dnstap.c revision 1.1.1.4 1 1.1 christos /* dnstap support for Unbound */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (c) 2013-2014, Farsight Security, Inc.
5 1.1 christos * All rights reserved.
6 1.1 christos *
7 1.1 christos * Redistribution and use in source and binary forms, with or without
8 1.1 christos * modification, are permitted provided that the following conditions
9 1.1 christos * are met:
10 1.1 christos *
11 1.1 christos * 1. Redistributions of source code must retain the above copyright
12 1.1 christos * notice, this list of conditions and the following disclaimer.
13 1.1 christos *
14 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
15 1.1 christos * notice, this list of conditions and the following disclaimer in the
16 1.1 christos * documentation and/or other materials provided with the distribution.
17 1.1 christos *
18 1.1 christos * 3. Neither the name of the copyright holder nor the names of its
19 1.1 christos * contributors may be used to endorse or promote products derived from
20 1.1 christos * this software without specific prior written permission.
21 1.1 christos *
22 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 1.1 christos * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
24 1.1 christos * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
25 1.1 christos * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
26 1.1 christos * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
27 1.1 christos * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
28 1.1 christos * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
29 1.1 christos * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
30 1.1 christos * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
31 1.1 christos * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
32 1.1 christos * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 1.1 christos */
34 1.1 christos
35 1.1 christos #include "dnstap/dnstap_config.h"
36 1.1 christos
37 1.1 christos #ifdef USE_DNSTAP
38 1.1 christos
39 1.1 christos #include "config.h"
40 1.1 christos #include <string.h>
41 1.1 christos #include <sys/time.h>
42 1.1.1.3 christos #ifdef HAVE_SYS_STAT_H
43 1.1.1.3 christos #include <sys/stat.h>
44 1.1.1.3 christos #endif
45 1.1.1.3 christos #include <errno.h>
46 1.1 christos #include "sldns/sbuffer.h"
47 1.1 christos #include "util/config_file.h"
48 1.1 christos #include "util/net_help.h"
49 1.1 christos #include "util/netevent.h"
50 1.1 christos #include "util/log.h"
51 1.1 christos
52 1.1 christos #include <protobuf-c/protobuf-c.h>
53 1.1 christos
54 1.1 christos #include "dnstap/dnstap.h"
55 1.1.1.4 christos #include "dnstap/dtstream.h"
56 1.1 christos #include "dnstap/dnstap.pb-c.h"
57 1.1 christos
58 1.1 christos #define DNSTAP_INITIAL_BUF_SIZE 256
59 1.1 christos
60 1.1 christos struct dt_msg {
61 1.1 christos void *buf;
62 1.1 christos size_t len_buf;
63 1.1 christos Dnstap__Dnstap d;
64 1.1 christos Dnstap__Message m;
65 1.1 christos };
66 1.1 christos
67 1.1 christos static int
68 1.1 christos dt_pack(const Dnstap__Dnstap *d, void **buf, size_t *sz)
69 1.1 christos {
70 1.1 christos ProtobufCBufferSimple sbuf;
71 1.1 christos
72 1.1 christos memset(&sbuf, 0, sizeof(sbuf));
