s4 dns: Fix TCP handling in the DNS server
authorKai Blin <kai@samba.org>
Tue, 6 Mar 2012 07:49:16 +0000 (08:49 +0100)
committerKai Blin <kai@samba.org>
Tue, 6 Mar 2012 20:17:18 +0000 (21:17 +0100)
Autobuild-User: Kai Blin <kai@samba.org>
Autobuild-Date: Tue Mar  6 21:17:19 CET 2012 on sn-devel-104

source4/dns_server/dns_server.c
source4/lib/stream/packet.c
source4/lib/stream/packet.h
source4/scripting/python/samba/tests/dns.py

index 25873c2bf4c8a6e7c45a6e11667ee687817d3be6..cf43590b63f2bb5dc0cc2b243011484fb8a444e7 100644 (file)
@@ -233,13 +233,13 @@ static void dns_tcp_call_loop(struct tevent_req *subreq)
                return;
        }
 
-       DEBUG(10,("Received krb5 TCP packet of length %lu from %s\n",
+       DEBUG(10,("Received DNS TCP packet of length %lu from %s\n",
                 (long) call->in.length,
                 tsocket_address_string(dns_conn->conn->remote_address, call)));
 
        /* skip length header */
-       call->in.data += 4;
-       call->in.length -= 4;
+       call->in.data += 2;
+       call->in.length -= 2;
 
        /* Call dns */
        status = dns_process(dns_conn->dns_socket->dns, call, &call->in, &call->out);
@@ -251,9 +251,9 @@ static void dns_tcp_call_loop(struct tevent_req *subreq)
        }
 
        /* First add the length of the out buffer */
-       RSIVAL(call->out_hdr, 0, call->out.length);
+       RSSVAL(call->out_hdr, 0, call->out.length);
        call->out_iov[0].iov_base = (char *) call->out_hdr;
-       call->out_iov[0].iov_len = 4;
+       call->out_iov[0].iov_len = 2;
 
        call->out_iov[1].iov_base = (char *) call->out.data;
        call->out_iov[1].iov_len = call->out.length;
@@ -271,14 +271,14 @@ static void dns_tcp_call_loop(struct tevent_req *subreq)
        tevent_req_set_callback(subreq, dns_tcp_call_writev_done, call);
 
        /*
-        * The krb5 tcp pdu's has the length as 4 byte (initial_read_size),
-        * packet_full_request_u32 provides the pdu length then.
+        * The dns tcp pdu's has the length as 2 byte (initial_read_size),
+        * packet_full_request_u16 provides the pdu length then.
         */
        subreq = tstream_read_pdu_blob_send(dns_conn,
                                            dns_conn->conn->event.ctx,
                                            dns_conn->tstream,
-                                           4, /* initial_read_size */
-                                           packet_full_request_u32,
+                                           2, /* initial_read_size */
+                                           packet_full_request_u16,
                                            dns_conn);
        if (subreq == NULL) {
                dns_tcp_terminate_connection(dns_conn, "dns_tcp_call_loop: "
@@ -358,14 +358,14 @@ static void dns_tcp_accept(struct stream_connection *conn)
        conn->private_data = dns_conn;
 
        /*
-        * The krb5 tcp pdu's has the length as 4 byte (initial_read_size),
-        * packet_full_request_u32 provides the pdu length then.
+        * The dns tcp pdu's has the length as 2 byte (initial_read_size),
+        * packet_full_request_u16 provides the pdu length then.
         */
        subreq = tstream_read_pdu_blob_send(dns_conn,
                                            dns_conn->conn->event.ctx,
                                            dns_conn->tstream,
-                                           4, /* initial_read_size */
-                                           packet_full_request_u32,
+                                           2, /* initial_read_size */
+                                           packet_full_request_u16,
                                            dns_conn);
        if (subreq == NULL) {
                dns_tcp_terminate_connection(dns_conn, "dns_tcp_accept: "
index 3a7f600560843be1031a65cfba6104e32dc0b48e..b36d6507ef01ed07a9cc760aee1cbdba0b9e0bf7 100644 (file)
@@ -612,3 +612,15 @@ _PUBLIC_ NTSTATUS packet_full_request_u32(void *private_data, DATA_BLOB blob, si
        }
        return NT_STATUS_OK;
 }
+
+_PUBLIC_ NTSTATUS packet_full_request_u16(void *private_data, DATA_BLOB blob, size_t *size)
+{
+       if (blob.length < 2) {
+               return STATUS_MORE_ENTRIES;
+       }
+       *size = 2 + RSVAL(blob.data, 0);
+       if (*size > blob.length) {
+               return STATUS_MORE_ENTRIES;
+       }
+       return NT_STATUS_OK;
+}
index a274bd397c180b2fa78f7c4b99f11d4c48d42569..32c26686c3e03f492dfff1be159f45cdbfbfaf36 100644 (file)
@@ -61,5 +61,6 @@ void packet_queue_run(struct packet_context *pc);
 */
 NTSTATUS packet_full_request_nbt(void *private_data, DATA_BLOB blob, size_t *size);
 NTSTATUS packet_full_request_u32(void *private_data, DATA_BLOB blob, size_t *size);
+NTSTATUS packet_full_request_u16(void *private_data, DATA_BLOB blob, size_t *size);
 
 
index ca9edbf50009c7e5dca4b9eb60774985d15617ca..26f80898225d80d683c931c489750a98534b7797 100644 (file)
@@ -99,6 +99,22 @@ class DNSTest(TestCase):
             if s is not None:
                 s.close()
 
+    def dns_transaction_tcp(self, packet, host=os.getenv('DC_SERVER_IP')):
+        "send a DNS query and read the reply"
+        s = None
+        try:
+            send_packet = ndr.ndr_pack(packet)
+            s = socket.socket(socket.AF_INET, socket.SOCK_STREAM, 0)
+            s.connect((host, 53))
+            tcp_packet = struct.pack('!H', len(send_packet))
+            tcp_packet += send_packet
+            s.send(tcp_packet, 0)
+            recv_packet = s.recv(0xffff + 2, 0)
+            return ndr.ndr_unpack(dns.name_packet, recv_packet[2:])
+        finally:
+                if s is not None:
+                    s.close()
+
     def test_one_a_query(self):
         "create a query packet containing one query record"
         p = self.make_name_packet(dns.DNS_OPCODE_QUERY)
@@ -117,6 +133,24 @@ class DNSTest(TestCase):
         self.assertEquals(response.answers[0].rdata,
                           os.getenv('DC_SERVER_IP'))
 
+    def test_one_a_query_tcp(self):
+        "create a query packet containing one query record via TCP"
+        p = self.make_name_packet(dns.DNS_OPCODE_QUERY)
+        questions = []
+
+        name = "%s.%s" % (os.getenv('DC_SERVER'), self.get_dns_domain())
+        q = self.make_name_question(name, dns.DNS_QTYPE_A, dns.DNS_QCLASS_IN)
+        print "asking for ", q.name
+        questions.append(q)
+
+        self.finish_name_packet(p, questions)
+        response = self.dns_transaction_tcp(p)
+        self.assert_dns_rcode_equals(response, dns.DNS_RCODE_OK)
+        self.assert_dns_opcode_equals(response, dns.DNS_OPCODE_QUERY)
+        self.assertEquals(response.ancount, 1)
+        self.assertEquals(response.answers[0].rdata,
+                          os.getenv('DC_SERVER_IP'))
+
     def test_two_queries(self):
         "create a query packet containing two query records"
         p = self.make_name_packet(dns.DNS_OPCODE_QUERY)