mirror of
https://github.com/m13253/dns-over-https.git
synced 2026-03-31 11:55:38 +00:00
Compare commits
10 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
36da908686 | ||
|
|
8b45c99dfc | ||
|
|
68c3f30d14 | ||
|
|
7c4b818967 | ||
|
|
57c956594f | ||
|
|
542585b1ec | ||
|
|
1819deb6c0 | ||
|
|
56973c827d | ||
|
|
c1be2ddd18 | ||
|
|
cb78b9b696 |
35
Makefile
35
Makefile
@@ -3,24 +3,41 @@
|
|||||||
GOBUILD=go build
|
GOBUILD=go build
|
||||||
GOGET=go get -d -v
|
GOGET=go get -d -v
|
||||||
PREFIX=/usr/local
|
PREFIX=/usr/local
|
||||||
|
ifeq ($(shell uname),Darwin)
|
||||||
|
CONFDIR=/usr/local/etc/dns-over-https
|
||||||
|
else
|
||||||
|
CONFDIR=/etc/dns-over-https
|
||||||
|
endif
|
||||||
|
|
||||||
all: doh-client/doh-client doh-server/doh-server
|
all: doh-client/doh-client doh-server/doh-server
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f doh-client/doh-client doh-server/doh-server
|
rm -f doh-client/doh-client doh-server/doh-server
|
||||||
|
|
||||||
install: doh-client/doh-client doh-server/doh-server
|
install:
|
||||||
install -Dm0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
||||||
install -Dm0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
[ -e doh-server/doh-server ] || $(MAKE) doh-server/doh-server
|
||||||
[ -e "$(DESTDIR)/etc/dns-over-https/doh-client.conf" ] || install -Dm0644 doh-client/doh-client.conf "$(DESTDIR)/etc/dns-over-https/doh-client.conf"
|
mkdir -p "$(DESTDIR)$(PREFIX)/bin/"
|
||||||
[ -e "$(DESTDIR)/etc/dns-over-https/doh-server.conf" ] || install -Dm0644 doh-server/doh-server.conf "$(DESTDIR)/etc/dns-over-https/doh-server.conf"
|
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
||||||
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||||
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
||||||
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
||||||
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
||||||
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
|
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
||||||
|
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
||||||
|
elif [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
||||||
|
fi
|
||||||
|
|
||||||
uninstall:
|
uninstall:
|
||||||
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||||
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"
|
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
|
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
|
elif [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C launchd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
|
fi
|
||||||
|
|
||||||
deps:
|
deps:
|
||||||
$(GOGET) ./doh-client ./doh-server
|
$(GOGET) ./doh-client ./doh-server
|
||||||
|
|||||||
25
Readme.md
25
Readme.md
@@ -72,11 +72,26 @@ you can host DNS-over-HTTPS along with other HTTPS services.
|
|||||||
|
|
||||||
## DNSSEC
|
## DNSSEC
|
||||||
|
|
||||||
DNSSEC validation is not built-in. It is highly recommended that you install
|
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
||||||
`unbound` or `bind` and pass results for them to validate DNS records.
|
default. However signature validation is not built-in. It is highly recommended
|
||||||
|
that you install `unbound` or `bind` and pass results for them to validate DNS
|
||||||
|
records.
|
||||||
|
|
||||||
If you are running a server without anycast, you probably want to enable EDNS0
|
## EDNS0-Client-Subnet (GeoDNS)
|
||||||
Client Subnet during your configuring `unbound` or `bind`.
|
|
||||||
|
DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of the
|
||||||
|
client's IP address (/24 for IPv4, /48 for IPv6 by default) to the upstream
|
||||||
|
server. This is useful for GeoDNS and CDNs to work, and is exactly the same
|
||||||
|
configuration as most public DNS servers.
