edns.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630
  1. package dns
  2. import (
  3. "encoding/binary"
  4. "encoding/hex"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "strconv"
  9. )
  10. // EDNS0 Option codes.
  11. const (
  12. EDNS0LLQ = 0x1 // long lived queries: http://tools.ietf.org/html/draft-sekar-dns-llq-01
  13. EDNS0UL = 0x2 // update lease draft: http://files.dns-sd.org/draft-sekar-dns-ul.txt
  14. EDNS0NSID = 0x3 // nsid (See RFC 5001)
  15. EDNS0DAU = 0x5 // DNSSEC Algorithm Understood
  16. EDNS0DHU = 0x6 // DS Hash Understood
  17. EDNS0N3U = 0x7 // NSEC3 Hash Understood
  18. EDNS0SUBNET = 0x8 // client-subnet (See RFC 7871)
  19. EDNS0EXPIRE = 0x9 // EDNS0 expire
  20. EDNS0COOKIE = 0xa // EDNS0 Cookie
  21. EDNS0TCPKEEPALIVE = 0xb // EDNS0 tcp keep alive (See RFC 7828)
  22. EDNS0PADDING = 0xc // EDNS0 padding (See RFC 7830)
  23. EDNS0LOCALSTART = 0xFDE9 // Beginning of range reserved for local/experimental use (See RFC 6891)
  24. EDNS0LOCALEND = 0xFFFE // End of range reserved for local/experimental use (See RFC 6891)
  25. _DO = 1 << 15 // DNSSEC OK
  26. )
  27. // OPT is the EDNS0 RR appended to messages to convey extra (meta) information.
  28. // See RFC 6891.
  29. type OPT struct {
  30. Hdr RR_Header
  31. Option []EDNS0 `dns:"opt"`
  32. }
  33. func (rr *OPT) String() string {
  34. s := "\n;; OPT PSEUDOSECTION:\n; EDNS: version " + strconv.Itoa(int(rr.Version())) + "; "
  35. if rr.Do() {
  36. s += "flags: do; "
  37. } else {
  38. s += "flags: ; "
  39. }
  40. s += "udp: " + strconv.Itoa(int(rr.UDPSize()))
  41. for _, o := range rr.Option {
  42. switch o.(type) {
  43. case *EDNS0_NSID:
  44. s += "\n; NSID: " + o.String()
  45. h, e := o.pack()
  46. var r string
  47. if e == nil {
  48. for _, c := range h {
  49. r += "(" + string(c) + ")"
  50. }
  51. s += " " + r
  52. }
  53. case *EDNS0_SUBNET:
  54. s += "\n; SUBNET: " + o.String()
  55. case *EDNS0_COOKIE:
  56. s += "\n; COOKIE: " + o.String()
  57. case *EDNS0_UL:
  58. s += "\n; UPDATE LEASE: " + o.String()
  59. case *EDNS0_LLQ:
  60. s += "\n; LONG LIVED QUERIES: " + o.String()
  61. case *EDNS0_DAU:
  62. s += "\n; DNSSEC ALGORITHM UNDERSTOOD: " + o.String()
  63. case *EDNS0_DHU:
  64. s += "\n; DS HASH UNDERSTOOD: " + o.String()
  65. case *EDNS0_N3U:
  66. s += "\n; NSEC3 HASH UNDERSTOOD: " + o.String()
  67. case *EDNS0_LOCAL:
  68. s += "\n; LOCAL OPT: " + o.String()
  69. case *EDNS0_PADDING:
  70. s += "\n; PADDING: " + o.String()
  71. }
  72. }
  73. return s
  74. }
  75. func (rr *OPT) len() int {
  76. l := rr.Hdr.len()
  77. for i := 0; i < len(rr.Option); i++ {
  78. l += 4 // Account for 2-byte option code and 2-byte option length.
  79. lo, _ := rr.Option[i].pack()
  80. l += len(lo)
  81. }
  82. return l
  83. }
  84. // return the old value -> delete SetVersion?
  85. // Version returns the EDNS version used. Only zero is defined.
