/* Pi-hole: A black hole for Internet advertisements * (c) 2017 Pi-hole, LLC (https://pi-hole.net) * Network-wide ad blocking via your own hardware. * * FTL Engine * API Implementation * * This file is copyright under the latest version of the EUPL. * Please see LICENSE file for your rights under this license. */ #include "FTL.h" #include "api.h" #include "version.h" // needed for sqlite3_libversion() #include "sqlite3.h" #define min(a,b) ({ __typeof__ (a) _a = (a); __typeof__ (b) _b = (b); _a < _b ? _a : _b; }) /* qsort comparision function (count field), sort ASC */ static int __attribute__((pure)) cmpasc(const void *a, const void *b) { const int *elem1 = (int*)a; const int *elem2 = (int*)b; if (elem1[1] < elem2[1]) return -1; else if (elem1[1] > elem2[1]) return 1; else return 0; } // qsort subroutine, sort DESC static int __attribute__((pure)) cmpdesc(const void *a, const void *b) { const int *elem1 = (int*)a; const int *elem2 = (int*)b; if (elem1[1] > elem2[1]) return -1; else if (elem1[1] < elem2[1]) return 1; else return 0; } void getStats(const int *sock) { const int blocked = counters->blocked; const int total = counters->queries; float percentage = 0.0f; // Avoid 1/0 condition if(total > 0) percentage = 1e2f*blocked/total; // Send domains being blocked if(istelnet[*sock]) { ssend(*sock, "domains_being_blocked %i\n", counters->gravity); } else pack_int32(*sock, counters->gravity); // unique_clients: count only clients that have been active within the most recent 24 hours int activeclients = 0; for(int clientID=0; clientID < counters->clients; clientID++) { // Get client pointer const clientsData* client = getClient(clientID, true); if(client->count > 0) activeclients++; } if(istelnet[*sock]) { ssend(*sock, "dns_queries_today %i\nads_blocked_today %i\nads_percentage_today %f\n", total, blocked, percentage); ssend(*sock, "unique_domains %i\nqueries_forwarded %i\nqueries_cached %i\n", counters->domains, counters->forwardedqueries, counters->cached); ssend(*sock, "clients_ever_seen %i\n", counters->clients); ssend(*sock, "unique_clients %i\n", activeclients); // Sum up all query types (A, AAAA, ANY, SRV, SOA, ...) int sumalltypes = 0; for(int queryType=0; queryType < TYPE_MAX-1; queryType++) { sumalltypes += counters->querytype[queryType]; } ssend(*sock, "dns_queries_all_types %i\n", sumalltypes); // Send individual reply type counters ssend(*sock, "reply_NODATA %i\nreply_NXDOMAIN %i\nreply_CNAME %i\nreply_IP %i\n", counters->reply_NODATA, counters->reply_NXDOMAIN, counters->reply_CNAME, counters->reply_IP); ssend(*sock, "privacy_level %i\n", config.privacylevel); } else { pack_int32(*sock, total); pack_int32(*sock, blocked); pack_float(*sock, percentage); pack_int32(*sock, counters->domains); pack_int32(*sock, counters->forwardedqueries); pack_int32(*sock, counters->cached); pack_int32(*sock, counters->clients); pack_int32(*sock, activeclients); } // Send status if(istelnet[*sock]) { ssend(*sock, "status %s\n", counters->gravity > 0 ? "enabled" : "disabled"); } else pack_uint8(*sock, blockingstatus); } void getOverTime(const int *sock) { int from = 0, until = OVERTIME_SLOTS; bool found = false; time_t mintime = overTime[0].timestamp; // Start with the first non-empty overTime slot for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if((overTime[slot].total > 0 || overTime[slot].blocked > 0) && overTime[slot].timestamp >= mintime) { from = slot; found = true; break; } } // End with last non-empty overTime slot for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if(overTime[slot].timestamp >= time(NULL)) { until = slot; break; } } // Check if there is any data to be sent if(!found) return; if(istelnet[*sock]) { for(int slot = from; slot < until; slot++) { ssend(*sock,"%li %i %i\n", overTime[slot].timestamp, overTime[slot].total, overTime[slot].blocked); } } else { // We can use the map16 type because there should only be about 288 time slots (TIMEFRAME set to "yesterday") // and