mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-12-17 05:01:35 +03:00
7fab31beae
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master Closes #2508. Squashed commit of the following: commit 5b9d33f9cd352756831f63e34c4aea48674628c1 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 20 17:15:17 2021 +0300 util: replace net.IPNet with pointer commit 680126de7d59464077f9edf1bbaa925dd3fcee19 Merge: d3ba6a6c5a50efad
Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Jan 20 17:02:41 2021 +0300 Merge branch 'master' into 2508-ip-conversion-vol2 commit d3ba6a6cdd01c0aa736418fdb86ed40120169fe9 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 19 18:29:54 2021 +0300 all: remove last conversion commit 88b63f11a6c3f8705d7fa0c448c50dd646cc9214 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Jan 19 14:12:45 2021 +0300 all: improve code quality commit 71af60c70a0dbaf55e2221023d6d2e4993c9e9a7 Merge: 98af37849f75725d
Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 17:13:27 2021 +0300 Merge branch 'master' into 2508-ip-conversion-vol2 commit 98af3784ce44d0993d171653c13d6e83bb8d1e6a Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 16:32:53 2021 +0300 all: log changes commit e99595a172bae1e844019d344544be84ddd65e4e Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Jan 18 16:06:49 2021 +0300 all: fix or remove remaining net.IP <-> string conversions commit 7fd0634ce945f7e4c9b856684c5199f8a84a543e Author: Eugene Burkov <e.burkov@adguard.com> Date: Fri Jan 15 15:36:17 2021 +0300 all: remove redundant net.IP <-> string converions commit 5df8af030421237d41b67ed659f83526cc258199 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Jan 14 16:35:25 2021 +0300 stats: remove redundant net.IP <-> string conversion commit fbe4e3fc015e6898063543a90c04401d76dbb18f Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Jan 14 16:20:35 2021 +0300 querylog: remove redundant net.IP <-> string conversion
248 lines
5.2 KiB
Go
248 lines
5.2 KiB
Go
package home
|
|
|
|
import (
|
|
"context"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghio"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
|
|
|
"github.com/AdguardTeam/golibs/cache"
|
|
"github.com/AdguardTeam/golibs/log"
|
|
)
|
|
|
|
const (
|
|
defaultServer = "whois.arin.net"
|
|
defaultPort = "43"
|
|
maxValueLength = 250
|
|
whoisTTL = 1 * 60 * 60 // 1 hour
|
|
)
|
|
|
|
// Whois - module context
|
|
type Whois struct {
|
|
clients *clientsContainer
|
|
ipChan chan net.IP
|
|
timeoutMsec uint
|
|
|
|
// Contains IP addresses of clients
|
|
// An active IP address is resolved once again after it expires.
|
|
// If IP address couldn't be resolved, it stays here for some time to prevent further attempts to resolve the same IP.
|
|
ipAddrs cache.Cache
|
|
}
|
|
|
|
// Create module context
|
|
func initWhois(clients *clientsContainer) *Whois {
|
|
w := Whois{}
|
|
w.timeoutMsec = 5000
|
|
w.clients = clients
|
|
|
|
cconf := cache.Config{}
|
|
cconf.EnableLRU = true
|
|
cconf.MaxCount = 10000
|
|
w.ipAddrs = cache.New(cconf)
|
|
|
|
w.ipChan = make(chan net.IP, 255)
|
|
go w.workerLoop()
|
|
return &w
|
|
}
|
|
|
|
// If the value is too large - cut it and append "..."
|
|
func trimValue(s string) string {
|
|
if len(s) <= maxValueLength {
|
|
return s
|
|
}
|
|
return s[:maxValueLength-3] + "..."
|
|
}
|
|
|
|
// Parse plain-text data from the response
|
|
func whoisParse(data string) map[string]string {
|
|
m := map[string]string{}
|
|
descr := ""
|
|
netname := ""
|
|
for len(data) != 0 {
|
|
ln := util.SplitNext(&data, '\n')
|
|
if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' {
|
|
continue
|
|
}
|
|
|
|
kv := strings.SplitN(ln, ":", 2)
|
|
if len(kv) != 2 {
|
|
continue
|
|
}
|
|
k := strings.TrimSpace(kv[0])
|
|
k = strings.ToLower(k)
|
|
v := strings.TrimSpace(kv[1])
|
|
|
|
switch k {
|
|
case "org-name":
|
|
m["orgname"] = trimValue(v)
|
|
case "orgname":
|
|
fallthrough
|
|
case "city":
|
|
fallthrough
|
|
case "country":
|
|
m[k] = trimValue(v)
|
|
|
|
case "descr":
|
|
if len(descr) == 0 {
|
|
descr = v
|
|
}
|
|
case "netname":
|
|
netname = v
|
|
|
|
case "whois": // "whois: whois.arin.net"
|
|
m["whois"] = v
|
|
|
|
case "referralserver": // "ReferralServer: whois://whois.ripe.net"
|
|
if strings.HasPrefix(v, "whois://") {
|
|
m["whois"] = v[len("whois://"):]
|
|
}
|
|
}
|
|
}
|
|
|
|
// descr or netname -> orgname
|
|
_, ok := m["orgname"]
|
|
if !ok && len(descr) != 0 {
|
|
m["orgname"] = trimValue(descr)
|
|
} else if !ok && len(netname) != 0 {
|
|
m["orgname"] = trimValue(netname)
|
|
}
|
|
|
|
return m
|
|
}
|
|
|
|
// MaxConnReadSize is an upper limit in bytes for reading from net.Conn.
