1 /* 2 * cachedb/cachedb.c - cache from a database external to the program module 3 * 4 * Copyright (c) 2016, NLnet Labs. All rights reserved. 5 * 6 * This software is open source. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * Redistributions of source code must retain the above copyright notice, 13 * this list of conditions and the following disclaimer. 14 * 15 * Redistributions in binary form must reproduce the above copyright notice, 16 * this list of conditions and the following disclaimer in the documentation 17 * and/or other materials provided with the distribution. 18 * 19 * Neither the name of the NLNET LABS nor the names of its contributors may 20 * be used to endorse or promote products derived from this software without 21 * specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 /** 37 * \file 38 * 39 * This file contains a module that uses an external database to cache 40 * dns responses. 41 */ 42 43 #include "config.h" 44 #ifdef USE_CACHEDB 45 #include "cachedb/cachedb.h" 46 #include "cachedb/redis.h" 47 #include "util/regional.h" 48 #include "util/net_help.h" 49 #include "util/config_file.h" 50 #include "util/data/dname.h" 51 #include "util/data/msgreply.h" 52 #include "util/data/msgencode.h" 53 #include "services/cache/dns.h" 54 #include "services/mesh.h" 55 #include "services/modstack.h" 56 #include "validator/val_neg.h" 57 #include "validator/val_secalgo.h" 58 #include "iterator/iter_utils.h" 59 #include "sldns/parseutil.h" 60 #include "sldns/wire2str.h" 61 #include "sldns/sbuffer.h" 62 63 /* header file for htobe64 */ 64 #ifdef HAVE_ENDIAN_H 65 # include <endian.h> 66 #endif 67 #ifdef HAVE_SYS_ENDIAN_H 68 # include <sys/endian.h> 69 #endif 70 71 #ifndef HAVE_HTOBE64 72 # ifdef HAVE_LIBKERN_OSBYTEORDER_H 73 /* In practice this is specific to MacOS X. We assume it doesn't have 74 * htobe64/be64toh but has alternatives with a different name. */ 75 # include <libkern/OSByteOrder.h> 76 # define htobe64(x) OSSwapHostToBigInt64(x) 77 # define be64toh(x) OSSwapBigToHostInt64(x) 78 # else 79 /* not OSX */ 80 /* Some compilers do not define __BYTE_ORDER__, like IBM XLC on AIX */ 81 # if __BIG_ENDIAN__ 82 # define be64toh(n) (n) 83 # define htobe64(n) (n) 84 # else 85 # define be64toh(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 86 # define htobe64(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 87 # endif /* _ENDIAN */ 88 # endif /* HAVE_LIBKERN_OSBYTEORDER_H */ 89 #endif /* HAVE_BE64TOH */ 90 91 /** the unit test testframe for cachedb, its module state contains 92 * a cache for a couple queries (in memory). */ 93 struct testframe_moddata { 94 /** lock for mutex */ 95 lock_basic_type lock; 96 /** key for single stored data element, NULL if none */ 97 char* stored_key; 98 /** data for single stored data element, NULL if none */ 99 uint8_t* stored_data; 100 /** length of stored data */ 101 size_t stored_datalen; 102 }; 103 104 static int 105 testframe_init(struct module_env* env, struct cachedb_env* cachedb_env) 106 { 107 struct testframe_moddata* d; 108 verbose(VERB_ALGO, "testframe_init"); 109 d = (struct testframe_moddata*)calloc(1, 110 sizeof(struct testframe_moddata)); 111 cachedb_env->backend_data = (void*)d; 112 if(!cachedb_env->backend_data) { 113 log_err("out of memory"); 114 return 0; 115 } 116 /* Register an EDNS option (65534) to bypass the worker cache lookup 117 * for testing */ 118 if(!edns_register_option(LDNS_EDNS_UNBOUND_CACHEDB_TESTFRAME_TEST, 119 1 /* bypass cache */, 120 0 /* no aggregation */, env)) { 121 log_err("testframe_init, could not register test opcode"); 122 free(d); 123 return 0; 124 } 125 lock_basic_init(&d->lock); 126 lock_protect(&d->lock, d, sizeof(*d)); 127 return 1; 128 } 129 130 static void 131 testframe_deinit(struct module_env* env, struct cachedb_env* cachedb_env) 132 { 133 struct testframe_moddata* d = (struct testframe_moddata*) 134 cachedb_env->backend_data; 135 (void)env; 136 verbose(VERB_ALGO, "testframe_deinit"); 137 if(!d) 138 return; 139 lock_basic_destroy(&d->lock); 140 free(d->stored_key); 141 free(d->stored_data); 142 free(d); 143 } 144 145 static int 146 testframe_lookup(struct module_env* env, struct cachedb_env* cachedb_env, 147 