首页 > 编程 > C++ > 正文

C++如何实现DNS域名解析

2020-01-26 15:00:35
字体:
来源:转载
供稿:网友

一、概述

现在来搞定DNS域名解析,其实这是前面一篇文章C++实现Ping里面的遗留问题,要干的活是ping的过程中画红线的部分:

cmd下域名解析的命令是nslookup,比如“nslookup www.baidu.com”的结果如下:

其中,Address返回的就是www.baidu.com对应的IP地址,这个可能有多个

Alias指别名,也就是说www.baidu.com是www.a.shifen.com的别名,而www.a.shifen.com则是www.baidu.com的规范名(Canonical Name,CName),具体参考RFC1035 3.2.2 & wikipedia

二、实现结果预览

先看一下最终搞成了什么样子

输入:域名字符串

输出:IP列表、CName列表、DNS查询所用时间

三、相关技术

3.1、UDP or TCP ? (RFC1035 4.2)

UDP:DNS查询和回复采用低开销高性能的UDP,端口号为53。

TCP:辅助DNS服务器从主DNS服务器拉取最新数据时,采用可靠的TCP传输,端口号也为53。

我们这里做DNS查询采用UDP,53端口。

3.2、DNS查询/回复包头部解析 (RFC1035 4.1.1)

重点介绍一下我们关心的部分:

ID(16bits):标识符,一般填入本进程的标识符

QR(1bits):标志位,查询包为0,回复包为1

Opcode(4bits):查询的种类,标准查询为0

QDCOUNT(16bits):DNS查询/回复包数据部分Question字段的个数

ANCOUNT(16bits):DNS查询/回复包数据部分Answer字段的个数

3.2、DNS查询/回复包数据部分解析 (RFC1035 4.1.2 & 4.1.3)

查询/回复包的数据部分依次为QDCOUNT个Question字段、ANCOUNT个Answer字段....

对于任意字段,其格式如下:

Name(不定长):域名,这部分的格式比较复杂,后面单独说。

TYPE(16bits):查询类型/回复包RDATA类型,比如TYPE=1表示主机IP地址、TYPE=5表示CNAME,详见RFC1035 3.2.2

CLASS(16bits):类,一般情况下CLASS=1表示Internet,详见RFC1035 3.2.4

TTL(32bits,仅回复包):生存时间

RDLENGTH(16bits,仅回复包):RDATA部分的字节数

RDATA(不定长,仅回复包):资源数据,具体格式取决于TYPE和CLASS,比如TYPE=1、CLASS=1时,RDATA为四个字节的IP地址

3.3、Name解析&消息压缩

3.3.1、一般格式 (RFC1035 4.1.2)

标签内容长度(1个字节) + 标签内容,以标签内容长度0作为Name的结束符,例如:

3.3.2、消息压缩格式 (RFC1035 4.1.4)

如果标签内容长度的二进制前两位是11,则表示消息压缩。

此时,标签内容长度1个字节+后面的1个字节一共16位,后14位表示相对DNS包起始地址的偏移(Byte),例如:

上述例子中,DNS包起始地址为0x0000,c0 13的二进制为11000000 00010003,即跳转偏移为0x13个字节,对应的数据为03 63 6f 6d 00。

RFC1035中规定,支持的消息压缩规则为:

