xref: /freebsd/contrib/unbound/cachedb/cachedb.c (revision be771a7b7f4580a30d99e41a5bb1b93a385a119d)
1 /*
2  * cachedb/cachedb.c - cache from a database external to the program module
3  *
4  * Copyright (c) 2016, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 /**
37  * \file
38  *
39  * This file contains a module that uses an external database to cache
40  * dns responses.
41  */
42 
43 #include "config.h"
44 #ifdef USE_CACHEDB
45 #include "cachedb/cachedb.h"
46 #include "cachedb/redis.h"
47 #include "util/regional.h"
48 #include "util/net_help.h"
49 #include "util/config_file.h"
50 #include "util/data/dname.h"
51 #include "util/data/msgreply.h"
52 #include "util/data/msgencode.h"
53 #include "services/cache/dns.h"
54 #include "services/mesh.h"
55 #include "services/modstack.h"
56 #include "validator/val_neg.h"
57 #include "validator/val_secalgo.h"
58 #include "iterator/iter_utils.h"
59 #include "sldns/parseutil.h"
60 #include "sldns/wire2str.h"
61 #include "sldns/sbuffer.h"
62 
63 /* header file for htobe64 */
64 #ifdef HAVE_ENDIAN_H
65 #  include <endian.h>
66 #endif
67 #ifdef HAVE_SYS_ENDIAN_H
68 #  include <sys/endian.h>
69 #endif
70 
71 #ifndef HAVE_HTOBE64
72 #  ifdef HAVE_LIBKERN_OSBYTEORDER_H
73      /* In practice this is specific to MacOS X.  We assume it doesn't have
74       * htobe64/be64toh but has alternatives with a different name. */
75 #    include <libkern/OSByteOrder.h>
76 #    define htobe64(x) OSSwapHostToBigInt64(x)
77 #    define be64toh(x) OSSwapBigToHostInt64(x)
78 #  else
79      /* not OSX */
80      /* Some compilers do not define __BYTE_ORDER__, like IBM XLC on AIX */
81 #    if __BIG_ENDIAN__
82 #      define be64toh(n) (n)
83 #      define htobe64(n) (n)
84 #    else
85 #      define be64toh(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32))
86 #      define htobe64(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32))
87 #    endif /* _ENDIAN */
88 #  endif /* HAVE_LIBKERN_OSBYTEORDER_H */
89 #endif /* HAVE_BE64TOH */
90 
91 /** the unit test testframe for cachedb, its module state contains
92  * a cache for a couple queries (in memory). */
93 struct testframe_moddata {
94 	/** lock for mutex */
95 	lock_basic_type lock;
96 	/** key for single stored data element, NULL if none */
97 	char* stored_key;
98 	/** data for single stored data element, NULL if none */
99 	uint8_t* stored_data;
100 	/** length of stored data */
101 	size_t stored_datalen;
102 };
103 
104 static int
105 testframe_init(struct module_env* env, struct cachedb_env* cachedb_env)
106 {
107 	struct testframe_moddata* d;
108 	verbose(VERB_ALGO, "testframe_init");
109 	d = (struct testframe_moddata*)calloc(1,
110 		sizeof(struct testframe_moddata));
111 	cachedb_env->backend_data = (void*)d;
112 	if(!cachedb_env->backend_data) {
113 		log_err("out of memory");
114 		return 0;
115 	}
116 	/* Register an EDNS option (65534) to bypass the worker cache lookup
117 	 * for testing */
118 	if(!edns_register_option(LDNS_EDNS_UNBOUND_CACHEDB_TESTFRAME_TEST,
119 		1 /* bypass cache */,
120 		0 /* no aggregation */, env)) {
121 		log_err("testframe_init, could not register test opcode");
122 		free(d);
123 		return 0;
124 	}
125 	lock_basic_init(&d->lock);
126 	lock_protect(&d->lock, d, sizeof(*d));
127 	return 1;
128 }
129 
130 static void
131 testframe_deinit(struct module_env* env, struct cachedb_env* cachedb_env)
132 {
133 	struct testframe_moddata* d = (struct testframe_moddata*)
134 		cachedb_env->backend_data;
135 	(void)env;
136 	verbose(VERB_ALGO, "testframe_deinit");
137 	if(!d)
138 		return;
139 	lock_basic_destroy(&d->lock);
140 	free(d->stored_key);
141 	free(d->stored_data);
142 	free(d);
143 }
144 
145 static int
146 testframe_lookup(struct module_env* env, struct cachedb_env* cachedb_env,
147 	char* key, struct sldns_buffer* result_buffer)
148 {
149 	struct testframe_moddata* d = (struct testframe_moddata*)
150 		cachedb_env->backend_data;
151 	(void)env;
152 	verbose(VERB_ALGO, "testframe_lookup of %s", key);
153 	lock_basic_lock(&d->lock);
154 	if(d->stored_key && strcmp(d->stored_key, key) == 0) {
155 		if(d->stored_datalen > sldns_buffer_capacity(result_buffer)) {
156 			lock_basic_unlock(&d->lock);
157 			return 0; /* too large */
158 		}
159 		verbose(VERB_ALGO, "testframe_lookup found %d bytes",
160 			(int)d->stored_datalen);
