// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !js // DNS client: see RFC 1035. // Has to be linked into package net for Dial. // TODO(rsc): // Could potentially handle many outstanding lookups faster. // Random UDP source port (net.Dial should do that for us). // Random request IDs. package adns import ( "bytes" "context" cryptorand "crypto/rand" "errors" "io" "net" "os" "runtime" "sync" "sync/atomic" "time" "golang.org/x/net/dns/dnsmessage" "github.com/mjl-/adns/internal/bytealg" "github.com/mjl-/adns/internal/itoa" ) const ( // to be used as a useTCP parameter to exchange useTCPOnly = true useUDPOrTCP = false // Maximum DNS packet size. // Value taken from https://dnsflagday.net/2020/. maxDNSPacketSize = 1232 ) var ( errLameReferral = errors.New("lame referral") errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message") errCannotMarshalDNSMessage = errors.New("cannot marshal DNS message") errServerMisbehaving = errors.New("server misbehaving") errInvalidDNSResponse = errors.New("invalid DNS response") errNoAnswerFromDNSServer = errors.New("no answer from DNS server") // errServerTemporarilyMisbehaving is like errServerMisbehaving, except // that when it gets translated to a DNSError, the IsTemporary field // gets set to true. errServerTemporarilyMisbehaving = errors.New("server misbehaving") ) func newRequest(q dnsmessage.Question, ad bool) (id uint16, udpReq, tcpReq []byte, err error) { var idbuf [2]byte _, err = cryptorand.Read(idbuf[:]) if err != nil { return 0, nil, nil, err } id = uint16(idbuf[0])<<8 | uint16(idbuf[1]) b := dnsmessage.NewBuilder(make([]byte, 2, 514), dnsmessage.Header{ID: id, RecursionDesired: true, AuthenticData: ad}) if err := b.StartQuestions(); err != nil { return 0, nil, nil, err } if err := b.Question(q); err != nil { return 0, nil, nil, err } // Accept packets up to maxDNSPacketSize. RFC 6891. if err := b.StartAdditionals(); err != nil { return 0, nil, nil, err } var rh dnsmessage.ResourceHeader if err := rh.SetEDNS0(maxDNSPacketSize, dnsmessage.RCodeSuccess, false); err != nil { return 0, nil, nil, err } if err := b.OPTResource(rh, dnsmessage.OPTResource{}); err != nil { return 0, nil, nil, err } tcpReq, err = b.Finish() if err != nil { return 0, nil, nil, err } udpReq = tcpReq[2:] l := len(tcpReq) - 2 tcpReq[0] = byte(l >> 8) tcpReq[1] = byte(l) return id, udpReq, tcpReq, nil } func checkResponse(reqID uint16, reqQues dnsmessage.Question, respHdr dnsmessage.Header, respQues dnsmessage.Question) bool { if !respHdr.Response { return false } if reqID != respHdr.ID { return false } if reqQues.Type != respQues.Type || reqQues.Class != respQues.Class || !equalASCIIName(reqQues.Name, respQues.Name) { return false } return true } func dnsPacketRoundTrip(c net.Conn, id uint16, query dnsmessage.Question, b []byte) (dnsmessage.Parser, dnsmessage.Header, error) { if _, err := c.Write(b); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } b = make([]byte, maxDNSPacketSize) for { n, err := c.Read(b) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } var p dnsmessage.Parser // Ignore invalid responses as they may be malicious // forgery attempts. Instead continue waiting until // timeout. See golang.org/issue/13281. h, err := p.Start(b[:n]) if err != nil { continue } q, err := p.Question() if err != nil || !checkResponse(id, query, h, q) { continue } return p, h, nil } } func dnsStreamRoundTrip(c net.Conn, id uint16, query dnsmessage.Question, b []byte) (dnsmessage.Parser, dnsmessage.Header, error) { if _, err := c.Write(b); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } b = make([]byte, 1280) // 1280 is a reasonable initial size for IP over Ethernet, see RFC 4035 if _, err := io.ReadFull(c, b[:2]); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } l := int(b[0])<<8 | int(b[1]) if l > len(b) { b = make([]byte, l) } n, err := io.ReadFull(c, b[:l]) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } var p dnsmessage.Parser h, err := p.Start(b[:n]) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotUnmarshalDNSMessage } q, err := p.Question() if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotUnmarshalDNSMessage } if !checkResponse(id, query, h, q) { return