]> git.ipfire.org Git - thirdparty/pdns.git/blob - pdns/doh.hh
dnsdist: Clear the DoH Session Ticket Encryption Key in the ctor
[thirdparty/pdns.git] / pdns / doh.hh
1 #pragma once
2 #include "iputils.hh"
3 #include "libssl.hh"
4
5 struct DOHServerConfig;
6
7 class DOHResponseMapEntry
8 {
9 public:
10 DOHResponseMapEntry(const std::string& regex, uint16_t status, const std::string& content, const boost::optional<std::vector<std::pair<std::string, std::string>>>& headers): d_regex(regex), d_customHeaders(headers), d_content(content), d_status(status)
11 {
12 }
13
14 bool matches(const std::string& path) const
15 {
16 return d_regex.match(path);
17 }
18
19 uint16_t getStatusCode() const
20 {
21 return d_status;
22 }
23
24 const std::string& getContent() const
25 {
26 return d_content;
27 }
28
29 const boost::optional<std::vector<std::pair<std::string, std::string>>>& getHeaders() const
30 {
31 return d_customHeaders;
32 }
33
34 private:
35 Regex d_regex;
36 boost::optional<std::vector<std::pair<std::string, std::string>>> d_customHeaders;
37 std::string d_content;
38 uint16_t d_status;
39 };
40
41 struct DOHFrontend
42 {
43 DOHFrontend()
44 {
45 d_rotatingTicketsKey.clear();
46 }
47
48 std::shared_ptr<DOHServerConfig> d_dsc{nullptr};
49 std::vector<std::pair<std::string, std::string>> d_certKeyPairs;
50 std::vector<std::string> d_ocspFiles;
51 std::vector<std::shared_ptr<DOHResponseMapEntry>> d_responsesMap;
52 std::string d_ciphers;
53 std::string d_ciphers13;
54 std::string d_serverTokens{"h2o/dnsdist"};
55 LibsslTLSVersion d_minTLSVersion{LibsslTLSVersion::TLS10};
56 #ifdef HAVE_DNS_OVER_HTTPS
57 std::unique_ptr<OpenSSLTLSTicketKeysRing> d_ticketKeys{nullptr};
58 #endif
59 std::vector<std::pair<std::string, std::string>> d_customResponseHeaders;
60 ComboAddress d_local;
61
62 uint32_t d_idleTimeout{30}; // HTTP idle timeout in seconds
63 std::vector<std::string> d_urls;
64 std::string d_ticketKeyFile;
65
66 time_t d_ticketsKeyRotationDelay{43200};
67 size_t d_maxStoredSessions{20480};
68 uint8_t d_numberOfTicketsKeys{5};
69 bool d_enableTickets{true};
70
71 std::atomic<uint64_t> d_httpconnects; // number of TCP/IP connections established
72 std::atomic<uint64_t> d_tls10queries; // valid DNS queries received via TLSv1.0
73 std::atomic<uint64_t> d_tls11queries; // valid DNS queries received via TLSv1.1
74 std::atomic<uint64_t> d_tls12queries; // valid DNS queries received via TLSv1.2
75 std::atomic<uint64_t> d_tls13queries; // valid DNS queries received via TLSv1.3
76 std::atomic<uint64_t> d_tlsUnknownqueries; // valid DNS queries received via unknown TLS version
77
78 std::atomic<uint64_t> d_getqueries; // valid DNS queries received via GET
79 std::atomic<uint64_t> d_postqueries; // valid DNS queries received via POST
80 std::atomic<uint64_t> d_badrequests; // request could not be converted to dns query
81 std::atomic<uint64_t> d_errorresponses; // dnsdist set 'error' on response
82 std::atomic<uint64_t> d_redirectresponses; // dnsdist set 'redirect' on response
83 std::atomic<uint64_t> d_validresponses; // valid responses sent out
84
85 struct HTTPVersionStats
86 {
87 std::atomic<uint64_t> d_nbQueries{0}; // valid DNS queries received
88 std::atomic<uint64_t> d_nb200Responses{0};
89 std::atomic<uint64_t> d_nb400Responses{0};
90 std::atomic<uint64_t> d_nb403Responses{0};
91 std::atomic<uint64_t> d_nb500Responses{0};
92 std::atomic<uint64_t> d_nb502Responses{0};
93 std::atomic<uint64_t> d_nbOtherResponses{0};
94 };
95
96 HTTPVersionStats d_http1Stats;
97 HTTPVersionStats d_http2Stats;
98
99
100 #ifndef HAVE_DNS_OVER_HTTPS
101 void setup()
102 {
103 }
104
105 void reloadCertificates()
106 {
107 }
108
109 void rotateTicketsKey(time_t now)
110 {
111 }
112
113 void loadTicketsKeys(const std::string& keyFile)
114 {
115 }
116
117 void handleTicketsKeyRotation()
118 {
119 }
120
121 #else
122 void setup();
123 void reloadCertificates();
124
125 void rotateTicketsKey(time_t now);
126 void loadTicketsKeys(const std::string& keyFile);
127 void handleTicketsKeyRotation();
128
129 #endif /* HAVE_DNS_OVER_HTTPS */
130
131 private:
132 time_t d_ticketsKeyNextRotation{0};
133 std::atomic_flag d_rotatingTicketsKey;
134 };
135
136 #ifndef HAVE_DNS_OVER_HTTPS
137 struct DOHUnit
138 {
139 };
140
141 #else /* HAVE_DNS_OVER_HTTPS */
142 #include <unordered_map>
143
144 struct st_h2o_req_t;
145
146 struct DOHUnit
147 {
148 std::string query;
149 std::string response;
150 ComboAddress remote;
151 ComboAddress dest;
152 st_h2o_req_t* req{nullptr};
153 DOHUnit** self{nullptr};
154 std::string contentType;
155 int rsock;
156 uint16_t qtype;
157 /* the status_code is set from
158 processDOHQuery() (which is executed in
159 the DOH client thread) so that the correct
160 response can be sent in on_dnsdist(),
161 after the DOHUnit has been passed back to
162 the main DoH thread.
163 */
164 uint16_t status_code{200};
165 bool ednsAdded{false};
166
167 std::string getHTTPPath() const;
168 std::string getHTTPHost() const;
169 std::string getHTTPScheme() const;
170 std::string getHTTPQueryString() const;
171 std::unordered_map<std::string, std::string> getHTTPHeaders() const;
172 void setHTTPResponse(uint16_t statusCode, const std::string& body, const std::string& contentType="");
173 };
174
175 #endif /* HAVE_DNS_OVER_HTTPS */
176
177 void handleDOHTimeout(DOHUnit* oldDU);