/src/unbound/validator/val_sigcrypt.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * validator/val_sigcrypt.c - validator signature crypto functions. |
3 | | * |
4 | | * Copyright (c) 2007, NLnet Labs. All rights reserved. |
5 | | * |
6 | | * This software is open source. |
7 | | * |
8 | | * Redistribution and use in source and binary forms, with or without |
9 | | * modification, are permitted provided that the following conditions |
10 | | * are met: |
11 | | * |
12 | | * Redistributions of source code must retain the above copyright notice, |
13 | | * this list of conditions and the following disclaimer. |
14 | | * |
15 | | * Redistributions in binary form must reproduce the above copyright notice, |
16 | | * this list of conditions and the following disclaimer in the documentation |
17 | | * and/or other materials provided with the distribution. |
18 | | * |
19 | | * Neither the name of the NLNET LABS nor the names of its contributors may |
20 | | * be used to endorse or promote products derived from this software without |
21 | | * specific prior written permission. |
22 | | * |
23 | | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
24 | | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
25 | | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
26 | | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
27 | | * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
28 | | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED |
29 | | * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
30 | | * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
31 | | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
32 | | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
33 | | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
34 | | */ |
35 | | |
36 | | /** |
37 | | * \file |
38 | | * |
39 | | * This file contains helper functions for the validator module. |
40 | | * The functions help with signature verification and checking, the |
41 | | * bridging between RR wireformat data and crypto calls. |
42 | | */ |
43 | | #include "config.h" |
44 | | #include "validator/val_sigcrypt.h" |
45 | | #include "validator/val_secalgo.h" |
46 | | #include "validator/validator.h" |
47 | | #include "util/data/msgreply.h" |
48 | | #include "util/data/msgparse.h" |
49 | | #include "util/data/dname.h" |
50 | | #include "util/rbtree.h" |
51 | | #include "util/rfc_1982.h" |
52 | | #include "util/module.h" |
53 | | #include "util/net_help.h" |
54 | | #include "util/regional.h" |
55 | | #include "util/config_file.h" |
56 | | #include "sldns/keyraw.h" |
57 | | #include "sldns/sbuffer.h" |
58 | | #include "sldns/parseutil.h" |
59 | | #include "sldns/wire2str.h" |
60 | | |
61 | | #include <ctype.h> |
62 | | #if !defined(HAVE_SSL) && !defined(HAVE_NSS) && !defined(HAVE_NETTLE) |
63 | | #error "Need crypto library to do digital signature cryptography" |
64 | | #endif |
65 | | |
66 | | #ifdef HAVE_OPENSSL_ERR_H |
67 | | #include <openssl/err.h> |
68 | | #endif |
69 | | |
70 | | #ifdef HAVE_OPENSSL_RAND_H |
71 | | #include <openssl/rand.h> |
72 | | #endif |
73 | | |
74 | | #ifdef HAVE_OPENSSL_CONF_H |
75 | | #include <openssl/conf.h> |
76 | | #endif |
77 | | |
78 | | #ifdef HAVE_OPENSSL_ENGINE_H |
79 | | #include <openssl/engine.h> |
80 | | #endif |
81 | | |
82 | | /** Maximum number of RRSIG validations for an RRset. */ |
83 | 0 | #define MAX_VALIDATE_RRSIGS 8 |
84 | | |
85 | | /** return number of rrs in an rrset */ |
86 | | static size_t |
87 | | rrset_get_count(struct ub_packed_rrset_key* rrset) |
88 | 0 | { |
89 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*) |
90 | 0 | rrset->entry.data; |
91 | 0 | if(!d) return 0; |
92 | 0 | return d->count; |
93 | 0 | } |
94 | | |
95 | | /** |
96 | | * Get RR signature count |
97 | | */ |
98 | | static size_t |
99 | | rrset_get_sigcount(struct ub_packed_rrset_key* k) |
100 | 0 | { |
101 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
102 | 0 | return d->rrsig_count; |
103 | 0 | } |
104 | | |
105 | | /** |
106 | | * Get signature keytag value |
107 | | * @param k: rrset (with signatures) |
108 | | * @param sig_idx: signature index. |
109 | | * @return keytag or 0 if malformed rrsig. |
110 | | */ |
111 | | static uint16_t |
112 | | rrset_get_sig_keytag(struct ub_packed_rrset_key* k, size_t sig_idx) |
113 | 0 | { |
114 | 0 | uint16_t t; |
115 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
116 | 0 | log_assert(sig_idx < d->rrsig_count); |
117 | 0 | if(d->rr_len[d->count + sig_idx] < 2+18) |
118 | 0 | return 0; |
119 | 0 | memmove(&t, d->rr_data[d->count + sig_idx]+2+16, 2); |
120 | 0 | return ntohs(t); |
121 | 0 | } |
122 | | |
123 | | /** |
124 | | * Get signature signing algorithm value |
125 | | * @param k: rrset (with signatures) |
126 | | * @param sig_idx: signature index. |
127 | | * @return algo or 0 if malformed rrsig. |
128 | | */ |
129 | | static int |
130 | | rrset_get_sig_algo(struct ub_packed_rrset_key* k, size_t sig_idx) |
131 | 0 | { |
132 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
133 | 0 | log_assert(sig_idx < d->rrsig_count); |
134 | 0 | if(d->rr_len[d->count + sig_idx] < 2+3) |
135 | 0 | return 0; |
136 | 0 | return (int)d->rr_data[d->count + sig_idx][2+2]; |
137 | 0 | } |
138 | | |
139 | | /** get rdata pointer and size */ |
140 | | static void |
141 | | rrset_get_rdata(struct ub_packed_rrset_key* k, size_t idx, uint8_t** rdata, |
142 | | size_t* len) |
143 | 0 | { |
144 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
145 | 0 | log_assert(d && idx < (d->count + d->rrsig_count)); |
146 | 0 | *rdata = d->rr_data[idx]; |
147 | 0 | *len = d->rr_len[idx]; |
148 | 0 | } |
149 | | |
150 | | uint16_t |
151 | | dnskey_get_flags(struct ub_packed_rrset_key* k, size_t idx) |
152 | 0 | { |
153 | 0 | uint8_t* rdata; |
154 | 0 | size_t len; |
155 | 0 | uint16_t f; |
156 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
157 | 0 | if(len < 2+2) |
158 | 0 | return 0; |
159 | 0 | memmove(&f, rdata+2, 2); |
160 | 0 | f = ntohs(f); |
161 | 0 | return f; |
162 | 0 | } |
163 | | |
164 | | /** |
165 | | * Get DNSKEY protocol value from rdata |
166 | | * @param k: DNSKEY rrset. |
167 | | * @param idx: which key. |
168 | | * @return protocol octet value |
169 | | */ |
170 | | static int |
171 | | dnskey_get_protocol(struct ub_packed_rrset_key* k, size_t idx) |
172 | 0 | { |
173 | 0 | uint8_t* rdata; |
174 | 0 | size_t len; |
175 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
176 | 0 | if(len < 2+4) |
177 | 0 | return 0; |
178 | 0 | return (int)rdata[2+2]; |
179 | 0 | } |
180 | | |
181 | | int |
182 | | dnskey_get_algo(struct ub_packed_rrset_key* k, size_t idx) |
183 | 0 | { |
184 | 0 | uint8_t* rdata; |
185 | 0 | size_t len; |
186 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
187 | 0 | if(len < 2+4) |
188 | 0 | return 0; |
189 | 0 | return (int)rdata[2+3]; |
190 | 0 | } |
191 | | |
192 | | /** get public key rdata field from a dnskey RR and do some checks */ |
193 | | static void |
194 | | dnskey_get_pubkey(struct ub_packed_rrset_key* k, size_t idx, |
195 | | unsigned char** pk, unsigned int* pklen) |
196 | 0 | { |
197 | 0 | uint8_t* rdata; |
