9 Commits

Author SHA1 Message Date
George 4e4e6f63ba Add an option to disable .meship resolver 2021-04-02 16:35:22 -04:00
George 61c74e0568 Add .meship protocol support (#7) 2021-04-01 12:49:09 -04:00
George b2082295c2 Set the Recursion Desired flag 2021-03-31 09:47:00 -04:00
George cb422b143c Fix tests 2021-03-17 09:39:28 -04:00
George 655c353c95 Merge branch 'master' into docker 2020-12-08 09:28:10 -05:00
George a3fe08f5cb Add allowremote flag. It allows remote meshname lookups for any IP address, not just localhost 2020-12-08 09:21:39 -05:00
George 8b557c92e1 Docker updates 2020-12-08 08:05:06 -05:00
George c0fddf65bb Add dockerfile 2020-12-08 06:05:51 -05:00
George 3cc3d2d63a Update protocol.md
Specify explicit base32 implementation
2020-09-29 13:04:31 -04:00
6 changed files with 90 additions and 21 deletions
+19
View File
@@ -0,0 +1,19 @@
FROM docker.io/golang:alpine as builder
COPY . /src
WORKDIR /src
RUN apk add git make && make
FROM docker.io/alpine
LABEL maintainer="George <zhoreeq@users.noreply.github.com>"
COPY --from=builder /src/meshnamed /usr/bin/meshnamed
USER nobody
COPY docker-entrypoint.sh /usr/local/bin/
ENTRYPOINT ["docker-entrypoint.sh"]
EXPOSE 53535/udp
CMD ["meshnamed"]
+4 -2
View File
@@ -38,7 +38,7 @@ func loadConfig(s *meshname.MeshnameServer, confPath string) error {
var ( var (
genconf, subdomain, useconffile, listenAddr, networksconf string genconf, subdomain, useconffile, listenAddr, networksconf string
debug bool debug, noMeshIP, allowRemote bool
) )
func init() { func init() {
@@ -47,6 +47,8 @@ func init() {
flag.StringVar(&useconffile, "useconffile", "", "run daemon with a config file") flag.StringVar(&useconffile, "useconffile", "", "run daemon with a config file")
flag.StringVar(&listenAddr, "listenaddr", "[::1]:53535", "address to listen on") flag.StringVar(&listenAddr, "listenaddr", "[::1]:53535", "address to listen on")
flag.StringVar(&networksconf, "networks", "ygg=200::/7,cjd=fc00::/8,meshname=::/0", "TLD=subnet list separated by comma") flag.StringVar(&networksconf, "networks", "ygg=200::/7,cjd=fc00::/8,meshname=::/0", "TLD=subnet list separated by comma")
flag.BoolVar(&noMeshIP, "nomeship", false, "disable .meship resolver")
flag.BoolVar(&allowRemote, "allowremote", false, "allow remote queries from any IP address")
flag.BoolVar(&debug, "debug", false, "enable debug logging") flag.BoolVar(&debug, "debug", false, "enable debug logging")
} }
@@ -76,7 +78,7 @@ func main() {
logger.Fatalln(err) logger.Fatalln(err)
} }
s := meshname.New(logger, listenAddr, networks) s := meshname.New(logger, listenAddr, networks, !noMeshIP, allowRemote)
if useconffile != "" { if useconffile != "" {
if err := loadConfig(s, useconffile); err != nil { if err := loadConfig(s, useconffile); err != nil {
logger.Fatalln(err) logger.Fatalln(err)
+4
View File
@@ -0,0 +1,4 @@
#!/bin/sh
set -e
exec meshnamed "$@"
+48 -5
View File
@@ -16,6 +16,8 @@ type MeshnameServer struct {
dnsClient *dns.Client dnsClient *dns.Client
dnsServer *dns.Server dnsServer *dns.Server
networks map[string]*net.IPNet networks map[string]*net.IPNet
enableMeshIP bool
allowRemote bool
dnsRecordsLock sync.RWMutex dnsRecordsLock sync.RWMutex
dnsRecords map[string][]dns.RR dnsRecords map[string][]dns.RR
@@ -25,7 +27,7 @@ type MeshnameServer struct {
} }
// New is a constructor for MeshnameServer // New is a constructor for MeshnameServer
func New(log *log.Logger, listenAddr string, networks map[string]*net.IPNet) *MeshnameServer { func New(log *log.Logger, listenAddr string, networks map[string]*net.IPNet, enableMeshIP bool, allowRemote bool) *MeshnameServer {
dnsClient := new(dns.Client) dnsClient := new(dns.Client)
dnsClient.Timeout = 5000000000 // increased 5 seconds timeout dnsClient.Timeout = 5000000000 // increased 5 seconds timeout
@@ -35,6 +37,8 @@ func New(log *log.Logger, listenAddr string, networks map[string]*net.IPNet) *Me
dnsRecords: make(map[string][]dns.RR), dnsRecords: make(map[string][]dns.RR),
networks: networks, networks: networks,
dnsClient: dnsClient, dnsClient: dnsClient,
enableMeshIP: enableMeshIP,
allowRemote: allowRemote,
} }
} }
@@ -59,13 +63,18 @@ func (s *MeshnameServer) Start() error {
s.dnsServer = &dns.Server{ s.dnsServer = &dns.Server{
Addr: s.listenAddr, Addr: s.listenAddr,
Net: "udp", Net: "udp",
NotifyStartedFunc: func(){ close(waitStarted) }, NotifyStartedFunc: func() { close(waitStarted) },
