2 * Copyright (c) 2002-2004 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
23 Change History (most recent first):
26 Revision 1.225 2005/10/21 22:51:17 cheshire
27 <rdar://problem/4290265> Add check to avoid crashing NAT gateways that have buggy DNS relay code
28 Refinement: Shorten "check-for-broken-dns-relay" to just "dnsbugtest"
29 to avoid crashing NAT gateways that have a different DNS relay bug
31 Revision 1.224 2005/10/20 00:10:33 cheshire
32 <rdar://problem/4290265> Add check to avoid crashing NAT gateways that have buggy DNS relay code
34 Revision 1.223 2005/10/17 18:52:42 cheshire
35 <rdar://problem/4271183> mDNSResponder crashed in CheckRecordRegistrations
36 Move code to unregister the service's extra records from uDNS_DeregisterService() to unlinkSRS().
38 Revision 1.222 2005/10/05 23:04:10 cheshire
39 Add more information to unlinkAR and startLLQHandshakeCallback error messages
41 Revision 1.221 2005/10/05 17:27:48 herscher
42 <rdar://problem/4272516> Change 200ms delay to 10ms
44 Revision 1.220 2005/09/24 01:10:09 cheshire
47 Revision 1.219 2005/09/22 07:28:25 herscher
48 Double the delay to 200000 usec after sending out a DNS query
50 Revision 1.218 2005/09/13 01:06:14 herscher
51 <rdar://problem/4248878> Add 100ms delay in sendQuery.
53 Revision 1.217 2005/08/04 18:08:24 cheshire
56 Revision 1.216 2005/07/29 23:05:22 ksekar
57 <rdar://problem/4137930> Hostname registration should register IPv6 AAAA record with DNS Update
58 Services should point to IPv6 address if IPv4 NAT mapping fails
60 Revision 1.215 2005/07/29 21:01:51 ksekar
61 <rdar://problem/4137930> Hostname registration should register IPv6 AAAA record with DNS Update
62 correction to original checkin - misplaced return in HostnameCallback and logic error determining v6 changes
64 Revision 1.214 2005/07/29 19:46:10 ksekar
65 <rdar://problem/4191860> reduce polling period on failed LLQs to 15 minutes
67 Revision 1.213 2005/07/29 18:04:22 ksekar
68 <rdar://problem/4137930> Hostname registration should register IPv6 AAAA record with DNS Update
70 Revision 1.212 2005/07/22 19:35:50 ksekar
71 <rdar://problem/4188821> SUTiger: LLQ event acknowledgments are not formated correctly
73 Revision 1.211 2005/07/21 18:51:04 ksekar
74 <rdar://problem/4103136> mDNSResponder times out when mapping ports after sleep
76 Revision 1.210 2005/07/21 18:47:31 ksekar
77 <rdar://problem/4137283> NAT-PMP refresh Requested Public Port should contain actual mapped port
79 Revision 1.209 2005/07/04 21:16:37 cheshire
80 Minor code tidying -- initialize variables where they are declared
82 Revision 1.208 2005/06/28 00:24:28 ksekar
83 <rdar://problem/4157823> memory smasher in conQueryCallback
85 Revision 1.207 2005/05/13 20:45:10 ksekar
86 <rdar://problem/4074400> Rapid wide-area txt record updates don't work
88 Revision 1.206 2005/03/31 02:19:55 cheshire
89 <rdar://problem/4021486> Fix build warnings
90 Reviewed by: Scott Herscher
92 Revision 1.205 2005/03/21 00:33:51 shersche
93 <rdar://problem/4021486> Fix build warnings on Win32 platform
95 Revision 1.204 2005/03/16 00:42:32 ksekar
96 <rdar://problem/4012279> Long-lived queries not working on Windows
98 Revision 1.203 2005/03/04 03:00:03 ksekar
99 <rdar://problem/4026546> Retransmissions happen too early, causing registrations to conflict with themselves
101 Revision 1.202 2005/03/01 19:29:17 ksekar
102 changed LogMsgs to debugfs
104 Revision 1.201 2005/02/26 03:04:13 cheshire
105 <rdar://problem/4017292> Should not indicate successful dynamic update if no network connection
106 Don't try to do updates to root name server. This ensures status dot turns red if user
107 enters a bad host name such as just "fred" instead of a properly fully-qualified name.
109 Revision 1.200 2005/02/25 17:47:45 ksekar
110 <rdar://problem/4021868> SendServiceRegistration fails on wake from sleep
112 Revision 1.199 2005/02/25 04:21:00 cheshire
113 <rdar://problem/4015377> mDNS -F returns the same domain multiple times with different casing
115 Revision 1.198 2005/02/25 02:35:22 cheshire
116 <rdar://problem/4017292> Should not indicate successful dynamic update if no network connection
117 If we get NXDomain error looking for the _dns-update._udp record,
118 update status from 1 (in progress) to mStatus_NoSuchNameErr (failed)
120 Revision 1.197 2005/02/24 21:56:59 ksekar
121 Change LogMsgs to debugfs
123 Revision 1.196 2005/02/24 21:52:28 ksekar
124 <rdar://problem/3922768> Remove "deferred deregistration" logic for hostnames
126 Revision 1.195 2005/02/22 17:53:08 ksekar
127 Changed successful NAT Traversals from LogMsg to LogOperation
129 Revision 1.194 2005/02/15 18:38:03 ksekar
130 <rdar://problem/3967876> change expected/redundant log messages to debugfs.
132 Revision 1.193 2005/02/15 01:17:48 ksekar
135 Revision 1.192 2005/02/14 23:01:28 ksekar
136 Refinement to previous checkin - don't log bad LLQ opcode if we had to send the request more than once.
138 Revision 1.191 2005/02/14 18:26:51 ksekar
139 <rdar://problem/4005569> mDNSResponder complains about bad LLQ Opcode 2
141 Revision 1.190 2005/02/11 19:44:06 shersche
142 Remove extra semicolon at end of line
144 Revision 1.189 2005/02/10 21:07:02 ksekar
145 Don't goto error in ReceiveNATAddrResponse if we receive a malformatted response
147 Revision 1.188 2005/02/10 02:02:44 ksekar
148 Remove double semi-colon
150 Revision 1.187 2005/02/09 23:28:01 ksekar
151 <rdar://problem/3984374> NAT-PMP response callback should return a
152 boolean indicating if the packet matched the request
154 Revision 1.186 2005/02/04 21:56:29 ksekar
155 <rdar://problem/3984374> Simultaneous port map requests sometimes fail
156 - Refinement to previous checkin.
158 Revision 1.185 2005/02/03 23:48:22 ksekar
159 <rdar://problem/3984374> Simultaneous port map requests sometimes fail
161 Revision 1.184 2005/02/01 19:33:29 ksekar
162 <rdar://problem/3985239> Keychain format too restrictive
164 Revision 1.183 2005/01/27 22:57:55 cheshire
165 Fix compile errors on gcc4
167 Revision 1.182 2005/01/25 18:55:05 ksekar
168 Shortened log message
170 Revision 1.181 2005/01/25 02:17:32 cheshire
171 <rdar://problem/3971263> Don't use query ID zero in uDNS queries
173 Revision 1.180 2005/01/19 21:01:54 ksekar
174 <rdar://problem/3955355> uDNS needs to support subtype registration and browsing
176 Revision 1.179 2005/01/19 19:15:35 ksekar
177 Refinement to <rdar://problem/3954575> - Simplify mDNS_PurgeResultsForDomain logic and move into daemon layer
179 Revision 1.178 2005/01/17 23:47:58 cheshire
180 <rdar://problem/3904954> Wide-area services not found on little-endian
182 Revision 1.177 2005/01/17 23:41:26 cheshire
185 Revision 1.176 2005/01/17 21:03:04 cheshire
186 <rdar://problem/3904954> Wide-area services not found on little-endian
188 Revision 1.175 2005/01/15 00:56:41 ksekar
189 <rdar://problem/3954575> Unicast services don't disappear when logging
192 Revision 1.174 2005/01/14 18:44:28 ksekar
193 <rdar://problem/3954609> mDNSResponder is crashing when changing domains
195 Revision 1.173 2005/01/14 18:34:22 ksekar
196 <rdar://problem/3954571> Services registered outside of firewall don't succeed after location change
198 Revision 1.172 2005/01/11 22:50:52 ksekar
199 Fixed constant naming (was using kLLQ_DefLease for update leases)
201 Revision 1.171 2005/01/10 04:52:49 ksekar
202 Changed LogMsg to debugf
204 Revision 1.170 2005/01/08 00:50:05 ksekar
205 Fixed spelling mistake in log msg
207 Revision 1.169 2005/01/08 00:42:18 ksekar
208 <rdar://problem/3922758> Clean up syslog messages
210 Revision 1.168 2004/12/23 23:22:47 ksekar
211 <rdar://problem/3933606> Unicast known answers "name" pointers point to garbage stack memory
213 Revision 1.167 2004/12/22 22:25:47 ksekar
214 <rdar://problem/3734265> NATPMP: handle location changes
216 Revision 1.166 2004/12/22 00:04:12 ksekar
217 <rdar://problem/3930324> mDNSResponder crashing in ReceivePortMapReply
219 Revision 1.165 2004/12/18 03:14:22 cheshire
222 Revision 1.164 2004/12/17 03:55:40 ksekar
223 Don't use -1 as special meaning for expiration timer (it is a valid
224 value, and is redundant with our state variables)
226 Revision 1.163 2004/12/17 03:51:53 ksekar
227 <rdar://problem/3920991> Don't update TXT record if service registration fails
229 Revision 1.162 2004/12/17 01:29:11 ksekar
230 <rdar://problem/3920598> Questions can go deaf on location changes
232 Revision 1.161 2004/12/16 20:42:02 cheshire
233 Fix compiler warnings
235 Revision 1.160 2004/12/16 20:13:00 cheshire
236 <rdar://problem/3324626> Cache memory management improvements
238 Revision 1.159 2004/12/15 02:11:22 ksekar
239 <rdar://problem/3917317> Don't check for Dynamic DNS hostname uniqueness
241 Revision 1.158 2004/12/15 02:04:28 ksekar
242 Refinement to previous checkin - we should still return NatTraversal error when the port mapping fails
244 Revision 1.157 2004/12/15 01:39:21 ksekar
245 Refinement to previous checkin - we should still return NatTraversal error when the port mapping fails
247 Revision 1.156 2004/12/15 01:18:57 ksekar
248 <rdar://problem/3825979> Call DeregisterService on nat port map failure
250 Revision 1.155 2004/12/14 21:21:20 ksekar
251 <rdar://problem/3825979> NAT-PMP: Update response format to contain "Seconds Since Boot"
253 Revision 1.154 2004/12/14 20:52:27 cheshire
254 Add question->qnamehash and cr->resrec.namehash to log message
256 Revision 1.153 2004/12/14 20:45:02 cheshire
257 Improved error logging in "unexpected answer" message
259 Revision 1.152 2004/12/14 03:02:10 ksekar
260 <rdar://problem/3919016> Rare race condition can cause crash
262 Revision 1.151 2004/12/13 21:45:08 ksekar
263 uDNS_DeregisterService should return NoError if called twice (to follow mDNS behavior expected by daemon layer)
265 Revision 1.150 2004/12/13 20:42:41 ksekar
268 Revision 1.149 2004/12/13 18:10:03 ksekar
271 Revision 1.148 2004/12/13 01:18:04 ksekar
272 Fixed unused variable warning for non-debug builds
274 Revision 1.147 2004/12/12 23:51:42 ksekar
275 <rdar://problem/3845683> Wide-area registrations should fallback to using DHCP hostname as target
277 Revision 1.146 2004/12/12 23:30:40 ksekar
278 <rdar://problem/3916987> Extra RRs not properly unlinked when parent service registration fails
280 Revision 1.145 2004/12/12 22:56:29 ksekar
281 <rdar://problem/3668508> Need to properly handle duplicate long-lived queries
283 Revision 1.144 2004/12/11 20:55:29 ksekar
284 <rdar://problem/3916479> Clean up registration state machines
286 Revision 1.143 2004/12/10 01:21:27 cheshire
287 <rdar://problem/3914089> Get rid of "LLQ Responses over TCP not currently supported" message
289 Revision 1.142 2004/12/08 02:03:31 ksekar
290 <rdar://problem/3865124> Looping on NAT Traversal error - check for
293 Revision 1.141 2004/12/07 01:39:28 cheshire
294 Don't fail if the same server is responsible for more than one domain
295 (e.g. the same DNS server may be responsible for both apple.com. and 17.in-addr.arpa.)
297 Revision 1.140 2004/12/06 21:15:22 ksekar
298 <rdar://problem/3884386> mDNSResponder crashed in CheckServiceRegistrations
300 Revision 1.139 2004/12/06 19:08:03 cheshire
301 Add clarifying comment -- CountLabels() excludes the final root label.
303 Revision 1.138 2004/12/06 01:45:54 ksekar
304 Correct wording in LogMsg
306 Revision 1.137 2004/12/03 20:40:35 ksekar
307 <rdar://problem/3865124> Looping on NAT Traversal error
309 Revision 1.136 2004/12/03 07:20:50 ksekar
310 <rdar://problem/3674208> Wide-Area: Registration of large TXT record fails
312 Revision 1.135 2004/12/03 05:18:33 ksekar
313 <rdar://problem/3810596> mDNSResponder needs to return more specific TSIG errors
315 Revision 1.134 2004/12/02 20:03:49 ksekar
316 <rdar://problem/3889647> Still publishes wide-area domains even after switching to a local subnet
318 Revision 1.133 2004/12/02 18:37:52 ksekar
319 <rdar://problem/3758233> Registering with port number zero should not create a port mapping
321 Revision 1.132 2004/12/01 20:57:19 ksekar
322 <rdar://problem/3873921> Wide Area Service Discovery must be split-DNS aware
324 Revision 1.131 2004/12/01 19:59:27 cheshire
325 <rdar://problem/3882643> Crash in mDNSPlatformTCPConnect
326 If a TCP response has the TC bit set, don't respond by just trying another TCP connection
328 Revision 1.130 2004/12/01 02:43:23 cheshire
329 Don't call StatusCallback if function pointer is null
331 Revision 1.129 2004/11/30 23:51:06 cheshire
332 Remove double semicolons
334 Revision 1.128 2004/11/25 01:48:30 ksekar
335 <rdar://problem/3878991> Logging into VPN does not trigger registration of address record
337 Revision 1.127 2004/11/25 01:41:36 ksekar
338 Changed unnecessary LogMsgs to debugfs
340 Revision 1.126 2004/11/23 23:54:17 ksekar
341 <rdar://problem/3890318> Wide-Area DNSServiceRegisterRecord() failures
342 can crash mDNSResponder
344 Revision 1.125 2004/11/23 04:16:48 cheshire
345 Removed receiveMsg() routine.
347 Revision 1.124 2004/11/23 04:06:51 cheshire
348 Get rid of floating point constant -- in a small embedded device, bringing in all
349 the floating point libraries just to halve an integer value is a bit too heavyweight.
351 Revision 1.123 2004/11/22 17:16:20 ksekar
352 <rdar://problem/3854298> Unicast services don't disappear when you disable all networking
354 Revision 1.122 2004/11/19 18:00:34 ksekar
355 <rdar://problem/3682646> Security: use random ID for one-shot unicast queries
357 Revision 1.121 2004/11/19 04:24:08 ksekar
358 <rdar://problem/3682609> Security: Enforce a "window" on one-shot wide-area queries
360 Revision 1.120 2004/11/19 02:32:43 ksekar
361 <rdar://problem/3682608> Wide-Area Security: Add LLQ-ID to events
363 Revision 1.119 2004/11/18 23:21:24 ksekar
364 <rdar://problem/3764544> LLQ Security: Need to verify src port/address for LLQ handshake
366 Revision 1.118 2004/11/18 22:58:37 ksekar
369 Revision 1.117 2004/11/18 18:04:21 ksekar
370 Restore checkins lost due to repository disk failure: Update comments & <rdar://problem/3880688>
372 Revision 1.xxx 2004/11/17 06:17:57 cheshire
373 Update comments to show correct SRV names: _dns-update._udp.<zone>. and _dns-llq._udp.<zone>.
375 Revision 1.xxx 2004/11/17 00:45:28 ksekar
376 <rdar://problem/3880688> Result of putUpdateLease not error-checked
378 Revision 1.116 2004/11/16 01:41:47 ksekar
381 Revision 1.115 2004/11/15 20:09:24 ksekar
382 <rdar://problem/3719050> Wide Area support for Add/Remove record
384 Revision 1.114 2004/11/13 02:32:47 ksekar
385 <rdar://problem/3868216> LLQ mobility fragile on non-primary interface
386 - fixed incorrect state comparison in CheckQueries
388 Revision 1.113 2004/11/13 02:29:52 ksekar
389 <rdar://problem/3878386> LLQ refreshes not reliable
391 Revision 1.112 2004/11/11 20:45:14 ksekar
392 <rdar://problem/3876052> self-conflict test not compatible with some BIND servers
394 Revision 1.111 2004/11/11 20:14:55 ksekar
395 <rdar://problem/3719574> Wide-Area registrations not deregistered on sleep
397 Revision 1.110 2004/11/10 23:53:53 ksekar
398 Remove no longer relevant comment
400 Revision 1.109 2004/11/10 20:40:53 ksekar
401 <rdar://problem/3868216> LLQ mobility fragile on non-primary interface
403 Revision 1.108 2004/11/01 20:36:16 ksekar
404 <rdar://problem/3802395> mDNSResponder should not receive Keychain Notifications
406 Revision 1.107 2004/10/26 06:11:41 cheshire
407 Add improved logging to aid in diagnosis of <rdar://problem/3842714> mDNSResponder crashed
409 Revision 1.106 2004/10/26 03:52:03 cheshire
410 Update checkin comments
412 Revision 1.105 2004/10/26 01:15:06 cheshire
413 Use "#if 0" instead of commenting out code
415 Revision 1.104 2004/10/25 21:41:38 ksekar
416 <rdar://problem/3852958> wide-area name conflicts can cause crash
418 Revision 1.103 2004/10/25 19:30:52 ksekar
419 <rdar://problem/3827956> Simplify dynamic host name structures
421 Revision 1.102 2004/10/23 01:16:00 cheshire
422 <rdar://problem/3851677> uDNS operations not always reliable on multi-homed hosts
424 Revision 1.101 2004/10/22 20:52:07 ksekar
425 <rdar://problem/3799260> Create NAT port mappings for Long Lived Queries
427 Revision 1.100 2004/10/20 02:16:41 cheshire
428 Improve "could not confirm existence of NS record" error message
429 Don't call newRR->RecordCallback if it is NULL
431 Revision 1.99 2004/10/19 21:33:18 cheshire
432 <rdar://problem/3844991> Cannot resolve non-local registrations using the mach API
433 Added flag 'kDNSServiceFlagsForceMulticast'. Passing through an interface id for a unicast name
434 doesn't force multicast unless you set this flag to indicate explicitly that this is what you want
436 Revision 1.98 2004/10/16 00:16:59 cheshire
437 <rdar://problem/3770558> Replace IP TTL 255 check with local subnet source address check
439 Revision 1.97 2004/10/15 23:00:18 ksekar
440 <rdar://problem/3799242> Need to update LLQs on location changes
442 Revision 1.96 2004/10/12 23:30:44 ksekar
443 <rdar://problem/3609944> mDNSResponder needs to follow CNAME referrals
445 Revision 1.95 2004/10/12 03:15:09 ksekar
446 <rdar://problem/3835612> mDNS_StartQuery shouldn't return transient no-server error
448 Revision 1.94 2004/10/12 02:49:20 ksekar
449 <rdar://problem/3831228> Clean up LLQ sleep/wake, error handling
451 Revision 1.93 2004/10/08 04:17:25 ksekar
452 <rdar://problem/3831819> Don't use DNS extensions if the server does not advertise required SRV record
454 Revision 1.92 2004/10/08 03:54:35 ksekar
455 <rdar://problem/3831802> Refine unicast polling intervals
457 Revision 1.91 2004/09/30 17:45:34 ksekar
458 <rdar://problem/3821119> lots of log messages: mDNS_SetPrimaryIP: IP address unchanged
460 Revision 1.90 2004/09/25 00:22:13 ksekar
461 <rdar://problem/3815534> Crash in uDNS_RegisterService
463 Revision 1.89 2004/09/24 19:14:53 cheshire
464 Remove unused "extern mDNS mDNSStorage"
466 Revision 1.88 2004/09/23 20:48:15 ksekar
467 Clarify retransmission debugf messages.
469 Revision 1.87 2004/09/22 00:41:59 cheshire
470 Move tcp connection status codes into the legal range allocated for mDNS use
472 Revision 1.86 2004/09/21 23:40:11 ksekar
473 <rdar://problem/3810349> mDNSResponder to return errors on NAT traversal failure
475 Revision 1.85 2004/09/21 22:38:27 ksekar
476 <rdar://problem/3810286> PrimaryIP type uninitialized
478 Revision 1.84 2004/09/18 00:30:39 cheshire
479 <rdar://problem/3806643> Infinite loop in CheckServiceRegistrations
481 Revision 1.83 2004/09/17 00:31:51 cheshire
482 For consistency with ipv6, renamed rdata field 'ip' to 'ipv4'
484 Revision 1.82 2004/09/16 21:36:36 cheshire
485 <rdar://problem/3803162> Fix unsafe use of mDNSPlatformTimeNow()
486 Changes to add necessary locking calls around unicast DNS operations
488 Revision 1.81 2004/09/16 02:29:39 cheshire
489 Moved mDNS_Lock/mDNS_Unlock to DNSCommon.c; Added necessary locking around
490 uDNS_ReceiveMsg, uDNS_StartQuery, uDNS_UpdateRecord, uDNS_RegisterService
492 Revision 1.80 2004/09/16 01:58:21 cheshire
493 Fix compiler warnings
495 Revision 1.79 2004/09/16 00:24:48 cheshire
496 <rdar://problem/3803162> Fix unsafe use of mDNSPlatformTimeNow()
498 Revision 1.78 2004/09/15 01:16:57 ksekar
499 <rdar://problem/3797598> mDNSResponder printing too many messages
501 Revision 1.77 2004/09/14 23:27:47 cheshire
504 Revision 1.76 2004/09/14 22:22:00 ksekar
505 <rdar://problem/3800920> Legacy browses broken against some BIND versions
507 Revision 1.75 2004/09/03 19:23:05 ksekar
508 <rdar://problem/3788460>: Need retransmission mechanism for wide-area service registrations
510 Revision 1.74 2004/09/02 17:49:04 ksekar
511 <rdar://problem/3785135>: 8A246: mDNSResponder crash while logging on restart
512 Fixed incorrect conversions, changed %s to %##s for all domain names.
514 Revision 1.73 2004/09/02 01:39:40 cheshire
515 For better readability, follow consistent convention that QR bit comes first, followed by OP bits
517 Revision 1.72 2004/09/01 03:59:29 ksekar
518 <rdar://problem/3783453>: Conditionally compile out uDNS code on Windows
520 Revision 1.71 2004/08/27 17:51:53 ksekar
521 Replaced unnecessary LogMsg with debugf.
523 Revision 1.70 2004/08/25 00:37:27 ksekar
524 <rdar://problem/3774635>: Cleanup DynDNS hostname registration code
526 Revision 1.69 2004/08/18 17:35:41 ksekar
527 <rdar://problem/3651443>: Feature #9586: Need support for Legacy NAT gateways
529 Revision 1.68 2004/08/14 03:22:41 cheshire
530 <rdar://problem/3762579> Dynamic DNS UI <-> mDNSResponder glue
531 Add GetUserSpecifiedDDNSName() routine
532 Convert ServiceRegDomain to domainname instead of C string
533 Replace mDNS_GenerateFQDN/mDNS_GenerateGlobalFQDN with mDNS_SetFQDNs
535 Revision 1.67 2004/08/13 23:46:58 cheshire
536 "asyncronous" -> "asynchronous"
538 Revision 1.66 2004/08/13 23:37:02 cheshire
539 Now that we do both uDNS and mDNS, global replace "uDNS_info.hostname" with
540 "uDNS_info.UnicastHostname" for clarity
542 Revision 1.65 2004/08/13 23:12:32 cheshire
543 Don't use strcpy() and strlen() on "struct domainname" objects;
544 use AssignDomainName() and DomainNameLength() instead
545 (A "struct domainname" is a collection of packed pascal strings, not a C string.)
547 Revision 1.64 2004/08/13 23:01:05 cheshire
548 Use platform-independent mDNSNULL instead of NULL
550 Revision 1.63 2004/08/12 00:32:36 ksekar
551 <rdar://problem/3759567>: LLQ Refreshes never terminate if unanswered
553 Revision 1.62 2004/08/10 23:19:14 ksekar
554 <rdar://problem/3722542>: DNS Extension daemon for Wide Area Service Discovery
555 Moved routines/constants to allow extern access for garbage collection daemon
557 Revision 1.61 2004/07/30 17:40:06 ksekar
558 <rdar://problem/3739115>: TXT Record updates not available for wide-area services
560 Revision 1.60 2004/07/29 19:40:05 ksekar
561 NATPMP Support - minor fixes and cleanup
563 Revision 1.59 2004/07/29 19:27:15 ksekar
564 NATPMP Support - minor fixes and cleanup
566 Revision 1.58 2004/07/27 07:35:38 shersche
567 fix syntax error, variables declared in the middle of a block
569 Revision 1.57 2004/07/26 22:49:30 ksekar
570 <rdar://problem/3651409>: Feature #9516: Need support for NATPMP in client
572 Revision 1.56 2004/07/26 19:14:44 ksekar
573 <rdar://problem/3737814>: 8A210: mDNSResponder crashed in startLLQHandshakeCallback
575 Revision 1.55 2004/07/15 19:01:33 ksekar
576 <rdar://problem/3681029>: Check for incorrect time comparisons
578 Revision 1.54 2004/06/22 02:10:53 ksekar
579 <rdar://problem/3705433>: Lighthouse failure causes packet flood to DNS
581 Revision 1.53 2004/06/17 20:49:09 ksekar
582 <rdar://problem/3690436>: mDNSResponder crash while location cycling
584 Revision 1.52 2004/06/17 01:13:11 ksekar
585 <rdar://problem/3696616>: polling interval too short
587 Revision 1.51 2004/06/10 04:36:44 cheshire
590 Revision 1.50 2004/06/10 00:55:13 ksekar
591 <rdar://problem/3686213>: crash on network reconnect
593 Revision 1.49 2004/06/10 00:10:50 ksekar
594 <rdar://problem/3686174>: Infinite Loop in uDNS_Execute()
596 Revision 1.48 2004/06/09 20:03:37 ksekar
597 <rdar://problem/3686163>: Incorrect copying of resource record in deregistration
599 Revision 1.47 2004/06/09 03:48:28 ksekar
600 <rdar://problem/3685226>: nameserver address fails with prod. Lighthouse server
602 Revision 1.46 2004/06/09 01:44:30 ksekar
603 <rdar://problem/3681378> reworked Cache Record copy code
605 Revision 1.45 2004/06/08 18:54:47 ksekar
606 <rdar://problem/3681378>: mDNSResponder leaks after exploring in Printer Setup Utility
608 Revision 1.44 2004/06/05 00:33:51 cheshire
609 <rdar://problem/3681029>: Check for incorrect time comparisons
611 Revision 1.43 2004/06/05 00:14:44 cheshire
612 Fix signed/unsigned and other compiler warnings
614 Revision 1.42 2004/06/04 22:36:16 ksekar
615 Properly set u->nextevent in uDNS_Execute
617 Revision 1.41 2004/06/04 08:58:29 ksekar
618 <rdar://problem/3668624>: Keychain integration for secure dynamic update
620 Revision 1.40 2004/06/03 03:09:58 ksekar
621 <rdar://problem/3668626>: Garbage Collection for Dynamic Updates
623 Revision 1.39 2004/06/01 23:46:50 ksekar
624 <rdar://problem/3675149>: DynDNS: dynamically look up LLQ/Update ports
626 Revision 1.38 2004/05/31 22:19:44 ksekar
627 <rdar://problem/3258021>: Feature: DNS server->client notification on
628 record changes (#7805) - revert to polling mode on setup errors
630 Revision 1.37 2004/05/28 23:42:37 ksekar
631 <rdar://problem/3258021>: Feature: DNS server->client notification on record changes (#7805)
633 Revision 1.36 2004/05/18 23:51:25 cheshire
634 Tidy up all checkin comments to use consistent "<rdar://problem/xxxxxxx>" format for bug numbers
636 Revision 1.35 2004/05/07 23:01:04 ksekar
637 Cleaned up list traversal in deriveGoodbyes - removed unnecessary
638 conditional assignment.
640 Revision 1.34 2004/05/05 18:26:12 ksekar
641 Periodically re-transmit questions if the send() fails. Include
642 internal questions in retransmission.
644 Revision 1.33 2004/05/05 17:40:06 ksekar
645 Removed prerequisite from deregistration update - it does not work for
646 shared records, and is unnecessary until we have more sophisticated
647 name conflict management.