198 | 0 | size_t len; |
199 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
200 | 0 | if(len < 2+5) { |
201 | 0 | *pk = NULL; |
202 | 0 | *pklen = 0; |
203 | 0 | return; |
204 | 0 | } |
205 | 0 | *pk = (unsigned char*)rdata+2+4; |
206 | 0 | *pklen = (unsigned)len-2-4; |
207 | 0 | } |
208 | | |
209 | | int |
210 | | ds_get_key_algo(struct ub_packed_rrset_key* k, size_t idx) |
211 | 0 | { |
212 | 0 | uint8_t* rdata; |
213 | 0 | size_t len; |
214 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
215 | 0 | if(len < 2+3) |
216 | 0 | return 0; |
217 | 0 | return (int)rdata[2+2]; |
218 | 0 | } |
219 | | |
220 | | int |
221 | | ds_get_digest_algo(struct ub_packed_rrset_key* k, size_t idx) |
222 | 0 | { |
223 | 0 | uint8_t* rdata; |
224 | 0 | size_t len; |
225 | 0 | rrset_get_rdata(k, idx, &rdata, &len); |
226 | 0 | if(len < 2+4) |
227 | 0 | return 0; |
228 | 0 | return (int)rdata[2+3]; |
229 | 0 | } |
230 | | |
231 | | uint16_t |
232 | | ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) |
233 | 0 | { |
234 | 0 | uint16_t t; |
235 | 0 | uint8_t* rdata; |
236 | 0 | size_t len; |
237 | 0 | rrset_get_rdata(ds_rrset, ds_idx, &rdata, &len); |
238 | 0 | if(len < 2+2) |
239 | 0 | return 0; |
240 | 0 | memmove(&t, rdata+2, 2); |
241 | 0 | return ntohs(t); |
242 | 0 | } |
243 | | |
244 | | /** |
245 | | * Return pointer to the digest in a DS RR. |
246 | | * @param k: DS rrset. |
247 | | * @param idx: which DS. |
248 | | * @param digest: digest data is returned. |
249 | | * on error, this is NULL. |
250 | | * @param len: length of digest is returned. |
251 | | * on error, the length is 0. |
252 | | */ |
253 | | static void |
254 | | ds_get_sigdata(struct ub_packed_rrset_key* k, size_t idx, uint8_t** digest, |
255 | | size_t* len) |
256 | 0 | { |
257 | 0 | uint8_t* rdata; |
258 | 0 | size_t rdlen; |
259 | 0 | rrset_get_rdata(k, idx, &rdata, &rdlen); |
260 | 0 | if(rdlen < 2+5) { |
261 | 0 | *digest = NULL; |
262 | 0 | *len = 0; |
263 | 0 | return; |
264 | 0 | } |
265 | 0 | *digest = rdata + 2 + 4; |
266 | 0 | *len = rdlen - 2 - 4; |
267 | 0 | } |
268 | | |
269 | | /** |
270 | | * Return size of DS digest according to its hash algorithm. |
271 | | * @param k: DS rrset. |
272 | | * @param idx: which DS. |
273 | | * @return size in bytes of digest, or 0 if not supported. |
274 | | */ |
275 | | static size_t |
276 | | ds_digest_size_algo(struct ub_packed_rrset_key* k, size_t idx) |
277 | 0 | { |
278 | 0 | return ds_digest_size_supported(ds_get_digest_algo(k, idx)); |
279 | 0 | } |
280 | | |
281 | | /** |
282 | | * Create a DS digest for a DNSKEY entry. |
283 | | * |
284 | | * @param env: module environment. Uses scratch space. |
285 | | * @param dnskey_rrset: DNSKEY rrset. |
286 | | * @param dnskey_idx: index of RR in rrset. |
287 | | * @param ds_rrset: DS rrset |
288 | | * @param ds_idx: index of RR in DS rrset. |
289 | | * @param digest: digest is returned in here (must be correctly sized). |
290 | | * @return false on error. |
291 | | */ |
292 | | static int |
293 | | ds_create_dnskey_digest(struct module_env* env, |
294 | | struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, |
295 | | struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, |
296 | | uint8_t* digest) |
297 | 0 | { |
298 | 0 | sldns_buffer* b = env->scratch_buffer; |
299 | 0 | uint8_t* dnskey_rdata; |
300 | 0 | size_t dnskey_len; |
301 | 0 | rrset_get_rdata(dnskey_rrset, dnskey_idx, &dnskey_rdata, &dnskey_len); |
302 | | |
303 | | /* create digest source material in buffer |
304 | | * digest = digest_algorithm( DNSKEY owner name | DNSKEY RDATA); |
305 | | * DNSKEY RDATA = Flags | Protocol | Algorithm | Public Key. */ |
306 | 0 | sldns_buffer_clear(b); |
307 | 0 | sldns_buffer_write(b, dnskey_rrset->rk.dname, |
308 | 0 | dnskey_rrset->rk.dname_len); |
309 | 0 | query_dname_tolower(sldns_buffer_begin(b)); |
310 | 0 | sldns_buffer_write(b, dnskey_rdata+2, dnskey_len-2); /* skip rdatalen*/ |
311 | 0 | sldns_buffer_flip(b); |
312 | | |
313 | 0 | return secalgo_ds_digest(ds_get_digest_algo(ds_rrset, ds_idx), |
314 | 0 | (unsigned char*)sldns_buffer_begin(b), sldns_buffer_limit(b), |
315 | 0 | (unsigned char*)digest); |
316 | 0 | } |
317 | | |
318 | | int ds_digest_match_dnskey(struct module_env* env, |
319 | | struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, |
320 | | struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) |
321 | 0 | { |
322 | 0 | uint8_t* ds; /* DS digest */ |
323 | 0 | size_t dslen; |
324 | 0 | uint8_t* digest; /* generated digest */ |
325 | 0 | size_t digestlen = ds_digest_size_algo(ds_rrset, ds_idx); |
326 | |
|
327 | 0 | if(digestlen == 0) { |
328 | 0 | verbose(VERB_QUERY, "DS fail: not supported, or DS RR " |
329 | 0 | "format error"); |
330 | 0 | return 0; /* not supported, or DS RR format error */ |
331 | 0 | } |
332 | | #ifndef USE_SHA1 |
333 | | if(fake_sha1 && ds_get_digest_algo(ds_rrset, ds_idx)==LDNS_SHA1) |
334 | | return 1; |
335 | | #endif |
336 | | |
337 | | /* check digest length in DS with length from hash function */ |
338 | 0 | ds_get_sigdata(ds_rrset, ds_idx, &ds, &dslen); |
339 | 0 | if(!ds || dslen != digestlen) { |
340 | 0 | verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " |
341 | 0 | "match each other"); |
342 | 0 | return 0; /* DS algorithm and digest do not match */ |
343 | 0 | } |
344 | | |
345 | 0 | digest = regional_alloc(env->scratch, digestlen); |
346 | 0 | if(!digest) { |
347 | 0 | verbose(VERB_QUERY, "DS fail: out of memory"); |
348 | 0 | return 0; /* mem error */ |
349 | 0 | } |
350 | 0 | if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, |
351 | 0 | ds_idx, digest)) { |
352 | 0 | verbose(VERB_QUERY, "DS fail: could not calc key digest"); |
353 | 0 | return 0; /* digest algo failed */ |
354 | 0 | } |
355 | 0 | if(memcmp(digest, ds, dslen) != 0) { |
356 | 0 | verbose(VERB_QUERY, "DS fail: digest is different"); |
357 | 0 | return 0; /* digest different */ |
358 | 0 | } |
359 | 0 | return 1; |
360 | 0 | } |
361 | | |
362 | | int |
363 | | ds_digest_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, |
364 | | size_t ds_idx) |
365 | 0 | { |
366 | 0 | return (ds_digest_size_algo(ds_rrset, ds_idx) != 0); |
367 | 0 | } |
368 | | |
369 | | int |
370 | | ds_key_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, |
371 | | size_t ds_idx) |
372 | 0 | { |
373 | 0 | return dnskey_algo_id_is_supported(ds_get_key_algo(ds_rrset, ds_idx)); |
374 | 0 | } |
375 | | |
376 | | uint16_t |
377 | | dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) |
378 | 0 | { |
379 | 0 | uint8_t* data; |
380 | 0 | size_t len; |
381 | 0 | rrset_get_rdata(dnskey_rrset, dnskey_idx, &data, &len); |
382 | | /* do not pass rdatalen to ldns */ |
383 | 0 | return sldns_calc_keytag_raw(data+2, len-2); |
384 | 0 | } |
385 | | |
386 | | int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, |
387 | | size_t dnskey_idx) |
388 | 0 | { |
389 | 0 | return dnskey_algo_id_is_supported(dnskey_get_algo(dnskey_rrset, |
390 | 0 | dnskey_idx)); |
391 | 0 | } |
392 | | |
393 | | int dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, |
394 | | size_t dnskey_idx) |
395 | 0 | { |
396 | | #ifdef DEPRECATE_RSA_1024 |
397 | | uint8_t* rdata; |
