mirror of
https://github.com/m13253/dns-over-https.git
synced 2026-03-31 14:05:38 +00:00
Compare commits
44 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
5ca6813801 | ||
|
|
033865e508 | ||
|
|
7e7cd1ee90 | ||
|
|
e19250dc99 | ||
|
|
a64df3f048 | ||
|
|
f54b49c090 | ||
|
|
87436b7cbf | ||
|
|
11056bcad5 | ||
|
|
ca33027e04 | ||
|
|
6ff0a6a9ab | ||
|
|
359c81a019 | ||
|
|
07143d5890 | ||
|
|
1d367cb7e7 | ||
|
|
b132de608f | ||
|
|
523b6120b9 | ||
|
|
82fe91395d | ||
|
|
06ce104d2a | ||
|
|
71b8c093c0 | ||
|
|
abdd033310 | ||
|
|
461d546082 | ||
|
|
51b065eed7 | ||
|
|
a58607dc3d | ||
|
|
cf94354b08 | ||
|
|
f2e3a642e3 | ||
|
|
88b3c95710 | ||
|
|
93b70f3941 | ||
|
|
76c40fb4dc | ||
|
|
174a465ac8 | ||
|
|
4cbe7c8c98 | ||
|
|
7839d2c7b1 | ||
|
|
c4b2236cf9 | ||
|
|
1b90731f20 | ||
|
|
20624acf20 | ||
|
|
01385b6d29 | ||
|
|
5afdee6315 | ||
|
|
874a3613e4 | ||
|
|
dc14a70e9d | ||
|
|
58e4018ab2 | ||
|
|
f4516429ee | ||
|
|
12df47f45f | ||
|
|
450c10a594 | ||
|
|
e7c4450787 | ||
|
|
bd5ef5d61e | ||
|
|
ff0e9529cb |
40
Changelog.md
40
Changelog.md
@@ -4,6 +4,46 @@ This Changelog records major changes between versions.
|
|||||||
|
|
||||||
Not all changes are recorded. Please check git log for details.
|
Not all changes are recorded. Please check git log for details.
|
||||||
|
|
||||||
|
## Version 1.3.8
|
||||||
|
|
||||||
|
- Workaround a bug causing Firefox 61-62 to reject responses with Content-Type = application/dns-message
|
||||||
|
- Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
- TransactionID is now preserved to maintain compatibility with some clients
|
||||||
|
- Turn on `no_cookies` by default according to the IETF draft
|
||||||
|
- Update Documentation
|
||||||
|
|
||||||
|
## Version 1.3.7
|
||||||
|
|
||||||
|
- Add CloudFlare DNS resolver for Tor to the preset
|
||||||
|
- It is now able to print upstream information if error happens
|
||||||
|
- Updated default configuration files are now installed to `*.conf.example`
|
||||||
|
- Workaround a bug causing Unbound to refuse returning anything about the root
|
||||||
|
- Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
|
||||||
|
## Version 1.3.6
|
||||||
|
|
||||||
|
- We have a logger for macOS platform now, so logs can be sent to Console.app
|
||||||
|
- Add an option to disable IPv6, this option is available to client only
|
||||||
|
|
||||||
|
## Version 1.3.5
|
||||||
|
|
||||||
|
- Limit the frequency of creating HTTP client on bad network condition
|
||||||
|
|
||||||
|
## Version 1.3.4
|
||||||
|
|
||||||
|
- doh-client now silently fails in case of network error to prevent caching of SERVFAIL
|
||||||
|
- EDNS0 is now inserted to the beginning of OPT section, to ensure DNSSEC signatures are at the end
|
||||||
|
- Improve building system
|
||||||
|
- Update documents
|
||||||
|
|
||||||
|
## Version 1.3.3
|
||||||
|
|
||||||
|
- Take User-Agent out of common library, that would be better for packaging
|
||||||
|
|
||||||
|
## Version 1.3.2
|
||||||
|
|
||||||
|
- Fix version string in HTTP User-Agent
|
||||||
|
|
||||||
## Version 1.3.1
|
## Version 1.3.1
|
||||||
|
|
||||||
- Fix the "address already in use" issue
|
- Fix the "address already in use" issue
|
||||||
|
|||||||
18
Makefile
18
Makefile
@@ -2,6 +2,7 @@
|
|||||||
|
|
||||||
GOBUILD=go build
|
GOBUILD=go build
|
||||||
GOGET=go get -d -v
|
GOGET=go get -d -v
|
||||||
|
GOGET_UPDATE=go get -d -u -v
|
||||||
PREFIX=/usr/local
|
PREFIX=/usr/local
|
||||||
ifeq ($(shell uname),Darwin)
|
ifeq ($(shell uname),Darwin)
|
||||||
CONFDIR=/usr/local/etc/dns-over-https
|
CONFDIR=/usr/local/etc/dns-over-https
|
||||||
@@ -10,9 +11,15 @@ else
|
|||||||
endif
|
endif
|
||||||
|
|
||||||
all: doh-client/doh-client doh-server/doh-server
|
all: doh-client/doh-client doh-server/doh-server
|
||||||
|
if [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper; \
|
||||||
|
fi
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f doh-client/doh-client doh-server/doh-server
|
rm -f doh-client/doh-client doh-server/doh-server
|
||||||
|
if [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper clean; \
|
||||||
|
fi
|
||||||
|
|
||||||
install:
|
install:
|
||||||
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
||||||
@@ -21,17 +28,20 @@ install:
|
|||||||
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
||||||
