mirror of
https://github.com/mjl-/mox.git
synced 2025-07-12 18:24:35 +03:00
implement dnssec-awareness throughout code, and dane for incoming/outgoing mail delivery
the vendored dns resolver code is a copy of the go stdlib dns resolver, with awareness of the "authentic data" (i.e. dnssec secure) added, as well as support for enhanced dns errors, and looking up tlsa records (for dane). ideally it would be upstreamed, but the chances seem slim. dnssec-awareness is added to all packages, e.g. spf, dkim, dmarc, iprev. their dnssec status is added to the Received message headers for incoming email. but the main reason to add dnssec was for implementing dane. with dane, the verification of tls certificates can be done through certificates/public keys published in dns (in the tlsa records). this only makes sense (is trustworthy) if those dns records can be verified to be authentic. mox now applies dane to delivering messages over smtp. mox already implemented mta-sts for webpki/pkix-verification of certificates against the (large) pool of CA's, and still enforces those policies when present. but it now also checks for dane records, and will verify those if present. if dane and mta-sts are both absent, the regular opportunistic tls with starttls is still done. and the fallback to plaintext is also still done. mox also makes it easy to setup dane for incoming deliveries, so other servers can deliver with dane tls certificate verification. the quickstart now generates private keys that are used when requesting certificates with acme. the private keys are pre-generated because they must be static and known during setup, because their public keys must be published in tlsa records in dns. autocert would generate private keys on its own, so had to be forked to add the option to provide the private key when requesting a new certificate. hopefully upstream will accept the change and we can drop the fork. with this change, using the quickstart to setup a new mox instance, the checks at internet.nl result in a 100% score, provided the domain is dnssec-signed and the network doesn't have any issues.
This commit is contained in:
11
dns/dns.go
11
dns/dns.go
@ -5,10 +5,11 @@ package dns
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"net"
|
||||
"strings"
|
||||
|
||||
"golang.org/x/net/idna"
|
||||
|
||||
"github.com/mjl-/adns"
|
||||
)
|
||||
|
||||
var errTrailingDot = errors.New("dns name has trailing dot")
|
||||
@ -100,16 +101,16 @@ func ParseDomain(s string) (Domain, error) {
|
||||
return Domain{ascii, unicode}, nil
|
||||
}
|
||||
|
||||
// IsNotFound returns whether an error is a net.DNSError with IsNotFound set.
|
||||
// IsNotFound returns whether an error is an adns.DNSError with IsNotFound set.
|
||||
// IsNotFound means the requested type does not exist for the given domain (a
|
||||
// nodata or nxdomain response). It doesn't not necessarily mean no other types
|
||||
// for that name exist.
|
||||
// nodata or nxdomain response). It doesn't not necessarily mean no other types for
|
||||
// that name exist.
|
||||
//
|
||||
// A DNS server can respond to a lookup with an error "nxdomain" to indicate a
|
||||
// name does not exist (at all), or with a success status with an empty list.
|
||||
// The Go resolver returns an IsNotFound error for both cases, there is no need
|
||||
// to explicitly check for zero entries.
|
||||
func IsNotFound(err error) bool {
|
||||
var dnsErr *net.DNSError
|
||||
var dnsErr *adns.DNSError
|
||||
return err != nil && errors.As(err, &dnsErr) && dnsErr.IsNotFound
|
||||
}
|
||||
|
269
dns/mock.go
269
dns/mock.go
@ -4,139 +4,185 @@ import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net"
|
||||
|
||||
"golang.org/x/exp/slices"
|
||||
|
||||
"github.com/mjl-/adns"
|
||||
)
|
||||
|
||||
// MockResolver is a Resolver used for testing.
|
||||
// Set DNS records in the fields, which map FQDNs (with trailing dot) to values.
