2020-05-08 15:39:37 +00:00
|
|
|
package dnsforward
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
2020-09-01 11:33:35 +00:00
|
|
|
"io/ioutil"
|
2020-05-08 15:39:37 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"sort"
|
|
|
|
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
2020-05-08 15:39:37 +00:00
|
|
|
"github.com/AdguardTeam/dnsproxy/proxy"
|
|
|
|
"github.com/AdguardTeam/dnsproxy/upstream"
|
2020-09-08 14:28:01 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2020-12-07 14:58:33 +00:00
|
|
|
"github.com/ameshkov/dnscrypt/v2"
|
2020-05-08 15:39:37 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// FilteringConfig represents the DNS filtering configuration of AdGuard Home
|
|
|
|
// The zero FilteringConfig is empty and ready for use.
|
|
|
|
type FilteringConfig struct {
|
|
|
|
// Callbacks for other modules
|
|
|
|
// --
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
// FilterHandler is an optional additional filtering callback.
|
|
|
|
FilterHandler func(clientAddr net.IP, clientID string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"`
|
2020-05-08 15:39:37 +00:00
|
|
|
|
2020-05-13 17:31:43 +00:00
|
|
|
// GetCustomUpstreamByClient - a callback function that returns upstreams configuration
|
|
|
|
// based on the client IP address. Returns nil if there are no custom upstreams for the client
|
2021-01-27 15:32:13 +00:00
|
|
|
//
|
2021-01-20 14:27:53 +00:00
|
|
|
// TODO(e.burkov): Replace argument type with net.IP.
|
2020-05-13 17:31:43 +00:00
|
|
|
GetCustomUpstreamByClient func(clientAddr string) *proxy.UpstreamConfig `yaml:"-"`
|
2020-05-08 15:39:37 +00:00
|
|
|
|
|
|
|
// Protection configuration
|
|
|
|
// --
|
|
|
|
|
2021-01-13 13:56:05 +00:00
|
|
|
ProtectionEnabled bool `yaml:"protection_enabled"` // whether or not use any of dnsfilter features
|
|
|
|
BlockingMode string `yaml:"blocking_mode"` // mode how to answer filtered requests
|
|
|
|
BlockingIPv4 net.IP `yaml:"blocking_ipv4"` // IP address to be returned for a blocked A request
|
|
|
|
BlockingIPv6 net.IP `yaml:"blocking_ipv6"` // IP address to be returned for a blocked AAAA request
|
2020-05-08 15:39:37 +00:00
|
|
|
BlockedResponseTTL uint32 `yaml:"blocked_response_ttl"` // if 0, then default is used (3600)
|
|
|
|
|
|
|
|
// IP (or domain name) which is used to respond to DNS requests blocked by parental control or safe-browsing
|
|
|
|
ParentalBlockHost string `yaml:"parental_block_host"`
|
|
|
|
SafeBrowsingBlockHost string `yaml:"safebrowsing_block_host"`
|
|
|
|
|
|
|
|
// Anti-DNS amplification
|
|
|
|
// --
|
|
|
|
|
|
|
|
Ratelimit uint32 `yaml:"ratelimit"` // max number of requests per second from a given IP (0 to disable)
|
|
|
|
RatelimitWhitelist []string `yaml:"ratelimit_whitelist"` // a list of whitelisted client IP addresses
|
|
|
|
RefuseAny bool `yaml:"refuse_any"` // if true, refuse ANY requests
|
|
|
|
|
|
|
|
// Upstream DNS servers configuration
|
|
|
|
// --
|
|
|
|
|
2020-09-01 11:33:35 +00:00
|
|
|
UpstreamDNS []string `yaml:"upstream_dns"`
|
|
|
|
UpstreamDNSFileName string `yaml:"upstream_dns_file"`
|
|
|
|
BootstrapDNS []string `yaml:"bootstrap_dns"` // a list of bootstrap DNS for DoH and DoT (plain DNS only)
