OXIESEC PANEL
- Current Dir:
/
/
opt
/
golang
/
1.22.0
/
src
/
net
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
addrselect.go
9.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
addrselect_test.go
8.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_aix.go
582 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_android.go
272 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_bsd.go
343 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_darwin.go
298 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_linux.go
642 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_netbsd.go
276 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_openbsd.go
276 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_resnew.go
580 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_resold.go
579 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_socknew.go
753 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_sockold.go
842 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_solaris.go
343 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_stub.go
1.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix.go
11.35 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo.go
2.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_darwin.go
461 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_res.go
911 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_resn.go
998 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_syscall.go
2.99 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_test.go
1.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conf.go
15.63 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conf_test.go
12.28 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conn_test.go
1.82 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial.go
25.68 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial_test.go
30.14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial_unix_test.go
2.77 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient.go
5.65 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_test.go
1.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_unix.go
24.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_unix_test.go
69.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig.go
1.73 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_unix.go
4.16 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_unix_test.go
7.07 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_windows.go
1.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsname_test.go
1.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_plan9.go
224 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_plan9_test.go
437 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_posix.go
543 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_posix_test.go
981 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_test.go
20.32 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_unix.go
382 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_unix_test.go
723 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_windows.go
355 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_windows_test.go
757 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
example_test.go
8.45 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
external_test.go
4.05 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_fake.go
3.79 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_js.go
627 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_plan9.go
3.56 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_posix.go
4.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_unix.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_wasip1.go
496 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_windows.go
6.14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file.go
1.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_plan9.go
2.72 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_stub.go
481 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_test.go
6.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_unix.go
2.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_unix_test.go
2.07 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_wasip1.go
2.2 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_wasip1_test.go
3.76 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_windows.go
521 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook.go
894 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_plan9.go
211 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_unix.go
658 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_windows.go
720 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hosts.go
3.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
hosts_test.go
5.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
http
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
interface.go
7.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_aix.go
4.46 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsd.go
2.82 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsd_test.go
1.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsdvar.go
718 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_darwin.go
1.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_freebsd.go
1.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_linux.go
