* feat: recursive resolution + full DNSSEC validation Numa becomes a true DNS resolver — resolves from root nameservers with complete DNSSEC chain-of-trust verification. Recursive resolution: - Iterative RFC 1034 from configurable root hints (13 default) - CNAME chasing (depth 8), referral following (depth 10) - A+AAAA glue extraction, IPv6 nameserver support - TLD priming: NS + DS + DNSKEY for 34 gTLDs + EU ccTLDs - Config: mode = "recursive" in [upstream], root_hints, prime_tlds DNSSEC (all 4 phases): - EDNS0 OPT pseudo-record (DO bit, 1232 payload per DNS Flag Day 2020) - DNSKEY, DS, RRSIG, NSEC, NSEC3 record types with wire read/write - Signature verification via ring: RSA/SHA-256, ECDSA P-256, Ed25519 - Chain-of-trust: zone DNSKEY → parent DS → root KSK (key tag 20326) - DNSKEY RRset self-signature verification (RRSIG(DNSKEY) by KSK) - RRSIG expiration/inception time validation - NSEC: NXDOMAIN gap proofs, NODATA type absence, wildcard denial - NSEC3: SHA-1 iterated hashing, closest encloser proof, hash range - Authority RRSIG verification for denial proofs - Config: [dnssec] enabled/strict (default false, opt-in) - AD bit on Secure, SERVFAIL on Bogus+strict - DnssecStatus cached per entry, ValidationStats logging Performance: - TLD chain pre-warmed on startup (root DNSKEY + TLD DS/DNSKEY) - Referral DS piggybacking from authority sections - DNSKEY prefetch before validation loop - Cold-cache validation: ~1 DNSKEY fetch (down from 5) - Benchmarks: RSA 10.9µs, ECDSA 174ns, DS verify 257ns Also: - write_qname fix for root domain "." (was producing malformed queries) - write_record_header() dedup, write_bytes() bulk writes - DnsRecord::domain() + query_type() accessors - UpstreamMode enum, DEFAULT_EDNS_PAYLOAD const - Real glue TTL (was hardcoded 3600) - DNSSEC restricted to recursive mode only Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * feat: TCP fallback, query minimization, UDP auto-disable Transport resilience for restrictive networks (ISPs blocking UDP:53): - DNS-over-TCP fallback: UDP fail/truncation → automatic TCP retry - UDP auto-disable: after 3 consecutive failures, switch to TCP-first - IPv6 → TCP directly (UDP socket binds 0.0.0.0, can't reach IPv6) - Network change resets UDP detection for re-probing - Root hint rotation in TLD priming Privacy: - RFC 7816 query minimization: root servers see TLD only, not full name Code quality: - Merged find_starting_ns + find_starting_zone → find_closest_ns - Extracted resolve_ns_addrs_from_glue shared helper - Removed overall timeout wrapper (per-hop timeouts sufficient) - forward_tcp for DNS-over-TCP (RFC 1035 §4.2.2) Testing: - Mock TCP-only DNS server for fallback tests (no network needed) - tcp_fallback_resolves_when_udp_blocked - tcp_only_iterative_resolution - tcp_fallback_handles_nxdomain - udp_auto_disable_resets - Integration test suite (4 suites, 51 tests) - Network probe script (tests/network-probe.sh) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat: DNSSEC verified badge in dashboard query log - Add dnssec field to QueryLogEntry, track validation status per query - DnssecStatus::as_str() for API serialization - Dashboard shows green checkmark next to DNSSEC-verified responses - Blog post: add "How keys get there" section, transport resilience section, trim code blocks, update What's Next Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix: use SVG shield for DNSSEC badge, update blog HTML Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix: NS cache lookup from authorities, UDP re-probe, shield alignment - find_closest_ns checks authorities (not just answers) for NS records, fixing TLD priming cache misses that caused redundant root queries - Periodic UDP re-probe every 5min when disabled — re-enables UDP after switching from a restrictive network to an open one - Dashboard DNSSEC shield uses fixed-width container for alignment - Blog post: tuck key-tag