1 /* 2 * cachedb/cachedb.c - cache from a database external to the program module 3 * 4 * Copyright (c) 2016, NLnet Labs. All rights reserved. 5 * 6 * This software is open source. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * Redistributions of source code must retain the above copyright notice, 13 * this list of conditions and the following disclaimer. 14 * 15 * Redistributions in binary form must reproduce the above copyright notice, 16 * this list of conditions and the following disclaimer in the documentation 17 * and/or other materials provided with the distribution. 18 * 19 * Neither the name of the NLNET LABS nor the names of its contributors may 20 * be used to endorse or promote products derived from this software without 21 * specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 /** 37 * \file 38 * 39 * This file contains a module that uses an external database to cache 40 * dns responses. 41 */ 42 43 #include "config.h" 44 #ifdef USE_CACHEDB 45 #include "cachedb/cachedb.h" 46 #include "cachedb/redis.h" 47 #include "util/regional.h" 48 #include "util/net_help.h" 49 #include "util/config_file.h" 50 #include "util/data/msgreply.h" 51 #include "util/data/msgencode.h" 52 #include "services/cache/dns.h" 53 #include "services/mesh.h" 54 #include "services/modstack.h" 55 #include "validator/val_neg.h" 56 #include "validator/val_secalgo.h" 57 #include "iterator/iter_utils.h" 58 #include "sldns/parseutil.h" 59 #include "sldns/wire2str.h" 60 #include "sldns/sbuffer.h" 61 62 /* header file for htobe64 */ 63 #ifdef HAVE_ENDIAN_H 64 # include <endian.h> 65 #endif 66 #ifdef HAVE_SYS_ENDIAN_H 67 # include <sys/endian.h> 68 #endif 69 70 #ifndef HAVE_HTOBE64 71 # ifdef HAVE_LIBKERN_OSBYTEORDER_H 72 /* In practice this is specific to MacOS X. We assume it doesn't have 73 * htobe64/be64toh but has alternatives with a different name. */ 74 # include <libkern/OSByteOrder.h> 75 # define htobe64(x) OSSwapHostToBigInt64(x) 76 # define be64toh(x) OSSwapBigToHostInt64(x) 77 # else 78 /* not OSX */ 79 /* Some compilers do not define __BYTE_ORDER__, like IBM XLC on AIX */ 80 # if __BIG_ENDIAN__ 81 # define be64toh(n) (n) 82 # define htobe64(n) (n) 83 # else 84 # define be64toh(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 85 # define htobe64(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 86 # endif /* _ENDIAN */ 87 # endif /* HAVE_LIBKERN_OSBYTEORDER_H */ 88 #endif /* HAVE_BE64TOH */ 89 90 /** the unit test testframe for cachedb, its module state contains 91 * a cache for a couple queries (in memory). */ 92 struct testframe_moddata { 93 /** lock for mutex */ 94 lock_basic_type lock; 95 /** key for single stored data element, NULL if none */ 96 char* stored_key; 97 /** data for single stored data element, NULL if none */ 98 uint8_t* stored_data; 99 /** length of stored data */ 100 size_t stored_datalen; 101 }; 102 103 static int 104 testframe_init(struct module_env* env, struct cachedb_env* cachedb_env) 105 { 106 struct testframe_moddata* d; 107 verbose(VERB_ALGO, "testframe_init"); 108 d = (struct testframe_moddata*)calloc(1, 109 sizeof(struct testframe_moddata)); 110 cachedb_env->backend_data = (void*)d; 111 if(!cachedb_env->backend_data) { 112 log_err("out of memory"); 113 return 0; 114 } 115 /* Register an EDNS option (65534) to bypass the worker cache lookup 116 * for testing */ 117 if(!edns_register_option(LDNS_EDNS_UNBOUND_CACHEDB_TESTFRAME_TEST, 118 1 /* bypass cache */, 119 0 /* no aggregation */, env)) { 120 log_err("testframe_init, could not register test opcode"); 121 free(d); 122 return 0; 123 } 124 lock_basic_init(&d->lock); 125 lock_protect(&d->lock, d, sizeof(*d)); 126 return 1; 127 } 128 129 static void 130 testframe_deinit(struct module_env* env, struct cachedb_env* cachedb_env) 131 { 132 struct testframe_moddata* d = (struct testframe_moddata*) 133 cachedb_env->backend_data; 134 (void)env; 135 verbose(VERB_ALGO, "testframe_deinit"); 136 if(!d) 137 return; 138 lock_basic_destroy(&d->lock); 139 free(d->stored_key); 140 free(d->stored_data); 141 free(d); 142 } 143 144 static int 145 testframe_lookup(struct module_env* env, struct cachedb_env* cachedb_env, 146 char* key, struct