientMux = new(sync.RWMutex)
|
||||
err = c.newHTTPClient()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return c, nil
|
||||
}
|
||||
|
||||
func (c *Client) newHTTPClient() error {
|
||||
c.httpClientMux.Lock()
|
||||
defer c.httpClientMux.Unlock()
|
||||
if c.httpTransport != nil {
|
||||
c.httpTransport.CloseIdleConnections()
|
||||
}
|
||||
c.httpTransport = &http.Transport{
|
||||
DialContext: (&net.Dialer{
|
||||
Timeout: time.Duration(conf.Timeout) * time.Second,
|
||||
Timeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||
KeepAlive: 30 * time.Second,
|
||||
DualStack: true,
|
||||
Resolver: bootResolver,
|
||||
Resolver: c.bootstrapResolver,
|
||||
}).DialContext,
|
||||
ExpectContinueTimeout: 1 * time.Second,
|
||||
IdleConnTimeout: 90 * time.Second,
|
||||
MaxIdleConns: 100,
|
||||
MaxIdleConnsPerHost: 10,
|
||||
Proxy: http.ProxyFromEnvironment,
|
||||
ResponseHeaderTimeout: time.Duration(conf.Timeout) * time.Second,
|
||||
TLSHandshakeTimeout: time.Duration(conf.Timeout) * time.Second,
|
||||
ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||
TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||
}
|
||||
http2.ConfigureTransport(c.httpTransport)
|
||||
// Most CDNs require Cookie support to prevent DDoS attack
|
||||
cookieJar, err := cookiejar.New(nil)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
c.httpClient = &http.Client{
|
||||
Transport: c.httpTransport,
|
||||
Jar: cookieJar,
|
||||
}
|
||||
return c, nil
|
||||
}
|
||||
|
||||
func (c *Client) Start() error {
|
||||
result := make(chan error)
|
||||
go func() {
|
||||
err := c.udpServer.ListenAndServe()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
}
|
||||
result <- err
|
||||
}()
|
||||
go func() {
|
||||
err := c.tcpServer.ListenAndServe()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
}
|
||||
result <- err
|
||||
}()
|
||||
err := <-result
|
||||
err := http2.ConfigureTransport(c.httpTransport)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = <-result
|
||||
return err
|
||||
c.httpClient = &http.Client{
|
||||
Transport: c.httpTransport,
|
||||
Jar: c.cookieJar,
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *Client) Start() error {
|
||||
results := make(chan error, len(c.udpServers)+len(c.tcpServers))
|
||||
for _, srv := range append(c.udpServers, c.tcpServers...) {
|
||||
go func(srv *dns.Server) {
|
||||
err := srv.ListenAndServe()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
}
|
||||
results <- err
|
||||
}(srv)
|
||||
}
|
||||
|
||||
for i := 0; i < cap(results); i++ {
|
||||
err := <-results
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
close(results)
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
@@ -144,20 +181,56 @@ func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
return
|
||||
}
|
||||
|
||||
requestType := ""
|
||||
if len(c.conf.UpstreamIETF) == 0 {
|
||||
c.handlerFuncGoogle(w, r, isTCP)
|
||||
return
|
||||
}
|
||||
if len(c.conf.UpstreamGoogle) == 0 {
|
||||
c.handlerFuncIETF(w, r, isTCP)
|
||||
return
|
||||
}
|
||||
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
|
||||
random := rand.Intn(numServers)
|
||||
if random < len(c.conf.UpstreamGoogle) {
|
||||
c.handlerFuncGoogle(w, r, isTCP)
|
||||
requestType = "application/dns-json"
|
||||
} else if len(c.conf.UpstreamGoogle) == 0 {
|
||||
requestType = "application/dns-message"
|
||||
} else {
|
||||
c.handlerFuncIETF(w, r, isTCP)
|
||||
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
|
||||
random := rand.Intn(numServers)
|
||||
if random < len(c.conf.UpstreamGoogle) {
|
||||
requestType = "application/dns-json"
|
||||
} else {
|
||||
requestType = "application/dns-message"
|
||||
}
|
||||
}
|
||||
|
||||
var req *DNSRequest
|
||||
if requestType == "application/dns-json" {
|
||||
