]> git.ipfire.org Git - thirdparty/pdns.git/blame - pdns/nproxy.cc
Merge pull request #4868 from grinapo/master
[thirdparty/pdns.git] / pdns / nproxy.cc
CommitLineData
12471842
PL
1/*
2 * This file is part of PowerDNS or dnsdist.
3 * Copyright -- PowerDNS.COM B.V. and its contributors
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
8 *
9 * In addition, for the avoidance of any doubt, permission is granted to
10 * link this program with OpenSSL and to (re)distribute the binaries
11 * produced as the result of such linking.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
870a0fe4
AT
22#ifdef HAVE_CONFIG_H
23#include "config.h"
24#endif
0efda032
BH
25#include <bitset>
26#include "dnsparser.hh"
27#include "iputils.hh"
28#undef L
29#include <boost/program_options.hpp>
30
31#include <boost/format.hpp>
32#include <boost/utility.hpp>
33#include <boost/multi_index_container.hpp>
34#include <boost/multi_index/ordered_index.hpp>
35#include <boost/multi_index/key_extractors.hpp>
8472da1b
BH
36#include <boost/algorithm/string.hpp>
37#include <sys/types.h>
38#include <sys/stat.h>
39#include <fcntl.h>
2d21c5cd 40#include <grp.h>
df62aa1d 41#include "dnsrecords.hh"
0efda032 42#include "mplexer.hh"
8bc03e7e 43#include "statbag.hh"
0efda032 44
61b26744 45#include "namespaces.hh"
0efda032 46using namespace ::boost::multi_index;
10f4eea8 47#include "namespaces.hh"
0efda032
BH
48
49namespace po = boost::program_options;
50po::variables_map g_vm;
51
8bc03e7e
BH
52StatBag S;
53
0efda032
BH
54SelectFDMultiplexer g_fdm;
55int g_pdnssocket;
8472da1b 56bool g_verbose;
0efda032
BH
57
58struct NotificationInFlight
59{
60 ComboAddress source;
33ecb315 61 time_t resentTime;
5ab019ac 62 DNSName domain;
33ecb315
BH
63 uint16_t origID, resentID;
64 int origSocket;
0efda032
BH
65};
66
8472da1b
BH
67typedef map<uint16_t, NotificationInFlight> nifs_t;
68nifs_t g_nifs;
33ecb315 69
c37f5e15
BH
70void syslogFmt(const boost::format& fmt)
71{
72 cerr<<"nproxy: "<<fmt<<endl;
73 syslog(LOG_WARNING, "%s", str(fmt).c_str());
74}
75
0efda032
BH
76void handleOutsideUDPPacket(int fd, boost::any&)
77try
78{
79 char buffer[1500];
80 struct NotificationInFlight nif;
33ecb315 81 nif.origSocket = fd;
0efda032
BH
82
83 socklen_t socklen=sizeof(nif.source);
84
85 int res=recvfrom(fd, buffer, sizeof(buffer), 0, (struct sockaddr*)&nif.source, &socklen);
86 if(!res)
87 return;
88
89 if(res < 0)
90 throw runtime_error("reading packet from remote: "+stringerror());
91
92 string packet(buffer, res);
93 MOADNSParser mdp(packet);
33ecb315
BH
94 nif.domain = mdp.d_qname;
95 nif.origID = mdp.d_header.id;
0efda032 96
c37f5e15 97
5ab019ac 98 if(mdp.d_header.opcode == Opcode::Query && !mdp.d_header.qr && mdp.d_answers.empty() && mdp.d_qname.toString() == "pdns.nproxy." &&
8825be6b 99 (mdp.d_qtype == QType::TXT || mdp.d_qtype ==QType::A)) {
df62aa1d
BH
100 vector<uint8_t> packet;
101 DNSPacketWriter pw(packet, mdp.d_qname, mdp.d_qtype);
102 pw.getHeader()->id = mdp.d_header.id;
103 pw.getHeader()->rd = mdp.d_header.rd;
104 pw.getHeader()->qr = 1;
105
8825be6b
BH
106 pw.startRecord(mdp.d_qname, mdp.d_qtype);
107 if(mdp.d_qtype == QType::TXT) {
108 TXTRecordContent trc("\"OK\"");
109 trc.toPacket(pw);
110 }
111 else if(mdp.d_qtype == QType::A) {
112 ARecordContent arc("1.2.3.4");
113 arc.toPacket(pw);
114 }
df62aa1d 115 pw.commit();
0d502f42
BH
116