|
||||||
|
|
||||||
|
Keep in mind that /24 is not enough to track a single user, although it is
|
||||||
|
precise enough to know the city where the user is located. If you think
|
||||||
|
EDNS0-Client-Subnet is affecting your privacy, you can set `no_ecs = true` in
|
||||||
|
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
||||||
|
or software downloading speed.
|
||||||
|
|
||||||
|
If your server is backed by `unbound` or `bind`, you probably want to enable
|
||||||
|
the EDNS0-Client-Subnet feature in their configuration files as well.
|
||||||
|
|
||||||
## Protocol compatibility
|
## Protocol compatibility
|
||||||
|
|
||||||
@@ -99,7 +114,7 @@ Currently supported features are:
|
|||||||
|
|
||||||
- [X] IPv4 / IPv6
|
- [X] IPv4 / IPv6
|
||||||
- [X] EDNS0 large UDP packet (4 KiB by default)
|
- [X] EDNS0 large UDP packet (4 KiB by default)
|
||||||
- [X] EDNS0 Client Subnet (/24 for IPv4, /48 for IPv6 by default)
|
- [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
|
|||||||
@@ -31,6 +31,7 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
"net/http/cookiejar"
|
"net/http/cookiejar"
|
||||||
"strings"
|
"strings"
|
||||||
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"../json-dns"
|
"../json-dns"
|
||||||
@@ -39,12 +40,15 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Client struct {
|
type Client struct {
|
||||||
conf *config
|
conf *config
|
||||||
bootstrap []string
|
bootstrap []string
|
||||||
udpServer *dns.Server
|
udpServer *dns.Server
|
||||||
tcpServer *dns.Server
|
tcpServer *dns.Server
|
||||||
httpTransport *http.Transport
|
bootstrapResolver *net.Resolver
|
||||||
httpClient *http.Client
|
cookieJar *cookiejar.Jar
|
||||||
|
httpClientMux *sync.RWMutex
|
||||||
|
httpTransport *http.Transport
|
||||||
|
httpClient *http.Client
|
||||||
}
|
}
|
||||||
|
|
||||||
type DNSRequest struct {
|
type DNSRequest struct {
|
||||||
@@ -71,7 +75,7 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
Net: "tcp",
|
Net: "tcp",
|
||||||
Handler: dns.HandlerFunc(c.tcpHandlerFunc),
|
Handler: dns.HandlerFunc(c.tcpHandlerFunc),
|
||||||
}
|
}
|
||||||
bootResolver := net.DefaultResolver
|
c.bootstrapResolver = net.DefaultResolver
|
||||||
if len(conf.Bootstrap) != 0 {
|
if len(conf.Bootstrap) != 0 {
|
||||||
c.bootstrap = make([]string, len(conf.Bootstrap))
|
c.bootstrap = make([]string, len(conf.Bootstrap))
|
||||||
for i, bootstrap := range conf.Bootstrap {
|
for i, bootstrap := range conf.Bootstrap {
|
||||||
@@ -84,7 +88,7 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
}
|
}
|
||||||
c.bootstrap[i] = bootstrapAddr.String()
|
c.bootstrap[i] = bootstrapAddr.String()
|
||||||
}
|
}
|
||||||
bootResolver = &net.Resolver{
|
c.bootstrapResolver = &net.Resolver{
|
||||||
PreferGo: true,
|
PreferGo: true,
|
||||||
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
|
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
|
||||||
var d net.Dialer
|
var d net.Dialer
|
||||||
@@ -95,33 +99,53 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
c.httpTransport = new(http.Transport)
|
// Most CDNs require Cookie support to prevent DDoS attack.
|
||||||
|
// Disabling Cookie does not effectively prevent tracking,
|
||||||
|
// so I will leave it on to make anti-DDoS services happy.
