C++如何实现DNS域名解析


一、概述

现在来搞定DNS域名解析,其实这是前面一篇文章C++实现Ping里面的遗留问题,要干的活是ping的过程中画红线的部分:

cmd下域名解析的命令是nslookup,比如“nslookup www.baidu.com”的结果如下:

其中,Address返回的就是www.baidu.com对应的IP地址,这个可能有多个

Alias指别名,也就是说www.baidu.com是www.a.shifen.com的别名,而www.a.shifen.com则是www.baidu.com的规范名(Canonical Name,CName),具体参考RFC1035 3.2.2 & wikipedia

二、实现结果预览

先看一下最终搞成了什么样子

输入:域名字符串

输出:IP列表、CName列表、DNS查询所用时间

三、相关技术

3.1、UDP or TCP ? (RFC1035 4.2)

UDP:DNS查询和回复采用低开销高性能的UDP,端口号为53。

TCP:辅助DNS服务器从主DNS服务器拉取最新数据时,采用可靠的TCP传输,端口号也为53。

我们这里做DNS查询采用UDP,53端口。

3.2、DNS查询/回复包头部解析 (RFC1035 4.1.1)

重点介绍一下我们关心的部分:

ID(16bits):标识符,一般填入本进程的标识符

QR(1bits):标志位,查询包为0,回复包为1

Opcode(4bits):查询的种类,标准查询为0

QDCOUNT(16bits):DNS查询/回复包数据部分Question字段的个数

ANCOUNT(16bits):DNS查询/回复包数据部分Answer字段的个数

3.2、DNS查询/回复包数据部分解析 (RFC1035 4.1.2 & 4.1.3)

查询/回复包的数据部分依次为QDCOUNT个Question字段、ANCOUNT个Answer字段....

对于任意字段,其格式如下:

Name(不定长):域名,这部分的格式比较复杂,后面单独说。

TYPE(16bits):查询类型/回复包RDATA类型,比如TYPE=1表示主机IP地址、TYPE=5表示CNAME,详见RFC1035 3.2.2

CLASS(16bits):类,一般情况下CLASS=1表示Internet,详见RFC1035 3.2.4

TTL(32bits,仅回复包):生存时间

RDLENGTH(16bits,仅回复包):RDATA部分的字节数

RDATA(不定长,仅回复包):资源数据,具体格式取决于TYPE和CLASS,比如TYPE=1、CLASS=1时,RDATA为四个字节的IP地址

3.3、Name解析&消息压缩

3.3.1、一般格式 (RFC1035 4.1.2)

标签内容长度(1个字节) + 标签内容,以标签内容长度0作为Name的结束符,例如:

3.3.2、消息压缩格式 (RFC1035 4.1.4)

如果标签内容长度的二进制前两位是11,则表示消息压缩。

此时,标签内容长度1个字节+后面的1个字节一共16位,后14位表示相对DNS包起始地址的偏移(Byte),例如:

上述例子中,DNS包起始地址为0x0000,c0 13的二进制为11000000 00010003,即跳转偏移为0x13个字节,对应的数据为03 63 6f 6d 00。

RFC1035中规定,支持的消息压缩规则为:

①以内容长度0结尾的标签序列

②偏移指针

③标签序列+偏移指针

也就是说,Name的消息压缩要求偏移指针必须在Name的尾部,且不支持同一级存在多个偏移指针(偏移指针序列),

但Name的消息压缩支持嵌套的偏移指针,即指针指向的偏移位置仍然是以偏移指针结尾的数据

四、代码实现

#pragma once

//这里需要导入库 Ws2_32.lib,在不同的IDE下可能不太一样
//#pragma comment(lib, "Ws2_32.lib")

#include <windows.h>
#include <string>
#include <vector>

#define MAX_DOMAINNAME_LEN 255
#define DNS_PORT   53
#define DNS_TYPE_SIZE  2
#define DNS_CLASS_SIZE  2
#define DNS_TTL_SIZE  4
#define DNS_DATALEN_SIZE 2
#define DNS_TYPE_A   0x0001 //1 a host address
#define DNS_TYPE_CNAME  0x0005 //5 the canonical name for an alias
#define DNS_PACKET_MAX_SIZE (sizeof(DNSHeader) + MAX_DOMAINNAME_LEN + DNS_TYPE_SIZE + DNS_CLASS_SIZE)

struct DNSHeader
{
 USHORT usTransID; //标识符
 USHORT usFlags; //各种标志位
 USHORT usQuestionCount; //Question字段个数 
 USHORT usAnswerCount; //Answer字段个数
 USHORT usAuthorityCount; //Authority字段个数
 USHORT usAdditionalCount; //Additional字段个数
};

class CDNSLookup
{
public:
 CDNSLookup();
 ~CDNSLookup();

