wire.rs 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551
  1. //! Parsing the DNS wire protocol.
  2. pub(crate) use std::io::Cursor;
  3. pub(crate) use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt};
  4. use std::io;
  5. use log::*;
  6. use crate::record::{Record, OPT};
  7. use crate::strings::{ReadLabels, WriteLabels};
  8. use crate::types::*;
  9. impl Request {
  10. /// Converts this request to a vector of bytes.
  11. pub fn to_bytes(&self) -> io::Result<Vec<u8>> {
  12. let mut bytes = Vec::with_capacity(32);
  13. bytes.write_u16::<BigEndian>(self.transaction_id)?;
  14. bytes.write_u16::<BigEndian>(self.flags.to_u16())?;
  15. bytes.write_u16::<BigEndian>(1)?; // query count
  16. bytes.write_u16::<BigEndian>(0)?; // answer count
  17. bytes.write_u16::<BigEndian>(0)?; // authority RR count
  18. bytes.write_u16::<BigEndian>(if self.additional.is_some() { 1 } else { 0 })?; // additional RR count
  19. bytes.write_labels(&self.query.qname)?;
  20. bytes.write_u16::<BigEndian>(self.query.qtype)?;
  21. bytes.write_u16::<BigEndian>(self.query.qclass.to_u16())?;
  22. if let Some(opt) = &self.additional {
  23. bytes.write_u8(0)?; // usually a name
  24. bytes.write_u16::<BigEndian>(OPT::RR_TYPE)?;
  25. bytes.extend(opt.to_bytes()?);
  26. }
  27. Ok(bytes)
  28. }
  29. /// Returns the OPT record to be sent as part of requests.
  30. pub fn additional_record() -> OPT {
  31. OPT {
  32. udp_payload_size: 512,
  33. higher_bits: 0,
  34. edns0_version: 0,
  35. flags: 0,
  36. data: Vec::new(),
  37. }
  38. }
  39. }
  40. impl Response {
  41. /// Reads bytes off of the given slice, parsing them into a response.
  42. #[cfg_attr(all(test, feature = "with_mutagen"), ::mutagen::mutate)]
  43. pub fn from_bytes(bytes: &[u8]) -> Result<Self, WireError> {
  44. info!("Parsing response");
  45. trace!("Bytes -> {:?}", bytes);
  46. let mut c = Cursor::new(bytes);
  47. let transaction_id = c.read_u16::<BigEndian>()?;
  48. trace!("Read txid -> {:?}", transaction_id);
  49. let flags = Flags::from_u16(c.read_u16::<BigEndian>()?);
  50. trace!("Read flags -> {:#?}", flags);
  51. let query_count = c.read_u16::<BigEndian>()?;
  52. let answer_count = c.read_u16::<BigEndian>()?;
  53. let authority_count = c.read_u16::<BigEndian>()?;
  54. let additional_count = c.read_u16::<BigEndian>()?;
  55. let mut queries = Vec::new();
  56. debug!("Reading {}x query from response", query_count);
  57. for _ in 0 .. query_count {
  58. let (qname, _) = c.read_labels()?;
  59. queries.push(Query::from_bytes(qname, &mut c)?);
  60. }
  61. let mut answers = Vec::new();
  62. debug!("Reading {}x answer from response", answer_count);
  63. for _ in 0 .. answer_count {
  64. let (qname, _) = c.read_labels()?;
  65. answers.push(Answer::from_bytes(qname, &mut c)?);
  66. }
  67. let mut authorities = Vec::new();
  68. debug!("Reading {}x authority from response", authority_count);
  69. for _ in 0 .. authority_count {
  70. let (qname, _) = c.read_labels()?;
  71. authorities.push(Answer::from_bytes(qname, &mut c)?);
  72. }
  73. let mut additionals = Vec::new();
  74. debug!("Reading {}x additional answer from response", additional_count);
  75. for _ in 0 .. additional_count {
  76. let (qname, _) = c.read_labels()?;
  77. additionals.push(Answer::from_bytes(qname, &mut c)?);
  78. }
  79. Ok(Self { transaction_id, flags, queries, answers, authorities, additionals })
  80. }
  81. }
  82. impl Query {
  83. /// Reads bytes from the given cursor, and parses them into a query with
  84. /// the given domain name.
