hammer/examples/dns.c

578 lines
16 KiB
C
Raw Normal View History

2012-05-26 19:14:26 +02:00
#include <sys/socket.h>
#include <netinet/in.h>
#include <err.h>
2012-05-26 19:42:07 +02:00
#include <string.h>
2013-01-15 01:24:47 +01:00
#include <assert.h>
#include "../src/hammer.h"
#include "dns_common.h"
#include "dns.h"
#include "rr.h"
#define false 0
#define true 1
2012-05-22 00:57:33 +02:00
///
// API Additions
///
#define H_RULE(rule, def) const HParser *rule = def
#define H_ARULE(rule, def) const HParser *rule = h_action(def, act_ ## rule)
// The action equivalent of h_ignore.
const HParsedToken *act_ignore(const HParseResult *p)
{
return NULL;
}
// Helper to build HAction's that pick one index out of a sequence.
const HParsedToken *act_index(int i, const HParseResult *p)
{
if(!p) return NULL;
const HParsedToken *tok = p->ast;
if(!tok || tok->token_type != TT_SEQUENCE)
return NULL;
const HCountedArray *seq = tok->seq;
size_t n = seq->used;
if(i<0 || (size_t)i>=n)
return NULL;
else
return tok->seq->elements[i];
}
const HParsedToken *act_index0(const HParseResult *p)
{
return act_index(0, p);
}
HParsedToken *h_make_token(HArena *arena, HTokenType type, void *value) {
HParsedToken *ret = h_arena_malloc(arena, sizeof(HParsedToken));
ret->token_type = type;
ret->user = value;
return ret;
}
#define H_MAKE(TYP) \
((TYP ## _t *) h_arena_malloc(p->arena, sizeof(TYP ## _t)))
#define H_MAKE_TOKEN(TYP, VAL) \
h_make_token(p->arena, TT_ ## TYP, VAL)
HParsedToken *h_carray_index(const HCountedArray *a, size_t i) {
assert(i < a->used);
return a->elements[i];
}
HParsedToken *h_seq_index(const HParsedToken *p, size_t i) {
assert(p->token_type == TT_SEQUENCE);
return h_carray_index(p->seq, i);
}
void *h_seq_index_user(HTokenType type, const HParsedToken *p, size_t i) {
HParsedToken *elem = h_seq_index(p, i);
assert(elem->token_type == (HTokenType)type);
return elem->user;
}
#define H_SEQ_INDEX(TYP, SEQ, IDX) \
((TYP ## _t *) h_seq_index_user(TT_ ## TYP, SEQ, IDX))
#define H_FIELD(TYP, IDX) \
H_SEQ_INDEX(TYP, p->ast, IDX)
2012-05-26 13:23:00 +02:00
bool is_zero(HParseResult *p) {
if (TT_UINT != p->ast->token_type)
return false;
return (0 == p->ast->uint);
}
2012-05-22 00:57:33 +02:00
///
// Semantic Actions
///
/**
* Every DNS message should have QDCOUNT entries in the question
* section, and ANCOUNT+NSCOUNT+ARCOUNT resource records.
*/
2012-05-26 13:23:00 +02:00
bool validate_dns(HParseResult *p) {
if (TT_SEQUENCE != p->ast->token_type)
return false;
2013-01-15 01:24:47 +01:00
assert(p->ast->seq->elements[0]->token_type == (HTokenType)TT_dns_header);
dns_header_t *header = (dns_header_t *)p->ast->seq->elements[0]->user;
size_t qd = header->question_count;
size_t an = header->answer_count;
size_t ns = header->authority_count;
size_t ar = header->additional_count;
2012-05-26 13:23:00 +02:00
HParsedToken *questions = p->ast->seq->elements[1];
if (questions->seq->used != qd)
return false;
2012-05-26 13:23:00 +02:00
HParsedToken *rrs = p->ast->seq->elements[2];
if (an+ns+ar != rrs->seq->used)
return false;
return true;
2012-05-22 00:57:33 +02:00
}
char* get_domain(const HParsedToken *t) {
switch(t->token_type) {
case TT_UINT:
return " ";
case TT_SEQUENCE:
{
// Sequence of subdomains separated by "."
