mirror of
https://github.com/m13253/dns-over-https.git
synced 2026-03-31 22:45:40 +00:00
Compare commits
101 Commits
v1.3.3
...
jamesits/p
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
9985c4b279 | ||
|
|
97a27e60e1 | ||
|
|
ca14db8929 | ||
|
|
a95e3e5f39 | ||
|
|
5010a16458 | ||
|
|
2332d9b7c1 | ||
|
|
7f5a23584f | ||
|
|
17e5848178 | ||
|
|
475894baaa | ||
|
|
2df81db465 | ||
|
|
871604f577 | ||
|
|
a400f03960 | ||
|
|
7839eed014 | ||
|
|
0f35971118 | ||
|
|
fec1e84d5e | ||
|
|
8f2004d1de | ||
|
|
a3f4468325 | ||
|
|
fa2bcf74a9 | ||
|
|
01d60df9cd | ||
|
|
4c0cae7111 | ||
|
|
95fe3e3b4e | ||
|
|
35ddf43505 | ||
|
|
3083b668ca | ||
|
|
dd8ea973f4 | ||
|
|
0df0002e6b | ||
|
|
3affb2c227 | ||
|
|
7c7b7d969d | ||
|
|
4754aa0414 | ||
|
|
2d9c9eba50 | ||
|
|
c51be0e69c | ||
|
|
95ec839409 | ||
|
|
502fe6b048 | ||
|
|
f8b40c4bfc | ||
|
|
bb1e21778a | ||
|
|
afa0d563d0 | ||
|
|
017a18f20c | ||
|
|
0577ff6dca | ||
|
|
ef2c6bbdc8 | ||
|
|
4d742bd15e | ||
|
|
3b112b946e | ||
|
|
6d19cbb9ad | ||
|
|
b094a8d4fd | ||
|
|
c1f6fe1997 | ||
|
|
1fb3ed3513 | ||
|
|
c85ef45840 | ||
|
|
85d81d3d0b | ||
|
|
ab0eddb0ba | ||
|
|
aa3389b1d0 | ||
|
|
6eb7b29142 | ||
|
|
ea0a769389 | ||
|
|
e480251e67 | ||
|
|
027480afeb | ||
|
|
4839498ad5 | ||
|
|
a303c21036 | ||
|
|
3586688aa6 | ||
|
|
ffe5573552 | ||
|
|
f40116b1f8 | ||
|
|
58e6cdfb71 | ||
|
|
1491138f69 | ||
|
|
83df8964d8 | ||
|
|
07f39088d4 | ||
|
|
db007fbded | ||
|
|
89d809d469 | ||
|
|
5ca6813801 | ||
|
|
033865e508 | ||
|
|
7e7cd1ee90 | ||
|
|
e19250dc99 | ||
|
|
a64df3f048 | ||
|
|
f54b49c090 | ||
|
|
87436b7cbf | ||
|
|
11056bcad5 | ||
|
|
ca33027e04 | ||
|
|
6ff0a6a9ab | ||
|
|
359c81a019 | ||
|
|
07143d5890 | ||
|
|
1d367cb7e7 | ||
|
|
b132de608f | ||
|
|
523b6120b9 | ||
|
|
82fe91395d | ||
|
|
06ce104d2a | ||
|
|
71b8c093c0 | ||
|
|
abdd033310 | ||
|
|
461d546082 | ||
|
|
51b065eed7 | ||
|
|
a58607dc3d | ||
|
|
cf94354b08 | ||
|
|
f2e3a642e3 | ||
|
|
88b3c95710 | ||
|
|
93b70f3941 | ||
|
|
76c40fb4dc | ||
|
|
174a465ac8 | ||
|
|
4cbe7c8c98 | ||
|
|
7839d2c7b1 | ||
|
|
c4b2236cf9 | ||
|
|
1b90731f20 | ||
|
|
20624acf20 | ||
|
|
01385b6d29 | ||
|
|
5afdee6315 | ||
|
|
874a3613e4 | ||
|
|
dc14a70e9d | ||
|
|
58e4018ab2 |
3
.gitignore
vendored
3
.gitignore
vendored
@@ -3,6 +3,7 @@
|
|||||||
*.dll
|
*.dll
|
||||||
*.so
|
*.so
|
||||||
*.dylib
|
*.dylib
|
||||||
|
build/
|
||||||
|
|
||||||
# Test binary, build with `go test -c`
|
# Test binary, build with `go test -c`
|
||||||
*.test
|
*.test
|
||||||
@@ -12,3 +13,5 @@
|
|||||||
|
|
||||||
# Project-local glide cache, RE: https://github.com/Masterminds/glide/issues/736
|
# Project-local glide cache, RE: https://github.com/Masterminds/glide/issues/736
|
||||||
.glide/
|
.glide/
|
||||||
|
|
||||||
|
.idea/
|
||||||
|
|||||||
70
Changelog.md
70
Changelog.md
@@ -4,6 +4,76 @@ This Changelog records major changes between versions.
|
|||||||
|
|
||||||
Not all changes are recorded. Please check git log for details.
|
Not all changes are recorded. Please check git log for details.
|
||||||
|
|
||||||
|
## Version 2.0.1
|
||||||
|
|
||||||
|
- Fix a crash with the random load balancing algorithm.
|
||||||
|
|
||||||
|
## Version 2.0.0
|
||||||
|
|
||||||
|
**This is a breaking change!** Please update the configuration file after upgrading.
|
||||||
|
|
||||||
|
- Implemented two upstream server selector algorithms: `weighted_round_robin` and `lvs_weighted_round_robin`.
|
||||||
|
- Add a configuration option for doh-server: `log_guessed_client_ip`.
|
||||||
|
|
||||||
|
## Version 1.4.2
|
||||||
|
|
||||||
|
- Add PID file feature for systems which lacks a cgroup-based process tracker.
|
||||||
|
- Remove dns.ErrTruncated according to <https://github.com/miekg/dns/pull/815>.
|
||||||
|
|
||||||
|
## Version 1.4.1
|
||||||
|
|
||||||
|
- Add a configuration option: `debug_http_headers` (e.g. Add `CF-Ray` to diagnose Cloudflare's resolver)
|
||||||
|
- Add a configuration option: `passrthrough`
|
||||||
|
- macOS logger is rebuilt with static libswiftCore
|
||||||
|
- Fix HTTP stream leaking problem, which may cause massive half-open connections if HTTP/1 is in use
|
||||||
|
- Utilize Go's cancelable context to detect timeouts more reliably.
|
||||||
|
- Fix interoperation problems with gDNS
|
||||||
|
- CORS is enabled by default in doh-server
|
||||||
|
- Documentation updates
|
||||||
|
|
||||||
|
## Version 1.3.10
|
||||||
|
|
||||||
|
- Enable application/dns-message (draft-13) by default, since Google has finally supported it
|
||||||
|
|
||||||
|
## Version 1.3.9
|
||||||
|
|
||||||
|
- Fix client crash with `no_cookies = true`
|
||||||
|
- Add 5380 as an additional default doh-client port
|
||||||
|
- If `$GOROOT` is defined, Makefile now respects the value for the convenience of Debian/Ubuntu users
|
||||||
|
- Change the ECS prefix length from /48 to /56 for IPv6, per RFC 7871
|
||||||
|
|
||||||
|
## Version 1.3.8
|
||||||
|
|
||||||
|
- Workaround a bug causing Firefox 61-62 to reject responses with Content-Type = application/dns-message
|
||||||
|
- Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
- TransactionID is now preserved to maintain compatibility with some clients
|
||||||
|
- Turn on `no_cookies` by default according to the IETF draft
|
||||||
|
- Update Documentation
|
||||||
|
|
||||||
|
## Version 1.3.7
|
||||||
|
|
||||||
|
- Add CloudFlare DNS resolver for Tor to the preset
|
||||||
|
- It is now able to print upstream information if error happens
|
||||||
|
- Updated default configuration files are now installed to `*.conf.example`
|
||||||
|
- Workaround a bug causing Unbound to refuse returning anything about the root
|
||||||
|
- Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
|
||||||
|
## Version 1.3.6
|
||||||
|
|
||||||
|
- We have a logger for macOS platform now, so logs can be sent to Console.app
|
||||||
|
- Add an option to disable IPv6, this option is available to client only
|
||||||
|
|
||||||
|
## Version 1.3.5
|
||||||
|
|
||||||
|
- Limit the frequency of creating HTTP client on bad network condition
|
||||||
|
|
||||||
|
## Version 1.3.4
|
||||||
|
|
||||||
|
- doh-client now silently fails in case of network error to prevent caching of SERVFAIL
|
||||||
|
- EDNS0 is now inserted to the beginning of OPT section, to ensure DNSSEC signatures are at the end
|
||||||
|
- Improve building system
|
||||||
|
- Update documents
|
||||||
|
|
||||||
## Version 1.3.3
|
## Version 1.3.3
|
||||||
|
|
||||||
- Take User-Agent out of common library, that would be better for packaging
|
- Take User-Agent out of common library, that would be better for packaging
|
||||||
|
|||||||
37
Makefile
37
Makefile
@@ -1,19 +1,33 @@
|
|||||||
.PHONY: all clean install uninstall deps
|
.PHONY: all clean install uninstall deps
|
||||||
|
|
||||||
GOBUILD=go build
|
PREFIX = /usr/local
|
||||||
GOGET=go get -d -v
|
|
||||||
GOGET_UPDATE=go get -d -u -v
|
ifeq ($(GOROOT),)
|
||||||
PREFIX=/usr/local
|
GOBUILD = go build
|
||||||
ifeq ($(shell uname),Darwin)
|
GOGET = go get -d -v
|
||||||
CONFDIR=/usr/local/etc/dns-over-https
|
GOGET_UPDATE = go get -d -u -v
|
||||||
else
|
else
|
||||||
CONFDIR=/etc/dns-over-https
|
GOBUILD = $(GOROOT)/bin/go build
|
||||||
|
GOGET = $(GOROOT)/bin/go get -d -v
|
||||||
|
GOGET_UPDATE = $(GOROOT)/bin/go get -d -u -v
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifeq ($(shell uname),Darwin)
|
||||||
|
CONFDIR = /usr/local/etc/dns-over-https
|
||||||
|
else
|
||||||
|
CONFDIR = /etc/dns-over-https
|
||||||
endif
|
endif
|
||||||
|
|
||||||
all: doh-client/doh-client doh-server/doh-server
|
all: doh-client/doh-client doh-server/doh-server
|
||||||
|
if [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper; \
|
||||||
|
fi
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f doh-client/doh-client doh-server/doh-server
|
rm -f doh-client/doh-client doh-server/doh-server
|
||||||
|
if [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper clean; \
|
||||||
|
fi
|
||||||
|
|
||||||
install:
|
install:
|
||||||
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
[ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
|
||||||
@@ -22,17 +36,20 @@ install:
|
|||||||
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
|
||||||
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
||||||
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
mkdir -p "$(DESTDIR)$(CONFDIR)/"
|
||||||
|
install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf.example"
|
||||||
|
install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf.example"
|
||||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
|
||||||
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
|
||||||
if [ "`uname`" = "Linux" ]; then \
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
|
||||||
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
|
||||||
elif [ "`uname`" = "Darwin" ]; then \
|
elif [ "`uname`" = "Darwin" ]; then \
|
||||||
|
$(MAKE) -C darwin-wrapper install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)"; \
|
||||||
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
uninstall:
|
uninstall:
|
||||||
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
|
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server" "$(DESTDIR)$(CONFDIR)/doh-client.conf.example" "$(DESTDIR)$(CONFDIR)/doh-server.conf.example"
|
||||||
if [ "`uname`" = "Linux" ]; then \
|
if [ "`uname`" = "Linux" ]; then \
|
||||||
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
|
||||||
@@ -45,8 +62,8 @@ deps:
|
|||||||
$(GOGET_UPDATE) github.com/m13253/dns-over-https/json-dns
|
$(GOGET_UPDATE) github.com/m13253/dns-over-https/json-dns
|
||||||
$(GOGET) ./doh-client ./doh-server
|
$(GOGET) ./doh-client ./doh-server
|
||||||
|
|
||||||
doh-client/doh-client: deps doh-client/client.go doh-client/config.go doh-client/google.go doh-client/ietf.go doh-client/main.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
doh-client/doh-client: deps doh-client/client.go doh-client/config/config.go doh-client/google.go doh-client/ietf.go doh-client/main.go doh-client/version.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||||
cd doh-client && $(GOBUILD)
|
cd doh-client && $(GOBUILD)
|
||||||
|
|
||||||
doh-server/doh-server: deps doh-server/config.go doh-server/google.go doh-server/ietf.go doh-server/main.go doh-server/server.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
doh-server/doh-server: deps doh-server/config.go doh-server/google.go doh-server/ietf.go doh-server/main.go doh-server/server.go doh-server/version.go json-dns/error.go json-dns/globalip.go json-dns/marshal.go json-dns/response.go json-dns/unmarshal.go
|
||||||
cd doh-server && $(GOBUILD)
|
cd doh-server && $(GOBUILD)
|
||||||
|
|||||||
37
Readme.md
37
Readme.md
@@ -2,11 +2,17 @@ DNS-over-HTTPS
|
|||||||
==============
|
==============
|
||||||
|
|
||||||
Client and server software to query DNS over HTTPS, using [Google DNS-over-HTTPS protocol](https://developers.google.com/speed/public-dns/docs/dns-over-https)
|
Client and server software to query DNS over HTTPS, using [Google DNS-over-HTTPS protocol](https://developers.google.com/speed/public-dns/docs/dns-over-https)
|
||||||
and [draft-ietf-doh-dns-over-https](https://github.com/dohwg/draft-ietf-doh-dns-over-https).
|
and [IETF DNS-over-HTTPS (RFC 8484)](https://www.rfc-editor.org/rfc/rfc8484.txt).
|
||||||
|
|
||||||
## Easy start
|
## Guide
|
||||||
|
|
||||||
Install [Go](https://golang.org), at least version 1.9.
|
[Tutorial to setup your own DNS-over-HTTPS (DoH) server](https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/). (Thanks to Antoine Aflalo)
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
Install [Go](https://golang.org), at least version 1.10.
|
||||||
|
|
||||||
|
(Note for Debian/Ubuntu users: You need to set `$GOROOT` if you could not get your new version of Go selected by the Makefile.)
|
||||||
|
|
||||||
First create an empty directory, used for `$GOPATH`:
|
First create an empty directory, used for `$GOPATH`:
|
||||||
|
|
||||||
@@ -70,6 +76,9 @@ The following is a typical DNS-over-HTTPS architecture:
|
|||||||
Although DNS-over-HTTPS can work alone, a HTTP service muxer would be useful as
|
Although DNS-over-HTTPS can work alone, a HTTP service muxer would be useful as
|
||||||
you can host DNS-over-HTTPS along with other HTTPS services.
|
you can host DNS-over-HTTPS along with other HTTPS services.
|
||||||
|
|
||||||
|
HTTP/2 with at least TLS v1.3 is recommended. OCSP stapling must be enabled,
|
||||||
|
otherwise DNS recursion may happen.
|
||||||
|
|
||||||
## DNSSEC
|
## DNSSEC
|
||||||
|
|
||||||
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
|
||||||
@@ -80,7 +89,7 @@ records.
|
|||||||
## EDNS0-Client-Subnet (GeoDNS)
|
## EDNS0-Client-Subnet (GeoDNS)
|
||||||
|
|
||||||
DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of the
|
DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of the
|
||||||
client's IP address (/24 for IPv4, /48 for IPv6 by default) to the upstream
|
client's IP address (/24 for IPv4, /56 for IPv6 by default) to the upstream
|
||||||
server. This is useful for GeoDNS and CDNs to work, and is exactly the same
|
server. This is useful for GeoDNS and CDNs to work, and is exactly the same
|
||||||
configuration as most public DNS servers.
|
configuration as most public DNS servers.
|
||||||
|
|
||||||
@@ -90,8 +99,10 @@ EDNS0-Client-Subnet is affecting your privacy, you can set `no_ecs = true` in
|
|||||||
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
|
||||||
or software downloading speed.
|
or software downloading speed.
|
||||||
|
|
||||||
If your server is backed by `unbound` or `bind`, you probably want to enable
|
To ultilize ECS, `X-Forwarded-For` or `X-Real-IP` should be enabled on your
|
||||||
the EDNS0-Client-Subnet feature in their configuration files as well.
|
HTTP service muxer. If your server is backed by `unbound` or `bind`, you
|
||||||
|
probably want to configure it to enable the EDNS0-Client-Subnet feature as
|
||||||
|
well.
|
||||||
|
|
||||||
## Protocol compatibility
|
## Protocol compatibility
|
||||||
|
|
||||||
@@ -102,11 +113,9 @@ except for absolute expire time is preferred to relative TTL value. Refer to
|
|||||||
[json-dns/response.go](json-dns/response.go) for a complete description of the
|
[json-dns/response.go](json-dns/response.go) for a complete description of the
|
||||||
API.
|
API.
|
||||||
|
|
||||||
### IETF DNS-over-HTTPS Protocol (Draft)
|
### IETF DNS-over-HTTPS Protocol
|
||||||
|
|
||||||
DNS-over-HTTPS uses a protocol compatible to [draft-ietf-doh-dns-over-https](https://github.com/dohwg/draft-ietf-doh-dns-over-https).
|
DNS-over-HTTPS uses a protocol compatible to [IETF DNS-over-HTTPS (RFC 8484)](https://www.rfc-editor.org/rfc/rfc8484.txt).
|
||||||
This protocol is in draft stage. Any incompatibility may be introduced before
|
|
||||||
it is finished.
|
|
||||||
|
|
||||||
### Supported features
|
### Supported features
|
||||||
|
|
||||||
@@ -114,7 +123,13 @@ Currently supported features are:
|
|||||||
|
|
||||||
- [X] IPv4 / IPv6
|
- [X] IPv4 / IPv6
|
||||||
- [X] EDNS0 large UDP packet (4 KiB by default)
|
- [X] EDNS0 large UDP packet (4 KiB by default)
|
||||||
- [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
|
- [X] EDNS0-Client-Subnet (/24 for IPv4, /56 for IPv6 by default)
|
||||||
|
|
||||||
|
## The name of the project
|
||||||
|
|
||||||
|
This project is named "DNS-over-HTTPS" because it was written before the IETF DoH project. Although this project is compatible with IETF DoH, the project is not affiliated with IETF.
|
||||||
|
|
||||||
|
To avoid confusion, you may also call this project "m13253/DNS-over-HTTPS" or anything you like.
