Code Monkey home page Code Monkey logo

dnsproxy's Introduction

Code Coverage Go Report Card Go Doc

DNS Proxy

A simple DNS proxy server that supports all existing DNS protocols including DNS-over-TLS, DNS-over-HTTPS, DNSCrypt, and DNS-over-QUIC. Moreover, it can work as a DNS-over-HTTPS, DNS-over-TLS or DNS-over-QUIC server.

How to install

There are several options how to install dnsproxy.

  1. Grab the binary for your device/OS from the Releases page.
  2. Use the official Docker image.
  3. Build it yourself (see the instruction below).

How to build

You will need Go v1.21 or later.

$ make build

Usage

Usage:
  dnsproxy [OPTIONS]

Application Options:
      --config-path=               yaml configuration file. Minimal working configuration in config.yaml.dist. Options passed through command line will override the ones from this file.
  -o, --output=                    Path to the log file. If not set, write to stdout.
  -c, --tls-crt=                   Path to a file with the certificate chain
  -k, --tls-key=                   Path to a file with the private key
      --https-server-name=         Set the Server header for the responses from the HTTPS server. (default: dnsproxy)
      --https-userinfo=            If set, all DoH queries are required to have this basic authentication information.
  -g, --dnscrypt-config=           Path to a file with DNSCrypt configuration. You can generate one using https://github.com/ameshkov/dnscrypt
      --edns-addr=                 Send EDNS Client Address
      --upstream-mode=             Defines the upstreams logic mode, possible values: load_balance, parallel, fastest_addr (default: load_balance)
  -l, --listen=                    Listening addresses
  -p, --port=                      Listening ports. Zero value disables TCP and UDP listeners
  -s, --https-port=                Listening ports for DNS-over-HTTPS
  -t, --tls-port=                  Listening ports for DNS-over-TLS
  -q, --quic-port=                 Listening ports for DNS-over-QUIC
  -y, --dnscrypt-port=             Listening ports for DNSCrypt
  -u, --upstream=                  An upstream to be used (can be specified multiple times). You can also specify path to a file with the list of servers
  -b, --bootstrap=                 Bootstrap DNS for DoH and DoT, can be specified multiple times (default: use system-provided)
  -f, --fallback=                  Fallback resolvers to use when regular ones are unavailable, can be specified multiple times. You can also specify path to a file with the list of servers
      --private-rdns-upstream=     Private DNS upstreams to use for reverse DNS lookups of private addresses, can be specified multiple times
      --dns64-prefix=              Prefix used to handle DNS64. If not specified, dnsproxy uses the 'Well-Known Prefix' 64:ff9b::.  Can be specified multiple times
      --private-subnets=           Private subnets to use for reverse DNS lookups of private addresses
      --bogus-nxdomain=            Transform the responses containing at least a single IP that matches specified addresses and CIDRs into NXDOMAIN.  Can be specified multiple times.
      --timeout=                   Timeout for outbound DNS queries to remote upstream servers in a human-readable form (default: 10s)
      --cache-min-ttl=             Minimum TTL value for DNS entries, in seconds. Capped at 3600. Artificially extending TTLs should only be done with careful consideration.
      --cache-max-ttl=             Maximum TTL value for DNS entries, in seconds.
      --cache-size=                Cache size (in bytes). Default: 64k
  -r, --ratelimit=                 Ratelimit (requests per second)
      --ratelimit-subnet-len-ipv4= Ratelimit subnet length for IPv4. (default: 24)
      --ratelimit-subnet-len-ipv6= Ratelimit subnet length for IPv6. (default: 56)
      --udp-buf-size=              Set the size of the UDP buffer in bytes. A value <= 0 will use the system default.
      --max-go-routines=           Set the maximum number of go routines. A zero value will not not set a maximum.
      --tls-min-version=           Minimum TLS version, for example 1.0
      --tls-max-version=           Maximum TLS version, for example 1.3
      --pprof                      If present, exposes pprof information on localhost:6060.
      --version                    Prints the program version
  -v, --verbose                    Verbose output (optional)
      --insecure                   Disable secure TLS certificate validation
      --ipv6-disabled              If specified, all AAAA requests will be replied with NoError RCode and empty answer
      --http3                      Enable HTTP/3 support
      --cache-optimistic           If specified, optimistic DNS cache is enabled
      --cache                      If specified, DNS cache is enabled
      --refuse-any                 If specified, refuse ANY requests
      --edns                       Use EDNS Client Subnet extension
      --dns64                      If specified, dnsproxy will act as a DNS64 server
      --use-private-rdns           If specified, use private upstreams for reverse DNS lookups of private addresses

Help Options:
  -h, --help                       Show this help message

Examples

Simple options

Runs a DNS proxy on 0.0.0.0:53 with a single upstream - Google DNS.