398 | | size_t len; |
399 | | int alg = dnskey_get_algo(dnskey_rrset, dnskey_idx); |
400 | | size_t keysize; |
401 | | |
402 | | rrset_get_rdata(dnskey_rrset, dnskey_idx, &rdata, &len); |
403 | | if(len < 2+4) |
404 | | return 0; |
405 | | keysize = sldns_rr_dnskey_key_size_raw(rdata+2+4, len-2-4, alg); |
406 | | |
407 | | switch((sldns_algorithm)alg) { |
408 | | case LDNS_RSAMD5: |
409 | | case LDNS_RSASHA1: |
410 | | case LDNS_RSASHA1_NSEC3: |
411 | | case LDNS_RSASHA256: |
412 | | case LDNS_RSASHA512: |
413 | | /* reject RSA keys of 1024 bits and shorter */ |
414 | | if(keysize <= 1024) |
415 | | return 0; |
416 | | break; |
417 | | default: |
418 | | break; |
419 | | } |
420 | | #else |
421 | 0 | (void)dnskey_rrset; (void)dnskey_idx; |
422 | 0 | #endif /* DEPRECATE_RSA_1024 */ |
423 | 0 | return 1; |
424 | 0 | } |
425 | | |
426 | | int dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset) |
427 | 0 | { |
428 | 0 | size_t i, num = rrset_get_count(dnskey_rrset); |
429 | 0 | for(i=0; i<num; i++) { |
430 | 0 | if(!dnskey_size_is_supported(dnskey_rrset, i)) |
431 | 0 | return 0; |
432 | 0 | } |
433 | 0 | return 1; |
434 | 0 | } |
435 | | |
436 | | void algo_needs_init_dnskey_add(struct algo_needs* n, |
437 | | struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) |
438 | 0 | { |
439 | 0 | uint8_t algo; |
440 | 0 | size_t i, total = n->num; |
441 | 0 | size_t num = rrset_get_count(dnskey); |
442 | |
|
443 | 0 | for(i=0; i<num; i++) { |
444 | 0 | algo = (uint8_t)dnskey_get_algo(dnskey, i); |
445 | 0 | if(!dnskey_algo_id_is_supported((int)algo)) |
446 | 0 | continue; |
447 | 0 | if(n->needs[algo] == 0) { |
448 | 0 | n->needs[algo] = 1; |
449 | 0 | sigalg[total] = algo; |
450 | 0 | total++; |
451 | 0 | } |
452 | 0 | } |
453 | 0 | sigalg[total] = 0; |
454 | 0 | n->num = total; |
455 | 0 | } |
456 | | |
457 | | void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg) |
458 | 0 | { |
459 | 0 | uint8_t algo; |
460 | 0 | size_t total = 0; |
461 | |
|
462 | 0 | memset(n->needs, 0, sizeof(uint8_t)*ALGO_NEEDS_MAX); |
463 | 0 | while( (algo=*sigalg++) != 0) { |
464 | 0 | log_assert(dnskey_algo_id_is_supported((int)algo)); |
465 | 0 | log_assert(n->needs[algo] == 0); |
466 | 0 | n->needs[algo] = 1; |
467 | 0 | total++; |
468 | 0 | } |
469 | 0 | n->num = total; |
470 | 0 | } |
471 | | |
472 | | void algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds, |
473 | | int fav_ds_algo, uint8_t* sigalg) |
474 | 0 | { |
475 | 0 | uint8_t algo; |
476 | 0 | size_t i, total = 0; |
477 | 0 | size_t num = rrset_get_count(ds); |
478 | |
|
479 | 0 | memset(n->needs, 0, sizeof(uint8_t)*ALGO_NEEDS_MAX); |
480 | 0 | for(i=0; i<num; i++) { |
481 | 0 | if(ds_get_digest_algo(ds, i) != fav_ds_algo) |
482 | 0 | continue; |
483 | 0 | algo = (uint8_t)ds_get_key_algo(ds, i); |
484 | 0 | if(!dnskey_algo_id_is_supported((int)algo)) |
485 | 0 | continue; |
486 | 0 | log_assert(algo != 0); /* we do not support 0 and is EOS */ |
487 | 0 | if(n->needs[algo] == 0) { |
488 | 0 | n->needs[algo] = 1; |
489 | 0 | sigalg[total] = algo; |
490 | 0 | total++; |
491 | 0 | } |
492 | 0 | } |
493 | 0 | sigalg[total] = 0; |
494 | 0 | n->num = total; |
495 | 0 | } |
496 | | |
497 | | int algo_needs_set_secure(struct algo_needs* n, uint8_t algo) |
498 | 0 | { |
499 | 0 | if(n->needs[algo]) { |
500 | 0 | n->needs[algo] = 0; |
501 | 0 | n->num --; |
502 | 0 | if(n->num == 0) /* done! */ |
503 | 0 | return 1; |
504 | 0 | } |
505 | 0 | return 0; |
506 | 0 | } |
507 | | |
508 | | void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) |
509 | 0 | { |
510 | 0 | if(n->needs[algo]) n->needs[algo] = 2; /* need it, but bogus */ |
511 | 0 | } |
512 | | |
513 | | size_t algo_needs_num_missing(struct algo_needs* n) |
514 | 0 | { |
515 | 0 | return n->num; |
516 | 0 | } |
517 | | |
518 | | int algo_needs_missing(struct algo_needs* n) |
519 | 0 | { |
520 | 0 | int i, miss = -1; |
521 | | /* check if a needed algo was bogus - report that; |
522 | | * check the first missing algo - report that; |
523 | | * or return 0 */ |
524 | 0 | for(i=0; i<ALGO_NEEDS_MAX; i++) { |
525 | 0 | if(n->needs[i] == 2) |
526 | 0 | return 0; |
527 | 0 | if(n->needs[i] == 1 && miss == -1) |
528 | 0 | miss = i; |
529 | 0 | } |
530 | 0 | if(miss != -1) return miss; |
531 | 0 | return 0; |
532 | 0 | } |
533 | | |
534 | | /** |
535 | | * verify rrset, with dnskey rrset, for a specific rrsig in rrset |
536 | | * @param env: module environment, scratch space is used. |
537 | | * @param ve: validator environment, date settings. |
538 | | * @param now: current time for validation (can be overridden). |
539 | | * @param rrset: to be validated. |
540 | | * @param dnskey: DNSKEY rrset, keyset to try. |
541 | | * @param sig_idx: which signature to try to validate. |
542 | | * @param sortree: reused sorted order. Stored in region. Pass NULL at start, |
543 | | * and for a new rrset. |
544 | | * @param reason: if bogus, a string returned, fixed or alloced in scratch. |
545 | | * @param reason_bogus: EDE (RFC8914) code paired with the reason of failure. |
546 | | * @param section: section of packet where this rrset comes from. |
547 | | * @param qstate: qstate with region. |
548 | | * @param numverified: incremented when the number of RRSIG validations |
549 | | * increases. |
550 | | * @return secure if any key signs *this* signature. bogus if no key signs it, |
551 | | * unchecked on error, or indeterminate if all keys are not supported by |
552 | | * the crypto library (openssl3+ only). |
553 | | */ |
554 | | static enum sec_status |
555 | | dnskeyset_verify_rrset_sig(struct module_env* env, struct val_env* ve, |
556 | | time_t now, struct ub_packed_rrset_key* rrset, |
557 | | struct ub_packed_rrset_key* dnskey, size_t sig_idx, |
558 | | struct rbtree_type** sortree, |
559 | | char** reason, sldns_ede_code *reason_bogus, |
560 | | sldns_pkt_section section, struct module_qstate* qstate, |
561 | | int* numverified) |
562 | 0 | { |
563 | | /* find matching keys and check them */ |
564 | 0 | enum sec_status sec = sec_status_bogus; |
565 | 0 | uint16_t tag = rrset_get_sig_keytag(rrset, sig_idx); |
566 | 0 | int algo = rrset_get_sig_algo(rrset, sig_idx); |
567 | 0 | size_t i, num = rrset_get_count(dnskey); |
568 | 0 | size_t numchecked = 0; |
569 | 0 | size_t numindeterminate = 0; |
570 | 0 | int buf_canon = 0; |
571 | 0 | verbose(VERB_ALGO, "verify sig %d %d", (int)tag, algo); |
572 | 0 | if(!dnskey_algo_id_is_supported(algo)) { |
573 | 0 | if(reason_bogus) |
574 | 0 | *reason_bogus = LDNS_EDE_UNSUPPORTED_DNSKEY_ALG; |
575 | 0 | verbose(VERB_QUERY, "verify sig: unknown algorithm"); |
576 | 0 | return sec_status_insecure; |
577 | 0 | } |
578 | | |
579 | 0 | for(i=0; i<num; i++) { |
580 | | /* see if key matches keytag and algo */ |
581 | 0 | if(algo != dnskey_get_algo(dnskey, i) || |
582 | 0 | tag != dnskey_calc_keytag(dnskey, i)) |
583 | 0 | continue; |
584 | 0 | numchecked ++; |
585 | 0 | (*numverified)++; |
586 | | |
587 | | /* see if key verifies */ |
588 | 0 | sec = dnskey_verify_rrset_sig(env->scratch, |
589 | 0 | env->scratch_buffer, ve, now, rrset, dnskey, i, |
590 | 0 | sig_idx, sortree, &buf_canon, reason, reason_bogus, |