req = c.generateRequestGoogle(w, r, isTCP)
|
||||
} else if requestType == "application/dns-message" {
|
||||
req = c.generateRequestIETF(w, r, isTCP)
|
||||
} else {
|
||||
panic("Unknown request Content-Type")
|
||||
}
|
||||
|
||||
if req.err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
contentType := ""
|
||||
candidateType := strings.SplitN(req.response.Header.Get("Content-Type"), ";", 2)[0]
|
||||
if candidateType == "application/json" {
|
||||
contentType = "application/json"
|
||||
} else if candidateType == "application/dns-message" {
|
||||
contentType = "application/dns-message"
|
||||
} else if candidateType == "application/dns-udpwireformat" {
|
||||
contentType = "application/dns-message"
|
||||
} else {
|
||||
if requestType == "application/dns-json" {
|
||||
contentType = "application/json"
|
||||
} else if requestType == "application/dns-message" {
|
||||
contentType = "application/dns-message"
|
||||
}
|
||||
}
|
||||
|
||||
if contentType == "application/json" {
|
||||
c.parseResponseGoogle(w, r, isTCP, req)
|
||||
} else if contentType == "application/dns-message" {
|
||||
c.parseResponseIETF(w, r, isTCP, req)
|
||||
} else {
|
||||
panic("Unknown response Content-Type")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -30,11 +30,12 @@ import (
|
||||
)
|
||||
|
||||
type config struct {
|
||||
Listen string `toml:"listen"`
|
||||
Listen []string `toml:"listen"`
|
||||
UpstreamGoogle []string `toml:"upstream_google"`
|
||||
UpstreamIETF []string `toml:"upstream_ietf"`
|
||||
Bootstrap []string `toml:"bootstrap"`
|
||||
Timeout uint `toml:"timeout"`
|
||||
NoCookies bool `toml:"no_cookies"`
|
||||
NoECS bool `toml:"no_ecs"`
|
||||
Verbose bool `toml:"verbose"`
|
||||
}
|
||||
@@ -49,8 +50,8 @@ func loadConfig(path string) (*config, error) {
|
||||
return nil, &configError{fmt.Sprintf("unknown option %q", key.String())}
|
||||
}
|
||||
|
||||
if conf.Listen == "" {
|
||||
conf.Listen = "127.0.0.1:53"
|
||||
if len(conf.Listen) == 0 {
|
||||
conf.Listen = []string{"127.0.0.1:53", "[::1]:53"}
|
||||
}
|
||||
if len(conf.UpstreamGoogle) == 0 && len(conf.UpstreamIETF) == 0 {
|
||||
conf.UpstreamGoogle = []string{"https://dns.google.com/resolve"}
|
||||
|
||||
@@ -1,27 +1,68 @@
|
||||
# DNS listen port
|
||||
listen = "127.0.0.1:53"
|
||||
listen = [
|
||||
"127.0.0.1:53",
|
||||
"[::1]:53",
|
||||
]
|
||||
|
||||
# HTTP path for upstream resolver
|
||||
# If multiple servers are specified, a random one will be chosen each time.
|
||||
upstream_google = [
|
||||
|
||||
# Google's productive resolver, good ECS, bad DNSSEC
|
||||
"https://dns.google.com/resolve",
|
||||
|
||||
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||
#"https://cloudflare-dns.com/dns-query",
|
||||
#"https://1.1.1.1/dns-query",
|
||||
#"https://1.0.0.1/dns-query",
|
||||
|
||||
]
|
||||
upstream_ietf = [
|
||||
"https://dns.google.com/experimental",
|
||||
|
||||
# Google's experimental resolver, good ECS, good DNSSEC
|
||||
#"https://dns.google.com/experimental",
|
||||
|
||||
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||
#"https://cloudflare-dns.com/dns-query",
|
||||
#"https://1.1.1.1/dns-query",
|
||||
#"https://1.0.0.1/dns-query",
|
||||
|
||||
]
|
||||
|
||||
# Bootstrap DNS server to resolve the address of the upstream resolver
|
||||
# If multiple servers are specified, a random one will be chosen each time.
|
||||
# If empty, use the system DNS settings.
|
||||
# If you want to preload IP addresses in /etc/hosts instead of using a
|
||||
# bootstrap server, please make this list empty.
|
||||
bootstrap = [
|
||||
|
||||
# Google's resolver, bad ECS, good DNSSEC
|
||||
"8.8.8.8:53",
|
||||
"8.8.4.4:53",
|
||||
|
||||
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||
#"1.1.1.1:53",
|
||||
#"1.0.0.1:53",
|
||||
|
||||
]