  86. func (rr *OPT) Version() uint8 {
  87. return uint8((rr.Hdr.Ttl & 0x00FF0000) >> 16)
  88. }
  89. // SetVersion sets the version of EDNS. This is usually zero.
  90. func (rr *OPT) SetVersion(v uint8) {
  91. rr.Hdr.Ttl = rr.Hdr.Ttl&0xFF00FFFF | (uint32(v) << 16)
  92. }
  93. // ExtendedRcode returns the EDNS extended RCODE field (the upper 8 bits of the TTL).
  94. func (rr *OPT) ExtendedRcode() int {
  95. return int((rr.Hdr.Ttl&0xFF000000)>>24) + 15
  96. }
  97. // SetExtendedRcode sets the EDNS extended RCODE field.
  98. func (rr *OPT) SetExtendedRcode(v uint8) {
  99. if v < RcodeBadVers { // Smaller than 16.. Use the 4 bits you have!
  100. return
  101. }
  102. rr.Hdr.Ttl = rr.Hdr.Ttl&0x00FFFFFF | (uint32(v-15) << 24)
  103. }
  104. // UDPSize returns the UDP buffer size.
  105. func (rr *OPT) UDPSize() uint16 {
  106. return rr.Hdr.Class
  107. }
  108. // SetUDPSize sets the UDP buffer size.
  109. func (rr *OPT) SetUDPSize(size uint16) {
  110. rr.Hdr.Class = size
  111. }
  112. // Do returns the value of the DO (DNSSEC OK) bit.
  113. func (rr *OPT) Do() bool {
  114. return rr.Hdr.Ttl&_DO == _DO
  115. }
  116. // SetDo sets the DO (DNSSEC OK) bit.
  117. // If we pass an argument, set the DO bit to that value.
  118. // It is possible to pass 2 or more arguments. Any arguments after the 1st is silently ignored.
  119. func (rr *OPT) SetDo(do ...bool) {
  120. if len(do) == 1 {
  121. if do[0] {
  122. rr.Hdr.Ttl |= _DO
  123. } else {
  124. rr.Hdr.Ttl &^= _DO
  125. }
  126. } else {
  127. rr.Hdr.Ttl |= _DO
  128. }
  129. }
  130. // EDNS0 defines an EDNS0 Option. An OPT RR can have multiple options appended to it.
  131. type EDNS0 interface {
  132. // Option returns the option code for the option.
  133. Option() uint16
  134. // pack returns the bytes of the option data.
  135. pack() ([]byte, error)
  136. // unpack sets the data as found in the buffer. Is also sets
  137. // the length of the slice as the length of the option data.
  138. unpack([]byte) error
  139. // String returns the string representation of the option.
  140. String() string
  141. }
  142. // EDNS0_NSID option is used to retrieve a nameserver
  143. // identifier. When sending a request Nsid must be set to the empty string
  144. // The identifier is an opaque string encoded as hex.
  145. // Basic use pattern for creating an nsid option:
  146. //
  147. // o := new(dns.OPT)
  148. // o.Hdr.Name = "."
  149. // o.Hdr.Rrtype = dns.TypeOPT
  150. // e := new(dns.EDNS0_NSID)
  151. // e.Code = dns.EDNS0NSID
  152. // e.Nsid = "AA"
  153. // o.Option = append(o.Option, e)
  154. type EDNS0_NSID struct {
  155. Code uint16 // Always EDNS0NSID
  156. Nsid string // This string needs to be hex encoded
  157. }
  158. func (e *EDNS0_NSID) pack() ([]byte, error) {
  159. h, err := hex.DecodeString(e.Nsid)
  160. if err != nil {
  161. return nil, err
  162. }
  163. return h, nil
  164. }
  165. // Option implements the EDNS0 interface.
  166. func (e *EDNS0_NSID) Option() uint16 { return EDNS0NSID } // Option returns the option code.