6.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_linux_test.go
3.65 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_plan9.go
4.71 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_solaris.go
2.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_stub.go
814 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_test.go
9.76 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_unix_test.go
4.85 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_windows.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
internal
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
ip.go
13.88 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ip_test.go
25.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock.go
7.11 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_plan9.go
874 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_posix.go
3.89 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_test.go
5.98 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock.go
9.05 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_plan9.go
7.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_plan9_test.go
645 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_posix.go
7.86 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_test.go
6.81 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
listen_test.go
20.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup.go
29.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_plan9.go
9.94 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_test.go
40.62 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_unix.go
3.35 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_windows.go
13.8 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_windows_test.go
8.93 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mac.go
1.88 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mac_test.go
3.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
mail
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
main_cloexec_test.go
693 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_conf_test.go
1.39 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_noconf_test.go
467 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_plan9_test.go
392 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_posix_test.go
1.37 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_test.go
7.53 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_unix_test.go
1.19 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_wasm_test.go
284 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_windows_test.go
1 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mockserver_test.go
10.77 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_linux.go
3.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_linux_test.go
4.06 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_stub.go
542 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
net.go
24.56 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_fake.go
26.36 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_fake_test.go
2.79 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_test.go
14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_windows_test.go
16.28 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
netcgo_off.go
222 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netcgo_on.go
220 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_netcgo.go
453 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_off.go
220 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_on.go
218 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📁
netip
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
nss.go
5.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
nss_test.go
3.4 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
packetconn_test.go
3.02 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
parse.go
6.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
parse_test.go
1.55 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
pipe.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
pipe_test.go
1.2 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
platform_test.go
4.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port.go
1.46 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port_test.go
1.34 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port_unix.go
1.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
protoconn_test.go
7.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn.go
2.7 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_stub_test.go
631 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_test.go
4.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_unix_test.go
2.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_windows_test.go
3.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
resolverdialfunc_test.go
8.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rlimit_js.go
346 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
rlimit_unix.go
1.1 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
rpc
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
sendfile_linux.go
1.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_linux_test.go
1.93 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_stub.go
344 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_test.go
