/* Copyright (C) 2014 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ #include <sys/time.h> #include <libknot/descriptor.h> #include <libknot/rrtype/rdname.h> #include <libknot/processing/requestor.h> #include <dnssec/random.h> #include "lib/layer/iterate.h" #include "lib/resolve.h" #include "lib/rplan.h" #include "lib/defines.h" #include "lib/nsrep.h" #include "lib/module.h" #define DEBUG_MSG(fmt...) QRDEBUG(kr_rplan_current(param->rplan), "iter", fmt) /* Packet classification. */ enum { PKT_NOERROR = 1 << 0, /* Positive response */ PKT_NODATA = 1 << 1, /* No data response */ PKT_NXDOMAIN = 1 << 2, /* Negative response */ PKT_ERROR = 1 << 3 /* Refused or server failure */ }; /* Iterator often walks through packet section, this is an abstraction. */ typedef int (*rr_callback_t)(const knot_rrset_t *, unsigned, struct kr_layer_param *); /*! \brief Return minimized QNAME/QTYPE for current zone cut. */ static const knot_dname_t *minimized_qname(struct kr_query *query, uint16_t *qtype) { /* Minimization disabled. */ const knot_dname_t *qname = query->sname; if (query->flags & QUERY_NO_MINIMIZE) { return qname; } /* Minimize name to contain current zone cut + 1 label. */ int cut_labels = knot_dname_labels(query->zone_cut.name, NULL); int qname_labels = knot_dname_labels(qname, NULL); while(qname_labels > cut_labels + 1) { qname = knot_wire_next_label(qname, NULL); qname_labels -= 1; } /* Hide QTYPE if minimized. */ if (qname != query->sname) { *qtype = KNOT_RRTYPE_NS; } return qname; } /*! \brief Answer is paired to query. */ static bool is_paired_to_query(const knot_pkt_t *answer, struct kr_query *query) { uint16_t qtype = query->stype; const knot_dname_t *qname = minimized_qname(query, &qtype); return query->id == knot_wire_get_id(answer->wire) && (query->sclass == KNOT_CLASS_ANY || query->sclass == knot_pkt_qclass(answer)) && qtype == knot_pkt_qtype(answer) && knot_dname_is_equal(qname, knot_pkt_qname(answer)); } /*! \brief Relaxed rule for AA, either AA=1 or SOA matching zone cut is required. */ static bool is_authoritative(const knot_pkt_t *answer, struct kr_query *query) { if (knot_wire_get_aa(answer->wire)) { return true; } const knot_pktsection_t *ns = knot_pkt_section(answer, KNOT_AUTHORITY); for (unsigned i = 0; i < ns->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(ns, i); if (rr->type == KNOT_RRTYPE_SOA && knot_dname_is_equal(rr->owner, query->zone_cut.name)) { return true; } } return false; } /*! \brief Return response class. */ static int response_classify(knot_pkt_t *pkt) { const knot_pktsection_t *an = knot_pkt_section(pkt, KNOT_ANSWER); switch (knot_wire_get_rcode(pkt->wire)) { case KNOT_RCODE_NOERROR: return (an->count == 0) ? PKT_NODATA : PKT_NOERROR; case KNOT_RCODE_NXDOMAIN: return PKT_NXDOMAIN; default: return PKT_ERROR; } } static void follow_cname_chain(const knot_dname_t **cname, const knot_rrset_t *rr, struct kr_query *cur) { /* Follow chain from SNAME. */ if (knot_dname_is_equal(rr->owner, *cname)) { if (rr->type == KNOT_RRTYPE_CNAME) { *cname = knot_cname_name(&rr->rrs); } else { /* Terminate CNAME chain. */ *cname = cur->sname; } } } static int update_nsaddr(const knot_rrset_t *rr, struct kr_query *query, uint16_t index) { if (rr->type == KNOT_RRTYPE_A || rr->type == KNOT_RRTYPE_AAAA) { if (knot_dname_is_equal(query->zone_cut.ns, rr->owner)) { /* Set zone cut address. */ int ret = kr_set_zone_cut_addr(&query->zone_cut, rr, index); if (ret == KNOT_EOK) { return KNOT_STATE_DONE; } else { return KNOT_STATE_FAIL; } } } return KNOT_STATE_CONSUME; } static int update_glue(const knot_rrset_t *rr, unsigned hint, struct kr_layer_param *param) { return update_nsaddr(rr, kr_rplan_current(param->rplan), hint); } int rr_update_parent(const knot_rrset_t *rr, unsigned hint, struct kr_layer_param *param) { struct kr_query *query = kr_rplan_current(param->rplan); return update_nsaddr(rr, query->parent, hint); } int rr_update_answer(const knot_rrset_t *rr, unsigned hint, struct kr_layer_param *param) { knot_pkt_t *answer = param->answer; /* Write copied RR to the result packet. */ int ret = knot_pkt_put(answer, KNOT_COMPR_HINT_NONE, rr, hint); if (ret != KNOT_EOK) { if (hint & KNOT_PF_FREE) { knot_rrset_clear((knot_rrset_t *)rr, &answer->mm); } knot_wire_set_tc(answer->wire); return KNOT_STATE_DONE; } return KNOT_STATE_DONE; } static bool has_glue(const knot_dname_t *ns_name, knot_pkt_t *pkt) { const knot_pktsection_t *ar = knot_pkt_section(pkt, KNOT_ADDITIONAL); for (unsigned i = 0; i < ar->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(ar, i); if ((rr->type == KNOT_RRTYPE_A || rr->type == KNOT_RRTYPE_AAAA) && (knot_dname_is_equal(ns_name, rr->owner))) { return true; } } return false; } static int nameserver_score(const knot_rrset_t *rr, unsigned hint, knot_pkt_t *pkt, struct kr_layer_param *param) { struct kr_query *query = kr_rplan_current(param->rplan); const knot_dname_t *ns_name = knot_ns_name(&rr->rrs, hint); int score = kr_nsrep_score(rr->owner, param); if (score < KR_NS_VALID) { return score; } /* Authority MUST be at/below the authority of the nameserver, otherwise * possible cache injection attempt. */ if (!knot_dname_in(query->zone_cut.name, rr->owner)) { DEBUG_MSG("<= authority: ns outside bailiwick, rejecting\n"); return KR_NS_INVALID; } /* Ignore already resolved zone cut. */ if (knot_dname_is_equal(rr->owner, query->zone_cut.name)) { return KR_NS_VALID; } else { score += 1; } /* Check if contains glue. */ if (has_glue(ns_name, pkt)) { score += 1; } return score; } static int process_authority(knot_pkt_t *pkt, struct kr_layer_param *param) { struct kr_query *query = kr_rplan_current(param->rplan); const knot_rrset_t *best_ns = NULL; int best_score = 0; /* AA, terminate resolution chain. */ if (knot_wire_get_aa(pkt->wire)) { return KNOT_STATE_CONSUME; } /* Elect best name server candidate. */ const knot_pktsection_t *ns = knot_pkt_section(pkt, KNOT_AUTHORITY); for (unsigned i = 0; i < ns->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(ns, i); if (rr->type == KNOT_RRTYPE_NS) { int score = nameserver_score(rr, 0, pkt, param); if (score < KR_NS_VALID) { return KNOT_STATE_FAIL; } if (score > best_score) { best_ns = rr; best_score = score; } } } /* Update name server candidate. */ if (best_ns != NULL) { kr_set_zone_cut(&query->zone_cut, best_ns->owner, knot_ns_name(&best_ns->rrs, 0)); return KNOT_STATE_DONE; } return KNOT_STATE_CONSUME; } static int process_additional(knot_pkt_t *pkt, struct kr_layer_param *param) { /* Attempt to find glue for current nameserver. */ const knot_pktsection_t *ar = knot_pkt_section(pkt, KNOT_ADDITIONAL); for (unsigned i = 0; i < ar->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(ar, i); int state = update_glue(rr, 0, param); if (state != KNOT_STATE_CONSUME) { return state; } } return KNOT_STATE_DONE; } static void finalize_answer(knot_pkt_t *pkt, struct kr_layer_param *param) { /* Finalize header */ knot_pkt_t *answer = param->answer; knot_wire_set_rcode(answer->wire, knot_wire_get_rcode(pkt->wire)); /* Fill in SOA if negative response */ knot_pkt_begin(answer, KNOT_AUTHORITY); int pkt_class = response_classify(pkt); if (pkt_class & (PKT_NXDOMAIN|PKT_NODATA)) { const knot_pktsection_t *ns = knot_pkt_section(pkt, KNOT_AUTHORITY); for (unsigned i = 0; i < ns->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(ns, i); if (rr->type == KNOT_RRTYPE_SOA) { rr_update_answer(rr, 0, param); break; } } } } static int process_answer(knot_pkt_t *pkt, struct kr_layer_param *param) { struct kr_query *query = kr_rplan_current(param->rplan); /* Response for minimized QNAME. * NODATA => may be empty non-terminal, retry (found zone cut) * NOERROR => found zone cut, retry * NXDOMAIN => parent is zone cut, retry as a workaround for bad authoritatives */ bool is_final = (query->parent == NULL); int pkt_class = response_classify(pkt); if (!knot_dname_is_equal(knot_pkt_qname(pkt), query->sname) && (pkt_class & (PKT_NXDOMAIN|PKT_NODATA))) { query->flags |= QUERY_NO_MINIMIZE; return KNOT_STATE_DONE; } /* This answer didn't improve resolution chain, therefore must be authoritative (relaxed to negative). */ if (!is_authoritative(pkt, query) && (pkt_class & (PKT_NXDOMAIN|PKT_NODATA))) { DEBUG_MSG("<= lame response: non-auth sent negative response\n"); return KNOT_STATE_FAIL; } /* Process answer type */ const knot_pktsection_t *an = knot_pkt_section(pkt, KNOT_ANSWER); const knot_dname_t *cname = query->sname; for (unsigned i = 0; i < an->count; ++i) { const knot_rrset_t *rr = knot_pkt_rr(an, i); int state = is_final ? rr_update_answer(rr, 0, param) : rr_update_parent(rr, 0, param); if (state == KNOT_STATE_FAIL) { return state; } follow_cname_chain(&cname, rr, query); } /* Follow canonical name as next SNAME. */ if (cname != query->sname) { (void) kr_rplan_push(param->rplan, query->parent, cname, query->sclass, query->stype); } else { if (query->parent == NULL) { finalize_answer(pkt, param); } } /* Either way it resolves current query. */ query->resolved = true; return KNOT_STATE_DONE; } /*! \brief Error handling, RFC1034 5.3.3, 4d. */ static int resolve_error(knot_pkt_t *pkt, struct kr_layer_param *param) { return KNOT_STATE_FAIL; } /* State-less single resolution iteration step, not needed. */ static int reset(knot_layer_t *ctx) { return KNOT_STATE_PRODUCE; } static int finish(knot_layer_t *ctx) { return KNOT_STATE_NOOP; } /* Set resolution context and parameters. */ static int begin(knot_layer_t *ctx, void *module_param) { ctx->data = module_param; return reset(ctx); } static int prepare_query(knot_layer_t *ctx, knot_pkt_t *pkt) { assert(pkt && ctx); struct kr_layer_param *param = ctx->data; struct kr_query *query = kr_rplan_current(param->rplan); if (query == NULL || ctx->state == KNOT_STATE_DONE) { return ctx->state; } /* Minimize QNAME (if possible). */ uint16_t qtype = query->stype; const knot_dname_t *qname = minimized_qname(query, &qtype); /* Form a query for the authoritative. */ knot_pkt_clear(pkt); int ret = knot_pkt_put_question(pkt, qname, query->sclass, qtype); if (ret != KNOT_EOK) { return KNOT_STATE_FAIL; } query->id = dnssec_random_uint16_t(); knot_wire_set_id(pkt->wire, query->id); /* Declare EDNS0 support. */ knot_rrset_t opt_rr; ret = knot_edns_init(&opt_rr, KR_EDNS_PAYLOAD, 0, KR_EDNS_VERSION, &pkt->mm); if (ret != KNOT_EOK) { return KNOT_STATE_FAIL; } knot_pkt_begin(pkt, KNOT_ADDITIONAL); ret = knot_pkt_put(pkt, KNOT_COMPR_HINT_NONE, &opt_rr, KNOT_PF_FREE); if (ret != KNOT_EOK) { knot_rrset_clear(&opt_rr, &pkt->mm); return KNOT_STATE_FAIL; } #ifndef NDEBUG char qname_str[KNOT_DNAME_MAXLEN], zonecut_str[KNOT_DNAME_MAXLEN], ns_str[KNOT_DNAME_MAXLEN]; knot_dname_to_str(qname_str, qname, sizeof(qname_str)); knot_dname_to_str(ns_str, query->zone_cut.ns, sizeof(ns_str)); knot_dname_to_str(zonecut_str, query->zone_cut.name, sizeof(zonecut_str)); DEBUG_MSG("=> querying: '%s' zone cut: '%s' m12n: '%s'\n", ns_str, zonecut_str, qname_str); #endif /* Query built, expect answer. */ return KNOT_STATE_CONSUME; } /*! \brief Resolve input query or continue resolution with followups. * * This roughly corresponds to RFC1034, 5.3.3 4a-d. */ static int resolve(knot_layer_t *ctx, knot_pkt_t *pkt) { assert(pkt && ctx); struct kr_layer_param *param = ctx->data; struct kr_query *query = kr_rplan_current(param->rplan); if (query == NULL || query->resolved) { return ctx->state; } /* Check for packet processing errors first. */ if (pkt->parsed < pkt->size) { DEBUG_MSG("<= malformed response\n"); return resolve_error(pkt, param); } else if (!is_paired_to_query(pkt, query)) { DEBUG_MSG("<= ignoring mismatching response\n"); return KNOT_STATE_CONSUME; } else if (knot_wire_get_tc(pkt->wire)) { DEBUG_MSG("<= truncated response, failover to TCP\n"); struct kr_query *cur = kr_rplan_current(param->rplan); if (cur) { /* Fail if already on TCP. */ if (cur->flags & QUERY_TCP) { DEBUG_MSG("<= TC=1 with TCP, bailing out\n"); return resolve_error(pkt, param); } cur->flags |= QUERY_TCP; } return KNOT_STATE_DONE; } /* Check response code. */ lookup_table_t *rcode = lookup_by_id(knot_rcode_names, knot_wire_get_rcode(pkt->wire)); switch(knot_wire_get_rcode(pkt->wire)) { case KNOT_RCODE_NOERROR: case KNOT_RCODE_NXDOMAIN: break; /* OK */ default: DEBUG_MSG("<= rcode: %s\n", rcode ? rcode->name : "??"); return resolve_error(pkt, param); } /* Resolve authority to see if it's referral or authoritative. */ int state = KNOT_STATE_CONSUME; state = process_authority(pkt, param); switch(state) { case KNOT_STATE_CONSUME: /* Not referral, process answer. */ DEBUG_MSG("<= rcode: %s\n", rcode ? rcode->name : "??"); state = process_answer(pkt, param); break; case KNOT_STATE_DONE: /* Referral, try to find glue. */ DEBUG_MSG("<= referral response, follow\n"); state = process_additional(pkt, param); break; default: break; } return state; } /*! \brief Module implementation. */ const knot_layer_api_t *iterate_layer(void) { static const knot_layer_api_t _layer = { .begin = &begin, .reset = &reset, .finish = &finish, .consume = &resolve, .produce = &prepare_query }; return &_layer; } KR_MODULE_EXPORT(iterate)