mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-05 04:29:19 +02:00
cd4631ce99
* DNS: add clientip for specific nameserver * Refactoring: DNS App * DNS: add DNS over QUIC support * Feat: add disableCache option for DNS * Feat: add queryStrategy option for DNS * Feat: add disableFallback & skipFallback option for DNS * Feat: DNS hosts support multiple addresses * Feat: DNS transport over TCP * DNS: fix typo & refine code * DNS: refine code * Add disableFallbackIfMatch dns option * Feat: routing and freedom outbound ignore Fake DNS Turn off fake DNS for request sent from Routing and Freedom outbound. Fake DNS now only apply to DNS outbound. This is important for Android, where VPN service take over all system DNS traffic and pass it to core. "UseIp" option can be used in Freedom outbound to avoid getting fake IP and fail connection. * Fix test * Fix dns return * Fix local dns return empty * Apply timeout to dns outbound * Update app/dns/config.go Co-authored-by: Loyalsoldier <10487845+loyalsoldier@users.noreply.github.com> Co-authored-by: Ye Zhihao <vigilans@foxmail.com> Co-authored-by: maskedeken <52683904+maskedeken@users.noreply.github.com> Co-authored-by: V2Fly Team <51714622+vcptr@users.noreply.github.com> Co-authored-by: CalmLong <37164399+calmlong@users.noreply.github.com> Co-authored-by: Shelikhoo <xiaokangwang@outlook.com> Co-authored-by: 秋のかえで <autmaple@protonmail.com> Co-authored-by: 朱聖黎 <digglife@gmail.com> Co-authored-by: rurirei <72071920+rurirei@users.noreply.github.com> Co-authored-by: yuhan6665 <1588741+yuhan6665@users.noreply.github.com> Co-authored-by: Arthur Morgan <4637240+badO1a5A90@users.noreply.github.com>
221 lines
7.7 KiB
Go
221 lines
7.7 KiB
Go
package dns
|
||
|
||
import (
|
||
"context"
|
||
"net/url"
|
||
"strings"
|
||
"time"
|
||
|
||
"github.com/xtls/xray-core/app/router"
|
||
"github.com/xtls/xray-core/common/errors"
|
||
"github.com/xtls/xray-core/common/net"
|
||
"github.com/xtls/xray-core/common/strmatcher"
|
||
"github.com/xtls/xray-core/core"
|
||
"github.com/xtls/xray-core/features/dns"
|
||
"github.com/xtls/xray-core/features/routing"
|
||
)
|
||
|
||
// Server is the interface for Name Server.
|
||
type Server interface {
|
||
// Name of the Client.
|
||
Name() string
|
||
// QueryIP sends IP queries to its configured server.
|
||
QueryIP(ctx context.Context, domain string, clientIP net.IP, option dns.IPOption, disableCache bool) ([]net.IP, error)
|
||
}
|
||
|
||
// Client is the interface for DNS client.
|
||
type Client struct {
|
||
server Server
|
||
clientIP net.IP
|
||
skipFallback bool
|
||
domains []string
|
||
expectIPs []*router.GeoIPMatcher
|
||
}
|
||
|
||
var errExpectedIPNonMatch = errors.New("expectIPs not match")
|
||
|
||
// NewServer creates a name server object according to the network destination url.