} }
for tld, subnet := range s.networks { for tld, subnet := range s.networks {
dns.HandleFunc(tld, s.handleRequest) dns.HandleFunc(tld, s.handleMeshnameRequest)
s.log.Debugln("Handling:", tld, subnet) s.log.Debugln("Handling:", tld, subnet)
} }
go func(){ if s.enableMeshIP {
dns.HandleFunc("meship", s.handleMeshIPRequest)
s.log.Debugln("Handling: meship ::/0")
}
go func() {
if err := s.dnsServer.ListenAndServe(); err != nil { if err := s.dnsServer.ListenAndServe(); err != nil {
s.log.Fatalln("MeshnameServer failed to start:", err) s.log.Fatalln("MeshnameServer failed to start:", err)
} }
@@ -86,10 +95,11 @@ func (s *MeshnameServer) ConfigureDNSRecords(dnsRecords map[string][]dns.RR) {
s.dnsRecordsLock.Unlock() s.dnsRecordsLock.Unlock()
} }
func (s *MeshnameServer) handleRequest(w dns.ResponseWriter, r *dns.Msg) { func (s *MeshnameServer) handleMeshnameRequest(w dns.ResponseWriter, r *dns.Msg) {
var remoteLookups = make(map[string][]dns.Question) var remoteLookups = make(map[string][]dns.Question)
m := new(dns.Msg) m := new(dns.Msg)
m.SetReply(r) m.SetReply(r)
s.log.Debugln(r.String())
s.dnsRecordsLock.RLock() s.dnsRecordsLock.RLock()
for _, q := range r.Question { for _, q := range r.Question {
@@ -127,12 +137,14 @@ func (s *MeshnameServer) handleRequest(w dns.ResponseWriter, r *dns.Msg) {
for remoteServer, questions := range remoteLookups { for remoteServer, questions := range remoteLookups {
rm := new(dns.Msg) rm := new(dns.Msg)
rm.RecursionDesired = true
rm.Question = questions rm.Question = questions
resp, _, err := s.dnsClient.Exchange(rm, "["+remoteServer+"]:53") // no retries resp, _, err := s.dnsClient.Exchange(rm, "["+remoteServer+"]:53") // no retries
if err != nil { if err != nil {
s.log.Debugln(err) s.log.Debugln(err)
continue continue
} }
s.log.Debugln(resp.String())
m.Answer = append(m.Answer, resp.Answer...) m.Answer = append(m.Answer, resp.Answer...)
} }
@@ -141,8 +153,39 @@ func (s *MeshnameServer) handleRequest(w dns.ResponseWriter, r *dns.Msg) {
} }
} }
func (s *MeshnameServer) handleMeshIPRequest(w dns.ResponseWriter, r *dns.Msg) {
m := new(dns.Msg)
m.SetReply(r)
for _, q := range r.Question {
labels := dns.SplitDomainName(q.Name)
// resolve only 2nd level domains and AAAA type
if len(labels) != 2 || q.Qtype != dns.TypeAAAA || q.Qclass != dns.ClassINET {
s.log.Debugln("Error: invalid resource requested")
continue
}
if resolvedAddr, err := IPFromDomain(&labels[0]); err == nil {
answer := new(dns.AAAA)
answer.Hdr = dns.RR_Header{Name: q.Name, Rrtype: dns.TypeAAAA, Class: dns.ClassINET, Ttl: 3600}
answer.AAAA = resolvedAddr
m.Answer = append(m.Answer, answer)
} else {
s.log.Debugln(err)
}
}
if err := w.WriteMsg(m); err != nil {
s.log.Debugln("Error writing response:", err)
}
}
func (s *MeshnameServer) isRemoteLookupAllowed(addr net.Addr) bool { func (s *MeshnameServer) isRemoteLookupAllowed(addr net.Addr) bool {
// TODO prefix whitelists ? // TODO prefix whitelists ?
if s.allowRemote {
return true
}
ra := addr.String() ra := addr.String()
return strings.HasPrefix(ra, "[::1]:") || strings.HasPrefix(ra, "127.0.0.1:") return strings.HasPrefix(ra, "[::1]:") || strings.HasPrefix(ra, "127.0.0.1:")
} }
+2 -1
View File
@@ -17,8 +17,9 @@ func TestServerLocalDomain(t *testing.T) {
log := log.New(os.Stdout, "", log.Flags()) log := log.New(os.Stdout, "", log.Flags())
yggIPNet := &net.IPNet{IP: net.ParseIP("200::"), Mask: net.CIDRMask(7, 128)} yggIPNet := &net.IPNet{IP: net.ParseIP("200::"), Mask: net.CIDRMask(7, 128)}
networks := map[string]*net.IPNet{"meshname": yggIPNet} networks := map[string]*net.IPNet{"meshname": yggIPNet}
allowRemote := false
ts := meshname.New(log, bindAddr, networks) ts := meshname.New(log, bindAddr, networks, allowRemote)
exampleConfig := make(map[string][]string) exampleConfig := make(map[string][]string)
exampleConfig["aiarnf2wpqjxkp6rhivuxbondy"] = append(exampleConfig["aiarnf2wpqjxkp6rhivuxbondy"], exampleConfig["aiarnf2wpqjxkp6rhivuxbondy"] = append(exampleConfig["aiarnf2wpqjxkp6rhivuxbondy"],
+1 -1
View File
@@ -30,7 +30,7 @@ The name space is derived from its IPv6 address as follows:
b'\x02\x00o\xc8\x92 \xf4\x00\\\xc20ZJ\xc6\x96~' b'\x02\x00o\xc8\x92 \xf4\x00\\\xc20ZJ\xc6\x96~'
2) The binary value is encoded to base32: 2) The binary value is encoded to base32 (RFC 4648):
AIAG7SESED2AAXGCGBNEVRUWPY====== AIAG7SESED2AAXGCGBNEVRUWPY======