533 lines
11 KiB
C
533 lines
11 KiB
C
/** @file
|
|
* @brief mDNS responder
|
|
*
|
|
* This listens to mDNS queries and responds to them.
|
|
*/
|
|
|
|
/*
|
|
* Copyright (c) 2017 Intel Corporation
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
#define LOG_MODULE_NAME net_mdns_responder
|
|
#define NET_LOG_LEVEL CONFIG_MDNS_RESPONDER_LOG_LEVEL
|
|
|
|
#include <zephyr.h>
|
|
#include <init.h>
|
|
#include <string.h>
|
|
#include <strings.h>
|
|
#include <errno.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <net/net_ip.h>
|
|
#include <net/net_pkt.h>
|
|
#include <net/dns_resolve.h>
|
|
|
|
#include "dns_pack.h"
|
|
#include "ipv6.h"
|
|
|
|
#include "net_private.h"
|
|
|
|
#define MDNS_LISTEN_PORT 5353
|
|
|
|
#define MDNS_TTL CONFIG_MDNS_RESPONDER_TTL /* In seconds */
|
|
|
|
static struct net_context *ipv4;
|
|
static struct net_context *ipv6;
|
|
|
|
#define BUF_ALLOC_TIMEOUT K_MSEC(100)
|
|
|
|
/* This value is recommended by RFC 1035 */
|
|
#define DNS_RESOLVER_MAX_BUF_SIZE 512
|
|
#define DNS_RESOLVER_MIN_BUF 1
|
|
#define DNS_RESOLVER_BUF_CTR (DNS_RESOLVER_MIN_BUF + \
|
|
CONFIG_MDNS_RESOLVER_ADDITIONAL_BUF_CTR)
|
|
|
|
NET_BUF_POOL_DEFINE(mdns_msg_pool, DNS_RESOLVER_BUF_CTR,
|
|
DNS_RESOLVER_MAX_BUF_SIZE, 0, NULL);
|
|
|
|
#if defined(CONFIG_NET_IPV6)
|
|
static void create_ipv6_addr(struct sockaddr_in6 *addr)
|
|
{
|
|
addr->sin6_family = AF_INET6;
|
|
addr->sin6_port = htons(MDNS_LISTEN_PORT);
|
|
|
|
/* Well known IPv6 ff02::fb address */
|
|
net_ipv6_addr_create(&addr->sin6_addr,
|
|
0xff02, 0, 0, 0, 0, 0, 0, 0x00fb);
|
|
}
|
|
#endif
|
|
|
|
#if defined(CONFIG_NET_IPV4)
|
|
static void create_ipv4_addr(struct sockaddr_in *addr)
|
|
{
|
|
addr->sin_family = AF_INET;
|
|
addr->sin_port = htons(MDNS_LISTEN_PORT);
|
|
|
|
/* Well known IPv4 224.0.0.251 address */
|
|
addr->sin_addr.s_addr = htonl(0xE00000FB);
|
|
}
|
|
#endif
|
|
|
|
static struct net_context *get_ctx(sa_family_t family)
|
|
{
|
|
struct net_context *ctx;
|
|
int ret;
|
|
|
|
ret = net_context_get(family, SOCK_DGRAM, IPPROTO_UDP, &ctx);
|
|
if (ret < 0) {
|
|
NET_DBG("Cannot get context (%d)", ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ctx;
|
|
}
|
|
|
|
static int bind_ctx(struct net_context *ctx,
|
|
struct sockaddr *local_addr,
|
|
socklen_t addrlen)
|
|
{
|
|
int ret;
|
|
|
|
if (!ctx) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
ret = net_context_bind(ctx, local_addr, addrlen);
|
|
if (ret < 0) {
|
|
NET_DBG("Cannot bind to mDNS %s port (%d)",
|
|
local_addr->sa_family == AF_INET ?