73 1.1 christos sbuf.base.append = protobuf_c_buffer_simple_append;
74 1.1 christos sbuf.len = 0;
75 1.1 christos sbuf.alloced = DNSTAP_INITIAL_BUF_SIZE;
76 1.1 christos sbuf.data = malloc(sbuf.alloced);
77 1.1 christos if (sbuf.data == NULL)
78 1.1 christos return 0;
79 1.1 christos sbuf.must_free_data = 1;
80 1.1 christos
81 1.1 christos *sz = dnstap__dnstap__pack_to_buffer(d, (ProtobufCBuffer *) &sbuf);
82 1.1 christos if (sbuf.data == NULL)
83 1.1 christos return 0;
84 1.1 christos *buf = sbuf.data;
85 1.1 christos
86 1.1 christos return 1;
87 1.1 christos }
88 1.1 christos
89 1.1 christos static void
90 1.1 christos dt_send(const struct dt_env *env, void *buf, size_t len_buf)
91 1.1 christos {
92 1.1.1.4 christos dt_msg_queue_submit(env->msgqueue, buf, len_buf);
93 1.1 christos }
94 1.1 christos
95 1.1 christos static void
96 1.1 christos dt_msg_init(const struct dt_env *env,
97 1.1 christos struct dt_msg *dm,
98 1.1 christos Dnstap__Message__Type mtype)
99 1.1 christos {
100 1.1 christos memset(dm, 0, sizeof(*dm));
101 1.1 christos dm->d.base.descriptor = &dnstap__dnstap__descriptor;
102 1.1 christos dm->m.base.descriptor = &dnstap__message__descriptor;
103 1.1 christos dm->d.type = DNSTAP__DNSTAP__TYPE__MESSAGE;
104 1.1 christos dm->d.message = &dm->m;
105 1.1 christos dm->m.type = mtype;
106 1.1 christos if (env->identity != NULL) {
107 1.1 christos dm->d.identity.data = (uint8_t *) env->identity;
108 1.1 christos dm->d.identity.len = (size_t) env->len_identity;
109 1.1 christos dm->d.has_identity = 1;
110 1.1 christos }
111 1.1 christos if (env->version != NULL) {
112 1.1 christos dm->d.version.data = (uint8_t *) env->version;
113 1.1 christos dm->d.version.len = (size_t) env->len_version;
114 1.1 christos dm->d.has_version = 1;
115 1.1 christos }
116 1.1 christos }
117 1.1 christos
118 1.1.1.3 christos /* check that the socket file can be opened and exists, print error if not */
119 1.1.1.3 christos static void
120 1.1.1.3 christos check_socket_file(const char* socket_path)
121 1.1.1.3 christos {
122 1.1.1.3 christos struct stat statbuf;
123 1.1.1.3 christos memset(&statbuf, 0, sizeof(statbuf));
124 1.1.1.3 christos if(stat(socket_path, &statbuf) < 0) {
125 1.1.1.3 christos log_warn("could not open dnstap-socket-path: %s, %s",
126 1.1.1.3 christos socket_path, strerror(errno));
127 1.1.1.3 christos }
128 1.1.1.3 christos }
129 1.1.1.3 christos
130 1.1 christos struct dt_env *
131 1.1.1.4 christos dt_create(struct config_file* cfg)
132 1.1 christos {
133 1.1 christos struct dt_env *env;
134 1.1.1.4 christos
135 1.1.1.4 christos if(cfg->dnstap && cfg->dnstap_socket_path && cfg->dnstap_socket_path[0] &&
136 1.1.1.4 christos (cfg->dnstap_ip==NULL || cfg->dnstap_ip[0]==0)) {
137 1.1.1.4 christos char* p = cfg->dnstap_socket_path;
138 1.1.1.4 christos if(cfg->chrootdir && cfg->chrootdir[0] && strncmp(p,
139 1.1.1.4 christos cfg->chrootdir, strlen(cfg->chrootdir)) == 0)
140 1.1.1.4 christos p += strlen(cfg->chrootdir);
141 1.1.1.4 christos verbose(VERB_OPS, "attempting to connect to dnstap socket %s",
142 1.1.1.4 christos p);
143 1.1.1.4 christos check_socket_file(p);
144 1.1.1.4 christos }
145 1.1 christos
146 1.1 christos env = (struct dt_env *) calloc(1, sizeof(struct dt_env));