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||||
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
||||||
|
install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf.example"
|
||||||
|
install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf.example"
|
||||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
||||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
||||||
if [ "`uname`" = "Linux" ]; then \
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
||||||
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
||||||
elif [ "`uname`" = "Darwin" ]; then \
|
elif [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"; \
|
||||||
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
uninstall:
|
uninstall:
|
||||||
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server" "$(DESTDIR)$(CONFDIR)/doh-client.conf.example" "$(DESTDIR)$(CONFDIR)/doh-server.conf.example"
|
||||||
if [ "`uname`" = "Linux" ]; then \
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
@@ -40,10 +50,12 @@ uninstall:
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
deps:
|
deps:
|
||||||
|
@# I am not sure if it is the correct way to keep the common library updated
|
||||||
|
$(GOGET_UPDATE) github.com/m13253/dns-over-https/json-dns
|
||||||
$(GOGET) ./doh-client ./doh-server
|
$(GOGET) ./doh-client ./doh-server
|
||||||
|
|
||||||
doh-client/doh-client: deps doh-client/client.go doh-client/config.go doh-client/google.go doh-client/ietf.go doh-client/main.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
doh-client/doh-client: deps doh-client/client.go doh-client/config.go doh-client/google.go doh-client/ietf.go doh-client/main.go doh-client/version.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||||
cd doh-client && $(GOBUILD)
|
cd doh-client && $(GOBUILD)
|
||||||
|
|
||||||
doh-server/doh-server: deps doh-server/config.go doh-server/google.go doh-server/ietf.go doh-server/main.go doh-server/server.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
doh-server/doh-server: deps doh-server/config.go doh-server/google.go doh-server/ietf.go doh-server/main.go doh-server/server.go doh-server/version.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||||
cd doh-server && $(GOBUILD)
|
cd doh-server && $(GOBUILD)
|
||||||
|
|||||||
15
Readme.md
15
Readme.md
@@ -70,6 +70,9 @@ The following is a typical DNS-over-HTTPS architecture:
|
|||||||
Although DNS-over-HTTPS can work alone, a HTTP service muxer would be useful as
|
Although DNS-over-HTTPS can work alone, a HTTP service muxer would be useful as
|
||||||
you can host DNS-over-HTTPS along with other HTTPS services.
|
you can host DNS-over-HTTPS along with other HTTPS services.
|
||||||
|
|
||||||
|
HTTP/2 with at least TLS v1.3 is recommended. OCSP stapling must be enabled,
|
||||||
|
otherwise DNS recursion may happen.
|
||||||
|
|
||||||
## DNSSEC
|
## DNSSEC
|
||||||
|
|
||||||
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
||||||
@@ -90,8 +93,10 @@ EDNS0-Client-Subnet is affecting your privacy, you can set `no_ecs = true` in
|
|||||||
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
||||||
or software downloading speed.
|
or software downloading speed.
|
||||||
|
|
||||||
If your server is backed by `unbound` or `bind`, you probably want to enable
|
To ultilize ECS, `X-Forwarded-For` or `X-Real-IP` should be enabled on your
|
||||||
the EDNS0-Client-Subnet feature in their configuration files as well.
|
HTTP service muxer. If your server is backed by `unbound` or `bind`, you
|
||||||
|
probably want to configure it to enable the EDNS0-Client-Subnet feature as
|
||||||
|
well.
|
||||||
|
|
||||||
## Protocol compatibility
|
## Protocol compatibility
|
||||||
|
|
||||||
@@ -116,6 +121,12 @@ Currently supported features are:
|
|||||||
- [X] EDNS0 large UDP packet (4 KiB by default)
|
- [X] EDNS0 large UDP packet (4 KiB by default)
|
||||||
- [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
|
- [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
|
||||||
|
|
||||||
|
## The name of the project
|
||||||
|
|
||||||
|
This project is named "DNS-over-HTTPS" because it was written before the IETF DoH project. Although this project is compatible with IETF DoH, the project is not affiliated with IETF.
|
||||||
|
|
||||||
|
To avoid confusion, you may also call this project "m13253/DNS-over-HTTPS" or anything you like.