|
||||
type MockResolver struct {
|
||||
PTR map[string][]string
|
||||
A map[string][]string
|
||||
AAAA map[string][]string
|
||||
TXT map[string][]string
|
||||
MX map[string][]*net.MX
|
||||
CNAME map[string]string
|
||||
Fail map[Mockreq]struct{}
|
||||
PTR map[string][]string
|
||||
A map[string][]string
|
||||
AAAA map[string][]string
|
||||
TXT map[string][]string
|
||||
MX map[string][]*net.MX
|
||||
TLSA map[string][]adns.TLSA // Keys are e.g. _25._tcp.<host>.
|
||||
CNAME map[string]string
|
||||
Fail map[Mockreq]struct{}
|
||||
AllAuthentic bool // Default value for authentic in responses. Overridden with Authentic and Inauthentic
|
||||
Authentic []string // Records of the form "type name", e.g. "cname localhost."
|
||||
Inauthentic []string
|
||||
}
|
||||
|
||||
type Mockreq struct {
|
||||
Type string // E.g. "cname", "txt", "mx", "ptr", etc.
|
||||
Name string
|
||||
Name string // Name of request. For TLSA, the full requested DNS name, e.g. _25._tcp.<host>.
|
||||
}
|
||||
|
||||
var _ Resolver = MockResolver{}
|
||||
|
||||
func (r MockResolver) nxdomain(s string) *net.DNSError {
|
||||
return &net.DNSError{
|
||||
func (r MockResolver) result(ctx context.Context, mr Mockreq) (string, adns.Result, error) {
|
||||
result := adns.Result{Authentic: r.AllAuthentic}
|
||||
|
||||
if err := ctx.Err(); err != nil {
|
||||
return "", result, err
|
||||
}
|
||||
|
||||
updateAuthentic := func(mock string) {
|
||||
if slices.Contains(r.Authentic, mock) {
|
||||
result.Authentic = true
|
||||
}
|
||||
if slices.Contains(r.Inauthentic, mock) {
|
||||
result.Authentic = false
|
||||
}
|
||||
}
|
||||
|
||||
for {
|
||||
if _, ok := r.Fail[mr]; ok {
|
||||
updateAuthentic(mr.Type + " " + mr.Name)
|
||||
return mr.Name, adns.Result{}, r.servfail(mr.Name)
|
||||
}
|
||||
|
||||
cname, ok := r.CNAME[mr.Name]
|
||||
if !ok {
|
||||
updateAuthentic(mr.Type + " " + mr.Name)
|
||||
break
|
||||
}
|
||||
updateAuthentic("cname " + mr.Name)
|
||||
if mr.Type == "cname" {
|
||||
return mr.Name, result, nil
|
||||
}
|
||||
mr.Name = cname
|
||||
}
|
||||
return mr.Name, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) nxdomain(s string) error {
|
||||
return &adns.DNSError{
|
||||
Err: "no record",
|
||||
Name: s,
|
||||
Server: "localhost",
|
||||
Server: "mock",
|
||||
IsNotFound: true,
|
||||
}
|
||||
}
|
||||
|
||||
func (r MockResolver) servfail(s string) *net.DNSError {
|
||||
return &net.DNSError{
|
||||
func (r MockResolver) servfail(s string) error {
|
||||
return &adns.DNSError{
|
||||
Err: "temp error",
|
||||
Name: s,
|
||||
Server: "localhost",
|
||||
Server: "mock",
|
||||
IsTemporary: true,
|
||||
}
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupCNAME(ctx context.Context, name string) (string, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return "", err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"cname", name}]; ok {
|
||||
return "", r.servfail(name)
|
||||
}
|
||||
if cname, ok := r.CNAME[name]; ok {
|
||||
return cname, nil
|
||||
}
|
||||
return "", r.nxdomain(name)
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupAddr(ctx context.Context, ip string) ([]string, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"ptr", ip}]; ok {
|
||||
return nil, r.servfail(ip)
|
||||
}
|
||||
l, ok := r.PTR[ip]
|
||||
if !ok {
|
||||
return nil, r.nxdomain(ip)
|
||||
}
|
||||
return l, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupNS(ctx context.Context, name string) ([]*net.NS, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return nil, r.servfail("ns not implemented")