// Each subdomain is a label, which can be no more than 63 chars.
char *ret = h_arena_malloc(t->seq->arena, 64*t->seq->used);
size_t count = 0;
for (size_t i=0; i<t->seq->used; ++i) {
HParsedToken *tmp = t->seq->elements[i];
for (size_t j=0; j<tmp->seq->used; ++j) {
ret[count] = tmp->seq->elements[i]->uint;
++count;
}
ret[count] = '.';
++count;
}
ret[count-1] = '\x00';
return ret;
}
default:
return NULL;
}
}
uint8_t* get_cs(const HCountedArray *arr) {
uint8_t *ret = h_arena_malloc(arr->arena, sizeof(uint8_t)*arr->used);
for (size_t i=0; i<arr->used; ++i)
ret[i] = arr->elements[i]->uint;
return ret;
}
uint8_t** get_txt(const HCountedArray *arr) {
uint8_t **ret = h_arena_malloc(arr->arena, sizeof(uint8_t*)*arr->used);
for (size_t i=0; i<arr->used; ++i) {
uint8_t *tmp = h_arena_malloc(arr->arena, sizeof(uint8_t)*arr->elements[i]->seq->used);
for (size_t j=0; j<arr->elements[i]->seq->used; ++j)
tmp[j] = arr->elements[i]->seq->elements[j]->uint;
}
return ret;
}
void set_rr(struct dns_rr rr, HCountedArray *rdata) {
uint8_t *data = h_arena_malloc(rdata->arena, sizeof(uint8_t)*rdata->used);
for (size_t i=0; i<rdata->used; ++i)
data[i] = rdata->elements[i]->uint;
2013-01-15 22:12:13 +01:00
// Mapping numeric RR types (as indices) to parsers
const HParser *parsers[] = {
NULL, // there is no type 0
init_a(), // 1
init_ns(),
init_md(),
init_mf(),
init_cname(), // 5
init_soa(),
init_mb(),
init_mg(),
init_mr(),
init_null(), // 10
init_wks(),
init_ptr(),
init_hinfo(),
init_minfo(),
init_mx(), // 15
init_txt()
};
// Parse rdata if possible.
const HParseResult *r = NULL;
if (rr.type < sizeof(parsers)) {
const HParser *p = parsers[rr.type];
if (p)
r = h_parse(p, (const uint8_t*)data, rdata->used);
}
// If the RR doesn't parse, set its type to 0.
2013-01-15 22:12:13 +01:00
if (!r)
rr.type = 0;
// Pack the parsed rdata into rr.
switch(rr.type) {
case 1: // A
2013-01-15 22:12:13 +01:00
rr.a = r->ast->seq->elements[0]->uint;
break;
case 2: // NS
2013-01-15 22:12:13 +01:00
rr.ns = get_domain(r->ast->seq->elements[0]);
break;
case 3: // MD
2013-01-15 22:12:13 +01:00
rr.md = get_domain(r->ast->seq->elements[0]);
break;
case 4: // MF
2013-01-15 22:12:13 +01:00
rr.md = get_domain(r->ast->seq->elements[0]);
break;
case 5: // CNAME
2013-01-15 22:12:13 +01:00
rr.cname = get_domain(r->ast->seq->elements[0]);
break;
case 6: // SOA
2013-01-15 22:12:13 +01:00
rr.soa.mname = get_domain(r->ast->seq->elements[0]);
rr.soa.rname = get_domain(r->ast->seq->elements[1]);
rr.soa.serial = r->ast->seq->elements[2]->uint;
rr.soa.refresh = r->ast->seq->elements[3]->uint;
rr.soa.retry = r->ast->seq->elements[4]->uint;
rr.soa.expire = r->ast->seq->elements[5]->uint;
rr.soa.minimum = r->ast->seq->elements[6]->uint;
break;
case 7: // MB
2013-01-15 22:12:13 +01:00
rr.mb = get_domain(r->ast->seq->elements[0]);
break;
case 8: // MG
2013-01-15 22:12:13 +01:00
rr.mg = get_domain(r->ast->seq->elements[0]);
break;
case 9: // MR
2013-01-15 22:12:13 +01:00
rr.mr = get_domain(r->ast->seq->elements[0]);
break;
case 10: // NULL
2013-01-15 22:12:13 +01:00
rr.null = h_arena_malloc(rdata->arena, sizeof(uint8_t)*r->ast->seq->used);
for (size_t i=0; i<r->ast->seq->used; ++i)
rr.null[i] = r->ast->seq->elements[i]->uint;
break;
case 11: // WKS
2013-01-15 22:12:13 +01:00
rr.wks.address = r->ast->seq->elements[0]->uint;
rr.wks.protocol = r->ast->seq->elements[1]->uint;
rr.wks.len = r->ast->seq->elements[2]->seq->used;
rr.wks.bit_map = h_arena_malloc(rdata->arena, sizeof(uint8_t)*r->ast->seq->elements[2]->seq->used);