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
DNS-over-HTTPS is licensed under the [MIT License](LICENSE). You are encouraged
|
DNS-over-HTTPS is licensed under the [MIT License](LICENSE). You are encouraged
|
||||||
|
|||||||
19
darwin-wrapper/Makefile
Normal file
19
darwin-wrapper/Makefile
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
.PHONY: all clean install uninstall
|
||||||
|
|
||||||
|
SWIFTC = swiftc
|
||||||
|
PREFIX = /usr/local
|
||||||
|
|
||||||
|
all: doh-logger
|
||||||
|
|
||||||
|
doh-logger: doh-logger.swift
|
||||||
|
$(SWIFTC) -o $@ -O $<
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f doh-logger
|
||||||
|
|
||||||
|
install: doh-logger
|
||||||
|
mkdir -p $(DESTDIR)$(PREFIX)/bin
|
||||||
|
install -m0755 doh-logger $(DESTDIR)$(PREFIX)/bin
|
||||||
|
|
||||||
|
uninstall:
|
||||||
|
rm -f $(DESTDIR)$(PREFIX)/bin/doh-logger
|
||||||
94
darwin-wrapper/doh-logger.swift
Normal file
94
darwin-wrapper/doh-logger.swift
Normal file
@@ -0,0 +1,94 @@
|
|||||||
|
#!/usr/bin/swift
|
||||||
|
|
||||||
|
/*
|
||||||
|
DNS-over-HTTPS
|
||||||
|
Copyright (C) 2017-2018 Star Brilliant <m13253@hotmail.com>
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a
|
||||||
|
copy of this software and associated documentation files (the "Software"),
|
||||||
|
to deal in the Software without restriction, including without limitation
|
||||||
|
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||||
|
and/or sell copies of the Software, and to permit persons to whom the
|
||||||
|
Software is furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in
|
||||||
|
all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||||
|
DEALINGS IN THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
import Foundation
|
||||||
|
import os.log
|
||||||
|
|
||||||
|
if CommandLine.arguments.count < 3 {
|
||||||
|
let programName = CommandLine.arguments[0]
|
||||||
|
print("Usage: \(programName) LOG_NAME PROGRAM [ARGUMENTS]\n")
|
||||||
|
exit(1)
|
||||||
|
}
|
||||||
|
let logSubsystem = CommandLine.arguments[1]
|
||||||
|
let logger = OSLog(subsystem: logSubsystem, category: "default")
|
||||||
|
|
||||||
|
let pipe = Pipe()
|
||||||
|
var buffer = Data()
|
||||||
|
NotificationCenter.default.addObserver(forName: FileHandle.readCompletionNotification, object: pipe.fileHandleForReading, queue: nil) { notification in
|
||||||
|
let data = notification.userInfo?["NSFileHandleNotificationDataItem"] as? Data ?? Data()
|
||||||
|
buffer.append(data)
|
||||||
|
var lastIndex = 0
|
||||||
|
for (i, byte) in buffer.enumerated() {
|
||||||
|
if byte == 0x0a {
|
||||||
|
let line = String(data: buffer.subdata(in: lastIndex..<i), encoding: .utf8) ?? ""
|
||||||
|
print(line)
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
lastIndex = i + 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
buffer = buffer.subdata(in: lastIndex..<buffer.count)
|
||||||
|
if data.count == 0 && buffer.count != 0 {
|
||||||
|
let line = String(data: buffer, encoding: .utf8) ?? ""
|
||||||
|
print(line, terminator: "")
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
}
|
||||||
|
pipe.fileHandleForReading.readInBackgroundAndNotify()
|
||||||
|
}
|
||||||
|
pipe.fileHandleForReading.readInBackgroundAndNotify()
|
||||||
|
|
||||||
|
let process = Process()
|
||||||
|
process.arguments = Array(CommandLine.arguments[3...])
|
||||||
|
process.executableURL = URL(fileURLWithPath: CommandLine.arguments[2])
|
||||||
|
process.standardError = pipe.fileHandleForWriting
|
||||||
|
process.standardInput = FileHandle.standardInput
|
||||||
|
process.standardOutput = pipe.fileHandleForWriting
|
||||||
|
NotificationCenter.default.addObserver(forName: Process.didTerminateNotification, object: process, queue: nil) { notification in
|
||||||
|
if buffer.count != 0 {
|
||||||
|
let line = String(data: buffer, encoding: .utf8) ?? ""
|
||||||
|
print(line, terminator: "")
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
}
|
||||||
|
exit(process.terminationStatus)
|
||||||
|
}
|
||||||
|
|
||||||
|
let SIGINTSource = DispatchSource.makeSignalSource(signal: SIGINT)
|
||||||
|
let SIGTERMSource = DispatchSource.makeSignalSource(signal: SIGTERM)
|
||||||
|
SIGINTSource.setEventHandler(handler: process.interrupt)
|
||||||
|
SIGTERMSource.setEventHandler(handler: process.terminate)
|
||||||
|
signal(SIGINT, SIG_IGN)
|
||||||
|
signal(SIGTERM, SIG_IGN)
|
||||||
|
SIGINTSource.resume()
|
||||||
|
SIGTERMSource.resume()
|
||||||
|
|
||||||
|
do {
|
||||||
|
try process.run()
|
||||||
|
} catch {
|
||||||
|
let errorMessage = error.localizedDescription
|
||||||
|
print(errorMessage)
|
||||||
|
os_log("%{public}@", log: logger, type: .fault, errorMessage)
|
||||||
|
exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
RunLoop.current.run()
|
||||||
@@ -40,15 +40,16 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Client struct {
|
type Client struct {
|
||||||
conf *config
|
conf *config
|
||||||
bootstrap []string
|
bootstrap []string
|
||||||
udpServers []*dns.Server
|
udpServers []*dns.Server
|
||||||
tcpServers []*dns.Server
|
tcpServers []*dns.Server