117 if(sendto(fd, &packet[0], packet.size(), 0, (struct sockaddr*)&nif.source, socklen) < 0) {
118 syslogFmt(boost::format("Unable to send health check response to external nameserver %s - %s") % nif.source.toStringWithPort() % stringerror());
119 }
df62aa1d
BH
120 return;
121 }
0efda032
BH
122
123 if(mdp.d_header.opcode != Opcode::Notify || mdp.d_qtype != QType::SOA) {
5ab019ac 124 syslogFmt(boost::format("Received non-notification packet for domain '%s' from external nameserver %s") % nif.domain.toString() % nif.source.toStringWithPort());
0efda032
BH
125 return;
126 }
5ab019ac 127 syslogFmt(boost::format("External notification received for domain '%s' from %s") % nif.domain.toString() % nif.source.toStringWithPort());
0efda032
BH
128 vector<uint8_t> outpacket;
129 DNSPacketWriter pw(outpacket, mdp.d_qname, mdp.d_qtype, 1, Opcode::Notify);
33ecb315
BH
130
131 static uint16_t s_idpool;
132 pw.getHeader()->id = nif.resentID = s_idpool++;
133
134 if(send(g_pdnssocket, &outpacket[0], outpacket.size(), 0) < 0) {
135 throw runtime_error("Unable to send notify to PowerDNS: "+stringerror());
136 }
137 nif.resentTime=time(0);
138 g_nifs[nif.resentID] = nif;
139
140}
adc10f99 141catch(std::exception &e)
33ecb315 142{
c37f5e15 143 syslogFmt(boost::format("Error parsing packet from external nameserver: %s") % e.what());
33ecb315
BH
144}
145
146
147void handleInsideUDPPacket(int fd, boost::any&)
148try
149{
150 char buffer[1500];
151 struct NotificationInFlight nif;
152
153 socklen_t socklen=sizeof(nif.source);
154
8472da1b
BH
155 int len=recvfrom(fd, buffer, sizeof(buffer), 0, (struct sockaddr*)&nif.source, &socklen);
156 if(!len)
33ecb315
BH
157 return;
158
8472da1b 159 if(len < 0)
33ecb315
BH
160 throw runtime_error("reading packet from remote: "+stringerror());
161
8472da1b 162 string packet(buffer, len);
33ecb315
BH
163 MOADNSParser mdp(packet);
164
c37f5e15 165 // cerr<<"Inside notification response for: "<<mdp.d_qname<<endl;
33ecb315
BH
166
167 if(!g_nifs.count(mdp.d_header.id)) {
73367b2e 168 syslogFmt(boost::format("Response from inner PowerDNS with unknown ID %1%") % (uint16_t)mdp.d_header.id);
33ecb315
BH
169 return;
170 }
171
172 nif=g_nifs[mdp.d_header.id];
173
5ab019ac
PL
174 if(nif.domain != mdp.d_qname) {
175 syslogFmt(boost::format("Response from inner nameserver for different domain '%s' than original notification '%s'") % mdp.d_qname.toString() % nif.domain.toString());
8472da1b 176 } else {
8472da1b 177 if(sendto(nif.origSocket, buffer, len, 0, (sockaddr*) &nif.source, nif.source.getSocklen()) < 0) {
c37f5e15 178 syslogFmt(boost::format("Unable to send notification response to external nameserver %s - %s") % nif.source.toStringWithPort() % stringerror());
8472da1b 179 }
c37f5e15 180 else
5ab019ac 181 syslogFmt(boost::format("Sent notification response to external nameserver %s for domain '%s'") % nif.source.toStringWithPort() % nif.domain.toString());
0efda032 182 }
8472da1b 183 g_nifs.erase(mdp.d_header.id);
0efda032
BH
184
185}
adc10f99 186catch(std::exception &e)
0efda032 187{
c37f5e15 188 syslogFmt(boost::format("Error parsing packet from internal nameserver: %s") % e.what());
0efda032
BH
189}
190
8472da1b
BH
191void expireOldNotifications()
192{
193 time_t limit = time(0) - 10;
194 for(nifs_t::iterator iter = g_nifs.begin(); iter != g_nifs.end(); ) {
195 if(iter->second.resentTime < limit) {