char* key, struct sldns_buffer* result_buffer) 148 { 149 struct testframe_moddata* d = (struct testframe_moddata*) 150 cachedb_env->backend_data; 151 (void)env; 152 verbose(VERB_ALGO, "testframe_lookup of %s", key); 153 lock_basic_lock(&d->lock); 154 if(d->stored_key && strcmp(d->stored_key, key) == 0) { 155 if(d->stored_datalen > sldns_buffer_capacity(result_buffer)) { 156 lock_basic_unlock(&d->lock); 157 return 0; /* too large */ 158 } 159 verbose(VERB_ALGO, "testframe_lookup found %d bytes", 160 (int)d->stored_datalen); 161 sldns_buffer_clear(result_buffer); 162 sldns_buffer_write(result_buffer, d->stored_data, 163 d->stored_datalen); 164 sldns_buffer_flip(result_buffer); 165 lock_basic_unlock(&d->lock); 166 return 1; 167 } 168 lock_basic_unlock(&d->lock); 169 return 0; 170 } 171 172 static void 173 testframe_store(struct module_env* env, struct cachedb_env* cachedb_env, 174 char* key, uint8_t* data, size_t data_len, time_t ATTR_UNUSED(ttl)) 175 { 176 struct testframe_moddata* d = (struct testframe_moddata*) 177 cachedb_env->backend_data; 178 (void)env; 179 lock_basic_lock(&d->lock); 180 verbose(VERB_ALGO, "testframe_store %s (%d bytes)", key, (int)data_len); 181 182 /* free old data element (if any) */ 183 free(d->stored_key); 184 d->stored_key = NULL; 185 free(d->stored_data); 186 d->stored_data = NULL; 187 d->stored_datalen = 0; 188 189 d->stored_data = memdup(data, data_len); 190 if(!d->stored_data) { 191 lock_basic_unlock(&d->lock); 192 log_err("out of memory"); 193 return; 194 } 195 d->stored_datalen = data_len; 196 d->stored_key = strdup(key); 197 if(!d->stored_key) { 198 free(d->stored_data); 199 d->stored_data = NULL; 200 d->stored_datalen = 0; 201 lock_basic_unlock(&d->lock); 202 return; 203 } 204 lock_basic_unlock(&d->lock); 205 /* (key,data) successfully stored */ 206 } 207 208 /** The testframe backend is for unit tests */ 209 static struct cachedb_backend testframe_backend = { "testframe", 210 testframe_init, testframe_deinit, testframe_lookup, testframe_store 211 }; 212 213 /** find a particular backend from possible backends */ 214 static struct cachedb_backend* 215 cachedb_find_backend(const char* str) 216 { 217 #ifdef USE_REDIS 218 if(strcmp(str, redis_backend.name) == 0) 219 return &redis_backend; 220 #endif 221 if(strcmp(str, testframe_backend.name) == 0) 222 return &testframe_backend; 223 /* TODO add more backends here */ 224 return NULL; 225 } 226 227 /** apply configuration to cachedb module 'global' state */ 228 static int 229 cachedb_apply_cfg(struct cachedb_env* cachedb_env, struct config_file* cfg) 230 { 231 const char* backend_str = cfg->cachedb_backend; 232 if(!backend_str || *backend_str==0) 233 return 1; 234 cachedb_env->backend = cachedb_find_backend(backend_str); 235 if(!cachedb_env->backend) { 236 log_err("cachedb: cannot find backend name '%s'", backend_str); 237 return 0; 238 } 239 240 /* TODO see if more configuration needs to be applied or not */ 241 return 1; 242 } 243 244 int 245 cachedb_init(struct module_env* env, int id) 246 { 247 struct cachedb_env* cachedb_env = (struct cachedb_env*)calloc(1, 248 sizeof(struct cachedb_env)); 249 if(!cachedb_env) { 250 log_err("malloc failure"); 251 return 0; 252 } 253 env->modinfo[id] = (void*)cachedb_env; 254 if(!cachedb_apply_cfg(cachedb_env, env->cfg)) { 255 log_err("cachedb: could not apply configuration settings."); 256 free(cachedb_env); 257 env->modinfo[id] = NULL; 258 return 0; 259 } 260 /* see if a backend is selected */ 261 if(!cachedb_env->backend || !cachedb_env->backend->name) 262 return 1; 263 if(!(*cachedb_env->backend->init)(env, cachedb_env)) { 264 log_err("cachedb: could not init %s backend", 265 cachedb_env->backend->name); 266 free(cachedb_env); 267 env->modinfo[id] = NULL; 268 return 0; 269 } 270 cachedb_env->enabled = 1; 271 return 1; 272 } 273 274 void 275 cachedb_deinit(struct module_env* env, int id) 276 { 277 struct cachedb_env* cachedb_env; 278 if(!env || !env->modinfo[id]) 279 return; 280 cachedb_env = (struct cachedb_env*)env->modinfo[id]; 281 if(cachedb_env->enabled) { 282 (*cachedb_env->backend->deinit)(env, cachedb_env); 283 } 284 free(cachedb_env); 285 env->modinfo[id] = NULL; 286 } 287 288 /** new query for cachedb */ 289 static int 290 cachedb_new(struct module_qstate* qstate, int id) 291 { 292 struct cachedb_qstate* iq = (struct cachedb_qstate*)regional_alloc( 293 qstate->region, sizeof(struct cachedb_qstate)); 294 qstate->minfo[id] = iq; 295 if(!iq) 296 return 0; 297 memset(iq, 0, sizeof(*iq)); 298 /* initialise it */ 299 /* TODO */ 300 301 return 1; 302 } 303 304 /** 305 * Return an error 306 * @param qstate: our query state 307 * @param id: module id 308 * @param rcode: error code (DNS errcode). 