2 This file is part of systemd.
4 Copyright 2014 Zbigniew Jędrzejewski-Szmek
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
26 #include "alloc-util.h"
27 #include "bus-error.h"
30 #include "in-addr-util.h"
31 #include "gcrypt-util.h"
32 #include "parse-util.h"
33 #include "resolved-def.h"
34 #include "resolved-dns-packet.h"
35 #include "terminal-util.h"
37 #define DNS_CALL_TIMEOUT_USEC (45*USEC_PER_SEC)
39 static int arg_family
= AF_UNSPEC
;
40 static int arg_ifindex
= 0;
41 static uint16_t arg_type
= 0;
42 static uint16_t arg_class
= 0;
43 static bool arg_legend
= true;
44 static uint64_t arg_flags
= 0;
46 typedef enum ServiceFamily
{
50 _SERVICE_FAMILY_INVALID
= -1,
52 static ServiceFamily arg_service_family
= SERVICE_FAMILY_TCP
;
54 typedef enum RawType
{
59 static RawType arg_raw
= RAW_NONE
;
68 MODE_RESET_STATISTICS
,
70 } arg_mode
= MODE_RESOLVE_HOST
;
72 static ServiceFamily
service_family_from_string(const char *s
) {
73 if (s
== NULL
|| streq(s
, "tcp"))
74 return SERVICE_FAMILY_TCP
;
76 return SERVICE_FAMILY_UDP
;
78 return SERVICE_FAMILY_SCTP
;
79 return _SERVICE_FAMILY_INVALID
;
82 static const char* service_family_to_string(ServiceFamily service
) {
84 case SERVICE_FAMILY_TCP
:
86 case SERVICE_FAMILY_UDP
:
88 case SERVICE_FAMILY_SCTP
:
91 assert_not_reached("invalid service");
95 static void print_source(uint64_t flags
, usec_t rtt
) {
96 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
104 fputs("\n-- Information acquired via", stdout
);
107 printf(" protocol%s%s%s%s%s",
108 flags
& SD_RESOLVED_DNS
? " DNS" :"",
109 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
110 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
111 flags
& SD_RESOLVED_MDNS_IPV4
? "mDNS/IPv4" : "",
112 flags
& SD_RESOLVED_MDNS_IPV6
? "mDNS/IPv6" : "");
114 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
116 printf(" in %s", rtt_str
);
121 printf("-- Data is authenticated: %s\n", yes_no(flags
& SD_RESOLVED_AUTHENTICATED
));
124 static int resolve_host(sd_bus
*bus
, const char *name
) {
126 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
127 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
128 const char *canonical
= NULL
;
129 char ifname
[IF_NAMESIZE
] = "";
137 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
138 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
140 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
142 r
= sd_bus_message_new_method_call(
145 "org.freedesktop.resolve1",
146 "/org/freedesktop/resolve1",
147 "org.freedesktop.resolve1.Manager",
150 return bus_log_create_error(r
);
152 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
154 return bus_log_create_error(r
);
156 ts
= now(CLOCK_MONOTONIC
);
158 r
= sd_bus_call(bus
, req
, DNS_CALL_TIMEOUT_USEC
, &error
, &reply
);
160 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
162 ts
= now(CLOCK_MONOTONIC
) - ts
;
164 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
166 return bus_log_parse_error(r
);
168 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
169 _cleanup_free_
char *pretty
= NULL
;
174 assert_cc(sizeof(int) == sizeof(int32_t));
176 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
178 return bus_log_parse_error(r
);
180 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
182 return bus_log_parse_error(r
);
184 r
= sd_bus_message_exit_container(reply
);
186 return bus_log_parse_error(r
);
188 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
189 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
193 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
194 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
199 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
200 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
202 r
= in_addr_to_string(family
, a
, &pretty
);
204 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
206 printf("%*s%s %s%s%s\n",
207 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
209 isempty(ifname
) ? "" : "%", ifname
);
214 return bus_log_parse_error(r
