dnscrypt-proxy/vendor/github.com/lifenjoiner/dhcpdns/dhcpdns.go
2025-02-19 10:30:02 +01:00

508 lines
13 KiB
Go

// Copyright 2023-now by lifenjoiner. All rights reserved.
// Use of this source code is governed by a MIT license
// that can be found in the LICENSE file.
// Package dhcpdns gets the DHCP/DHCPv6 DNS.
package dhcpdns
import (
"crypto/rand"
"errors"
//"log"
"net"
"runtime"
"sync"
"time"
)
const (
dhcpv4MessageSizeMax = 576
dhcpv6MessageSizeComm = 1024
)
var (
err4InvalidParam = errors.New("invalid DHCPv4 parameters")
err4NotReply = errors.New("not DHCPv4 reply")
err4TidNotMatch = errors.New("DHCPv4 TID not match")
)
var (
errInvalidReply = errors.New("invalid reply")
errNoDNSFound = errors.New("no DNS found")
)
var (
err6InterfaceNotRunning = errors.New("interface is not running")
err6InvalidParam = errors.New("invalid DHCPv6 parameters")
err6NoLLUAFound = errors.New("no link-local address found")
err6NotReply = errors.New("not DHCPv6 Reply")
err6TidNotMatch = errors.New("DHCPv6 TID not match")
)
var (
errIsLLA = errors.New("unsupported link-local address")
errIsTeredo = errors.New("unsupported Teredo Tunneling Pseudo-Interface")
)
// Sample messages, https://wiki.wireshark.org/SampleCaptures.md
// GetDNSFromReply4 gets DNS from a DHCP reply message.
func GetDNSFromReply4(msg []byte, tid []byte) (ip []net.IP, err error) {
n := len(msg)
if n < 241 || len(tid) < 4 {
err = err4InvalidParam
return
}
if msg[0] != 0x02 {
err = err4NotReply
return
}
if msg[4] != tid[0] || msg[5] != tid[1] || msg[6] != tid[2] || msg[7] != tid[3] {
err = err4TidNotMatch
return
}
m := 240
for m < n {
opt := msg[m]
if opt == 255 {
// END
break
}
m++
if m < n {
i := m + 1
m += 1 + int(msg[m])
if m <= n {
if opt == 6 {
// DHCP DNS
for i+4 <= m {
ip = append(ip, msg[i:i+4])
i += 4
}
break
}
continue
}
}
err = errInvalidReply
break
}
if len(ip) == 0 {
err = errNoDNSFound
//log.Printf("%x", msg)
}
return
}
// GetDNSByIPv4 sends DHCP message and return the DNS.
// ip is the reaching out IP.
func GetDNSByIPv4(ip string) (dns []net.IP, err error) {
ipAddr, ifi, err := getOutboundParams(ip)
if err != nil {
return nil, err
}
//log.Printf("Receiving addr Zone: %v", ipAddr.Zone)
// Windows (WSL2) can't choose the right IP.
pc, err := reuseListenPacket("udp4", ip+":68")
if err != nil {
return nil, err
}
// Minimal DHCP message
// We prefer to be reached by a broadcast than unicast relpy, in case of there is the OS DHCP deamon binding.
// https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
// https://datatracker.ietf.org/doc/html/rfc2132#section-9.6
// INIT-REBOOT: https://datatracker.ietf.org/doc/html/rfc2131#section-4.3.2
dhcpMsg := []byte{
0x01, // message type
0x01, // hardware type: Ethernet
0x06, // hardware address length: Ethernet
0x00, // hops
0x48, 0x59, 0x58, 0x27, // transaction id
0x00, 0x00, // seconds elasped
0x80, 0x00, // flags: BROADCAST. Unicast may not be received.
0x00, 0x00, 0x00, 0x00, // client ip: ciaddr
0x00, 0x00, 0x00, 0x00, // your ip: yiaddr
0x00, 0x00, 0x00, 0x00, // server ip: siaddr
0x00, 0x00, 0x00, 0x00, // relay ip: giaddr
// client MAC: https://gitlab.com/wireshark/wireshark/-/raw/master/manuf
0x06, 0x05, 0x04, 0x03, 0x02, 0x01,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // client hardware address padding
// ServerHostName
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
// BootFileName
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
// magic cookie: DHCP
0x63, 0x82, 0x53, 0x63, // 240B
// Options
0x35, 0x01, 0x03, // DHCPREQUEST. DHCPDISCOVER may cause the server to release the OFFER.