  167. func (e *EDNS0_NSID) unpack(b []byte) error { e.Nsid = hex.EncodeToString(b); return nil }
  168. func (e *EDNS0_NSID) String() string { return string(e.Nsid) }
  169. // EDNS0_SUBNET is the subnet option that is used to give the remote nameserver
  170. // an idea of where the client lives. See RFC 7871. It can then give back a different
  171. // answer depending on the location or network topology.
  172. // Basic use pattern for creating an subnet option:
  173. //
  174. // o := new(dns.OPT)
  175. // o.Hdr.Name = "."
  176. // o.Hdr.Rrtype = dns.TypeOPT
  177. // e := new(dns.EDNS0_SUBNET)
  178. // e.Code = dns.EDNS0SUBNET
  179. // e.Family = 1 // 1 for IPv4 source address, 2 for IPv6
  180. // e.SourceNetmask = 32 // 32 for IPV4, 128 for IPv6
  181. // e.SourceScope = 0
  182. // e.Address = net.ParseIP("127.0.0.1").To4() // for IPv4
  183. // // e.Address = net.ParseIP("2001:7b8:32a::2") // for IPV6
  184. // o.Option = append(o.Option, e)
  185. //
  186. // This code will parse all the available bits when unpacking (up to optlen).
  187. // When packing it will apply SourceNetmask. If you need more advanced logic,
  188. // patches welcome and good luck.
  189. type EDNS0_SUBNET struct {
  190. Code uint16 // Always EDNS0SUBNET
  191. Family uint16 // 1 for IP, 2 for IP6
  192. SourceNetmask uint8
  193. SourceScope uint8
  194. Address net.IP
  195. }
  196. // Option implements the EDNS0 interface.
  197. func (e *EDNS0_SUBNET) Option() uint16 { return EDNS0SUBNET }
  198. func (e *EDNS0_SUBNET) pack() ([]byte, error) {
  199. b := make([]byte, 4)
  200. binary.BigEndian.PutUint16(b[0:], e.Family)
  201. b[2] = e.SourceNetmask
  202. b[3] = e.SourceScope
  203. switch e.Family {
  204. case 0:
  205. // "dig" sets AddressFamily to 0 if SourceNetmask is also 0
  206. // We might don't need to complain either
  207. if e.SourceNetmask != 0 {
  208. return nil, errors.New("dns: bad address family")
  209. }
  210. case 1:
  211. if e.SourceNetmask > net.IPv4len*8 {
  212. return nil, errors.New("dns: bad netmask")
  213. }
  214. if len(e.Address.To4()) != net.IPv4len {
  215. return nil, errors.New("dns: bad address")
  216. }
  217. ip := e.Address.To4().Mask(net.CIDRMask(int(e.SourceNetmask), net.IPv4len*8))
  218. needLength := (e.SourceNetmask + 8 - 1) / 8 // division rounding up
  219. b = append(b, ip[:needLength]...)
  220. case 2:
  221. if e.SourceNetmask > net.IPv6len*8 {
  222. return nil, errors.New("dns: bad netmask")
  223. }
  224. if len(e.Address) != net.IPv6len {
  225. return nil, errors.New("dns: bad address")
  226. }
  227. ip := e.Address.Mask(net.CIDRMask(int(e.SourceNetmask), net.IPv6len*8))
  228. needLength := (e.SourceNetmask + 8 - 1) / 8 // division rounding up
  229. b = append(b, ip[:needLength]...)