);
216 r
= sd_bus_message_exit_container(reply
);
218 return bus_log_parse_error(r
);
220 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
222 return bus_log_parse_error(r
);
224 if (!streq(name
, canonical
))
225 printf("%*s%s (%s)\n",
226 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
230 log_error("%s: no addresses found", name
);
234 print_source(flags
, ts
);
239 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
240 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
241 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
242 _cleanup_free_
char *pretty
= NULL
;
243 char ifname
[IF_NAMESIZE
] = "";
250 assert(IN_SET(family
, AF_INET
, AF_INET6
));
254 ifindex
= arg_ifindex
;
256 r
= in_addr_to_string(family
, address
, &pretty
);
260 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
261 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
263 log_debug("Resolving %s%s%s.", pretty
, isempty(ifname
) ? "" : "%", ifname
);
265 r
= sd_bus_message_new_method_call(
268 "org.freedesktop.resolve1",
269 "/org/freedesktop/resolve1",
270 "org.freedesktop.resolve1.Manager",
273 return bus_log_create_error(r
);
275 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
277 return bus_log_create_error(r
);
279 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
281 return bus_log_create_error(r
);
283 r
= sd_bus_message_append(req
, "t", arg_flags
);
285 return bus_log_create_error(r
);
287 ts
= now(CLOCK_MONOTONIC
);
289 r
= sd_bus_call(bus
, req
, DNS_CALL_TIMEOUT_USEC
, &error
, &reply
);
291 log_error("%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
295 ts
= now(CLOCK_MONOTONIC
) - ts
;
297 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
299 return bus_log_create_error(r
);
301 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
304 assert_cc(sizeof(int) == sizeof(int32_t));
306 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
310 r
= sd_bus_message_exit_container(reply
);
315 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
316 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
318 printf("%*s%*s%*s%s %s\n",
319 (int) strlen(pretty
), c
== 0 ? pretty
: "",
320 isempty(ifname
) ? 0 : 1, c
> 0 || isempty(ifname
) ? "" : "%",
321 (int) strlen(ifname
), c
== 0 ? ifname
: "",
328 return bus_log_parse_error(r
);
330 r
= sd_bus_message_exit_container(reply
);
332 return bus_log_parse_error(r
);
334 r
= sd_bus_message_read(reply
, "t", &flags
);
336 return bus_log_parse_error(r
);
339 log_error("%s: no names found", pretty
);
343 print_source(flags
, ts
);
348 static int parse_address(const char *s
, int *family
, union in_addr_union
*address
, int *ifindex
) {
349 const char *percent
, *a
;
353 percent
= strchr(s
, '%');
355 if (parse_ifindex(percent
+1, &ifi
) < 0) {
356 ifi
= if_nametoindex(percent
+1);
361 a
= strndupa(s
, percent
- s
);
365 r
= in_addr_from_string_auto(a
, family
, address
);
373 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
374 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
375 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
377 char ifname
[IF_NAMESIZE
] = "";
379 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0);
383 p
->refuse_compression
= true;
385 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
389 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
391 return log_error_errno(r
, "Failed to parse RR: %m");
393 if (arg_raw
== RAW_PAYLOAD
) {
397 k
= dns_resource_record_payload(rr
, &data
);
399 return log_error_errno(k
, "Cannot dump RR: %m");
400 fwrite(data
, 1, k
, stdout
);
404 s
= dns_resource_record_to_string(rr
);
408 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
409 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
411 printf("%s%s%s\n", s
, isempty(ifname
) ? "" : " # interface ", ifname
);
417 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
) {
418 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
419 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
420 char ifname
[IF_NAMESIZE
] = "";