147 1.1 christos if (!env)
148 1.1 christos return NULL;
149 1.1 christos
150 1.1.1.4 christos env->dtio = dt_io_thread_create();
151 1.1.1.4 christos if(!env->dtio) {
152 1.1.1.4 christos log_err("malloc failure");
153 1.1 christos free(env);
154 1.1.1.4 christos return NULL;
155 1.1 christos }
156 1.1.1.4 christos if(!dt_io_thread_apply_cfg(env->dtio, cfg)) {
157 1.1.1.4 christos dt_io_thread_delete(env->dtio);
158 1.1.1.4 christos free(env);
159 1.1.1.4 christos return NULL;
160 1.1.1.4 christos }
161 1.1.1.4 christos dt_apply_cfg(env, cfg);
162 1.1 christos return env;
163 1.1 christos }
164 1.1 christos
165 1.1 christos static void
166 1.1 christos dt_apply_identity(struct dt_env *env, struct config_file *cfg)
167 1.1 christos {
168 1.1 christos char buf[MAXHOSTNAMELEN+1];
169 1.1 christos if (!cfg->dnstap_send_identity)
170 1.1 christos return;
171 1.1 christos free(env->identity);
172 1.1 christos if (cfg->dnstap_identity == NULL || cfg->dnstap_identity[0] == 0) {
173 1.1 christos if (gethostname(buf, MAXHOSTNAMELEN) == 0) {
174 1.1 christos buf[MAXHOSTNAMELEN] = 0;
175 1.1 christos env->identity = strdup(buf);
176 1.1 christos } else {
177 1.1 christos fatal_exit("dt_apply_identity: gethostname() failed");
178 1.1 christos }
179 1.1 christos } else {
180 1.1 christos env->identity = strdup(cfg->dnstap_identity);
181 1.1 christos }
182 1.1 christos if (env->identity == NULL)
183 1.1 christos fatal_exit("dt_apply_identity: strdup() failed");
184 1.1 christos env->len_identity = (unsigned int)strlen(env->identity);
185 1.1 christos verbose(VERB_OPS, "dnstap identity field set to \"%s\"",
186 1.1 christos env->identity);
187 1.1 christos }
188 1.1 christos
189 1.1 christos static void
190 1.1 christos dt_apply_version(struct dt_env *env, struct config_file *cfg)
191 1.1 christos {
192 1.1 christos if (!cfg->dnstap_send_version)
193 1.1 christos return;
194 1.1 christos free(env->version);
195 1.1 christos if (cfg->dnstap_version == NULL || cfg->dnstap_version[0] == 0)
196 1.1 christos env->version = strdup(PACKAGE_STRING);
197 1.1 christos else
198 1.1 christos env->version = strdup(cfg->dnstap_version);
199 1.1 christos if (env->version == NULL)
200 1.1 christos fatal_exit("dt_apply_version: strdup() failed");
201 1.1 christos env->len_version = (unsigned int)strlen(env->version);
202 1.1 christos verbose(VERB_OPS, "dnstap version field set to \"%s\"",
203 1.1 christos env->version);
204 1.1 christos }
205 1.1 christos
206 1.1 christos void
207 1.1 christos dt_apply_cfg(struct dt_env *env, struct config_file *cfg)
208 1.1 christos {
209 1.1 christos if (!cfg->dnstap)
210 1.1 christos return;
211 1.1 christos
212 1.1 christos dt_apply_identity(env, cfg);
213 1.1 christos dt_apply_version(env, cfg);
214 1.1 christos if ((env->log_resolver_query_messages = (unsigned int)
215 1.1 christos cfg->dnstap_log_resolver_query_messages))
216 1.1 christos {
217 1.1 christos verbose(VERB_OPS, "dnstap Message/RESOLVER_QUERY enabled");
218 1.1 christos }
219 1.1 christos if ((env->log_resolver_response_messages = (unsigned int)
220 1.1 christos cfg->dnstap_log_resolver_response_messages))
221 1.1 christos {
222 1.1 christos verbose(VERB_OPS, "dnstap Message/RESOLVER_RESPONSE enabled");
