xref: /illumos-gate/usr/src/contrib/mDNSResponder/mDNSCore/DNSCommon.h (revision 472cd20d26008f77084ade4c2048159b98c2b705)
1 /* -*- Mode: C; tab-width: 4 -*-
2  *
3  * Copyright (c) 2002-2020 Apple Inc. All rights reserved.
4  *
5  * Licensed under the Apache License, Version 2.0 (the "License");
6  * you may not use this file except in compliance with the License.
7  * You may obtain a copy of the License at
8  *
9  *     http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17 
18 #ifndef __DNSCOMMON_H_
19 #define __DNSCOMMON_H_
20 
21 #include "mDNSEmbeddedAPI.h"
22 
23 #ifdef  __cplusplus
24 extern "C" {
25 #endif
26 
27 //*************************************************************************************************************
28 // Macros
29 
30 // Note: The C preprocessor stringify operator ('#') makes a string from its argument, without macro expansion
31 // e.g. If "version" is #define'd to be "4", then STRINGIFY_AWE(version) will return the string "version", not "4"
32 // To expand "version" to its value before making the string, use STRINGIFY(version) instead
33 #define STRINGIFY_ARGUMENT_WITHOUT_EXPANSION(s) # s
34 #define STRINGIFY(s) STRINGIFY_ARGUMENT_WITHOUT_EXPANSION(s)
35 
36 // ***************************************************************************
37 #if COMPILER_LIKES_PRAGMA_MARK
38 #pragma mark - DNS Protocol Constants
39 #endif
40 
41 typedef enum
42 {
43     kDNSFlag0_QR_Mask        = 0x80,    // Query or response?
44     kDNSFlag0_QR_Query       = 0x00,
45     kDNSFlag0_QR_Response    = 0x80,
46 
47     kDNSFlag0_OP_Mask        = 0xF << 3, // Operation type
48     kDNSFlag0_OP_StdQuery    = 0x0 << 3,
49     kDNSFlag0_OP_Iquery      = 0x1 << 3,
50     kDNSFlag0_OP_Status      = 0x2 << 3,
51     kDNSFlag0_OP_Unused3     = 0x3 << 3,
52     kDNSFlag0_OP_Notify      = 0x4 << 3,
53     kDNSFlag0_OP_Update      = 0x5 << 3,
54     kDNSFlag0_OP_DSO         = 0x6 << 3,
55 
56     kDNSFlag0_QROP_Mask   = kDNSFlag0_QR_Mask | kDNSFlag0_OP_Mask,
57 
58     kDNSFlag0_AA          = 0x04,       // Authoritative Answer?
59     kDNSFlag0_TC          = 0x02,       // Truncated?
60     kDNSFlag0_RD          = 0x01,       // Recursion Desired?
61     kDNSFlag1_RA          = 0x80,       // Recursion Available?
62 
63     kDNSFlag1_Zero        = 0x40,       // Reserved; must be zero
64     kDNSFlag1_AD          = 0x20,       // Authentic Data [RFC 2535]
65     kDNSFlag1_CD          = 0x10,       // Checking Disabled [RFC 2535]
66 
67     kDNSFlag1_RC_Mask     = 0x0F,       // Response code
68     kDNSFlag1_RC_NoErr    = 0x00,
69     kDNSFlag1_RC_FormErr  = 0x01,
70     kDNSFlag1_RC_ServFail = 0x02,
71     kDNSFlag1_RC_NXDomain = 0x03,
72     kDNSFlag1_RC_NotImpl  = 0x04,
73     kDNSFlag1_RC_Refused  = 0x05,
74     kDNSFlag1_RC_YXDomain = 0x06,
75     kDNSFlag1_RC_YXRRSet  = 0x07,
76     kDNSFlag1_RC_NXRRSet  = 0x08,
77     kDNSFlag1_RC_NotAuth  = 0x09,
78     kDNSFlag1_RC_NotZone  = 0x0A,
79 	kDNSFlag1_RC_DSOTypeNI = 0x0B
80 } DNS_Flags;
81 
82 typedef enum
83 {
84     TSIG_ErrBadSig  = 16,
85     TSIG_ErrBadKey  = 17,
86     TSIG_ErrBadTime = 18
87 } TSIG_ErrorCode;
88 
89 
90 // ***************************************************************************
91 #if COMPILER_LIKES_PRAGMA_MARK
92 #pragma mark -
93 #pragma mark - General Utility Functions
94 #endif
95 
96 extern NetworkInterfaceInfo *GetFirstActiveInterface(NetworkInterfaceInfo *intf);
97 extern mDNSInterfaceID GetNextActiveInterfaceID(const NetworkInterfaceInfo *intf);
98 
99 extern mDNSu32 mDNSRandom(mDNSu32 max);     // Returns pseudo-random result from zero to max inclusive
100 
101 #if !MDNSRESPONDER_SUPPORTS(APPLE, QUERIER)
102 extern mDNSu32 mDNS_GetNextResolverGroupID(void);
103 #endif
104 
105 // ***************************************************************************
106 #if COMPILER_LIKES_PRAGMA_MARK
107 #pragma mark -
108 #pragma mark - Domain Name Utility Functions
109 #endif
110 
111 #define mDNSSubTypeLabel   "\x04_sub"
112 
113 #define mDNSIsDigit(X)     ((X) >= '0' && (X) <= '9')
114 #define mDNSIsUpperCase(X) ((X) >= 'A' && (X) <= 'Z')
115 #define mDNSIsLowerCase(X) ((X) >= 'a' && (X) <= 'z')
116 #define mDNSIsLetter(X)    (mDNSIsUpperCase(X) || mDNSIsLowerCase(X))
117 
118 // We believe we have adequate safeguards to protect against cache poisoning.