8.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_unix_alt.go
2.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_windows.go
1.02 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
server_test.go
11.67 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
smtp
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
sock_bsd.go
918 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_cloexec.go
1.38 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_linux.go
993 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_linux_test.go
575 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_plan9.go
262 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_posix.go
6.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_stub.go
390 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_windows.go
802 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockaddr_posix.go
1.45 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_aix.go
1.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_bsd.go
2.21 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_fake.go
955 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_linux.go
1.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_plan9.go
406 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_posix.go
2.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_solaris.go
1.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_windows.go
1.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_bsdvar.go
867 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_linux.go
735 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_posix.go
1.38 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_stub.go
769 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_windows.go
786 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_linux.go
1.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_stub.go
376 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_test.go
13.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sys_cloexec.go
962 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock.go
11.75 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_plan9.go
2.18 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_posix.go
6.16 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_test.go
17.68 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_unix_test.go
2.34 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_darwin.go
770 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_dragonfly.go
698 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_openbsd.go
365 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_plan9.go
525 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_posix.go
442 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_solaris.go
1.15 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_stub.go
399 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_unix.go
722 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_windows.go
741 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📁
testdata
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📁
textproto
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
timeout_test.go
29.11 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock.go
11.83 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_plan9.go
4.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_plan9_test.go
1.31 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_posix.go
7.53 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_test.go
17.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock.go
10.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_linux_test.go
2.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_plan9.go
1.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_posix.go
6.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_cloexec.go
654 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_cmsg_cloexec.go
332 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_other.go
275 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_test.go
2.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_test.go
10.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_windows_test.go
2.03 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
url
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
write_unix_test.go
1.61 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
writev_test.go
5.03 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
writev_unix.go
666 bytes
02/02/2024 06:09:55 PM
rw-r--r--
Editing: dnsclient_unix.go
Close
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // DNS client: see RFC 1035. // Has to be linked into package net for Dial. // TODO(rsc): // Could potentially handle many outstanding lookups faster. // Random UDP source port (net.Dial should do that for us). // Random request IDs. package net import ( "context" "errors" "internal/bytealg" "internal/itoa" "io" "os" "runtime" "sync" "sync/atomic" "time" "golang.org/x/net/dns/dnsmessage" ) const ( // to be used as a useTCP parameter to exchange useTCPOnly = true useUDPOrTCP = false // Maximum DNS packet size. // Value taken from https://dnsflagday.net/2020/. maxDNSPacketSize = 1232 ) var ( errLameReferral = errors.New("lame referral") errCannotUnmarshalDNSMessage = errors.New("cannot unmarshal DNS message") errCannotMarshalDNSMessage = errors.New("cannot marshal DNS