-add missing includes for FreeBSD
[oweals/gnunet.git] / src / gns / gnunet-dns2gns.c
index cb7abe6ec91a3bdf26f4d7689c533be480326ca6..ec64f0730cfdb14c68e6c831a1f32ed2e08a18df 100644 (file)
 #include <gnunet_util_lib.h>
 #include <gnunet_dnsparser_lib.h>
 #include <gnunet_gns_service.h>
+#include <gnunet_dnsstub_lib.h>
+#include "gns.h"
 
 /**
  * Timeout for DNS requests.
  */
 #define TIMEOUT GNUNET_TIME_UNIT_MINUTES
 
+/**
+ * Default suffix
+ */
+#define DNS_SUFFIX ".zkey.eu"
+
+/**
+ * FCFS suffix
+ */
+#define FCFS_SUFFIX "fcfs.zkey.eu"
+
 /**
  * Data kept per request.
  */
@@ -58,6 +70,11 @@ struct Request
    */
   struct GNUNET_GNS_LookupRequest *lookup;
 
+  /**
+   * Our DNS request handle
+   */
+  struct GNUNET_DNSSTUB_RequestSocket *dns_lookup;
+
   /**
    * Task run on timeout or shutdown to clean up without
    * response.
@@ -77,6 +94,11 @@ struct Request
  */
 struct GNUNET_GNS_Handle *gns;
 
+/**
+ * Stub resolver
+ */
+struct GNUNET_DNSSTUB_Context *dns_stub;
+
 /**
  * Listen socket for IPv4.
  */
@@ -97,6 +119,26 @@ static GNUNET_SCHEDULER_TaskIdentifier t4;
  */
 static GNUNET_SCHEDULER_TaskIdentifier t6;
 
+/**
+ * DNS suffix, suffix of this gateway in DNS; defaults to '.zkey.eu'
+ */
+static char *dns_suffix;
+
+/**
+ * FCFS suffix, suffix of FCFS-authority in DNS; defaults to 'fcfs.zkey.eu'.
+ */
+static char *fcfs_suffix;
+
+/**
+ * IP of DNS server
+ */
+static char *dns_ip;
+
+/**
+ * UDP Port we listen on for inbound DNS requests.
+ */
+static unsigned int listen_port = 53;
+
 
 /**
  * Task run on shutdown.  Cleans up everything.
@@ -124,6 +166,8 @@ do_shutdown (void *cls,
   }
   GNUNET_GNS_disconnect (gns);
   gns = NULL;
+  GNUNET_DNSSTUB_stop (dns_stub);
+  dns_stub = NULL;
 }
 
 
@@ -175,18 +219,43 @@ do_timeout (void *cls,
 {
   struct Request *request = cls;
 
-  GNUNET_DNSPARSER_free_packet (request->packet);
-  GNUNET_GNS_cancel_lookup_request (request->lookup);
+  if (NULL != request->packet)
+    GNUNET_DNSPARSER_free_packet (request->packet);
+  if (NULL != request->lookup)
+    GNUNET_GNS_cancel_lookup_request (request->lookup);
+  if (NULL != request->dns_lookup)
+    GNUNET_DNSSTUB_resolve_cancel (request->dns_lookup);
   GNUNET_free (request);
 }
 
 
+/**
+ * Iterator called on obtained result for a DNS
+ * lookup
+ *
+ * @param cls closure
+ * @param rs the request socket
+ * @param dns the DNS udp payload
+ * @param r size of the DNS payload
+ */
+static void
+dns_result_processor (void *cls,
+                  struct GNUNET_DNSSTUB_RequestSocket *rs,
+                  const struct GNUNET_TUN_DnsHeader *dns,
+                  size_t r)
+{
+  struct Request *request = cls;
+
+  request->packet = GNUNET_DNSPARSER_parse ((char*)dns, r);
+  send_response (request);
+}
+
+
 /**
  * Iterator called on obtained result for a GNS
  * lookup
  *
  * @param cls closure
- * @param name "name" of the original lookup
  * @param rd_count number of records
  * @param rd the records in reply
  */
@@ -196,12 +265,71 @@ result_processor (void *cls,
                  const struct GNUNET_NAMESTORE_RecordData *rd)
 {
   struct Request *request = cls;
+  struct GNUNET_DNSPARSER_Packet *packet;
+  uint32_t i;
+  struct GNUNET_DNSPARSER_Record rec;
 