161 		sldns_buffer_clear(result_buffer);
162 		sldns_buffer_write(result_buffer, d->stored_data,
163 			d->stored_datalen);
164 		sldns_buffer_flip(result_buffer);
165 		lock_basic_unlock(&d->lock);
166 		return 1;
167 	}
168 	lock_basic_unlock(&d->lock);
169 	return 0;
170 }
171 
172 static void
173 testframe_store(struct module_env* env, struct cachedb_env* cachedb_env,
174 	char* key, uint8_t* data, size_t data_len, time_t ATTR_UNUSED(ttl))
175 {
176 	struct testframe_moddata* d = (struct testframe_moddata*)
177 		cachedb_env->backend_data;
178 	(void)env;
179 	lock_basic_lock(&d->lock);
180 	verbose(VERB_ALGO, "testframe_store %s (%d bytes)", key, (int)data_len);
181 
182 	/* free old data element (if any) */
183 	free(d->stored_key);
184 	d->stored_key = NULL;
185 	free(d->stored_data);
186 	d->stored_data = NULL;
187 	d->stored_datalen = 0;
188 
189 	d->stored_data = memdup(data, data_len);
190 	if(!d->stored_data) {
191 		lock_basic_unlock(&d->lock);
192 		log_err("out of memory");
193 		return;
194 	}
195 	d->stored_datalen = data_len;
196 	d->stored_key = strdup(key);
197 	if(!d->stored_key) {
198 		free(d->stored_data);
199 		d->stored_data = NULL;
200 		d->stored_datalen = 0;
201 		lock_basic_unlock(&d->lock);
202 		return;
203 	}
204 	lock_basic_unlock(&d->lock);
205 	/* (key,data) successfully stored */
206 }
207 
208 /** The testframe backend is for unit tests */
209 static struct cachedb_backend testframe_backend = { "testframe",
210 	testframe_init, testframe_deinit, testframe_lookup, testframe_store
211 };
212 
213 /** find a particular backend from possible backends */
214 static struct cachedb_backend*
215 cachedb_find_backend(const char* str)
216 {
217 #ifdef USE_REDIS
218 	if(strcmp(str, redis_backend.name) == 0)
219 		return &redis_backend;
220 #endif
221 	if(strcmp(str, testframe_backend.name) == 0)
222 		return &testframe_backend;
223 	/* TODO add more backends here */
224 	return NULL;
225 }
226 
227 /** apply configuration to cachedb module 'global' state */
228 static int
229 cachedb_apply_cfg(struct cachedb_env* cachedb_env, struct config_file* cfg)
230 {
231 	const char* backend_str = cfg->cachedb_backend;
232 	if(!backend_str || *backend_str==0)
233 		return 1;
234 	cachedb_env->backend = cachedb_find_backend(backend_str);
235 	if(!cachedb_env->backend) {
236 		log_err("cachedb: cannot find backend name '%s'", backend_str);
237 		return 0;
238 	}
239 
240 	/* TODO see if more configuration needs to be applied or not */
241 	return 1;
242 }
243 
244 int
245 cachedb_init(struct module_env* env, int id)
246 {
247 	struct cachedb_env* cachedb_env = (struct cachedb_env*)calloc(1,
248 		sizeof(struct cachedb_env));
249 	if(!cachedb_env) {
250 		log_err("malloc failure");
251 		return 0;
252 	}
253 	env->modinfo[id] = (void*)cachedb_env;
254 	if(!cachedb_apply_cfg(cachedb_env, env->cfg)) {
255 		log_err("cachedb: could not apply configuration settings.");
256 		free(cachedb_env);
257 		env->modinfo[id] = NULL;
258 		return 0;
259 	}
260 	/* see if a backend is selected */
261 	if(!cachedb_env->backend || !cachedb_env->backend->name)
262 		return 1;
263 	if(!(*cachedb_env->backend->init)(env, cachedb_env)) {
264 		log_err("cachedb: could not init %s backend",
265 			cachedb_env->backend->name);
266 		free(cachedb_env);
267 		env->modinfo[id] = NULL;
268 		return 0;
269 	}
270 	cachedb_env->enabled = 1;
271 	return 1;
272 }
273 
274 void
275 cachedb_deinit(struct module_env* env, int id)
276 {
277 	struct cachedb_env* cachedb_env;
278 	if(!env || !env->modinfo[id])
279 		return;
280 	cachedb_env = (struct cachedb_env*)env->modinfo[id];
281 	if(cachedb_env->enabled) {
282 		(*cachedb_env->backend->deinit)(env, cachedb_env);
283 	}
284 	free(cachedb_env);
285 	env->modinfo[id] = NULL;
286 }
287 
288 /** new query for cachedb */
289 static int
290 cachedb_new(struct module_qstate* qstate, int id)
291 {
292 	struct cachedb_qstate* iq = (struct cachedb_qstate*)regional_alloc(
293 		qstate->region, sizeof(struct cachedb_qstate));
294 	qstate->minfo[id] = iq;
295 	if(!iq)
296 		return 0;
297 	memset(iq, 0, sizeof(*iq));
298 	/* initialise it */
299 	/* TODO */
300 
301 	return 1;
302 }
303 
304 /**
305  * Return an error
306  * @param qstate: our query state
307  * @param id: module id
308  * @param rcode: error code (DNS errcode).