|
||||||
|
if !c.conf.NoCookies {
|
||||||
|
c.cookieJar, err = cookiejar.New(nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
c.httpClientMux = new(sync.RWMutex)
|
||||||
|
err = c.newHTTPClient()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) newHTTPClient() error {
|
||||||
|
c.httpClientMux.Lock()
|
||||||
|
defer c.httpClientMux.Unlock()
|
||||||
|
if c.httpTransport != nil {
|
||||||
|
c.httpTransport.CloseIdleConnections()
|
||||||
|
}
|
||||||
c.httpTransport = &http.Transport{
|
c.httpTransport = &http.Transport{
|
||||||
DialContext: (&net.Dialer{
|
DialContext: (&net.Dialer{
|
||||||
Timeout: time.Duration(conf.Timeout) * time.Second,
|
Timeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
KeepAlive: 30 * time.Second,
|
KeepAlive: 30 * time.Second,
|
||||||
DualStack: true,
|
DualStack: true,
|
||||||
Resolver: bootResolver,
|
Resolver: c.bootstrapResolver,
|
||||||
}).DialContext,
|
}).DialContext,
|
||||||
ExpectContinueTimeout: 1 * time.Second,
|
ExpectContinueTimeout: 1 * time.Second,
|
||||||
IdleConnTimeout: 90 * time.Second,
|
IdleConnTimeout: 90 * time.Second,
|
||||||
MaxIdleConns: 100,
|
MaxIdleConns: 100,
|
||||||
MaxIdleConnsPerHost: 10,
|
MaxIdleConnsPerHost: 10,
|
||||||
Proxy: http.ProxyFromEnvironment,
|
Proxy: http.ProxyFromEnvironment,
|
||||||
ResponseHeaderTimeout: time.Duration(conf.Timeout) * time.Second,
|
ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
TLSHandshakeTimeout: time.Duration(conf.Timeout) * time.Second,
|
TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
}
|
}
|
||||||
http2.ConfigureTransport(c.httpTransport)
|
err := http2.ConfigureTransport(c.httpTransport)
|
||||||
// Most CDNs require Cookie support to prevent DDoS attack
|
|
||||||
cookieJar, err := cookiejar.New(nil)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return err
|
||||||
}
|
}
|
||||||
c.httpClient = &http.Client{
|
c.httpClient = &http.Client{
|
||||||
Transport: c.httpTransport,
|
Transport: c.httpTransport,
|
||||||
Jar: cookieJar,
|
Jar: c.cookieJar,
|
||||||
}
|
}
|
||||||
return c, nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) Start() error {
|
func (c *Client) Start() error {
|
||||||
@@ -156,21 +180,21 @@ func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
|||||||
|
|
||||||
requestType := ""
|
requestType := ""
|
||||||
if len(c.conf.UpstreamIETF) == 0 {
|
if len(c.conf.UpstreamIETF) == 0 {
|
||||||
requestType = "application/x-www-form-urlencoded"
|
requestType = "application/dns-json"
|
||||||
} else if len(c.conf.UpstreamGoogle) == 0 {
|
} else if len(c.conf.UpstreamGoogle) == 0 {
|
||||||
requestType = "application/dns-udpwireformat"
|
requestType = "application/dns-udpwireformat"
|
||||||
} else {
|
} else {
|
||||||
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
|
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
|
||||||