①以内容长度0结尾的标签序列

②偏移指针

③标签序列+偏移指针

也就是说,Name的消息压缩要求偏移指针必须在Name的尾部,且不支持同一级存在多个偏移指针(偏移指针序列),

但Name的消息压缩支持嵌套的偏移指针,即指针指向的偏移位置仍然是以偏移指针结尾的数据

四、代码实现

#pragma once//这里需要导入库 Ws2_32.lib,在不同的IDE下可能不太一样//#pragma comment(lib, "Ws2_32.lib")#include <windows.h>#include <string>#include <vector>#define MAX_DOMAINNAME_LEN 255#define DNS_PORT  53#define DNS_TYPE_SIZE 2#define DNS_CLASS_SIZE 2#define DNS_TTL_SIZE 4#define DNS_DATALEN_SIZE 2#define DNS_TYPE_A  0x0001 //1 a host address#define DNS_TYPE_CNAME 0x0005 //5 the canonical name for an alias#define DNS_PACKET_MAX_SIZE (sizeof(DNSHeader) + MAX_DOMAINNAME_LEN + DNS_TYPE_SIZE + DNS_CLASS_SIZE)struct DNSHeader{ USHORT usTransID; //标识符 USHORT usFlags; //各种标志位 USHORT usQuestionCount; //Question字段个数  USHORT usAnswerCount; //Answer字段个数 USHORT usAuthorityCount; //Authority字段个数 USHORT usAdditionalCount; //Additional字段个数};class CDNSLookup{public: CDNSLookup(); ~CDNSLookup(); BOOL DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList = NULL, std::vector<std::string> *pvecstrCNameList = NULL, ULONG ulTimeout = 1000, ULONG *pulTimeSpent = NULL); BOOL DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<std::string> *pvecstrIPList = NULL, std::vector<std::string> *pvecstrCNameList = NULL, ULONG ulTimeout = 1000, ULONG *pulTimeSpent = NULL);private: BOOL Init(); BOOL UnInit(); BOOL DNSLookupCore(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent); BOOL SendDNSRequest(sockaddr_in sockAddrDNSServer, char *szDomainName); BOOL RecvDNSResponse(sockaddr_in sockAddrDNSServer, ULONG ulTimeout, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG *pulTimeSpent); BOOL EncodeDotStr(char *szDotStr, char *szEncodedStr, USHORT nEncodedStrSize); BOOL DecodeDotStr(char *szEncodedStr, USHORT *pusEncodedStrLen, char *szDotStr, USHORT nDotStrSize, char *szPacketStartPos = NULL); ULONG GetTickCountCalibrate();private: BOOL m_bIsInitOK; SOCKET m_sock; WSAEVENT m_event; USHORT m_usCurrentProcID; char *m_szDNSPacket;}; [DNSLookup.h] #include "DNSLookup.h"#include <stdio.h>#include <string.h>CDNSLookup::CDNSLookup() :  m_bIsInitOK(FALSE),  m_sock(INVALID_SOCKET), m_szDNSPacket(NULL){ m_bIsInitOK = Init();}CDNSLookup::~CDNSLookup(){ UnInit();}BOOL CDNSLookup::DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent){ return DNSLookupCore(ulDNSServerIP, szDomainName, pveculIPList, pvecstrCNameList, ulTimeout, pulTimeSpent);}BOOL CDNSLookup::DNSLookup(ULONG ulDNSServerIP, char *szDomainName, std::vector<std::string> *pvecstrIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent){ std::vector<ULONG> *pveculIPList = NULL; if (pvecstrIPList != NULL) { std::vector<ULONG> veculIPList; pveculIPList = &veculIPList; } BOOL bRet = DNSLookupCore(ulDNSServerIP, szDomainName, pveculIPList, pvecstrCNameList, ulTimeout, pulTimeSpent); if (bRet) { pvecstrIPList->clear(); char szIP[16] = {'/0'}; for (std::vector<ULONG>::iterator iter = pveculIPList->begin(); iter != pveculIPList->end(); ++iter) {  BYTE *pbyIPSegment = (BYTE*)(&(*iter));  //sprintf_s(szIP, 16, "%d.%d.%d.%d", pbyIPSegment[0], pbyIPSegment[1], pbyIPSegment[2], pbyIPSegment[3]);  sprintf(szIP, "%d.%d.%d.