425 bool needs_authentication
= false;
429 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
430 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
432 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(ifname
) ? "*" : ifname
);
434 r
= sd_bus_message_new_method_call(
437 "org.freedesktop.resolve1",
438 "/org/freedesktop/resolve1",
439 "org.freedesktop.resolve1.Manager",
442 return bus_log_create_error(r
);
444 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
446 return bus_log_create_error(r
);
448 ts
= now(CLOCK_MONOTONIC
);
450 r
= sd_bus_call(bus
, req
, DNS_CALL_TIMEOUT_USEC
, &error
, &reply
);
452 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
456 ts
= now(CLOCK_MONOTONIC
) - ts
;
458 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
460 return bus_log_parse_error(r
);
462 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
468 assert_cc(sizeof(int) == sizeof(int32_t));
470 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
472 return bus_log_parse_error(r
);
474 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
476 return bus_log_parse_error(r
);
478 r
= sd_bus_message_exit_container(reply
);
480 return bus_log_parse_error(r
);
482 if (arg_raw
== RAW_PACKET
) {
483 uint64_t u64
= htole64(l
);
485 fwrite(&u64
, sizeof(u64
), 1, stdout
);
486 fwrite(d
, 1, l
, stdout
);
488 r
= output_rr_packet(d
, l
, ifindex
);
493 if (dns_type_needs_authentication(t
))
494 needs_authentication
= true;
499 return bus_log_parse_error(r
);
501 r
= sd_bus_message_exit_container(reply
);
503 return bus_log_parse_error(r
);
505 r
= sd_bus_message_read(reply
, "t", &flags
);
507 return bus_log_parse_error(r
);
510 log_error("%s: no records found", name
);
514 print_source(flags
, ts
);
516 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
519 fprintf(stderr
, "\n%s"
520 "WARNING: The resources shown contain cryptographic key data which could not be\n"
521 " authenticated. It is not suitable to authenticate any communication.\n"
522 " This is usually indication that DNSSEC authentication was not enabled\n"
523 " or is not available for the selected protocol or DNS servers.%s\n",
524 ansi_highlight_red(),
531 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
532 uint16_t type
= 0, class = 0;
533 const char *p
, *q
, *n
;
538 assert(startswith(name
, "dns:"));
540 /* Parse RFC 4501 dns: URIs */
550 e
= strchr(p
+ 2, '/');
555 log_warning("DNS authority specification not supported; ignoring specified authority.");
562 n
= strndupa(p
, q
- p
);
568 f
= startswith_no_case(q
, "class=");
570 _cleanup_free_
char *t
= NULL
;
574 log_error("DNS class specified twice.");
578 e
= strchrnul(f
, ';');
579 t
= strndup(f
, e
- f
);
583 r
= dns_class_from_string(t
);
585 log_error("Unknown DNS class %s.", t
);
599 f
= startswith_no_case(q
, "type=");
601 _cleanup_free_
char *t
= NULL
;
605 log_error("DNS type specified twice.");
609 e
= strchrnul(f
, ';');
610 t
= strndup(f
, e
- f
);
614 r
= dns_type_from_string(t
);
616 log_error("Unknown DNS type %s.", t
);
636 class = arg_class
?: DNS_CLASS_IN
;
638 type
= arg_type
?: DNS_TYPE_A
;
640 return resolve_record(bus
, n
, class, type
);
643 log_error("Invalid DNS URI: %s", name
);
647 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
648 const char *canonical_name
, *canonical_type
, *canonical_domain
;
649 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
650 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
651 char ifname
[IF_NAMESIZE
] = "";
662 name
= empty_to_null(name
);
663 type
= empty_to_null(type
);
665 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
666 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
669 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
671 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
673 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
675 r
= sd_bus_message_new_method_call(
678 "org.freedesktop.resolve1",
679 "/org/freedesktop/resolve1",
680 "org.freedesktop.resolve1.Manager",
683 return bus_log_create_error(r