649 Revision 1.32 2004/05/05 17:32:18 ksekar
650 Prevent registration of loopback interface caused by removal of
651 Multicast flag in interface structure.
653 Revision 1.31 2004/05/05 17:05:02 ksekar
654 Use LargeCacheRecord structs when pulling records off packets
656 Revision 1.30 2004/04/16 21:33:27 ksekar
657 Fixed bug in processing GetZoneData responses that do not use BIND formatting.
659 Revision 1.29 2004/04/15 20:03:13 ksekar
660 Clarified log message when pulling bad resource records off packet.
662 Revision 1.28 2004/04/15 00:51:28 bradley
663 Minor tweaks for Windows and C++ builds. Added casts for signed/unsigned integers and 64-bit pointers.
664 Prefix some functions with mDNS to avoid conflicts. Disable benign warnings on Microsoft compilers.
666 Revision 1.27 2004/04/14 23:09:28 ksekar
667 Support for TSIG signed dynamic updates.
669 Revision 1.26 2004/04/14 19:36:05 ksekar
670 Fixed memory corruption error in deriveGoodbyes.
672 Revision 1.25 2004/04/14 04:07:11 ksekar
673 Fixed crash in IsActiveUnicastQuery(). Removed redundant checks in routine.
675 Revision 1.24 2004/04/08 09:41:40 bradley
676 Added const to AuthRecord in deadvertiseIfCallback to match callback typedef.
678 Revision 1.23 2004/03/24 00:29:45 ksekar
679 Make it safe to call StopQuery in a unicast question callback
681 Revision 1.22 2004/03/19 10:11:09 bradley
682 Added AuthRecord * cast from umalloc for C++ builds.
684 Revision 1.21 2004/03/15 02:03:45 bradley
685 Added const to params where needed to match prototypes. Changed SetNewRData calls to use 0 instead
686 of -1 for unused size to fix warning. Disable assignment within conditional warnings with Visual C++.
688 Revision 1.20 2004/03/13 02:07:26 ksekar
689 <rdar://problem/3192546>: DynDNS: Dynamic update of service records
691 Revision 1.19 2004/03/13 01:57:33 ksekar
692 <rdar://problem/3192546>: DynDNS: Dynamic update of service records
694 Revision 1.18 2004/02/21 08:34:15 bradley
695 Added casts from void * to specific type for C++ builds. Changed void * l-value cast
696 r-value cast to fix problems with VC++ builds. Removed empty switch to fix VC++ error.
698 Revision 1.17 2004/02/21 02:06:24 cheshire
699 Can't use anonymous unions -- they're non-standard and don't work on all compilers
701 Revision 1.16 2004/02/12 01:51:45 cheshire
702 Don't try to send uDNS queries unless we have at least one uDNS server available
704 Revision 1.15 2004/02/10 03:02:46 cheshire
707 Revision 1.14 2004/02/06 23:04:19 ksekar
708 Basic Dynamic Update support via mDNS_Register (dissabled via
709 UNICAST_REGISTRATION #define)
711 Revision 1.13 2004/02/03 22:15:01 ksekar
712 Fixed nameToAddr error check: don't abort state machine on nxdomain error.
714 Revision 1.12 2004/02/03 19:47:36 ksekar
715 Added an asynchronous state machine mechanism to uDNS.c, including
716 calls to find the parent zone for a domain name. Changes include code
717 in repository previously dissabled via "#if 0 incomplete". Codepath
718 is currently unused, and will be called to create update records, etc.
720 Revision 1.11 2004/01/30 02:12:30 ksekar
721 Changed uDNS_ReceiveMsg() to correctly return void.
723 Revision 1.10 2004/01/29 02:59:17 ksekar
724 Unicast DNS: Changed from a resource record oriented question/response
725 matching to packet based matching. New callback architecture allows
726 collections of records in a response to be processed differently
727 depending on the nature of the request, and allows the same structure
728 to be used for internal and client-driven queries with different processing needs.
730 Revision 1.9 2004/01/28 20:20:45 ksekar
731 Unified ActiveQueries and ActiveInternalQueries lists, using a flag to
732 demux them. Check-in includes work-in-progress code, #ifdef'd out.
734 Revision 1.8 2004/01/28 02:30:07 ksekar
735 Added default Search Domains to unicast browsing, controlled via
736 Networking sharing prefs pane. Stopped sending unicast messages on
737 every interface. Fixed unicast resolving via mach-port API.
739 Revision 1.7 2004/01/27 20:15:22 cheshire
740 <rdar://problem/3541288>: Time to prune obsolete code for listening on port 53
742 Revision 1.6 2004/01/24 23:47:17 cheshire
743 Use mDNSOpaque16fromIntVal() instead of shifting and masking
745 Revision 1.5 2004/01/24 04:59:15 cheshire
746 Fixes so that Posix/Linux, OS9, Windows, and VxWorks targets build again
748 Revision 1.4 2004/01/24 04:19:26 cheshire
749 Restore overwritten checkin 1.2
751 Revision 1.3 2004/01/23 23:23:15 ksekar
752 Added TCP support for truncated unicast messages.
754 Revision 1.2 2004/01/22 03:48:41 cheshire
755 Make sure uDNS client doesn't accidentally use query ID zero
757 Revision 1.1 2003/12/13 03:05:27 ksekar
758 <rdar://problem/3192548>: DynDNS: Unicast query of service records
764 #if(defined(_MSC_VER))
765 // Disable "assignment within conditional expression".
766 // Other compilers understand the convention that if you place the assignment expression within an extra pair
767 // of parentheses, this signals to the compiler that you really intended an assignment and no warning is necessary.
768 // The Microsoft compiler doesn't understand this convention, so in the absense of any other way to signal
769 // to the compiler that the assignment is intentional, we have to just turn this warning off completely.
770 #pragma warning(disable:4706)
773 #define umalloc(x) mDNSPlatformMemAllocate(x) // short hands for common routines
774 #define ufree(x) mDNSPlatformMemFree(x)
775 #define ubzero(x,y) mDNSPlatformMemZero(x,y)
776 #define umemcpy(x, y, l) mDNSPlatformMemCopy(y, x, l) // uses memcpy(2) arg ordering
778 // Asynchronous operation types
783 // other async. operation names go here
789 mDNSAddr primaryAddr
;
792 mDNSIPPort updatePort
;
795 // other async. result struct defs go here
799 AsyncOpResultType type
;
801 // other async result structs go here
804 typedef void AsyncOpCallback(mStatus err
, mDNS
*const m
, void *info
, const AsyncOpResult
*result
);
807 // Private Function Prototypes
808 // Note: In general, functions are ordered such that they do not require forward declarations.
809 // However, prototypes are used where cyclic call graphs exist (e.g. foo calls bar, and bar calls
810 // foo), or when they aid in the grouping or readability of code (e.g. state machine code that is easier
811 // read top-to-bottom.)
813 mDNSlocal mDNSBool
FreeNATInfo(mDNS
*m
, NATTraversalInfo
*n
);
814 mDNSlocal
void hndlTruncatedAnswer(DNSQuestion
*question
, const mDNSAddr
*src
, mDNS
*m
);
815 mDNSlocal mStatus
startGetZoneData(domainname
*name
, mDNS
*m
, mDNSBool findUpdatePort
, mDNSBool findLLQPort
, AsyncOpCallback callback
, void *callbackInfo
);
816 mDNSlocal mDNSBool
recvLLQResponse(mDNS
*m
, DNSMessage
*msg
, const mDNSu8
*end
, const mDNSAddr
*srcaddr
, mDNSIPPort srcport
, const mDNSInterfaceID InterfaceID
);
817 mDNSlocal
void sendRecordRegistration(mDNS
*const m
, AuthRecord
*rr
);
818 mDNSlocal
void SendServiceRegistration(mDNS
*m
, ServiceRecordSet
*srs
);
819 mDNSlocal
void SendServiceDeregistration(mDNS
*m
, ServiceRecordSet
*srs
);
820 mDNSlocal
void serviceRegistrationCallback(mStatus err
, mDNS
*const m
, void *srsPtr
, const AsyncOpResult
*result
);
821 mDNSlocal
void SuspendLLQs(mDNS
*m
, mDNSBool DeregisterActive
);
822 mDNSlocal
void RestartQueries(mDNS
*m
);
823 mDNSlocal
void startLLQHandshake(mDNS
*m
, LLQ_Info
*info
, mDNSBool defer
);
824 mDNSlocal
void llqResponseHndlr(mDNS
* const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, void *context
);
826 // ***************************************************************************
827 #if COMPILER_LIKES_PRAGMA_MARK
828 #pragma mark - Temporary workaround
831 // 17 Places in this file directly call mDNSPlatformTimeNow(), which is unsafe
832 // The platform function is now called mDNSPlatformRawTime(), and
833 // mDNSPlatformTimeNow() is defined here as a temporary workaround.
834 // This is a gross hack, and after this change has been tested for a while,
835 // all these calls should be replaced by simple references to m->timenow
837 mDNSlocal mDNSs32
mDNSPlatformTimeNow(mDNS
*m
)
839 if (m
->mDNS_busy
&& m
->timenow
) return(m
->timenow
);
840 LogMsg("ERROR: uDNS.c code executing without holding main mDNS lock");
842 // To get a quick and easy stack trace to find out *how* this routine
843 // is being called without holding main mDNS lock, uncomment the line below:
846 return(mDNS_TimeNow(m
));
849 // ***************************************************************************
850 #if COMPILER_LIKES_PRAGMA_MARK
851 #pragma mark - General Utility Functions
854 // CountLabels() returns number of labels in name, excluding final root label
855 // (e.g. for "apple.com." CountLabels returns 2.)
856 mDNSlocal
int CountLabels(const domainname
*d
)
861 for (ptr
= d
->c
; *ptr
; ptr
= ptr
+ ptr
[0] + 1) count
++;
865 mDNSlocal mDNSOpaque16
newMessageID(uDNS_GlobalInfo
*u
)
867 static mDNSBool randomized
= mDNSfalse
;
869 if (!randomized
) { u
->NextMessageID
= (mDNSu16
)mDNSRandom(0xFFFF); randomized
= mDNStrue
; }
870 if (u
->NextMessageID
== 0) u
->NextMessageID
++;
871 return mDNSOpaque16fromIntVal(u
->NextMessageID
++);
874 // unlink an AuthRecord from a linked list
875 mDNSlocal mStatus
unlinkAR(AuthRecord
**list
, AuthRecord
*const rr
)
877 while (*list
&& *list
!= rr
) list
= &(*list
)->next
;
878 if (*list
) { *list
= rr
->next
; rr
->next
= mDNSNULL
; return(mStatus_NoError
); }
879 LogMsg("ERROR: unlinkAR - no such active record %##s", rr
->resrec
.name
->c
);
880 return(mStatus_NoSuchRecord
);
883 mDNSlocal
void unlinkSRS(mDNS
*m
, ServiceRecordSet
*srs
)
885 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
886 ServiceRecordSet
**p
;
887 NATTraversalInfo
*n
= u
->NATTraversals
;
889 // verify that no NAT objects reference this service
892 if (n
->reg
.ServiceRegistration
== srs
)
894 NATTraversalInfo
*tmp
= n
;
896 LogMsg("ERROR: Unlinking service record set %##s still referenced by NAT traversal object!", srs
->RR_SRV
.resrec
.name
->c
);
902 for (p
= &u
->ServiceRegistrations
; *p
; p
= &(*p
)->next
)
905 ExtraResourceRecord
*e
;
907 srs
->next
= mDNSNULL
;
908 for (e
=srs
->Extras
; e
; e
=e
->next
)
909 if (unlinkAR(&u
->RecordRegistrations
, &e
->r
))
910 LogMsg("unlinkSRS: extra record %##s not found", e
->r
.resrec
.name
->c
);
913 LogMsg("ERROR: unlinkSRS - SRS not found in ServiceRegistrations list %##s", srs
->RR_SRV
.resrec
.name
->c
);
916 mDNSlocal
void LinkActiveQuestion(uDNS_GlobalInfo
*u
, DNSQuestion
*q
)
918 if (uDNS_IsActiveQuery(q
, u
))
919 { LogMsg("LinkActiveQuestion - %##s (%d) already in list!", q
->qname
.c
, q
->qtype
); return; }
921 q
->next
= u
->ActiveQueries
;
922 u
->ActiveQueries
= q
;
925 // set retry timestamp for record with exponential backoff
926 // (for service record sets, use RR_SRV as representative for time checks
927 mDNSlocal
void SetRecordRetry(mDNS
*const m
, AuthRecord
*rr
, mStatus SendErr
)
929 rr
->LastAPTime
= mDNSPlatformTimeNow(m
);
930 if (SendErr
== mStatus_TransientErr
|| rr
->ThisAPInterval
< INIT_UCAST_POLL_INTERVAL
) rr
->ThisAPInterval
= INIT_UCAST_POLL_INTERVAL
;
931 else if (rr
->ThisAPInterval
*2 <= MAX_UCAST_POLL_INTERVAL
) rr
->ThisAPInterval
*= 2;
932 else if (rr
->ThisAPInterval
!= MAX_UCAST_POLL_INTERVAL
) rr
->ThisAPInterval
= MAX_UCAST_POLL_INTERVAL
;
936 // ***************************************************************************
937 #if COMPILER_LIKES_PRAGMA_MARK
938 #pragma mark - Name Server List Management
941 mDNSexport
void mDNS_AddDNSServer(mDNS
*const m
, const mDNSAddr
*addr
, const domainname
*d
)
943 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
944 DNSServer
*s
, **p
= &u
->Servers
;
947 if (!d
) d
= (domainname
*)"";
949 while (*p
) // Check if we already have this {server,domain} pair registered
951 if (mDNSSameAddress(&(*p
)->addr
, addr
) && SameDomainName(&(*p
)->domain
, d
))
952 LogMsg("Note: DNS Server %#a for domain %##s registered more than once", addr
, d
->c
);
956 // allocate, add to list
957 s
= umalloc(sizeof(*s
));
958 if (!s
) { LogMsg("Error: mDNS_AddDNSServer - malloc"); goto end
; }
961 s
->teststate
= DNSServer_Untested
;
962 AssignDomainName(&s
->domain
, d
);
970 mDNSexport
void mDNS_DeleteDNSServers(mDNS
*const m
)
975 s
= m
->uDNS_info
.Servers
;
976 m
->uDNS_info
.Servers
= mDNSNULL
;
987 // ***************************************************************************
988 #if COMPILER_LIKES_PRAGMA_MARK
989 #pragma mark - authorization management
992 mDNSlocal uDNS_AuthInfo
*GetAuthInfoForName(const uDNS_GlobalInfo
*u
, const domainname
*name
)
997 for (ptr
= u
->AuthInfoList
; ptr
; ptr
= ptr
->next
)
998 if (SameDomainName(&ptr
->zone
, name
)) return(ptr
);
999 name
= (const domainname
*)(name
->c
+ 1 + name
->c
[0]);
1004 mDNSlocal
void DeleteAuthInfoForZone(uDNS_GlobalInfo
*u
, const domainname
*zone
)
1006 uDNS_AuthInfo
*ptr
, *prev
= mDNSNULL
;
1008 for (ptr
= u
->AuthInfoList
; ptr
; ptr
= ptr
->next
)
1010 if (SameDomainName(&ptr
->zone
, zone
))
1012 if (prev
) prev
->next
= ptr
->next
;
1013 else u
->AuthInfoList
= ptr
->next
;
1021 mDNSexport mStatus
mDNS_SetSecretForZone(mDNS
*m
, const domainname
*zone
, const domainname
*key
, const char *sharedSecret
)
1023 uDNS_AuthInfo
*info
;
1024 mDNSu8 keybuf
[1024];
1026 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1027 mStatus status
= mStatus_NoError
;
1031 if (GetAuthInfoForName(u
, zone
)) DeleteAuthInfoForZone(u
, zone
);
1032 if (!key
) goto exit
;
1034 info
= (uDNS_AuthInfo
*)umalloc(sizeof(*info
));
1035 if (!info
) { LogMsg("ERROR: umalloc"); status
= mStatus_NoMemoryErr
; goto exit
; }
1036 ubzero(info
, sizeof(*info
));
1037 AssignDomainName(&info
->zone
, zone
);
1038 AssignDomainName(&info
->keyname
, key
);
1040 keylen
= DNSDigest_Base64ToBin(sharedSecret
, keybuf
, 1024);
1043 LogMsg("ERROR: mDNS_SetSecretForZone - could not convert shared secret %s from base64", sharedSecret
);
1045 status
= mStatus_UnknownErr
;
1048 DNSDigest_ConstructHMACKey(info
, keybuf
, (mDNSu32
)keylen
);
1051 info
->next
= m
->uDNS_info
.AuthInfoList
;
1052 m
->uDNS_info
.AuthInfoList
= info
;
1058 // ***************************************************************************
1059 #if COMPILER_LIKES_PRAGMA_MARK
1060 #pragma mark - NAT Traversal
1063 mDNSlocal mDNSBool
DomainContainsLabelString(const domainname
*d
, const char *str
)
1065 const domainlabel
*l
;
1068 if (!MakeDomainLabelFromLiteralString(&buf
, str
)) return mDNSfalse
;
1070 for (l
= (const domainlabel
*)d
; l
->c
[0]; l
= (const domainlabel
*)(l
->c
+ l
->c
[0]+1))
1071 if (SameDomainLabel(l
->c
, buf
.c
)) return mDNStrue
;
1075 // allocate struct, link into global list, initialize
1076 mDNSlocal NATTraversalInfo
*AllocNATInfo(mDNS
*const m
, NATOp_t op
, NATResponseHndlr callback
)
1078 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1079 NATTraversalInfo
*info
= umalloc(sizeof(NATTraversalInfo
));
1080 if (!info
) { LogMsg("ERROR: malloc"); return mDNSNULL
; }
1081 ubzero(info
, sizeof(NATTraversalInfo
));
1082 info
->next
= u
->NATTraversals
;
1083 u
->NATTraversals
= info
;
1084 info
->retry
= mDNSPlatformTimeNow(m
) + NATMAP_INIT_RETRY
;
1086 info
->state
= NATState_Init
;
1087 info
->ReceiveResponse
= callback
;
1088 info
->PublicPort
.NotAnInteger
= 0;
1089 info
->Router
= u
->Router
;
1093 // unlink from list, deallocate
1094 mDNSlocal mDNSBool
FreeNATInfo(mDNS
*m
, NATTraversalInfo
*n
)
1096 NATTraversalInfo
*ptr
, *prev
= mDNSNULL
;
1097 ServiceRecordSet
*s
= m
->uDNS_info
.ServiceRegistrations
;
1099 // Verify that object is not referenced by any services
1102 if (s
->uDNS_info
.NATinfo
== n
)
1104 LogMsg("Error: Freeing NAT info object still referenced by Service Record Set %##s!", s
->RR_SRV
.resrec
.name
->c
);
1105 s
->uDNS_info
.NATinfo
= mDNSNULL
;
1110 if (n
== m
->uDNS_info
.LLQNatInfo
) m
->uDNS_info
.LLQNatInfo
= mDNSNULL
;
1111 ptr
= m
->uDNS_info
.NATTraversals
;
1116 if (prev
) prev
->next
= ptr
->next
;
1117 else m
->uDNS_info
.NATTraversals
= ptr
->next
;
1124 LogMsg("FreeNATInfo: NATTraversalInfo not found in list");
1128 mDNSlocal
void SendNATMsg(NATTraversalInfo
*info
, mDNS
*m
)
1133 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1135 if (info
->state
!= NATState_Request
&& info
->state
!= NATState_Refresh
)
1136 { LogMsg("SendNATMsg: Bad state %d", info
->state
); return; }
1138 if (u
->Router
.ip
.v4
.NotAnInteger
)
1140 // send msg if we have a router
1141 const mDNSu8
*end
= (mDNSu8
*)&info
->request
;
1142 if (info
->op
== NATOp_AddrRequest
) end
+= sizeof(NATAddrRequest
);
1143 else end
+= sizeof(NATPortMapRequest
);
1145 dst
.type
= u
->Router
.type
;
1146 dst
.ip
.v4
= u
->Router
.ip
.v4
;
1147 dstport
= mDNSOpaque16fromIntVal(NATMAP_PORT
);
1148 err
= mDNSPlatformSendUDP(m
, &info
->request
, end
, 0, &dst
, dstport
);
1149 if (!err
) (info
->ntries
++); // don't increment attempt counter if the send failed
1153 if (info
->RetryInterval
< NATMAP_INIT_RETRY
) info
->RetryInterval
= NATMAP_INIT_RETRY
;
1154 else if (info
->RetryInterval
* 2 > NATMAP_MAX_RETRY
) info
->RetryInterval
= NATMAP_MAX_RETRY
;
1155 else info
->RetryInterval
*= 2;
1156 info
->retry
= mDNSPlatformTimeNow(m
) + info
->RetryInterval
;
1159 mDNSlocal mDNSBool
ReceiveNATAddrResponse(NATTraversalInfo
*n
, mDNS
*m
, mDNSu8
*pkt
, mDNSu16 len
)
1161 mStatus err
= mStatus_NoError
;
1162 AuthRecord
*rr
= mDNSNULL
;
1163 NATAddrReply
*response
= (NATAddrReply
*)pkt
;
1166 if (n
->state
!= NATState_Request
)
1168 LogMsg("ReceiveNATAddrResponse: bad state %d", n
->state
);
1172 rr
= n
->reg
.RecordRegistration
;
1175 LogMsg("ReceiveNATAddrResponse: registration cancelled");
1179 addr
.type
= mDNSAddrType_IPv4
;
1180 addr
.ip
.v4
= rr
->resrec
.rdata
->u
.ipv4
;
1182 if (!pkt
) // timeout
1184 #ifdef _LEGACY_NAT_TRAVERSAL_
1185 err
= LNT_GetPublicIP(&addr
.ip
.v4
);
1187 else n
->state
= NATState_Legacy
;
1189 debugf("ReceiveNATAddrResponse: timeout");
1190 err
= mStatus_NATTraversal
;
1192 #endif // _LEGACY_NAT_TRAVERSAL_
1196 if (len
< sizeof(*response
))
1198 LogMsg("ReceiveNATAddrResponse: response too short (%d bytes)", len
);
1201 if (response
->vers
!= NATMAP_VERS
)
1203 LogMsg("ReceiveNATAddrResponse: received version %d (expect version %d)", pkt
[0], NATMAP_VERS
);
1206 if (response
->opcode
!= (NATOp_AddrRequest
| NATMAP_RESPONSE_MASK
))
1208 LogMsg("ReceiveNATAddrResponse: bad response code %d", response
->opcode
);
1211 if (response
->err
.NotAnInteger
)
1212 { LogMsg("ReceiveAddrResponse: received error %d", mDNSVal16(response
->err
)); err
= mStatus_NATTraversal
; goto end
; }
1214 addr
.ip
.v4
= response
->PubAddr
;
1215 n
->state
= NATState_Established
;
1218 if (IsPrivateV4Addr(&addr
))
1220 LogMsg("ReceiveNATAddrResponse: Double NAT");
1221 err
= mStatus_DoubleNAT
;
1231 rr
->uDNS_info
.NATinfo
= mDNSNULL
;
1232 rr
->uDNS_info
.state
= regState_Unregistered
; // note that rr is not yet in global list
1233 rr
->RecordCallback(m
, rr
, mStatus_NATTraversal
);
1234 // note - unsafe to touch rr after callback
1238 else LogOperation("Received public IP address %d.%d.%d.%d from NAT.", addr
.ip
.v4
.b
[0], addr
.ip
.v4
.b
[1], addr
.ip
.v4
.b
[2], addr
.ip
.v4
.b
[3]);
1239 rr
->resrec
.rdata
->u
.ipv4
= addr
.ip
.v4
; // replace rdata w/ public address
1240 uDNS_RegisterRecord(m
, rr
);
1245 mDNSlocal
void StartGetPublicAddr(mDNS
*m
, AuthRecord
*AddressRec
)
1247 NATAddrRequest
*req
;
1248 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1250 NATTraversalInfo
*info
= AllocNATInfo(m
, NATOp_AddrRequest
, ReceiveNATAddrResponse
);
1251 if (!info
) { uDNS_RegisterRecord(m
, AddressRec
); return; }
1252 AddressRec
->uDNS_info
.NATinfo
= info
;
1253 info
->reg
.RecordRegistration
= AddressRec
;
1254 info
->state
= NATState_Request
;
1257 req
= &info
->request
.AddrReq
;
1258 req
->vers
= NATMAP_VERS
;
1259 req
->opcode
= NATOp_AddrRequest
;
1261 if (!u
->Router
.ip
.v4
.NotAnInteger
)
1263 debugf("No router. Will retry NAT traversal in %ld ticks", NATMAP_INIT_RETRY
);
1267 SendNATMsg(info
, m
);
1271 mDNSlocal
void RefreshNATMapping(NATTraversalInfo
*n
, mDNS
*m
)
1273 n
->state
= NATState_Refresh
;
1274 n
->RetryInterval
= NATMAP_INIT_RETRY
;
1279 mDNSlocal
void LLQNatMapComplete(mDNS
*m
)
1281 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1283 NATTraversalInfo
*n
= u
->LLQNatInfo
;
1285 if (!n
) { LogMsg("Error: LLQNatMapComplete called with NULL LLQNatInfo"); return; }
1286 if (n
->state
!= NATState_Established
&& n
->state
!= NATState_Legacy
&& n
->state
!= NATState_Error
)
1287 { LogMsg("LLQNatMapComplete - bad nat state %d", n
->state
); return; }
1289 u
->CurrentQuery
= u
->ActiveQueries
;
1290 while (u
->CurrentQuery
)
1292 DNSQuestion
*q
= u
->CurrentQuery
;
1293 u
->CurrentQuery
= u
->CurrentQuery
->next
;
1294 llqInfo
= q
->uDNS_info
.llq
;
1295 if (q
->LongLived
&& llqInfo
->state
== LLQ_NatMapWait
)
1297 if (n
->state
== NATState_Error
)
1299 llqInfo
->NATMap
= mDNSfalse
;
1300 llqInfo
->question
->uDNS_info
.responseCallback
= llqResponseHndlr
;
1301 llqInfo
->state
= LLQ_Poll
;
1302 llqInfo
->question
->LastQTime
= mDNSPlatformTimeNow(m
) - (2 * INIT_UCAST_POLL_INTERVAL
); // trigger immediate poll
1303 llqInfo
->question
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
;
1305 else { llqInfo
->state
= LLQ_GetZoneInfo
; startLLQHandshake(m
, llqInfo
, mDNSfalse
); }
1310 mDNSlocal mDNSBool
ReceivePortMapReply(NATTraversalInfo
*n
, mDNS
*m
, mDNSu8
*pkt
, mDNSu16 len
)
1312 ServiceRecordSet
*srs
= n
->reg
.ServiceRegistration
;
1313 mDNSIPPort priv
= srs
? srs
->RR_SRV
.resrec
.rdata
->u
.srv
.port
: m
->UnicastPort4
;
1315 mDNSBool deletion
= !n
->request
.PortReq
.lease
.NotAnInteger
;
1316 NATPortMapReply
*reply
= (NATPortMapReply
*)pkt
;
1317 mDNSu8
*service
= srs
? srs
->RR_SRV
.resrec
.name
->c
: (mDNSu8
*)"\016LLQ event port";
1319 if (n
->state
!= NATState_Request
&& n
->state
!= NATState_Refresh
)
1320 { LogMsg("ReceivePortMapReply (%##s): bad state %d", service
, n
->state
); return mDNSfalse
; }
1322 if (!pkt
&& !deletion
) // timeout
1324 #ifdef _LEGACY_NAT_TRAVERSAL_
1328 mDNSBool tcp
= (srs
&& DomainContainsLabelString(srs
->RR_PTR
.resrec
.name
, "_tcp"));
1330 pub
= priv
; // initially request priv == pub