map16 can hold up to (2^16)-1 = 65535 pairs // Send domains over time pack_map16_start(*sock, (uint16_t) (until - from)); for(int slot = from; slot < until; slot++) { pack_int32(*sock, overTime[slot].timestamp); pack_int32(*sock, overTime[slot].total); } // Send ads over time pack_map16_start(*sock, (uint16_t) (until - from)); for(int slot = from; slot < until; slot++) { pack_int32(*sock, overTime[slot].timestamp); pack_int32(*sock, overTime[slot].blocked); } } } void getTopDomains(const char *client_message, const int *sock) { int temparray[counters->domains][2], count=10, num; bool audit = false, asc = false; const bool blocked = command(client_message, ">top-ads"); // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_HIDE_DOMAINS) { // Always send the total number of domains, but pretend it's 0 if(!istelnet[*sock]) pack_int32(*sock, 0); return; } // Match both top-domains and top-ads // example: >top-domains (15) if(sscanf(client_message, "%*[^(](%i)", &num) > 0) { // User wants a different number of requests count = num; } // Apply Audit Log filtering? // example: >top-domains for audit if(command(client_message, " for audit")) audit = true; // Sort in ascending order? // example: >top-domains asc if(command(client_message, " asc")) asc = true; for(int domainID=0; domainID < counters->domains; domainID++) { // Get domain pointer const domainsData* domain = getDomain(domainID, true); temparray[domainID][0] = domainID; if(blocked) temparray[domainID][1] = domain->blockedcount; else // Count only permitted queries temparray[domainID][1] = (domain->count - domain->blockedcount); } // Sort temporary array if(asc) qsort(temparray, counters->domains, sizeof(int[2]), cmpasc); else qsort(temparray, counters->domains, sizeof(int[2]), cmpdesc); // Get filter const char* filter = read_setupVarsconf("API_QUERY_LOG_SHOW"); bool showpermitted = true, showblocked = true; if(filter != NULL) { if((strcmp(filter, "permittedonly")) == 0) showblocked = false; else if((strcmp(filter, "blockedonly")) == 0) showpermitted = false; else if((strcmp(filter, "nothing")) == 0) { showpermitted = false; showblocked = false; } } clearSetupVarsArray(); // Get domains which the user doesn't want to see char * excludedomains = NULL; if(!audit) { excludedomains = read_setupVarsconf("API_EXCLUDE_DOMAINS"); if(excludedomains != NULL) { getSetupVarsArray(excludedomains); } } if(!istelnet[*sock]) { // Send the data required to get the percentage each domain has been blocked / queried if(blocked) pack_int32(*sock, counters->blocked); else pack_int32(*sock, counters->queries); } int n = 0; for(int i=0; i < counters->domains; i++) { // Get sorted index const int domainID = temparray[i][0]; // Get domain pointer const domainsData* domain = getDomain(domainID, true); // Skip this domain if there is a filter on it if(excludedomains != NULL && insetupVarsArray(getstr(domain->domainpos))) continue; // Skip this domain if already included in audit if(audit && countlineswith(getstr(domain->domainpos), files.auditlist) > 0) continue; // Hidden domain, probably due to privacy level. Skip this in the top lists if(strcmp(getstr(domain->domainpos), HIDDEN_DOMAIN) == 0) continue; if(blocked && showblocked && domain->blockedcount > 0) { if(audit && domain->regexmatch == REGEX_BLOCKED) { if(istelnet[*sock]) ssend(*sock, "%i %i %s wildcard\n", n, domain->blockedcount, getstr(domain->domainpos)); else { char *fancyWildcard = calloc(3 + strlen(getstr(domain->domainpos)), sizeof(char)); if(fancyWildcard == NULL) return; sprintf(fancyWildcard, "*.