223 1.1 christos }
224 1.1 christos if ((env->log_client_query_messages = (unsigned int)
225 1.1 christos cfg->dnstap_log_client_query_messages))
226 1.1 christos {
227 1.1 christos verbose(VERB_OPS, "dnstap Message/CLIENT_QUERY enabled");
228 1.1 christos }
229 1.1 christos if ((env->log_client_response_messages = (unsigned int)
230 1.1 christos cfg->dnstap_log_client_response_messages))
231 1.1 christos {
232 1.1 christos verbose(VERB_OPS, "dnstap Message/CLIENT_RESPONSE enabled");
233 1.1 christos }
234 1.1 christos if ((env->log_forwarder_query_messages = (unsigned int)
235 1.1 christos cfg->dnstap_log_forwarder_query_messages))
236 1.1 christos {
237 1.1 christos verbose(VERB_OPS, "dnstap Message/FORWARDER_QUERY enabled");
238 1.1 christos }
239 1.1 christos if ((env->log_forwarder_response_messages = (unsigned int)
240 1.1 christos cfg->dnstap_log_forwarder_response_messages))
241 1.1 christos {
242 1.1 christos verbose(VERB_OPS, "dnstap Message/FORWARDER_RESPONSE enabled");
243 1.1 christos }
244 1.1 christos }
245 1.1 christos
246 1.1 christos int
247 1.1.1.4 christos dt_init(struct dt_env *env, struct comm_base* base)
248 1.1 christos {
249 1.1.1.4 christos env->msgqueue = dt_msg_queue_create(base);
250 1.1.1.4 christos if(!env->msgqueue) {
251 1.1.1.4 christos log_err("malloc failure");
252 1.1.1.4 christos return 0;
253 1.1.1.4 christos }
254 1.1.1.4 christos if(!dt_io_thread_register_queue(env->dtio, env->msgqueue)) {
255 1.1.1.4 christos log_err("malloc failure");
256 1.1.1.4 christos dt_msg_queue_delete(env->msgqueue);
257 1.1.1.4 christos env->msgqueue = NULL;
258 1.1 christos return 0;
259 1.1.1.4 christos }
260 1.1 christos return 1;
261 1.1 christos }
262 1.1 christos
263 1.1 christos void
264 1.1.1.4 christos dt_deinit(struct dt_env* env)
265 1.1.1.4 christos {
266 1.1.1.4 christos dt_io_thread_unregister_queue(env->dtio, env->msgqueue);
267 1.1.1.4 christos dt_msg_queue_delete(env->msgqueue);
268 1.1.1.4 christos }
269 1.1.1.4 christos
270 1.1.1.4 christos void
271 1.1 christos dt_delete(struct dt_env *env)
272 1.1 christos {
273 1.1 christos if (!env)
274 1.1 christos return;
275 1.1.1.4 christos dt_io_thread_delete(env->dtio);
276 1.1 christos free(env->identity);
277 1.1 christos free(env->version);
278 1.1 christos free(env);
279 1.1 christos }
280 1.1 christos
281 1.1 christos static void
282 1.1 christos dt_fill_timeval(const struct timeval *tv,
283 1.1 christos uint64_t *time_sec, protobuf_c_boolean *has_time_sec,
284 1.1 christos uint32_t *time_nsec, protobuf_c_boolean *has_time_nsec)
285 1.1 christos {
286 1.1 christos #ifndef S_SPLINT_S
287 1.1 christos *time_sec = tv->tv_sec;
288 1.1 christos *time_nsec = tv->tv_usec * 1000;
289 1.1 christos #endif
290 1.1 christos *has_time_sec = 1;
291 1.1 christos *has_time_nsec = 1;
292 1.1 christos }
293 1.1 christos
294 1.1 christos static void
295 1.1 christos dt_fill_buffer(sldns_buffer *b, ProtobufCBinaryData *p, protobuf_c_boolean *has)
296 1.1 christos {
297 1.1 christos log_assert(b != NULL);
298 1.1 christos p->len = sldns_buffer_limit(b);
299 1.1 christos p->data = sldns_buffer_begin(b);
300 1.1 christos *has = 1;
301 1.1 christos }
302 1.1 christos
303 1.1 christos static void