|
||||
|
||||
# Timeout for upstream request
|
||||
timeout = 10
|
||||
|
||||
# Disable EDNS0-Client-Subnet, do not send client's IP address
|
||||
# Disable HTTP Cookies
|
||||
#
|
||||
# Cookies may be useful if your upstream resolver is protected by some
|
||||
# anti-DDoS services to identify clients.
|
||||
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
||||
# to track uesrs and is not controlled by doh-client.
|
||||
no_cookies = false
|
||||
|
||||
# Disable EDNS0-Client-Subnet (ECS)
|
||||
#
|
||||
# DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of
|
||||
# the client's IP address (/24 for IPv4, /48 for IPv6 by default) to the
|
||||
# upstream server. This is useful for GeoDNS and CDNs to work, and is exactly
|
||||
# the same configuration as most public DNS servers.
|
||||
no_ecs = false
|
||||
|
||||
# Enable logging
|
||||
|
||||
@@ -35,20 +35,22 @@ import (
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
)
|
||||
|
||||
func (c *Client) handlerFuncGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool) *DNSRequest {
|
||||
reply := jsonDNS.PrepareReply(r)
|
||||
|
||||
if len(r.Question) != 1 {
|
||||
log.Println("Number of questions is not 1")
|
||||
reply.Rcode = dns.RcodeFormatError
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: &dns.Error{},
|
||||
}
|
||||
}
|
||||
question := r.Question[0]
|
||||
question := &r.Question[0]
|
||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
||||
questionName := strings.ToLower(question.Name)
|
||||
questionType := ""
|
||||
@@ -64,7 +66,7 @@ func (c *Client) handlerFuncGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool)
|
||||
|
||||
numServers := len(c.conf.UpstreamGoogle)
|
||||
upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)]
|
||||
requestURL := fmt.Sprintf("%s?name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
||||
requestURL := fmt.Sprintf("%s?ct=application/dns-json&name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
||||
|
||||
if r.CheckingDisabled {
|
||||
requestURL += "&cd=1"
|
||||
@@ -85,33 +87,53 @@ func (c *Client) handlerFuncGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool)
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
req.Header.Set("Accept", "application/json")
|
||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.0 (+https://github.com/m13253/dns-over-https)")
|
||||
req.Header.Set("Accept", "application/json, application/dns-message, application/dns-udpwireformat")
|
||||
req.Header.Set("User-Agent", jsonDNS.USER_AGENT)
|
||||
c.httpClientMux.RLock()
|
||||
resp, err := c.httpClient.Do(req)
|
||||
c.httpClientMux.RUnlock()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
c.httpTransport.CloseIdleConnections()
|
||||
return
|
||||
err1 := c.newHTTPClient()
|
||||
if err1 != nil {
|
||||
log.Fatalln(err1)
|
||||
}
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
if resp.StatusCode != 200 {
|
||||
log.Printf("HTTP error: %s\n", resp.Status)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
contentType := resp.Header.Get("Content-Type")
|
||||
|
||||
return &DNSRequest{
|
||||
response: resp,
|
||||
reply: reply,
|
||||
udpSize: udpSize,
|
||||
ednsClientAddress: ednsClientAddress,
|
||||
ednsClientNetmask: ednsClientNetmask,
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Client) parseResponseGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||
if req.response.StatusCode != 200 {
|
||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
contentType := req.response.Header.Get("Content-Type")
|
||||
if contentType != "application/json" && !strings.HasPrefix(contentType, "application/json;") {
|
||||
w.WriteMsg(reply)
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
body, err := ioutil.ReadAll(resp.Body)
|
||||
body, err := ioutil.ReadAll(req.response.Body)
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
|
||||
@@ -119,8 +141,8 @@ func (c *Client) handlerFuncGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool)
|
||||
err = json.Unmarshal(body, &respJSON)
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
|
||||
@@ -128,22 +150,22 @@ func (c *Client) handlerFuncGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool)
|
||||
log.Printf("DNS error: %s\n", respJSON.Comment)
|
||||
}
|
||||
|
||||
fullReply := jsonDNS.Unmarshal(reply, &respJSON, udpSize, ednsClientNetmask)
|
||||
fullReply := jsonDNS.Unmarshal(req.reply, &respJSON, req.udpSize, req.ednsClientNetmask)
|
||||