%s", getstr(domain->domainpos)); if(!pack_str32(*sock, fancyWildcard)) return; pack_int32(*sock, domain->blockedcount); free(fancyWildcard); } } else { if(istelnet[*sock]) ssend(*sock, "%i %i %s\n", n, domain->blockedcount, getstr(domain->domainpos)); else { if(!pack_str32(*sock, getstr(domain->domainpos))) return; pack_int32(*sock, domain->blockedcount); } } n++; } else if(!blocked && showpermitted && (domain->count - domain->blockedcount) > 0) { if(istelnet[*sock]) ssend(*sock,"%i %i %s\n",n,(domain->count - domain->blockedcount),getstr(domain->domainpos)); else { if(!pack_str32(*sock, getstr(domain->domainpos))) return; pack_int32(*sock, domain->count - domain->blockedcount); } n++; } // Only count entries that are actually sent and return when we have send enough data if(n == count) break; } if(excludedomains != NULL) clearSetupVarsArray(); } void getTopClients(const char *client_message, const int *sock) { int temparray[counters->clients][2], count=10, num; // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_HIDE_DOMAINS_CLIENTS) { // Always send the total number of clients, but pretend it's 0 if(!istelnet[*sock]) pack_int32(*sock, 0); return; } // Match both top-domains and top-ads // example: >top-clients (15) if(sscanf(client_message, "%*[^(](%i)", &num) > 0) { // User wants a different number of requests count = num; } // Show also clients which have not been active recently? // This option can be combined with existing options, // i.e. both >top-clients withzero" and ">top-clients withzero (123)" are valid bool includezeroclients = false; if(command(client_message, " withzero")) includezeroclients = true; // Show number of blocked queries instead of total number? // This option can be combined with existing options, // i.e. ">top-clients withzero blocked (123)" would be valid bool blockedonly = false; if(command(client_message, " blocked")) blockedonly = true; for(int clientID = 0; clientID < counters->clients; clientID++) { // Get client pointer const clientsData* client = getClient(clientID, true); temparray[clientID][0] = clientID; // Use either blocked or total count based on request string temparray[clientID][1] = blockedonly ? client->blockedcount : client->count; } // Sort in ascending order? // example: >top-clients asc bool asc = false; if(command(client_message, " asc")) asc = true; // Sort temporary array if(asc) qsort(temparray, counters->clients, sizeof(int[2]), cmpasc); else qsort(temparray, counters->clients, sizeof(int[2]), cmpdesc); // Get clients which the user doesn't want to see const char* excludeclients = read_setupVarsconf("API_EXCLUDE_CLIENTS"); if(excludeclients != NULL) { getSetupVarsArray(excludeclients); } if(!istelnet[*sock]) { // Send the total queries so they can make percentages from this data pack_int32(*sock, counters->queries); } int n = 0; for(int i=0; i < counters->clients; i++) { // Get sorted indices and counter values (may be either total or blocked count) const int clientID = temparray[i][0]; const int ccount = temparray[i][1]; // Get client pointer const clientsData* client = getClient(clientID, true); // Skip this client if there is a filter on it if(excludeclients != NULL && (insetupVarsArray(getstr(client->ippos)) || insetupVarsArray(getstr(client->namepos)))) continue; // Hidden client, probably due to privacy level. Skip this in the top lists if(strcmp(getstr(client->ippos), HIDDEN_CLIENT) == 0) continue; // Get client IP and name const char *client_ip = getstr(client->ippos); const char *client_name = getstr(client->namepos); // Return this client if either // - "withzero" option is set, and/or // - the client made at least one query within the most recent 24 hours if(includezeroclients || ccount > 0) { if(istelnet[*sock]) ssend(*sock,"%i %i %s %s\n", n, ccount, client_ip, client_name); else { if(!pack_str32(*sock, "") || !pack_str32(*sock, client_ip)) return; pack_int32(*sock, ccount); } n++; } if(n == count) break; } if(excludeclients != NULL) clearSetupVarsArray(); } void getForwardDestinations(const char *client_message, const int *sock) { bool sort = true; int temparray[counters->forwarded][2], totalqueries = 0; if(command(client_message, "unsorted")) sort = false; for(int forwardID = 0; forwardID < counters->forwarded; forwardID++) { // If we want to print a sorted output, we fill the temporary array with // the