  85. #[cfg_attr(all(test, feature = "with_mutagen"), ::mutagen::mutate)]
  86. fn from_bytes(qname: String, c: &mut Cursor<&[u8]>) -> Result<Self, WireError> {
  87. let qtype = c.read_u16::<BigEndian>()?;
  88. trace!("Read qtype -> {:?}", qtype);
  89. let qclass = QClass::from_u16(c.read_u16::<BigEndian>()?);
  90. trace!("Read qclass -> {:?}", qtype);
  91. Ok(Self { qtype, qclass, qname })
  92. }
  93. }
  94. impl Answer {
  95. /// Reads bytes from the given cursor, and parses them into an answer with
  96. /// the given domain name.
  97. #[cfg_attr(all(test, feature = "with_mutagen"), ::mutagen::mutate)]
  98. fn from_bytes(qname: String, c: &mut Cursor<&[u8]>) -> Result<Self, WireError> {
  99. let qtype = c.read_u16::<BigEndian>()?;
  100. trace!("Read qtype -> {:?}", qtype);
  101. if qtype == OPT::RR_TYPE {
  102. let opt = OPT::read(c)?;
  103. Ok(Self::Pseudo { qname, opt })
  104. }
  105. else {
  106. let qclass = QClass::from_u16(c.read_u16::<BigEndian>()?);
  107. trace!("Read qclass -> {:?}", qtype);
  108. let ttl = c.read_u32::<BigEndian>()?;
  109. trace!("Read TTL -> {:?}", ttl);
  110. let record_length = c.read_u16::<BigEndian>()?;
  111. trace!("Read record length -> {:?}", record_length);
  112. let record = Record::from_bytes(qtype, record_length, c)?;
  113. Ok(Self::Standard { qclass, qname, record, ttl })
  114. }
  115. }
  116. }
  117. impl Record {
  118. /// Reads at most `len` bytes from the given curser, and parses them into
  119. /// a record structure depending on the type number, which has already been read.
  120. #[cfg_attr(all(test, feature = "with_mutagen"), ::mutagen::mutate)]
  121. fn from_bytes(qtype: TypeInt, len: u16, c: &mut Cursor<&[u8]>) -> Result<Self, WireError> {
  122. use crate::record::*;
  123. macro_rules! try_record {
  124. ($record:tt) => {
  125. if $record::RR_TYPE == qtype {
  126. info!("Parsing {} record (type {}, len {})", $record::NAME, qtype, len);
  127. return Wire::read(len, c).map(Self::$record)
  128. }
  129. }
  130. }
  131. // Try all the records, one type at a time, returning early if the
  132. // type number matches.
  133. try_record!(A);
  134. try_record!(AAAA);
  135. try_record!(CAA);
  136. try_record!(CNAME);
  137. try_record!(MX);
  138. try_record!(NS);
  139. // OPT is handled separately
  140. try_record!(PTR);
  141. try_record!(SOA);
  142. try_record!(SRV);
  143. try_record!(TXT);
  144. // Otherwise, collect the bytes into a vector and return an unknown
  145. // record type.
  146. let mut bytes = Vec::new();
  147. for _ in 0 .. len {
  148. bytes.push(c.read_u8()?);
  149. }
  150. let type_number = UnknownQtype::from(qtype);
  151. Ok(Self::Other { type_number, bytes })
  152. }
  153. }
  154. impl QClass {
  155. fn from_u16(uu: u16) -> Self {
  156. match uu {
  157. 0x0001 => Self::IN,
  158. 0x0003 => Self::CH,
  159. 0x0004 => Self::HS,
  160. _ => Self::Other(uu),
  161. }
  162. }
  163. fn to_u16(self) -> u16 {
  164. match self {
  165. Self::IN => 0x0001,
  166. Self::CH => 0x0003,
  167. Self::HS => 0x0004,
  168. Self::Other(uu) => uu,
  169. }
  170. }
  171. }
  172. /// Determines the record type number to signify a record with the given name.