random := rand.Intn(numServers)
|
random := rand.Intn(numServers)
|
||||||
if random < len(c.conf.UpstreamGoogle) {
|
if random < len(c.conf.UpstreamGoogle) {
|
||||||
requestType = "application/x-www-form-urlencoded"
|
requestType = "application/dns-json"
|
||||||
} else {
|
} else {
|
||||||
requestType = "application/dns-udpwireformat"
|
requestType = "application/dns-udpwireformat"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var req *DNSRequest
|
var req *DNSRequest
|
||||||
if requestType == "application/x-www-form-urlencoded" {
|
if requestType == "application/dns-json" {
|
||||||
req = c.generateRequestGoogle(w, r, isTCP)
|
req = c.generateRequestGoogle(w, r, isTCP)
|
||||||
} else if requestType == "application/dns-udpwireformat" {
|
} else if requestType == "application/dns-udpwireformat" {
|
||||||
req = c.generateRequestIETF(w, r, isTCP)
|
req = c.generateRequestIETF(w, r, isTCP)
|
||||||
@@ -189,7 +213,7 @@ func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
|||||||
} else if candidateType == "application/dns-udpwireformat" {
|
} else if candidateType == "application/dns-udpwireformat" {
|
||||||
contentType = "application/dns-udpwireformat"
|
contentType = "application/dns-udpwireformat"
|
||||||
} else {
|
} else {
|
||||||
if requestType == "application/x-www-form-urlencoded" {
|
if requestType == "application/dns-json" {
|
||||||
contentType = "application/json"
|
contentType = "application/json"
|
||||||
} else if requestType == "application/dns-udpwireformat" {
|
} else if requestType == "application/dns-udpwireformat" {
|
||||||
contentType = "application/dns-udpwireformat"
|
contentType = "application/dns-udpwireformat"
|
||||||
|
|||||||
@@ -35,6 +35,7 @@ type config struct {
|
|||||||
UpstreamIETF []string `toml:"upstream_ietf"`
|
UpstreamIETF []string `toml:"upstream_ietf"`
|
||||||
Bootstrap []string `toml:"bootstrap"`
|
Bootstrap []string `toml:"bootstrap"`
|
||||||
Timeout uint `toml:"timeout"`
|
Timeout uint `toml:"timeout"`
|
||||||
|
NoCookies bool `toml:"no_cookies"`
|
||||||
NoECS bool `toml:"no_ecs"`
|
NoECS bool `toml:"no_ecs"`
|
||||||
Verbose bool `toml:"verbose"`
|
Verbose bool `toml:"verbose"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,24 +4,56 @@ listen = "127.0.0.1:53"
|
|||||||
# HTTP path for upstream resolver
|
# HTTP path for upstream resolver
|
||||||
# If multiple servers are specified, a random one will be chosen each time.
|
# If multiple servers are specified, a random one will be chosen each time.
|
||||||
upstream_google = [
|
upstream_google = [
|
||||||
|
|
||||||
|
# Google's productive resolver, good ECS, bad DNSSEC
|
||||||
"https://dns.google.com/resolve",
|
"https://dns.google.com/resolve",
|
||||||
|
|
||||||
|
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
#"https://cloudflare-dns.com/dns-query",
|
||||||
|
|
||||||
]
|
]