sldns_buffer* result_buffer) 147 { 148 struct testframe_moddata* d = (struct testframe_moddata*) 149 cachedb_env->backend_data; 150 (void)env; 151 verbose(VERB_ALGO, "testframe_lookup of %s", key); 152 lock_basic_lock(&d->lock); 153 if(d->stored_key && strcmp(d->stored_key, key) == 0) { 154 if(d->stored_datalen > sldns_buffer_capacity(result_buffer)) { 155 lock_basic_unlock(&d->lock); 156 return 0; /* too large */ 157 } 158 verbose(VERB_ALGO, "testframe_lookup found %d bytes", 159 (int)d->stored_datalen); 160 sldns_buffer_clear(result_buffer); 161 sldns_buffer_write(result_buffer, d->stored_data, 162 d->stored_datalen); 163 sldns_buffer_flip(result_buffer); 164 lock_basic_unlock(&d->lock); 165 return 1; 166 } 167 lock_basic_unlock(&d->lock); 168 return 0; 169 } 170 171 static void 172 testframe_store(struct module_env* env, struct cachedb_env* cachedb_env, 173 char* key, uint8_t* data, size_t data_len, time_t ATTR_UNUSED(ttl)) 174 { 175 struct testframe_moddata* d = (struct testframe_moddata*) 176 cachedb_env->backend_data; 177 (void)env; 178 lock_basic_lock(&d->lock); 179 verbose(VERB_ALGO, "testframe_store %s (%d bytes)", key, (int)data_len); 180 181 /* free old data element (if any) */ 182 free(d->stored_key); 183 d->stored_key = NULL; 184 free(d->stored_data); 185 d->stored_data = NULL; 186 d->stored_datalen = 0; 187 188 d->stored_data = memdup(data, data_len); 189 if(!d->stored_data) { 190 lock_basic_unlock(&d->lock); 191 log_err("out of memory"); 192 return; 193 } 194 d->stored_datalen = data_len; 195 d->stored_key = strdup(key); 196 if(!d->stored_key) { 197 free(d->stored_data); 198 d->stored_data = NULL; 199 d->stored_datalen = 0; 200 lock_basic_unlock(&d->lock); 201 return; 202 } 203 lock_basic_unlock(&d->lock); 204 /* (key,data) successfully stored */ 205 } 206 207 /** The testframe backend is for unit tests */ 208 static struct cachedb_backend testframe_backend = { "testframe", 209 testframe_init, testframe_deinit, testframe_lookup, testframe_store 210 }; 211 212 /** find a particular backend from possible backends */ 213 static struct cachedb_backend* 214 cachedb_find_backend(const char* str) 215 { 216 #ifdef USE_REDIS 217 if(strcmp(str, redis_backend.name) == 0) 218 return &redis_backend; 219 #endif 220 if(strcmp(str, testframe_backend.name) == 0) 221 return &testframe_backend; 222 /* TODO add more backends here */ 223 return NULL; 224 } 225 226 /** apply configuration to cachedb module 'global' state */ 227 static int 228 cachedb_apply_cfg(struct cachedb_env* cachedb_env, struct config_file* cfg) 229 { 230 const char* backend_str = cfg->cachedb_backend; 231 if(!backend_str || *backend_str==0) 232 return 1; 233 cachedb_env->backend = cachedb_find_backend(backend_str); 234 if(!cachedb_env->backend) { 235 log_err("cachedb: cannot find backend name '%s'", backend_str); 236 return 0; 237 } 238 239 /* TODO see if more configuration needs to be applied or not */ 240 return 1; 241 } 242 243 int 244 cachedb_init(struct module_env* env, int id) 245 { 246 struct cachedb_env* cachedb_env = (struct cachedb_env*)calloc(1, 247 sizeof(struct cachedb_env)); 248 if(!cachedb_env) { 249 log_err("malloc failure"); 250 return 0; 251 } 252 env->modinfo[id] = (void*)cachedb_env; 253 if(!cachedb_apply_cfg(cachedb_env, env->cfg)) { 254 log_err("cachedb: could not apply configuration settings."); 255 free(cachedb_env); 256 env->modinfo[id] = NULL; 257 return 0; 258 } 259 /* see if a backend is selected */ 260 if(!cachedb_env->backend || !cachedb_env->backend->name) 261 return 1; 262 if(!(*cachedb_env->backend->init)(env, cachedb_env)) { 263 log_err("cachedb: could not init %s backend", 264 cachedb_env->backend->name); 265 free(cachedb_env); 266 env->modinfo[id] = NULL; 267 return 0; 268 } 269 cachedb_env->enabled = 1; 270 return 1; 271 } 272 273 void 274 cachedb_deinit(struct module_env* env, int id) 275 { 276 struct cachedb_env* cachedb_env; 277 if(!env || !env->modinfo[id]) 278 return; 279 cachedb_env = (struct cachedb_env*)env->modinfo[id]; 280 if(cachedb_env->enabled) { 281 (*cachedb_env->backend->deinit)(env, cachedb_env); 282 } 283 free(cachedb_env); 284 env->modinfo[id] = NULL; 285 } 286 287 /** new query for cachedb */ 288 static int 289 cachedb_new(struct module_qstate* qstate, int id) 290 { 291 struct cachedb_qstate* iq = (struct cachedb_qstate*)regional_alloc( 292 qstate->region, sizeof(struct cachedb_qstate)); 293 qstate->minfo[id] = iq; 294 if(!iq) 295 return 0; 296 memset(iq, 0, sizeof(*iq)); 297 /* initialise it */ 298 /* TODO */ 299 300 return 1; 301 } 302 303 /** 304 * Return an error 305 * @param qstate: our query state 306 * @param id: module id 307 * @param rcode: error code (DNS errcode). 