#include #include #include #include #include "../src/hammer.h" #include "dns_common.h" #include "dns.h" #include "rr.h" #define false 0 #define true 1 /// // Validations /// bool validate_hdzero(HParseResult *p) { if (TT_UINT != p->ast->token_type) return false; return (0 == p->ast->uint); } /** * Every DNS message should have QDCOUNT entries in the question * section, and ANCOUNT+NSCOUNT+ARCOUNT resource records. */ bool validate_message(HParseResult *p) { if (TT_SEQUENCE != p->ast->token_type) return false; dns_header_t *header = H_FIELD(dns_header_t, 0); size_t qd = header->question_count; size_t an = header->answer_count; size_t ns = header->authority_count; size_t ar = header->additional_count; HParsedToken *questions = p->ast->seq->elements[1]; if (questions->seq->used != qd) return false; HParsedToken *rrs = p->ast->seq->elements[2]; if (an+ns+ar != rrs->seq->used) return false; return true; } /// // Semantic Actions /// void set_rdata(struct dns_rr rr, HCountedArray *rdata) { uint8_t *data = h_arena_malloc(rdata->arena, sizeof(uint8_t)*rdata->used); for (size_t i=0; iused; ++i) data[i] = rdata->elements[i]->uint; // Parse RDATA if possible. const HParseResult *p = NULL; const HParser *parser = init_rdata(rr.type); if (parser) p = h_parse(parser, (const uint8_t*)data, rdata->used); // If the RR doesn't parse, set its type to 0. if (!p) rr.type = 0; // Pack the parsed rdata into rr. switch(rr.type) { case 1: // A rr.a = p->ast->seq->elements[0]->uint; break; case 2: // NS rr.ns = *(dns_domain_t *)p->ast->user; break; case 3: // MD rr.md = *(dns_domain_t *)p->ast->user; break; case 4: // MF rr.md = *(dns_domain_t *)p->ast->user; break; case 5: // CNAME rr.cname = *(dns_domain_t *)p->ast->user; break; case 6: // SOA rr.soa = *(dns_rr_soa_t *)p->ast->user; break; case 7: // MB rr.mb = *(dns_domain_t *)p->ast->user; break; case 8: // MG rr.mg = *(dns_domain_t *)p->ast->user; break; case 9: // MR rr.mr = *(dns_domain_t *)p->ast->user; break; case 10: // NULL rr.null = *(dns_rr_null_t *)p->ast->user; break; case 11: // WKS rr.wks = *(dns_rr_wks_t *)p->ast->user; break; case 12: // PTR rr.ptr = *(dns_domain_t *)p->ast->user; break; case 13: // HINFO rr.hinfo = *(dns_rr_hinfo_t *)p->ast->user; break; case 14: // MINFO rr.minfo = *(dns_rr_minfo_t *)p->ast->user; break; case 15: // MX rr.mx = *(dns_rr_mx_t *)p->ast->user; break; case 16: // TXT rr.txt = *(dns_rr_txt_t *)p->ast->user; break; default: break; } } const HParsedToken* act_header(const HParseResult *p) { HParsedToken **fields = p->ast->seq->elements; dns_header_t header_ = { .id = fields[0]->uint, .qr = fields[1]->uint, .opcode = fields[2]->uint, .aa = fields[3]->uint, .tc = fields[4]->uint, .rd = fields[5]->uint, .ra = fields[6]->uint, .rcode = fields[7]->uint, .question_count = fields[8]->uint, .answer_count = fields[9]->uint, .authority_count = fields[10]->uint, .additional_count = fields[11]->uint }; dns_header_t *header = H_MAKE(dns_header_t); *header = header_; return H_MAKE_TOKEN(dns_header_t, header); } const HParsedToken* act_label(const HParseResult *p) { dns_label_t *r = H_MAKE(dns_label_t); r->len = p->ast->seq->used; r->label = h_arena_malloc(p->arena, r->len + 1); for (size_t i=0; ilen; ++i) r->label[i] = p->ast->seq->elements[i]->uint; r->label[r->len] = 0; return H_MAKE_TOKEN(dns_label_t, r); } const HParsedToken* act_rr(const HParseResult *p) { dns_rr_t *rr = H_MAKE(dns_rr_t); rr->name = *H_FIELD(dns_domain_t, 0); rr->type = p->ast->seq->elements[1]->uint; rr->class = p->ast->seq->elements[2]->uint; rr->ttl = p->ast->seq->elements[3]->uint; rr->rdlength = p->ast->seq->elements[4]->seq->used; // Parse and pack RDATA. set_rdata(*rr, p->ast->seq->elements[4]->seq); return H_MAKE_TOKEN(dns_rr_t, rr); } const HParsedToken* act_question(const HParseResult *p) { dns_question_t *q = H_MAKE(dns_question_t); HParsedToken **fields = p->ast->seq->elements; // QNAME is a sequence of labels. Pack them into an array. q->qname.qlen = fields[0]->seq->used; q->qname.labels = h_arena_malloc(p->arena, sizeof(dns_label_t)*q->qname.qlen); for(size_t i=0; iseq->used; i++) { q->qname.labels[i] = *H_SEQ_INDEX(dns_label_t, fields[0], i); } q->qtype = fields[1]->uint; q->qclass = fields[2]->uint; return H_MAKE_TOKEN(dns_question_t, q); } const HParsedToken* act_message(const HParseResult *p) { h_pprint(stdout, p->ast, 0, 2); dns_message_t *msg = H_MAKE(dns_message_t); // Copy header into message struct. dns_header_t *header = H_FIELD(dns_header_t, 0); msg->header = *header; // Copy questions into message struct. HParsedToken *qs = p->ast->seq->elements[1]; struct dns_question *questions = h_arena_malloc(p->arena, sizeof(struct dns_question)*(header->question_count)); for (size_t i=0; iquestion_count; ++i) { questions[i] = *H_SEQ_INDEX(dns_question_t, qs, i); } msg->questions = questions; // Copy answer RRs into message struct. HParsedToken *rrs = p->ast->seq->elements[2]; struct dns_rr *answers = h_arena_malloc(p->arena, sizeof(struct dns_rr)*(header->answer_count)); for (size_t i=0; ianswer_count; ++i) { answers[i] = *H_SEQ_INDEX(dns_rr_t, rrs, i); } msg->answers = answers; // Copy authority RRs into message struct. struct dns_rr *authority = h_arena_malloc(p->arena, sizeof(struct dns_rr)*(header->authority_count)); for (size_t i=0, j=header->answer_count; iauthority_count; ++i, ++j) { authority[i] = *H_SEQ_INDEX(dns_rr_t, rrs, j); } msg->authority = authority; // Copy additional RRs into message struct. struct dns_rr *additional = h_arena_malloc(p->arena, sizeof(struct dns_rr)*(header->additional_count)); for (size_t i=0, j=header->answer_count+header->authority_count; iadditional_count; ++i, ++j) { additional[i] = *H_SEQ_INDEX(dns_rr_t, rrs, j); } msg->additional = additional; return H_MAKE_TOKEN(dns_message_t, msg); } #define act_hdzero h_act_ignore #define act_qname act_index0 /// // Parser / Grammar /// const HParser* init_parser() { static const HParser *ret = NULL; if (ret) return ret; H_RULE (domain, init_domain()); H_AVRULE(hdzero, h_bits(3, false)); H_ARULE (header, h_sequence(h_bits(16, false), // ID h_bits(1, false), // QR h_bits(4, false), // opcode h_bits(1, false), // AA h_bits(1, false), // TC h_bits(1, false), // RD h_bits(1, false), // RA hdzero, // Z h_bits(4, false), // RCODE h_uint16(), // QDCOUNT h_uint16(), // ANCOUNT h_uint16(), // NSCOUNT h_uint16(), // ARCOUNT NULL)); H_RULE (type, h_int_range(h_uint16(), 1, 16)); H_RULE (qtype, h_choice(type, h_int_range(h_uint16(), 252, 255), NULL)); H_RULE (class, h_int_range(h_uint16(), 1, 4)); H_RULE (qclass, h_choice(class, h_int_range(h_uint16(), 255, 255), NULL)); H_RULE (len, h_int_range(h_uint8(), 1, 255)); H_ARULE (label, h_length_value(len, h_uint8())); H_ARULE (qname, h_sequence(h_many1(label), h_ch('\x00'), NULL)); H_ARULE (question, h_sequence(qname, qtype, qclass, NULL)); H_RULE (rdata, h_length_value(h_uint16(), h_uint8())); H_ARULE (rr, h_sequence(domain, // NAME type, // TYPE class, // CLASS h_uint32(), // TTL rdata, // RDLENGTH+RDATA