-  // FIXME: is 'processor' called only once or
-  // possibly more than once?
   request->lookup = NULL;
-  GNUNET_break (0);
-  // FIXME: convert 'rd' to response here...
+  packet = request->packet;
+  packet->flags.query_or_response = 1;
+  packet->flags.return_code = GNUNET_DNSPARSER_RETURN_CODE_NO_ERROR;
+  packet->flags.checking_disabled = 0;
+  packet->flags.authenticated_data = 1;
+  packet->flags.zero = 0;
+  packet->flags.recursion_available = 1;
+  packet->flags.message_truncated = 0;
+  packet->flags.authoritative_answer = 0;
+  //packet->flags.opcode = GNUNET_DNSPARSER_OPCODE_STATUS; // ???
+  for (i=0;i<rd_count;i++)
+    {
+      rec.expiration_time.abs_value = rd[i].expiration_time;
+      switch (rd[i].record_type)
+       {
+       case GNUNET_DNSPARSER_TYPE_A:
+         GNUNET_assert (sizeof (struct in_addr) == rd[i].data_size);
+         rec.name = GNUNET_strdup (packet->queries[0].name);
+         rec.class = GNUNET_DNSPARSER_CLASS_INTERNET;
+         rec.type = GNUNET_DNSPARSER_TYPE_A;
+         rec.data.raw.data = GNUNET_malloc (sizeof (struct in_addr));
+         memcpy (rec.data.raw.data,
+                 rd[i].data,
+                 rd[i].data_size);
+         rec.data.raw.data_len = sizeof (struct in_addr);
+         GNUNET_array_append (packet->answers,
+                              packet->num_answers,
+                              rec);
+         break;
+       case GNUNET_DNSPARSER_TYPE_AAAA:
+         GNUNET_assert (sizeof (struct in6_addr) == rd[i].data_size);
+         rec.name = GNUNET_strdup (packet->queries[0].name);
+         rec.data.raw.data = GNUNET_malloc (sizeof (struct in6_addr));
+         rec.class = GNUNET_DNSPARSER_CLASS_INTERNET;
+         rec.type = GNUNET_DNSPARSER_TYPE_AAAA;
+         memcpy (rec.data.raw.data,
+                 rd[i].data,
+                 rd[i].data_size);
+         rec.data.raw.data_len = sizeof (struct in6_addr);
+         GNUNET_array_append (packet->answers,
+                              packet->num_answers,
+                              rec);
+         break;
+       case GNUNET_DNSPARSER_TYPE_CNAME:
+         rec.name = GNUNET_strdup (packet->queries[0].name);
+         rec.data.hostname = strdup (rd[i].data);
+         rec.class = GNUNET_DNSPARSER_CLASS_INTERNET;
+         rec.type = GNUNET_DNSPARSER_TYPE_CNAME;
+         memcpy (rec.data.hostname,
+                 rd[i].data,
+                 rd[i].data_size);
+         GNUNET_array_append (packet->answers,
+                              packet->num_answers,
+                              rec);
+         break;
+       default:
+         /* skip */
+         break;
+       }
+    }
   send_response (request);
 }
 
@@ -224,13 +352,45 @@ handle_request (struct GNUNET_NETWORK_Handle *lsock,
 {
   struct Request *request;
   struct GNUNET_DNSPARSER_Packet *packet;
+  char *name;
+  char *dot;
+  char *nname;
+  size_t name_len;
+  enum GNUNET_GNS_RecordType type;
+  int use_gns;
+  struct GNUNET_CRYPTO_ShortHashCode zone;
 