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupPort(ctx context.Context, network, service string) (port int, err error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
return 0, r.servfail("port not implemented")
|
||||
return net.LookupPort(network, service)
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupSRV(ctx context.Context, service, proto, name string) (string, []*net.SRV, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return "", nil, err
|
||||
}
|
||||
return "", nil, r.servfail("srv not implemented")
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"ipaddr", host}]; ok {
|
||||
return nil, r.servfail(host)
|
||||
}
|
||||
addrs, err := r.LookupHost(ctx, host)
|
||||
func (r MockResolver) LookupCNAME(ctx context.Context, name string) (string, adns.Result, error) {
|
||||
mr := Mockreq{"cname", name}
|
||||
name, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
return name, result, err
|
||||
}
|
||||
cname, ok := r.CNAME[name]
|
||||
if !ok {
|
||||
return cname, result, r.nxdomain(name)
|
||||
}
|
||||
return cname, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupAddr(ctx context.Context, ip string) ([]string, adns.Result, error) {
|
||||
mr := Mockreq{"ptr", ip}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
l, ok := r.PTR[ip]
|
||||
if !ok {
|
||||
return nil, result, r.nxdomain(ip)
|
||||
}
|
||||
return l, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupNS(ctx context.Context, name string) ([]*net.NS, adns.Result, error) {
|
||||
mr := Mockreq{"ns", name}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
return nil, result, r.servfail("ns not implemented")
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupSRV(ctx context.Context, service, proto, name string) (string, []*net.SRV, adns.Result, error) {
|
||||
xname := fmt.Sprintf("_%s._%s.%s", service, proto, name)
|
||||
mr := Mockreq{"srv", xname}
|
||||
name, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return name, nil, result, err
|
||||
}
|
||||
return name, nil, result, r.servfail("srv not implemented")
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, adns.Result, error) {
|
||||
// todo: make closer to resolver, doing a & aaaa lookups, including their error/(in)secure status.
|
||||
mr := Mockreq{"ipaddr", host}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
addrs, result1, err := r.LookupHost(ctx, host)
|
||||
result.Authentic = result.Authentic && result1.Authentic
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
ips := make([]net.IPAddr, len(addrs))
|
||||
for i, a := range addrs {
|
||||
ip := net.ParseIP(a)
|
||||
if ip == nil {
|
||||
return nil, fmt.Errorf("malformed ip %q", a)
|
||||
return nil, result, fmt.Errorf("malformed ip %q", a)
|
||||
}
|
||||
ips[i] = net.IPAddr{IP: ip}
|
||||
}
|
||||
return ips, nil
|
||||
return ips, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupHost(ctx context.Context, host string) (addrs []string, err error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"host", host}]; ok {
|
||||
return nil, r.servfail(host)
|
||||
func (r MockResolver) LookupHost(ctx context.Context, host string) ([]string, adns.Result, error) {
|
||||
// todo: make closer to resolver, doing a & aaaa lookups, including their error/(in)secure status.
|
||||
mr := Mockreq{"host", host}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
var addrs []string
|
||||
addrs = append(addrs, r.A[host]...)
|
||||
addrs = append(addrs, r.AAAA[host]...)