309 * @return: 0 for use by caller, to make notation easy, like: 310 * return error_response(..). 311 */ 312 static int 313 error_response(struct module_qstate* qstate, int id, int rcode) 314 { 315 verbose(VERB_QUERY, "return error response %s", 316 sldns_lookup_by_id(sldns_rcodes, rcode)? 317 sldns_lookup_by_id(sldns_rcodes, rcode)->name:"??"); 318 qstate->return_rcode = rcode; 319 qstate->return_msg = NULL; 320 qstate->ext_state[id] = module_finished; 321 return 0; 322 } 323 324 /** 325 * Hash the query name, type, class and dbacess-secret into lookup buffer. 326 * @param qinfo: query info 327 * @param env: with env->cfg with secret. 328 * @param buf: returned buffer with hash to lookup 329 * @param len: length of the buffer. 330 */ 331 static void 332 calc_hash(struct query_info* qinfo, struct module_env* env, char* buf, 333 size_t len) 334 { 335 uint8_t clear[1024]; 336 size_t clen = 0; 337 uint8_t hash[CACHEDB_HASHSIZE/8]; 338 const char* hex = "0123456789ABCDEF"; 339 const char* secret = env->cfg->cachedb_secret; 340 size_t i; 341 342 /* copy the hash info into the clear buffer */ 343 if(clen + qinfo->qname_len < sizeof(clear)) { 344 memmove(clear+clen, qinfo->qname, qinfo->qname_len); 345 query_dname_tolower(clear+clen); 346 clen += qinfo->qname_len; 347 } 348 if(clen + 4 < sizeof(clear)) { 349 uint16_t t = htons(qinfo->qtype); 350 uint16_t c = htons(qinfo->qclass); 351 memmove(clear+clen, &t, 2); 352 memmove(clear+clen+2, &c, 2); 353 clen += 4; 354 } 355 if(secret && secret[0] && clen + strlen(secret) < sizeof(clear)) { 356 memmove(clear+clen, secret, strlen(secret)); 357 clen += strlen(secret); 358 } 359 360 /* hash the buffer */ 361 secalgo_hash_sha256(clear, clen, hash); 362 #ifdef HAVE_EXPLICIT_BZERO 363 explicit_bzero(clear, clen); 364 #else 365 memset(clear, 0, clen); 366 #endif 367 368 /* hex encode output for portability (some online dbs need 369 * no nulls, no control characters, and so on) */ 370 log_assert(len >= sizeof(hash)*2 + 1); 371 (void)len; 372 for(i=0; i<sizeof(hash); i++) { 373 buf[i*2] = hex[(hash[i]&0xf0)>>4]; 374 buf[i*2+1] = hex[hash[i]&0x0f]; 375 } 376 buf[sizeof(hash)*2] = 0; 377 } 378 379 /** convert data from return_msg into the data buffer */ 380 static int 381 prep_data(struct module_qstate* qstate, struct sldns_buffer* buf) 382 { 383 uint64_t timestamp, expiry; 384 size_t oldlim; 385 struct edns_data edns; 386 memset(&edns, 0, sizeof(edns)); 387 edns.edns_present = 1; 388 edns.bits = EDNS_DO; 389 edns.ext_rcode = 0; 390 edns.edns_version = EDNS_ADVERTISED_VERSION; 391 edns.udp_size = EDNS_ADVERTISED_SIZE; 392 393 if(!qstate->return_msg || !qstate->return_msg->rep) 394 return 0; 395 /* do not store failures like SERVFAIL in the cachedb, this avoids 396 * overwriting expired, valid, content with broken content. */ 397 if(FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 398 LDNS_RCODE_NOERROR && 399 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 400 LDNS_RCODE_NXDOMAIN && 401 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 402 LDNS_RCODE_YXDOMAIN) 403 return 0; 404 /* We don't store the reply if its TTL is 0 unless serve-expired is 405 * enabled. Such a reply won't be reusable and simply be a waste for 406 * the backend. It's also compatible with the default behavior of 407 * dns_cache_store_msg(). */ 408 if(qstate->return_msg->rep->ttl == 0 && 409 !qstate->env->cfg->serve_expired) 410 return 0; 411 412 /* The EDE is added to the out-list so it is encoded in the cached message */ 413 if (qstate->env->cfg->ede && qstate->return_msg->rep->reason_bogus != LDNS_EDE_NONE) { 414 edns_opt_list_append_ede(&edns.opt_list_out, qstate->env->scratch, 415 qstate->return_msg->rep->reason_bogus, 