message") errServerMisbehaving = errors.New("server misbehaving") errInvalidDNSResponse = errors.New("invalid DNS response") errNoAnswerFromDNSServer = errors.New("no answer from DNS server") // errServerTemporarilyMisbehaving is like errServerMisbehaving, except // that when it gets translated to a DNSError, the IsTemporary field // gets set to true. errServerTemporarilyMisbehaving = errors.New("server misbehaving") ) func newRequest(q dnsmessage.Question, ad bool) (id uint16, udpReq, tcpReq []byte, err error) { id = uint16(randInt()) b := dnsmessage.NewBuilder(make([]byte, 2, 514), dnsmessage.Header{ID: id, RecursionDesired: true, AuthenticData: ad}) if err := b.StartQuestions(); err != nil { return 0, nil, nil, err } if err := b.Question(q); err != nil { return 0, nil, nil, err } // Accept packets up to maxDNSPacketSize. RFC 6891. if err := b.StartAdditionals(); err != nil { return 0, nil, nil, err } var rh dnsmessage.ResourceHeader if err := rh.SetEDNS0(maxDNSPacketSize, dnsmessage.RCodeSuccess, false); err != nil { return 0, nil, nil, err } if err := b.OPTResource(rh, dnsmessage.OPTResource{}); err != nil { return 0, nil, nil, err } tcpReq, err = b.Finish() if err != nil { return 0, nil, nil, err } udpReq = tcpReq[2:] l := len(tcpReq) - 2 tcpReq[0] = byte(l >> 8) tcpReq[1] = byte(l) return id, udpReq, tcpReq, nil } func checkResponse(reqID uint16, reqQues dnsmessage.Question, respHdr dnsmessage.Header, respQues dnsmessage.Question) bool { if !respHdr.Response { return false } if reqID != respHdr.ID { return false } if reqQues.Type != respQues.Type || reqQues.Class != respQues.Class || !equalASCIIName(reqQues.Name, respQues.Name) { return false } return true } func dnsPacketRoundTrip(c Conn, id uint16, query dnsmessage.Question, b []byte) (dnsmessage.Parser, dnsmessage.Header, error) { if _, err := c.Write(b); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } b = make([]byte, maxDNSPacketSize) for { n, err := c.Read(b) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } var p dnsmessage.Parser // Ignore invalid responses as they may be malicious // forgery attempts. Instead continue waiting until // timeout. See golang.org/issue/13281. h, err := p.Start(b[:n]) if err != nil { continue } q, err := p.Question() if err != nil || !checkResponse(id, query, h, q) { continue } return p, h, nil } } func dnsStreamRoundTrip(c Conn, id uint16, query dnsmessage.Question, b []byte) (dnsmessage.Parser, dnsmessage.Header, error) { if _, err := c.Write(b); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } b = make([]byte, 1280) // 1280 is a reasonable initial size for IP over Ethernet, see RFC 4035 if _, err := io.ReadFull(c, b[:2]); err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } l := int(b[0])<<8 | int(b[1]) if l > len(b) { b = make([]byte, l) } n, err := io.ReadFull(c, b[:l]) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } var p dnsmessage.Parser h, err := p.Start(b[:n]) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotUnmarshalDNSMessage } q, err := p.Question() if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotUnmarshalDNSMessage } if !checkResponse(id, query, h, q) { return dnsmessage.Parser{}, dnsmessage.Header{}, errInvalidDNSResponse } return p, h, nil } // exchange sends a query on the connection and hopes for a response. func (r *Resolver) exchange(ctx context.Context, server string, q dnsmessage.Question, timeout time.Duration, useTCP, ad bool) (dnsmessage.Parser, dnsmessage.Header, error) { q.Class = dnsmessage.ClassINET id, udpReq, tcpReq, err := newRequest(q, ad) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, errCannotMarshalDNSMessage } var networks []string if useTCP { networks = []string{"tcp"} } else { networks = []string{"udp", "tcp"} } for _, network := range networks { ctx, cancel := context.WithDeadline(ctx, time.Now().Add(timeout)) defer cancel() c, err := r.dial(ctx, network, server) if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, err } if d, ok := ctx.Deadline(); ok && !d.IsZero() { c.SetDeadline(d) } var p dnsmessage.Parser var h dnsmessage.Header if _, ok := c.(PacketConn); ok { p, h, err = dnsPacketRoundTrip(c, id, q, udpReq) } else { p, h, err = dnsStreamRoundTrip(c, id, q, tcpReq) } c.Close() if err != nil { return dnsmessage.Parser{}, dnsmessage.Header{}, mapErr(err) } if err := p.SkipQuestion(); err != dnsmessage.ErrSectionDone { return dnsmessage.Parser{}, dnsmessage.Header{}, errInvalidDNSResponse } if h.Truncated { // see RFC 5966 continue } return p, h, nil } return dnsmessage.Parser{}, dnsmessage.Header{}, errNoAnswerFromDNSServer } // checkHeader performs basic sanity checks on the header. func checkHeader(p *dnsmessage.Parser, h dnsmessage.Header) error { rcode := extractExtendedRCode(*p, h) if rcode == dnsmessage.RCodeNameError { return errNoSuchHost } _, err := p.AnswerHeader() if err != nil && err != dnsmessage.ErrSectionDone { return errCannotUnmarshalDNSMessage } // libresolv continues to the next server when it receives // an invalid referral response. See golang.org/issue/15434. if rcode == dnsmessage.RCodeSuccess && !h.Authoritative && !h.RecursionAvailable && err == dnsmessage.ErrSectionDone { return errLameReferral } if rcode != dnsmessage.RCodeSuccess && rcode != dnsmessage.RCodeNameError { // None of the error codes make sense // for the query we sent. If we didn't get // a name error and we didn't