|
||
func NewServer(dest net.Destination, dispatcher routing.Dispatcher) (Server, error) {
|
||
if address := dest.Address; address.Family().IsDomain() {
|
||
u, err := url.Parse(address.Domain())
|
||
if err != nil {
|
||
return nil, err
|
||
}
|
||
switch {
|
||
case strings.EqualFold(u.String(), "localhost"):
|
||
return NewLocalNameServer(), nil
|
||
case strings.EqualFold(u.Scheme, "https"): // DOH Remote mode
|
||
return NewDoHNameServer(u, dispatcher)
|
||
case strings.EqualFold(u.Scheme, "https+local"): // DOH Local mode
|
||
return NewDoHLocalNameServer(u), nil
|
||
case strings.EqualFold(u.Scheme, "quic+local"): // DNS-over-QUIC Local mode
|
||
return NewQUICNameServer(u)
|
||
case strings.EqualFold(u.Scheme, "tcp"): // DNS-over-TCP Remote mode
|
||
return NewTCPNameServer(u, dispatcher)
|
||
case strings.EqualFold(u.Scheme, "tcp+local"): // DNS-over-TCP Local mode
|
||
return NewTCPLocalNameServer(u)
|
||
case strings.EqualFold(u.String(), "fakedns"):
|
||
return NewFakeDNSServer(), nil
|
||
}
|
||
}
|
||
if dest.Network == net.Network_Unknown {
|
||
dest.Network = net.Network_UDP
|
||
}
|
||
if dest.Network == net.Network_UDP { // UDP classic DNS mode
|
||
return NewClassicNameServer(dest, dispatcher), nil
|
||
}
|
||
return nil, newError("No available name server could be created from ", dest).AtWarning()
|
||
}
|
||
|
||
// NewClient creates a DNS client managing a name server with client IP, domain rules and expected IPs.
|
||
func NewClient(ctx context.Context, ns *NameServer, clientIP net.IP, container router.GeoIPMatcherContainer, matcherInfos *[]*DomainMatcherInfo, updateDomainRule func(strmatcher.Matcher, int, []*DomainMatcherInfo) error) (*Client, error) {
|
||
client := &Client{}
|
||
|
||
err := core.RequireFeatures(ctx, func(dispatcher routing.Dispatcher) error {
|
||
// Create a new server for each client for now
|
||
server, err := NewServer(ns.Address.AsDestination(), dispatcher)
|
||
if err != nil {
|
||
return newError("failed to create nameserver").Base(err).AtWarning()
|
||
}
|
||
|
||
// Priotize local domains with specific TLDs or without any dot to local DNS
|
||
if _, isLocalDNS := server.(*LocalNameServer); isLocalDNS {
|
||
ns.PrioritizedDomain = append(ns.PrioritizedDomain, localTLDsAndDotlessDomains...)
|
||
ns.OriginalRules = append(ns.OriginalRules, localTLDsAndDotlessDomainsRule)
|
||
// The following lines is a solution to avoid core panics(rule index out of range) when setting `localhost` DNS client in config.
|
||
// Because the `localhost` DNS client will apend len(localTLDsAndDotlessDomains) rules into matcherInfos to match `geosite:private` default rule.
|
||
// But `matcherInfos` has no enough length to add rules, which leads to core panics (rule index out of range).
|
||
// To avoid this, the length of `matcherInfos` must be equal to the expected, so manually append it with Golang default zero value first for later modification.
|
||
// Related issues:
|
||
// https://github.com/v2fly/v2ray-core/issues/529
|
||
// https://github.com/v2fly/v2ray-core/issues/719
|
||
for i := 0; i < len(localTLDsAndDotlessDomains); i++ {
|
||
*matcherInfos = append(*matcherInfos, &DomainMatcherInfo{
|
||
clientIdx: uint16(0),
|
||
domainRuleIdx: uint16(0),
|
||
})
|
||
}
|
||
}
|
||
|
||
// Establish domain rules
|
||
var rules []string
|
||
ruleCurr := 0
|
||
ruleIter := 0
|
||
for _, domain := range ns.PrioritizedDomain {
|
||
domainRule, err := toStrMatcher(domain.Type, domain.Domain)
|
||
if err != nil {
|
||
return newError("failed to create prioritized domain").Base(err).AtWarning()
|
||
}
|
||
originalRuleIdx := ruleCurr
|
||
if ruleCurr < len(ns.OriginalRules) {
|
||
rule := ns.OriginalRules[ruleCurr]
|
||