309  * @return: 0 for use by caller, to make notation easy, like:
310  * 	return error_response(..).
311  */
312 static int
313 error_response(struct module_qstate* qstate, int id, int rcode)
314 {
315 	verbose(VERB_QUERY, "return error response %s",
316 		sldns_lookup_by_id(sldns_rcodes, rcode)?
317 		sldns_lookup_by_id(sldns_rcodes, rcode)->name:"??");
318 	qstate->return_rcode = rcode;
319 	qstate->return_msg = NULL;
320 	qstate->ext_state[id] = module_finished;
321 	return 0;
322 }
323 
324 /**
325  * Hash the query name, type, class and dbacess-secret into lookup buffer.
326  * @param qinfo: query info
327  * @param env: with env->cfg with secret.
328  * @param buf: returned buffer with hash to lookup
329  * @param len: length of the buffer.
330  */
331 static void
332 calc_hash(struct query_info* qinfo, struct module_env* env, char* buf,
333 	size_t len)
334 {
335 	uint8_t clear[1024];
336 	size_t clen = 0;
337 	uint8_t hash[CACHEDB_HASHSIZE/8];
338 	const char* hex = "0123456789ABCDEF";
339 	const char* secret = env->cfg->cachedb_secret;
340 	size_t i;
341 
342 	/* copy the hash info into the clear buffer */
343 	if(clen + qinfo->qname_len < sizeof(clear)) {
344 		memmove(clear+clen, qinfo->qname, qinfo->qname_len);
345 		query_dname_tolower(clear+clen);
346 		clen += qinfo->qname_len;
347 	}
348 	if(clen + 4 < sizeof(clear)) {
349 		uint16_t t = htons(qinfo->qtype);
350 		uint16_t c = htons(qinfo->qclass);
351 		memmove(clear+clen, &t, 2);
352 		memmove(clear+clen+2, &c, 2);
353 		clen += 4;
354 	}
355 	if(secret && secret[0] && clen + strlen(secret) < sizeof(clear)) {
356 		memmove(clear+clen, secret, strlen(secret));
357 		clen += strlen(secret);
358 	}
359 
360 	/* hash the buffer */
361 	secalgo_hash_sha256(clear, clen, hash);
362 #ifdef HAVE_EXPLICIT_BZERO
363 	explicit_bzero(clear, clen);
364 #else
365 	memset(clear, 0, clen);
366 #endif
367 
368 	/* hex encode output for portability (some online dbs need
369 	 * no nulls, no control characters, and so on) */
370 	log_assert(len >= sizeof(hash)*2 + 1);
371 	(void)len;
372 	for(i=0; i<sizeof(hash); i++) {
373 		buf[i*2] = hex[(hash[i]&0xf0)>>4];
374 		buf[i*2+1] = hex[hash[i]&0x0f];
375 	}
376 	buf[sizeof(hash)*2] = 0;
377 }
378 
379 /** convert data from return_msg into the data buffer */
380 static int
381 prep_data(struct module_qstate* qstate, struct sldns_buffer* buf)
382 {
383 	uint64_t timestamp, expiry;
384 	size_t oldlim;
385 	struct edns_data edns;
386 	memset(&edns, 0, sizeof(edns));
387 	edns.edns_present = 1;
388 	edns.bits = EDNS_DO;
389 	edns.ext_rcode = 0;
390 	edns.edns_version = EDNS_ADVERTISED_VERSION;
391 	edns.udp_size = EDNS_ADVERTISED_SIZE;
392 
393 	if(!qstate->return_msg || !qstate->return_msg->rep)
394 		return 0;
395 	/* do not store failures like SERVFAIL in the cachedb, this avoids
396 	 * overwriting expired, valid, content with broken content. */
397 	if(FLAGS_GET_RCODE(qstate->return_msg->rep->flags) !=
398 		LDNS_RCODE_NOERROR &&
399 	   FLAGS_GET_RCODE(qstate->return_msg->rep->flags) !=
400 		LDNS_RCODE_NXDOMAIN &&
401 	   FLAGS_GET_RCODE(qstate->return_msg->rep->flags) !=
402 		LDNS_RCODE_YXDOMAIN)
403 		return 0;
404 	/* We don't store the reply if its TTL is 0 unless serve-expired is
405 	 * enabled.  Such a reply won't be reusable and simply be a waste for
406 	 * the backend.  It's also compatible with the default behavior of
407 	 * dns_cache_store_msg(). */
408 	if(qstate->return_msg->rep->ttl == 0 &&
409 		!qstate->env->cfg->serve_expired)
410 		return 0;
411 
412 	/* The EDE is added to the out-list so it is encoded in the cached message */
413 	if (qstate->env->cfg->ede && qstate->return_msg->rep->reason_bogus != LDNS_EDE_NONE) {
414 		edns_opt_list_append_ede(&edns.opt_list_out, qstate->env->scratch,
415 					qstate->return_msg->rep->reason_bogus,
416 					qstate->return_msg->rep->reason_bogus_str);
417 	}
418 
419 	if(verbosity >= VERB_ALGO)
420 		log_dns_msg("cachedb encoding", &qstate->return_msg->qinfo,
421 	                qstate->return_msg->rep);
422 	if(!reply_info_answer_encode(&qstate->return_msg->qinfo,