   packet = GNUNET_DNSPARSER_parse (udp_msg, udp_msg_size);
   if (NULL == packet)
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+                 _("Cannot parse DNS request from %s\n"),
+                 GNUNET_a2s (addr, addr_len));
+      return;
+    }
+  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+             "Received request for `%s' with flags %u, #answers %d, #auth %d, #additional %d\n",
+             packet->queries[0].name,
+             (unsigned int) packet->flags.query_or_response,
+             (int) packet->num_answers,
+             (int) packet->num_authority_records,
+             (int) packet->num_additional_records);
+  if ( (0 != packet->flags.query_or_response) || 
+       (0 != packet->num_answers) ||
+       (0 != packet->num_authority_records))
     {
       GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
                  _("Received malformed DNS request from %s\n"),
                  GNUNET_a2s (addr, addr_len));
+      GNUNET_DNSPARSER_free_packet (packet);
+      return;
+    }
+  if ( (1 != packet->num_queries) )
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+                 _("Received unsupported DNS request from %s\n"),
+                 GNUNET_a2s (addr, addr_len));
+      GNUNET_DNSPARSER_free_packet (packet);
       return;
     }
   request = GNUNET_malloc (sizeof (struct Request) + addr_len);
@@ -242,16 +402,76 @@ handle_request (struct GNUNET_NETWORK_Handle *lsock,
   request->timeout_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT,
                                                        &do_timeout,
                                                        request);
-  // FIXME: extract name and type from 'request->packet'
-  const char *name = "foo";
-  enum GNUNET_GNS_RecordType type = GNUNET_GNS_RECORD_A;
-  request->lookup = GNUNET_GNS_lookup (gns,
-                                      name,
-                                      type,
-                                      GNUNET_NO,
-                                      NULL,
-                                      &result_processor,
-                                      request);
+  name = GNUNET_strdup (packet->queries[0].name);
+  name_len = strlen (name);
+  use_gns = GNUNET_NO;
+  if ( (name_len > strlen (dns_suffix)) &&
+       (0 == strcasecmp (dns_suffix,
+                        &name[name_len - strlen (dns_suffix)])) )
+    {
+      /* Test if '.zkey' was requested */
+      name[name_len - strlen (dns_suffix)] = '\0';
+      dot = strrchr (name, (int) '.');
+      if ( (NULL != dot) &&
+          (GNUNET_OK ==
+           GNUNET_CRYPTO_short_hash_from_string (dot + 1, &zone)) )
+      {
+       /* valid '.zkey' name */
+       GNUNET_asprintf (&nname, 
+                        "%s.%s", 
+                        name, 
+                        GNUNET_GNS_TLD_ZKEY);
+       GNUNET_free (name);
+       name = nname;
+      }
+      else
+      {        
+       /* try '.gads' name */
+       GNUNET_asprintf (&nname, 
+                        "%s.%s", 
+                        name, 
+                        GNUNET_GNS_TLD);
+       GNUNET_free (name);
+       name = nname;
+      }
+      name_len = strlen (name);
+    }
+  if ( (name_len >= strlen ((GNUNET_GNS_TLD))) &&
+       (0 == strcasecmp (GNUNET_GNS_TLD,
+                         &name[name_len - strlen (GNUNET_GNS_TLD)])) )
+    use_gns = GNUNET_YES;
+
+  if ( (name_len > strlen (GNUNET_GNS_TLD_ZKEY)) &&
+       (0 == strcasecmp (GNUNET_GNS_TLD_ZKEY,
+                         &name[name_len - strlen (GNUNET_GNS_TLD_ZKEY)])) )
+    use_gns = GNUNET_YES;
+
+  if (GNUNET_YES == use_gns)
+  {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+                  "Calling GNS\n");
+      type = packet->queries[0].type;
+      request->lookup = GNUNET_GNS_lookup (gns,
+                                          name,
+                                          type,
+                                          GNUNET_NO,
+                                          NULL,
+                                          &result_processor,
+                                          request);
+    }
+  else
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+                  "Calling DNS at %s\n", dns_ip);
+      GNUNET_DNSPARSER_free_packet (request->packet);
+      request->packet = NULL;
+      request->dns_lookup = GNUNET_DNSSTUB_resolve2 (dns_stub,
+                                                     udp_msg,
+                                                     udp_msg_size,
+                                                     &dns_result_processor,
+                                                     request);
+    }
+  GNUNET_free (name);
 }
 