dnsmessage.Parser{}, dnsmessage.Header{}, errInvalidDNSResponse } return p, h, nil } // exchange sends a query on the connection and hopes for a response. func (r *Resolver) exchange(ctx context.Context, server string, q dnsmessage.Question, timeout time.Duration, useTCP, ad bool) (dnsmessage.Parser, dnsmessage.Header, error) { q.Class = dnsmessage.ClassINET id, udpReq, tcpReq, err := newRequest(q, ad) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotMarshalDNSMessage } var networks []string if useTCP { networks = []string{"tcp"} } else { networks = []string{"udp", "tcp"} } for _, network := range networks { nctx, cancel := context.WithDeadline(ctx, time.Now().Add(timeout)) defer cancel() c, err := r.dial(nctx, network, server) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } if d, ok := nctx.Deadline(); ok && !d.IsZero() { c.SetDeadline(d) } var p dnsmessage.Parser var h dnsmessage.Header if _, ok := c.(net.PacketConn); ok { p, h, err = dnsPacketRoundTrip(c, id, q, udpReq) } else { p, h, err = dnsStreamRoundTrip(c, id, q, tcpReq) } c.Close() if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, mapErr(err) } if err := p.SkipQuestion(); err != dnsmessage.ErrSectionDone { return dnsmessage.Parser{}, dnsmessage.Header{}, errInvalidDNSResponse } // RFC 5966 indicates that when a client receives a UDP response with // the TC flag set, it should take the TC flag as an indication that it // should retry over TCP instead. // The case when the TC flag is set in a TCP response is not well specified, // so this implements the glibc resolver behavior, returning the existing // dns response instead of returning a "errNoAnswerFromDNSServer" error. // See go.dev/issue/64896 if h.Truncated && network == "udp" { continue } return p, h, nil } return dnsmessage.Parser{}, dnsmessage.Header{}, errNoAnswerFromDNSServer } // checkHeader performs basic sanity checks on the header. func checkHeader(p *dnsmessage.Parser, h dnsmessage.Header) error { rcode, hasAdd := extractExtendedRCode(*p, h) if rcode == dnsmessage.RCodeNameError { return errNoSuchHost } _, err := p.AnswerHeader() if err != nil && err != dnsmessage.ErrSectionDone { return errCannotUnmarshalDNSMessage } // libresolv continues to the next server when it receives // an invalid referral response. See golang.org/issue/15434. if rcode == dnsmessage.RCodeSuccess && !h.Authoritative && !h.RecursionAvailable && err == dnsmessage.ErrSectionDone && !hasAdd { return errLameReferral } if rcode != dnsmessage.RCodeSuccess && h.RCode != dnsmessage.RCodeNameError { // None of the error codes make sense // for the query we sent. If we didn't get // a name error and we didn't get success, // the server is behaving incorrectly or // having temporary trouble. if rcode == dnsmessage.RCodeServerFailure { // Look for Extended DNS Error (EDE), RFC 8914. if p.SkipAllAnswers() != nil || p.SkipAllAuthorities() != nil { return errServerTemporarilyMisbehaving } var haveOPT bool for { rh, err := p.AdditionalHeader() if err == dnsmessage.ErrSectionDone { break } else if err != nil { return errServerTemporarilyMisbehaving } if rh.Type != dnsmessage.TypeOPT { if err := p.SkipAdditional(); err != nil { return errInvalidDNSResponse } continue } // Only one OPT record is allowed. With multiple we MUST return an error. See RFC // 6891, section 6.1.1, page 6, last paragraph. if haveOPT { return errInvalidDNSResponse } haveOPT = true opt, err := p.OPTResource() if err != nil { return errInvalidDNSResponse } for _, o := range opt.Options { if o.Code == 15 { if len(o.Data) < 2 { return errInvalidDNSResponse } infoCode := ErrorCode(uint16(o.Data[0])<<8 | uint16(o.Data[1]<<0)) extraText := string(bytes.TrimRight(o.Data[2:], "\u0000")) return ExtendedError{infoCode, extraText} } } } return errServerTemporarilyMisbehaving } return errServerMisbehaving } return nil } func skipToAnswer(p *dnsmessage.Parser, qtype dnsmessage.Type) error { for { h, err := p.AnswerHeader() if err == dnsmessage.ErrSectionDone { return errNoSuchHost } if err != nil { return errCannotUnmarshalDNSMessage } if h.Type == qtype { return nil } if err := p.SkipAnswer(); err != nil { return errCannotUnmarshalDNSMessage } } } // extractExtendedRCode extracts