Commit graph

132 commits

Author SHA1 Message Date
Christopher Wood
c748f93752 Add ODoH support. (#1653) 2021-03-30 11:53:51 +02:00
Ian Bashford
fcd9225121
Threadsafe update (#1579)
* threadsafe update for relays

* locks around registeredRelays
2021-01-09 22:44:32 +01:00
Frank Denis
bc42eda1c8 Shorten 2021-01-03 16:58:21 +01:00
Frank Denis
5c3db0dcf5 Try to rely on proxy.serversInfo rather than proxy.registeredServers
With the introduction of background updates, I'm a little bit worried
about race conditions that can happen when a new server or relay is
registered (or even when a stamp changes).
2021-01-03 16:40:38 +01:00
Frank Denis
fbd598f027 Nits 2021-01-03 16:22:23 +01:00
Frank Denis
197f13ea0f Fix typo and update message 2021-01-03 16:00:02 +01:00
Frank Denis
1e10251407 Only find the farthest route on wildcards 2021-01-03 13:33:51 +01:00
Frank Denis
0f54b2b34c Automatic relay selection 2021-01-03 13:01:44 +01:00
Ian Bashford
87fb44a588
Run from in memory cache updates (#1564)
* ConfigFile change to allowlist and blocklist

* revised names and warnings

* consistent file naming in kebab case, and generic use of blocklist and allowlist in cmoments for clarity

* update ci files

* impose maximum delay and document

* live update of servers

* update for source prefixes

* fixup test

* stop registerServers being called twice at startup

* prevent double registration at startup

* tidy function signature for loadSource

Co-authored-by: Ian Bashford <ianbashford@gmail.com>
2021-01-01 14:04:12 +01:00
Frank Denis
254a4a6532 Use , not | to match multiples items
Fixes #1558
2020-12-26 17:55:31 +01:00
Frank Denis
a8a0677ea9 h1 -> http/1.x 2020-12-17 01:13:11 +01:00
Frank Denis
7d851366bb Do not only warn if the protocol is empty 2020-12-17 01:08:06 +01:00
Frank Denis
a24b009667 Filler 2020-12-12 22:35:51 +01:00
Frank Denis
d700ab6085 Nits 2020-12-12 22:19:09 +01:00
Frank Denis
a384011e71 Support relays in static entries 2020-12-12 21:57:04 +01:00
Frank Denis
7f46f4820c Don't use distinct pointers for UDP and TCP relay addresses 2020-12-12 21:18:32 +01:00
Frank Denis
ab8ebead34 Remove support for {ip|host}[:port] syntax for specifying a relay
It's very likely that no one ever used it.
2020-12-12 20:46:40 +01:00
Frank Denis
fc785f9f69 Print details when an unsupported protocol is found 2020-12-11 12:26:05 +01:00
Frank Denis
4fa643ef4d Repack structures to save some memory 2020-11-14 14:46:59 +01:00
Frank Denis
dadb38c32e Lower severity 2020-08-05 15:50:48 +02:00
Frank Denis
0ac96fec30 Add some logging back to fetchDoHServerInfo() 2020-08-05 15:39:30 +02:00
Frank Denis
b583fb5314 Turns out that the "test." zone is directly served by the Tencent CDN
without hitting the actual resolvers.

So, we need to use a different test zone.
2020-08-05 15:03:16 +02:00
Frank Denis
f3157b0a42 Check DoH servers with a query to a random name
The issue with benchmarking DoH servers is that some responses can
be directly served by a CDN, while others require a round trip to
the origin that can be significantly more expensive.

Random padding was an attempt at mitigating this. Unfortunately,
some servers (Tencent) ignore the padding. We end up with a query
for the root zone served by the Tencent CDN very quickly, but
anything else is orders of magnitude slower.

So, measure a query within the reserved "test." zone instead.
Caching resolvers should either know that "test." is undelegated,
or have it in their negative cache already, so this is unlikely to
trigger an actual query to authoritative servers.