|
|
"IPv4" : "IPv6", ret);
|
|
return ret;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#define append(pkt, type, value) \
|
|
do { \
|
|
if (!net_pkt_append_##type##_timeout(pkt, value, \
|
|
BUF_ALLOC_TIMEOUT)) { \
|
|
ret = -ENOMEM; \
|
|
goto drop; \
|
|
} \
|
|
} while (0)
|
|
|
|
#define append_all(pkt, size, value) \
|
|
do { \
|
|
if (!net_pkt_append_all(pkt, size, value, \
|
|
BUF_ALLOC_TIMEOUT)) { \
|
|
ret = -ENOMEM; \
|
|
goto drop; \
|
|
} \
|
|
} while (0)
|
|
|
|
static int setup_dns_hdr(struct net_pkt *pkt, u16_t answers)
|
|
{
|
|
u16_t flags;
|
|
int ret;
|
|
|
|
/* See RFC 1035, ch 4.1.1 for header details */
|
|
|
|
flags = BIT(15); /* This is response */
|
|
flags |= BIT(10); /* Authoritative Answer */
|
|
|
|
append(pkt, be16, 0); /* Identifier, RFC 6762 ch 18.1 */
|
|
append(pkt, be16, flags); /* Flags and codes */
|
|
append(pkt, be16, 0); /* Question count */
|
|
append(pkt, be16, answers); /* Answer RR count */
|
|
append(pkt, be16, 0); /* Authority RR count */
|
|
append(pkt, be16, 0); /* Additional RR count */
|
|
|
|
ret = 0;
|
|
drop:
|
|
return ret;
|
|
}
|
|
|
|
static int add_answer(struct net_pkt *pkt, enum dns_rr_type qtype,
|
|
struct net_buf *query, u32_t ttl,
|
|
u16_t addr_len, u8_t *addr)
|
|
{
|
|
char *dot = query->data;
|
|
char *prev = NULL;
|
|
int ret;
|
|
|
|
while ((dot = strchr(dot, '.'))) {
|
|
if (!prev) {
|
|
prev = dot++;
|
|
continue;
|
|
}
|
|
|
|
*prev = dot - prev - 1;
|
|
prev = dot++;
|
|
}
|
|
|
|
if (prev) {
|
|
*prev = strlen(prev) - 1;
|
|
}
|
|
|
|
append_all(pkt, query->len + 1, query->data);
|
|
append(pkt, be16, qtype);
|
|
|
|
/* Bit 15 tells to flush the cache */
|
|
append(pkt, be16, DNS_CLASS_IN | BIT(15));
|
|
|
|
append(pkt, be32, ttl);
|
|
append(pkt, be16, addr_len);
|
|
append_all(pkt, addr_len, addr);
|
|
|
|
ret = 0;
|
|
|
|
drop:
|
|
return ret;
|
|
}
|
|
|
|
static struct net_pkt *create_answer(struct net_context *ctx,
|
|
sa_family_t family,
|
|
enum dns_rr_type qtype,
|
|
struct net_buf *query,
|
|
u16_t addr_len, u8_t *addr)
|
|
{
|
|
struct net_pkt *pkt;
|
|
int ret;
|
|
|
|
pkt = net_pkt_get_tx(ctx, BUF_ALLOC_TIMEOUT);
|
|
if (!pkt) {
|
|
return NULL;
|
|
}
|
|
|
|
net_pkt_set_family(pkt, family);
|
|
|
|
if (setup_dns_hdr(pkt, 1) < 0) {
|
|
goto drop;
|
|
}
|
|
|
|
ret = add_answer(pkt, qtype, query, MDNS_TTL, addr_len, addr);
|
|
if (ret < 0) {
|
|
goto drop;
|
|
}
|
|
|
|
return pkt;
|
|
|
|
drop:
|
|
net_pkt_unref(pkt);
|
|
return NULL;
|
|
}
|
|
|
|
static int send_response(struct net_context *ctx, struct net_pkt *pkt,
|
|
struct net_buf *query,