308 * @return: 0 for use by caller, to make notation easy, like: 309 * return error_response(..). 310 */ 311 static int 312 error_response(struct module_qstate* qstate, int id, int rcode) 313 { 314 verbose(VERB_QUERY, "return error response %s", 315 sldns_lookup_by_id(sldns_rcodes, rcode)? 316 sldns_lookup_by_id(sldns_rcodes, rcode)->name:"??"); 317 qstate->return_rcode = rcode; 318 qstate->return_msg = NULL; 319 qstate->ext_state[id] = module_finished; 320 return 0; 321 } 322 323 /** 324 * Hash the query name, type, class and dbacess-secret into lookup buffer. 325 * @param qinfo: query info 326 * @param env: with env->cfg with secret. 327 * @param buf: returned buffer with hash to lookup 328 * @param len: length of the buffer. 329 */ 330 static void 331 calc_hash(struct query_info* qinfo, struct module_env* env, char* buf, 332 size_t len) 333 { 334 uint8_t clear[1024]; 335 size_t clen = 0; 336 uint8_t hash[CACHEDB_HASHSIZE/8]; 337 const char* hex = "0123456789ABCDEF"; 338 const char* secret = env->cfg->cachedb_secret; 339 size_t i; 340 341 /* copy the hash info into the clear buffer */ 342 if(clen + qinfo->qname_len < sizeof(clear)) { 343 memmove(clear+clen, qinfo->qname, qinfo->qname_len); 344 clen += qinfo->qname_len; 345 } 346 if(clen + 4 < sizeof(clear)) { 347 uint16_t t = htons(qinfo->qtype); 348 uint16_t c = htons(qinfo->qclass); 349 memmove(clear+clen, &t, 2); 350 memmove(clear+clen+2, &c, 2); 351 clen += 4; 352 } 353 if(secret && secret[0] && clen + strlen(secret) < sizeof(clear)) { 354 memmove(clear+clen, secret, strlen(secret)); 355 clen += strlen(secret); 356 } 357 358 /* hash the buffer */ 359 secalgo_hash_sha256(clear, clen, hash); 360 #ifdef HAVE_EXPLICIT_BZERO 361 explicit_bzero(clear, clen); 362 #else 363 memset(clear, 0, clen); 364 #endif 365 366 /* hex encode output for portability (some online dbs need 367 * no nulls, no control characters, and so on) */ 368 log_assert(len >= sizeof(hash)*2 + 1); 369 (void)len; 370 for(i=0; i<sizeof(hash); i++) { 371 buf[i*2] = hex[(hash[i]&0xf0)>>4]; 372 buf[i*2+1] = hex[hash[i]&0x0f]; 373 } 374 buf[sizeof(hash)*2] = 0; 375 } 376 377 /** convert data from return_msg into the data buffer */ 378 static int 379 prep_data(struct module_qstate* qstate, struct sldns_buffer* buf) 380 { 381 uint64_t timestamp, expiry; 382 size_t oldlim; 383 struct edns_data edns; 384 memset(&edns, 0, sizeof(edns)); 385 edns.edns_present = 1; 386 edns.bits = EDNS_DO; 387 edns.ext_rcode = 0; 388 edns.edns_version = EDNS_ADVERTISED_VERSION; 389 edns.udp_size = EDNS_ADVERTISED_SIZE; 390 391 if(!qstate->return_msg || !qstate->return_msg->rep) 392 return 0; 393 /* do not store failures like SERVFAIL in the cachedb, this avoids 394 * overwriting expired, valid, content with broken content. */ 395 if(FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 396 LDNS_RCODE_NOERROR && 397 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 398 LDNS_RCODE_NXDOMAIN && 399 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 400 LDNS_RCODE_YXDOMAIN) 401 return 0; 402 /* We don't store the reply if its TTL is 0 unless serve-expired is 403 * enabled. Such a reply won't be reusable and simply be a waste for 404 * the backend. It's also compatible with the default behavior of 405 * dns_cache_store_msg(). */ 406 if(qstate->return_msg->rep->ttl == 0 && 407 !qstate->env->cfg->serve_expired) 408 return 0; 409 410 /* The EDE is added to the out-list so it is encoded in the cached message */ 411 if (qstate->env->cfg->ede && qstate->return_msg->rep->reason_bogus != LDNS_EDE_NONE) { 412 edns_opt_list_append_ede(&edns.opt_list_out, qstate->env->scratch, 413 qstate->return_msg->rep->reason_bogus, 414 qstate->return_msg->rep->reason_bogus_str); 