119 // In the event that someone does find a workable cache poisoning attack, we want to limit the lifetime of the poisoned entry.
120 // We set the maximum allowable TTL to one hour.
121 // With the 25% correction factor to avoid the DNS Zeno's paradox bug, that gives us an actual maximum lifetime of 75 minutes.
122 
123 #define mDNSMaximumMulticastTTLSeconds  (mDNSu32)4500
124 #define mDNSMaximumUnicastTTLSeconds    (mDNSu32)3600
125 
126 #define mDNSValidHostChar(X, notfirst, notlast) (mDNSIsLetter(X) || mDNSIsDigit(X) || ((notfirst) && (notlast) && (X) == '-') )
127 
128 extern mDNSu16 CompressedDomainNameLength(const domainname *const name, const domainname *parent);
129 extern int CountLabels(const domainname *d);
130 extern const domainname *SkipLeadingLabels(const domainname *d, int skip);
131 
132 extern mDNSu32 TruncateUTF8ToLength(mDNSu8 *string, mDNSu32 length, mDNSu32 max);
133 extern mDNSBool LabelContainsSuffix(const domainlabel *const name, const mDNSBool RichText);
134 extern mDNSu32 RemoveLabelSuffix(domainlabel *name, mDNSBool RichText);
135 extern void AppendLabelSuffix(domainlabel *const name, mDNSu32 val, const mDNSBool RichText);
136 #define ValidateDomainName(N) (DomainNameLength(N) <= MAX_DOMAIN_NAME)
137 
138 // ***************************************************************************
139 #if COMPILER_LIKES_PRAGMA_MARK
140 #pragma mark -
141 #pragma mark - Resource Record Utility Functions
142 #endif
143 
144 // IdenticalResourceRecord returns true if two resources records have
145 // the same name, type, class, and identical rdata (InterfaceID and TTL may differ)
146 
147 // IdenticalSameNameRecord is the same, except it skips the expensive SameDomainName() check,
148 // which is at its most expensive and least useful in cases where we know in advance that the names match
149 
150 // Note: The dominant use of IdenticalResourceRecord is from ProcessQuery(), handling known-answer lists. In this case
151 // it's common to have a whole bunch or records with exactly the same name (e.g. "_http._tcp.local") but different RDATA.
152 // The SameDomainName() check is expensive when the names match, and in this case *all* the names match, so we
153 // used to waste a lot of CPU time verifying that the names match, only then to find that the RDATA is different.
154 // We observed mDNSResponder spending 30% of its total CPU time on this single task alone.
155 // By swapping the checks so that we check the RDATA first, we can quickly detect when it's different
156 // (99% of the time) and then bail out before we waste time on the expensive SameDomainName() check.