 
@@ -353,9 +573,25 @@ static void
 run (void *cls, char *const *args, const char *cfgfile,
      const struct GNUNET_CONFIGURATION_Handle *cfg)
 {
-  gns = GNUNET_GNS_connect (cfg);
-  if (NULL == gns)
+  if (NULL == dns_ip)
+  {
+    GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
+                "No DNS server specified!\n");
+    return;
+  }
+
+  if (NULL == dns_suffix)
+    dns_suffix = DNS_SUFFIX;
+  if (NULL == fcfs_suffix)
+    fcfs_suffix = FCFS_SUFFIX;
+  if (NULL == (gns = GNUNET_GNS_connect (cfg)))
     return;
+  if (NULL == (dns_stub = GNUNET_DNSSTUB_start (dns_ip)))
+    {
+      GNUNET_GNS_disconnect (gns);
+      gns = NULL;
+      return;
+    }
   listen_socket4 = GNUNET_NETWORK_socket_create (PF_INET,
                                                 SOCK_DGRAM, 
                                                 IPPROTO_UDP);
@@ -368,11 +604,12 @@ run (void *cls, char *const *args, const char *cfgfile,
 #if HAVE_SOCKADDR_IN_SIN_LEN
       v4.sin_len = sizeof (v4);
 #endif
-      v4.sin_port = htons (53);
+      v4.sin_port = htons (listen_port);
       if (GNUNET_OK !=
          GNUNET_NETWORK_socket_bind (listen_socket4,
                                      (struct sockaddr *) &v4,
-                                     sizeof (v4)))
+                                     sizeof (v4),
+                                      0))
        {
          GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "bind");
          GNUNET_NETWORK_socket_close (listen_socket4);
@@ -391,11 +628,12 @@ run (void *cls, char *const *args, const char *cfgfile,
 #if HAVE_SOCKADDR_IN_SIN_LEN
       v6.sin6_len = sizeof (v6);
 #endif
-      v6.sin6_port = htons (53);
+      v6.sin6_port = htons (listen_port);
       if (GNUNET_OK !=
          GNUNET_NETWORK_socket_bind (listen_socket6,
                                      (struct sockaddr *) &v6,
-                                     sizeof (v6)))
+                                     sizeof (v6),
+                                      0))
        {
          GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, "bind");
          GNUNET_NETWORK_socket_close (listen_socket6);
@@ -404,7 +642,13 @@ run (void *cls, char *const *args, const char *cfgfile,
     }
   if ( (NULL == listen_socket4) &&
        (NULL == listen_socket6) )
-    return;
+    {
+      GNUNET_GNS_disconnect (gns);
+      gns = NULL;
+      GNUNET_DNSSTUB_stop (dns_stub);
+      dns_stub = NULL;
+      return;
+    }
   if (NULL != listen_socket4)
     t4 = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
                                        listen_socket4,
@@ -433,6 +677,18 @@ main (int argc,
       char *const *argv)
 {
   static const struct GNUNET_GETOPT_CommandLineOption options[] = {
+    {'d', "dns", "IP",
+      gettext_noop ("IP of recursive DNS resolver to use (required)"), 1,
+      &GNUNET_GETOPT_set_string, &dns_ip},
+    {'s', "suffix", "SUFFIX",
+      gettext_noop ("Authoritative DNS suffix to use (optional); default: zkey.eu"), 1,
+      &GNUNET_GETOPT_set_string, &dns_suffix},
+    {'f', "fcfs", "NAME",
+      gettext_noop ("Authoritative FCFS suffix to use (optional); default: fcfs.zkey.eu"), 1,
+      &GNUNET_GETOPT_set_string, &fcfs_suffix},
+    {'p', "port", "UDPPORT",
+      gettext_noop ("UDP port to listen on for inbound DNS requests; default: 53"), 1,
+      &GNUNET_GETOPT_set_uint, &listen_port},
     GNUNET_GETOPT_OPTION_END
   };
   int ret;
@@ -447,7 +703,7 @@ main (int argc,
                            _("GNUnet DNS-to-GNS proxy (a DNS server)"), 
                           options,
                            &run, NULL)) ? 0 : 1;
-
+  GNUNET_free ((void*) argv);
   return ret;
 }