416 qstate->return_msg->rep->reason_bogus_str); 417 } 418 419 if(verbosity >= VERB_ALGO) 420 log_dns_msg("cachedb encoding", &qstate->return_msg->qinfo, 421 qstate->return_msg->rep); 422 if(!reply_info_answer_encode(&qstate->return_msg->qinfo, 423 qstate->return_msg->rep, 0, qstate->query_flags, 424 buf, 0, 1, qstate->env->scratch, 65535, &edns, 1, 0)) 425 return 0; 426 427 /* TTLs in the return_msg are relative to time(0) so we have to 428 * store that, we also store the smallest ttl in the packet+time(0) 429 * as the packet expiry time */ 430 /* qstate->return_msg->rep->ttl contains that relative shortest ttl */ 431 timestamp = (uint64_t)*qstate->env->now; 432 expiry = timestamp + (uint64_t)qstate->return_msg->rep->ttl; 433 timestamp = htobe64(timestamp); 434 expiry = htobe64(expiry); 435 oldlim = sldns_buffer_limit(buf); 436 if(oldlim + sizeof(timestamp)+sizeof(expiry) >= 437 sldns_buffer_capacity(buf)) 438 return 0; /* doesn't fit. */ 439 sldns_buffer_set_limit(buf, oldlim + sizeof(timestamp)+sizeof(expiry)); 440 sldns_buffer_write_at(buf, oldlim, ×tamp, sizeof(timestamp)); 441 sldns_buffer_write_at(buf, oldlim+sizeof(timestamp), &expiry, 442 sizeof(expiry)); 443 444 return 1; 445 } 446 447 /** check expiry, return true if matches OK */ 448 static int 449 good_expiry_and_qinfo(struct module_qstate* qstate, struct sldns_buffer* buf) 450 { 451 uint64_t expiry; 452 /* the expiry time is the last bytes of the buffer */ 453 if(sldns_buffer_limit(buf) < sizeof(expiry)) 454 return 0; 455 sldns_buffer_read_at(buf, sldns_buffer_limit(buf)-sizeof(expiry), 456 &expiry, sizeof(expiry)); 457 expiry = be64toh(expiry); 458 459 /* Check if we are allowed to return expired entries: 460 * - serve_expired needs to be set 461 * - if SERVE_EXPIRED_TTL is set make sure that the record is not older 462 * than that. */ 463 if((time_t)expiry < *qstate->env->now && 464 (!qstate->env->cfg->serve_expired || 465 (SERVE_EXPIRED_TTL && 466 *qstate->env->now - (time_t)expiry > SERVE_EXPIRED_TTL))) 467 return 0; 468 469 return 1; 470 } 471 472 /* Adjust the TTL of the given RRset by 'subtract'. If 'subtract' is 473 * negative, set the TTL to 0. */ 474 static void 475 packed_rrset_ttl_subtract(struct packed_rrset_data* data, time_t subtract) 476 { 477 size_t i; 478 size_t total = data->count + data->rrsig_count; 479 if(subtract >= 0 && data->ttl > subtract) 480 data->ttl -= subtract; 481 else data->ttl = 0; 482 for(i=0; i<total; i++) { 483 if(subtract >= 0 && data->rr_ttl[i] > subtract) 484 data->rr_ttl[i] -= subtract; 485 else data->rr_ttl[i] = 0; 486 } 487 data->ttl_add = (subtract < data->ttl_add) ? (data->ttl_add - subtract) : 0; 488 } 489 490 /* Adjust the TTL of a DNS message and its RRs by 'adjust'. If 'adjust' is 491 * negative, set the TTLs to 0. */ 492 static void 493 adjust_msg_ttl(struct dns_msg* msg, time_t adjust) 494 { 495 size_t i; 496 if(adjust >= 0 && msg->rep->ttl > adjust) 497 msg->rep->ttl -= adjust; 498 else 499 msg->rep->ttl = 0; 500 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 501 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 502 503 for(i=0; i<msg->rep->rrset_count; i++) { 504 packed_rrset_ttl_subtract((struct packed_rrset_data*)msg-> 505 rep->rrsets[i]->entry.data, adjust); 506 } 507 } 508 509 /* Set the TTL of the given RRset to fixed value. */ 510 static void 511 packed_rrset_ttl_set(struct packed_rrset_data* data, time_t ttl) 512 { 513 size_t i; 514 size_t total = data->count + data->rrsig_count; 515 data->ttl = ttl; 516 for(i=0; i<total; i++) { 517 data->rr_ttl[i] = ttl; 518 } 519 data->ttl_add = 0; 520 } 521 522 /* Set the TTL of a DNS message and its RRs by to a fixed value. */ 523 static void 524 set_msg_ttl(struct dns_msg* msg, time_t ttl) 525 { 526 size_t i; 527 msg->rep->ttl = ttl; 528 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 529 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 530 531 for(i=0; i<msg->rep->rrset_count; i++) { 532 packed_rrset_ttl_set((struct packed_rrset_data*)msg-> 533 rep->rrsets[i]->entry.data, ttl); 534 } 535 } 536 537 /** convert dns message in buffer to return_msg */ 538 static int 539 parse_data(struct module_qstate* qstate, struct sldns_buffer* buf, 