mirror of
https://github.com/MetaCubeX/mihomo.git
synced 2026-02-26 08:47:09 +00:00
chore: support connection reuse for DoT
This commit is contained in:
@@ -1189,7 +1189,7 @@ func parseNameServer(servers []string, respectRules bool, preferH3 bool) ([]dns.
|
||||
dnsNetType = "tcp" // TCP
|
||||
case "tls":
|
||||
addr, err = hostWithDefaultPort(u.Host, "853")
|
||||
dnsNetType = "tcp-tls" // DNS over TLS
|
||||
dnsNetType = "tls" // DNS over TLS
|
||||
case "http", "https":
|
||||
addr, err = hostWithDefaultPort(u.Host, "443")
|
||||
dnsNetType = "https" // DNS over HTTPS
|
||||
|
||||
@@ -7,20 +7,17 @@ import (
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/metacubex/mihomo/component/ca"
|
||||
C "github.com/metacubex/mihomo/constant"
|
||||
"github.com/metacubex/mihomo/log"
|
||||
|
||||
"github.com/metacubex/tls"
|
||||
D "github.com/miekg/dns"
|
||||
)
|
||||
|
||||
type client struct {
|
||||
port string
|
||||
host string
|
||||
dialer *dnsDialer
|
||||
schema string
|
||||
skipCertVerify bool
|
||||
port string
|
||||
host string
|
||||
dialer *dnsDialer
|
||||
schema string
|
||||
}
|
||||
|
||||
var _ dnsClient = (*client)(nil)
|
||||
@@ -43,23 +40,6 @@ func (c *client) ExchangeContext(ctx context.Context, m *D.Msg) (*D.Msg, error)
|
||||
}
|
||||
defer conn.Close()
|
||||
|
||||
if c.schema == "tls" {
|
||||
tlsConfig, err := ca.GetTLSConfig(ca.Option{
|
||||
TLSConfig: &tls.Config{
|
||||
ServerName: c.host,
|
||||
InsecureSkipVerify: c.skipCertVerify,
|
||||
},
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
tlsConn := tls.Client(conn, tlsConfig)
|
||||
if err := tlsConn.HandshakeContext(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
conn = tlsConn
|
||||
}
|
||||
|
||||
// miekg/dns ExchangeContext doesn't respond to context cancel.
|
||||
// this is a workaround
|
||||
type result struct {
|
||||
@@ -117,12 +97,6 @@ func newClient(addr string, resolver *Resolver, netType string, params map[strin
|
||||
}
|
||||
if strings.HasPrefix(netType, "tcp") {
|
||||
c.schema = "tcp"
|
||||
if strings.HasSuffix(netType, "tls") {
|
||||
c.schema = "tls"
|
||||
}
|
||||
}
|
||||
if params["skip-cert-verify"] == "true" {
|
||||
c.skipCertVerify = true
|
||||
}
|
||||
return c
|
||||
}
|
||||
|
||||
164
dns/dot.go
Normal file
164
dns/dot.go
Normal file
@@ -0,0 +1,164 @@
|
||||
package dns
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net"
|
||||
"runtime"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/metacubex/mihomo/common/deque"
|
||||
"github.com/metacubex/mihomo/component/ca"
|
||||
C "github.com/metacubex/mihomo/constant"
|
||||
|
||||
"github.com/metacubex/tls"
|
||||
D "github.com/miekg/dns"
|
||||
)
|
||||
|
||||
const maxOldDotConns = 8
|
||||
|
||||
type dnsOverTLS struct {
|
||||
port string
|
||||
host string
|
||||
dialer *dnsDialer
|
||||
skipCertVerify bool
|
||||
|
||||
access sync.Mutex
|
||||
connections deque.Deque[net.Conn] // LIFO
|
||||
}
|
||||
|
||||
var _ dnsClient = (*dnsOverTLS)(nil)
|
||||
|
||||
// Address implements dnsClient
|
||||
func (t *dnsOverTLS) Address() string {
|
||||
return fmt.Sprintf("tls://%s", net.JoinHostPort(t.host, t.port))
|
||||
}
|
||||
|
||||
func (t *dnsOverTLS) ExchangeContext(ctx context.Context, m *D.Msg) (*D.Msg, error) {
|
||||
// miekg/dns ExchangeContext doesn't respond to context cancel.