values we will use for sorting afterwards if(sort) { // Get forward pointer const forwardedData* forward = getForward(forwardID, true); temparray[forwardID][0] = forwardID; temparray[forwardID][1] = forward->count; } } if(sort) { // Sort temporary array in descending order qsort(temparray, counters->forwarded, sizeof(int[2]), cmpdesc); } totalqueries = counters->forwardedqueries + counters->cached + counters->blocked; // Loop over available forward destinations for(int i = -2; i < min(counters->forwarded, 8); i++) { float percentage = 0.0f; const char* ip, *name; if(i == -2) { // Blocked queries (local lists) ip = "blocklist"; name = ip; if(totalqueries > 0) // Whats the percentage of locked queries on the total amount of queries? percentage = 1e2f * counters->blocked / totalqueries; } else if(i == -1) { // Local cache ip = "cache"; name = ip; if(totalqueries > 0) // Whats the percentage of cached queries on the total amount of queries? percentage = 1e2f * counters->cached / totalqueries; } else { // Regular forward destionation // Get sorted indices int forwardID; if(sort) forwardID = temparray[i][0]; else forwardID = i; // Get forward pointer const forwardedData* forward = getForward(forwardID, true); // Get IP and host name of forward destination if available ip = getstr(forward->ippos); name = getstr(forward->namepos); // Get percentage if(totalqueries > 0) percentage = 1e2f * forward->count / totalqueries; } // Send data: // - always if i < 0 (special upstreams: blocklist and cache) // - only if percentage > 0.0 for all others (i > 0) if(percentage > 0.0f || i < 0) { if(istelnet[*sock]) ssend(*sock, "%i %.2f %s %s\n", i, percentage, ip, name); else { if(!pack_str32(*sock, name) || !pack_str32(*sock, ip)) return; pack_float(*sock, percentage); } } } } void getQueryTypes(const int *sock) { int total = 0; for(int i=0; i < TYPE_MAX-1; i++) { total += counters->querytype[i]; } float percentage[TYPE_MAX-1] = { 0.0 }; // Prevent floating point exceptions by checking if the divisor is != 0 if(total > 0) { for(int i=0; i < TYPE_MAX-1; i++) { percentage[i] = 1e2f*counters->querytype[i]/total; } } if(istelnet[*sock]) { ssend(*sock, "A (IPv4): %.2f\nAAAA (IPv6): %.2f\nANY: %.2f\nSRV: %.2f\nSOA: %.2f\nPTR: %.2f\nTXT: %.2f\n", percentage[0], percentage[1], percentage[2], percentage[3], percentage[4], percentage[5], percentage[6]); } else { pack_str32(*sock, "A (IPv4)"); pack_float(*sock, percentage[0]); pack_str32(*sock, "AAAA (IPv6)"); pack_float(*sock, percentage[1]); pack_str32(*sock, "ANY"); pack_float(*sock, percentage[2]); pack_str32(*sock, "SRV"); pack_float(*sock, percentage[3]); pack_str32(*sock, "SOA"); pack_float(*sock, percentage[4]); pack_str32(*sock, "PTR"); pack_float(*sock, percentage[5]); pack_str32(*sock, "TXT"); pack_float(*sock, percentage[6]); } } const char *querytypes[8] = {"A","AAAA","ANY","SRV","SOA","PTR","TXT","UNKN"}; void getAllQueries(const char *client_message, const int *sock) { // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_MAXIMUM) return; // Do we want a more specific version of this command (domain/client/time interval filtered)? int from = 0, until = 0; char *domainname = NULL; bool filterdomainname = false; int domainid = -1; char *clientname = NULL; bool filterclientname = false; int clientid = -1; int querytype = 0; char *forwarddest = NULL; bool filterforwarddest = false; int forwarddestid = 0; // Time filtering? if(command(client_message, ">getallqueries-time")) { sscanf(client_message, ">getallqueries-time %i %i",&from, &until); } // Query type filtering? if(command(client_message, ">getallqueries-qtype")) { // Get query type we want to see only sscanf(client_message, ">getallqueries-qtype %i", &querytype); if(querytype < 1 || querytype >= TYPE_MAX) { // Invalid query type requested return; } } // Forward destination filtering? if(command(client_message, ">getallqueries-forward")) { // Get forward destination name we want to see only (limit