forked from aarond10/https_dns_proxy
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathoptions.c
More file actions
297 lines (288 loc) · 11.2 KB
/
options.c
File metadata and controls
297 lines (288 loc) · 11.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
#include <fcntl.h>
#include <grp.h>
#include <pwd.h>
#include <stdio.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "logging.h"
#include "options.h"
// Hack for platforms that don't support O_CLOEXEC.
#ifndef O_CLOEXEC
#define O_CLOEXEC 0
#endif
enum {
DEFAULT_HTTP_VERSION = 2,
MAX_TCP_CLIENTS = 200
};
void options_init(struct Options *opt) {
opt->listen_addr = "127.0.0.1";
opt->listen_port = 5053;
opt->tcp_client_limit = 20;
opt->logfile = "-";
opt->logfd = STDOUT_FILENO;
opt->loglevel = LOG_ERROR;
opt->daemonize = 0;
opt->dscp = 0;
opt->user = NULL;
opt->group = NULL;
opt->uid = (uid_t)-1;
opt->gid = (uid_t)-1;
//new as from https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers
opt->bootstrap_dns = "8.8.8.8,1.1.1.1,8.8.4.4,1.0.0.1,145.100.185.15,145.100.185.16,185.49.141.37";
opt->bootstrap_dns_polling_interval = 120;
opt->ipv4 = 0;
opt->resolver_url = "https://dns.google/dns-query";
opt->curl_proxy = NULL;
opt->source_addr = NULL;
opt->use_http_version = DEFAULT_HTTP_VERSION;
opt->max_idle_time = 118;
opt->conn_loss_time = 15;
opt->stats_interval = 0;
opt->ca_info = NULL;
opt->flight_recorder_size = 0;
}
int parse_int(char * str) {
char * endptr = NULL;
unsigned long int value = strtoul(str, &endptr, 10);
if (*endptr != '\0' || value > INT32_MAX) {
return -1;
}
return (int)value;
}
enum OptionsParseResult options_parse_args(struct Options *opt, int argc, char **argv) {
int c = 0;
while ((c = getopt(argc, argv, "a:c:p:T:du:g:b:i:4r:e:t:l:vxqm:L:s:S:C:F:hV")) != -1) {
switch (c) {
case 'a': // listen_addr
opt->listen_addr = optarg;
break;
case 'c': // DSCP codepoint
opt->dscp = parse_int(optarg);
break;
case 'p': // listen_port
opt->listen_port = parse_int(optarg);
break;
case 'T': // tcp_client_limit
opt->tcp_client_limit = parse_int(optarg);
break;
case 'd': // daemonize
opt->daemonize = 1;
break;
case 'u': // user
opt->user = optarg;
break;
case 'g': // group
opt->group = optarg;
break;
case 'b': // bootstrap dns servers
opt->bootstrap_dns = optarg;
break;
case 'i': // bootstrap dns servers polling interval
opt->bootstrap_dns_polling_interval = parse_int(optarg);
break;
case '4': // ipv4 mode - don't use v6 addresses.
