15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_config_service_win.h" 65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <algorithm> 85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <string> 95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h" 115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/callback.h" 125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/compiler_specific.h" 132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/files/file_path.h" 145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/files/file_path_watcher.h" 155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h" 165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/memory/scoped_ptr.h" 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/metrics/histogram.h" 182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/strings/string_split.h" 19eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/strings/string_util.h" 20868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h" 215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/synchronization/lock.h" 225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/non_thread_safe.h" 235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/thread_restrictions.h" 24eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/time/time.h" 255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/object_watcher.h" 265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/registry.h" 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/windows_version.h" 285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_util.h" 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/network_change_notifier.h" 305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_hosts.h" 315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_protocol.h" 325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/serial_worker.h" 337dbb3d5cf0c15f500944d211057644d6a2f37371Ben Murdoch#include "url/url_canon.h" 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#pragma comment(lib, "iphlpapi.lib") 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace net { 385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace internal { 405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace { 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Interval between retries to parse config. Used only until parsing succeeds. 445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kRetryIntervalSeconds = 5; 455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 46d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Registry key paths. 47d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kTcpipPath = 48d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) L"SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters"; 49d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kTcpip6Path = 50d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) L"SYSTEM\\CurrentControlSet\\Services\\Tcpip6\\Parameters"; 51d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kDnscachePath = 52d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) L"SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters"; 53d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kPolicyPath = 54d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) L"SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient"; 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const wchar_t* const kPrimaryDnsSuffixPath = 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) L"SOFTWARE\\Policies\\Microsoft\\System\\DNSClient"; 57d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kNRPTPath = 58d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) L"SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient\\DnsPolicyConfig"; 595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum HostsParseWinResult { 615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_OK = 0, 625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE, 635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED, 645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_IPHELPER_FAILED, 655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_BAD_ADDRESS, 665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_MAX // Bounding values for enumeration. 675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Convenience for reading values using RegKey. 705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryReader : public base::NonThreadSafe { 715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit RegistryReader(const wchar_t* key) { 735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Ignoring the result. |key_.Valid()| will catch failures. 745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.Open(HKEY_LOCAL_MACHINE, key, KEY_QUERY_VALUE); 755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool ReadString(const wchar_t* name, 785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::RegString* out) const { 795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = false; 815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!key_.Valid()) { 825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Assume that if the |key_| is invalid then the key is missing. 835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LONG result = key_.ReadValue(name, &out->value); 865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == ERROR_SUCCESS) { 875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = true; 885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return (result == ERROR_FILE_NOT_FOUND); 915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool ReadDword(const wchar_t* name, 945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::RegDword* out) const { 955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = false; 975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!key_.Valid()) { 985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Assume that if the |key_| is invalid then the key is missing. 995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LONG result = key_.ReadValueDW(name, &out->value); 1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == ERROR_SUCCESS) { 1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = true; 1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return (result == ERROR_FILE_NOT_FOUND); 1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::RegKey key_; 1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(RegistryReader); 1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Wrapper for GetAdaptersAddresses. Returns NULL if failed. 116a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> ReadIpHelper(ULONG flags) { 1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::ThreadRestrictions::AssertIOAllowed(); 1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 119a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles) scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> out; 1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ULONG len = 15000; // As recommended by MSDN for GetAdaptersAddresses. 1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UINT rv = ERROR_BUFFER_OVERFLOW; 1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Try up to three times. 1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (unsigned tries = 0; (tries < 3) && (rv == ERROR_BUFFER_OVERFLOW); 1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tries++) { 125a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles) out.reset(static_cast<PIP_ADAPTER_ADDRESSES>(malloc(len))); 1261320f92c476a1ad9d19dba2a48c72b75566198e9Primiano Tucci memset(out.get(), 0, len); 1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rv = GetAdaptersAddresses(AF_UNSPEC, flags, NULL, out.get(), &len); 1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (rv != NO_ERROR) 1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out.reset(); 1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return out.Pass(); 1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 134c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)// Converts a base::string16 domain name to ASCII, possibly using punycode. 