415 } 416 417 if(verbosity >= VERB_ALGO) 418 log_dns_msg("cachedb encoding", &qstate->return_msg->qinfo, 419 qstate->return_msg->rep); 420 if(!reply_info_answer_encode(&qstate->return_msg->qinfo, 421 qstate->return_msg->rep, 0, qstate->query_flags, 422 buf, 0, 1, qstate->env->scratch, 65535, &edns, 1, 0)) 423 return 0; 424 425 /* TTLs in the return_msg are relative to time(0) so we have to 426 * store that, we also store the smallest ttl in the packet+time(0) 427 * as the packet expiry time */ 428 /* qstate->return_msg->rep->ttl contains that relative shortest ttl */ 429 timestamp = (uint64_t)*qstate->env->now; 430 expiry = timestamp + (uint64_t)qstate->return_msg->rep->ttl; 431 timestamp = htobe64(timestamp); 432 expiry = htobe64(expiry); 433 oldlim = sldns_buffer_limit(buf); 434 if(oldlim + sizeof(timestamp)+sizeof(expiry) >= 435 sldns_buffer_capacity(buf)) 436 return 0; /* doesn't fit. */ 437 sldns_buffer_set_limit(buf, oldlim + sizeof(timestamp)+sizeof(expiry)); 438 sldns_buffer_write_at(buf, oldlim, ×tamp, sizeof(timestamp)); 439 sldns_buffer_write_at(buf, oldlim+sizeof(timestamp), &expiry, 440 sizeof(expiry)); 441 442 return 1; 443 } 444 445 /** check expiry, return true if matches OK */ 446 static int 447 good_expiry_and_qinfo(struct module_qstate* qstate, struct sldns_buffer* buf) 448 { 449 uint64_t expiry; 450 /* the expiry time is the last bytes of the buffer */ 451 if(sldns_buffer_limit(buf) < sizeof(expiry)) 452 return 0; 453 sldns_buffer_read_at(buf, sldns_buffer_limit(buf)-sizeof(expiry), 454 &expiry, sizeof(expiry)); 455 expiry = be64toh(expiry); 456 457 /* Check if we are allowed to return expired entries: 458 * - serve_expired needs to be set 459 * - if SERVE_EXPIRED_TTL is set make sure that the record is not older 460 * than that. */ 461 if((time_t)expiry < *qstate->env->now && 462 (!qstate->env->cfg->serve_expired || 463 (SERVE_EXPIRED_TTL && 464 *qstate->env->now - (time_t)expiry > SERVE_EXPIRED_TTL))) 465 return 0; 466 467 return 1; 468 } 469 470 /* Adjust the TTL of the given RRset by 'subtract'. If 'subtract' is 471 * negative, set the TTL to 0. */ 472 static void 473 packed_rrset_ttl_subtract(struct packed_rrset_data* data, time_t subtract) 474 { 475 size_t i; 476 size_t total = data->count + data->rrsig_count; 477 if(subtract >= 0 && data->ttl > subtract) 478 data->ttl -= subtract; 479 else data->ttl = 0; 480 for(i=0; i<total; i++) { 481 if(subtract >= 0 && data->rr_ttl[i] > subtract) 482 data->rr_ttl[i] -= subtract; 483 else data->rr_ttl[i] = 0; 484 } 485 data->ttl_add = (subtract < data->ttl_add) ? (data->ttl_add - subtract) : 0; 486 } 487 488 /* Adjust the TTL of a DNS message and its RRs by 'adjust'. If 'adjust' is 489 * negative, set the TTLs to 0. */ 490 static void 491 adjust_msg_ttl(struct dns_msg* msg, time_t adjust) 492 { 493 size_t i; 494 if(adjust >= 0 && msg->rep->ttl > adjust) 495 msg->rep->ttl -= adjust; 496 else 497 msg->rep->ttl = 0; 498 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 499 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 500 501 for(i=0; i<msg->rep->rrset_count; i++) { 502 packed_rrset_ttl_subtract((struct packed_rrset_data*)msg-> 503 rep->rrsets[i]->entry.data, adjust); 504 } 505 } 506 507 /* Set the TTL of the given RRset to fixed value. */ 508 static void 509 packed_rrset_ttl_set(struct packed_rrset_data* data, time_t ttl) 510 { 511 size_t i; 512 size_t total = data->count + data->rrsig_count; 513 data->ttl = ttl; 514 for(i=0; i<total; i++) { 515 data->rr_ttl[i] = ttl; 516 } 517 data->ttl_add = 0; 518 } 519 520 /* Set the TTL of a DNS message and its RRs by to a fixed value. */ 521 static void 522 set_msg_ttl(struct dns_msg* msg, time_t ttl) 523 { 524 size_t i; 525 msg->rep->ttl = ttl; 526 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 527 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 528 529 for(i=0; i<msg->rep->rrset_count; i++) { 530 packed_rrset_ttl_set((struct packed_rrset_data*)msg-> 531 rep->rrsets[i]->entry.data, ttl); 532 } 533 } 534 535 /** convert dns message in buffer to return_msg */ 536 static int 537 parse_data(struct module_qstate* qstate, struct sldns_buffer* buf, 538 int* msg_expired) 539 { 540 struct