|
||||||
bootstrapResolver *net.Resolver
|
bootstrapResolver *net.Resolver
|
||||||
cookieJar *cookiejar.Jar
|
cookieJar *cookiejar.Jar
|
||||||
httpClientMux *sync.RWMutex
|
httpClientMux *sync.RWMutex
|
||||||
httpTransport *http.Transport
|
httpTransport *http.Transport
|
||||||
httpClient *http.Client
|
httpClient *http.Client
|
||||||
|
httpClientLastCreate time.Time
|
||||||
}
|
}
|
||||||
|
|
||||||
type DNSRequest struct {
|
type DNSRequest struct {
|
||||||
@@ -57,6 +58,7 @@ type DNSRequest struct {
|
|||||||
udpSize uint16
|
udpSize uint16
|
||||||
ednsClientAddress net.IP
|
ednsClientAddress net.IP
|
||||||
ednsClientNetmask uint8
|
ednsClientNetmask uint8
|
||||||
|
currentUpstream string
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -65,19 +67,19 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
conf: conf,
|
conf: conf,
|
||||||
}
|
}
|
||||||
|
|
||||||
udpH := dns.HandlerFunc(c.udpHandlerFunc)
|
udpHandler := dns.HandlerFunc(c.udpHandlerFunc)
|
||||||
tcpH := dns.HandlerFunc(c.tcpHandlerFunc)
|
tcpHandler := dns.HandlerFunc(c.tcpHandlerFunc)
|
||||||
for _, addr := range conf.Listen {
|
for _, addr := range conf.Listen {
|
||||||
c.udpServers = append(c.udpServers, &dns.Server{
|
c.udpServers = append(c.udpServers, &dns.Server{
|
||||||
Addr: addr,
|
Addr: addr,
|
||||||
Net: "udp",
|
Net: "udp",
|
||||||
Handler: udpH,
|
Handler: udpHandler,
|
||||||
UDPSize: 4096,
|
UDPSize: dns.DefaultMsgSize,
|
||||||
})
|
})
|
||||||
c.tcpServers = append(c.tcpServers, &dns.Server{
|
c.tcpServers = append(c.tcpServers, &dns.Server{
|
||||||
Addr: addr,
|
Addr: addr,
|
||||||
Net: "tcp",
|
Net: "tcp",
|
||||||
Handler: tcpH,
|
Handler: tcpHandler,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
c.bootstrapResolver = net.DefaultResolver
|
c.bootstrapResolver = net.DefaultResolver
|
||||||
@@ -124,16 +126,20 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
func (c *Client) newHTTPClient() error {
|
func (c *Client) newHTTPClient() error {
|
||||||
c.httpClientMux.Lock()
|
c.httpClientMux.Lock()
|
||||||
defer c.httpClientMux.Unlock()
|
defer c.httpClientMux.Unlock()
|
||||||
|
if !c.httpClientLastCreate.IsZero() && time.Now().Sub(c.httpClientLastCreate) < time.Duration(c.conf.Timeout)*time.Second {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
if c.httpTransport != nil {
|
if c.httpTransport != nil {
|
||||||
c.httpTransport.CloseIdleConnections()
|
c.httpTransport.CloseIdleConnections()
|
||||||
}
|
}
|
||||||
|
dialer := &net.Dialer{
|
||||||
|
Timeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
|
KeepAlive: 30 * time.Second,
|
||||||
|
DualStack: true,
|
||||||
|
Resolver: c.bootstrapResolver,
|
||||||
|
}
|
||||||
c.httpTransport = &http.Transport{
|
c.httpTransport = &http.Transport{
|
||||||
DialContext: (&net.Dialer{
|
DialContext: dialer.DialContext,
|
||||||
Timeout: time.Duration(c.conf.Timeout) * time.Second,
|
|
||||||
KeepAlive: 30 * time.Second,
|
|
||||||
DualStack: true,
|
|
||||||
Resolver: c.bootstrapResolver,
|
|
||||||
}).DialContext,
|
|
||||||
ExpectContinueTimeout: 1 * time.Second,
|
ExpectContinueTimeout: 1 * time.Second,
|
||||||
IdleConnTimeout: 90 * time.Second,
|
IdleConnTimeout: 90 * time.Second,
|
||||||
MaxIdleConns: 100,
|
MaxIdleConns: 100,
|
||||||
@@ -142,6 +148,14 @@ func (c *Client) newHTTPClient() error {
|
|||||||
ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
||||||
}
|
}
|
||||||
|
if c.conf.NoIPv6 {
|
||||||
|
c.httpTransport.DialContext = func(ctx context.Context, network, address string) (net.Conn, error) {
|
||||||
|
if strings.HasPrefix(network, "tcp") {
|
||||||
|
network = "tcp4"
|
||||||
|
}
|
||||||
|
return dialer.DialContext(ctx, network, address)
|
||||||
|
}
|
||||||
|
}
|
||||||
err := http2.ConfigureTransport(c.httpTransport)
|
err := http2.ConfigureTransport(c.httpTransport)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -150,6 +164,7 @@ func (c *Client) newHTTPClient() error {
|
|||||||
Transport: c.httpTransport,
|
Transport: c.httpTransport,
|
||||||
Jar: c.cookieJar,
|
Jar: c.cookieJar,
|
||||||
}
|
}
|
||||||
|
c.httpClientLastCreate = time.Now()
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -37,6 +37,7 @@ type config struct {
|
|||||||
Timeout uint `toml:"timeout"`
|
Timeout uint `toml:"timeout"`
|
||||||
NoCookies bool `toml:"no_cookies"`
|
NoCookies bool `toml:"no_cookies"`
|
||||||
NoECS bool `toml:"no_ecs"`
|
NoECS bool `toml:"no_ecs"`
|
||||||
|
NoIPv6 bool `toml:"no_ipv6"`
|
||||||
Verbose bool `toml:"verbose"`
|
Verbose bool `toml:"verbose"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -16,6 +16,11 @@ upstream_google = [
|
|||||||
#"https://1.1.1.1/dns-query",
|
#"https://1.1.1.1/dns-query",
|
||||||
#"https://1.0.0.1/dns-query",
|
#"https://1.0.0.1/dns-query",
|
||||||
|
|
||||||
|
# CloudFlare's resolver for Tor, available only with Tor
|
||||||
|
# Remember to disable ECS below when using Tor!
|
||||||
|
# Blog: https://blog.cloudflare.com/welcome-hidden-resolver/
|
||||||
|
#"https://dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion/dns-query",
|
||||||
|
|
||||||
]
|
]