5ab019ac 196 syslogFmt(boost::format("Notification for domain '%s' was sent to inner nameserver, but no response within 10 seconds") % iter->second.domain.toString());
8472da1b
BH
197 g_nifs.erase(iter++);
198 }
199 else
200 ++iter;
201 }
202}
33ecb315 203
4c89ccef 204void daemonize(int null_fd);
33ecb315 205
f5df3c78
PL
206void usage(po::options_description &desc) {
207 cerr<<"nproxy"<<endl;
208 cerr<<desc<<endl;
209}
210
0efda032
BH
211int main(int argc, char** argv)
212try
213{
df62aa1d 214 reportAllTypes();
c37f5e15
BH
215 openlog("nproxy", LOG_NDELAY | LOG_PID, LOG_DAEMON);
216
0efda032
BH
217 po::options_description desc("Allowed options");
218 desc.add_options()
219 ("help,h", "produce help message")
f5df3c78 220 ("version", "print the version")
8472da1b 221 ("powerdns-address", po::value<string>(), "IP address of PowerDNS server")
c37f5e15
BH
222 ("chroot", po::value<string>(), "chroot to this directory for additional security")
223 ("setuid", po::value<int>(), "setuid to this numerical user id")
224 ("setgid", po::value<int>(), "setgid to this numerical user id")
8472da1b
BH
225 ("origin-address", po::value<string>()->default_value("::"), "Source address for notifications to PowerDNS")
226 ("listen-address", po::value<vector<string> >(), "IP addresses to listen on")
b4e82077 227 ("listen-port", po::value<int>()->default_value(53), "Source port to listen on")
8472da1b
BH
228 ("daemon,d", po::value<bool>()->default_value(true), "operate in the background")
229 ("verbose,v", "be verbose");
0efda032
BH
230
231 po::store(po::command_line_parser(argc, argv).options(desc).run(), g_vm);
232 po::notify(g_vm);
233
234 if (g_vm.count("help")) {
f5df3c78
PL
235 usage(desc);
236 return EXIT_SUCCESS;
237 }
238
239 if (g_vm.count("version")) {
240 cerr << "nproxy " << VERSION << endl;
0efda032
BH
241 return EXIT_SUCCESS;
242 }
243
8472da1b 244 if(!g_vm.count("powerdns-address")) {
f5df3c78
PL
245 cerr<<"Mandatory setting 'powerdns-address' unset:\n"<<endl;
246 usage(desc);
0efda032
BH
247 return EXIT_FAILURE;
248 }
8472da1b
BH
249
250 if(!g_vm.count("verbose")) {
251 g_verbose=true;
252 }
0efda032
BH
253
254 vector<string> addresses;
8472da1b
BH
255 if(g_vm.count("listen-address"))
256 addresses=g_vm["listen-address"].as<vector<string> >();
0efda032
BH
257 else
258 addresses.push_back("::");
259
260 // create sockets to listen on
261
c37f5e15 262 syslogFmt(boost::format("Starting up"));
0efda032 263 for(vector<string>::const_iterator address = addresses.begin(); address != addresses.end(); ++address) {
b4e82077 264 ComboAddress local(*address, g_vm["listen-port"].as<int>());
0efda032
BH
265 int sock = socket(local.sin4.sin_family, SOCK_DGRAM, 0);
266 if(sock < 0)
267 throw runtime_error("Creating socket for incoming packets: "+stringerror());
268
269 if(::bind(sock,(sockaddr*) &local, local.getSocklen()) < 0)
8472da1b 270 throw runtime_error("Binding socket for incoming packets to '"+ local.toStringWithPort()+"': "+stringerror());
0efda032 271
33ecb315 272 g_fdm.addReadFD(sock, handleOutsideUDPPacket); // add to fdmultiplexer for each socket
c37f5e15 273 syslogFmt(boost::format("Listening for external notifications on address %s") % local.toStringWithPort());
0efda032
BH
274 }
275
33ecb315 276 // create socket that talks to inner PowerDNS
b4e82077
BH