buf, err := fullReply.Pack()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
if !isTCP && len(buf) > int(udpSize) {
|
||||
if !isTCP && len(buf) > int(req.udpSize) {
|
||||
fullReply.Truncated = true
|
||||
buf, err = fullReply.Pack()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
return
|
||||
}
|
||||
buf = buf[:udpSize]
|
||||
buf = buf[:req.udpSize]
|
||||
}
|
||||
w.Write(buf)
|
||||
}
|
||||
|
||||
@@ -30,26 +30,29 @@ import (
|
||||
"io/ioutil"
|
||||
"log"
|
||||
"math/rand"
|
||||
"net"
|
||||
"net/http"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
)
|
||||
|
||||
func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) *DNSRequest {
|
||||
reply := jsonDNS.PrepareReply(r)
|
||||
|
||||
if len(r.Question) != 1 {
|
||||
log.Println("Number of questions is not 1")
|
||||
reply.Rcode = dns.RcodeFormatError
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: &dns.Error{},
|
||||
}
|
||||
}
|
||||
|
||||
question := r.Question[0]
|
||||
question := &r.Question[0]
|
||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
||||
questionName := strings.ToLower(question.Name)
|
||||
questionType := ""
|
||||
@@ -63,8 +66,6 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
fmt.Printf("%s - - [%s] \"%s IN %s\"\n", w.RemoteAddr(), time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionType)
|
||||
}
|
||||
|
||||
requestID := r.Id
|
||||
r.Id = 0
|
||||
question.Name = questionName
|
||||
opt := r.IsEdns0()
|
||||
udpSize := uint16(512)
|
||||
@@ -85,9 +86,10 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
break
|
||||
}
|
||||
}
|
||||
ednsClientAddress, ednsClientNetmask := net.IP(nil), uint8(255)
|
||||
if edns0Subnet == nil {
|
||||
ednsClientFamily := uint16(0)
|
||||
ednsClientAddress, ednsClientNetmask := c.findClientIP(w, r)
|
||||
ednsClientAddress, ednsClientNetmask = c.findClientIP(w, r)
|
||||
if ednsClientAddress != nil {
|
||||
if ipv4 := ednsClientAddress.To4(); ipv4 != nil {
|
||||
ednsClientFamily = 1
|
||||
@@ -105,20 +107,28 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
edns0Subnet.Address = ednsClientAddress
|
||||
opt.Option = append(opt.Option, edns0Subnet)
|
||||
}
|
||||
} else {
|
||||
ednsClientAddress, ednsClientNetmask = edns0Subnet.Address, edns0Subnet.SourceNetmask
|
||||
}
|
||||
|
||||
requestID := r.Id
|
||||
r.Id = 0
|
||||
requestBinary, err := r.Pack()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeFormatError
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
r.Id = requestID
|
||||
requestBase64 := base64.RawURLEncoding.EncodeToString(requestBinary)
|
||||
|
||||
numServers := len(c.conf.UpstreamIETF)
|
||||
upstream := c.conf.UpstreamIETF[rand.Intn(numServers)]
|
||||
requestURL := fmt.Sprintf("%s?ct=application/dns-udpwireformat&dns=%s", upstream, requestBase64)
|
||||
//requestURL := fmt.Sprintf("%s?ct=application/dns-message&dns=%s", upstream, requestBase64)
|
||||
|
||||
var req *http.Request
|
||||
if len(requestURL) < 2048 {
|
||||
@@ -127,7 +137,9 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
} else {
|
||||
req, err = http.NewRequest("POST", upstream, bytes.NewReader(requestBinary))
|
||||
@@ -135,48 +147,76 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
return
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
req.Header.Set("Content-Type", "application/dns-udpwireformat")
|
||||
req.Header.Set("Content-Type", "application/dns-message")
|
||||
}
|
||||
req.Header.Set("Accept", "application/dns-udpwireformat")
|
||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.0 (+https://github.com/m13253/dns-over-https)")
|
||||
req.Header.Set("Accept", "application/dns-message, application/dns-udpwireformat, application/json")
|
||||
req.Header.Set("User-Agent", jsonDNS.USER_AGENT)
|
||||
c.httpClientMux.RLock()
|
||||
resp, err := c.httpClient.Do(req)
|
||||
c.httpClientMux.RUnlock()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
c.httpTransport.CloseIdleConnections()
|
||||
return
|
||||
err1 := c.newHTTPClient()
|
||||
if err1 != nil {
|
||||
log.Fatalln(err1)
|
||||
}
|
||||
return &DNSRequest{
|
||||
err: err,
|
||||
}
|
||||
}
|
||||
if resp.StatusCode != 200 {
|
||||
log.Printf("HTTP error: %s\n", resp.Status)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
contentType := resp.Header.Get("Content-Type")
|
||||
if contentType != "application/dns-udpwireformat" && !strings.HasPrefix(contentType, "application/dns-udpwireformat;") {
|
||||
w.WriteMsg(reply)
|
||||
|
||||
return &DNSRequest{