1333 err
= LNT_MapPort(priv
, pub
, tcp
);
1336 n
->PublicPort
= pub
;
1337 n
->state
= NATState_Legacy
;
1340 else if (err
!= mStatus_AlreadyRegistered
|| ++ntries
> LEGACY_NATMAP_MAX_TRIES
)
1342 n
->state
= NATState_Error
;
1347 // the mapping we want is taken - try a random port
1348 mDNSu16 RandPort
= mDNSRandom(DYN_PORT_MAX
- DYN_PORT_MIN
) + DYN_PORT_MIN
;
1349 pub
= mDNSOpaque16fromIntVal(RandPort
);
1354 #endif // _LEGACY_NAT_TRAVERSAL_
1357 if (len
< sizeof(*reply
)) { LogMsg("ReceivePortMapReply: response too short (%d bytes)", len
); return mDNSfalse
; }
1358 if (reply
->vers
!= NATMAP_VERS
) { LogMsg("ReceivePortMapReply: received version %d (expect version %d)", pkt
[0], NATMAP_VERS
); return mDNSfalse
; }
1359 if (reply
->opcode
!= (n
->op
| NATMAP_RESPONSE_MASK
)) { LogMsg("ReceivePortMapReply: bad response code %d", pkt
[1]); return mDNSfalse
; }
1360 if (reply
->err
.NotAnInteger
) { LogMsg("ReceivePortMapReply: received error %d", mDNSVal16(reply
->err
)); return mDNSfalse
; }
1361 if (priv
.NotAnInteger
!= reply
->priv
.NotAnInteger
) return mDNSfalse
; // packet does not match this request
1363 if (!srs
&& n
!= m
->uDNS_info
.LLQNatInfo
)
1365 LogMsg("ReceivePortMapReply: registration cancelled"); //!!!KRS change to debugf before checkin
1370 if (deletion
) { n
->state
= NATState_Deleted
; return mDNStrue
; }
1372 lease
= (mDNSu32
)mDNSVal32(reply
->lease
);
1373 if (lease
> 0x70000000UL
/ mDNSPlatformOneSecond
) lease
= 0x70000000UL
/ mDNSPlatformOneSecond
;
1375 if (n
->state
== NATState_Refresh
&& reply
->pub
.NotAnInteger
!= n
->PublicPort
.NotAnInteger
)
1376 LogMsg("ReceivePortMapReply: NAT refresh changed public port from %d to %d", mDNSVal16(n
->PublicPort
), mDNSVal16(reply
->pub
));
1377 // this should never happen
1378 // !!!KRS to be defensive, use SRVChanged flag on service and deregister here
1380 n
->PublicPort
= reply
->pub
;
1381 if (reply
->pub
.NotAnInteger
!= n
->request
.PortReq
.pub
.NotAnInteger
) n
->request
.PortReq
.pub
= reply
->pub
; // set message buffer for refreshes
1383 n
->retry
= mDNSPlatformTimeNow(m
) + ((mDNSs32
)lease
* mDNSPlatformOneSecond
/ 2); // retry half way to expiration
1385 if (n
->state
== NATState_Refresh
) { n
->state
= NATState_Established
; return mDNStrue
; }
1386 n
->state
= NATState_Established
;
1389 if (n
->state
!= NATState_Established
&& n
->state
!= NATState_Legacy
)
1391 LogMsg("NAT Port Mapping (%##s): timeout", service
);
1392 if (pkt
) LogMsg("!!! timeout with non-null packet");
1393 n
->state
= NATState_Error
;
1396 uDNS_HostnameInfo
*hi
= m
->uDNS_info
.Hostnames
;
1399 if (hi
->arv6
&& (hi
->arv6
->uDNS_info
.state
== regState_Registered
|| hi
->arv6
->uDNS_info
.state
== regState_Refresh
)) break;
1405 debugf("Port map failed for service %##s - using IPv6 service target", service
);
1406 srs
->uDNS_info
.NATinfo
= mDNSNULL
;
1408 goto register_service
;
1410 else srs
->uDNS_info
.state
= regState_NATError
;
1412 else LLQNatMapComplete(m
);
1415 else LogOperation("Mapped private port %d to public port %d", mDNSVal16(priv
), mDNSVal16(n
->PublicPort
));
1417 if (!srs
) { LLQNatMapComplete(m
); return mDNStrue
; }
1420 if (srs
->uDNS_info
.ns
.ip
.v4
.NotAnInteger
) SendServiceRegistration(m
, srs
); // non-zero server address means we already have necessary zone data to send update
1423 srs
->uDNS_info
.state
= regState_FetchingZoneData
;
1424 startGetZoneData(srs
->RR_SRV
.resrec
.name
, m
, mDNStrue
, mDNSfalse
, serviceRegistrationCallback
, srs
);
1429 mDNSlocal
void FormatPortMaprequest(NATTraversalInfo
*info
, mDNSIPPort port
)
1431 NATPortMapRequest
*req
= &info
->request
.PortReq
;
1433 req
->vers
= NATMAP_VERS
;
1434 req
->opcode
= info
->op
;
1435 req
->unused
.NotAnInteger
= 0;
1438 req
->lease
= mDNSOpaque32fromIntVal(NATMAP_DEFAULT_LEASE
);
1441 mDNSlocal
void SendInitialPMapReq(mDNS
*m
, NATTraversalInfo
*info
)
1443 if (!m
->uDNS_info
.Router
.ip
.v4
.NotAnInteger
)
1445 debugf("No router. Will retry NAT traversal in %ld seconds", NATMAP_INIT_RETRY
);
1446 info
->retry
= mDNSPlatformTimeNow(m
) + NATMAP_INIT_RETRY
;
1447 info
->RetryInterval
= NATMAP_INIT_RETRY
;
1450 SendNATMsg(info
, m
);
1454 mDNSlocal
void StartNATPortMap(mDNS
*m
, ServiceRecordSet
*srs
)
1457 NATTraversalInfo
*info
;
1459 if (DomainContainsLabelString(srs
->RR_PTR
.resrec
.name
, "_tcp")) op
= NATOp_MapTCP
;
1460 else if (DomainContainsLabelString(srs
->RR_PTR
.resrec
.name
, "_udp")) op
= NATOp_MapUDP
;
1461 else { LogMsg("StartNATPortMap: could not determine transport protocol of service %##s", srs
->RR_SRV
.resrec
.name
->c
); goto error
; }
1463 if (srs
->uDNS_info
.NATinfo
) { LogMsg("Error: StartNATPortMap - NAT info already initialized!"); FreeNATInfo(m
, srs
->uDNS_info
.NATinfo
); }
1464 info
= AllocNATInfo(m
, op
, ReceivePortMapReply
);
1465 srs
->uDNS_info
.NATinfo
= info
;
1466 info
->reg
.ServiceRegistration
= srs
;
1467 info
->state
= NATState_Request
;
1469 FormatPortMaprequest(info
, srs
->RR_SRV
.resrec
.rdata
->u
.srv
.port
);
1470 SendInitialPMapReq(m
, info
);
1474 startGetZoneData(srs
->RR_SRV
.resrec
.name
, m
, mDNStrue
, mDNSfalse
, serviceRegistrationCallback
, srs
);
1477 mDNSlocal
void DeleteNATPortMapping(mDNS
*m
, NATTraversalInfo
*nat
, ServiceRecordSet
*srs
)
1479 if (nat
->state
== NATState_Established
) // let other edge-case states expire for simplicity
1482 nat
->request
.PortReq
.lease
.NotAnInteger
= 0;
1483 nat
->state
= NATState_Request
;
1486 #ifdef _LEGACY_NAT_TRAVERSAL_
1487 else if (nat
->state
== NATState_Legacy
)
1489 mStatus err
= mStatus_NoError
;
1490 mDNSBool tcp
= srs
? DomainContainsLabelString(srs
->RR_PTR
.resrec
.name
, "_tcp") : mDNSfalse
;
1491 err
= LNT_UnmapPort(nat
->PublicPort
, tcp
);
1492 if (err
) LogMsg("Legacy NAT Traversal - unmap request failed with error %ld", err
);
1495 (void)srs
; // unused
1496 #endif // _LEGACY_NAT_TRAVERSAL_
1499 mDNSlocal
void StartLLQNatMap(mDNS
*m
)
1501 NATTraversalInfo
*info
= AllocNATInfo(m
, NATOp_MapUDP
, ReceivePortMapReply
);
1502 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1504 u
->LLQNatInfo
= info
;
1506 info
->reg
.RecordRegistration
= mDNSNULL
;
1507 info
->reg
.ServiceRegistration
= mDNSNULL
;
1508 info
->state
= NATState_Request
;
1509 FormatPortMaprequest(info
, m
->UnicastPort4
);
1510 SendInitialPMapReq(m
, info
);
1514 // if LLQ NAT context unreferenced, delete the mapping
1515 mDNSlocal
void CheckForUnreferencedLLQMapping(mDNS
*m
)
1517 NATTraversalInfo
*nat
= m
->uDNS_info
.LLQNatInfo
;
1522 for (q
= m
->uDNS_info
.ActiveQueries
; q
; q
= q
->next
)
1523 if (q
->LongLived
&& q
->uDNS_info
.llq
->NATMap
) return;
1525 //to avoid race condition if we need to recreate before this finishes, we do one-shot deregistration
1526 if (nat
->state
== NATState_Established
|| nat
->state
== NATState_Legacy
)
1527 DeleteNATPortMapping(m
, nat
, mDNSNULL
); // for simplicity we allow other states to expire
1528 FreeNATInfo(m
, nat
); // note: this clears the global LLQNatInfo pointer
1531 // ***************************************************************************
1532 #if COMPILER_LIKES_PRAGMA_MARK
1533 #pragma mark - host name and interface management
1536 // if we ever want to refine support for multiple hostnames, we can add logic matching service names to a particular hostname
1537 // for now, we grab the first registered DynDNS name, if any, or a static name we learned via a reverse-map query
1538 mDNSlocal mDNSBool
GetServiceTarget(uDNS_GlobalInfo
*u
, AuthRecord
*srv
, domainname
*dst
)
1540 uDNS_HostnameInfo
*hi
= u
->Hostnames
;
1541 (void)srv
; // unused
1546 if (hi
->arv4
&& (hi
->arv4
->uDNS_info
.state
== regState_Registered
|| hi
->arv4
->uDNS_info
.state
== regState_Refresh
))
1548 AssignDomainName(dst
, hi
->arv4
->resrec
.name
);
1551 if (hi
->arv6
&& (hi
->arv6
->uDNS_info
.state
== regState_Registered
|| hi
->arv6
->uDNS_info
.state
== regState_Refresh
))
1553 AssignDomainName(dst
, hi
->arv4
->resrec
.name
);
1559 if (u
->StaticHostname
.c
[0]) { AssignDomainName(dst
, &u
->StaticHostname
); return mDNStrue
; }
1563 mDNSlocal
void UpdateSRV(mDNS
*m
, ServiceRecordSet
*srs
)
1565 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1566 ExtraResourceRecord
*e
;
1568 // Target change if:
1569 // We have a target and were previously waiting for one, or
1570 // We had a target and no longer do, or
1571 // The target has changed
1573 domainname newtarget
;
1574 domainname
*curtarget
= &srs
->RR_SRV
.resrec
.rdata
->u
.srv
.target
;
1575 mDNSBool HaveTarget
= GetServiceTarget(u
, &srs
->RR_SRV
, &newtarget
);
1576 mDNSBool TargetChanged
= (HaveTarget
&& srs
->uDNS_info
.state
== regState_NoTarget
) || (curtarget
->c
[0] && !HaveTarget
) || !SameDomainName(curtarget
, &newtarget
);
1577 mDNSBool HaveZoneData
= srs
->uDNS_info
.ns
.ip
.v4
.NotAnInteger
? mDNStrue
: mDNSfalse
;
1579 // Nat state change if:
1580 // We were behind a NAT, and now we are behind a new NAT, or
1581 // We're not behind a NAT but our port was previously mapped to a different public port
1582 // We were not behind a NAT and now we are
1584 NATTraversalInfo
*nat
= srs
->uDNS_info
.NATinfo
;
1585 mDNSIPPort port
= srs
->RR_SRV
.resrec
.rdata
->u
.srv
.port
;
1586 mDNSBool NATChanged
= mDNSfalse
;
1587 mDNSBool NowBehindNAT
= port
.NotAnInteger
&& IsPrivateV4Addr(&u
->AdvertisedV4
);
1588 mDNSBool WereBehindNAT
= nat
!= mDNSNULL
;
1589 mDNSBool NATRouterChanged
= nat
&& nat
->Router
.ip
.v4
.NotAnInteger
!= u
->Router
.ip
.v4
.NotAnInteger
;
1590 mDNSBool PortWasMapped
= nat
&& (nat
->state
== NATState_Established
|| nat
->state
== NATState_Legacy
) && nat
->PublicPort
.NotAnInteger
!= port
.NotAnInteger
;
1592 if (WereBehindNAT
&& NowBehindNAT
&& NATRouterChanged
) NATChanged
= mDNStrue
;
1593 else if (!NowBehindNAT
&& PortWasMapped
) NATChanged
= mDNStrue
;
1594 else if (!WereBehindNAT
&& NowBehindNAT
) NATChanged
= mDNStrue
;
1596 if (!TargetChanged
&& !NATChanged
) return;
1598 debugf("UpdateSRV (%##s) HadZoneData=%d, TargetChanged=%d, HaveTarget=%d, NowBehindNAT=%d, WereBehindNAT=%d, NATRouterChanged=%d, PortWasMapped=%d",
1599 srs
->RR_SRV
.resrec
.name
->c
, HaveZoneData
, TargetChanged
, HaveTarget
, NowBehindNAT
, WereBehindNAT
, NATRouterChanged
, PortWasMapped
);
1601 switch(srs
->uDNS_info
.state
)
1603 case regState_FetchingZoneData
:
1604 case regState_Cancelled
:
1605 case regState_DeregPending
:
1606 case regState_DeregDeferred
:
1607 case regState_Unregistered
:
1608 case regState_NATMap
:
1609 case regState_ExtraQueued
:
1610 // In these states, the SRV has either not yet been registered (it will get up-to-date information when it is)
1611 // or is in the process of, or has already been, deregistered
1614 case regState_Pending
:
1615 case regState_Refresh
:
1616 case regState_UpdatePending
:
1617 // let the in-flight operation complete before updating
1618 srs
->uDNS_info
.SRVUpdateDeferred
= mDNStrue
;
1621 case regState_NATError
:
1622 if (!NATChanged
) return;
1623 // if nat changed, register if we have a target (below)
1625 case regState_NoTarget
:
1628 debugf("UpdateSRV: %s service %##s", HaveZoneData
? (NATChanged
&& NowBehindNAT
? "Starting Port Map for" : "Registering") : "Getting Zone Data for", srs
->RR_SRV
.resrec
.name
->c
);
1631 srs
->uDNS_info
.state
= regState_FetchingZoneData
;
1632 startGetZoneData(srs
->RR_SRV
.resrec
.name
, m
, mDNStrue
, mDNSfalse
, serviceRegistrationCallback
, srs
);
1636 if (nat
&& (NATChanged
|| !NowBehindNAT
)) { srs
->uDNS_info
.NATinfo
= mDNSNULL
; FreeNATInfo(m
, nat
); }
1637 if (NATChanged
&& NowBehindNAT
) { srs
->uDNS_info
.state
= regState_NATMap
; StartNATPortMap(m
, srs
); }
1638 else SendServiceRegistration(m
, srs
);
1643 case regState_Registered
:
1644 // target or nat changed. deregister service. upon completion, we'll look for a new target
1645 debugf("UpdateSRV: SRV record changed for service %##s - deregistering (will re-register with new SRV)", srs
->RR_SRV
.resrec
.name
->c
);
1646 for (e
= srs
->Extras
; e
; e
= e
->next
) e
->r
.uDNS_info
.state
= regState_ExtraQueued
; // extra will be re-registed if the service is re-registered
1647 srs
->uDNS_info
.SRVChanged
= mDNStrue
;
1648 SendServiceDeregistration(m
, srs
);
1653 mDNSlocal
void UpdateSRVRecords(mDNS
*m
)
1655 ServiceRecordSet
*srs
;
1657 for (srs
= m
->uDNS_info
.ServiceRegistrations
; srs
; srs
= srs
->next
) UpdateSRV(m
, srs
);
1660 mDNSlocal
void HostnameCallback(mDNS
*const m
, AuthRecord
*const rr
, mStatus result
)
1662 uDNS_HostnameInfo
*hi
= (uDNS_HostnameInfo
*)rr
->RecordContext
;
1664 if (result
== mStatus_MemFree
)
1668 if (hi
->arv4
== rr
) hi
->arv4
= mDNSNULL
;
1669 else if (hi
->arv4
== rr
) hi
->arv6
= mDNSNULL
;
1670 rr
->RecordContext
= mDNSNULL
;
1671 if (!hi
->arv4
&& !hi
->arv6
) ufree(hi
); // free hi when both v4 and v6 AuthRecs deallocated
1679 // don't unlink or free - we can retry when we get a new address/router
1680 if (rr
->resrec
.rrtype
== kDNSType_A
)
1681 LogMsg("HostnameCallback: Error %ld for registration of %##s IP %.4a", result
, rr
->resrec
.name
->c
, &rr
->resrec
.rdata
->u
.ipv4
);
1683 LogMsg("HostnameCallback: Error %ld for registration of %##s IP %.16a", result
, rr
->resrec
.name
->c
, &rr
->resrec
.rdata
->u
.ipv6
);
1684 if (!hi
) { ufree(rr
); return; }
1685 if (rr
->uDNS_info
.state
!= regState_Unregistered
) LogMsg("Error: HostnameCallback invoked with error code for record not in regState_Unregistered!");
1687 if ((!hi
->arv4
|| hi
->arv4
->uDNS_info
.state
== regState_Unregistered
) &&
1688 (!hi
->arv6
|| hi
->arv6
->uDNS_info
.state
== regState_Unregistered
))
1690 // only deliver status if both v4 and v6 fail
1691 rr
->RecordContext
= (void *)hi
->StatusContext
;
1692 if (hi
->StatusCallback
)
1693 hi
->StatusCallback(m
, rr
, result
); // client may NOT make API calls here
1694 rr
->RecordContext
= (void *)hi
;
1698 // register any pending services that require a target
1699 UpdateSRVRecords(m
);
1701 // Deliver success to client
1702 if (!hi
) { LogMsg("HostnameCallback invoked with orphaned address record"); return; }
1703 if (rr
->resrec
.rrtype
== kDNSType_A
)
1704 LogMsg("Registered hostname %##s IP %.4a", rr
->resrec
.name
->c
, &rr
->resrec
.rdata
->u
.ipv4
);
1706 LogMsg("Registered hostname %##s IP %.16a", rr
->resrec
.name
->c
, &rr
->resrec
.rdata
->u
.ipv6
);
1708 rr
->RecordContext
= (void *)hi
->StatusContext
;
1709 if (hi
->StatusCallback
)
1710 hi
->StatusCallback(m
, rr
, result
); // client may NOT make API calls here
1711 rr
->RecordContext
= (void *)hi
;
1714 // register record or begin NAT traversal
1715 mDNSlocal
void AdvertiseHostname(mDNS
*m
, uDNS_HostnameInfo
*h
)
1717 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1719 if (u
->AdvertisedV4
.ip
.v4
.NotAnInteger
&& h
->arv4
->uDNS_info
.state
== regState_Unregistered
)
1721 if (IsPrivateV4Addr(&u
->AdvertisedV4
))
1722 StartGetPublicAddr(m
, h
->arv4
);
1725 LogMsg("Advertising %##s IP %.4a", h
->arv4
->resrec
.name
->c
, &u
->AdvertisedV4
.ip
.v4
);
1726 uDNS_RegisterRecord(m
, h
->arv4
);
1729 if (u
->AdvertisedV6
.ip
.v6
.b
[0] && h
->arv6
->uDNS_info
.state
== regState_Unregistered
)
1731 LogMsg("Advertising %##s IP %.16a", h
->arv4
->resrec
.name
->c
, &u
->AdvertisedV6
.ip
.v6
);
1732 uDNS_RegisterRecord(m
, h
->arv6
);
1736 mDNSlocal
void FoundStaticHostname(mDNS
*const m
, DNSQuestion
*question
, const ResourceRecord
*const answer
, mDNSBool AddRecord
)
1738 const domainname
*pktname
= &answer
->rdata
->u
.name
;
1739 domainname
*storedname
= &m
->uDNS_info
.StaticHostname
;
1740 uDNS_HostnameInfo
*h
= m
->uDNS_info
.Hostnames
;
1744 debugf("FoundStaticHostname: %##s -> %##s (%s)", question
->qname
.c
, answer
->rdata
->u
.name
.c
, AddRecord
? "added" : "removed");
1745 if (AddRecord
&& !SameDomainName(pktname
, storedname
))
1747 AssignDomainName(storedname
, pktname
);
1750 if ((h
->arv4
&& (h
->arv4
->uDNS_info
.state
== regState_FetchingZoneData
|| h
->arv4
->uDNS_info
.state
== regState_Pending
|| h
->arv4
->uDNS_info
.state
== regState_NATMap
)) ||
1751 (h
->arv6
&& (h
->arv6
->uDNS_info
.state
== regState_FetchingZoneData
|| h
->arv6
->uDNS_info
.state
== regState_Pending
)))
1753 // if we're in the process of registering a dynamic hostname, delay SRV update so we don't have to reregister services if the dynamic name succeeds
1754 m
->uDNS_info
.DelaySRVUpdate
= mDNStrue
;
1755 m
->uDNS_info
.NextSRVUpdate
= mDNSPlatformTimeNow(m
) + (5 * mDNSPlatformOneSecond
);
1760 UpdateSRVRecords(m
);
1762 else if (!AddRecord
&& SameDomainName(pktname
, storedname
))
1764 storedname
->c
[0] = 0;
1765 UpdateSRVRecords(m
);
1769 mDNSlocal
void GetStaticHostname(mDNS
*m
)
1771 char buf
[MAX_ESCAPED_DOMAIN_NAME
];
1772 DNSQuestion
*q
= &m
->uDNS_info
.ReverseMap
;
1773 mDNSu8
*ip
= m
->uDNS_info
.AdvertisedV4
.ip
.v4
.b
;
1776 if (m
->uDNS_info
.ReverseMapActive
)
1778 uDNS_StopQuery(m
, q
);
1779 m
->uDNS_info
.ReverseMapActive
= mDNSfalse
;
1782 m
->uDNS_info
.StaticHostname
.c
[0] = 0;
1783 if (!m
->uDNS_info
.AdvertisedV4
.ip
.v4
.NotAnInteger
) return;
1784 ubzero(q
, sizeof(*q
));
1785 mDNS_snprintf(buf
, MAX_ESCAPED_DOMAIN_NAME
, "%d.%d.%d.%d.in-addr.arpa.", ip
[3], ip
[2], ip
[1], ip
[0]);
1786 if (!MakeDomainNameFromDNSNameString(&q
->qname
, buf
)) { LogMsg("Error: GetStaticHostname - bad name %s", buf
); return; }
1788 q
->InterfaceID
= mDNSInterface_Any
;
1789 q
->Target
= zeroAddr
;
1790 q
->qtype
= kDNSType_PTR
;
1791 q
->qclass
= kDNSClass_IN
;
1792 q
->LongLived
= mDNSfalse
;
1793 q
->ExpectUnique
= mDNSfalse
;
1794 q
->ForceMCast
= mDNSfalse
;
1795 q
->QuestionCallback
= FoundStaticHostname
;
1796 q
->QuestionContext
= mDNSNULL
;
1798 err
= uDNS_StartQuery(m
, q
);
1799 if (err
) LogMsg("Error: GetStaticHostname - StartQuery returned error %d", err
);
1800 else m
->uDNS_info
.ReverseMapActive
= mDNStrue
;
1803 mDNSlocal
void AssignHostnameInfoAuthRecord(mDNS
*m
, uDNS_HostnameInfo
*hi
, int type
)
1805 AuthRecord
**dst
= (type
== mDNSAddrType_IPv4
? &hi
->arv4
: &hi
->arv6
);
1806 AuthRecord
*ar
= umalloc(sizeof(*ar
));
1807 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1809 if (type
!= mDNSAddrType_IPv4
&& type
!= mDNSAddrType_IPv6
) { LogMsg("ERROR: AssignHostnameInfoAuthRecord - bad type %d", type
); return; }
1810 if (!ar
) { LogMsg("ERROR: AssignHostnameInfoAuthRecord - malloc"); return; }
1812 mDNS_SetupResourceRecord(ar
, mDNSNULL
, 0, type
== mDNSAddrType_IPv4
? kDNSType_A
: kDNSType_AAAA
, 1, kDNSRecordTypeKnownUnique
, HostnameCallback
, hi
);
1813 AssignDomainName(ar
->resrec
.name
, &hi
->fqdn
);
1815 // only set RData if we have a valid IP
1816 if (type
== mDNSAddrType_IPv4
&& u
->AdvertisedV4
.ip
.v4
.NotAnInteger
)
1818 if (u
->MappedV4
.ip
.v4
.NotAnInteger
) ar
->resrec
.rdata
->u
.ipv4
= u
->MappedV4
.ip
.v4
;
1819 else ar
->resrec
.rdata
->u
.ipv4
= u
->AdvertisedV4
.ip
.v4
;
1821 else if (type
== mDNSAddrType_IPv6
&& u
->AdvertisedV6
.ip
.v6
.b
[0])
1823 ar
->resrec
.rdata
->u
.ipv6
= u
->AdvertisedV6
.ip
.v6
;
1826 ar
->uDNS_info
.state
= regState_Unregistered
;
1830 LogMsg("ERROR: AssignHostnameInfoAuthRecord - overwriting %s AuthRec", type
== mDNSAddrType_IPv4
? "IPv4" : "IPv6");
1831 unlinkAR(&u
->RecordRegistrations
, *dst
);
1832 (*dst
)->RecordContext
= mDNSNULL
; // defensively clear backpointer to avoid doubly-referenced context
1839 // Deregister hostnames and register new names for each host domain with the current global
1840 // values for the hostlabel and primary IP address
1841 mDNSlocal
void UpdateHostnameRegistrations(mDNS
*m
)
1843 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1844 uDNS_HostnameInfo
*i
;
1846 for (i
= u
->Hostnames
; i
; i
= i
->next
)
1848 if (i
->arv4
&& i
->arv4
->uDNS_info
.state
!= regState_Unregistered
&&
1849 i
->arv4
->resrec
.rdata
->u
.ipv4
.NotAnInteger
!= u
->AdvertisedV4
.ip
.v4
.NotAnInteger
&&
1850 i
->arv4
->resrec
.rdata
->u
.ipv4
.NotAnInteger
!=u
->MappedV4
.ip
.v4
.NotAnInteger
)
1852 uDNS_DeregisterRecord(m
, i
->arv4
);
1855 if (i
->arv6
&& !mDNSPlatformMemSame(i
->arv6
->resrec
.rdata
->u
.ipv6
.b
, u
->AdvertisedV6
.ip
.v6
.b
, 16) && i
->arv6
->uDNS_info
.state
!= regState_Unregistered
)
1857 uDNS_DeregisterRecord(m
, i
->arv6
);
1861 if (!i
->arv4
&& u
->AdvertisedV4
.ip
.v4
.NotAnInteger
) AssignHostnameInfoAuthRecord(m
, i
, mDNSAddrType_IPv4
);
1862 else if (i
->arv4
&& i
->arv4
->uDNS_info
.state
== regState_Unregistered
) i
->arv4
->resrec
.rdata
->u
.ipv4
= u
->AdvertisedV4
.ip
.v4
; // simply overwrite unregistered
1863 if (!i
->arv6
&& u
->AdvertisedV6
.ip
.v6
.b
[0]) AssignHostnameInfoAuthRecord(m
, i
, mDNSAddrType_IPv6
);
1864 else if (i
->arv6
&&i
->arv6
->uDNS_info
.state
== regState_Unregistered
) i
->arv6
->resrec
.rdata
->u
.ipv6
= u
->AdvertisedV6
.ip
.v6
;
1866 AdvertiseHostname(m
, i
);
1870 mDNSexport
void mDNS_AddDynDNSHostName(mDNS
*m
, const domainname
*fqdn
, mDNSRecordCallback
*StatusCallback
, const void *StatusContext
)
1872 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1873 uDNS_HostnameInfo
*ptr
, *new;
1877 // check if domain already registered
1878 for (ptr
= u
->Hostnames
; ptr
; ptr
= ptr
->next
)
1880 if (SameDomainName(fqdn
, &ptr
->fqdn
))
1881 { LogMsg("Host Domain %##s already in list", fqdn
->c
); goto exit
; }
1884 // allocate and format new address record
1885 new = umalloc(sizeof(*new));
1886 if (!new) { LogMsg("ERROR: mDNS_AddDynDNSHostname - malloc"); goto exit
; }
1887 ubzero(new, sizeof(*new));
1888 new->next
= u
->Hostnames
;
1891 AssignDomainName(&new->fqdn
, fqdn
);
1892 new->StatusCallback
= StatusCallback
;
1893 new->StatusContext
= StatusContext
;
1895 if (u
->AdvertisedV4
.ip
.v4
.NotAnInteger
) AssignHostnameInfoAuthRecord(m
, new, mDNSAddrType_IPv4
);
1896 else new->arv4
= mDNSNULL
;
1897 if (u
->AdvertisedV6
.ip
.v6
.b
[0]) AssignHostnameInfoAuthRecord(m
, new, mDNSAddrType_IPv6
);
1898 else new->arv6
= mDNSNULL
;
1900 if (u
->AdvertisedV6
.ip
.v6
.b
[0] || u
->AdvertisedV4
.ip
.v4
.NotAnInteger
) AdvertiseHostname(m
, new);
1906 mDNSexport
void mDNS_RemoveDynDNSHostName(mDNS
*m
, const domainname
*fqdn
)
1908 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1909 uDNS_HostnameInfo
**ptr
= &u
->Hostnames
;
1913 while (*ptr
&& !SameDomainName(fqdn
, &(*ptr
)->fqdn
)) ptr
= &(*ptr
