|
29 | 29 |
|
30 | 30 | #include "dns.h"
|
31 | 31 | #include "socket.h"
|
| 32 | +#include "options.h" |
| 33 | + |
| 34 | +#ifdef _WIN32 |
| 35 | +#include "win32.h" |
| 36 | +#include "openvpn-msg.h" |
| 37 | +#endif |
32 | 38 |
|
33 | 39 | /**
|
34 | 40 | * Parses a string as port and stores it
|
@@ -428,6 +434,122 @@ setenv_dns_options(const struct dns_options *o, struct env_set *es)
|
428 | 434 | gc_free(&gc);
|
429 | 435 | }
|
430 | 436 |
|
| 437 | +#ifdef _WIN32 |
| 438 | + |
| 439 | +static void |
| 440 | +make_domain_list(const char *what, const struct dns_domain *src, |
| 441 | + bool nrpt_domains, char *dst, size_t dst_size) |
| 442 | +{ |
| 443 | + /* NRPT domains need two \0 at the end for REG_MULTI_SZ |
| 444 | + * and a leading '.' added in front of the domain name */ |
| 445 | + size_t term_size = nrpt_domains ? 2 : 1; |
| 446 | + size_t leading_dot = nrpt_domains ? 1 : 0; |
| 447 | + size_t offset = 0; |
| 448 | + |
| 449 | + memset(dst, 0, dst_size); |
| 450 | + |
| 451 | + while (src) |
| 452 | + { |
| 453 | + size_t len = strlen(src->name); |
| 454 | + if (offset + leading_dot + len + term_size > dst_size) |
| 455 | + { |
| 456 | + msg(M_WARN, "WARNING: %s truncated", what); |
| 457 | + if (offset) |
| 458 | + { |
| 459 | + /* Remove trailing comma */ |
| 460 | + *(dst + offset - 1) = '\0'; |
| 461 | + } |
| 462 | + break; |
| 463 | + } |
| 464 | + |
| 465 | + if (leading_dot) |
| 466 | + { |
| 467 | + *(dst + offset++) = '.'; |
| 468 | + } |
| 469 | + strncpy(dst + offset, src->name, len); |
| 470 | + offset += len; |
| 471 | + |
| 472 | + src = src->next; |
| 473 | + if (src) |
| 474 | + { |
| 475 | + *(dst + offset++) = ','; |
| 476 | + } |
| 477 | + } |
| 478 | +} |
| 479 | + |
| 480 | +static void |
| 481 | +run_up_down_service(bool add, const struct options *o, const struct tuntap *tt) |
| 482 | +{ |
| 483 | + const struct dns_server *server = o->dns_options.servers; |
| 484 | + const struct dns_domain *search_domains = o->dns_options.search_domains; |
| 485 | + |
| 486 | + while (true) |
| 487 | + { |
| 488 | + if (!server) |
| 489 | + { |
| 490 | + if (add) |
| 491 | + { |
| 492 | + msg(M_WARN, "WARNING: setting DNS failed, no compatible server profile"); |
| 493 | + } |
| 494 | + return; |
| 495 | + } |
| 496 | + |
| 497 | + bool only_standard_server_ports = true; |
| 498 | + for (size_t i = 0; i < NRPT_ADDR_NUM; ++i) |
| 499 | + { |
| 500 | + if (server->addr[i].port && server->addr[i].port != 53) |
| 501 | + { |
| 502 | + only_standard_server_ports = false; |
| 503 | + break; |
| 504 | + } |
| 505 | + } |
| 506 | + if ((server->transport == DNS_TRANSPORT_UNSET || server->transport == DNS_TRANSPORT_PLAIN) |
| 507 | + && only_standard_server_ports) |
| 508 | + { |
| 509 | + break; /* found compatible server */ |
| 510 | + } |
| 511 | + |
| 512 | + server = server->next; |
| 513 | + } |
| 514 | + |
| 515 | + ack_message_t ack; |