 BOOL DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList = NULL, std::vector<std::string> *pvecstrCNameList = NULL, ULONG ulTimeout = 1000, ULONG *pulTimeSpent = NULL);
 BOOL DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<std::string> *pvecstrIPList = NULL, std::vector<std::string> *pvecstrCNameList = NULL, ULONG ulTimeout = 1000, ULONG *pulTimeSpent = NULL);

private:
 BOOL Init();
 BOOL UnInit();
 BOOL DNSLookupCore(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent);
 BOOL SendDNSRequest(sockaddr_in sockAddrDNSServer, char *szDomainName);
 BOOL RecvDNSResponse(sockaddr_in sockAddrDNSServer, ULONG ulTimeout, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG *pulTimeSpent);
 BOOL EncodeDotStr(char *szDotStr, char *szEncodedStr, USHORT nEncodedStrSize);
 BOOL DecodeDotStr(char *szEncodedStr, USHORT *pusEncodedStrLen, char *szDotStr, USHORT nDotStrSize, char *szPacketStartPos = NULL);
 ULONG GetTickCountCalibrate();

private:
 BOOL m_bIsInitOK;
 SOCKET m_sock;
 WSAEVENT m_event;
 USHORT m_usCurrentProcID;
 char *m_szDNSPacket;
};
 [DNSLookup.h]

 

#include "DNSLookup.h"
#include <stdio.h>
#include <string.h>

CDNSLookup::CDNSLookup() : 
 m_bIsInitOK(FALSE), 
 m_sock(INVALID_SOCKET),
 m_szDNSPacket(NULL)
{
 m_bIsInitOK = Init();
}

CDNSLookup::~CDNSLookup()
{
 UnInit();
}

BOOL CDNSLookup::DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent)
{
 return DNSLookupCore(ulDNSServerIP, szDomainName, pveculIPList, pvecstrCNameList, ulTimeout, pulTimeSpent);
}

BOOL CDNSLookup::DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<std::string> *pvecstrIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent)
{
 std::vector<ULONG> *pveculIPList = NULL;
 if (pvecstrIPList != NULL)
 {
  std::vector<ULONG> veculIPList;
  pveculIPList = &veculIPList;
 }

 BOOL bRet = DNSLookupCore(ulDNSServerIP, szDomainName, pveculIPList, pvecstrCNameList, ulTimeout, pulTimeSpent);

 if (bRet)
 {
  pvecstrIPList->clear();
  char szIP[16] = {'\0'};
  for (std::vector<ULONG>::iterator iter = pveculIPList->begin(); iter != pveculIPList->end(); ++iter)
  {
   BYTE *pbyIPSegment = (BYTE*)(&(*iter));
   //sprintf_s(szIP, 16, "%d.%d.%d.%d", pbyIPSegment[0], pbyIPSegment[1], pbyIPSegment[2], pbyIPSegment[3]);
   sprintf(szIP, "%d.%d.%d.%d", pbyIPSegment[0], pbyIPSegment[1], pbyIPSegment[2], pbyIPSegment[3]);
   pvecstrIPList->push_back(szIP);
  }
 }

 return bRet;
}


BOOL CDNSLookup::Init()
{
 WSADATA wsaData;
 if (WSAStartup(MAKEWORD(2, 2), &wsaData) == SOCKET_ERROR)
 {
  return FALSE;
 }
 
 if ((m_sock = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET)
 {
  return FALSE;
 }

 m_event = WSACreateEvent();
 WSAEventSelect(m_sock, m_event, FD_READ);

 m_szDNSPacket = new (std::nothrow) char[DNS_PACKET_MAX_SIZE];
 if (m_szDNSPacket == NULL)
 {
  return FALSE;
 }

 m_usCurrentProcID = (USHORT)GetCurrentProcessId();

 return TRUE;
}

BOOL CDNSLookup::UnInit()
{
 WSACleanup();

 if (m_szDNSPacket != NULL)
 {
  delete [] m_szDNSPacket;
 }

 return TRUE;
}

BOOL CDNSLookup::DNSLookupCore(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent)
{
 if (m_bIsInitOK == FALSE || szDomainName == NULL)
 {
  return FALSE;
 }

 //配置SOCKET
 sockaddr_in sockAddrDNSServer; 
 sockAddrDNSServer.sin_family = AF_INET; 
 sockAddrDNSServer.sin_addr.s_addr = ulDNSServerIP;
 sockAddrDNSServer.sin_port = htons( DNS_PORT );