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
|
|||||||
173
contrib/package.sh
Executable file
173
contrib/package.sh
Executable file
@@ -0,0 +1,173 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
# This is a script used for automated packaging.
|
||||||
|
# Debian maintainers please don't use this.
|
||||||
|
#
|
||||||
|
# Environment assumption:
|
||||||
|
# * Ubuntu 16.04
|
||||||
|
# * run with normal user
|
||||||
|
# * sudo with no password
|
||||||
|
# * go and fpm is pre-installed
|
||||||
|
# * rpmbuild is required if you need rpm packages
|
||||||
|
#
|
||||||
|
# Compatible with Azure DevOps hosted Ubuntu 16.04 agent
|
||||||
|
|
||||||
|
export DEBIAN_FRONTEND="noninteractive"
|
||||||
|
export DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"/..
|
||||||
|
export BUILD_BINARIESDIRECTORY="${BUILD_BINARIESDIRECTORY:-${DIR}/build/bin}"
|
||||||
|
export BUILD_ARTIFACTSTAGINGDIRECTORY="${BUILD_ARTIFACTSTAGINGDIRECTORY:-${DIR}/build/packages}"
|
||||||
|
export TMP_DIRECTORY="/tmp/dohbuild"
|
||||||
|
export GOPATH="${GOPATH:-/tmp/go}"
|
||||||
|
export GOBIN="${GOBIN:-/tmp/go/bin}"
|
||||||
|
|
||||||
|
function prepare_env() {
|
||||||
|
echo "Checking dependencies"
|
||||||
|
|
||||||
|
if ! [ -x "$(command -v go)" ]; then
|
||||||
|
echo "Please install golang"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -x "$(command -v apt-get)" ]; then
|
||||||
|
sudo apt-get -y update
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! [ -x "$(command -v rpmbuild)" ]; then
|
||||||
|
# TODO: correctly install rpmbuild
|
||||||
|
! sudo apt-get -y install rpmbuild
|
||||||
|
fi
|
||||||
|
|
||||||
|
# if ! [ -x "$(command -v upx)" ]; then
|
||||||
|
# sudo apt-get -y install upx
|
||||||
|
# fi
|
||||||
|
|
||||||
|
echo "Creating directories"
|
||||||
|
|
||||||
|
mkdir -p "${BUILD_BINARIESDIRECTORY}/nm-dispatcher"
|
||||||
|
mkdir -p "${BUILD_BINARIESDIRECTORY}/launchd"
|
||||||
|
mkdir -p "${BUILD_BINARIESDIRECTORY}/systemd"
|
||||||
|
mkdir -p "${BUILD_BINARIESDIRECTORY}/config"
|
||||||
|
mkdir -p "${BUILD_ARTIFACTSTAGINGDIRECTORY}"
|
||||||
|
mkdir -p "${TMP_DIRECTORY}"
|
||||||
|
}
|
||||||
|
|
||||||
|
function build_common() {
|
||||||
|
cp NetworkManager/dispatcher.d/* "${BUILD_BINARIESDIRECTORY}"/nm-dispatcher
|
||||||
|
cp launchd/*.plist "${BUILD_BINARIESDIRECTORY}"/launchd
|
||||||
|
cp systemd/*.service "${BUILD_BINARIESDIRECTORY}"/systemd
|
||||||
|
cp doh-server/doh-server.conf "${BUILD_BINARIESDIRECTORY}"/config
|
||||||
|
cp doh-client/doh-client.conf "${BUILD_BINARIESDIRECTORY}"/config
|
||||||
|
}
|
||||||
|
|
||||||
|
# used to get version
|
||||||
|
function build_native() {
|
||||||
|
echo "Building a native binary..."
|
||||||
|
|
||||||
|
go build -ldflags="-s -w" -o ${BUILD_BINARIESDIRECTORY}/"${EXE}"-native
|
||||||
|
}
|
||||||
|
|
||||||
|
function build() {
|
||||||
|
echo "Building ${EXE} for OS=$1 ARCH=$2"
|
||||||
|
env GOOS="$1" GOARCH="$2" go build -ldflags="-s -w" -o ${BUILD_BINARIESDIRECTORY}/"${EXE}"-"$3"
|
||||||
|
|
||||||
|
# echo "Compressing executable"
|
||||||
|
# ! upx --ultra-brute ${BUILD_BINARIESDIRECTORY}/${EXE}-"$3" || true
|
||||||
|
}
|
||||||
|
|
||||||
|
function package() {
|
||||||
|
VERSION=$("${BUILD_BINARIESDIRECTORY}/${EXE}-native" --version | head -n 1 | cut -d" " -f2)
|
||||||
|
REVISION=$(git log --pretty=format:'%h' -n 1)
|
||||||
|
|
||||||
|
echo "Packaging ${EXE} ${VERSION} for OS=$1 ARCH=$2 TYPE=$3 DST=$4"
|
||||||
|
|
||||||
|
! rm -rf "${TMP_DIRECTORY}"/*
|
||||||
|
|
||||||
|
mkdir -p "${TMP_DIRECTORY}"/usr/bin
|
||||||
|
cp "${BUILD_BINARIESDIRECTORY}"/"${EXE}"-"$3" "${TMP_DIRECTORY}"/usr/bin/"${EXE}"
|
||||||
|
|
||||||
|
mkdir -p "${TMP_DIRECTORY}"/usr/lib/systemd/system
|
||||||
|
cp "${BUILD_BINARIESDIRECTORY}"/systemd/"${EXE}".service "${TMP_DIRECTORY}"/usr/lib/systemd/system
|
||||||
|
|
||||||
|
mkdir -p "${TMP_DIRECTORY}"/etc/dns-over-https
|
||||||
|
cp "${BUILD_BINARIESDIRECTORY}"/config/"${EXE}".conf "${TMP_DIRECTORY}"/etc/dns-over-https
|
||||||
|
|
||||||
|
mkdir -p "${TMP_DIRECTORY}"/etc/NetworkManager/dispatcher.d
|
||||||
|
cp "${BUILD_BINARIESDIRECTORY}"/nm-dispatcher/"${EXE}" "${TMP_DIRECTORY}"/etc/NetworkManager/dispatcher.d
|
||||||
|
|
||||||
|
# call fpm
|
||||||
|
fpm --input-type dir \
|
||||||
|
--output-type $4 \
|
||||||
|
--chdir "${TMP_DIRECTORY}" \
|
||||||
|
--package "${BUILD_ARTIFACTSTAGINGDIRECTORY}" \
|
||||||
|
--name "${EXE}" \
|
||||||
|
--description "${DESCR}" \
|
||||||
|
--version "${VERSION}" \
|
||||||
|
--iteration "${REVISION}" \
|
||||||
|
--url "https://github.com/m13253/dns-over-https" \
|
||||||
|
--vendor "Star Brilliant <coder@poorlab.com>" \
|
||||||
|
--license "MIT License" \
|
||||||
|
--category "net" \
|
||||||
|
--maintainer "James Swineson <autopkg@public.swineson.me>" \
|
||||||
|
--architecture "$2" \
|
||||||
|
--force \
|
||||||
|
.
|
||||||
|
}
|
||||||
|
|
||||||
|
cd "${DIR}"/..
|
||||||
|
prepare_env
|
||||||
|
make deps
|
||||||
|
build_common
|
||||||
|
|
||||||
|
pushd doh-server
|
||||||
|
export EXE="doh-server"
|
||||||
|
export DESCR="DNS-over-HTTPS Server"
|
||||||
|
|
||||||
|
build_native
|
||||||
|
|
||||||
|
build linux amd64 linux-amd64
|
||||||
|
package linux amd64 linux-amd64 deb
|
||||||
|
! package linux amd64 linux-amd64 rpm
|
||||||
|
package linux amd64 linux-amd64 pacman
|
||||||
|
|
||||||
|
build linux arm linux-armhf
|
||||||
|
package linux arm linux-armhf deb
|
||||||
|
! package linux arm linux-armhf rpm
|
||||||
|
package linux arm linux-armhf pacman
|
||||||
|
|
||||||
|
build linux arm64 linux-arm64
|
||||||
|
package linux arm64 linux-arm64 deb
|
||||||
|
! package linux arm64 linux-arm64 rpm
|
||||||
|
package linux arm64 linux-arm64 pacman
|
||||||
|
|
||||||
|
# build darwin amd64 darwin-amd64
|
||||||
|
# build windows 386 windows-x86.exe
|
||||||
|
# build windows amd64 windows-amd64.exe
|
||||||
|
popd
|
||||||
|
|
||||||
|
pushd doh-client
|
||||||
|
export EXE="doh-client"
|
||||||
|
export DESCR="DNS-over-HTTPS Client"
|
||||||
|
|
||||||
|
build_native
|
||||||
|
|
||||||
|
build linux amd64 linux-amd64
|
||||||
|
package linux amd64 linux-amd64 deb
|
||||||
|
! package linux amd64 linux-amd64 rpm
|
||||||
|
package linux amd64 linux-amd64 pacman
|
||||||
|
|
||||||
|
build linux arm linux-armhf
|
||||||
|
package linux arm linux-armhf deb
|
||||||
|
! package linux arm linux-armhf rpm
|
||||||
|
package linux arm linux-armhf pacman
|
||||||
|
|
||||||
|
build linux arm64 linux-arm64
|
||||||
|
package linux arm64 linux-arm64 deb
|
||||||
|
! package linux arm64 linux-arm64 rpm
|
||||||
|
package linux arm64 linux-arm64 pacman
|
||||||
|
|
||||||
|
# build darwin amd64 darwin-amd64
|
||||||
|
# build windows 386 windows-x86.exe
|
||||||
|
# build windows amd64 windows-amd64.exe
|
||||||
|
popd
|
||||||
|
|
||||||
19
darwin-wrapper/Makefile
Normal file
19
darwin-wrapper/Makefile
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
.PHONY: all clean install uninstall
|
||||||
|
|
||||||
|
SWIFTC = swiftc
|
||||||
|
PREFIX = /usr/local
|
||||||
|
|
||||||
|
all: doh-logger
|
||||||
|
|
||||||
|
doh-logger: doh-logger.swift
|
||||||
|
$(SWIFTC) -o $@ -O -static-stdlib $<
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f doh-logger
|
||||||
|
|
||||||
|
install: doh-logger
|
||||||
|
mkdir -p $(DESTDIR)$(PREFIX)/bin
|
||||||
|
install -m0755 doh-logger $(DESTDIR)$(PREFIX)/bin
|
||||||
|
|
||||||
|
uninstall:
|
||||||
|
rm -f $(DESTDIR)$(PREFIX)/bin/doh-logger
|
||||||
94
darwin-wrapper/doh-logger.swift
Normal file
94
darwin-wrapper/doh-logger.swift
Normal file
@@ -0,0 +1,94 @@
|
|||||||
|
#!/usr/bin/swift
|
||||||
|
|
||||||
|
/*
|
||||||
|
DNS-over-HTTPS
|
||||||
|
Copyright (C) 2017-2018 Star Brilliant <m13253@hotmail.com>
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a
|
||||||
|
copy of this software and associated documentation files (the "Software"),
|
||||||
|
to deal in the Software without restriction, including without limitation
|
||||||
|
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||||
|
and/or sell copies of the Software, and to permit persons to whom the
|
||||||
|
Software is furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in
|
||||||
|
all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||||
|
DEALINGS IN THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
import Foundation
|
||||||
|
import os.log
|
||||||
|
|
||||||
|
if CommandLine.arguments.count < 3 {
|
||||||
|
let programName = CommandLine.arguments[0]
|
||||||
|
print("Usage: \(programName) LOG_NAME PROGRAM [ARGUMENTS]\n")
|
||||||
|
exit(1)
|
||||||
|
}
|
||||||
|
let logSubsystem = CommandLine.arguments[1]
|
||||||
|
let logger = OSLog(subsystem: logSubsystem, category: "default")
|
||||||
|
|
||||||
|
let pipe = Pipe()
|
||||||
|
var buffer = Data()
|
||||||
|
NotificationCenter.default.addObserver(forName: FileHandle.readCompletionNotification, object: pipe.fileHandleForReading, queue: nil) { notification in
|
||||||
|
let data = notification.userInfo?["NSFileHandleNotificationDataItem"] as? Data ?? Data()
|
||||||
|
buffer.append(data)
|
||||||
|
var lastIndex = 0
|
||||||
|
for (i, byte) in buffer.enumerated() {
|
||||||
|
if byte == 0x0a {
|
||||||
|
let line = String(data: buffer.subdata(in: lastIndex..<i), encoding: .utf8) ?? ""
|
||||||
|
print(line)
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
lastIndex = i + 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
buffer = buffer.subdata(in: lastIndex..<buffer.count)
|
||||||
|
if data.count == 0 && buffer.count != 0 {
|
||||||
|
let line = String(data: buffer, encoding: .utf8) ?? ""
|
||||||
|
print(line, terminator: "")
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
}
|
||||||
|
pipe.fileHandleForReading.readInBackgroundAndNotify()
|
||||||
|
}
|
||||||
|
pipe.fileHandleForReading.readInBackgroundAndNotify()
|
||||||
|
|
||||||
|
let process = Process()
|
||||||
|
process.arguments = Array(CommandLine.arguments[3...])
