1 /* 2 * cachedb/cachedb.c - cache from a database external to the program module 3 * 4 * Copyright (c) 2016, NLnet Labs. All rights reserved. 5 * 6 * This software is open source. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * Redistributions of source code must retain the above copyright notice, 13 * this list of conditions and the following disclaimer. 14 * 15 * Redistributions in binary form must reproduce the above copyright notice, 16 * this list of conditions and the following disclaimer in the documentation 17 * and/or other materials provided with the distribution. 18 * 19 * Neither the name of the NLNET LABS nor the names of its contributors may 20 * be used to endorse or promote products derived from this software without 21 * specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 /** 37 * \file 38 * 39 * This file contains a module that uses an external database to cache 40 * dns responses. 41 */ 42 43 #include "config.h" 44 #ifdef USE_CACHEDB 45 #include "cachedb/cachedb.h" 46 #include "cachedb/redis.h" 47 #include "util/regional.h" 48 #include "util/net_help.h" 49 #include "util/config_file.h" 50 #include "util/data/msgreply.h" 51 #include "util/data/msgencode.h" 52 #include "services/cache/dns.h" 53 #include "services/mesh.h" 54 #include "services/modstack.h" 55 #include "validator/val_neg.h" 56 #include "validator/val_secalgo.h" 57 #include "iterator/iter_utils.h" 58 #include "sldns/parseutil.h" 59 #include "sldns/wire2str.h" 60 #include "sldns/sbuffer.h" 61 62 /* header file for htobe64 */ 63 #ifdef HAVE_ENDIAN_H 64 # include <endian.h> 65 #endif 66 #ifdef HAVE_SYS_ENDIAN_H 67 # include <sys/endian.h> 68 #endif 69 70 #ifndef HAVE_HTOBE64 71 # ifdef HAVE_LIBKERN_OSBYTEORDER_H 72 /* In practice this is specific to MacOS X. We assume it doesn't have 73 * htobe64/be64toh but has alternatives with a different name. */ 74 # include <libkern/OSByteOrder.h> 75 # define htobe64(x) OSSwapHostToBigInt64(x) 76 # define be64toh(x) OSSwapBigToHostInt64(x) 77 # else 78 /* not OSX */ 79 /* Some compilers do not define __BYTE_ORDER__, like IBM XLC on AIX */ 80 # if __BIG_ENDIAN__ 81 # define be64toh(n) (n) 82 # define htobe64(n) (n) 83 # else 84 # define be64toh(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 85 # define htobe64(n) (((uint64_t)htonl((n) & 0xFFFFFFFF) << 32) | htonl((n) >> 32)) 86 # endif /* _ENDIAN */ 87 # endif /* HAVE_LIBKERN_OSBYTEORDER_H */ 88 #endif /* HAVE_BE64TOH */ 89 90 /** the unit test testframe for cachedb, its module state contains 91 * a cache for a couple queries (in memory). */ 92 struct testframe_moddata { 93 /** lock for mutex */ 94 lock_basic_type lock; 95 /** key for single stored data element, NULL if none */ 96 char* stored_key; 97 /** data for single stored data element, NULL if none */ 98 uint8_t* stored_data; 99 /** length of stored data */ 100 size_t stored_datalen; 101 }; 102 103 static int 104 testframe_init(struct module_env* env, struct cachedb_env* cachedb_env) 105 { 106 struct testframe_moddata* d; 107 verbose(VERB_ALGO, "testframe_init"); 108 d = (struct testframe_moddata*)calloc(1, 109 sizeof(struct testframe_moddata)); 110 cachedb_env->backend_data = (void*)d; 111 if(!cachedb_env->backend_data) { 112 log_err("out of memory"); 113 return 0; 114 } 115 /* Register an EDNS option (65534) to bypass the worker cache lookup 116 * for testing */ 117 if(!edns_register_option(LDNS_EDNS_UNBOUND_CACHEDB_TESTFRAME_TEST, 118 1 /* bypass cache */, 119 0 /* no aggregation */, env)) { 120 log_err("testframe_init, could not register test opcode"); 121 free(d); 122 return 0; 123 } 124 lock_basic_init(&d->lock); 125 lock_protect(&d->lock, d, sizeof(*d)); 126 return 1; 127 } 128 129 static void 130 testframe_deinit(struct module_env* env, struct cachedb_env* cachedb_env) 131 { 132 struct testframe_moddata* d = (struct testframe_moddata*) 133 cachedb_env->backend_data; 134 (void)env; 135 verbose(VERB_ALGO, "testframe_deinit"); 136 if(!d) 137 return; 138 lock_basic_destroy(&d->lock); 139 free(d->stored_key); 140 free(d->stored_data); 141 free(d); 142 } 143 144 static int 145 testframe_lookup(struct module_env* env, struct cachedb_env* cachedb_env, 146 char* key, struct