 //DNS查询与解析
 if (!SendDNSRequest(sockAddrDNSServer, szDomainName)
  || !RecvDNSResponse(sockAddrDNSServer, ulTimeout, pveculIPList, pvecstrCNameList, pulTimeSpent))
 {
  return FALSE;
 }

 return TRUE;
}

BOOL CDNSLookup::SendDNSRequest(sockaddr_in sockAddrDNSServer, char *szDomainName)
{
 char *pWriteDNSPacket = m_szDNSPacket;
 memset(pWriteDNSPacket, 0, DNS_PACKET_MAX_SIZE); 

 //填充DNS查询报文头部
 DNSHeader *pDNSHeader = (DNSHeader*)pWriteDNSPacket;
 pDNSHeader->usTransID = m_usCurrentProcID;
 pDNSHeader->usFlags = htons(0x0100);
 pDNSHeader->usQuestionCount = htons(0x0001);
 pDNSHeader->usAnswerCount = 0x0000;
 pDNSHeader->usAuthorityCount = 0x0000;
 pDNSHeader->usAdditionalCount = 0x0000;

 //设置DNS查询报文内容
 USHORT usQType = htons(0x0001);
 USHORT usQClass = htons(0x0001);
 USHORT nDomainNameLen = strlen(szDomainName);
 char *szEncodedDomainName = (char *)malloc(nDomainNameLen + 2);
 if (szEncodedDomainName == NULL)
 {
  return FALSE;
 }
 if (!EncodeDotStr(szDomainName, szEncodedDomainName, nDomainNameLen + 2))
 {
  return FALSE;
 }

 //填充DNS查询报文内容
 USHORT nEncodedDomainNameLen = strlen(szEncodedDomainName) + 1;
 memcpy(pWriteDNSPacket += sizeof(DNSHeader), szEncodedDomainName, nEncodedDomainNameLen);
 memcpy(pWriteDNSPacket += nEncodedDomainNameLen, (char*)(&usQType), DNS_TYPE_SIZE);
 memcpy(pWriteDNSPacket += DNS_TYPE_SIZE, (char*)(&usQClass), DNS_CLASS_SIZE);
 free (szEncodedDomainName);

 //发送DNS查询报文
 USHORT nDNSPacketSize = sizeof(DNSHeader) + nEncodedDomainNameLen + DNS_TYPE_SIZE + DNS_CLASS_SIZE;
 if (sendto(m_sock, m_szDNSPacket, nDNSPacketSize, 0, (sockaddr*)&sockAddrDNSServer, sizeof(sockAddrDNSServer)) == SOCKET_ERROR)
 {
  return FALSE;
 }

 return TRUE;
}

BOOL CDNSLookup::RecvDNSResponse(sockaddr_in sockAddrDNSServer, ULONG ulTimeout, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG *pulTimeSpent)
{
 ULONG ulSendTimestamp = GetTickCountCalibrate();

 if (pveculIPList != NULL)
 {
  pveculIPList->clear();
 }
 if (pvecstrCNameList != NULL)
 {
  pvecstrCNameList->clear();
 }

 char recvbuf[1024] = {'\0'};
 char szDotName[128] = {'\0'};
 USHORT nEncodedNameLen = 0;

 while (TRUE)
 {
  if (WSAWaitForMultipleEvents(1, &m_event, FALSE, 100, FALSE) != WSA_WAIT_TIMEOUT)
  {
   WSANETWORKEVENTS netEvent;
   WSAEnumNetworkEvents(m_sock, m_event, &netEvent);

   if (netEvent.lNetworkEvents & FD_READ)
   {
    ULONG ulRecvTimestamp = GetTickCountCalibrate();
    int nSockaddrDestSize = sizeof(sockAddrDNSServer);

    //接收响应报文
    if (recvfrom(m_sock, recvbuf, 1024, 0, (struct sockaddr*)&sockAddrDNSServer, &nSockaddrDestSize) != SOCKET_ERROR)
    {
     DNSHeader *pDNSHeader = (DNSHeader*)recvbuf;
     USHORT usQuestionCount = 0;
     USHORT usAnswerCount = 0;

     if (pDNSHeader->usTransID == m_usCurrentProcID
      && (ntohs(pDNSHeader->usFlags) & 0xfb7f) == 0x8100 //RFC1035 4.1.1(Header section format)
      && (usQuestionCount = ntohs(pDNSHeader->usQuestionCount)) >= 0
      && (usAnswerCount = ntohs(pDNSHeader->usAnswerCount)) > 0)
     {
      char *pDNSData = recvbuf + sizeof(DNSHeader);

