Compare commits

..

No commits in common. "c56789e19396837c00865ec020edf4a8af39ad48" and "0752a7e443c6501a70e7654c313016d121df74bf" have entirely different histories.

5 changed files with 21 additions and 69 deletions

View File

@ -13,13 +13,10 @@ import (
"github.com/miekg/dns" "github.com/miekg/dns"
) )
var localresponderConfigName string
type stringarray []string type stringarray []string
type urlsMap map[string]stringarray type urlsMap map[string]stringarray
func init() { func init() {
localresponderConfigName = "__localresponder__"
var MyConfRaw interface{} var MyConfRaw interface{}
file, err := ioutil.ReadFile("config.json") file, err := ioutil.ReadFile("config.json")
@ -110,14 +107,9 @@ func init() {
conf.ZabovUpDNS = confRaw["upstream"].(string) conf.ZabovUpDNS = confRaw["upstream"].(string)
conf.ZabovSingleBL = confRaw["singlefilters"].(string) conf.ZabovSingleBL = confRaw["singlefilters"].(string)
conf.ZabovDoubleBL = confRaw["doublefilters"].(string) conf.ZabovDoubleBL = confRaw["doublefilters"].(string)
conf.ZabovAddBL = net.ParseIP(confRaw["blackholeip"].(string)) conf.ZabovAddBL = confRaw["blackholeip"].(string)
conf.ZabovHostsFile = confRaw["hostsfile"].(string) conf.ZabovHostsFile = confRaw["hostsfile"].(string)
if confRaw["cache"] != nil {
conf.ZabovCache = confRaw["cache"].(bool)
} else {
conf.ZabovCache = true
}
conf.ZabovDNSArray = fileByLines(conf.ZabovUpDNS) conf.ZabovDNSArray = fileByLines(conf.ZabovUpDNS)
ZabovConfigs[name] = &conf ZabovConfigs[name] = &conf
@ -224,16 +216,8 @@ func init() {
} }
groupStruct.ips = append(groupStruct.ips, ip) groupStruct.ips = append(groupStruct.ips, ip)
} }
if groupMap["cfg"] != nil { groupStruct.cfg = groupMap["cfg"].(string)
groupStruct.cfg = groupMap["cfg"].(string) groupStruct.timetable = groupMap["timetable"].(string)
}
if groupMap["timetable"] != nil {
groupStruct.timetable = groupMap["timetable"].(string)
}
if len(groupStruct.cfg) == 0 && len(groupStruct.timetable) == 0 {
log.Println("ip group error: specify cfg or timetable")
os.Exit(1)
}
if len(groupStruct.cfg) > 0 { if len(groupStruct.cfg) > 0 {
refConfig, ok := ZabovConfigs[groupStruct.cfg] refConfig, ok := ZabovConfigs[groupStruct.cfg]
if !ok { if !ok {
@ -242,17 +226,14 @@ func init() {
} else { } else {
refConfig.references++ refConfig.references++
} }
fmt.Println("cfg:", groupStruct.cfg)
} }
if len(groupStruct.timetable) > 0 { fmt.Println("cfg:", groupStruct.cfg)
fmt.Println("timetable:", groupStruct.timetable) fmt.Println("timetable:", groupStruct.timetable)
_, ok := ZabovTimetables[groupStruct.timetable] _, ok := ZabovTimetables[groupStruct.timetable]
if !ok { if !ok {
log.Println("inexistent timetable:", groupStruct.timetable) log.Println("inexistent timetable:", groupStruct.timetable)
os.Exit(1) os.Exit(1)
}
} }
ZabovIPGroups = append(ZabovIPGroups, groupStruct) ZabovIPGroups = append(ZabovIPGroups, groupStruct)
} }
} }
@ -267,7 +248,7 @@ func init() {
} }
//************************ //************************
// Local responder section // Local responser section
//************************ //************************
if MyConf["localresponder"] != nil { if MyConf["localresponder"] != nil {
localresponder := MyConf["localresponder"].(map[string]interface{}) localresponder := MyConf["localresponder"].(map[string]interface{})
@ -277,7 +258,7 @@ func init() {
ZabovLocalResponder = localresponder["responder"].(string) ZabovLocalResponder = localresponder["responder"].(string)
if len(ZabovLocalResponder) > 0 { if len(ZabovLocalResponder) > 0 {
local := ZabovConfig{ZabovDNSArray: []string{ZabovLocalResponder}, references: 1} local := ZabovConfig{ZabovDNSArray: []string{ZabovLocalResponder}, references: 1}
ZabovConfigs[localresponderConfigName] = &local ZabovConfigs["__localresponder__"] = &local
fmt.Println("ZabovLocalResponder:", ZabovLocalResponder) fmt.Println("ZabovLocalResponder:", ZabovLocalResponder)
} }
} }