sldns_buffer* result_buffer) 147 { 148 struct testframe_moddata* d = (struct testframe_moddata*) 149 cachedb_env->backend_data; 150 (void)env; 151 verbose(VERB_ALGO, "testframe_lookup of %s", key); 152 lock_basic_lock(&d->lock); 153 if(d->stored_key && strcmp(d->stored_key, key) == 0) { 154 if(d->stored_datalen > sldns_buffer_capacity(result_buffer)) { 155 lock_basic_unlock(&d->lock); 156 return 0; /* too large */ 157 } 158 verbose(VERB_ALGO, "testframe_lookup found %d bytes", 159 (int)d->stored_datalen); 160 sldns_buffer_clear(result_buffer); 161 sldns_buffer_write(result_buffer, d->stored_data, 162 d->stored_datalen); 163 sldns_buffer_flip(result_buffer); 164 lock_basic_unlock(&d->lock); 165 return 1; 166 } 167 lock_basic_unlock(&d->lock); 168 return 0; 169 } 170 171 static void 172 testframe_store(struct module_env* env, struct cachedb_env* cachedb_env, 173 char* key, uint8_t* data, size_t data_len, time_t ATTR_UNUSED(ttl)) 174 { 175 struct testframe_moddata* d = (struct testframe_moddata*) 176 cachedb_env->backend_data; 177 (void)env; 178 lock_basic_lock(&d->lock); 179 verbose(VERB_ALGO, "testframe_store %s (%d bytes)", key, (int)data_len); 180 181 /* free old data element (if any) */ 182 free(d->stored_key); 183 d->stored_key = NULL; 184 free(d->stored_data); 185 d->stored_data = NULL; 186 d->stored_datalen = 0; 187 188 d->stored_data = memdup(data, data_len); 189 if(!d->stored_data) { 190 lock_basic_unlock(&d->lock); 191 log_err("out of memory"); 192 return; 193 } 194 d->stored_datalen = data_len; 195 d->stored_key = strdup(key); 196 if(!d->stored_key) { 197 free(d->stored_data); 198 d->stored_data = NULL; 199 d->stored_datalen = 0; 200 lock_basic_unlock(&d->lock); 201 return; 202 } 203 lock_basic_unlock(&d->lock); 204 /* (key,data) successfully stored */ 205 } 206 207 /** The testframe backend is for unit tests */ 208 static struct cachedb_backend testframe_backend = { "testframe", 209 testframe_init, testframe_deinit, testframe_lookup, testframe_store 210 }; 211 212 /** find a particular backend from possible backends */ 213 static struct cachedb_backend* 214 cachedb_find_backend(const char* str) 215 { 216 #ifdef USE_REDIS 217 if(strcmp(str, redis_backend.name) == 0) 218 return &redis_backend; 219 #endif 220 if(strcmp(str, testframe_backend.name) == 0) 221 return &testframe_backend; 222 /* TODO add more backends here */ 223 return NULL; 224 } 225 226 /** apply configuration to cachedb module 'global' state */ 227 static int 228 cachedb_apply_cfg(struct cachedb_env* cachedb_env, struct config_file* cfg) 229 { 230 const char* backend_str = cfg->cachedb_backend; 231 if(!backend_str || *backend_str==0) 232 return 1; 233 cachedb_env->backend = cachedb_find_backend(backend_str); 234 if(!cachedb_env->backend) { 235 log_err("cachedb: cannot find backend name '%s'", backend_str); 236 return 0; 237 } 238 239 /* TODO see if more configuration needs to be applied or not */ 240 return 1; 241 } 242 243 int 244 cachedb_init(struct module_env* env, int id) 245 { 246 struct cachedb_env* cachedb_env = (struct cachedb_env*)calloc(1, 247 sizeof(struct cachedb_env)); 248 if(!cachedb_env) { 249 log_err("malloc failure"); 250 return 0; 251 } 252 env->modinfo[id] = (void*)cachedb_env; 253 if(!cachedb_apply_cfg(cachedb_env, env->cfg)) { 254 log_err("cachedb: could not apply configuration settings."); 255 free(cachedb_env); 256 env->modinfo[id] = NULL; 257 return 0; 258 } 259 /* see if a backend is selected */ 260 if(!cachedb_env->backend || !cachedb_env->backend->name) 261 return 1; 262 if(!(*cachedb_env->backend->init)(env, cachedb_env)) { 263 log_err("cachedb: could not init %s backend", 264 cachedb_env->backend->name); 265 free(cachedb_env); 266 env->modinfo[id] = NULL; 267 return 0; 268 } 269 cachedb_env->enabled = 1; 270 return 1; 271 } 272 273 void 274 cachedb_deinit(struct module_env* env, int id) 275 { 276 struct cachedb_env* cachedb_env; 277 if(!env || !env->modinfo[id]) 278 return; 279 cachedb_env = (struct cachedb_env*)env->modinfo[id]; 280 if(cachedb_env->enabled) { 281 (*cachedb_env->backend->deinit)(env, cachedb_env); 282 } 283 free(cachedb_env); 284 env->modinfo[id] = NULL; 285 } 286 287 /** new query for cachedb */ 288 static int 289 cachedb_new(struct module_qstate* qstate, int id) 290 { 291 struct cachedb_qstate* iq = (struct cachedb_qstate*)regional_alloc( 292 qstate->region, sizeof(struct cachedb_qstate)); 293 qstate->minfo[id] = iq; 294 if(!iq) 295 return 0; 296 memset(iq, 0, sizeof(*iq)); 297 /* initialise it */ 298 /* TODO */ 299 300 return 1; 301 } 302 303 /** 304 * Return an error 305 * @param qstate: our query state 306 * @param id: module id 307 * @param rcode: error code (DNS errcode). 