|
||||||
|
process.executableURL = URL(fileURLWithPath: CommandLine.arguments[2])
|
||||||
|
process.standardError = pipe.fileHandleForWriting
|
||||||
|
process.standardInput = FileHandle.standardInput
|
||||||
|
process.standardOutput = pipe.fileHandleForWriting
|
||||||
|
NotificationCenter.default.addObserver(forName: Process.didTerminateNotification, object: process, queue: nil) { notification in
|
||||||
|
if buffer.count != 0 {
|
||||||
|
let line = String(data: buffer, encoding: .utf8) ?? ""
|
||||||
|
print(line, terminator: "")
|
||||||
|
os_log("%{public}@", log: logger, line)
|
||||||
|
}
|
||||||
|
exit(process.terminationStatus)
|
||||||
|
}
|
||||||
|
|
||||||
|
let SIGINTSource = DispatchSource.makeSignalSource(signal: SIGINT)
|
||||||
|
let SIGTERMSource = DispatchSource.makeSignalSource(signal: SIGTERM)
|
||||||
|
SIGINTSource.setEventHandler(handler: process.interrupt)
|
||||||
|
SIGTERMSource.setEventHandler(handler: process.terminate)
|
||||||
|
signal(SIGINT, SIG_IGN)
|
||||||
|
signal(SIGTERM, SIG_IGN)
|
||||||
|
SIGINTSource.resume()
|
||||||
|
SIGTERMSource.resume()
|
||||||
|
|
||||||
|
do {
|
||||||
|
try process.run()
|
||||||
|
} catch {
|
||||||
|
let errorMessage = error.localizedDescription
|
||||||
|
print(errorMessage)
|
||||||
|
os_log("%{public}@", log: logger, type: .fault, errorMessage)
|
||||||
|
exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
RunLoop.current.run()
|
||||||
@@ -25,30 +25,41 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/cookiejar"
|
"net/http/cookiejar"
|
||||||
|
"net/url"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/m13253/dns-over-https/doh-client/config"
|
||||||
|
"github.com/m13253/dns-over-https/doh-client/selector"
|
||||||
"github.com/m13253/dns-over-https/json-dns"
|
"github.com/m13253/dns-over-https/json-dns"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
"golang.org/x/net/http2"
|
"golang.org/x/net/http2"
|
||||||
|
"golang.org/x/net/idna"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Client struct {
|
type Client struct {
|
||||||
conf *config
|
conf *config.Config
|
||||||
bootstrap []string
|
bootstrap []string
|
||||||
udpServers []*dns.Server
|
passthrough []string
|
||||||
tcpServers []*dns.Server
|
udpClient *dns.Client
|
||||||
bootstrapResolver *net.Resolver
|
tcpClient *dns.Client
|
||||||
cookieJar *cookiejar.Jar
|
udpServers []*dns.Server
|
||||||
httpClientMux *sync.RWMutex
|
tcpServers []*dns.Server
|
||||||
httpTransport *http.Transport
|
bootstrapResolver *net.Resolver
|
||||||
httpClient *http.Client
|
cookieJar http.CookieJar
|
||||||
|
httpClientMux *sync.RWMutex
|
||||||
|
httpTransport *http.Transport
|
||||||
|
httpClient *http.Client
|
||||||
|
httpClientLastCreate time.Time
|
||||||
|
selector selector.Selector
|
||||||
}
|
}
|
||||||
|
|
||||||
type DNSRequest struct {
|
type DNSRequest struct {
|
||||||
@@ -57,33 +68,43 @@ type DNSRequest struct {
|
|||||||
udpSize uint16
|
udpSize uint16
|
||||||
ednsClientAddress net.IP
|
ednsClientAddress net.IP
|
||||||
ednsClientNetmask uint8
|
ednsClientNetmask uint8
|
||||||
|
currentUpstream string
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewClient(conf *config) (c *Client, err error) {
|
func NewClient(conf *config.Config) (c *Client, err error) {
|
||||||
c = &Client{
|
c = &Client{
|
||||||
conf: conf,
|
conf: conf,
|
||||||
}
|
}
|
||||||
|
|
||||||
udpH := dns.HandlerFunc(c.udpHandlerFunc)
|
udpHandler := dns.HandlerFunc(c.udpHandlerFunc)
|
||||||
tcpH := dns.HandlerFunc(c.tcpHandlerFunc)
|
tcpHandler := dns.HandlerFunc(c.tcpHandlerFunc)
|
||||||
|
c.udpClient = &dns.Client{
|
||||||
|
Net: "udp",
|
||||||
|
UDPSize: dns.DefaultMsgSize,
|
||||||
|
Timeout: time.Duration(conf.Other.Timeout) * time.Second,
|
||||||
|
}
|
||||||
|
c.tcpClient = &dns.Client{
|
||||||
|
Net: "tcp",
|
||||||
|
Timeout: time.Duration(conf.Other.Timeout) * time.Second,
|
||||||
|
}
|
||||||
for _, addr := range conf.Listen {
|
for _, addr := range conf.Listen {
|
||||||
c.udpServers = append(c.udpServers, &dns.Server{
|
c.udpServers = append(c.udpServers, &dns.Server{
|
||||||
Addr: addr,
|
Addr: addr,
|
||||||
Net: "udp",
|
Net: "udp",
|
||||||
Handler: udpH,
|
Handler: udpHandler,
|
||||||
UDPSize: 4096,
|
UDPSize: dns.DefaultMsgSize,
|
||||||
})
|
})
|
||||||
c.tcpServers = append(c.tcpServers, &dns.Server{
|
c.tcpServers = append(c.tcpServers, &dns.Server{
|
||||||
Addr: addr,
|
Addr: addr,
|
||||||
Net: "tcp",
|
Net: "tcp",
|
||||||
Handler: tcpH,
|
Handler: tcpHandler,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
c.bootstrapResolver = net.DefaultResolver
|
c.bootstrapResolver = net.DefaultResolver
|
||||||
if len(conf.Bootstrap) != 0 {
|
if len(conf.Other.Bootstrap) != 0 {
|
||||||
c.bootstrap = make([]string, len(conf.Bootstrap))
|
c.bootstrap = make([]string, len(conf.Other.Bootstrap))
|
||||||
for i, bootstrap := range conf.Bootstrap {
|
for i, bootstrap := range conf.Other.Bootstrap {
|
||||||
bootstrapAddr, err := net.ResolveUDPAddr("udp", bootstrap)
|
bootstrapAddr, err := net.ResolveUDPAddr("udp", bootstrap)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
bootstrapAddr, err = net.ResolveUDPAddr("udp", "["+bootstrap+"]:53")
|
bootstrapAddr, err = net.ResolveUDPAddr("udp", "["+bootstrap+"]:53")
|
||||||
@@ -103,44 +124,137 @@ func NewClient(conf *config) (c *Client, err error) {
|
|||||||
return conn, err
|
return conn, err
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
if len(conf.Other.Passthrough) != 0 {
|
||||||
|
c.passthrough = make([]string, len(conf.Other.Passthrough))
|
||||||
|
for i, passthrough := range conf.Other.Passthrough {
|
||||||
|
if punycode, err := idna.ToASCII(passthrough); err != nil {
|
||||||
|
passthrough = punycode
|
||||||
|
}
|
||||||
|
c.passthrough[i] = "." + strings.ToLower(strings.Trim(passthrough, ".")) + "."
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
// Most CDNs require Cookie support to prevent DDoS attack.
|
// Most CDNs require Cookie support to prevent DDoS attack.
|
||||||
// Disabling Cookie does not effectively prevent tracking,
|
// Disabling Cookie does not effectively prevent tracking,
|
||||||
// so I will leave it on to make anti-DDoS services happy.
|
// so I will leave it on to make anti-DDoS services happy.
|
||||||
if !c.conf.NoCookies {
|
if !c.conf.Other.NoCookies {
|
||||||
c.cookieJar, err = cookiejar.New(nil)
|
c.cookieJar, err = cookiejar.New(nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
} else {
|
||||||
|
c.cookieJar = nil
|
||||||
}
|
}
|
||||||
|
|
||||||
c.httpClientMux = new(sync.RWMutex)
|
c.httpClientMux = new(sync.RWMutex)
|
||||||
err = c.newHTTPClient()
|
err = c.newHTTPClient()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
switch c.conf.Upstream.UpstreamSelector {
|
||||||
|
case config.NginxWRR:
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
log.Println(config.NginxWRR, "mode start")
|
||||||
|
}
|
||||||
|
|
||||||
|
s := selector.NewNginxWRRSelector(time.Duration(c.conf.Other.Timeout) * time.Second)
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamGoogle {
|
||||||
|
if err := s.Add(u.URL, selector.Google, u.Weight); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamIETF {
|
||||||
|
if err := s.Add(u.URL, selector.IETF, u.Weight); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.selector = s
|
||||||
|
|
||||||
|
case config.LVSWRR:
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
log.Println(config.LVSWRR, "mode start")
|
||||||
|
}
|
||||||
|
|
||||||
|
s := selector.NewLVSWRRSelector(time.Duration(c.conf.Other.Timeout) * time.Second)
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamGoogle {
|
||||||
|
if err := s.Add(u.URL, selector.Google, u.Weight); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamIETF {
|
||||||
|
if err := s.Add(u.URL, selector.IETF, u.Weight); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.selector = s
|
||||||
|
|
||||||
|
default:
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
log.Println(config.Random, "mode start")
|
||||||
|
}
|
||||||
|
|
||||||
|
// if selector is invalid or random, use random selector, or should we stop program and let user knows he is wrong?
|
||||||
|
s := selector.NewRandomSelector()
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamGoogle {
|
||||||
|
if err := s.Add(u.URL, selector.Google); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, u := range c.conf.Upstream.UpstreamIETF {
|
||||||
|
if err := s.Add(u.URL, selector.IETF); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.selector = s
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
if reporter, ok := c.selector.(selector.DebugReporter); ok {
|
||||||
|
reporter.ReportWeights()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return c, nil
|
return c, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) newHTTPClient() error {
|
func (c *Client) newHTTPClient() error {
|
||||||
c.httpClientMux.Lock()
|
c.httpClientMux.Lock()
|
||||||
defer c.httpClientMux.Unlock()
|
defer c.httpClientMux.Unlock()
|
||||||
|
if !c.httpClientLastCreate.IsZero() && time.Since(c.httpClientLastCreate) < time.Duration(c.conf.Other.Timeout)*time.Second {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
if c.httpTransport != nil {
|
if c.httpTransport != nil {
|
||||||
c.httpTransport.CloseIdleConnections()
|
c.httpTransport.CloseIdleConnections()
|
||||||
}
|
}
|
||||||
|
dialer := &net.Dialer{
|
||||||
|
Timeout: time.Duration(c.conf.Other.Timeout) * time.Second,
|
||||||
|
KeepAlive: 30 * time.Second,
|
||||||
|
// DualStack: true,
|
||||||
|
Resolver: c.bootstrapResolver,
|
||||||
|
}
|
||||||
c.httpTransport = &http.Transport{
|
c.httpTransport = &http.Transport{
|
||||||
DialContext: (&net.Dialer{
|
DialContext: dialer.DialContext,
|
||||||
Timeout: time.Duration(c.conf.Timeout) * time.Second,
|
|
||||||
KeepAlive: 30 * time.Second,
|
|
||||||
DualStack: true,
|
|
||||||
Resolver: c.bootstrapResolver,
|
|
||||||
}).DialContext,
|
|
||||||
ExpectContinueTimeout: 1 * time.Second,
|
ExpectContinueTimeout: 1 * time.Second,
|
||||||
IdleConnTimeout: 90 * time.Second,
|
IdleConnTimeout: 90 * time.Second,
|
||||||
MaxIdleConns: 100,
|
MaxIdleConns: 100,
|
||||||
MaxIdleConnsPerHost: 10,
|
MaxIdleConnsPerHost: 10,
|
||||||
Proxy: http.ProxyFromEnvironment,
|
Proxy: http.ProxyFromEnvironment,
|
||||||
ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
TLSHandshakeTimeout: time.Duration(c.conf.Other.Timeout) * time.Second,
|
||||||
TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
|
}
|
||||||
|
if c.conf.Other.NoIPv6 {
|
||||||
|
c.httpTransport.DialContext = func(ctx context.Context, network, address string) (net.Conn, error) {
|
||||||
|
if strings.HasPrefix(network, "tcp") {
|
||||||
|
network = "tcp4"
|
||||||
|
}
|
||||||
|
return dialer.DialContext(ctx, network, address)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
err := http2.ConfigureTransport(c.httpTransport)
|
err := http2.ConfigureTransport(c.httpTransport)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -150,6 +264,7 @@ func (c *Client) newHTTPClient() error {
|
|||||||
Transport: c.httpTransport,
|
Transport: c.httpTransport,
|
||||||
Jar: c.cookieJar,
|
Jar: c.cookieJar,
|
||||||
}
|
}
|
||||||
|
c.httpClientLastCreate = time.Now()
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -165,6 +280,9 @@ func (c *Client) Start() error {
|
|||||||
}(srv)
|
}(srv)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// start evaluation loop
|
||||||
|
c.selector.StartEvaluate()
|
||||||
|
|
||||||
for i := 0; i < cap(results); i++ {
|
for i := 0; i < cap(results); i++ {
|
||||||
err := <-results
|
err := <-results
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -172,65 +290,152 @@ func (c *Client) Start() error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
close(results)
|
close(results)
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
|
||||||
if r.Response == true {
|
ctx, cancel := context.WithTimeout(context.Background(), time.Duration(c.conf.Other.Timeout)*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
if r.Response {
|
||||||
log.Println("Received a response packet")
|
log.Println("Received a response packet")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
requestType := ""
|
if len(r.Question) != 1 {
|
||||||
if len(c.conf.UpstreamIETF) == 0 {
|
log.Println("Number of questions is not 1")
|
||||||
requestType = "application/dns-json"
|
reply := jsonDNS.PrepareReply(r)
|
||||||
} else if len(c.conf.UpstreamGoogle) == 0 {
|
reply.Rcode = dns.RcodeFormatError
|
||||||
requestType = "application/dns-message"
|
w.WriteMsg(reply)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
question := &r.Question[0]
|
||||||
|
questionName := question.Name
|
||||||
|
questionClass := ""
|
||||||
|
if qclass, ok := dns.ClassToString[question.Qclass]; ok {
|
||||||
|
questionClass = qclass
|
||||||
} else {
|
} else {
|
||||||
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
|
questionClass = strconv.FormatUint(uint64(question.Qclass), 10)
|
||||||
random := rand.Intn(numServers)
|
}
|
||||||
if random < len(c.conf.UpstreamGoogle) {
|
questionType := ""
|
||||||
requestType = "application/dns-json"
|
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||||
} else {
|
questionType = qtype
|
||||||
requestType = "application/dns-message"
|
} else {
|
||||||
|
questionType = strconv.FormatUint(uint64(question.Qtype), 10)
|
||||||
|
}
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", w.RemoteAddr(), time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
||||||
|
}
|
||||||
|
|
||||||
|
shouldPassthrough := false
|
||||||
|
passthroughQuestionName := questionName
|
||||||
|
if punycode, err := idna.ToASCII(passthroughQuestionName); err != nil {
|
||||||
|
passthroughQuestionName = punycode
|
||||||
|
}
|
||||||
|
passthroughQuestionName = "." + strings.ToLower(strings.Trim(passthroughQuestionName, ".")) + "."
|
||||||
|
for _, passthrough := range c.passthrough {
|
||||||
|
if strings.HasSuffix(passthroughQuestionName, passthrough) {
|
||||||
|
shouldPassthrough = true
|
||||||
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if shouldPassthrough {
|
||||||
|
numServers := len(c.bootstrap)
|
||||||
|
upstream := c.bootstrap[rand.Intn(numServers)]
|
||||||
|
log.Printf("Request \"%s %s %s\" is passed through %s.\n", questionName, questionClass, questionType, upstream)
|
||||||
|
var reply *dns.Msg
|
||||||
|
var err error
|
||||||
|
if !isTCP {
|
||||||
|
reply, _, err = c.udpClient.Exchange(r, upstream)
|
||||||
|
} else {
|
||||||
|
reply, _, err = c.tcpClient.Exchange(r, upstream)
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
w.WriteMsg(reply)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Println(err)
|
||||||
|
reply = jsonDNS.PrepareReply(r)
|
||||||
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
|
w.WriteMsg(reply)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
upstream := c.selector.Get()
|
||||||
|
requestType := upstream.RequestType
|
||||||
|
|
||||||
|
if c.conf.Other.Verbose {
|
||||||
|
log.Println("choose upstream:", upstream)
|
||||||
|
}
|
||||||
|
|
||||||
var req *DNSRequest
|
var req *DNSRequest
|
||||||
if requestType == "application/dns-json" {
|
switch requestType {
|
||||||
req = c.generateRequestGoogle(w, r, isTCP)
|
case "application/dns-json":
|
||||||
} else if requestType == "application/dns-message" {
|
req = c.generateRequestGoogle(ctx, w, r, isTCP, upstream)
|
||||||
req = c.generateRequestIETF(w, r, isTCP)
|
|
||||||
} else {
|
case "application/dns-message":
|
||||||
|
req = c.generateRequestIETF(ctx, w, r, isTCP, upstream)
|
||||||
|
|
||||||
|
default:
|
||||||
panic("Unknown request Content-Type")
|
panic("Unknown request Content-Type")
|
||||||
}
|
}
|
||||||
|
|
||||||
if req.err != nil {
|
if req.err != nil {
|
||||||
|
if urlErr, ok := req.err.(*url.Error); ok {
|
||||||
|
// should we only check timeout?