423 		qstate->return_msg->rep, 0, qstate->query_flags,
424 		buf, 0, 1, qstate->env->scratch, 65535, &edns, 1, 0))
425 		return 0;
426 
427 	/* TTLs in the return_msg are relative to time(0) so we have to
428 	 * store that, we also store the smallest ttl in the packet+time(0)
429 	 * as the packet expiry time */
430 	/* qstate->return_msg->rep->ttl contains that relative shortest ttl */
431 	timestamp = (uint64_t)*qstate->env->now;
432 	expiry = timestamp + (uint64_t)qstate->return_msg->rep->ttl;
433 	timestamp = htobe64(timestamp);
434 	expiry = htobe64(expiry);
435 	oldlim = sldns_buffer_limit(buf);
436 	if(oldlim + sizeof(timestamp)+sizeof(expiry) >=
437 		sldns_buffer_capacity(buf))
438 		return 0; /* doesn't fit. */
439 	sldns_buffer_set_limit(buf, oldlim + sizeof(timestamp)+sizeof(expiry));
440 	sldns_buffer_write_at(buf, oldlim, &timestamp, sizeof(timestamp));
441 	sldns_buffer_write_at(buf, oldlim+sizeof(timestamp), &expiry,
442 		sizeof(expiry));
443 
444 	return 1;
445 }
446 
447 /** check expiry, return true if matches OK */
448 static int
449 good_expiry_and_qinfo(struct module_qstate* qstate, struct sldns_buffer* buf)
450 {
451 	uint64_t expiry;
452 	/* the expiry time is the last bytes of the buffer */
453 	if(sldns_buffer_limit(buf) < sizeof(expiry))
454 		return 0;
455 	sldns_buffer_read_at(buf, sldns_buffer_limit(buf)-sizeof(expiry),
456 		&expiry, sizeof(expiry));
457 	expiry = be64toh(expiry);
458 
459 	/* Check if we are allowed to return expired entries:
460 	 * - serve_expired needs to be set
461 	 * - if SERVE_EXPIRED_TTL is set make sure that the record is not older
462 	 *   than that. */
463 	if((time_t)expiry < *qstate->env->now &&
464 		(!qstate->env->cfg->serve_expired ||
465 			(SERVE_EXPIRED_TTL &&
466 			*qstate->env->now - (time_t)expiry > SERVE_EXPIRED_TTL)))
467 		return 0;
468 
469 	return 1;
470 }
471 
472 /* Adjust the TTL of the given RRset by 'subtract'.  If 'subtract' is
473  * negative, set the TTL to 0. */
474 static void
475 packed_rrset_ttl_subtract(struct packed_rrset_data* data, time_t subtract)
476 {
477 	size_t i;
478 	size_t total = data->count + data->rrsig_count;
479 	if(subtract >= 0 && data->ttl > subtract)
480 		data->ttl -= subtract;
481 	else	data->ttl = 0;
482 	for(i=0; i<total; i++) {
483 		if(subtract >= 0 && data->rr_ttl[i] > subtract)
484 			data->rr_ttl[i] -= subtract;
485 		else	data->rr_ttl[i] = 0;
486 	}
487 	data->ttl_add = (subtract < data->ttl_add) ? (data->ttl_add - subtract) : 0;
488 }
489 
490 /* Adjust the TTL of a DNS message and its RRs by 'adjust'.  If 'adjust' is
491  * negative, set the TTLs to 0. */
492 static void
493 adjust_msg_ttl(struct dns_msg* msg, time_t adjust)
494 {
495 	size_t i;
496 	if(adjust >= 0 && msg->rep->ttl > adjust)
497 		msg->rep->ttl -= adjust;
498 	else
499 		msg->rep->ttl = 0;
500 	msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl);
501 	msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL;
502 
503 	for(i=0; i<msg->rep->rrset_count; i++) {
504 		packed_rrset_ttl_subtract((struct packed_rrset_data*)msg->
505 			rep->rrsets[i]->entry.data, adjust);
506 	}
507 }
508 
509 /* Set the TTL of the given RRset to fixed value. */
510 static void
511 packed_rrset_ttl_set(struct packed_rrset_data* data, time_t ttl)
512 {
513 	size_t i;
514 	size_t total = data->count + data->rrsig_count;
515 	data->ttl = ttl;
516 	for(i=0; i<total; i++) {
517 		data->rr_ttl[i] = ttl;
518 	}
519 	data->ttl_add = 0;
520 }
521 
522 /* Set the TTL of a DNS message and its RRs by to a fixed value. */
523 static void
524 set_msg_ttl(struct dns_msg* msg, time_t ttl)
525 {
526 	size_t i;
527 	msg->rep->ttl = ttl;
528 	msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl);
529 	msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL;
530 
531 	for(i=0; i<msg->rep->rrset_count; i++) {
532 		packed_rrset_ttl_set((struct packed_rrset_data*)msg->
533 			rep->rrsets[i]->entry.data, ttl);
534 	}
535 }
536 
537 /** convert dns message in buffer to return_msg */
538 static int