|
|
|
|
AllServers bool `yaml:"all_servers"` // if true, parallel queries to all configured upstream servers are enabled
|
|
|
|
FastestAddr bool `yaml:"fastest_addr"` // use Fastest Address algorithm
|
2020-05-08 15:39:37 +00:00
|
|
|
|
|
|
|
// Access settings
|
|
|
|
// --
|
|
|
|
|
|
|
|
AllowedClients []string `yaml:"allowed_clients"` // IP addresses of whitelist clients
|
|
|
|
DisallowedClients []string `yaml:"disallowed_clients"` // IP addresses of clients that should be blocked
|
|
|
|
BlockedHosts []string `yaml:"blocked_hosts"` // hosts that should be blocked
|
|
|
|
|
|
|
|
// DNS cache settings
|
|
|
|
// --
|
|
|
|
|
|
|
|
CacheSize uint32 `yaml:"cache_size"` // DNS cache size (in bytes)
|
|
|
|
CacheMinTTL uint32 `yaml:"cache_ttl_min"` // override TTL value (minimum) received from upstream server
|
|
|
|
CacheMaxTTL uint32 `yaml:"cache_ttl_max"` // override TTL value (maximum) received from upstream server
|
|
|
|
|
|
|
|
// Other settings
|
|
|
|
// --
|
|
|
|
|
2020-05-08 16:02:16 +00:00
|
|
|
BogusNXDomain []string `yaml:"bogus_nxdomain"` // transform responses with these IP addresses to NXDOMAIN
|
|
|
|
AAAADisabled bool `yaml:"aaaa_disabled"` // Respond with an empty answer to all AAAA requests
|
|
|
|
EnableDNSSEC bool `yaml:"enable_dnssec"` // Set DNSSEC flag in outcoming DNS request
|
|
|
|
EnableEDNSClientSubnet bool `yaml:"edns_client_subnet"` // Enable EDNS Client Subnet option
|
2020-08-14 16:27:36 +00:00
|
|
|
MaxGoroutines uint32 `yaml:"max_goroutines"` // Max. number of parallel goroutines for processing incoming requests
|
2020-09-02 11:13:45 +00:00
|
|
|
|
|
|
|
// IPSET configuration - add IP addresses of the specified domain names to an ipset list
|
|
|
|
// Syntax:
|
|
|
|
// "DOMAIN[,DOMAIN].../IPSET_NAME"
|
|
|
|
IPSETList []string `yaml:"ipset"`
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// TLSConfig is the TLS configuration for HTTPS, DNS-over-HTTPS, and DNS-over-TLS
|
|
|
|
type TLSConfig struct {
|
2020-05-15 23:02:50 +00:00
|
|
|
TLSListenAddr *net.TCPAddr `yaml:"-" json:"-"`
|
2020-08-27 12:03:07 +00:00
|
|
|
QUICListenAddr *net.UDPAddr `yaml:"-" json:"-"`
|
2020-05-15 23:02:50 +00:00
|
|
|
|
2020-11-20 14:32:41 +00:00
|
|
|
// Reject connection if the client uses server name (in SNI) that doesn't match the certificate
|
|
|
|
StrictSNICheck bool `yaml:"strict_sni_check" json:"-"`
|
2020-05-08 15:39:37 +00:00
|
|
|
|
2020-11-20 14:32:41 +00:00
|
|
|
// PEM-encoded certificates chain
|
|
|
|
CertificateChain string `yaml:"certificate_chain" json:"certificate_chain"`
|
|
|
|
// PEM-encoded private key
|
|
|
|
PrivateKey string `yaml:"private_key" json:"private_key"`
|
|
|
|
|
|
|
|
CertificatePath string `yaml:"certificate_path" json:"certificate_path"`
|
|
|
|
PrivateKeyPath string `yaml:"private_key_path" json:"private_key_path"`
|
2020-05-08 15:39:37 +00:00
|
|
|
|
|
|
|
CertificateChainData []byte `yaml:"-" json:"-"`
|
|
|
|
PrivateKeyData []byte `yaml:"-" json:"-"`
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
// ServerName is the hostname of the server. Currently, it is only
|
|
|
|
// being used for client ID checking.