./dnsproxy -u 8.8.8.8:53

The same proxy with verbose logging enabled writing it to the file log.txt.

./dnsproxy -u 8.8.8.8:53 -v -o log.txt

Runs a DNS proxy on 127.0.0.1:5353 with multiple upstreams.

./dnsproxy -l 127.0.0.1 -p 5353 -u 8.8.8.8:53 -u 1.1.1.1:53

Listen on multiple interfaces and ports:

./dnsproxy -l 127.0.0.1 -l 192.168.1.10 -p 5353 -p 5354 -u 1.1.1.1

The plain DNS upstream server may be specified in several ways:

  • With a plain IP address:

    ./dnsproxy -l 127.0.0.1 -u 8.8.8.8:53
  • With a hostname or plain IP address and the udp:// scheme:

    ./dnsproxy -l 127.0.0.1 -u udp://dns.google -u udp://1.1.1.1
  • With a hostname or plain IP address and the tcp:// scheme to force using TCP:

    ./dnsproxy -l 127.0.0.1 -u tcp://dns.google -u tcp://1.1.1.1

Encrypted upstreams

DNS-over-TLS upstream:

./dnsproxy -u tls://dns.adguard.com

DNS-over-HTTPS upstream with specified bootstrap DNS:

./dnsproxy -u https://dns.adguard.com/dns-query -b 1.1.1.1:53

DNS-over-QUIC upstream:

./dnsproxy -u quic://dns.adguard.com

DNS-over-HTTPS upstream with enabled HTTP/3 support (chooses it if it's faster):

./dnsproxy -u https://dns.google/dns-query --http3

DNS-over-HTTPS upstream with forced HTTP/3 (no fallback to other protocol):

./dnsproxy -u h3://dns.google/dns-query

DNSCrypt upstream (DNS Stamp of AdGuard DNS):

./dnsproxy -u sdns://AQMAAAAAAAAAETk0LjE0MC4xNC4xNDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20

DNS-over-HTTPS upstream (DNS Stamp of Cloudflare DNS):

./dnsproxy -u sdns://AgcAAAAAAAAABzEuMC4wLjGgENk8mGSlIfMGXMOlIlCcKvq7AVgcrZxtjon911-ep0cg63Ul-I8NlFj4GplQGb_TTLiczclX57DvMV8Q-JdjgRgSZG5zLmNsb3VkZmxhcmUuY29tCi9kbnMtcXVlcnk

DNS-over-TLS upstream with two fallback servers (to be used when the main upstream is not available):

./dnsproxy -u tls://dns.adguard.com -f 8.8.8.8:53 -f 1.1.1.1:53

Encrypted DNS server

Runs a DNS-over-TLS proxy on 127.0.0.1:853.

./dnsproxy -l 127.0.0.1 --tls-port=853 --tls-crt=example.crt --tls-key=example.key -u 8.8.8.8:53 -p 0

Runs a DNS-over-HTTPS proxy on 127.0.0.1:443.

./dnsproxy -l 127.0.0.1 --https-port=443 --tls-crt=example.crt --tls-key=example.key -u 8.8.8.8:53 -p 0

Runs a DNS-over-HTTPS proxy on 127.0.0.1:443 with HTTP/3 support.

./dnsproxy -l 127.0.0.1 --https-port=443 --http3 --tls-crt=example.crt --tls-key=example.key -u 8.8.8.8:53 -p 0

Runs a DNS-over-QUIC proxy on 127.0.0.1:853.

./dnsproxy -l 127.0.0.1 --quic-port=853 --tls-crt=example.crt --tls-key=example.key -u 8.8.8.8:53 -p 0

Runs a DNSCrypt proxy on 127.0.0.1:443.

./dnsproxy -l 127.0.0.1 --dnscrypt-config=./dnscrypt-config.yaml --dnscrypt-port=443 --upstream=8.8.8.8:53 -p 0

Please note that in order to run a DNSCrypt proxy, you need to obtain DNSCrypt configuration first. You can use https://github.com/ameshkov/dnscrypt command-line tool to do that with a command like this ./dnscrypt generate --provider-name=2.dnscrypt-cert.example.org --out=dnscrypt-config.yaml

Additional features

Runs a DNS proxy on 0.0.0.0:53 with rate limit set to 10 rps, enabled DNS cache, and that refuses type=ANY requests.