|
||||||
|
if urlErr.Timeout() {
|
||||||
|
c.selector.ReportUpstreamStatus(upstream, selector.Timeout)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
contentType := ""
|
// if req.err == nil, req.response != nil
|
||||||
candidateType := strings.SplitN(req.response.Header.Get("Content-Type"), ";", 2)[0]
|
defer req.response.Body.Close()
|
||||||
if candidateType == "application/json" {
|
|
||||||
contentType = "application/json"
|
for _, header := range c.conf.Other.DebugHTTPHeaders {
|
||||||
} else if candidateType == "application/dns-message" {
|
if value := req.response.Header.Get(header); value != "" {
|
||||||
contentType = "application/dns-message"
|
log.Printf("%s: %s\n", header, value)
|
||||||
} else if candidateType == "application/dns-udpwireformat" {
|
|
||||||
contentType = "application/dns-message"
|
|
||||||
} else {
|
|
||||||
if requestType == "application/dns-json" {
|
|
||||||
contentType = "application/json"
|
|
||||||
} else if requestType == "application/dns-message" {
|
|
||||||
contentType = "application/dns-message"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if contentType == "application/json" {
|
candidateType := strings.SplitN(req.response.Header.Get("Content-Type"), ";", 2)[0]
|
||||||
c.parseResponseGoogle(w, r, isTCP, req)
|
|
||||||
} else if contentType == "application/dns-message" {
|
switch candidateType {
|
||||||
c.parseResponseIETF(w, r, isTCP, req)
|
case "application/json":
|
||||||
} else {
|
c.parseResponseGoogle(ctx, w, r, isTCP, req)
|
||||||
panic("Unknown response Content-Type")
|
|
||||||
|
case "application/dns-message", "application/dns-udpwireformat":
|
||||||
|
c.parseResponseIETF(ctx, w, r, isTCP, req)
|
||||||
|
|
||||||
|
default:
|
||||||
|
switch requestType {
|
||||||
|
case "application/dns-json":
|
||||||
|
c.parseResponseGoogle(ctx, w, r, isTCP, req)
|
||||||
|
|
||||||
|
case "application/dns-message":
|
||||||
|
c.parseResponseIETF(ctx, w, r, isTCP, req)
|
||||||
|
|
||||||
|
default:
|
||||||
|
panic("Unknown response Content-Type")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// https://developers.cloudflare.com/1.1.1.1/dns-over-https/request-structure/ says
|
||||||
|
// returns code will be 200 / 400 / 413 / 415 / 504, some server will return 503, so
|
||||||
|
// I think if status code is 5xx, upstream must has some problems
|
||||||
|
/*if req.response.StatusCode/100 == 5 {
|
||||||
|
c.selector.ReportUpstreamStatus(upstream, selector.Medium)
|
||||||
|
}*/
|
||||||
|
|
||||||
|
switch req.response.StatusCode / 100 {
|
||||||
|
case 5:
|
||||||
|
c.selector.ReportUpstreamStatus(upstream, selector.Error)
|
||||||
|
|
||||||
|
case 2:
|
||||||
|
c.selector.ReportUpstreamStatus(upstream, selector.OK)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -244,12 +449,12 @@ func (c *Client) tcpHandlerFunc(w dns.ResponseWriter, r *dns.Msg) {
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
ipv4Mask24 = net.IPMask{255, 255, 255, 0}
|
ipv4Mask24 = net.IPMask{255, 255, 255, 0}
|
||||||
ipv6Mask48 = net.CIDRMask(48, 128)
|
ipv6Mask56 = net.CIDRMask(56, 128)
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c *Client) findClientIP(w dns.ResponseWriter, r *dns.Msg) (ednsClientAddress net.IP, ednsClientNetmask uint8) {
|
func (c *Client) findClientIP(w dns.ResponseWriter, r *dns.Msg) (ednsClientAddress net.IP, ednsClientNetmask uint8) {
|
||||||
ednsClientNetmask = 255
|
ednsClientNetmask = 255
|
||||||
if c.conf.NoECS {
|
if c.conf.Other.NoECS {
|
||||||
return net.IPv4(0, 0, 0, 0), 0
|
return net.IPv4(0, 0, 0, 0), 0
|
||||||
}
|
}
|
||||||
if opt := r.IsEdns0(); opt != nil {
|
if opt := r.IsEdns0(); opt != nil {
|
||||||
@@ -271,8 +476,8 @@ func (c *Client) findClientIP(w dns.ResponseWriter, r *dns.Msg) (ednsClientAddre
|
|||||||
ednsClientAddress = ipv4.Mask(ipv4Mask24)
|
ednsClientAddress = ipv4.Mask(ipv4Mask24)
|
||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientAddress = ip.Mask(ipv6Mask48)
|
ednsClientAddress = ip.Mask(ipv6Mask56)
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
|
|||||||
@@ -21,7 +21,7 @@
|
|||||||
DEALINGS IN THE SOFTWARE.
|
DEALINGS IN THE SOFTWARE.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package config
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
@@ -29,19 +29,42 @@ import (
|
|||||||
"github.com/BurntSushi/toml"
|
"github.com/BurntSushi/toml"
|
||||||
)
|
)
|
||||||
|
|
||||||
type config struct {
|
const (
|
||||||
Listen []string `toml:"listen"`
|
Random = "random"
|
||||||
UpstreamGoogle []string `toml:"upstream_google"`
|
NginxWRR = "weighted_round_robin"
|
||||||
UpstreamIETF []string `toml:"upstream_ietf"`
|
LVSWRR = "lvs_weighted_round_robin"
|
||||||
Bootstrap []string `toml:"bootstrap"`
|
)
|
||||||
Timeout uint `toml:"timeout"`
|
|
||||||
NoCookies bool `toml:"no_cookies"`
|
type upstreamDetail struct {
|
||||||
NoECS bool `toml:"no_ecs"`
|
URL string `toml:"url"`
|
||||||
Verbose bool `toml:"verbose"`
|
Weight int32 `toml:"weight"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func loadConfig(path string) (*config, error) {
|
type upstream struct {
|
||||||
conf := &config{}
|
UpstreamGoogle []upstreamDetail `toml:"upstream_google"`
|
||||||
|
UpstreamIETF []upstreamDetail `toml:"upstream_ietf"`
|
||||||
|
UpstreamSelector string `toml:"upstream_selector"` // usable: random or weighted_random
|
||||||
|
}
|
||||||
|
|
||||||
|
type others struct {
|
||||||
|
Bootstrap []string `toml:"bootstrap"`
|
||||||
|
Passthrough []string `toml:"passthrough"`
|
||||||
|
Timeout uint `toml:"timeout"`
|
||||||
|
NoCookies bool `toml:"no_cookies"`
|
||||||
|
NoECS bool `toml:"no_ecs"`
|
||||||
|
NoIPv6 bool `toml:"no_ipv6"`
|
||||||
|
Verbose bool `toml:"verbose"`
|
||||||
|
DebugHTTPHeaders []string `toml:"debug_http_headers"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Config struct {
|
||||||
|
Listen []string `toml:"listen"`
|
||||||
|
Upstream upstream `toml:"upstream"`
|
||||||
|
Other others `toml:"others"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func LoadConfig(path string) (*Config, error) {
|
||||||
|
conf := &Config{}
|
||||||
metaData, err := toml.DecodeFile(path, conf)
|
metaData, err := toml.DecodeFile(path, conf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@@ -53,11 +76,15 @@ func loadConfig(path string) (*config, error) {
|
|||||||
if len(conf.Listen) == 0 {
|
if len(conf.Listen) == 0 {
|
||||||
conf.Listen = []string{"127.0.0.1:53", "[::1]:53"}
|
conf.Listen = []string{"127.0.0.1:53", "[::1]:53"}
|
||||||
}
|
}
|
||||||
if len(conf.UpstreamGoogle) == 0 && len(conf.UpstreamIETF) == 0 {
|
if len(conf.Upstream.UpstreamGoogle) == 0 && len(conf.Upstream.UpstreamIETF) == 0 {
|
||||||
conf.UpstreamGoogle = []string{"https://dns.google.com/resolve"}
|
conf.Upstream.UpstreamGoogle = []upstreamDetail{{URL: "https://dns.google.com/resolve", Weight: 50}}
|
||||||
}
|
}
|
||||||
if conf.Timeout == 0 {
|
if conf.Other.Timeout == 0 {
|
||||||
conf.Timeout = 10
|
conf.Other.Timeout = 10
|
||||||
|
}
|
||||||
|
|
||||||
|
if conf.Upstream.UpstreamSelector == "" {
|
||||||
|
conf.Upstream.UpstreamSelector = Random
|
||||||
}
|
}
|
||||||
|
|
||||||
return conf, nil
|
return conf, nil
|
||||||
@@ -1,34 +1,59 @@
|
|||||||
# DNS listen port
|
# DNS listen port
|
||||||
listen = [
|
listen = [
|
||||||
"127.0.0.1:53",
|
"127.0.0.1:53",
|
||||||
|
"127.0.0.1:5380",
|
||||||
"[::1]:53",
|
"[::1]:53",
|
||||||
|
"[::1]:5380",
|
||||||
]
|
]
|
||||||
|
|
||||||
# HTTP path for upstream resolver
|
# HTTP path for upstream resolver
|
||||||
# If multiple servers are specified, a random one will be chosen each time.
|
|
||||||
upstream_google = [
|
|
||||||
|
|
||||||
# Google's productive resolver, good ECS, bad DNSSEC
|
[upstream]
|
||||||
"https://dns.google.com/resolve",
|
|
||||||
|
|
||||||
# CloudFlare's resolver, bad ECS, good DNSSEC
|
# available selector: random or weighted_round_robin or lvs_weighted_round_robin
|
||||||
#"https://cloudflare-dns.com/dns-query",
|
upstream_selector = "random"
|
||||||
#"https://1.1.1.1/dns-query",
|
|
||||||
#"https://1.0.0.1/dns-query",
|
|
||||||
|
|
||||||
]
|
# weight should in (0, 100], if upstream_selector is random, weight will be ignored
|
||||||
upstream_ietf = [
|
|
||||||
|
|
||||||
# Google's experimental resolver, good ECS, good DNSSEC
|
## Google's productive resolver, good ECS, bad DNSSEC
|
||||||
#"https://dns.google.com/experimental",
|
#[[upstream.upstream_google]]
|
||||||
|
# url = "https://dns.google.com/resolve"
|
||||||
|
# weight = 50
|
||||||
|
|
||||||
# CloudFlare's resolver, bad ECS, good DNSSEC
|
## CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
#"https://cloudflare-dns.com/dns-query",
|
#[[upstream.upstream_google]]
|
||||||
#"https://1.1.1.1/dns-query",
|
# url = "https://cloudflare-dns.com/dns-query"
|
||||||
#"https://1.0.0.1/dns-query",
|
# weight = 50
|
||||||
|
|
||||||
]
|
## CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
#[[upstream.upstream_google]]
|
||||||
|
# url = "https://1.1.1.1/dns-query"
|
||||||
|
# weight = 50
|
||||||
|
|
||||||
|
# CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
[[upstream.upstream_ietf]]
|
||||||
|
url = "https://cloudflare-dns.com/dns-query"
|
||||||
|
weight = 50
|
||||||
|
|
||||||
|
## CloudFlare's resolver, bad ECS, good DNSSEC
|
||||||
|
#[[upstream.upstream_ietf]]
|
||||||
|
# url = "https://1.1.1.1/dns-query"
|
||||||
|
# weight = 50
|
||||||
|
|
||||||
|
## Google's experimental resolver, good ECS, good DNSSEC
|
||||||
|
#[[upstream.upstream_ietf]]
|
||||||
|
# url = "https://dns.google.com/experimental"
|
||||||
|
# weight = 50
|
||||||
|
|
||||||
|
## CloudFlare's resolver for Tor, available only with Tor
|
||||||
|
## Remember to disable ECS below when using Tor!
|
||||||
|
## Blog: https://blog.cloudflare.com/welcome-hidden-resolver/
|
||||||
|
#[[upstream.upstream_ietf]]
|
||||||
|
# url = "https://dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion/dns-query"
|
||||||
|
# weight = 50
|
||||||
|
|
||||||
|
|
||||||
|
[others]
|
||||||
# Bootstrap DNS server to resolve the address of the upstream resolver
|
# Bootstrap DNS server to resolve the address of the upstream resolver
|
||||||
# If multiple servers are specified, a random one will be chosen each time.
|
# If multiple servers are specified, a random one will be chosen each time.
|
||||||
# If empty, use the system DNS settings.
|
# If empty, use the system DNS settings.
|
||||||
@@ -46,8 +71,26 @@ bootstrap = [
|
|||||||
|
|
||||||
]
|
]
|
||||||
|
|
||||||
# Timeout for upstream request
|
# The domain names here are directly passed to bootstrap servers listed above,
|
||||||
timeout = 10
|
# allowing captive portal detection and systems without RTC to work.
|
||||||
|
# Only effective if at least one bootstrap server is configured.
|
||||||
|
passthrough = [
|
||||||
|
"captive.apple.com",
|
||||||
|
"connectivitycheck.gstatic.com",
|
||||||
|
"detectportal.firefox.com",
|
||||||
|
"msftconnecttest.com",
|
||||||
|
"nmcheck.gnome.org",
|
||||||
|
|
||||||
|
"pool.ntp.org",
|
||||||
|
"time.apple.com",
|
||||||
|
"time.asia.apple.com",
|
||||||
|
"time.euro.apple.com",
|
||||||
|
"time.nist.gov",
|
||||||
|
"time.windows.com",
|
||||||
|
]