157 
158 #define IdenticalResourceRecord(r1,r2) ( \
159         (r1)->rrtype    == (r2)->rrtype      && \
160         (r1)->rrclass   == (r2)->rrclass     && \
161         (r1)->namehash  == (r2)->namehash    && \
162         (r1)->rdlength  == (r2)->rdlength    && \
163         (r1)->rdatahash == (r2)->rdatahash   && \
164         SameRDataBody((r1), &(r2)->rdata->u, SameDomainName) && \
165         SameDomainName((r1)->name, (r2)->name))
166 
167 #define IdenticalSameNameRecord(r1,r2) ( \
168         (r1)->rrtype    == (r2)->rrtype      && \
169         (r1)->rrclass   == (r2)->rrclass     && \
170         (r1)->rdlength  == (r2)->rdlength    && \
171         (r1)->rdatahash == (r2)->rdatahash   && \
172         SameRDataBody((r1), &(r2)->rdata->u, SameDomainName))
173 
174 // A given RRType answers a QuestionType if RRType is CNAME, or types match, or QuestionType is ANY,
175 // or the RRType is NSEC and positively asserts the nonexistence of the type being requested
176 #define RRTypeAnswersQuestionType(R,Q) ((R)->rrtype == kDNSType_CNAME || (R)->rrtype == (Q) || (Q) == kDNSQType_ANY || RRAssertsNonexistence((R),(Q)))
177 // Unicast NSEC records have the NSEC bit set whereas the multicast NSEC ones don't
178 #define UNICAST_NSEC(rr) ((rr)->rrtype == kDNSType_NSEC && RRAssertsExistence((rr), kDNSType_NSEC))
179 
180 extern mDNSu32 RDataHashValue(const ResourceRecord *const rr);
181 extern mDNSBool SameRDataBody(const ResourceRecord *const r1, const RDataBody *const r2, DomainNameComparisonFn *samename);
182 extern mDNSBool SameNameCacheRecordAnswersQuestion(const CacheRecord *const cr, const DNSQuestion *const q);
183 extern mDNSBool ResourceRecordAnswersQuestion(const ResourceRecord *const rr, const DNSQuestion *const q);
184 extern mDNSBool AuthRecordAnswersQuestion(const AuthRecord *const ar, const DNSQuestion *const q);
185 extern mDNSBool CacheRecordAnswersQuestion(const CacheRecord *const cr, const DNSQuestion *const q);
186 extern mDNSBool AnyTypeRecordAnswersQuestion (const AuthRecord *const ar, const DNSQuestion *const q);
187 extern mDNSBool ResourceRecordAnswersUnicastResponse(const ResourceRecord *const rr, const DNSQuestion *const q);
188 extern mDNSBool LocalOnlyRecordAnswersQuestion(AuthRecord *const rr, const DNSQuestion *const q);
189 extern mDNSu16 GetRDLength(const ResourceRecord *const rr, mDNSBool estimate);
190 extern mDNSBool ValidateRData(const mDNSu16 rrtype, const mDNSu16 rdlength, const RData *const rd);
191 extern mStatus DNSNameToLowerCase(domainname *d, domainname *result);
192 
193 #define GetRRDomainNameTarget(RR) (                                                                          \
194         ((RR)->rrtype == kDNSType_NS || (RR)->rrtype == kDNSType_CNAME || (RR)->rrtype == kDNSType_PTR || (RR)->rrtype == kDNSType_DNAME) ? &(RR)->rdata->u.name        : \
195         ((RR)->rrtype == kDNSType_MX || (RR)->rrtype == kDNSType_AFSDB || (RR)->rrtype == kDNSType_RT  || (RR)->rrtype == kDNSType_KX   ) ? &(RR)->rdata->u.mx.exchange : \
196         ((RR)->rrtype == kDNSType_SRV                                  ) ? &(RR)->rdata->u.srv.target : mDNSNULL )
197 
198 #define LocalRecordReady(X) ((X)->resrec.RecordType != kDNSRecordTypeUnique)
199 
200 // ***************************************************************************
201 #if COMPILER_LIKES_PRAGMA_MARK
202 #pragma mark -
203 #pragma mark - DNS Message Creation Functions
204 #endif
205 
206 extern void InitializeDNSMessage(DNSMessageHeader *h, mDNSOpaque16 id, mDNSOpaque16 flags);
207 extern const mDNSu8 *FindCompressionPointer(const mDNSu8 *const base, const mDNSu8 *const end, const mDNSu8 *const domname);
208 extern mDNSu8 *putDomainNameAsLabels(const DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const domainname *const name);
209 extern mDNSu8 *putRData(const DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const ResourceRecord *const rr);
