2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-23 10:39:16 +00:00
bind/lib/ns/server.c

243 lines
5.8 KiB
C
Raw Normal View History

/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
/*! \file */
#include <stdbool.h>
#include <isc/mem.h>
#include <isc/stats.h>
#include <isc/util.h>
#include <dns/stats.h>
#include <dns/tkey.h>
#include <ns/query.h>
#include <ns/server.h>
#include <ns/stats.h>
2020-02-13 14:44:37 -08:00
#define SCTX_MAGIC ISC_MAGIC('S', 'c', 't', 'x')
#define SCTX_VALID(s) ISC_MAGIC_VALID(s, SCTX_MAGIC)
#define CHECKFATAL(op) \
do { \
result = (op); \
RUNTIME_CHECK(result == ISC_R_SUCCESS); \
} while (0)
isc_result_t
ns_server_create(isc_mem_t *mctx, ns_matchview_t matchingview,
2020-02-13 14:44:37 -08:00
ns_server_t **sctxp) {
ns_server_t *sctx;
isc_result_t result;
REQUIRE(sctxp != NULL && *sctxp == NULL);
sctx = isc_mem_get(mctx, sizeof(*sctx));
memset(sctx, 0, sizeof(*sctx));
isc_mem_attach(mctx, &sctx->mctx);
isc_refcount_init(&sctx->references, 1);
2018-11-16 15:45:01 +01:00
isc_quota_init(&sctx->xfroutquota, 10);
isc_quota_init(&sctx->tcpquota, 10);
isc_quota_init(&sctx->recursionquota, 100);
Add (http-)listener-clients option (DoH quota mechanism) This commit adds support for http-listener-clients global options as well as ability to override the default in an HTTP server description, like: http local-http-server { ... listener-clients 100; ... }; This way we have ability to specify per-listener active connections quota globally and then override it when required. This is exactly what AT&T requested us: they wanted a functionality to specify quota globally and then override it for specific IPs. This change functionality makes such a configuration possible. It makes sense: for example, one could have different quotas for internal and external clients. Or, for example, one could use BIND's internal ability to serve encrypted DoH with some sane quota value for internal clients, while having un-encrypted DoH listener without quota to put BIND behind a load balancer doing TLS offloading for external clients. Moreover, the code no more shares the quota with TCP, which makes little sense anyway (see tcp-clients option), because of the nature of interaction of DoH clients: they tend to keep idle opened connections for longer periods of time, preventing the TCP and TLS client from being served. Thus, the need to have a separate, generally larger, quota for them. Also, the change makes any option within "http <name> { ... };" statement optional, making it easier to override only required default options. By default, the DoH connections are limited to 300 per listener. I hope that it is a good initial guesstimate.
2021-05-14 14:18:57 +03:00
ISC_LIST_INIT(sctx->http_quotas);
CHECKFATAL(dns_tkeyctx_create(mctx, &sctx->tkeyctx));
CHECKFATAL(ns_stats_create(mctx, ns_statscounter_max, &sctx->nsstats));
CHECKFATAL(dns_rdatatypestats_create(mctx, &sctx->rcvquerystats));
CHECKFATAL(dns_opcodestats_create(mctx, &sctx->opcodestats));
CHECKFATAL(dns_rcodestats_create(mctx, &sctx->rcodestats));
CHECKFATAL(isc_stats_create(mctx, &sctx->udpinstats4,
dns_sizecounter_in_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->udpoutstats4,
dns_sizecounter_out_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->udpinstats6,
dns_sizecounter_in_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->udpoutstats6,
dns_sizecounter_out_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->tcpinstats4,
dns_sizecounter_in_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->tcpoutstats4,
dns_sizecounter_out_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->tcpinstats6,
dns_sizecounter_in_max));
CHECKFATAL(isc_stats_create(mctx, &sctx->tcpoutstats6,
dns_sizecounter_out_max));
sctx->udpsize = 1232;
sctx->transfer_tcp_message_size = 20480;
sctx->fuzztype = isc_fuzz_none;
sctx->fuzznotify = NULL;
sctx->gethostname = NULL;
sctx->matchingview = matchingview;
sctx->answercookie = true;