539 parse_data(struct module_qstate* qstate, struct sldns_buffer* buf,
540 	int* msg_expired)
541 {
542 	struct msg_parse* prs;
543 	struct edns_data edns;
544 	struct edns_option* ede;
545 	uint64_t timestamp, expiry;
546 	time_t adjust;
547 	size_t lim = sldns_buffer_limit(buf);
548 	if(lim < LDNS_HEADER_SIZE+sizeof(timestamp)+sizeof(expiry))
549 		return 0; /* too short */
550 
551 	/* remove timestamp and expiry from end */
552 	sldns_buffer_read_at(buf, lim-sizeof(expiry), &expiry, sizeof(expiry));
553 	sldns_buffer_read_at(buf, lim-sizeof(expiry)-sizeof(timestamp),
554 		&timestamp, sizeof(timestamp));
555 	expiry = be64toh(expiry);
556 	timestamp = be64toh(timestamp);
557 
558 	/* parse DNS packet */
559 	regional_free_all(qstate->env->scratch);
560 	prs = (struct msg_parse*)regional_alloc(qstate->env->scratch,
561 		sizeof(struct msg_parse));
562 	if(!prs)
563 		return 0; /* out of memory */
564 	memset(prs, 0, sizeof(*prs));
565 	memset(&edns, 0, sizeof(edns));
566 	sldns_buffer_set_limit(buf, lim - sizeof(expiry)-sizeof(timestamp));
567 	if(parse_packet(buf, prs, qstate->env->scratch) != LDNS_RCODE_NOERROR) {
568 		sldns_buffer_set_limit(buf, lim);
569 		return 0;
570 	}
571 	if(parse_extract_edns_from_response_msg(prs, &edns, qstate->env->scratch) !=
572 		LDNS_RCODE_NOERROR) {
573 		sldns_buffer_set_limit(buf, lim);
574 		return 0;
575 	}
576 
577 	qstate->return_msg = dns_alloc_msg(buf, prs, qstate->region);
578 	sldns_buffer_set_limit(buf, lim);
579 	if(!qstate->return_msg)
580 		return 0;
581 
582 	/* We find the EDE in the in-list after parsing */
583 	if(qstate->env->cfg->ede &&
584 		(ede = edns_opt_list_find(edns.opt_list_in, LDNS_EDNS_EDE))) {
585 		if(ede->opt_len >= 2) {
586 			qstate->return_msg->rep->reason_bogus =
587 				sldns_read_uint16(ede->opt_data);
588 		}
589 		/* allocate space and store the error string and it's size */
590 		if(ede->opt_len > 2) {
591 			size_t ede_len = ede->opt_len - 2;
592 			qstate->return_msg->rep->reason_bogus_str = regional_alloc(
593 				qstate->region, sizeof(char) * (ede_len+1));
594 			memcpy(qstate->return_msg->rep->reason_bogus_str,
595 				ede->opt_data+2, ede_len);
596 			qstate->return_msg->rep->reason_bogus_str[ede_len] = 0;
597 		}
598 	}
599 
600 	qstate->return_rcode = LDNS_RCODE_NOERROR;
601 
602 	/* see how much of the TTL expired, and remove it */
603 	if(*qstate->env->now <= (time_t)timestamp) {
604 		verbose(VERB_ALGO, "cachedb msg adjust by zero");
605 		return 1; /* message from the future (clock skew?) */
606 	}
607 	adjust = *qstate->env->now - (time_t)timestamp;
608 	if(qstate->return_msg->rep->ttl < adjust) {
609 		verbose(VERB_ALGO, "cachedb msg expired");
610 		*msg_expired = 1;
611 		/* If serve-expired is enabled, we still use an expired message
612 		 * setting the TTL to 0. */
613 		if(!qstate->env->cfg->serve_expired ||
614 			(FLAGS_GET_RCODE(qstate->return_msg->rep->flags)
615 			!= LDNS_RCODE_NOERROR &&
616 			FLAGS_GET_RCODE(qstate->return_msg->rep->flags)
617 			!= LDNS_RCODE_NXDOMAIN &&
618 			FLAGS_GET_RCODE(qstate->return_msg->rep->flags)
619 			!= LDNS_RCODE_YXDOMAIN))
620 			return 0; /* message expired */
621 		else
622 			adjust = -1;
623 	}
624 	verbose(VERB_ALGO, "cachedb msg adjusted down by %d", (int)adjust);
625 	adjust_msg_ttl(qstate->return_msg, adjust);
626 	if(qstate->env->cfg->aggressive_nsec) {
627 		limit_nsec_ttl(qstate->return_msg);
628 	}
629 
630 	/* Similar to the unbound worker, if serve-expired is enabled and
631 	 * the msg would be considered to be expired, mark the state so a
632 	 * refetch will be scheduled.  The comparison between 'expiry' and
633 	 * 'now' should be redundant given how these values were calculated,
634 	 * but we check it just in case as does good_expiry_and_qinfo(). */
635 	if(qstate->env->cfg->serve_expired &&
636 		!qstate->env->cfg->serve_expired_client_timeout &&
637 		(adjust == -1 || (time_t)expiry < *qstate->env->now)) {
638 		qstate->need_refetch = 1;
639 	}
640 
641 	return 1;
642 }
643 
644 /**
645  * Lookup the qstate.qinfo in extcache, store in qstate.return_msg.