|
||||||
upstream_ietf = [
|
upstream_ietf = [
|
||||||
|
|
||||||
|
# Google's experimental resolver, good ECS, good DNSSEC
|
||||||
#"https://dns.google.com/experimental",
|
#"https://dns.google.com/experimental",
|
||||||
|
|
||||||
|
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
#"https://cloudflare-dns.com/dns-query",
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
||||||
# Bootstrap DNS server to resolve the address of the upstream resolver
|
# Bootstrap DNS server to resolve the address of the upstream resolver
|
||||||
# If multiple servers are specified, a random one will be chosen each time.
|
# If multiple servers are specified, a random one will be chosen each time.
|
||||||
# If empty, use the system DNS settings.
|
# If empty, use the system DNS settings.
|
||||||
bootstrap = [
|
bootstrap = [
|
||||||
|
|
||||||
|
# Google's resolver, bad ECS, good DNSSEC
|
||||||
"8.8.8.8:53",
|
"8.8.8.8:53",
|
||||||
"8.8.4.4:53",
|
"8.8.4.4:53",
|
||||||
|
|
||||||
|
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
#"1.1.1.1:53",
|
||||||
|
#"1.0.0.1:53",
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
||||||
# Timeout for upstream request
|
# Timeout for upstream request
|
||||||
timeout = 10
|
timeout = 10
|
||||||
|
|
||||||
# Disable EDNS0-Client-Subnet, do not send client's IP address
|
# Disable HTTP Cookies
|
||||||
|
#
|
||||||
|
# Cookies may be useful if your upstream resolver is protected by some
|
||||||
|
# anti-DDoS services to identify clients.
|
||||||
|
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
||||||
|
# to track uesrs and is not controlled by doh-client.
|
||||||
|
no_cookies = false
|
||||||
|
|
||||||
|
# Disable EDNS0-Client-Subnet (ECS)
|
||||||
|
#
|
||||||
|
# DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of
|
||||||
|
# the client's IP address (/24 for IPv4, /48 for IPv6 by default) to the
|
||||||
|
# upstream server. This is useful for GeoDNS and CDNs to work, and is exactly
|
||||||
|
# the same configuration as most public DNS servers.
|
||||||
no_ecs = false
|
no_ecs = false
|
||||||
|
|
||||||
# Enable logging
|
# Enable logging
|
||||||
|
|||||||
@@ -66,7 +66,7 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
|
|
||||||
numServers := len(c.conf.UpstreamGoogle)
|
numServers := len(c.conf.UpstreamGoogle)
|
||||||
upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)]
|
upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)]
|
||||||
requestURL := fmt.Sprintf("%s?name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
requestURL := fmt.Sprintf("%s?ct=application/dns-json&name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
||||||
|
|
||||||
if r.CheckingDisabled {
|
if r.CheckingDisabled {
|
||||||
requestURL += "&cd=1"
|
requestURL += "&cd=1"
|
||||||
@@ -93,12 +93,17 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
}
|
}
|
||||||
req.Header.Set("Accept", "application/json, application/dns-udpwireformat")
|
req.Header.Set("Accept", "application/json, application/dns-udpwireformat")
|
||||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
||||||
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
|
c.httpClientMux.RUnlock()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
c.httpTransport.CloseIdleConnections()
|
err1 := c.newHTTPClient()
|
||||||
|
if err1 != nil {
|
||||||
|
log.Fatalln(err1)
|
||||||
|
}
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -154,12 +154,17 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
}
|
}
|
||||||
req.Header.Set("Accept", "application/dns-udpwireformat, application/json")
|
req.Header.Set("Accept", "application/dns-udpwireformat, application/json")
|
||||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
||||||
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
|
c.httpClientMux.RUnlock()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
c.httpTransport.CloseIdleConnections()
|
err1 := c.newHTTPClient()
|
||||||
|
if err1 != nil {
|
||||||
|
log.Fatalln(err1)
|
||||||
|
}
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -96,7 +96,7 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
|||||||
if contentType == "" {
|
if contentType == "" {
|
||||||
// Guess request Content-Type based on other parameters
|
// Guess request Content-Type based on other parameters
|
||||||
if r.FormValue("name") != "" {
|
if r.FormValue("name") != "" {
|
||||||
contentType = "application/x-www-form-urlencoded"
|
contentType = "application/dns-json"
|
||||||
} else if r.FormValue("dns") != "" {
|
} else if r.FormValue("dns") != "" {
|