|
||||||
|
|
||||||
|
# Timeout for upstream request in seconds
|
||||||
|
timeout = 30
|
||||||
|
|
||||||
# Disable HTTP Cookies
|
# Disable HTTP Cookies
|
||||||
#
|
#
|
||||||
@@ -55,15 +98,23 @@ timeout = 10
|
|||||||
# anti-DDoS services to identify clients.
|
# anti-DDoS services to identify clients.
|
||||||
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
|
||||||
# to track uesrs and is not controlled by doh-client.
|
# to track uesrs and is not controlled by doh-client.
|
||||||
no_cookies = false
|
no_cookies = true
|
||||||
|
|
||||||
# Disable EDNS0-Client-Subnet (ECS)
|
# Disable EDNS0-Client-Subnet (ECS)
|
||||||
#
|
#
|
||||||
# DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of
|
# DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of
|
||||||
# the client's IP address (/24 for IPv4, /48 for IPv6 by default) to the
|
# the client's IP address (/24 for IPv4, /56 for IPv6 by default) to the
|
||||||
# upstream server. This is useful for GeoDNS and CDNs to work, and is exactly
|
# upstream server. This is useful for GeoDNS and CDNs to work, and is exactly
|
||||||
# the same configuration as most public DNS servers.
|
# the same configuration as most public DNS servers.
|
||||||
no_ecs = false
|
no_ecs = false
|
||||||
|
|
||||||
|
# Disable IPv6 when querying upstream
|
||||||
|
#
|
||||||
|
# Only enable this if you really have trouble connecting.
|
||||||
|
# Doh-client uses both IPv4 and IPv6 by default and should not have problems
|
||||||
|
# with an IPv4-only environment.
|
||||||
|
# Note that DNS listening and bootstrapping is not controlled by this option.
|
||||||
|
no_ipv6 = false
|
||||||
|
|
||||||
# Enable logging
|
# Enable logging
|
||||||
verbose = false
|
verbose = false
|
||||||
|
|||||||
@@ -24,49 +24,41 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
"math/rand"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
|
||||||
|
|
||||||
|
"github.com/m13253/dns-over-https/doh-client/selector"
|
||||||
"github.com/m13253/dns-over-https/json-dns"
|
"github.com/m13253/dns-over-https/json-dns"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool) *DNSRequest {
|
func (c *Client) generateRequestGoogle(ctx context.Context, w dns.ResponseWriter, r *dns.Msg, isTCP bool, upstream *selector.Upstream) *DNSRequest {
|
||||||
reply := jsonDNS.PrepareReply(r)
|
question := &r.Question[0]
|
||||||
|
questionName := question.Name
|
||||||
if len(r.Question) != 1 {
|
questionClass := question.Qclass
|
||||||
log.Println("Number of questions is not 1")
|
if questionClass != dns.ClassINET {
|
||||||
reply.Rcode = dns.RcodeFormatError
|
reply := jsonDNS.PrepareReply(r)
|
||||||
|
reply.Rcode = dns.RcodeRefused
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: &dns.Error{},
|
err: &dns.Error{},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
question := &r.Question[0]
|
|
||||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
|
||||||
questionName := strings.ToLower(question.Name)
|
|
||||||
questionType := ""
|
questionType := ""
|
||||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||||
questionType = qtype
|
questionType = qtype
|
||||||
} else {
|
} else {
|
||||||
questionType = strconv.Itoa(int(question.Qtype))
|
questionType = strconv.FormatUint(uint64(question.Qtype), 10)
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.conf.Verbose {
|
requestURL := fmt.Sprintf("%s?ct=application/dns-json&name=%s&type=%s", upstream.URL, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
||||||
fmt.Printf("%s - - [%s] \"%s IN %s\"\n", w.RemoteAddr(), time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionType)
|
|
||||||
}
|
|
||||||
|
|
||||||
numServers := len(c.conf.UpstreamGoogle)
|
|
||||||
upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)]
|
|
||||||
requestURL := fmt.Sprintf("%s?ct=application/dns-json&name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
|
|
||||||
|
|
||||||
if r.CheckingDisabled {
|
if r.CheckingDisabled {
|
||||||
requestURL += "&cd=1"
|
requestURL += "&cd=1"
|
||||||
@@ -82,28 +74,39 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
requestURL += fmt.Sprintf("&edns_client_subnet=%s/%d", ednsClientAddress.String(), ednsClientNetmask)
|
requestURL += fmt.Sprintf("&edns_client_subnet=%s/%d", ednsClientAddress.String(), ednsClientNetmask)
|
||||||
}
|
}
|
||||||
|
|
||||||
req, err := http.NewRequest("GET", requestURL, nil)
|
req, err := http.NewRequest(http.MethodGet, requestURL, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
req.Header.Set("Accept", "application/json, application/dns-message, application/dns-udpwireformat")
|
req.Header.Set("Accept", "application/json, application/dns-message, application/dns-udpwireformat")
|
||||||
req.Header.Set("User-Agent", USER_AGENT)
|
req.Header.Set("User-Agent", USER_AGENT)
|
||||||
|
req = req.WithContext(ctx)
|
||||||
|
|
||||||
c.httpClientMux.RLock()
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
c.httpClientMux.RUnlock()
|
c.httpClientMux.RUnlock()
|
||||||
|
|
||||||
|
// if http Client.Do returns non-nil error, it always *url.Error
|
||||||
|
/*if err == context.DeadlineExceeded {
|
||||||
|
// Do not respond, silently fail to prevent caching of SERVFAIL
|
||||||
|
log.Println(err)
|
||||||
|
return &DNSRequest{
|
||||||
|
err: err,
|
||||||
|
}
|
||||||
|
}*/
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
err1 := c.newHTTPClient()
|
|
||||||
if err1 != nil {
|
|
||||||
log.Fatalln(err1)
|
|
||||||
}
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
@@ -111,16 +114,17 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
|
|||||||
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
response: resp,
|
response: resp,
|
||||||
reply: reply,
|
reply: jsonDNS.PrepareReply(r),
|
||||||
udpSize: udpSize,
|
udpSize: udpSize,
|
||||||
ednsClientAddress: ednsClientAddress,
|
ednsClientAddress: ednsClientAddress,
|
||||||
ednsClientNetmask: ednsClientNetmask,
|
ednsClientNetmask: ednsClientNetmask,
|
||||||
|
currentUpstream: upstream.URL,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) parseResponseGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
func (c *Client) parseResponseGoogle(ctx context.Context, w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||||
if req.response.StatusCode != 200 {
|
if req.response.StatusCode != http.StatusOK {
|
||||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
log.Printf("HTTP error from upstream %s: %s\n", req.currentUpstream, req.response.Status)
|
||||||
req.reply.Rcode = dns.RcodeServerFailure
|
req.reply.Rcode = dns.RcodeServerFailure
|
||||||
contentType := req.response.Header.Get("Content-Type")
|
contentType := req.response.Header.Get("Content-Type")
|
||||||
if contentType != "application/json" && !strings.HasPrefix(contentType, "application/json;") {
|
if contentType != "application/json" && !strings.HasPrefix(contentType, "application/json;") {
|
||||||
|
|||||||
@@ -25,57 +25,31 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"context"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
"math/rand"
|
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/m13253/dns-over-https/doh-client/selector"
|
||||||
"github.com/m13253/dns-over-https/json-dns"
|
"github.com/m13253/dns-over-https/json-dns"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool) *DNSRequest {
|
func (c *Client) generateRequestIETF(ctx context.Context, w dns.ResponseWriter, r *dns.Msg, isTCP bool, upstream *selector.Upstream) *DNSRequest {
|
||||||
reply := jsonDNS.PrepareReply(r)
|
|
||||||
|
|
||||||
if len(r.Question) != 1 {
|
|
||||||
log.Println("Number of questions is not 1")
|
|
||||||
reply.Rcode = dns.RcodeFormatError
|
|
||||||
w.WriteMsg(reply)
|
|
||||||
return &DNSRequest{
|
|
||||||
err: &dns.Error{},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
question := &r.Question[0]
|
|
||||||
// knot-resolver scrambles capitalization, I think it is unfriendly to cache
|
|
||||||
questionName := strings.ToLower(question.Name)
|
|
||||||
questionType := ""
|
|
||||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
|
||||||
questionType = qtype
|
|
||||||
} else {
|
|
||||||
questionType = strconv.Itoa(int(question.Qtype))
|
|
||||||
}
|
|
||||||
|
|
||||||
if c.conf.Verbose {
|
|
||||||
fmt.Printf("%s - - [%s] \"%s IN %s\"\n", w.RemoteAddr(), time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionType)
|
|
||||||
}
|
|
||||||
|
|
||||||
question.Name = questionName
|
|
||||||
opt := r.IsEdns0()
|
opt := r.IsEdns0()
|
||||||
udpSize := uint16(512)
|
udpSize := uint16(512)
|
||||||
if opt == nil {
|
if opt == nil {
|
||||||
opt = new(dns.OPT)
|
opt = new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(false)
|
opt.SetDo(false)
|
||||||
r.Extra = append(r.Extra, opt)
|
r.Extra = append([]dns.RR{opt}, r.Extra...)
|
||||||
} else {
|
} else {
|
||||||
udpSize = opt.UDPSize()
|
udpSize = opt.UDPSize()
|
||||||
}
|
}
|
||||||
@@ -97,7 +71,7 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientFamily = 2
|
ednsClientFamily = 2
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
edns0Subnet = new(dns.EDNS0_SUBNET)
|
edns0Subnet = new(dns.EDNS0_SUBNET)
|
||||||
edns0Subnet.Code = dns.EDNS0SUBNET
|
edns0Subnet.Code = dns.EDNS0SUBNET
|
||||||
@@ -116,6 +90,7 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
requestBinary, err := r.Pack()
|
requestBinary, err := r.Pack()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeFormatError
|
reply.Rcode = dns.RcodeFormatError
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
@@ -125,16 +100,14 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
r.Id = requestID
|
r.Id = requestID
|
||||||
requestBase64 := base64.RawURLEncoding.EncodeToString(requestBinary)
|
requestBase64 := base64.RawURLEncoding.EncodeToString(requestBinary)
|
||||||
|
|
||||||
numServers := len(c.conf.UpstreamIETF)
|
requestURL := fmt.Sprintf("%s?ct=application/dns-message&dns=%s", upstream.URL, requestBase64)
|
||||||
upstream := c.conf.UpstreamIETF[rand.Intn(numServers)]
|
|
||||||
requestURL := fmt.Sprintf("%s?ct=application/dns-udpwireformat&dns=%s", upstream, requestBase64)
|
|
||||||
//requestURL := fmt.Sprintf("%s?ct=application/dns-message&dns=%s", upstream, requestBase64)
|
|
||||||
|
|
||||||
var req *http.Request
|
var req *http.Request
|
||||||
if len(requestURL) < 2048 {
|
if len(requestURL) < 2048 {
|
||||||
req, err = http.NewRequest("GET", requestURL, nil)
|
req, err = http.NewRequest(http.MethodGet, requestURL, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
@@ -142,9 +115,10 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
req, err = http.NewRequest("POST", upstream, bytes.NewReader(requestBinary))
|
req, err = http.NewRequest(http.MethodPost, upstream.URL, bytes.NewReader(requestBinary))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
@@ -155,17 +129,25 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
}
|
}
|
||||||
req.Header.Set("Accept", "application/dns-message, application/dns-udpwireformat, application/json")
|
req.Header.Set("Accept", "application/dns-message, application/dns-udpwireformat, application/json")
|
||||||
req.Header.Set("User-Agent", USER_AGENT)
|
req.Header.Set("User-Agent", USER_AGENT)
|
||||||
|
req = req.WithContext(ctx)
|
||||||
c.httpClientMux.RLock()
|
c.httpClientMux.RLock()
|
||||||
resp, err := c.httpClient.Do(req)
|
resp, err := c.httpClient.Do(req)
|
||||||
c.httpClientMux.RUnlock()
|
c.httpClientMux.RUnlock()
|
||||||
|
|
||||||
|
// if http Client.Do returns non-nil error, it always *url.Error
|
||||||
|
/*if err == context.DeadlineExceeded {
|
||||||
|
// Do not respond, silently fail to prevent caching of SERVFAIL
|
||||||
|
log.Println(err)
|
||||||
|
return &DNSRequest{
|
||||||
|
err: err,
|
||||||
|
}
|
||||||
|
}*/
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
|
reply := jsonDNS.PrepareReply(r)
|
||||||
reply.Rcode = dns.RcodeServerFailure
|
reply.Rcode = dns.RcodeServerFailure
|
||||||
w.WriteMsg(reply)
|
w.WriteMsg(reply)
|
||||||
err1 := c.newHTTPClient()
|
|
||||||
if err1 != nil {
|
|
||||||
log.Fatalln(err1)
|
|
||||||
}
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
err: err,
|
err: err,
|
||||||
}
|
}
|
||||||
@@ -173,16 +155,17 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
|
|||||||
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
response: resp,
|
response: resp,
|
||||||
reply: reply,
|
reply: jsonDNS.PrepareReply(r),
|
||||||
udpSize: udpSize,
|
udpSize: udpSize,
|
||||||
ednsClientAddress: ednsClientAddress,
|
ednsClientAddress: ednsClientAddress,
|
||||||
ednsClientNetmask: ednsClientNetmask,
|
ednsClientNetmask: ednsClientNetmask,
|
||||||
|
currentUpstream: upstream.URL,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) parseResponseIETF(w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
func (c *Client) parseResponseIETF(ctx context.Context, w dns.ResponseWriter, r *dns.Msg, isTCP bool, req *DNSRequest) {
|
||||||
if req.response.StatusCode != 200 {
|
if req.response.StatusCode != http.StatusOK {
|
||||||
log.Printf("HTTP error: %s\n", req.response.Status)
|
log.Printf("HTTP error from upstream %s: %s\n", req.currentUpstream, req.response.Status)
|
||||||
req.reply.Rcode = dns.RcodeServerFailure
|
req.reply.Rcode = dns.RcodeServerFailure
|
||||||
contentType := req.response.Header.Get("Content-Type")
|
contentType := req.response.Header.Get("Content-Type")
|
||||||
if contentType != "application/dns-message" && !strings.HasPrefix(contentType, "application/dns-message;") {
|
if contentType != "application/dns-message" && !strings.HasPrefix(contentType, "application/dns-message;") {
|
||||||
|
|||||||
@@ -25,21 +25,91 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"flag"
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/m13253/dns-over-https/doh-client/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func checkPIDFile(pidFile string) (bool, error) {
|
||||||
|
retry:
|
||||||
|
f, err := os.OpenFile(pidFile, os.O_WRONLY|os.O_CREATE|os.O_EXCL, 0666)
|
||||||
|
if os.IsExist(err) {
|
||||||
|
pidStr, err := ioutil.ReadFile(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
pid, err := strconv.ParseUint(string(pidStr), 10, 0)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
_, err = os.Stat(fmt.Sprintf("/proc/%d", pid))
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
err = os.Remove(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
goto retry
|
||||||
|
} else if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
log.Printf("Already running on PID %d, exiting.\n", pid)
|
||||||
|
return false, nil
|
||||||
|
} else if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
_, err = io.WriteString(f, strconv.FormatInt(int64(os.Getpid()), 10))
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
confPath := flag.String("conf", "doh-client.conf", "Configuration file")
|
confPath := flag.String("conf", "doh-client.conf", "Configuration file")
|
||||||
verbose := flag.Bool("verbose", false, "Enable logging")
|
verbose := flag.Bool("verbose", false, "Enable logging")
|
||||||
|
showVersion := flag.Bool("version", false, "Show software version and exit")
|
||||||
|
var pidFile *string
|
||||||
|
|
||||||
|
// I really want to push the technology forward by recommending cgroup-based
|
||||||
|
// process tracking. But I understand some cloud service providers have
|
||||||
|
// their own monitoring system. So this feature is only enabled on Linux and
|
||||||
|
// BSD series platforms which lacks functionality similar to cgroup.