646  * return true if lookup was successful.
647  */
648 static int
649 cachedb_extcache_lookup(struct module_qstate* qstate, struct cachedb_env* ie,
650 	int* msg_expired)
651 {
652 	char key[(CACHEDB_HASHSIZE/8)*2+1];
653 	calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key));
654 
655 	/* call backend to fetch data for key into scratch buffer */
656 	if( !(*ie->backend->lookup)(qstate->env, ie, key,
657 		qstate->env->scratch_buffer)) {
658 		return 0;
659 	}
660 
661 	/* check expiry date and check if query-data matches */
662 	if( !good_expiry_and_qinfo(qstate, qstate->env->scratch_buffer) ) {
663 		return 0;
664 	}
665 
666 	/* parse dns message into return_msg */
667 	if( !parse_data(qstate, qstate->env->scratch_buffer, msg_expired) ) {
668 		return 0;
669 	}
670 	return 1;
671 }
672 
673 /**
674  * Store the qstate.return_msg in extcache for key qstate.info
675  */
676 static void
677 cachedb_extcache_store(struct module_qstate* qstate, struct cachedb_env* ie)
678 {
679 	char key[(CACHEDB_HASHSIZE/8)*2+1];
680 	calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key));
681 
682 	/* prepare data in scratch buffer */
683 	if(!prep_data(qstate, qstate->env->scratch_buffer))
684 		return;
685 
686 	/* call backend */
687 	(*ie->backend->store)(qstate->env, ie, key,
688 		sldns_buffer_begin(qstate->env->scratch_buffer),
689 		sldns_buffer_limit(qstate->env->scratch_buffer),
690 		qstate->return_msg->rep->ttl);
691 }
692 
693 /**
694  * See if unbound's internal cache can answer the query
695  */
696 static int
697 cachedb_intcache_lookup(struct module_qstate* qstate, struct cachedb_env* cde)
698 {
699 	uint8_t dpname_storage[LDNS_MAX_DOMAINLEN+1];
700 	uint8_t* dpname=NULL;
701 	size_t dpnamelen=0;
702 	struct dns_msg* msg;
703 	/* for testframe bypass this lookup */
704 	if(cde->backend == &testframe_backend) {
705 		return 0;
706 	}
707 	if(iter_stub_fwd_no_cache(qstate, &qstate->qinfo,
708 		&dpname, &dpnamelen, dpname_storage, sizeof(dpname_storage)))
709 		return 0; /* no cache for these queries */
710 	msg = dns_cache_lookup(qstate->env, qstate->qinfo.qname,
711 		qstate->qinfo.qname_len, qstate->qinfo.qtype,
712 		qstate->qinfo.qclass, qstate->query_flags,
713 		qstate->region, qstate->env->scratch,
714 		1, /* no partial messages with only a CNAME */
715 		dpname, dpnamelen
716 		);
717 	if(!msg && qstate->env->neg_cache &&
718 		iter_qname_indicates_dnssec(qstate->env, &qstate->qinfo)) {
719 		/* lookup in negative cache; may result in
720 		 * NOERROR/NODATA or NXDOMAIN answers that need validation */
721 		msg = val_neg_getmsg(qstate->env->neg_cache, &qstate->qinfo,
722 			qstate->region, qstate->env->rrset_cache,
723 			qstate->env->scratch_buffer,
724 			*qstate->env->now, 1/*add SOA*/, NULL,
725 			qstate->env->cfg);
726 	}
727 	if(!msg)
728 		return 0;
729 	/* this is the returned msg */
730 	qstate->return_rcode = LDNS_RCODE_NOERROR;
731 	qstate->return_msg = msg;
732 	return 1;
733 }
734 
735 /**
736  * Store query into the internal cache of unbound.
737  */
738 static void
739 cachedb_intcache_store(struct module_qstate* qstate, int msg_expired)
740 {
741 	uint32_t store_flags = qstate->query_flags;
742 	int serve_expired = qstate->env->cfg->serve_expired;
743 
744 	if(qstate->env->cfg->serve_expired)
745 		store_flags |= DNSCACHE_STORE_ZEROTTL;
746 	if(!qstate->return_msg)
747 		return;
748 	if(serve_expired && msg_expired) {
749 		/* Set TTLs to a value such that value + *env->now is
750 		 * going to be now-3 seconds. Making it expired
751 		 * in the cache. */
752 		set_msg_ttl(qstate->return_msg, (time_t)-3);
753 		/* The expired entry does not get checked by the validator
754 		 * and we need a validation value for it. */
755 		if(qstate->env->cfg->cachedb_check_when_serve_expired)
756 			qstate->return_msg->rep->security = sec_status_insecure;
757 	}
758 	(void)dns_cache_store(qstate->env, &qstate->qinfo,
759 		qstate->return_msg->rep, 0, qstate->prefetch_leeway, 0,
760 		qstate->region, store_flags, qstate->qstarttime,
761 		qstate->is_valrec);
762 	if(serve_expired && msg_expired) {
763 		if(qstate->env->cfg->serve_expired_client_timeout) {
764 			/* No expired response from the query state, the
765 			 * query resolution needs to continue and it can
766 			 * pick up the expired result after the timer out
767 			 * of cache. */
768 			return;
769 		}
770 		/* set TTLs to zero again */
771 		adjust_msg_ttl(qstate->return_msg, -1);
772 		/* Send serve expired responses based on the cachedb
773 		 * returned message, that was just stored in the cache.