  173. pub fn find_qtype_number(record_type: &str) -> Option<TypeInt> {
  174. use crate::record::*;
  175. macro_rules! try_record {
  176. ($record:tt) => {
  177. if $record::NAME == record_type {
  178. return Some($record::RR_TYPE);
  179. }
  180. }
  181. }
  182. try_record!(A);
  183. try_record!(AAAA);
  184. try_record!(CAA);
  185. try_record!(CNAME);
  186. try_record!(MX);
  187. try_record!(NS);
  188. // OPT is elsewhere
  189. try_record!(PTR);
  190. try_record!(SOA);
  191. try_record!(SRV);
  192. try_record!(TXT);
  193. None
  194. }
  195. impl Flags {
  196. /// The set of flags that represents a query packet.
  197. pub fn query() -> Self {
  198. Self::from_u16(0b_0000_0001_0000_0000)
  199. }
  200. /// The set of flags that represents a successful response.
  201. pub fn standard_response() -> Self {
  202. Self::from_u16(0b_1000_0001_1000_0000)
  203. }
  204. /// Converts the flags into a two-byte number.
  205. pub fn to_u16(self) -> u16 { // 0123 4567 89AB CDEF
  206. let mut bits = 0b_0000_0000_0000_0000;
  207. if self.response { bits += 0b_1000_0000_0000_0000; }
  208. match self.opcode {
  209. _ => { bits += 0b_0000_0000_0000_0000; }
  210. }
  211. if self.authoritative { bits += 0b_0000_0100_0000_0000; }
  212. if self.truncated { bits += 0b_0000_0010_0000_0000; }
  213. if self.recursion_desired { bits += 0b_0000_0001_0000_0000; }
  214. if self.recursion_available { bits += 0b_0000_0000_1000_0000; }
  215. // (the Z bit is reserved) 0b_0000_0000_0100_0000
  216. if self.authentic_data { bits += 0b_0000_0000_0010_0000; }
  217. if self.checking_disabled { bits += 0b_0000_0000_0001_0000; }
  218. bits
  219. }
  220. /// Extracts the flags from the given two-byte number.
  221. pub fn from_u16(bits: u16) -> Self {
  222. let has_bit = |bit| { bits & bit == bit };
  223. Self {
  224. response: has_bit(0b_1000_0000_0000_0000),
  225. opcode: 0,
  226. authoritative: has_bit(0b_0000_0100_0000_0000),
  227. truncated: has_bit(0b_0000_0010_0000_0000),
  228. recursion_desired: has_bit(0b_0000_0001_0000_0000),
  229. recursion_available: has_bit(0b_0000_0000_1000_0000),
  230. authentic_data: has_bit(0b_0000_0000_0010_0000),
  231. checking_disabled: has_bit(0b_0000_0000_0001_0000),
  232. error_code: ErrorCode::from_bits(bits & 0b_1111),
  233. }
  234. }
  235. }
  236. impl ErrorCode {
  237. /// Extracts the rcode from the last four bits of the flags field.
  238. fn from_bits(bits: u16) -> Option<Self> {
  239. match bits {
  240. 0 => None,
  241. 1 => Some(Self::FormatError),
  242. 2 => Some(Self::ServerFailure),
  243. 3 => Some(Self::NXDomain),
  244. 4 => Some(Self::NotImplemented),
  245. 5 => Some(Self::QueryRefused),
  246. 16 => Some(Self::BadVersion),
  247. n => Some(Self::Other(n)),
  248. }
  249. }
  250. }
  251. /// Trait for decoding DNS record structures from bytes read over the wire.
  252. pub trait Wire: Sized {
  253. /// This record’s type as a string, such as `"A"` or `"CNAME"`.
  254. const NAME: &'static str;
  255. /// The number signifying that a record is of this type.
  256. /// See <https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-4>
  257. const RR_TYPE: u16;
  258. /// Read at most `len` bytes from the given `Cursor`. This cursor travels
  259. /// throughout the complete data — by this point, we have read the entire
  260. /// response into a buffer.