length to 255 chars) forwarddest = calloc(256, sizeof(char)); if(forwarddest == NULL) return; sscanf(client_message, ">getallqueries-forward %255s", forwarddest); filterforwarddest = true; if(strcmp(forwarddest, "cache") == 0) forwarddestid = -1; else if(strcmp(forwarddest, "blocklist") == 0) forwarddestid = -2; else { // Iterate through all known forward destinations forwarddestid = -3; for(int i = 0; i < counters->forwarded; i++) { // Get forward pointer const forwardedData* forward = getForward(i, true); // Try to match the requested string against their IP addresses and // (if available) their host names if(strcmp(getstr(forward->ippos), forwarddest) == 0 || (forward->namepos != 0 && strcmp(getstr(forward->namepos), forwarddest) == 0)) { forwarddestid = i; break; } } if(forwarddestid < 0) { // Requested forward destination has not been found, we directly // exit here as there is no data to be returned free(forwarddest); return; } } } // Domain filtering? if(command(client_message, ">getallqueries-domain")) { // Get domain name we want to see only (limit length to 255 chars) domainname = calloc(256, sizeof(char)); if(domainname == NULL) return; sscanf(client_message, ">getallqueries-domain %255s", domainname); filterdomainname = true; // Iterate through all known domains for(int domainID = 0; domainID < counters->domains; domainID++) { // Get domain pointer const domainsData* domain = getDomain(domainID, true); // Try to match the requested string if(strcmp(getstr(domain->domainpos), domainname) == 0) { domainid = domainID; break; } } if(domainid < 0) { // Requested domain has not been found, we directly // exit here as there is no data to be returned free(domainname); return; } } // Client filtering? if(command(client_message, ">getallqueries-client")) { // Get client name we want to see only (limit length to 255 chars) clientname = calloc(256, sizeof(char)); if(clientname == NULL) return; sscanf(client_message, ">getallqueries-client %255s", clientname); filterclientname = true; // Iterate through all known clients for(int i = 0; i < counters->clients; i++) { // Get client pointer const clientsData* client = getClient(i, true); // Try to match the requested string if(strcmp(getstr(client->ippos), clientname) == 0 || (client->namepos != 0 && strcmp(getstr(client->namepos), clientname) == 0)) { clientid = i; break; } } if(clientid < 0) { // Requested client has not been found, we directly // exit here as there is no data to be returned free(clientname); return; } } int ibeg = 0, num; // Test for integer that specifies number of entries to be shown if(sscanf(client_message, "%*[^(](%i)", &num) > 0) { // User wants a different number of requests // Don't allow a start index that is smaller than zero ibeg = counters->queries-num; if(ibeg < 0) ibeg = 0; } // Get potentially existing filtering flags char * filter = read_setupVarsconf("API_QUERY_LOG_SHOW"); bool showpermitted = true, showblocked = true; if(filter != NULL) { if((strcmp(filter, "permittedonly")) == 0) showblocked = false; else if((strcmp(filter, "blockedonly")) == 0) showpermitted = false; else if((strcmp(filter, "nothing")) == 0) { showpermitted = false; showblocked = false; } } clearSetupVarsArray(); for(int queryID = ibeg; queryID < counters->queries; queryID++) { const queriesData* query = getQuery(queryID, true); // Check if this query has been create while in maximum privacy mode if(query->privacylevel >= PRIVACY_MAXIMUM) continue; // Verify query type if(query->type > TYPE_MAX-1) continue; // Get query type const char *qtype = querytypes[query->type - TYPE_A]; // 1 = gravity.list, 4 = wildcard, 5 = black.list if((query->status == QUERY_GRAVITY || query->status == QUERY_WILDCARD || query->status == QUERY_BLACKLIST) && !showblocked) continue; // 2 = forwarded, 3 = cached if((query->status == QUERY_FORWARDED || query->status == QUERY_CACHE) && !showpermitted) continue; // Skip those entries which so not meet the requested