./dnsproxy -u 8.8.8.8:53 -r 10 --cache --refuse-any

Runs a DNS proxy on 127.0.0.1:5353 with multiple upstreams and enable parallel queries to all configured upstream servers.

./dnsproxy -l 127.0.0.1 -p 5353 -u 8.8.8.8:53 -u 1.1.1.1:53 -u tls://dns.adguard.com --upstream-mode parallel

Loads upstreams list from a file.

./dnsproxy -l 127.0.0.1 -p 5353 -u ./upstreams.txt

DNS64 server

dnsproxy is capable of working as a DNS64 server.

What is DNS64/NAT64 This is a mechanism of providing IPv6 access to IPv4. Using a NAT64 gateway with IPv4-IPv6 translation capability lets IPv6-only clients connect to IPv4-only services via synthetic IPv6 addresses starting with a prefix that routes them to the NAT64 gateway. DNS64 is a DNS service that returns AAAA records with these synthetic IPv6 addresses for IPv4-only destinations (with A but not AAAA records in the DNS). This lets IPv6-only clients use NAT64 gateways without any other configuration.

See also RFC 6147.

Enables DNS64 with the default Well-Known Prefix:

./dnsproxy -l 127.0.0.1 -p 5353 -u 8.8.8.8 --use-private-rdns --private-rdns-upstream=127.0.0.1 --dns64

You can also specify any number of custom DNS64 prefixes:

./dnsproxy -l 127.0.0.1 -p 5353 -u 8.8.8.8 --use-private-rdns --private-rdns-upstream=127.0.0.1 --dns64 --dns64-prefix=64:ffff:: --dns64-prefix=32:ffff::

Note that only the first specified prefix will be used for synthesis.

PTR queries for addresses within the specified ranges or the Well-Known one could only be answered with locally appropriate data, so dnsproxy will route those to the local upstream servers. Those should be specified and enabled if DNS64 is enabled.

Fastest addr + cache-min-ttl

This option would be useful to the users with problematic network connection. In this mode, dnsproxy would detect the fastest IP address among all that were returned, and it will return only it.

Additionally, for those with problematic network connection, it makes sense to override cache-min-ttl. In this case, dnsproxy will make sure that DNS responses are cached for at least the specified amount of time.

It makes sense to run it with multiple upstream servers only.

Run a DNS proxy with two upstreams, min-TTL set to 10 minutes, fastest address detection is enabled:

./dnsproxy -u 8.8.8.8 -u 1.1.1.1 --cache --cache-min-ttl=600 --upstream-mode=fastest_addr

who run dnsproxy with multiple upstreams

Specifying upstreams for domains

You can specify upstreams that will be used for a specific domain(s). We use the dnsmasq-like syntax, decorating domains with brackets (see --server description).

Syntax: [/[domain1][/../domainN]/]upstreamString

Where upstreamString is one or many upstreams separated by space (e.g. 1.1.1.1 or 1.1.1.1 2.2.2.2).

If one or more domains are specified, that upstream (upstreamString) is used only for those domains. Usually, it is used for private nameservers. For instance, if you have a nameserver on your network which deals with xxx.internal.local at 192.168.0.1 then you can specify [/internal.local/]192.168.0.1, and dnsproxy will send all queries to that nameserver. Everything else will be sent to the default upstreams (which are mandatory!).

  1. An empty domain specification, // has the special meaning of "unqualified names only", which will be used to resolve names with a single label in them, or with exactly two labels in case of DS requests.
  2. More specific domains take precedence over less specific domains, so: --upstream=[/host.com/]1.2.3.4 --upstream=[/www.host.com/]2.3.4.5 will send queries for *.host.com to 1.2.3.4, except *.www.host.com, which will go to 2.3.4.5.
  3. The special server address # means, "use the common servers", so: --upstream=[/host.com/]1.2.3.4 --upstream=[/www.host.com/]# will send queries for *.host.com to 1.2.3.4, except *.www.host.com which will be forwarded as usual.
  4. The wildcard * has special meaning of "any sub-domain", so: --upstream=[/*.host.com/]1.2.3.4 will send queries for *.host.com to 1.2.3.4, but host.com will be forwarded to default upstreams.