308 * @return: 0 for use by caller, to make notation easy, like: 309 * return error_response(..). 310 */ 311 static int 312 error_response(struct module_qstate* qstate, int id, int rcode) 313 { 314 verbose(VERB_QUERY, "return error response %s", 315 sldns_lookup_by_id(sldns_rcodes, rcode)? 316 sldns_lookup_by_id(sldns_rcodes, rcode)->name:"??"); 317 qstate->return_rcode = rcode; 318 qstate->return_msg = NULL; 319 qstate->ext_state[id] = module_finished; 320 return 0; 321 } 322 323 /** 324 * Hash the query name, type, class and dbacess-secret into lookup buffer. 325 * @param qinfo: query info 326 * @param env: with env->cfg with secret. 327 * @param buf: returned buffer with hash to lookup 328 * @param len: length of the buffer. 329 */ 330 static void 331 calc_hash(struct query_info* qinfo, struct module_env* env, char* buf, 332 size_t len) 333 { 334 uint8_t clear[1024]; 335 size_t clen = 0; 336 uint8_t hash[CACHEDB_HASHSIZE/8]; 337 const char* hex = "0123456789ABCDEF"; 338 const char* secret = env->cfg->cachedb_secret; 339 size_t i; 340 341 /* copy the hash info into the clear buffer */ 342 if(clen + qinfo->qname_len < sizeof(clear)) { 343 memmove(clear+clen, qinfo->qname, qinfo->qname_len); 344 clen += qinfo->qname_len; 345 } 346 if(clen + 4 < sizeof(clear)) { 347 uint16_t t = htons(qinfo->qtype); 348 uint16_t c = htons(qinfo->qclass); 349 memmove(clear+clen, &t, 2); 350 memmove(clear+clen+2, &c, 2); 351 clen += 4; 352 } 353 if(secret && secret[0] && clen + strlen(secret) < sizeof(clear)) { 354 memmove(clear+clen, secret, strlen(secret)); 355 clen += strlen(secret); 356 } 357 358 /* hash the buffer */ 359 secalgo_hash_sha256(clear, clen, hash); 360 #ifdef HAVE_EXPLICIT_BZERO 361 explicit_bzero(clear, clen); 362 #else 363 memset(clear, 0, clen); 364 #endif 365 366 /* hex encode output for portability (some online dbs need 367 * no nulls, no control characters, and so on) */ 368 log_assert(len >= sizeof(hash)*2 + 1); 369 (void)len; 370 for(i=0; i<sizeof(hash); i++) { 371 buf[i*2] = hex[(hash[i]&0xf0)>>4]; 372 buf[i*2+1] = hex[hash[i]&0x0f]; 373 } 374 buf[sizeof(hash)*2] = 0; 375 } 376 377 /** convert data from return_msg into the data buffer */ 378 static int 379 prep_data(struct module_qstate* qstate, struct sldns_buffer* buf) 380 { 381 uint64_t timestamp, expiry; 382 size_t oldlim; 383 struct edns_data edns; 384 memset(&edns, 0, sizeof(edns)); 385 edns.edns_present = 1; 386 edns.bits = EDNS_DO; 387 edns.ext_rcode = 0; 388 edns.edns_version = EDNS_ADVERTISED_VERSION; 389 edns.udp_size = EDNS_ADVERTISED_SIZE; 390 391 if(!qstate->return_msg || !qstate->return_msg->rep) 392 return 0; 393 /* do not store failures like SERVFAIL in the cachedb, this avoids 394 * overwriting expired, valid, content with broken content. */ 395 if(FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 396 LDNS_RCODE_NOERROR && 397 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 398 LDNS_RCODE_NXDOMAIN && 399 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) != 400 LDNS_RCODE_YXDOMAIN) 401 return 0; 402 /* We don't store the reply if its TTL is 0 unless serve-expired is 403 * enabled. Such a reply won't be reusable and simply be a waste for 404 * the backend. It's also compatible with the default behavior of 405 * dns_cache_store_msg(). */ 406 if(qstate->return_msg->rep->ttl == 0 && 407 !qstate->env->cfg->serve_expired) 408 return 0; 409 410 /* The EDE is added to the out-list so it is encoded in the cached message */ 411 if (qstate->env->cfg->ede && qstate->return_msg->rep->reason_bogus != LDNS_EDE_NONE) { 412 edns_opt_list_append_ede(&edns.opt_list_out, qstate->env->scratch, 413 qstate->return_msg->rep->reason_bogus, 414 