|
|
const MaxConnReadSize = 64 * 1024
|
|
|
|
// Send request to a server and receive the response
|
|
func (w *Whois) query(target, serverAddr string) (string, error) {
|
|
addr, _, _ := net.SplitHostPort(serverAddr)
|
|
if addr == "whois.arin.net" {
|
|
target = "n + " + target
|
|
}
|
|
conn, err := customDialContext(context.TODO(), "tcp", serverAddr)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer conn.Close()
|
|
|
|
connReadCloser, err := aghio.LimitReadCloser(conn, MaxConnReadSize)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer connReadCloser.Close()
|
|
|
|
_ = conn.SetReadDeadline(time.Now().Add(time.Duration(w.timeoutMsec) * time.Millisecond))
|
|
_, err = conn.Write([]byte(target + "\r\n"))
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// This use of ReadAll is now safe, because we limited the conn Reader.
|
|
data, err := ioutil.ReadAll(connReadCloser)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return string(data), nil
|
|
}
|
|
|
|
// Query WHOIS servers (handle redirects)
|
|
func (w *Whois) queryAll(target string) (string, error) {
|
|
server := net.JoinHostPort(defaultServer, defaultPort)
|
|
const maxRedirects = 5
|
|
for i := 0; i != maxRedirects; i++ {
|
|
resp, err := w.query(target, server)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
log.Debug("Whois: received response (%d bytes) from %s IP:%s", len(resp), server, target)
|
|
|
|
m := whoisParse(resp)
|
|
redir, ok := m["whois"]
|
|
if !ok {
|
|
return resp, nil
|
|
}
|
|
redir = strings.ToLower(redir)
|
|
|
|
_, _, err = net.SplitHostPort(redir)
|
|
if err != nil {
|
|
server = net.JoinHostPort(redir, defaultPort)
|
|
} else {
|
|
server = redir
|
|
}
|
|
|
|
log.Debug("Whois: redirected to %s IP:%s", redir, target)
|
|
}
|
|
return "", fmt.Errorf("whois: redirect loop")
|
|
}
|
|
|
|
// Request WHOIS information
|
|
func (w *Whois) process(ip net.IP) [][]string {
|
|
data := [][]string{}
|
|
resp, err := w.queryAll(ip.String())
|
|
if err != nil {
|
|
log.Debug("Whois: error: %s IP:%s", err, ip)
|
|
return data
|
|
}
|
|
|
|
log.Debug("Whois: IP:%s response: %d bytes", ip, len(resp))
|
|
|
|
m := whoisParse(resp)
|
|
|
|
keys := []string{"orgname", "country", "city"}
|
|
for _, k := range keys {
|
|
v, found := m[k]
|
|
if !found {
|
|
continue
|
|
}
|
|
pair := []string{k, v}
|
|
data = append(data, pair)
|
|
}
|
|
|
|
return data
|
|
}
|
|
|
|
// Begin - begin requesting WHOIS info
|
|
func (w *Whois) Begin(ip net.IP) {
|
|
now := uint64(time.Now().Unix())
|
|
expire := w.ipAddrs.Get([]byte(ip))
|
|
if len(expire) != 0 {
|
|
exp := binary.BigEndian.Uint64(expire)
|
|
if exp > now {
|
|
return
|
|
}
|
|
// TTL expired
|
|
}
|
|
expire = make([]byte, 8)
|
|
binary.BigEndian.PutUint64(expire, now+whoisTTL)
|
|
_ = w.ipAddrs.Set([]byte(ip), expire)
|
|
|
|
log.Debug("Whois: adding %s", ip)
|
|
select {
|
|
case w.ipChan <- ip:
|
|
//
|
|
default:
|
|
log.Debug("Whois: queue is full")
|
|
}
|
|
}
|
|
|
|
// Get IP address from channel; get WHOIS info; associate info with a client
|
|
func (w *Whois) workerLoop() {
|
|
for {
|
|
ip := <-w.ipChan
|
|
|
|
info := w.process(ip)
|
|
if len(info) == 0 {
|
|
continue
|
|
}
|
|
|
|
w.clients.SetWhoisInfo(ip, info)
|
|
}
|
|
}
|