|
||||
if len(addrs) > 0 {
|
||||
return addrs, nil
|
||||
if len(addrs) == 0 {
|
||||
return nil, result, r.nxdomain(host)
|
||||
}
|
||||
if cname, ok := r.CNAME[host]; ok {
|
||||
return []string{cname}, nil
|
||||
}
|
||||
return nil, r.nxdomain(host)
|
||||
return addrs, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupIP(ctx context.Context, network, host string) ([]net.IP, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"ip", host}]; ok {
|
||||
return nil, r.servfail(host)
|
||||
func (r MockResolver) LookupIP(ctx context.Context, network, host string) ([]net.IP, adns.Result, error) {
|
||||
mr := Mockreq{"ip", host}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
var ips []net.IP
|
||||
switch network {
|
||||
@ -152,35 +198,52 @@ func (r MockResolver) LookupIP(ctx context.Context, network, host string) ([]net
|
||||
}
|
||||
}
|
||||
if len(ips) == 0 {
|
||||
return nil, r.nxdomain(host)
|
||||
return nil, result, r.nxdomain(host)
|
||||
}
|
||||
return ips, nil
|
||||
return ips, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupMX(ctx context.Context, name string) ([]*net.MX, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"mx", name}]; ok {
|
||||
return nil, r.servfail(name)
|
||||
func (r MockResolver) LookupMX(ctx context.Context, name string) ([]*net.MX, adns.Result, error) {
|
||||
mr := Mockreq{"mx", name}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
l, ok := r.MX[name]
|
||||
if !ok {
|
||||
return nil, r.nxdomain(name)
|
||||
return nil, result, r.nxdomain(name)
|
||||
}
|
||||
return l, nil
|
||||
return l, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupTXT(ctx context.Context, name string) ([]string, error) {
|
||||
if err := ctx.Err(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if _, ok := r.Fail[Mockreq{"txt", name}]; ok {
|
||||
return nil, r.servfail(name)
|
||||
func (r MockResolver) LookupTXT(ctx context.Context, name string) ([]string, adns.Result, error) {
|
||||
mr := Mockreq{"txt", name}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
l, ok := r.TXT[name]
|
||||
if !ok {
|
||||
return nil, r.nxdomain(name)
|
||||
return nil, result, r.nxdomain(name)
|
||||
}
|
||||
return l, nil
|
||||
return l, result, nil
|
||||
}
|
||||
|
||||
func (r MockResolver) LookupTLSA(ctx context.Context, port int, protocol string, host string) ([]adns.TLSA, adns.Result, error) {
|
||||
var name string
|
||||
if port == 0 && protocol == "" {
|
||||
name = host
|
||||
} else {
|
||||
name = fmt.Sprintf("_%d._%s.%s", port, protocol, host)
|
||||
}
|
||||
mr := Mockreq{"tlsa", name}
|
||||
_, result, err := r.result(ctx, mr)
|
||||
if err != nil {
|
||||
return nil, result, err
|
||||
}
|
||||
l, ok := r.TLSA[name]
|
||||
if !ok {
|
||||
return nil, result, r.nxdomain(name)
|
||||
}
|
||||
return l, result, nil
|
||||
}
|
||||
|
234
dns/resolver.go
234
dns/resolver.go
@ -13,6 +13,8 @@ import (
|
||||
"github.com/prometheus/client_golang/prometheus"
|
||||
"github.com/prometheus/client_golang/prometheus/promauto"
|
||||
|
||||
"github.com/mjl-/adns"
|
||||
|
||||
"github.com/mjl-/mox/mlog"
|
||||
)
|
||||
|
||||
@ -22,6 +24,10 @@ import (
|
||||
|
||||
var xlog = mlog.New("dns")
|
||||
|
||||
func init() {
|
||||
net.DefaultResolver.StrictErrors = true
|
||||
}
|
||||
|
||||
var (
|
||||
metricLookup = promauto.NewHistogramVec(
|
||||
prometheus.HistogramOpts{
|
||||
@ -39,16 +45,17 @@ var (
|
||||
|
||||
// Resolver is the interface strict resolver implements.
|
||||
type Resolver interface {
|
||||
LookupAddr(ctx context.Context, addr string) ([]string, error) // Always returns absolute names, with trailing dot.
|
||||
LookupCNAME(ctx context.Context, host string) (string, error) // NOTE: returns an error if no CNAME record is present.