into trust anchor paragraph Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix: TCP single-write, mock server consistency, integration tests - TCP single-write fix: combine length prefix + message to avoid split segments that Microsoft/Azure DNS servers reject - Mock server (spawn_tcp_dns_server) updated to use single-write too - Tests: forward_tcp_wire_format, forward_tcp_single_segment_write - Integration: real-server checks for Microsoft/Office/Azure domains Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat: recursive bar in dashboard, special-use domain interception Dashboard: - Add Recursive bar to resolution paths chart (cyan, distinct from Override) - Add RECURSIVE path tag style in query log Special-use domains (RFC 6761/6303/8880/9462): - .localhost → 127.0.0.1 (RFC 6761) - Private reverse PTR (10.x, 192.168.x, 172.16-31.x) → NXDOMAIN - _dns.resolver.arpa (DDR) → NXDOMAIN - ipv4only.arpa (NAT64) → 192.0.0.170/171 - mDNS service discovery for private ranges → NXDOMAIN Eliminates ~900ms SERVFAILs for macOS system queries that were hitting root servers unnecessarily. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * chore: move generated blog HTML to site/blog/posts/, gitignore - Generated HTML now in site/blog/posts/ (gitignored) - CI workflow runs pandoc + make blog before deploy - Updated all internal blog links to /blog/posts/ path - blog/*.md remains the source of truth Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix: review feedback — memory ordering, RRSIG time, NS resolution - Ordering::Relaxed → Acquire/Release for UDP_DISABLED/UDP_FAILURES (ARM correctness for cross-thread coordination) - RRSIG time validation: serial number arithmetic (RFC 4034 §3.1.5) + 300s clock skew fudge factor (matches BIND) - resolve_ns_addrs_from_glue collects addresses from ALL NS names, not just the first with glue (improves failover) - is_special_use_domain: eliminate 16 format! allocations per .in-addr.arpa query (parse octet instead) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat: API endpoint tests, coverage target - 8 new axum handler tests: health, stats, query-log, overrides CRUD, cache, blocking stats, services CRUD, dashboard HTML - Tests use tower::oneshot — no network, no server startup - test_ctx() builds minimal ServerCtx for isolated testing - `make coverage` target (cargo-tarpaulin), separate from `make all` - 82 total tests (was 74) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
197 lines
5.3 KiB
Rust
197 lines
5.3 KiB
Rust
use std::collections::HashMap;
|
|
use std::time::{Duration, Instant};
|
|
|
|
use crate::packet::DnsPacket;
|
|
use crate::question::QueryType;
|
|
use crate::record::DnsRecord;
|
|
|
|
#[derive(Clone, Copy, Debug, Default, PartialEq, Eq)]
|
|
pub enum DnssecStatus {
|
|
Secure,
|
|
Insecure,
|
|
Bogus,
|
|
#[default]
|
|
Indeterminate,
|
|
}
|
|
|
|
impl DnssecStatus {
|
|
pub fn as_str(&self) -> &'static str {
|
|
match self {
|
|
DnssecStatus::Secure => "secure",
|
|
DnssecStatus::Insecure => "insecure",
|
|
DnssecStatus::Bogus => "bogus",
|
|
DnssecStatus::Indeterminate => "indeterminate",
|
|
}
|
|
}
|
|
}
|
|
|
|
struct CacheEntry {
|
|
packet: DnsPacket,
|
|
inserted_at: Instant,
|
|
ttl: Duration,
|
|
dnssec_status: DnssecStatus,
|
|
}
|
|
|
|
/// DNS cache using a two-level map (domain -> query_type -> entry) so that
|
|
/// lookups can borrow `&str` instead of allocating a `String` key.
|
|
pub struct DnsCache {
|
|
entries: HashMap<String, HashMap<QueryType, CacheEntry>>,
|
|
entry_count: usize,
|
|
max_entries: usize,
|
|
min_ttl: u32,
|
|
max_ttl: u32,
|
|
}
|
|
|
|
impl DnsCache {
|
|
pub fn new(max_entries: usize, min_ttl: u32, max_ttl: u32) -> Self {
|
|
DnsCache {
|
|
entries: HashMap::new(),
|
|
entry_count: 0,
|
|
max_entries,
|
|
min_ttl,
|
|
max_ttl,
|
|
}
|
|
}
|
|
|
|
/// Read-only lookup — expired entries are left in place (cleaned up on insert).