  261. fn read(len: u16, c: &mut Cursor<&[u8]>) -> Result<Self, WireError>;
  262. }
  263. /// Helper macro to get the qtype number of a record type at compile-time.
  264. ///
  265. /// # Examples
  266. ///
  267. /// ```
  268. /// use dns::{qtype, record::MX};
  269. ///
  270. /// assert_eq!(15, qtype!(MX));
  271. /// ```
  272. #[macro_export]
  273. macro_rules! qtype {
  274. ($type:ty) => {
  275. <$type as $crate::Wire>::RR_TYPE
  276. }
  277. }
  278. /// Something that can go wrong deciphering a record.
  279. #[derive(PartialEq, Debug)]
  280. pub enum WireError {
  281. /// There was an IO error reading from the cursor.
  282. /// Almost all the time, this means that the buffer was too short.
  283. IO,
  284. // (io::Error is not PartialEq so we don’t propagate it)
  285. /// When the DNS standard requires records of this type to have a certain
  286. /// fixed length, but the response specified a different length.
  287. ///
  288. /// This error should be returned regardless of the _content_ of the
  289. /// record, whatever it is.
  290. WrongRecordLength {
  291. /// The expected size.
  292. expected: u16,
  293. /// The size that was actually received.
  294. got: u16,
  295. },
  296. /// When the length of this record as specified in the packet differs from
  297. /// the computed length, as determined by reading labels.
  298. ///
  299. /// There are two ways, in general, to read arbitrary-length data from a
  300. /// stream of bytes: length-prefixed (read the length, then read that many
  301. /// bytes) or sentinel-terminated (keep reading bytes until you read a
  302. /// certain value, usually zero). The DNS protocol uses both: each
  303. /// record’s size is specified up-front in the packet, but inside the
  304. /// record, there exist arbitrary-length strings that must be read until a
  305. /// zero is read, indicating there is no more string.
  306. ///
  307. /// Consider the case of a packet, with a specified length, containing a
  308. /// string of arbitrary length (such as the CNAME or TXT records). A DNS
  309. /// client has to deal with this in one of two ways:
  310. ///
  311. /// 1. Read exactly the specified length of bytes from the record, raising
  312. /// an error if the contents are too short or a string keeps going past
  313. /// the length (assume the length is correct but the contents are wrong).
  314. ///
  315. /// 2. Read as many bytes from the record as the string requests, raising
  316. /// an error if the number of bytes read at the end differs from the
  317. /// expected length of the record (assume the length is wrong but the
  318. /// contents are correct).
  319. ///
  320. /// Note that no matter which way is picked, the record will still be
  321. /// incorrect — it only impacts the parsing of records that occur after it
  322. /// in the packet. Knowing which method should be used requires knowing
  323. /// what caused the DNS packet to be erroneous, which we cannot know.
  324. ///
  325. /// dog picks the second way. If a record ends up reading more or fewer
  326. /// bytes than it is ‘supposed’ to, it will raise this error, but _after_
  327. /// having read a different number of bytes than the specified length.
  328. WrongLabelLength {
  329. /// The expected size.
  330. expected: u16,
  331. /// The size that was actually received.
  332. got: u16,
  333. },
  334. /// When the data contained a string containing a cycle of pointers.
  335. /// Contains the vector of indexes that was being checked.
  336. TooMuchRecursion(Vec<u16>),
  337. /// When the data contained a string with a pointer to an index outside of
  338. /// the packet. Contains the invalid index.
  339. OutOfBounds(u16),
  340. }
  341. impl From<io::Error> for WireError {
  342. fn from(ioe: io::Error) -> Self {
  343. error!("IO error -> {:?}", ioe);
  344. Self::IO
  345. }
  346. }
  347. #[cfg(test)]
  348. mod test {
  349. use super::*;
  350. use crate::record::{Record, A, SOA, OPT, UnknownQtype};
  351. use std::net::Ipv4Addr;
  352. #[test]
  353. fn complete_response() {
  354. // This is an artifical amalgam of DNS, not a real-world response!