)->next
;
1914 if (!*ptr
) LogMsg("mDNS_RemoveDynDNSHostName: no such domainname %##s", fqdn
->c
);
1917 uDNS_HostnameInfo
*hi
= *ptr
;
1918 *ptr
= (*ptr
)->next
; // unlink
1921 hi
->arv4
->RecordContext
= mDNSNULL
; // about to free wrapper struct
1922 if (hi
->arv4
->uDNS_info
.state
!= regState_Unregistered
) uDNS_DeregisterRecord(m
, hi
->arv4
);
1923 else { ufree(hi
->arv4
); hi
->arv4
= mDNSNULL
; }
1927 hi
->arv6
->RecordContext
= mDNSNULL
; // about to free wrapper struct
1928 if (hi
->arv6
->uDNS_info
.state
!= regState_Unregistered
) uDNS_DeregisterRecord(m
, hi
->arv6
);
1929 else { ufree(hi
->arv6
); hi
->arv6
= mDNSNULL
; }
1933 UpdateSRVRecords(m
);
1937 mDNSexport
void mDNS_SetPrimaryInterfaceInfo(mDNS
*m
, const mDNSAddr
*v4addr
, const mDNSAddr
*v6addr
, const mDNSAddr
*router
)
1939 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
1940 mDNSBool v4Changed
, v6Changed
, RouterChanged
;
1942 if (v4addr
&& v4addr
->type
!= mDNSAddrType_IPv4
) { LogMsg("mDNS_SetPrimaryInterfaceInfo V4 address - incorrect type. Discarding."); return; }
1943 if (v6addr
&& v6addr
->type
!= mDNSAddrType_IPv6
) { LogMsg("mDNS_SetPrimaryInterfaceInfo V6 address - incorrect type. Discarding."); return; }
1944 if (router
&& router
->type
!= mDNSAddrType_IPv4
) { LogMsg("mDNS_SetPrimaryInterfaceInfo passed non-V4 router. Discarding."); return; }
1948 v4Changed
= (v4addr
? v4addr
->ip
.v4
.NotAnInteger
: 0) != u
->AdvertisedV4
.ip
.v4
.NotAnInteger
;
1949 v6Changed
= v6addr
? !mDNSPlatformMemSame(v6addr
, &u
->AdvertisedV6
, sizeof(*v6addr
)) : (u
->AdvertisedV6
.ip
.v6
.b
[0] != 0);
1950 RouterChanged
= (router
? router
->ip
.v4
.NotAnInteger
: 0) != u
->Router
.ip
.v4
.NotAnInteger
;
1953 if (v4addr
&& (v4Changed
|| RouterChanged
))
1954 LogMsg("mDNS_SetPrimaryInterfaceInfo: address changed from %d.%d.%d.%d to %d.%d.%d.%d:%d",
1955 u
->AdvertisedV4
.ip
.v4
.b
[0], u
->AdvertisedV4
.ip
.v4
.b
[1], u
->AdvertisedV4
.ip
.v4
.b
[2], u
->AdvertisedV4
.ip
.v4
.b
[3],
1956 v4addr
->ip
.v4
.b
[0], v4addr
->ip
.v4
.b
[1], v4addr
->ip
.v4
.b
[2], v4addr
->ip
.v4
.b
[3]);
1957 #endif // MDNS_DEBUGMSGS
1959 if ((v4Changed
|| RouterChanged
) && u
->MappedV4
.ip
.v4
.NotAnInteger
) u
->MappedV4
.ip
.v4
.NotAnInteger
= 0;
1960 if (v4addr
) u
->AdvertisedV4
= *v4addr
; else u
->AdvertisedV4
.ip
.v4
.NotAnInteger
= 0;
1961 if (v6addr
) u
->AdvertisedV6
= *v6addr
; else ubzero(u
->AdvertisedV6
.ip
.v6
.b
, 16);
1962 if (router
) u
->Router
= *router
; else u
->Router
.ip
.v4
.NotAnInteger
= 0;
1963 // setting router to zero indicates that nat mappings must be reestablished when router is reset
1965 if ((v4Changed
|| RouterChanged
|| v6Changed
) && (v4addr
&& router
))
1967 // don't update these unless we've got V4
1968 UpdateHostnameRegistrations(m
);
1969 UpdateSRVRecords(m
);
1970 GetStaticHostname(m
); // look up reverse map record to find any static hostnames for our IP address
1976 // ***************************************************************************
1977 #if COMPILER_LIKES_PRAGMA_MARK
1978 #pragma mark - Incoming Message Processing
1981 mDNSlocal mDNSBool
kaListContainsAnswer(DNSQuestion
*question
, CacheRecord
*rr
)
1985 for (ptr
= question
->uDNS_info
.knownAnswers
; ptr
; ptr
= ptr
->next
)
1986 if (SameResourceRecord(&ptr
->resrec
, &rr
->resrec
)) return mDNStrue
;
1992 mDNSlocal
void removeKnownAnswer(DNSQuestion
*question
, CacheRecord
*rr
)
1994 CacheRecord
*ptr
, *prev
= mDNSNULL
;
1996 for (ptr
= question
->uDNS_info
.knownAnswers
; ptr
; ptr
= ptr
->next
)
1998 if (SameResourceRecord(&ptr
->resrec
, &rr
->resrec
))
2000 if (prev
) prev
->next
= ptr
->next
;
2001 else question
->uDNS_info
.knownAnswers
= ptr
->next
;
2007 LogMsg("removeKnownAnswer() called for record not in KA list");
2011 mDNSlocal
void addKnownAnswer(DNSQuestion
*question
, const CacheRecord
*rr
)
2013 CacheRecord
*newCR
= mDNSNULL
;
2016 size
= sizeof(CacheRecord
) + rr
->resrec
.rdlength
- InlineCacheRDSize
;
2017 newCR
= (CacheRecord
*)umalloc(size
);
2018 if (!newCR
) { LogMsg("ERROR: addKnownAnswer - malloc"); return; }
2019 umemcpy(newCR
, rr
, size
);
2020 newCR
->resrec
.rdata
= (RData
*)&newCR
->rdatastorage
;
2021 newCR
->resrec
.rdata
->MaxRDLength
= rr
->resrec
.rdlength
;
2022 newCR
->resrec
.name
= &question
->qname
;
2023 newCR
->next
= question
->uDNS_info
.knownAnswers
;
2024 question
->uDNS_info
.knownAnswers
= newCR
;
2027 mDNSlocal
void deriveGoodbyes(mDNS
* const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
)
2031 CacheRecord
*fptr
, *ka
, *cr
, *answers
= mDNSNULL
, *prev
= mDNSNULL
;
2032 LargeCacheRecord
*lcr
;
2034 if (question
!= m
->uDNS_info
.CurrentQuery
) { LogMsg("ERROR: deriveGoodbyes called without CurrentQuery set!"); return; }
2036 ptr
= LocateAnswers(msg
, end
);
2037 if (!ptr
) goto pkt_error
;
2039 if (!msg
->h
.numAnswers
)
2041 // delete the whole KA list
2042 ka
= question
->uDNS_info
.knownAnswers
;
2045 debugf("deriving goodbye for %##s", ka
->resrec
.name
->c
);
2047 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
2048 question
->QuestionCallback(m
, question
, &ka
->resrec
, mDNSfalse
);
2049 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
2050 if (question
!= m
->uDNS_info
.CurrentQuery
)
2052 debugf("deriveGoodbyes - question removed via callback. returning.");
2059 question
->uDNS_info
.knownAnswers
= mDNSNULL
;
2063 // make a list of all the new answers
2064 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
2066 lcr
= (LargeCacheRecord
*)umalloc(sizeof(LargeCacheRecord
));
2067 if (!lcr
) goto malloc_error
;
2068 ubzero(lcr
, sizeof(LargeCacheRecord
));
2069 ptr
= GetLargeResourceRecord(m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, lcr
);
2070 if (!ptr
) goto pkt_error
;
2072 if (ResourceRecordAnswersQuestion(&cr
->resrec
, question
))
2080 // make sure every known answer is in the answer list
2081 ka
= question
->uDNS_info
.knownAnswers
;
2084 for (cr
= answers
; cr
; cr
= cr
->next
)
2085 { if (SameResourceRecord(&ka
->resrec
, &cr
->resrec
)) break; }
2088 // record is in KA list but not answer list - remove from KA list
2089 if (prev
) prev
->next
= ka
->next
;
2090 else question
->uDNS_info
.knownAnswers
= ka
->next
;
2091 debugf("deriving goodbye for %##s", ka
->resrec
.name
->c
);
2092 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
2093 question
->QuestionCallback(m
, question
, &ka
->resrec
, mDNSfalse
);
2094 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
2095 if (question
!= m
->uDNS_info
.CurrentQuery
)
2097 debugf("deriveGoodbyes - question removed via callback. returning.");
2111 // free temp answers list
2113 while (cr
) { fptr
= cr
; cr
= cr
->next
; ufree(fptr
); }
2118 LogMsg("ERROR: deriveGoodbyes - received malformed response to query for %##s (%d)",
2119 question
->qname
.c
, question
->qtype
);
2123 LogMsg("ERROR: Malloc");
2126 mDNSlocal
void pktResponseHndlr(mDNS
* const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, mDNSBool llq
)
2130 LargeCacheRecord lcr
;
2131 CacheRecord
*cr
= &lcr
.r
;
2132 mDNSBool goodbye
, inKAList
, followedCName
= mDNSfalse
;
2133 LLQ_Info
*llqInfo
= question
->uDNS_info
.llq
;
2134 domainname origname
;
2137 if (question
!= m
->uDNS_info
.CurrentQuery
)
2138 { LogMsg("ERROR: pktResponseHdnlr called without CurrentQuery ptr set!"); return; }
2140 question
->uDNS_info
.Answered
= mDNStrue
;
2142 ptr
= LocateAnswers(msg
, end
);
2143 if (!ptr
) goto pkt_error
;
2145 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
2147 ptr
= GetLargeResourceRecord(m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
2148 if (!ptr
) goto pkt_error
;
2149 if (ResourceRecordAnswersQuestion(&cr
->resrec
, question
))
2151 if (cr
->resrec
.rrtype
== kDNSType_CNAME
)
2153 if (followedCName
) LogMsg("Error: multiple CNAME referals for question %##s", question
->qname
.c
);
2156 debugf("Following cname %##s -> %##s", question
->qname
.c
, cr
->resrec
.rdata
->u
.name
.c
);
2157 AssignDomainName(&origname
, &question
->qname
);
2158 AssignDomainName(&question
->qname
, &cr
->resrec
.rdata
->u
.name
);
2159 question
->qnamehash
= DomainNameHashValue(&question
->qname
);
2160 followedCName
= mDNStrue
;
2161 i
= -1; // restart packet answer matching
2162 ptr
= LocateAnswers(msg
, end
);
2167 goodbye
= llq
? ((mDNSs32
)cr
->resrec
.rroriginalttl
== -1) : mDNSfalse
;
2168 inKAList
= kaListContainsAnswer(question
, cr
);
2170 if ((goodbye
&& !inKAList
) || (!goodbye
&& inKAList
)) continue; // list up to date
2171 if (!inKAList
) addKnownAnswer(question
, cr
);
2172 if (goodbye
) removeKnownAnswer(question
, cr
);
2173 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
2174 question
->QuestionCallback(m
, question
, &cr
->resrec
, !goodbye
);
2175 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
2176 if (question
!= m
->uDNS_info
.CurrentQuery
)
2178 debugf("pktResponseHndlr - CurrentQuery changed by QuestionCallback - returning");
2182 else if (!followedCName
|| !SameDomainName(cr
->resrec
.name
, &origname
))
2183 LogMsg("Question %##s %X (%s) %##s unexpected answer %##s %X (%s)",
2184 question
->qname
.c
, question
->qnamehash
, DNSTypeName(question
->qtype
), origname
.c
,
2185 cr
->resrec
.name
->c
, cr
->resrec
.namehash
, DNSTypeName(cr
->resrec
.rrtype
));
2188 if (!llq
|| llqInfo
->state
== LLQ_Poll
|| llqInfo
->deriveRemovesOnResume
)
2190 deriveGoodbyes(m
, msg
, end
,question
);
2191 if (llq
&& llqInfo
->deriveRemovesOnResume
) llqInfo
->deriveRemovesOnResume
= mDNSfalse
;
2194 // Our interval may be set lower to recover from failures -- now that we have an answer, fully back off retry.
2195 // If the server advertised an LLQ-specific port number then that implies that this zone
2196 // *wants* to support LLQs, so if the setup fails (e.g. because we are behind a NAT)
2197 // then we use a slightly faster polling rate to give slightly better user experience.
2198 if (llq
&& llqInfo
->state
== LLQ_Poll
&& llqInfo
->servPort
.NotAnInteger
) question
->ThisQInterval
= LLQ_POLL_INTERVAL
;
2199 else if (question
->ThisQInterval
< MAX_UCAST_POLL_INTERVAL
) question
->ThisQInterval
= MAX_UCAST_POLL_INTERVAL
;
2203 LogMsg("ERROR: pktResponseHndlr - received malformed response to query for %##s (%d)",
2204 question
->qname
.c
, question
->qtype
);
2208 mDNSlocal
void simpleResponseHndlr(mDNS
* const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, void *context
)
2210 (void)context
; // unused
2211 pktResponseHndlr(m
, msg
, end
, question
, mDNSfalse
);
2214 mDNSlocal
void llqResponseHndlr(mDNS
* const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, void *context
)
2216 (void)context
; // unused
2217 pktResponseHndlr(m
, msg
, end
, question
, mDNStrue
);
2220 mDNSlocal mStatus
ParseTSIGError(mDNS
*m
, const DNSMessage
*msg
, const mDNSu8
*end
, const domainname
*displayname
)
2222 LargeCacheRecord lcr
;
2224 mStatus err
= mStatus_NoError
;
2227 ptr
= LocateAdditionals(msg
, end
);
2228 if (!ptr
) goto finish
;
2230 for (i
= 0; i
< msg
->h
.numAdditionals
; i
++)
2232 ptr
= GetLargeResourceRecord(m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAdd
, &lcr
);
2233 if (!ptr
) goto finish
;
2234 if (lcr
.r
.resrec
.rrtype
== kDNSType_TSIG
)
2237 mDNSu8
*rd
= lcr
.r
.resrec
.rdata
->u
.data
;
2238 mDNSu8
*rdend
= rd
+ MaximumRDSize
;
2239 int alglen
= DomainNameLength(&lcr
.r
.resrec
.rdata
->u
.name
);
2241 if (rd
+ alglen
> rdend
) goto finish
;
2242 rd
+= alglen
; // algorithm name
2243 if (rd
+ 6 > rdend
) goto finish
;
2244 rd
+= 6; // 48-bit timestamp
2245 if (rd
+ sizeof(mDNSOpaque16
) > rdend
) goto finish
;
2246 rd
+= sizeof(mDNSOpaque16
); // fudge
2247 if (rd
+ sizeof(mDNSOpaque16
) > rdend
) goto finish
;
2248 macsize
= mDNSVal16(*(mDNSOpaque16
*)rd
);
2249 rd
+= sizeof(mDNSOpaque16
); // MAC size
2250 if (rd
+ macsize
> rdend
) goto finish
;
2252 if (rd
+ sizeof(mDNSOpaque16
) > rdend
) goto finish
;
2253 rd
+= sizeof(mDNSOpaque16
); // orig id
2254 if (rd
+ sizeof(mDNSOpaque16
) > rdend
) goto finish
;
2255 err
= mDNSVal16(*(mDNSOpaque16
*)rd
); // error code
2257 if (err
== TSIG_ErrBadSig
) { LogMsg("%##s: bad signature", displayname
->c
); err
= mStatus_BadSig
; }
2258 else if (err
== TSIG_ErrBadKey
) { LogMsg("%##s: bad key", displayname
->c
); err
= mStatus_BadKey
; }
2259 else if (err
== TSIG_ErrBadTime
) { LogMsg("%##s: bad time", displayname
->c
); err
= mStatus_BadTime
; }
2260 else if (err
) { LogMsg("%##s: unknown tsig error %d", displayname
->c
, err
); err
= mStatus_UnknownErr
; }
2269 mDNSlocal mStatus
checkUpdateResult(domainname
*displayname
, mDNSu8 rcode
, mDNS
*m
, const DNSMessage
*msg
, const mDNSu8
*end
)
2271 (void)msg
; // currently unused, needed for TSIG errors
2272 if (!rcode
) return mStatus_NoError
;
2273 else if (rcode
== kDNSFlag1_RC_YXDomain
)
2275 debugf("name in use: %##s", displayname
->c
);
2276 return mStatus_NameConflict
;
2278 else if (rcode
== kDNSFlag1_RC_Refused
)
2280 LogMsg("Update %##s refused", displayname
->c
);
2281 return mStatus_Refused
;
2283 else if (rcode
== kDNSFlag1_RC_NXRRSet
)
2285 LogMsg("Reregister refused (NXRRSET): %##s", displayname
->c
);
2286 return mStatus_NoSuchRecord
;
2288 else if (rcode
== kDNSFlag1_RC_NotAuth
)
2290 // TSIG errors should come with FmtErr as per RFC 2845, but BIND 9 sends them with NotAuth so we look here too
2291 mStatus tsigerr
= ParseTSIGError(m
, msg
, end
, displayname
);
2294 LogMsg("Permission denied (NOAUTH): %##s", displayname
->c
);
2295 return mStatus_UnknownErr
;
2297 else return tsigerr
;
2299 else if (rcode
== kDNSFlag1_RC_FmtErr
)
2301 mStatus tsigerr
= ParseTSIGError(m
, msg
, end
, displayname
);
2304 LogMsg("Format Error: %##s", displayname
->c
);
2305 return mStatus_UnknownErr
;
2307 else return tsigerr
;
2311 LogMsg("Update %##s failed with rcode %d", displayname
->c
, rcode
);
2312 return mStatus_UnknownErr
;
2316 mDNSlocal
void hndlServiceUpdateReply(mDNS
* const m
, ServiceRecordSet
*srs
, mStatus err
)
2318 mDNSBool InvokeCallback
= mDNSfalse
;
2319 uDNS_RegInfo
*info
= &srs
->uDNS_info
;
2320 NATTraversalInfo
*nat
= srs
->uDNS_info
.NATinfo
;
2321 ExtraResourceRecord
**e
= &srs
->Extras
;
2322 AuthRecord
*txt
= &srs
->RR_TXT
;
2323 uDNS_RegInfo
*txtInfo
= &txt
->uDNS_info
;
2324 switch (info
->state
)
2326 case regState_Pending
:
2327 if (err
== mStatus_NameConflict
&& !info
->TestForSelfConflict
)
2329 info
->TestForSelfConflict
= mDNStrue
;
2330 debugf("checking for self-conflict of service %##s", srs
->RR_SRV
.resrec
.name
->c
);
2331 SendServiceRegistration(m
, srs
);
2334 else if (info
->TestForSelfConflict
)
2336 info
->TestForSelfConflict
= mDNSfalse
;
2337 if (err
== mStatus_NoSuchRecord
) err
= mStatus_NameConflict
; // NoSuchRecord implies that our prereq was not met, so we actually have a name conflict
2338 if (err
) info
->state
= regState_Unregistered
;
2339 else info
->state
= regState_Registered
;
2340 InvokeCallback
= mDNStrue
;
2343 else if (err
== mStatus_UnknownErr
&& info
->lease
)
2345 LogMsg("Re-trying update of service %##s without lease option", srs
->RR_SRV
.resrec
.name
->c
);
2346 info
->lease
= mDNSfalse
;
2347 SendServiceRegistration(m
, srs
);
2352 if (err
) { LogMsg("Error %ld for registration of service %##s", err
, srs
->RR_SRV
.resrec
.name
->c
); info
->state
= regState_Unregistered
; } //!!!KRS make sure all structs will still get cleaned up when client calls DeregisterService with this state
2353 else info
->state
= regState_Registered
;
2354 InvokeCallback
= mDNStrue
;
2357 case regState_Refresh
:
2360 LogMsg("Error %ld for refresh of service %##s", err
, srs
->RR_SRV
.resrec
.name
->c
);
2361 InvokeCallback
= mDNStrue
;
2362 info
->state
= regState_Unregistered
;
2364 else info
->state
= regState_Registered
;
2366 case regState_DeregPending
:
2367 if (err
) LogMsg("Error %ld for deregistration of service %##s", err
, srs
->RR_SRV
.resrec
.name
->c
);
2368 if (info
->SRVChanged
)
2370 info
->state
= regState_NoTarget
; // NoTarget will allow us to pick up new target OR nat traversal state
2373 err
= mStatus_MemFree
;
2374 InvokeCallback
= mDNStrue
;
2377 if (nat
->state
== NATState_Deleted
) { info
->NATinfo
= mDNSNULL
; FreeNATInfo(m
, nat
); } // deletion copmleted
2378 else nat
->reg
.ServiceRegistration
= mDNSNULL
; // allow mapping deletion to continue
2380 info
->state
= regState_Unregistered
;
2382 case regState_DeregDeferred
:
2385 debugf("Error %ld received prior to deferred derigstration of %##s", err
, srs
->RR_SRV
.resrec
.name
->c
);
2386 err
= mStatus_MemFree
;
2387 InvokeCallback
= mDNStrue
;
2388 info
->state
= regState_Unregistered
;
2393 debugf("Performing deferred deregistration of %##s", srs
->RR_SRV
.resrec
.name
->c
);
2394 info
->state
= regState_Registered
;
2395 SendServiceDeregistration(m
, srs
);
2398 case regState_UpdatePending
:
2401 LogMsg("hndlServiceUpdateReply: error updating TXT record for service %##s", srs
->RR_SRV
.resrec
.name
->c
);
2402 info
->state
= regState_Unregistered
;
2403 InvokeCallback
= mDNStrue
;
2407 info
->state
= regState_Registered
;
2408 // deallocate old RData
2409 if (txtInfo
->UpdateRDCallback
) txtInfo
->UpdateRDCallback(m
, txt
, txtInfo
->OrigRData
);
2410 SetNewRData(&txt
->resrec
, txtInfo
->InFlightRData
, txtInfo
->InFlightRDLen
);
2411 txtInfo
->OrigRData
= mDNSNULL
;
2412 txtInfo
->InFlightRData
= mDNSNULL
;
2415 case regState_FetchingZoneData
:
2416 case regState_Registered
:
2417 case regState_Cancelled
:
2418 case regState_Unregistered
:
2419 case regState_NATMap
:
2420 case regState_NoTarget
:
2421 case regState_ExtraQueued
:
2422 case regState_NATError
:
2423 LogMsg("hndlServiceUpdateReply called for service %##s in unexpected state %d with error %ld. Unlinking.",
2424 srs
->RR_SRV
.resrec
.name
->c
, info
->state
, err
);
2425 err
= mStatus_UnknownErr
;
2428 if ((info
->SRVChanged
|| info
->SRVUpdateDeferred
) && (info
->state
== regState_NoTarget
|| info
->state
== regState_Registered
))
2432 info
->ClientCallbackDeferred
= mDNStrue
;
2433 info
->DeferredStatus
= err
;
2435 info
->SRVChanged
= mDNSfalse
;
2442 uDNS_RegInfo
*einfo
= &(*e
)->r
.uDNS_info
;
2443 if (einfo
->state
== regState_ExtraQueued
)
2445 if (info
->state
== regState_Registered
&& !err
)
2447 // extra resource record queued for this service - copy zone info and register
2448 AssignDomainName(&einfo
->zone
, &info
->zone
);
2449 einfo
->ns
= info
->ns
;
2450 einfo
->port
= info
->port
;
2451 einfo
->lease
= info
->lease
;
2452 sendRecordRegistration(m
, &(*e
)->r
);
2455 else if (err
&& einfo
->state
!= regState_Unregistered
)
2457 // unlink extra from list
2458 einfo
->state
= regState_Unregistered
;
2461 else e
= &(*e
)->next
;
2463 else e
= &(*e
)->next
;
2466 srs
->RR_SRV
.ThisAPInterval
= INIT_UCAST_POLL_INTERVAL
- 1; // reset retry delay for future refreshes, dereg, etc.
2467 if (info
->state
== regState_Unregistered
) unlinkSRS(m
, srs
);
2468 else if (txtInfo
->QueuedRData
&& info
->state
== regState_Registered
)
2472 // if we were supposed to give a client callback, we'll do it after we update the primary txt record
2473 info
->ClientCallbackDeferred
= mDNStrue
;
2474 info
->DeferredStatus
= err
;
2476 info
->state
= regState_UpdatePending
;
2477 txtInfo
->InFlightRData
= txtInfo
->QueuedRData
;
2478 txtInfo
->InFlightRDLen
= txtInfo
->QueuedRDLen
;
2479 info
->OrigRData
= txt
->resrec
.rdata
;
2480 info
->OrigRDLen
= txt
->resrec
.rdlength
;
2481 txtInfo
->QueuedRData
= mDNSNULL
;
2482 SendServiceRegistration(m
, srs
);
2486 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
2487 if (InvokeCallback
) srs
->ServiceCallback(m
, srs
, err
);
2488 else if (info
->ClientCallbackDeferred
)
2490 info
->ClientCallbackDeferred
= mDNSfalse
;
2491 srs
->ServiceCallback(m
, srs
, info
->DeferredStatus
);
2493 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
2494 // NOTE: do not touch structures after calling ServiceCallback
2497 mDNSlocal
void hndlRecordUpdateReply(mDNS
*m
, AuthRecord
*rr
, mStatus err
)
2499 uDNS_RegInfo
*info
= &rr
->uDNS_info
;
2500 mDNSBool InvokeCallback
= mDNStrue
;
2502 if (info
->state
== regState_UpdatePending
)
2506 LogMsg("Update record failed for %##s (err %d)", rr
->resrec
.name
->c
, err
);
2507 info
->state
= regState_Unregistered
;
2511 debugf("Update record %##s - success", rr
->resrec
.name
->c
);
2512 info
->state
= regState_Registered
;
2513 // deallocate old RData
2514 if (info
->UpdateRDCallback
) info
->UpdateRDCallback(m
, rr
, info
->OrigRData
);
2515 SetNewRData(&rr
->resrec
, info
->InFlightRData
, info
->InFlightRDLen
);
2516 info
->OrigRData
= mDNSNULL
;
2517 info
->InFlightRData
= mDNSNULL
;
2521 if (info
->state
== regState_DeregPending
)
2523 debugf("Received reply for deregister record %##s type %d", rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
2524 if (err
) LogMsg("ERROR: Deregistration of record %##s type %d failed with error %ld",
2525 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
, err
);
2526 err
= mStatus_MemFree
;
2527 info
->state
= regState_Unregistered
;
2530 if (info
->state
== regState_DeregDeferred
)
2534 LogMsg("Cancelling deferred deregistration record %##s type %d due to registration error %ld",
2535 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
, err
);
2536 info
->state
= regState_Unregistered
;
2538 debugf("Calling deferred deregistration of record %##s type %d", rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
2539 info
->state
= regState_Registered
;
2540 uDNS_DeregisterRecord(m
, rr
);
2544 if (info
->state
== regState_Pending
|| info
->state
== regState_Refresh
)
2548 info
->state
= regState_Registered
;
2549 if (info
->state
== regState_Refresh
) InvokeCallback
= mDNSfalse
;
2553 if (info
->lease
&& err
== mStatus_UnknownErr
)
2555 LogMsg("Re-trying update of record %##s without lease option", rr
->resrec
.name
->c
);
2556 info
->lease
= mDNSfalse
;
2557 sendRecordRegistration(m
, rr
);
2560 LogMsg("Registration of record %##s type %d failed with error %ld", rr
->resrec
.name
->c
, rr
->resrec
.rrtype
, err
);
2561 info
->state
= regState_Unregistered
;
2565 if (info
->state
== regState_Unregistered
) unlinkAR(&m
->uDNS_info
.RecordRegistrations
, rr
);
2566 else rr
->ThisAPInterval
= INIT_UCAST_POLL_INTERVAL
- 1; // reset retry delay for future refreshes, dereg, etc.