|
|
enum dns_rr_type qtype)
|
|
{
|
|
struct net_pkt *reply;
|
|
struct sockaddr dst;
|
|
socklen_t dst_len;
|
|
int ret;
|
|
|
|
if (qtype == DNS_RR_TYPE_A) {
|
|
#if defined(CONFIG_NET_IPV4)
|
|
const struct in_addr *addr;
|
|
|
|
addr = net_if_ipv4_select_src_addr(net_pkt_iface(pkt),
|
|
&NET_IPV4_HDR(pkt)->src);
|
|
|
|
create_ipv4_addr(net_sin(&dst));
|
|
dst_len = sizeof(struct sockaddr_in);
|
|
|
|
reply = create_answer(ctx, AF_INET, qtype, query,
|
|
sizeof(struct in_addr), (u8_t *)addr);
|
|
if (!reply) {
|
|
return -ENOMEM;
|
|
}
|
|
|
|
net_pkt_set_ipv4_ttl(reply, 255);
|
|
#else /* CONFIG_NET_IPV4 */
|
|
return -EPFNOSUPPORT;
|
|
#endif /* CONFIG_NET_IPV4 */
|
|
|
|
} else if (qtype == DNS_RR_TYPE_AAAA) {
|
|
#if defined(CONFIG_NET_IPV6)
|
|
const struct in6_addr *addr;
|
|
|
|
addr = net_if_ipv6_select_src_addr(net_pkt_iface(pkt),
|
|
&NET_IPV6_HDR(pkt)->src);
|
|
|
|
create_ipv6_addr(net_sin6(&dst));
|
|
dst_len = sizeof(struct sockaddr_in6);
|
|
|
|
reply = create_answer(ctx, AF_INET6, qtype, query,
|
|
sizeof(struct in6_addr), (u8_t *)addr);
|
|
if (!reply) {
|
|
return -ENOMEM;
|
|
}
|
|
|
|
net_pkt_set_ipv6_hop_limit(reply, 255);
|
|
#else /* CONFIG_NET_IPV6 */
|
|
return -EPFNOSUPPORT;
|
|
#endif /* CONFIG_NET_IPV6 */
|
|
|
|
} else {
|
|
/* TODO: support also service PTRs */
|
|
return -EINVAL;
|
|
}
|
|
|
|
ret = net_context_sendto(reply, &dst, dst_len, NULL, K_NO_WAIT,
|
|
NULL, NULL);
|
|
if (ret < 0) {
|
|
NET_DBG("Cannot send mDNS reply (%d)", ret);
|
|
net_pkt_unref(reply);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int dns_read(struct net_context *ctx,
|
|
struct net_pkt *pkt,
|
|
struct net_buf *dns_data,
|
|
struct dns_addrinfo *info)
|
|
{
|
|
/* Helper struct to track the dns msg received from the server */
|
|
const char *hostname = net_hostname_get();
|
|
int hostname_len = strlen(hostname);
|
|
struct net_buf *result;
|
|
struct dns_msg_t dns_msg;
|
|
int data_len;
|
|
int queries;
|
|
int offset;
|
|
int ret;
|
|
|
|
data_len = min(net_pkt_appdatalen(pkt), DNS_RESOLVER_MAX_BUF_SIZE);
|
|
offset = net_pkt_get_len(pkt) - data_len;
|
|
|
|
/* Store the DNS query name into a temporary net_buf. This means
|
|
* that largest name we can resolve is CONFIG_NET_BUF_DATA_SIZE
|
|
* which typically is 128 bytes. This is done using net_buf so that
|
|
* we do not increase the stack usage of RX thread.
|
|
*/
|
|
result = net_pkt_get_data(ctx, BUF_ALLOC_TIMEOUT);
|
|
if (!result) {
|
|
ret = -ENOMEM;
|
|
goto quit;
|
|
}
|
|
|
|
/* TODO: Instead of this temporary copy, just use the net_pkt directly.