|
||||||
upstream_ietf = [
|
upstream_ietf = [
|
||||||
|
|
||||||
@@ -27,6 +32,11 @@ upstream_ietf = [
|
|||||||
#"https://1.1.1.1/dns-query",
|
#"https://1.1.1.1/dns-query",
|
||||||
#"https://1.0.0.1/dns-query",
|
#"https://1.0.0.1/dns-query",
|
||||||
|
|
||||||
|
# CloudFlare's resolver for Tor, available only with Tor
|
||||||
|
# Remember to disable ECS below when using Tor!
|
||||||
|
# Blog: https://blog.cloudflare.com/welcome-hidden-resolver/
|
||||||
|
#"https://dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion/dns-query",
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
||||||
# Bootstrap DNS server to resolve the address of the upstream resolver
|
# Bootstrap DNS server to resolve the address of the upstream resolver
|
||||||
@@ -47,7 +57,7 @@ bootstrap = [
|
|||||||
]
|
]
|
||||||
|
|
||||||
# Timeout for upstream request
|
# Timeout for upstream request
|
||||||
timeout = 10
|
timeout = 30
|
||||||
|
|
||||||
# Disable HTTP Cookies
|
# Disable HTTP Cookies
|
||||||
#
|
#
|
||||||
@@ -55,7 +65,7 @@ timeout = 10
|
|||||||
# anti-DDoS services to identify clients.
|
# anti-DDoS services to identify clients.
|
||||||
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
||||||
# to track uesrs and is not controlled by doh-client.
|
# to track uesrs and is not controlled by doh-client.
|
||||||
no_cookies = false
|
no_cookies = true
|
||||||
|
|
||||||
# Disable EDNS0-Client-Subnet (ECS)
|
# Disable EDNS0-Client-Subnet (ECS)
|
||||||
#
|
#
|
||||||
@@ -65,5 +75,13 @@ no_cookies = false
|
|||||||
# the same configuration as most public DNS servers.
|
# the same configuration as most public DNS servers.
|
||||||
no_ecs = false
|
no_ecs = false
|
||||||
|
|
||||||
|
# Disable IPv6 when querying upstream
|
||||||
|
#
|
||||||
|
# Only enable this if you really have trouble connecting.
|
||||||
|
# Doh-client uses both IPv4 and IPv6 by default and should not have problems
|
||||||
|
# with an IPv4-only environment.
|
||||||
|
# Note that DNS listening and bootstrapping is not controlled by this option.
|
||||||
|
no_ipv6 = false
|
||||||
|
|
||||||
# Enable logging
|
# Enable logging
|
||||||
verbose = false
|
verbose = false
|
||||||
|
|||||||
@@ -51,8 +51,7 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
question := &r.Question[0]
|
question := &r.Question[0]
|
||||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
questionName := question.Name
|
||||||
questionName := strings.ToLower(question.Name)
|
|
||||||
questionType := ""
|
questionType := ""
|
||||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||||
questionType = qtype
|
questionType = qtype
|
||||||
@@ -92,7 +91,7 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
req.Header.Set("Accept", "application/json, application/dns-message, application/dns-udpwireformat")
|
req.Header.Set("Accept", "application/json, application/dns-message, application/dns-udpwireformat")
|
||||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
req.Header.Set("User-Agent", USER_AGENT)
|
||||||
c.httpClientMux.RLock()
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
c.httpClientMux.RUnlock()
|
c.httpClientMux.RUnlock()
|
||||||
@@ -115,12 +114,13 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
udpSize: udpSize,
|
udpSize: udpSize,
|
||||||
ednsClientAddress: ednsClientAddress,
|
ednsClientAddress: ednsClientAddress,
|
||||||
ednsClientNetmask: ednsClientNetmask,
|
ednsClientNetmask: ednsClientNetmask,
|
||||||
|
currentUpstream: upstream,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) parseResponseGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
func (c *Client) parseResponseGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||||
if req.response.StatusCode != 200 {
|
if req.response.StatusCode != 200 {
|
||||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
log.Printf("HTTP error from upstream %s: %s\n", req.currentUpstream, req.response.Status)
|
||||||
req.reply.Rcode = dns.RcodeServerFailure
|
req.reply.Rcode = dns.RcodeServerFailure
|
||||||
contentType := req.response.Header.Get("Content-Type")
|
contentType := req.response.Header.Get("Content-Type")
|
||||||
if contentType != "application/json" && !strings.HasPrefix(contentType, "application/json;") {
|
if contentType != "application/json" && !strings.HasPrefix(contentType, "application/json;") {
|
||||||
|
|||||||
@@ -53,8 +53,7 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
}
|
}
|
||||||
|
|
||||||
question := &r.Question[0]
|
question := &r.Question[0]
|
||||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
questionName := question.Name
|
||||||
questionName := strings.ToLower(question.Name)
|
|
||||||
questionType := ""
|
questionType := ""
|
||||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||||
questionType = qtype
|
questionType = qtype
|
||||||
@@ -73,9 +72,9 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
opt = new(dns.OPT)
|
opt = new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(false)
|
opt.SetDo(false)
|
||||||
r.Extra = append(r.Extra, opt)
|
r.Extra = append([]dns.RR{opt}, r.Extra...)
