DoH first working version

This commit is contained in:
Vladimir
2022-04-13 17:35:23 +03:00
parent 0abe90f2e5
commit ecbbb3a33e
4 changed files with 162 additions and 6 deletions

View File

@@ -111,7 +111,7 @@ The format is: "protocol://ip:port?parameter=value&parameter=value"
ExpertiseLevel: config.ExpertiseLevelExpert,
ReleaseLevel: config.ReleaseLevelStable,
DefaultValue: defaultNameServers,
ValidationRegex: fmt.Sprintf("^(%s|%s|%s)://.*", ServerTypeDoT, ServerTypeDNS, ServerTypeTCP),
ValidationRegex: fmt.Sprintf("^(%s|%s|%s|%s)://.*", ServerTypeDoT, ServerTypeDoH, ServerTypeDNS, ServerTypeTCP),
ValidationFunc: validateNameservers,
Annotations: config.Annotations{
config.DisplayHintAnnotation: config.DisplayHintOrdered,
@@ -126,6 +126,14 @@ The format is: "protocol://ip:port?parameter=value&parameter=value"
"dot://149.112.112.112:853?verify=dns.quad9.net&name=Quad9&blockedif=empty",
},
},
{
Name: "Quad9 DoH",
Action: config.QuickReplace,
Value: []string{
"doh://149.112.112.112:443?verify=dns.quad9.net&name=Quad9&blockedif=empty",
"doh://9.9.9.9:443?verify=dns.quad9.net&name=Quad9&blockedif=empty",
},
},
{
Name: "AdGuard",
Action: config.QuickReplace,
@@ -134,6 +142,14 @@ The format is: "protocol://ip:port?parameter=value&parameter=value"
"dot://94.140.15.15:853?verify=dns.adguard.com&name=AdGuard&blockedif=zeroip",
},
},
{
Name: "AdGuard DoH",
Action: config.QuickReplace,
Value: []string{
"doh://94.140.14.14:443?verify=dns.adguard.com&name=AdGuard&blockedif=zeroip",
"doh://94.140.15.15:443?verify=dns.adguard.com&name=AdGuard&blockedif=zeroip",
},
},
{
Name: "Foundation for Applied Privacy",
Action: config.QuickReplace,
@@ -150,6 +166,14 @@ The format is: "protocol://ip:port?parameter=value&parameter=value"
"dot://1.0.0.2:853?verify=cloudflare-dns.com&name=Cloudflare&blockedif=zeroip",
},
},
{
Name: "Cloudflare (with Malware Filter) DoH",
Action: config.QuickReplace,
Value: []string{
"doh://1.1.1.2:443?verify=cloudflare-dns.com&name=Cloudflare&blockedif=zeroip",
"doh://1.0.0.2:443?verify=cloudflare-dns.com&name=Cloudflare&blockedif=zeroip",
},
},
},
"self:detail:internalSpecialUseDomains": internalSpecialUseDomains,
"self:detail:connectivityDomains": netenv.ConnectivityDomains,