%d", pbyIPSegment[0], pbyIPSegment[1], pbyIPSegment[2], pbyIPSegment[3]);  pvecstrIPList->push_back(szIP); } } return bRet;}BOOL CDNSLookup::Init(){ WSADATA wsaData; if (WSAStartup(MAKEWORD(2, 2), &wsaData) == SOCKET_ERROR) { return FALSE; }  if ((m_sock = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET) { return FALSE; } m_event = WSACreateEvent(); WSAEventSelect(m_sock, m_event, FD_READ); m_szDNSPacket = new (std::nothrow) char[DNS_PACKET_MAX_SIZE]; if (m_szDNSPacket == NULL) { return FALSE; } m_usCurrentProcID = (USHORT)GetCurrentProcessId(); return TRUE;}BOOL CDNSLookup::UnInit(){ WSACleanup(); if (m_szDNSPacket != NULL) { delete [] m_szDNSPacket; } return TRUE;}BOOL CDNSLookup::DNSLookupCore(ULONG ulDNSServerIP, char *szDomainName, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG ulTimeout, ULONG *pulTimeSpent){ if (m_bIsInitOK == FALSE || szDomainName == NULL) { return FALSE; } //配置SOCKET sockaddr_in sockAddrDNSServer;  sockAddrDNSServer.sin_family = AF_INET;  sockAddrDNSServer.sin_addr.s_addr = ulDNSServerIP; sockAddrDNSServer.sin_port = htons( DNS_PORT ); //DNS查询与解析 if (!SendDNSRequest(sockAddrDNSServer, szDomainName) || !RecvDNSResponse(sockAddrDNSServer, ulTimeout, pveculIPList, pvecstrCNameList, pulTimeSpent)) { return FALSE; } return TRUE;}BOOL CDNSLookup::SendDNSRequest(sockaddr_in sockAddrDNSServer, char *szDomainName){ char *pWriteDNSPacket = m_szDNSPacket; memset(pWriteDNSPacket, 0, DNS_PACKET_MAX_SIZE);  //填充DNS查询报文头部 DNSHeader *pDNSHeader = (DNSHeader*)pWriteDNSPacket; pDNSHeader->usTransID = m_usCurrentProcID; pDNSHeader->usFlags = htons(0x0100); pDNSHeader->usQuestionCount = htons(0x0001); pDNSHeader->usAnswerCount = 0x0000; pDNSHeader->usAuthorityCount = 0x0000; pDNSHeader->usAdditionalCount = 0x0000; //设置DNS查询报文内容 USHORT usQType = htons(0x0001); USHORT usQClass = htons(0x0001); USHORT nDomainNameLen = strlen(szDomainName); char *szEncodedDomainName = (char *)malloc(nDomainNameLen + 2); if (szEncodedDomainName == NULL) { return FALSE; } if (!EncodeDotStr(szDomainName, szEncodedDomainName, nDomainNameLen + 2)) { return FALSE; } //填充DNS查询报文内容 USHORT nEncodedDomainNameLen = strlen(szEncodedDomainName) + 1; memcpy(pWriteDNSPacket += sizeof(DNSHeader), szEncodedDomainName, nEncodedDomainNameLen); memcpy(pWriteDNSPacket += nEncodedDomainNameLen, (char*)(&usQType), DNS_TYPE_SIZE); memcpy(pWriteDNSPacket += DNS_TYPE_SIZE, (char*)(&usQClass), DNS_CLASS_SIZE); free (szEncodedDomainName); //发送DNS查询报文 USHORT nDNSPacketSize = sizeof(DNSHeader) + nEncodedDomainNameLen + DNS_TYPE_SIZE + DNS_CLASS_SIZE; if (sendto(m_sock, m_szDNSPacket, nDNSPacketSize, 0, (sockaddr*)&sockAddrDNSServer, sizeof(sockAddrDNSServer)) == SOCKET_ERROR) { return FALSE; } return TRUE;}BOOL CDNSLookup::RecvDNSResponse(sockaddr_in sockAddrDNSServer, ULONG ulTimeout, std::vector<ULONG> *pveculIPList, std::vector<std::string> *pvecstrCNameList, ULONG *pulTimeSpent){ ULONG ulSendTimestamp = GetTickCountCalibrate(); if (pveculIPList != NULL) { pveculIPList->clear(); } if (pvecstrCNameList != NULL) { pvecstrCNameList->clear(); } char recvbuf[1024] = {'/0'}; char szDotName[128] = {'/0'}; USHORT nEncodedNameLen = 0; while (TRUE) { if (WSAWaitForMultipleEvents(1, &m_event, FALSE, 100, FALSE) != WSA_WAIT_TIMEOUT) {  WSANETWORKEVENTS netEvent;  