|
|
*/
|
|
ret = net_frag_linear_copy(dns_data, pkt->frags, offset, data_len);
|
|
if (ret < 0) {
|
|
goto quit;
|
|
}
|
|
|
|
dns_msg.msg = dns_data->data;
|
|
dns_msg.msg_size = data_len;
|
|
|
|
ret = mdns_unpack_query_header(&dns_msg, NULL);
|
|
if (ret < 0) {
|
|
ret = -EINVAL;
|
|
goto quit;
|
|
}
|
|
|
|
queries = ret;
|
|
|
|
NET_DBG("Received %d %s from %s", queries,
|
|
queries > 1 ? "queries" : "query",
|
|
net_pkt_family(pkt) == AF_INET ?
|
|
log_strdup(net_sprint_ipv4_addr(&NET_IPV4_HDR(pkt)->src)) :
|
|
log_strdup(net_sprint_ipv6_addr(&NET_IPV6_HDR(pkt)->src)));
|
|
|
|
do {
|
|
enum dns_rr_type qtype;
|
|
enum dns_class qclass;
|
|
u8_t *lquery;
|
|
|
|
(void)memset(result->data, 0, net_buf_tailroom(result));
|
|
result->len = 0;
|
|
|
|
ret = dns_unpack_query(&dns_msg, result, &qtype, &qclass);
|
|
if (ret < 0) {
|
|
goto quit;
|
|
}
|
|
|
|
/* Handle only .local queries */
|
|
lquery = strrchr(result->data + 1, '.');
|
|
if (!lquery || memcmp(lquery, (const void *){ ".local" }, 7)) {
|
|
continue;
|
|
}
|
|
|
|
NET_DBG("[%d] query %s/%s label %s (%d bytes)", queries,
|
|
qtype == DNS_RR_TYPE_A ? "A" : "AAAA", "IN",
|
|
log_strdup(result->data), ret);
|
|
|
|
/* If the query matches to our hostname, then send reply.
|
|
* We skip the first dot, and make sure there is dot after
|
|
* matching hostname.
|
|
*/
|
|
if (!strncasecmp(hostname, result->data + 1, hostname_len) &&
|
|
(result->len - 1) >= hostname_len &&
|
|
&(result->data + 1)[hostname_len] == lquery) {
|
|
NET_DBG("mDNS query to our hostname %s.local",
|
|
hostname);
|
|
send_response(ctx, pkt, result, qtype);
|
|
}
|
|
} while (--queries);
|
|
|
|
ret = 0;
|
|
|
|
quit:
|
|
if (result) {
|
|
net_pkt_frag_unref(result);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void recv_cb(struct net_context *net_ctx,
|
|
struct net_pkt *pkt,
|
|
int status,
|
|
void *user_data)
|
|
{
|
|
struct net_context *ctx = user_data;
|
|
struct net_buf *dns_data = NULL;
|
|
struct dns_addrinfo info = { 0 };
|
|
int ret;
|
|
|
|
ARG_UNUSED(net_ctx);
|
|
NET_ASSERT(ctx == net_ctx);
|
|
|
|
if (!pkt) {
|
|
return;
|
|
}
|
|
|
|
if (status) {
|
|
goto quit;
|
|
}
|
|
|
|
dns_data = net_buf_alloc(&mdns_msg_pool, BUF_ALLOC_TIMEOUT);
|
|
if (!dns_data) {
|
|
goto quit;
|
|
}
|
|
|
|
ret = dns_read(ctx, pkt, dns_data, &info);
|
|
if (ret < 0 && ret != -EINVAL) {
|
|
NET_DBG("mDNS read failed (%d)", ret);
|
|
}
|
|
|
|
net_buf_unref(dns_data);
|
|
|
|
quit:
|
|
net_pkt_unref(pkt);
|
|
}
|
|
|
|
#if defined(CONFIG_NET_IPV6)
|
|
static void iface_ipv6_cb(struct net_if *iface, void *user_data)
