282 lines
11 KiB
C++
282 lines
11 KiB
C++
/*
|
|
* Copyright (C) 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#include <array>
|
|
#include <list>
|
|
#include <map>
|
|
#include <mutex>
|
|
#include <vector>
|
|
|
|
#include <android-base/format.h>
|
|
#include <android-base/logging.h>
|
|
#include <android-base/result.h>
|
|
#include <android-base/thread_annotations.h>
|
|
#include <netdutils/BackoffSequence.h>
|
|
#include <netdutils/DumpWriter.h>
|
|
#include <netdutils/InternetAddresses.h>
|
|
#include <netdutils/Slice.h>
|
|
|
|
#include "DnsTlsServer.h"
|
|
#include "LockedQueue.h"
|
|
#include "PrivateDnsValidationObserver.h"
|
|
#include "doh.h"
|
|
|
|
namespace android {
|
|
namespace net {
|
|
|
|
// TODO: decouple the dependency of DnsTlsServer.
|
|
struct PrivateDnsStatus {
|
|
PrivateDnsMode mode;
|
|
|
|
// TODO: change the type to std::vector<DnsTlsServer>.
|
|
std::map<DnsTlsServer, Validation, AddressComparator> dotServersMap;
|
|
|
|
std::map<netdutils::IPSockAddr, Validation> dohServersMap;
|
|
|
|
std::list<DnsTlsServer> validatedServers() const {
|
|
std::list<DnsTlsServer> servers;
|
|
|
|
for (const auto& pair : dotServersMap) {
|
|
if (pair.second == Validation::success) {
|
|
servers.push_back(pair.first);
|
|
}
|
|
}
|
|
return servers;
|
|
}
|
|
|
|
bool hasValidatedDohServers() const {
|
|
for (const auto& [_, status] : dohServersMap) {
|
|
if (status == Validation::success) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
};
|
|
|
|
class PrivateDnsConfiguration {
|
|
public:
|
|
static constexpr int kDohQueryDefaultTimeoutMs = 30000;
|
|
static constexpr int kDohProbeDefaultTimeoutMs = 60000;
|
|
|
|
// The default value for QUIC max_idle_timeout.
|
|
static constexpr int kDohIdleDefaultTimeoutMs = 55000;
|
|
|
|
struct ServerIdentity {
|
|
const netdutils::IPSockAddr sockaddr;
|
|
const std::string provider;
|
|
|
|
explicit ServerIdentity(const IPrivateDnsServer& server)
|
|
: sockaddr(server.addr()), provider(server.provider()) {}
|
|
ServerIdentity(const netdutils::IPSockAddr& addr, const std::string& host)
|
|
: sockaddr(addr), provider(host) {}
|
|
|
|
bool operator<(const ServerIdentity& other) const {
|
|
return std::tie(sockaddr, provider) < std::tie(other.sockaddr, other.provider);
|
|
}
|
|
bool operator==(const ServerIdentity& other) const {
|
|
return std::tie(sockaddr, provider) == std::tie(other.sockaddr, other.provider);
|
|
}
|
|
};
|
|
|
|
// The only instance of PrivateDnsConfiguration.
|
|
static PrivateDnsConfiguration& getInstance() {
|
|
static PrivateDnsConfiguration instance;
|
|
return instance;
|
|
}
|
|
|
|
int set(int32_t netId, uint32_t mark, const std::vector<std::string>& servers,
|
|
const std::string& name, const std::string& caCert) EXCLUDES(mPrivateDnsLock);
|
|
|
|
void initDoh() EXCLUDES(mPrivateDnsLock);
|
|
|
|
int setDoh(int32_t netId, uint32_t mark, const std::vector<std::string>& servers,
|
|
const std::string& name, const std::string& caCert) EXCLUDES(mPrivateDnsLock);
|
|
|
|
PrivateDnsStatus getStatus(unsigned netId) const EXCLUDES(mPrivateDnsLock);
|
|
|
|
void clear(unsigned netId) EXCLUDES(mPrivateDnsLock);
|
|
|
|
void clearDoh(unsigned netId) EXCLUDES(mPrivateDnsLock);
|
|
|
|
ssize_t dohQuery(unsigned netId, const netdutils::Slice query, const netdutils::Slice answer,
|
|
uint64_t timeoutMs) EXCLUDES(mPrivateDnsLock);
|
|
|
|
// Request the server to be revalidated on a connection tagged with |mark|.