msg_parse* prs; 541 struct edns_data edns; 542 struct edns_option* ede; 543 uint64_t timestamp, expiry; 544 time_t adjust; 545 size_t lim = sldns_buffer_limit(buf); 546 if(lim < LDNS_HEADER_SIZE+sizeof(timestamp)+sizeof(expiry)) 547 return 0; /* too short */ 548 549 /* remove timestamp and expiry from end */ 550 sldns_buffer_read_at(buf, lim-sizeof(expiry), &expiry, sizeof(expiry)); 551 sldns_buffer_read_at(buf, lim-sizeof(expiry)-sizeof(timestamp), 552 ×tamp, sizeof(timestamp)); 553 expiry = be64toh(expiry); 554 timestamp = be64toh(timestamp); 555 556 /* parse DNS packet */ 557 regional_free_all(qstate->env->scratch); 558 prs = (struct msg_parse*)regional_alloc(qstate->env->scratch, 559 sizeof(struct msg_parse)); 560 if(!prs) 561 return 0; /* out of memory */ 562 memset(prs, 0, sizeof(*prs)); 563 memset(&edns, 0, sizeof(edns)); 564 sldns_buffer_set_limit(buf, lim - sizeof(expiry)-sizeof(timestamp)); 565 if(parse_packet(buf, prs, qstate->env->scratch) != LDNS_RCODE_NOERROR) { 566 sldns_buffer_set_limit(buf, lim); 567 return 0; 568 } 569 if(parse_extract_edns_from_response_msg(prs, &edns, qstate->env->scratch) != 570 LDNS_RCODE_NOERROR) { 571 sldns_buffer_set_limit(buf, lim); 572 return 0; 573 } 574 575 qstate->return_msg = dns_alloc_msg(buf, prs, qstate->region); 576 sldns_buffer_set_limit(buf, lim); 577 if(!qstate->return_msg) 578 return 0; 579 580 /* We find the EDE in the in-list after parsing */ 581 if(qstate->env->cfg->ede && 582 (ede = edns_opt_list_find(edns.opt_list_in, LDNS_EDNS_EDE))) { 583 if(ede->opt_len >= 2) { 584 qstate->return_msg->rep->reason_bogus = 585 sldns_read_uint16(ede->opt_data); 586 } 587 /* allocate space and store the error string and it's size */ 588 if(ede->opt_len > 2) { 589 size_t ede_len = ede->opt_len - 2; 590 qstate->return_msg->rep->reason_bogus_str = regional_alloc( 591 qstate->region, sizeof(char) * (ede_len+1)); 592 memcpy(qstate->return_msg->rep->reason_bogus_str, 593 ede->opt_data+2, ede_len); 594 qstate->return_msg->rep->reason_bogus_str[ede_len] = 0; 595 } 596 } 597 598 qstate->return_rcode = LDNS_RCODE_NOERROR; 599 600 /* see how much of the TTL expired, and remove it */ 601 if(*qstate->env->now <= (time_t)timestamp) { 602 verbose(VERB_ALGO, "cachedb msg adjust by zero"); 603 return 1; /* message from the future (clock skew?) */ 604 } 605 adjust = *qstate->env->now - (time_t)timestamp; 606 if(qstate->return_msg->rep->ttl < adjust) { 607 verbose(VERB_ALGO, "cachedb msg expired"); 608 *msg_expired = 1; 609 /* If serve-expired is enabled, we still use an expired message 610 * setting the TTL to 0. */ 611 if(!qstate->env->cfg->serve_expired || 612 (FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 613 != LDNS_RCODE_NOERROR && 614 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 615 != LDNS_RCODE_NXDOMAIN && 616 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 617 != LDNS_RCODE_YXDOMAIN)) 618 return 0; /* message expired */ 619 else 620 adjust = -1; 621 } 622 verbose(VERB_ALGO, "cachedb msg adjusted down by %d", (int)adjust); 623 adjust_msg_ttl(qstate->return_msg, adjust); 624 625 /* Similar to the unbound worker, if serve-expired is enabled and 626 * the msg would be considered to be expired, mark the state so a 627 * refetch will be scheduled. The comparison between 'expiry' and 628 * 'now' should be redundant given how these values were calculated, 629 * but we check it just in case as does good_expiry_and_qinfo(). */ 630 if(qstate->env->cfg->serve_expired && 631 !qstate->env->cfg->serve_expired_client_timeout && 632 (adjust == -1 || (time_t)expiry < *qstate->env->now)) { 633 qstate->need_refetch = 1; 634 } 635 636 return 1; 637 } 638 639 /** 640 * Lookup the qstate.qinfo in extcache, store in qstate.return_msg. 641 * return true if lookup was successful. 642 */ 643 static int 644 cachedb_extcache_lookup(struct module_qstate* qstate, struct cachedb_env* ie, 645 int* msg_expired) 646 { 647 char key[(CACHEDB_HASHSIZE/8)*2+1]; 648 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 649 650 /* call backend to fetch data for key into scratch buffer */ 651 if( !