Newer
Older
/* Copyright (C) 2014 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <ctype.h>
#include <sys/time.h>
#include <libknot/descriptor.h>
#include <libknot/internal/base64.h>
#include <libknot/rrtype/rdname.h>
#include <libknot/rrtype/dnskey.h>
#include "lib/layer/iterate.h"
#include "lib/resolve.h"
#include "lib/rplan.h"
#include "lib/defines.h"
#include "lib/nsrep.h"
#include "lib/module.h"
#define DEBUG_MSG(fmt...) QRDEBUG(qry, "vldr", fmt)
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
static int dname_parse(knot_dname_t **dname, const char *dname_str, mm_ctx_t *pool)
{
if (!dname) {
return kr_error(EINVAL);
}
knot_dname_t *owner = mm_alloc(pool, KNOT_DNAME_MAXLEN);
if (owner == NULL) {
return kr_error(ENOMEM);
}
knot_dname_t *aux = knot_dname_from_str(owner, dname_str, KNOT_DNAME_MAXLEN);
if (aux == NULL) {
mm_free(pool, owner);
return kr_error(ENOMEM);
}
assert(!*dname);
*dname = owner;
return 0;
}
static int uint_parse(const char *str, unsigned *u)
{
char *err_pos;
long num = strtol(str, &err_pos, 10);
if ((*err_pos != '\0') || (num < 0)) {
return kr_error(EINVAL);
}
*u = (unsigned) num;
return 0;
}
static int strcicmp(char const *a, char const *b)
{
if (!a && !b) {
return 0;
}
if (!a) {
return -1;
}
if (!b) {
return 1;
}
for ( ; ; ++a, ++b) {
int d = tolower(*a) - tolower(*b);
if ((d != 0) || (*a == '\0')) {
return d;
}
}
}
static int algorithm_parse(const char *str, unsigned *u)
{
int ret = uint_parse(str, u);
if (ret == 0) {
return 0;
}
const lookup_table_t *item = knot_dnssec_alg_names;
while (item->id) {
if (strcicmp(str, item->name) == 0) {
break;
}
++item;
}
if (!item->id) {
return kr_error(ENOENT);
}
*u = (unsigned) item->id;
return 0;
}
static int hex2value(const char hex)
{
if ((hex >= '0') && (hex <= '9')) {
return hex - '0';
} else if ((hex >= 'a') && (hex <= 'f')) {
return hex - 'a' + 10;
} else if ((hex >= 'A') && (hex <= 'F')) {
return hex - 'A' + 10;
} else {
return -1;
}
}
static int hex2byte(const char hex[2], uint8_t *u)
{
int d0, d1;
d0 = hex2value(hex[0]);
d1 = hex2value(hex[1]);
if ((d0 == -1) || (d1 == -1)) {
return kr_error(EINVAL);
}
*u = ((d0 & 0x0f) << 4) | (d1 & 0x0f);
return 0;
}
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
static int ta_ds_parse(uint8_t *rd, size_t *rd_written, size_t rd_maxsize, const char *seps, char **saveptr)
{
if (!rd || !rd_written || !seps || !saveptr) {
return kr_error(EINVAL);
}
int ret = 0;
const char *token;
unsigned aux;
/* Key tag. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = uint_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint16_t key_tag = aux;
/* Algorithm. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = algorithm_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint8_t algorithm = aux;
/* Digest type. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = uint_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint8_t digest_type = aux;
size_t rd_pos = 0;
if (rd_maxsize >= 4) {
* (uint16_t *) (rd + rd_pos) = htons(key_tag); rd_pos += 2;
*(rd + rd_pos++) = algorithm;
*(rd + rd_pos++) = digest_type;
} else {
return kr_error(EINVAL);
}
char hexbuf[2];
int i = 0;
while ((token = strtok_r(NULL, seps, saveptr)) != NULL) {