NULL)); H_AVRULE(message, h_sequence(header, h_many(question), h_many(rr), h_end_p(), NULL)); ret = message; return ret; } /// // Program Logic for a Dummy DNS Server /// int start_listening() { // return: fd int sock; struct sockaddr_in addr; sock = socket(PF_INET, SOCK_DGRAM, 0); if (sock < 0) err(1, "Failed to open listning socket"); addr.sin_family = AF_INET; addr.sin_port = htons(53); addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); int optval = 1; setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)); if (bind(sock, (struct sockaddr*)&addr, sizeof(addr)) < 0) err(1, "Bind failed"); return sock; } const int TYPE_MAX = 16; typedef const char* cstr; static const char* TYPE_STR[17] = { "nil", "A", "NS", "MD", "MF", "CNAME", "SOA", "MB", "MG", "MR", "NULL", "WKS", "PTR", "HINFO", "MINFO", "MX", "TXT" }; const int CLASS_MAX = 4; const char* CLASS_STR[5] = { "nil", "IN", "CS", "CH", "HS" }; void format_qname(struct dns_qname *name, uint8_t **dest) { uint8_t *rp = *dest; for (size_t j = 0; j < name->qlen; j++) { *rp++ = name->labels[j].len; for (size_t k = 0; k < name->labels[j].len; k++) *rp++ = name->labels[j].label[k]; } *rp++ = 0; *dest = rp; } int main(int argc, char** argv) { const HParser *parser = init_parser(); // set up a listening socket... int sock = start_listening(); uint8_t packet[8192]; // static buffer for simplicity ssize_t packet_size; struct sockaddr_in remote; socklen_t remote_len; while (1) { remote_len = sizeof(remote); packet_size = recvfrom(sock, packet, sizeof(packet), 0, (struct sockaddr*)&remote, &remote_len); // dump the packet... for (int i = 0; i < packet_size; i++) printf(".%02hhx", packet[i]); printf("\n"); HParseResult *content = h_parse(parser, packet, packet_size); if (!content) { printf("Invalid packet; ignoring\n"); continue; } dns_message_t *message = content->ast->user; (void)message; for (size_t i = 0; i < message->header.question_count; i++) { struct dns_question *question = &message->questions[i]; printf("Recieved %s %s request for ", CLASS_STR[question->qclass], TYPE_STR[question->qtype]); for (size_t j = 0; j < question->qname.qlen; j++) printf("%s.", question->qname.labels[j].label); printf("\n"); } printf("%p\n", content); // Not much time to actually implement the DNS server for the talk, so here's something quick and dirty. // Traditional response for this time of year... uint8_t response_buf[4096]; uint8_t *rp = response_buf; // write out header... *rp++ = message->header.id >> 8; *rp++ = message->header.id & 0xff; *rp++ = 0x80 | (message->header.opcode << 3) | message->header.rd; *rp++ = 0x0; // change to 0 for no error... *rp++ = 0; *rp++ = 1; // QDCOUNT *rp++ = 0; *rp++ = 1; // ANCOUNT *rp++ = 0; *rp++ = 0; // NSCOUNT *rp++ = 0; *rp++ = 0; // ARCOUNT // encode the first question... { struct dns_question *question = &message->questions[0]; format_qname(&question->qname, &rp); *rp++ = (question->qtype >> 8) & 0xff; *rp++ = (question->qtype ) & 0xff; *rp++ = (question->qclass >> 8) & 0xff; *rp++ = (question->qclass ) & 0xff; // it's a cname... format_qname(&question->qname, &rp); *rp++ = 0; *rp++ = 5; *rp++ = (question->qclass >> 8) & 0xff; *rp++ = (question->qclass ) & 0xff; *rp++ = 0; *rp++ = 0; *rp++ = 0; *rp++ = 0; // TTL. //const char cname_rd[14] = "\x09spargelze\x02it"; *rp++ = 0; *rp++ = 14; memcpy(rp, "\x09spargelze\x02it", 14); rp += 14; } // send response. sendto(sock, response_buf, (rp - response_buf), 0, (struct sockaddr*)&remote, remote_len); } return 0; }