116
resolver/resolver-https.go Normal file
View File

@@ -0,0 +1,116 @@
package resolver
import (
"context"
"crypto/tls"
"encoding/base64"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"github.com/miekg/dns"
)
// TCPResolver is a resolver using just a single tcp connection with pipelining.
type HttpsResolver struct {
BasicResolverConn
}
// tcpQuery holds the query information for a tcpResolverConn.
type HttpsQuery struct {
Query *Query
Response chan *dns.Msg
}
// MakeCacheRecord creates an RRCache record from a reply.
func (tq *HttpsQuery) MakeCacheRecord(reply *dns.Msg, resolverInfo *ResolverInfo) *RRCache {
return &RRCache{
Domain: tq.Query.FQDN,
Question: tq.Query.QType,
RCode: reply.Rcode,
Answer: reply.Answer,
Ns: reply.Ns,
Extra: reply.Extra,
Resolver: resolverInfo.Copy(),
}
}
// NewTCPResolver returns a new TPCResolver.
func NewHttpsResolver(resolver *Resolver) *HttpsResolver {
newResolver := &HttpsResolver{
BasicResolverConn: BasicResolverConn{
resolver: resolver,
},
}
newResolver.BasicResolverConn.init()
return newResolver
}
// Query executes the given query against the resolver.
func (hr *HttpsResolver) Query(ctx context.Context, q *Query) (*RRCache, error) {
// Get resolver connection.
dnsQuery := new(dns.Msg)
dnsQuery.SetQuestion(q.FQDN, uint16(q.QType))
buf, err := dnsQuery.Pack()
if err != nil {
return nil, err
}
tr := &http.Transport{
TLSClientConfig: &tls.Config{
MinVersion: tls.VersionTLS12,
ServerName: hr.resolver.VerifyDomain,
// TODO: use portbase rng
},
}
b64dns := base64.RawStdEncoding.EncodeToString(buf)
url := &url.URL{
Scheme: "https",
Host: hr.resolver.ServerAddress,
Path: fmt.Sprintf("%s/dns-query", hr.resolver.Path), // "dns-query" path is specified in rfc-8484 (https://www.rfc-editor.org/rfc/rfc8484.html)
ForceQuery: true,
RawQuery: fmt.Sprintf("dns=%s", b64dns),
}
request := &http.Request{
Method: "GET",
URL: url,
Proto: "HTTP/1.1",
ProtoMajor: 1,
ProtoMinor: 1,
Header: make(http.Header),
Body: nil,
Host: hr.resolver.ServerAddress,
}
client := &http.Client{Transport: tr}
resp, err := client.Do(request)
if err != nil {
return nil, err
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
reply := new(dns.Msg)
reply.Unpack(body)
newRecord := &RRCache{
Domain: q.FQDN,
Question: q.QType,
RCode: reply.Rcode,
Answer: reply.Answer,
Ns: reply.Ns,
Extra: reply.Extra,
Resolver: hr.resolver.Info.Copy(),
}
// TODO: check if reply.Answer is valid
return newRecord, nil
}

View File

@@ -64,6 +64,7 @@ type Resolver struct {
VerifyDomain string
Search []string
SearchOnly bool
Path string
// logic interface
Conn ResolverConn `json:"-"`

View File

@@ -31,6 +31,7 @@ const (
parameterBlockedIf = "blockedif"
parameterSearch = "search"
parameterSearchOnly = "search-only"
parameterPath = "path"
)
var (
@@ -78,6 +79,8 @@ func resolverConnFactory(resolver *Resolver) ResolverConn {
return NewTCPResolver(resolver)
case ServerTypeDoT:
return NewTCPResolver(resolver).UseTLS()
case ServerTypeDoH:
return NewHttpsResolver(resolver)
case ServerTypeDNS:
return NewPlainResolver(resolver)
default:
@@ -92,7 +95,7 @@ func createResolver(resolverURL, source string) (*Resolver, bool, error) {
}
switch u.Scheme {
case ServerTypeDNS, ServerTypeDoT, ServerTypeTCP:
case ServerTypeDNS, ServerTypeDoT, ServerTypeDoH, ServerTypeTCP:
default:
return nil, false, fmt.Errorf("DNS resolver scheme %q invalid", u.Scheme)
}
@@ -136,7 +139,8 @@ func createResolver(resolverURL, source string) (*Resolver, bool, error) {
parameterVerify,
parameterBlockedIf,
parameterSearch,
parameterSearchOnly:
parameterSearchOnly,
parameterPath:
// Known key, continue.
default:
// Unknown key, abort.
@@ -146,13 +150,23 @@ func createResolver(resolverURL, source string) (*Resolver, bool, error) {
// Check domain verification config.
verifyDomain := query.Get(parameterVerify)
if verifyDomain != "" && u.Scheme != ServerTypeDoT {
return nil, false, fmt.Errorf("domain verification only supported in DOT")
if verifyDomain != "" && !(u.Scheme == ServerTypeDoT || u.Scheme == ServerTypeDoH) {
return nil, false, fmt.Errorf("domain verification only supported in DoT and DoH")
}
if verifyDomain == "" && u.Scheme == ServerTypeDoT {
if verifyDomain == "" && (u.Scheme == ServerTypeDoT || u.Scheme == ServerTypeDoH) {
return nil, false, fmt.Errorf("DOT must have a verify query parameter set")
}
// Check path for https (doh) request
path := query.Get(parameterPath)
if path != "" && u.Scheme != "doh" {
return nil, false, fmt.Errorf("path parameter is only supported in DoH")
}
if path != "" && !strings.HasPrefix(path, "/") {
path = "/" + path
}
// Check block detection type.
blockType := query.Get(parameterBlockedIf)
if blockType == "" {
@@ -177,6 +191,7 @@ func createResolver(resolverURL, source string) (*Resolver, bool, error) {
},
ServerAddress: net.JoinHostPort(ip.String(), strconv.Itoa(int(port))),
VerifyDomain: verifyDomain,
Path: path,
UpstreamBlockDetection: blockType,
}