for (int j = 0; j < strlen(token); ++j) {
hexbuf[i++] = token[j];
if (i == 2) {
uint8_t byte;
ret = hex2byte(hexbuf, &byte);
if (ret != 0) {
return ret;
}
i = 0;
if (rd_pos < rd_maxsize) {
*(rd + rd_pos++) = byte;
} else {
return kr_error(ENOMEM);
}
}
}
}
if (i != 0) {
return kr_error(EINVAL);
}
*rd_written = rd_pos;
return 0;
}
static int base2bytes(const uint8_t base[4], uint8_t bytes[3], unsigned *valid)
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
{
int32_t decoded = base64_decode(base, 4, bytes, 3);
if (decoded < 0) {
return kr_error(EINVAL);
}
*valid = decoded;
return 0;
}
int ta_dnskey_parse(uint8_t *rd, size_t *rd_written, size_t rd_maxsize, const char *seps, char **saveptr)
{
fprintf(stderr, "%s()\n", __func__);
if (!rd || !rd_written || !seps || !saveptr) {
return kr_error(EINVAL);
}
int ret = 0;
const char *token;
unsigned aux;
/* Flags. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = uint_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint16_t flags = aux;
/* Protocol. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = uint_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint8_t protocol = aux;
if (protocol != 3) {
return kr_error(EINVAL);
}
/* Algorithm. */
token = strtok_r(NULL, seps, saveptr);
if (!token) {
return kr_error(EINVAL);
}
ret = algorithm_parse(token, &aux);
if (ret != 0) {
return ret;
}
uint8_t algorithm = aux;
size_t rd_pos = 0;
if (rd_maxsize >= 4) {
* (uint16_t *) (rd + rd_pos) = htons(flags); rd_pos += 2;
*(rd + rd_pos++) = protocol;
*(rd + rd_pos++) = algorithm;
} else {
return kr_error(EINVAL);
}
uint8_t basebuf[4];
uint8_t databuf[3];
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
int i = 0;
while ((token = strtok_r(NULL, seps, saveptr)) != NULL) {
for (int j = 0; j < strlen(token); ++j) {
basebuf[i++] = token[j];
if (i == 4) {
unsigned written;
ret = base2bytes(basebuf, databuf, &written);
if (ret != 0) {
return ret;
}
i = 0;
if ((rd_pos + written) < rd_maxsize) {
memcpy(rd + rd_pos, databuf, written);
rd_pos += written;
} else {
return kr_error(ENOMEM);
}
}
}
}
if (i != 0) {
return kr_error(EINVAL);
}
*rd_written = rd_pos;
return 0;
}
int kr_ta_parse(knot_rrset_t **rr, const char *ds_str, mm_ctx_t *pool)
{
#define SEPARATORS " \t\n\r"
#define RDATA_MAXSIZE 640
int ret = 0;
if (!rr || !ds_str || !pool) {
ret = kr_error(EINVAL);
goto fail;
}
char *ds_cpy = NULL;
knot_dname_t *owner = NULL;
knot_rdata_t *rdata = NULL;
knot_rrset_t *ds_set = NULL;
size_t ds_len = strlen(ds_str) + 1;
ds_cpy = mm_alloc(pool, ds_len);
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
if (!ds_cpy) {
ret = kr_error(ENOMEM);
goto fail;
}
memcpy(ds_cpy, ds_str, ds_len);
char *saveptr = NULL, *token;
/* Owner name. */
token = strtok_r(ds_cpy, SEPARATORS, &saveptr);
if (!token) {
ret = kr_error(EINVAL);
goto fail;
}
ret = dname_parse(&owner, token, pool);
if (ret != 0) {
goto fail;
}
/* Class. */
uint16_t class;
token = strtok_r(NULL, SEPARATORS, &saveptr);
if (!token) {
ret = kr_error(EINVAL);
goto fail;
}
ret = knot_rrclass_from_string(token, &class);
if (ret != 0) {
ret = kr_error(EINVAL);
goto fail;
}
/* Type. */
uint16_t type;
token = strtok_r(NULL, SEPARATORS, &saveptr);
if (!token) {
