# Copyright (C) Internet Systems Consortium, Inc. ("ISC") # # SPDX-License-Identifier: MPL-2.0 # # This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, you can obtain one at https://mozilla.org/MPL/2.0/. # # See the COPYRIGHT file distributed with this work for additional # information regarding copyright ownership. from __future__ import print_function import os import sys import signal import socket import select from datetime import datetime, timedelta import time import functools import dns, dns.message, dns.query, dns.flags from dns.rdatatype import * from dns.rdataclass import * from dns.rcode import * from dns.name import * # Log query to file def logquery(type, qname): with open("qlog", "a") as f: f.write("%s %s\n", type, qname) def endswith(domain, labels): return domain.endswith("." + labels) or domain == labels ############################################################################ # Respond to a DNS query. # For good. it serves: # ns2.good. IN A 10.53.0.2 # zoop.boing.good. NS ns3.good. # ns3.good. IN A 10.53.0.3 # too.many.labels.a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.q.r.s.t.u.v.w.x.y.z.good. A 192.0.2.2 # it responds properly (with NODATA empty response) to non-empty terminals # # For slow. it works the same as for good., but each response is delayed by 400 milliseconds # # For bad. it works the same as for good., but returns NXDOMAIN to non-empty terminals # # For ugly. it works the same as for good., but returns garbage to non-empty terminals # # For 1.0.0.2.ip6.arpa it serves # 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.f.4.0.1.0.0.2.ip6.arpa. IN PTR nee.com. # 8.2.6.0.1.0.0.2.ip6.arpa IN NS ns3.good # 1.0.0.2.ip6.arpa. IN NS ns2.good # ip6.arpa. IN NS ns2.good # # For stale. it serves: # a.b. NS ns.a.b.stale. # ns.a.b.stale. IN A 10.53.0.3 # b. NS ns.b.stale. # ns.b.stale. IN A 10.53.0.4 ############################################################################ def create_response(msg): m = dns.message.from_wire(msg) qname = m.question[0].name.to_text() lqname = qname.lower() labels = lqname.split(".") # get qtype rrtype = m.question[0].rdtype typename = dns.rdatatype.to_text(rrtype) if typename == "A" or typename == "AAAA": typename = "ADDR" bad = False ugly = False slow = False # log this query with open("query.log", "a") as f: f.write("%s %s\n" % (typename, lqname)) print("%s %s" % (typename, lqname), end=" ") r = dns.message.make_response(m) r.set_rcode(NOERROR) if endswith(lqname, "1.0.0.2.ip6.arpa."): # Direct query - give direct answer if endswith(lqname, "8.2.6.0.1.0.0.2.ip6.arpa."): # Delegate to ns3 r.authority.append( dns.rrset.from_text( "8.2.6.0.1.0.0.2.ip6.arpa.", 60, IN, NS, "ns3.good." ) ) r.additional.append( dns.rrset.from_text("ns3.good.", 60, IN, A, "10.53.0.3") ) elif ( lqname == "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.f.4.0.1.0.0.2.ip6.arpa." and rrtype == PTR ): # Direct query - give direct answer r.answer.append( dns.rrset.from_text( "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.f.4.0.1.0.0.2.ip6.arpa.", 1, IN, PTR, "nee.com.", ) ) r.flags |= dns.flags.AA elif lqname == "1.0.0.2.ip6.arpa." and rrtype == NS: # NS query at the apex r.answer.append( dns.rrset.from_text("1.0.0.2.ip6.arpa.", 30, IN, NS, "ns2.good.") ) r.flags |= dns.flags.AA elif endswith( "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.f.4.0.1.0.0.2.ip6.arpa.", lqname, ): # NODATA answer r.authority.append( dns.rrset.from_text( "1.0.0.2.ip6.arpa.", 30, IN, SOA, "ns2.good. hostmaster.arpa. 2018050100 1 1 1 1", ) ) else: # NXDOMAIN r.authority.append( dns.rrset.from_text( "1.0.0.2.ip6.arpa.", 30, IN, SOA, "ns2.good. hostmaster.arpa. 2018050100 1 1 1 1", ) ) r.set_rcode(NXDOMAIN) return r elif endswith(lqname, "ip6.arpa."): if lqname == "ip6.arpa." and rrtype == NS: # NS query at the apex r.answer.append(dns.rrset.from_text("ip6.arpa.", 30, IN, NS, "ns2.good.")) r.flags |= dns.flags.AA elif endswith("1.0.0.2.ip6.arpa.", lqname): # NODATA answer r.authority.append( dns.rrset.from_text( "ip6.arpa.", 30, IN, SOA, "ns2.good. hostmaster.arpa. 2018050100 1 1 1 1", ) ) else: # NXDOMAIN r.authority.append( dns.rrset.from_text( "ip6.arpa.", 30, IN, SOA, "ns2.good. hostmaster.arpa. 2018050100 1 1 1 1", ) ) r.set_rcode(NXDOMAIN) return r elif endswith(lqname, "stale."): if endswith(lqname, "a.b.stale."): # Delegate to ns.a.b.stale. r.authority.append( dns.rrset.from_text("a.b.stale.", 2, IN, NS, "ns.a.b.stale.") ) r.additional.append( dns.rrset.from_text("ns.a.b.stale.", 2, IN, A, "10.53.0.3") ) elif endswith(lqname, "b.stale."): # Delegate to ns.b.stale. r.authority.append( dns.rrset.from_text("b.stale.", 2, IN, NS, "ns.b.stale.") ) r.additional.append( dns.rrset.from_text("ns.b.stale.", 2, IN, A, "10.53.0.4") ) elif lqname == "stale." and rrtype == NS: # NS query at the apex. r.answer.append(dns.rrset.from_text("stale.", 2, IN, NS, "ns2.stale.")) r.flags |= dns.flags.AA elif lqname == "stale." and rrtype == SOA: # SOA query at the apex. r.answer.append( dns.rrset.from_text( "stale.", 2, IN, SOA, "ns2.stale. hostmaster.stale. 1 2 3 4 5" ) ) r.flags |= dns.flags.AA elif lqname == "stale.": # NODATA answer r.authority.append( dns.rrset.from_text( "stale.", 2, IN, SOA, "ns2.stale. hostmaster.arpa. 1 2 3 4 5" ) ) else: # NXDOMAIN r.authority.append( dns.rrset.from_text( "stale.", 2, IN, SOA, "ns2.stale. hostmaster.arpa. 1 2 3 4 5" ) ) r.set_rcode(NXDOMAIN) return r elif endswith(lqname, "bad."): bad = True suffix = "bad." lqname = lqname[:-4] elif endswith(lqname, "ugly."): ugly = True suffix = "ugly." lqname = lqname[:-5] elif endswith(lqname, "good."): suffix = "good." lqname = lqname[:-5] elif endswith(lqname, "slow."): slow = True suffix = "slow." lqname = lqname[:-5] elif endswith(lqname, "fwd."): suffix = "fwd." lqname = lqname[:-4] else: r.set_rcode(REFUSED) return r # Good/bad/ugly differs only in how we treat non-empty terminals if endswith(lqname, "zoop.boing."): r.authority.append( dns.rrset.from_text("zoop.boing." + suffix, 1, IN, NS, "ns3." + suffix) ) elif ( lqname == "many.labels.a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.q.r.s.t.u.v.w.x.y.z." and rrtype == A ): r.answer.append(dns.rrset.from_text(lqname + suffix, 1, IN, A, "192.0.2.2")) r.flags |= dns.flags.AA elif lqname == "" and rrtype == NS: r.answer.append(dns.rrset.from_text(suffix, 30, IN, NS, "ns2." + suffix)) r.flags |= dns.flags.AA elif lqname == "ns2." and rrtype == A: r.answer.append(dns.rrset.from_text("ns2." + suffix, 30, IN, A, "10.53.0.2")) r.flags |= dns.flags.AA elif lqname == "ns2." and