if ruleCurr >= len(rules) {
|
||
rules = append(rules, rule.Rule)
|
||
}
|
||
ruleIter++
|
||
if ruleIter >= int(rule.Size) {
|
||
ruleIter = 0
|
||
ruleCurr++
|
||
}
|
||
} else { // No original rule, generate one according to current domain matcher (majorly for compatibility with tests)
|
||
rules = append(rules, domainRule.String())
|
||
ruleCurr++
|
||
}
|
||
err = updateDomainRule(domainRule, originalRuleIdx, *matcherInfos)
|
||
if err != nil {
|
||
return newError("failed to create prioritized domain").Base(err).AtWarning()
|
||
}
|
||
}
|
||
|
||
// Establish expected IPs
|
||
var matchers []*router.GeoIPMatcher
|
||
for _, geoip := range ns.Geoip {
|
||
matcher, err := container.Add(geoip)
|
||
if err != nil {
|
||
return newError("failed to create ip matcher").Base(err).AtWarning()
|
||
}
|
||
matchers = append(matchers, matcher)
|
||
}
|
||
|
||
if len(clientIP) > 0 {
|
||
switch ns.Address.Address.GetAddress().(type) {
|
||
case *net.IPOrDomain_Domain:
|
||
newError("DNS: client ", ns.Address.Address.GetDomain(), " uses clientIP ", clientIP.String()).AtInfo().WriteToLog()
|
||
case *net.IPOrDomain_Ip:
|
||
newError("DNS: client ", ns.Address.Address.GetIp(), " uses clientIP ", clientIP.String()).AtInfo().WriteToLog()
|
||
}
|
||
}
|
||
|
||
client.server = server
|
||
client.clientIP = clientIP
|
||
client.skipFallback = ns.SkipFallback
|
||
client.domains = rules
|
||
client.expectIPs = matchers
|
||
return nil
|
||
})
|
||
return client, err
|
||
}
|
||
|
||
// NewSimpleClient creates a DNS client with a simple destination.
|
||
func NewSimpleClient(ctx context.Context, endpoint *net.Endpoint, clientIP net.IP) (*Client, error) {
|
||
client := &Client{}
|
||
err := core.RequireFeatures(ctx, func(dispatcher routing.Dispatcher) error {
|
||
server, err := NewServer(endpoint.AsDestination(), dispatcher)
|
||
if err != nil {
|
||
return newError("failed to create nameserver").Base(err).AtWarning()
|
||
}
|
||
client.server = server
|
||
client.clientIP = clientIP
|
||
return nil
|
||
})
|
||
|
||
if len(clientIP) > 0 {
|
||
switch endpoint.Address.GetAddress().(type) {
|
||
case *net.IPOrDomain_Domain:
|
||
newError("DNS: client ", endpoint.Address.GetDomain(), " uses clientIP ", clientIP.String()).AtInfo().WriteToLog()
|
||
case *net.IPOrDomain_Ip:
|
||
newError("DNS: client ", endpoint.Address.GetIp(), " uses clientIP ", clientIP.String()).AtInfo().WriteToLog()
|
||
}
|
||
}
|
||
|
||
return client, err
|
||
}
|
||
|
||
// Name returns the server name the client manages.
|
||
func (c *Client) Name() string {
|
||
return c.server.Name()
|
||
}
|
||
|
||
// QueryIP send DNS query to the name server with the client's IP.
|
||
func (c *Client) QueryIP(ctx context.Context, domain string, option dns.IPOption, disableCache bool) ([]net.IP, error) {
|
||
ctx, cancel := context.WithTimeout(ctx, 4*time.Second)
|
||
ips, err := c.server.QueryIP(ctx, domain, c.clientIP, option, disableCache)
|
||
cancel()
|
||
|
||
if err != nil {
|
||
return ips, err
|
||
}
|
||
return c.MatchExpectedIPs(domain, ips)
|
||
}
|
||
|
||
// MatchExpectedIPs matches queried domain IPs with expected IPs and returns matched ones.
|
||
func (c *Client) MatchExpectedIPs(domain string, ips []net.IP) ([]net.IP, error) {
|
||
if len(c.expectIPs) == 0 {
|
||
return ips, nil
|
||
}
|
||
newIps := []net.IP{}
|
||
for _, ip := range ips {
|
||
for _, matcher := range c.expectIPs {
|
||
if matcher.Match(ip) {
|
||
newIps = append(newIps, ip)
|
||
break
|
||
}
|
||
}
|
||
}
|
||
if len(newIps) == 0 {
|
||
return nil, errExpectedIPNonMatch
|
||
}
|
||
newError("domain ", domain, " expectIPs ", newIps, " matched at server ", c.Name()).AtDebug().WriteToLog()
|
||
return newIps, nil
|
||
}
|