|
|
|
|
ServerName string `yaml:"-" json:"-"`
|
|
|
|
|
2020-11-20 14:32:41 +00:00
|
|
|
cert tls.Certificate
|
|
|
|
// DNS names from certificate (SAN) or CN value from Subject
|
|
|
|
dnsNames []string
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
|
2020-12-07 14:58:33 +00:00
|
|
|
// DNSCryptConfig is the DNSCrypt server configuration struct.
|
|
|
|
type DNSCryptConfig struct {
|
|
|
|
UDPListenAddr *net.UDPAddr
|
|
|
|
TCPListenAddr *net.TCPAddr
|
|
|
|
ProviderName string
|
|
|
|
ResolverCert *dnscrypt.Cert
|
|
|
|
Enabled bool
|
|
|
|
}
|
|
|
|
|
2020-05-08 15:39:37 +00:00
|
|
|
// ServerConfig represents server configuration.
|
|
|
|
// The zero ServerConfig is empty and ready for use.
|
|
|
|
type ServerConfig struct {
|
2020-05-13 17:31:43 +00:00
|
|
|
UDPListenAddr *net.UDPAddr // UDP listen address
|
|
|
|
TCPListenAddr *net.TCPAddr // TCP listen address
|
|
|
|
UpstreamConfig *proxy.UpstreamConfig // Upstream DNS servers config
|
|
|
|
OnDNSRequest func(d *proxy.DNSContext)
|
2020-05-08 15:39:37 +00:00
|
|
|
|
|
|
|
FilteringConfig
|
|
|
|
TLSConfig
|
2020-12-07 14:58:33 +00:00
|
|
|
DNSCryptConfig
|
2020-05-08 15:39:37 +00:00
|
|
|
TLSAllowUnencryptedDOH bool
|
|
|
|
|
|
|
|
TLSv12Roots *x509.CertPool // list of root CAs for TLSv1.2
|
|
|
|
TLSCiphers []uint16 // list of TLS ciphers to use
|
|
|
|
|
|
|
|
// Called when the configuration is changed by HTTP request
|
|
|
|
ConfigModified func()
|
|
|
|
|
|
|
|
// Register an HTTP handler
|
|
|
|
HTTPRegister func(string, string, func(http.ResponseWriter, *http.Request))
|
|
|
|
}
|
|
|
|
|
|
|
|
// if any of ServerConfig values are zero, then default values from below are used
|
|
|
|
var defaultValues = ServerConfig{
|
|
|
|
UDPListenAddr: &net.UDPAddr{Port: 53},
|
|
|
|
TCPListenAddr: &net.TCPAddr{Port: 53},
|
|
|
|
FilteringConfig: FilteringConfig{BlockedResponseTTL: 3600},
|
|
|
|
}
|
|
|
|
|
|
|
|
// createProxyConfig creates and validates configuration for the main proxy
|
|
|
|
func (s *Server) createProxyConfig() (proxy.Config, error) {
|
|
|
|
proxyConfig := proxy.Config{
|
2020-08-13 08:49:42 +00:00
|
|
|
UDPListenAddr: []*net.UDPAddr{s.conf.UDPListenAddr},
|
|
|
|
TCPListenAddr: []*net.TCPAddr{s.conf.TCPListenAddr},
|
2020-05-13 17:31:43 +00:00
|
|
|
Ratelimit: int(s.conf.Ratelimit),
|
|
|
|
RatelimitWhitelist: s.conf.RatelimitWhitelist,
|
|
|
|
RefuseAny: s.conf.RefuseAny,
|
|
|
|
CacheMinTTL: s.conf.CacheMinTTL,
|
|
|
|
CacheMaxTTL: s.conf.CacheMaxTTL,
|
|
|
|
UpstreamConfig: s.conf.UpstreamConfig,
|
|
|
|
BeforeRequestHandler: s.beforeRequestHandler,
|
|
|
|
RequestHandler: s.handleDNSRequest,
|
|
|
|
EnableEDNSClientSubnet: s.conf.EnableEDNSClientSubnet,
|
2020-08-14 16:27:36 +00:00
|
|
|
MaxGoroutines: int(s.conf.MaxGoroutines),
|
2020-06-10 12:33:23 +00:00
|
|
|
}
|
|
|
|
|
2020-06-16 12:13:38 +00:00
|
|
|
if s.conf.CacheSize != 0 {
|
|
|
|
proxyConfig.CacheEnabled = true
|
|
|
|
proxyConfig.CacheSizeBytes = int(s.conf.CacheSize)
|
|
|
|
}
|
|