774 		 * It can then continue to work on this query. */
775 		mesh_respond_serve_expired(qstate->mesh_info);
776 	}
777 }
778 
779 /**
780  * Handle a cachedb module event with a query
781  * @param qstate: query state (from the mesh), passed between modules.
782  * 	contains qstate->env module environment with global caches and so on.
783  * @param iq: query state specific for this module.  per-query.
784  * @param ie: environment specific for this module.  global.
785  * @param id: module id.
786  */
787 static void
788 cachedb_handle_query(struct module_qstate* qstate,
789 	struct cachedb_qstate* ATTR_UNUSED(iq),
790 	struct cachedb_env* ie, int id)
791 {
792 	int msg_expired = 0;
793 	qstate->is_cachedb_answer = 0;
794 	/* check if we are enabled, and skip if so */
795 	if(!ie->enabled) {
796 		/* pass request to next module */
797 		qstate->ext_state[id] = module_wait_module;
798 		return;
799 	}
800 
801 	if(qstate->blacklist || qstate->no_cache_lookup) {
802 		/* cache is blacklisted or we are instructed from edns to not look */
803 		/* pass request to next module */
804 		qstate->ext_state[id] = module_wait_module;
805 		return;
806 	}
807 
808 	/* lookup inside unbound's internal cache.
809 	 * This does not look for expired entries. */
810 	if(cachedb_intcache_lookup(qstate, ie)) {
811 		if(verbosity >= VERB_ALGO) {
812 			if(qstate->return_msg->rep)
813 				log_dns_msg("cachedb internal cache lookup",
814 					&qstate->return_msg->qinfo,
815 					qstate->return_msg->rep);
816 			else log_info("cachedb internal cache lookup: rcode %s",
817 				sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode)
818 				?sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode)->name
819 				:"??");
820 		}
821 		/* we are done with the query */
822 		qstate->ext_state[id] = module_finished;
823 		return;
824 	}
825 
826 	/* ask backend cache to see if we have data */
827 	if(cachedb_extcache_lookup(qstate, ie, &msg_expired)) {
828 		if(verbosity >= VERB_ALGO)
829 			log_dns_msg(ie->backend->name,
830 				&qstate->return_msg->qinfo,
831 				qstate->return_msg->rep);
832 		/* store this result in internal cache */
833 		cachedb_intcache_store(qstate, msg_expired);
834 		/* In case we have expired data but there is a client timer for expired
835 		 * answers, pass execution to next module in order to try updating the
836 		 * data first.
837 		 */
838 		if(qstate->env->cfg->serve_expired && msg_expired) {
839 			qstate->return_msg = NULL;
840 			qstate->ext_state[id] = module_wait_module;
841 			/* The expired reply is sent with
842 			 * mesh_respond_serve_expired, and so
843 			 * the need_refetch is not used. */
844 			qstate->need_refetch = 0;
845 			return;
846 		}
847 		if(qstate->need_refetch && qstate->serve_expired_data &&
848 			qstate->serve_expired_data->timer) {
849 				qstate->return_msg = NULL;
850 				qstate->ext_state[id] = module_wait_module;
851 				return;
852 		}
853 		qstate->is_cachedb_answer = 1;
854 		/* we are done with the query */
855 		qstate->ext_state[id] = module_finished;
856 		return;
857 	}
858 
859 	if(qstate->serve_expired_data &&
860 		qstate->env->cfg->cachedb_check_when_serve_expired &&
861 		!qstate->env->cfg->serve_expired_client_timeout) {
862 		/* Reply with expired data if any to client, because cachedb
863 		 * also has no useful, current data */
864 		mesh_respond_serve_expired(qstate->mesh_info);
865 	}
866 
867 	/* no cache fetches */
868 	/* pass request to next module */
869 	qstate->ext_state[id] = module_wait_module;
870 }
871 
872 /**
873  * Handle a cachedb module event with a response from the iterator.
874  * @param qstate: query state (from the mesh), passed between modules.
875  * 	contains qstate->env module environment with global caches and so on.
876  * @param iq: query state specific for this module.  per-query.
877  * @param ie: environment specific for this module.  global.
878  * @param id: module id.