||||||
contentType = "application/dns-udpwireformat"
|
contentType = "application/dns-udpwireformat"
|
||||||
}
|
}
|
||||||
@@ -114,7 +114,7 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
|||||||
}
|
}
|
||||||
if responseType == "" {
|
if responseType == "" {
|
||||||
// Guess response Content-Type based on request Content-Type
|
// Guess response Content-Type based on request Content-Type
|
||||||
if contentType == "application/x-www-form-urlencoded" {
|
if contentType == "application/dns-json" {
|
||||||
responseType = "application/json"
|
responseType = "application/json"
|
||||||
} else if contentType == "application/dns-udpwireformat" {
|
} else if contentType == "application/dns-udpwireformat" {
|
||||||
responseType = "application/dns-udpwireformat"
|
responseType = "application/dns-udpwireformat"
|
||||||
@@ -122,12 +122,12 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
var req *DNSRequest
|
var req *DNSRequest
|
||||||
if contentType == "application/x-www-form-urlencoded" {
|
if contentType == "application/dns-json" {
|
||||||
req = s.parseRequestGoogle(w, r)
|
req = s.parseRequestGoogle(w, r)
|
||||||
} else if contentType == "application/dns-udpwireformat" {
|
} else if contentType == "application/dns-udpwireformat" {
|
||||||
req = s.parseRequestIETF(w, r)
|
req = s.parseRequestIETF(w, r)
|
||||||
} else {
|
} else {
|
||||||
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 400)
|
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if req.errcode != 0 {
|
if req.errcode != 0 {
|
||||||
|
|||||||
16
launchd/Makefile
Normal file
16
launchd/Makefile
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
.PHONY: install uninstall
|
||||||
|
|
||||||
|
PREFIX = /usr/local
|
||||||
|
LAUNCHD_DIR = /Library/LaunchDaemons
|
||||||
|
|
||||||
|
install:
|
||||||
|
mkdir -p "$(DESTDIR)$(LAUNCHD_DIR)"
|
||||||
|
install -m0644 doh-client.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist"
|
||||||
|
install -m0644 doh-server.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"
|
||||||
|
@echo
|
||||||
|
@echo 'Note:'
|
||||||
|
@echo ' Use "sudo launchctl load $(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" to start doh-client,'
|
||||||
|
@echo ' use "sudo launchctl load -w $(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist" to enable doh-server.'
|
||||||
|
|
||||||
|
uninstall:
|
||||||
|
rm -f "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"
|
||||||
27
launchd/doh-client.plist
Normal file
27
launchd/doh-client.plist
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>Label</key>
|
||||||
|
<string>org.eu.starlab.doh.client</string>
|
||||||
|
<key>ProgramArguments</key>
|
||||||
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-client</string>
|
||||||
|
<string>-conf</string>
|
||||||
|
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
||||||
|
</array>
|
||||||
|
<key>RunAtLoad</key>
|
||||||
|
<true/>
|
||||||
|
<key>UserName</key>
|
||||||
|
<string>root</string>
|
||||||
|
<key>GroupName</key>
|
||||||
|
<string>wheel</string>
|
||||||
|
<key>KeepAlive</key>
|
||||||
|
<dict>
|
||||||
|
<key>SuccessfulExit</key>
|
||||||
|
<false/>
|
||||||
|
</dict>
|
||||||
|
<key>ThrottleInterval</key>
|
||||||
|
<integer>5</integer>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
29
launchd/doh-server.plist
Normal file
29
launchd/doh-server.plist
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>Label</key>
|
||||||
|
<string>org.eu.starlab.doh.server</string>
|
||||||
|
<key>ProgramArguments</key>
|
||||||
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-server</string>
|
||||||
|
<string>-conf</string>
|
||||||
|
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
||||||
|
</array>
|
||||||
|
<key>Disabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>RunAtLoad</key>
|
||||||
|
<true/>
|
||||||
|
<key>UserName</key>
|
||||||
|
<string>root</string>
|
||||||
|
<key>GroupName</key>
|
||||||
|
<string>wheel</string>
|
||||||
|
<key>KeepAlive</key>
|
||||||
|
<dict>
|
||||||
|
<key>SuccessfulExit</key>
|
||||||
|
<false/>
|
||||||
|
</dict>
|
||||||
|
<key>ThrottleInterval</key>
|
||||||
|
<integer>5</integer>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
@@ -1,6 +1,5 @@
|
|||||||
.PHONY: install uninstall
|
.PHONY: install uninstall
|
||||||
|
|
||||||
PREFIX = /usr/local
|
|
||||||
SYSTEMD_DIR = /usr/lib/systemd
|
SYSTEMD_DIR = /usr/lib/systemd
|
||||||
SYSTEMD_UNIT_DIR = $(SYSTEMD_DIR)/system
|
SYSTEMD_UNIT_DIR = $(SYSTEMD_DIR)/system
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user