blob: 2c2715524df28c146341ccdb8ad39a82c76d9967 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/dns/dns_util.h"
#include <errno.h>
#include <limits.h>
#include <algorithm>
#include <cstring>
#include <string>
#include <unordered_map>
#include <vector>
#include "base/big_endian.h"
#include "base/containers/contains.h"
#include "base/feature_list.h"
#include "base/metrics/field_trial.h"
#include "base/metrics/histogram_macros.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "build/build_config.h"
#include "net/base/url_util.h"
#include "net/dns/public/dns_protocol.h"
#include "net/dns/public/doh_provider_entry.h"
#include "net/dns/public/util.h"
#include "net/third_party/uri_template/uri_template.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
#if BUILDFLAG(IS_POSIX)
#include <netinet/in.h>
#include <net/if.h>
#if !BUILDFLAG(IS_ANDROID)
#include <ifaddrs.h>
#endif // !BUILDFLAG(IS_ANDROID)
#endif // BUILDFLAG(IS_POSIX)
#if BUILDFLAG(IS_ANDROID)
#include "net/android/network_library.h"
#endif
namespace net {
namespace {
// Based on DJB's public domain code.
bool DNSDomainFromDot(const base::StringPiece& dotted,
bool is_unrestricted,
std::string* out) {
const char* buf = dotted.data();
size_t n = dotted.size();
char label[dns_protocol::kMaxLabelLength];
size_t labellen = 0; /* <= sizeof label */
char name[dns_protocol::kMaxNameLength];
size_t namelen = 0; /* <= sizeof name */
char ch;
for (;;) {
if (!n)
break;
ch = *buf++;
--n;
if (ch == '.') {
// Don't allow empty labels per http://crbug.com/456391.
if (!labellen)
return false;
if (namelen + labellen + 1 > sizeof name)
return false;
name[namelen++] = static_cast<char>(labellen);
memcpy(name + namelen, label, labellen);
namelen += labellen;
labellen = 0;
continue;
}
if (labellen >= sizeof label)
return false;
if (!is_unrestricted && !IsValidHostLabelCharacter(ch, labellen == 0)) {
return false;
}
label[labellen++] = ch;
}
// Allow empty label at end of name to disable suffix search.
if (labellen) {
if (namelen + labellen + 1 > sizeof name)
return false;
name[namelen++] = static_cast<char>(labellen);
memcpy(name + namelen, label, labellen);
namelen += labellen;
labellen = 0;
}
if (namelen + 1 > sizeof name)
return false;
if (namelen == 0) // Empty names e.g. "", "." are not valid.
return false;
name[namelen++] = 0; // This is the root label (of length 0).
*out = std::string(name, namelen);
return true;
}
DohProviderEntry::List GetDohProviderEntriesFromNameservers(
const std::vector<IPEndPoint>& dns_servers) {
const DohProviderEntry::List& providers = DohProviderEntry::GetList();
DohProviderEntry::List entries;
for (const auto& server : dns_servers) {
for (const auto* entry : providers) {
// DoH servers should only be added once.
if (base::FeatureList::IsEnabled(entry->feature) &&
base::Contains(entry->ip_addresses, server.address()) &&
!base::Contains(entries, entry)) {
entries.push_back(entry);
}
}
}
return entries;
}
} // namespace
bool DNSDomainFromDot(const base::StringPiece& dotted, std::string* out) {
return DNSDomainFromDot(dotted, false /* is_unrestricted */, out);
}
bool DNSDomainFromUnrestrictedDot(const base::StringPiece& dotted,
std::string* out) {
return DNSDomainFromDot(dotted, true /* is_unrestricted */, out);
}
bool IsValidDNSDomain(const base::StringPiece& dotted) {
std::string dns_formatted;
return DNSDomainFromDot(dotted, &dns_formatted);
}
bool IsValidUnrestrictedDNSDomain(const base::StringPiece& dotted) {
std::string dns_formatted;
return DNSDomainFromUnrestrictedDot(dotted, &dns_formatted);
}
bool IsValidHostLabelCharacter(char c, bool is_first_char) {
return (c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') ||
(c >= '0' && c <= '9') || (!is_first_char && c == '-') || c == '_';
}
absl::optional<std::string> DnsDomainToString(base::StringPiece dns_name,
bool require_complete) {
auto reader = base::BigEndianReader::FromStringPiece(dns_name);
return DnsDomainToString(reader, require_complete);
}
absl::optional<std::string> DnsDomainToString(base::BigEndianReader& reader,
bool require_complete) {
std::string ret;
size_t octets_read = 0;
while (reader.remaining() > 0) {
// DNS name compression not allowed because it does not make sense without
// the context of a full DNS message.
if ((*reader.ptr() & dns_protocol::kLabelMask) ==
dns_protocol::kLabelPointer)
return absl::nullopt;
base::StringPiece label;
if (!reader.ReadU8LengthPrefixed(&label))
return absl::nullopt;
// Final zero-length label not included in size enforcement.