  230. default:
  231. return nil, errors.New("dns: bad address family")
  232. }
  233. return b, nil
  234. }
  235. func (e *EDNS0_SUBNET) unpack(b []byte) error {
  236. if len(b) < 4 {
  237. return ErrBuf
  238. }
  239. e.Family = binary.BigEndian.Uint16(b)
  240. e.SourceNetmask = b[2]
  241. e.SourceScope = b[3]
  242. switch e.Family {
  243. case 0:
  244. // "dig" sets AddressFamily to 0 if SourceNetmask is also 0
  245. // It's okay to accept such a packet
  246. if e.SourceNetmask != 0 {
  247. return errors.New("dns: bad address family")
  248. }
  249. e.Address = net.IPv4(0, 0, 0, 0)
  250. case 1:
  251. if e.SourceNetmask > net.IPv4len*8 || e.SourceScope > net.IPv4len*8 {
  252. return errors.New("dns: bad netmask")
  253. }
  254. addr := make([]byte, net.IPv4len)
  255. for i := 0; i < net.IPv4len && 4+i < len(b); i++ {
  256. addr[i] = b[4+i]
  257. }
  258. e.Address = net.IPv4(addr[0], addr[1], addr[2], addr[3])
  259. case 2:
  260. if e.SourceNetmask > net.IPv6len*8 || e.SourceScope > net.IPv6len*8 {
  261. return errors.New("dns: bad netmask")
  262. }
  263. addr := make([]byte, net.IPv6len)
  264. for i := 0; i < net.IPv6len && 4+i < len(b); i++ {
  265. addr[i] = b[4+i]
  266. }
  267. e.Address = net.IP{addr[0], addr[1], addr[2], addr[3], addr[4],
  268. addr[5], addr[6], addr[7], addr[8], addr[9], addr[10],
  269. addr[11], addr[12], addr[13], addr[14], addr[15]}
  270. default:
  271. return errors.New("dns: bad address family")
  272. }
  273. return nil
  274. }
  275. func (e *EDNS0_SUBNET) String() (s string) {
  276. if e.Address == nil {
  277. s = "<nil>"
  278. } else if e.Address.To4() != nil {
  279. s = e.Address.String()
  280. } else {
  281. s = "[" + e.Address.String() + "]"
  282. }
  283. s += "/" + strconv.Itoa(int(e.SourceNetmask)) + "/" + strconv.Itoa(int(e.SourceScope))
  284. return
  285. }
  286. // The EDNS0_COOKIE option is used to add a DNS Cookie to a message.
  287. //
  288. // o := new(dns.OPT)
  289. // o.Hdr.Name = "."
  290. // o.Hdr.Rrtype = dns.TypeOPT
  291. // e := new(dns.EDNS0_COOKIE)
  292. // e.Code = dns.EDNS0COOKIE
  293. // e.Cookie = "24a5ac.."
  294. // o.Option = append(o.Option, e)
  295. //
  296. // The Cookie field consists out of a client cookie (RFC 7873 Section 4), that is
  297. // always 8 bytes. It may then optionally be followed by the server cookie. The server
  298. // cookie is of variable length, 8 to a maximum of 32 bytes. In other words:
  299. //
  300. // cCookie := o.Cookie[:16]
  301. // sCookie := o.Cookie[16:]
  302. //
  303. // There is no guarantee that the Cookie string has a specific length.
  304. type EDNS0_COOKIE struct {
  305. Code uint16 // Always EDNS0COOKIE
  306. Cookie string // Hex-encoded cookie data
  307. }
  308. func (e *EDNS0_COOKIE) pack() ([]byte, error) {
  309. h, err := hex.DecodeString(e.Cookie)
  310. if err != nil {
  311. return nil, err
  312. }
  313. return h, nil
  314. }
  315. // Option implements the EDNS0 interface.
  316. func (e *EDNS0_COOKIE) Option() uint16 { return EDNS0COOKIE }
  317. func (e *EDNS0_COOKIE) unpack(b []byte) error { e.Cookie = hex.EncodeToString(b); return nil }
  318. func (e *EDNS0_COOKIE) String() string { return e.Cookie }
  319. // The EDNS0_UL (Update Lease) (draft RFC) option is used to tell the server to set
  320. // an expiration on an update RR. This is helpful for clients that cannot clean
  321. // up after themselves. This is a draft RFC and more information can be found at
  322. // http://files.dns-sd.org/draft-sekar-dns-ul.txt
  323. //
  324. // o := new(dns.OPT)
  325. // o.Hdr.Name = "."
  326. // o.Hdr.Rrtype = dns.TypeOPT
  327. // e := new(dns.EDNS0_UL)
  328. // e.Code = dns.EDNS0UL
  329. // e.Lease = 120 // in seconds
  330. // o.Option = append(o.Option, e)
  331. type EDNS0_UL struct {
  332. Code uint16 // Always EDNS0UL
  333. Lease uint32
  334. }
  335. // Option implements the EDNS0 interface.