1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Returns true if the conversion succeeds and output is not empty. In case of 1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// failure, |domain| might become dirty. 137c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseDomainASCII(const base::string16& widestr, std::string* domain) { 1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(domain); 1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (widestr.empty()) 1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check if already ASCII. 143010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) if (base::IsStringASCII(widestr)) { 144a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles) *domain = base::UTF16ToASCII(widestr); 1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Otherwise try to convert it from IDN to punycode. 1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const int kInitialBufferSize = 256; 1505c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu url::RawCanonOutputT<base::char16, kInitialBufferSize> punycode; 1515c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu if (!url::IDNToASCII(widestr.data(), widestr.length(), &punycode)) 1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // |punycode_output| should now be ASCII; convert it to a std::string. 1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (We could use UTF16ToASCII() instead, but that requires an extra string 1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // copy. Since ASCII is a subset of UTF8 the following is equivalent). 1575d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles) bool success = base::UTF16ToUTF8(punycode.data(), punycode.length(), domain); 1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(success); 159010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) DCHECK(base::IsStringASCII(*domain)); 1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return success && !domain->empty(); 1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool ReadDevolutionSetting(const RegistryReader& reader, 1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::DevolutionSetting* setting) { 1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return reader.ReadDword(L"UseDomainNameDevolution", &setting->enabled) && 1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) reader.ReadDword(L"DomainNameDevolutionLevel", &setting->level); 1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads DnsSystemSettings from IpHelper and registry. 1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ReadSystemSettings(DnsSystemSettings* settings) { 1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) settings->addresses = ReadIpHelper(GAA_FLAG_SKIP_ANYCAST | 1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_UNICAST | 1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_MULTICAST | 1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_FRIENDLY_NAME); 1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!settings->addresses.get()) 1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_IPHELPER; 1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader tcpip_reader(kTcpipPath); 1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader tcpip6_reader(kTcpip6Path); 1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader dnscache_reader(kDnscachePath); 1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader policy_reader(kPolicyPath); 1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader primary_dns_suffix_reader(kPrimaryDnsSuffixPath); 1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!policy_reader.ReadString(L"SearchList", 1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->policy_search_list)) { 1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_POLICY_SEARCHLIST; 1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_reader.ReadString(L"SearchList", &settings->tcpip_search_list)) 1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_TCPIP_SEARCHLIST; 1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_reader.ReadString(L"Domain", &settings->tcpip_domain)) 1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_DOMAIN; 1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(policy_reader, &settings->policy_devolution)) 1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_POLICY_DEVOLUTION; 1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(dnscache_reader, &settings->dnscache_devolution)) 1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_DNSCACHE_DEVOLUTION; 2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(tcpip_reader, &settings->tcpip_devolution)) 2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_TCPIP_DEVOLUTION; 2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!policy_reader.ReadDword(L"AppendToMultiLabelName", 2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->append_to_multi_label_name)) { 2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_APPEND_MULTILABEL; 2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!primary_dns_suffix_reader.ReadString(L"PrimaryDnsSuffix", 2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->primary_dns_suffix)) { 2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_PRIMARY_SUFFIX; 2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 213d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 214d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) base::win::RegistryKeyIterator nrpt_rules(HKEY_LOCAL_MACHINE, kNRPTPath); 215d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) settings->have_name_resolution_policy = (nrpt_rules.SubkeyCount() > 0); 216d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; 2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Default address of "localhost" and local computer name can be overridden 2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// by the HOSTS file, but if it's not there, then we need to fill it in. 2225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)HostsParseWinResult AddLocalhostEntries(DnsHosts* hosts) { 2235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const unsigned char kIPv4Localhost[] = { 127, 0, 0, 1 }; 2245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const unsigned char kIPv6Localhost[] = { 0, 0, 0, 0, 0, 0, 0, 0, 2255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 0, 0, 0, 0, 0, 0, 0, 1 }; 2265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPAddressNumber loopback_ipv4(kIPv4Localhost, 2275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kIPv4Localhost + arraysize(kIPv4Localhost)); 2285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPAddressNumber loopback_ipv6(kIPv6Localhost, 2295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kIPv6Localhost + arraysize(kIPv6Localhost)); 2305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // This does not override any pre-existing entries from the HOSTS file. 2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV4), 2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) loopback_ipv4)); 2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV6), 2355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) loopback_ipv6)); 2365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) WCHAR buffer[MAX_PATH]; 2385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DWORD