(*ie->backend->lookup)(qstate->env, ie, key, 652 qstate->env->scratch_buffer)) { 653 return 0; 654 } 655 656 /* check expiry date and check if query-data matches */ 657 if( !good_expiry_and_qinfo(qstate, qstate->env->scratch_buffer) ) { 658 return 0; 659 } 660 661 /* parse dns message into return_msg */ 662 if( !parse_data(qstate, qstate->env->scratch_buffer, msg_expired) ) { 663 return 0; 664 } 665 return 1; 666 } 667 668 /** 669 * Store the qstate.return_msg in extcache for key qstate.info 670 */ 671 static void 672 cachedb_extcache_store(struct module_qstate* qstate, struct cachedb_env* ie) 673 { 674 char key[(CACHEDB_HASHSIZE/8)*2+1]; 675 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 676 677 /* prepare data in scratch buffer */ 678 if(!prep_data(qstate, qstate->env->scratch_buffer)) 679 return; 680 681 /* call backend */ 682 (*ie->backend->store)(qstate->env, ie, key, 683 sldns_buffer_begin(qstate->env->scratch_buffer), 684 sldns_buffer_limit(qstate->env->scratch_buffer), 685 qstate->return_msg->rep->ttl); 686 } 687 688 /** 689 * See if unbound's internal cache can answer the query 690 */ 691 static int 692 cachedb_intcache_lookup(struct module_qstate* qstate, struct cachedb_env* cde) 693 { 694 uint8_t dpname_storage[LDNS_MAX_DOMAINLEN+1]; 695 uint8_t* dpname=NULL; 696 size_t dpnamelen=0; 697 struct dns_msg* msg; 698 /* for testframe bypass this lookup */ 699 if(cde->backend == &testframe_backend) { 700 return 0; 701 } 702 if(iter_stub_fwd_no_cache(qstate, &qstate->qinfo, 703 &dpname, &dpnamelen, dpname_storage, sizeof(dpname_storage))) 704 return 0; /* no cache for these queries */ 705 msg = dns_cache_lookup(qstate->env, qstate->qinfo.qname, 706 qstate->qinfo.qname_len, qstate->qinfo.qtype, 707 qstate->qinfo.qclass, qstate->query_flags, 708 qstate->region, qstate->env->scratch, 709 1, /* no partial messages with only a CNAME */ 710 dpname, dpnamelen 711 ); 712 if(!msg && qstate->env->neg_cache && 713 iter_qname_indicates_dnssec(qstate->env, &qstate->qinfo)) { 714 /* lookup in negative cache; may result in 715 * NOERROR/NODATA or NXDOMAIN answers that need validation */ 716 msg = val_neg_getmsg(qstate->env->neg_cache, &qstate->qinfo, 717 qstate->region, qstate->env->rrset_cache, 718 qstate->env->scratch_buffer, 719 *qstate->env->now, 1/*add SOA*/, NULL, 720 qstate->env->cfg); 721 } 722 if(!msg) 723 return 0; 724 /* this is the returned msg */ 725 qstate->return_rcode = LDNS_RCODE_NOERROR; 726 qstate->return_msg = msg; 727 return 1; 728 } 729 730 /** 731 * Store query into the internal cache of unbound. 732 */ 733 static void 734 cachedb_intcache_store(struct module_qstate* qstate, int msg_expired) 735 { 736 uint32_t store_flags = qstate->query_flags; 737 int serve_expired = qstate->env->cfg->serve_expired; 738 739 if(qstate->env->cfg->serve_expired) 740 store_flags |= DNSCACHE_STORE_ZEROTTL; 741 if(!qstate->return_msg) 742 return; 743 if(serve_expired && msg_expired) { 744 /* Set TTLs to a value such that value + *env->now is 745 * going to be now-3 seconds. Making it expired 746 * in the cache. */ 747 set_msg_ttl(qstate->return_msg, (time_t)-3); 748 /* The expired entry does not get checked by the validator 749 * and we need a validation value for it. */ 750 if(qstate->env->cfg->cachedb_check_when_serve_expired) 751 qstate->return_msg->rep->security = sec_status_insecure; 752 } 753 (void)dns_cache_store(qstate->env, &qstate->qinfo, 754 qstate->return_msg->rep, 0, qstate->prefetch_leeway, 0, 755 qstate->region, store_flags, qstate->qstarttime); 756 if(serve_expired && msg_expired) { 757 if(qstate->env->cfg->serve_expired_client_timeout) { 758 /* No expired response from the query state, the 759 * query resolution needs to continue and it can 760 * pick up the expired result after the timer out 761 * of cache. */ 762 return; 763 } 764 /* set TTLs to zero again */ 765 adjust_msg_ttl(qstate->return_msg, -1); 766 /* Send serve expired responses based on the cachedb 767 * returned message, that was just stored in the cache. 768 * It can then continue to work on this query. */ 769 mesh_respond_serve_expired(qstate->mesh_info); 770 } 771 } 772 773 /** 774 * Handle a cachedb module event with a query 775 * @param qstate: query state (from the mesh), passed between modules. 