304 1.1 christos dt_msg_fill_net(struct dt_msg *dm,
305 1.1 christos struct sockaddr_storage *ss,
306 1.1 christos enum comm_point_type cptype,
307 1.1 christos ProtobufCBinaryData *addr, protobuf_c_boolean *has_addr,
308 1.1 christos uint32_t *port, protobuf_c_boolean *has_port)
309 1.1 christos {
310 1.1 christos log_assert(ss->ss_family == AF_INET6 || ss->ss_family == AF_INET);
311 1.1 christos if (ss->ss_family == AF_INET6) {
312 1.1 christos struct sockaddr_in6 *s = (struct sockaddr_in6 *) ss;
313 1.1 christos
314 1.1 christos /* socket_family */
315 1.1 christos dm->m.socket_family = DNSTAP__SOCKET_FAMILY__INET6;
316 1.1 christos dm->m.has_socket_family = 1;
317 1.1 christos
318 1.1 christos /* addr: query_address or response_address */
319 1.1 christos addr->data = s->sin6_addr.s6_addr;
320 1.1 christos addr->len = 16; /* IPv6 */
321 1.1 christos *has_addr = 1;
322 1.1 christos
323 1.1 christos /* port: query_port or response_port */
324 1.1 christos *port = ntohs(s->sin6_port);
325 1.1 christos *has_port = 1;
326 1.1 christos } else if (ss->ss_family == AF_INET) {
327 1.1 christos struct sockaddr_in *s = (struct sockaddr_in *) ss;
328 1.1 christos
329 1.1 christos /* socket_family */
330 1.1 christos dm->m.socket_family = DNSTAP__SOCKET_FAMILY__INET;
331 1.1 christos dm->m.has_socket_family = 1;
332 1.1 christos
333 1.1 christos /* addr: query_address or response_address */
334 1.1 christos addr->data = (uint8_t *) &s->sin_addr.s_addr;
335 1.1 christos addr->len = 4; /* IPv4 */
336 1.1 christos *has_addr = 1;
337 1.1 christos
338 1.1 christos /* port: query_port or response_port */
339 1.1 christos *port = ntohs(s->sin_port);
340 1.1 christos *has_port = 1;
341 1.1 christos }
342 1.1 christos
343 1.1 christos log_assert(cptype == comm_udp || cptype == comm_tcp);
344 1.1 christos if (cptype == comm_udp) {
345 1.1 christos /* socket_protocol */
346 1.1 christos dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__UDP;
347 1.1 christos dm->m.has_socket_protocol = 1;
348 1.1 christos } else if (cptype == comm_tcp) {
349 1.1 christos /* socket_protocol */
350 1.1 christos dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__TCP;
351 1.1 christos dm->m.has_socket_protocol = 1;
352 1.1 christos }
353 1.1 christos }
354 1.1 christos
355 1.1 christos void
356 1.1 christos dt_msg_send_client_query(struct dt_env *env,
357 1.1 christos struct sockaddr_storage *qsock,
358 1.1 christos enum comm_point_type cptype,
359 1.1 christos sldns_buffer *qmsg)
360 1.1 christos {
361 1.1 christos struct dt_msg dm;
362 1.1 christos struct timeval qtime;
363 1.1 christos
364 1.1 christos gettimeofday(&qtime, NULL);
365 1.1 christos
366 1.1 christos /* type */
367 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__CLIENT_QUERY);
368 1.1 christos
369 1.1 christos /* query_time */
370 1.1 christos dt_fill_timeval(&qtime,
371 1.1 christos &dm.m.query_time_sec, &dm.m.has_query_time_sec,
372 1.1 christos &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);
373 1.1 christos
374 1.1 christos /* query_message */
375 1.1 christos dt_fill_buffer(qmsg, &dm.m.query_message, &dm.m.has_query_message);
376 1.1 christos
377 1.1 christos /* socket_family, socket_protocol, query_address, query_port */