591 | 0 | section, qstate); |
592 | 0 | if(sec == sec_status_secure) |
593 | 0 | return sec; |
594 | 0 | else if(sec == sec_status_indeterminate) |
595 | 0 | numindeterminate ++; |
596 | 0 | if(*numverified > MAX_VALIDATE_RRSIGS) { |
597 | 0 | *reason = "too many RRSIG validations"; |
598 | 0 | if(reason_bogus) |
599 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
600 | 0 | verbose(VERB_ALGO, "verify sig: too many RRSIG validations"); |
601 | 0 | return sec_status_bogus; |
602 | 0 | } |
603 | 0 | } |
604 | 0 | if(numchecked == 0) { |
605 | 0 | *reason = "signatures from unknown keys"; |
606 | 0 | if(reason_bogus) |
607 | 0 | *reason_bogus = LDNS_EDE_DNSKEY_MISSING; |
608 | 0 | verbose(VERB_QUERY, "verify: could not find appropriate key"); |
609 | 0 | return sec_status_bogus; |
610 | 0 | } |
611 | 0 | if(numindeterminate == numchecked) { |
612 | 0 | *reason = "unsupported algorithm by crypto library"; |
613 | 0 | if(reason_bogus) |
614 | 0 | *reason_bogus = LDNS_EDE_UNSUPPORTED_DNSKEY_ALG; |
615 | 0 | verbose(VERB_ALGO, "verify sig: unsupported algorithm by " |
616 | 0 | "crypto library"); |
617 | 0 | return sec_status_indeterminate; |
618 | 0 | } |
619 | 0 | return sec_status_bogus; |
620 | 0 | } |
621 | | |
622 | | enum sec_status |
623 | | dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, |
624 | | struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, |
625 | | uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, |
626 | | sldns_pkt_section section, struct module_qstate* qstate, int* verified, |
627 | | char* reasonbuf, size_t reasonlen) |
628 | 0 | { |
629 | 0 | enum sec_status sec; |
630 | 0 | size_t i, num; |
631 | 0 | rbtree_type* sortree = NULL; |
632 | | /* make sure that for all DNSKEY algorithms there are valid sigs */ |
633 | 0 | struct algo_needs needs; |
634 | 0 | int alg; |
635 | 0 | *verified = 0; |
636 | |
|
637 | 0 | num = rrset_get_sigcount(rrset); |
638 | 0 | if(num == 0) { |
639 | 0 | verbose(VERB_QUERY, "rrset failed to verify due to a lack of " |
640 | 0 | "signatures"); |
641 | 0 | *reason = "no signatures"; |
642 | 0 | if(reason_bogus) |
643 | 0 | *reason_bogus = LDNS_EDE_RRSIGS_MISSING; |
644 | 0 | return sec_status_bogus; |
645 | 0 | } |
646 | | |
647 | 0 | if(sigalg) { |
648 | 0 | algo_needs_init_list(&needs, sigalg); |
649 | 0 | if(algo_needs_num_missing(&needs) == 0) { |
650 | 0 | verbose(VERB_QUERY, "zone has no known algorithms"); |
651 | 0 | *reason = "zone has no known algorithms"; |
652 | 0 | if(reason_bogus) |
653 | 0 | *reason_bogus = LDNS_EDE_UNSUPPORTED_DNSKEY_ALG; |
654 | 0 | return sec_status_insecure; |
655 | 0 | } |
656 | 0 | } |
657 | 0 | for(i=0; i<num; i++) { |
658 | 0 | sec = dnskeyset_verify_rrset_sig(env, ve, *env->now, rrset, |
659 | 0 | dnskey, i, &sortree, reason, reason_bogus, |
660 | 0 | section, qstate, verified); |
661 | | /* see which algorithm has been fixed up */ |
662 | 0 | if(sec == sec_status_secure) { |
663 | 0 | if(!sigalg) |
664 | 0 | return sec; /* done! */ |
665 | 0 | else if(algo_needs_set_secure(&needs, |
666 | 0 | (uint8_t)rrset_get_sig_algo(rrset, i))) |
667 | 0 | return sec; /* done! */ |
668 | 0 | } else if(sigalg && sec == sec_status_bogus) { |
669 | 0 | algo_needs_set_bogus(&needs, |
670 | 0 | (uint8_t)rrset_get_sig_algo(rrset, i)); |
671 | 0 | } |
672 | 0 | if(*verified > MAX_VALIDATE_RRSIGS) { |
673 | 0 | verbose(VERB_QUERY, "rrset failed to verify, too many RRSIG validations"); |
674 | 0 | *reason = "too many RRSIG validations"; |
675 | 0 | if(reason_bogus) |
676 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
677 | 0 | return sec_status_bogus; |
678 | 0 | } |
679 | 0 | } |
680 | 0 | if(sigalg && (alg=algo_needs_missing(&needs)) != 0) { |
681 | 0 | verbose(VERB_ALGO, "rrset failed to verify: " |
682 | 0 | "no valid signatures for %d algorithms", |
683 | 0 | (int)algo_needs_num_missing(&needs)); |
684 | 0 | algo_needs_reason(alg, reason, "no signatures", reasonbuf, |
685 | 0 | reasonlen); |
686 | 0 | } else { |
687 | 0 | verbose(VERB_ALGO, "rrset failed to verify: " |
688 | 0 | "no valid signatures"); |
689 | 0 | } |
690 | 0 | return sec_status_bogus; |
691 | 0 | } |
692 | | |
693 | | void algo_needs_reason(int alg, char** reason, char* s, char* reasonbuf, |
694 | | size_t reasonlen) |
695 | 0 | { |
696 | 0 | sldns_lookup_table *t = sldns_lookup_by_id(sldns_algorithms, alg); |
697 | 0 | if(t&&t->name) |
698 | 0 | snprintf(reasonbuf, reasonlen, "%s with algorithm %s", s, |
699 | 0 | t->name); |
700 | 0 | else snprintf(reasonbuf, reasonlen, "%s with algorithm ALG%u", s, |
701 | 0 | (unsigned)alg); |
702 | 0 | *reason = reasonbuf; |
703 | 0 | } |
704 | | |
705 | | enum sec_status |
706 | | dnskey_verify_rrset(struct module_env* env, struct val_env* ve, |
707 | | struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, |
708 | | size_t dnskey_idx, char** reason, sldns_ede_code *reason_bogus, |
709 | | sldns_pkt_section section, struct module_qstate* qstate) |
710 | 0 | { |
711 | 0 | enum sec_status sec; |
712 | 0 | size_t i, num, numchecked = 0, numindeterminate = 0; |
713 | 0 | rbtree_type* sortree = NULL; |
714 | 0 | int buf_canon = 0; |
715 | 0 | uint16_t tag = dnskey_calc_keytag(dnskey, dnskey_idx); |
716 | 0 | int algo = dnskey_get_algo(dnskey, dnskey_idx); |
717 | 0 | int numverified = 0; |
718 | |
|
719 | 0 | num = rrset_get_sigcount(rrset); |
720 | 0 | if(num == 0) { |
721 | 0 | verbose(VERB_QUERY, "rrset failed to verify due to a lack of " |
722 | 0 | "signatures"); |
723 | 0 | *reason = "no signatures"; |
724 | 0 | if(reason_bogus) |
725 | 0 | *reason_bogus = LDNS_EDE_RRSIGS_MISSING; |
726 | 0 | return sec_status_bogus; |
727 | 0 | } |
728 | 0 | for(i=0; i<num; i++) { |
729 | | /* see if sig matches keytag and algo */ |
730 | 0 | if(algo != rrset_get_sig_algo(rrset, i) || |
731 | 0 | tag != rrset_get_sig_keytag(rrset, i)) |
732 | 0 | continue; |
733 | 0 | buf_canon = 0; |
734 | 0 | sec = dnskey_verify_rrset_sig(env->scratch, |
735 | 0 | env->scratch_buffer, ve, *env->now, rrset, |
736 | 0 | dnskey, dnskey_idx, i, &sortree, &buf_canon, reason, |
737 | 0 | reason_bogus, section, qstate); |
738 | 0 | if(sec == sec_status_secure) |
739 | 0 | return sec; |
740 | 0 | numchecked ++; |
741 | 0 | numverified ++; |
742 | 0 | if(sec == sec_status_indeterminate) |
743 | 0 | numindeterminate ++; |
744 | 0 | if(numverified > MAX_VALIDATE_RRSIGS) { |
745 | 0 | verbose(VERB_QUERY, "rrset failed to verify, too many RRSIG validations"); |
746 | 0 | *reason = "too many RRSIG validations"; |
747 | 0 | if(reason_bogus) |
748 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
749 | 0 | return sec_status_bogus; |
750 | 0 | } |
751 | 0 | } |
752 | 0 | if(!numchecked) { |
753 | 0 | *reason = "signature for expected key and algorithm missing"; |
754 | 0 | if(reason_bogus) |
755 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
756 | 0 | } else if(numchecked == numindeterminate) { |
757 | 0 | verbose(VERB_ALGO, "rrset failed to verify due to algorithm " |
758 | 0 | "refusal by cryptolib"); |
759 | 0 | if(reason_bogus) |
760 | 0 | *reason_bogus = LDNS_EDE_UNSUPPORTED_DNSKEY_ALG; |
761 | 0 | *reason = "algorithm refused by cryptolib"; |