the extended RCode from the OPT resource (EDNS(0)) // If an OPT record is not found, the RCode from the hdr is returned. // Another return value indicates whether an additional resource was found. func extractExtendedRCode(p dnsmessage.Parser, hdr dnsmessage.Header) (dnsmessage.RCode, bool) { p.SkipAllAnswers() p.SkipAllAuthorities() hasAdd := false for { ahdr, err := p.AdditionalHeader() if err != nil { return hdr.RCode, hasAdd } hasAdd = true if ahdr.Type == dnsmessage.TypeOPT { return ahdr.ExtendedRCode(hdr.RCode), hasAdd } if err := p.SkipAdditional(); err != nil { return hdr.RCode, hasAdd } } } // Do a lookup for a single name, which must be rooted // (otherwise answer will not find the answers). func (r *Resolver) tryOneName(ctx context.Context, cfg *dnsConfig, name string, qtype dnsmessage.Type) (dnsmessage.Parser, string, Result, error) { var lastErr error var lastResult Result serverOffset := cfg.serverOffset() sLen := uint32(len(cfg.servers)) n, err := dnsmessage.NewName(name) if err != nil { return dnsmessage.Parser{}, "", Result{}, errCannotMarshalDNSMessage } q := dnsmessage.Question{ Name: n, Type: qtype, Class: dnsmessage.ClassINET, } for i := 0; i < cfg.attempts; i++ { for j := uint32(0); j < sLen; j++ { server := cfg.servers[(serverOffset+j)%sLen] p, h, err := r.exchange(ctx, server, q, cfg.timeout, cfg.useTCP, cfg.trustAD) if err != nil { dnsErr := &DNSError{ Err: err.Error(), Name: name, Server: server, } if nerr, ok := err.(net.Error); ok && nerr.Timeout() { dnsErr.IsTimeout = true } // Set IsTemporary for socket-level errors. Note that this flag // may also be used to indicate a SERVFAIL response. if _, ok := err.(*net.OpError); ok { dnsErr.IsTemporary = true } lastErr = dnsErr lastResult = Result{} continue } useAD := h.RCode == dnsmessage.RCodeSuccess || h.RCode == dnsmessage.RCodeNameError result := Result{Authentic: cfg.trustAD && h.AuthenticData && useAD} if err := checkHeader(&p, h); err != nil { dnsErr := &DNSError{ Underlying: err, Err: err.Error(), Name: name, Server: server, } if err == errServerTemporarilyMisbehaving { dnsErr.IsTemporary = true } else if edeErr, isEDE := err.(ExtendedError); isEDE && edeErr.IsTemporary() { dnsErr.IsTemporary = true } else if isEDE { // Something wrong with the zone, no point asking another server or retrying. return p, server, result, dnsErr } if err == errNoSuchHost { // The name does not exist, so trying // another server won't help. dnsErr.IsNotFound = true return p, server, result, dnsErr } lastErr = dnsErr lastResult = result continue } err = skipToAnswer(&p, qtype) if err == nil { return p, server, result, nil } lastErr = &DNSError{ Err: err.Error(), Name: name, Server: server, } lastResult = result if err == errNoSuchHost { // The name does not exist, so trying another // server won't help. lastErr.(*DNSError).IsNotFound = true return p, server, lastResult, lastErr } } } return dnsmessage.Parser{}, "", lastResult, lastErr } // A resolverConfig represents a DNS stub resolver configuration. type resolverConfig struct { initOnce sync.Once // guards init of resolverConfig // ch is used as a semaphore that only allows one lookup at a // time to recheck resolv.conf. ch chan struct{} // guards lastChecked and modTime lastChecked time.Time // last time resolv.conf was checked dnsConfig atomic.Pointer[dnsConfig] // parsed resolv.conf structure used in lookups } var resolvConf resolverConfig func getSystemDNSConfig() *dnsConfig { resolvConf.tryUpdate("/etc/resolv.conf") return resolvConf.dnsConfig.Load() } // init initializes conf and is only called via conf.initOnce. func (conf *resolverConfig) init() { // Set dnsConfig and lastChecked so we don't parse // resolv.conf twice the first time. conf.dnsConfig.Store(dnsReadConfig("/etc/resolv.conf")) conf.lastChecked = time.Now() // Prepare ch so that only one update of resolverConfig may // run at once. conf.ch = make(chan struct{}, 1) } // tryUpdate tries to update conf with the named resolv.conf file. // The name variable only exists for testing. It is otherwise always // "/etc/resolv.conf". func (conf *resolverConfig) tryUpdate(name string) { conf.initOnce.Do(conf.init) if conf.dnsConfig.Load().noReload { return } // Ensure only one update at a time checks resolv.conf. if !conf.tryAcquireSema() { return } defer conf.releaseSema() now := time.Now() if conf.lastChecked.After(now.Add(-5 * time.Second)) { return } conf.lastChecked = now switch runtime.GOOS { case "windows": // There's no file on disk, so don't bother checking // and failing. // // The Windows implementation of dnsReadConfig (called // below) ignores the name. default: var mtime time.Time if fi, err := os.Stat(name); err == nil { mtime = fi.ModTime() } if mtime.Equal(conf.dnsConfig.Load().mtime) { return } } dnsConf := dnsReadConfig(name) conf.dnsConfig.Store(dnsConf) } func (conf *resolverConfig) tryAcquireSema() bool { select { case conf.ch <- struct{}{}: return true default: return false } } func (conf *resolverConfig) releaseSema() { <-conf.ch } func (r *Resolver) lookup(ctx context.Context, name string, qtype dnsmessage.Type, conf *dnsConfig) (dnsmessage.Parser, string, Result, error) { if !isDomainName(name) { // We used to use "invalid domain name" as the error, // but that is a detail of the specific lookup mechanism. // Other lookups might allow broader name syntax // (for example Multicast DNS allows UTF-8; see RFC 6762). // For consistency with libc resolvers, report no such host. return dnsmessage.Parser{}, "", Result{}, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } if conf == nil { conf = getSystemDNSConfig() } var ( p dnsmessage.Parser server string result Result err error ) for _, fqdn := range conf.nameList(name) { p, server, result, err = r.tryOneName(ctx, conf, fqdn, qtype) if err == nil { break } var edeErr ExtendedError if nerr, ok := err.(net.Error); ok && nerr.Temporary() && r.strictErrors() || errors.As(err, &edeErr) && !edeErr.IsTemporary() { // If we hit a temporary error with StrictErrors enabled, // stop immediately instead of trying more names. break } } if err == nil { return p, server, result, nil } if err, ok := err.(*DNSError); ok { // Show original name passed to lookup, not suffixed one. // In general we might have tried many suffixes; showing // just one is misleading. See also golang.org/issue/6324. err.Name = name } return dnsmessage.Parser{}, "", result, err } // avoidDNS reports whether this is a hostname for which we should not // use DNS. Currently this includes only .onion, per RFC 7686. See // golang.org/issue/13705. Does not cover .local names (RFC 6762), // see golang.org/issue/16739. func avoidDNS(name string) bool { if name == "" { return true } if name[len(name)-1] == '.' { name = name[:len(name)-1] } return stringsHasSuffixFold(name, ".onion") } // nameList returns a list of names for sequential DNS queries. func (conf *dnsConfig) nameList(name string) []string { // Check name length (see isDomainName). l := len(name) rooted := l > 0 && name[l-1] == '.' if l > 254 || l == 254 && !rooted { return nil } // If name is rooted (trailing dot), try only that name. if rooted { if avoidDNS(name) { return nil } return []string{name} } hasNdots := bytealg.CountString(name, '.') >= conf.ndots name += "." l++ // Build list of search choices. names := make([]string, 0, 1+len(conf.search)) // If name has enough dots, try unsuffixed first. if hasNdots && !avoidDNS(name) { names = append(names, name) } // Try suffixes that are not too long (see isDomainName). for _, suffix := range conf.search { fqdn := name + suffix if !avoidDNS(fqdn) && len(fqdn) <= 254 { names = append(names, fqdn) } } // Try unsuffixed, if not tried first above. if !hasNdots && !avoidDNS(name) { names = append(names, name) } return names } // hostLookupOrder specifies the order of LookupHost lookup strategies. // It is basically a simplified representation of nsswitch.conf. // "files" means /etc/hosts. type hostLookupOrder int const ( // hostLookupCgo means defer to cgo. hostLookupCgo hostLookupOrder = iota hostLookupFilesDNS // files first hostLookupDNSFiles // dns first hostLookupFiles // only files hostLookupDNS // only DNS ) var lookupOrderName = map[hostLookupOrder]string{ hostLookupCgo: "cgo", hostLookupFilesDNS: "files,dns", hostLookupDNSFiles: "dns,files", hostLookupFiles: "files", hostLookupDNS: "dns", } func (o hostLookupOrder) String() string { if s, ok := lookupOrderName[o]; ok { return s } return "hostLookupOrder=" + itoa.Itoa(int(o)) + "??" } func (r *Resolver) goLookupHostOrder(ctx context.Context, name string, order hostLookupOrder, conf *dnsConfig) (addrs []string, result Result, err error) { if order == hostLookupFilesDNS || order == hostLookupFiles { // Use entries from /etc/hosts if they match. addrs, _ = lookupStaticHost(name) if len(addrs) > 0 { return } if order == hostLookupFiles { return nil, result, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } } ips, _, result, err := r.goLookupIPCNAMEOrder(ctx, "ip", name, order, conf) if err != nil { return } addrs = make([]string, 0, len(ips)) for _, ip := range ips { addrs = append(addrs, ip.String()) } return } // lookup entries from /etc/hosts func goLookupIPFiles(name string) (addrs []net.IPAddr, canonical string) { addr, canonical := lookupStaticHost(name) for _, haddr := range addr { xhaddr, zone := splitHostZone(haddr) if ip := net.ParseIP(xhaddr); ip != nil { addr := net.IPAddr{IP: ip, Zone: zone} addrs = append(addrs, addr) } } sortByRFC6724(addrs) return addrs, canonical } // goLookupIP is the native Go implementation of LookupIP. // The libc versions are in cgo_*.go. func (r *Resolver) goLookupIP(ctx context.Context, network, host string) (addrs []net.IPAddr, result Result, err error) { order, conf := systemConf().hostLookupOrder(r, host) addrs, _, result, err = r.goLookupIPCNAMEOrder(ctx, network, host, order, conf) return } func (r *Resolver) goLookupIPCNAMEOrder(ctx context.Context, network, name string, order hostLookupOrder, conf *dnsConfig) (addrs []net.IPAddr, cname dnsmessage.Name, result Result, err error) { if order == hostLookupFilesDNS || order == hostLookupFiles { var canonical string addrs, canonical = goLookupIPFiles(name) if len(addrs) > 0 { var err error cname, err = dnsmessage.NewName(canonical) if err != nil { return nil, dnsmessage.Name{}, result, err } return addrs, cname, result, nil } if order == hostLookupFiles { return nil, dnsmessage.Name{}, result, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } } if !isDomainName(name) { // See comment in func lookup above about use of errNoSuchHost. return nil, dnsmessage.Name{}, result, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } type result0 struct { p dnsmessage.Parser server string result Result error } if conf == nil { conf = getSystemDNSConfig() } lane := make(chan result0, 1) qtypes := []dnsmessage.Type{dnsmessage.TypeA, dnsmessage.TypeAAAA} if network == "CNAME" { qtypes = append(qtypes, dnsmessage.TypeCNAME) } switch ipVersion(network) { case '4': qtypes = []dnsmessage.Type{dnsmessage.TypeA} case '6': qtypes = []dnsmessage.Type{dnsmessage.TypeAAAA} } var queryFn func(fqdn string, qtype dnsmessage.Type) var responseFn func(fqdn string, qtype dnsmessage.Type) result0 if conf.singleRequest { queryFn = func(fqdn string, qtype dnsmessage.Type) {} responseFn = func(fqdn string, qtype dnsmessage.Type) result0 { dnsWaitGroup.Add(1) defer dnsWaitGroup.Done() p, server, res, err := r.tryOneName(ctx, conf, fqdn, qtype) return result0{p, server, res, err} } } else { queryFn = func(fqdn string, qtype dnsmessage.Type) { dnsWaitGroup.Add(1) go func(qtype dnsmessage.Type) { p, server, res, err := r.tryOneName(ctx, conf, fqdn, qtype) lane <- result0{p, server, res, err} dnsWaitGroup.Done() }(qtype) } responseFn = func(fqdn string, qtype dnsmessage.Type) result0 { return <-lane } } var lastErr error var lastResult Result for _, fqdn := range conf.nameList(name) { for _, qtype := range qtypes { queryFn(fqdn, qtype) } hitStrictError := false for _, qtype := range qtypes { result0 := responseFn(fqdn, qtype) if result0.error != nil { if nerr, ok := result0.error.