forked from folbricht/routedns
-
Notifications
You must be signed in to change notification settings - Fork 0
/
dtlsclient.go
115 lines (100 loc) · 2.63 KB
/
dtlsclient.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
package rdns
import (
"fmt"
"net"
"strconv"
"github.com/miekg/dns"
"github.com/pion/dtls/v2"
"github.com/sirupsen/logrus"
)
// DTLSClient is a DNS-over-DTLS resolver.
type DTLSClient struct {
id string
endpoint string
pipeline *Pipeline
// Pipeline also provides operation metrics.
}
// DTLSClientOptions contains options used by the DNS-over-DTLS resolver.
type DTLSClientOptions struct {
// Bootstrap address - IP to use for the serivce instead of looking up
// the service's hostname with potentially plain DNS.
BootstrapAddr string
// Local IP to use for outbound connections. If nil, a local address is chosen.
LocalAddr net.IP
DTLSConfig *dtls.Config
}
var _ Resolver = &DTLSClient{}
// NewDTLSClient instantiates a new DNS-over-TLS resolver.
func NewDTLSClient(id, endpoint string, opt DTLSClientOptions) (*DTLSClient, error) {
if err := validEndpoint(endpoint); err != nil {
return nil, err
}
host, port, err := net.SplitHostPort(endpoint)
if err != nil {
return nil, err
}
p, err := strconv.Atoi(port)
if err != nil {
return nil, err
}
// If a bootstrap address was provided, we need to use the IP for the connection but the
// hostname in the TLS handshake.
var ip net.IP
if opt.BootstrapAddr != "" {
opt.DTLSConfig.ServerName = host
ip = net.ParseIP(opt.BootstrapAddr)
if ip == nil {
return nil, fmt.Errorf("failed to parse bootstrap address '%s'", opt.BootstrapAddr)
}
} else {
ips, err := net.LookupIP(host)
if err != nil {
return nil, err
}
if len(ips) < 1 {
return nil, fmt.Errorf("failed to lookup '%s'", host)
}
ip = ips[0]
}
addr := &net.UDPAddr{IP: ip, Port: p}
var laddr *net.UDPAddr
if opt.LocalAddr != nil {
laddr = &net.UDPAddr{IP: opt.LocalAddr}
}
client := &dtlsDialer{
raddr: addr,
laddr: laddr,
dtlsConfig: opt.DTLSConfig,
}
return &DTLSClient{
id: id,
endpoint: endpoint,
pipeline: NewPipeline(id, endpoint, client),
}, nil
}
// Resolve a DNS query.
func (d *DTLSClient) Resolve(q *dns.Msg, ci ClientInfo) (*dns.Msg, error) {
logger(d.id, q, ci).WithFields(logrus.Fields{
"resolver": d.endpoint,
"protocol": "dtls",
}).Debug("querying upstream resolver")
// Add padding to the query before sending over TLS
padQuery(q)
return d.pipeline.Resolve(q)
}
func (d *DTLSClient) String() string {
return d.id
}
type dtlsDialer struct {
raddr *net.UDPAddr
laddr *net.UDPAddr
dtlsConfig *dtls.Config
}
func (d dtlsDialer) Dial(address string) (*dns.Conn, error) {
pConn, err := net.DialUDP("udp", d.laddr, d.raddr)
if err != nil {
return nil, err
}
c, err := dtls.Client(pConn, d.dtlsConfig)
return &dns.Conn{Conn: c}, err
}