  336. func (e *EDNS0_UL) Option() uint16 { return EDNS0UL }
  337. func (e *EDNS0_UL) String() string { return strconv.FormatUint(uint64(e.Lease), 10) }
  338. // Copied: http://golang.org/src/pkg/net/dnsmsg.go
  339. func (e *EDNS0_UL) pack() ([]byte, error) {
  340. b := make([]byte, 4)
  341. binary.BigEndian.PutUint32(b, e.Lease)
  342. return b, nil
  343. }
  344. func (e *EDNS0_UL) unpack(b []byte) error {
  345. if len(b) < 4 {
  346. return ErrBuf
  347. }
  348. e.Lease = binary.BigEndian.Uint32(b)
  349. return nil
  350. }
  351. // EDNS0_LLQ stands for Long Lived Queries: http://tools.ietf.org/html/draft-sekar-dns-llq-01
  352. // Implemented for completeness, as the EDNS0 type code is assigned.
  353. type EDNS0_LLQ struct {
  354. Code uint16 // Always EDNS0LLQ
  355. Version uint16
  356. Opcode uint16
  357. Error uint16
  358. Id uint64
  359. LeaseLife uint32
  360. }
  361. // Option implements the EDNS0 interface.
  362. func (e *EDNS0_LLQ) Option() uint16 { return EDNS0LLQ }
  363. func (e *EDNS0_LLQ) pack() ([]byte, error) {
  364. b := make([]byte, 18)
  365. binary.BigEndian.PutUint16(b[0:], e.Version)
  366. binary.BigEndian.PutUint16(b[2:], e.Opcode)
  367. binary.BigEndian.PutUint16(b[4:], e.Error)
  368. binary.BigEndian.PutUint64(b[6:], e.Id)
  369. binary.BigEndian.PutUint32(b[14:], e.LeaseLife)
  370. return b, nil
  371. }
  372. func (e *EDNS0_LLQ) unpack(b []byte) error {
  373. if len(b) < 18 {
  374. return ErrBuf
  375. }
  376. e.Version = binary.BigEndian.Uint16(b[0:])
  377. e.Opcode = binary.BigEndian.Uint16(b[2:])
  378. e.Error = binary.BigEndian.Uint16(b[4:])
  379. e.Id = binary.BigEndian.Uint64(b[6:])
  380. e.LeaseLife = binary.BigEndian.Uint32(b[14:])
  381. return nil
  382. }
  383. func (e *EDNS0_LLQ) String() string {
  384. s := strconv.FormatUint(uint64(e.Version), 10) + " " + strconv.FormatUint(uint64(e.Opcode), 10) +
  385. " " + strconv.FormatUint(uint64(e.Error), 10) + " " + strconv.FormatUint(uint64(e.Id), 10) +
  386. " " + strconv.FormatUint(uint64(e.LeaseLife), 10)
  387. return s
  388. }
  389. // EDNS0_DUA implements the EDNS0 "DNSSEC Algorithm Understood" option. See RFC 6975.
  390. type EDNS0_DAU struct {
  391. Code uint16 // Always EDNS0DAU
  392. AlgCode []uint8
  393. }
  394. // Option implements the EDNS0 interface.
  395. func (e *EDNS0_DAU) Option() uint16 { return EDNS0DAU }
  396. func (e *EDNS0_DAU) pack() ([]byte, error) { return e.AlgCode, nil }
  397. func (e *EDNS0_DAU) unpack(b []byte) error { e.AlgCode = b; return nil }
  398. func (e *EDNS0_DAU) String() string {
  399. s := ""
  400. for i := 0; i < len(e.AlgCode); i++ {
  401. if a, ok := AlgorithmToString[e.AlgCode[i]]; ok {
  402. s += " " + a
  403. } else {
  404. s += " " + strconv.Itoa(int(e.AlgCode[i]))
  405. }
  406. }
  407. return s
  408. }
  409. // EDNS0_DHU implements the EDNS0 "DS Hash Understood" option. See RFC 6975.