540 int* msg_expired) 541 { 542 struct msg_parse* prs; 543 struct edns_data edns; 544 struct edns_option* ede; 545 uint64_t timestamp, expiry; 546 time_t adjust; 547 size_t lim = sldns_buffer_limit(buf); 548 if(lim < LDNS_HEADER_SIZE+sizeof(timestamp)+sizeof(expiry)) 549 return 0; /* too short */ 550 551 /* remove timestamp and expiry from end */ 552 sldns_buffer_read_at(buf, lim-sizeof(expiry), &expiry, sizeof(expiry)); 553 sldns_buffer_read_at(buf, lim-sizeof(expiry)-sizeof(timestamp), 554 ×tamp, sizeof(timestamp)); 555 expiry = be64toh(expiry); 556 timestamp = be64toh(timestamp); 557 558 /* parse DNS packet */ 559 regional_free_all(qstate->env->scratch); 560 prs = (struct msg_parse*)regional_alloc(qstate->env->scratch, 561 sizeof(struct msg_parse)); 562 if(!prs) 563 return 0; /* out of memory */ 564 memset(prs, 0, sizeof(*prs)); 565 memset(&edns, 0, sizeof(edns)); 566 sldns_buffer_set_limit(buf, lim - sizeof(expiry)-sizeof(timestamp)); 567 if(parse_packet(buf, prs, qstate->env->scratch) != LDNS_RCODE_NOERROR) { 568 sldns_buffer_set_limit(buf, lim); 569 return 0; 570 } 571 if(parse_extract_edns_from_response_msg(prs, &edns, qstate->env->scratch) != 572 LDNS_RCODE_NOERROR) { 573 sldns_buffer_set_limit(buf, lim); 574 return 0; 575 } 576 577 qstate->return_msg = dns_alloc_msg(buf, prs, qstate->region); 578 sldns_buffer_set_limit(buf, lim); 579 if(!qstate->return_msg) 580 return 0; 581 582 /* We find the EDE in the in-list after parsing */ 583 if(qstate->env->cfg->ede && 584 (ede = edns_opt_list_find(edns.opt_list_in, LDNS_EDNS_EDE))) { 585 if(ede->opt_len >= 2) { 586 qstate->return_msg->rep->reason_bogus = 587 sldns_read_uint16(ede->opt_data); 588 } 589 /* allocate space and store the error string and it's size */ 590 if(ede->opt_len > 2) { 591 size_t ede_len = ede->opt_len - 2; 592 qstate->return_msg->rep->reason_bogus_str = regional_alloc( 593 qstate->region, sizeof(char) * (ede_len+1)); 594 memcpy(qstate->return_msg->rep->reason_bogus_str, 595 ede->opt_data+2, ede_len); 596 qstate->return_msg->rep->reason_bogus_str[ede_len] = 0; 597 } 598 } 599 600 qstate->return_rcode = LDNS_RCODE_NOERROR; 601 602 /* see how much of the TTL expired, and remove it */ 603 if(*qstate->env->now <= (time_t)timestamp) { 604 verbose(VERB_ALGO, "cachedb msg adjust by zero"); 605 return 1; /* message from the future (clock skew?) */ 606 } 607 adjust = *qstate->env->now - (time_t)timestamp; 608 if(qstate->return_msg->rep->ttl < adjust) { 609 verbose(VERB_ALGO, "cachedb msg expired"); 610 *msg_expired = 1; 611 /* If serve-expired is enabled, we still use an expired message 612 * setting the TTL to 0. */ 613 if(!qstate->env->cfg->serve_expired || 614 (FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 615 != LDNS_RCODE_NOERROR && 616 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 617 != LDNS_RCODE_NXDOMAIN && 618 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 619 != LDNS_RCODE_YXDOMAIN)) 620 return 0; /* message expired */ 621 else 622 adjust = -1; 623 } 624 verbose(VERB_ALGO, "cachedb msg adjusted down by %d", (int)adjust); 625 adjust_msg_ttl(qstate->return_msg, adjust); 626 if(qstate->env->cfg->aggressive_nsec) { 627 limit_nsec_ttl(qstate->return_msg); 628 } 629 630 /* Similar to the unbound worker, if serve-expired is enabled and 631 * the msg would be considered to be expired, mark the state so a 632 * refetch will be scheduled. The comparison between 'expiry' and 633 * 'now' should be redundant given how these values were calculated, 634 * but we check it just in case as does good_expiry_and_qinfo(). */ 635 if(qstate->env->cfg->serve_expired && 636 !qstate->env->cfg->serve_expired_client_timeout && 637 (adjust == -1 || (time_t)expiry < *qstate->env->now)) { 638 qstate->need_refetch = 1; 639 } 640 641 return 1; 642 } 643 644 /** 645 * Lookup the qstate.qinfo in extcache, store in qstate.return_msg. 646 * return true if lookup was successful. 647 */ 648 static int 649 cachedb_extcache_lookup(struct module_qstate* qstate, struct cachedb_env* ie, 650 int* msg_expired) 651 { 652 char key[(CACHEDB_HASHSIZE/8)*2+1]; 653 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 654 655 /* call backend to fetch data for key into scratch buffer */ 656 if( !