for (size_t i=0; i<rr.wks.len; ++i)
rr.wks.bit_map[i] = r->ast->seq->elements[2]->seq->elements[i]->uint;
break;
case 12: // PTR
2013-01-15 22:12:13 +01:00
rr.ptr = get_domain(r->ast->seq->elements[0]);
break;
case 13: // HINFO
2013-01-15 22:12:13 +01:00
rr.hinfo.cpu = get_cs(r->ast->seq->elements[0]->seq);
rr.hinfo.os = get_cs(r->ast->seq->elements[1]->seq);
break;
case 14: // MINFO
2013-01-15 22:12:13 +01:00
rr.minfo.rmailbx = get_domain(r->ast->seq->elements[0]);
rr.minfo.emailbx = get_domain(r->ast->seq->elements[1]);
break;
case 15: // MX
2013-01-15 22:12:13 +01:00
rr.mx.preference = r->ast->seq->elements[0]->uint;
rr.mx.exchange = get_domain(r->ast->seq->elements[1]);
break;
case 16: // TXT
2013-01-15 22:12:13 +01:00
rr.txt.count = r->ast->seq->elements[0]->seq->used;
rr.txt.txt_data = get_txt(r->ast->seq->elements[0]->seq);
break;
default:
break;
}
}
2013-01-15 01:24:47 +01:00
const HParsedToken* act_header(const HParseResult *p) {
HParsedToken **fields = p->ast->seq->elements;
dns_header_t header_ = {
.id = fields[0]->uint,
.qr = fields[1]->uint,
.opcode = fields[2]->uint,
.aa = fields[3]->uint,
.tc = fields[4]->uint,
.rd = fields[5]->uint,
.ra = fields[6]->uint,
.rcode = fields[7]->uint,
.question_count = fields[8]->uint,
.answer_count = fields[9]->uint,
.authority_count = fields[10]->uint,
.additional_count = fields[11]->uint
};
dns_header_t *header = H_MAKE(dns_header);
*header = header_;
return H_MAKE_TOKEN(dns_header, header);
2013-01-15 01:24:47 +01:00
}
2013-01-15 13:54:30 +01:00
const HParsedToken* act_label(const HParseResult *p) {
dns_label_t *r = H_MAKE(dns_label);
2013-01-15 13:54:30 +01:00
r->len = p->ast->seq->used;
r->label = h_arena_malloc(p->arena, r->len + 1);
for (size_t i=0; i<r->len; ++i)
r->label[i] = p->ast->seq->elements[i]->uint;
r->label[r->len] = 0;
return H_MAKE_TOKEN(dns_label, r);
2013-01-15 13:54:30 +01:00
}
const HParsedToken* act_question(const HParseResult *p) {
dns_question_t *q = H_MAKE(dns_question);
2013-01-15 13:54:30 +01:00
HParsedToken **fields = p->ast->seq->elements;
// QNAME is a sequence of labels. Pack them into an array.
q->qname.qlen = fields[0]->seq->used;
q->qname.labels = h_arena_malloc(p->arena, sizeof(dns_label_t)*q->qname.qlen);
for(size_t i=0; i<fields[0]->seq->used; i++) {
q->qname.labels[i] = *H_SEQ_INDEX(dns_label, fields[0], i);
2013-01-15 13:54:30 +01:00
}
q->qtype = fields[1]->uint;
q->qclass = fields[2]->uint;
return H_MAKE_TOKEN(dns_question, q);
2013-01-15 13:54:30 +01:00
}
2013-01-15 00:19:43 +01:00
const HParsedToken* act_message(const HParseResult *p) {
2012-05-26 19:14:26 +02:00
h_pprint(stdout, p->ast, 0, 2);
dns_message_t *msg = H_MAKE(dns_message);
dns_header_t *header = H_FIELD(dns_header, 0);
2013-01-15 01:24:47 +01:00
msg->header = *header;
2012-05-26 13:23:00 +02:00
HParsedToken *qs = p->ast->seq->elements[1];
struct dns_question *questions = h_arena_malloc(p->arena,
2013-01-15 13:54:30 +01:00
sizeof(struct dns_question)*(header->question_count));
2013-01-15 01:24:47 +01:00
for (size_t i=0; i<header->question_count; ++i) {
2013-01-15 22:18:33 +01:00
questions[i] = *H_SEQ_INDEX(dns_question, qs, i);
}
msg->questions = questions;
2012-05-26 13:23:00 +02:00
HParsedToken *rrs = p->ast->seq->elements[2];
struct dns_rr *answers = h_arena_malloc(p->arena,
2013-01-15 01:24:47 +01:00
sizeof(struct dns_rr)*(header->answer_count));
for (size_t i=0; i<header->answer_count; ++i) {