Examples

Sends requests for *.local domains to 192.168.0.1:53. Other requests are sent to 8.8.8.8:53:

./dnsproxy\
    -u "8.8.8.8:53"\
    -u "[/local/]192.168.0.1:53"

Sends requests for *.host.com to 1.1.1.1:53 except for *.maps.host.com which are sent to 8.8.8.8:53 (along with other requests):

./dnsproxy\
    -u "8.8.8.8:53"\
    -u "[/host.com/]1.1.1.1:53"\
    -u "[/maps.host.com/]#"

Sends requests for *.host.com to 1.1.1.1:53 except for host.com which is sent to 9.9.9.10:53, and all other requests are sent to 8.8.8.8:53:

./dnsproxy\
    -u "8.8.8.8:53"\
    -u "[/host.com/]9.9.9.10:53"\
    -u "[/*.host.com/]1.1.1.1:53"

Sends requests for com (and its subdomains) to 1.2.3.4:53, requests for other top-level domains to 1.1.1.1:53, and all other requests to 8.8.8.8:53:

./dnsproxy\
    -u "8.8.8.8:53"\
    -u "[//]1.1.1.1:53"\
    -u "[/com/]1.2.3.4:53"

Specifying private rDNS upstreams

You can specify upstreams that will be used for reverse DNS requests of type PTR for private addresses. Same applies to the authority requests of types SOA and NS. The set of private addresses is defined by the --private-rdns-upstream, and the set from RFC 6303 is used by default.

The additional requirement to the domains specified for upstreams is to be in-addr.arpa, ip6.arpa, or its subdomain. Addresses encoded in the domains should also be private.

Examples

Sends queries for *.168.192.in-addr.arpa to 192.168.1.2, if requested by client from 192.168.0.0/16 subnet. Other queries answered with NXDOMAIN:

./dnsproxy\
    -l "0.0.0.0"\
    -u "8.8.8.8"\
    --use-private-rdns\
    --private-subnets="192.168.0.0/16"
    --private-rdns-upstream="192.168.1.2"\

Sends queries for *.in-addr.arpa to 192.168.1.2, *.ip6.arpa to fe80::1, if requested by client within the default RFC 6303 subnet set. Other queries answered with NXDOMAIN:

./dnsproxy\
    -l "0.0.0.0"\
    -u 8.8.8.8\
    --use-private-rdns\
    --private-rdns-upstream="192.168.1.2"\
    --private-rdns-upstream="[/ip6.arpa/]fe80::1"

EDNS Client Subnet

To enable support for EDNS Client Subnet extension you should run dnsproxy with --edns flag:

./dnsproxy -u 8.8.8.8:53 --edns

Now if you connect to the proxy from the Internet - it will pass through your original IP address's prefix to the upstream server. This way the upstream server may respond with IP addresses of the servers that are located near you to minimize latency.

If you want to use EDNS CS feature when you're connecting to the proxy from a local network, you need to set --edns-addr=PUBLIC_IP argument:

./dnsproxy -u 8.8.8.8:53 --edns --edns-addr=72.72.72.72

Now even if your IP address is 192.168.0.1 and it's not a public IP, the proxy will pass through 72.72.72.72 to the upstream server.

Bogus NXDomain

This option is similar to dnsmasq bogus-nxdomain. dnsproxy will transform responses that contain at least a single IP address which is also specified by the option into NXDOMAIN. Can be specified multiple times.

In the example below, we use AdGuard DNS server that returns 0.0.0.0 for blocked domains, and transform them to NXDOMAIN.

./dnsproxy -u 94.140.14.14:53 --bogus-nxdomain=0.0.0.0

CIDR ranges are supported as well. The following will respond with NXDOMAIN instead of responses containing any IP from 192.168.0.0-192.168.255.255:

./dnsproxy -u 192.168.0.15:53 --bogus-nxdomain=192.168.0.0/16

Basic Auth for DoH

By setting the --https-userinfo option you can use dnsproxy as a DoH proxy with basic authentication requirements.

For example:

./dnsproxy\
    --https-port='443'\
    --https-userinfo='user:p4ssw0rd'\
    --tls-crt='…/my.crt'\
    --tls-key='…/my.key'\
    -u '94.140.14.14:53'

This configuration will only allow DoH queries that contain an Authorization header containing the BasicAuth credentials for user user with password p4ssw0rd.