|
|
|
2020-06-10 12:33:23 +00:00
|
|
|
proxyConfig.UpstreamMode = proxy.UModeLoadBalance
|
|
|
|
if s.conf.AllServers {
|
|
|
|
proxyConfig.UpstreamMode = proxy.UModeParallel
|
|
|
|
} else if s.conf.FastestAddr {
|
|
|
|
proxyConfig.UpstreamMode = proxy.UModeFastestAddr
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(s.conf.BogusNXDomain) > 0 {
|
|
|
|
for _, s := range s.conf.BogusNXDomain {
|
|
|
|
ip := net.ParseIP(s)
|
|
|
|
if ip == nil {
|
|
|
|
log.Error("Invalid bogus IP: %s", s)
|
|
|
|
} else {
|
|
|
|
proxyConfig.BogusNXDomain = append(proxyConfig.BogusNXDomain, ip)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TLS settings
|
|
|
|
err := s.prepareTLS(&proxyConfig)
|
|
|
|
if err != nil {
|
|
|
|
return proxyConfig, err
|
|
|
|
}
|
|
|
|
|
2020-12-07 14:58:33 +00:00
|
|
|
if s.conf.DNSCryptConfig.Enabled {
|
|
|
|
proxyConfig.DNSCryptUDPListenAddr = []*net.UDPAddr{s.conf.DNSCryptConfig.UDPListenAddr}
|
|
|
|
proxyConfig.DNSCryptTCPListenAddr = []*net.TCPAddr{s.conf.DNSCryptConfig.TCPListenAddr}
|
|
|
|
proxyConfig.DNSCryptProviderName = s.conf.DNSCryptConfig.ProviderName
|
|
|
|
proxyConfig.DNSCryptResolverCert = s.conf.DNSCryptConfig.ResolverCert
|
|
|
|
}
|
|
|
|
|
2020-05-08 15:39:37 +00:00
|
|
|
// Validate proxy config
|
2020-05-13 17:31:43 +00:00
|
|
|
if proxyConfig.UpstreamConfig == nil || len(proxyConfig.UpstreamConfig.Upstreams) == 0 {
|
2020-09-09 15:12:11 +00:00
|
|
|
return proxyConfig, errors.New("no default upstream servers configured")
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return proxyConfig, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// initDefaultSettings initializes default settings if nothing
|
|
|
|
// is configured
|
|
|
|
func (s *Server) initDefaultSettings() {
|
|
|
|
if len(s.conf.UpstreamDNS) == 0 {
|
|
|
|
s.conf.UpstreamDNS = defaultDNS
|
|
|
|
}
|
|
|
|
if len(s.conf.BootstrapDNS) == 0 {
|
|
|
|
s.conf.BootstrapDNS = defaultBootstrap
|
|
|
|
}
|
|
|
|
if len(s.conf.ParentalBlockHost) == 0 {
|
|
|
|
s.conf.ParentalBlockHost = parentalBlockHost
|
|
|
|
}
|
|
|
|
if len(s.conf.SafeBrowsingBlockHost) == 0 {
|
|
|
|
s.conf.SafeBrowsingBlockHost = safeBrowsingBlockHost
|
|
|
|
}
|
|
|
|
if s.conf.UDPListenAddr == nil {
|
|
|
|
s.conf.UDPListenAddr = defaultValues.UDPListenAddr
|
|
|
|
}
|
|
|
|
if s.conf.TCPListenAddr == nil {
|
|
|
|
s.conf.TCPListenAddr = defaultValues.TCPListenAddr
|
|
|
|
}
|
2020-09-10 09:32:36 +00:00
|
|
|
if len(s.conf.BlockedHosts) == 0 {
|
|
|
|
s.conf.BlockedHosts = defaultBlockedHosts
|
|
|
|
}
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// prepareUpstreamSettings - prepares upstream DNS server settings
|
|
|
|
func (s *Server) prepareUpstreamSettings() error {
|
2020-09-08 14:28:01 +00:00
|
|
|
// We're setting a customized set of RootCAs
|
|
|
|
// The reason is that Go default mechanism of loading TLS roots
|
|
|
|
// does not always work properly on some routers so we're
|
|
|
|
// loading roots manually and pass it here.