size = MAX_PATH; 2395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string localname; 2405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!GetComputerNameExW(ComputerNameDnsHostname, buffer, &size) || 2415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) !ParseDomainASCII(buffer, &localname)) { 2425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED; 2435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2446e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles) base::StringToLowerASCII(&localname); 2455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool have_ipv4 = 2475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)) > 0; 2485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool have_ipv6 = 2495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)) > 0; 2505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (have_ipv4 && have_ipv6) 2525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_OK; 2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 254a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles) scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> addresses = 2555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ReadIpHelper(GAA_FLAG_SKIP_ANYCAST | 2565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_DNS_SERVER | 2575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_MULTICAST | 2585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_FRIENDLY_NAME); 2595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!addresses.get()) 2605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_IPHELPER_FAILED; 2615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The order of adapters is the network binding order, so stick to the 2635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // first good adapter for each family. 2645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_ADDRESSES* adapter = addresses.get(); 2655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter != NULL && (!have_ipv4 || !have_ipv6); 2665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter = adapter->Next) { 2675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->OperStatus != IfOperStatusUp) 2685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 2695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK) 2705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 2715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_UNICAST_ADDRESS* address = 2735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter->FirstUnicastAddress; 2745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address != NULL; 2755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address = address->Next) { 2765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPEndPoint ipe; 2775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ipe.FromSockAddr(address->Address.lpSockaddr, 2785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address->Address.iSockaddrLength)) { 2795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_BAD_ADDRESS; 2805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2812a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (!have_ipv4 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV4)) { 2825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) have_ipv4 = true; 2835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)] = ipe.address(); 2842a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) } else if (!have_ipv6 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV6)) { 2855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) have_ipv6 = true; 2865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)] = ipe.address(); 2875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_OK; 2915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches a single registry key for changes. 2945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryWatcher : public base::win::ObjectWatcher::Delegate, 2955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public base::NonThreadSafe { 2965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 2975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) typedef base::Callback<void(bool succeeded)> CallbackType; 2985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher() {} 2995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool Watch(const wchar_t* key, const CallbackType& callback) { 3015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 3025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(!callback.is_null()); 3035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(callback_.is_null()); 3045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_ = callback; 3055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (key_.Open(HKEY_LOCAL_MACHINE, key, KEY_NOTIFY) != ERROR_SUCCESS) 3065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 3075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (key_.StartWatching() != ERROR_SUCCESS) 3085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 3095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!watcher_.StartWatching(key_.watch_event(), this)) 3105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 3115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 3125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnObjectSignaled(HANDLE object) OVERRIDE { 3155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool succeeded = (key_.StartWatching() == ERROR_SUCCESS) && 3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.StartWatching(key_.watch_event(), this); 3185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!succeeded && key_.Valid()) { 3195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.StopWatching(); 3205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.StopWatching(); 3215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.Close(); 3225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!callback_.is_null()) 3245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_.Run(succeeded); 3255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 3285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CallbackType callback_; 3295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::RegKey key_; 3305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::ObjectWatcher watcher_; 3315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(RegistryWatcher); 3335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 3345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3352a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// Returns true iff |address| is DNS address from IPv6 stateless discovery, 3362a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// i.e., matches fec0:0:0:ffff::{1,2,3}. 