rrtype == AAAA: r.answer.append( dns.rrset.from_text("ns2." + suffix, 30, IN, AAAA, "fd92:7065:b8e:ffff::2") ) r.flags |= dns.flags.AA elif lqname == "ns3." and rrtype == A: r.answer.append(dns.rrset.from_text("ns3." + suffix, 30, IN, A, "10.53.0.3")) r.flags |= dns.flags.AA elif lqname == "ns3." and rrtype == AAAA: r.answer.append( dns.rrset.from_text("ns3." + suffix, 30, IN, AAAA, "fd92:7065:b8e:ffff::3") ) r.flags |= dns.flags.AA elif lqname == "ns4." and rrtype == A: r.answer.append(dns.rrset.from_text("ns4." + suffix, 30, IN, A, "10.53.0.4")) r.flags |= dns.flags.AA elif lqname == "ns4." and rrtype == AAAA: r.answer.append( dns.rrset.from_text("ns4." + suffix, 30, IN, AAAA, "fd92:7065:b8e:ffff::4") ) r.flags |= dns.flags.AA elif lqname == "a.bit.longer.ns.name." and rrtype == A: r.answer.append( dns.rrset.from_text("a.bit.longer.ns.name." + suffix, 1, IN, A, "10.53.0.4") ) r.flags |= dns.flags.AA elif lqname == "a.bit.longer.ns.name." and rrtype == AAAA: r.answer.append( dns.rrset.from_text( "a.bit.longer.ns.name." + suffix, 1, IN, AAAA, "fd92:7065:b8e:ffff::4" ) ) r.flags |= dns.flags.AA else: r.authority.append( dns.rrset.from_text( suffix, 1, IN, SOA, "ns2." + suffix + " hostmaster.arpa. 2018050100 1 1 1 1", ) ) if bad or not ( endswith("icky.icky.icky.ptang.zoop.boing.", lqname) or endswith( "many.labels.a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.q.r.s.t.u.v.w.x.y.z.", lqname, ) or endswith("a.bit.longer.ns.name.", lqname) ): r.set_rcode(NXDOMAIN) if ugly: r.set_rcode(FORMERR) if slow: time.sleep(0.2) return r def sigterm(signum, frame): print("Shutting down now...") os.remove("ans.pid") running = False sys.exit(0) ############################################################################ # Main # # Set up responder and control channel, open the pid file, and start # the main loop, listening for queries on the query channel or commands # on the control channel and acting on them. ############################################################################ ip4 = "10.53.0.2" ip6 = "fd92:7065:b8e:ffff::2" try: port = int(os.environ["PORT"]) except: port = 5300 query4_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) query4_socket.bind((ip4, port)) havev6 = True try: query6_socket = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM) try: query6_socket.bind((ip6, port)) except: query6_socket.close() havev6 = False except: havev6 = False signal.signal(signal.SIGTERM, sigterm) f = open("ans.pid", "w") pid = os.getpid() print(pid, file=f) f.close() running = True print("Listening on %s port %d" % (ip4, port)) if havev6: print("Listening on %s port %d" % (ip6, port)) print("Ctrl-c to quit") if havev6: input = [query4_socket, query6_socket] else: input = [query4_socket] while running: try: inputready, outputready, exceptready = select.select(input, [], []) except select.error as e: break except socket.error as e: break except KeyboardInterrupt: break for s in inputready: if s == query4_socket or s == query6_socket: print( "Query received on %s" % (ip4 if s == query4_socket else ip6), end=" " ) # Handle incoming queries msg = s.recvfrom(65535) rsp = create_response(msg[0]) if rsp: print(dns.rcode.to_text(rsp.rcode())) s.sendto(rsp.to_wire(), msg[1]) else: print("NO RESPONSE") if not running: break