762 | 0 | return sec_status_indeterminate; |
763 | 0 | } |
764 | 0 | verbose(VERB_ALGO, "rrset failed to verify: all signatures are bogus"); |
765 | 0 | return sec_status_bogus; |
766 | 0 | } |
767 | | |
768 | | /** |
769 | | * RR entries in a canonical sorted tree of RRs |
770 | | */ |
771 | | struct canon_rr { |
772 | | /** rbtree node, key is this structure */ |
773 | | rbnode_type node; |
774 | | /** rrset the RR is in */ |
775 | | struct ub_packed_rrset_key* rrset; |
776 | | /** which RR in the rrset */ |
777 | | size_t rr_idx; |
778 | | }; |
779 | | |
780 | | /** |
781 | | * Compare two RR for canonical order, in a field-style sweep. |
782 | | * @param d: rrset data |
783 | | * @param desc: ldns wireformat descriptor. |
784 | | * @param i: first RR to compare |
785 | | * @param j: first RR to compare |
786 | | * @return comparison code. |
787 | | */ |
788 | | static int |
789 | | canonical_compare_byfield(struct packed_rrset_data* d, |
790 | | const sldns_rr_descriptor* desc, size_t i, size_t j) |
791 | 0 | { |
792 | | /* sweep across rdata, keep track of some state: |
793 | | * which rr field, and bytes left in field. |
794 | | * current position in rdata, length left. |
795 | | * are we in a dname, length left in a label. |
796 | | */ |
797 | 0 | int wfi = -1; /* current wireformat rdata field (rdf) */ |
798 | 0 | int wfj = -1; |
799 | 0 | uint8_t* di = d->rr_data[i]+2; /* ptr to current rdata byte */ |
800 | 0 | uint8_t* dj = d->rr_data[j]+2; |
801 | 0 | size_t ilen = d->rr_len[i]-2; /* length left in rdata */ |
802 | 0 | size_t jlen = d->rr_len[j]-2; |
803 | 0 | int dname_i = 0; /* true if these bytes are part of a name */ |
804 | 0 | int dname_j = 0; |
805 | 0 | size_t lablen_i = 0; /* 0 for label length byte,for first byte of rdf*/ |
806 | 0 | size_t lablen_j = 0; /* otherwise remaining length of rdf or label */ |
807 | 0 | int dname_num_i = (int)desc->_dname_count; /* decreased at root label */ |
808 | 0 | int dname_num_j = (int)desc->_dname_count; |
809 | | |
810 | | /* loop while there are rdata bytes available for both rrs, |
811 | | * and still some lowercasing needs to be done; either the dnames |
812 | | * have not been reached yet, or they are currently being processed */ |
813 | 0 | while(ilen > 0 && jlen > 0 && (dname_num_i > 0 || dname_num_j > 0)) { |
814 | | /* compare these two bytes */ |
815 | | /* lowercase if in a dname and not a label length byte */ |
816 | 0 | if( ((dname_i && lablen_i)?(uint8_t)tolower((int)*di):*di) |
817 | 0 | != ((dname_j && lablen_j)?(uint8_t)tolower((int)*dj):*dj) |
818 | 0 | ) { |
819 | 0 | if(((dname_i && lablen_i)?(uint8_t)tolower((int)*di):*di) |
820 | 0 | < ((dname_j && lablen_j)?(uint8_t)tolower((int)*dj):*dj)) |
821 | 0 | return -1; |
822 | 0 | return 1; |
823 | 0 | } |
824 | 0 | ilen--; |
825 | 0 | jlen--; |
826 | | /* bytes are equal */ |
827 | | |
828 | | /* advance field i */ |
829 | | /* lablen 0 means that this byte is the first byte of the |
830 | | * next rdata field; inspect this rdata field and setup |
831 | | * to process the rest of this rdata field. |
832 | | * The reason to first read the byte, then setup the rdf, |
833 | | * is that we are then sure the byte is available and short |
834 | | * rdata is handled gracefully (even if it is a formerr). */ |
835 | 0 | if(lablen_i == 0) { |
836 | 0 | if(dname_i) { |
837 | | /* scan this dname label */ |
838 | | /* capture length to lowercase */ |
839 | 0 | lablen_i = (size_t)*di; |
840 | 0 | if(lablen_i == 0) { |
841 | | /* end root label */ |
842 | 0 | dname_i = 0; |
843 | 0 | dname_num_i--; |
844 | | /* if dname num is 0, then the |
845 | | * remainder is binary only */ |
846 | 0 | if(dname_num_i == 0) |
847 | 0 | lablen_i = ilen; |
848 | 0 | } |
849 | 0 | } else { |
850 | | /* scan this rdata field */ |
851 | 0 | wfi++; |
852 | 0 | if(desc->_wireformat[wfi] |
853 | 0 | == LDNS_RDF_TYPE_DNAME) { |
854 | 0 | dname_i = 1; |
855 | 0 | lablen_i = (size_t)*di; |
856 | 0 | if(lablen_i == 0) { |
857 | 0 | dname_i = 0; |
858 | 0 | dname_num_i--; |
859 | 0 | if(dname_num_i == 0) |
860 | 0 | lablen_i = ilen; |
861 | 0 | } |
862 | 0 | } else if(desc->_wireformat[wfi] |
863 | 0 | == LDNS_RDF_TYPE_STR) |
864 | 0 | lablen_i = (size_t)*di; |
865 | 0 | else lablen_i = get_rdf_size( |
866 | 0 | desc->_wireformat[wfi]) - 1; |
867 | 0 | } |
868 | 0 | } else lablen_i--; |
869 | | |
870 | | /* advance field j; same as for i */ |
871 | 0 | if(lablen_j == 0) { |
872 | 0 | if(dname_j) { |
873 | 0 | lablen_j = (size_t)*dj; |
874 | 0 | if(lablen_j == 0) { |
875 | 0 | dname_j = 0; |
876 | 0 | dname_num_j--; |
877 | 0 | if(dname_num_j == 0) |
878 | 0 | lablen_j = jlen; |
879 | 0 | } |
880 | 0 | } else { |
881 | 0 | wfj++; |
882 | 0 | if(desc->_wireformat[wfj] |
883 | 0 | == LDNS_RDF_TYPE_DNAME) { |
884 | 0 | dname_j = 1; |
885 | 0 | lablen_j = (size_t)*dj; |
886 | 0 | if(lablen_j == 0) { |
887 | 0 | dname_j = 0; |
888 | 0 | dname_num_j--; |
889 | 0 | if(dname_num_j == 0) |
890 | 0 | lablen_j = jlen; |
891 | 0 | } |
892 | 0 | } else if(desc->_wireformat[wfj] |
893 | 0 | == LDNS_RDF_TYPE_STR) |
894 | 0 | lablen_j = (size_t)*dj; |
895 | 0 | else lablen_j = get_rdf_size( |
896 | 0 | desc->_wireformat[wfj]) - 1; |
897 | 0 | } |
898 | 0 | } else lablen_j--; |
899 | 0 | di++; |
900 | 0 | dj++; |
901 | 0 | } |
902 | | /* end of the loop; because we advanced byte by byte; now we have |
903 | | * that the rdata has ended, or that there is a binary remainder */ |
904 | | /* shortest first */ |
905 | 0 | if(ilen == 0 && jlen == 0) |
906 | 0 | return 0; |
907 | 0 | if(ilen == 0) |
908 | 0 | return -1; |
909 | 0 | if(jlen == 0) |
910 | 0 | return 1; |
911 | | /* binary remainder, capture comparison in wfi variable */ |
912 | 0 | if((wfi = memcmp(di, dj, (ilen<jlen)?ilen:jlen)) != 0) |
913 | 0 | return wfi; |
914 | 0 | if(ilen < jlen) |
915 | 0 | return -1; |
916 | 0 | if(jlen < ilen) |
917 | 0 | return 1; |
918 | 0 | return 0; |
919 | 0 | } |
920 | | |
921 | | /** |
922 | | * Compare two RRs in the same RRset and determine their relative |
923 | | * canonical order. |
924 | | * @param rrset: the rrset in which to perform compares. |
925 | | * @param i: first RR to compare |
926 | | * @param j: first RR to compare |
927 | | * @return 0 if RR i== RR j, -1 if <, +1 if >. |
928 | | */ |
929 | | static int |
930 | | canonical_compare(struct ub_packed_rrset_key* rrset, size_t i, size_t j) |
931 | 0 | { |
932 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*) |
933 | 0 | rrset->entry.data; |
934 | 0 | const sldns_rr_descriptor* desc; |
935 | 0 | uint16_t type = ntohs(rrset->rk.type); |
936 | 0 | size_t minlen; |
937 | 0 | int c; |
938 | |
|
939 | 0 | if(i==j) |
940 | 0 | return 0; |
941 | | |
942 | 0 | switch(type) { |
943 | | /* These RR types have only a name as RDATA. |
944 | | * This name has to be canonicalized.*/ |
945 | 0 | case LDNS_RR_TYPE_NS: |
946 | 0 | case LDNS_RR_TYPE_MD: |
947 | 0 | case LDNS_RR_TYPE_MF: |
948 | 0 | case LDNS_RR_TYPE_CNAME: |
949 | 0 | case LDNS_RR_TYPE_MB: |
950 | 0 | case LDNS_RR_TYPE_MG: |
951 | 0 | case LDNS_RR_TYPE_MR: |
952 | 0 | case LDNS_RR_TYPE_PTR: |
953 | 0 | case LDNS_RR_TYPE_DNAME: |