|
||||
LookupHost(ctx context.Context, host string) (addrs []string, err error)
|
||||
LookupIP(ctx context.Context, network, host string) ([]net.IP, error)
|
||||
LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, error)
|
||||
LookupMX(ctx context.Context, name string) ([]*net.MX, error)
|
||||
LookupNS(ctx context.Context, name string) ([]*net.NS, error)
|
||||
LookupPort(ctx context.Context, network, service string) (port int, err error)
|
||||
LookupSRV(ctx context.Context, service, proto, name string) (string, []*net.SRV, error)
|
||||
LookupTXT(ctx context.Context, name string) ([]string, error)
|
||||
LookupAddr(ctx context.Context, addr string) ([]string, adns.Result, error) // Always returns absolute names, with trailing dot.
|
||||
LookupCNAME(ctx context.Context, host string) (string, adns.Result, error) // NOTE: returns an error if no CNAME record is present.
|
||||
LookupHost(ctx context.Context, host string) ([]string, adns.Result, error)
|
||||
LookupIP(ctx context.Context, network, host string) ([]net.IP, adns.Result, error)
|
||||
LookupIPAddr(ctx context.Context, host string) ([]net.IPAddr, adns.Result, error)
|
||||
LookupMX(ctx context.Context, name string) ([]*net.MX, adns.Result, error)
|
||||
LookupNS(ctx context.Context, name string) ([]*net.NS, adns.Result, error)
|
||||
LookupSRV(ctx context.Context, service, proto, name string) (string, []*net.SRV, adns.Result, error)
|
||||
LookupTXT(ctx context.Context, name string) ([]string, adns.Result, error)
|
||||
LookupTLSA(ctx context.Context, port int, protocol, host string) ([]adns.TLSA, adns.Result, error)
|
||||
}
|
||||
|
||||
// WithPackage sets Pkg on resolver if it is a StrictResolve and does not have a package set yet.
|
||||
@ -65,8 +72,8 @@ func WithPackage(resolver Resolver, name string) Resolver {
|
||||
// StrictResolver is a net.Resolver that enforces that DNS names end with a dot,
|
||||
// preventing "search"-relative lookups.
|
||||
type StrictResolver struct {
|
||||
Pkg string // Name of subsystem that is making DNS requests, for metrics.
|
||||
Resolver *net.Resolver // Where the actual lookups are done. If nil, net.DefaultResolver is used for lookups.
|
||||
Pkg string // Name of subsystem that is making DNS requests, for metrics.
|
||||
Resolver *adns.Resolver // Where the actual lookups are done. If nil, adns.DefaultResolver is used for lookups.
|
||||
}
|
||||
|
||||
var _ Resolver = StrictResolver{}
|
||||
@ -75,7 +82,7 @@ var ErrRelativeDNSName = errors.New("dns: host to lookup must be absolute, endin
|
||||
|
||||
func metricLookupObserve(pkg, typ string, err error, start time.Time) {
|
||||
var result string
|
||||
var dnsErr *net.DNSError
|
||||
var dnsErr *adns.DNSError
|
||||
switch {
|
||||
case err == nil:
|
||||
result = "ok"
|
||||
@ -101,7 +108,7 @@ func (r StrictResolver) WithPackage(name string) Resolver {
|
||||
|
||||
func (r StrictResolver) resolver() Resolver {
|
||||
if r.Resolver == nil {
|
||||
return net.DefaultResolver
|
||||
return adns.DefaultResolver
|
||||
}
|
||||
return r.Resolver
|
||||
}
|
||||
@ -111,26 +118,52 @@ func resolveErrorHint(err *error) {
|
||||
if e == nil {
|
||||
return
|
||||
}
|
||||
dnserr, ok := e.(*net.DNSError)
|
||||
dnserr, ok := e.(*adns.DNSError)
|
||||
if !ok {
|
||||
return
|
||||
}
|
||||
// If the dns server is not running, and it is one of the default/fallback IPs,
|
||||
// hint at where to look.