|
|
pub fn lookup(&self, domain: &str, qtype: QueryType) -> Option<DnsPacket> {
|
|
self.lookup_with_status(domain, qtype).map(|(pkt, _)| pkt)
|
|
}
|
|
|
|
pub fn lookup_with_status(
|
|
&self,
|
|
domain: &str,
|
|
qtype: QueryType,
|
|
) -> Option<(DnsPacket, DnssecStatus)> {
|
|
let type_map = self.entries.get(domain)?;
|
|
let entry = type_map.get(&qtype)?;
|
|
|
|
let elapsed = entry.inserted_at.elapsed();
|
|
if elapsed >= entry.ttl {
|
|
return None;
|
|
}
|
|
|
|
let remaining_secs = (entry.ttl - elapsed).as_secs() as u32;
|
|
let remaining = remaining_secs.max(1);
|
|
|
|
let mut packet = entry.packet.clone();
|
|
adjust_ttls(&mut packet.answers, remaining);
|
|
adjust_ttls(&mut packet.authorities, remaining);
|
|
adjust_ttls(&mut packet.resources, remaining);
|
|
|
|
Some((packet, entry.dnssec_status))
|
|
}
|
|
|
|
pub fn insert(&mut self, domain: &str, qtype: QueryType, packet: &DnsPacket) {
|
|
self.insert_with_status(domain, qtype, packet, DnssecStatus::Indeterminate);
|
|
}
|
|
|
|
pub fn insert_with_status(
|
|
&mut self,
|
|
domain: &str,
|
|
qtype: QueryType,
|
|
packet: &DnsPacket,
|
|
dnssec_status: DnssecStatus,
|
|
) {
|
|
if self.entry_count >= self.max_entries {
|
|
self.evict_expired();
|
|
if self.entry_count >= self.max_entries {
|
|
return;
|
|
}
|
|
}
|
|
|
|
let min_ttl = extract_min_ttl(&packet.answers)
|
|
.unwrap_or(self.min_ttl)
|
|
.clamp(self.min_ttl, self.max_ttl);
|
|
|
|
let type_map = if let Some(existing) = self.entries.get_mut(domain) {
|
|
existing
|
|
} else {
|
|
self.entries.entry(domain.to_string()).or_default()
|
|
};
|
|
|
|
if !type_map.contains_key(&qtype) {
|
|
self.entry_count += 1;
|
|
}
|
|
|
|
type_map.insert(
|
|
qtype,
|
|
CacheEntry {
|
|
packet: packet.clone(),
|
|
inserted_at: Instant::now(),
|
|
ttl: Duration::from_secs(min_ttl as u64),
|
|
dnssec_status,
|
|
},
|
|
);
|
|
}
|
|
|
|
pub fn len(&self) -> usize {
|
|
self.entry_count
|
|
}
|
|
|
|
pub fn is_empty(&self) -> bool {
|
|
self.entry_count == 0
|
|
}
|
|
|
|
pub fn max_entries(&self) -> usize {
|
|
self.max_entries
|
|
}
|
|
|
|
pub fn clear(&mut self) {
|
|
self.entries.clear();
|
|
self.entry_count = 0;
|
|
}
|
|
|
|
pub fn remove(&mut self, domain: &str) {
|
|
let domain_lower = domain.to_lowercase();
|
|
if let Some(type_map) = self.entries.remove(&domain_lower) {
|
|
self.entry_count -= type_map.len();
|
|
}
|
|
}
|
|
|
|
pub fn list(&self) -> Vec<CacheInfo> {
|
|
let mut result = Vec::new();
|
|
for (domain, type_map) in &self.entries {
|
|
for (qtype, entry) in type_map {
|
|
let elapsed = entry.inserted_at.elapsed();
|
|
if elapsed < entry.ttl {
|
|
let remaining = (entry.ttl - elapsed).as_secs() as u32;
|
|
result.push(CacheInfo {
|
|
domain: domain.clone(),
|
|
query_type: *qtype,
|
|
ttl_remaining: remaining,
|
|
});
|
|
}
|
|
}
|
|
}
|
|
result
|
|
}
|
|
|
|
fn evict_expired(&mut self) {
|
|
let mut count = 0;
|
|
self.entries.retain(|_, type_map| {
|
|
let before = type_map.len();
|
|
type_map.retain(|_, entry| entry.inserted_at.elapsed() < entry.ttl);
|
|
count += before - type_map.len();
|
|
!type_map.is_empty()
|
|
});
|
|
self.entry_count -= count;
|
|
}
|
|
}
|
|
|
|
pub struct CacheInfo {
|
|
pub domain: String,
|
|
pub query_type: QueryType,
|
|
pub ttl_remaining: u32,
|
|
}
|
|
|
|
fn extract_min_ttl(records: &[DnsRecord]) -> Option<u32> {
|
|
records.iter().map(|r| r.ttl()).min()
|
|
}
|
|
|
|
fn adjust_ttls(records: &mut [DnsRecord], new_ttl: u32) {
|
|
for record in records.iter_mut() {
|
|
record.set_ttl(new_ttl);
|
|
}
|
|
}
|