qstate->return_msg->rep->reason_bogus_str); 415 } 416 417 if(verbosity >= VERB_ALGO) 418 log_dns_msg("cachedb encoding", &qstate->return_msg->qinfo, 419 qstate->return_msg->rep); 420 if(!reply_info_answer_encode(&qstate->return_msg->qinfo, 421 qstate->return_msg->rep, 0, qstate->query_flags, 422 buf, 0, 1, qstate->env->scratch, 65535, &edns, 1, 0)) 423 return 0; 424 425 /* TTLs in the return_msg are relative to time(0) so we have to 426 * store that, we also store the smallest ttl in the packet+time(0) 427 * as the packet expiry time */ 428 /* qstate->return_msg->rep->ttl contains that relative shortest ttl */ 429 timestamp = (uint64_t)*qstate->env->now; 430 expiry = timestamp + (uint64_t)qstate->return_msg->rep->ttl; 431 timestamp = htobe64(timestamp); 432 expiry = htobe64(expiry); 433 oldlim = sldns_buffer_limit(buf); 434 if(oldlim + sizeof(timestamp)+sizeof(expiry) >= 435 sldns_buffer_capacity(buf)) 436 return 0; /* doesn't fit. */ 437 sldns_buffer_set_limit(buf, oldlim + sizeof(timestamp)+sizeof(expiry)); 438 sldns_buffer_write_at(buf, oldlim, ×tamp, sizeof(timestamp)); 439 sldns_buffer_write_at(buf, oldlim+sizeof(timestamp), &expiry, 440 sizeof(expiry)); 441 442 return 1; 443 } 444 445 /** check expiry, return true if matches OK */ 446 static int 447 good_expiry_and_qinfo(struct module_qstate* qstate, struct sldns_buffer* buf) 448 { 449 uint64_t expiry; 450 /* the expiry time is the last bytes of the buffer */ 451 if(sldns_buffer_limit(buf) < sizeof(expiry)) 452 return 0; 453 sldns_buffer_read_at(buf, sldns_buffer_limit(buf)-sizeof(expiry), 454 &expiry, sizeof(expiry)); 455 expiry = be64toh(expiry); 456 457 /* Check if we are allowed to return expired entries: 458 * - serve_expired needs to be set 459 * - if SERVE_EXPIRED_TTL is set make sure that the record is not older 460 * than that. */ 461 if((time_t)expiry < *qstate->env->now && 462 (!qstate->env->cfg->serve_expired || 463 (SERVE_EXPIRED_TTL && 464 *qstate->env->now - (time_t)expiry > SERVE_EXPIRED_TTL))) 465 return 0; 466 467 return 1; 468 } 469 470 /* Adjust the TTL of the given RRset by 'subtract'. If 'subtract' is 471 * negative, set the TTL to 0. */ 472 static void 473 packed_rrset_ttl_subtract(struct packed_rrset_data* data, time_t subtract) 474 { 475 size_t i; 476 size_t total = data->count + data->rrsig_count; 477 if(subtract >= 0 && data->ttl > subtract) 478 data->ttl -= subtract; 479 else data->ttl = 0; 480 for(i=0; i<total; i++) { 481 if(subtract >= 0 && data->rr_ttl[i] > subtract) 482 data->rr_ttl[i] -= subtract; 483 else data->rr_ttl[i] = 0; 484 } 485 data->ttl_add = (subtract < data->ttl_add) ? (data->ttl_add - subtract) : 0; 486 } 487 488 /* Adjust the TTL of a DNS message and its RRs by 'adjust'. If 'adjust' is 489 * negative, set the TTLs to 0. */ 490 static void 491 adjust_msg_ttl(struct dns_msg* msg, time_t adjust) 492 { 493 size_t i; 494 if(adjust >= 0 && msg->rep->ttl > adjust) 495 msg->rep->ttl -= adjust; 496 else 497 msg->rep->ttl = 0; 498 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 499 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 500 501 for(i=0; i<msg->rep->rrset_count; i++) { 502 packed_rrset_ttl_subtract((struct packed_rrset_data*)msg-> 503 rep->rrsets[i]->entry.data, adjust); 504 } 505 } 506 507 /* Set the TTL of the given RRset to fixed value. */ 508 static void 509 packed_rrset_ttl_set(struct packed_rrset_data* data, time_t ttl) 510 { 511 size_t i; 512 size_t total = data->count + data->rrsig_count; 513 data->ttl = ttl; 514 for(i=0; i<total; i++) { 515 data->rr_ttl[i] = ttl; 516 } 517 data->ttl_add = 0; 518 } 519 520 /* Set the TTL of a DNS message and its RRs by to a fixed value. */ 521 static void 522 set_msg_ttl(struct dns_msg* msg, time_t ttl) 523 { 524 size_t i; 525 msg->rep->ttl = ttl; 526 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); 527 msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; 528 529 for(i=0; i<msg->rep->rrset_count; i++) { 530 packed_rrset_ttl_set((struct packed_rrset_data*)msg-> 531 rep->rrsets[i]->entry.data, ttl); 532 } 533 } 534 535 /** convert dns message in buffer to return_msg */ 536 static int 537 parse_data(struct module_qstate* qstate, struct sldns_buffer* buf, 538 