opt->ipv4 = 1;
break;
case 'r': // resolver url prefix
opt->resolver_url = optarg;
break;
case 't': // curl http proxy
opt->curl_proxy = optarg;
break;
case 'l': // logfile
opt->logfile = optarg;
break;
case 'v': // verbose
if (opt->loglevel) {
opt->loglevel--;
}
break;
case 'x': // http/1.1 fallthrough
case 'q': // http/3
if (opt->use_http_version == DEFAULT_HTTP_VERSION) {
opt->use_http_version = (c == 'x' ? 1 : 3);
} else {
printf("HTTP version already set to: HTTP/%s\n",
opt->use_http_version == 1 ? "1.1" : "3");
return OPR_OPTION_ERROR;
}
break;
case 'm':
opt->max_idle_time = parse_int(optarg);
break;
case 'L':
opt->conn_loss_time = parse_int(optarg);
break;
case 's': // stats interval
opt->stats_interval = parse_int(optarg);
break;
case 'S': // source address
opt->source_addr = optarg;
break;
case 'C': // CA info
opt->ca_info = optarg;
break;
case 'F': // Flight recorder size
opt->flight_recorder_size = parse_int(optarg);
break;
case 'h':
return OPR_HELP;
case 'V': // version
return OPR_VERSION;
case '?':
default:
return OPR_PARSING_ERROR;
}
}
if (opt->user) {
struct passwd *p = getpwnam(opt->user);
if (!p || !p->pw_uid) {
printf("Username (%s) invalid.\n", opt->user);
return OPR_OPTION_ERROR;
}
opt->uid = p->pw_uid;
}
if (opt->group) {
struct group *g = getgrnam(opt->group);
if (!g || !g->gr_gid) {
printf("Group (%s) invalid.\n", opt->group);
return OPR_OPTION_ERROR;
}
opt->gid = g->gr_gid;
}
if (opt->dscp < 0 || opt->dscp >63) {
printf("DSCP code must be between 0 and 63.\n");
return OPR_OPTION_ERROR;
}
opt->dscp <<= 2;
// Get noisy about bad security practices.
if (getuid() == 0 && (!opt->user || !opt->group)) {
printf("----------------------------\n"
"WARNING: Running as root without dropping privileges "
"is NOT recommended.\n"
"----------------------------\n");
sleep(1);
}
if (opt->logfile != NULL && strcmp(opt->logfile, "-") != 0) {
opt->logfd = open(opt->logfile,
O_CREAT | O_WRONLY | O_APPEND | O_CLOEXEC,
S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
if (opt->logfd <= 0) {
printf("Could not open logfile '%s' for writing.\n", opt->logfile);
}
}
if (opt->resolver_url == NULL ||
strncmp(opt->resolver_url, "https://", 8) != 0) {
printf("Resolver prefix (%s) must be a https:// address.\n",
opt->resolver_url);
return OPR_OPTION_ERROR;
}
if (opt->bootstrap_dns_polling_interval < 5 ||
opt->bootstrap_dns_polling_interval > 3600) {
printf("DNS servers polling interval must be between 5 and 3600.\n");
return OPR_OPTION_ERROR;
}
if (opt->max_idle_time < 0 ||
opt->max_idle_time > 3600) {
printf("Maximum idle time must be between 0 and 3600.\n");
return OPR_OPTION_ERROR;
}
if (opt->conn_loss_time < 5 ||
opt->conn_loss_time > 60) {
printf("Connection loss time must be between 5 and 60.\n");
return OPR_OPTION_ERROR;
}
if (opt->stats_interval < 0 || opt->stats_interval > 3600) {
printf("Statistic interval must be between 0 and 3600.\n");
return OPR_OPTION_ERROR;
}
if (opt->flight_recorder_size != 0 &&
(opt->flight_recorder_size < 100 || opt->flight_recorder_size > 100000)) {
printf("Flight recorder limit must be between 100 and 100000.\n");
return OPR_OPTION_ERROR;
}
if (opt->listen_port < 0 || opt->listen_port > UINT16_MAX) {
printf("Listen port must be between 0 and %u.\n", UINT16_MAX);
return OPR_OPTION_ERROR;
}
if (opt->tcp_client_limit < 0 || opt->tcp_client_limit > MAX_TCP_CLIENTS) {
printf("TCP client limit must be between 0 and %u.\n", MAX_TCP_CLIENTS);
return OPR_OPTION_ERROR;
}
return OPR_SUCCESS;
}
void options_show_usage(int __attribute__((unused)) argc, char **argv) {
struct Options defaults;
options_init(&defaults);
printf("Usage: %s [-a <listen_addr>] [-p <listen_port>] [-T <tcp_client_limit>]\n", argv[0]);
