mirror of
https://github.com/matrix-construct/construct
synced 2024-11-06 22:08:52 +01:00
275 lines
12 KiB
C++
275 lines
12 KiB
C++
// Copyright (C) Matrix Construct Developers, Authors & Contributors
|
|
// Copyright (C) 2016-2018 Jason Volk
|
|
//
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
// copyright notice and this permission notice is present in all copies.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
// IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
// WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
// DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
|
|
// INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
// (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
// HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
|
|
// IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
// POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
ircd::mutable_buffer
|
|
ircd::rfc1035::make_query(const mutable_buffer &out,
|
|
const question &q)
|
|
{
|
|
const ilist<const question> questions{q};
|
|
return make_query(out, questions);
|
|
}
|
|
|
|
ircd::mutable_buffer
|
|
ircd::rfc1035::make_query(const mutable_buffer &out,
|
|
const vector_view<const question> &questions)
|
|
{
|
|
header h{0};
|
|
h.id = rand::integer(1, 65535);
|
|
h.qdcount = bswap(uint16_t(questions.size()));
|
|
return make_query(out, h, questions);
|
|
}
|
|
|
|
ircd::mutable_buffer
|
|
ircd::rfc1035::make_query(const mutable_buffer &out,
|
|
const header &header,
|
|
const vector_view<const question> &questions)
|
|
{
|
|
assert(bswap(header.qdcount) == questions.size());
|
|
stream_buffer sb{out};
|
|
|
|
sb([&header](const mutable_buffer &buf)
|
|
{
|
|
const const_raw_buffer headbuf
|
|
{
|
|
reinterpret_cast<const uint8_t *>(&header), sizeof(header)
|
|
};
|
|
|
|
return copy(buf, headbuf);
|
|
});
|
|
|
|
for(const auto &question : questions)
|
|
sb([&question](const mutable_buffer &buf)
|
|
{
|
|
return size(question(buf));
|
|
});
|
|
|
|
return sb.completed();
|
|
}
|
|
|
|
ircd::mutable_buffer
|
|
ircd::rfc1035::question::operator()(const mutable_buffer &buf)
|
|
const
|
|
{
|
|
const size_t required
|
|
{
|
|
1 + size(fqdn) + 1 + 2 + 2
|
|
};
|
|
|
|
if(unlikely(size(buf) < required))
|
|
throw error
|
|
{
|
|
"Not enough space in question buffer; %zu bytes required", required
|
|
};
|
|
|
|
char *pos{data(buf)};
|
|
ircd::tokens(fqdn, '.', [&pos, &buf](const string_view &label)
|
|
{
|
|
if(unlikely(size(label) >= 64))
|
|
throw error
|
|
{
|
|
"Single part of domain cannot exceed 63 characters"
|
|
};
|
|
|
|
*pos++ = size(label);
|
|
pos += strlcpy(pos, label, std::distance(pos, end(buf)));
|
|
});
|
|
|
|
assert(*pos == '\0'); pos += 1;
|
|
*(uint16_t *)pos = bswap(qtype); pos += 2;
|
|
*(uint16_t *)pos = bswap(qclass); pos += 2;
|
|
|
|
assert(size_t(std::distance(data(buf), pos)) == required);
|
|
return mutable_buffer
|
|
{
|
|
data(buf), pos
|
|
};
|
|
}
|
|
|
|
ircd::rfc1035::answer::answer(const const_raw_buffer &in)
|
|
{
|
|
if(size(in) < 2 + 2 + 2 + 4 + 2)
|
|
throw error
|
|
{
|
|
"Answer input buffer is too small"
|
|
};
|
|
|
|
const uint8_t *pos(data(in));
|
|
if(*pos & uint8_t(128))
|
|
throw error
|
|
{
|
|
"Pointer format not implemented"
|
|
};
|
|
|
|
name[0] = '\0';
|
|
for(uint8_t len(*pos++); len && pos + len < end(in); len = *pos++)
|
|
{
|
|
const string_view label
|
|
{
|
|
reinterpret_cast<const char *>(pos), len
|
|
};
|
|
|
|
strlcat(name, label, sizeof(name));
|
|
strlcat(name, ".", sizeof(name));
|
|
pos += len;
|
|
}
|
|
|
|
if(pos + 2 + 2 + 4 + 2 > end(in))
|
|
throw error
|
|
{
|
|
"Answer input buffer is incomplete (%zu bytes)", size(in)
|
|
};
|
|
|
|
qtype = bswap(*(const uint16_t *)pos); pos += 2;
|
|
qclass = bswap(*(const uint16_t *)pos); pos += 2;
|
|
ttl = bswap(*(const uint32_t *)pos); pos += 4;
|
|
rdlength = bswap(*(const uint16_t *)pos); pos += 2;
|
|
|
|
if(qclass != 1)
|
|
throw error
|
|
{
|
|
"Resource record not for IN (internet); corrupt data?"