|
||||||
} else {
|
} else {
|
||||||
udpSize = opt.UDPSize()
|
udpSize = opt.UDPSize()
|
||||||
}
|
}
|
||||||
@@ -134,9 +133,8 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
if len(requestURL) < 2048 {
|
if len(requestURL) < 2048 {
|
||||||
req, err = http.NewRequest("GET", requestURL, nil)
|
req, err = http.NewRequest("GET", requestURL, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// Do not respond, silently fail to prevent caching of SERVFAIL
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
|
||||||
w.WriteMsg(reply)
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
@@ -144,9 +142,8 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
} else {
|
} else {
|
||||||
req, err = http.NewRequest("POST", upstream, bytes.NewReader(requestBinary))
|
req, err = http.NewRequest("POST", upstream, bytes.NewReader(requestBinary))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// Do not respond, silently fail to prevent caching of SERVFAIL
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
|
||||||
w.WriteMsg(reply)
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
@@ -154,7 +151,7 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
req.Header.Set("Content-Type", "application/dns-message")
|
req.Header.Set("Content-Type", "application/dns-message")
|
||||||
}
|
}
|
||||||
req.Header.Set("Accept", "application/dns-message, application/dns-udpwireformat, application/json")
|
req.Header.Set("Accept", "application/dns-message, application/dns-udpwireformat, application/json")
|
||||||
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
req.Header.Set("User-Agent", USER_AGENT)
|
||||||
c.httpClientMux.RLock()
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
c.httpClientMux.RUnlock()
|
c.httpClientMux.RUnlock()
|
||||||
@@ -177,12 +174,13 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
udpSize: udpSize,
|
udpSize: udpSize,
|
||||||
ednsClientAddress: ednsClientAddress,
|
ednsClientAddress: ednsClientAddress,
|
||||||
ednsClientNetmask: ednsClientNetmask,
|
ednsClientNetmask: ednsClientNetmask,
|
||||||
|
currentUpstream: upstream,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) parseResponseIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
func (c *Client) parseResponseIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||||
if req.response.StatusCode != 200 {
|
if req.response.StatusCode != 200 {
|
||||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
log.Printf("HTTP error from upstream %s: %s\n", req.currentUpstream, req.response.Status)
|
||||||
req.reply.Rcode = dns.RcodeServerFailure
|
req.reply.Rcode = dns.RcodeServerFailure
|
||||||
contentType := req.response.Header.Get("Content-Type")
|
contentType := req.response.Header.Get("Content-Type")
|
||||||
if contentType != "application/dns-message" && !strings.HasPrefix(contentType, "application/dns-message;") {
|
if contentType != "application/dns-message" && !strings.HasPrefix(contentType, "application/dns-message;") {
|
||||||
|
|||||||
29
doh-client/version.go
Normal file
29
doh-client/version.go
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
/*
|
||||||
|
DNS-over-HTTPS
|
||||||
|
Copyright (C) 2017-2018 Star Brilliant <m13253@hotmail.com>
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a
|
||||||
|
copy of this software and associated documentation files (the "Software"),
|
||||||
|
to deal in the Software without restriction, including without limitation
|
||||||
|
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||||
|
and/or sell copies of the Software, and to permit persons to whom the
|
||||||
|
Software is furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in
|
||||||
|
all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||||
|
DEALINGS IN THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
const (
|
||||||
|
VERSION = "1.3.8"
|
||||||
|
USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
||||||
|
)
|
||||||
@@ -5,9 +5,14 @@ listen = [
|
|||||||
]
|
]
|
||||||
|
|
||||||
# TLS certification file
|
# TLS certification file
|
||||||
|
# If left empty, plain-text HTTP will be used.
|
||||||
|
# Please be informed that this program does not do OCSP Stapling, which is
|
||||||
|
# necessary for some clients to bootstrap itself.
|
||||||
|
# You are recommended to use a server load balancer (Caddy, Nginx) and set up
|
||||||
|
# TLS there.
|
||||||
cert = ""
|
cert = ""
|
||||||
|
|
||||||
# TLS key file
|
# TLS private key file
|
||||||
key = ""
|
key = ""
|
||||||
|
|
||||||
# HTTP path for resolve application
|
# HTTP path for resolve application
|
||||||
|
|||||||
@@ -46,7 +46,6 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
errtext: "Invalid argument value: \"name\"",
|
errtext: "Invalid argument value: \"name\"",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
name = strings.ToLower(name)
|
|
||||||
if punycode, err := idna.ToASCII(name); err == nil {
|
if punycode, err := idna.ToASCII(name); err == nil {
|
||||||
name = punycode
|
name = punycode
|
||||||
} else {
|
} else {
|
||||||
@@ -150,7 +149,7 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
opt := new(dns.OPT)
|
opt := new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(true)
|
opt.SetDo(true)
|
||||||
if ednsClientAddress != nil {
|
if ednsClientAddress != nil {
|
||||||
edns0Subnet := new(dns.EDNS0_SUBNET)
|
edns0Subnet := new(dns.EDNS0_SUBNET)
|
||||||
@@ -182,6 +181,7 @@ func (s *Server) generateResponseGoogle(w http.ResponseWriter, r *http.Request,
|
|||||||
now := time.Now().UTC().Format(http.TimeFormat)
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
w.Header().Set("Date", now)
|
w.Header().Set("Date", now)
|
||||||
w.Header().Set("Last-Modified", now)
|
w.Header().Set("Last-Modified", now)
|
||||||
|
w.Header().Set("Vary", "Accept")
|
||||||
if respJSON.HaveTTL {
|
if respJSON.HaveTTL {
|
||||||
if req.isTailored {
|
if req.isTailored {
|
||||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||||
|
|||||||
@@ -24,12 +24,14 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/m13253/dns-over-https/json-dns"
|
"github.com/m13253/dns-over-https/json-dns"
|
||||||
@@ -60,6 +62,13 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
errtext: fmt.Sprintf("Invalid argument value: \"dns\""),
|
errtext: fmt.Sprintf("Invalid argument value: \"dns\""),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if s.patchDNSCryptProxyReqID(w, r, requestBinary) {
|
||||||
|
return &DNSRequest{
|
||||||
|
errcode: 444,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
msg := new(dns.Msg)
|
msg := new(dns.Msg)
|
||||||
err = msg.Unpack(requestBinary)
|
err = msg.Unpack(requestBinary)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -87,15 +96,16 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", r.RemoteAddr, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", r.RemoteAddr, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
transactionID := msg.Id
|
||||||
msg.Id = dns.Id()
|
msg.Id = dns.Id()
|
||||||
opt := msg.IsEdns0()
|
opt := msg.IsEdns0()
|
||||||
if opt == nil {
|
if opt == nil {
|
||||||
opt = new(dns.OPT)
|
opt = new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(false)
|
opt.SetDo(false)
|
||||||
msg.Extra = append(msg.Extra, opt)
|
msg.Extra = append([]dns.RR{opt}, msg.Extra...)