3372a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// http://tools.ietf.org/html/draft-ietf-ipngwg-dns-discovery 3382a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)bool IsStatelessDiscoveryAddress(const IPAddressNumber& address) { 3392a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (address.size() != kIPv6AddressSize) 3402a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return false; 3412a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const uint8 kPrefix[] = { 3422a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 0xfe, 0xc0, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 3432a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 3442a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) }; 3452a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return std::equal(kPrefix, kPrefix + arraysize(kPrefix), 3462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) address.begin()) && (address.back() < 4); 3472a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)} 3482a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 349d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Returns the path to the HOSTS file. 3502a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::FilePath GetHostsPath() { 3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TCHAR buffer[MAX_PATH]; 3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UINT rc = GetSystemDirectory(buffer, MAX_PATH); 3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(0 < rc && rc < MAX_PATH); 3542a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return base::FilePath(buffer).Append( 3552a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) FILE_PATH_LITERAL("drivers\\etc\\hosts")); 3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 358d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)void ConfigureSuffixSearch(const DnsSystemSettings& settings, 359d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) DnsConfig* config) { 360d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // SearchList takes precedence, so check it first. 361d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (settings.policy_search_list.set) { 362d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) std::vector<std::string> search; 363d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (ParseSearchList(settings.policy_search_list.value, &search)) { 364d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->search.swap(search); 365d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return; 366d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 367d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // Even if invalid, the policy disables the user-specified setting below. 368d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } else if (settings.tcpip_search_list.set) { 369d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) std::vector<std::string> search; 370d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (ParseSearchList(settings.tcpip_search_list.value, &search)) { 371d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->search.swap(search); 372d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return; 373d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 374d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 375d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 376d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // In absence of explicit search list, suffix search is: 377d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // [primary suffix, connection-specific suffix, devolution of primary suffix]. 378d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // Primary suffix can be set by policy (primary_dns_suffix) or 379d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // user setting (tcpip_domain). 380d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // 381d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // The policy (primary_dns_suffix) can be edited via Group Policy Editor 382d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // (gpedit.msc) at Local Computer Policy => Computer Configuration 383d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // => Administrative Template => Network => DNS Client => Primary DNS Suffix. 384d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // 385d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // The user setting (tcpip_domain) can be configurred at Computer Name in 386d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // System Settings 387d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) std::string primary_suffix; 388d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if ((settings.primary_dns_suffix.set && 389d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ParseDomainASCII(settings.primary_dns_suffix.value, &primary_suffix)) || 390d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) (settings.tcpip_domain.set && 391d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ParseDomainASCII(settings.tcpip_domain.value, &primary_suffix))) { 392d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // Primary suffix goes in front. 393d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->search.insert(config->search.begin(), primary_suffix); 394d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } else { 395d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return; // No primary suffix, hence no devolution. 396d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 397d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 398d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // Devolution is determined by precedence: policy > dnscache > tcpip. 399d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // |enabled|: UseDomainNameDevolution and |level|: DomainNameDevolutionLevel 400d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // are overridden independently. 401d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) DnsSystemSettings::DevolutionSetting devolution = settings.policy_devolution; 402d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 403d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (!devolution.enabled.set) 404d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) devolution.enabled = settings.dnscache_devolution.enabled; 405d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (!devolution.enabled.set) 406d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) devolution.enabled = settings.tcpip_devolution.enabled; 407d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (devolution.enabled.set && (devolution.enabled.value == 0)) 408d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return; // Devolution disabled. 409d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 410d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // By default devolution is enabled. 411d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 412d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (!devolution.level.set) 413d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) devolution.level = settings.dnscache_devolution.level; 414d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (!devolution.level.set) 415d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) devolution.level = settings.tcpip_devolution.level; 416d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 417d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // After the recent update, Windows will try to determine a safe default 418d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // value by comparing the forest root domain (FRD) to the primary suffix. 419d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // See http://support.microsoft.com/kb/957579 for details. 420d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // For now, if the level is not set, we disable devolution, assuming that 421d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // we will fallback to the system getaddrinfo anyway. This might cause 422d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // performance loss for resolutions which depend on the system default 423d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // devolution setting. 424d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // 425d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // If the level is explicitly set below 2, devolution is disabled. 426d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (!devolution.level.set || devolution.level.value < 2) 427d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return; // Devolution disabled. 