378 1.1 christos log_assert(cptype == comm_udp || cptype == comm_tcp);
379 1.1 christos dt_msg_fill_net(&dm, qsock, cptype,
380 1.1 christos &dm.m.query_address, &dm.m.has_query_address,
381 1.1 christos &dm.m.query_port, &dm.m.has_query_port);
382 1.1 christos
383 1.1 christos if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
384 1.1 christos dt_send(env, dm.buf, dm.len_buf);
385 1.1 christos }
386 1.1 christos
387 1.1 christos void
388 1.1 christos dt_msg_send_client_response(struct dt_env *env,
389 1.1 christos struct sockaddr_storage *qsock,
390 1.1 christos enum comm_point_type cptype,
391 1.1 christos sldns_buffer *rmsg)
392 1.1 christos {
393 1.1 christos struct dt_msg dm;
394 1.1 christos struct timeval rtime;
395 1.1 christos
396 1.1 christos gettimeofday(&rtime, NULL);
397 1.1 christos
398 1.1 christos /* type */
399 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__CLIENT_RESPONSE);
400 1.1 christos
401 1.1 christos /* response_time */
402 1.1 christos dt_fill_timeval(&rtime,
403 1.1 christos &dm.m.response_time_sec, &dm.m.has_response_time_sec,
404 1.1 christos &dm.m.response_time_nsec, &dm.m.has_response_time_nsec);
405 1.1 christos
406 1.1 christos /* response_message */
407 1.1 christos dt_fill_buffer(rmsg, &dm.m.response_message, &dm.m.has_response_message);
408 1.1 christos
409 1.1 christos /* socket_family, socket_protocol, query_address, query_port */
410 1.1 christos log_assert(cptype == comm_udp || cptype == comm_tcp);
411 1.1 christos dt_msg_fill_net(&dm, qsock, cptype,
412 1.1 christos &dm.m.query_address, &dm.m.has_query_address,
413 1.1 christos &dm.m.query_port, &dm.m.has_query_port);
414 1.1 christos
415 1.1 christos if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
416 1.1 christos dt_send(env, dm.buf, dm.len_buf);
417 1.1 christos }
418 1.1 christos
419 1.1 christos void
420 1.1 christos dt_msg_send_outside_query(struct dt_env *env,
421 1.1 christos struct sockaddr_storage *rsock,
422 1.1 christos enum comm_point_type cptype,
423 1.1 christos uint8_t *zone, size_t zone_len,
424 1.1 christos sldns_buffer *qmsg)
425 1.1 christos {
426 1.1 christos struct dt_msg dm;
427 1.1 christos struct timeval qtime;
428 1.1 christos uint16_t qflags;
429 1.1 christos
430 1.1 christos gettimeofday(&qtime, NULL);
431 1.1 christos qflags = sldns_buffer_read_u16_at(qmsg, 2);
432 1.1 christos
433 1.1 christos /* type */
434 1.1 christos if (qflags & BIT_RD) {
435 1.1 christos if (!env->log_forwarder_query_messages)
436 1.1 christos return;
437 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__FORWARDER_QUERY);
438 1.1 christos } else {
439 1.1 christos if (!env->log_resolver_query_messages)
440 1.1 christos return;
441 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__RESOLVER_QUERY);
442 1.1 christos }
443 1.1 christos
444 1.1 christos /* query_zone */
445 1.1 christos dm.m.query_zone.data = zone;
446 1.1 christos dm.m.query_zone.len = zone_len;
447 1.1 christos dm.m.has_query_zone = 1;
448 1.1 christos
449 1.1 christos /* query_time_sec, query_time_nsec */
450 1.1 christos dt_fill_timeval(&qtime,
451 1.1 christos &dm.m.query_time_sec, &dm.m.has_query_time_sec,
452 1.1 christos &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);
453 1.1 christos