ret = kr_error(EINVAL);
goto fail;
}
ret = knot_rrtype_from_string(token, &type);
if ((ret != 0) ||
((type != KNOT_RRTYPE_DS) && (type != KNOT_RRTYPE_DNSKEY))) {
ret = kr_error(EINVAL);
goto fail;
}
/* Construct RDATA. */
rdata = mm_alloc(pool, RDATA_MAXSIZE);
if (!rdata) {
ret = kr_error(ENOMEM);
goto fail;
}
size_t rd_written = 0;
switch (type) {
case KNOT_RRTYPE_DS:
ret = ta_ds_parse(rdata, &rd_written, RDATA_MAXSIZE, SEPARATORS, &saveptr);
break;
case KNOT_RRTYPE_DNSKEY:
ret = ta_dnskey_parse(rdata, &rd_written, RDATA_MAXSIZE, SEPARATORS, &saveptr);
break;
default:
assert(0);
ret = kr_error(EINVAL);
break;
}
if (ret != 0) {
goto fail;
}
ds_set = knot_rrset_new(owner, type, class, pool);
if (!ds_set) {
ret = kr_error(ENOMEM);
goto fail;
}
ret = knot_rrset_add_rdata(ds_set, rdata, rd_written, 0, pool);
if (ret != 0) {
goto fail;
}
*rr = ds_set;
ds_set = NULL;
fail:
knot_rrset_free(&ds_set, pool);
mm_free(pool, rdata);
knot_dname_free(&owner, pool);
mm_free(pool, ds_cpy);
return ret;
#undef RDATA_MAXSIZE
#undef SEPARATORS
}
/* Set resolution context and parameters. */
static int begin(knot_layer_t *ctx, void *module_param)
{
ctx->data = module_param;
return KNOT_STATE_PRODUCE;
}
static int secure_query(knot_layer_t *ctx, knot_pkt_t *pkt)
{
assert(pkt && ctx);
struct kr_request *req = ctx->data;
struct kr_query *query = kr_rplan_current(&req->rplan);
if (ctx->state & (KNOT_STATE_DONE|KNOT_STATE_FAIL)) {
return ctx->state;
}
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
if (query->zone_cut.key == NULL) {
/*
query->flags |= QUERY_AWAIT_TRUST;
DEBUG_MSG("%s() A002 '%s'\n", __func__, knot_pkt_qname(pkt));
struct knot_rrset *opt_rr = knot_rrset_copy(req->answer->opt_rr, &pkt->mm);
if (opt_rr == NULL) {
return KNOT_STATE_FAIL;
}
knot_pkt_clear(pkt);
int ret = knot_pkt_put_question(pkt, query->zone_cut.name, query->sclass, KNOT_RRTYPE_DNSKEY);
if (ret != KNOT_EOK) {
knot_rrset_free(&opt_rr, &pkt->mm);
return KNOT_STATE_FAIL;
}
knot_pkt_begin(pkt, KNOT_ADDITIONAL);
knot_pkt_put(pkt, KNOT_COMPR_HINT_NONE, opt_rr, KNOT_PF_FREE);
{
char name_str[KNOT_DNAME_MAXLEN], type_str[16];
knot_dname_to_str(name_str, knot_pkt_qname(pkt), sizeof(name_str));
knot_rrtype_to_string(knot_pkt_qtype(pkt), type_str, sizeof(type_str));
DEBUG_MSG("%s() A003 '%s %s'\n", __func__, name_str, type_str);
}
return KNOT_STATE_CONSUME;
*/
}
DEBUG_MSG("%s() A004\n", __func__);
#if 0
/* Copy query EDNS options and request DNSKEY for current cut. */
pkt->opt_rr = knot_rrset_copy(req->answer->opt_rr, &pkt->mm);
query->flags |= QUERY_AWAIT_TRUST;
#warning TODO: check if we already have valid DNSKEY in zone cut, otherwise request it from the resolver
#warning FLOW: since first query doesnt have it, resolve.c will catch this and issue subrequest for it
/* Write OPT to additional section */
knot_pkt_begin(pkt, KNOT_ADDITIONAL);
knot_pkt_put(pkt, KNOT_COMPR_HINT_NONE, pkt->opt_rr, KNOT_PF_FREE);
return KNOT_STATE_CONSUME;
#endif
static int validate_records(struct kr_query *qry, knot_pkt_t *answer)
{
#warning TODO: validate RRSIGS (records with ZSK, keys with KSK), return FAIL if failed
if (!qry->zone_cut.key) {
DEBUG_MSG("<= no DNSKEY, can't validate\n");
}