printf(" [-b <dns_servers>] [-i <polling_interval>] [-4]\n");
printf(" [-r <resolver_url>] [-t <proxy_server>] [-S <source_addr>] [-x] [-q] [-C <ca_path>] [-c <dscp_codepoint>]\n");
printf(" [-d] [-u <user>] [-g <group>] \n");
printf(" [-v]+ [-l <logfile>] [-s <statistic_interval>] [-F <log_limit>] [-V] [-h]\n");
printf("\n DNS server\n");
printf(" -a listen_addr Local IPv4/v6 address to bind to. (Default: %s)\n",
defaults.listen_addr);
printf(" -p listen_port Local port to bind to. (Default: %d)\n",
defaults.listen_port);
printf(" -T tcp_client_limit Number of TCP clients to serve. (Default: %d, Disabled: 0, Min: 1, Max: %d)\n",
defaults.tcp_client_limit, MAX_TCP_CLIENTS);
printf("\n DNS client\n");
printf(" -b dns_servers Comma-separated IPv4/v6 addresses and ports (addr:port)\n");
printf(" of DNS servers to resolve resolver host (e.g. dns.google).\n"\
" When specifying a port for IPv6, enclose the address in [].\n"\
" (Default: %s)\n",
defaults.bootstrap_dns);
printf(" -i polling_interval Optional polling interval of DNS servers.\n"\
" (Default: %d, Min: 5, Max: 3600)\n",
defaults.bootstrap_dns_polling_interval);
printf(" -4 Force IPv4 hostnames for DNS resolvers non IPv6 networks.\n");
printf("\n HTTPS client\n");
printf(" -r resolver_url The HTTPS path to the resolver URL. (Default: %s)\n",
defaults.resolver_url);
printf(" -t proxy_server Optional HTTP proxy. e.g. socks5://127.0.0.1:1080\n");
printf(" Remote name resolution will be used if the protocol\n");
printf(" supports it (http, https, socks4a, socks5h), otherwise\n");
printf(" initial DNS resolution will still be done via the\n");
printf(" bootstrap DNS servers.\n");
printf(" -S source_addr Source IPv4/v6 address for outbound HTTPS connections.\n");
printf(" (Default: system default)\n");
printf(" -x Use HTTP/1.1 instead of HTTP/2. Useful with broken\n"
" or limited builds of libcurl.\n");
printf(" -q Use HTTP/3 (QUIC) only.\n");
printf(" -m max_idle_time Maximum idle time in seconds allowed for reusing a HTTPS connection.\n"\
" (Default: %d, Min: 0, Max: 3600)\n",
defaults.max_idle_time);
printf(" -L conn_loss_time Time in seconds to tolerate connection timeouts of reused connections.\n"\
" This option mitigates half-open TCP connection issue (e.g. WAN IP change).\n"\
" (Default: %d, Min: 5, Max: 60)\n",
defaults.conn_loss_time);
printf(" -C ca_path Optional file containing CA certificates.\n");
printf(" -c dscp_codepoint Optional DSCP codepoint to set on upstream HTTPS server\n");
printf(" connections. (Min: 0, Max: 63)\n");
printf("\n Process\n");
printf(" -d Daemonize.\n");
printf(" -u user Optional user to drop to if launched as root.\n");
printf(" -g group Optional group to drop to if launched as root.\n");
printf("\n Logging\n");
printf(" -v Increase logging verbosity. (Default: error)\n");
printf(" Levels: fatal, stats, error, warning, info, debug\n");
printf(" Request issues are logged on warning level.\n");
printf(" -l logfile Path to file to log to. (Default: standard output)\n");
printf(" -s statistic_interval Optional statistic printout interval.\n"\
" (Default: %d, Disabled: 0, Min: 1, Max: 3600)\n",
defaults.stats_interval);
printf(" -F log_limit Flight recorder: storing desired amount of logs from all levels\n"\
" in memory and dumping them on fatal error or on SIGUSR2 signal.\n"
" (Default: %u, Disabled: 0, Min: 100, Max: 100000)\n",
defaults.flight_recorder_size);
printf(" -V Print versions and exit.\n");
printf(" -h Print help and exit.\n");
options_cleanup(&defaults);
}
void options_cleanup(struct Options *opt) {
if (opt->logfd != STDOUT_FILENO && opt->logfd > 0) {
close(opt->logfd);
}
}