if (label.size() != 0)
octets_read += label.size() + 1;
if (label.size() > dns_protocol::kMaxLabelLength)
return absl::nullopt;
if (octets_read > dns_protocol::kMaxNameLength)
return absl::nullopt;
if (label.size() == 0)
return ret;
if (!ret.empty())
ret.append(".");
ret.append(label.data(), label.size());
}
if (require_complete)
return absl::nullopt;
// If terminating zero-length label was not included in the input, no need to
// recheck against max name length because terminating zero-length label does
// not count against the limit.
return ret;
}
std::string GetURLFromTemplateWithoutParameters(const string& server_template) {
std::string url_string;
std::unordered_map<string, string> parameters;
uri_template::Expand(server_template, parameters, &url_string);
return url_string;
}
namespace {
bool GetTimeDeltaForConnectionTypeFromFieldTrial(
const char* field_trial,
NetworkChangeNotifier::ConnectionType type,
base::TimeDelta* out) {
std::string group = base::FieldTrialList::FindFullName(field_trial);
if (group.empty())
return false;
std::vector<base::StringPiece> group_parts = base::SplitStringPiece(
group, ":", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
if (type < 0)
return false;
size_t type_size = static_cast<size_t>(type);
if (type_size >= group_parts.size())
return false;
int64_t ms;
if (!base::StringToInt64(group_parts[type_size], &ms))
return false;
*out = base::Milliseconds(ms);
return true;
}
} // namespace
base::TimeDelta GetTimeDeltaForConnectionTypeFromFieldTrialOrDefault(
const char* field_trial,
base::TimeDelta default_delta,
NetworkChangeNotifier::ConnectionType type) {
base::TimeDelta out;
if (!GetTimeDeltaForConnectionTypeFromFieldTrial(field_trial, type, &out))
out = default_delta;
return out;
}
std::string CreateNamePointer(uint16_t offset) {
DCHECK_EQ(offset & ~dns_protocol::kOffsetMask, 0);
char buf[2];
base::WriteBigEndian(buf, offset);
buf[0] |= dns_protocol::kLabelPointer;
return std::string(buf, sizeof(buf));
}
uint16_t DnsQueryTypeToQtype(DnsQueryType dns_query_type) {
switch (dns_query_type) {
case DnsQueryType::UNSPECIFIED:
NOTREACHED();
return 0;
case DnsQueryType::A:
return dns_protocol::kTypeA;
case DnsQueryType::AAAA:
return dns_protocol::kTypeAAAA;
case DnsQueryType::TXT:
return dns_protocol::kTypeTXT;
case DnsQueryType::PTR:
return dns_protocol::kTypePTR;
case DnsQueryType::SRV:
return dns_protocol::kTypeSRV;
case DnsQueryType::INTEGRITY:
return dns_protocol::kExperimentalTypeIntegrity;
case DnsQueryType::HTTPS:
case DnsQueryType::HTTPS_EXPERIMENTAL:
return dns_protocol::kTypeHttps;
}
}
DnsQueryType AddressFamilyToDnsQueryType(AddressFamily address_family) {
switch (address_family) {
case ADDRESS_FAMILY_UNSPECIFIED:
return DnsQueryType::UNSPECIFIED;
case ADDRESS_FAMILY_IPV4:
return DnsQueryType::A;
case ADDRESS_FAMILY_IPV6:
return DnsQueryType::AAAA;
default:
NOTREACHED();
return DnsQueryType::UNSPECIFIED;
}
}
std::vector<DnsOverHttpsServerConfig> GetDohUpgradeServersFromDotHostname(
const std::string& dot_server) {
std::vector<DnsOverHttpsServerConfig> doh_servers;
if (dot_server.empty())
return doh_servers;
for (const auto* entry : DohProviderEntry::GetList()) {
if (base::FeatureList::IsEnabled(entry->feature) &&
base::Contains(entry->dns_over_tls_hostnames, dot_server)) {
doh_servers.push_back(entry->doh_server_config);
}
}
return doh_servers;
}
std::vector<DnsOverHttpsServerConfig> GetDohUpgradeServersFromNameservers(
const std::vector<IPEndPoint>& dns_servers) {
const auto entries = GetDohProviderEntriesFromNameservers(dns_servers);
std::vector<DnsOverHttpsServerConfig> doh_servers;
doh_servers.reserve(entries.size());
std::transform(entries.begin(), entries.end(),
std::back_inserter(doh_servers),
[](const auto* entry) { return entry->doh_server_config; });
return doh_servers;
}
std::string GetDohProviderIdForHistogramFromServerConfig(
const DnsOverHttpsServerConfig& doh_server) {
const auto& entries = DohProviderEntry::GetList();
const auto it =
std::find_if(entries.begin(), entries.end(), [&](const auto* entry) {
return entry->doh_server_config == doh_server;
});
return it != entries.end() ? (*it)->provider : "Other";
}
std::string GetDohProviderIdForHistogramFromNameserver(
const IPEndPoint& nameserver) {
const auto entries = GetDohProviderEntriesFromNameservers({nameserver});
return entries.empty() ? "Other" : entries[0]->provider;
}
std::string SecureDnsModeToString(const SecureDnsMode secure_dns_mode) {
switch (secure_dns_mode) {
case SecureDnsMode::kOff:
return "Off";
case SecureDnsMode::kAutomatic:
return "Automatic";
case SecureDnsMode::kSecure:
return "Secure";
}
}
} // namespace net