Android framework 增加DNS检测功能

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接: https://blog.csdn.net/myvest/article/details/94752780

Android系统中,一个网络类型可以设置多个DNS,Android系统中,最多可以设置三个DNS,可以通过其属性net.dns*查看。DNS在dhcp等流程之后,会通过netd设置到libc,DNS解析是通过libc实现。当解析一个域名时第一个DNS超时,则会使用第二个、第三个DNS解析,解析后的结果会进行缓存。

最近需要在Android framework中增加DNS检测功能,在网络连接后,检测DNS是否有效,并将有效的DNS尽量置前。尽量保证第一个DNS的有效性,加快对新域名的解析速度。

framework需要修改的点有两个:
1)需要增加DNS检测接口;
2)在检测完成后调用DNS设置接口重新设置DNS

DNS检测接口实现

1、在NetworkUtils 工具类函数中增加native接口checkDnsValid

public class NetworkUtils {
......省略
    /** check dns server */
    public native static int checkDnsValid(String dns, String host);
......省略    
 }

2、JNI实现:

frameworks/base/core/jni/android_net_NetUtils.cpp  
......省略
static jint android_net_utils_checkDnsValid(JNIEnv* env, jobject clazz, jstring dns, jstring host)
{
    int result = 0;
    const char *dnsStr = env->GetStringUTFChars(dns, NULL);
    const char* hostStr= env->GetStringUTFChars(host, NULL);
    ALOGD("android_net_utils_checkDnsValid : DNS[%s] HOST[%s] \n",dnsStr,hostStr);    
    char* hostIp =::ngethost((unsigned char*)hostStr ,1, dnsStr);//T_A  Ipv4 address
    if(hostIp != NULL){
       result = 1;
        ALOGD("android_net_utils_checkDnsValid : DNS[%s] [%s:%s] \n",dnsStr,hostStr,hostIp);
    }    
    env->ReleaseStringUTFChars(dns, dnsStr);
    env->ReleaseStringUTFChars(host, hostStr);
    return (jint)result;
}
......省略
 { "checkDnsValid", "(Ljava/lang/String;Ljava/lang/String;)I",  (void *)android_net_utils_checkDnsValid },
......省略
 };

核心部分,DNS检测接口ngethost的实现,检测接口参考开源代码并加以优化,类似的功能开源的工具有nslookup等。通过对指定域名,如百度www.baidu.com的解析,来判断DNS是否有效,超时时间为5s。

#include <stdio.h>	
#include <string.h>	
#include <stdlib.h>	
#include <sys/socket.h>	
#include <sys/time.h>
#include <arpa/inet.h>	
#include <netinet/in.h>
#include <unistd.h>	
#include <cutils/properties.h>
#include <utils/Log.h>

#define LOG_TAG "NetUtils"

#define T_A 1 			/*Ipv4 address*/
#define T_NS 2 			/*Nameserver*/
#define T_CNAME 5 		/*canonical name*/
#define T_SOA 6 		/*start of authority zone */
#define T_PTR 12 		/*domain name pointer */
#define T_MX 15 		/*Mail server*/

char * ngethost (unsigned char* , int, const char *);

static void reverseIP(char *,char *);
static void removeDotsFromName(unsigned char*,unsigned char*);
static unsigned char* ReadName (unsigned char*,unsigned char*,int*);

/*DNS header*/
struct DNS_HEADER
{
	unsigned short id; 	// identification number

# if __BYTE_ORDER == __LITTLE_ENDIAN
	unsigned char rd :1; 	// recursion desired
	unsigned char tc :1; 	// truncated message
	unsigned char aa :1; 	// authoritive answer
	unsigned char opcode :4; // purpose of message
	unsigned char qr :1; 	// query/response flag

	unsigned char rcode :4; // response code
	unsigned char cd :1; 	// checking disabled
	unsigned char ad :1; 	// authenticated data
	unsigned char z :1; 	// reserved and unused
	unsigned char ra :1; 	// recursion available
# endif
# if __BYTE_ORDER == __BIG_ENDIAN
	unsigned char qr :1;
	unsigned char opcode :4;
	unsigned char aa :1;
	unsigned char tc :1;
	unsigned char rd :1;

	unsigned char ra :1;
	unsigned char z :1;
	unsigned char ad :1;
	unsigned char cd :1;
	unsigned char rcode :4;
# endif

	unsigned short q_count; // number of question entries
	unsigned short ans_count; // number of answer entries
	unsigned short auth_count; // number of authority entries
	unsigned short add_count; // number of resource entries
};

struct QUESTION				/*QUESTION DATA*/
{
	unsigned short qtype;		/*query type:IN,NS,CNAME,SOA,PTR,MX*/
	unsigned short qclass;		/*query class:IN or CHAOS*/
};