|
||||
// this is a workaround
|
||||
type result struct {
|
||||
msg *D.Msg
|
||||
err error
|
||||
}
|
||||
ch := make(chan result, 1)
|
||||
|
||||
go func() {
|
||||
var msg *D.Msg
|
||||
var err error
|
||||
defer func() { ch <- result{msg, err} }()
|
||||
for { // retry loop; only retry when reusing old conn
|
||||
err = ctx.Err() // check context first
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
var conn net.Conn
|
||||
isOldConn := true
|
||||
|
||||
t.access.Lock()
|
||||
if t.connections.Len() > 0 {
|
||||
conn = t.connections.PopBack()
|
||||
}
|
||||
t.access.Unlock()
|
||||
|
||||
if conn == nil {
|
||||
conn, err = t.dialContext(ctx)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
isOldConn = false
|
||||
}
|
||||
|
||||
dClient := &D.Client{
|
||||
UDPSize: 4096,
|
||||
Timeout: 5 * time.Second,
|
||||
}
|
||||
dConn := &D.Conn{
|
||||
Conn: conn,
|
||||
UDPSize: dClient.UDPSize,
|
||||
}
|
||||
|
||||
msg, _, err = dClient.ExchangeWithConn(m, dConn)
|
||||
if err != nil {
|
||||
_ = conn.Close()
|
||||
conn = nil
|
||||
if isOldConn { // retry
|
||||
continue
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
t.access.Lock()
|
||||
if t.connections.Len() >= maxOldDotConns {
|
||||
oldConn := t.connections.PopFront()
|
||||
go oldConn.Close() // close in a new goroutine, not blocking the current task
|
||||
}
|
||||
t.connections.PushBack(conn)
|
||||
t.access.Unlock()
|
||||
return
|
||||
}
|
||||
}()
|
||||
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
return nil, ctx.Err()
|
||||
case ret := <-ch:
|
||||
return ret.msg, ret.err
|
||||
}
|
||||
}
|
||||
|
||||
func (t *dnsOverTLS) dialContext(ctx context.Context) (net.Conn, error) {
|
||||
conn, err := t.dialer.DialContext(ctx, "tcp", net.JoinHostPort(t.host, t.port))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
tlsConfig, err := ca.GetTLSConfig(ca.Option{
|
||||
TLSConfig: &tls.Config{
|
||||
ServerName: t.host,
|
||||
InsecureSkipVerify: t.skipCertVerify,
|
||||
},
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
tlsConn := tls.Client(conn, tlsConfig)
|
||||
if err = tlsConn.HandshakeContext(ctx); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
conn = tlsConn
|
||||
|
||||
return conn, nil
|
||||
}
|
||||
|
||||
func (t *dnsOverTLS) ResetConnection() {
|
||||
t.access.Lock()
|
||||
for t.connections.Len() > 0 {
|
||||
oldConn := t.connections.PopFront()
|
||||
go oldConn.Close() // close in a new goroutine, not blocking the current task
|
||||
}
|
||||
t.access.Unlock()
|
||||
}
|
||||
|
||||
func (t *dnsOverTLS) Close() error {
|
||||
runtime.SetFinalizer(t, nil)
|
||||
t.ResetConnection()
|
||||
return nil
|
||||
}
|
||||
|
||||
func newDoTClient(addr string, resolver *Resolver, params map[string]string, proxyAdapter C.ProxyAdapter, proxyName string) *dnsOverTLS {
|
||||
host, port, _ := net.SplitHostPort(addr)
|
||||
c := &dnsOverTLS{
|
||||
port: port,
|
||||
host: host,
|
||||
dialer: newDNSDialer(resolver, proxyAdapter, proxyName),
|
||||
}
|
||||
c.connections.SetBaseCap(maxOldDotConns)
|
||||
if params["skip-cert-verify"] == "true" {
|
||||
c.skipCertVerify = true
|
||||
}
|
||||
runtime.SetFinalizer(c, (*dnsOverTLS).Close)
|
||||
return c
|
||||
}
|
||||
@@ -95,6 +95,8 @@ func transform(servers []NameServer, resolver *Resolver) []dnsClient {
|
||||
for _, s := range servers {
|
||||
var c dnsClient
|
||||
switch s.Net {
|
||||
case "tls":
|
||||
c = newDoTClient(s.Addr, resolver, s.Params, s.ProxyAdapter, s.ProxyName)
|
||||
case "https":
|
||||
c = newDoHClient(s.Addr, resolver, s.PreferH3, s.Params, s.ProxyAdapter, s.ProxyName)
|
||||
case "dhcp":
|
||||
|
||||
Reference in New Issue
Block a user