(net.Error); ok && nerr.Temporary() && r.strictErrors() { // This error will abort the nameList loop. hitStrictError = true lastErr = result0.error lastResult = result0.result } else if lastErr == nil || fqdn == name+"." { // Prefer error for original name. lastErr = result0.error lastResult = result0.result } continue } result = result0.result // Presotto says it's okay to assume that servers listed in // /etc/resolv.conf are recursive resolvers. // // We asked for recursion, so it should have included all the // answers we need in this one packet. // // Further, RFC 1034 section 4.3.1 says that "the recursive // response to a query will be... The answer to the query, // possibly preface by one or more CNAME RRs that specify // aliases encountered on the way to an answer." // // Therefore, we should be able to assume that we can ignore // CNAMEs and that the A and AAAA records we requested are // for the canonical name. loop: for { h, err := result0.p.AnswerHeader() if err != nil && err != dnsmessage.ErrSectionDone { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result0.server, } } if err != nil { break } switch h.Type { case dnsmessage.TypeA: a, err := result0.p.AResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result0.server, } break loop } addrs = append(addrs, net.IPAddr{IP: net.IP(a.A[:])}) if cname.Length == 0 && h.Name.Length != 0 { cname = h.Name } case dnsmessage.TypeAAAA: aaaa, err := result0.p.AAAAResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result0.server, } break loop } addrs = append(addrs, net.IPAddr{IP: net.IP(aaaa.AAAA[:])}) if cname.Length == 0 && h.Name.Length != 0 { cname = h.Name } case dnsmessage.TypeCNAME: c, err := result0.p.CNAMEResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result0.server, } break loop } if cname.Length == 0 && c.CNAME.Length > 0 { cname = c.CNAME } default: if err := result0.p.SkipAnswer(); err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result0.server, } break loop } continue } } } if hitStrictError { // If either family hit an error with StrictErrors enabled, // discard all addresses. This ensures that network flakiness // cannot turn a dualstack hostname IPv4/IPv6-only. addrs = nil break } if len(addrs) > 0 || network == "CNAME" && cname.Length > 0 { break } } if lastErr, ok := lastErr.(*DNSError); ok { // Show original name passed to lookup, not suffixed one. // In general we might have tried many suffixes; showing // just one is misleading. See also golang.org/issue/6324. lastErr.Name = name } sortByRFC6724(addrs) if len(addrs) == 0 && !(network == "CNAME" && cname.Length > 0) { if order == hostLookupDNSFiles { var canonical string addrs, canonical = goLookupIPFiles(name) if len(addrs) > 0 { var err error cname, err = dnsmessage.NewName(canonical) if err != nil { return nil, dnsmessage.Name{}, result, err } return addrs, cname, result, nil } } if lastErr != nil { return nil, dnsmessage.Name{}, lastResult, lastErr } } return addrs, cname, result, nil } // goLookupCNAME is the native Go (non-cgo) implementation of LookupCNAME. func (r *Resolver) goLookupCNAME(ctx context.Context, host string, order hostLookupOrder, conf *dnsConfig) (string, Result, error) { _, cname, result, err := r.goLookupIPCNAMEOrder(ctx, "CNAME", host, order, conf) return cname.String(), result, err } // goLookupPTR is the native Go implementation of LookupAddr. func (r *Resolver) goLookupPTR(ctx context.Context, addr string, order hostLookupOrder, conf *dnsConfig) ([]string, Result, error) { if order == hostLookupFiles || order == hostLookupFilesDNS { names := lookupStaticAddr(addr) if len(names) > 0 { return names, Result{}, nil } if order == hostLookupFiles { return nil, Result{}, &DNSError{Err: errNoSuchHost.Error(), Name: addr, IsNotFound: true} } } arpa, err := reverseaddr(addr) if err != nil { return nil, Result{}, err } p, server, result, err := r.lookup(ctx, arpa, dnsmessage.TypePTR, conf) if err != nil { var dnsErr *DNSError if errors.As(err, &dnsErr) && dnsErr.IsNotFound { if order == hostLookupDNSFiles { names := lookupStaticAddr(addr) if len(names) > 0 { return names, result, nil } } } return nil, result, err } var ptrs []string for { h, err := p.AnswerHeader() if err == dnsmessage.ErrSectionDone { break } if err != nil { return nil, result, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } if h.Type != dnsmessage.TypePTR { err := p.SkipAnswer() if err != nil { return nil, result, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } continue } ptr, err := p.PTRResource() if err != nil { return nil, result, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } ptrs = append(ptrs, ptr.PTR.String()) } return ptrs, result, nil }