|
||||
response: resp,
|
||||
reply: reply,
|
||||
udpSize: udpSize,
|
||||
ednsClientAddress: ednsClientAddress,
|
||||
ednsClientNetmask: ednsClientNetmask,
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Client) parseResponseIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||
if req.response.StatusCode != 200 {
|
||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
contentType := req.response.Header.Get("Content-Type")
|
||||
if contentType != "application/dns-message" && !strings.HasPrefix(contentType, "application/dns-message;") {
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
body, err := ioutil.ReadAll(resp.Body)
|
||||
body, err := ioutil.ReadAll(req.response.Body)
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
lastModified := resp.Header.Get("Last-Modified")
|
||||
if lastModified == "" {
|
||||
lastModified = resp.Header.Get("Date")
|
||||
headerNow := req.response.Header.Get("Date")
|
||||
now := time.Now().UTC()
|
||||
if headerNow != "" {
|
||||
if nowDate, err := time.Parse(http.TimeFormat, headerNow); err == nil {
|
||||
now = nowDate
|
||||
} else {
|
||||
log.Println(err)
|
||||
}
|
||||
}
|
||||
now := time.Now()
|
||||
lastModifiedDate, err := time.Parse(http.TimeFormat, lastModified)
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
lastModifiedDate = now
|
||||
headerLastModified := req.response.Header.Get("Last-Modified")
|
||||
lastModified := now
|
||||
if headerLastModified != "" {
|
||||
if lastModifiedDate, err := time.Parse(http.TimeFormat, headerLastModified); err == nil {
|
||||
lastModified = lastModifiedDate
|
||||
} else {
|
||||
log.Println(err)
|
||||
}
|
||||
}
|
||||
timeDelta := now.Sub(lastModifiedDate)
|
||||
timeDelta := now.Sub(lastModified)
|
||||
if timeDelta < 0 {
|
||||
timeDelta = 0
|
||||
}
|
||||
@@ -185,12 +225,12 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
err = fullReply.Unpack(body)
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
|
||||
fullReply.Id = requestID
|
||||
fullReply.Id = r.Id
|
||||
for _, rr := range fullReply.Answer {
|
||||
_ = fixRecordTTL(rr, timeDelta)
|
||||
}
|
||||
@@ -207,18 +247,18 @@ func (c *Client) handlerFuncIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||
buf, err := fullReply.Pack()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(reply)
|
||||
req.reply.Rcode = dns.RcodeServerFailure
|
||||
w.WriteMsg(req.reply)
|
||||
return
|
||||
}
|
||||
if !isTCP && len(buf) > int(udpSize) {
|
||||
if !isTCP && len(buf) > int(req.udpSize) {
|
||||
fullReply.Truncated = true
|
||||
buf, err = fullReply.Pack()
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
return
|
||||
}
|
||||
buf = buf[:udpSize]
|
||||
buf = buf[:req.udpSize]
|
||||
}
|
||||
w.Write(buf)
|
||||
}
|
||||
@@ -227,7 +267,7 @@ func fixRecordTTL(rr dns.RR, delta time.Duration) dns.RR {
|
||||
rrHeader := rr.Header()
|
||||
oldTTL := time.Duration(rrHeader.Ttl) * time.Second
|
||||
newTTL := oldTTL - delta
|
||||
if newTTL >= 0 {
|
||||
if newTTL > 0 {
|
||||
rrHeader.Ttl = uint32(newTTL / time.Second)
|
||||
} else {
|
||||
rrHeader.Ttl = 0
|
||||
|
||||
@@ -30,7 +30,7 @@ import (
|
||||
)
|
||||
|
||||
type config struct {
|
||||
Listen string `toml:"listen"`
|
||||
Listen []string `toml:"listen"`
|
||||
Cert string `toml:"cert"`
|
||||
Key string `toml:"key"`
|
||||
Path string `toml:"path"`
|
||||
@@ -51,9 +51,10 @@ func loadConfig(path string) (*config, error) {
|
||||
return nil, &configError{fmt.Sprintf("unknown option %q", key.String())}
|
||||
}
|
||||
|
||||
if conf.Listen == "" {
|
||||
conf.Listen = "127.0.0.1:8053"
|
||||
if len(conf.Listen) == 0 {
|
||||
conf.Listen = []string{"127.0.0.1:8053", "[::1]:8053"}
|
||||
}
|
||||
|
||||
if conf.Path == "" {
|
||||
conf.Path = "/dns-query"
|
||||
}
|
||||
|
||||
@@ -1,5 +1,8 @@
|
||||
# HTTP listen port
|
||||
listen = "127.0.0.1:8053"
|
||||
listen = [
|
||||
"127.0.0.1:8053",
|
||||
"[::1]:8053",
|
||||
]
|
||||
|
||||
# TLS certification file
|
||||
cert = ""
|
||||
|
||||
@@ -31,8 +31,9 @@ import (
|
||||
"net/http"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
"golang.org/x/net/idna"
|
||||
)
|
||||
@@ -178,11 +179,14 @@ func (s *Server) generateResponseGoogle(w http.ResponseWriter, r *http.Request,
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json; charset=UTF-8")
|
||||
now := time.Now().UTC().Format(http.TimeFormat)
|
||||
w.Header().Set("Date", now)
|
||||
w.Header().Set("Last-Modified", now)
|
||||