2568 if (info
->QueuedRData
&& info
->state
== regState_Registered
)
2570 info
->state
= regState_UpdatePending
;
2571 info
->InFlightRData
= info
->QueuedRData
;
2572 info
->InFlightRDLen
= info
->QueuedRDLen
;
2573 info
->OrigRData
= rr
->resrec
.rdata
;
2574 info
->OrigRDLen
= rr
->resrec
.rdlength
;
2575 info
->QueuedRData
= mDNSNULL
;
2576 sendRecordRegistration(m
, rr
);
2582 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
2583 if (rr
->RecordCallback
) rr
->RecordCallback(m
, rr
, err
);
2584 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
2589 mDNSlocal
void SetUpdateExpiration(mDNS
*m
, DNSMessage
*msg
, const mDNSu8
*end
, uDNS_RegInfo
*info
)
2591 LargeCacheRecord lcr
;
2597 ptr
= LocateAdditionals(msg
, end
);
2599 if (info
->lease
&& (ptr
= LocateAdditionals(msg
, end
)))
2601 for (i
= 0; i
< msg
->h
.numAdditionals
; i
++)
2603 ptr
= GetLargeResourceRecord(m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAdd
, &lcr
);
2605 if (lcr
.r
.resrec
.rrtype
== kDNSType_OPT
)
2607 if (lcr
.r
.resrec
.rdlength
< LEASE_OPT_RDLEN
) continue;
2608 if (lcr
.r
.resrec
.rdata
->u
.opt
.opt
!= kDNSOpt_Lease
) continue;
2609 lease
= lcr
.r
.resrec
.rdata
->u
.opt
.OptData
.lease
;
2617 expire
= (mDNSPlatformTimeNow(m
) + (((mDNSs32
)lease
* mDNSPlatformOneSecond
)) * 3/4);
2618 if (info
->state
== regState_UpdatePending
)
2619 // if updating individual record, the service record set may expire sooner
2620 { if (expire
- info
->expire
< 0) info
->expire
= expire
; }
2621 else info
->expire
= expire
;
2623 else info
->lease
= mDNSfalse
;
2626 mDNSexport
void uDNS_ReceiveNATMap(mDNS
*m
, mDNSu8
*pkt
, mDNSu16 len
)
2628 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
2629 NATTraversalInfo
*ptr
= u
->NATTraversals
;
2632 // check length, version, opcode
2633 if (len
< sizeof(NATPortMapReply
) && len
< sizeof(NATAddrReply
)) { LogMsg("NAT Traversal message too short (%d bytes)", len
); return; }
2634 if (pkt
[0] != NATMAP_VERS
) { LogMsg("Received NAT Traversal response with version %d (expect version %d)", pkt
[0], NATMAP_VERS
); return; }
2636 if (!(op
& NATMAP_RESPONSE_MASK
)) { LogMsg("Received NAT Traversal message that is not a response (opcode %d)", op
); return; }
2640 if ((ptr
->state
== NATState_Request
|| ptr
->state
== NATState_Refresh
) && (ptr
->op
| NATMAP_RESPONSE_MASK
) == op
)
2641 if (ptr
->ReceiveResponse(ptr
, m
, pkt
, len
)) break; // note callback may invalidate ptr if it return value is non-zero
2646 mDNSlocal
const domainname
*DNSRelayTestQuestion
= (domainname
*)
2647 "\x1" "1" "\x1" "0" "\x1" "0" "\x3" "127" "\xa" "dnsbugtest"
2648 "\x1" "1" "\x1" "0" "\x1" "0" "\x3" "127" "\x7" "in-addr" "\x4" "arpa";
2650 // Returns mDNStrue if response was handled
2651 mDNSlocal mDNSBool
uDNS_ReceiveTestQuestionResponse(mDNS
*const m
, DNSMessage
*const msg
, const mDNSu8
*const end
,
2652 const mDNSAddr
*const srcaddr
, const mDNSInterfaceID InterfaceID
)
2654 const mDNSu8
*ptr
= msg
->data
;
2658 mDNSBool found
= mDNSfalse
;
2660 // 1. Find out if this is an answer to one of our test questions
2661 if (msg
->h
.numQuestions
!= 1) return(mDNSfalse
);
2662 ptr
= getQuestion(msg
, ptr
, end
, InterfaceID
, &q
);
2663 if (!ptr
) return(mDNSfalse
);
2664 if (q
.qtype
!= kDNSType_PTR
|| q
.qclass
!= kDNSClass_IN
) return(mDNSfalse
);
2665 if (!SameDomainName(&q
.qname
, DNSRelayTestQuestion
)) return(mDNSfalse
);
2667 // 2. If the DNS relay gave us a positive response, then it's got buggy firmware
2668 // else, if the DNS relay gave us an error or no-answer response, it passed our test
2669 if ((msg
->h
.flags
.b
[1] & kDNSFlag1_RC
) == kDNSFlag1_RC_NoErr
&& msg
->h
.numAnswers
> 0)
2670 result
= DNSServer_Failed
;
2672 result
= DNSServer_Passed
;
2674 // 3. Find occurrences of this server in our list, and mark them appropriately
2675 for (s
= m
->uDNS_info
.Servers
; s
; s
= s
->next
)
2676 if (mDNSSameAddress(srcaddr
, &s
->addr
) && s
->teststate
!= result
)
2677 { s
->teststate
= result
; found
= mDNStrue
; }
2679 // 4. Assuming we found the server in question in our list (don't want to risk being victim of a deliberate DOS attack here)
2680 // log a message to let the user know why Wide-Area Service Discovery isn't working
2681 if (found
&& result
== DNSServer_Failed
)
2682 LogMsg("NOTE: Wide-Area Service Discovery disabled to avoid crashing defective DNS relay %#a.", srcaddr
);
2684 return(mDNStrue
); // Return mDNStrue to tell uDNS_ReceiveMsg it doens't need to process this packet further
2687 mDNSexport
void uDNS_ReceiveMsg(mDNS
*const m
, DNSMessage
*const msg
, const mDNSu8
*const end
,
2688 const mDNSAddr
*const srcaddr
, const mDNSIPPort srcport
, const mDNSAddr
*const dstaddr
,
2689 const mDNSIPPort dstport
, const mDNSInterfaceID InterfaceID
)
2693 ServiceRecordSet
*sptr
;
2694 mStatus err
= mStatus_NoError
;
2695 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
2697 mDNSu8 StdR
= kDNSFlag0_QR_Response
| kDNSFlag0_OP_StdQuery
;
2698 mDNSu8 UpdateR
= kDNSFlag0_QR_Response
| kDNSFlag0_OP_Update
;
2699 mDNSu8 QR_OP
= (mDNSu8
)(msg
->h
.flags
.b
[0] & kDNSFlag0_QROP_Mask
);
2700 mDNSu8 rcode
= (mDNSu8
)(msg
->h
.flags
.b
[1] & kDNSFlag1_RC
);
2702 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
2711 // !!!KRS we should to a table lookup here to see if it answers an LLQ or a 1-shot
2712 // LLQ Responses over TCP not currently supported
2713 if (srcaddr
&& recvLLQResponse(m
, msg
, end
, srcaddr
, srcport
, InterfaceID
)) return;
2715 if (uDNS_ReceiveTestQuestionResponse(m
, msg
, end
, srcaddr
, InterfaceID
)) return;
2717 for (qptr
= u
->ActiveQueries
; qptr
; qptr
= qptr
->next
)
2719 //!!!KRS we should have a hashtable, hashed on message id
2720 if (qptr
->uDNS_info
.id
.NotAnInteger
== msg
->h
.id
.NotAnInteger
)
2722 if (timenow
- (qptr
->LastQTime
+ RESPONSE_WINDOW
) > 0)
2723 { debugf("uDNS_ReceiveMsg - response received after maximum allowed window. Discarding"); return; }
2724 if (msg
->h
.flags
.b
[0] & kDNSFlag0_TC
)
2725 { hndlTruncatedAnswer(qptr
, srcaddr
, m
); return; }
2728 u
->CurrentQuery
= qptr
;
2729 qptr
->uDNS_info
.responseCallback(m
, msg
, end
, qptr
, qptr
->uDNS_info
.context
);
2730 u
->CurrentQuery
= mDNSNULL
;
2731 // Note: responseCallback can invalidate qptr
2737 if (QR_OP
== UpdateR
)
2739 for (sptr
= u
->ServiceRegistrations
; sptr
; sptr
= sptr
->next
)
2741 if (sptr
->uDNS_info
.id
.NotAnInteger
== msg
->h
.id
.NotAnInteger
)
2743 err
= checkUpdateResult(sptr
->RR_SRV
.resrec
.name
, rcode
, m
, msg
, end
);
2744 if (!err
) SetUpdateExpiration(m
, msg
, end
, &sptr
->uDNS_info
);
2745 hndlServiceUpdateReply(m
, sptr
, err
);
2749 for (rptr
= u
->RecordRegistrations
; rptr
; rptr
= rptr
->next
)
2751 if (rptr
->uDNS_info
.id
.NotAnInteger
== msg
->h
.id
.NotAnInteger
)
2753 err
= checkUpdateResult(rptr
->resrec
.name
, rcode
, m
, msg
, end
);
2754 if (!err
) SetUpdateExpiration(m
, msg
, end
, &rptr
->uDNS_info
);
2755 hndlRecordUpdateReply(m
, rptr
, err
);
2760 debugf("Received unexpected response: ID %d matches no active records", mDNSVal16(msg
->h
.id
));
2763 // lookup a DNS Server, matching by name in split-dns configurations. Result stored in addr parameter if successful
2764 mDNSlocal DNSServer
*GetServerForName(uDNS_GlobalInfo
*u
, const domainname
*name
)
2766 DNSServer
*curmatch
= mDNSNULL
, *p
= u
->Servers
;
2767 int i
, curmatchlen
= -1;
2768 int ncount
= name
? CountLabels(name
) : 0;
2772 int scount
= CountLabels(&p
->domain
);
2773 if (scount
<= ncount
&& scount
> curmatchlen
)
2775 // only inspect if server's domain is longer than current best match and shorter than the name itself
2776 const domainname
*tail
= name
;
2777 for (i
= 0; i
< ncount
- scount
; i
++)
2778 tail
= (domainname
*)(tail
->c
+ 1 + tail
->c
[0]); // find "tail" (scount labels) of name
2779 if (SameDomainName(tail
, &p
->domain
)) { curmatch
= p
; curmatchlen
= scount
; }
2786 // ***************************************************************************
2787 #if COMPILER_LIKES_PRAGMA_MARK
2788 #pragma mark - Query Routines
2791 #define sameID(x,y) mDNSPlatformMemSame(x,y,8)
2793 mDNSlocal
void initializeQuery(DNSMessage
*msg
, DNSQuestion
*question
)
2795 ubzero(msg
, sizeof(msg
));
2796 InitializeDNSMessage(&msg
->h
, question
->uDNS_info
.id
, uQueryFlags
);
2799 mDNSlocal mStatus
constructQueryMsg(DNSMessage
*msg
, mDNSu8
**endPtr
, DNSQuestion
*const question
)
2801 initializeQuery(msg
, question
);
2803 *endPtr
= putQuestion(msg
, msg
->data
, msg
->data
+ AbsoluteMaxDNSMessageData
, &question
->qname
, question
->qtype
, question
->qclass
);
2806 LogMsg("ERROR: Unicast query out of space in packet");
2807 return mStatus_UnknownErr
;
2809 return mStatus_NoError
;
2812 mDNSlocal mDNSu8
*putLLQ(DNSMessage
*const msg
, mDNSu8
*ptr
, DNSQuestion
*question
, LLQOptData
*data
, mDNSBool includeQuestion
)
2815 ResourceRecord
*opt
= &rr
.resrec
;
2818 //!!!KRS when we implement multiple llqs per message, we'll need to memmove anything past the question section
2819 if (includeQuestion
)
2821 ptr
= putQuestion(msg
, ptr
, msg
->data
+ AbsoluteMaxDNSMessageData
, &question
->qname
, question
->qtype
, question
->qclass
);
2822 if (!ptr
) { LogMsg("ERROR: putLLQ - putQuestion"); return mDNSNULL
; }
2824 // locate OptRR if it exists, set pointer to end
2825 // !!!KRS implement me
2828 // format opt rr (fields not specified are zero-valued)
2829 ubzero(&rr
, sizeof(AuthRecord
));
2830 mDNS_SetupResourceRecord(&rr
, mDNSNULL
, mDNSInterface_Any
, kDNSType_OPT
, kStandardTTL
, kDNSRecordTypeKnownUnique
, mDNSNULL
, mDNSNULL
);
2831 opt
->rdlength
= LLQ_OPT_RDLEN
;
2832 opt
->rdestimate
= LLQ_OPT_RDLEN
;
2834 optRD
= &rr
.resrec
.rdata
->u
.opt
;
2835 optRD
->opt
= kDNSOpt_LLQ
;
2836 optRD
->optlen
= LLQ_OPTLEN
;
2837 umemcpy(&optRD
->OptData
.llq
, data
, sizeof(*data
));
2838 ptr
= PutResourceRecordTTLJumbo(msg
, ptr
, &msg
->h
.numAdditionals
, opt
, 0);
2839 if (!ptr
) { LogMsg("ERROR: putLLQ - PutResourceRecordTTLJumbo"); return mDNSNULL
; }
2845 mDNSlocal mDNSBool
getLLQAtIndex(mDNS
*m
, DNSMessage
*msg
, const mDNSu8
*end
, LLQOptData
*llq
, int index
)
2847 LargeCacheRecord lcr
;
2851 ubzero(&lcr
, sizeof(lcr
));
2853 ptr
= LocateAdditionals(msg
, end
);
2854 if (!ptr
) return mDNSfalse
;
2856 // find the last additional
2857 for (i
= 0; i
< msg
->h
.numAdditionals
; i
++)
2858 // { ptr = GetLargeResourceRecord(m, msg, ptr, end, 0, kDNSRecordTypePacketAdd, &lcr); if (!ptr) return mDNSfalse; }
2859 //!!!KRS workaround for LH server bug, which puts OPT as first additional
2860 { ptr
= GetLargeResourceRecord(m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAdd
, &lcr
); if (!ptr
) return mDNSfalse
; if (lcr
.r
.resrec
.rrtype
== kDNSType_OPT
) break; }
2861 if (lcr
.r
.resrec
.rrtype
!= kDNSType_OPT
) return mDNSfalse
;
2862 if (lcr
.r
.resrec
.rdlength
< (index
+ 1) * LLQ_OPT_RDLEN
) return mDNSfalse
; // rdata too small
2863 umemcpy(llq
, (mDNSu8
*)&lcr
.r
.resrec
.rdata
->u
.opt
.OptData
.llq
+ (index
* sizeof(*llq
)), sizeof(*llq
));
2867 mDNSlocal
void recvRefreshReply(mDNS
*m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*q
)
2872 qInfo
= q
->uDNS_info
.llq
;
2873 if (!getLLQAtIndex(m
, msg
, end
, &pktData
, 0)) { LogMsg("ERROR recvRefreshReply - getLLQAtIndex"); return; }
2874 if (pktData
.llqOp
!= kLLQOp_Refresh
) return;
2875 if (!sameID(pktData
.id
, qInfo
->id
)) { LogMsg("recvRefreshReply - ID mismatch. Discarding"); return; }
2876 if (pktData
.err
!= LLQErr_NoError
) { LogMsg("recvRefreshReply: received error %d from server", pktData
.err
); return; }
2878 qInfo
->expire
= mDNSPlatformTimeNow(m
) + ((mDNSs32
)pktData
.lease
* mDNSPlatformOneSecond
);
2879 qInfo
->retry
= qInfo
->expire
- ((mDNSs32
)pktData
.lease
* mDNSPlatformOneSecond
/2);
2881 qInfo
->origLease
= pktData
.lease
;
2882 qInfo
->state
= LLQ_Established
;
2885 mDNSlocal
void sendLLQRefresh(mDNS
*m
, DNSQuestion
*q
, mDNSu32 lease
)
2890 LLQ_Info
*info
= q
->uDNS_info
.llq
;
2894 timenow
= mDNSPlatformTimeNow(m
);
2895 if ((info
->state
== LLQ_Refresh
&& info
->ntries
>= kLLQ_MAX_TRIES
) ||
2896 info
->expire
- timenow
< 0)
2898 LogMsg("Unable to refresh LLQ %##s - will retry in %d minutes", q
->qname
.c
, kLLQ_DEF_RETRY
/60);
2899 info
->state
= LLQ_Retry
;
2900 info
->retry
= mDNSPlatformTimeNow(m
) + kLLQ_DEF_RETRY
* mDNSPlatformOneSecond
;
2901 info
->deriveRemovesOnResume
= mDNStrue
;
2903 //!!!KRS handle this - periodically try to re-establish
2906 llq
.vers
= kLLQ_Vers
;
2907 llq
.llqOp
= kLLQOp_Refresh
;
2908 llq
.err
= LLQErr_NoError
;
2909 umemcpy(llq
.id
, info
->id
, 8);
2912 initializeQuery(&msg
, q
);
2913 end
= putLLQ(&msg
, msg
.data
, q
, &llq
, mDNStrue
);
2914 if (!end
) { LogMsg("ERROR: sendLLQRefresh - putLLQ"); return; }
2916 err
= mDNSSendDNSMessage(m
, &msg
, end
, mDNSInterface_Any
, &info
->servAddr
, info
->servPort
, -1, mDNSNULL
);
2917 if (err
) debugf("ERROR: sendLLQRefresh - mDNSSendDNSMessage returned %ld", err
);
2919 if (info
->state
== LLQ_Established
) info
->ntries
= 1;
2920 else info
->ntries
++;
2921 info
->state
= LLQ_Refresh
;
2922 q
->LastQTime
= timenow
;
2923 info
->retry
= (info
->expire
- q
->LastQTime
) / 2;
2926 mDNSlocal mDNSBool
recvLLQEvent(mDNS
*m
, DNSQuestion
*q
, DNSMessage
*msg
, const mDNSu8
*end
, const mDNSAddr
*srcaddr
, mDNSIPPort srcport
, mDNSInterfaceID InterfaceID
)
2929 mDNSu8
*ackEnd
= ack
.data
;
2933 (void)InterfaceID
; // unused
2935 // find Opt RR, verify correct ID
2936 if (!getLLQAtIndex(m
, msg
, end
, &opt
, 0)) { debugf("Pkt does not contain LLQ Opt"); return mDNSfalse
; }
2937 if (!q
->uDNS_info
.llq
) { LogMsg("Error: recvLLQEvent - question object does not contain LLQ metadata"); return mDNSfalse
; }
2938 if (!sameID(opt
.id
, q
->uDNS_info
.llq
->id
)) { return mDNSfalse
; }
2939 if (opt
.llqOp
!= kLLQOp_Event
) { if (!q
->uDNS_info
.llq
->ntries
) LogMsg("recvLLQEvent - Bad LLQ Opcode %d", opt
.llqOp
); return mDNSfalse
; }
2941 // invoke response handler
2942 m
->uDNS_info
.CurrentQuery
= q
;
2943 q
->uDNS_info
.responseCallback(m
, msg
, end
, q
, q
->uDNS_info
.context
);
2944 if (m
->uDNS_info
.CurrentQuery
!= q
) return mDNStrue
;
2946 // format and send ack
2947 InitializeDNSMessage(&ack
.h
, msg
->h
.id
, ResponseFlags
);
2948 ackEnd
= putLLQ(&ack
, ack
.data
, mDNSNULL
, &opt
, mDNSfalse
);
2949 if (!ackEnd
) { LogMsg("ERROR: recvLLQEvent - putLLQ"); return mDNSfalse
; }
2950 err
= mDNSSendDNSMessage(m
, &ack
, ackEnd
, mDNSInterface_Any
, srcaddr
, srcport
, -1, mDNSNULL
);
2951 if (err
) debugf("ERROR: recvLLQEvent - mDNSSendDNSMessage returned %ld", err
);
2957 mDNSlocal
void hndlChallengeResponseAck(mDNS
*m
, DNSMessage
*pktMsg
, const mDNSu8
*end
, LLQOptData
*llq
, DNSQuestion
*q
)
2959 LLQ_Info
*info
= q
->uDNS_info
.llq
;
2961 if (llq
->err
) { LogMsg("hndlChallengeResponseAck - received error %d from server", llq
->err
); goto error
; }
2962 if (!sameID(info
->id
, llq
->id
)) { LogMsg("hndlChallengeResponseAck - ID changed. discarding"); return; } // this can happen rarely (on packet loss + reordering)
2963 info
->expire
= mDNSPlatformTimeNow(m
) + ((mDNSs32
)llq
->lease
* mDNSPlatformOneSecond
);
2964 info
->retry
= info
->expire
- ((mDNSs32
)llq
->lease
* mDNSPlatformOneSecond
/ 2);
2966 info
->origLease
= llq
->lease
;
2967 info
->state
= LLQ_Established
;
2969 q
->uDNS_info
.responseCallback
= llqResponseHndlr
;
2970 llqResponseHndlr(m
, pktMsg
, end
, q
, mDNSNULL
);
2974 info
->state
= LLQ_Error
;
2977 mDNSlocal
void sendChallengeResponse(mDNS
*m
, DNSQuestion
*q
, LLQOptData
*llq
)
2979 LLQ_Info
*info
= q
->uDNS_info
.llq
;
2980 DNSMessage response
;
2981 mDNSu8
*responsePtr
= response
.data
;
2984 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
2986 if (info
->ntries
++ == kLLQ_MAX_TRIES
)
2988 LogMsg("sendChallengeResponse: %d failed attempts for LLQ %##s. Will re-try in %d minutes",
2989 kLLQ_MAX_TRIES
, q
->qname
.c
, kLLQ_DEF_RETRY
/ 60);
2990 info
->state
= LLQ_Retry
;
2991 info
->retry
= timenow
+ (kLLQ_DEF_RETRY
* mDNSPlatformOneSecond
);
2992 // !!!KRS give a callback error in these cases?
2999 llq
->vers
= kLLQ_Vers
;
3000 llq
->llqOp
= kLLQOp_Setup
;
3001 llq
->err
= LLQErr_NoError
;
3002 umemcpy(llq
->id
, info
->id
, 8);
3003 llq
->lease
= info
->origLease
;
3006 q
->LastQTime
= timenow
;
3007 info
->retry
= timenow
+ (kLLQ_INIT_RESEND
* info
->ntries
* mDNSPlatformOneSecond
);
3009 if (constructQueryMsg(&response
, &responsePtr
, q
)) goto error
;
3010 responsePtr
= putLLQ(&response
, responsePtr
, q
, llq
, mDNSfalse
);
3011 if (!responsePtr
) { LogMsg("ERROR: sendChallengeResponse - putLLQ"); goto error
; }
3013 err
= mDNSSendDNSMessage(m
, &response
, responsePtr
, mDNSInterface_Any
, &info
->servAddr
, info
->servPort
, -1, mDNSNULL
);
3014 if (err
) debugf("ERROR: sendChallengeResponse - mDNSSendDNSMessage returned %ld", err
);
3015 // on error, we procede as normal and retry after the appropriate interval
3020 info
->state
= LLQ_Error
;
3025 mDNSlocal
void hndlRequestChallenge(mDNS
*m
, DNSMessage
*pktMsg
, const mDNSu8
*end
, LLQOptData
*llq
, DNSQuestion
*q
)
3027 LLQ_Info
*info
= q
->uDNS_info
.llq
;
3028 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
3031 case LLQErr_NoError
: break;
3032 case LLQErr_ServFull
:
3033 LogMsg("hndlRequestChallenge - received ServFull from server for LLQ %##s. Retry in %lu sec", q
->qname
.c
, llq
->lease
);
3034 info
->retry
= timenow
+ ((mDNSs32
)llq
->lease
* mDNSPlatformOneSecond
);
3035 info
->state
= LLQ_Retry
;
3036 simpleResponseHndlr(m
, pktMsg
, end
, q
, mDNSNULL
); // get available answers
3037 info
->deriveRemovesOnResume
= mDNStrue
;
3039 info
->state
= LLQ_Static
;
3040 LogMsg("LLQ %##s: static", q
->qname
.c
);
3041 simpleResponseHndlr(m
, pktMsg
, end
, q
, mDNSNULL
);
3043 case LLQErr_FormErr
:
3044 LogMsg("ERROR: hndlRequestChallenge - received FormErr from server for LLQ %##s", q
->qname
.c
);
3046 case LLQErr_BadVers
:
3047 LogMsg("ERROR: hndlRequestChallenge - received BadVers from server");
3049 case LLQErr_UnknownErr
:
3050 LogMsg("ERROR: hndlRequestChallenge - received UnknownErr from server for LLQ %##s", q
->qname
.c
);
3053 LogMsg("ERROR: hndlRequestChallenge - received invalid error %d for LLQ %##s", llq
->err
, q
->qname
.c
);
3057 if (info
->origLease
!= llq
->lease
)
3058 debugf("hndlRequestChallenge: requested lease %lu, granted lease %lu", info
->origLease
, llq
->lease
);
3060 // cache expiration in case we go to sleep before finishing setup
3061 info
->origLease
= llq
->lease
;
3062 info
->expire
= timenow
+ ((mDNSs32
)llq
->lease
* mDNSPlatformOneSecond
);
3065 info
->state
= LLQ_SecondaryRequest
;
3066 umemcpy(info
->id
, llq
->id
, 8);
3067 info
->ntries
= 0; // first attempt to send response
3069 sendChallengeResponse(m
, q
, llq
);
3074 info
->state
= LLQ_Error
;
3078 // response handler for initial and secondary setup responses
3079 mDNSlocal
void recvSetupResponse(mDNS
*m
, DNSMessage
*pktMsg
, const mDNSu8
*end
, DNSQuestion
*q
, void *clientContext
)
3081 DNSQuestion pktQuestion
;
3083 const mDNSu8
*ptr
= pktMsg
->data
;
3084 LLQ_Info
*info
= q
->uDNS_info
.llq
;
3085 mDNSu8 rcode
= (mDNSu8
)(pktMsg
->h
.flags
.b
[1] & kDNSFlag1_RC
);
3087 (void)clientContext
; // unused
3089 if (rcode
&& rcode
!= kDNSFlag1_RC_NXDomain
) goto poll
;
3091 ptr
= getQuestion(pktMsg
, ptr
, end
, 0, &pktQuestion
);
3092 if (!ptr
) { LogMsg("ERROR: recvSetupResponse - getQuestion"); goto poll
; }
3093 if (!SameDomainName(&q
->qname
, &pktQuestion
.qname
))
3094 { LogMsg("ERROR: recvSetupResponse - mismatched question in response for llq setup %##s", q
->qname
.c
); goto poll
; }
3096 if (!getLLQAtIndex(m
, pktMsg
, end
, &llq
, 0)) { debugf("recvSetupResponse - GetLLQAtIndex"); goto poll
; }
3097 if (llq
.llqOp
!= kLLQOp_Setup
) { LogMsg("ERROR: recvSetupResponse - bad op %d", llq
.llqOp
); goto poll
; }
3098 if (llq
.vers
!= kLLQ_Vers
) { LogMsg("ERROR: recvSetupResponse - bad vers %d", llq
.vers
); goto poll
; }
3100 if (info
->state
== LLQ_InitialRequest
) { hndlRequestChallenge(m
, pktMsg
, end
, &llq
, q
); return; }
3101 if (info
->state
== LLQ_SecondaryRequest
) { hndlChallengeResponseAck(m
, pktMsg
, end
, &llq
, q
); return; }
3102 LogMsg("recvSetupResponse - bad state %d", info
->state
);
3105 info
->state
= LLQ_Poll
;
3106 q
->uDNS_info
.responseCallback
= llqResponseHndlr
;
3107 info
->question
->LastQTime
= mDNSPlatformTimeNow(m
) - (2 * INIT_UCAST_POLL_INTERVAL
); // trigger immediate poll
3108 info
->question
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
;
3111 mDNSlocal
void startLLQHandshake(mDNS
*m
, LLQ_Info
*info
, mDNSBool defer
)
3116 DNSQuestion
*q
= info
->question
;
3117 mStatus err
= mStatus_NoError
;
3118 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
3119 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
3121 if (IsPrivateV4Addr(&u
->AdvertisedV4
))
3125 info
->state
= LLQ_NatMapWait
;
3129 if (u
->LLQNatInfo
->state
== NATState_Error
) goto poll
;
3130 if (u
->LLQNatInfo
->state
!= NATState_Established
&& u
->LLQNatInfo
->state
!= NATState_Legacy
)
3131 { info
->state
= LLQ_NatMapWait
; info
->NATMap
= mDNStrue
; return; }
3132 info
->NATMap
= mDNStrue
; // this llq references the global llq nat mapping
3135 if (info
->ntries
++ >= kLLQ_MAX_TRIES
)
3137 debugf("startLLQHandshake: %d failed attempts for LLQ %##s. Polling.", kLLQ_MAX_TRIES
, q
->qname
.c
, kLLQ_DEF_RETRY
/ 60);
3142 llqData
.vers
= kLLQ_Vers
;
3143 llqData
.llqOp
= kLLQOp_Setup
;
3144 llqData
.err
= LLQErr_NoError
;
3145 ubzero(llqData
.id
, 8);
3146 llqData
.lease
= kLLQ_DefLease
;
3148 initializeQuery(&msg
, q
);
3149 end
= putLLQ(&msg
, msg
.data
, q
, &llqData
, mDNStrue
);
3152 LogMsg("ERROR: startLLQHandshake - putLLQ");
3153 info
->state
= LLQ_Error
;
3157 if (!defer
) // if we are to defer, we simply set the retry timers so the request goes out in the future
3159 err
= mDNSSendDNSMessage(m
, &msg
, end
, mDNSInterface_Any
, &info
->servAddr
, info
->servPort
, -1, mDNSNULL
);
3160 if (err
) debugf("ERROR: startLLQHandshake - mDNSSendDNSMessage returned %ld", err
);
3161 // on error, we procede as normal and retry after the appropriate interval
3164 // update question/info state
3165 info
->state
= LLQ_InitialRequest
;
3166 info
->origLease
= kLLQ_DefLease
;
3167 info
->retry
= timenow
+ (kLLQ_INIT_RESEND
* mDNSPlatformOneSecond
);
3168 q
->LastQTime
= timenow
;
3169 q
->uDNS_info
.responseCallback
= recvSetupResponse
;
3170 q
->uDNS_info
.internal
= mDNStrue
;
3174 info
->question
->uDNS_info
.responseCallback
= llqResponseHndlr
;
3175 info
->state
= LLQ_Poll
;
3176 info
->question
->LastQTime
= mDNSPlatformTimeNow(m
) - (2 * INIT_UCAST_POLL_INTERVAL
); // trigger immediate poll
3177 info
->question
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
;
3180 // wrapper for startLLQHandshake, invoked by async op callback
3181 mDNSlocal
void startLLQHandshakeCallback(mStatus err
, mDNS
*const m
, void *llqInfo
, const AsyncOpResult
*result
)
3183 LLQ_Info
*info
= (LLQ_Info
*)llqInfo
;
3184 const zoneData_t
*zoneInfo
= mDNSNULL
;
3186 // check state first to make sure it is OK to touch question object
3187 if (info
->state
== LLQ_Cancelled
)
3189 // StopQuery was called while we were getting the zone info
3190 debugf("startLLQHandshake - LLQ Cancelled.");
3191 info
->question
= mDNSNULL
; // question may be deallocated
3196 if (!info
->question
)
3197 { LogMsg("ERROR: startLLQHandshakeCallback invoked with NULL question"); goto error
; }
3199 if (info
->state
!= LLQ_GetZoneInfo
)
3200 { LogMsg("ERROR: startLLQHandshake - bad state %d", info
->state
); goto error
; }
3203 { LogMsg("ERROR: startLLQHandshakeCallback %##s invoked with error code %ld", info
->question
->qname
.c
, err
); goto poll
; }
3206 { LogMsg("ERROR: startLLQHandshakeCallback invoked with NULL result and no error code"); goto error
; }
3208 zoneInfo
= &result
->zoneData
;
3210 if (!zoneInfo
->llqPort
.NotAnInteger
)
3211 { debugf("LLQ port lookup failed - reverting to polling"); info
->servPort
.NotAnInteger
= 0; goto poll
; }
3213 // cache necessary zone data
3214 info
->servAddr
= zoneInfo
->primaryAddr
;
3215 info
->servPort
= zoneInfo
->llqPort
;
3218 if (info
->state
== LLQ_SuspendDeferred
) info
->state
= LLQ_Suspended
;
3219 else startLLQHandshake(m
, info
, mDNSfalse
);
3223 info
->question
->uDNS_info
.responseCallback
= llqResponseHndlr
;
3224 info
->state
= LLQ_Poll
;
3225 info
->question
->LastQTime
= mDNSPlatformTimeNow(m
) - (2 * INIT_UCAST_POLL_INTERVAL
); // trigger immediate poll
3226 info
->question
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
;
3230 info
->state
= LLQ_Error
;
3233 mDNSlocal mStatus
startLLQ(mDNS
*m
, DNSQuestion
*question
)
3236 mStatus err
= mStatus_NoError
;
3238 // allocate / init info struct
3239 info
= umalloc(sizeof(LLQ_Info
));
3240 if (!info
) { LogMsg("ERROR: startLLQ - malloc"); return mStatus_NoMemoryErr
; }
3241 ubzero(info
, sizeof(LLQ_Info
));
3242 info
->state
= LLQ_GetZoneInfo
;
3244 // link info/question
3245 info
->question
= question
;
3246 question
->uDNS_info
.llq
= info
;
3248 question
->uDNS_info
.responseCallback
= llqResponseHndlr
;
3250 err
= startGetZoneData(&question
->qname
, m
, mDNSfalse
, mDNStrue
, startLLQHandshakeCallback
, info
);
3253 LogMsg("ERROR: startLLQ - startGetZoneData returned %ld", err
);
3254 info
->question
= mDNSNULL
;
3256 question
->uDNS_info
.llq
= mDNSNULL
;
3260 LinkActiveQuestion(&m
->uDNS_info
, question
);
3264 mDNSlocal mDNSBool
recvLLQResponse(mDNS
*m
, DNSMessage
*msg
, const mDNSu8
*end
, const mDNSAddr
*srcaddr
, mDNSIPPort srcport
, const mDNSInterfaceID InterfaceID
)
3266 DNSQuestion pktQ
, *q
;
3267 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
3268 const mDNSu8
*ptr
= msg
->data
;
3271 if (!msg
->h
.numQuestions
) return mDNSfalse
;
3273 ptr
= getQuestion(msg
, ptr
, end
, 0, &pktQ
);
3274 if (!ptr
) return mDNSfalse
;
3275 pktQ
.uDNS_info
.id
= msg
->h
.id
;
3277 q
= u
->ActiveQueries
;
3280 llqInfo
= q
->uDNS_info
.llq
;
3283 q
->qnamehash
== pktQ
.qnamehash
&&
3284 q
->qtype
== pktQ
.qtype
&&
3285 SameDomainName(&q
->qname
, &pktQ
.qname
))
3287 u
->CurrentQuery
= q
;
3288 if (llqInfo
->state
== LLQ_Established
|| (llqInfo
->state
== LLQ_Refresh
&& msg
->h
.numAnswers
))
3289 { if (recvLLQEvent(m
, q
, msg
, end
, srcaddr
, srcport
, InterfaceID
)) return mDNStrue
; }
3290 else if (msg
->h
.id
.NotAnInteger
== q
->uDNS_info
.id
.NotAnInteger
)
3292 if (llqInfo
->state
== LLQ_Refresh
&& msg
->h
.numAdditionals
&& !msg
->h
.numAnswers
)
3293 { recvRefreshReply(m
, msg
, end
, q
); return mDNStrue
; }
3294 if (llqInfo
->state
< LLQ_Static
)
3296 if ((llqInfo
->state
!= LLQ_InitialRequest
&& llqInfo
->state
!= LLQ_SecondaryRequest
) || mDNSSameAddress(srcaddr
, &llqInfo
->servAddr
))
3297 { q
->uDNS_info
.responseCallback(m
, msg
, end
, q
, q
->uDNS_info
.context
); return mDNStrue
; }
3306 mDNSexport mDNSBool
uDNS_IsActiveQuery(DNSQuestion
*const question
, uDNS_GlobalInfo
*u
)
3310 for (q
= u
->ActiveQueries
; q
; q
= q
->next
)
3314 if (!question
->uDNS_info
.id
.NotAnInteger
|| question
->InterfaceID
== mDNSInterface_LocalOnly
|| IsLocalDomain(&question
->qname
))
3315 LogMsg("Warning: Question %##s in Active Unicast Query list with id %d, interfaceID %p",
3316 question
->qname
.c
, question
->uDNS_info
.id
.NotAnInteger
, question
->InterfaceID
);
3323 // stopLLQ happens IN ADDITION to stopQuery
3324 mDNSlocal
void stopLLQ(mDNS
*m
, DNSQuestion
*question
)
3326 LLQ_Info
*info
= question
->uDNS_info
.llq
;
3329 if (!question
->LongLived
) { LogMsg("ERROR: stopLLQ - LongLived flag not set"); return; }
3330 if (!info
) { LogMsg("ERROR: stopLLQ - llq info is NULL"); return; }
3332 switch (info
->state
)
3335 LogMsg("ERROR: stopLLQ - state LLQ_UnInit");
3336 //!!!KRS should we unlink info<->question here?