);
685 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
687 return bus_log_create_error(r
);
689 ts
= now(CLOCK_MONOTONIC
);
691 r
= sd_bus_call(bus
, req
, DNS_CALL_TIMEOUT_USEC
, &error
, &reply
);
693 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
695 ts
= now(CLOCK_MONOTONIC
) - ts
;
697 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
699 return bus_log_parse_error(r
);
702 (name
? strlen(name
) + 1 : 0) +
703 (type
? strlen(type
) + 1 : 0) +
707 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
708 uint16_t priority
, weight
, port
;
709 const char *hostname
, *canonical
;
711 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
713 return bus_log_parse_error(r
);
716 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
718 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
720 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
721 (int) strlen(domain
), c
== 0 ? domain
: "",
726 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
728 return bus_log_parse_error(r
);
730 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
731 _cleanup_free_
char *pretty
= NULL
;
735 assert_cc(sizeof(int) == sizeof(int32_t));
737 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
739 return bus_log_parse_error(r
);
741 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
743 return bus_log_parse_error(r
);
745 r
= sd_bus_message_exit_container(reply
);
747 return bus_log_parse_error(r
);
749 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
750 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
754 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
755 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
760 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
761 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
763 r
= in_addr_to_string(family
, a
, &pretty
);
765 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
767 printf("%*s%s%s%s\n", (int) indent
, "", pretty
, isempty(ifname
) ? "" : "%s", ifname
);
770 return bus_log_parse_error(r
);
772 r
= sd_bus_message_exit_container(reply
);
774 return bus_log_parse_error(r
);
776 r
= sd_bus_message_read(reply
, "s", &canonical
);
778 return bus_log_parse_error(r
);
780 if (!streq(hostname
, canonical
))
781 printf("%*s(%s)\n", (int) indent
, "", canonical
);
783 r
= sd_bus_message_exit_container(reply
);
785 return bus_log_parse_error(r
);
790 return bus_log_parse_error(r
);
792 r
= sd_bus_message_exit_container(reply
);
794 return bus_log_parse_error(r
);
796 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
798 return bus_log_parse_error(r
);
801 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
802 _cleanup_free_
char *escaped
= NULL
;
804 escaped
= cescape_length(p
, sz
);
808 printf("%*s%s\n", (int) indent
, "", escaped
);
812 return bus_log_parse_error(r
);
814 r
= sd_bus_message_exit_container(reply
);
816 return bus_log_parse_error(r
);
818 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
820 return bus_log_parse_error(r
);
822 canonical_name
= empty_to_null(canonical_name
);
823 canonical_type
= empty_to_null(canonical_type
);
825 if (!streq_ptr(name
, canonical_name
) ||
826 !streq_ptr(type
, canonical_type
) ||
827 !streq_ptr(domain
, canonical_domain
)) {
829 printf("%*s(", (int) indent
, "");
832 printf("%s/", canonical_name
);
834 printf("%s/", canonical_type
);
836 printf("%s)\n", canonical_domain
);
839 print_source(flags
, ts
);
844 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
845 const char *domain
, *full
;
847 _cleanup_free_
char *hashed
= NULL
;
852 domain
= strrchr(address
, '@');
854 log_error("Address does not contain '@': \"%s\"", address
);
856 } else if (domain
== address
|| domain
[1] == '\0') {
857 log_error("Address starts or ends with '@': \"%s\"", address
);
862 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
864 return log_error_errno(r
, "Hashing failed: %m");
866 full
= strjoina(hashed
, "._openpgpkey.", domain
);
867 log_debug("Looking up \"%s\".", full
);
869 return resolve_record(bus