|
|
// Returns a Result to indicate if the request is accepted.
|
|
base::Result<void> requestValidation(unsigned netId, const ServerIdentity& identity,
|
|
uint32_t mark) EXCLUDES(mPrivateDnsLock);
|
|
|
|
void setObserver(PrivateDnsValidationObserver* observer);
|
|
|
|
void dump(netdutils::DumpWriter& dw) const;
|
|
|
|
void onDohStatusUpdate(uint32_t netId, bool success, const char* ipAddr, const char* host)
|
|
EXCLUDES(mPrivateDnsLock);
|
|
|
|
base::Result<netdutils::IPSockAddr> getDohServer(unsigned netId) const
|
|
EXCLUDES(mPrivateDnsLock);
|
|
|
|
private:
|
|
typedef std::map<ServerIdentity, std::unique_ptr<IPrivateDnsServer>> PrivateDnsTracker;
|
|
|
|
PrivateDnsConfiguration() = default;
|
|
|
|
// Launchs a thread to run the validation for |server| on the network |netId|.
|
|
// |isRevalidation| is true if this call is due to a revalidation request.
|
|
void startValidation(const ServerIdentity& identity, unsigned netId, bool isRevalidation)
|
|
REQUIRES(mPrivateDnsLock);
|
|
|
|
bool recordPrivateDnsValidation(const ServerIdentity& identity, unsigned netId, bool success,
|
|
bool isRevalidation) EXCLUDES(mPrivateDnsLock);
|
|
|
|
void sendPrivateDnsValidationEvent(const ServerIdentity& identity, unsigned netId,
|
|
bool success) const REQUIRES(mPrivateDnsLock);
|
|
|
|
// Decide if a validation for |server| is needed. Note that servers that have failed
|
|
// multiple validation attempts but for which there is still a validating
|
|
// thread running are marked as being Validation::in_process.
|
|
bool needsValidation(const IPrivateDnsServer& server) const REQUIRES(mPrivateDnsLock);
|
|
|
|
void updateServerState(const ServerIdentity& identity, Validation state, uint32_t netId)
|
|
REQUIRES(mPrivateDnsLock);
|
|
|
|
// For testing.
|
|
base::Result<IPrivateDnsServer*> getPrivateDns(const ServerIdentity& identity, unsigned netId)
|
|
EXCLUDES(mPrivateDnsLock);
|
|
|
|
base::Result<IPrivateDnsServer*> getPrivateDnsLocked(const ServerIdentity& identity,
|
|
unsigned netId) REQUIRES(mPrivateDnsLock);
|
|
|
|
void initDohLocked() REQUIRES(mPrivateDnsLock);
|
|
void clearDohLocked(unsigned netId) REQUIRES(mPrivateDnsLock);
|
|
|
|
mutable std::mutex mPrivateDnsLock;
|
|
std::map<unsigned, PrivateDnsMode> mPrivateDnsModes GUARDED_BY(mPrivateDnsLock);
|
|
|
|
// Contains all servers for a network, along with their current validation status.
|
|
// In case a server is removed due to a configuration change, it remains in this map,
|
|
// but is marked inactive.
|
|
// Any pending validation threads will continue running because we have no way to cancel them.
|
|
std::map<unsigned, PrivateDnsTracker> mPrivateDnsTransports GUARDED_BY(mPrivateDnsLock);
|
|
|
|
void notifyValidationStateUpdate(const netdutils::IPSockAddr& sockaddr, Validation validation,
|
|
uint32_t netId) const REQUIRES(mPrivateDnsLock);
|
|
|
|
bool needReportEvent(uint32_t netId, ServerIdentity identity, bool success) const
|
|
REQUIRES(mPrivateDnsLock);
|
|
|
|
// TODO: fix the reentrancy problem.
|
|
PrivateDnsValidationObserver* mObserver GUARDED_BY(mPrivateDnsLock);
|
|
|
|
DohDispatcher* mDohDispatcher;
|
|
|
|
friend class PrivateDnsConfigurationTest;
|
|
|
|
// It's not const because PrivateDnsConfigurationTest needs to override it.