954 | | /* the wireread function has already checked these |
955 | | * dname's for correctness, and this double checks */ |
956 | 0 | if(!dname_valid(d->rr_data[i]+2, d->rr_len[i]-2) || |
957 | 0 | !dname_valid(d->rr_data[j]+2, d->rr_len[j]-2)) |
958 | 0 | return 0; |
959 | 0 | return query_dname_compare(d->rr_data[i]+2, |
960 | 0 | d->rr_data[j]+2); |
961 | | |
962 | | /* These RR types have STR and fixed size rdata fields |
963 | | * before one or more name fields that need canonicalizing, |
964 | | * and after that a byte-for byte remainder can be compared. |
965 | | */ |
966 | | /* type starts with the name; remainder is binary compared */ |
967 | 0 | case LDNS_RR_TYPE_NXT: |
968 | | /* use rdata field formats */ |
969 | 0 | case LDNS_RR_TYPE_MINFO: |
970 | 0 | case LDNS_RR_TYPE_RP: |
971 | 0 | case LDNS_RR_TYPE_SOA: |
972 | 0 | case LDNS_RR_TYPE_RT: |
973 | 0 | case LDNS_RR_TYPE_AFSDB: |
974 | 0 | case LDNS_RR_TYPE_KX: |
975 | 0 | case LDNS_RR_TYPE_MX: |
976 | 0 | case LDNS_RR_TYPE_SIG: |
977 | | /* RRSIG signer name has to be downcased */ |
978 | 0 | case LDNS_RR_TYPE_RRSIG: |
979 | 0 | case LDNS_RR_TYPE_PX: |
980 | 0 | case LDNS_RR_TYPE_NAPTR: |
981 | 0 | case LDNS_RR_TYPE_SRV: |
982 | 0 | desc = sldns_rr_descript(type); |
983 | 0 | log_assert(desc); |
984 | | /* this holds for the types that need canonicalizing */ |
985 | 0 | log_assert(desc->_minimum == desc->_maximum); |
986 | 0 | return canonical_compare_byfield(d, desc, i, j); |
987 | | |
988 | 0 | case LDNS_RR_TYPE_HINFO: /* no longer downcased */ |
989 | 0 | case LDNS_RR_TYPE_NSEC: |
990 | 0 | default: |
991 | | /* For unknown RR types, or types not listed above, |
992 | | * no canonicalization is needed, do binary compare */ |
993 | | /* byte for byte compare, equal means shortest first*/ |
994 | 0 | minlen = d->rr_len[i]-2; |
995 | 0 | if(minlen > d->rr_len[j]-2) |
996 | 0 | minlen = d->rr_len[j]-2; |
997 | 0 | c = memcmp(d->rr_data[i]+2, d->rr_data[j]+2, minlen); |
998 | 0 | if(c!=0) |
999 | 0 | return c; |
1000 | | /* rdata equal, shortest is first */ |
1001 | 0 | if(d->rr_len[i] < d->rr_len[j]) |
1002 | 0 | return -1; |
1003 | 0 | if(d->rr_len[i] > d->rr_len[j]) |
1004 | 0 | return 1; |
1005 | | /* rdata equal, length equal */ |
1006 | 0 | break; |
1007 | 0 | } |
1008 | 0 | return 0; |
1009 | 0 | } |
1010 | | |
1011 | | int |
1012 | | canonical_tree_compare(const void* k1, const void* k2) |
1013 | 0 | { |
1014 | 0 | struct canon_rr* r1 = (struct canon_rr*)k1; |
1015 | 0 | struct canon_rr* r2 = (struct canon_rr*)k2; |
1016 | 0 | log_assert(r1->rrset == r2->rrset); |
1017 | 0 | return canonical_compare(r1->rrset, r1->rr_idx, r2->rr_idx); |
1018 | 0 | } |
1019 | | |
1020 | | /** |
1021 | | * Sort RRs for rrset in canonical order. |
1022 | | * Does not actually canonicalize the RR rdatas. |
1023 | | * Does not touch rrsigs. |
1024 | | * @param rrset: to sort. |
1025 | | * @param d: rrset data. |
1026 | | * @param sortree: tree to sort into. |
1027 | | * @param rrs: rr storage. |
1028 | | */ |
1029 | | static void |
1030 | | canonical_sort(struct ub_packed_rrset_key* rrset, struct packed_rrset_data* d, |
1031 | | rbtree_type* sortree, struct canon_rr* rrs) |
1032 | 0 | { |
1033 | 0 | size_t i; |
1034 | | /* insert into rbtree to sort and detect duplicates */ |
1035 | 0 | for(i=0; i<d->count; i++) { |
1036 | 0 | rrs[i].node.key = &rrs[i]; |
1037 | 0 | rrs[i].rrset = rrset; |
1038 | 0 | rrs[i].rr_idx = i; |
1039 | 0 | if(!rbtree_insert(sortree, &rrs[i].node)) { |
1040 | | /* this was a duplicate */ |
1041 | 0 | } |
1042 | 0 | } |
1043 | 0 | } |
1044 | | |
1045 | | /** |
1046 | | * Insert canonical owner name into buffer. |
1047 | | * @param buf: buffer to insert into at current position. |
1048 | | * @param k: rrset with its owner name. |
1049 | | * @param sig: signature with signer name and label count. |
1050 | | * must be length checked, at least 18 bytes long. |
1051 | | * @param can_owner: position in buffer returned for future use. |
1052 | | * @param can_owner_len: length of canonical owner name. |
1053 | | */ |
1054 | | static void |
1055 | | insert_can_owner(sldns_buffer* buf, struct ub_packed_rrset_key* k, |
1056 | | uint8_t* sig, uint8_t** can_owner, size_t* can_owner_len) |
1057 | 0 | { |
1058 | 0 | int rrsig_labels = (int)sig[3]; |
1059 | 0 | int fqdn_labels = dname_signame_label_count(k->rk.dname); |
1060 | 0 | *can_owner = sldns_buffer_current(buf); |
1061 | 0 | if(rrsig_labels == fqdn_labels) { |
1062 | | /* no change */ |
1063 | 0 | sldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); |
1064 | 0 | query_dname_tolower(*can_owner); |
1065 | 0 | *can_owner_len = k->rk.dname_len; |
1066 | 0 | return; |
1067 | 0 | } |
1068 | 0 | log_assert(rrsig_labels < fqdn_labels); |
1069 | | /* *. | fqdn(rightmost rrsig_labels) */ |
1070 | 0 | if(rrsig_labels < fqdn_labels) { |
1071 | 0 | int i; |
1072 | 0 | uint8_t* nm = k->rk.dname; |
1073 | 0 | size_t len = k->rk.dname_len; |
1074 | | /* so skip fqdn_labels-rrsig_labels */ |
1075 | 0 | for(i=0; i<fqdn_labels-rrsig_labels; i++) { |
1076 | 0 | dname_remove_label(&nm, &len); |
1077 | 0 | } |
1078 | 0 | *can_owner_len = len+2; |
1079 | 0 | sldns_buffer_write(buf, (uint8_t*)"\001*", 2); |
1080 | 0 | sldns_buffer_write(buf, nm, len); |
1081 | 0 | query_dname_tolower(*can_owner); |
1082 | 0 | } |
1083 | 0 | } |
1084 | | |
1085 | | /** |
1086 | | * Canonicalize Rdata in buffer. |
1087 | | * @param buf: buffer at position just after the rdata. |
1088 | | * @param rrset: rrset with type. |
1089 | | * @param len: length of the rdata (including rdatalen uint16). |
1090 | | */ |
1091 | | static void |
1092 | | canonicalize_rdata(sldns_buffer* buf, struct ub_packed_rrset_key* rrset, |
1093 | | size_t len) |
1094 | 0 | { |
1095 | 0 | uint8_t* datstart = sldns_buffer_current(buf)-len+2; |
1096 | 0 | switch(ntohs(rrset->rk.type)) { |
1097 | 0 | case LDNS_RR_TYPE_NXT: |
1098 | 0 | case LDNS_RR_TYPE_NS: |
1099 | 0 | case LDNS_RR_TYPE_MD: |
1100 | 0 | case LDNS_RR_TYPE_MF: |
1101 | 0 | case LDNS_RR_TYPE_CNAME: |
1102 | 0 | case LDNS_RR_TYPE_MB: |
1103 | 0 | case LDNS_RR_TYPE_MG: |
1104 | 0 | case LDNS_RR_TYPE_MR: |
1105 | 0 | case LDNS_RR_TYPE_PTR: |
1106 | 0 | case LDNS_RR_TYPE_DNAME: |
1107 | | /* type only has a single argument, the name */ |
1108 | 0 | query_dname_tolower(datstart); |
1109 | 0 | return; |
1110 | 0 | case LDNS_RR_TYPE_MINFO: |
1111 | 0 | case LDNS_RR_TYPE_RP: |
1112 | 0 | case LDNS_RR_TYPE_SOA: |
1113 | | /* two names after another */ |
1114 | 0 | query_dname_tolower(datstart); |
1115 | 0 | query_dname_tolower(datstart + |
1116 | 0 | dname_valid(datstart, len-2)); |
1117 | 0 | return; |
1118 | 0 | case LDNS_RR_TYPE_RT: |
1119 | 0 | case LDNS_RR_TYPE_AFSDB: |
1120 | 0 | case LDNS_RR_TYPE_KX: |
1121 | 0 | case LDNS_RR_TYPE_MX: |
1122 | | /* skip fixed part */ |
1123 | 0 | if(len < 2+2+1) /* rdlen, skiplen, 1byteroot */ |
1124 | 0 | return; |
1125 | 0 | datstart += 2; |
1126 | 0 | query_dname_tolower(datstart); |
1127 | 0 | return; |
1128 | 0 | case LDNS_RR_TYPE_SIG: |
1129 | | /* downcase the RRSIG, compat with BIND (kept it from SIG) */ |
1130 | 0 | case LDNS_RR_TYPE_RRSIG: |
1131 | | /* skip fixed part */ |
1132 | 0 | if(len < 2+18+1) |