428d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 429d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // Devolve the primary suffix. This naive logic matches the observed 430d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // behavior (see also ParseSearchList). If a suffix is not valid, it will be 431d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // discarded when the fully-qualified name is converted to DNS format. 432d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 433d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) unsigned num_dots = std::count(primary_suffix.begin(), 434d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) primary_suffix.end(), '.'); 435d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 436d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) for (size_t offset = 0; num_dots >= devolution.level.value; --num_dots) { 437d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) offset = primary_suffix.find('.', offset + 1); 438d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->search.push_back(primary_suffix.substr(offset + 1)); 439d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 440d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} 441d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 442d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} // namespace 443d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 444c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseSearchList(const base::string16& value, 445c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) std::vector<std::string>* output) { 4465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(output); 4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (value.empty()) 4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) output->clear(); 4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // If the list includes an empty hostname (",," or ", ,"), it is terminated. 4535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Although nslookup and network connection property tab ignore such 4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // fragments ("a,b,,c" becomes ["a", "b", "c"]), our reference is getaddrinfo 4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (which sees ["a", "b"]). WMI queries also return a matching search list. 456c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) std::vector<base::string16> woutput; 4575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::SplitString(value, ',', &woutput); 4585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (size_t i = 0; i < woutput.size(); ++i) { 4595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Convert non-ASCII to punycode, although getaddrinfo does not properly 4605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // handle such suffixes. 461c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) const base::string16& t = woutput[i]; 4625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string parsed; 4635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ParseDomainASCII(t, &parsed)) 4645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) break; 4655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) output->push_back(parsed); 4665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return !output->empty(); 4685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 4695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ConvertSettingsToDnsConfig( 4715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const DnsSystemSettings& settings, 4725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfig* config) { 4735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) *config = DnsConfig(); 4745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Use GetAdapterAddresses to get effective DNS server order and 4765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // connection-specific DNS suffix. Ignore disconnected and loopback adapters. 4775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The order of adapters is the network binding order, so stick to the 4785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // first good adapter. 4795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_ADDRESSES* adapter = settings.addresses.get(); 4805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter != NULL && config->nameservers.empty(); 4815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter = adapter->Next) { 4825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->OperStatus != IfOperStatusUp) 4835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 4845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK) 4855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 4865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_DNS_SERVER_ADDRESS* address = 4885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter->FirstDnsServerAddress; 4895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address != NULL; 4905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address = address->Next) { 4915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPEndPoint ipe; 4925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ipe.FromSockAddr(address->Address.lpSockaddr, 4935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address->Address.iSockaddrLength)) { 4942a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (IsStatelessDiscoveryAddress(ipe.address())) 4952a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) continue; 4965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Override unset port. 4975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ipe.port()) 4985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ipe = IPEndPoint(ipe.address(), dns_protocol::kDefaultPort); 4995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->nameservers.push_back(ipe); 5005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 5015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_BAD_ADDRESS; 5025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // IP_ADAPTER_ADDRESSES in Vista+ has a search list at |FirstDnsSuffix|, 5065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // but it came up empty in all trials. 5075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // |DnsSuffix| stores the effective connection-specific suffix, which is 5085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // obtained via DHCP (regkey: Tcpip\Parameters\Interfaces\{XXX}\DhcpDomain) 5095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // or specified by the user (regkey: Tcpip\Parameters\Domain). 5105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string dns_suffix; 5115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseDomainASCII(adapter->DnsSuffix, &dns_suffix)) 5125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.push_back(dns_suffix); 5135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (config->nameservers.empty()) 5165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_NO_NAMESERVERS; // No point continuing. 5175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Windows always tries a multi-label name "as is" before using suffixes. 5195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->ndots = 1; 5205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!settings.append_to_multi_label_name.set) { 5225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The default setting is true for XP, false for Vista+. 