Add -p 0 if you also want to disable plain-DNS handling and make dnsproxy only serve DoH with Basic Auth checking.

dnsproxy's People

Contributors

0xf4ced avatar adworacz avatar ainar-g avatar ameshkov avatar artembaskal avatar cattyhouse avatar d13410n3 avatar dreista avatar ekildeew avatar eugeneone1 avatar fernvenue avatar fhriley avatar hmage avatar hongyi-zhao avatar honwen avatar irinesistiana avatar justus-forks avatar krombel avatar lanius-collaris avatar linuxgemini avatar marinomtz avatar mizzick avatar natesales avatar peterdavehello avatar rampagex avatar sc0rp10 avatar schzhn avatar sdbochkarev avatar snawoot avatar szolin avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

dnsproxy's Issues

dnsproxy with configuration DoT, forward IP

Hello,

I run dnsproxy like that :
dnsproxy -p 5353 --tls-port=853 -u 127.0.0.1:53 --tls-crt=/fullchain.pem --tls-key=privkey.pem

But my internal DNS server (127.0.0.1) see request coming from 127.0.0.1 instead original IP, is it possible to fix that ?

Upstreams rotation algorithm should consider the case of an unreachable server

The current upstreams rotation algorithm is flawed.

Consider the case when there are two upstream servers configured: IPv4 and IPv6.

In an IPv4-only network, the IPv6 upstream will return error immediately, and dnsproxy will use 0 as the rtt value:

	reply, err := dnsUpstream.Exchange(d.Req)
	rtt := int(time.Since(startTime) / time.Millisecond)

Android: dnsproxy creates dozens connections to DOH upstream on startup

00:13:03.349 [Thread-15] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.351 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.352 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.353 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.354 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.355 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.355 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.356 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.357 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.358 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.359 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.361 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.362 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.363 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.365 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.366 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.367 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.367 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.368 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.369 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.369 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.370 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.371 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.371 [Thread-9] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.372 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.372 [Thread-20] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443
00:13:03.373 [Thread-21] INFO  com.adguard.android.filtering.dns.a - Dialing to 176.103.130.132:443

Try experimenting with http.Transport settings (MaxConnsPerHost and MaxIdleConns).

Add DNSCrypt support

DNSCrypt seems to be better from the performance point of view, and this might be important to mobiles. So we should considering adding full DNSCrypt support to dnsproxy (and therefore, to AdGuard Home).

Crash on a request with invalid number of questions

@armanzor commented on Wed Jan 02 2019

AdGuardHome have been suddenly crashed with no actions from my side. Last records in log:

2019/01/02 11:13:25 [WARN] got invalid number of questions: 0
panic: runtime error: index out of range

goroutine 48079 [running]:
github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(0xc002b00000, 0xc000342ee0, 0xc, 0xc)
        /Users/hmage/go/pkg/mod/github.com/!adguard!team/[email protected]/proxy/proxy.go:477 +0x546
github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleUDPPacket(0xc002b00000, 0xc0055462d0, 0xc, 0xc, 0xa805a0, 0xc001dcc3f0, 0xc001430c58)
        /Users/hmage/go/pkg/mod/github.com/!adguard!team/[email protected]/proxy/proxy.go:345 +0x1ea
created by github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpPacketLoop
        /Users/hmage/go/pkg/mod/github.com/!adguard!team/[email protected]/proxy/proxy.go:315 +0x2fe

Environment

Description Value
Version of AdGuard Home server: v0.92
How did you setup DNS configuration: Docker v18.06.1-ce
Operating system and version: Amazon Linux AMI release 2018.03

IIJ DoH server fails

HTTP response code 400 is returned, when the following DoH service is specified as upstream.
https://public.dns.iij.jp/dns-query
DoT is fine.
tls://public.dns.iij.jp

The DNS service is a beta service by a corporation [Internet Initiative Japan Inc.].
se. https://public.dns.iij.jp/
*There seems to be no English page available

Steps to reproduce

dnsproxy.exe -v -o dnsproxy.log -u https://public.dns.iij.jp/dns-query -p 10053
and query for "adguard.com"

Actual behavior

See attached log.
dnsproxy.log

Your environment

Description Value
Version of dnsproxy: v0.15.1 (amd64 binary)
Operating system and version: Windows 10 1903, Pro x64

Fix RTT format for `exchangeWithUpstream` func

There is wrong time format for RTT in exchangeWithUpstream func:

2019/02/28 21:52:20 [1021] proxy.exchangeWithUpstream(): upstream 1dot1dot1dot1.cloudflare-dns.com:853 successfully finished exchange of ;unified-ter-na.hismarttv.com.    IN     A. Elapsed 28020400 ms.