timeframe if((from > query->timestamp && from != 0) || (query->timestamp > until && until != 0)) continue; // Skip if domain is not identical with what the user wants to see if(filterdomainname && query->domainID != domainid) continue; // Skip if client name and IP are not identical with what the user wants to see if(filterclientname && query->clientID != clientid) continue; // Skip if query type is not identical with what the user wants to see if(querytype != 0 && querytype != query->type) continue; if(filterforwarddest) { // Does the user want to see queries answered from blocking lists? if(forwarddestid == -2 && query->status != QUERY_GRAVITY && query->status != QUERY_WILDCARD && query->status != QUERY_BLACKLIST) continue; // Does the user want to see queries answered from local cache? else if(forwarddestid == -1 && query->status != QUERY_CACHE) continue; // Does the user want to see queries answered by an upstream server? else if(forwarddestid >= 0 && forwarddestid != query->forwardID) continue; } // Ask subroutine for domain. It may return "hidden" depending on // the privacy settings at the time the query was made const char *domain = getDomainString(queryID); // Similarly for the client const char *clientIPName = NULL; // Get client pointer const clientsData* client = getClient(query->clientID, true); if(strlen(getstr(client->namepos)) > 0) clientIPName = getClientNameString(queryID); else clientIPName = getClientIPString(queryID); unsigned long delay = query->response; // Check if received (delay should be smaller than 30min) if(delay > 1.8e7) delay = 0; if(istelnet[*sock]) { ssend(*sock,"%li %s %s %s %i %i %i %lu",query->timestamp,qtype,domain,clientIPName,query->status,query->dnssec,query->reply,delay); if(config.debug & DEBUG_API) ssend(*sock, " %i", queryID); ssend(*sock, "\n"); } else { pack_int32(*sock, query->timestamp); // Use a fixstr because the length of qtype is always 4 (max is 31 for fixstr) if(!pack_fixstr(*sock, qtype)) return; // Use str32 for domain and client because we have no idea how long they will be (max is 4294967295 for str32) if(!pack_str32(*sock, domain) || !pack_str32(*sock, clientIPName)) return; pack_uint8(*sock, query->status); pack_uint8(*sock, query->dnssec); } } // Free allocated memory if(filterclientname) free(clientname); if(filterdomainname) free(domainname); if(filterforwarddest) free(forwarddest); } void getRecentBlocked(const char *client_message, const int *sock) { int num=1; // Test for integer that specifies number of entries to be shown if(sscanf(client_message, "%*[^(](%i)", &num) > 0) { // User wants a different number of requests if(num >= counters->queries) num = 0; } // Find most recently blocked query int found = 0; for(int queryID = counters->queries - 1; queryID > 0 ; queryID--) { const queriesData* query = getQuery(queryID, true); if(query->status == QUERY_GRAVITY || query->status == QUERY_WILDCARD || query->status == QUERY_BLACKLIST) { found++; // Ask subroutine for domain. It may return "hidden" depending on // the privacy settings at the time the query was made const char *domain = getDomainString(queryID); if(istelnet[*sock]) ssend(*sock,"%s\n", domain); else if(!pack_str32(*sock, domain)) return; } if(found >= num) break; } } void getClientID(const int *sock) { if(istelnet[*sock]) ssend(*sock,"%i\n", *sock); else pack_int32(*sock, *sock); } void getQueryTypesOverTime(const int *sock) { int from = -1, until = OVERTIME_SLOTS; const time_t mintime = overTime[0].timestamp; for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if((overTime[slot].total > 0 || overTime[slot].blocked > 0) && overTime[slot].timestamp >= mintime) { from = slot; break; } } // End with last non-empty overTime slot for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if(overTime[slot].timestamp >= time(NULL)) { until = slot; break; } } // No data? if(from < 0) return; for(int slot = from; slot < until; slot++) { float percentageIPv4 = 0.0, percentageIPv6 = 0.0; int sum = overTime[slot].querytypedata[0] + overTime[slot].querytypedata[1]; if(sum > 0) { percentageIPv4 = (float) (1e2 * overTime[slot].querytypedata[0] / sum); percentageIPv6 = (float) (1e2 * overTime[slot].querytypedata[1] / sum); } if(istelnet[*sock]) ssend(*sock, "%li %.2f %.2f\n", overTime[slot].timestamp, percentageIPv4, percentageIPv6); else { pack_int32(*sock, overTime[slot].timestamp); pack_float(*sock, percentageIPv4); pack_float(*sock, percentageIPv6); } } } void getVersion(const int *sock) { const char * commit = GIT_HASH; const char * tag = GIT_TAG; // Extract first 7 characters of the hash char hash[8]; strncpy(hash, commit, 7); hash[7] = 0; if(strlen(tag) > 1) { if(istelnet[*sock]) ssend( *sock, "version %s\ntag %s\nbranch %s\nhash %s\ndate %s\n", GIT_VERSION, tag, GIT_BRANCH, hash, GIT_DATE ); else { if(!pack_str32(*sock, GIT_VERSION) || !pack_str32(*sock, (char *) tag) || !pack_str32(*sock, GIT_BRANCH) || !pack_str32(*sock, hash) || !pack_str32(*sock, GIT_DATE)) return; } } else { if(istelnet[*sock]) ssend( *sock, "version vDev-%s\ntag %s\nbranch %s\nhash %s\ndate %s\n", hash, tag, GIT_BRANCH, hash, GIT_DATE ); else { char *hashVersion = calloc(6 + strlen(hash), sizeof(char)); if(hashVersion == NULL) return; sprintf(hashVersion, "vDev-%s", hash); if(!pack_str32(*sock, hashVersion) || !pack_str32(*sock, (char *) tag) || !pack_str32(*sock, GIT_BRANCH) || !pack_str32(*sock, hash) || !pack_str32(*sock, GIT_DATE)) return; free(hashVersion); } } } void getDBstats(const int *sock) { // Get file details struct stat st; long int filesize = 0; if(stat(FTLfiles.db, &st) != 0) // stat() failed (maybe the file does not exist?) filesize = -1; else filesize = st.st_size; char *prefix = calloc(2, sizeof(char)); if(prefix == NULL) return; double formated = 0.0; format_memory_size(prefix, filesize, &formated); if(istelnet[*sock]) ssend(*sock,"queries in database: %i\ndatabase filesize: %.2f %sB\nSQLite version: %s\n", get_number_of_queries_in_DB(), formated, prefix, sqlite3_libversion()); else { pack_int32(*sock, get_number_of_queries_in_DB()); pack_int64(*sock, filesize); if(!pack_str32(*sock, (char *) sqlite3_libversion())) return; } } void getClientsOverTime(const int *sock) { int sendit = -1, until = OVERTIME_SLOTS; // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_HIDE_DOMAINS_CLIENTS) return; // Find minimum ID to send for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if((overTime[slot].total > 0 || overTime[slot].blocked > 0) && overTime[slot].timestamp >= overTime[0].timestamp) { sendit = slot; break; } } if(sendit < 0) return; // Find minimum ID to send for(int slot = 0; slot < OVERTIME_SLOTS; slot++) { if(overTime[slot].timestamp >= time(NULL)) { until = slot; break; } } // Get clients which the user doesn't want to see char * excludeclients = read_setupVarsconf("API_EXCLUDE_CLIENTS"); // Array of clients to be skipped in the output // if skipclient[i] == true then this client should be hidden from // returned data. We initialize it with false bool skipclient[counters->clients]; memset(skipclient, false, counters->clients*sizeof(bool)); if(excludeclients != NULL) { getSetupVarsArray(excludeclients); for(int clientID=0; clientID < counters->clients; clientID++) { // Get client pointer const clientsData* client = getClient(clientID, true); // Check if this client should be skipped if(insetupVarsArray(getstr(client->ippos)) || insetupVarsArray(getstr(client->namepos))) skipclient[clientID] = true; } } // Main return loop for(int slot = sendit; slot < until; slot++) { if(istelnet[*sock]) ssend(*sock, "%li", overTime[slot].timestamp); else pack_int32(*sock, overTime[slot].timestamp); // Loop over forward destinations to generate output to be sent to the client for(int clientID = 0; clientID < counters->clients; clientID++) { if(skipclient[clientID]) continue; // Get client pointer const clientsData* client = getClient(clientID, true); const int thisclient = client->overTime[slot]; if(istelnet[*sock]) ssend(*sock, " %i", thisclient); else pack_int32(*sock, thisclient); } if(istelnet[*sock]) ssend(*sock, "\n"); else pack_int32(*sock, -1); } if(excludeclients != NULL) clearSetupVarsArray(); } void getClientNames(const int *sock) { // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_HIDE_DOMAINS_CLIENTS) return; // Get clients which the user doesn't want to see char * excludeclients = read_setupVarsconf("API_EXCLUDE_CLIENTS"); // Array of clients to be skipped in the output // if skipclient[i] == true then this client should be hidden from // returned data. We initialize it with false bool skipclient[counters->clients]; memset(skipclient, false, counters->clients*sizeof(bool)); if(excludeclients != NULL) { getSetupVarsArray(excludeclients); for(int clientID=0; clientID < counters->clients; clientID++) { // Get client pointer const clientsData* client = getClient(clientID, true); // Check if this client should be skipped if(insetupVarsArray(getstr(client->ippos)) || insetupVarsArray(getstr(client->namepos))) skipclient[clientID] = true; } } // Loop over clients to generate output to be sent to the client for(int clientID = 0; clientID < counters->clients; clientID++) { if(skipclient[clientID]) continue; // Get client pointer const clientsData* client = getClient(clientID, true); const char *client_ip = getstr(client->ippos); const char *client_name = getstr(client->namepos); if(istelnet[*sock]) ssend(*sock, "%s %s\n", client_name, client_ip); else { pack_str32(*sock, client_name); pack_str32(*sock, client_ip); } } if(excludeclients != NULL) clearSetupVarsArray(); } void getUnknownQueries(const int *sock) { // Exit before processing any data if requested via config setting get_privacy_level(NULL); if(config.privacylevel >= PRIVACY_HIDE_DOMAINS) return; for(int queryID = 0; queryID < counters->queries; queryID++) { const queriesData* query = getQuery(queryID, true); if(query->status != QUERY_UNKNOWN && query->complete) continue; char type[5]; if(query->type == TYPE_A) { strcpy(type,"IPv4"); } else { strcpy(type,"IPv6"); } // Get domain pointer const domainsData* domain = getDomain(query->domainID, true); // Get client pointer const clientsData* client = getClient(query->clientID, true); // Get client IP string const char *clientIP = getstr(client->ippos); if(istelnet[*sock]) ssend(*sock, "%li %i %i %s %s %s %i %s\n", query->timestamp, queryID, query->id, type, getstr(domain->domainpos), clientIP, query->status, query->complete ? "true" : "false"); else { pack_int32(*sock, query->timestamp); pack_int32(*sock, query->id); // Use a fixstr because the length of qtype is always 4 (max is 31 for fixstr) if(!pack_fixstr(*sock, type)) return; // Use str32 for domain and client because we have no idea how long they will be (max is 4294967295 for str32) if(!pack_str32(*sock, getstr(domain->domainpos)) || !pack_str32(*sock, clientIP)) return; pack_uint8(*sock, query->status); pack_bool(*sock, query->complete); } } } void getDomainDetails(const char *client_message, const int *sock) { // Get domain name char domainString[128]; if(sscanf(client_message, "%*[^ ] %127s", domainString) < 1) { ssend(*sock, "Need domain for this request\n"); return; } for(int domainID = 0; domainID < counters->domains; domainID++) { // Get domain pointer const domainsData* domain = getDomain(domainID, true); if(strcmp(getstr(domain->domainpos), domainString) == 0) { ssend(*sock,"Domain \"%s\", ID: %i\n", domainString, domainID); ssend(*sock,"Total: %i\n", domain->count); ssend(*sock,"Blocked: %i\n", domain->blockedcount); const char *regexstatus; if(domain->regexmatch == REGEX_BLOCKED) regexstatus = "blocked"; else if(domain->regexmatch == REGEX_NOTBLOCKED) regexstatus = "not blocked"; else regexstatus = "unknown"; ssend(*sock,"Regex status: %s\n", regexstatus); return; } } // for loop finished without an exact match ssend(*sock,"Domain \"%s\" is unknown\n", domainString); }