, full
,
870 arg_class
?: DNS_CLASS_IN
,
871 arg_type
?: DNS_TYPE_OPENPGPKEY
);
874 static int resolve_tlsa(sd_bus
*bus
, const char *address
) {
876 uint16_t port_num
= 443;
877 _cleanup_free_
char *full
= NULL
;
883 port
= strrchr(address
, ':');
885 r
= safe_atou16(port
+ 1, &port_num
);
886 if (r
< 0 || port_num
== 0)
887 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
889 address
= strndupa(address
, port
- address
);
892 r
= asprintf(&full
, "_%u.%s.%s",
894 service_family_to_string(arg_service_family
),
899 log_debug("Looking up \"%s\".", full
);
901 return resolve_record(bus
, full
,
902 arg_class
?: DNS_CLASS_IN
,
903 arg_type
?: DNS_TYPE_TLSA
);
906 static int show_statistics(sd_bus
*bus
) {
907 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
908 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
909 uint64_t n_current_transactions
, n_total_transactions
,
910 cache_size
, n_cache_hit
, n_cache_miss
,
911 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
912 int r
, dnssec_supported
;
916 r
= sd_bus_get_property_trivial(bus
,
917 "org.freedesktop.resolve1",
918 "/org/freedesktop/resolve1",
919 "org.freedesktop.resolve1.Manager",
925 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
927 printf("DNSSEC supported by current servers: %s%s%s\n\n",
929 yes_no(dnssec_supported
),
932 r
= sd_bus_get_property(bus
,
933 "org.freedesktop.resolve1",
934 "/org/freedesktop/resolve1",
935 "org.freedesktop.resolve1.Manager",
936 "TransactionStatistics",
941 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
943 r
= sd_bus_message_read(reply
, "(tt)",
944 &n_current_transactions
,
945 &n_total_transactions
);
947 return bus_log_parse_error(r
);
949 printf("%sTransactions%s\n"
950 "Current Transactions: %" PRIu64
"\n"
951 " Total Transactions: %" PRIu64
"\n",
954 n_current_transactions
,
955 n_total_transactions
);
957 reply
= sd_bus_message_unref(reply
);
959 r
= sd_bus_get_property(bus
,
960 "org.freedesktop.resolve1",
961 "/org/freedesktop/resolve1",
962 "org.freedesktop.resolve1.Manager",
968 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
970 r
= sd_bus_message_read(reply
, "(ttt)",
975 return bus_log_parse_error(r
);
977 printf("\n%sCache%s\n"
978 " Current Cache Size: %" PRIu64
"\n"
979 " Cache Hits: %" PRIu64
"\n"
980 " Cache Misses: %" PRIu64
"\n",
987 reply
= sd_bus_message_unref(reply
);
989 r
= sd_bus_get_property(bus
,
990 "org.freedesktop.resolve1",
991 "/org/freedesktop/resolve1",
992 "org.freedesktop.resolve1.Manager",
998 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1000 r
= sd_bus_message_read(reply
, "(tttt)",
1004 &n_dnssec_indeterminate
);
1006 return bus_log_parse_error(r
);
1008 printf("\n%sDNSSEC Verdicts%s\n"
1009 " Secure: %" PRIu64
"\n"
1010 " Insecure: %" PRIu64
"\n"
1011 " Bogus: %" PRIu64
"\n"
1012 " Indeterminate: %" PRIu64
"\n",
1018 n_dnssec_indeterminate
);
1023 static int reset_statistics(sd_bus
*bus
) {
1024 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1027 r
= sd_bus_call_method(bus
,
1028 "org.freedesktop.resolve1",
1029 "/org/freedesktop/resolve1",
1030 "org.freedesktop.resolve1.Manager",
1036 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1041 static int flush_caches(sd_bus
*bus
) {
1042 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1045 r
= sd_bus_call_method(bus
,
1046 "org.freedesktop.resolve1",
1047 "/org/freedesktop/resolve1",
1048 "org.freedesktop.resolve1.Manager",
1054 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1059 static void help_protocol_types(void) {
1061 puts("Known protocol types:");
1062 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6");
1065 static void help_dns_types(void) {
1070 puts("Known DNS RR types:");
1071 for (i
= 0; i
< _DNS_TYPE_MAX
; i
++) {
1072 t
= dns_type_to_string(i
);
1078 static void help_dns_classes(void) {
1083 puts("Known DNS RR classes:");
1084 for (i
= 0; i
< _DNS_CLASS_MAX
; i
++) {
1085 t
= dns_class_to_string(i
);
1091 static void help(void) {