|
||||||
}
|
}
|
||||||
var edns0Subnet *dns.EDNS0_SUBNET
|
var edns0Subnet *dns.EDNS0_SUBNET
|
||||||
for _, option := range opt.Option {
|
for _, option := range opt.Option {
|
||||||
@@ -129,14 +139,15 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
}
|
}
|
||||||
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
request: msg,
|
request: msg,
|
||||||
isTailored: isTailored,
|
transactionID: transactionID,
|
||||||
|
isTailored: isTailored,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
||||||
respJSON := jsonDNS.Marshal(req.response)
|
respJSON := jsonDNS.Marshal(req.response)
|
||||||
req.response.Id = 0
|
req.response.Id = req.transactionID
|
||||||
respBytes, err := req.response.Pack()
|
respBytes, err := req.response.Pack()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
@@ -148,6 +159,10 @@ func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, re
|
|||||||
now := time.Now().UTC().Format(http.TimeFormat)
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
w.Header().Set("Date", now)
|
w.Header().Set("Date", now)
|
||||||
w.Header().Set("Last-Modified", now)
|
w.Header().Set("Last-Modified", now)
|
||||||
|
w.Header().Set("Vary", "Accept")
|
||||||
|
|
||||||
|
_ = s.patchFirefoxContentType(w, r, req)
|
||||||
|
|
||||||
if respJSON.HaveTTL {
|
if respJSON.HaveTTL {
|
||||||
if req.isTailored {
|
if req.isTailored {
|
||||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
||||||
@@ -156,8 +171,35 @@ func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, re
|
|||||||
}
|
}
|
||||||
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
||||||
}
|
}
|
||||||
|
|
||||||
if respJSON.Status == dns.RcodeServerFailure {
|
if respJSON.Status == dns.RcodeServerFailure {
|
||||||
w.WriteHeader(503)
|
w.WriteHeader(503)
|
||||||
}
|
}
|
||||||
w.Write(respBytes)
|
w.Write(respBytes)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
func (s *Server) patchDNSCryptProxyReqID(w http.ResponseWriter, r *http.Request, requestBinary []byte) bool {
|
||||||
|
if strings.Contains(r.UserAgent(), "dnscrypt-proxy") && bytes.Equal(requestBinary, []byte("\xca\xfe\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01\x00\x00\x02\x00\x01\x00\x00\x29\x10\x00\x00\x00\x80\x00\x00\x00")) {
|
||||||
|
log.Println("DNSCrypt-Proxy detected. Patching response.")
|
||||||
|
w.Header().Set("Content-Type", "application/dns-message")
|
||||||
|
w.Header().Set("Vary", "Accept, User-Agent")
|
||||||
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
|
w.Header().Set("Date", now)
|
||||||
|
w.Write([]byte("\xca\xfe\x81\x05\x00\x01\x00\x01\x00\x00\x00\x00\x00\x00\x02\x00\x01\x00\x00\x10\x00\x01\x00\x00\x00\x00\x00\xa8\xa7\r\nWorkaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe\r\nRefer to https://github.com/jedisct1/dnscrypt-proxy/issues/526 for details."))
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Workaround a bug causing Firefox 61-62 to reject responses with Content-Type = application/dns-message
|
||||||
|
func (s *Server) patchFirefoxContentType(w http.ResponseWriter, r *http.Request, req *DNSRequest) bool {
|
||||||
|
if strings.Contains(r.UserAgent(), "Firefox") && strings.Contains(r.Header.Get("Accept"), "application/dns-udpwireformat") && !strings.Contains(r.Header.Get("Accept"), "application/dns-message") {
|
||||||
|
log.Println("Firefox 61-62 detected. Patching response.")