get success, // the server is behaving incorrectly or // having temporary trouble. if rcode == dnsmessage.RCodeServerFailure { return errServerTemporarilyMisbehaving } return errServerMisbehaving } return nil } func skipToAnswer(p *dnsmessage.Parser, qtype dnsmessage.Type) error { for { h, err := p.AnswerHeader() if err == dnsmessage.ErrSectionDone { return errNoSuchHost } if err != nil { return errCannotUnmarshalDNSMessage } if h.Type == qtype { return nil } if err := p.SkipAnswer(); err != nil { return errCannotUnmarshalDNSMessage } } } // extractExtendedRCode extracts the extended RCode from the OPT resource (EDNS(0)) // If an OPT record is not found, the RCode from the hdr is returned. func extractExtendedRCode(p dnsmessage.Parser, hdr dnsmessage.Header) dnsmessage.RCode { p.SkipAllAnswers() p.SkipAllAuthorities() for { ahdr, err := p.AdditionalHeader() if err != nil { return hdr.RCode } if ahdr.Type == dnsmessage.TypeOPT { return ahdr.ExtendedRCode(hdr.RCode) } p.SkipAdditional() } } // Do a lookup for a single name, which must be rooted // (otherwise answer will not find the answers). func (r *Resolver) tryOneName(ctx context.Context, cfg *dnsConfig, name string, qtype dnsmessage.Type) (dnsmessage.Parser, string, error) { var lastErr error serverOffset := cfg.serverOffset() sLen := uint32(len(cfg.servers)) n, err := dnsmessage.NewName(name) if err != nil { return dnsmessage.Parser{}, "", errCannotMarshalDNSMessage } q := dnsmessage.Question{ Name: n, Type: qtype, Class: dnsmessage.ClassINET, } for i := 0; i < cfg.attempts; i++ { for j := uint32(0); j < sLen; j++ { server := cfg.servers[(serverOffset+j)%sLen] p, h, err := r.exchange(ctx, server, q, cfg.timeout, cfg.useTCP, cfg.trustAD) if err != nil { dnsErr := &DNSError{ Err: err.Error(), Name: name, Server: server, } if nerr, ok := err.(Error); ok && nerr.Timeout() { dnsErr.IsTimeout = true } // Set IsTemporary for socket-level errors. Note that this flag // may also be used to indicate a SERVFAIL response. if _, ok := err.(*OpError); ok { dnsErr.IsTemporary = true } lastErr = dnsErr continue } if err := checkHeader(&p, h); err != nil { dnsErr := &DNSError{ Err: err.Error(), Name: name, Server: server, } if err == errServerTemporarilyMisbehaving { dnsErr.IsTemporary = true } if err == errNoSuchHost { // The name does not exist, so trying // another server won't help. dnsErr.IsNotFound = true return p, server, dnsErr } lastErr = dnsErr continue } err = skipToAnswer(&p, qtype) if err == nil { return p, server, nil } lastErr = &DNSError{ Err: err.Error(), Name: name, Server: server, } if err == errNoSuchHost { // The name does not exist, so trying another // server won't help. lastErr.(*DNSError).IsNotFound = true return p, server, lastErr } } } return dnsmessage.Parser{}, "", lastErr } // A resolverConfig represents a DNS stub resolver configuration. type resolverConfig struct { initOnce sync.Once // guards init of resolverConfig // ch is used as a semaphore that only allows one lookup at a // time to recheck resolv.conf. ch chan struct{} // guards lastChecked and modTime lastChecked time.Time // last time resolv.conf was checked dnsConfig atomic.Pointer[dnsConfig] // parsed resolv.conf structure used in lookups } var resolvConf resolverConfig func getSystemDNSConfig() *dnsConfig { resolvConf.tryUpdate("/etc/resolv.conf") return resolvConf.dnsConfig.Load() } // init initializes conf and is only called via conf.initOnce. func (conf *resolverConfig) init() { // Set dnsConfig and lastChecked so we don't parse // resolv.conf twice the first time. conf.dnsConfig.Store(dnsReadConfig("/etc/resolv.conf")) conf.lastChecked = time.Now() // Prepare ch so that only one update of resolverConfig may // run at once. conf.ch = make(chan struct{}, 1) } // tryUpdate tries to update conf with the named resolv.conf file. // The name variable only exists for testing. It is otherwise always // "/etc/resolv.conf". func (conf *resolverConfig) tryUpdate(name string) { conf.initOnce.Do(conf.init) if conf.dnsConfig.Load().noReload { return } // Ensure only one update at a time checks resolv.conf. if !conf.tryAcquireSema() { return } defer conf.releaseSema() now := time.Now() if conf.lastChecked.After(now.Add(-5 * time.Second)) { return } conf.lastChecked = now switch runtime.GOOS { case "windows": // There's no file on disk, so don't bother checking // and failing. // // The Windows implementation of dnsReadConfig (called // below) ignores the name. default: var mtime time.Time if fi, err := os.Stat(name); err == nil { mtime = fi.ModTime() } if mtime.Equal(conf.dnsConfig.Load().mtime) { return } } dnsConf := dnsReadConfig(name) conf.dnsConfig.Store(dnsConf) } func (conf *resolverConfig) tryAcquireSema() bool { select { case conf.ch <- struct{}{}: return true default: return false } } func (conf *resolverConfig) releaseSema() { <-conf.ch } func (r *Resolver) lookup(ctx context.Context, name string, qtype dnsmessage.Type, conf *dnsConfig) (dnsmessage.Parser, string, error) { if !isDomainName(name) { // We used to use "invalid domain name" as the error, // but that is a detail of the specific lookup mechanism. // Other lookups might allow broader name syntax // (for example Multicast DNS allows UTF-8; see RFC 6762). // For consistency with libc resolvers, report no such host. return dnsmessage.Parser{}, "", &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } if conf == nil { conf = getSystemDNSConfig() } var ( p dnsmessage.Parser server string err error ) for _, fqdn := range conf.nameList(name) { p, server, err = r.tryOneName(ctx, conf, fqdn, qtype) if err == nil { break } if nerr, ok := err.