0x32, 0x04, 0xc0, 0xa8, 0x01, 0x04, // Requested IP address for `INIT-REBOOT`
0x37, 0x01, 0x06, // Parameter Request List: DNS
0x3d, 0x07, 0x01, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01, // Client Identifier
0xff, // END
// padding: min length of 300 bytes per RFC951
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
}
// new transaction id
tid := dhcpMsg[4:8]
_, _ = rand.Read(tid)
// MAC. On devices (Android) with both IPv6 and IPv6 available, MAC would be nil.
copy(dhcpMsg[28:28+16], ifi.HardwareAddr)
// Requested IP address
copy(dhcpMsg[245:245+4], ipAddr.IP.To4())
// The DHCP server of VMware NAT mode requires Client identifier.
m := len(ifi.HardwareAddr)
//log.Printf("MAC[%v]: %v", m, ifi.HardwareAddr)
if m > 0 {
copy(dhcpMsg[255:255+m], ifi.HardwareAddr)
dhcpMsg[253] = byte(m&0xff) + 1
dhcpMsg[255+m] = 0xff
}
rAddr := &net.UDPAddr{IP: net.IPv4bcast, Port: 67}
_ = pc.SetDeadline(time.Now().Add(2 * time.Second))
_, err = pc.WriteTo(dhcpMsg, rAddr)
if err != nil {
// defer doesn't work on reassignment
_ = pc.Close()
return nil, err
}
// Prefer broadcast:
// (*nix) may have a deamon binding the local IPPort and the gateway IPPort.
// If so and the server replies with a broadcast to the local IPPort, rather than IPv4bcast,
// it may not be received on some OS.
if ipAddr.Zone != "" {
_ = pc.Close()
pc, err = reuseListenPacket("udp4", ":68")
if err != nil {
return nil, err
}
}
//log.Printf("Receiving addr: %v", pc.LocalAddr())
buf := make([]byte, dhcpv4MessageSizeMax)
_ = pc.SetDeadline(time.Now().Add(2 * time.Second))
n, _, err := pc.ReadFrom(buf[:])
_ = pc.Close()
if err != nil {
return nil, err
}
//log.Printf("Received from: %v", rAddr2)
dns, err = GetDNSFromReply4(buf[:n], tid)
return
}
// Required.
func getOutboundParams(ip string) (*net.IPAddr, *net.Interface, error) {
ipAddr, err := net.ResolveIPAddr("ip", ip)
if err != nil {
return nil, nil, err
}
is6 := ipAddr.IP.To4() == nil
ift, err := net.Interfaces()
if err != nil {
return nil, nil, err
}
for _, ifi := range ift {
addrs, err := ifi.Addrs()
if err != nil {
continue
}
var ipUnicast net.IP
var got bool
for _, addr := range addrs {
ipa, ok := addr.(*net.IPNet)
if !ok {
continue
}
ipi := ipa.IP
if ipi.Equal(ipAddr.IP) {
got = true
}
if is6 && ipi.To4() == nil && ipi.IsLinkLocalUnicast() {
ipUnicast = ipi
}
//log.Printf("%v: %v", ifi.Name, ipi)
}
if got {
// https://www.kernel.org/doc/html/latest/networking/operstates.html
if ifi.Flags&net.FlagRunning == net.FlagRunning {
if ipUnicast != nil {
ipAddr.IP = ipUnicast
}
// Bind fe80::/10 and ListenUDP needs Zone on *nix.
if ipAddr.Zone == "" && runtime.GOOS != "windows" {
ipAddr.Zone = ifi.Name
}
return ipAddr, &ifi, nil
}
return nil, nil, err6InterfaceNotRunning
}
}
return nil, nil, err6NoLLUAFound
}
func readBigEndianUint16(b []byte) uint16 {
return uint16(b[0])<<8&0xff00 | uint16(b[1])
}
// GetDNSFromReply6 gets DNS from a DHCPv6 REPLY message.
// https://datatracker.ietf.org/doc/html/rfc3646
func GetDNSFromReply6(msg []byte, tid []byte) (ip []net.IP, err error) {
n := len(msg)
if n < 7 || len(tid) < 3 {
err = err6InvalidParam
return
}
if msg[0] != 0x07 {
err = err6NotReply
return
}
if msg[1] != tid[0] || msg[2] != tid[1] || msg[3] != tid[2] {
err = err6TidNotMatch
return
}
m := 4
for m+2 <= n {
opt := readBigEndianUint16(msg[m : m+2])
m += 2
if m+2 < n {
i := m + 2
m += 2 + int(readBigEndianUint16(msg[m:m+2]))
if m <= n {
if opt == 23 {
// DHCPv6 DNS
for i+16 <= m {
ip = append(ip, msg[i:i+16])
i += 16
}
break
}
continue
}
}
err = errInvalidReply
break
}
if len(ip) == 0 {
err = errNoDNSFound
}
return
}
// GetDNSByIPv6 sends DHCPv6 INFORMATION-REQUEST message and return the DNS.