3338 case LLQ_GetZoneInfo
:
3339 case LLQ_SuspendDeferred
:
3340 info
->question
= mDNSNULL
; // remove ref to question, as it may be freed when we get called back from async op
3341 info
->state
= LLQ_Cancelled
;
3343 case LLQ_Established
:
3345 // refresh w/ lease 0
3346 sendLLQRefresh(m
, question
, 0);
3349 debugf("stopLLQ - silently discarding LLQ in state %d", info
->state
);
3354 if (info
->NATMap
) info
->NATMap
= mDNSfalse
;
3355 CheckForUnreferencedLLQMapping(m
);
3356 info
->question
= mDNSNULL
;
3358 question
->uDNS_info
.llq
= mDNSNULL
;
3359 question
->LongLived
= mDNSfalse
;
3362 mDNSexport mStatus
uDNS_StopQuery(mDNS
*const m
, DNSQuestion
*const question
)
3364 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
3365 DNSQuestion
*qptr
, *prev
= mDNSNULL
;
3368 qptr
= u
->ActiveQueries
;
3371 if (qptr
== question
)
3373 if (question
->LongLived
&& question
->uDNS_info
.llq
)
3374 stopLLQ(m
, question
);
3375 if (m
->uDNS_info
.CurrentQuery
== question
)
3376 m
->uDNS_info
.CurrentQuery
= m
->uDNS_info
.CurrentQuery
->next
;
3377 while (question
->uDNS_info
.knownAnswers
)
3379 ka
= question
->uDNS_info
.knownAnswers
;
3380 question
->uDNS_info
.knownAnswers
= question
->uDNS_info
.knownAnswers
->next
;
3383 if (prev
) prev
->next
= question
->next
;
3384 else u
->ActiveQueries
= question
->next
;
3385 return mStatus_NoError
;
3390 LogMsg("uDNS_StopQuery: no such active query (%##s)", question
->qname
.c
);
3391 return mStatus_UnknownErr
;
3394 mDNSlocal mStatus
startQuery(mDNS
*const m
, DNSQuestion
*const question
, mDNSBool internal
)
3396 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
3397 //!!!KRS we should check if the question is already in our activequestion list
3398 if (!ValidateDomainName(&question
->qname
))
3400 LogMsg("Attempt to start query with invalid qname %##s (%s)", question
->qname
.c
, DNSTypeName(question
->qtype
));
3401 return mStatus_Invalid
;
3404 question
->next
= mDNSNULL
;
3405 question
->qnamehash
= DomainNameHashValue(&question
->qname
); // to do quick domain name comparisons
3406 question
->uDNS_info
.id
= newMessageID(u
);
3407 question
->uDNS_info
.Answered
= mDNSfalse
;
3409 // break here if its and LLQ
3410 if (question
->LongLived
) return startLLQ(m
, question
);
3412 question
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
/ 2;
3413 question
->LastQTime
= mDNSPlatformTimeNow(m
) - question
->ThisQInterval
;
3414 // store the question/id in active question list
3415 question
->uDNS_info
.internal
= internal
;
3416 LinkActiveQuestion(u
, question
);
3417 question
->uDNS_info
.knownAnswers
= mDNSNULL
;
3418 LogOperation("uDNS startQuery: %##s (%s)", question
->qname
.c
, DNSTypeName(question
->qtype
));
3420 return mStatus_NoError
;
3423 mDNSexport mStatus
uDNS_StartQuery(mDNS
*const m
, DNSQuestion
*const question
)
3425 ubzero(&question
->uDNS_info
, sizeof(uDNS_QuestionInfo
));
3426 question
->uDNS_info
.responseCallback
= simpleResponseHndlr
;
3427 question
->uDNS_info
.context
= mDNSNULL
;
3428 //LogOperation("uDNS_StartQuery %##s (%s)", question->qname.c, DNSTypeName(question->qtype));
3429 return startQuery(m
, question
, 0);
3432 // explicitly set response handler
3433 mDNSlocal mStatus
startInternalQuery(DNSQuestion
*q
, mDNS
*m
, InternalResponseHndlr callback
, void *hndlrContext
)
3435 ubzero(&q
->uDNS_info
, sizeof(uDNS_QuestionInfo
));
3436 q
->QuestionContext
= hndlrContext
;
3437 q
->uDNS_info
.responseCallback
= callback
;
3438 q
->uDNS_info
.context
= hndlrContext
;
3439 return startQuery(m
, q
, 1);
3444 // ***************************************************************************
3445 #if COMPILER_LIKES_PRAGMA_MARK
3446 #pragma mark - Domain -> Name Server Conversion
3452 * Asynchronously find the address of the nameserver for the enclosing zone for a given domain name,
3453 * i.e. the server to which update and LLQ requests will be sent for a given name. Once the address is
3454 * derived, it will be passed to the callback, along with a context pointer. If the zone cannot
3455 * be determined or if an error occurs, an all-zeros address will be passed and a message will be
3456 * written to the syslog.
3458 * If the FindUpdatePort arg is set, the port on which the server accepts dynamic updates is determined
3459 * by querying for the _dns-update._udp.<zone>. SRV record. Likewise, if the FindLLQPort arg is set,
3460 * the port on which the server accepts long lived queries is determined by querying for
3461 * _dns-llq._udp.<zone>. record. If either of these queries fail, or flags are not specified,
3462 * the llqPort and updatePort fields in the result structure are set to zero.
3464 * Steps for deriving the zone name are as follows:
3466 * Query for an SOA record for the required domain. If we don't get an answer (or an SOA in the Authority
3467 * section), we strip the leading label from the name and repeat, until we get an answer.
3469 * The name of the SOA record is our enclosing zone. The mname field in the SOA rdata is the domain
3470 * name of the primary NS.
3472 * We verify that there is an NS record with this zone for a name and the mname for its rdata.
3473 * (!!!KRS this seems redundant, but BIND does this, and it should normally be zero-overhead since
3474 * the NS query will get us address records in the additionals section, which we'd otherwise have to
3475 * explicitly query for.)
3477 * We then query for the address record for this nameserver (if it is not in the addionals section of
3478 * the NS record response.)
3482 // state machine types and structs
3485 // state machine states
3500 // state machine actions
3503 smContinue
, // continue immediately to next state
3504 smBreak
, // break until next packet/timeout
3505 smError
// terminal error - cleanup and abort
3510 domainname origName
; // name we originally try to convert
3511 domainname
*curSOA
; // name we have an outstanding SOA query for
3512 ntaState state
; // determines what we do upon receiving a packet
3514 domainname zone
; // left-hand-side of SOA record
3516 domainname ns
; // mname in SOA rdata, verified in confirmNS state
3517 mDNSv4Addr addr
; // address of nameserver
3518 DNSQuestion question
; // storage for any active question
3519 DNSQuestion extraQuestion
; // additional storage
3520 mDNSBool questionActive
; // if true, StopQuery() can be called on the question field
3521 mDNSBool findUpdatePort
;
3522 mDNSBool findLLQPort
;
3523 mDNSIPPort updatePort
;
3525 AsyncOpCallback
*callback
; // caller specified function to be called upon completion
3530 // function prototypes (for routines that must be used as fn pointers prior to their definitions,
3531 // and allows states to be read top-to-bottom in logical order)
3532 mDNSlocal
void getZoneData(mDNS
*const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, void *contextPtr
);
3533 mDNSlocal smAction
hndlLookupSOA(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
);
3534 mDNSlocal
void processSOA(ntaContext
*context
, ResourceRecord
*rr
);
3535 mDNSlocal smAction
confirmNS(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
);
3536 mDNSlocal smAction
lookupNSAddr(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
);
3537 mDNSlocal smAction
hndlLookupPorts(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
);
3540 mDNSlocal mStatus
startGetZoneData(domainname
*name
, mDNS
*m
, mDNSBool findUpdatePort
, mDNSBool findLLQPort
,
3541 AsyncOpCallback callback
, void *callbackInfo
)
3543 ntaContext
*context
= (ntaContext
*)umalloc(sizeof(ntaContext
));
3544 if (!context
) { LogMsg("ERROR: startGetZoneData - umalloc failed"); return mStatus_NoMemoryErr
; }
3545 ubzero(context
, sizeof(ntaContext
));
3546 AssignDomainName(&context
->origName
, name
);
3547 context
->state
= init
;
3549 context
->callback
= callback
;
3550 context
->callbackInfo
= callbackInfo
;
3551 context
->findUpdatePort
= findUpdatePort
;
3552 context
->findLLQPort
= findLLQPort
;
3553 getZoneData(m
, mDNSNULL
, mDNSNULL
, mDNSNULL
, context
);
3554 return mStatus_NoError
;
3557 // state machine entry routine
3558 mDNSlocal
void getZoneData(mDNS
*const m
, DNSMessage
*msg
, const mDNSu8
*end
, DNSQuestion
*question
, void *contextPtr
)
3560 AsyncOpResult result
;
3561 ntaContext
*context
= (ntaContext
*)contextPtr
;
3568 // stop any active question
3569 if (context
->questionActive
)
3571 uDNS_StopQuery(context
->m
, &context
->question
);
3572 context
->questionActive
= mDNSfalse
;
3575 if (msg
&& msg
->h
.flags
.b
[2] >> 4 && msg
->h
.flags
.b
[2] >> 4 != kDNSFlag1_RC_NXDomain
)
3577 // rcode non-zero, non-nxdomain
3578 LogMsg("ERROR: getZoneData - received response w/ rcode %d", msg
->h
.flags
.b
[2] >> 4);
3582 switch (context
->state
)
3586 action
= hndlLookupSOA(msg
, end
, context
);
3587 if (action
== smError
) goto error
;
3588 if (action
== smBreak
) return;
3591 action
= confirmNS(msg
, end
, context
);
3592 if (action
== smError
) goto error
;
3593 if (action
== smBreak
) return;
3596 action
= lookupNSAddr(msg
, end
, context
);
3597 if (action
== smError
) goto error
;
3598 if (action
== smBreak
) return;
3600 if (!context
->findUpdatePort
&& !context
->findLLQPort
)
3602 context
->state
= complete
;
3606 action
= hndlLookupPorts(msg
, end
, context
);
3607 if (action
== smError
) goto error
;
3608 if (action
== smBreak
) return;
3609 if (action
== smContinue
) context
->state
= complete
;
3611 case complete
: break;
3614 if (context
->state
!= complete
)
3616 LogMsg("ERROR: getZoneData - exited state machine with state %d", context
->state
);
3620 result
.type
= zoneDataResult
;
3621 result
.zoneData
.primaryAddr
.ip
.v4
= context
->addr
;
3622 result
.zoneData
.primaryAddr
.type
= mDNSAddrType_IPv4
;
3623 AssignDomainName(&result
.zoneData
.zoneName
, &context
->zone
);
3624 result
.zoneData
.zoneClass
= context
->zoneClass
;
3625 result
.zoneData
.llqPort
= context
->findLLQPort
? context
->llqPort
: zeroIPPort
;
3626 result
.zoneData
.updatePort
= context
->findUpdatePort
? context
->updatePort
: zeroIPPort
;
3627 context
->callback(mStatus_NoError
, context
->m
, context
->callbackInfo
, &result
);
3631 if (context
&& context
->callback
)
3632 context
->callback(mStatus_UnknownErr
, context
->m
, context
->callbackInfo
, mDNSNULL
);
3634 if (context
&& context
->questionActive
)
3636 uDNS_StopQuery(context
->m
, &context
->question
);
3637 context
->questionActive
= mDNSfalse
;
3639 if (context
) ufree(context
);
3642 mDNSlocal smAction
hndlLookupSOA(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
)
3645 LargeCacheRecord lcr
;
3646 ResourceRecord
*rr
= &lcr
.r
.resrec
;
3647 DNSQuestion
*query
= &context
->question
;
3652 // if msg contains SOA record in answer or authority sections, update context/state and return
3654 ptr
= LocateAnswers(msg
, end
);
3655 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
3657 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
3658 if (!ptr
) { LogMsg("ERROR: hndlLookupSOA, Answers - GetLargeResourceRecord returned NULL"); return smError
; }
3659 if (rr
->rrtype
== kDNSType_SOA
&& SameDomainName(context
->curSOA
, rr
->name
))
3661 processSOA(context
, rr
);
3665 ptr
= LocateAuthorities(msg
, end
);
3666 // SOA not in answers, check in authority
3667 for (i
= 0; i
< msg
->h
.numAuthorities
; i
++)
3669 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
); ///!!!KRS using type PacketAns for auth
3670 if (!ptr
) { LogMsg("ERROR: hndlLookupSOA, Authority - GetLargeResourceRecord returned NULL"); return smError
; }
3671 if (rr
->rrtype
== kDNSType_SOA
)
3673 processSOA(context
, rr
);
3679 if (context
->state
!= init
&& !context
->curSOA
->c
[0])
3681 // we've gone down to the root and have not found an SOA
3682 LogMsg("ERROR: hndlLookupSOA - recursed to root label of %##s without finding SOA",
3683 context
->origName
.c
);
3687 ubzero(query
, sizeof(DNSQuestion
));
3688 // chop off leading label unless this is our first try
3689 if (context
->state
== init
) context
->curSOA
= &context
->origName
;
3690 else context
->curSOA
= (domainname
*)(context
->curSOA
->c
+ context
->curSOA
->c
[0]+1);
3692 context
->state
= lookupSOA
;
3693 AssignDomainName(&query
->qname
, context
->curSOA
);
3694 query
->qtype
= kDNSType_SOA
;
3695 query
->qclass
= kDNSClass_IN
;
3696 err
= startInternalQuery(query
, context
->m
, getZoneData
, context
);
3697 context
->questionActive
= mDNStrue
;
3698 if (err
) LogMsg("hndlLookupSOA: startInternalQuery returned error %ld (breaking until next periodic retransmission)", err
);
3700 return smBreak
; // break from state machine until we receive another packet
3703 mDNSlocal
void processSOA(ntaContext
*context
, ResourceRecord
*rr
)
3705 AssignDomainName(&context
->zone
, rr
->name
);
3706 context
->zoneClass
= rr
->rrclass
;
3707 AssignDomainName(&context
->ns
, &rr
->rdata
->u
.soa
.mname
);
3708 context
->state
= foundZone
;
3712 mDNSlocal smAction
confirmNS(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
)
3714 DNSQuestion
*query
= &context
->question
;
3716 LargeCacheRecord lcr
;
3717 const ResourceRecord
*const rr
= &lcr
.r
.resrec
;
3721 if (context
->state
== foundZone
)
3723 // we've just learned the zone. confirm that an NS record exists
3724 AssignDomainName(&query
->qname
, &context
->zone
);
3725 query
->qtype
= kDNSType_NS
;
3726 query
->qclass
= kDNSClass_IN
;
3727 err
= startInternalQuery(query
, context
->m
, getZoneData
, context
);
3728 context
->questionActive
= mDNStrue
;
3729 if (err
) LogMsg("confirmNS: startInternalQuery returned error %ld (breaking until next periodic retransmission", err
);
3730 context
->state
= lookupNS
;
3731 return smBreak
; // break from SM until we receive another packet
3733 else if (context
->state
== lookupNS
)
3735 ptr
= LocateAnswers(msg
, end
);
3736 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
3738 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
3739 if (!ptr
) { LogMsg("ERROR: confirmNS, Answers - GetLargeResourceRecord returned NULL"); return smError
; }
3740 if (rr
->rrtype
== kDNSType_NS
&&
3741 SameDomainName(&context
->zone
, rr
->name
) && SameDomainName(&context
->ns
, &rr
->rdata
->u
.name
))
3743 context
->state
= foundNS
;
3744 return smContinue
; // next routine will examine additionals section of A record
3747 debugf("ERROR: could not confirm existence of record %##s NS %##s", context
->zone
.c
, context
->ns
.c
);
3750 else { LogMsg("ERROR: confirmNS - bad state %d", context
->state
); return smError
; }
3753 mDNSlocal smAction
queryNSAddr(ntaContext
*context
)
3756 DNSQuestion
*query
= &context
->question
;
3758 AssignDomainName(&query
->qname
, &context
->ns
);
3759 query
->qtype
= kDNSType_A
;
3760 query
->qclass
= kDNSClass_IN
;
3761 err
= startInternalQuery(query
, context
->m
, getZoneData
, context
);
3762 context
->questionActive
= mDNStrue
;
3763 if (err
) LogMsg("confirmNS: startInternalQuery returned error %ld (breaking until next periodic retransmission)", err
);
3764 context
->state
= lookupA
;
3768 mDNSlocal smAction
lookupNSAddr(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
)
3772 LargeCacheRecord lcr
;
3773 ResourceRecord
*rr
= &lcr
.r
.resrec
;
3775 if (context
->state
== foundNS
)
3777 // we just found the NS record - look for the corresponding A record in the Additionals section
3778 if (!msg
->h
.numAdditionals
) return queryNSAddr(context
);
3779 ptr
= LocateAdditionals(msg
, end
);
3782 LogMsg("ERROR: lookupNSAddr - LocateAdditionals returned NULL, expected %d additionals", msg
->h
.numAdditionals
);
3783 return queryNSAddr(context
);
3787 for (i
= 0; i
< msg
->h
.numAdditionals
; i
++)
3789 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
3792 LogMsg("ERROR: lookupNSAddr, Additionals - GetLargeResourceRecord returned NULL");
3793 return queryNSAddr(context
);
3795 if (rr
->rrtype
== kDNSType_A
&& SameDomainName(&context
->ns
, rr
->name
))
3797 context
->addr
= rr
->rdata
->u
.ipv4
;
3798 context
->state
= foundA
;
3803 // no A record in Additionals - query the server
3804 return queryNSAddr(context
);
3806 else if (context
->state
== lookupA
)
3808 ptr
= LocateAnswers(msg
, end
);
3809 if (!ptr
) { LogMsg("ERROR: lookupNSAddr: LocateAnswers returned NULL"); return smError
; }
3810 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
3812 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
3813 if (!ptr
) { LogMsg("ERROR: lookupNSAddr, Answers - GetLargeResourceRecord returned NULL"); break; }
3814 if (rr
->rrtype
== kDNSType_A
&& SameDomainName(&context
->ns
, rr
->name
))
3816 context
->addr
= rr
->rdata
->u
.ipv4
;
3817 context
->state
= foundA
;
3821 LogMsg("ERROR: lookupNSAddr: Address record not found in answer section");
3824 else { LogMsg("ERROR: lookupNSAddr - bad state %d", context
->state
); return smError
; }
3827 mDNSlocal smAction
lookupDNSPort(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
, char *portName
, mDNSIPPort
*port
)
3830 LargeCacheRecord lcr
;
3835 if (context
->state
== lookupPort
) // we've already issued the query
3837 if (!msg
) { LogMsg("ERROR: hndlLookupUpdatePort - NULL message"); return smError
; }
3838 ptr
= LocateAnswers(msg
, end
);
3839 for (i
= 0; i
< msg
->h
.numAnswers
; i
++)
3841 ptr
= GetLargeResourceRecord(context
->m
, msg
, ptr
, end
, 0, kDNSRecordTypePacketAns
, &lcr
);
3842 if (!ptr
) { LogMsg("ERROR: hndlLookupUpdatePort - GetLargeResourceRecord returned NULL"); return smError
; }
3843 if (ResourceRecordAnswersQuestion(&lcr
.r
.resrec
, &context
->question
))
3845 *port
= lcr
.r
.resrec
.rdata
->u
.srv
.port
;
3846 context
->state
= foundPort
;
3850 debugf("hndlLookupUpdatePort - no answer for type %s", portName
);
3851 port
->NotAnInteger
= 0;
3852 context
->state
= foundPort
;
3856 // query the server for the update port for the zone
3857 context
->state
= lookupPort
;
3858 q
= &context
->question
;
3859 MakeDomainNameFromDNSNameString(&q
->qname
, portName
);
3860 AppendDomainName(&q
->qname
, &context
->zone
);
3861 q
->qtype
= kDNSType_SRV
;
3862 q
->qclass
= kDNSClass_IN
;
3863 err
= startInternalQuery(q
, context
->m
, getZoneData
, context
);
3864 context
->questionActive
= mDNStrue
;
3865 if (err
) LogMsg("hndlLookupSOA: startInternalQuery returned error %ld (breaking until next periodic retransmission)", err
);
3866 return smBreak
; // break from state machine until we receive another packet
3869 mDNSlocal smAction
hndlLookupPorts(DNSMessage
*msg
, const mDNSu8
*end
, ntaContext
*context
)
3873 if (context
->findUpdatePort
&& !context
->updatePort
.NotAnInteger
)
3875 action
= lookupDNSPort(msg
, end
, context
, UPDATE_PORT_NAME
, &context
->updatePort
);
3876 if (action
!= smContinue
) return action
;
3878 if (context
->findLLQPort
&& !context
->llqPort
.NotAnInteger
)
3879 return lookupDNSPort(msg
, end
, context
, LLQ_PORT_NAME
, &context
->llqPort
);
3885 // ***************************************************************************
3886 #if COMPILER_LIKES_PRAGMA_MARK
3887 #pragma mark - Truncation Handling
3892 DNSQuestion
*question
;
3899 // issue queries over a conected socket
3900 mDNSlocal
void conQueryCallback(int sd
, void *context
, mDNSBool ConnectionEstablished
)
3903 char msgbuf
[356]; // 96 (hdr) + 256 (domain) + 4 (class/type)
3906 tcpInfo_t
*info
= (tcpInfo_t
*)context
;
3907 DNSQuestion
*question
= info
->question
;
3913 if (ConnectionEstablished
)
3915 // connection is established - send the message
3916 msg
= (DNSMessage
*)&msgbuf
;
3917 err
= constructQueryMsg(msg
, &end
, question
);
3918 if (err
) { LogMsg("ERROR: conQueryCallback: constructQueryMsg - %ld", err
); goto error
; }
3919 err
= mDNSSendDNSMessage(m
, msg
, end
, mDNSInterface_Any
, &zeroAddr
, zeroIPPort
, sd
, mDNSNULL
);
3920 question
->LastQTime
= mDNSPlatformTimeNow(m
);
3921 if (err
) { debugf("ERROR: conQueryCallback: mDNSSendDNSMessage_tcp - %ld", err
); goto error
; }
3929 n
= mDNSPlatformReadTCP(sd
, lenbuf
, 2);
3932 LogMsg("ERROR:conQueryCallback - attempt to read message length failed (read returned %d)", n
);
3935 info
->replylen
= (mDNSu16
)((mDNSu16
)lenbuf
[0] << 8 | lenbuf
[1]);
3936 if (info
->replylen
< sizeof(DNSMessageHeader
))
3937 { LogMsg("ERROR: conQueryCallback - length too short (%d bytes)", info
->replylen
); goto error
; }
3938 info
->reply
= umalloc(info
->replylen
);
3939 if (!info
->reply
) { LogMsg("ERROR: conQueryCallback - malloc failed"); goto error
; }
3941 n
= mDNSPlatformReadTCP(sd
, ((char *)info
->reply
) + info
->nread
, info
->replylen
- info
->nread
);
3942 if (n
< 0) { LogMsg("ERROR: conQueryCallback - read returned %d", n
); goto error
; }
3944 if (info
->nread
== info
->replylen
)
3946 // Finished reading message; convert the integer parts which are in IETF byte-order (MSB first, LSB second)
3947 DNSMessage
*msg
= info
->reply
;
3948 mDNSu8
*ptr
= (mDNSu8
*)&msg
->h
.numQuestions
;
3949 msg
->h
.numQuestions
= (mDNSu16
)((mDNSu16
)ptr
[0] << 8 | ptr
[1]);
3950 msg
->h
.numAnswers
= (mDNSu16
)((mDNSu16
)ptr
[2] << 8 | ptr
[3]);
3951 msg
->h
.numAuthorities
= (mDNSu16
)((mDNSu16
)ptr
[4] << 8 | ptr
[5]);
3952 msg
->h
.numAdditionals
= (mDNSu16
)((mDNSu16
)ptr
[6] << 8 | ptr
[7]);
3953 uDNS_ReceiveMsg(m
, msg
, (mDNSu8
*)msg
+ info
->replylen
, mDNSNULL
, zeroIPPort
, mDNSNULL
, zeroIPPort
, question
->InterfaceID
);
3954 mDNSPlatformTCPCloseConnection(sd
);
3964 mDNSPlatformTCPCloseConnection(sd
);
3965 if (info
->reply
) ufree(info
->reply
);
3970 mDNSlocal
void hndlTruncatedAnswer(DNSQuestion
*question
, const mDNSAddr
*src
, mDNS
*m
)
3972 mStatus connectionStatus
;
3973 uDNS_QuestionInfo
*info
= &question
->uDNS_info
;
3977 if (!src
) { LogMsg("hndlTruncatedAnswer: TCP DNS response had TC bit set: ignoring"); return; }
3979 context
= (tcpInfo_t
*)umalloc(sizeof(tcpInfo_t
));
3980 if (!context
) { LogMsg("ERROR: hndlTruncatedAnswer - memallocate failed"); return; }
3981 ubzero(context
, sizeof(tcpInfo_t
));
3982 context
->question
= question
;
3984 info
->id
= newMessageID(&m
->uDNS_info
);
3986 connectionStatus
= mDNSPlatformTCPConnect(src
, UnicastDNSPort
, question
->InterfaceID
, conQueryCallback
, context
, &sd
);
3987 if (connectionStatus
== mStatus_ConnEstablished
) // manually invoke callback if connection completes
3989 conQueryCallback(sd
, context
, mDNStrue
);
3992 if (connectionStatus
== mStatus_ConnPending
) return; // callback will be automatically invoked when connection completes
3993 LogMsg("hndlTruncatedAnswer: connection failed");
3994 uDNS_StopQuery(m
, question
); //!!!KRS can we really call this here?