Wrong timeout behavior

Despite having the timeout set to 5 seconds, I see some durations in the log which shouldn't be possible:

[2308] proxy.(*Proxy).Resolve(): RTT: 10006 ms
[2421] proxy.(*Proxy).Resolve(): RTT: 15005 ms
[2423] proxy.(*Proxy).Resolve(): RTT: 22909 ms

Add "--all-servers" configuration property

This flag should enable parallel queries to all configured upstream servers. Just like the --all-servers setting of dnsmasq.

Here's this flag description from the dnsmasq docs:

--all-servers
By default, when dnsmasq has more than one upstream server available, it will
send queries to just one server. Setting this flag forces dnsmasq to send all
queries to all available servers. The reply from the server which answers first
will be returned to the original requester.

Experiment with different blocking settings

Once urlfilter library is integrated, we should experiment with different blocking strategies.

It seems that on Android caching does not work for NXDOMAIN answers at the moment despite the SOA record. If this is proved to be so, we should consider using UNSPECIFIED_DOMAIN (0.0.0.0) instead.

version

add please param key "--version" to display the dnsproxy version

Allow specifying resolver's IP address

Currently, DOH/DOT resolvers rely on the bootstrap DNS server. Alternatively, we should allow specifying the IP address when the new upstream is created.

dnsproxy code refactoring

  1. Add Cleanup() method to the Upstream interface. It is necessary to clean up resources (connections) sometimes.
  2. Use this Cleanup() method on proxy shutdown.
  3. Rework the TLSPool, we should be able to limit the maximum pool size.

Cloudflare DoH server fails

Querying Cloudflare's DoH server (https://cloudflare-dns.com/dns-query) seems to constantly fail (even when testing upstreams in the configuration page), while Quad9 or AdGuard appear to work normally.
Could this be caused by how Cloudflare uses HTTP error messages as response for malformed/empty/too small requests? E.g. HTTP 400 is returned for empty GETs.

Change upstream.AddressToUpstream declaration

Let's do something like this:

type Options struct {
    Bootstrap []string,
    Timeout time.Duration,
}

func AddressToUpstream(address string, opts Options)

The benefit of this is that we won't need to release a major update every time we need to add a new option.

not correct permissions for created log file

start dnsproxy with -o /root/edns/debug.log
proccess creates log file with 0755 permission access

[15:08] root@host ~/edns # stat debug.log
File: ‘debug.log’
Size: 1363 Blocks: 8 IO Block: 4096 regular file
Device: ca03h/51715d Inode: 660706 Links: 1
Access: (0755/-rwxr-xr-x) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2019-03-04 15:08:00.565400970 +0200
Modify: 2019-03-04 15:07:52.409434027 +0200
Change: 2019-03-04 15:07:52.409434027 +0200
Birth: -

DNS-over-TLS upstream fails randomly

@tomacco81 commented on Mon Dec 31 2018

Since v0.92 I'm getting sporadic DNS errors (Failed to read a request from 1.1.1.1:853, cause: EOF)

Steps to reproduce

host adguard.com 127.0.0.1

Expected behavior

Name: 127.0.0.1
Address: 127.0.0.1#53
Aliases: 

adguard.com has address 104.20.30.130
adguard.com has address 104.20.31.130
adguard.com has IPv6 address 2606:4700:10::6814:1e82
adguard.com has IPv6 address 2606:4700:10::6814:1f82
adguard.com mail is handled by 10 mx.yandex.net.

Actual behavior

Using domain server:
Name: 127.0.0.1
Address: 127.0.0.1#53
Aliases: 