1092 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
1093 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
1094 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
1095 "%1$s [OPTIONS...] --statistics\n"
1096 "%1$s [OPTIONS...] --reset-statistics\n"
1098 "Resolve domain names, IPv4 and IPv6 addresses, DNS resource records, and services.\n\n"
1099 " -h --help Show this help\n"
1100 " --version Show package version\n"
1101 " -4 Resolve IPv4 addresses\n"
1102 " -6 Resolve IPv6 addresses\n"
1103 " -i --interface=INTERFACE Look on interface\n"
1104 " -p --protocol=PROTO|help Look via protocol\n"
1105 " -t --type=TYPE|help Query RR with DNS type\n"
1106 " -c --class=CLASS|help Query RR with DNS class\n"
1107 " --service Resolve service (SRV)\n"
1108 " --service-address=BOOL Resolve address for services (default: yes)\n"
1109 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
1110 " --openpgp Query OpenPGP public key\n"
1111 " --tlsa Query TLS public key\n"
1112 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
1113 " --search=BOOL Use search domains for single-label names\n"
1115 " --raw[=payload|packet] Dump the answer as binary data\n"
1116 " --legend=BOOL Print headers and additional info (default: yes)\n"
1117 " --statistics Show resolver statistics\n"
1118 " --reset-statistics Reset resolver statistics\n"
1119 " --flush-caches Flush all local DNS caches\n"
1120 , program_invocation_short_name
);
1123 static int parse_argv(int argc
, char *argv
[]) {
1125 ARG_VERSION
= 0x100,
1129 ARG_SERVICE_ADDRESS
,
1136 ARG_RESET_STATISTICS
,
1140 static const struct option options
[] = {
1141 { "help", no_argument
, NULL
, 'h' },
1142 { "version", no_argument
, NULL
, ARG_VERSION
},
1143 { "type", required_argument
, NULL
, 't' },
1144 { "class", required_argument
, NULL
, 'c' },
1145 { "legend", required_argument
, NULL
, ARG_LEGEND
},
1146 { "interface", required_argument
, NULL
, 'i' },
1147 { "protocol", required_argument
, NULL
, 'p' },
1148 { "cname", required_argument
, NULL
, ARG_CNAME
},
1149 { "service", no_argument
, NULL
, ARG_SERVICE
},
1150 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
1151 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
1152 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
1153 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
1154 { "raw", optional_argument
, NULL
, ARG_RAW
},
1155 { "search", required_argument
, NULL
, ARG_SEARCH
},
1156 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
1157 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
1158 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
1167 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
1172 return 0; /* done */;
1178 arg_family
= AF_INET
;
1182 arg_family
= AF_INET6
;
1188 if (parse_ifindex(optarg
, &ifi
) >= 0)
1191 ifi
= if_nametoindex(optarg
);
1193 return log_error_errno(errno
, "Unknown interface %s: %m", optarg
);
1202 if (streq(optarg
, "help")) {
1207 r
= dns_type_from_string(optarg
);
1209 log_error("Failed to parse RR record type %s", optarg
);
1212 arg_type
= (uint16_t) r
;
1213 assert((int) arg_type
== r
);
1215 arg_mode
= MODE_RESOLVE_RECORD
;
1219 if (streq(optarg
, "help")) {
1224 r
= dns_class_from_string(optarg
);
1226 log_error("Failed to parse RR record class %s", optarg
);
1229 arg_class
= (uint16_t) r
;
1230 assert((int) arg_class
== r
);
1235 r
= parse_boolean(optarg
);
1237 return log_error_errno(r
, "Failed to parse --legend= argument");
1243 if (streq(optarg
, "help")) {
1244 help_protocol_types();
1246 } else if (streq(optarg
, "dns"))
1247 arg_flags
|= SD_RESOLVED_DNS
;
1248 else if (streq(optarg
, "llmnr"))
1249 arg_flags
|= SD_RESOLVED_LLMNR
;
1250 else if (streq(optarg
, "llmnr-ipv4"))
1251 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
1252 else if (streq(optarg
, "llmnr-ipv6"))
1253 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
1255 log_error("Unknown protocol specifier: %s", optarg
);
1262 arg_mode
= MODE_RESOLVE_SERVICE
;
1266 arg_mode
= MODE_RESOLVE_OPENPGP
;