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "dragonfly", "freebsd", "linux", "netbsd", "openbsd":
|
||||||
|
pidFile = flag.String("pid-file", "", "PID file for legacy supervision systems lacking support for reliable cgroup-based process tracking")
|
||||||
|
}
|
||||||
|
|
||||||
flag.Parse()
|
flag.Parse()
|
||||||
|
|
||||||
conf, err := loadConfig(*confPath)
|
if *showVersion {
|
||||||
|
fmt.Printf("doh-server %s\nHomepage: https://github.com/m13253/dns-over-https\n", VERSION)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if pidFile != nil && *pidFile != "" {
|
||||||
|
ok, err := checkPIDFile(*pidFile)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error checking PID file: %v\n", err)
|
||||||
|
}
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
conf, err := config.LoadConfig(*confPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Fatalln(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if *verbose {
|
if *verbose {
|
||||||
conf.Verbose = true
|
conf.Other.Verbose = true
|
||||||
}
|
}
|
||||||
|
|
||||||
client, err := NewClient(conf)
|
client, err := NewClient(conf)
|
||||||
|
|||||||
262
doh-client/selector/lvsWRRSelector.go
Normal file
262
doh-client/selector/lvsWRRSelector.go
Normal file
@@ -0,0 +1,262 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
type LVSWRRSelector struct {
|
||||||
|
upstreams []*Upstream // upstreamsInfo
|
||||||
|
client http.Client // http client to check the upstream
|
||||||
|
lastChoose int32
|
||||||
|
currentWeight int32
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewLVSWRRSelector(timeout time.Duration) *LVSWRRSelector {
|
||||||
|
return &LVSWRRSelector{
|
||||||
|
client: http.Client{Timeout: timeout},
|
||||||
|
lastChoose: -1,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) Add(url string, upstreamType UpstreamType, weight int32) (err error) {
|
||||||
|
if weight < 1 {
|
||||||
|
return errors.New("weight is 1")
|
||||||
|
}
|
||||||
|
|
||||||
|
switch upstreamType {
|
||||||
|
case Google:
|
||||||
|
ls.upstreams = append(ls.upstreams, &Upstream{
|
||||||
|
Type: Google,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-json",
|
||||||
|
weight: weight,
|
||||||
|
effectiveWeight: weight,
|
||||||
|
})
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
ls.upstreams = append(ls.upstreams, &Upstream{
|
||||||
|
Type: IETF,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-message",
|
||||||
|
weight: weight,
|
||||||
|
effectiveWeight: weight,
|
||||||
|
})
|
||||||
|
|
||||||
|
default:
|
||||||
|
return errors.New("unknown upstream type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) StartEvaluate() {
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
|
||||||
|
for i := range ls.upstreams {
|
||||||
|
wg.Add(1)
|
||||||
|
|
||||||
|
go func(i int) {
|
||||||
|
defer wg.Done()
|
||||||
|
|
||||||
|
upstreamURL := ls.upstreams[i].URL
|
||||||
|
var acceptType string
|
||||||
|
|
||||||
|
switch ls.upstreams[i].Type {
|
||||||
|
case Google:
|
||||||
|
upstreamURL += "?name=www.example.com&type=A"
|
||||||
|
acceptType = "application/dns-json"
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
// www.example.com
|
||||||
|
upstreamURL += "?dns=q80BAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB"
|
||||||
|
acceptType = "application/dns-message"
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := http.NewRequest(http.MethodGet, upstreamURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
/*log.Println("upstream:", upstreamURL, "type:", typeMap[upstream.Type], "check failed:", err)
|
||||||
|
continue*/
|
||||||
|
|
||||||
|
// should I only log it? But if there is an error, I think when query the server will return error too
|
||||||
|
panic("upstream: " + upstreamURL + " type: " + typeMap[ls.upstreams[i].Type] + " check failed: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("accept", acceptType)
|
||||||
|
|
||||||
|
resp, err := ls.client.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&ls.upstreams[i].effectiveWeight, -5) < 1 {
|
||||||
|
atomic.StoreInt32(&ls.upstreams[i].effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
switch ls.upstreams[i].Type {
|
||||||
|
case Google:
|
||||||
|
ls.checkGoogleResponse(resp, ls.upstreams[i])
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
ls.checkIETFResponse(resp, ls.upstreams[i])
|
||||||
|
}
|
||||||
|
}(i)
|
||||||
|
}
|
||||||
|
|
||||||
|
wg.Wait()
|
||||||
|
|
||||||
|
time.Sleep(15 * time.Second)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) Get() *Upstream {
|
||||||
|
if len(ls.upstreams) == 1 {
|
||||||
|
return ls.upstreams[0]
|
||||||
|
}
|
||||||
|
|
||||||
|
for {
|
||||||
|
atomic.StoreInt32(&ls.lastChoose, (atomic.LoadInt32(&ls.lastChoose)+1)%int32(len(ls.upstreams)))
|
||||||
|
|
||||||
|
if atomic.LoadInt32(&ls.lastChoose) == 0 {
|
||||||
|
atomic.AddInt32(&ls.currentWeight, -ls.gcdWeight())
|
||||||
|
|
||||||
|
if atomic.LoadInt32(&ls.currentWeight) <= 0 {
|
||||||
|
atomic.AddInt32(&ls.currentWeight, ls.maxWeight())
|
||||||
|
|
||||||
|
if atomic.LoadInt32(&ls.currentWeight) == 0 {
|
||||||
|
panic("current weight is 0")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if atomic.LoadInt32(&ls.upstreams[atomic.LoadInt32(&ls.lastChoose)].effectiveWeight) >= atomic.LoadInt32(&ls.currentWeight) {
|
||||||
|
return ls.upstreams[atomic.LoadInt32(&ls.lastChoose)]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) gcdWeight() (res int32) {
|
||||||
|
res = gcd(atomic.LoadInt32(&ls.upstreams[0].effectiveWeight), atomic.LoadInt32(&ls.upstreams[0].effectiveWeight))
|
||||||
|
|
||||||
|
for i := 1; i < len(ls.upstreams); i++ {
|
||||||
|
res = gcd(res, atomic.LoadInt32(&ls.upstreams[i].effectiveWeight))
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) maxWeight() (res int32) {
|
||||||
|
for _, upstream := range ls.upstreams {
|
||||||
|
w := atomic.LoadInt32(&upstream.effectiveWeight)
|
||||||
|
if w > res {
|
||||||
|
res = w
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func gcd(x, y int32) int32 {
|
||||||
|
for {
|
||||||
|
if x < y {
|
||||||
|
x, y = y, x
|
||||||
|
}
|
||||||
|
|
||||||
|
tmp := x % y
|
||||||
|
if tmp == 0 {
|
||||||
|
return y
|
||||||
|
}
|
||||||
|
|
||||||
|
x = tmp
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) ReportUpstreamStatus(upstream *Upstream, upstreamStatus upstreamStatus) {
|
||||||
|
switch upstreamStatus {
|
||||||
|
case Timeout:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -5) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
case Error:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -2) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
case OK:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 1) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) checkGoogleResponse(resp *http.Response, upstream *Upstream) {
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
// server error
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -3) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
m := make(map[string]interface{})
|
||||||
|
if err := json.NewDecoder(resp.Body).Decode(&m); err != nil {
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -2) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if status, ok := m["Status"]; ok {
|
||||||
|
if statusNum, ok := status.(float64); ok && statusNum == 0 {
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 5) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -2) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) checkIETFResponse(resp *http.Response, upstream *Upstream) {
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
// server error
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -3) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 5) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ls *LVSWRRSelector) ReportWeights() {
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
time.Sleep(15 * time.Second)
|
||||||
|
|
||||||
|
for _, u := range ls.upstreams {
|
||||||
|
log.Printf("%s, effect weight: %d", u, atomic.LoadInt32(&u.effectiveWeight))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
215
doh-client/selector/nginxWRRSelector.go
Normal file
215
doh-client/selector/nginxWRRSelector.go
Normal file
@@ -0,0 +1,215 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NginxWRRSelector struct {
|
||||||
|
upstreams []*Upstream // upstreamsInfo
|
||||||
|
client http.Client // http client to check the upstream
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewNginxWRRSelector(timeout time.Duration) *NginxWRRSelector {
|
||||||
|
return &NginxWRRSelector{
|
||||||
|
client: http.Client{Timeout: timeout},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) Add(url string, upstreamType UpstreamType, weight int32) (err error) {
|
||||||
|
switch upstreamType {
|
||||||
|
case Google:
|
||||||
|
ws.upstreams = append(ws.upstreams, &Upstream{
|
||||||
|
Type: Google,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-json",
|
||||||
|
weight: weight,
|
||||||
|
effectiveWeight: weight,
|
||||||
|
})
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
ws.upstreams = append(ws.upstreams, &Upstream{
|
||||||
|
Type: IETF,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-message",
|
||||||
|
weight: weight,
|
||||||
|
effectiveWeight: weight,
|
||||||
|
})
|
||||||
|
|
||||||
|
default:
|
||||||
|
return errors.New("unknown upstream type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) StartEvaluate() {
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
|
||||||
|
for i := range ws.upstreams {
|
||||||
|
wg.Add(1)
|
||||||
|
|
||||||
|
go func(i int) {
|
||||||
|
defer wg.Done()
|
||||||
|
|
||||||
|
upstreamURL := ws.upstreams[i].URL
|
||||||
|
var acceptType string
|
||||||
|
|
||||||
|
switch ws.upstreams[i].Type {
|
||||||
|
case Google:
|
||||||
|
upstreamURL += "?name=www.example.com&type=A"
|
||||||
|
acceptType = "application/dns-json"
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
// www.example.com
|
||||||
|
upstreamURL += "?dns=q80BAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB"
|
||||||
|
acceptType = "application/dns-message"
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := http.NewRequest(http.MethodGet, upstreamURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
/*log.Println("upstream:", upstreamURL, "type:", typeMap[upstream.Type], "check failed:", err)
|
||||||
|
continue*/
|
||||||
|
|
||||||
|
// should I only log it? But if there is an error, I think when query the server will return error too
|
||||||
|
panic("upstream: " + upstreamURL + " type: " + typeMap[ws.upstreams[i].Type] + " check failed: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Set("accept", acceptType)
|
||||||
|
|
||||||
|
resp, err := ws.client.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&ws.upstreams[i].effectiveWeight, -10) < 1 {
|
||||||
|
atomic.StoreInt32(&ws.upstreams[i].effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
switch ws.upstreams[i].Type {
|
||||||
|
case Google:
|
||||||
|
ws.checkGoogleResponse(resp, ws.upstreams[i])
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
ws.checkIETFResponse(resp, ws.upstreams[i])
|
||||||
|
}
|
||||||
|
}(i)
|
||||||
|
}
|
||||||
|
|
||||||
|
wg.Wait()
|
||||||
|
|
||||||
|
time.Sleep(15 * time.Second)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// nginx wrr like
|
||||||
|
func (ws *NginxWRRSelector) Get() *Upstream {
|
||||||
|
var (
|
||||||
|
total int32
|
||||||
|
bestUpstreamIndex = -1
|
||||||
|
)
|
||||||
|
|
||||||
|
for i := range ws.upstreams {
|
||||||
|
effectiveWeight := atomic.LoadInt32(&ws.upstreams[i].effectiveWeight)
|
||||||
|
atomic.AddInt32(&ws.upstreams[i].currentWeight, effectiveWeight)
|
||||||
|
total += effectiveWeight
|
||||||
|
|
||||||
|
if bestUpstreamIndex == -1 || atomic.LoadInt32(&ws.upstreams[i].currentWeight) > atomic.LoadInt32(&ws.upstreams[bestUpstreamIndex].currentWeight) {
|
||||||
|
bestUpstreamIndex = i
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
atomic.AddInt32(&ws.upstreams[bestUpstreamIndex].currentWeight, -total)
|
||||||
|
|
||||||
|
return ws.upstreams[bestUpstreamIndex]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) ReportUpstreamStatus(upstream *Upstream, upstreamStatus upstreamStatus) {
|
||||||
|
switch upstreamStatus {
|
||||||
|
case Timeout:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -5) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
case Error:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -3) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
case OK:
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 1) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) checkGoogleResponse(resp *http.Response, upstream *Upstream) {
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
// server error
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -3) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
m := make(map[string]interface{})
|
||||||
|
if err := json.NewDecoder(resp.Body).Decode(&m); err != nil {
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -2) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if status, ok := m["Status"]; ok {
|
||||||
|
if statusNum, ok := status.(float64); ok && statusNum == 0 {
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 5) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// should I check error in detail?
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -2) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) checkIETFResponse(resp *http.Response, upstream *Upstream) {
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
// server error
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, -5) < 1 {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, 1)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if atomic.AddInt32(&upstream.effectiveWeight, 5) > upstream.weight {
|
||||||
|
atomic.StoreInt32(&upstream.effectiveWeight, upstream.weight)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ws *NginxWRRSelector) ReportWeights() {
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
time.Sleep(15 * time.Second)
|
||||||
|
|
||||||
|
for _, u := range ws.upstreams {
|
||||||
|
log.Printf("%s, effect weight: %d", u, atomic.LoadInt32(&u.effectiveWeight))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
50
doh-client/selector/randomSelector.go
Normal file
50
doh-client/selector/randomSelector.go
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"math/rand"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
|
}
|
||||||
|
|
||||||
|
type RandomSelector struct {
|
||||||
|
upstreams []*Upstream
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRandomSelector() *RandomSelector {
|
||||||
|
return new(RandomSelector)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rs *RandomSelector) Add(url string, upstreamType UpstreamType) (err error) {
|
||||||
|
switch upstreamType {
|
||||||
|
case Google:
|
||||||
|
rs.upstreams = append(rs.upstreams, &Upstream{
|
||||||
|
Type: Google,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-json",
|
||||||
|
})
|
||||||
|
|
||||||
|
case IETF:
|
||||||
|
rs.upstreams = append(rs.upstreams, &Upstream{
|
||||||
|
Type: IETF,
|
||||||
|
URL: url,
|
||||||
|
RequestType: "application/dns-message",
|
||||||
|
})
|
||||||
|
|
||||||
|
default:
|
||||||
|
return errors.New("unknown upstream type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rs *RandomSelector) Get() *Upstream {
|
||||||
|
return rs.upstreams[rand.Intn(len(rs.upstreams))]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rs *RandomSelector) StartEvaluate() {}
|
||||||
|
|
||||||
|
func (rs *RandomSelector) ReportUpstreamStatus(upstream *Upstream, upstreamStatus upstreamStatus) {}
|
||||||
17
doh-client/selector/selector.go
Normal file
17
doh-client/selector/selector.go
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
type Selector interface {
|
||||||
|
// Get returns a upstream
|
||||||
|
Get() *Upstream
|
||||||
|
|
||||||
|
// StartEvaluate start upstream evaluation loop
|
||||||
|
StartEvaluate()
|
||||||
|
|
||||||
|
// ReportUpstreamStatus report upstream status
|
||||||
|
ReportUpstreamStatus(upstream *Upstream, upstreamStatus upstreamStatus)
|
||||||
|
}
|
||||||
|
|
||||||
|
type DebugReporter interface {
|
||||||
|
// ReportWeights starts a goroutine to report all upstream weights, recommend interval is 15s
|
||||||
|
ReportWeights()
|
||||||
|
}
|
||||||
28
doh-client/selector/upstream.go
Normal file
28
doh-client/selector/upstream.go
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
import "fmt"
|
||||||
|
|
||||||
|
type UpstreamType int
|
||||||
|
|
||||||
|
const (
|
||||||
|
Google UpstreamType = iota
|
||||||
|
IETF
|
||||||
|
)
|
||||||
|
|
||||||
|
var typeMap = map[UpstreamType]string{
|
||||||
|
Google: "Google",
|
||||||
|
IETF: "IETF",
|
||||||
|
}
|
||||||
|
|
||||||
|
type Upstream struct {
|
||||||
|
Type UpstreamType
|
||||||
|
URL string
|
||||||
|
RequestType string
|
||||||
|
weight int32
|
||||||
|
effectiveWeight int32
|
||||||
|
currentWeight int32
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u Upstream) String() string {
|
||||||
|
return fmt.Sprintf("upstream type: %s, upstream url: %s", typeMap[u.Type], u.URL)
|
||||||
|
}
|
||||||
14
doh-client/selector/upstreamStatus.go
Normal file
14
doh-client/selector/upstreamStatus.go
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
package selector
|
||||||
|
|
||||||
|
type upstreamStatus int
|
||||||
|
|
||||||
|
const (
|
||||||
|
// when query upstream timeout, usually upstream is unavailable for a long time
|
||||||
|
Timeout upstreamStatus = iota
|
||||||
|
|
||||||
|
// when query upstream return 5xx response, upstream still alive, maybe just a lof of query for him
|
||||||
|
Error
|
||||||
|
|
||||||
|
// when query upstream ok, means upstream is available
|
||||||
|
OK
|
||||||
|
)
|
||||||
@@ -23,5 +23,7 @@
|
|||||||
|
|
||||||
package main
|
package main
|
||||||
|
|
||||||
const VERSION = "1.3.3"
|
const (
|
||||||
const USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
VERSION = "2.0.1"
|
||||||
|
USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
||||||
|
)
|
||||||
|
|||||||
@@ -30,15 +30,18 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type config struct {
|
type config struct {
|
||||||
Listen []string `toml:"listen"`
|
Listen []string `toml:"listen"`
|
||||||
Cert string `toml:"cert"`
|
LocalAddr string `toml:"local_addr"`
|
||||||
Key string `toml:"key"`
|
Cert string `toml:"cert"`
|
||||||
Path string `toml:"path"`
|
Key string `toml:"key"`
|
||||||
Upstream []string `toml:"upstream"`
|
Path string `toml:"path"`
|
||||||
Timeout uint `toml:"timeout"`
|
Upstream []string `toml:"upstream"`
|
||||||
Tries uint `toml:"tries"`
|
Timeout uint `toml:"timeout"`
|
||||||
TCPOnly bool `toml:"tcp_only"`
|
Tries uint `toml:"tries"`
|
||||||
Verbose bool `toml:"verbose"`
|
TCPOnly bool `toml:"tcp_only"`
|
||||||
|
Verbose bool `toml:"verbose"`
|
||||||
|
DebugHTTPHeaders []string `toml:"debug_http_headers"`
|
||||||
|
LogGuessedIP bool `toml:"log_guessed_client_ip"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func loadConfig(path string) (*config, error) {