776 * contains qstate->env module environment with global caches and so on. 777 * @param iq: query state specific for this module. per-query. 778 * @param ie: environment specific for this module. global. 779 * @param id: module id. 780 */ 781 static void 782 cachedb_handle_query(struct module_qstate* qstate, 783 struct cachedb_qstate* ATTR_UNUSED(iq), 784 struct cachedb_env* ie, int id) 785 { 786 int msg_expired = 0; 787 qstate->is_cachedb_answer = 0; 788 /* check if we are enabled, and skip if so */ 789 if(!ie->enabled) { 790 /* pass request to next module */ 791 qstate->ext_state[id] = module_wait_module; 792 return; 793 } 794 795 if(qstate->blacklist || qstate->no_cache_lookup) { 796 /* cache is blacklisted or we are instructed from edns to not look */ 797 /* pass request to next module */ 798 qstate->ext_state[id] = module_wait_module; 799 return; 800 } 801 802 /* lookup inside unbound's internal cache. 803 * This does not look for expired entries. */ 804 if(cachedb_intcache_lookup(qstate, ie)) { 805 if(verbosity >= VERB_ALGO) { 806 if(qstate->return_msg->rep) 807 log_dns_msg("cachedb internal cache lookup", 808 &qstate->return_msg->qinfo, 809 qstate->return_msg->rep); 810 else log_info("cachedb internal cache lookup: rcode %s", 811 sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode) 812 ?sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode)->name 813 :"??"); 814 } 815 /* we are done with the query */ 816 qstate->ext_state[id] = module_finished; 817 return; 818 } 819 820 /* ask backend cache to see if we have data */ 821 if(cachedb_extcache_lookup(qstate, ie, &msg_expired)) { 822 if(verbosity >= VERB_ALGO) 823 log_dns_msg(ie->backend->name, 824 &qstate->return_msg->qinfo, 825 qstate->return_msg->rep); 826 /* store this result in internal cache */ 827 cachedb_intcache_store(qstate, msg_expired); 828 /* In case we have expired data but there is a client timer for expired 829 * answers, pass execution to next module in order to try updating the 830 * data first. 831 * TODO: this needs revisit. The expired data stored from cachedb has 832 * 0 TTL which is picked up by iterator later when looking in the cache. 833 */ 834 if(qstate->env->cfg->serve_expired && msg_expired) { 835 qstate->return_msg = NULL; 836 qstate->ext_state[id] = module_wait_module; 837 /* The expired reply is sent with 838 * mesh_respond_serve_expired, and so 839 * the need_refetch is not used. */ 840 qstate->need_refetch = 0; 841 return; 842 } 843 if(qstate->need_refetch && qstate->serve_expired_data && 844 qstate->serve_expired_data->timer) { 845 qstate->return_msg = NULL; 846 qstate->ext_state[id] = module_wait_module; 847 return; 848 } 849 qstate->is_cachedb_answer = 1; 850 /* we are done with the query */ 851 qstate->ext_state[id] = module_finished; 852 return; 853 } 854 855 if(qstate->serve_expired_data && 856 qstate->env->cfg->cachedb_check_when_serve_expired && 857 !qstate->env->cfg->serve_expired_client_timeout) { 858 /* Reply with expired data if any to client, because cachedb 859 * also has no useful, current data */ 860 mesh_respond_serve_expired(qstate->mesh_info); 861 } 862 863 /* no cache fetches */ 864 /* pass request to next module */ 865 qstate->ext_state[id] = module_wait_module; 866 } 867 868 /** 869 * Handle a cachedb module event with a response from the iterator. 870 * @param qstate: query state (from the mesh), passed between modules. 871 * contains qstate->env module environment with global caches and so on. 872 * @param iq: query state specific for this module. per-query. 873 * @param ie: environment specific for this module. global. 874 * @param id: module id. 875 */ 876 static void 877 cachedb_handle_response(struct module_qstate* qstate, 878 struct cachedb_qstate* ATTR_UNUSED(iq), struct cachedb_env* ie, int id) 879 { 880 qstate->is_cachedb_answer = 0; 881 /* check if we are not enabled or instructed to not cache, and skip */ 882 if(!ie->enabled || qstate->no_cache_store) { 883 /* we are done with the query */ 884 qstate->ext_state[id] = module_finished; 885 return; 886 } 887 if(qstate->env->cfg->cachedb_no_store) { 888 /* do not store the item in the external cache */ 889 qstate->ext_state[id] = module_finished; 890 return; 891 } 892 893 /* store the