210 
211 // If we have a single large record to put in the packet, then we allow the packet to be up to 9K bytes,
212 // but in the normal case we try to keep the packets below 1500 to avoid IP fragmentation on standard Ethernet
213 
214 #define AllowedRRSpace(msg) (((msg)->h.numAnswers || (msg)->h.numAuthorities || (msg)->h.numAdditionals) ? NormalMaxDNSMessageData : AbsoluteMaxDNSMessageData)
215 
216 extern mDNSu8 *PutResourceRecordTTLWithLimit(DNSMessage *const msg, mDNSu8 *ptr, mDNSu16 *count, const ResourceRecord *rr,
217     mDNSu32 ttl, const mDNSu8 *limit);
218 
219 #define PutResourceRecordTTL(msg, ptr, count, rr, ttl) \
220     PutResourceRecordTTLWithLimit((msg), (ptr), (count), (rr), (ttl), (msg)->data + AllowedRRSpace(msg))
221 
222 #define PutResourceRecordTTLJumbo(msg, ptr, count, rr, ttl) \
223     PutResourceRecordTTLWithLimit((msg), (ptr), (count), (rr), (ttl), (msg)->data + AbsoluteMaxDNSMessageData)
224 
225 #define PutResourceRecord(MSG, P, C, RR) PutResourceRecordTTL((MSG), (P), (C), (RR), (RR)->rroriginalttl)
226 
227 // The PutRR_OS variants assume a local variable 'm', put build the packet at m->omsg,
228 // and assume local variables 'OwnerRecordSpace' & 'TraceRecordSpace' indicating how many bytes (if any) to reserve to add an OWNER/TRACER option at the end
229 #define PutRR_OS_TTL(ptr, count, rr, ttl) \
230     PutResourceRecordTTLWithLimit(&m->omsg, (ptr), (count), (rr), (ttl), m->omsg.data + AllowedRRSpace(&m->omsg) - OwnerRecordSpace - TraceRecordSpace)
231 
232 #define PutRR_OS(P, C, RR) PutRR_OS_TTL((P), (C), (RR), (RR)->rroriginalttl)
233 
234 extern mDNSu8 *putQuestion(DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const domainname *const name, mDNSu16 rrtype, mDNSu16 rrclass);
235 extern mDNSu8 *putZone(DNSMessage *const msg, mDNSu8 *ptr, mDNSu8 *limit, const domainname *zone, mDNSOpaque16 zoneClass);
236 extern mDNSu8 *putPrereqNameNotInUse(const domainname *const name, DNSMessage *const msg, mDNSu8 *const ptr, mDNSu8 *const end);
237 extern mDNSu8 *putDeletionRecord(DNSMessage *msg, mDNSu8 *ptr, ResourceRecord *rr);
238 extern mDNSu8 *putDeletionRecordWithLimit(DNSMessage *msg, mDNSu8 *ptr, ResourceRecord *rr, mDNSu8 *limit);
239 extern mDNSu8 *putDeleteRRSetWithLimit(DNSMessage *msg, mDNSu8 *ptr, const domainname *name, mDNSu16 rrtype, mDNSu8 *limit);
240 extern mDNSu8 *putDeleteAllRRSets(DNSMessage *msg, mDNSu8 *ptr, const domainname *name);
241 extern mDNSu8 *putUpdateLease(DNSMessage *msg, mDNSu8 *ptr, mDNSu32 lease);
242 extern mDNSu8 *putUpdateLeaseWithLimit(DNSMessage *msg, mDNSu8 *ptr, mDNSu32 lease, mDNSu8 *limit);
243 
244 extern int baseEncode(char *buffer, int blen, const mDNSu8 *data, int len, int encAlg);
245 extern void NSEC3Parse(const ResourceRecord *const rr, mDNSu8 **salt, int *hashLength, mDNSu8 **nxtName, int *bitmaplen, mDNSu8 **bitmap);
246 
247 // ***************************************************************************
248 #if COMPILER_LIKES_PRAGMA_MARK
249 #pragma mark -
250 #pragma mark - DNS Message Parsing Functions
251 #endif
252 
253 #define HashSlotFromNameHash(X) ((X) % CACHE_HASH_SLOTS)
254 extern mDNSu32 DomainNameHashValue(const domainname *const name);
255 extern void SetNewRData(ResourceRecord *const rr, RData *NewRData, mDNSu16 rdlength);
256 extern const mDNSu8 *skipDomainName(const DNSMessage *const msg, const mDNSu8 *ptr, const mDNSu8 *const end);
257 extern const mDNSu8 *getDomainName(const DNSMessage *const msg, const mDNSu8 *ptr, const mDNSu8 *const end,
258                                    domainname *const name);
259 extern const mDNSu8 *skipResourceRecord(const DNSMessage *msg, const mDNSu8 *ptr, const mDNSu8 *end);
260 extern const mDNSu8 *GetLargeResourceRecord(mDNS *const m, const DNSMessage * const msg, const mDNSu8 *ptr,