277 ComboAddress originAddress(g_vm["origin-address"].as<string>(), 0);
278 g_pdnssocket=socket(originAddress.sin4.sin_family, SOCK_DGRAM, 0);
0efda032
BH
279 if(g_pdnssocket < 0)
280 throw runtime_error("Creating socket for packets to PowerDNS: "+stringerror());
281
b4e82077 282
8472da1b
BH
283 if(::bind(g_pdnssocket,(sockaddr*) &originAddress, originAddress.getSocklen()) < 0)
284 throw runtime_error("Binding local address of inward socket to '"+ originAddress.toStringWithPort()+"': "+stringerror());
285
286
287 ComboAddress pdns(g_vm["powerdns-address"].as<string>(), 53);
0efda032 288 if(connect(g_pdnssocket, (struct sockaddr*) &pdns, pdns.getSocklen()) < 0)
c37f5e15
BH
289 throw runtime_error("Failed to connect PowerDNS socket to address "+pdns.toStringWithPort()+": "+stringerror());
290
f7fb7022 291 syslogFmt(boost::format("Sending notifications from %s to internal address %s") % originAddress.toString() % pdns.toStringWithPort());
0efda032 292
33ecb315
BH
293 g_fdm.addReadFD(g_pdnssocket, handleInsideUDPPacket);
294
4c89ccef
CH
295 int null_fd=open("/dev/null",O_RDWR); /* open stdin */
296 if(null_fd < 0)
297 throw runtime_error("Unable to open /dev/null: "+stringerror());
298
0efda032 299 if(g_vm.count("chroot")) {
4c89ccef 300 if(chroot(g_vm["chroot"].as<string>().c_str()) < 0 || chdir("/") < 0)
0efda032 301 throw runtime_error("while chrooting to "+g_vm["chroot"].as<string>());
c37f5e15
BH
302 syslogFmt(boost::format("Changed root to directory '%s'") % g_vm["chroot"].as<string>());
303 }
304
fe97f596
PD
305 if(g_vm.count("setgid")) {
306 if(setgid(g_vm["setgid"].as<int>()) < 0)
335da0ba 307 throw runtime_error("while changing gid to "+std::to_string(g_vm["setgid"].as<int>()));
fe97f596
PD
308 syslogFmt(boost::format("Changed gid to %d") % g_vm["setgid"].as<int>());
309 if(setgroups(0, NULL) < 0)
310 throw runtime_error("while dropping supplementary groups");
311 }
312
c37f5e15
BH
313 if(g_vm.count("setuid")) {
314 if(setuid(g_vm["setuid"].as<int>()) < 0)
335da0ba 315 throw runtime_error("while changing uid to "+std::to_string(g_vm["setuid"].as<int>()));
c37f5e15
BH
316 syslogFmt(boost::format("Changed uid to %d") % g_vm["setuid"].as<int>());
317 }
318
8472da1b 319 if(g_vm["daemon"].as<bool>()) {
c37f5e15 320 syslogFmt(boost::format("Daemonizing"));
4c89ccef 321 daemonize(null_fd);
8472da1b 322 }
4c89ccef 323 close(null_fd);
c37f5e15 324 syslogFmt(boost::format("Program operational"));
8472da1b
BH
325
326
0efda032
BH
327 // start loop
328 struct timeval now;
329 for(;;) {
330 gettimeofday(&now, 0);
331 g_fdm.run(&now);
332 // check for notifications that have been outstanding for more than 10 seconds
8472da1b 333 expireOldNotifications();
0efda032 334 }
0efda032 335}
c37f5e15
BH
336catch(boost::program_options::error& e)
337{
338 syslogFmt(boost::format("Error parsing command line options: %s") % e.what());
339}
adc10f99 340catch(std::exception& e)
0efda032 341{
c37f5e15 342 syslogFmt(boost::format("Fatal: %s") % e.what());
0efda032 343}
3f81d239 344catch(PDNSException& e)
8472da1b 345{
c37f5e15 346 syslogFmt(boost::format("Fatal: %s") % e.reason);
8472da1b 347}
0efda032 348
4c89ccef 349void daemonize(int null_fd)
8472da1b
BH
350{
351 if(fork())
352 exit(0); // bye bye
4c89ccef
CH
353
354 setsid();
355
356 dup2(null_fd,0); /* stdin */
357 dup2(null_fd,1); /* stderr */
358 dup2(null_fd,2); /* stderr */
8472da1b 359}