ISC_LIST_INIT(sctx->altsecrets);
sctx->magic = SCTX_MAGIC;
*sctxp = sctx;
return (ISC_R_SUCCESS);
}
void
2020-02-13 14:44:37 -08:00
ns_server_attach(ns_server_t *src, ns_server_t **dest) {
REQUIRE(SCTX_VALID(src));
REQUIRE(dest != NULL && *dest == NULL);
isc_refcount_increment(&src->references);
*dest = src;
}
void
2020-02-13 14:44:37 -08:00
ns_server_detach(ns_server_t **sctxp) {
ns_server_t *sctx;
REQUIRE(sctxp != NULL && SCTX_VALID(*sctxp));
sctx = *sctxp;
*sctxp = NULL;
if (isc_refcount_decrement(&sctx->references) == 1) {
ns_altsecret_t *altsecret;
Add (http-)listener-clients option (DoH quota mechanism) This commit adds support for http-listener-clients global options as well as ability to override the default in an HTTP server description, like: http local-http-server { ... listener-clients 100; ... }; This way we have ability to specify per-listener active connections quota globally and then override it when required. This is exactly what AT&T requested us: they wanted a functionality to specify quota globally and then override it for specific IPs. This change functionality makes such a configuration possible. It makes sense: for example, one could have different quotas for internal and external clients. Or, for example, one could use BIND's internal ability to serve encrypted DoH with some sane quota value for internal clients, while having un-encrypted DoH listener without quota to put BIND behind a load balancer doing TLS offloading for external clients. Moreover, the code no more shares the quota with TCP, which makes little sense anyway (see tcp-clients option), because of the nature of interaction of DoH clients: they tend to keep idle opened connections for longer periods of time, preventing the TCP and TLS client from being served. Thus, the need to have a separate, generally larger, quota for them. Also, the change makes any option within "http <name> { ... };" statement optional, making it easier to override only required default options. By default, the DoH connections are limited to 300 per listener. I hope that it is a good initial guesstimate.
2021-05-14 14:18:57 +03:00
isc_quota_t *http_quota;
while ((altsecret = ISC_LIST_HEAD(sctx->altsecrets)) != NULL) {
ISC_LIST_UNLINK(sctx->altsecrets, altsecret, link);
isc_mem_put(sctx->mctx, altsecret, sizeof(*altsecret));
}
isc_quota_destroy(&sctx->recursionquota);
isc_quota_destroy(&sctx->tcpquota);
isc_quota_destroy(&sctx->xfroutquota);
Add (http-)listener-clients option (DoH quota mechanism) This commit adds support for http-listener-clients global options as well as ability to override the default in an HTTP server description, like: http local-http-server { ... listener-clients 100; ... }; This way we have ability to specify per-listener active connections quota globally and then override it when required. This is exactly what AT&T requested us: they wanted a functionality to specify quota globally and then override it for specific IPs. This change functionality makes such a configuration possible. It makes sense: for example, one could have different quotas for internal and external clients. Or, for example, one could use BIND's internal ability to serve encrypted DoH with some sane quota value for internal clients, while having un-encrypted DoH listener without quota to put BIND behind a load balancer doing TLS offloading for external clients. Moreover, the code no more shares the quota with TCP, which makes little sense anyway (see tcp-clients option), because of the nature of interaction of DoH clients: they tend to keep idle opened connections for longer periods of time, preventing the TCP and TLS client from being served. Thus, the need to have a separate, generally larger, quota for them. Also, the change makes any option within "http <name> { ... };" statement optional, making it easier to override only required default options. By default, the DoH connections are limited to 300 per listener. I hope that it is a good initial guesstimate.