answers[i].name = get_domain(rrs[i].seq->elements[0]);
answers[i].type = rrs[i].seq->elements[1]->uint;
answers[i].class = rrs[i].seq->elements[2]->uint;
answers[i].ttl = rrs[i].seq->elements[3]->uint;
answers[i].rdlength = rrs[i].seq->elements[4]->seq->used;
set_rr(answers[i], rrs[i].seq->elements[4]->seq);
}
msg->answers = answers;
struct dns_rr *authority = h_arena_malloc(p->arena,
2013-01-15 01:24:47 +01:00
sizeof(struct dns_rr)*(header->authority_count));
for (size_t i=0, j=header->answer_count; i<header->authority_count; ++i, ++j) {
authority[i].name = get_domain(rrs[j].seq->elements[0]);
authority[i].type = rrs[j].seq->elements[1]->uint;
authority[i].class = rrs[j].seq->elements[2]->uint;
authority[i].ttl = rrs[j].seq->elements[3]->uint;
authority[i].rdlength = rrs[j].seq->elements[4]->seq->used;
set_rr(authority[i], rrs[j].seq->elements[4]->seq);
}
msg->authority = authority;
struct dns_rr *additional = h_arena_malloc(p->arena,
2013-01-15 01:24:47 +01:00
sizeof(struct dns_rr)*(header->additional_count));
for (size_t i=0, j=header->answer_count+header->authority_count; i<header->additional_count; ++i, ++j) {
additional[i].name = get_domain(rrs[j].seq->elements[0]);
additional[i].type = rrs[j].seq->elements[1]->uint;
additional[i].class = rrs[j].seq->elements[2]->uint;
additional[i].ttl = rrs[j].seq->elements[3]->uint;
additional[i].rdlength = rrs[j].seq->elements[4]->seq->used;
set_rr(additional[i], rrs[j].seq->elements[4]->seq);
}
msg->additional = additional;
return H_MAKE_TOKEN(dns_message, msg);
2013-01-15 13:54:30 +01:00
}
2013-01-15 00:19:43 +01:00
#define act_hdzero act_ignore
2013-01-15 13:54:30 +01:00
#define act_qname act_index0
2012-05-22 00:57:33 +02:00
///
// Parser / Grammar
///
const HParser* init_parser() {
static const HParser *ret = NULL;
if (ret)
return ret;
2012-05-22 00:57:33 +02:00
2013-01-15 00:19:43 +01:00
H_RULE (domain, init_domain());
H_ARULE(hdzero, h_attr_bool(h_bits(3, false), is_zero));
2013-01-15 01:24:47 +01:00
H_ARULE(header, h_sequence(h_bits(16, false), // ID
2013-01-15 00:19:43 +01:00
h_bits(1, false), // QR
h_bits(4, false), // opcode
h_bits(1, false), // AA
h_bits(1, false), // TC
h_bits(1, false), // RD
h_bits(1, false), // RA
hdzero, // Z
h_bits(4, false), // RCODE
h_uint16(), // QDCOUNT
h_uint16(), // ANCOUNT
h_uint16(), // NSCOUNT
h_uint16(), // ARCOUNT
NULL));
2013-01-15 00:19:43 +01:00
H_RULE (type, h_int_range(h_uint16(), 1, 16));
H_RULE (qtype, h_choice(type,
h_int_range(h_uint16(), 252, 255),
NULL));
H_RULE (class, h_int_range(h_uint16(), 1, 4));
H_RULE (qclass, h_choice(class,
h_int_range(h_uint16(), 255, 255),
NULL));
H_RULE (len, h_int_range(h_uint8(), 1, 255));
2013-01-15 13:54:30 +01:00
H_ARULE(label, h_length_value(len, h_uint8()));
H_ARULE(qname, h_sequence(h_many1(label),
2013-01-15 00:19:43 +01:00
h_ch('\x00'),
NULL));
2013-01-15 13:54:30 +01:00
H_ARULE(question, h_sequence(qname, qtype, qclass, NULL));
2013-01-15 00:19:43 +01:00
H_RULE (rdata, h_length_value(h_uint16(), h_uint8()));
H_RULE (rr, h_sequence(domain, // NAME
type, // TYPE
class, // CLASS
h_uint32(), // TTL
rdata, // RDLENGTH+RDATA
NULL));
H_ARULE(message, h_attr_bool(h_sequence(header,
h_many(question),
h_many(rr),
h_end_p(),
NULL),
validate_dns));
2013-01-15 00:19:43 +01:00
ret = message;
return ret;
}
///
// Program Logic for a Dummy DNS Server
///
2012-05-26 19:14:26 +02:00
int start_listening() {
// return: fd
int sock;
struct sockaddr_in addr;
sock = socket(PF_INET, SOCK_DGRAM, 0);
if (sock < 0)