if respJSON.HaveTTL {
|
||||
if req.isTailored {
|
||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
} else {
|
||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
} else {
|
||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
}
|
||||
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
||||
}
|
||||
|
||||
@@ -32,7 +32,7 @@ import (
|
||||
"strconv"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
)
|
||||
|
||||
@@ -45,7 +45,7 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
||||
errtext: fmt.Sprintf("Invalid argument value: \"dns\" = %q", requestBase64),
|
||||
}
|
||||
}
|
||||
if len(requestBinary) == 0 && r.Header.Get("Content-Type") == "application/dns-udpwireformat" {
|
||||
if len(requestBinary) == 0 && (r.Header.Get("Content-Type") == "application/dns-message" || r.Header.Get("Content-Type") == "application/dns-udpwireformat") {
|
||||
requestBinary, err = ioutil.ReadAll(r.Body)
|
||||
if err != nil {
|
||||
return &DNSRequest{
|
||||
@@ -68,6 +68,25 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
||||
errtext: fmt.Sprintf("DNS packet parse failure (%s)", err.Error()),
|
||||
}
|
||||
}
|
||||
|
||||
if s.conf.Verbose && len(msg.Question) > 0 {
|
||||
question := &msg.Question[0]
|
||||
questionName := question.Name
|
||||
questionClass := ""
|
||||
if qclass, ok := dns.ClassToString[question.Qclass]; ok {
|
||||
questionClass = qclass
|
||||
} else {
|
||||
questionClass = strconv.Itoa(int(question.Qclass))
|
||||
}
|
||||
questionType := ""
|
||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||
questionType = qtype
|
||||
} else {
|
||||
questionType = strconv.Itoa(int(question.Qtype))
|
||||
}
|
||||
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", r.RemoteAddr, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
||||
}
|
||||
|
||||
msg.Id = dns.Id()
|
||||
opt := msg.IsEdns0()
|
||||
if opt == nil {
|
||||
@@ -125,15 +144,15 @@ func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, re
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/dns-udpwireformat")
|
||||
now := time.Now().Format(http.TimeFormat)
|
||||
w.Header().Set("Content-Type", "application/dns-message")
|
||||
now := time.Now().UTC().Format(http.TimeFormat)
|
||||
w.Header().Set("Date", now)
|
||||
w.Header().Set("Last-Modified", now)
|
||||
if respJSON.HaveTTL {
|
||||
if req.isTailored {
|
||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
} else {
|
||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
} else {
|
||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||
}
|
||||
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
||||
}
|
||||
|
||||
@@ -43,8 +43,5 @@ func main() {
|
||||
}
|
||||
|
||||
server := NewServer(conf)
|
||||
err = server.Start()
|
||||
if err != nil {
|
||||
log.Fatalln(err)
|
||||
}
|
||||
_ = server.Start()
|
||||
}
|
||||
|
||||
@@ -33,8 +33,8 @@ import (
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"../json-dns"
|
||||
"github.com/gorilla/handlers"
|
||||
"github.com/m13253/dns-over-https/json-dns"
|
||||
"github.com/miekg/dns"
|
||||
)
|
||||
|
||||
@@ -75,15 +75,35 @@ func (s *Server) Start() error {
|
||||
if s.conf.Verbose {
|
||||
servemux = handlers.CombinedLoggingHandler(os.Stdout, servemux)
|
||||
}
|
||||
if s.conf.Cert != "" || s.conf.Key != "" {
|
||||
return http.ListenAndServeTLS(s.conf.Listen, s.conf.Cert, s.conf.Key, servemux)
|
||||
results := make(chan error, len(s.conf.Listen))
|
||||
for _, addr := range s.conf.Listen {
|
||||
go func(addr string) {
|
||||
var err error
|
||||
if s.conf.Cert != "" || s.conf.Key != "" {
|
||||
err = http.ListenAndServeTLS(addr, s.conf.Cert, s.conf.Key, servemux)
|
||||
} else {
|
||||
err = http.ListenAndServe(addr, servemux)
|
||||
}
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
}
|
||||
results <- err
|
||||
}(addr)
|
||||
}
|
||||
return http.ListenAndServe(s.conf.Listen, servemux)
|
||||
// wait for all handlers
|
||||
for i := 0; i < cap(results); i++ {
|
||||
err := <-results
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
close(results)
|
||||
return nil
|
||||
}
|
||||
|
||||
func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
||||
w.Header().Set("Server", "DNS-over-HTTPS/1.0 (+https://github.com/m13253/dns-over-https)")
|
||||
w.Header().Set("X-Powered-By", "DNS-over-HTTPS/1.0 (+https://github.com/m13253/dns-over-https)")
|
||||
w.Header().Set("Server", jsonDNS.USER_AGENT)
|
||||
w.Header().Set("X-Powered-By", jsonDNS.USER_AGENT)