(*ie->backend->lookup)(qstate->env, ie, key, 657 qstate->env->scratch_buffer)) { 658 return 0; 659 } 660 661 /* check expiry date and check if query-data matches */ 662 if( !good_expiry_and_qinfo(qstate, qstate->env->scratch_buffer) ) { 663 return 0; 664 } 665 666 /* parse dns message into return_msg */ 667 if( !parse_data(qstate, qstate->env->scratch_buffer, msg_expired) ) { 668 return 0; 669 } 670 return 1; 671 } 672 673 /** 674 * Store the qstate.return_msg in extcache for key qstate.info 675 */ 676 static void 677 cachedb_extcache_store(struct module_qstate* qstate, struct cachedb_env* ie) 678 { 679 char key[(CACHEDB_HASHSIZE/8)*2+1]; 680 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 681 682 /* prepare data in scratch buffer */ 683 if(!prep_data(qstate, qstate->env->scratch_buffer)) 684 return; 685 686 /* call backend */ 687 (*ie->backend->store)(qstate->env, ie, key, 688 sldns_buffer_begin(qstate->env->scratch_buffer), 689 sldns_buffer_limit(qstate->env->scratch_buffer), 690 qstate->return_msg->rep->ttl); 691 } 692 693 /** 694 * See if unbound's internal cache can answer the query 695 */ 696 static int 697 cachedb_intcache_lookup(struct module_qstate* qstate, struct cachedb_env* cde) 698 { 699 uint8_t dpname_storage[LDNS_MAX_DOMAINLEN+1]; 700 uint8_t* dpname=NULL; 701 size_t dpnamelen=0; 702 struct dns_msg* msg; 703 /* for testframe bypass this lookup */ 704 if(cde->backend == &testframe_backend) { 705 return 0; 706 } 707 if(iter_stub_fwd_no_cache(qstate, &qstate->qinfo, 708 &dpname, &dpnamelen, dpname_storage, sizeof(dpname_storage))) 709 return 0; /* no cache for these queries */ 710 msg = dns_cache_lookup(qstate->env, qstate->qinfo.qname, 711 qstate->qinfo.qname_len, qstate->qinfo.qtype, 712 qstate->qinfo.qclass, qstate->query_flags, 713 qstate->region, qstate->env->scratch, 714 1, /* no partial messages with only a CNAME */ 715 dpname, dpnamelen 716 ); 717 if(!msg && qstate->env->neg_cache && 718 iter_qname_indicates_dnssec(qstate->env, &qstate->qinfo)) { 719 /* lookup in negative cache; may result in 720 * NOERROR/NODATA or NXDOMAIN answers that need validation */ 721 msg = val_neg_getmsg(qstate->env->neg_cache, &qstate->qinfo, 722 qstate->region, qstate->env->rrset_cache, 723 qstate->env->scratch_buffer, 724 *qstate->env->now, 1/*add SOA*/, NULL, 725 qstate->env->cfg); 726 } 727 if(!msg) 728 return 0; 729 /* this is the returned msg */ 730 qstate->return_rcode = LDNS_RCODE_NOERROR; 731 qstate->return_msg = msg; 732 return 1; 733 } 734 735 /** 736 * Store query into the internal cache of unbound. 737 */ 738 static void 739 cachedb_intcache_store(struct module_qstate* qstate, int msg_expired) 740 { 741 uint32_t store_flags = qstate->query_flags; 742 int serve_expired = qstate->env->cfg->serve_expired; 743 744 if(qstate->env->cfg->serve_expired) 745 store_flags |= DNSCACHE_STORE_ZEROTTL; 746 if(!qstate->return_msg) 747 return; 748 if(serve_expired && msg_expired) { 749 /* Set TTLs to a value such that value + *env->now is 750 * going to be now-3 seconds. Making it expired 751 * in the cache. */ 752 set_msg_ttl(qstate->return_msg, (time_t)-3); 753 /* The expired entry does not get checked by the validator 754 * and we need a validation value for it. */ 755 if(qstate->env->cfg->cachedb_check_when_serve_expired) 756 qstate->return_msg->rep->security = sec_status_insecure; 757 } 758 (void)dns_cache_store(qstate->env, &qstate->qinfo, 759 qstate->return_msg->rep, 0, qstate->prefetch_leeway, 0, 760 qstate->region, store_flags, qstate->qstarttime, 761 qstate->is_valrec); 762 if(serve_expired && msg_expired) { 763 if(qstate->env->cfg->serve_expired_client_timeout) { 764 /* No expired response from the query state, the 765 * query resolution needs to continue and it can 766 * pick up the expired result after the timer out 767 * of cache. */ 768 return; 769 } 770 /* set TTLs to zero again */ 771 adjust_msg_ttl(qstate->return_msg, -1); 772 /* Send serve expired responses based on the cachedb 773 * returned message, that was just stored in the cache. 774 * It can then continue to work on this query. */ 775 mesh_respond_serve_expired(qstate->mesh_info); 776 } 777 } 778 779 /** 780 * Handle a cachedb module event with a query 781 * @param qstate: query state (from the mesh), passed between modules. 