  410. type EDNS0_DHU struct {
  411. Code uint16 // Always EDNS0DHU
  412. AlgCode []uint8
  413. }
  414. // Option implements the EDNS0 interface.
  415. func (e *EDNS0_DHU) Option() uint16 { return EDNS0DHU }
  416. func (e *EDNS0_DHU) pack() ([]byte, error) { return e.AlgCode, nil }
  417. func (e *EDNS0_DHU) unpack(b []byte) error { e.AlgCode = b; return nil }
  418. func (e *EDNS0_DHU) String() string {
  419. s := ""
  420. for i := 0; i < len(e.AlgCode); i++ {
  421. if a, ok := HashToString[e.AlgCode[i]]; ok {
  422. s += " " + a
  423. } else {
  424. s += " " + strconv.Itoa(int(e.AlgCode[i]))
  425. }
  426. }
  427. return s
  428. }
  429. // EDNS0_N3U implements the EDNS0 "NSEC3 Hash Understood" option. See RFC 6975.
  430. type EDNS0_N3U struct {
  431. Code uint16 // Always EDNS0N3U
  432. AlgCode []uint8
  433. }
  434. // Option implements the EDNS0 interface.
  435. func (e *EDNS0_N3U) Option() uint16 { return EDNS0N3U }
  436. func (e *EDNS0_N3U) pack() ([]byte, error) { return e.AlgCode, nil }
  437. func (e *EDNS0_N3U) unpack(b []byte) error { e.AlgCode = b; return nil }
  438. func (e *EDNS0_N3U) String() string {
  439. // Re-use the hash map
  440. s := ""
  441. for i := 0; i < len(e.AlgCode); i++ {
  442. if a, ok := HashToString[e.AlgCode[i]]; ok {
  443. s += " " + a
  444. } else {
  445. s += " " + strconv.Itoa(int(e.AlgCode[i]))
  446. }
  447. }
  448. return s
  449. }
  450. // EDNS0_EXPIRE implementes the EDNS0 option as described in RFC 7314.
  451. type EDNS0_EXPIRE struct {
  452. Code uint16 // Always EDNS0EXPIRE
  453. Expire uint32
  454. }
  455. // Option implements the EDNS0 interface.
  456. func (e *EDNS0_EXPIRE) Option() uint16 { return EDNS0EXPIRE }
  457. func (e *EDNS0_EXPIRE) String() string { return strconv.FormatUint(uint64(e.Expire), 10) }
  458. func (e *EDNS0_EXPIRE) pack() ([]byte, error) {
  459. b := make([]byte, 4)
  460. b[0] = byte(e.Expire >> 24)
  461. b[1] = byte(e.Expire >> 16)
  462. b[2] = byte(e.Expire >> 8)
  463. b[3] = byte(e.Expire)
  464. return b, nil
  465. }
  466. func (e *EDNS0_EXPIRE) unpack(b []byte) error {
  467. if len(b) < 4 {
  468. return ErrBuf
  469. }
  470. e.Expire = binary.BigEndian.Uint32(b)
  471. return nil
  472. }
  473. // The EDNS0_LOCAL option is used for local/experimental purposes. The option
  474. // code is recommended to be within the range [EDNS0LOCALSTART, EDNS0LOCALEND]
  475. // (RFC6891), although any unassigned code can actually be used. The content of
  476. // the option is made available in Data, unaltered.
  477. // Basic use pattern for creating a local option:
  478. //
  479. // o := new(dns.OPT)
  480. // o.Hdr.Name = "."
  481. // o.Hdr.Rrtype = dns.TypeOPT
  482. // e := new(dns.EDNS0_LOCAL)
  483. // e.Code = dns.EDNS0LOCALSTART
  484. // e.Data = []byte{72, 82, 74}
  485. // o.Option = append(o.Option, e)
  486. type EDNS0_LOCAL struct {
  487. Code uint16
  488. Data []byte
  489. }
  490. // Option implements the EDNS0 interface.