View File

@ -62,8 +62,7 @@ Minimal config file should look like:
"singlefilters":"./urls-domains.txt", "singlefilters":"./urls-domains.txt",
"doublefilters":"./urls-hosts.txt", "doublefilters":"./urls-hosts.txt",
"blackholeip":"127.0.0.1", "blackholeip":"127.0.0.1",
"hostsfile":"./urls-local.txt", "hostsfile":"./urls-local.txt"
"cache":true
}, },
} }
} }
@ -85,7 +84,7 @@ configs:
- doublefilters: name of the file, for blacklists following the "doublefilter" schema.(one URL per line) - doublefilters: name of the file, for blacklists following the "doublefilter" schema.(one URL per line)
- blackholeip: IP address to return when the IP is banned. This is because you may want to avoid MX issues, mail loops on localhost, or you have a web server running on localhost - blackholeip: IP address to return when the IP is banned. This is because you may want to avoid MX issues, mail loops on localhost, or you have a web server running on localhost
- hostsfile: path where you keep your local blacklistfile : this is in the format "singlefilter", meaning one domain per line, unlike hosts file. - hostsfile: path where you keep your local blacklistfile : this is in the format "singlefilter", meaning one domain per line, unlike hosts file.
- cache: if set to false disable the cache for this configuration. Boolean, defaults true
Advanced configuration includes support for multiple configurations based on IP Source and timetables: Advanced configuration includes support for multiple configurations based on IP Source and timetables:
<pre> <pre>
@ -105,7 +104,6 @@ Advanced configuration includes support for multiple configurations based on IP
}, },
"ipaliases":{ "ipaliases":{
"pc8":"192.168.178.29", "pc8":"192.168.178.29",
"lg-tv":"192.168.178.10",
"localhost":"127.0.0.1" "localhost":"127.0.0.1"
}, },
"ipgroups":[ "ipgroups":[
@ -113,11 +111,6 @@ Advanced configuration includes support for multiple configurations based on IP
"ips":["localhost", "::1", "192.168.178.30", "192.168.178.31", "pc8"], "ips":["localhost", "::1", "192.168.178.30", "192.168.178.31", "pc8"],
"cfg":"", "cfg":"",
"timetable":"tt_children" "timetable":"tt_children"
},
{
"ips":["lg-tv"],
"cfg":"tv",
"timetable":""
} }
], ],
"timetables":{ "timetables":{
@ -153,14 +146,6 @@ Advanced configuration includes support for multiple configurations based on IP
"doublefilters":"./urls-hosts-restricted.txt", "doublefilters":"./urls-hosts-restricted.txt",
"blackholeip":"127.0.0.1", "blackholeip":"127.0.0.1",
"hostsfile":"./urls-local.txt" "hostsfile":"./urls-local.txt"
},
"tv":{
"upstream":"./dns-upstream.txt",
"singlefilters":"",
"doublefilters":"",
"blackholeip":"127.0.0.1",
"hostsfile":"",
"cache":false
} }
} }
} }

View File

@ -2,7 +2,6 @@ package main
import ( import (
"fmt" "fmt"
"log"
"time" "time"
"math/rand" "math/rand"
@ -15,9 +14,7 @@ import (
//first server to answer wins //first server to answer wins
//accepts config name to select the UP DNS source list //accepts config name to select the UP DNS source list
func ForwardQuery(query *dns.Msg, config string, nocache bool) *dns.Msg { func ForwardQuery(query *dns.Msg, config string, nocache bool) *dns.Msg {
if ZabovDebug {
log.Println("ForwardQuery: nocache", nocache)
}
go incrementStats("ForwardQueries", 1) go incrementStats("ForwardQueries", 1)
r := new(dns.Msg) r := new(dns.Msg)
@ -32,10 +29,6 @@ func ForwardQuery(query *dns.Msg, config string, nocache bool) *dns.Msg {
go incrementStats("CacheHit", 1) go incrementStats("CacheHit", 1)
cached.SetReply(query) cached.SetReply(query)
cached.Authoritative = true cached.Authoritative = true
if ZabovDebug {
log.Println("ForwardQuery: CacheHit")
}
cached.Compress = true
return cached return cached
} }
@ -49,8 +42,7 @@ func ForwardQuery(query *dns.Msg, config string, nocache bool) *dns.Msg {
for { for {
// round robin with retry // round robin with retry
// local responder should always be available also if no internet connection if !NetworkUp {
if !NetworkUp && localresponderConfigName != config {
time.Sleep(10 * time.Second) time.Sleep(10 * time.Second)
go incrementStats("Network Problems ", 1) go incrementStats("Network Problems ", 1)
continue continue
@ -67,12 +59,7 @@ func ForwardQuery(query *dns.Msg, config string, nocache bool) *dns.Msg {
go incrementStats(d, 1) go incrementStats(d, 1)
in.SetReply(query) in.SetReply(query)
in.Authoritative = true in.Authoritative = true
in.Compress = true
go DomainCache(lfqdn, in) go DomainCache(lfqdn, in)
if ZabovDebug {
log.Println("ForwardQuery: OK!")
}
return in return in
} }