int* msg_expired) 539 { 540 struct msg_parse* prs; 541 struct edns_data edns; 542 struct edns_option* ede; 543 uint64_t timestamp, expiry; 544 time_t adjust; 545 size_t lim = sldns_buffer_limit(buf); 546 if(lim < LDNS_HEADER_SIZE+sizeof(timestamp)+sizeof(expiry)) 547 return 0; /* too short */ 548 549 /* remove timestamp and expiry from end */ 550 sldns_buffer_read_at(buf, lim-sizeof(expiry), &expiry, sizeof(expiry)); 551 sldns_buffer_read_at(buf, lim-sizeof(expiry)-sizeof(timestamp), 552 ×tamp, sizeof(timestamp)); 553 expiry = be64toh(expiry); 554 timestamp = be64toh(timestamp); 555 556 /* parse DNS packet */ 557 regional_free_all(qstate->env->scratch); 558 prs = (struct msg_parse*)regional_alloc(qstate->env->scratch, 559 sizeof(struct msg_parse)); 560 if(!prs) 561 return 0; /* out of memory */ 562 memset(prs, 0, sizeof(*prs)); 563 memset(&edns, 0, sizeof(edns)); 564 sldns_buffer_set_limit(buf, lim - sizeof(expiry)-sizeof(timestamp)); 565 if(parse_packet(buf, prs, qstate->env->scratch) != LDNS_RCODE_NOERROR) { 566 sldns_buffer_set_limit(buf, lim); 567 return 0; 568 } 569 if(parse_extract_edns_from_response_msg(prs, &edns, qstate->env->scratch) != 570 LDNS_RCODE_NOERROR) { 571 sldns_buffer_set_limit(buf, lim); 572 return 0; 573 } 574 575 qstate->return_msg = dns_alloc_msg(buf, prs, qstate->region); 576 sldns_buffer_set_limit(buf, lim); 577 if(!qstate->return_msg) 578 return 0; 579 580 /* We find the EDE in the in-list after parsing */ 581 if(qstate->env->cfg->ede && 582 (ede = edns_opt_list_find(edns.opt_list_in, LDNS_EDNS_EDE))) { 583 if(ede->opt_len >= 2) { 584 qstate->return_msg->rep->reason_bogus = 585 sldns_read_uint16(ede->opt_data); 586 } 587 /* allocate space and store the error string and it's size */ 588 if(ede->opt_len > 2) { 589 size_t ede_len = ede->opt_len - 2; 590 qstate->return_msg->rep->reason_bogus_str = regional_alloc( 591 qstate->region, sizeof(char) * (ede_len+1)); 592 memcpy(qstate->return_msg->rep->reason_bogus_str, 593 ede->opt_data+2, ede_len); 594 qstate->return_msg->rep->reason_bogus_str[ede_len] = 0; 595 } 596 } 597 598 qstate->return_rcode = LDNS_RCODE_NOERROR; 599 600 /* see how much of the TTL expired, and remove it */ 601 if(*qstate->env->now <= (time_t)timestamp) { 602 verbose(VERB_ALGO, "cachedb msg adjust by zero"); 603 return 1; /* message from the future (clock skew?) */ 604 } 605 adjust = *qstate->env->now - (time_t)timestamp; 606 if(qstate->return_msg->rep->ttl < adjust) { 607 verbose(VERB_ALGO, "cachedb msg expired"); 608 *msg_expired = 1; 609 /* If serve-expired is enabled, we still use an expired message 610 * setting the TTL to 0. */ 611 if(!qstate->env->cfg->serve_expired || 612 (FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 613 != LDNS_RCODE_NOERROR && 614 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 615 != LDNS_RCODE_NXDOMAIN && 616 FLAGS_GET_RCODE(qstate->return_msg->rep->flags) 617 != LDNS_RCODE_YXDOMAIN)) 618 return 0; /* message expired */ 619 else 620 adjust = -1; 621 } 622 verbose(VERB_ALGO, "cachedb msg adjusted down by %d", (int)adjust); 623 adjust_msg_ttl(qstate->return_msg, adjust); 624 if(qstate->env->cfg->aggressive_nsec) { 625 limit_nsec_ttl(qstate->return_msg); 626 } 627 628 /* Similar to the unbound worker, if serve-expired is enabled and 629 * the msg would be considered to be expired, mark the state so a 630 * refetch will be scheduled. The comparison between 'expiry' and 631 * 'now' should be redundant given how these values were calculated, 632 * but we check it just in case as does good_expiry_and_qinfo(). */ 633 if(qstate->env->cfg->serve_expired && 634 !qstate->env->cfg->serve_expired_client_timeout && 635 (adjust == -1 || (time_t)expiry < *qstate->env->now)) { 636 qstate->need_refetch = 1; 637 } 638 639 return 1; 640 } 641 642 /** 643 * Lookup the qstate.qinfo in extcache, store in qstate.return_msg. 644 * return true if lookup was successful. 645 */ 646 static int 647 cachedb_extcache_lookup(struct module_qstate* qstate, struct cachedb_env* ie, 648 int* msg_expired) 649 { 650 char key[(CACHEDB_HASHSIZE/8)*2+1]; 651 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 652 653 /* call backend to fetch data for key into scratch buffer */ 654 if( !