|
|
};
|
|
|
|
if(pos + rdlength > end(in))
|
|
throw error
|
|
{
|
|
"Answer input buffer has incomplete data (rdlength: %u)", rdlength
|
|
};
|
|
|
|
rdata = const_raw_buffer{pos, rdlength};
|
|
}
|
|
|
|
decltype(ircd::rfc1035::rcode)
|
|
ircd::rfc1035::rcode
|
|
{
|
|
"NoError No Error [RFC1035]", // 0
|
|
"FormErr Format Error [RFC1035]", // 1
|
|
"ServFail Server Failure [RFC1035]", // 2
|
|
"NXDomain Non-Existent Domain [RFC1035]", // 3
|
|
"NotImp Not Implemented [RFC1035]", // 4
|
|
"Refused Query Refused [RFC1035]", // 5
|
|
"YXDomain Name Exists when it should not [RFC2136][RFC6672]", // 6
|
|
"YXRRSet RR Set Exists when it should not [RFC2136]", // 7
|
|
"NXRRSet RR Set that should exist does not [RFC2136]", // 8
|
|
"NotAuth Not Authorized [RFC2845]", // 9
|
|
"NotZone Name not contained in zone [RFC2136]", // 10
|
|
"Unassigned", // 11
|
|
"Unassigned", // 12
|
|
"Unassigned", // 13
|
|
"Unassigned", // 14
|
|
"Unassigned", // 15
|
|
"BADVERS Bad OPT Version [RFC6891]", // 16
|
|
"BADSIG TSIG Signature Failure [RFC2845]", // 17
|
|
"BADKEY Key not recognized [RFC2845]", // 18
|
|
"BADTIME Signature out of time window [RFC2845]", // 19
|
|
"BADMODE Bad TKEY Mode [RFC2930]", // 20
|
|
"BADNAME Duplicate key name [RFC2930]", // 21
|
|
"BADALG Algorithm not supported [RFC2930]", // 22
|
|
"BADTRUNC Bad Truncation [RFC4635]", // 23
|
|
"BADCOOKIE Bad/missing Server Cookie [RFC7873]", // 24
|
|
};
|
|
|
|
decltype(ircd::rfc1035::qtype)
|
|
ircd::rfc1035::qtype
|
|
{
|
|
{ "A", 1 }, // a host address [RFC1035]
|
|
{ "NS", 2 }, // an authoritative name server [RFC1035]
|
|
{ "MD", 3 }, // a mail destination (OBSOLETE - use MX) [RFC1035]
|
|
{ "MF", 4 }, // a mail forwarder (OBSOLETE - use MX) [RFC1035]
|
|
{ "CNAME", 5 }, // the canonical name for an alias [RFC1035]
|
|
{ "SOA", 6 }, // marks the start of a zone of authority [RFC1035]
|
|
{ "MB", 7 }, // a mailbox domain name (EXPERIMENTAL) [RFC1035]
|
|
{ "MG", 8 }, // a mail group member (EXPERIMENTAL) [RFC1035]
|
|
{ "MR", 9 }, // a mail rename domain name (EXPERIMENTAL) [RFC1035]
|
|
{ "NULL", 10 }, // a null RR (EXPERIMENTAL) [RFC1035]
|
|
{ "WKS", 11 }, // a well known service description [RFC1035]
|
|
{ "PTR", 12 }, // a domain name pointer [RFC1035]
|
|
{ "HINFO", 13 }, // host information [RFC1035]
|
|
{ "MINFO", 14 }, // mailbox or mail list information [RFC1035]
|
|
{ "MX", 15 }, // mail exchange [RFC1035]
|
|
{ "TXT", 16 }, // text strings [RFC1035]
|
|
{ "RP", 17 }, // for Responsible Person [RFC1183]
|
|
{ "AFSDB", 18 }, // for AFS Data Base location [RFC1183][RFC5864]
|
|
{ "X25", 19 }, // for X.25 PSDN address [RFC1183]
|
|
{ "ISDN", 20 }, // for ISDN address [RFC1183]
|
|
{ "RT", 21 }, // for Route Through [RFC1183]
|
|
{ "NSAP", 22 }, // for NSAP address, NSAP style A record [RFC1706]
|
|
{ "NSAP-PTR", 23 }, // for domain name pointer, NSAP style [RFC1348][RFC1637][RFC1706]
|
|
{ "SIG", 24 }, // for security signature [RFC4034][RFC3755][RFC2535][RFC2536][RFC2537][RFC2931][RFC3110][RFC3008]
|
|
{ "KEY", 25 }, // for security key [RFC4034][RFC3755][RFC2535][RFC2536][RFC2537][RFC2539][RFC3008][RFC3110]
|
|
{ "PX", 26 }, // X.400 mail mapping information [RFC2163]
|
|
{ "GPOS", 27 }, // Geographical Position [RFC1712]
|
|
{ "AAAA", 28 }, // IP6 Address [RFC3596]
|
|
{ "LOC", 29 }, // Location Information [RFC1876]
|
|