|
func loadConfig(path string) (*config, error) {
|
||||||
|
|||||||
@@ -4,10 +4,19 @@ listen = [
|
|||||||
"[::1]:8053",
|
"[::1]:8053",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
# Local address and port for upstream DNS
|
||||||
|
# If left empty, a local address is automatically chosen.
|
||||||
|
local_addr = ""
|
||||||
|
|
||||||
# TLS certification file
|
# TLS certification file
|
||||||
|
# If left empty, plain-text HTTP will be used.
|
||||||
|
# You are recommended to leave empty and to use a server load balancer (e.g.
|
||||||
|
# Caddy, Nginx) and set up TLS there, because this program does not do OCSP
|
||||||
|
# Stapling, which is necessary for client bootstrapping in a network
|
||||||
|
# environment with completely no traditional DNS service.
|
||||||
cert = ""
|
cert = ""
|
||||||
|
|
||||||
# TLS key file
|
# TLS private key file
|
||||||
key = ""
|
key = ""
|
||||||
|
|
||||||
# HTTP path for resolve application
|
# HTTP path for resolve application
|
||||||
@@ -16,6 +25,8 @@ path = "/dns-query"
|
|||||||
# Upstream DNS resolver
|
# Upstream DNS resolver
|
||||||
# If multiple servers are specified, a random one will be chosen each time.
|
# If multiple servers are specified, a random one will be chosen each time.
|
||||||
upstream = [
|
upstream = [
|
||||||
|
"1.1.1.1:53",
|
||||||
|
"1.0.0.1:53",
|
||||||
"8.8.8.8:53",
|
"8.8.8.8:53",
|
||||||
"8.8.4.4:53",
|
"8.8.4.4:53",
|
||||||
]
|
]
|
||||||
@@ -31,3 +42,7 @@ tcp_only = false
|
|||||||
|
|
||||||
# Enable logging
|
# Enable logging
|
||||||
verbose = false
|
verbose = false
|
||||||
|
|
||||||
|
# Enable log IP from HTTPS-reverse proxy header: X-Forwarded-For or X-Real-IP
|
||||||
|
# Note: http uri/useragent log cannot be controlled by this config
|
||||||
|
log_guessed_client_ip = false
|
||||||
|
|||||||
@@ -24,6 +24,7 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
@@ -38,7 +39,7 @@ import (
|
|||||||
"golang.org/x/net/idna"
|
"golang.org/x/net/idna"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNSRequest {
|
func (s *Server) parseRequestGoogle(ctx context.Context, w http.ResponseWriter, r *http.Request) *DNSRequest {
|
||||||
name := r.FormValue("name")
|
name := r.FormValue("name")
|
||||||
if name == "" {
|
if name == "" {
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
@@ -46,7 +47,6 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
errtext: "Invalid argument value: \"name\"",
|
errtext: "Invalid argument value: \"name\"",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
name = strings.ToLower(name)
|
|
||||||
if punycode, err := idna.ToASCII(name); err == nil {
|
if punycode, err := idna.ToASCII(name); err == nil {
|
||||||
name = punycode
|
name = punycode
|
||||||
} else {
|
} else {
|
||||||
@@ -72,9 +72,9 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
|
|
||||||
cdStr := r.FormValue("cd")
|
cdStr := r.FormValue("cd")
|
||||||
cd := false
|
cd := false
|
||||||
if cdStr == "1" || cdStr == "true" {
|
if cdStr == "1" || strings.EqualFold(cdStr, "true") {
|
||||||
cd = true
|
cd = true
|
||||||
} else if cdStr == "0" || cdStr == "false" || cdStr == "" {
|
} else if cdStr == "0" || strings.EqualFold(cdStr, "false") || cdStr == "" {
|
||||||
} else {
|
} else {
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
errcode: 400,
|
errcode: 400,
|
||||||
@@ -105,7 +105,7 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientFamily = 2
|
ednsClientFamily = 2
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
ednsClientAddress = net.ParseIP(ednsClientSubnet[:slash])
|
ednsClientAddress = net.ParseIP(ednsClientSubnet[:slash])
|
||||||
@@ -140,7 +140,7 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientFamily = 2
|
ednsClientFamily = 2
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -150,7 +150,7 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
opt := new(dns.OPT)
|
opt := new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(true)
|
opt.SetDo(true)
|
||||||
if ednsClientAddress != nil {
|
if ednsClientAddress != nil {
|
||||||
edns0Subnet := new(dns.EDNS0_SUBNET)
|
edns0Subnet := new(dns.EDNS0_SUBNET)
|
||||||
@@ -169,7 +169,7 @@ func (s *Server) parseRequestGoogle(w http.ResponseWriter, r *http.Request) *DNS
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) generateResponseGoogle(w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
func (s *Server) generateResponseGoogle(ctx context.Context, w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
||||||
respJSON := jsonDNS.Marshal(req.response)
|
respJSON := jsonDNS.Marshal(req.response)
|
||||||
respStr, err := json.Marshal(respJSON)
|
respStr, err := json.Marshal(respJSON)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -182,11 +182,12 @@ func (s *Server) generateResponseGoogle(w http.ResponseWriter, r *http.Request,
|
|||||||
now := time.Now().UTC().Format(http.TimeFormat)
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
w.Header().Set("Date", now)
|
w.Header().Set("Date", now)
|
||||||
w.Header().Set("Last-Modified", now)
|
w.Header().Set("Last-Modified", now)
|
||||||
|
w.Header().Set("Vary", "Accept")
|
||||||
if respJSON.HaveTTL {
|
if respJSON.HaveTTL {
|
||||||
if req.isTailored {
|
if req.isTailored {
|
||||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "private, max-age="+strconv.FormatUint(uint64(respJSON.LeastTTL), 10))
|
||||||
} else {
|
} else {
|
||||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "public, max-age="+strconv.FormatUint(uint64(respJSON.LeastTTL), 10))
|
||||||
}
|
}
|
||||||
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -24,19 +24,23 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/m13253/dns-over-https/json-dns"
|
"github.com/m13253/dns-over-https/json-dns"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRequest {
|
func (s *Server) parseRequestIETF(ctx context.Context, w http.ResponseWriter, r *http.Request) *DNSRequest {
|
||||||
requestBase64 := r.FormValue("dns")
|
requestBase64 := r.FormValue("dns")
|
||||||
requestBinary, err := base64.RawURLEncoding.DecodeString(requestBase64)
|
requestBinary, err := base64.RawURLEncoding.DecodeString(requestBase64)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -60,6 +64,13 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
errtext: fmt.Sprintf("Invalid argument value: \"dns\""),
|
errtext: fmt.Sprintf("Invalid argument value: \"dns\""),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if s.patchDNSCryptProxyReqID(w, r, requestBinary) {
|
||||||
|
return &DNSRequest{
|
||||||
|
errcode: 444,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
msg := new(dns.Msg)
|
msg := new(dns.Msg)
|
||||||
err = msg.Unpack(requestBinary)
|
err = msg.Unpack(requestBinary)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -76,26 +87,35 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
if qclass, ok := dns.ClassToString[question.Qclass]; ok {
|
if qclass, ok := dns.ClassToString[question.Qclass]; ok {
|
||||||
questionClass = qclass
|
questionClass = qclass
|
||||||
} else {
|
} else {
|
||||||
questionClass = strconv.Itoa(int(question.Qclass))
|
questionClass = strconv.FormatUint(uint64(question.Qclass), 10)
|
||||||
}
|
}
|
||||||
questionType := ""
|
questionType := ""
|
||||||
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
if qtype, ok := dns.TypeToString[question.Qtype]; ok {
|
||||||
questionType = qtype
|
questionType = qtype
|
||||||
} else {
|
} else {
|
||||||
questionType = strconv.Itoa(int(question.Qtype))
|
questionType = strconv.FormatUint(uint64(question.Qtype), 10)
|
||||||
|
}
|
||||||
|
var clientip net.IP = nil
|
||||||
|
if s.conf.LogGuessedIP {
|
||||||
|
clientip = s.findClientIP(r)
|
||||||
|
}
|
||||||
|
if clientip != nil {
|
||||||
|
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", clientip, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
||||||
|
} else {
|
||||||
|
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", r.RemoteAddr, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
||||||
}
|
}
|
||||||
fmt.Printf("%s - - [%s] \"%s %s %s\"\n", r.RemoteAddr, time.Now().Format("02/Jan/2006:15:04:05 -0700"), questionName, questionClass, questionType)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
transactionID := msg.Id
|
||||||
msg.Id = dns.Id()
|
msg.Id = dns.Id()
|
||||||
opt := msg.IsEdns0()
|
opt := msg.IsEdns0()
|
||||||
if opt == nil {
|
if opt == nil {
|
||||||
opt = new(dns.OPT)
|
opt = new(dns.OPT)
|
||||||
opt.Hdr.Name = "."
|
opt.Hdr.Name = "."
|
||||||
opt.Hdr.Rrtype = dns.TypeOPT
|
opt.Hdr.Rrtype = dns.TypeOPT
|
||||||
opt.SetUDPSize(4096)
|
opt.SetUDPSize(dns.DefaultMsgSize)
|
||||||
opt.SetDo(false)
|
opt.SetDo(false)
|
||||||
msg.Extra = append(msg.Extra, opt)
|
msg.Extra = append([]dns.RR{opt}, msg.Extra...)
|
||||||
}
|
}
|
||||||
var edns0Subnet *dns.EDNS0_SUBNET
|
var edns0Subnet *dns.EDNS0_SUBNET
|
||||||
for _, option := range opt.Option {
|
for _, option := range opt.Option {
|
||||||
@@ -116,7 +136,7 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientFamily = 2
|
ednsClientFamily = 2
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
edns0Subnet = new(dns.EDNS0_SUBNET)
|
edns0Subnet = new(dns.EDNS0_SUBNET)
|
||||||
edns0Subnet.Code = dns.EDNS0SUBNET
|
edns0Subnet.Code = dns.EDNS0SUBNET
|
||||||
@@ -129,14 +149,15 @@ func (s *Server) parseRequestIETF(w http.ResponseWriter, r *http.Request) *DNSRe
|
|||||||
}
|
}
|
||||||
|
|
||||||
return &DNSRequest{
|
return &DNSRequest{
|
||||||
request: msg,
|
request: msg,
|
||||||
isTailored: isTailored,
|
transactionID: transactionID,
|
||||||
|
isTailored: isTailored,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
func (s *Server) generateResponseIETF(ctx context.Context, w http.ResponseWriter, r *http.Request, req *DNSRequest) {
|
||||||
respJSON := jsonDNS.Marshal(req.response)
|
respJSON := jsonDNS.Marshal(req.response)
|
||||||
req.response.Id = 0
|
req.response.Id = req.transactionID
|
||||||
respBytes, err := req.response.Pack()
|
respBytes, err := req.response.Pack()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
@@ -148,16 +169,47 @@ func (s *Server) generateResponseIETF(w http.ResponseWriter, r *http.Request, re
|
|||||||
now := time.Now().UTC().Format(http.TimeFormat)
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
w.Header().Set("Date", now)
|
w.Header().Set("Date", now)
|
||||||
w.Header().Set("Last-Modified", now)
|
w.Header().Set("Last-Modified", now)
|
||||||
|
w.Header().Set("Vary", "Accept")
|
||||||
|
|
||||||
|
_ = s.patchFirefoxContentType(w, r, req)
|
||||||
|
|
||||||
if respJSON.HaveTTL {
|
if respJSON.HaveTTL {
|
||||||
if req.isTailored {
|
if req.isTailored {
|
||||||
w.Header().Set("Cache-Control", "private, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "private, max-age="+strconv.FormatUint(uint64(respJSON.LeastTTL), 10))
|
||||||
} else {
|
} else {
|
||||||
w.Header().Set("Cache-Control", "public, max-age="+strconv.Itoa(int(respJSON.LeastTTL)))
|
w.Header().Set("Cache-Control", "public, max-age="+strconv.FormatUint(uint64(respJSON.LeastTTL), 10))
|
||||||
}
|
}
|
||||||
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
w.Header().Set("Expires", respJSON.EarliestExpires.Format(http.TimeFormat))
|
||||||
}
|
}
|
||||||
|
|
||||||
if respJSON.Status == dns.RcodeServerFailure {
|
if respJSON.Status == dns.RcodeServerFailure {
|
||||||
w.WriteHeader(503)
|
w.WriteHeader(503)
|
||||||
}
|
}
|
||||||
w.Write(respBytes)
|
w.Write(respBytes)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Workaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe
|
||||||
|
func (s *Server) patchDNSCryptProxyReqID(w http.ResponseWriter, r *http.Request, requestBinary []byte) bool {
|
||||||
|
if strings.Contains(r.UserAgent(), "dnscrypt-proxy") && bytes.Equal(requestBinary, []byte("\xca\xfe\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01\x00\x00\x02\x00\x01\x00\x00\x29\x10\x00\x00\x00\x80\x00\x00\x00")) {
|
||||||
|
log.Println("DNSCrypt-Proxy detected. Patching response.")
|
||||||
|
w.Header().Set("Content-Type", "application/dns-message")
|
||||||
|
w.Header().Set("Vary", "Accept, User-Agent")
|
||||||
|
now := time.Now().UTC().Format(http.TimeFormat)
|
||||||
|
w.Header().Set("Date", now)
|
||||||
|
w.Write([]byte("\xca\xfe\x81\x05\x00\x01\x00\x01\x00\x00\x00\x00\x00\x00\x02\x00\x01\x00\x00\x10\x00\x01\x00\x00\x00\x00\x00\xa8\xa7\r\nWorkaround a bug causing DNSCrypt-Proxy to expect a response with TransactionID = 0xcafe\r\nRefer to https://github.com/jedisct1/dnscrypt-proxy/issues/526 for details."))
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Workaround a bug causing Firefox 61-62 to reject responses with Content-Type = application/dns-message
|
||||||
|
func (s *Server) patchFirefoxContentType(w http.ResponseWriter, r *http.Request, req *DNSRequest) bool {
|
||||||
|
if strings.Contains(r.UserAgent(), "Firefox") && strings.Contains(r.Header.Get("Accept"), "application/dns-udpwireformat") && !strings.Contains(r.Header.Get("Accept"), "application/dns-message") {
|
||||||
|
log.Println("Firefox 61-62 detected. Patching response.")
|
||||||
|
w.Header().Set("Content-Type", "application/dns-udpwireformat")
|
||||||
|
w.Header().Set("Vary", "Accept, User-Agent")
|
||||||
|
req.isTailored = true
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|||||||
@@ -25,14 +25,82 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"flag"
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"strconv"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func checkPIDFile(pidFile string) (bool, error) {
|
||||||
|
retry:
|
||||||
|
f, err := os.OpenFile(pidFile, os.O_WRONLY|os.O_CREATE|os.O_EXCL, 0666)
|
||||||
|
if os.IsExist(err) {
|
||||||
|
pidStr, err := ioutil.ReadFile(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
pid, err := strconv.ParseUint(string(pidStr), 10, 0)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
_, err = os.Stat(fmt.Sprintf("/proc/%d", pid))
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
err = os.Remove(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
goto retry
|
||||||
|
} else if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
log.Printf("Already running on PID %d, exiting.\n", pid)
|
||||||
|
return false, nil
|
||||||
|
} else if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
_, err = io.WriteString(f, strconv.FormatInt(int64(os.Getpid()), 10))
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
confPath := flag.String("conf", "doh-server.conf", "Configuration file")
|
confPath := flag.String("conf", "doh-server.conf", "Configuration file")
|
||||||
verbose := flag.Bool("verbose", false, "Enable logging")
|
verbose := flag.Bool("verbose", false, "Enable logging")
|
||||||
|
showVersion := flag.Bool("version", false, "Show software version and exit")
|
||||||
|
var pidFile *string
|
||||||
|
|
||||||
|
// I really want to push the technology forward by recommending cgroup-based
|
||||||
|
// process tracking. But I understand some cloud service providers have
|
||||||
|
// their own monitoring system. So this feature is only enabled on Linux and
|
||||||
|
// BSD series platforms which lacks functionality similar to cgroup.