(*ie->backend->lookup)(qstate->env, ie, key, 655 qstate->env->scratch_buffer)) { 656 return 0; 657 } 658 659 /* check expiry date and check if query-data matches */ 660 if( !good_expiry_and_qinfo(qstate, qstate->env->scratch_buffer) ) { 661 return 0; 662 } 663 664 /* parse dns message into return_msg */ 665 if( !parse_data(qstate, qstate->env->scratch_buffer, msg_expired) ) { 666 return 0; 667 } 668 return 1; 669 } 670 671 /** 672 * Store the qstate.return_msg in extcache for key qstate.info 673 */ 674 static void 675 cachedb_extcache_store(struct module_qstate* qstate, struct cachedb_env* ie) 676 { 677 char key[(CACHEDB_HASHSIZE/8)*2+1]; 678 calc_hash(&qstate->qinfo, qstate->env, key, sizeof(key)); 679 680 /* prepare data in scratch buffer */ 681 if(!prep_data(qstate, qstate->env->scratch_buffer)) 682 return; 683 684 /* call backend */ 685 (*ie->backend->store)(qstate->env, ie, key, 686 sldns_buffer_begin(qstate->env->scratch_buffer), 687 sldns_buffer_limit(qstate->env->scratch_buffer), 688 qstate->return_msg->rep->ttl); 689 } 690 691 /** 692 * See if unbound's internal cache can answer the query 693 */ 694 static int 695 cachedb_intcache_lookup(struct module_qstate* qstate, struct cachedb_env* cde) 696 { 697 uint8_t dpname_storage[LDNS_MAX_DOMAINLEN+1]; 698 uint8_t* dpname=NULL; 699 size_t dpnamelen=0; 700 struct dns_msg* msg; 701 /* for testframe bypass this lookup */ 702 if(cde->backend == &testframe_backend) { 703 return 0; 704 } 705 if(iter_stub_fwd_no_cache(qstate, &qstate->qinfo, 706 &dpname, &dpnamelen, dpname_storage, sizeof(dpname_storage))) 707 return 0; /* no cache for these queries */ 708 msg = dns_cache_lookup(qstate->env, qstate->qinfo.qname, 709 qstate->qinfo.qname_len, qstate->qinfo.qtype, 710 qstate->qinfo.qclass, qstate->query_flags, 711 qstate->region, qstate->env->scratch, 712 1, /* no partial messages with only a CNAME */ 713 dpname, dpnamelen 714 ); 715 if(!msg && qstate->env->neg_cache && 716 iter_qname_indicates_dnssec(qstate->env, &qstate->qinfo)) { 717 /* lookup in negative cache; may result in 718 * NOERROR/NODATA or NXDOMAIN answers that need validation */ 719 msg = val_neg_getmsg(qstate->env->neg_cache, &qstate->qinfo, 720 qstate->region, qstate->env->rrset_cache, 721 qstate->env->scratch_buffer, 722 *qstate->env->now, 1/*add SOA*/, NULL, 723 qstate->env->cfg); 724 } 725 if(!msg) 726 return 0; 727 /* this is the returned msg */ 728 qstate->return_rcode = LDNS_RCODE_NOERROR; 729 qstate->return_msg = msg; 730 return 1; 731 } 732 733 /** 734 * Store query into the internal cache of unbound. 735 */ 736 static void 737 cachedb_intcache_store(struct module_qstate* qstate, int msg_expired) 738 { 739 uint32_t store_flags = qstate->query_flags; 740 int serve_expired = qstate->env->cfg->serve_expired; 741 742 if(qstate->env->cfg->serve_expired) 743 store_flags |= DNSCACHE_STORE_ZEROTTL; 744 if(!qstate->return_msg) 745 return; 746 if(serve_expired && msg_expired) { 747 /* Set TTLs to a value such that value + *env->now is 748 * going to be now-3 seconds. Making it expired 749 * in the cache. */ 750 set_msg_ttl(qstate->return_msg, (time_t)-3); 751 /* The expired entry does not get checked by the validator 752 * and we need a validation value for it. */ 753 if(qstate->env->cfg->cachedb_check_when_serve_expired) 754 qstate->return_msg->rep->security = sec_status_insecure; 755 } 756 (void)dns_cache_store(qstate->env, &qstate->qinfo, 757 qstate->return_msg->rep, 0, qstate->prefetch_leeway, 0, 758 qstate->region, store_flags, qstate->qstarttime); 759 if(serve_expired && msg_expired) { 760 if(qstate->env->cfg->serve_expired_client_timeout) { 761 /* No expired response from the query state, the 762 * query resolution needs to continue and it can 763 * pick up the expired result after the timer out 764 * of cache. */ 765 return; 766 } 767 /* set TTLs to zero again */ 768 adjust_msg_ttl(qstate->return_msg, -1); 769 /* Send serve expired responses based on the cachedb 770 * returned message, that was just stored in the cache. 771 * It can then continue to work on this query. */ 772 mesh_respond_serve_expired(qstate->mesh_info); 773 } 774 } 775 776 /** 777 * Handle a cachedb module event with a query 778 * @param qstate: query state (from the mesh), passed between modules. 