  491. func (e *EDNS0_LOCAL) Option() uint16 { return e.Code }
  492. func (e *EDNS0_LOCAL) String() string {
  493. return strconv.FormatInt(int64(e.Code), 10) + ":0x" + hex.EncodeToString(e.Data)
  494. }
  495. func (e *EDNS0_LOCAL) pack() ([]byte, error) {
  496. b := make([]byte, len(e.Data))
  497. copied := copy(b, e.Data)
  498. if copied != len(e.Data) {
  499. return nil, ErrBuf
  500. }
  501. return b, nil
  502. }
  503. func (e *EDNS0_LOCAL) unpack(b []byte) error {
  504. e.Data = make([]byte, len(b))
  505. copied := copy(e.Data, b)
  506. if copied != len(b) {
  507. return ErrBuf
  508. }
  509. return nil
  510. }
  511. // EDNS0_TCP_KEEPALIVE is an EDNS0 option that instructs the server to keep
  512. // the TCP connection alive. See RFC 7828.
  513. type EDNS0_TCP_KEEPALIVE struct {
  514. Code uint16 // Always EDNSTCPKEEPALIVE
  515. Length uint16 // the value 0 if the TIMEOUT is omitted, the value 2 if it is present;
  516. Timeout uint16 // an idle timeout value for the TCP connection, specified in units of 100 milliseconds, encoded in network byte order.
  517. }
  518. // Option implements the EDNS0 interface.
  519. func (e *EDNS0_TCP_KEEPALIVE) Option() uint16 { return EDNS0TCPKEEPALIVE }
  520. func (e *EDNS0_TCP_KEEPALIVE) pack() ([]byte, error) {
  521. if e.Timeout != 0 && e.Length != 2 {
  522. return nil, errors.New("dns: timeout specified but length is not 2")
  523. }
  524. if e.Timeout == 0 && e.Length != 0 {
  525. return nil, errors.New("dns: timeout not specified but length is not 0")
  526. }
  527. b := make([]byte, 4+e.Length)
  528. binary.BigEndian.PutUint16(b[0:], e.Code)
  529. binary.BigEndian.PutUint16(b[2:], e.Length)
  530. if e.Length == 2 {
  531. binary.BigEndian.PutUint16(b[4:], e.Timeout)
  532. }
  533. return b, nil
  534. }
  535. func (e *EDNS0_TCP_KEEPALIVE) unpack(b []byte) error {
  536. if len(b) < 4 {
  537. return ErrBuf
  538. }
  539. e.Length = binary.BigEndian.Uint16(b[2:4])
  540. if e.Length != 0 && e.Length != 2 {
  541. return errors.New("dns: length mismatch, want 0/2 but got " + strconv.FormatUint(uint64(e.Length), 10))
  542. }
  543. if e.Length == 2 {
  544. if len(b) < 6 {
  545. return ErrBuf
  546. }
  547. e.Timeout = binary.BigEndian.Uint16(b[4:6])
  548. }
  549. return nil
  550. }
  551. func (e *EDNS0_TCP_KEEPALIVE) String() (s string) {
  552. s = "use tcp keep-alive"
  553. if e.Length == 0 {
  554. s += ", timeout omitted"
  555. } else {
  556. s += fmt.Sprintf(", timeout %dms", e.Timeout*100)
  557. }
  558. return
  559. }
  560. // EDNS0_PADDING option is used to add padding to a request/response. The default
  561. // value of padding SHOULD be 0x0 but other values MAY be used, for instance if
  562. // compression is applied before encryption which may break signatures.
  563. type EDNS0_PADDING struct {
  564. Padding []byte
  565. }
  566. // Option implements the EDNS0 interface.
  567. func (e *EDNS0_PADDING) Option() uint16 { return EDNS0PADDING }
  568. func (e *EDNS0_PADDING) pack() ([]byte, error) { return e.Padding, nil }
  569. func (e *EDNS0_PADDING) unpack(b []byte) error { e.Padding = b; return nil }
  570. func (e *EDNS0_PADDING) String() string { return fmt.Sprintf("%0X", e.Padding) }