1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set sw=2 ts=8 et tw=80 : */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "DNSServiceBase.h"
#include "DNS.h"
#include "mozilla/Preferences.h"
#include "mozilla/StaticPrefs_network.h"
#include "nsIDNSService.h"
#include "nsIProtocolProxyService2.h"
#include "nsIPrefBranch.h"
#include "nsIProxyInfo.h"
namespace mozilla::net {
static const char kPrefProxyType[] = "network.proxy.type";
static const char kPrefDisablePrefetch[] = "network.dns.disablePrefetch";
static const char kPrefNetworkProxySOCKS[] = "network.proxy.socks";
static const char kPrefNetworkProxySOCKSVersion[] =
"network.proxy.socks_version";
NS_IMPL_ISUPPORTS(DNSServiceBase, nsIObserver)
void DNSServiceBase::AddPrefObserver(nsIPrefBranch* aPrefs) {
aPrefs->AddObserver(kPrefProxyType, this, false);
aPrefs->AddObserver(kPrefDisablePrefetch, this, false);
// Monitor these to see if there is a change in proxy configuration
aPrefs->AddObserver(kPrefNetworkProxySOCKS, this, false);
aPrefs->AddObserver(kPrefNetworkProxySOCKSVersion, this, false);
}
void DNSServiceBase::ReadPrefs(const char* aName) {
if (!aName || !strcmp(aName, kPrefNetworkProxySOCKS) ||
!strcmp(aName, kPrefNetworkProxySOCKSVersion)) {
uint32_t socksVersion = Preferences::GetInt(kPrefNetworkProxySOCKSVersion);
nsAutoCString socks;
if (NS_SUCCEEDED(Preferences::GetCString(kPrefNetworkProxySOCKS, socks))) {
mSocksProxyVersion = 0;
if (!socks.IsEmpty()) {
if (socksVersion == nsIProxyInfo::SOCKS_V4) {
mSocksProxyVersion = nsIProxyInfo::SOCKS_V4;
} else if (socksVersion == nsIProxyInfo::SOCKS_V5) {
mSocksProxyVersion = nsIProxyInfo::SOCKS_V5;
}
}
}
}
if (!aName || !strcmp(aName, kPrefDisablePrefetch) ||
!strcmp(aName, kPrefProxyType)) {
mDisablePrefetch = Preferences::GetBool(kPrefDisablePrefetch, false) ||
(StaticPrefs::network_proxy_type() ==
nsIProtocolProxyService::PROXYCONFIG_MANUAL);
}
}
bool DNSServiceBase::DNSForbiddenByActiveProxy(const nsACString& aHostname,
uint32_t aFlags) {
if (aFlags & nsIDNSService::RESOLVE_IGNORE_SOCKS_DNS) {
return false;
}
// TODO(Bug 1890542): use nsIProxyInfo object whether sending DNS request to
// local network is fine.
// We should avoid doing DNS when a proxy is in use.
if (StaticPrefs::network_proxy_type() ==
nsIProtocolProxyService::PROXYCONFIG_MANUAL &&
((mSocksProxyVersion == nsIProxyInfo::SOCKS_V4 &&
StaticPrefs::network_proxy_socks_remote_dns()) ||
(mSocksProxyVersion == nsIProxyInfo::SOCKS_V5 &&
StaticPrefs::network_proxy_socks5_remote_dns()))) {
// Allow IP lookups through, but nothing else.
if (!HostIsIPLiteral(aHostname)) {
return true;
}
}
return false;
}
} // namespace mozilla::net
|