|
|
// TODO: make it const by dependency injection.
|
|
netdutils::BackoffSequence<>::Builder mBackoffBuilder =
|
|
netdutils::BackoffSequence<>::Builder()
|
|
.withInitialRetransmissionTime(std::chrono::seconds(60))
|
|
.withMaximumRetransmissionTime(std::chrono::seconds(3600));
|
|
|
|
struct DohIdentity {
|
|
std::string httpsTemplate;
|
|
std::string ipAddr;
|
|
std::string host;
|
|
Validation status;
|
|
bool operator<(const DohIdentity& other) const {
|
|
return std::tie(ipAddr, host) < std::tie(other.ipAddr, other.host);
|
|
}
|
|
bool operator==(const DohIdentity& other) const {
|
|
return std::tie(ipAddr, host) == std::tie(other.ipAddr, other.host);
|
|
}
|
|
bool operator<(const ServerIdentity& other) const {
|
|
std::string otherIp = other.sockaddr.ip().toString();
|
|
return std::tie(ipAddr, host) < std::tie(otherIp, other.provider);
|
|
}
|
|
bool operator==(const ServerIdentity& other) const {
|
|
std::string otherIp = other.sockaddr.ip().toString();
|
|
return std::tie(ipAddr, host) == std::tie(otherIp, other.provider);
|
|
}
|
|
};
|
|
|
|
struct DohProviderEntry {
|
|
std::string provider;
|
|
std::set<std::string> ips;
|
|
std::string host;
|
|
std::string httpsTemplate;
|
|
bool requireRootPermission;
|
|
base::Result<DohIdentity> getDohIdentity(const std::vector<std::string>& ips,
|
|
const std::string& host) const {
|
|
if (!host.empty() && this->host != host) return Errorf("host {} not matched", host);
|
|
for (const auto& ip : ips) {
|
|
if (this->ips.find(ip) == this->ips.end()) continue;
|
|
LOG(INFO) << fmt::format("getDohIdentity: {} {}", ip, host);
|
|
// Only pick the first one for now.
|
|
return DohIdentity{httpsTemplate, ip, host, Validation::in_process};
|
|
}
|
|
return Errorf("server not matched");
|
|
};
|
|
};
|
|
|
|
// TODO: Move below DoH relevant stuff into Rust implementation.
|
|
std::map<unsigned, DohIdentity> mDohTracker GUARDED_BY(mPrivateDnsLock);
|
|
std::array<DohProviderEntry, 4> mAvailableDoHProviders = {{
|
|
{"Google",
|
|
{"2001:4860:4860::8888", "2001:4860:4860::8844", "8.8.8.8", "8.8.4.4"},
|
|
"dns.google",
|
|
"https://dns.google/dns-query",
|
|
false},
|
|
{"Cloudflare",
|
|
{"2606:4700::6810:f8f9", "2606:4700::6810:f9f9", "104.16.248.249", "104.16.249.249"},
|
|
"cloudflare-dns.com",
|
|
"https://cloudflare-dns.com/dns-query",
|
|
false},
|
|
|
|
// The DoH providers for testing only.
|
|
// Using ResolverTestProvider requires that the DnsResolver is configured by someone
|
|
// who has root permission, which should be run by tests only.
|
|
{"ResolverTestProvider",
|
|
{"127.0.0.3", "::1"},
|
|
"example.com",
|
|
"https://example.com/dns-query",
|
|
true},
|
|
{"AndroidTesting",
|
|
{"192.0.2.100"},
|
|
"dns.androidtesting.org",
|
|
"https://dns.androidtesting.org/dns-query",
|
|
false},
|
|
}};
|
|
|
|
struct RecordEntry {
|
|
RecordEntry(uint32_t netId, const ServerIdentity& identity, Validation state)
|
|
: netId(netId), serverIdentity(identity), state(state) {}
|
|
|
|
const uint32_t netId;
|
|
const ServerIdentity serverIdentity;
|
|
const Validation state;
|
|
const std::chrono::system_clock::time_point timestamp = std::chrono::system_clock::now();
|
|
};
|
|
|
|
LockedRingBuffer<RecordEntry> mPrivateDnsLog{100};
|
|
};
|
|
|
|
} // namespace net
|
|
} // namespace android
|