|
|
{
|
|
struct in6_addr *addr = user_data;
|
|
int ret;
|
|
|
|
ret = net_ipv6_mld_join(iface, addr);
|
|
if (ret < 0) {
|
|
NET_DBG("Cannot join %s IPv6 multicast group (%d)",
|
|
log_strdup(net_sprint_ipv6_addr(addr)), ret);
|
|
}
|
|
}
|
|
|
|
static void setup_ipv6_addr(struct sockaddr_in6 *local_addr)
|
|
{
|
|
create_ipv6_addr(local_addr);
|
|
|
|
net_if_foreach(iface_ipv6_cb, &local_addr->sin6_addr);
|
|
}
|
|
#endif /* CONFIG_NET_IPV6 */
|
|
|
|
#if defined(CONFIG_NET_IPV4)
|
|
static void iface_ipv4_cb(struct net_if *iface, void *user_data)
|
|
{
|
|
struct in_addr *addr = user_data;
|
|
struct net_if_mcast_addr *ifaddr;
|
|
|
|
ifaddr = net_if_ipv4_maddr_add(iface, addr);
|
|
if (!ifaddr) {
|
|
NET_DBG("Cannot add IPv4 multicast address to iface %p",
|
|
iface);
|
|
}
|
|
}
|
|
|
|
static void setup_ipv4_addr(struct sockaddr_in *local_addr)
|
|
{
|
|
create_ipv4_addr(local_addr);
|
|
|
|
net_if_foreach(iface_ipv4_cb, &local_addr->sin_addr);
|
|
}
|
|
#endif /* CONFIG_NET_IPV4 */
|
|
|
|
static int init_listener(void)
|
|
{
|
|
int ret, ok = 0;
|
|
|
|
#if defined(CONFIG_NET_IPV6)
|
|
do {
|
|
static struct sockaddr_in6 local_addr;
|
|
|
|
setup_ipv6_addr(&local_addr);
|
|
|
|
ipv6 = get_ctx(AF_INET6);
|
|
|
|
ret = bind_ctx(ipv6, (struct sockaddr *)&local_addr,
|
|
sizeof(local_addr));
|
|
if (ret < 0) {
|
|
net_context_put(ipv6);
|
|
goto ipv6_out;
|
|
}
|
|
|
|
ret = net_context_recv(ipv6, recv_cb, K_NO_WAIT, ipv6);
|
|
if (ret < 0) {
|
|
NET_WARN("Cannot receive IPv6 mDNS data (%d)", ret);
|
|
net_context_put(ipv6);
|
|
} else {
|
|
ok++;
|
|
}
|
|
} while (0);
|
|
ipv6_out:
|
|
#endif /* CONFIG_NET_IPV6 */
|
|
|
|
#if defined(CONFIG_NET_IPV4)
|
|
do {
|
|
static struct sockaddr_in local_addr;
|
|
|
|
setup_ipv4_addr(&local_addr);
|
|
|
|
ipv4 = get_ctx(AF_INET);
|
|
|
|
ret = bind_ctx(ipv4, (struct sockaddr *)&local_addr,
|
|
sizeof(local_addr));
|
|
if (ret < 0) {
|
|
net_context_put(ipv4);
|
|
goto ipv4_out;
|
|
}
|
|
|
|
ret = net_context_recv(ipv4, recv_cb, K_NO_WAIT, ipv4);
|
|
if (ret < 0) {
|
|
NET_WARN("Cannot receive IPv4 mDNS data (%d)", ret);
|
|
net_context_put(ipv4);
|
|
} else {
|
|
ok++;
|
|
}
|
|
} while (0);
|
|
ipv4_out:
|
|
#endif /* CONFIG_NET_IPV4 */
|
|
|
|
if (!ok) {
|
|
NET_WARN("Cannot start mDNS responder");
|
|
}
|
|
|
|
return !ok;
|
|
}
|
|
|
|
static int mdns_responder_init(struct device *device)
|
|
{
|
|
ARG_UNUSED(device);
|
|
|
|
return init_listener();
|
|
}
|
|
|
|
SYS_INIT(mdns_responder_init, APPLICATION, CONFIG_MDNS_RESPONDER_INIT_PRIO);
|