779 * contains qstate->env module environment with global caches and so on. 780 * @param iq: query state specific for this module. per-query. 781 * @param ie: environment specific for this module. global. 782 * @param id: module id. 783 */ 784 static void 785 cachedb_handle_query(struct module_qstate* qstate, 786 struct cachedb_qstate* ATTR_UNUSED(iq), 787 struct cachedb_env* ie, int id) 788 { 789 int msg_expired = 0; 790 qstate->is_cachedb_answer = 0; 791 /* check if we are enabled, and skip if so */ 792 if(!ie->enabled) { 793 /* pass request to next module */ 794 qstate->ext_state[id] = module_wait_module; 795 return; 796 } 797 798 if(qstate->blacklist || qstate->no_cache_lookup) { 799 /* cache is blacklisted or we are instructed from edns to not look */ 800 /* pass request to next module */ 801 qstate->ext_state[id] = module_wait_module; 802 return; 803 } 804 805 /* lookup inside unbound's internal cache. 806 * This does not look for expired entries. */ 807 if(cachedb_intcache_lookup(qstate, ie)) { 808 if(verbosity >= VERB_ALGO) { 809 if(qstate->return_msg->rep) 810 log_dns_msg("cachedb internal cache lookup", 811 &qstate->return_msg->qinfo, 812 qstate->return_msg->rep); 813 else log_info("cachedb internal cache lookup: rcode %s", 814 sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode) 815 ?sldns_lookup_by_id(sldns_rcodes, qstate->return_rcode)->name 816 :"??"); 817 } 818 /* we are done with the query */ 819 qstate->ext_state[id] = module_finished; 820 return; 821 } 822 823 /* ask backend cache to see if we have data */ 824 if(cachedb_extcache_lookup(qstate, ie, &msg_expired)) { 825 if(verbosity >= VERB_ALGO) 826 log_dns_msg(ie->backend->name, 827 &qstate->return_msg->qinfo, 828 qstate->return_msg->rep); 829 /* store this result in internal cache */ 830 cachedb_intcache_store(qstate, msg_expired); 831 /* In case we have expired data but there is a client timer for expired 832 * answers, pass execution to next module in order to try updating the 833 * data first. 834 */ 835 if(qstate->env->cfg->serve_expired && msg_expired) { 836 qstate->return_msg = NULL; 837 qstate->ext_state[id] = module_wait_module; 838 /* The expired reply is sent with 839 * mesh_respond_serve_expired, and so 840 * the need_refetch is not used. */ 841 qstate->need_refetch = 0; 842 return; 843 } 844 if(qstate->need_refetch && qstate->serve_expired_data && 845 qstate->serve_expired_data->timer) { 846 qstate->return_msg = NULL; 847 qstate->ext_state[id] = module_wait_module; 848 return; 849 } 850 qstate->is_cachedb_answer = 1; 851 /* we are done with the query */ 852 qstate->ext_state[id] = module_finished; 853 return; 854 } 855 856 if(qstate->serve_expired_data && 857 qstate->env->cfg->cachedb_check_when_serve_expired && 858 !qstate->env->cfg->serve_expired_client_timeout) { 859 /* Reply with expired data if any to client, because cachedb 860 * also has no useful, current data */ 861 mesh_respond_serve_expired(qstate->mesh_info); 862 } 863 864 /* no cache fetches */ 865 /* pass request to next module */ 866 qstate->ext_state[id] = module_wait_module; 867 } 868 869 /** 870 * Handle a cachedb module event with a response from the iterator. 871 * @param qstate: query state (from the mesh), passed between modules. 872 * contains qstate->env module environment with global caches and so on. 873 * @param iq: query state specific for this module. per-query. 874 * @param ie: environment specific for this module. global. 875 * @param id: module id. 876 */ 877 static void 878 cachedb_handle_response(struct module_qstate* qstate, 879 struct cachedb_qstate* ATTR_UNUSED(iq), struct cachedb_env* ie, int id) 880 { 881 qstate->is_cachedb_answer = 0; 882 /* check if we are not enabled or instructed to not cache, and skip */ 883 if(!ie->enabled || qstate->no_cache_store) { 884 /* we are done with the query */ 885 qstate->ext_state[id] = module_finished; 886 return; 887 } 888 if(qstate->env->cfg->cachedb_no_store) { 889 /* do not store the item in the external cache */ 890 qstate->ext_state[id] = module_finished; 891 return; 892 } 893 894 /* store the item into the