      //解析Question字段
      for (int q = 0; q != usQuestionCount; ++q)
      {
       if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName)))
       {
        return FALSE;
       }
       pDNSData += (nEncodedNameLen + DNS_TYPE_SIZE + DNS_CLASS_SIZE);
      }

      //解析Answer字段
      for (int a = 0; a != usAnswerCount; ++a)
      {
       if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName), recvbuf))
       {
        return FALSE;
       }
       pDNSData += nEncodedNameLen;

       USHORT usAnswerType = ntohs(*(USHORT*)(pDNSData));
       USHORT usAnswerClass = ntohs(*(USHORT*)(pDNSData + DNS_TYPE_SIZE));
       ULONG usAnswerTTL = ntohl(*(ULONG*)(pDNSData + DNS_TYPE_SIZE + DNS_CLASS_SIZE));
       USHORT usAnswerDataLen = ntohs(*(USHORT*)(pDNSData + DNS_TYPE_SIZE + DNS_CLASS_SIZE + DNS_TTL_SIZE));
       pDNSData += (DNS_TYPE_SIZE + DNS_CLASS_SIZE + DNS_TTL_SIZE + DNS_DATALEN_SIZE);

       if (usAnswerType == DNS_TYPE_A && pveculIPList != NULL)
       {
        ULONG ulIP = *(ULONG*)(pDNSData);
        pveculIPList->push_back(ulIP);
       }
       else if (usAnswerType == DNS_TYPE_CNAME && pvecstrCNameList != NULL)
       {
        if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName), recvbuf))
        {
         return FALSE;
        }
        pvecstrCNameList->push_back(szDotName);
       }

       pDNSData += (usAnswerDataLen);
      }

      //计算DNS查询所用时间
      if (pulTimeSpent != NULL)
      {
       *pulTimeSpent = ulRecvTimestamp - ulSendTimestamp;
      }

      break;
     }
    }
   }
  }

  //超时退出
  if (GetTickCountCalibrate() - ulSendTimestamp > ulTimeout)
  {
   *pulTimeSpent = ulTimeout + 1;
   return FALSE;
  }
 }

 return TRUE;
}

/*
 * convert "www.baidu.com" to "\x03www\x05baidu\x03com"
 * 0x0000 03 77 77 77 05 62 61 69 64 75 03 63 6f 6d 00 ff
 */
BOOL CDNSLookup::EncodeDotStr(char *szDotStr, char *szEncodedStr, USHORT nEncodedStrSize)
{
 USHORT nDotStrLen = strlen(szDotStr);

 if (szDotStr == NULL || szEncodedStr == NULL || nEncodedStrSize < nDotStrLen + 2)
 {
  return FALSE;
 }

 char *szDotStrCopy = new char[nDotStrLen + 1];
 //strcpy_s(szDotStrCopy, nDotStrLen + 1, szDotStr);
 strcpy(szDotStrCopy, szDotStr);

 char *pNextToken = NULL;
 //char *pLabel = strtok_s(szDotStrCopy, ".", &pNextToken);
 char *pLabel = strtok(szDotStrCopy, ".");
 USHORT nLabelLen = 0;
 USHORT nEncodedStrLen = 0;
 while (pLabel != NULL)
 {
  if ((nLabelLen = strlen(pLabel)) != 0)
  {
   //sprintf_s(szEncodedStr + nEncodedStrLen, nEncodedStrSize - nEncodedStrLen, "%c%s", nLabelLen, pLabel);
   sprintf(szEncodedStr + nEncodedStrLen, "%c%s", nLabelLen, pLabel);
   nEncodedStrLen += (nLabelLen + 1);
  }
  //pLabel = strtok_s(NULL, ".", &pNextToken);
  pLabel = strtok(NULL, ".");
 }

 delete [] szDotStrCopy;
 
 return TRUE;
}

/*
 * convert "\x03www\x05baidu\x03com\x00" to "www.baidu.com"
 * 0x0000 03 77 77 77 05 62 61 69 64 75 03 63 6f 6d 00 ff
 * convert "\x03www\x05baidu\xc0\x13" to "www.baidu.com"
 * 0x0000 03 77 77 77 05 62 61 69 64 75 c0 13 ff ff ff ff
 * 0x0010 ff ff ff 03 63 6f 6d 00 ff ff ff ff ff ff ff ff
 */
BOOL CDNSLookup::DecodeDotStr(char *szEncodedStr, USHORT *pusEncodedStrLen, char *szDotStr, USHORT nDotStrSize, char *szPacketStartPos)
{
 if (szEncodedStr == NULL || pusEncodedStrLen == NULL || szDotStr == NULL)
 {
  return FALSE;
 }