| 516 | + nrpt_dns_cfg_message_t nrpt = { |
| 517 | + .header = { |
| 518 | + (add ? msg_add_nrpt_cfg : msg_del_nrpt_cfg), |
| 519 | + sizeof(nrpt_dns_cfg_message_t), |
| 520 | + 0 |
| 521 | + }, |
| 522 | + .iface = { .index = tt->adapter_index, .name = "" }, |
| 523 | + .flags = server->dnssec == DNS_SECURITY_NO ? 0 : nrpt_dnssec, |
| 524 | + }; |
| 525 | + strncpynt(nrpt.iface.name, tt->actual_name, sizeof(nrpt.iface.name)); |
| 526 | + |
| 527 | + for (size_t i = 0; i < NRPT_ADDR_NUM; ++i) |
| 528 | + { |
| 529 | + if (server->addr[i].family == AF_UNSPEC) |
| 530 | + { |
| 531 | + /* No more addresses */ |
| 532 | + break; |
| 533 | + } |
| 534 | + |
| 535 | + if (inet_ntop(server->addr[i].family, &server->addr[i].in, |
| 536 | + nrpt.addresses[i], NRPT_ADDR_SIZE) == NULL) |
| 537 | + { |
| 538 | + msg(M_WARN, "WARNING: could not convert dns server address"); |
| 539 | + } |
| 540 | + } |
| 541 | + |
| 542 | + make_domain_list("dns server resolve domains", server->domains, true, |
| 543 | + nrpt.resolve_domains, sizeof(nrpt.resolve_domains)); |
| 544 | + |
| 545 | + make_domain_list("dns search domains", search_domains, false, |
| 546 | + nrpt.search_domains, sizeof(nrpt.search_domains)); |
| 547 | + |
| 548 | + send_msg_iservice(o->msg_channel, &nrpt, sizeof(nrpt), &ack, "DNS"); |
| 549 | +} |
| 550 | + |
| 551 | +#endif /* _WIN32 */ |
| 552 | + |
431 | 553 | void
|
432 | 554 | show_dns_options(const struct dns_options *o)
|
433 | 555 | {
|
@@ -506,3 +628,43 @@ show_dns_options(const struct dns_options *o)
|
506 | 628 |
|
507 | 629 | gc_free(&gc);
|
508 | 630 | }
|
| 631 | + |
| 632 | +void |
| 633 | +run_dns_up_down(bool up, struct options *o, const struct tuntap *tt) |
| 634 | +{ |
| 635 | + if (!o->dns_options.servers) |
| 636 | + { |
| 637 | + return; |
| 638 | + } |
| 639 | + |
| 640 | + /* Warn about adding servers of unsupported AF */ |
| 641 | + const struct dns_server *s = o->dns_options.servers; |
| 642 | + while (up && s) |
| 643 | + { |
| 644 | + size_t bad_count = 0; |
| 645 | + for (size_t i = 0; i < s->addr_count; ++i) |
| 646 | + { |
| 647 | + if ((s->addr[i].family == AF_INET6 && !tt->did_ifconfig_ipv6_setup) |
| 648 | + || (s->addr[i].family == AF_INET && !tt->did_ifconfig_setup)) |
| 649 | + { |
| 650 | + ++bad_count; |
| 651 | + } |
| 652 | + } |
| 653 | + if (bad_count == s->addr_count) |
| 654 | + { |
| 655 | + msg(M_WARN, "DNS server %ld only has address(es) from a family " |
| 656 | + "the tunnel is not configured for - it will not be reachable", |
| 657 | + s->priority); |
| 658 | + } |
| 659 | + else if (bad_count) |
| 660 | + { |
| 661 | + msg(M_WARN, "DNS server %ld has address(es) from a family " |
| 662 | + "the tunnel is not configured for", s->priority); |
| 663 | + } |
| 664 | + s = s->next; |
| 665 | + } |
| 666 | + |
| 667 | +#ifdef _WIN32 |
| 668 | + run_up_down_service(up, o, tt); |
| 669 | +#endif /* ifdef _WIN32 */ |
| 670 | +} |
0 commit comments