backend cache */ 895 cachedb_extcache_store(qstate, ie); 896 897 /* we are done with the query */ 898 qstate->ext_state[id] = module_finished; 899 } 900 901 void 902 cachedb_operate(struct module_qstate* qstate, enum module_ev event, int id, 903 struct outbound_entry* outbound) 904 { 905 struct cachedb_env* ie = (struct cachedb_env*)qstate->env->modinfo[id]; 906 struct cachedb_qstate* iq = (struct cachedb_qstate*)qstate->minfo[id]; 907 verbose(VERB_QUERY, "cachedb[module %d] operate: extstate:%s event:%s", 908 id, strextstate(qstate->ext_state[id]), strmodulevent(event)); 909 if(iq) log_query_info(VERB_QUERY, "cachedb operate: query", 910 &qstate->qinfo); 911 912 /* perform cachedb state machine */ 913 if((event == module_event_new || event == module_event_pass) && 914 iq == NULL) { 915 if(!cachedb_new(qstate, id)) { 916 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 917 return; 918 } 919 iq = (struct cachedb_qstate*)qstate->minfo[id]; 920 } 921 if(iq && (event == module_event_pass || event == module_event_new)) { 922 cachedb_handle_query(qstate, iq, ie, id); 923 return; 924 } 925 if(iq && (event == module_event_moddone)) { 926 cachedb_handle_response(qstate, iq, ie, id); 927 return; 928 } 929 if(iq && outbound) { 930 /* cachedb does not need to process responses at this time 931 * ignore it. 932 cachedb_process_response(qstate, iq, ie, id, outbound, event); 933 */ 934 return; 935 } 936 if(event == module_event_error) { 937 verbose(VERB_ALGO, "got called with event error, giving up"); 938 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 939 return; 940 } 941 if(!iq && (event == module_event_moddone)) { 942 /* during priming, module done but we never started */ 943 qstate->ext_state[id] = module_finished; 944 return; 945 } 946 947 log_err("bad event for cachedb"); 948 (void)error_response(qstate, id, LDNS_RCODE_SERVFAIL); 949 } 950 951 void 952 cachedb_inform_super(struct module_qstate* ATTR_UNUSED(qstate), 953 int ATTR_UNUSED(id), struct module_qstate* ATTR_UNUSED(super)) 954 { 955 /* cachedb does not use subordinate requests at this time */ 956 verbose(VERB_ALGO, "cachedb inform_super was called"); 957 } 958 959 void 960 cachedb_clear(struct module_qstate* qstate, int id) 961 { 962 struct cachedb_qstate* iq; 963 if(!qstate) 964 return; 965 iq = (struct cachedb_qstate*)qstate->minfo[id]; 966 if(iq) { 967 /* free contents of iq */ 968 /* TODO */ 969 } 970 qstate->minfo[id] = NULL; 971 } 972 973 size_t 974 cachedb_get_mem(struct module_env* env, int id) 975 { 976 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 977 if(!ie) 978 return 0; 979 return sizeof(*ie); /* TODO - more mem */ 980 } 981 982 /** 983 * The cachedb function block 984 */ 985 static struct module_func_block cachedb_block = { 986 "cachedb", 987 NULL, NULL, &cachedb_init, &cachedb_deinit, &cachedb_operate, 988 &cachedb_inform_super, &cachedb_clear, &cachedb_get_mem 989 }; 990 991 struct module_func_block* 992 cachedb_get_funcblock(void) 993 { 994 return &cachedb_block; 995 } 996 997 int 998 cachedb_is_enabled(struct module_stack* mods, struct module_env* env) 999 { 1000 struct cachedb_env* ie; 1001 int id = modstack_find(mods, "cachedb"); 1002 if(id == -1) 1003 return 0; 1004 ie = (struct cachedb_env*)env->modinfo[id]; 1005 if(ie && ie->enabled) 1006 return 1; 1007 return 0; 1008 } 1009 1010 void cachedb_msg_remove(struct module_qstate* qstate) 1011 { 1012 cachedb_msg_remove_qinfo(qstate->env, &qstate->qinfo); 1013 } 1014 1015 void cachedb_msg_remove_qinfo(struct module_env* env, struct query_info* qinfo) 1016 { 1017 char key[(CACHEDB_HASHSIZE/8)*2+1]; 1018 int id = modstack_find(env->modstack, "cachedb"); 1019 struct cachedb_env* ie = (struct cachedb_env*)env->modinfo[id]; 1020 1021 log_query_info(VERB_ALGO, "cachedb msg remove", qinfo); 1022 calc_hash(qinfo, env, key, sizeof(key)); 1023 sldns_buffer_clear(env->scratch_buffer); 1024 sldns_buffer_write_u32(env->scratch_buffer, 0); 1025 sldns_buffer_flip(env->scratch_buffer); 1026 1027 /* call backend */ 1028 (*ie->backend->store)(env, ie, key, 1029 sldns_buffer_begin(env->scratch_buffer), 1030 sldns_buffer_limit(env->scratch_buffer), 1031 0); 1032 } 1033 #endif /* USE_CACHEDB */ 1034