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "dragonfly", "freebsd", "linux", "netbsd", "openbsd":
|
||||||
|
pidFile = flag.String("pid-file", "", "PID file for legacy supervision systems lacking support for reliable cgroup-based process tracking")
|
||||||
|
}
|
||||||
|
|
||||||
flag.Parse()
|
flag.Parse()
|
||||||
|
|
||||||
|
if *showVersion {
|
||||||
|
fmt.Printf("doh-server %s\nHomepage: https://github.com/m13253/dns-over-https\n", VERSION)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if pidFile != nil && *pidFile != "" {
|
||||||
|
ok, err := checkPIDFile(*pidFile)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error checking PID file: %v\n", err)
|
||||||
|
}
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
conf, err := loadConfig(*confPath)
|
conf, err := loadConfig(*confPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Fatalln(err)
|
||||||
@@ -42,6 +110,9 @@ func main() {
|
|||||||
conf.Verbose = true
|
conf.Verbose = true
|
||||||
}
|
}
|
||||||
|
|
||||||
server := NewServer(conf)
|
server, err := NewServer(conf)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalln(err)
|
||||||
|
}
|
||||||
_ = server.Start()
|
_ = server.Start()
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -24,6 +24,7 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
"math/rand"
|
"math/rand"
|
||||||
@@ -46,28 +47,50 @@ type Server struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type DNSRequest struct {
|
type DNSRequest struct {
|
||||||
request *dns.Msg
|
request *dns.Msg
|
||||||
response *dns.Msg
|
response *dns.Msg
|
||||||
isTailored bool
|
transactionID uint16
|
||||||
errcode int
|
currentUpstream string
|
||||||
errtext string
|
isTailored bool
|
||||||
|
errcode int
|
||||||
|
errtext string
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(conf *config) (s *Server) {
|
func NewServer(conf *config) (*Server, error) {
|
||||||
s = &Server{
|
timeout := time.Duration(conf.Timeout) * time.Second
|
||||||
|
s := &Server{
|
||||||
conf: conf,
|
conf: conf,
|
||||||
udpClient: &dns.Client{
|
udpClient: &dns.Client{
|
||||||
Net: "udp",
|
Net: "udp",
|
||||||
Timeout: time.Duration(conf.Timeout) * time.Second,
|
UDPSize: dns.DefaultMsgSize,
|
||||||
|
Timeout: timeout,
|
||||||
},
|
},
|
||||||
tcpClient: &dns.Client{
|
tcpClient: &dns.Client{
|
||||||
Net: "tcp",
|
Net: "tcp",
|
||||||
Timeout: time.Duration(conf.Timeout) * time.Second,
|
Timeout: timeout,
|
||||||
},
|
},
|
||||||
servemux: http.NewServeMux(),
|
servemux: http.NewServeMux(),
|
||||||
}
|
}
|
||||||
|
if conf.LocalAddr != "" {
|
||||||
|
udpLocalAddr, err := net.ResolveUDPAddr("udp", conf.LocalAddr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
tcpLocalAddr, err := net.ResolveTCPAddr("tcp", conf.LocalAddr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
s.udpClient.Dialer = &net.Dialer{
|
||||||
|
Timeout: timeout,
|
||||||
|
LocalAddr: udpLocalAddr,
|
||||||
|
}
|
||||||
|
s.tcpClient.Dialer = &net.Dialer{
|
||||||
|
Timeout: timeout,
|
||||||
|
LocalAddr: tcpLocalAddr,
|
||||||
|
}
|
||||||
|
}
|
||||||
s.servemux.HandleFunc(conf.Path, s.handlerFunc)
|
s.servemux.HandleFunc(conf.Path, s.handlerFunc)
|
||||||
return
|
return s, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Start() error {
|
func (s *Server) Start() error {
|
||||||
@@ -102,13 +125,31 @@ func (s *Server) Start() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
||||||
|
ctx := r.Context()
|
||||||
|
|
||||||
|
w.Header().Set("Access-Control-Allow-Headers", "Content-Type")
|
||||||
|
w.Header().Set("Access-Control-Allow-Methods", "GET, HEAD, OPTIONS, POST")
|
||||||
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
||||||
|
w.Header().Set("Access-Control-Max-Age", "3600")
|
||||||
w.Header().Set("Server", USER_AGENT)
|
w.Header().Set("Server", USER_AGENT)
|
||||||
w.Header().Set("X-Powered-By", USER_AGENT)
|
w.Header().Set("X-Powered-By", USER_AGENT)
|
||||||
|
|
||||||
|
if r.Method == "OPTIONS" {
|
||||||
|
w.Header().Set("Content-Length", "0")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
if r.Form == nil {
|
if r.Form == nil {
|
||||||
const maxMemory = 32 << 20 // 32 MB
|
const maxMemory = 32 << 20 // 32 MB
|
||||||
r.ParseMultipartForm(maxMemory)
|
r.ParseMultipartForm(maxMemory)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
for _, header := range s.conf.DebugHTTPHeaders {
|
||||||
|
if value := r.Header.Get(header); value != "" {
|
||||||
|
log.Printf("%s: %s\n", header, value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
contentType := r.Header.Get("Content-Type")
|
contentType := r.Header.Get("Content-Type")
|
||||||
if ct := r.FormValue("ct"); ct != "" {
|
if ct := r.FormValue("ct"); ct != "" {
|
||||||
contentType = ct
|
contentType = ct
|
||||||
@@ -148,31 +189,36 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
var req *DNSRequest
|
var req *DNSRequest
|
||||||
if contentType == "application/dns-json" {
|
if contentType == "application/dns-json" {
|
||||||
req = s.parseRequestGoogle(w, r)
|
req = s.parseRequestGoogle(ctx, w, r)
|
||||||
} else if contentType == "application/dns-message" {
|
} else if contentType == "application/dns-message" {
|
||||||
req = s.parseRequestIETF(w, r)
|
req = s.parseRequestIETF(ctx, w, r)
|
||||||
} else if contentType == "application/dns-udpwireformat" {
|
} else if contentType == "application/dns-udpwireformat" {
|
||||||
req = s.parseRequestIETF(w, r)
|
req = s.parseRequestIETF(ctx, w, r)
|
||||||
} else {
|
} else {
|
||||||
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
if req.errcode == 444 {
|
||||||
|
return
|
||||||
|
}
|
||||||
if req.errcode != 0 {
|
if req.errcode != 0 {
|
||||||
jsonDNS.FormatError(w, req.errtext, req.errcode)
|
jsonDNS.FormatError(w, req.errtext, req.errcode)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
req = s.patchRootRD(req)
|
||||||
|
|
||||||
var err error
|
var err error
|
||||||
req.response, err = s.doDNSQuery(req.request)
|
req, err = s.doDNSQuery(ctx, req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
jsonDNS.FormatError(w, fmt.Sprintf("DNS query failure (%s)", err.Error()), 503)
|
jsonDNS.FormatError(w, fmt.Sprintf("DNS query failure (%s)", err.Error()), 503)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if responseType == "application/json" {
|
if responseType == "application/json" {
|
||||||
s.generateResponseGoogle(w, r, req)
|
s.generateResponseGoogle(ctx, w, r, req)
|
||||||
} else if responseType == "application/dns-message" {
|
} else if responseType == "application/dns-message" {
|
||||||
s.generateResponseIETF(w, r, req)
|
s.generateResponseIETF(ctx, w, r, req)
|
||||||
} else {
|
} else {
|
||||||
panic("Unknown response Content-Type")
|
panic("Unknown response Content-Type")
|
||||||
}
|
}
|
||||||
@@ -207,23 +253,34 @@ func (s *Server) findClientIP(r *http.Request) net.IP {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) doDNSQuery(msg *dns.Msg) (resp *dns.Msg, err error) {
|
// Workaround a bug causing Unbound to refuse returning anything about the root
|
||||||
|
func (s *Server) patchRootRD(req *DNSRequest) *DNSRequest {
|
||||||
|
for _, question := range req.request.Question {
|
||||||
|
if question.Name == "." {
|
||||||
|
req.request.RecursionDesired = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return req
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) doDNSQuery(ctx context.Context, req *DNSRequest) (resp *DNSRequest, err error) {
|
||||||
|
// TODO(m13253): Make ctx work. Waiting for a patch for ExchangeContext from miekg/dns.
|
||||||
numServers := len(s.conf.Upstream)
|
numServers := len(s.conf.Upstream)
|
||||||
for i := uint(0); i < s.conf.Tries; i++ {
|
for i := uint(0); i < s.conf.Tries; i++ {
|
||||||
server := s.conf.Upstream[rand.Intn(numServers)]
|
req.currentUpstream = s.conf.Upstream[rand.Intn(numServers)]
|
||||||
if !s.conf.TCPOnly {
|
if !s.conf.TCPOnly {
|
||||||
resp, _, err = s.udpClient.Exchange(msg, server)
|
req.response, _, err = s.udpClient.Exchange(req.request, req.currentUpstream)
|
||||||
if err == dns.ErrTruncated {
|
if err == nil && req.response != nil && req.response.Truncated {
|
||||||
log.Println(err)
|
log.Println(err)
|
||||||
resp, _, err = s.tcpClient.Exchange(msg, server)
|
req.response, _, err = s.tcpClient.Exchange(req.request, req.currentUpstream)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
resp, _, err = s.tcpClient.Exchange(msg, server)
|
req.response, _, err = s.tcpClient.Exchange(req.request, req.currentUpstream)
|
||||||
}
|
}
|
||||||
if err == nil {
|
if err == nil {
|
||||||
return
|
return req, nil
|
||||||
}
|
}
|
||||||
log.Println(err)
|
log.Printf("DNS error from upstream %s: %s\n", req.currentUpstream, err.Error())
|
||||||
}
|
}
|
||||||
return
|
return req, err
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -23,5 +23,7 @@
|
|||||||
|
|
||||||
package main
|
package main
|
||||||
|
|
||||||
const VERSION = "1.3.3"
|
const (
|
||||||
const USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
VERSION = "2.0.1"
|
||||||
|
USER_AGENT = "DNS-over-HTTPS/" + VERSION + " (+https://github.com/m13253/dns-over-https)"
|
||||||
|
)
|
||||||
|
|||||||
13
go.mod
Normal file
13
go.mod
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
module github.com/m13253/dns-over-https
|
||||||
|
|
||||||
|
go 1.12
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/BurntSushi/toml v0.3.1
|
||||||
|
github.com/gorilla/handlers v1.4.0
|
||||||
|
github.com/miekg/dns v1.1.6
|
||||||
|
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a // indirect
|
||||||
|
golang.org/x/net v0.0.0-20190311183353-d8887717615a
|
||||||
|
golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6 // indirect
|
||||||
|
golang.org/x/sys v0.0.0-20190312061237-fead79001313 // indirect
|
||||||
|
)
|
||||||
25
go.sum
Normal file
25
go.sum
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=
|
||||||
|
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
||||||
|
github.com/gorilla/handlers v1.4.0 h1:XulKRWSQK5uChr4pEgSE4Tc/OcmnU9GJuSwdog/tZsA=
|
||||||
|
github.com/gorilla/handlers v1.4.0/go.mod h1:Qkdc/uu4tH4g6mTK6auzZ766c4CA0Ng8+o/OAirnOIQ=
|
||||||
|
github.com/miekg/dns v1.1.4 h1:rCMZsU2ScVSYcAsOXgmC6+AKOK+6pmQTOcw03nfwYV0=
|
||||||
|
github.com/miekg/dns v1.1.4/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg=
|
||||||
|
github.com/miekg/dns v1.1.6 h1:jVwb4GDwD65q/gtItR/lIZHjNH93QfeGxZUkzJcW9mc=
|
||||||
|
github.com/miekg/dns v1.1.6/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg=
|
||||||
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2 h1:VklqNMn3ovrHsnt90PveolxSbWFaJdECFbxSq0Mqo2M=
|
||||||
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
|
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a h1:YX8ljsm6wXlHZO+aRz9Exqr0evNhKRNe5K/gi+zKh4U=
|
||||||
|
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
|
golang.org/x/net v0.0.0-20190301231341-16b79f2e4e95 h1:fY7Dsw114eJN4boqzVSbpVHO6rTdhq6/GnXeu+PKnzU=
|
||||||
|
golang.org/x/net v0.0.0-20190301231341-16b79f2e4e95/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
golang.org/x/net v0.0.0-20190311183353-d8887717615a h1:oWX7TPOiFAMXLq8o0ikBYfCJVlRHBcsciT5bXOrH628=
|
||||||
|
golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
||||||
|
golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6 h1:bjcUS9ztw9kFmmIxJInhon/0Is3p+EHBKNgquIzo1OI=
|
||||||
|
golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/sys v0.0.0-20190308023053-584f3b12f43e h1:K7CV15oJ823+HLXQ+M7MSMrUg8LjfqY7O3naO+8Pp/I=
|
||||||
|
golang.org/x/sys v0.0.0-20190308023053-584f3b12f43e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
golang.org/x/sys v0.0.0-20190312061237-fead79001313 h1:pczuHS43Cp2ktBEEmLwScxgjWsBSzdaQiKzUyf3DTTc=
|
||||||
|
golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
|
||||||
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
@@ -90,7 +90,7 @@ func Marshal(msg *dns.Msg) *Response {
|
|||||||
} else if ipv4 := clientAddress.To4(); ipv4 != nil {
|
} else if ipv4 := clientAddress.To4(); ipv4 != nil {
|
||||||
clientAddress = ipv4
|
clientAddress = ipv4
|
||||||
}
|
}
|
||||||
resp.EdnsClientSubnet = clientAddress.String() + "/" + strconv.Itoa(int(edns0.SourceScope))
|
resp.EdnsClientSubnet = clientAddress.String() + "/" + strconv.FormatUint(uint64(edns0.SourceScope), 10)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
continue
|
continue
|
||||||
|
|||||||
@@ -119,7 +119,7 @@ func Unmarshal(msg *dns.Msg, resp *Response, udpSize uint16, ednsClientNetmask u
|
|||||||
if ednsClientFamily == 1 {
|
if ednsClientFamily == 1 {
|
||||||
ednsClientNetmask = 24
|
ednsClientNetmask = 24
|
||||||
} else {
|
} else {
|
||||||
ednsClientNetmask = 48
|
ednsClientNetmask = 56
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
edns0Subnet := new(dns.EDNS0_SUBNET)
|
edns0Subnet := new(dns.EDNS0_SUBNET)
|
||||||
|
|||||||
@@ -6,6 +6,8 @@
|
|||||||
<string>org.eu.starlab.doh.client</string>
|
<string>org.eu.starlab.doh.client</string>
|
||||||
<key>ProgramArguments</key>
|
<key>ProgramArguments</key>
|
||||||
<array>
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-logger</string>
|
||||||
|
<string>doh-client</string>
|
||||||
<string>/usr/local/bin/doh-client</string>
|
<string>/usr/local/bin/doh-client</string>
|
||||||
<string>-conf</string>
|
<string>-conf</string>
|
||||||
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
|
||||||
|
|||||||
@@ -6,6 +6,8 @@
|
|||||||
<string>org.eu.starlab.doh.server</string>
|
<string>org.eu.starlab.doh.server</string>
|
||||||
<key>ProgramArguments</key>
|
<key>ProgramArguments</key>
|
||||||
<array>
|
<array>
|
||||||
|
<string>/usr/local/bin/doh-logger</string>
|
||||||
|
<string>doh-server</string>
|
||||||
<string>/usr/local/bin/doh-server</string>
|
<string>/usr/local/bin/doh-server</string>
|
||||||
<string>-conf</string>
|
<string>-conf</string>
|
||||||
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
|
||||||
|
|||||||
Reference in New Issue
Block a user