|
||||
if dnserr.IsTemporary && runtime.GOOS == "linux" && (dnserr.Server == "127.0.0.1:53" || dnserr.Server == "[::1]:53") && strings.HasSuffix(dnserr.Err, "connection refused") {
|
||||
*err = fmt.Errorf("%w (hint: does /etc/resolv.conf point to a running nameserver? in case of systemd-resolved, see systemd-resolved.service(8))", *err)
|
||||
*err = fmt.Errorf("%w (hint: does /etc/resolv.conf point to a running nameserver? in case of systemd-resolved, see systemd-resolved.service(8); better yet, install a proper dnssec-verifying recursive resolver like unbound)", *err)
|
||||
}
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupAddr(ctx context.Context, addr string) (resp []string, err error) {
|
||||
func (r StrictResolver) LookupPort(ctx context.Context, network, service string) (resp int, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "addr", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "addr"), mlog.Field("addr", addr), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
metricLookupObserve(r.Pkg, "port", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "port"),
|
||||
mlog.Field("network", network),
|
||||
mlog.Field("service", service),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
resp, err = r.resolver().LookupAddr(ctx, addr)
|
||||
resp, err = r.resolver().LookupPort(ctx, network, service)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupAddr(ctx context.Context, addr string) (resp []string, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "addr", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "addr"),
|
||||
mlog.Field("addr", addr),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
resp, result, err = r.resolver().LookupAddr(ctx, addr)
|
||||
// For addresses from /etc/hosts without dot, we add the missing trailing dot.
|
||||
for i, s := range resp {
|
||||
if !strings.HasSuffix(s, ".") {
|
||||
@ -142,20 +175,27 @@ func (r StrictResolver) LookupAddr(ctx context.Context, addr string) (resp []str
|
||||
|
||||
// LookupCNAME looks up a CNAME. Unlike "net" LookupCNAME, it returns a "not found"
|
||||
// error if there is no CNAME record.
|
||||
func (r StrictResolver) LookupCNAME(ctx context.Context, host string) (resp string, err error) {
|
||||
func (r StrictResolver) LookupCNAME(ctx context.Context, host string) (resp string, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "cname", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "cname"), mlog.Field("host", host), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "cname"),
|
||||
mlog.Field("host", host),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(host, ".") {
|
||||
return "", ErrRelativeDNSName
|
||||
return "", result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupCNAME(ctx, host)
|
||||
resp, result, err = r.resolver().LookupCNAME(ctx, host)
|
||||
if err == nil && resp == host {
|
||||
return "", &net.DNSError{
|
||||
return "", result, &adns.DNSError{
|
||||
Err: "no cname record",
|
||||
Name: host,
|
||||
Server: "",
|
||||
@ -164,119 +204,185 @@ func (r StrictResolver) LookupCNAME(ctx context.Context, host string) (resp stri
|
||||
}
|
||||
return
|
||||
}
|
||||
func (r StrictResolver) LookupHost(ctx context.Context, host string) (resp []string, err error) {
|
||||
|
||||
func (r StrictResolver) LookupHost(ctx context.Context, host string) (resp []string, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "host", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "host"), mlog.Field("host", host), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "host"),
|
||||
mlog.Field("host", host),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(host, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupHost(ctx, host)
|
||||
resp, result, err = r.resolver().LookupHost(ctx, host)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupIP(ctx context.Context, network, host string) (resp []net.IP, err error) {
|
||||
func (r StrictResolver) LookupIP(ctx context.Context, network, host string) (resp []net.IP, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "ip", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "ip"), mlog.Field("network", network), mlog.Field("host", host), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "ip"),
|
||||
mlog.Field("network", network),
|
||||
mlog.Field("host", host),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(host, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupIP(ctx, network, host)
|
||||
resp, result, err = r.resolver().LookupIP(ctx, network, host)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupIPAddr(ctx context.Context, host string) (resp []net.IPAddr, err error) {
|
||||
func (r StrictResolver) LookupIPAddr(ctx context.Context, host string) (resp []net.IPAddr, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "ipaddr", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "ipaddr"), mlog.Field("host", host), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "ipaddr"),