Host adguard.com not found: 2(SERVFAIL)
Debug output:
2018/12/31 11:17:23 AdGuard Home web interface backend, version v0.92
2018/12/31 11:17:23 Current working directory is /home/pi/AdGuardHome
2018/12/31 11:17:23 config file /home/pi/AdGuardHome/AdGuardHome.yaml does not exist, nothing to upgrade
2018/12/31 11:17:23 Reading YAML file: /home/pi/AdGuardHome/AdGuardHome.yaml
2018/12/31 11:17:23 YAML file doesn't exist, skipping: /home/pi/AdGuardHome/AdGuardHome.yaml
2018/12/31 11:17:23 Loading filter 1 contents to: /home/pi/AdGuardHome/data/filters/1.txt
2018/12/31 11:17:23 Couldn't load filter 1 contents due to stat /home/pi/AdGuardHome/data/filters/1.txt: no such file or directory
2018/12/31 11:17:23 Downloading update for filter 1 from https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt
2018/12/31 11:17:23 Filter 1 has been updated: 500197 bytes, 25936 rules
2018/12/31 11:17:23 Saving filter 1 contents to: /home/pi/AdGuardHome/data/filters/1.txt
2018/12/31 11:17:23 Writing YAML file: /home/pi/AdGuardHome/AdGuardHome.yaml
2018/12/31 11:17:23 Writing YAML file: /home/pi/AdGuardHome/AdGuardHome.yaml
2018/12/31 11:17:23 Creating dnsfilter
2018/12/31 11:17:24 Loading stats from querylog
2018/12/31 11:17:24 Starting the DNS proxy server
2018/12/31 11:17:24 Ratelimit is enabled and set to 20 rps
2018/12/31 11:17:24 The server is configured to refuse ANY requests
2018/12/31 11:17:24 DNS cache is enabled
2018/12/31 11:17:24 Creating the UDP server socket
2018/12/31 11:17:24 Listening to udp://[::]:53
2018/12/31 11:17:24 Go to http://127.0.0.1:3000
2018/12/31 11:17:24 Entering the UDP listener loop on [::]:53
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:33900
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29190
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       A
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.0.0.1:853 (1)
upstream.(*TLSPool).Get(): Dialing to 1.0.0.1:853
proxy.(*Proxy).Resolve(): RTT: 322 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 29190
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       A

;; ANSWER SECTION:
github.com.     58      IN      A       192.30.253.112
github.com.     58      IN      A       192.30.253.113
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:47626
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1348
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       AAAA
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Dialing to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 272 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 1348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       AAAA

;; AUTHORITY SECTION:
github.com.     435     IN      SOA     ns-1707.awsdns-21.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:59009
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 27641
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       MX
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 18 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 27641
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;github.com.    IN       MX

;; ANSWER SECTION:
github.com.     2550    IN      MX      5 alt1.aspmx.l.google.com.
github.com.     2550    IN      MX      5 alt2.aspmx.l.google.com.
github.com.     2550    IN      MX      10 alt3.aspmx.l.google.com.
github.com.     2550    IN      MX      10 alt4.aspmx.l.google.com.
github.com.     2550    IN      MX      1 aspmx.l.google.com.
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:51953
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21781
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       A
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 0 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: SERVFAIL, id: 21781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       A
proxy.(*Proxy).handleUDPPacket(): error handling DNS (udp) request: talking to dnsUpstream failed, cause: Failed to read a request from 1.1.1.1:853, cause: EOF
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:58301
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 63958
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       A
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Dialing to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 313 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 63958
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       A

;; ANSWER SECTION:
adguard.com.    9       IN      A       104.20.30.130
adguard.com.    9       IN      A       104.20.31.130
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:51084
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31321
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       AAAA
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 22 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 31321
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       AAAA

;; ANSWER SECTION:
adguard.com.    9       IN      AAAA    2606:4700:10::6814:1e82
adguard.com.    9       IN      AAAA    2606:4700:10::6814:1f82
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:47365
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 53334
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       MX
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 29 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 53334
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;adguard.com.   IN       MX

;; ANSWER SECTION:
adguard.com.    120     IN      MX      10 mx.yandex.net.
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:35731
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42165
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       A
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 0 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: SERVFAIL, id: 42165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       A
proxy.(*Proxy).handleUDPPacket(): error handling DNS (udp) request: talking to dnsUpstream failed, cause: Failed to read a request from 1.1.1.1:853, cause: EOF
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:58581
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61169
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       A
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Dialing to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 309 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61169
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       A

;; ANSWER SECTION:
google.com.     61      IN      A       216.58.207.46
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:40590
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7467
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       AAAA
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 31 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7467
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       AAAA

;; ANSWER SECTION:
google.com.     70      IN      AAAA    2a00:1450:4001:808::200e
proxy.(*Proxy).handleUDPPacket(): Start handling new UDP packet from 127.0.0.1:48402
proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 60335
;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       MX
proxy.(*Proxy).handleDNSRequest(): Upstream is 1.1.1.1:853 (0)
upstream.(*TLSPool).Get(): Returning existing connection to 1.1.1.1:853
proxy.(*Proxy).Resolve(): RTT: 37 ms
proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 60335
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;google.com.    IN       MX