(Error); ok && nerr.Temporary() && r.strictErrors() { // If we hit a temporary error with StrictErrors enabled, // stop immediately instead of trying more names. break } } if err == nil { return p, server, nil } if err, ok := err.(*DNSError); ok { // Show original name passed to lookup, not suffixed one. // In general we might have tried many suffixes; showing // just one is misleading. See also golang.org/issue/6324. err.Name = name } return dnsmessage.Parser{}, "", err } // avoidDNS reports whether this is a hostname for which we should not // use DNS. Currently this includes only .onion, per RFC 7686. See // golang.org/issue/13705. Does not cover .local names (RFC 6762), // see golang.org/issue/16739. func avoidDNS(name string) bool { if name == "" { return true } if name[len(name)-1] == '.' { name = name[:len(name)-1] } return stringsHasSuffixFold(name, ".onion") } // nameList returns a list of names for sequential DNS queries. func (conf *dnsConfig) nameList(name string) []string { // Check name length (see isDomainName). l := len(name) rooted := l > 0 && name[l-1] == '.' if l > 254 || l == 254 && !rooted { return nil } // If name is rooted (trailing dot), try only that name. if rooted { if avoidDNS(name) { return nil } return []string{name} } hasNdots := bytealg.CountString(name, '.') >= conf.ndots name += "." l++ // Build list of search choices. names := make([]string, 0, 1+len(conf.search)) // If name has enough dots, try unsuffixed first. if hasNdots && !avoidDNS(name) { names = append(names, name) } // Try suffixes that are not too long (see isDomainName). for _, suffix := range conf.search { fqdn := name + suffix if !avoidDNS(fqdn) && len(fqdn) <= 254 { names = append(names, fqdn) } } // Try unsuffixed, if not tried first above. if !hasNdots && !avoidDNS(name) { names = append(names, name) } return names } // hostLookupOrder specifies the order of LookupHost lookup strategies. // It is basically a simplified representation of nsswitch.conf. // "files" means /etc/hosts. type hostLookupOrder int const ( // hostLookupCgo means defer to cgo. hostLookupCgo hostLookupOrder = iota hostLookupFilesDNS // files first hostLookupDNSFiles // dns first hostLookupFiles // only files hostLookupDNS // only DNS ) var lookupOrderName = map[hostLookupOrder]string{ hostLookupCgo: "cgo", hostLookupFilesDNS: "files,dns", hostLookupDNSFiles: "dns,files", hostLookupFiles: "files", hostLookupDNS: "dns", } func (o hostLookupOrder) String() string { if s, ok := lookupOrderName[o]; ok { return s } return "hostLookupOrder=" + itoa.Itoa(int(o)) + "??" } func (r *Resolver) goLookupHostOrder(ctx context.Context, name string, order hostLookupOrder, conf *dnsConfig) (addrs []string, err error) { if order == hostLookupFilesDNS || order == hostLookupFiles { // Use entries from /etc/hosts if they match. addrs, _ = lookupStaticHost(name) if len(addrs) > 0 { return } if order == hostLookupFiles { return nil, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } } ips, _, err := r.goLookupIPCNAMEOrder(ctx, "ip", name, order, conf) if err != nil { return } addrs = make([]string, 0, len(ips)) for _, ip := range ips { addrs = append(addrs, ip.String()) } return } // lookup entries from /etc/hosts func goLookupIPFiles(name string) (addrs []IPAddr, canonical string) { addr, canonical := lookupStaticHost(name) for _, haddr := range addr { haddr, zone := splitHostZone(haddr) if ip := ParseIP(haddr); ip != nil { addr := IPAddr{IP: ip, Zone: zone} addrs = append(addrs, addr) } } sortByRFC6724(addrs) return addrs, canonical } // goLookupIP is the native Go implementation of LookupIP. // The libc versions are in cgo_*.go. func (r *Resolver) goLookupIP(ctx context.Context, network, host string, order hostLookupOrder, conf *dnsConfig) (addrs []IPAddr, err error) { addrs, _, err = r.goLookupIPCNAMEOrder(ctx, network, host, order, conf) return } func (r *Resolver) goLookupIPCNAMEOrder(ctx context.Context, network, name string, order hostLookupOrder, conf *dnsConfig) (addrs []IPAddr, cname dnsmessage.Name, err error) { if order == hostLookupFilesDNS || order == hostLookupFiles { var canonical string addrs, canonical = goLookupIPFiles(name) if len(addrs) > 0 { var err error cname, err = dnsmessage.NewName(canonical) if err != nil { return nil, dnsmessage.Name{}, err } return addrs, cname, nil } if order == hostLookupFiles { return nil, dnsmessage.Name{}, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } } if !isDomainName(name) { // See comment in func lookup above about use of errNoSuchHost. return nil, dnsmessage.Name{}, &DNSError{Err: errNoSuchHost.Error(), Name: name, IsNotFound: true} } type result struct { p dnsmessage.Parser server string error } if conf == nil { conf = getSystemDNSConfig() } lane := make(chan result, 1) qtypes := []dnsmessage.Type{dnsmessage.TypeA, dnsmessage.TypeAAAA} if network == "CNAME" { qtypes = append(qtypes, dnsmessage.TypeCNAME) } switch ipVersion(network) { case '4': qtypes = []dnsmessage.Type{dnsmessage.TypeA} case '6': qtypes = []dnsmessage.Type{dnsmessage.TypeAAAA} } var queryFn func(fqdn string, qtype dnsmessage.Type) var responseFn func(fqdn