|
||||||
|
w.Header().Set("Content-Type", "application/dns-udpwireformat")
|
||||||
|
w.Header().Set("Vary", "Accept, User-Agent")
|
||||||
|
req.isTailored = true
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|||||||
@@ -46,11 +46,13 @@ type Server struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type DNSRequest struct {
|
type DNSRequest struct {
|
||||||
request *dns.Msg
|
request *dns.Msg
|
||||||
response *dns.Msg
|
response *dns.Msg
|
||||||
isTailored bool
|
transactionID uint16
|
||||||
errcode int
|
currentUpstream string
|
||||||
errtext string
|
isTailored bool
|
||||||
|
errcode int
|
||||||
|
errtext string
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(conf *config) (s *Server) {
|
func NewServer(conf *config) (s *Server) {
|
||||||
@@ -58,6 +60,7 @@ func NewServer(conf *config) (s *Server) {
|
|||||||
conf: conf,
|
conf: conf,
|
||||||
udpClient: &dns.Client{
|
udpClient: &dns.Client{
|
||||||
Net: "udp",
|
Net: "udp",
|
||||||
|
UDPSize: dns.DefaultMsgSize,
|
||||||
Timeout: time.Duration(conf.Timeout) * time.Second,
|
Timeout: time.Duration(conf.Timeout) * time.Second,
|
||||||
},
|
},
|
||||||
tcpClient: &dns.Client{
|
tcpClient: &dns.Client{
|
||||||
@@ -102,8 +105,8 @@ func (s *Server) Start() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
||||||
w.Header().Set("Server", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
w.Header().Set("Server", USER_AGENT)
|
||||||
w.Header().Set("X-Powered-By", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
|
w.Header().Set("X-Powered-By", USER_AGENT)
|
||||||
|
|
||||||
if r.Form == nil {
|
if r.Form == nil {
|
||||||
const maxMemory = 32 << 20 // 32 MB
|
const maxMemory = 32 << 20 // 32 MB
|
||||||
@@ -157,13 +160,18 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
|||||||
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
if req.errcode == 444 {
|
||||||
|
return
|
||||||
|
}
|
||||||
if req.errcode != 0 {
|
if req.errcode != 0 {
|
||||||
jsonDNS.FormatError(w, req.errtext, req.errcode)
|
jsonDNS.FormatError(w, req.errtext, req.errcode)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
req = s.patchRootRD(req)
|
||||||
|
|
||||||
var err error
|
var err error
|
||||||
req.response, err = s.doDNSQuery(req.request)
|
req, err = s.doDNSQuery(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
jsonDNS.FormatError(w, fmt.Sprintf("DNS query failure (%s)", err.Error()), 503)
|
jsonDNS.FormatError(w, fmt.Sprintf("DNS query failure (%s)", err.Error()), 503)
|
||||||
return
|
return
|
||||||
@@ -207,23 +215,33 @@ func (s *Server) findClientIP(r *http.Request) net.IP {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) doDNSQuery(msg *dns.Msg) (resp *dns.Msg, err error) {
|
// Workaround a bug causing Unbound to refuse returning anything about the root
|
||||||
|
func (s *Server) patchRootRD(req *DNSRequest) *DNSRequest {
|
||||||
|
for _, question := range req.request.Question {
|
||||||
|
if question.Name == "." {
|
||||||
|
req.request.RecursionDesired = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return req
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) doDNSQuery(req *DNSRequest) (resp *DNSRequest, err error) {
|
||||||
numServers := len(s.conf.Upstream)
|
numServers := len(s.conf.Upstream)
|
||||||
for i := uint(0); i < s.conf.Tries; i++ {
|
for i := uint(0); i < s.conf.Tries; i++ {
|
||||||
server := s.conf.Upstream[rand.Intn(numServers)]
|
req.currentUpstream = s.conf.Upstream[rand.Intn(numServers)]
|
||||||
if !s.conf.TCPOnly {
|
if !s.conf.TCPOnly {
|
||||||
resp, _, err = s.udpClient.Exchange(msg, server)
|
req.response, _, err = s.udpClient.Exchange(req.request, req.currentUpstream)
|
||||||
if err == dns.ErrTruncated {
|
if err == dns.ErrTruncated {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
resp, _, err = s.tcpClient.Exchange(msg, server)
|
req.response, _, err = s.tcpClient.Exchange(req.request, req.currentUpstream)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
resp, _, err = s.tcpClient.Exchange(msg, server)
|
req.response, _, err = s.tcpClient.Exchange(req.request, req.currentUpstream)
|
||||||
}
|
}
|
||||||
if err == nil {
|
if err == nil {
|
||||||
return
|
return req, nil
|
||||||
}
|
}
|
||||||
log.Println(err)
|
log.Printf("DNS error from upstream %s: %s\n", req.currentUpstream, err.Error())
|
||||||
}
|
}
|
||||||
return
|
return req, err
|
||||||
}
|
}
|
||||||
|
|||||||
29
doh-server/version.go
Normal file
29
doh-server/version.go
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
/*
|
||||||
|
DNS-over-HTTPS
|
||||||
|
Copyright (C) 2017-2018 Star Brilliant <m13253@hotmail.com>
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a
|
||||||
|
copy of this software and associated documentation files (the "Software"),
|
||||||
|
to deal in the Software without restriction, including without limitation
|
||||||
|
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||||
|
and/or sell copies of the Software, and to permit persons to whom the
|
||||||
|
Software is furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in
|
||||||
|
all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||||
|
DEALINGS IN THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
const (
|
||||||
|
VERSION = "1.3.8"
|
||||||
|
USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
||||||
|
)
|
||||||
@@ -6,6 +6,8 @@
|
|||||||
<string>org.eu.starlab.doh.client</string>
|
<string>org.eu.starlab.doh.client</string>
|
||||||
<key>ProgramArguments</key>
|
<key>ProgramArguments</key>
|
||||||
<array>
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-logger</string>
|
||||||
|
<string>doh-client</string>
|
||||||
<string>/usr/local/bin/doh-client</string>
|
<string>/usr/local/bin/doh-client</string>
|
||||||
<string>-conf</string>
|
<string>-conf</string>
|
||||||
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
||||||
|
|||||||
@@ -6,6 +6,8 @@
|
|||||||
<string>org.eu.starlab.doh.server</string>
|
<string>org.eu.starlab.doh.server</string>
|
||||||
<key>ProgramArguments</key>
|
<key>ProgramArguments</key>
|
||||||
<array>
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-logger</string>
|
||||||
|
<string>doh-server</string>
|
||||||
<string>/usr/local/bin/doh-server</string>
|
<string>/usr/local/bin/doh-server</string>
|
||||||
<string>-conf</string>
|
<string>-conf</string>
|
||||||
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
||||||
|
|||||||
Reference in New Issue
Block a user