261                                             const mDNSu8 * end, const mDNSInterfaceID InterfaceID, mDNSu8 RecordType, LargeCacheRecord *const largecr);
262 extern mDNSBool SetRData(const DNSMessage *const msg, const mDNSu8 *ptr, const mDNSu8 *end, ResourceRecord *rr,
263     mDNSu16 rdlength);
264 extern const mDNSu8 *skipQuestion(const DNSMessage *msg, const mDNSu8 *ptr, const mDNSu8 *end);
265 extern const mDNSu8 *getQuestion(const DNSMessage *msg, const mDNSu8 *ptr, const mDNSu8 *end, const mDNSInterfaceID InterfaceID,
266                                  DNSQuestion *question);
267 extern const mDNSu8 *LocateAnswers(const DNSMessage *const msg, const mDNSu8 *const end);
268 extern const mDNSu8 *LocateAuthorities(const DNSMessage *const msg, const mDNSu8 *const end);
269 extern const mDNSu8 *LocateAdditionals(const DNSMessage *const msg, const mDNSu8 *const end);
270 extern const mDNSu8 *LocateOptRR(const DNSMessage *const msg, const mDNSu8 *const end, int minsize);
271 extern const rdataOPT *GetLLQOptData(mDNS *const m, const DNSMessage *const msg, const mDNSu8 *const end);
272 extern mDNSBool GetPktLease(mDNS *const m, const DNSMessage *const msg, const mDNSu8 *const end, mDNSu32 *const lease);
273 extern void DumpPacket(mStatus status, mDNSBool sent, const char *transport, const mDNSAddr *srcaddr, mDNSIPPort srcport,
274     const mDNSAddr *dstaddr, mDNSIPPort dstport, const DNSMessage *const msg, const mDNSu8 *const end,
275     mDNSInterfaceID interfaceID);
276 extern mDNSBool RRAssertsNonexistence(const ResourceRecord *const rr, mDNSu16 type);
277 extern mDNSBool RRAssertsExistence(const ResourceRecord *const rr, mDNSu16 type);
278 extern mDNSBool BitmapTypeCheck(mDNSu8 *bmap, int bitmaplen, mDNSu16 type);
279 
280 extern mDNSu16 swap16(mDNSu16 x);
281 extern mDNSu32 swap32(mDNSu32 x);
282 
283 extern mDNSBool GetReverseIPv6Addr(const domainname *inQName, mDNSu8 outIPv6[16]);
284 
285 // ***************************************************************************
286 #if COMPILER_LIKES_PRAGMA_MARK
287 #pragma mark -
288 #pragma mark - Packet Sending Functions
289 #endif
290 extern mStatus mDNSSendDNSMessage(mDNS *const m, DNSMessage *const msg, mDNSu8 *end,
291                                   mDNSInterfaceID InterfaceID, TCPSocket *tcpSrc, UDPSocket *udpSrc, const mDNSAddr *dst,
292                                   mDNSIPPort dstport, DomainAuthInfo *authInfo, mDNSBool useBackgroundTrafficClass);
293 
294 // ***************************************************************************
295 #if COMPILER_LIKES_PRAGMA_MARK
296 #pragma mark -
297 #pragma mark - RR List Management & Task Management
298 #endif
299 
300 extern void ShowTaskSchedulingError(mDNS *const m);
301 extern void mDNS_Lock_(mDNS *const m, const char * const functionname);
302 extern void mDNS_Unlock_(mDNS *const m, const char * const functionname);
303 
304 #if defined(_WIN32)
305  #define __func__ __FUNCTION__
306 #endif
307 
308 #define mDNS_Lock(X) mDNS_Lock_((X), __func__)
309 
310 #define mDNS_Unlock(X) mDNS_Unlock_((X), __func__)
311 
312 #define mDNS_CheckLock(X) \
313     if ((X)->mDNS_busy != (X)->mDNS_reentrancy+1) LogMsg("%s: Lock not held! mDNS_busy (%ld) mDNS_reentrancy (%ld)", __func__, (X)->mDNS_busy, (X)->mDNS_reentrancy)
314 
315 #define mDNS_DropLockBeforeCallback() do { m->mDNS_reentrancy++; \
316     if (m->mDNS_busy != m->mDNS_reentrancy) LogMsg("%s: Locking Failure! mDNS_busy (%ld) != mDNS_reentrancy (%ld)", __func__, m->mDNS_busy, m->mDNS_reentrancy); \
317     } while (0)
318 
319 #define mDNS_ReclaimLockAfterCallback() do { \
320     if (m->mDNS_busy != m->mDNS_reentrancy) LogMsg("%s: Unlocking Failure! mDNS_busy (%ld) != mDNS_reentrancy (%ld)", __func__, m->mDNS_busy, m->mDNS_reentrancy); \
321     m->mDNS_reentrancy--; } while (0)
322 
323 #ifdef  __cplusplus
324 }
325 #endif
326 
327 #endif // __DNSCOMMON_H_
328