dns_server: fix issue of incorrect caching results when enable ip white list.
This commit is contained in:
@@ -3214,6 +3214,7 @@ static int _dns_server_process_answer(struct dns_request *request, const char *d
|
|||||||
int j = 0;
|
int j = 0;
|
||||||
struct dns_rrs *rrs = NULL;
|
struct dns_rrs *rrs = NULL;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
int is_skip = 0;
|
||||||
|
|
||||||
if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
|
if (packet->head.rcode != DNS_RC_NOERROR && packet->head.rcode != DNS_RC_NXDOMAIN) {
|
||||||
if (request->rcode == DNS_RC_SERVFAIL) {
|
if (request->rcode == DNS_RC_SERVFAIL) {
|
||||||
@@ -3225,11 +3226,6 @@ static int _dns_server_process_answer(struct dns_request *request, const char *d
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
request->remote_server_fail = 0;
|
|
||||||
if (request->rcode == DNS_RC_SERVFAIL) {
|
|
||||||
request->rcode = packet->head.rcode;
|
|
||||||
}
|
|
||||||
|
|
||||||
for (j = 1; j < DNS_RRS_OPT; j++) {
|
for (j = 1; j < DNS_RRS_OPT; j++) {
|
||||||
rrs = dns_get_rrs_start(packet, j, &rr_count);
|
rrs = dns_get_rrs_start(packet, j, &rr_count);
|
||||||
for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
|
for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
|
||||||
@@ -3239,6 +3235,7 @@ static int _dns_server_process_answer(struct dns_request *request, const char *d
|
|||||||
if (ret == -1) {
|
if (ret == -1) {
|
||||||
break;
|
break;
|
||||||
} else if (ret == -2) {
|
} else if (ret == -2) {
|
||||||
|
is_skip = 1;
|
||||||
continue;
|
continue;
|
||||||
} else if (ret == -3) {
|
} else if (ret == -3) {
|
||||||
return -1;
|
return -1;
|
||||||
@@ -3250,6 +3247,7 @@ static int _dns_server_process_answer(struct dns_request *request, const char *d
|
|||||||
if (ret == -1) {
|
if (ret == -1) {
|
||||||
break;
|
break;
|
||||||
} else if (ret == -2) {
|
} else if (ret == -2) {
|
||||||
|
is_skip = 1;
|
||||||
continue;
|
continue;
|
||||||
} else if (ret == -3) {
|
} else if (ret == -3) {
|
||||||
return -1;
|
return -1;
|
||||||
@@ -3304,6 +3302,11 @@ static int _dns_server_process_answer(struct dns_request *request, const char *d
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
request->remote_server_fail = 0;
|
||||||
|
if (request->rcode == DNS_RC_SERVFAIL && is_skip == 0) {
|
||||||
|
request->rcode = packet->head.rcode;
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -3329,11 +3332,6 @@ static int _dns_server_passthrough_rule_check(struct dns_request *request, const
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
request->remote_server_fail = 0;
|
|
||||||
if (request->rcode == DNS_RC_SERVFAIL) {
|
|
||||||
request->rcode = packet->head.rcode;
|
|
||||||
}
|
|
||||||
|
|
||||||
for (j = 1; j < DNS_RRS_OPT; j++) {
|
for (j = 1; j < DNS_RRS_OPT; j++) {
|
||||||
rrs = dns_get_rrs_start(packet, j, &rr_count);
|
rrs = dns_get_rrs_start(packet, j, &rr_count);
|
||||||
for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
|
for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
|
||||||
@@ -3438,6 +3436,11 @@ static int _dns_server_passthrough_rule_check(struct dns_request *request, const
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
request->remote_server_fail = 0;
|
||||||
|
if (request->rcode == DNS_RC_SERVFAIL) {
|
||||||
|
request->rcode = packet->head.rcode;
|
||||||
|
}
|
||||||
|
|
||||||
*pttl = ttl;
|
*pttl = ttl;
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
@@ -7063,6 +7066,8 @@ static int _dns_create_socket(const char *host_ip, int type)