879  */
880 static void
881 cachedb_handle_response(struct module_qstate* qstate,
882 	struct cachedb_qstate* ATTR_UNUSED(iq), struct cachedb_env* ie, int id)
883 {
884 	qstate->is_cachedb_answer = 0;
885 	/* check if we are not enabled or instructed to not cache, and skip */
886 	if(!ie->enabled || qstate->no_cache_store) {
887 		/* we are done with the query */
888 		qstate->ext_state[id] = module_finished;
889 		return;
890 	}
891 	if(qstate->env->cfg->cachedb_no_store) {
892 		/* do not store the item in the external cache */
893 		qstate->ext_state[id] = module_finished;
894 		return;
895 	}
896 
897 	/* store the item into the backend cache */
898 	cachedb_extcache_store(qstate, ie);
899 
900 	/* we are done with the query */
901 	qstate->ext_state[id] = module_finished;
902 }
903 
904 void
905 cachedb_operate(struct module_qstate* qstate, enum module_ev event, int id,
906 	struct outbound_entry* outbound)
907 {
908 	struct cachedb_env* ie = (struct cachedb_env*)qstate->env->modinfo[id];
909 	struct cachedb_qstate* iq = (struct cachedb_qstate*)qstate->minfo[id];
910 	verbose(VERB_QUERY, "cachedb[module %d] operate: extstate:%s event:%s",
911 		id, strextstate(qstate->ext_state[id]), strmodulevent(event));
912 	if(iq) log_query_info(VERB_QUERY, "cachedb operate: query",
913 		&qstate->qinfo);
914 
915 	/* perform cachedb state machine */
916 	if((event == module_event_new || event == module_event_pass) &&
917 		iq == NULL) {
918 		if(!cachedb_new(qstate, id)) {
919 			(void)error_response(qstate, id, LDNS_RCODE_SERVFAIL);
920 			return;
921 		}
922 		iq = (struct cachedb_qstate*)qstate->minfo[id];
923 	}
924 	if(iq && (event == module_event_pass || event == module_event_new)) {
925 		cachedb_handle_query(qstate, iq, ie, id);
926 		return;
927 	}
928 	if(iq && (event == module_event_moddone)) {
929 		cachedb_handle_response(qstate, iq, ie, id);
930 		return;
931 	}
932 	if(iq && outbound) {
933 		/* cachedb does not need to process responses at this time
934 		 * ignore it.
935 		cachedb_process_response(qstate, iq, ie, id, outbound, event);
936 		*/
937 		return;
938 	}
939 	if(event == module_event_error) {
940 		verbose(VERB_ALGO, "got called with event error, giving up");
941 		(void)error_response(qstate, id, LDNS_RCODE_SERVFAIL);
942 		return;
943 	}
944 	if(!iq && (event == module_event_moddone)) {
945 		/* during priming, module done but we never started */
946 		qstate->ext_state[id] = module_finished;
947 		return;
948 	}
949 
950 	log_err("bad event for cachedb");
951 	(void)error_response(qstate, id, LDNS_RCODE_SERVFAIL);
952 }
953 
954 void
955 cachedb_inform_super(struct module_qstate* ATTR_UNUSED(qstate),
956 	int ATTR_UNUSED(id), struct module_qstate* ATTR_UNUSED(super))
957 {
958 	/* cachedb does not use subordinate requests at this time */
959 	verbose(VERB_ALGO, "cachedb inform_super was called");
960 }
961 
962 void
963 cachedb_clear(struct module_qstate* qstate, int id)
964 {
965 	struct cachedb_qstate* iq;
966 	if(!qstate)
967 		return;
968 	iq = (struct cachedb_qstate*)qstate->minfo[id];
969 	if(iq) {
970 		/* free contents of iq */
971 		/* TODO */
972 	}
973 	qstate->minfo[id] = NULL;
974 }
975 
976 size_t
977 cachedb_get_mem(struct module_env* env, int id)
978 {
979 	struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id];
980 	if(!ie)
981 		return 0;
982 	return sizeof(*ie); /* TODO - more mem */
983 }
984 
985 /**
986  * The cachedb function block
987  */
988 static struct module_func_block cachedb_block = {
989 	"cachedb",
990 	NULL, NULL, &cachedb_init, &cachedb_deinit, &cachedb_operate,
991 	&cachedb_inform_super, &cachedb_clear, &cachedb_get_mem
992 };
993 
994 struct module_func_block*
995 cachedb_get_funcblock(void)
996 {
997 	return &cachedb_block;
998 }
999 
1000 int
1001 cachedb_is_enabled(struct module_stack* mods, struct module_env* env)
1002 {
1003 	struct cachedb_env* ie;
1004 	int id = modstack_find(mods, "cachedb");
1005 	if(id == -1)
1006 		return 0;
1007 	ie = (struct cachedb_env*)env->modinfo[id];
1008 	if(ie && ie->enabled)
1009 		return 1;
1010 	return 0;
1011 }
1012 
1013 void cachedb_msg_remove(struct module_qstate* qstate)
1014 {
1015 	cachedb_msg_remove_qinfo(qstate->env, &qstate->qinfo);
1016 }
1017 
1018 void cachedb_msg_remove_qinfo(struct module_env* env, struct query_info* qinfo)
1019 {
1020 	char key[(CACHEDB_HASHSIZE/8)*2+1];
1021 	int id = modstack_find(env->modstack, "cachedb");
1022 	struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id];
1023 
1024 	log_query_info(VERB_ALGO, "cachedb msg remove", qinfo);
1025 	calc_hash(qinfo, env, key, sizeof(key));
1026 	sldns_buffer_clear(env->scratch_buffer);
1027 	sldns_buffer_write_u32(env->scratch_buffer, 0);
1028 	sldns_buffer_flip(env->scratch_buffer);
1029 
1030 	/* call backend */
1031 	(*ie->backend->store)(env, ie, key,
1032 		sldns_buffer_begin(env->scratch_buffer),
1033 		sldns_buffer_limit(env->scratch_buffer),
1034 		0);
1035 }
1036 #endif /* USE_CACHEDB */
1037