err(1, "Failed to open listning socket");
addr.sin_family = AF_INET;
addr.sin_port = htons(53);
addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
int optval = 1;
setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval));
if (bind(sock, (struct sockaddr*)&addr, sizeof(addr)) < 0)
err(1, "Bind failed");
return sock;
}
const int TYPE_MAX = 16;
typedef const char* cstr;
const char* TYPE_STR[17] = {
"nil", "A", "NS", "MD",
"MF", "CNAME", "SOA", "MB",
"MG", "MR", "NULL", "WKS",
"PTR", "HINFO", "MINFO", "MX",
"TXT"
};
const int CLASS_MAX = 4;
const char* CLASS_STR[5] = {
"nil", "IN", "CS", "CH", "HS"
};
void format_qname(struct dns_qname *name, uint8_t **dest) {
uint8_t *rp = *dest;
for (size_t j = 0; j < name->qlen; j++) {
*rp++ = name->labels[j].len;
for (size_t k = 0; k < name->labels[j].len; k++)
*rp++ = name->labels[j].label[k];
}
*rp++ = 0;
*dest = rp;
}
int main(int argc, char** argv) {
2012-05-26 19:14:26 +02:00
const HParser *parser = init_parser();
// set up a listening socket...
int sock = start_listening();
uint8_t packet[8192]; // static buffer for simplicity
ssize_t packet_size;
struct sockaddr_in remote;
socklen_t remote_len;
while (1) {
remote_len = sizeof(remote);
packet_size = recvfrom(sock, packet, sizeof(packet), 0, (struct sockaddr*)&remote, &remote_len);
// dump the packet...
for (int i = 0; i < packet_size; i++)
printf(".%02hhx", packet[i]);
printf("\n");
HParseResult *content = h_parse(parser, packet, packet_size);
if (!content) {
printf("Invalid packet; ignoring\n");
continue;
}
dns_message_t *message = content->ast->user;
(void)message;
for (size_t i = 0; i < message->header.question_count; i++) {
struct dns_question *question = &message->questions[i];
printf("Recieved %s %s request for ", CLASS_STR[question->qclass], TYPE_STR[question->qtype]);
for (size_t j = 0; j < question->qname.qlen; j++)
printf("%s.", question->qname.labels[j].label);
printf("\n");
}
printf("%p\n", content);
2012-05-26 19:42:07 +02:00
// Not much time to actually implement the DNS server for the talk, so here's something quick and dirty.
2012-05-26 19:14:26 +02:00
// Traditional response for this time of year...
uint8_t response_buf[4096];
uint8_t *rp = response_buf;
// write out header...
*rp++ = message->header.id >> 8;
*rp++ = message->header.id & 0xff;
*rp++ = 0x80 | (message->header.opcode << 3) | message->header.rd;
2012-05-26 19:42:07 +02:00
*rp++ = 0x0; // change to 0 for no error...
2012-05-26 19:14:26 +02:00
*rp++ = 0; *rp++ = 1; // QDCOUNT
2012-05-26 19:42:07 +02:00
*rp++ = 0; *rp++ = 1; // ANCOUNT
2012-05-26 19:14:26 +02:00
*rp++ = 0; *rp++ = 0; // NSCOUNT
*rp++ = 0; *rp++ = 0; // ARCOUNT
// encode the first question...
{
struct dns_question *question = &message->questions[0];
format_qname(&question->qname, &rp);
*rp++ = (question->qtype >> 8) & 0xff;
*rp++ = (question->qtype ) & 0xff;
*rp++ = (question->qclass >> 8) & 0xff;
*rp++ = (question->qclass ) & 0xff;
2012-05-26 19:42:07 +02:00
// it's a cname...
format_qname(&question->qname, &rp);
*rp++ = 0; *rp++ = 5;
*rp++ = (question->qclass >> 8) & 0xff;
*rp++ = (question->qclass ) & 0xff;
*rp++ = 0; *rp++ = 0; *rp++ = 0; *rp++ = 0; // TTL.
//const char cname_rd[14] = "\x09spargelze\x02it";
*rp++ = 0; *rp++ = 14;
memcpy(rp, "\x09spargelze\x02it", 14);
rp += 14;
2012-05-26 19:14:26 +02:00
}
// send response.
sendto(sock, response_buf, (rp - response_buf), 0, (struct sockaddr*)&remote, remote_len);
}
return 0;
}
2012-05-26 19:14:26 +02:00