  355. let buf = &[
  356. 0xce, 0xac, // transaction ID
  357. 0x81, 0x80, // flags (standard query, response, no error)
  358. 0x00, 0x01, 0x00, 0x01, 0x00, 0x01, 0x00, 0x02, // counts (1, 1, 1, 2)
  359. // query:
  360. 0x05, 0x62, 0x73, 0x61, 0x67, 0x6f, 0x02, 0x6d, 0x65, 0x00, // name
  361. 0x00, 0x01, // type A
  362. 0x00, 0x01, // class IN
  363. // answer:
  364. 0xc0, 0x0c, // name (backreference)
  365. 0x00, 0x01, // type A
  366. 0x00, 0x01, // class IN
  367. 0x00, 0x00, 0x03, 0x77, // TTL
  368. 0x00, 0x04, // data length 4
  369. 0x8a, 0x44, 0x75, 0x5e, // IP address
  370. // authoritative:
  371. 0x00, // name
  372. 0x00, 0x06, // type SOA
  373. 0x00, 0x01, // class IN
  374. 0xFF, 0xFF, 0xFF, 0xFF, // TTL (maximum possible!)
  375. 0x00, 0x1B, // data length
  376. 0x01, 0x61, 0x00, // primary name server ("a")
  377. 0x02, 0x6d, 0x78, 0x00, // mailbox ("mx")
  378. 0x78, 0x68, 0x52, 0x2c, // serial number
  379. 0x00, 0x00, 0x07, 0x08, // refresh interval
  380. 0x00, 0x00, 0x03, 0x84, // retry interval
  381. 0x00, 0x09, 0x3a, 0x80, // expire limit
  382. 0x00, 0x01, 0x51, 0x80, // minimum TTL
  383. // additional 1:
  384. 0x00, // name
  385. 0x00, 0x99, // unknown type
  386. 0x00, 0x99, // unknown class
  387. 0x12, 0x34, 0x56, 0x78, // TTL
  388. 0x00, 0x04, // data length 4
  389. 0x12, 0x34, 0x56, 0x78, // data
  390. // additional 2:
  391. 0x00, // name
  392. 0x00, 0x29, // type OPT
  393. 0x02, 0x00, // UDP payload size
  394. 0x00, // higher bits
  395. 0x00, // EDNS(0) version
  396. 0x00, 0x00, // more flags
  397. 0x00, 0x00, // no data
  398. ];
  399. let response = Response {
  400. transaction_id: 0xceac,
  401. flags: Flags::standard_response(),
  402. queries: vec![
  403. Query {
  404. qname: "bsago.me.".into(),
  405. qclass: QClass::IN,
  406. qtype: qtype!(A),
  407. },
  408. ],
  409. answers: vec![
  410. Answer::Standard {
  411. qname: "bsago.me.".into(),
  412. qclass: QClass::IN,
  413. ttl: 887,
  414. record: Record::A(A {
  415. address: Ipv4Addr::new(138, 68, 117, 94),
  416. }),
  417. }
  418. ],
  419. authorities: vec![
  420. Answer::Standard {
  421. qname: "".into(),
  422. qclass: QClass::IN,
  423. ttl: 4294967295,
  424. record: Record::SOA(SOA {
  425. mname: "a.".into(),
  426. rname: "mx.".into(),
  427. serial: 2020102700,
  428. refresh_interval: 1800,
  429. retry_interval: 900,
  430. expire_limit: 604800,
  431. minimum_ttl: 86400,
  432. }),
  433. }
  434. ],
  435. additionals: vec![
  436. Answer::Standard {
  437. qname: "".into(),
  438. qclass: QClass::Other(153),
  439. ttl: 305419896,
  440. record: Record::Other {
  441. type_number: UnknownQtype::UnheardOf(153),
  442. bytes: vec![ 0x12, 0x34, 0x56, 0x78 ],
  443. },
  444. },
  445. Answer::Pseudo {
  446. qname: "".into(),
  447. opt: OPT {
  448. udp_payload_size: 512,
  449. higher_bits: 0,
  450. edns0_version: 0,
  451. flags: 0,
  452. data: vec![],
  453. },
  454. },
  455. ],
  456. };
  457. assert_eq!(Response::from_bytes(buf), Ok(response));
  458. }
  459. }