3998 // ***************************************************************************
3999 #if COMPILER_LIKES_PRAGMA_MARK
4000 #pragma mark - Dynamic Updates
4003 mDNSlocal
void sendRecordRegistration(mDNS
*const m
, AuthRecord
*rr
)
4006 mDNSu8
*ptr
= msg
.data
;
4007 mDNSu8
*end
= (mDNSu8
*)&msg
+ sizeof(DNSMessage
);
4008 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4010 uDNS_RegInfo
*regInfo
= &rr
->uDNS_info
;
4011 mStatus err
= mStatus_UnknownErr
;
4013 id
= newMessageID(u
);
4014 InitializeDNSMessage(&msg
.h
, id
, UpdateReqFlags
);
4015 rr
->uDNS_info
.id
= id
;
4018 ptr
= putZone(&msg
, ptr
, end
, ®Info
->zone
, mDNSOpaque16fromIntVal(rr
->resrec
.rrclass
));
4019 if (!ptr
) goto error
;
4021 if (regInfo
->state
== regState_UpdatePending
)
4024 SetNewRData(&rr
->resrec
, regInfo
->OrigRData
, regInfo
->OrigRDLen
);
4025 if (!(ptr
= putDeletionRecord(&msg
, ptr
, &rr
->resrec
))) goto error
; // delete old rdata
4028 SetNewRData(&rr
->resrec
, regInfo
->InFlightRData
, regInfo
->InFlightRDLen
);
4029 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &rr
->resrec
, rr
->resrec
.rroriginalttl
))) goto error
;
4034 if (rr
->resrec
.RecordType
== kDNSRecordTypeKnownUnique
)
4036 // KnownUnique: Delete any previous value
4037 ptr
= putDeleteRRSet(&msg
, ptr
, rr
->resrec
.name
, rr
->resrec
.rrtype
);
4038 if (!ptr
) goto error
;
4041 else if (rr
->resrec
.RecordType
!= kDNSRecordTypeShared
)
4043 ptr
= putPrereqNameNotInUse(rr
->resrec
.name
, &msg
, ptr
, end
);
4044 if (!ptr
) goto error
;
4047 ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &rr
->resrec
, rr
->resrec
.rroriginalttl
);
4048 if (!ptr
) goto error
;
4051 if (rr
->uDNS_info
.lease
)
4052 { ptr
= putUpdateLease(&msg
, ptr
, DEFAULT_UPDATE_LEASE
); if (!ptr
) goto error
; }
4054 err
= mDNSSendDNSMessage(m
, &msg
, ptr
, mDNSInterface_Any
, ®Info
->ns
, regInfo
->port
, -1, GetAuthInfoForName(u
, rr
->resrec
.name
));
4055 if (err
) debugf("ERROR: sendRecordRegistration - mDNSSendDNSMessage - %ld", err
);
4057 SetRecordRetry(m
, rr
, err
);
4059 if (regInfo
->state
!= regState_Refresh
&& regInfo
->state
!= regState_DeregDeferred
&& regInfo
->state
!= regState_UpdatePending
)
4060 regInfo
->state
= regState_Pending
;
4065 LogMsg("sendRecordRegistration: Error formatting message");
4066 if (rr
->uDNS_info
.state
!= regState_Unregistered
)
4068 unlinkAR(&u
->RecordRegistrations
, rr
);
4069 rr
->uDNS_info
.state
= regState_Unregistered
;
4071 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4072 if (rr
->RecordCallback
) rr
->RecordCallback(m
, rr
, err
);
4073 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4074 // NOTE: not safe to touch any client structures here
4077 mDNSlocal
void RecordRegistrationCallback(mStatus err
, mDNS
*const m
, void *authPtr
, const AsyncOpResult
*result
)
4079 AuthRecord
*newRR
= (AuthRecord
*)authPtr
;
4080 const zoneData_t
*zoneData
= mDNSNULL
;
4081 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4084 // make sure record is still in list
4085 for (ptr
= u
->RecordRegistrations
; ptr
; ptr
= ptr
->next
)
4086 if (ptr
== newRR
) break;
4087 if (!ptr
) { LogMsg("RecordRegistrationCallback - RR no longer in list. Discarding."); return; }
4089 // check error/result
4090 if (err
) { LogMsg("RecordRegistrationCallback: error %ld", err
); goto error
; }
4091 if (!result
) { LogMsg("ERROR: RecordRegistrationCallback invoked with NULL result and no error"); goto error
; }
4092 else zoneData
= &result
->zoneData
;
4094 if (newRR
->uDNS_info
.state
== regState_Cancelled
)
4096 //!!!KRS we should send a memfree callback here!
4097 debugf("Registration of %##s type %d cancelled prior to update",
4098 newRR
->resrec
.name
->c
, newRR
->resrec
.rrtype
);
4099 newRR
->uDNS_info
.state
= regState_Unregistered
;
4100 unlinkAR(&u
->RecordRegistrations
, newRR
);
4104 if (result
->type
!= zoneDataResult
)
4106 LogMsg("ERROR: buildUpdatePacket passed incorrect result type %d", result
->type
);
4110 if (newRR
->resrec
.rrclass
!= zoneData
->zoneClass
)
4112 LogMsg("ERROR: New resource record's class (%d) does not match zone class (%d)",
4113 newRR
->resrec
.rrclass
, zoneData
->zoneClass
);
4117 // Don't try to do updates to the root name server.
4118 // We might be tempted also to block updates to any single-label name server (e.g. com, edu, net, etc.) but some
4119 // organizations use their own private pseudo-TLD, like ".home", etc, and we don't want to block that.
4120 if (zoneData
->zoneName
.c
[0] == 0)
4122 LogMsg("ERROR: Only name server claiming responsibility for \"%##s\" is \"%##s\"!",
4123 newRR
->resrec
.name
->c
, zoneData
->zoneName
.c
);
4124 err
= mStatus_NoSuchNameErr
;
4129 AssignDomainName(&newRR
->uDNS_info
.zone
, &zoneData
->zoneName
);
4130 newRR
->uDNS_info
.ns
= zoneData
->primaryAddr
;
4131 if (zoneData
->updatePort
.NotAnInteger
) newRR
->uDNS_info
.port
= zoneData
->updatePort
;
4134 debugf("Update port not advertised via SRV - guessing port 53, no lease option");
4135 newRR
->uDNS_info
.port
= UnicastDNSPort
;
4136 newRR
->uDNS_info
.lease
= mDNSfalse
;
4139 sendRecordRegistration(m
, newRR
);
4143 if (newRR
->uDNS_info
.state
!= regState_Unregistered
)
4145 unlinkAR(&u
->RecordRegistrations
, newRR
);
4146 newRR
->uDNS_info
.state
= regState_Unregistered
;
4148 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4149 if (newRR
->RecordCallback
)
4150 newRR
->RecordCallback(m
, newRR
, err
);
4151 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4152 // NOTE: not safe to touch any client structures here
4155 mDNSlocal
void SendServiceRegistration(mDNS
*m
, ServiceRecordSet
*srs
)
4158 mDNSu8
*ptr
= msg
.data
;
4159 mDNSu8
*end
= (mDNSu8
*)&msg
+ sizeof(DNSMessage
);
4160 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4162 uDNS_RegInfo
*rInfo
= &srs
->uDNS_info
;
4163 mStatus err
= mStatus_UnknownErr
;
4164 mDNSIPPort privport
;
4165 NATTraversalInfo
*nat
= srs
->uDNS_info
.NATinfo
;
4166 mDNSBool mapped
= mDNSfalse
;
4168 AuthRecord
*srv
= &srs
->RR_SRV
;
4171 privport
= zeroIPPort
;
4173 if (!rInfo
->ns
.ip
.v4
.NotAnInteger
) { LogMsg("SendServiceRegistration - NS not set!"); return; }
4175 id
= newMessageID(u
);
4176 InitializeDNSMessage(&msg
.h
, id
, UpdateReqFlags
);
4178 // setup resource records
4179 SetNewRData(&srs
->RR_PTR
.resrec
, mDNSNULL
, 0);
4180 SetNewRData(&srs
->RR_TXT
.resrec
, mDNSNULL
, 0);
4182 // replace port w/ NAT mapping if necessary
4183 if (nat
&& nat
->PublicPort
.NotAnInteger
&&
4184 (nat
->state
== NATState_Established
|| nat
->state
== NATState_Refresh
|| nat
->state
== NATState_Legacy
))
4186 privport
= srv
->resrec
.rdata
->u
.srv
.port
;
4187 srv
->resrec
.rdata
->u
.srv
.port
= nat
->PublicPort
;
4191 // construct update packet
4193 ptr
= putZone(&msg
, ptr
, end
, &rInfo
->zone
, mDNSOpaque16fromIntVal(srv
->resrec
.rrclass
));
4194 if (!ptr
) goto error
;
4196 if (srs
->uDNS_info
.TestForSelfConflict
)
4198 // update w/ prereq that SRV already exist to make sure previous registration was ours, and delete any stale TXT records
4199 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numPrereqs
, &srs
->RR_SRV
.resrec
, 0))) goto error
;
4200 if (!(ptr
= putDeleteRRSet(&msg
, ptr
, srs
->RR_TXT
.resrec
.name
, srs
->RR_TXT
.resrec
.rrtype
))) goto error
;
4203 else if (srs
->uDNS_info
.state
!= regState_Refresh
&& srs
->uDNS_info
.state
!= regState_UpdatePending
)
4205 // use SRV name for prereq
4206 ptr
= putPrereqNameNotInUse(srv
->resrec
.name
, &msg
, ptr
, end
);
4207 if (!ptr
) goto error
;
4210 //!!!KRS Need to do bounds checking and use TCP if it won't fit!!!
4211 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &srs
->RR_PTR
.resrec
, srs
->RR_PTR
.resrec
.rroriginalttl
))) goto error
;
4213 for (i
= 0; i
< srs
->NumSubTypes
; i
++)
4214 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &srs
->SubTypes
[i
].resrec
, srs
->SubTypes
[i
].resrec
.rroriginalttl
))) goto error
;
4216 if (rInfo
->state
== regState_UpdatePending
) // we're updating the txt record
4218 AuthRecord
*txt
= &srs
->RR_TXT
;
4219 uDNS_RegInfo
*txtInfo
= &txt
->uDNS_info
;
4221 SetNewRData(&txt
->resrec
, txtInfo
->OrigRData
, txtInfo
->OrigRDLen
);
4222 if (!(ptr
= putDeletionRecord(&msg
, ptr
, &srs
->RR_TXT
.resrec
))) goto error
; // delete old rdata
4225 SetNewRData(&txt
->resrec
, txtInfo
->InFlightRData
, txtInfo
->InFlightRDLen
);
4226 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &srs
->RR_TXT
.resrec
, srs
->RR_TXT
.resrec
.rroriginalttl
))) goto error
;
4229 if (!(ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &srs
->RR_TXT
.resrec
, srs
->RR_TXT
.resrec
.rroriginalttl
))) goto error
;
4231 if (!GetServiceTarget(u
, srv
, &target
))
4233 debugf("Couldn't get target for service %##s", srv
->resrec
.name
->c
);
4234 rInfo
->state
= regState_NoTarget
;
4238 if (!SameDomainName(&target
, &srv
->resrec
.rdata
->u
.srv
.target
))
4240 AssignDomainName(&srv
->resrec
.rdata
->u
.srv
.target
, &target
);
4241 SetNewRData(&srv
->resrec
, mDNSNULL
, 0);
4244 ptr
= PutResourceRecordTTLJumbo(&msg
, ptr
, &msg
.h
.mDNS_numUpdates
, &srv
->resrec
, srv
->resrec
.rroriginalttl
);
4245 if (!ptr
) goto error
;
4247 if (srs
->uDNS_info
.lease
)
4248 { ptr
= putUpdateLease(&msg
, ptr
, DEFAULT_UPDATE_LEASE
); if (!ptr
) goto error
; }
4250 err
= mDNSSendDNSMessage(m
, &msg
, ptr
, mDNSInterface_Any
, &rInfo
->ns
, rInfo
->port
, -1, GetAuthInfoForName(u
, srs
->RR_SRV
.resrec
.name
));
4251 if (err
) debugf("ERROR: SendServiceRegistration - mDNSSendDNSMessage - %ld", err
);
4253 if (rInfo
->state
!= regState_Refresh
&& rInfo
->state
!= regState_DeregDeferred
&& srs
->uDNS_info
.state
!= regState_UpdatePending
)
4254 rInfo
->state
= regState_Pending
;
4256 SetRecordRetry(m
, &srs
->RR_SRV
, err
);
4258 if (mapped
) srv
->resrec
.rdata
->u
.srv
.port
= privport
;
4262 LogMsg("SendServiceRegistration - Error formatting message");
4263 if (mapped
) srv
->resrec
.rdata
->u
.srv
.port
= privport
;
4265 rInfo
->state
= regState_Unregistered
;
4266 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4267 srs
->ServiceCallback(m
, srs
, err
);
4268 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4269 //!!!KRS will mem still be free'd on error?
4270 // NOTE: not safe to touch any client structures here
4273 mDNSlocal
void serviceRegistrationCallback(mStatus err
, mDNS
*const m
, void *srsPtr
, const AsyncOpResult
*result
)
4275 ServiceRecordSet
*srs
= (ServiceRecordSet
*)srsPtr
;
4276 const zoneData_t
*zoneData
= mDNSNULL
;
4278 if (err
) goto error
;
4279 if (!result
) { LogMsg("ERROR: serviceRegistrationCallback invoked with NULL result and no error"); goto error
; }
4280 else zoneData
= &result
->zoneData
;
4282 if (result
->type
!= zoneDataResult
)
4284 LogMsg("ERROR: buildUpdatePacket passed incorrect result type %d", result
->type
);
4288 if (srs
->uDNS_info
.state
== regState_Cancelled
)
4290 // client cancelled registration while fetching zone data
4291 srs
->uDNS_info
.state
= regState_Unregistered
;
4293 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4294 srs
->ServiceCallback(m
, srs
, mStatus_MemFree
);
4295 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4299 if (srs
->RR_SRV
.resrec
.rrclass
!= zoneData
->zoneClass
)
4301 LogMsg("Service %##s - class does not match zone", srs
->RR_SRV
.resrec
.name
->c
);
4306 AssignDomainName(&srs
->uDNS_info
.zone
, &zoneData
->zoneName
);
4307 srs
->uDNS_info
.ns
.type
= mDNSAddrType_IPv4
;
4308 srs
->uDNS_info
.ns
= zoneData
->primaryAddr
;
4309 if (zoneData
->updatePort
.NotAnInteger
) srs
->uDNS_info
.port
= zoneData
->updatePort
;
4312 debugf("Update port not advertised via SRV - guessing port 53, no lease option");
4313 srs
->uDNS_info
.port
= UnicastDNSPort
;
4314 srs
->uDNS_info
.lease
= mDNSfalse
;
4317 if (srs
->RR_SRV
.resrec
.rdata
->u
.srv
.port
.NotAnInteger
&& IsPrivateV4Addr(&m
->uDNS_info
.AdvertisedV4
))
4318 { srs
->uDNS_info
.state
= regState_NATMap
; StartNATPortMap(m
, srs
); }
4319 else SendServiceRegistration(m
, srs
);
4324 srs
->uDNS_info
.state
= regState_Unregistered
;
4325 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4326 srs
->ServiceCallback(m
, srs
, err
);
4327 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4328 // NOTE: not safe to touch any client structures here
4331 mDNSlocal mStatus
SetupRecordRegistration(mDNS
*m
, AuthRecord
*rr
)
4333 domainname
*target
= GetRRDomainNameTarget(&rr
->resrec
);
4334 AuthRecord
*ptr
= m
->uDNS_info
.RecordRegistrations
;
4336 while (ptr
&& ptr
!= rr
) ptr
= ptr
->next
;
4337 if (ptr
) { LogMsg("Error: SetupRecordRegistration - record %##s already in list!", rr
->resrec
.name
->c
); return mStatus_AlreadyRegistered
; }
4339 if (rr
->uDNS_info
.state
== regState_FetchingZoneData
||
4340 rr
->uDNS_info
.state
== regState_Pending
||
4341 rr
->uDNS_info
.state
== regState_Registered
)
4343 LogMsg("Requested double-registration of physical record %##s type %d",
4344 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
4345 return mStatus_AlreadyRegistered
;
4348 rr
->resrec
.rdlength
= GetRDLength(&rr
->resrec
, mDNSfalse
);
4349 rr
->resrec
.rdestimate
= GetRDLength(&rr
->resrec
, mDNStrue
);
4351 if (!ValidateDomainName(rr
->resrec
.name
))
4353 LogMsg("Attempt to register record with invalid name: %s", ARDisplayString(m
, rr
));
4354 return mStatus_Invalid
;
4357 // Don't do this until *after* we've set rr->resrec.rdlength
4358 if (!ValidateRData(rr
->resrec
.rrtype
, rr
->resrec
.rdlength
, rr
->resrec
.rdata
))
4360 LogMsg("Attempt to register record with invalid rdata: %s", ARDisplayString(m
, rr
));
4361 return mStatus_Invalid
;
4364 rr
->resrec
.namehash
= DomainNameHashValue(rr
->resrec
.name
);
4365 rr
->resrec
.rdatahash
= target
? DomainNameHashValue(target
) : RDataHashValue(rr
->resrec
.rdlength
, &rr
->resrec
.rdata
->u
);
4367 rr
->uDNS_info
.state
= regState_FetchingZoneData
;
4368 rr
->next
= m
->uDNS_info
.RecordRegistrations
;
4369 m
->uDNS_info
.RecordRegistrations
= rr
;
4370 rr
->uDNS_info
.lease
= mDNStrue
;
4372 return mStatus_NoError
;
4375 mDNSexport mStatus
uDNS_RegisterRecord(mDNS
*const m
, AuthRecord
*const rr
)
4377 mStatus err
= SetupRecordRegistration(m
, rr
);
4378 if (err
) return err
;
4379 else return startGetZoneData(rr
->resrec
.name
, m
, mDNStrue
, mDNSfalse
, RecordRegistrationCallback
, rr
);
4382 mDNSlocal
void SendRecordDeregistration(mDNS
*m
, AuthRecord
*rr
)
4384 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4386 mDNSu8
*ptr
= msg
.data
;
4387 mDNSu8
*end
= (mDNSu8
*)&msg
+ sizeof(DNSMessage
);
4390 InitializeDNSMessage(&msg
.h
, rr
->uDNS_info
.id
, UpdateReqFlags
);
4392 ptr
= putZone(&msg
, ptr
, end
, &rr
->uDNS_info
.zone
, mDNSOpaque16fromIntVal(rr
->resrec
.rrclass
));
4393 if (!ptr
) goto error
;
4394 if (!(ptr
= putDeletionRecord(&msg
, ptr
, &rr
->resrec
))) goto error
;
4396 err
= mDNSSendDNSMessage(m
, &msg
, ptr
, mDNSInterface_Any
, &rr
->uDNS_info
.ns
, rr
->uDNS_info
.port
, -1, GetAuthInfoForName(u
, rr
->resrec
.name
));
4397 if (err
) debugf("ERROR: SendRecordDeregistration - mDNSSendDNSMessage - %ld", err
);
4399 SetRecordRetry(m
, rr
, err
);
4400 rr
->uDNS_info
.state
= regState_DeregPending
;
4404 LogMsg("Error: SendRecordDeregistration - could not contruct deregistration packet");
4405 unlinkAR(&u
->RecordRegistrations
, rr
);
4406 rr
->uDNS_info
.state
= regState_Unregistered
;
4411 mDNSexport mStatus
uDNS_DeregisterRecord(mDNS
*const m
, AuthRecord
*const rr
)
4413 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4414 NATTraversalInfo
*n
= rr
->uDNS_info
.NATinfo
;
4416 switch (rr
->uDNS_info
.state
)
4418 case regState_NATMap
:
4419 // we're in the middle of a NAT traversal operation
4420 rr
->uDNS_info
.NATinfo
= mDNSNULL
;
4421 if (!n
) LogMsg("uDNS_DeregisterRecord: no NAT info context");
4422 else FreeNATInfo(m
, n
); // cause response to outstanding request to be ignored.
4423 // Note: normally here we're trying to determine our public address,
4424 //in which case there is not state to be torn down. For simplicity,
4425 //we allow other operations to expire.
4426 rr
->uDNS_info
.state
= regState_Unregistered
;
4428 case regState_ExtraQueued
:
4429 rr
->uDNS_info
.state
= regState_Unregistered
;
4431 case regState_FetchingZoneData
:
4432 rr
->uDNS_info
.state
= regState_Cancelled
;
4433 return mStatus_NoError
;
4434 case regState_Refresh
:
4435 case regState_Pending
:
4436 case regState_UpdatePending
:
4437 rr
->uDNS_info
.state
= regState_DeregDeferred
;
4438 LogMsg("Deferring deregistration of record %##s until registration completes", rr
->resrec
.name
->c
);
4439 return mStatus_NoError
;
4440 case regState_Registered
:
4441 case regState_DeregPending
:
4443 case regState_DeregDeferred
:
4444 case regState_Cancelled
:
4445 LogMsg("Double deregistration of record %##s type %d",
4446 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
4447 return mStatus_UnknownErr
;
4448 case regState_Unregistered
:
4449 LogMsg("Requested deregistration of unregistered record %##s type %d",
4450 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
4451 return mStatus_UnknownErr
;
4452 case regState_NATError
:
4453 case regState_NoTarget
:
4454 LogMsg("ERROR: uDNS_DeregisterRecord called for record %##s with bad state %s", rr
->resrec
.name
->c
, rr
->uDNS_info
.state
== regState_NoTarget
? "regState_NoTarget" : "regState_NATError");
4455 return mStatus_UnknownErr
;
4458 if (rr
->uDNS_info
.state
== regState_Unregistered
)
4460 // unlink and deliver memfree
4462 unlinkAR(&u
->RecordRegistrations
, rr
);
4463 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4464 if (rr
->RecordCallback
) rr
->RecordCallback(m
, rr
, mStatus_MemFree
);
4465 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4466 return mStatus_NoError
;
4469 rr
->uDNS_info
.NATinfo
= mDNSNULL
;
4470 if (n
) FreeNATInfo(m
, n
);
4472 SendRecordDeregistration(m
, rr
);
4473 return mStatus_NoError
;
4476 mDNSexport mStatus
uDNS_RegisterService(mDNS
*const m
, ServiceRecordSet
*srs
)
4480 uDNS_RegInfo
*info
= &srs
->uDNS_info
;
4481 ServiceRecordSet
**p
= &m
->uDNS_info
.ServiceRegistrations
;
4482 while (*p
&& *p
!= srs
) p
=&(*p
)->next
;
4483 if (*p
) { LogMsg("uDNS_RegisterService: %p %##s already in list", srs
, srs
->RR_SRV
.resrec
.name
->c
); return(mStatus_AlreadyRegistered
); }
4484 ubzero(info
, sizeof(*info
));
4486 srs
->next
= mDNSNULL
;
4488 srs
->RR_SRV
.resrec
.rroriginalttl
= kWideAreaTTL
;
4489 srs
->RR_TXT
.resrec
.rroriginalttl
= kWideAreaTTL
;
4490 srs
->RR_PTR
.resrec
.rroriginalttl
= kWideAreaTTL
;
4491 for (i
= 0; i
< srs
->NumSubTypes
;i
++) srs
->SubTypes
[i
].resrec
.rroriginalttl
= kWideAreaTTL
;
4493 info
->lease
= mDNStrue
;
4495 srs
->RR_SRV
.resrec
.rdata
->u
.srv
.target
.c
[0] = 0;
4496 if (!GetServiceTarget(&m
->uDNS_info
, &srs
->RR_SRV
, &target
))
4498 // defer registration until we've got a target
4499 debugf("uDNS_RegisterService - no target for %##s", srs
->RR_SRV
.resrec
.name
->c
);
4500 info
->state
= regState_NoTarget
;
4501 return mStatus_NoError
;
4504 info
->state
= regState_FetchingZoneData
;
4505 return startGetZoneData(srs
->RR_SRV
.resrec
.name
, m
, mDNStrue
, mDNSfalse
, serviceRegistrationCallback
, srs
);
4508 mDNSlocal
void SendServiceDeregistration(mDNS
*m
, ServiceRecordSet
*srs
)
4510 uDNS_RegInfo
*info
= &srs
->uDNS_info
;
4511 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4514 mDNSu8
*ptr
= msg
.data
;
4515 mDNSu8
*end
= (mDNSu8
*)&msg
+ sizeof(DNSMessage
);
4516 mStatus err
= mStatus_UnknownErr
;
4519 id
= newMessageID(u
);
4520 InitializeDNSMessage(&msg
.h
, id
, UpdateReqFlags
);
4523 ptr
= putZone(&msg
, ptr
, end
, &info
->zone
, mDNSOpaque16fromIntVal(srs
->RR_SRV
.resrec
.rrclass
));
4524 if (!ptr
) { LogMsg("ERROR: SendServiceDeregistration - putZone"); goto error
; }
4526 if (!(ptr
= putDeleteAllRRSets(&msg
, ptr
, srs
->RR_SRV
.resrec
.name
))) goto error
; // this deletes SRV, TXT, and Extras
4527 if (!(ptr
= putDeletionRecord(&msg
, ptr
, &srs
->RR_PTR
.resrec
))) goto error
;
4528 for (i
= 0; i
< srs
->NumSubTypes
; i
++)
4529 if (!(ptr
= putDeletionRecord(&msg
, ptr
, &srs
->SubTypes
[i
].resrec
))) goto error
;
4532 err
= mDNSSendDNSMessage(m
, &msg
, ptr
, mDNSInterface_Any
, &info
->ns
, info
->port
, -1, GetAuthInfoForName(u
, srs
->RR_SRV
.resrec
.name
));
4533 if (err
&& err
!= mStatus_TransientErr
) { debugf("ERROR: SendServiceDeregistration - mDNSSendDNSMessage - %ld", err
); goto error
; }
4535 SetRecordRetry(m
, &srs
->RR_SRV
, err
);
4537 info
->state
= regState_DeregPending
;
4543 info
->state
= regState_Unregistered
;
4546 mDNSexport mStatus
uDNS_DeregisterService(mDNS
*const m
, ServiceRecordSet
*srs
)
4548 NATTraversalInfo
*nat
= srs
->uDNS_info
.NATinfo
;
4549 char *errmsg
= "Unknown State";
4551 // don't re-register with a new target following deregistration
4552 srs
->uDNS_info
.SRVChanged
= srs
->uDNS_info
.SRVUpdateDeferred
= mDNSfalse
;
4556 if (nat
->state
== NATState_Established
|| nat
->state
== NATState_Refresh
|| nat
->state
== NATState_Legacy
)
4557 DeleteNATPortMapping(m
, nat
, srs
);
4558 nat
->reg
.ServiceRegistration
= mDNSNULL
;
4559 srs
->uDNS_info
.NATinfo
= mDNSNULL
;
4560 FreeNATInfo(m
, nat
);
4563 switch (srs
->uDNS_info
.state
)
4565 case regState_Unregistered
:
4566 debugf("uDNS_DeregisterService - service %##s not registered", srs
->RR_SRV
.resrec
.name
->c
);
4567 return mStatus_BadReferenceErr
;
4568 case regState_FetchingZoneData
:
4569 // let the async op complete, then terminate
4570 srs
->uDNS_info
.state
= regState_Cancelled
;
4571 return mStatus_NoError
; // deliver memfree upon completion of async op
4572 case regState_Pending
:
4573 case regState_Refresh
:
4574 case regState_UpdatePending
:
4575 // deregister following completion of in-flight operation
4576 srs
->uDNS_info
.state
= regState_DeregDeferred
;
4577 return mStatus_NoError
;
4578 case regState_DeregPending
:
4579 case regState_DeregDeferred
:
4580 case regState_Cancelled
:
4581 debugf("Double deregistration of service %##s", srs
->RR_SRV
.resrec
.name
->c
);
4582 return mStatus_NoError
;
4583 case regState_NATError
: // not registered
4584 case regState_NATMap
: // not registered
4585 case regState_NoTarget
: // not registered
4587 srs
->uDNS_info
.state
= regState_Unregistered
;
4588 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4589 srs
->ServiceCallback(m
, srs
, mStatus_MemFree
);
4590 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4591 return mStatus_NoError
;
4592 case regState_Registered
:
4593 srs
->uDNS_info
.state
= regState_DeregPending
;
4594 SendServiceDeregistration(m
, srs
);
4595 return mStatus_NoError
;
4596 case regState_ExtraQueued
: // only for record registrations
4597 errmsg
= "bad state (regState_ExtraQueued)";
4602 LogMsg("Error, uDNS_DeregisterService: %s", errmsg
);
4603 return mStatus_BadReferenceErr
;
4606 mDNSexport mStatus
uDNS_AddRecordToService(mDNS
*const m
, ServiceRecordSet
*sr
, ExtraResourceRecord
*extra
)
4608 mStatus err
= mStatus_UnknownErr
;
4610 extra
->r
.resrec
.RecordType
= kDNSRecordTypeShared
; // don't want it to conflict with the service name
4611 extra
->r
.RecordCallback
= mDNSNULL
; // don't generate callbacks for extra RRs
4613 if (sr
->uDNS_info
.state
== regState_Registered
|| sr
->uDNS_info
.state
== regState_Refresh
)
4614 err
= uDNS_RegisterRecord(m
, &extra
->r
);
4617 err
= SetupRecordRegistration(m
, &extra
->r
);
4618 extra
->r
.uDNS_info
.state
= regState_ExtraQueued
; // %%% Is it okay to overwrite the previous uDNS_info.state?