{ "NXT", 30 }, // Next Domain (OBSOLETE) [RFC3755][RFC2535]
|
|
{ "EID", 31 }, // Endpoint Identifier [Michael_Patton][http://ana-3.lcs.mit.edu/~jnc/nimrod/dns.txt]
|
|
{ "NIMLOC", 32 }, // Nimrod Locator [1][Michael_Patton][http://ana-3.lcs.mit.edu/~jnc/nimrod/dns.txt]
|
|
{ "SRV", 33 }, // Server Selection [1][RFC2782]
|
|
{ "ATMA", 34 }, // ATM Address [ATM Forum Technical Committee]
|
|
{ "NAPTR", 35 }, // Naming Authority Pointer [RFC2915][RFC2168][RFC3403]
|
|
{ "KX", 36 }, // Key Exchanger [RFC2230]
|
|
{ "CERT", 37 }, // CERT [RFC4398]
|
|
{ "A6", 38 }, // A6 (OBSOLETE - use AAAA) [RFC3226][RFC2874][RFC6563]
|
|
{ "DNAME", 39 }, // DNAME [RFC6672]
|
|
{ "SINK", 40 }, // SINK [Donald_E_Eastlake][http://tools.ietf.org/html/draft-eastlake-kitchen-sink] 1997-11
|
|
{ "OPT", 41 }, // OPT [RFC6891][RFC3225]
|
|
{ "APL", 42 }, // APL [RFC3123]
|
|
{ "DS", 43 }, // Delegation Signer [RFC4034][RFC3658]
|
|
{ "SSHFP", 44 }, // SSH Key Fingerprint [RFC4255]
|
|
{ "IPSECKEY", 45 }, // IPSECKEY [RFC4025]
|
|
{ "RRSIG", 46 }, // RRSIG [RFC4034][RFC3755]
|
|
{ "NSEC", 47 }, // NSEC [RFC4034][RFC3755]
|
|
{ "DNSKEY", 48 }, // DNSKEY [RFC4034][RFC3755]
|
|
{ "DHCID", 49 }, // DHCID [RFC4701]
|
|
{ "NSEC3", 50 }, // NSEC3 [RFC5155]
|
|
{ "NSEC3PARAM", 51 }, // NSEC3PARAM [RFC5155]
|
|
{ "TLSA", 52 }, // TLSA [RFC6698]
|
|
{ "SMIMEA", 53 }, // S/MIME cert association [RFC8162]
|
|
{ "HIP", 55 }, // Host Identity Protocol [RFC8005]
|
|
{ "NINFO", 56 }, // NINFO [Jim_Reid] NINFO/ninfo-completed-template
|
|
{ "RKEY", 57 }, // RKEY [Jim_Reid] RKEY/rkey-completed-template
|
|
{ "TALINK", 58 }, // Trust Anchor LINK [Wouter_Wijngaards] TALINK/talink-completed-template
|
|
{ "CDS", 59 }, // Child DS [RFC7344] CDS/cds-completed-template
|
|
{ "CDNSKEY", 60 }, // DNSKEY(s) the Child wants reflected in DS [RFC7344]
|
|
{ "OPENPGPKEY", 61 }, // OpenPGP Key [RFC7929] OPENPGPKEY/openpgpkey-completed-template
|
|
{ "CSYNC", 62 }, // Child-To-Parent Synchronization [RFC7477]
|
|
{ "SPF", 99 }, // [RFC7208]
|
|
{ "UINFO", 100 }, // IANA-Reserved
|
|
{ "UID", 101 }, // IANA-Reserved
|
|
{ "GID", 102 }, // IANA-Reserved
|
|
{ "UNSPEC", 103 }, // IANA-Reserved
|
|
{ "NID", 104 }, // [RFC6742] ILNP/nid-completed-template
|
|
{ "L32", 105 }, // [RFC6742] ILNP/l32-completed-template
|
|
{ "L64", 106 }, // [RFC6742] ILNP/l64-completed-template
|
|
{ "LP", 107 }, // [RFC6742] ILNP/lp-completed-template
|
|
{ "EUI48", 108 }, // an EUI-48 address [RFC7043]
|
|
{ "EUI64", 109 }, // an EUI-64 address [RFC7043]
|
|
{ "TKEY", 249 }, // Transaction Key [RFC2930]
|
|
{ "TSIG", 250 }, // Transaction Signature [RFC2845]
|
|
{ "IXFR", 251 }, // incremental transfer [RFC1995]
|
|
{ "AXFR", 252 }, // transfer of an entire zone [RFC1035][RFC5936]
|
|
{ "MAILB", 253 }, // mailbox-related RRs (MB, MG or MR) [RFC1035]
|
|
{ "MAILA", 254 }, // mail agent RRs (OBSOLETE - see MX) [RFC1035]
|
|
{ "*", 255 }, // A request for all records the server/cache has available [RFC1035][RFC6895]
|
|
{ "URI", 256 }, // URI [RFC7553] URI/uri-completed-template
|
|
{ "CAA", 257 }, // Certification Authority Restriction [RFC6844]
|
|
{ "AVC", 258 }, // Application Visibility and Control [Wolfgang_Riedel]
|
|
{ "DOA", 259 }, // Digital Object Architecture [draft-durand-doa-over-dns]
|
|
{ "TA", 32768 }, // DNSSEC Trust Authorities [Sam_Weiler][http://cameo.library.cmu.edu/]
|
|
};
|