#pragma pack(push, 1)
struct R_DATA				/*RESOURCE RECORD DATA*/
{
	unsigned short type;
	unsigned short _class;
	unsigned int ttl;
	unsigned short data_len;
};
#pragma pack(pop)
struct RES_RECORD			/*RESOURCE RECORD FIELD:AUTHORITATIVE,ANSWER or ADDITIONAL*/
{
	unsigned char *name;
	struct R_DATA *resource;
	unsigned char *rdata;
};

typedef struct				/*QUESTION FIELD*/
{
	unsigned char *name;
	struct QUESTION *ques;
} QUERY;


void reverseIP(char *addr, char *tar )		/*change a.b.c.d to d.c.b.a.in-addr.arpa*/
{
	int i,j,count_dots=0,pos=0;
	char buffer[10];
	for(i=strlen(addr)-1;i>=0;i--)
	{
		if(addr[i]=='.')
		{
			for(j=count_dots-1;j>=0;j--)
			{
				*(tar+pos)=buffer[j];
				pos++;
			}
			*(tar+pos)='.';
			pos++;
			count_dots=0;
		}
		else
		{
			buffer[count_dots]=addr[i];
			count_dots++;
		}
	}
	for(j=count_dots-1;j>=0;j--)
	{
		*(tar+pos)=buffer[j];
		pos++;
	}			
	char *arpa = ".in-addr.arpa";
	for(i=0;i<14;i++)
	{
		*(tar+pos) = *arpa;
		pos++;
		arpa++;
	}
}

/*perform nslookup*/
char* ngethost(unsigned char *host , int query_type, const char *dns_server)
{
	unsigned char buf[65536],*qname,*reader;
	int i , j , stop , s;

	struct sockaddr_in a,dest;
	struct timeval timeout;
	timeout.tv_sec = 5; 
	timeout.tv_usec = 0; 

	struct RES_RECORD answers[50],auth[50],addinfo[50]; 

	struct DNS_HEADER *dns = NULL;
	struct QUESTION *qinfo = NULL;

	ALOGD("Resolving %s from dns[%s]\n" , host,dns_server);

	s = socket(AF_INET , SOCK_DGRAM , IPPROTO_UDP); 
	setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout));	/*set timeout on this socket*/

	dest.sin_family = AF_INET;
	dest.sin_port = htons(53);
	dest.sin_addr.s_addr = inet_addr(dns_server); 

	dns = (struct DNS_HEADER *)&buf;			/*DNS HEADER*/

	dns->id = (unsigned short) htons(getpid());
	dns->qr = 0; 
	dns->opcode = 0; 				/*standard query*/
	dns->aa = 0; 			
	dns->tc = 1; 
	dns->rd = 1; 					/*recursion desired*/
	dns->ra = 0; 
	dns->z = 0;
	dns->ad = 0;
	dns->cd = 0;
	dns->rcode = 0;
	dns->q_count = htons(1); 
	dns->ans_count = 0;
	dns->auth_count = 0;
	dns->add_count = 0;

	qname =(unsigned char*)&buf[sizeof(struct DNS_HEADER)];					     /*DNS QUESTION NAME.ANY JUNK VALUE WILL DO*/

	removeDotsFromName(qname , host);
	qinfo =(struct QUESTION*)&buf[sizeof(struct DNS_HEADER) + (strlen((const char*)qname) + 1)]; /*DNS QUESTION TYPE AND CLASS*/

	qinfo->qtype = htons( query_type ); 
	qinfo->qclass = htons(1); 

	if( sendto(s,(char*)buf,sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION),0,(struct sockaddr*)&dest,sizeof(dest)) < 0){
		ALOGD("\nSending Packet to %s faile\n",dns_server);
		goto fail;
	}

	i=sizeof(dest);
	if(recvfrom (s,(char*)buf , 65536 , 0 , (struct sockaddr*)&dest , (socklen_t*)&i ) < 0){
		goto fail;
	}
	dns = (struct DNS_HEADER*) buf;
	if(dns->ra==0){
		goto fail;
	}		