string, qtype dnsmessage.Type) result if conf.singleRequest { queryFn = func(fqdn string, qtype dnsmessage.Type) {} responseFn = func(fqdn string, qtype dnsmessage.Type) result { dnsWaitGroup.Add(1) defer dnsWaitGroup.Done() p, server, err := r.tryOneName(ctx, conf, fqdn, qtype) return result{p, server, err} } } else { queryFn = func(fqdn string, qtype dnsmessage.Type) { dnsWaitGroup.Add(1) go func(qtype dnsmessage.Type) { p, server, err := r.tryOneName(ctx, conf, fqdn, qtype) lane <- result{p, server, err} dnsWaitGroup.Done() }(qtype) } responseFn = func(fqdn string, qtype dnsmessage.Type) result { return <-lane } } var lastErr error for _, fqdn := range conf.nameList(name) { for _, qtype := range qtypes { queryFn(fqdn, qtype) } hitStrictError := false for _, qtype := range qtypes { result := responseFn(fqdn, qtype) if result.error != nil { if nerr, ok := result.error.(Error); ok && nerr.Temporary() && r.strictErrors() { // This error will abort the nameList loop. hitStrictError = true lastErr = result.error } else if lastErr == nil || fqdn == name+"." { // Prefer error for original name. lastErr = result.error } continue } // Presotto says it's okay to assume that servers listed in // /etc/resolv.conf are recursive resolvers. // // We asked for recursion, so it should have included all the // answers we need in this one packet. // // Further, RFC 1034 section 4.3.1 says that "the recursive // response to a query will be... The answer to the query, // possibly preface by one or more CNAME RRs that specify // aliases encountered on the way to an answer." // // Therefore, we should be able to assume that we can ignore // CNAMEs and that the A and AAAA records we requested are // for the canonical name. loop: for { h, err := result.p.AnswerHeader() if err != nil && err != dnsmessage.ErrSectionDone { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result.server, } } if err != nil { break } switch h.Type { case dnsmessage.TypeA: a, err := result.p.AResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result.server, } break loop } addrs = append(addrs, IPAddr{IP: IP(a.A[:])}) if cname.Length == 0 && h.Name.Length != 0 { cname = h.Name } case dnsmessage.TypeAAAA: aaaa, err := result.p.AAAAResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result.server, } break loop } addrs = append(addrs, IPAddr{IP: IP(aaaa.AAAA[:])}) if cname.Length == 0 && h.Name.Length != 0 { cname = h.Name } case dnsmessage.TypeCNAME: c, err := result.p.CNAMEResource() if err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result.server, } break loop } if cname.Length == 0 && c.CNAME.Length > 0 { cname = c.CNAME } default: if err := result.p.SkipAnswer(); err != nil { lastErr = &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: name, Server: result.server, } break loop } continue } } } if hitStrictError { // If either family hit an error with StrictErrors enabled, // discard all addresses. This ensures that network flakiness // cannot turn a dualstack hostname IPv4/IPv6-only. addrs = nil break } if len(addrs) > 0 || network == "CNAME" && cname.Length > 0 { break } } if lastErr, ok := lastErr.(*DNSError); ok { // Show original name passed to lookup, not suffixed one. // In general we might have tried many suffixes; showing // just one is misleading. See also golang.org/issue/6324. lastErr.Name = name } sortByRFC6724(addrs) if len(addrs) == 0 && !(network == "CNAME" && cname.Length > 0) { if order == hostLookupDNSFiles { var canonical string addrs, canonical = goLookupIPFiles(name) if len(addrs) > 0 { var err error cname, err = dnsmessage.NewName(canonical) if err != nil { return nil, dnsmessage.Name{}, err } return addrs, cname, nil } } if lastErr != nil { return nil, dnsmessage.Name{}, lastErr } } return addrs, cname, nil } // goLookupCNAME is the native Go (non-cgo) implementation of LookupCNAME. func (r *Resolver) goLookupCNAME(ctx context.Context, host string, order hostLookupOrder, conf *dnsConfig) (string, error) { _, cname, err := r.goLookupIPCNAMEOrder(ctx, "CNAME", host, order, conf) return cname.String(), err } // goLookupPTR is the native Go implementation of LookupAddr. func (r *Resolver) goLookupPTR(ctx context.Context, addr string, order hostLookupOrder, conf *dnsConfig) ([]string, error) { if order == hostLookupFiles || order == hostLookupFilesDNS { names := lookupStaticAddr(addr) if len(names) > 0 { return names, nil } if order == hostLookupFiles { return nil, &DNSError{Err: errNoSuchHost.Error(), Name: addr, IsNotFound: true} } } arpa, err := reverseaddr(addr) if err != nil { return nil, err } p, server, err := r.lookup(ctx, arpa, dnsmessage.TypePTR, conf) if err != nil { var dnsErr *DNSError if errors.As(err, &dnsErr) && dnsErr.IsNotFound { if order == hostLookupDNSFiles { names := lookupStaticAddr(addr) if len(names) > 0 { return names, nil } } } return nil, err } var ptrs []string for { h, err := p.AnswerHeader() if err == dnsmessage.ErrSectionDone { break } if err != nil { return nil, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } if h.Type != dnsmessage.TypePTR { err := p.SkipAnswer() if err != nil { return nil, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } continue } ptr, err := p.PTRResource() if err != nil { return nil, &DNSError{ Err: errCannotUnmarshalDNSMessage.Error(), Name: addr, Server: server, } } ptrs = append(ptrs, ptr.PTR.String()) } return ptrs, nil }