2021-05-14 14:18:57 +03:00
http_quota = ISC_LIST_HEAD(sctx->http_quotas);
while (http_quota != NULL) {
isc_quota_t *next = NULL;
next = ISC_LIST_NEXT(http_quota, link);
ISC_LIST_DEQUEUE(sctx->http_quotas, http_quota, link);
isc_quota_destroy(http_quota);
isc_mem_put(sctx->mctx, http_quota,
sizeof(*http_quota));
http_quota = next;
}
2019-07-04 15:45:06 +02:00
if (sctx->server_id != NULL) {
isc_mem_free(sctx->mctx, sctx->server_id);
2019-07-04 15:45:06 +02:00
}
2019-07-04 15:45:06 +02:00
if (sctx->blackholeacl != NULL) {
dns_acl_detach(&sctx->blackholeacl);
2019-07-04 15:45:06 +02:00
}
if (sctx->tkeyctx != NULL) {
dns_tkeyctx_destroy(&sctx->tkeyctx);
2019-07-04 15:45:06 +02:00
}
2019-07-04 15:45:06 +02:00
if (sctx->nsstats != NULL) {
ns_stats_detach(&sctx->nsstats);
2019-07-04 15:45:06 +02:00
}
2019-07-04 15:45:06 +02:00
if (sctx->rcvquerystats != NULL) {
dns_stats_detach(&sctx->rcvquerystats);
2019-07-04 15:45:06 +02:00
}
if (sctx->opcodestats != NULL) {
dns_stats_detach(&sctx->opcodestats);
2019-07-04 15:45:06 +02:00
}
if (sctx->rcodestats != NULL) {
dns_stats_detach(&sctx->rcodestats);
2019-07-04 15:45:06 +02:00
}
2019-07-04 15:45:06 +02:00
if (sctx->udpinstats4 != NULL) {
isc_stats_detach(&sctx->udpinstats4);
2019-07-04 15:45:06 +02:00
}
if (sctx->tcpinstats4 != NULL) {
isc_stats_detach(&sctx->tcpinstats4);
2019-07-04 15:45:06 +02:00
}
if (sctx->udpoutstats4 != NULL) {
isc_stats_detach(&sctx->udpoutstats4);
2019-07-04 15:45:06 +02:00
}
if (sctx->tcpoutstats4 != NULL) {
isc_stats_detach(&sctx->tcpoutstats4);
2019-07-04 15:45:06 +02:00
}
2019-07-04 15:45:06 +02:00
if (sctx->udpinstats6 != NULL) {
isc_stats_detach(&sctx->udpinstats6);
2019-07-04 15:45:06 +02:00
}
if (sctx->tcpinstats6 != NULL) {
isc_stats_detach(&sctx->tcpinstats6);
2019-07-04 15:45:06 +02:00
}
if (sctx->udpoutstats6 != NULL) {
isc_stats_detach(&sctx->udpoutstats6);
2019-07-04 15:45:06 +02:00
}
if (sctx->tcpoutstats6 != NULL) {
isc_stats_detach(&sctx->tcpoutstats6);
2019-07-04 15:45:06 +02:00
}
sctx->magic = 0;
isc_mem_putanddetach(&sctx->mctx, sctx, sizeof(*sctx));
}
}
isc_result_t
2020-02-13 14:44:37 -08:00
ns_server_setserverid(ns_server_t *sctx, const char *serverid) {
REQUIRE(SCTX_VALID(sctx));
if (sctx->server_id != NULL) {
isc_mem_free(sctx->mctx, sctx->server_id);
sctx->server_id = NULL;
}
if (serverid != NULL) {
sctx->server_id = isc_mem_strdup(sctx->mctx, serverid);
}
return (ISC_R_SUCCESS);
}
void
2020-02-13 14:44:37 -08:00
ns_server_setoption(ns_server_t *sctx, unsigned int option, bool value) {
REQUIRE(SCTX_VALID(sctx));
if (value) {
sctx->options |= option;
} else {
sctx->options &= ~option;
}
}
bool
2020-02-13 14:44:37 -08:00
ns_server_getoption(ns_server_t *sctx, unsigned int option) {
REQUIRE(SCTX_VALID(sctx));
return ((sctx->options & option) != 0);
}