|
||||
|
||||
if r.Form == nil {
|
||||
const maxMemory = 32 << 20 // 32 MB
|
||||
@@ -96,38 +116,45 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
||||
if contentType == "" {
|
||||
// Guess request Content-Type based on other parameters
|
||||
if r.FormValue("name") != "" {
|
||||
contentType = "application/x-www-form-urlencoded"
|
||||
contentType = "application/dns-json"
|
||||
} else if r.FormValue("dns") != "" {
|
||||
contentType = "application/dns-udpwireformat"
|
||||
contentType = "application/dns-message"
|
||||
}
|
||||
}
|
||||
var responseType string
|
||||
for _, responseCandidate := range strings.Split(r.Header.Get("Accept"), ",") {
|
||||
responseCandidate = strings.ToLower(strings.SplitN(responseCandidate, ";", 2)[0])
|
||||
responseCandidate = strings.SplitN(responseCandidate, ";", 2)[0]
|
||||
if responseCandidate == "application/json" {
|
||||
responseType = "application/json"
|
||||
break
|
||||
} else if responseCandidate == "application/dns-udpwireformat" {
|
||||
responseType = "application/dns-udpwireformat"
|
||||
responseType = "application/dns-message"
|
||||
break
|
||||
} else if responseCandidate == "application/dns-message" {
|
||||
responseType = "application/dns-message"
|
||||
break
|
||||
}
|
||||
}
|
||||
if responseType == "" {
|
||||
// Guess response Content-Type based on request Content-Type
|
||||
if contentType == "application/x-www-form-urlencoded" {
|
||||
if contentType == "application/dns-json" {
|
||||
responseType = "application/json"
|
||||
} else if contentType == "application/dns-message" {
|
||||
responseType = "application/dns-message"
|
||||
} else if contentType == "application/dns-udpwireformat" {
|
||||
responseType = "application/dns-udpwireformat"
|
||||
responseType = "application/dns-message"
|
||||
}
|
||||
}
|
||||
|
||||
var req *DNSRequest
|
||||
if contentType == "application/x-www-form-urlencoded" {
|
||||
if contentType == "application/dns-json" {
|
||||
req = s.parseRequestGoogle(w, r)
|
||||
} else if contentType == "application/dns-message" {
|
||||
req = s.parseRequestIETF(w, r)
|
||||
} else if contentType == "application/dns-udpwireformat" {
|
||||
req = s.parseRequestIETF(w, r)
|
||||
} else {
|
||||
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 400)
|
||||
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
||||
return
|
||||
}
|
||||
if req.errcode != 0 {
|
||||
@@ -142,10 +169,12 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
||||
return
|
||||
}
|
||||
|
||||
if contentType == "application/x-www-form-urlencoded" {
|
||||
if responseType == "application/json" {
|
||||
s.generateResponseGoogle(w, r, req)
|
||||
} else if contentType == "application/dns-udpwireformat" {
|
||||
} else if responseType == "application/dns-message" {
|
||||
s.generateResponseIETF(w, r, req)
|
||||
} else {
|
||||
panic("Unknown response Content-Type")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
27
json-dns/version.go
Normal file
27
json-dns/version.go
Normal file
@@ -0,0 +1,27 @@
|
||||
/*
|
||||
DNS-over-HTTPS
|
||||
Copyright (C) 2017-2018 Star Brilliant <m13253@hotmail.com>
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a
|
||||
copy of this software and associated documentation files (the "Software"),
|
||||
to deal in the Software without restriction, including without limitation
|
||||
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
and/or sell copies of the Software, and to permit persons to whom the
|
||||
Software is furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in
|
||||
all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
|
||||
package jsonDNS
|
||||
|
||||
const VERSION = "1.3.2"
|
||||
const USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
||||
16
launchd/Makefile
Normal file
16
launchd/Makefile
Normal file
@@ -0,0 +1,16 @@
|
||||
.PHONY: install uninstall
|
||||
|
||||
PREFIX = /usr/local
|
||||
LAUNCHD_DIR = /Library/LaunchDaemons
|
||||
|
||||
install:
|
||||
mkdir -p "$(DESTDIR)$(LAUNCHD_DIR)"
|
||||
install -m0644 doh-client.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist"
|
||||
install -m0644 doh-server.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"
|
||||
@echo
|
||||
@echo 'Note:'
|
||||
@echo ' Use "sudo launchctl load $(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" to start doh-client,'
|
||||
@echo ' use "sudo launchctl load -w $(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist" to enable doh-server.'