View File

@ -269,7 +269,7 @@ func (mydns *handler) ServeDNS(w dns.ResponseWriter, r *dns.Msg) {
if len(ZabovLocalResponder) > 0 { if len(ZabovLocalResponder) > 0 {
if !strings.Contains(fqdn, ".") || if !strings.Contains(fqdn, ".") ||
(len(ZabovLocalDomain) > 0 && strings.HasSuffix(fqdn, ZabovLocalDomain)) { (len(ZabovLocalDomain) > 0 && strings.HasSuffix(fqdn, ZabovLocalDomain)) {
config = localresponderConfigName config = "__localresponder__"
ret := ForwardQuery(r, config, true) ret := ForwardQuery(r, config, true)
w.WriteMsg(ret) w.WriteMsg(ret)
go logQuery(remIP, fqdn, QType, config, timetable, "localresponder") go logQuery(remIP, fqdn, QType, config, timetable, "localresponder")
@ -282,12 +282,12 @@ func (mydns *handler) ServeDNS(w dns.ResponseWriter, r *dns.Msg) {
msg.Answer = append(msg.Answer, &dns.A{ msg.Answer = append(msg.Answer, &dns.A{
Hdr: dns.RR_Header{Name: domain, Rrtype: dns.TypeA, Class: dns.ClassINET, Ttl: 60}, Hdr: dns.RR_Header{Name: domain, Rrtype: dns.TypeA, Class: dns.ClassINET, Ttl: 60},
A: ZabovConfig.ZabovAddBL, A: net.ParseIP(ZabovConfig.ZabovAddBL),
}) })
go logQuery(remIP, fqdn, QType, config, timetable, "killed") go logQuery(remIP, fqdn, QType, config, timetable, "killed")
} else { } else {
go logQuery(remIP, fqdn, QType, config, timetable, "forwarded") go logQuery(remIP, fqdn, QType, config, timetable, "forwarded")
ret := ForwardQuery(r, config, !ZabovConfig.ZabovCache) ret := ForwardQuery(r, config, false)
w.WriteMsg(ret) w.WriteMsg(ret)
} }
case dns.TypePTR: case dns.TypePTR:
@ -297,13 +297,13 @@ func (mydns *handler) ServeDNS(w dns.ResponseWriter, r *dns.Msg) {
if len(ZabovLocalResponder) > 0 { if len(ZabovLocalResponder) > 0 {
// if set use local responder for reverse lookup (suffix ".in-addr.arpa.") // if set use local responder for reverse lookup (suffix ".in-addr.arpa.")
config = localresponderConfigName config = "__localresponder__"
} }
ret := ForwardQuery(r, config, true) ret := ForwardQuery(r, config, true)
w.WriteMsg(ret) w.WriteMsg(ret)
go logQuery(remIP, msg.Question[0].Name, QType, config, timetable, "localresponder") go logQuery(remIP, msg.Question[0].Name, QType, config, timetable, "localresponder")
default: default:
ret := ForwardQuery(r, config, !ZabovConfig.ZabovCache) ret := ForwardQuery(r, config, false)
w.WriteMsg(ret) w.WriteMsg(ret)
if len(ZabovDebugDBPath) > 0 { if len(ZabovDebugDBPath) > 0 {
go logQuery(remIP, msg.Question[0].Name, QType, config, timetable, "forwarded") go logQuery(remIP, msg.Question[0].Name, QType, config, timetable, "forwarded")

View File

@ -37,11 +37,10 @@ type handler struct{}
type ZabovConfig struct { type ZabovConfig struct {
ZabovSingleBL string // json:singlefilters -> ZabovSingleBL list of urls returning a file with just names of domains ZabovSingleBL string // json:singlefilters -> ZabovSingleBL list of urls returning a file with just names of domains
ZabovDoubleBL string // json:doublefilters -> ZabovDoubleBL list of urls returning a file with IP<space>domain ZabovDoubleBL string // json:doublefilters -> ZabovDoubleBL list of urls returning a file with IP<space>domain
ZabovAddBL net.IP // json:blackholeip -> ZabovAddBL is the IP we want to send all the clients to. Usually is 127.0.0.1 ZabovAddBL string // json:blackholeip -> ZabovAddBL is the IP we want to send all the clients to. Usually is 127.0.0.1
ZabovHostsFile string // json:hostsfile -> ZabovHostsFile is the file we use to keep our hosts ZabovHostsFile string // json:hostsfile -> ZabovHostsFile is the file we use to keep our hosts
ZabovUpDNS string // json:upstream -> ZabovUpDNS keeps the name of upstream DNSs ZabovUpDNS string // json:upstream -> ZabovUpDNS keeps the name of upstream DNSs
ZabovDNSArray []string // contains all the DNS we mention, parsed from ZabovUpDNS file ZabovDNSArray []string // contains all the DNS we mention, parsed from ZabovUpDNS file
ZabovCache bool // allows to disable cache
references int // contains references to this config; if zero, config shall be removed references int // contains references to this config; if zero, config shall be removed
} }