1133 | 0 | return; |
1134 | 0 | datstart += 18; |
1135 | 0 | query_dname_tolower(datstart); |
1136 | 0 | return; |
1137 | 0 | case LDNS_RR_TYPE_PX: |
1138 | | /* skip, then two names after another */ |
1139 | 0 | if(len < 2+2+1) |
1140 | 0 | return; |
1141 | 0 | datstart += 2; |
1142 | 0 | query_dname_tolower(datstart); |
1143 | 0 | query_dname_tolower(datstart + |
1144 | 0 | dname_valid(datstart, len-2-2)); |
1145 | 0 | return; |
1146 | 0 | case LDNS_RR_TYPE_NAPTR: |
1147 | 0 | if(len < 2+4) |
1148 | 0 | return; |
1149 | 0 | len -= 2+4; |
1150 | 0 | datstart += 4; |
1151 | 0 | if(len < (size_t)datstart[0]+1) /* skip text field */ |
1152 | 0 | return; |
1153 | 0 | len -= (size_t)datstart[0]+1; |
1154 | 0 | datstart += (size_t)datstart[0]+1; |
1155 | 0 | if(len < (size_t)datstart[0]+1) /* skip text field */ |
1156 | 0 | return; |
1157 | 0 | len -= (size_t)datstart[0]+1; |
1158 | 0 | datstart += (size_t)datstart[0]+1; |
1159 | 0 | if(len < (size_t)datstart[0]+1) /* skip text field */ |
1160 | 0 | return; |
1161 | 0 | len -= (size_t)datstart[0]+1; |
1162 | 0 | datstart += (size_t)datstart[0]+1; |
1163 | 0 | if(len < 1) /* check name is at least 1 byte*/ |
1164 | 0 | return; |
1165 | 0 | query_dname_tolower(datstart); |
1166 | 0 | return; |
1167 | 0 | case LDNS_RR_TYPE_SRV: |
1168 | | /* skip fixed part */ |
1169 | 0 | if(len < 2+6+1) |
1170 | 0 | return; |
1171 | 0 | datstart += 6; |
1172 | 0 | query_dname_tolower(datstart); |
1173 | 0 | return; |
1174 | | |
1175 | | /* do not canonicalize NSEC rdata name, compat with |
1176 | | * from bind 9.4 signer, where it does not do so */ |
1177 | 0 | case LDNS_RR_TYPE_NSEC: /* type starts with the name */ |
1178 | 0 | case LDNS_RR_TYPE_HINFO: /* not downcased */ |
1179 | | /* A6 not supported */ |
1180 | 0 | default: |
1181 | | /* nothing to do for unknown types */ |
1182 | 0 | return; |
1183 | 0 | } |
1184 | 0 | } |
1185 | | |
1186 | | int rrset_canonical_equal(struct regional* region, |
1187 | | struct ub_packed_rrset_key* k1, struct ub_packed_rrset_key* k2) |
1188 | 0 | { |
1189 | 0 | struct rbtree_type sortree1, sortree2; |
1190 | 0 | struct canon_rr *rrs1, *rrs2, *p1, *p2; |
1191 | 0 | struct packed_rrset_data* d1=(struct packed_rrset_data*)k1->entry.data; |
1192 | 0 | struct packed_rrset_data* d2=(struct packed_rrset_data*)k2->entry.data; |
1193 | 0 | struct ub_packed_rrset_key fk; |
1194 | 0 | struct packed_rrset_data fd; |
1195 | 0 | size_t flen[2]; |
1196 | 0 | uint8_t* fdata[2]; |
1197 | | |
1198 | | /* basic compare */ |
1199 | 0 | if(k1->rk.dname_len != k2->rk.dname_len || |
1200 | 0 | k1->rk.flags != k2->rk.flags || |
1201 | 0 | k1->rk.type != k2->rk.type || |
1202 | 0 | k1->rk.rrset_class != k2->rk.rrset_class || |
1203 | 0 | query_dname_compare(k1->rk.dname, k2->rk.dname) != 0) |
1204 | 0 | return 0; |
1205 | 0 | if(d1->ttl != d2->ttl || |
1206 | 0 | d1->count != d2->count || |
1207 | 0 | d1->rrsig_count != d2->rrsig_count || |
1208 | 0 | d1->trust != d2->trust || |
1209 | 0 | d1->security != d2->security) |
1210 | 0 | return 0; |
1211 | | |
1212 | | /* init */ |
1213 | 0 | memset(&fk, 0, sizeof(fk)); |
1214 | 0 | memset(&fd, 0, sizeof(fd)); |
1215 | 0 | fk.entry.data = &fd; |
1216 | 0 | fd.count = 2; |
1217 | 0 | fd.rr_len = flen; |
1218 | 0 | fd.rr_data = fdata; |
1219 | 0 | rbtree_init(&sortree1, &canonical_tree_compare); |
1220 | 0 | rbtree_init(&sortree2, &canonical_tree_compare); |
1221 | 0 | if(d1->count > RR_COUNT_MAX || d2->count > RR_COUNT_MAX) |
1222 | 0 | return 1; /* protection against integer overflow */ |
1223 | 0 | rrs1 = regional_alloc(region, sizeof(struct canon_rr)*d1->count); |
1224 | 0 | rrs2 = regional_alloc(region, sizeof(struct canon_rr)*d2->count); |
1225 | 0 | if(!rrs1 || !rrs2) return 1; /* alloc failure */ |
1226 | | |
1227 | | /* sort */ |
1228 | 0 | canonical_sort(k1, d1, &sortree1, rrs1); |
1229 | 0 | canonical_sort(k2, d2, &sortree2, rrs2); |
1230 | | |
1231 | | /* compare canonical-sorted RRs for canonical-equality */ |
1232 | 0 | if(sortree1.count != sortree2.count) |
1233 | 0 | return 0; |
1234 | 0 | p1 = (struct canon_rr*)rbtree_first(&sortree1); |
1235 | 0 | p2 = (struct canon_rr*)rbtree_first(&sortree2); |
1236 | 0 | while(p1 != (struct canon_rr*)RBTREE_NULL && |
1237 | 0 | p2 != (struct canon_rr*)RBTREE_NULL) { |
1238 | 0 | flen[0] = d1->rr_len[p1->rr_idx]; |
1239 | 0 | flen[1] = d2->rr_len[p2->rr_idx]; |
1240 | 0 | fdata[0] = d1->rr_data[p1->rr_idx]; |
1241 | 0 | fdata[1] = d2->rr_data[p2->rr_idx]; |
1242 | |
|
1243 | 0 | if(canonical_compare(&fk, 0, 1) != 0) |
1244 | 0 | return 0; |
1245 | 0 | p1 = (struct canon_rr*)rbtree_next(&p1->node); |
1246 | 0 | p2 = (struct canon_rr*)rbtree_next(&p2->node); |
1247 | 0 | } |
1248 | 0 | return 1; |
1249 | 0 | } |
1250 | | |
1251 | | /** |
1252 | | * Create canonical form of rrset in the scratch buffer. |
1253 | | * @param region: temporary region. |
1254 | | * @param buf: the buffer to use. |
1255 | | * @param k: the rrset to insert. |
1256 | | * @param sig: RRSIG rdata to include. |
1257 | | * @param siglen: RRSIG rdata len excluding signature field, but inclusive |
1258 | | * signer name length. |
1259 | | * @param sortree: if NULL is passed a new sorted rrset tree is built. |
1260 | | * Otherwise it is reused. |
1261 | | * @param section: section of packet where this rrset comes from. |
1262 | | * @param qstate: qstate with region. |
1263 | | * @return false on alloc error. |
1264 | | */ |
1265 | | static int |
1266 | | rrset_canonical(struct regional* region, sldns_buffer* buf, |
1267 | | struct ub_packed_rrset_key* k, uint8_t* sig, size_t siglen, |
1268 | | struct rbtree_type** sortree, sldns_pkt_section section, |
1269 | | struct module_qstate* qstate) |
1270 | 0 | { |
1271 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
1272 | 0 | uint8_t* can_owner = NULL; |
1273 | 0 | size_t can_owner_len = 0; |
1274 | 0 | struct canon_rr* walk; |
1275 | 0 | struct canon_rr* rrs; |
1276 | |
|
1277 | 0 | if(!*sortree) { |
1278 | 0 | *sortree = (struct rbtree_type*)regional_alloc(region, |
1279 | 0 | sizeof(rbtree_type)); |
1280 | 0 | if(!*sortree) |
1281 | 0 | return 0; |
1282 | 0 | if(d->count > RR_COUNT_MAX) |
1283 | 0 | return 0; /* integer overflow protection */ |
1284 | 0 | rrs = regional_alloc(region, sizeof(struct canon_rr)*d->count); |
1285 | 0 | if(!rrs) { |
1286 | 0 | *sortree = NULL; |
1287 | 0 | return 0; |
1288 | 0 | } |
1289 | 0 | rbtree_init(*sortree, &canonical_tree_compare); |
1290 | 0 | canonical_sort(k, d, *sortree, rrs); |
1291 | 0 | } |
1292 | | |
1293 | 0 | sldns_buffer_clear(buf); |
1294 | 0 | sldns_buffer_write(buf, sig, siglen); |
1295 | | /* canonicalize signer name */ |
1296 | 0 | query_dname_tolower(sldns_buffer_begin(buf)+18); |
1297 | 0 | RBTREE_FOR(walk, struct canon_rr*, (*sortree)) { |
1298 | | /* see if there is enough space left in the buffer */ |
1299 | 0 | if(sldns_buffer_remaining(buf) < can_owner_len + 2 + 2 + 4 |
1300 | 0 | + d->rr_len[walk->rr_idx]) { |
1301 | 0 | log_err("verify: failed to canonicalize, " |
1302 | 0 | "rrset too big"); |
1303 | 0 | return 0; |
1304 | 0 | } |
1305 | | /* determine canonical owner name */ |
1306 | 0 | if(can_owner) |