5235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (base::win::GetVersion() >= base::win::VERSION_VISTA) { 5245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = false; 5255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 5265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = true; 5275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 5295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = 5305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (settings.append_to_multi_label_name.value != 0); 5315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 533d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ConfigParseWinResult result = CONFIG_PARSE_WIN_OK; 534d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) if (settings.have_name_resolution_policy) { 535d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->unhandled_options = true; 536d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) // TODO(szym): only set this to true if NRPT has DirectAccess rules. 537d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config->use_local_ipv6 = true; 538d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) result = CONFIG_PARSE_WIN_UNHANDLED_OPTIONS; 5395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 541d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ConfigureSuffixSearch(settings, config); 542d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return result; 5435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 5445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches registry and HOSTS file for changes. Must live on a thread which 5465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// allows IO. 5475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::Watcher 5485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : public NetworkChangeNotifier::IPAddressObserver { 5495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 5505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit Watcher(DnsConfigServiceWin* service) : service_(service) {} 5515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ~Watcher() { 5525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::RemoveIPAddressObserver(this); 5535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool Watch() { 5565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher::CallbackType callback = 5575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&DnsConfigServiceWin::OnConfigChanged, 5585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Unretained(service_)); 5595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success = true; 5615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The Tcpip key must be present. 5635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_watcher_.Watch(kTcpipPath, callback)) { 5645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS registry watch failed to start."; 5655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success = false; 5662a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 5672a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_TO_START_CONFIG, 5682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 5695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Watch for IPv6 nameservers. 5725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tcpip6_watcher_.Watch(kTcpip6Path, callback); 5735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // DNS suffix search list and devolution can be configured via group 5755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // policy which sets this registry key. If the key is missing, the policy 5765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // does not apply, and the DNS client uses Tcpip and Dnscache settings. 5775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // If a policy is installed, DnsConfigService will need to be restarted. 5785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // BUG=99509 5795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) dnscache_watcher_.Watch(kDnscachePath, callback); 5815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) policy_watcher_.Watch(kPolicyPath, callback); 5825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5832a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (!hosts_watcher_.Watch(GetHostsPath(), false, 5845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&Watcher::OnHostsChanged, 5855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Unretained(this)))) { 5862a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 5872a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_TO_START_HOSTS, 5882a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 5895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS hosts watch failed to start."; 5905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success = false; 5915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 5925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Also need to observe changes to local non-loopback IP for DnsHosts. 5935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::AddIPAddressObserver(this); 5945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return success; 5965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 5992a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) void OnHostsChanged(const base::FilePath& path, bool error) { 6005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (error) 6015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::RemoveIPAddressObserver(this); 6025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsChanged(!error); 6035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // NetworkChangeNotifier::IPAddressObserver: 6065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnIPAddressChanged() OVERRIDE { 6075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Need to update non-loopback IP of local host. 6085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsChanged(true); 6095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 6125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher tcpip_watcher_; 6145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher tcpip6_watcher_; 6155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher dnscache_watcher_; 6165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher policy_watcher_; 6172a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) base::FilePathWatcher hosts_watcher_; 6185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(Watcher); 6205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 6215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads config from registry and IpHelper. All work performed on WorkerPool. 6235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::ConfigReader : public SerialWorker { 6245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 6255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit ConfigReader(DnsConfigServiceWin* service) 6265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : service_(service), 6275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_(false) {} 6285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 6305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~ConfigReader() {} 6315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void DoWork() OVERRIDE { 6335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Should be called on WorkerPool. 