	if(dns->rcode==0)
	{
		reader = &buf[sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION)];	/*THE RESPONSE*/
		stop=0;

		for(i=0;i<ntohs(dns->ans_count);i++)
		{
			answers[i].name=ReadName(reader,buf,&stop);	
			reader = reader + stop;
			answers[i].resource = (struct R_DATA*)(reader);
			reader = reader + sizeof(struct R_DATA);

			if(ntohs(answers[i].resource->type) == 1) 	/*read address*/
			{
				answers[i].rdata = (unsigned char*)malloc(ntohs(answers[i].resource->data_len));

				for(j=0 ; j<ntohs(answers[i].resource->data_len) ; j++)
					answers[i].rdata[j]=reader[j];

				answers[i].rdata[ntohs(answers[i].resource->data_len)] = '\0';

				reader = reader + ntohs(answers[i].resource->data_len);
			}
			else						/*read name*/
			{
				answers[i].rdata = ReadName(reader,buf,&stop);
				reader = reader + stop;
			}
		}

		for(i=0;i<ntohs(dns->auth_count);i++)			
		{
			auth[i].name=ReadName(reader,buf,&stop);
			reader+=stop;

			auth[i].resource=(struct R_DATA*)(reader);
			reader+=sizeof(struct R_DATA);

			if(ntohs(auth[i].resource->type)==1)		/*read address*/
			{
				auth[i].rdata = (unsigned char*)malloc(ntohs(auth[i].resource->data_len));
				for(j=0;j<ntohs(auth[i].resource->data_len);j++)
					auth[i].rdata[j]=reader[j];

				auth[i].rdata[ntohs(auth[i].resource->data_len)]='\0';
				reader+=ntohs(auth[i].resource->data_len);
			}
			else						/*read name*/
			{
				auth[i].rdata=ReadName(reader,buf,&stop);
				reader+=stop;
			}
		}

		for(i=0;i<ntohs(dns->add_count);i++)
		{
			addinfo[i].name=ReadName(reader,buf,&stop);
			reader+=stop;

			addinfo[i].resource=(struct R_DATA*)(reader);
			reader+=sizeof(struct R_DATA);

			if(ntohs(addinfo[i].resource->type)==1)				/*read address*/
			{
				addinfo[i].rdata = (unsigned char*)malloc(ntohs(addinfo[i].resource->data_len));
				for(j=0;j<ntohs(addinfo[i].resource->data_len);j++){
				    addinfo[i].rdata[j]=reader[j];
				}

				addinfo[i].rdata[ntohs(addinfo[i].resource->data_len)]='\0';
				reader+=ntohs(addinfo[i].resource->data_len);
			}
			else								/*read name*/
			{
				addinfo[i].rdata=ReadName(reader,buf,&stop);
				reader+=stop;
			}
		}

		for(i=0 ; i < ntohs(dns->ans_count) ; i++)
		{
			ALOGD("----------ntohs(dns->ans_count[%d])--------------\n",i);
			if( ntohs(answers[i].resource->type) == T_A) //IPv4 address
			{
				ALOGD("---ntohs(answers[%d].resource->type) == T_A--\n",i);
				long *p;
				p=(long*)answers[i].rdata;
				a.sin_addr.s_addr=(*p); 
				ALOGD("has IPv4 address : %s \n",inet_ntoa(a.sin_addr));
                
				if(s > 0) close(s);
				return inet_ntoa(a.sin_addr);
			}
			else if(ntohs(answers[i].resource->type)== T_CNAME) 
			    ALOGD("has alias name : %s \n",answers[i].rdata);
			else if(ntohs(answers[i].resource->type)== T_PTR)
			    ALOGD("has domain name :%s \n",answers[i].rdata);
		}