;; ANSWER SECTION:
google.com.     232     IN      MX      10 aspmx.l.google.com.
google.com.     232     IN      MX      20 alt1.aspmx.l.google.com.
google.com.     232     IN      MX      30 alt2.aspmx.l.google.com.
google.com.     232     IN      MX      40 alt3.aspmx.l.google.com.
google.com.     232     IN      MX      50 alt4.aspmx.l.google.com.

Your environment

Description Value
Version of AdGuard Home server: v0.92
How did you setup DNS configuration: IoT
If it's a router or IoT, please write device model: Raspberry Pi 3 Model B Rev 1.2
Operating system and version: Raspbian GNU/Linux 9 (stretch)

@uraimo commented on Mon Dec 31 2018

Same here, on a RaspberryPi Zero, latest Raspbian (6 ips in the upstream_dns list, cloudflare,quad9 and adguard).
Just I would describe it as "sporadic", since most of the times the dns resolution fails.


@ameshkov commented on Mon Dec 31 2018

It happens when the tcp connection to the upstream is closed after some time. @hmage I guess we should re-connect automatically right away.

Rework the DNS cache

Currently, this is simply a map that can grow with no limit.

Here's what I suggest we do:

  1. Start using a cache instead of that map (possible solutions are go-cache or gcache)
  2. Another option would be to continue using that simple map but to periodically scan it and purge the expired records.
  3. Expose the current cache state (number of items, number of cache hits) via some public method
  4. Allow users to limit the maximum cache size (CacheMaxSize), but allow to specify unlimited max size.

DNSProxy Listens only on IPV6 [Android]

setting listenAddr to 0.0.0.0 on android doesn't work for ipv4
for ipv4 i have to set the exact ip !

Code :

Config cfg = new Config();
cfg.setListenPort(7053);
cfg.setListenAddr("0.0.0.0");
proxy.setConfig(cfg);
proxy.start();

Logs :

2019-03-10 16:46:40.687 10740-10876/in.test.my I/GoLog: [info] Entering the UDP listener loop on [::]:7053
2019-03-10 16:46:40.687 10740-10876/in.test.my I/GoLog: [info] Entering the tcp listener loop on [::]:7053

Netstat :

daisy_sprout:/ $ netstat -an | grep 7053
tcp6       0      0 :::7053                 :::*                    LISTEN
udp6       0      0 :::7053                 :::*

Failed to connect to 1.1.1.1:853

Got the log from here: AdguardTeam/AdGuardHome#500

proxy.(*Proxy).handleUDPPacket(): error handling DNS (udp) request: talking to d
nsUpstream failed, cause: Failed to get a connection from TLSPool to 1.1.1.1:853
, cause: Failed to connect to 1.1.1.1:853, cause: x509: certificate is valid for
 1.1.1.1, 1.0.0.1, 162.159.132.53, 2606:4700:4700::1111, 2606:4700:4700::1001, 2
606:4700:4700::64, 2606:4700:4700::6400, not 1.1.1.1

Might be Windows-specific.

Extend "AddressToUpstream" with dnsmasq-like domain specification

See --server here:
http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html

If one or more optional domains are given, that server is used only for those domains and they are queried only using the specified server. This is intended for private nameservers: if you have a nameserver on your network which deals with names of the form xxx.internal.thekelleys.org.uk at 192.168.1.1 then giving the flag --server=/internal.thekelleys.org.uk/192.168.1.1 will send all queries for internal machines to that nameserver, everything else will go to the servers in /etc/resolv.conf.

An empty domain specification, // has the special meaning of "unqualified names only" ie names without any dots in them.

More specific domains take precedence over less specific domains, so: --server=/google.com/1.2.3.4 --server=/www.google.com/2.3.4.5 will send queries for *.google.com to 1.2.3.4, except *www.google.com, which will go to 2.3.4.5

The special server address '#' means, "use the standard servers", so --server=/google.com/1.2.3.4 --server=/www.google.com/# will send queries for *.google.com to 1.2.3.4, except *www.google.com which will be forwarded as usual.

In our case, we should allow the following format:

--upstream=[/[domain1][/../domainN]/]upstreamString

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.