454 1.1 christos /* query_message */
455 1.1 christos dt_fill_buffer(qmsg, &dm.m.query_message, &dm.m.has_query_message);
456 1.1 christos
457 1.1 christos /* socket_family, socket_protocol, response_address, response_port */
458 1.1 christos log_assert(cptype == comm_udp || cptype == comm_tcp);
459 1.1 christos dt_msg_fill_net(&dm, rsock, cptype,
460 1.1 christos &dm.m.response_address, &dm.m.has_response_address,
461 1.1 christos &dm.m.response_port, &dm.m.has_response_port);
462 1.1 christos
463 1.1 christos if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
464 1.1 christos dt_send(env, dm.buf, dm.len_buf);
465 1.1 christos }
466 1.1 christos
467 1.1 christos void
468 1.1 christos dt_msg_send_outside_response(struct dt_env *env,
469 1.1 christos struct sockaddr_storage *rsock,
470 1.1 christos enum comm_point_type cptype,
471 1.1 christos uint8_t *zone, size_t zone_len,
472 1.1 christos uint8_t *qbuf, size_t qbuf_len,
473 1.1 christos const struct timeval *qtime,
474 1.1 christos const struct timeval *rtime,
475 1.1 christos sldns_buffer *rmsg)
476 1.1 christos {
477 1.1 christos struct dt_msg dm;
478 1.1 christos uint16_t qflags;
479 1.1 christos
480 1.1 christos log_assert(qbuf_len >= sizeof(qflags));
481 1.1 christos memcpy(&qflags, qbuf, sizeof(qflags));
482 1.1 christos qflags = ntohs(qflags);
483 1.1 christos
484 1.1 christos /* type */
485 1.1 christos if (qflags & BIT_RD) {
486 1.1 christos if (!env->log_forwarder_response_messages)
487 1.1 christos return;
488 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__FORWARDER_RESPONSE);
489 1.1 christos } else {
490 1.1 christos if (!env->log_resolver_response_messages)
491 1.1 christos return;
492 1.1 christos dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__RESOLVER_RESPONSE);
493 1.1 christos }
494 1.1 christos
495 1.1 christos /* query_zone */
496 1.1 christos dm.m.query_zone.data = zone;
497 1.1 christos dm.m.query_zone.len = zone_len;
498 1.1 christos dm.m.has_query_zone = 1;
499 1.1 christos
500 1.1 christos /* query_time_sec, query_time_nsec */
501 1.1 christos dt_fill_timeval(qtime,
502 1.1 christos &dm.m.query_time_sec, &dm.m.has_query_time_sec,
503 1.1 christos &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);
504 1.1 christos
505 1.1 christos /* response_time_sec, response_time_nsec */
506 1.1 christos dt_fill_timeval(rtime,
507 1.1 christos &dm.m.response_time_sec, &dm.m.has_response_time_sec,
508 1.1 christos &dm.m.response_time_nsec, &dm.m.has_response_time_nsec);
509 1.1 christos
510 1.1 christos /* response_message */
511 1.1 christos dt_fill_buffer(rmsg, &dm.m.response_message, &dm.m.has_response_message);
512 1.1 christos
513 1.1 christos /* socket_family, socket_protocol, response_address, response_port */
514 1.1 christos log_assert(cptype == comm_udp || cptype == comm_tcp);
515 1.1 christos dt_msg_fill_net(&dm, rsock, cptype,
516 1.1 christos &dm.m.response_address, &dm.m.has_response_address,
517 1.1 christos &dm.m.response_port, &dm.m.has_response_port);
518 1.1 christos
519 1.1 christos if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
520 1.1 christos dt_send(env, dm.buf, dm.len_buf);
521 1.1 christos }
522 1.1 christos
523 1.1 christos #endif /* USE_DNSTAP */
524