782 * contains qstate->env module environment with global caches and so on. 783 * @param iq: query state specific for this module. per-query. 784 * @param ie: environment specific for this module. global. 785 * @param id: module id. 786 */ 787 static void 788 cachedb_handle_query(struct module_qstate* qstate, 789 struct cachedb_qstate* ATTR_UNUSED(iq), 790 struct cachedb_env* ie, int id) 791 { 792 int msg_expired = 0; 793 qstate->is_cachedb_answer = 0; 794 /* check if we are enabled, and skip if so */ 795 if(!ie->enabled) { 796 /* pass request to next module */ 797 qstate->ext_state[id] = module_wait_module; 798 return; 799 } 800 801 if(qstate->blacklist || qstate->no_cache_lookup) { 802 /* cache is blacklisted or we are instructed from edns to not look */ 803 /* pass request to next module */ 804 qstate->ext_state[id] = module_wait_module; 805 return; 806 } 807 808 /* lookup inside unbound's internal cache. 809 * This does not look for expired entries. */ 810 if(cachedb_intcache_lookup(qstate, ie)) { 811 if(verbosity >= VERB_ALGO) { 812 if(qstate->return_msg->rep) 813 log_dns_msg("cachedb internal cache lookup", 814 &qstate->return_msg->qinfo, 815 qstate->return_msg->rep); 816 else log_info("cachedb internal cache lookup: rcode %s", 817 sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode) 818 ?sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode)->name 819 :"??"); 820 } 821 /* we are done with the query */ 822 qstate->ext_state[id] = module_finished; 823 return; 824 } 825 826 /* ask backend cache to see if we have data */ 827 if(cachedb_extcache_lookup(qstate, ie, &msg_expired)) { 828 if(verbosity >= VERB_ALGO) 829 log_dns_msg(ie->backend->name, 830 &qstate->return_msg->qinfo, 831 qstate->return_msg->rep); 832 /* store this result in internal cache */ 833 cachedb_intcache_store(qstate, msg_expired); 834 /* In case we have expired data but there is a client timer for expired 835 * answers, pass execution to next module in order to try updating the 836 * data first. 837 */ 838 if(qstate->env->cfg->serve_expired && msg_expired) { 839 qstate->return_msg = NULL; 840 qstate->ext_state[id] = module_wait_module; 841 /* The expired reply is sent with 842 * mesh_respond_serve_expired, and so 843 * the need_refetch is not used. */ 844 qstate->need_refetch = 0; 845 return; 846 } 847 if(qstate->need_refetch && qstate->serve_expired_data && 848 qstate->serve_expired_data->timer) { 849 qstate->return_msg = NULL; 850 qstate->ext_state[id] = module_wait_module; 851 return; 852 } 853 qstate->is_cachedb_answer = 1; 854 /* we are done with the query */ 855 qstate->ext_state[id] = module_finished; 856 return; 857 } 858 859 if(qstate->serve_expired_data && 860 qstate->env->cfg->cachedb_check_when_serve_expired && 861 !qstate->env->cfg->serve_expired_client_timeout) { 862 /* Reply with expired data if any to client, because cachedb 863 * also has no useful, current data */ 864 mesh_respond_serve_expired(qstate->mesh_info); 865 } 866 867 /* no cache fetches */ 868 /* pass request to next module */ 869 qstate->ext_state[id] = module_wait_module; 870 } 871 872 /** 873 * Handle a cachedb module event with a response from the iterator. 874 * @param qstate: query state (from the mesh), passed between modules. 875 * contains qstate->env module environment with global caches and so on. 876 * @param iq: query state specific for this module. per-query. 877 * @param ie: environment specific for this module. global. 878 * @param id: module id. 879 */ 880 static void 881 cachedb_handle_response(struct module_qstate* qstate, 882 struct cachedb_qstate* ATTR_UNUSED(iq), struct cachedb_env* ie, int id) 883 { 884 qstate->is_cachedb_answer = 0; 885 /* check if we are not enabled or instructed to not cache, and skip */ 886 if(!ie->enabled || qstate->no_cache_store) { 887 /* we are done with the query */ 888 qstate->ext_state[id] = module_finished; 889 return; 890 } 891 if(qstate->env->cfg->cachedb_no_store) { 892 /* do not store the item in the external cache */ 893 qstate->ext_state[id] = module_finished; 894 return; 895 } 896 897 /* store the