DEBUG_MSG("!! validation not implemented\n");
return kr_error(ENOSYS);
}
static int validate_proof(struct kr_query *qry, knot_pkt_t *answer)
{
#warning TODO: validate NSECx proof, RRSIGs will be checked later if it matches
return kr_ok();
}
static int validate_keyset(struct kr_query *qry, knot_pkt_t *answer)
{
/* Merge DNSKEY records from answer */
const knot_pktsection_t *an = knot_pkt_section(answer, KNOT_ANSWER);
for (unsigned i = 0; i < an->count; ++i) {
const knot_rrset_t *rr = knot_pkt_rr(an, i);
if ((rr->type != KNOT_RRTYPE_DNSKEY) ||
(knot_dname_cmp(rr->owner, qry->zone_cut.name) != 0)) {
continue;
}
/* Merge with zone cut. */
if (!qry->zone_cut.key) {
qry->zone_cut.key = knot_rrset_copy(rr, qry->zone_cut.pool);
if (!qry->zone_cut.key) {
return kr_error(ENOMEM);
}
} else {
int ret = knot_rdataset_merge(&qry->zone_cut.key->rrs,
&rr->rrs, qry->zone_cut.pool);
if (ret != 0) {
knot_rrset_free(&qry->zone_cut.key, qry->zone_cut.pool);
return ret;
}
if (!qry->zone_cut.key) {
/* TODO -- Not sure about the error value. */
return kr_error(KNOT_DNSSEC_ENOKEY);
}
/* Check if there's a key for current TA. */
#warning TODO: check if there is a DNSKEY we can trust (matching current TA)
return kr_ok();
}
static int update_delegation(struct kr_query *qry, knot_pkt_t *answer)
{
DEBUG_MSG("<= referral, checking DS\n");
#warning TODO: delegation, check DS record presence
return kr_ok();
}
static int validate(knot_layer_t *ctx, knot_pkt_t *pkt)
{
struct kr_query *qry = kr_rplan_current(&req->rplan);
if (ctx->state & KNOT_STATE_FAIL) {
return ctx->state;
}
/* Pass-through if user doesn't want secure answer. */
if (!(req->flags & KR_REQ_DNSSEC)) {
return ctx->state;
}
/* Server didn't copy back DO=1, this is okay if it doesn't have DS => insecure.
* If it has DS, it must be secured, fail it as bogus. */
if (!knot_pkt_has_dnssec(pkt)) {
DEBUG_MSG("<= asked with DO=1, got insecure response\n");
#warning TODO: fail and retry if it has TA, otherwise flag as INSECURE and continue
return KNOT_STATE_FAIL;
}
/* Validate non-existence proof if not positive answer. */
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
if (knot_wire_get_rcode(pkt->wire) == KNOT_RCODE_NXDOMAIN) {
ret = validate_proof(qry, pkt);
if (ret != 0) {
DEBUG_MSG("<= bad NXDOMAIN proof\n");
qry->flags |= QUERY_DNSSEC_BOGUS;
return KNOT_STATE_FAIL;
}
}
/* Check if this is a DNSKEY answer, check trust chain and store. */
uint16_t qtype = knot_pkt_qtype(pkt);
if (qtype == KNOT_RRTYPE_DNSKEY) {
ret = validate_keyset(qry, pkt);
if (ret != 0) {
DEBUG_MSG("<= bad keys, broken trust chain\n");
qry->flags |= QUERY_DNSSEC_BOGUS;
return KNOT_STATE_FAIL;
}
/* Update trust anchor. */
} else if (qtype == KNOT_RRTYPE_NS) {
update_delegation(qry, pkt);
}
/* Validate all records, fail as bogus if it doesn't match. */
ret = validate_records(qry, pkt);
if (ret != 0) {
DEBUG_MSG("<= couldn't validate RRSIGs\n");
qry->flags |= QUERY_DNSSEC_BOGUS;
return KNOT_STATE_FAIL;
}
DEBUG_MSG("<= answer valid, OK\n");
}
/** Module implementation. */
const knot_layer_api_t *validate_layer(struct kr_module *module)
{
static const knot_layer_api_t _layer = {
.begin = &begin,
.consume = &validate,
};
return &_layer;
}
KR_MODULE_EXPORT(validate)