6345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks start_time = base::TimeTicks::Now(); 6355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings settings = {}; 6365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ConfigParseWinResult result = ReadSystemSettings(&settings); 6375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == CONFIG_PARSE_WIN_OK) 6385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result = ConvertSettingsToDnsConfig(settings, &dns_config_); 639d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) success_ = (result == CONFIG_PARSE_WIN_OK || 640d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) result == CONFIG_PARSE_WIN_UNHANDLED_OPTIONS); 6415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.ConfigParseWin", 6425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result, CONFIG_PARSE_WIN_MAX); 6435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_BOOLEAN("AsyncDNS.ConfigParseResult", success_); 6445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_TIMES("AsyncDNS.ConfigParseDuration", 6455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks::Now() - start_time); 6465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnWorkFinished() OVERRIDE { 6495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(loop()->BelongsToCurrentThread()); 6505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(!IsCancelled()); 6515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (success_) { 6525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnConfigRead(dns_config_); 6535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 6545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(WARNING) << "Failed to read DnsConfig."; 6555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Try again in a while in case DnsConfigWatcher missed the signal. 65690dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles) base::MessageLoop::current()->PostDelayedTask( 6575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) FROM_HERE, 6585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&ConfigReader::WorkNow, this), 6595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeDelta::FromSeconds(kRetryIntervalSeconds)); 6605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 6645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Written in DoWork(), read in OnWorkFinished(). No locking required. 6655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfig dns_config_; 6665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success_; 6675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 6685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads hosts from HOSTS file and fills in localhost and local computer name if 6705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// necessary. All work performed on WorkerPool. 6715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::HostsReader : public SerialWorker { 6725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 6735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit HostsReader(DnsConfigServiceWin* service) 6745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : path_(GetHostsPath()), 6755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_(service), 6765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_(false) { 6775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 6805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~HostsReader() {} 6815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void DoWork() OVERRIDE { 6835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks start_time = base::TimeTicks::Now(); 6845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HostsParseWinResult result = HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE; 6855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseHostsFile(path_, &hosts_)) 6865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result = AddLocalhostEntries(&hosts_); 6875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_ = (result == HOSTS_PARSE_WIN_OK); 6885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.HostsParseWin", 6895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result, HOSTS_PARSE_WIN_MAX); 6905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_BOOLEAN("AsyncDNS.HostParseResult", success_); 6915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_TIMES("AsyncDNS.HostsParseDuration", 6925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks::Now() - start_time); 6935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnWorkFinished() OVERRIDE { 6965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(loop()->BelongsToCurrentThread()); 6975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (success_) { 6985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsRead(hosts_); 6995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 7005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(WARNING) << "Failed to read DnsHosts."; 7015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7042a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const base::FilePath path_; 7055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 7065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Written in DoWork, read in OnWorkFinished, no locking necessary. 7075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsHosts hosts_; 7085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success_; 7095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(HostsReader); 7115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 7125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::DnsConfigServiceWin() 7145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : config_reader_(new ConfigReader(this)), 7155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_(new HostsReader(this)) {} 7165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::~DnsConfigServiceWin() { 7185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->Cancel(); 7195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->Cancel(); 7205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::ReadNow() { 7235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->WorkNow(); 7245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->WorkNow(); 7255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool DnsConfigServiceWin::StartWatching() { 7285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // TODO(szym): re-start watcher if that makes sense. http://crbug.com/116139 7295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.reset(new Watcher(this)); 7302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", DNS_CONFIG_WATCH_STARTED, 7312a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return watcher_->Watch(); 7335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnConfigChanged(bool succeeded) { 7365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InvalidateConfig(); 7375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (succeeded) { 7385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->WorkNow(); 7395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 7405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS config watch failed."; 7415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) set_watch_failed(true); 7422a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 7432a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_CONFIG, 7442a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnHostsChanged(bool succeeded) { 7495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InvalidateHosts(); 7505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (succeeded) { 7515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->WorkNow(); 7525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 7535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS hosts watch failed."; 7545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) set_watch_failed(true); 7552a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 7562a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_HOSTS, 7572a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace internal 7625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static 7645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_ptr<DnsConfigService> DnsConfigService::CreateSystemService() { 7655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return scoped_ptr<DnsConfigService>(new internal::DnsConfigServiceWin()); 7665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace net 769