1270 arg_mode
= MODE_RESOLVE_TLSA
;
1271 arg_service_family
= service_family_from_string(optarg
);
1272 if (arg_service_family
< 0) {
1273 log_error("Unknown service family \"%s\".", optarg
);
1280 log_error("Refusing to write binary data to tty.");
1284 if (optarg
== NULL
|| streq(optarg
, "payload"))
1285 arg_raw
= RAW_PAYLOAD
;
1286 else if (streq(optarg
, "packet"))
1287 arg_raw
= RAW_PACKET
;
1289 log_error("Unknown --raw specifier \"%s\".", optarg
);
1297 r
= parse_boolean(optarg
);
1299 return log_error_errno(r
, "Failed to parse --cname= argument.");
1300 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
1303 case ARG_SERVICE_ADDRESS
:
1304 r
= parse_boolean(optarg
);
1306 return log_error_errno(r
, "Failed to parse --service-address= argument.");
1307 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
1310 case ARG_SERVICE_TXT
:
1311 r
= parse_boolean(optarg
);
1313 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
1314 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
1318 r
= parse_boolean(optarg
);
1320 return log_error_errno(r
, "Failed to parse --search argument.");
1321 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
1324 case ARG_STATISTICS
:
1325 arg_mode
= MODE_STATISTICS
;
1328 case ARG_RESET_STATISTICS
:
1329 arg_mode
= MODE_RESET_STATISTICS
;
1332 case ARG_FLUSH_CACHES
:
1333 arg_mode
= MODE_FLUSH_CACHES
;
1340 assert_not_reached("Unhandled option");
1343 if (arg_type
== 0 && arg_class
!= 0) {
1344 log_error("--class= may only be used in conjunction with --type=.");
1348 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
) {
1349 log_error("--service and --type= may not be combined.");
1353 if (arg_type
!= 0 && arg_class
== 0)
1354 arg_class
= DNS_CLASS_IN
;
1356 if (arg_class
!= 0 && arg_type
== 0)
1357 arg_type
= DNS_TYPE_A
;
1359 return 1 /* work to do */;
1362 int main(int argc
, char **argv
) {
1363 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
1366 log_parse_environment();
1369 r
= parse_argv(argc
, argv
);
1373 r
= sd_bus_open_system(&bus
);
1375 log_error_errno(r
, "sd_bus_open_system: %m");
1381 case MODE_RESOLVE_HOST
:
1382 if (optind
>= argc
) {
1383 log_error("No arguments passed.");
1388 while (argv
[optind
]) {
1389 int family
, ifindex
, k
;
1390 union in_addr_union a
;
1392 if (startswith(argv
[optind
], "dns:"))
1393 k
= resolve_rfc4501(bus
, argv
[optind
]);
1395 k
= parse_address(argv
[optind
], &family
, &a
, &ifindex
);
1397 k
= resolve_address(bus
, family
, &a
, ifindex
);
1399 k
= resolve_host(bus
, argv
[optind
]);
1409 case MODE_RESOLVE_RECORD
:
1410 if (optind
>= argc
) {
1411 log_error("No arguments passed.");
1416 while (argv
[optind
]) {
1419 k
= resolve_record(bus
, argv
[optind
], arg_class
, arg_type
);
1427 case MODE_RESOLVE_SERVICE
:
1428 if (argc
< optind
+ 1) {
1429 log_error("Domain specification required.");
1433 } else if (argc
== optind
+ 1)
1434 r
= resolve_service(bus
, NULL
, NULL
, argv
[optind
]);
1435 else if (argc
== optind
+ 2)
1436 r
= resolve_service(bus
, NULL
, argv
[optind
], argv
[optind
+1]);
1437 else if (argc
== optind
+ 3)
1438 r
= resolve_service(bus
, argv
[optind
], argv
[optind
+1], argv
[optind
+2]);
1440 log_error("Too many arguments.");
1447 case MODE_RESOLVE_OPENPGP
:
1448 if (argc
< optind
+ 1) {
1449 log_error("E-mail address required.");
1456 while (optind
< argc
) {
1459 k
= resolve_openpgp(bus
, argv
[optind
++]);
1465 case MODE_RESOLVE_TLSA
:
1466 if (argc
< optind
+ 1) {
1467 log_error("Domain name required.");
1474 while (optind
< argc
) {
1477 k
= resolve_tlsa(bus
, argv
[optind
++]);
1483 case MODE_STATISTICS
:
1484 if (argc
> optind
) {
1485 log_error("Too many arguments.");
1490 r
= show_statistics(bus
);
1493 case MODE_RESET_STATISTICS
:
1494 if (argc
> optind
) {
1495 log_error("Too many arguments.");
1500 r
= reset_statistics(bus
);
1503 case MODE_FLUSH_CACHES
:
1504 if (argc
> optind
) {
1505 log_error("Too many arguments.");
1510 r
= flush_caches(bus
);
1515 return r
== 0 ? EXIT_SUCCESS
: EXIT_FAILURE
;