item into the backend cache */ 894 cachedb_extcache_store(qstate, ie); 895 896 /* we are done with the query */ 897 qstate->ext_state[id] = module_finished; 898 } 899 900 void 901 cachedb_operate(struct module_qstate* qstate, enum module_ev event, int id, 902 struct outbound_entry* outbound) 903 { 904 struct cachedb_env* ie = (struct cachedb_env*)qstate->env->modinfo[id]; 905 struct cachedb_qstate* iq = (struct cachedb_qstate*)qstate->minfo[id]; 906 verbose(VERB_QUERY, "cachedb[module %d] operate: extstate:%s event:%s", 907 id, strextstate(qstate->ext_state[id]), strmodulevent(event)); 908 if(iq) log_query_info(VERB_QUERY, "cachedb operate: query", 909 &qstate->qinfo); 910 911 /* perform cachedb state machine */ 912 if((event == module_event_new || event == module_event_pass) && 913 iq == NULL) { 914 if(!cachedb_new(qstate, id)) { 915 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 916 return; 917 } 918 iq = (struct cachedb_qstate*)qstate->minfo[id]; 919 } 920 if(iq && (event == module_event_pass || event == module_event_new)) { 921 cachedb_handle_query(qstate, iq, ie, id); 922 return; 923 } 924 if(iq && (event == module_event_moddone)) { 925 cachedb_handle_response(qstate, iq, ie, id); 926 return; 927 } 928 if(iq && outbound) { 929 /* cachedb does not need to process responses at this time 930 * ignore it. 931 cachedb_process_response(qstate, iq, ie, id, outbound, event); 932 */ 933 return; 934 } 935 if(event == module_event_error) { 936 verbose(VERB_ALGO, "got called with event error, giving up"); 937 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 938 return; 939 } 940 if(!iq && (event == module_event_moddone)) { 941 /* during priming, module done but we never started */ 942 qstate->ext_state[id] = module_finished; 943 return; 944 } 945 946 log_err("bad event for cachedb"); 947 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 948 } 949 950 void 951 cachedb_inform_super(struct module_qstate* ATTR_UNUSED(qstate), 952 int ATTR_UNUSED(id), struct module_qstate* ATTR_UNUSED(super)) 953 { 954 /* cachedb does not use subordinate requests at this time */ 955 verbose(VERB_ALGO, "cachedb inform_super was called"); 956 } 957 958 void 959 cachedb_clear(struct module_qstate* qstate, int id) 960 { 961 struct cachedb_qstate* iq; 962 if(!qstate) 963 return; 964 iq = (struct cachedb_qstate*)qstate->minfo[id]; 965 if(iq) { 966 /* free contents of iq */ 967 /* TODO */ 968 } 969 qstate->minfo[id] = NULL; 970 } 971 972 size_t 973 cachedb_get_mem(struct module_env* env, int id) 974 { 975 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 976 if(!ie) 977 return 0; 978 return sizeof(*ie); /* TODO - more mem */ 979 } 980 981 /** 982 * The cachedb function block 983 */ 984 static struct module_func_block cachedb_block = { 985 "cachedb", 986 NULL, NULL, &cachedb_init, &cachedb_deinit, &cachedb_operate, 987 &cachedb_inform_super, &cachedb_clear, &cachedb_get_mem 988 }; 989 990 struct module_func_block* 991 cachedb_get_funcblock(void) 992 { 993 return &cachedb_block; 994 } 995 996 int 997 cachedb_is_enabled(struct module_stack* mods, struct module_env* env) 998 { 999 struct cachedb_env* ie; 1000 int id = modstack_find(mods, "cachedb"); 1001 if(id == -1) 1002 return 0; 1003 ie = (struct cachedb_env*)env->modinfo[id]; 1004 if(ie && ie->enabled) 1005 return 1; 1006 return 0; 1007 } 1008 1009 void cachedb_msg_remove(struct module_qstate* qstate) 1010 { 1011 cachedb_msg_remove_qinfo(qstate->env, &qstate->qinfo); 1012 } 1013 1014 void cachedb_msg_remove_qinfo(struct module_env* env, struct query_info* qinfo) 1015 { 1016 char key[(CACHEDB_HASHSIZE/8)*2+1]; 1017 int id = modstack_find(env->modstack, "cachedb"); 1018 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 1019 1020 log_query_info(VERB_ALGO, "cachedb msg remove", qinfo); 1021 calc_hash(qinfo, env, key, sizeof(key)); 1022 sldns_buffer_clear(env->scratch_buffer); 1023 sldns_buffer_write_u32(env->scratch_buffer, 0); 1024 sldns_buffer_flip(env->scratch_buffer); 1025 1026 /* call backend */ 1027 (*ie->backend->store)(env, ie, key, 1028 sldns_buffer_begin(env->scratch_buffer), 1029 sldns_buffer_limit(env->scratch_buffer), 1030 0); 1031 } 1032 #endif /* USE_CACHEDB */ 1033