item into the backend cache */ 898 cachedb_extcache_store(qstate, ie); 899 900 /* we are done with the query */ 901 qstate->ext_state[id] = module_finished; 902 } 903 904 void 905 cachedb_operate(struct module_qstate* qstate, enum module_ev event, int id, 906 struct outbound_entry* outbound) 907 { 908 struct cachedb_env* ie = (struct cachedb_env*)qstate->env->modinfo[id]; 909 struct cachedb_qstate* iq = (struct cachedb_qstate*)qstate->minfo[id]; 910 verbose(VERB_QUERY, "cachedb[module %d] operate: extstate:%s event:%s", 911 id, strextstate(qstate->ext_state[id]), strmodulevent(event)); 912 if(iq) log_query_info(VERB_QUERY, "cachedb operate: query", 913 &qstate->qinfo); 914 915 /* perform cachedb state machine */ 916 if((event == module_event_new || event == module_event_pass) && 917 iq == NULL) { 918 if(!cachedb_new(qstate, id)) { 919 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 920 return; 921 } 922 iq = (struct cachedb_qstate*)qstate->minfo[id]; 923 } 924 if(iq && (event == module_event_pass || event == module_event_new)) { 925 cachedb_handle_query(qstate, iq, ie, id); 926 return; 927 } 928 if(iq && (event == module_event_moddone)) { 929 cachedb_handle_response(qstate, iq, ie, id); 930 return; 931 } 932 if(iq && outbound) { 933 /* cachedb does not need to process responses at this time 934 * ignore it. 935 cachedb_process_response(qstate, iq, ie, id, outbound, event); 936 */ 937 return; 938 } 939 if(event == module_event_error) { 940 verbose(VERB_ALGO, "got called with event error, giving up"); 941 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 942 return; 943 } 944 if(!iq && (event == module_event_moddone)) { 945 /* during priming, module done but we never started */ 946 qstate->ext_state[id] = module_finished; 947 return; 948 } 949 950 log_err("bad event for cachedb"); 951 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 952 } 953 954 void 955 cachedb_inform_super(struct module_qstate* ATTR_UNUSED(qstate), 956 int ATTR_UNUSED(id), struct module_qstate* ATTR_UNUSED(super)) 957 { 958 /* cachedb does not use subordinate requests at this time */ 959 verbose(VERB_ALGO, "cachedb inform_super was called"); 960 } 961 962 void 963 cachedb_clear(struct module_qstate* qstate, int id) 964 { 965 struct cachedb_qstate* iq; 966 if(!qstate) 967 return; 968 iq = (struct cachedb_qstate*)qstate->minfo[id]; 969 if(iq) { 970 /* free contents of iq */ 971 /* TODO */ 972 } 973 qstate->minfo[id] = NULL; 974 } 975 976 size_t 977 cachedb_get_mem(struct module_env* env, int id) 978 { 979 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 980 if(!ie) 981 return 0; 982 return sizeof(*ie); /* TODO - more mem */ 983 } 984 985 /** 986 * The cachedb function block 987 */ 988 static struct module_func_block cachedb_block = { 989 "cachedb", 990 NULL, NULL, &cachedb_init, &cachedb_deinit, &cachedb_operate, 991 &cachedb_inform_super, &cachedb_clear, &cachedb_get_mem 992 }; 993 994 struct module_func_block* 995 cachedb_get_funcblock(void) 996 { 997 return &cachedb_block; 998 } 999 1000 int 1001 cachedb_is_enabled(struct module_stack* mods, struct module_env* env) 1002 { 1003 struct cachedb_env* ie; 1004 int id = modstack_find(mods, "cachedb"); 1005 if(id == -1) 1006 return 0; 1007 ie = (struct cachedb_env*)env->modinfo[id]; 1008 if(ie && ie->enabled) 1009 return 1; 1010 return 0; 1011 } 1012 1013 void cachedb_msg_remove(struct module_qstate* qstate) 1014 { 1015 cachedb_msg_remove_qinfo(qstate->env, &qstate->qinfo); 1016 } 1017 1018 void cachedb_msg_remove_qinfo(struct module_env* env, struct query_info* qinfo) 1019 { 1020 char key[(CACHEDB_HASHSIZE/8)*2+1]; 1021 int id = modstack_find(env->modstack, "cachedb"); 1022 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 1023 1024 log_query_info(VERB_ALGO, "cachedb msg remove", qinfo); 1025 calc_hash(qinfo, env, key, sizeof(key)); 1026 sldns_buffer_clear(env->scratch_buffer); 1027 sldns_buffer_write_u32(env->scratch_buffer, 0); 1028 sldns_buffer_flip(env->scratch_buffer); 1029 1030 /* call backend */ 1031 (*ie->backend->store)(env, ie, key, 1032 sldns_buffer_begin(env->scratch_buffer), 1033 sldns_buffer_limit(env->scratch_buffer), 1034 0); 1035 } 1036 #endif /* USE_CACHEDB */ 1037