WSAEnumNetworkEvents(m_sock, m_event, &netEvent);  if (netEvent.lNetworkEvents & FD_READ)  {  ULONG ulRecvTimestamp = GetTickCountCalibrate();  int nSockaddrDestSize = sizeof(sockAddrDNSServer);  //接收响应报文  if (recvfrom(m_sock, recvbuf, 1024, 0, (struct sockaddr*)&sockAddrDNSServer, &nSockaddrDestSize) != SOCKET_ERROR)  {   DNSHeader *pDNSHeader = (DNSHeader*)recvbuf;   USHORT usQuestionCount = 0;   USHORT usAnswerCount = 0;   if (pDNSHeader->usTransID == m_usCurrentProcID   && (ntohs(pDNSHeader->usFlags) & 0xfb7f) == 0x8100 //RFC1035 4.1.1(Header section format)   && (usQuestionCount = ntohs(pDNSHeader->usQuestionCount)) >= 0   && (usAnswerCount = ntohs(pDNSHeader->usAnswerCount)) > 0)   {   char *pDNSData = recvbuf + sizeof(DNSHeader);   //解析Question字段   for (int q = 0; q != usQuestionCount; ++q)   {    if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName)))    {    return FALSE;    }    pDNSData += (nEncodedNameLen + DNS_TYPE_SIZE + DNS_CLASS_SIZE);   }   //解析Answer字段   for (int a = 0; a != usAnswerCount; ++a)   {    if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName), recvbuf))    {    return FALSE;    }    pDNSData += nEncodedNameLen;    USHORT usAnswerType = ntohs(*(USHORT*)(pDNSData));    USHORT usAnswerClass = ntohs(*(USHORT*)(pDNSData + DNS_TYPE_SIZE));    ULONG usAnswerTTL = ntohl(*(ULONG*)(pDNSData + DNS_TYPE_SIZE + DNS_CLASS_SIZE));    USHORT usAnswerDataLen = ntohs(*(USHORT*)(pDNSData + DNS_TYPE_SIZE + DNS_CLASS_SIZE + DNS_TTL_SIZE));    pDNSData += (DNS_TYPE_SIZE + DNS_CLASS_SIZE + DNS_TTL_SIZE + DNS_DATALEN_SIZE);    if (usAnswerType == DNS_TYPE_A && pveculIPList != NULL)    {    ULONG ulIP = *(ULONG*)(pDNSData);    pveculIPList->push_back(ulIP);    }    else if (usAnswerType == DNS_TYPE_CNAME && pvecstrCNameList != NULL)    {    if (!DecodeDotStr(pDNSData, &nEncodedNameLen, szDotName, sizeof(szDotName), recvbuf))    {     return FALSE;    }    pvecstrCNameList->push_back(szDotName);    }    pDNSData += (usAnswerDataLen);   }   //计算DNS查询所用时间   if (pulTimeSpent != NULL)   {    *pulTimeSpent = ulRecvTimestamp - ulSendTimestamp;   }   break;   }  }  } } //超时退出 if (GetTickCountCalibrate() - ulSendTimestamp > ulTimeout) {  *pulTimeSpent = ulTimeout + 1;  return FALSE; } } return TRUE;}/* * convert "www.baidu.com" to "/x03www/x05baidu/x03com" * 0x0000 03 77 77 77 05 62 61 69 64 75 03 63 6f 6d 00 ff */BOOL CDNSLookup::EncodeDotStr(char *szDotStr, char *szEncodedStr, USHORT nEncodedStrSize){ USHORT nDotStrLen = strlen(szDotStr); if (szDotStr == NULL || szEncodedStr == NULL || nEncodedStrSize < nDotStrLen + 2) { return FALSE; } char *szDotStrCopy = new char[nDotStrLen + 1]; //strcpy_s(szDotStrCopy, nDotStrLen + 1, szDotStr); strcpy(szDotStrCopy, szDotStr); char *pNextToken = NULL; //char *pLabel = strtok_s(szDotStrCopy, ".", &pNextToken); char *pLabel = strtok(szDotStrCopy, "."); USHORT nLabelLen = 0; USHORT nEncodedStrLen = 0; while (pLabel != NULL) { if ((nLabelLen = strlen(pLabel)) != 0) {  //sprintf_s(szEncodedStr + nEncodedStrLen, nEncodedStrSize - nEncodedStrLen, "%c%s", nLabelLen, pLabel);  sprintf(szEncodedStr + nEncodedStrLen, "%c%s", nLabelLen, pLabel);  nEncodedStrLen += (nLabelLen + 1); } //pLabel = strtok_s(NULL, ".", &pNextToken); pLabel = strtok(NULL, "."); } delete [] szDotStrCopy;  return TRUE;}/* * convert "/x03www/x05baidu/x03com/x00" to "www.baidu.com" * 0x0000 03 77 77 77 05 62 61 69 64 75 03 63 6f 6d 00 ff * convert "/x03www/x05baidu/xc0/x13" to "www.baidu.com" * 0x0000 03 77 77 77 05 62 61 69 64 75 c0 13 ff ff ff ff * 0x0010 ff ff ff 03 63 6f 6d 00 ff ff ff ff ff ff ff ff */BOOL CDNSLookup::DecodeDotStr(char *szEncodedStr, USHORT *pusEncodedStrLen, char *szDotStr, USHORT nDotStrSize, char *szPacketStartPos){ if (szEncodedStr == NULL || pusEncodedStrLen == NULL || szDotStr == NULL) { return FALSE; } char *pDecodePos = szEncodedStr; USHORT usPlainStrLen = 0; BYTE nLabelDataLen = 0;  *pusEncodedStrLen = 0; while ((nLabelDataLen = *pDecodePos) != 0x00) { if ((nLabelDataLen & 0xc0) == 0) //普通格式,LabelDataLen + Label {  if (usPlainStrLen + nLabelDataLen + 1 > nDotStrSize)  {  return FALSE;  }  memcpy(szDotStr + usPlainStrLen, pDecodePos + 1, nLabelDataLen);  memcpy(szDotStr + usPlainStrLen + nLabelDataLen, ".", 1);  pDecodePos += (nLabelDataLen + 1);  usPlainStrLen += (nLabelDataLen + 1);  *pusEncodedStrLen += (nLabelDataLen + 1); } else //消息压缩格式,11000000 00000000,两个字节,前2位为跳转标志,后14位为跳转的偏移 {  if (szPacketStartPos == NULL)  {  return FALSE;  }  USHORT usJumpPos = ntohs(*(USHORT*)(pDecodePos)) & 0x3fff;  USHORT nEncodeStrLen = 0;  if (!DecodeDotStr(szPacketStartPos + usJumpPos, &nEncodeStrLen, szDotStr + usPlainStrLen, nDotStrSize - usPlainStrLen, szPacketStartPos))  {  return FALSE;  }  else  {  *pusEncodedStrLen += 2;  return TRUE;  } } } szDotStr[usPlainStrLen - 1] = '/0'; *pusEncodedStrLen += 1; return TRUE;}ULONG CDNSLookup::GetTickCountCalibrate(){ static ULONG s_ulFirstCallTick = 0; static LONGLONG s_ullFirstCallTickMS = 0; SYSTEMTIME systemtime; FILETIME filetime; GetLocalTime(&systemtime);  SystemTimeToFileTime(&systemtime, &filetime); LARGE_INTEGER liCurrentTime; liCurrentTime.HighPart = filetime.dwHighDateTime; liCurrentTime.LowPart = filetime.dwLowDateTime; LONGLONG llCurrentTimeMS = liCurrentTime.QuadPart / 10000; if (s_ulFirstCallTick == 0) { s_ulFirstCallTick = GetTickCount(); } if (s_ullFirstCallTickMS == 0) { s_ullFirstCallTickMS = llCurrentTimeMS; } return s_ulFirstCallTick + (ULONG)(llCurrentTimeMS - s_ullFirstCallTickMS);} [DNSLookup.cpp] #include <stdio.h>#include <windows.h>#include "DNSLookup.h"int main(void){ char szDomainName[] = "www.baidu.com"; std::vector<ULONG> veculIPList; std::vector<std::string> vecstrIPList; std::vector<std::string> vecCNameList; ULONG ulTimeSpent = 0; CDNSLookup dnslookup; BOOL bRet = dnslookup.DNSLookup(inet_addr("114.114.114.114"), szDomainName, &vecstrIPList, &vecCNameList, 1000, &ulTimeSpent); printf("DNSLookup result (%s):/n", szDomainName); if (!bRet) { printf("timeout!/n"); return -1; } for (int i = 0; i != veculIPList.size(); ++i) { printf("IP%d(ULONG) = %u/n", i + 1, veculIPList[i]); } for (int i = 0; i != vecstrIPList.size(); ++i) { printf("IP%d(string) = %s/n", i + 1, vecstrIPList[i].c_str()); } for (int i = 0; i != vecCNameList.size(); ++i) { printf("CName%d = %s/n", i + 1, vecCNameList[i].c_str()); } printf("time spent = %ums/n", ulTimeSpent);  return 0;}

以上就是C++实现DNS域名解析的全部内容,希望对大家的学习有所帮助。

发表评论 共有条评论
用户名: 密码:
验证码: 匿名发表