Take it as an opportunity to check that we don't get anything but
a NXDOMAIN response for nonexistent domains.
2020-08-05 14:54:14 +02:00
Frank Denis
5e2f1c4146 Clarify that skipAnonIncompatbibleResolvers does what it says 2020-07-02 13:45:19 +02:00
Kevin O'Sullivan
5db4365540
Adding support for additional root CAs for DoH TLS Auth (#1281) 2020-06-08 18:01:40 +02:00
Frank Denis
74095d38ed Remove LargerResponsesDropped
dnsdist drops DNSCrypt queries shorter than 256 bytes, interpreting them
as not being encrypted instead. This is surprising when doing ad-hoc
testing, but absolutely fine, and we will never send shorter encrypted
queries on normal circumstances.

So, remove a useless knob.
2020-03-26 17:20:34 +01:00
Frank Denis
5049516f53 Add an option to ignore servers incompatible with anonymization 2020-03-26 13:41:57 +01:00
Frank Denis
7424f1a8b7 Try harder to work around Cisco and Quad9 bugs 2020-03-25 20:10:11 +01:00
Frank Denis
0860245c73 Nits 2020-03-25 18:24:03 +01:00
Frank Denis
315f6f45ff Certificates that can't be loaded are fatal 2020-03-24 14:31:43 +01:00
Frank Denis
2670caa71e Print the anonymization incompatibility message even if detected at runtime 2020-03-24 14:19:41 +01:00
Frank Denis
06ca9b01f0 Nits 2020-03-21 10:24:09 +01:00
Frank Denis
34d83f027f Support power-of-<arbitrary number> 2020-03-20 17:49:32 +01:00
Frank Denis
b57cc19d70 Use an interface for load-balancing strategies 2020-03-20 17:37:34 +01:00
Frank Denis
16708a0c20 Automatically detect servers blocking fragmented queries 2020-03-14 21:34:40 +01:00
Kevin O'Sullivan
c040b13d59
Adding the ability to do TLS client authentication for DoH (#1203)
* Adding the ability to do TLS client authentication for DoH

* whitespace nit

* Check for server specific creds before wildcard

* small comma ok idiom change
2020-03-09 22:11:53 +01:00
Frank Denis
aa0e7f42d3 Make the xTransport functions return the HTTP body directly
This simplifies things, but also make RTT computation way more reliable
2020-02-21 22:33:34 +01:00
Frank Denis
673eea65af Add random padding to the initial DoH query
Fixes #1199
2020-02-21 20:24:24 +01:00
Frank Denis
b03e7f993f Add a default list of buggy servers 2019-11-17 21:44:46 +01:00
Frank Denis
ca7e5e5bcb Rename a few things 2019-11-17 15:07:40 +01:00
Frank Denis
15b405b552 Support workarounds for ancient/broken implementations
Fixes #984
2019-11-16 18:51:16 +01:00
Frank Denis
14862c2fc7 defer is slow and not worth it here 2019-11-05 00:37:46 +01:00
Frank Denis
e0c37f92fc Add a comment about why DoH addresses from stamps don't expire 2019-11-03 00:33:17 +01:00
Alison Winters
97e4c44223 remove err return values that are never set 2019-11-01 17:13:14 +01:00
Frank Denis
06b0976786 Remove the serverInfo rwlock; just use the global serversInfo rwlock 2019-10-31 17:50:56 +01:00
Frank Denis
3a68f90c37 Back to 2.0.29 beta 3 (ceed905196) 2019-10-31 17:50:19 +01:00
Frank Denis
4824e91d46 Remove the serverInfo rwlock; just use the global serversInfo rwlock 2019-10-26 17:28:24 +02:00
Frank Denis
3ddb134190 Reduce contention 2019-10-21 18:50:20 +02:00
Markus Linnala
bc831816f5 feature: xtransport: Expire CachedIPs, split resolve function from Fetch
I selected default ttl when resolving using system to be 86400 / 24h.

As the program can run long time, I think it is relevant to honor TTL
when resolving and caching results.

Change cache internal format from string to net.IP. This should ensure
there is no need to further check validity of value later when using.

Resolve part was too big and had only one purpose. So it is fine
candidate to be own function.
2019-10-21 18:12:49 +02:00
Markus Linnala
1b4f873026 fix: serversInfo: use lb strategy always even with estimator
I don't see why estimator should select which candidate to use.
2019-10-20 21:30:24 +02:00