// ip is the reaching out IP.
func GetDNSByIPv6(ip string) (dns []net.IP, err error) {
ipAddr, _, err := getOutboundParams(ip)
if err != nil {
return nil, err
}
pc, err := reuseListenPacket("udp6", "["+ipAddr.String()+"]:546")
if err != nil {
return nil, err
}
//log.Printf("Receiving addr: %v", pc.LocalAddr())
// Minimal INFORMATION-REQUEST message
// https://en.wikipedia.org/wiki/DHCPv6
// INFORMATION-REQUEST (11):
// https://datatracker.ietf.org/doc/html/rfc8415#section-18.2.6
// https://datatracker.ietf.org/doc/html/rfc8415#section-8
dhcpv6Msg := []byte{
0x0b, // message type
0x48, 0x59, 0x58, // transaction id
// Options
// Elapsed Time Option: https://datatracker.ietf.org/doc/html/rfc8415#section-21.9
0x00, 0x08, 0x00, 0x02, 0x00, 0x00,
// option request: INF_MAX_RT, Information Refresh Time, DNS
0x00, 0x06, 0x00, 0x06, 0x00, 0x53, 0x00, 0x20, 0x00, 0x17,
// Client Identifier Option: https://datatracker.ietf.org/doc/html/rfc8415#section-21.2
// anonymity profile DUID-LLT: https://datatracker.ietf.org/doc/html/rfc7844#section-4.3
0x00, 0x01, 0x00, 0x0e, 0x00, 0x01, 0x00, 0x01, 0x26, 0xeb, 0x58, 0x35, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01,
}
// new transaction id
tid := dhcpv6Msg[1:4]
_, _ = rand.Read(tid)
rAddr := &net.UDPAddr{IP: net.IP{0xff, 0x02, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x01, 0, 0x02}, Port: 547}
_ = pc.SetDeadline(time.Now().Add(2 * time.Second))
_, err = pc.WriteTo(dhcpv6Msg, rAddr)
if err != nil {
return nil, err
}
buf := make([]byte, dhcpv6MessageSizeComm)
_ = pc.SetDeadline(time.Now().Add(2 * time.Second))
n, _, err := pc.ReadFrom(buf[:])
_ = pc.Close()
if err != nil {
return nil, err
}
dns, err = GetDNSFromReply6(buf[:n], tid)
return
}
// Detector holds the parameters and results.
//
// if err == nil {
// if lastActiveIP != "" {
// // got DNS
// } else {
// // uninitialized
// }
// } else if lastActiveIP == "" {
// // offline/invalid
// } else if constancy > x {
// // treat as (switched to a network that) can't get DNS
// } else {
// // treat as temporarily failed
// }
type Detector struct {
sync.RWMutex
got bool
// RemoteIPPort is the remote IPPort to detect within UDP.
// Won't send any data to it. `Dial` in UDP only detects if the network is available.
RemoteIPPort string
lastActiveIP string
dns []net.IP
err error
constancy int
}
func detect(d *Detector) (string, []net.IP, error) {
c, err := net.Dial("udp", d.RemoteIPPort)
if err != nil {
return "", nil, err
}
ipPort := c.LocalAddr().String()
_ = c.Close()
ip, _, err := net.SplitHostPort(ipPort)
if err != nil {
return "", nil, err
}
if ip[:7] == "2001:0:" {
// https://en.wikipedia.org/wiki/Teredo_tunneling#IPv6_addressing
err = errIsTeredo
} else if ip[:6] == "fe80::" || ip[:7] == "169.254" {
// Only detect valid network. https://www.wikiwand.com/en/Link-local_address
err = errIsLLA
}
var dns []net.IP
if err == nil && (!d.got || d.lastActiveIP != ip) {
if ipPort[0] == '[' {
dns, err = GetDNSByIPv6(ip)
} else {
dns, err = GetDNSByIPv4(ip)
}
}
return ip, dns, err
}
// Detect the DNS from the active interface which is adopted to connect to the provided IPPort address.
// The last active IP is used to reduce traffic or defense.
// If got and IP hasn't changed, skip sending DHCP messages as soft detecting.
func (d *Detector) Detect() error {
ip, dns, err := detect(d)
d.Lock()
if err == nil {
if len(dns) > 0 {
d.dns = dns
}
d.got = true
}
if d.lastActiveIP == ip && isTheSameErr(err, d.err) {
d.constancy++
} else {
d.constancy = 1
}
d.lastActiveIP = ip
d.err = err
d.Unlock()
return err
}
// SetNewRound sets a new force detecting.
func (d *Detector) SetNewRound() {
d.Lock()
d.got = false
d.Unlock()
}
// Status gets the detected results.
func (d *Detector) Status() (constancy int, ip string, dns []net.IP, err error) {
d.RLock()
constancy = d.constancy
ip = d.lastActiveIP
dns = d.dns
err = d.err
d.RUnlock()
return
}
// Serve periodically detects the DNS as a daemon.
// cycle is the soft detecting rounds following a force detecting. sleep is in seconds.
func (d *Detector) Serve(cycle, sleep int) {
var i int
if cycle <= 0 {
cycle = 9
}
if sleep <= 0 {
sleep = 10
}
for {
if i%cycle == 0 {
d.SetNewRound()
}
_ = d.Detect()
i++
time.Sleep(time.Duration(sleep) * time.Second)
}
}
func isTheSameErr(err1, err2 error) bool {
return err1 == err2 || (err1 != nil && err2 != nil && err1.Error() == err2.Error())
}