 char *pDecodePos = szEncodedStr;
 USHORT usPlainStrLen = 0;
 BYTE nLabelDataLen = 0; 
 *pusEncodedStrLen = 0;

 while ((nLabelDataLen = *pDecodePos) != 0x00)
 {
  if ((nLabelDataLen & 0xc0) == 0) //普通格式,LabelDataLen + Label
  {
   if (usPlainStrLen + nLabelDataLen + 1 > nDotStrSize)
   {
    return FALSE;
   }
   memcpy(szDotStr + usPlainStrLen, pDecodePos + 1, nLabelDataLen);
   memcpy(szDotStr + usPlainStrLen + nLabelDataLen, ".", 1);
   pDecodePos += (nLabelDataLen + 1);
   usPlainStrLen += (nLabelDataLen + 1);
   *pusEncodedStrLen += (nLabelDataLen + 1);
  }
  else //消息压缩格式,11000000 00000000,两个字节,前2位为跳转标志,后14位为跳转的偏移
  {
   if (szPacketStartPos == NULL)
   {
    return FALSE;
   }
   USHORT usJumpPos = ntohs(*(USHORT*)(pDecodePos)) & 0x3fff;
   USHORT nEncodeStrLen = 0;
   if (!DecodeDotStr(szPacketStartPos + usJumpPos, &nEncodeStrLen, szDotStr + usPlainStrLen, nDotStrSize - usPlainStrLen, szPacketStartPos))
   {
    return FALSE;
   }
   else
   {
    *pusEncodedStrLen += 2;
    return TRUE;
   }
  }
 }

 szDotStr[usPlainStrLen - 1] = '\0';
 *pusEncodedStrLen += 1;

 return TRUE;
}

ULONG CDNSLookup::GetTickCountCalibrate()
{
 static ULONG s_ulFirstCallTick = 0;
 static LONGLONG s_ullFirstCallTickMS = 0;

 SYSTEMTIME systemtime;
 FILETIME filetime;
 GetLocalTime(&systemtime); 
 SystemTimeToFileTime(&systemtime, &filetime);
 LARGE_INTEGER liCurrentTime;
 liCurrentTime.HighPart = filetime.dwHighDateTime;
 liCurrentTime.LowPart = filetime.dwLowDateTime;
 LONGLONG llCurrentTimeMS = liCurrentTime.QuadPart / 10000;

 if (s_ulFirstCallTick == 0)
 {
  s_ulFirstCallTick = GetTickCount();
 }
 if (s_ullFirstCallTickMS == 0)
 {
  s_ullFirstCallTickMS = llCurrentTimeMS;
 }

 return s_ulFirstCallTick + (ULONG)(llCurrentTimeMS - s_ullFirstCallTickMS);
}
 [DNSLookup.cpp]

 

#include <stdio.h>
#include <windows.h>
#include "DNSLookup.h"

int main(void)
{
 char szDomainName[] = "www.baidu.com";
 std::vector<ULONG> veculIPList;
 std::vector<std::string> vecstrIPList;
 std::vector<std::string> vecCNameList;
 ULONG ulTimeSpent = 0;
 CDNSLookup dnslookup;
 BOOL bRet = dnslookup.DNSLookup(inet_addr("114.114.114.114"), szDomainName, &vecstrIPList, &vecCNameList, 1000, &ulTimeSpent);

 printf("DNSLookup result (%s):\n", szDomainName);
 if (!bRet)
 {
  printf("timeout!\n");
  return -1;
 }

 for (int i = 0; i != veculIPList.size(); ++i)
 {
  printf("IP%d(ULONG) = %u\n", i + 1, veculIPList[i]);
 }
 for (int i = 0; i != vecstrIPList.size(); ++i)
 {
  printf("IP%d(string) = %s\n", i + 1, vecstrIPList[i].c_str());
 }
 for (int i = 0; i != vecCNameList.size(); ++i)
 {
  printf("CName%d = %s\n", i + 1, vecCNameList[i].c_str());
 }
 printf("time spent = %ums\n", ulTimeSpent);
 
 return 0;
}

以上就是C++实现DNS域名解析的全部内容,希望对大家的学习有所帮助。


« 
» 
快速导航

Copyright © 2016 phpStudy | 豫ICP备2021030365号-3