|
|||||||
tlog(TLOG_ERROR, "set socket opt failed.");
|
tlog(TLOG_ERROR, "set socket opt failed.");
|
||||||
goto errout;
|
goto errout;
|
||||||
}
|
}
|
||||||
|
/* enable TCP_FASTOPEN */
|
||||||
|
setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &optval, sizeof(optval));
|
||||||
setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &yes, sizeof(yes));
|
setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &yes, sizeof(yes));
|
||||||
} else {
|
} else {
|
||||||
setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &optval, sizeof(optval));
|
setsockopt(fd, IPPROTO_IP, IP_PKTINFO, &optval, sizeof(optval));
|
||||||
@@ -7261,7 +7266,7 @@ static int _dns_server_socket_tls(struct dns_bind_ip *bind_ip, DNS_CONN_TYPE con
|
|||||||
}
|
}
|
||||||
|
|
||||||
SSL_CTX_set_session_cache_mode(ssl_ctx,
|
SSL_CTX_set_session_cache_mode(ssl_ctx,
|
||||||
SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_NO_INTERNAL | SSL_SESS_CACHE_NO_AUTO_CLEAR);
|
SSL_SESS_CACHE_BOTH | SSL_SESS_CACHE_NO_INTERNAL | SSL_SESS_CACHE_NO_AUTO_CLEAR);
|
||||||
SSL_CTX_set_default_passwd_cb(ssl_ctx, _dns_server_socket_tls_ssl_pass_callback);
|
SSL_CTX_set_default_passwd_cb(ssl_ctx, _dns_server_socket_tls_ssl_pass_callback);
|
||||||
SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, bind_ip);
|
SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, bind_ip);
|
||||||
|
|
||||||
|
|||||||
@@ -73,6 +73,48 @@ cache-persist no)""");
|
|||||||
EXPECT_EQ(client.GetAnswer()[0].GetData(), "4.5.6.7");
|
EXPECT_EQ(client.GetAnswer()[0].GetData(), "4.5.6.7");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TEST_F(IPRule, white_list_not_in)
|
||||||
|
{
|
||||||
|
smartdns::MockServer server_upstream;
|
||||||
|
smartdns::MockServer server_upstream2;
|
||||||
|
smartdns::Server server;
|
||||||
|
|
||||||
|
server_upstream.Start("udp://0.0.0.0:61053", [](struct smartdns::ServerRequestContext *request) {
|
||||||
|
if (request->qtype != DNS_T_A) {
|
||||||
|
return smartdns::SERVER_REQUEST_SOA;
|
||||||
|
}
|
||||||
|
|
||||||
|
smartdns::MockServer::AddIP(request, request->domain.c_str(), "1.2.3.4", 611);
|
||||||
|
return smartdns::SERVER_REQUEST_OK;
|
||||||
|
});
|
||||||
|
|
||||||
|
server_upstream2.Start("udp://0.0.0.0:62053", [](struct smartdns::ServerRequestContext *request) {
|
||||||
|
if (request->qtype != DNS_T_A) {
|
||||||
|
return smartdns::SERVER_REQUEST_SOA;
|
||||||
|
}
|
||||||
|
|
||||||
|
smartdns::MockServer::AddIP(request, request->domain.c_str(), "9.10.11.12", 611);
|
||||||
|
return smartdns::SERVER_REQUEST_OK;
|
||||||
|
});
|
||||||
|
|
||||||
|
/* this ip will be discard, but is reachable */
|
||||||
|
server.MockPing(PING_TYPE_ICMP, "1.2.3.4", 60, 10);
|
||||||
|
|
||||||
|
server.Start(R"""(bind [::]:60053
|
||||||
|
server udp://127.0.0.1:61053 -whitelist-ip
|
||||||
|
server udp://127.0.0.1:62053 -whitelist-ip
|
||||||
|
whitelist-ip 4.5.6.7/24
|
||||||
|
log-num 0
|
||||||
|
log-console yes
|
||||||
|
log-level debug
|
||||||
|
cache-persist no)""");
|
||||||
|
smartdns::Client client;
|
||||||
|
ASSERT_TRUE(client.Query("a.com", 60053));
|
||||||
|
std::cout << client.GetResult() << std::endl;
|
||||||
|
ASSERT_EQ(client.GetAnswerNum(), 0);
|
||||||
|
EXPECT_EQ(client.GetStatus(), "SERVFAIL");
|
||||||
|
}
|
||||||
|
|
||||||
TEST_F(IPRule, black_list)
|
TEST_F(IPRule, black_list)
|
||||||
{
|
{
|
||||||
smartdns::MockServer server_upstream;
|
smartdns::MockServer server_upstream;
|
||||||
|
|||||||
Reference in New Issue
Block a user