|
|
|
|
// See "util.LoadSystemRootCAs"
|
|
|
|
upstream.RootCAs = s.conf.TLSv12Roots
|
|
|
|
|
|
|
|
// See util.InitTLSCiphers -- removed unsafe ciphers
|
|
|
|
if len(s.conf.TLSCiphers) > 0 {
|
|
|
|
upstream.CipherSuites = s.conf.TLSCiphers
|
|
|
|
}
|
|
|
|
|
2020-09-09 11:35:11 +00:00
|
|
|
// Load upstreams either from the file, or from the settings
|
2020-09-01 11:33:35 +00:00
|
|
|
var upstreams []string
|
|
|
|
if s.conf.UpstreamDNSFileName != "" {
|
|
|
|
data, err := ioutil.ReadFile(s.conf.UpstreamDNSFileName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
d := string(data)
|
|
|
|
for len(d) != 0 {
|
|
|
|
s := util.SplitNext(&d, '\n')
|
|
|
|
upstreams = append(upstreams, s)
|
|
|
|
}
|
|
|
|
log.Debug("DNS: using %d upstream servers from file %s", len(upstreams), s.conf.UpstreamDNSFileName)
|
|
|
|
} else {
|
|
|
|
upstreams = s.conf.UpstreamDNS
|
|
|
|
}
|
2021-03-11 09:17:54 +00:00
|
|
|
|
2020-09-22 12:04:17 +00:00
|
|
|
upstreams = filterOutComments(upstreams)
|
2021-03-11 09:17:54 +00:00
|
|
|
upstreamConfig, err := proxy.ParseUpstreamsConfig(
|
|
|
|
upstreams,
|
2021-03-03 12:27:25 +00:00
|
|
|
upstream.Options{
|
|
|
|
Bootstrap: s.conf.BootstrapDNS,
|
|
|
|
Timeout: DefaultTimeout,
|
|
|
|
},
|
|
|
|
)
|
2020-05-08 15:39:37 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("dns: proxy.ParseUpstreamsConfig: %w", err)
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
2020-09-09 15:12:11 +00:00
|
|
|
|
|
|
|
if len(upstreamConfig.Upstreams) == 0 {
|
2021-02-16 15:46:49 +00:00
|
|
|
log.Info("warning: no default upstream servers specified, using %v", defaultDNS)
|
2021-03-11 18:30:52 +00:00
|
|
|
var uc proxy.UpstreamConfig
|
|
|
|
uc, err = proxy.ParseUpstreamsConfig(
|
2021-03-11 09:17:54 +00:00
|
|
|
defaultDNS,
|
2021-03-03 12:27:25 +00:00
|
|
|
upstream.Options{
|
|
|
|
Bootstrap: s.conf.BootstrapDNS,
|
|
|
|
Timeout: DefaultTimeout,
|
|
|
|
},
|
|
|
|
)
|
2020-09-09 15:12:11 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("dns: failed to parse default upstreams: %v", err)
|
2020-09-09 15:12:11 +00:00
|
|
|
}
|
|
|
|
upstreamConfig.Upstreams = uc.Upstreams
|
|
|
|
}
|
|
|
|
|
2020-05-13 17:31:43 +00:00
|
|
|
s.conf.UpstreamConfig = &upstreamConfig
|
2020-05-08 15:39:37 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// prepareIntlProxy - initializes DNS proxy that we use for internal DNS queries
|
|
|
|
func (s *Server) prepareIntlProxy() {
|
2021-02-04 17:35:13 +00:00
|
|
|
s.internalProxy = &proxy.Proxy{
|
|
|
|
Config: proxy.Config{
|
|
|
|
CacheEnabled: true,
|
|
|
|
CacheSizeBytes: 4096,
|
|
|
|
UpstreamConfig: s.conf.UpstreamConfig,
|
|
|
|
},
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// prepareTLS - prepares TLS configuration for the DNS proxy