	}
    
fail:
	if(s > 0) close(s);
	return NULL;
}

u_char* ReadName(unsigned char* reader,unsigned char* buffer,int* count)
{
	unsigned char *name;
	unsigned int p=0,jumped=0,offset;
	int i , j;
	*count = 1;
	name = (unsigned char*)malloc(256);		/*maximum allowed length is 256*/
	name[0]='\0';
	while(*reader!=0)
	{
		if(*reader>=192)
		{
			offset = (*reader)*256 + *(reader+1) - 49152;
			reader = buffer + offset - 1;
			jumped = 1; 
		}
		else
			name[p++]=*reader;
		reader = reader+1;
		if(jumped==0)
			*count = *count + 1;
	}

	name[p]='\0';
	if(jumped==1)
		*count = *count + 1;

	for(i=0;i<(int)strlen((const char*)name);i++) 
	{
		p=name[i];
		for(j=0;j<(int)p;j++) 
		{
			name[i]=name[i+1];
			i=i+1;
		}
		name[i]='.';
	}
	name[i-1]='\0';
	return name;
}

void removeDotsFromName(unsigned char* dns,unsigned char* host) 
{
	int lock = 0 , i;
	strcat((char*)host,".");
	for(i = 0 ; i < strlen((char*)host) ; i++) 
	{
		if(host[i]=='.') 
		{
			*dns++ = i-lock;		/*replace the dot with the number of characters after it before the next dot*/
			for(;lock<i;lock++) 
				*dns++=host[lock];
			lock++; 
		}
	}
	*dns++='\0';
}

DNS检测流程

在网络连接后,framework层在ConnectivityService中处理所有类型的网络连接,handleDnsConfigurationChange函数则是对DNS设置的地方。可以在此进行DNS检测,也可以在handleConnect中进行。
例如在handleConnect中增加,
1)如果当前网络类型设置的DNS个数>=2,则进行DNS检测。
2)联网后1s,在后台调用NetworkUtils.checkDnsValid(value,“www.baidu.com”);检测设置的各个DNS有效性。
3)如果第一个有效的DNS index 满足0<index<dnses.size,即说明需要重置DNS了。将第一个有效的DNS置于最前。

// TODO: add for check dns
    NetworkStateTracker nt = mNetTrackers[newNetType];
    if (nt != null && nt.getNetworkInfo().isConnected() && !nt.isTeardownRequested()){
        final LinkProperties p = nt.getLinkProperties();
        if (p == null) return;
        final Collection<InetAddress> dnses = p.getDnses();
        if(dnses.size() < 2) return;
        
        Runnable dnsCheckPorcess = new Runnable(){ 
            public void run() { 
                synchronized(this){
                    try {
                        Collection<InetAddress> dnsesVaild = new ArrayList();
                        int vaildIndex = 0;
                        for (InetAddress dns : dnses) {
                            String value = dns.getHostAddress();
                            int ret = NetworkUtils.checkDnsValid(value,"www.baidu.com");
                            Slog.d("NetUtils","checking " + value  + ">>>result:" + ret);
                            if(ret==1) {
                                dnsesVaild.add(dns);
                                break;
                            }
                            vaildIndex++;
                        }
                        
                        if(vaildIndex == 0/*first dns is vaild*/
                            ||vaildIndex >= dnses.size()/*no vaild dns*/){
                            Slog.d("NetUtils","no need reset dns");
                            return;
                        }
                        
                        for (InetAddress dns : dnses) {
                           if(!dnsesVaild.contains(dns)){
                               dnsesVaild.add(dns);
                           }
                       }
                        Slog.d("NetUtils",">>>>>>>>>>>>>>>>>>>>>>>>>>>>reset dns");
                        mNetd.setDnsServersForInterface(p.getInterfaceName(),NetworkUtils.makeStrings(dnsesVaild), p.getDomains());

                    } catch (Exception e) {
                        Slog.e("NetUtils","exception checkDnsValid: " + e);
                    }
                }
            } 
        };
        mHandler.postDelayed(dnsCheckPorcess,1000);
    }

DNS检测重置

重置参考handleDnsConfigurationChange代码实现即可,framework层对DNS的操作,均是通过netd设置到底层,详细了解需要参考framework层NetworkManagementService和netd实现代码。
重置如下
mNetd.setDnsServersForInterface(p.getInterfaceName(),NetworkUtils.makeStrings(dnsesVaild), p.getDomains());
但这里没有清除DNS缓存。

验证方法

WiFi联网后,手动设置DNS,第一个DNS随便填一个不可用的IP,第二个DNS填8.8.8.8,尝试ping一个新的域名,看是否能很快反馈结果,确实如此。
同时抓打印,抓包,看日志是否符合代码流程,同时看网络包第一个使用的DNS是8.8.8.8

猜你喜欢

转载自blog.csdn.net/myvest/article/details/94752780