4623 extra
->next
= sr
->Extras
;
4629 mDNSexport mStatus
uDNS_UpdateRecord(mDNS
*m
, AuthRecord
*rr
)
4631 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4632 ServiceRecordSet
*parent
= mDNSNULL
;
4634 uDNS_RegInfo
*info
= &rr
->uDNS_info
;
4635 regState_t
*stateptr
= mDNSNULL
;
4637 // find the record in registered service list
4638 for (parent
= u
->ServiceRegistrations
; parent
; parent
= parent
->next
)
4639 if (&parent
->RR_TXT
== rr
) { stateptr
= &parent
->uDNS_info
.state
; break; }
4643 // record not part of a service - check individual record registrations
4644 for (rptr
= u
->RecordRegistrations
; rptr
; rptr
= rptr
->next
)
4645 if (rptr
== rr
) { stateptr
= &rr
->uDNS_info
.state
; break; }
4646 if (!rptr
) goto unreg_error
;
4651 case regState_DeregPending
:
4652 case regState_DeregDeferred
:
4653 case regState_Cancelled
:
4654 case regState_Unregistered
:
4655 // not actively registered
4658 case regState_FetchingZoneData
:
4659 case regState_NATMap
:
4660 case regState_ExtraQueued
:
4661 case regState_NoTarget
:
4662 // change rdata directly since it hasn't been sent yet
4663 if (info
->UpdateRDCallback
) info
->UpdateRDCallback(m
, rr
, rr
->resrec
.rdata
);
4664 SetNewRData(&rr
->resrec
, rr
->NewRData
, rr
->newrdlength
);
4665 rr
->NewRData
= mDNSNULL
;
4666 return mStatus_NoError
;
4668 case regState_Pending
:
4669 case regState_Refresh
:
4670 case regState_UpdatePending
:
4671 // registration in-flight. queue rdata and return
4672 if (info
->QueuedRData
&& info
->UpdateRDCallback
)
4673 // if unsent rdata is already queued, free it before we replace it
4674 info
->UpdateRDCallback(m
, rr
, info
->QueuedRData
);
4675 info
->QueuedRData
= rr
->NewRData
;
4676 info
->QueuedRDLen
= rr
->newrdlength
;
4677 rr
->NewRData
= mDNSNULL
;
4678 return mStatus_NoError
;
4680 case regState_Registered
:
4681 info
->OrigRData
= rr
->resrec
.rdata
;
4682 info
->OrigRDLen
= rr
->resrec
.rdlength
;
4683 info
->InFlightRData
= rr
->NewRData
;
4684 info
->InFlightRDLen
= rr
->newrdlength
;
4685 rr
->NewRData
= mDNSNULL
;
4686 *stateptr
= regState_UpdatePending
;
4687 if (parent
) SendServiceRegistration(m
, parent
);
4688 else sendRecordRegistration(m
, rr
);
4689 return mStatus_NoError
;
4691 case regState_NATError
:
4692 LogMsg("ERROR: uDNS_UpdateRecord called for record %##s with bad state regState_NATError", rr
->resrec
.name
->c
);
4693 return mStatus_UnknownErr
; // states for service records only
4697 LogMsg("Requested update of record %##s type %d, part of service not currently registered",
4698 rr
->resrec
.name
->c
, rr
->resrec
.rrtype
);
4699 return mStatus_Invalid
;
4703 // ***************************************************************************
4704 #if COMPILER_LIKES_PRAGMA_MARK
4705 #pragma mark - Periodic Execution Routines
4709 mDNSlocal mDNSs32
CheckNATMappings(mDNS
*m
, mDNSs32 timenow
)
4711 NATTraversalInfo
*ptr
= m
->uDNS_info
.NATTraversals
;
4712 mDNSs32 nextevent
= timenow
+ MIN_UCAST_PERIODIC_EXEC
;
4716 NATTraversalInfo
*cur
= ptr
;
4718 if (cur
->op
!= NATOp_AddrRequest
|| cur
->state
!= NATState_Established
) // no refresh necessary for established Add requests
4720 if (cur
->retry
- timenow
< 0)
4722 if (cur
->state
== NATState_Established
) RefreshNATMapping(cur
, m
);
4723 else if (cur
->state
== NATState_Request
|| cur
->state
== NATState_Refresh
)
4725 if (cur
->ntries
>= NATMAP_MAX_TRIES
) cur
->ReceiveResponse(cur
, m
, mDNSNULL
, 0); // may invalidate "cur"
4726 else SendNATMsg(cur
, m
);
4729 else if (cur
->retry
- nextevent
< 0) nextevent
= cur
->retry
;
4735 mDNSlocal mDNSs32
CheckQueries(mDNS
*m
, mDNSs32 timenow
)
4738 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4741 mDNSs32 nextevent
= timenow
+ MIN_UCAST_PERIODIC_EXEC
;
4743 mStatus err
= mStatus_NoError
;
4745 uDNS_QuestionInfo
*info
;
4747 u
->CurrentQuery
= u
->ActiveQueries
;
4748 while (u
->CurrentQuery
)
4750 q
= u
->CurrentQuery
;
4751 info
= &q
->uDNS_info
;
4754 if (!info
->internal
&& ((!q
->LongLived
&& !info
->Answered
) || (llq
&& llq
->state
< LLQ_Established
)) &&
4755 info
->RestartTime
+ RESTART_GOODBYE_DELAY
- timenow
< 0)
4757 // if we've been spinning on restart setup, and we have known answers, give goodbyes (they may be re-added later)
4758 while (info
->knownAnswers
)
4760 CacheRecord
*cr
= info
->knownAnswers
;
4761 info
->knownAnswers
= info
->knownAnswers
->next
;
4763 m
->mDNS_reentrancy
++; // Increment to allow client to legally make mDNS API calls from the callback
4764 q
->QuestionCallback(m
, q
, &cr
->resrec
, mDNSfalse
);
4765 m
->mDNS_reentrancy
--; // Decrement to block mDNS API calls again
4767 if (q
!= u
->CurrentQuery
) { debugf("CheckQueries - question removed via callback."); break; }
4770 if (q
!= u
->CurrentQuery
) continue;
4772 if (q
->LongLived
&& llq
->state
!= LLQ_Poll
)
4774 if (llq
->state
>= LLQ_InitialRequest
&& llq
->state
<= LLQ_Established
)
4776 if (llq
->retry
- timenow
< 0)
4778 // sanity check to avoid packet flood bugs
4780 LogMsg("ERROR: retry timer not set for LLQ %##s in state %d", q
->qname
.c
, llq
->state
);
4781 else if (llq
->state
== LLQ_Established
|| llq
->state
== LLQ_Refresh
)
4782 sendLLQRefresh(m
, q
, llq
->origLease
);
4783 else if (llq
->state
== LLQ_InitialRequest
)
4784 startLLQHandshake(m
, llq
, mDNSfalse
);
4785 else if (llq
->state
== LLQ_SecondaryRequest
)
4786 sendChallengeResponse(m
, q
, mDNSNULL
);
4787 else if (llq
->state
== LLQ_Retry
)
4788 { llq
->ntries
= 0; startLLQHandshake(m
, llq
, mDNSfalse
); }
4790 else if (llq
->retry
- nextevent
< 0) nextevent
= llq
->retry
;
4795 sendtime
= q
->LastQTime
+ q
->ThisQInterval
;
4796 if (m
->SuppressStdPort53Queries
&&
4797 sendtime
- m
->SuppressStdPort53Queries
< 0) // Don't allow sendtime to be earlier than SuppressStdPort53Queries
4798 sendtime
= m
->SuppressStdPort53Queries
;
4799 if (sendtime
- timenow
< 0)
4801 DNSServer
*server
= GetServerForName(&m
->uDNS_info
, &q
->qname
);
4804 if (server
->teststate
== DNSServer_Untested
)
4806 InitializeDNSMessage(&msg
.h
, newMessageID(&m
->uDNS_info
), uQueryFlags
);
4807 end
= putQuestion(&msg
, msg
.data
, msg
.data
+ AbsoluteMaxDNSMessageData
, DNSRelayTestQuestion
, kDNSType_PTR
, kDNSClass_IN
);
4810 err
= constructQueryMsg(&msg
, &end
, q
);
4811 if (err
) LogMsg("Error: uDNS_Idle - constructQueryMsg. Skipping question %##s", q
->qname
.c
);
4814 if (server
->teststate
!= DNSServer_Failed
)
4815 err
= mDNSSendDNSMessage(m
, &msg
, end
, mDNSInterface_Any
, &server
->addr
, UnicastDNSPort
, -1, mDNSNULL
);
4816 m
->SuppressStdPort53Queries
= NonZeroTime(m
->timenow
+ (mDNSPlatformOneSecond
+99)/100);
4817 q
->LastQTime
= timenow
;
4818 if (err
) debugf("ERROR: uDNS_idle - mDNSSendDNSMessage - %ld", err
); // surpress syslog messages if we have no network
4819 else if (q
->ThisQInterval
< MAX_UCAST_POLL_INTERVAL
) q
->ThisQInterval
= q
->ThisQInterval
* 2; // don't increase interval if send failed
4823 else if (sendtime
- nextevent
< 0) nextevent
= sendtime
;
4825 u
->CurrentQuery
= u
->CurrentQuery
->next
;
4830 mDNSlocal mDNSs32
CheckRecordRegistrations(mDNS
*m
, mDNSs32 timenow
)
4833 uDNS_RegInfo
*rInfo
;
4834 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4835 mDNSs32 nextevent
= timenow
+ MIN_UCAST_PERIODIC_EXEC
;
4837 //!!!KRS list should be pre-sorted by expiration
4838 for (rr
= u
->RecordRegistrations
; rr
; rr
= rr
->next
)
4840 rInfo
= &rr
->uDNS_info
;
4841 if (rInfo
->state
== regState_Pending
|| rInfo
->state
== regState_DeregPending
|| rInfo
->state
== regState_UpdatePending
|| rInfo
->state
== regState_DeregDeferred
|| rInfo
->state
== regState_Refresh
)
4843 if (rr
->LastAPTime
+ rr
->ThisAPInterval
- timenow
< 0)
4846 char *op
= "(unknown operation)";
4847 if (rInfo
->state
== regState_Pending
) op
= "registration";
4848 else if (rInfo
->state
== regState_DeregPending
) op
= "deregistration";
4849 else if (rInfo
->state
== regState_Refresh
) op
= "refresh";
4850 debugf("Retransmit record %s %##s", op
, rr
->resrec
.name
->c
);
4852 //LogMsg("Retransmit record %##s", rr->resrec.name->c);
4853 if (rInfo
->state
== regState_DeregPending
) SendRecordDeregistration(m
, rr
);
4854 else sendRecordRegistration(m
, rr
);
4856 if (rr
->LastAPTime
+ rr
->ThisAPInterval
- nextevent
< 0) nextevent
= rr
->LastAPTime
+ rr
->ThisAPInterval
;
4858 if (rInfo
->lease
&& rInfo
->state
== regState_Registered
)
4860 if (rInfo
->expire
- timenow
< 0)
4862 debugf("refreshing record %##s", rr
->resrec
.name
->c
);
4863 rInfo
->state
= regState_Refresh
;
4864 sendRecordRegistration(m
, rr
);
4866 if (rInfo
->expire
- nextevent
< 0) nextevent
= rInfo
->expire
;
4872 mDNSlocal mDNSs32
CheckServiceRegistrations(mDNS
*m
, mDNSs32 timenow
)
4874 ServiceRecordSet
*s
= m
->uDNS_info
.ServiceRegistrations
;
4875 uDNS_RegInfo
*rInfo
;
4876 mDNSs32 nextevent
= timenow
+ MIN_UCAST_PERIODIC_EXEC
;
4878 // Note: ServiceRegistrations list is in the order they were created; important for in-order event delivery
4881 ServiceRecordSet
*srs
= s
;
4882 // NOTE: Must advance s here -- SendServiceDeregistration may delete the object we're looking at,
4883 // and then if we tried to do srs = srs->next at the end we'd be referencing a dead object
4886 rInfo
= &srs
->uDNS_info
;
4887 if (rInfo
->state
== regState_Pending
|| rInfo
->state
== regState_DeregPending
|| rInfo
->state
== regState_DeregDeferred
|| rInfo
->state
== regState_Refresh
|| rInfo
->state
== regState_UpdatePending
)
4889 if (srs
->RR_SRV
.LastAPTime
+ srs
->RR_SRV
.ThisAPInterval
- timenow
< 0)
4892 char *op
= "unknown";
4893 if (rInfo
->state
== regState_Pending
) op
= "registration";
4894 else if (rInfo
->state
== regState_DeregPending
) op
= "deregistration";
4895 else if (rInfo
->state
== regState_Refresh
) op
= "refresh";
4896 else if (rInfo
->state
== regState_UpdatePending
) op
= "txt record update";
4897 debugf("Retransmit service %s %##s", op
, srs
->RR_SRV
.resrec
.name
->c
);
4899 if (rInfo
->state
== regState_DeregPending
) { SendServiceDeregistration(m
, srs
); continue; }
4900 else SendServiceRegistration (m
, srs
);
4902 if (nextevent
- srs
->RR_SRV
.LastAPTime
+ srs
->RR_SRV
.ThisAPInterval
> 0)
4903 nextevent
= srs
->RR_SRV
.LastAPTime
+ srs
->RR_SRV
.ThisAPInterval
;
4906 if (rInfo
->lease
&& rInfo
->state
== regState_Registered
)
4908 if (rInfo
->expire
- timenow
< 0)
4910 debugf("refreshing service %##s", srs
->RR_SRV
.resrec
.name
->c
);
4911 rInfo
->state
= regState_Refresh
;
4912 SendServiceRegistration(m
, srs
);
4914 if (rInfo
->expire
- nextevent
< 0) nextevent
= rInfo
->expire
;
4920 mDNSexport
void uDNS_Execute(mDNS
*const m
)
4922 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4923 mDNSs32 nexte
, timenow
= mDNSPlatformTimeNow(m
);
4925 u
->nextevent
= timenow
+ MIN_UCAST_PERIODIC_EXEC
;
4927 if (u
->DelaySRVUpdate
&& u
->NextSRVUpdate
- timenow
< 0)
4929 u
->DelaySRVUpdate
= mDNSfalse
;
4930 UpdateSRVRecords(m
);
4933 nexte
= CheckNATMappings(m
, timenow
);
4934 if (nexte
- u
->nextevent
< 0) u
->nextevent
= nexte
;
4936 if (m
->SuppressStdPort53Queries
&& m
->timenow
- m
->SuppressStdPort53Queries
>= 0)
4937 m
->SuppressStdPort53Queries
= 0; // If suppression time has passed, clear it
4939 nexte
= CheckQueries(m
, timenow
);
4940 if (nexte
- u
->nextevent
< 0) u
->nextevent
= nexte
;
4942 nexte
= CheckRecordRegistrations(m
, timenow
);
4943 if (nexte
- u
->nextevent
< 0) u
->nextevent
= nexte
;
4945 nexte
= CheckServiceRegistrations(m
, timenow
);
4946 if (nexte
- u
->nextevent
< 0) u
->nextevent
= nexte
;
4950 // ***************************************************************************
4951 #if COMPILER_LIKES_PRAGMA_MARK
4952 #pragma mark - Startup, Shutdown, and Sleep
4955 // DeregisterActive causes active LLQs to be removed from the server, e.g. before sleep. Pass false
4956 // following a location change, as the server will reject deletions from a source address different
4957 // from the address on which the LLQ was created.
4959 mDNSlocal
void SuspendLLQs(mDNS
*m
, mDNSBool DeregisterActive
)
4963 for (q
= m
->uDNS_info
.ActiveQueries
; q
; q
= q
->next
)
4965 llq
= q
->uDNS_info
.llq
;
4966 if (q
->LongLived
&& llq
)
4968 if (llq
->state
== LLQ_GetZoneInfo
)
4970 debugf("Marking %##s suspend-deferred", q
->qname
.c
);
4971 llq
->state
= LLQ_SuspendDeferred
; // suspend once we're done getting zone info
4973 else if (llq
->state
< LLQ_Suspended
)
4975 if (DeregisterActive
&& (llq
->state
== LLQ_Established
|| llq
->state
== LLQ_Refresh
))
4976 { debugf("Deleting LLQ %##s", q
->qname
.c
); sendLLQRefresh(m
, q
, 0); }
4977 debugf("Marking %##s suspended", q
->qname
.c
);
4978 llq
->state
= LLQ_Suspended
;
4981 else if (llq
->state
== LLQ_Poll
) { debugf("Marking %##s suspended-poll", q
->qname
.c
); llq
->state
= LLQ_SuspendedPoll
; }
4982 if (llq
->NATMap
) llq
->NATMap
= mDNSfalse
; // may not need nat mapping if we restart with new route
4985 CheckForUnreferencedLLQMapping(m
);
4988 mDNSlocal
void RestartQueries(mDNS
*m
)
4990 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
4993 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
4995 u
->CurrentQuery
= u
->ActiveQueries
;
4996 while (u
->CurrentQuery
)
4998 q
= u
->CurrentQuery
;
4999 u
->CurrentQuery
= u
->CurrentQuery
->next
;
5000 llqInfo
= q
->uDNS_info
.llq
;
5001 q
->uDNS_info
.RestartTime
= timenow
;
5002 q
->uDNS_info
.Answered
= mDNSfalse
;
5005 if (!llqInfo
) { LogMsg("Error: RestartQueries - %##s long-lived with NULL info", q
->qname
.c
); continue; }
5006 if (llqInfo
->state
== LLQ_Suspended
|| llqInfo
->state
== LLQ_NatMapWait
)
5008 llqInfo
->ntries
= -1;
5009 llqInfo
->deriveRemovesOnResume
= mDNStrue
;
5010 startLLQHandshake(m
, llqInfo
, mDNStrue
); // we set defer to true since several events that may generate restarts often arrive in rapid succession, and this cuts unnecessary packets
5012 else if (llqInfo
->state
== LLQ_SuspendDeferred
)
5013 llqInfo
->state
= LLQ_GetZoneInfo
; // we never finished getting zone data - proceed as usual
5014 else if (llqInfo
->state
== LLQ_SuspendedPoll
)
5016 // if we were polling, we may have had bad zone data due to firewall, etc. - refetch
5017 llqInfo
->ntries
= 0;
5018 llqInfo
->deriveRemovesOnResume
= mDNStrue
;
5019 llqInfo
->state
= LLQ_GetZoneInfo
;
5020 startGetZoneData(&q
->qname
, m
, mDNSfalse
, mDNStrue
, startLLQHandshakeCallback
, llqInfo
);
5023 else { q
->LastQTime
= timenow
; q
->ThisQInterval
= INIT_UCAST_POLL_INTERVAL
; } // trigger poll in 1 second (to reduce packet rate when restarts come in rapid succession)
5027 mDNSexport
void mDNS_UpdateLLQs(mDNS
*m
)
5029 uDNS_GlobalInfo
*u
= &m
->uDNS_info
;
5034 DeleteNATPortMapping(m
, u
->LLQNatInfo
, mDNSNULL
);
5035 FreeNATInfo(m
, u
->LLQNatInfo
); // routine clears u->LLQNatInfo ptr
5037 SuspendLLQs(m
, mDNStrue
);
5042 // simplest sleep logic - rather than having sleep states that must be dealt with explicitly in all parts of
5043 // the code, we simply send a deregistration, and put the service in Refresh state, with a timeout far enough
5044 // in the future that we'll sleep (or the sleep will be cancelled) before it is retransmitted. Then to wake,
5045 // we just move up the timers.
5049 mDNSlocal
void SleepRecordRegistrations(mDNS
*m
)
5052 AuthRecord
*rr
= m
->uDNS_info
.RecordRegistrations
;
5053 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
5057 if (rr
->uDNS_info
.state
== regState_Registered
||
5058 rr
->uDNS_info
.state
== regState_Refresh
)
5060 mDNSu8
*ptr
= msg
.data
, *end
= (mDNSu8
*)&msg
+ sizeof(DNSMessage
);
5061 InitializeDNSMessage(&msg
.h
, newMessageID(&m
->uDNS_info
), UpdateReqFlags
);
5063 // construct deletion update
5064 ptr
= putZone(&msg
, ptr
, end
, &rr
->uDNS_info
.zone
, mDNSOpaque16fromIntVal(rr
->resrec
.rrclass
));
5065 if (!ptr
) { LogMsg("Error: SleepRecordRegistrations - could not put zone"); return; }
5066 ptr
= putDeletionRecord(&msg
, ptr
, &rr
->resrec
);
5067 if (!ptr
) { LogMsg("Error: SleepRecordRegistrations - could not put deletion record"); return; }
5069 mDNSSendDNSMessage(m
, &msg
, ptr
, mDNSInterface_Any
, &rr
->uDNS_info
.ns
, rr
->uDNS_info
.port
, -1, GetAuthInfoForName(&m
->uDNS_info
, rr
->resrec
.name
));
5070 rr
->uDNS_info
.state
= regState_Refresh
;
5071 rr
->LastAPTime
= timenow
;
5072 rr
->ThisAPInterval
= 300 * mDNSPlatformOneSecond
;
5078 mDNSlocal
void WakeRecordRegistrations(mDNS
*m
)
5080 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
5081 AuthRecord
*rr
= m
->uDNS_info
.RecordRegistrations
;
5085 if (rr
->uDNS_info
.state
== regState_Refresh
)
5087 // trigger slightly delayed refresh (we usually get this message before kernel is ready to send packets)
5088 rr
->LastAPTime
= timenow
;
5089 rr
->ThisAPInterval
= INIT_UCAST_POLL_INTERVAL
;
5095 mDNSlocal
void SleepServiceRegistrations(mDNS
*m
)
5097 ServiceRecordSet
*srs
= m
->uDNS_info
.ServiceRegistrations
;
5100 uDNS_RegInfo
*info
= &srs
->uDNS_info
;
5101 NATTraversalInfo
*nat
= info
->NATinfo
;
5105 if (nat
->state
== NATState_Established
|| nat
->state
== NATState_Refresh
|| nat
->state
== NATState_Legacy
)
5106 DeleteNATPortMapping(m
, nat
, srs
);
5107 nat
->reg
.ServiceRegistration
= mDNSNULL
;
5108 srs
->uDNS_info
.NATinfo
= mDNSNULL
;
5109 FreeNATInfo(m
, nat
);
5112 if (info
->state
== regState_UpdatePending
)
5114 // act as if the update succeeded, since we're about to delete the name anyway
5115 AuthRecord
*txt
= &srs
->RR_TXT
;
5116 uDNS_RegInfo
*txtInfo
= &txt
->uDNS_info
;
5117 info
->state
= regState_Registered
;
5118 // deallocate old RData
5119 if (txtInfo
->UpdateRDCallback
) txtInfo
->UpdateRDCallback(m
, txt
, txtInfo
->OrigRData
);
5120 SetNewRData(&txt
->resrec
, txtInfo
->InFlightRData
, txtInfo
->InFlightRDLen
);
5121 txtInfo
->OrigRData
= mDNSNULL
;
5122 txtInfo
->InFlightRData
= mDNSNULL
;
5125 if (info
->state
== regState_Registered
|| info
->state
== regState_Refresh
)
5127 mDNSOpaque16 origid
= srs
->uDNS_info
.id
;
5128 info
->state
= regState_DeregPending
; // state expected by SendDereg()
5129 SendServiceDeregistration(m
, srs
);
5131 info
->state
= regState_NoTarget
; // when we wake, we'll re-register (and optionally nat-map) once our address record completes
5132 srs
->RR_SRV
.resrec
.rdata
->u
.srv
.target
.c
[0] = 0;
5138 mDNSlocal
void WakeServiceRegistrations(mDNS
*m
)
5140 mDNSs32 timenow
= mDNSPlatformTimeNow(m
);
5141 ServiceRecordSet
*srs
= m
->uDNS_info
.ServiceRegistrations
;
5144 if (srs
->uDNS_info
.state
== regState_Refresh
)
5146 // trigger slightly delayed refresh (we usually get this message before kernel is ready to send packets)
5147 srs
->RR_SRV
.LastAPTime
= timenow
;
5148 srs
->RR_SRV
.ThisAPInterval
= INIT_UCAST_POLL_INTERVAL
;
5154 mDNSexport
void uDNS_Init(mDNS
*const m
)
5156 mDNSPlatformMemZero(&m
->uDNS_info
, sizeof(uDNS_GlobalInfo
));
5157 m
->uDNS_info
.nextevent
= m
->timenow_last
+ 0x78000000;
5160 mDNSexport
void uDNS_Sleep(mDNS
*const m
)
5162 SuspendLLQs(m
, mDNStrue
);
5163 SleepServiceRegistrations(m
);
5164 SleepRecordRegistrations(m
);
5167 mDNSexport
void uDNS_Wake(mDNS
*const m
)
5170 WakeServiceRegistrations(m
);
5171 WakeRecordRegistrations(m
);