|
||||
mlog.Field("host", host),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(host, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupIPAddr(ctx, host)
|
||||
resp, result, err = r.resolver().LookupIPAddr(ctx, host)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupMX(ctx context.Context, name string) (resp []*net.MX, err error) {
|
||||
func (r StrictResolver) LookupMX(ctx context.Context, name string) (resp []*net.MX, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "mx", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "mx"), mlog.Field("name", name), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "mx"),
|
||||
mlog.Field("name", name),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(name, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupMX(ctx, name)
|
||||
resp, result, err = r.resolver().LookupMX(ctx, name)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupNS(ctx context.Context, name string) (resp []*net.NS, err error) {
|
||||
func (r StrictResolver) LookupNS(ctx context.Context, name string) (resp []*net.NS, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "ns", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "ns"), mlog.Field("name", name), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "ns"),
|
||||
mlog.Field("name", name),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(name, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupNS(ctx, name)
|
||||
resp, result, err = r.resolver().LookupNS(ctx, name)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupPort(ctx context.Context, network, service string) (resp int, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "port", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "port"), mlog.Field("network", network), mlog.Field("service", service), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
resp, err = r.resolver().LookupPort(ctx, network, service)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupSRV(ctx context.Context, service, proto, name string) (resp0 string, resp1 []*net.SRV, err error) {
|
||||
func (r StrictResolver) LookupSRV(ctx context.Context, service, proto, name string) (resp0 string, resp1 []*net.SRV, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "srv", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "srv"), mlog.Field("service", service), mlog.Field("proto", proto), mlog.Field("name", name), mlog.Field("resp0", resp0), mlog.Field("resp1", resp1), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "srv"),
|
||||
mlog.Field("service", service),
|
||||
mlog.Field("proto", proto),
|
||||
mlog.Field("name", name),
|
||||
mlog.Field("resp0", resp0),
|
||||
mlog.Field("resp1", resp1),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(name, ".") {
|
||||
return "", nil, ErrRelativeDNSName
|
||||
return "", nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp0, resp1, err = r.resolver().LookupSRV(ctx, service, proto, name)
|
||||
resp0, resp1, result, err = r.resolver().LookupSRV(ctx, service, proto, name)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupTXT(ctx context.Context, name string) (resp []string, err error) {
|
||||
func (r StrictResolver) LookupTXT(ctx context.Context, name string) (resp []string, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "txt", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err, mlog.Field("pkg", r.Pkg), mlog.Field("type", "txt"), mlog.Field("name", name), mlog.Field("resp", resp), mlog.Field("duration", time.Since(start)))
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "txt"),
|
||||
mlog.Field("name", name),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(name, ".") {
|
||||
return nil, ErrRelativeDNSName
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, err = r.resolver().LookupTXT(ctx, name)
|
||||
resp, result, err = r.resolver().LookupTXT(ctx, name)
|
||||
return
|
||||
}
|
||||
|
||||
func (r StrictResolver) LookupTLSA(ctx context.Context, port int, protocol, host string) (resp []adns.TLSA, result adns.Result, err error) {
|
||||
start := time.Now()
|
||||
defer func() {
|
||||
metricLookupObserve(r.Pkg, "tlsa", err, start)
|
||||
xlog.WithContext(ctx).Debugx("dns lookup result", err,
|
||||
mlog.Field("pkg", r.Pkg),
|
||||
mlog.Field("type", "tlsa"),
|
||||
mlog.Field("port", port),
|
||||
mlog.Field("protocol", protocol),
|
||||
mlog.Field("host", host),
|
||||
mlog.Field("resp", resp),
|
||||
mlog.Field("authentic", result.Authentic),
|
||||
mlog.Field("duration", time.Since(start)),
|
||||
)
|
||||
}()
|
||||
defer resolveErrorHint(&err)
|
||||
|
||||
if !strings.HasSuffix(host, ".") {
|
||||
return nil, result, ErrRelativeDNSName
|
||||
}
|
||||
resp, result, err = r.resolver().LookupTLSA(ctx, port, protocol, host)
|
||||
return
|
||||
}
|
||||
|
Reference in New Issue
Block a user