|
|
|
|
func (s *Server) prepareTLS(proxyConfig *proxy.Config) error {
|
2020-09-08 14:20:24 +00:00
|
|
|
if len(s.conf.CertificateChainData) == 0 || len(s.conf.PrivateKeyData) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.conf.TLSListenAddr == nil &&
|
|
|
|
s.conf.QUICListenAddr == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.conf.TLSListenAddr != nil {
|
2020-08-13 08:49:42 +00:00
|
|
|
proxyConfig.TLSListenAddr = []*net.TCPAddr{s.conf.TLSListenAddr}
|
2020-09-08 14:20:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if s.conf.QUICListenAddr != nil {
|
|
|
|
proxyConfig.QUICListenAddr = []*net.UDPAddr{s.conf.QUICListenAddr}
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
s.conf.cert, err = tls.X509KeyPair(s.conf.CertificateChainData, s.conf.PrivateKeyData)
|
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("failed to parse TLS keypair: %w", err)
|
2020-09-08 14:20:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if s.conf.StrictSNICheck {
|
2021-03-11 18:30:52 +00:00
|
|
|
var x *x509.Certificate
|
|
|
|
x, err = x509.ParseCertificate(s.conf.cert.Certificate[0])
|
2020-05-08 15:39:37 +00:00
|
|
|
if err != nil {
|
2020-11-05 12:20:57 +00:00
|
|
|
return fmt.Errorf("x509.ParseCertificate(): %w", err)
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
2020-09-08 14:20:24 +00:00
|
|
|
if len(x.DNSNames) != 0 {
|
|
|
|
s.conf.dnsNames = x.DNSNames
|
|
|
|
log.Debug("DNS: using DNS names from certificate's SAN: %v", x.DNSNames)
|
|
|
|
sort.Strings(s.conf.dnsNames)
|
|
|
|
} else {
|
|
|
|
s.conf.dnsNames = append(s.conf.dnsNames, x.Subject.CommonName)
|
|
|
|
log.Debug("DNS: using DNS name from certificate's CN: %s", x.Subject.CommonName)
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
2020-09-08 14:20:24 +00:00
|
|
|
}
|
2020-05-08 15:39:37 +00:00
|
|
|
|
2020-09-08 14:20:24 +00:00
|
|
|
proxyConfig.TLSConfig = &tls.Config{
|
|
|
|
GetCertificate: s.onGetCertificate,
|
|
|
|
MinVersion: tls.VersionTLS12,
|
2020-05-08 15:39:37 +00:00
|
|
|
}
|
2020-09-08 14:20:24 +00:00
|
|
|
|
2020-05-08 15:39:37 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Called by 'tls' package when Client Hello is received
|
|
|
|
// If the server name (from SNI) supplied by client is incorrect - we terminate the ongoing TLS handshake.
|
|
|
|
func (s *Server) onGetCertificate(ch *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
|
|
if s.conf.StrictSNICheck && !matchDNSName(s.conf.dnsNames, ch.ServerName) {
|
|
|
|
log.Info("DNS: TLS: unknown SNI in Client Hello: %s", ch.ServerName)
|
|
|
|
return nil, fmt.Errorf("invalid SNI")
|
|
|
|
}
|
|
|
|
return &s.conf.cert, nil
|
|
|
|
}
|