|
||||
|
||||
uninstall:
|
||||
rm -f "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"
|
||||
27
launchd/doh-client.plist
Normal file
27
launchd/doh-client.plist
Normal file
@@ -0,0 +1,27 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||
<plist version="1.0">
|
||||
<dict>
|
||||
<key>Label</key>
|
||||
<string>org.eu.starlab.doh.client</string>
|
||||
<key>ProgramArguments</key>
|
||||
<array>
|
||||
<string>/usr/local/bin/doh-client</string>
|
||||
<string>-conf</string>
|
||||
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
||||
</array>
|
||||
<key>RunAtLoad</key>
|
||||
<true/>
|
||||
<key>UserName</key>
|
||||
<string>root</string>
|
||||
<key>GroupName</key>
|
||||
<string>wheel</string>
|
||||
<key>KeepAlive</key>
|
||||
<dict>
|
||||
<key>SuccessfulExit</key>
|
||||
<false/>
|
||||
</dict>
|
||||
<key>ThrottleInterval</key>
|
||||
<integer>5</integer>
|
||||
</dict>
|
||||
</plist>
|
||||
29
launchd/doh-server.plist
Normal file
29
launchd/doh-server.plist
Normal file
@@ -0,0 +1,29 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||
<plist version="1.0">
|
||||
<dict>
|
||||
<key>Label</key>
|
||||
<string>org.eu.starlab.doh.server</string>
|
||||
<key>ProgramArguments</key>
|
||||
<array>
|
||||
<string>/usr/local/bin/doh-server</string>
|
||||
<string>-conf</string>
|
||||
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
||||
</array>
|
||||
<key>Disabled</key>
|
||||
<true/>
|
||||
<key>RunAtLoad</key>
|
||||
<true/>
|
||||
<key>UserName</key>
|
||||
<string>root</string>
|
||||
<key>GroupName</key>
|
||||
<string>wheel</string>
|
||||
<key>KeepAlive</key>
|
||||
<dict>
|
||||
<key>SuccessfulExit</key>
|
||||
<false/>
|
||||
</dict>
|
||||
<key>ThrottleInterval</key>
|
||||
<integer>5</integer>
|
||||
</dict>
|
||||
</plist>
|
||||
51
linux-install.md
Normal file
51
linux-install.md
Normal file
@@ -0,0 +1,51 @@
|
||||
# Ubuntu Install
|
||||
> Tested on a clean install of `Ubuntu 16.04 LTS`
|
||||
|
||||
## Intalling go
|
||||
Install `Go >= 1.9`
|
||||
|
||||
```bash
|
||||
sudo apt update
|
||||
sudo apt install golang-1.10 -y
|
||||
```
|
||||
|
||||
Add the newly install `go` to the path
|
||||
|
||||
```bash
|
||||
export PATH=$PATH:/usr/lib/go-1.10/bin
|
||||
```
|
||||
|
||||
Test to make sure that you can execute `go`
|
||||
|
||||
```bash
|
||||
go version
|
||||
```
|
||||
which should output something like
|
||||
|
||||
```bash
|
||||
go version go1.10.1 linux/amd64
|
||||
```
|
||||
|
||||
## Installing dns-over-https
|
||||
|
||||
Clone this repo
|
||||
|
||||
|
||||
```bash
|
||||
git clone https://github.com/m13253/dns-over-https.git
|
||||
```
|
||||
|
||||
Change directory to the cloned repo
|
||||
|
||||
```bash
|
||||
cd dns-over-https
|
||||
```
|
||||
|
||||
make and install
|
||||
|
||||
```bash
|
||||
make
|
||||
sudo make install
|
||||
```
|
||||
|
||||
|
||||
13
linux-install.sh
Executable file
13
linux-install.sh
Executable file
@@ -0,0 +1,13 @@
|
||||
#!/bin/bash
|
||||
|
||||
# See the linux-install.md (README) first.
|
||||
set -e
|
||||
|
||||
sudo apt update
|
||||
sudo apt install golang-1.10 git -y
|
||||
export PATH=$PATH:/usr/lib/go-1.10/bin
|
||||
cd /tmp
|
||||
git clone https://github.com/m13253/dns-over-https.git
|
||||
cd dns-over-https
|
||||
make
|
||||
sudo make install
|
||||
@@ -1,6 +1,5 @@
|
||||
.PHONY: install uninstall
|
||||
|
||||
PREFIX = /usr/local
|
||||
SYSTEMD_DIR = /usr/lib/systemd
|
||||
SYSTEMD_UNIT_DIR = $(SYSTEMD_DIR)/system
|
||||
|
||||
|
||||
Reference in New Issue
Block a user