1307 | 0 | sldns_buffer_write(buf, can_owner, can_owner_len); |
1308 | 0 | else insert_can_owner(buf, k, sig, &can_owner, |
1309 | 0 | &can_owner_len); |
1310 | 0 | sldns_buffer_write(buf, &k->rk.type, 2); |
1311 | 0 | sldns_buffer_write(buf, &k->rk.rrset_class, 2); |
1312 | 0 | sldns_buffer_write(buf, sig+4, 4); |
1313 | 0 | sldns_buffer_write(buf, d->rr_data[walk->rr_idx], |
1314 | 0 | d->rr_len[walk->rr_idx]); |
1315 | 0 | canonicalize_rdata(buf, k, d->rr_len[walk->rr_idx]); |
1316 | 0 | } |
1317 | 0 | sldns_buffer_flip(buf); |
1318 | | |
1319 | | /* Replace RR owner with canonical owner for NSEC records in authority |
1320 | | * section, to prevent that a wildcard synthesized NSEC can be used in |
1321 | | * the non-existence proves. */ |
1322 | 0 | if(ntohs(k->rk.type) == LDNS_RR_TYPE_NSEC && |
1323 | 0 | section == LDNS_SECTION_AUTHORITY && qstate) { |
1324 | 0 | k->rk.dname = regional_alloc_init(qstate->region, can_owner, |
1325 | 0 | can_owner_len); |
1326 | 0 | if(!k->rk.dname) |
1327 | 0 | return 0; |
1328 | 0 | k->rk.dname_len = can_owner_len; |
1329 | 0 | } |
1330 | | |
1331 | | |
1332 | 0 | return 1; |
1333 | 0 | } |
1334 | | |
1335 | | int |
1336 | | rrset_canonicalize_to_buffer(struct regional* region, sldns_buffer* buf, |
1337 | | struct ub_packed_rrset_key* k) |
1338 | 0 | { |
1339 | 0 | struct rbtree_type* sortree = NULL; |
1340 | 0 | struct packed_rrset_data* d = (struct packed_rrset_data*)k->entry.data; |
1341 | 0 | uint8_t* can_owner = NULL; |
1342 | 0 | size_t can_owner_len = 0; |
1343 | 0 | struct canon_rr* walk; |
1344 | 0 | struct canon_rr* rrs; |
1345 | |
|
1346 | 0 | sortree = (struct rbtree_type*)regional_alloc(region, |
1347 | 0 | sizeof(rbtree_type)); |
1348 | 0 | if(!sortree) |
1349 | 0 | return 0; |
1350 | 0 | if(d->count > RR_COUNT_MAX) |
1351 | 0 | return 0; /* integer overflow protection */ |
1352 | 0 | rrs = regional_alloc(region, sizeof(struct canon_rr)*d->count); |
1353 | 0 | if(!rrs) { |
1354 | 0 | return 0; |
1355 | 0 | } |
1356 | 0 | rbtree_init(sortree, &canonical_tree_compare); |
1357 | 0 | canonical_sort(k, d, sortree, rrs); |
1358 | |
|
1359 | 0 | sldns_buffer_clear(buf); |
1360 | 0 | RBTREE_FOR(walk, struct canon_rr*, sortree) { |
1361 | | /* see if there is enough space left in the buffer */ |
1362 | 0 | if(sldns_buffer_remaining(buf) < can_owner_len + 2 + 2 + 4 |
1363 | 0 | + d->rr_len[walk->rr_idx]) { |
1364 | 0 | log_err("verify: failed to canonicalize, " |
1365 | 0 | "rrset too big"); |
1366 | 0 | return 0; |
1367 | 0 | } |
1368 | | /* determine canonical owner name */ |
1369 | 0 | if(can_owner) |
1370 | 0 | sldns_buffer_write(buf, can_owner, can_owner_len); |
1371 | 0 | else { |
1372 | 0 | can_owner = sldns_buffer_current(buf); |
1373 | 0 | sldns_buffer_write(buf, k->rk.dname, k->rk.dname_len); |
1374 | 0 | query_dname_tolower(can_owner); |
1375 | 0 | can_owner_len = k->rk.dname_len; |
1376 | 0 | } |
1377 | 0 | sldns_buffer_write(buf, &k->rk.type, 2); |
1378 | 0 | sldns_buffer_write(buf, &k->rk.rrset_class, 2); |
1379 | 0 | sldns_buffer_write_u32(buf, d->rr_ttl[walk->rr_idx]); |
1380 | 0 | sldns_buffer_write(buf, d->rr_data[walk->rr_idx], |
1381 | 0 | d->rr_len[walk->rr_idx]); |
1382 | 0 | canonicalize_rdata(buf, k, d->rr_len[walk->rr_idx]); |
1383 | 0 | } |
1384 | 0 | sldns_buffer_flip(buf); |
1385 | 0 | return 1; |
1386 | 0 | } |
1387 | | |
1388 | | /** pretty print rrsig error with dates */ |
1389 | | static void |
1390 | | sigdate_error(const char* str, int32_t expi, int32_t incep, int32_t now) |
1391 | 0 | { |
1392 | 0 | struct tm tm; |
1393 | 0 | char expi_buf[16]; |
1394 | 0 | char incep_buf[16]; |
1395 | 0 | char now_buf[16]; |
1396 | 0 | time_t te, ti, tn; |
1397 | |
|
1398 | 0 | if(verbosity < VERB_QUERY) |
1399 | 0 | return; |
1400 | 0 | te = (time_t)expi; |
1401 | 0 | ti = (time_t)incep; |
1402 | 0 | tn = (time_t)now; |
1403 | 0 | memset(&tm, 0, sizeof(tm)); |
1404 | 0 | if(gmtime_r(&te, &tm) && strftime(expi_buf, 15, "%Y%m%d%H%M%S", &tm) |
1405 | 0 | &&gmtime_r(&ti, &tm) && strftime(incep_buf, 15, "%Y%m%d%H%M%S", &tm) |
1406 | 0 | &&gmtime_r(&tn, &tm) && strftime(now_buf, 15, "%Y%m%d%H%M%S", &tm)) { |
1407 | 0 | log_info("%s expi=%s incep=%s now=%s", str, expi_buf, |
1408 | 0 | incep_buf, now_buf); |
1409 | 0 | } else |
1410 | 0 | log_info("%s expi=%u incep=%u now=%u", str, (unsigned)expi, |
1411 | 0 | (unsigned)incep, (unsigned)now); |
1412 | 0 | } |
1413 | | |
1414 | | /** check rrsig dates */ |
1415 | | static int |
1416 | | check_dates(struct val_env* ve, uint32_t unow, uint8_t* expi_p, |
1417 | | uint8_t* incep_p, char** reason, sldns_ede_code *reason_bogus) |
1418 | 0 | { |
1419 | | /* read out the dates */ |
1420 | 0 | uint32_t expi, incep, now; |
1421 | 0 | memmove(&expi, expi_p, sizeof(expi)); |
1422 | 0 | memmove(&incep, incep_p, sizeof(incep)); |
1423 | 0 | expi = ntohl(expi); |
1424 | 0 | incep = ntohl(incep); |
1425 | | |
1426 | | /* get current date */ |
1427 | 0 | if(ve->date_override) { |
1428 | 0 | if(ve->date_override == -1) { |
1429 | 0 | verbose(VERB_ALGO, "date override: ignore date"); |
1430 | 0 | return 1; |
1431 | 0 | } |
1432 | 0 | now = ve->date_override; |
1433 | 0 | verbose(VERB_ALGO, "date override option %d", (int)now); |
1434 | 0 | } else now = unow; |
1435 | | |
1436 | | /* check them */ |
1437 | 0 | if(compare_1982(incep, expi) > 0) { |
1438 | 0 | sigdate_error("verify: inception after expiration, " |
1439 | 0 | "signature bad", expi, incep, now); |
1440 | 0 | *reason = "signature inception after expiration"; |
1441 | 0 | if(reason_bogus){ |
1442 | | /* from RFC8914 on Signature Not Yet Valid: The resolver |
1443 | | * attempted to perform DNSSEC validation, but no |
1444 | | * signatures are presently valid and at least some are |
1445 | | * not yet valid. */ |
1446 | 0 | *reason_bogus = LDNS_EDE_SIGNATURE_NOT_YET_VALID; |
1447 | 0 | } |
1448 | |
|
1449 | 0 | return 0; |
1450 | 0 | } |
1451 | 0 | if(compare_1982(incep, now) > 0) { |
1452 | | /* within skew ? (calc here to avoid calculation normally) */ |
1453 | 0 | uint32_t skew = subtract_1982(incep, expi)/10; |
1454 | 0 | if(skew < (uint32_t)ve->skew_min) skew = ve->skew_min; |
1455 | 0 | if(skew > (uint32_t)ve->skew_max) skew = ve->skew_max; |
1456 | 0 | if(subtract_1982(now, incep) > skew) { |
1457 | 0 | sigdate_error("verify: signature bad, current time is" |
1458 | 0 | " before inception date", expi, incep, now); |
1459 | 0 | *reason = "signature before inception date"; |
1460 | 0 | if(reason_bogus) |
1461 | 0 | *reason_bogus = LDNS_EDE_SIGNATURE_NOT_YET_VALID; |
1462 | 0 | return 0; |
1463 | 0 | } |
1464 | 0 | sigdate_error("verify warning suspicious signature inception " |
1465 | 0 | " or bad local clock", expi, incep, now); |
1466 | 0 | } |
1467 | 0 | if(compare_1982(now, expi) > 0) { |
1468 | 0 | uint32_t skew = subtract_1982(incep, expi)/10; |
1469 | 0 | if(skew < (uint32_t)ve->skew_min) skew = ve->skew_min; |
1470 | 0 | if(skew > (uint32_t)ve->skew_max) skew = ve->skew_max; |
1471 | 0 | if(subtract_1982(expi, now) > skew) { |
1472 | 0 | sigdate_error("verify: signature expired", expi, |
1473 | 0 | incep, now); |
1474 | 0 | *reason = "signature expired"; |
1475 | 0 | if(reason_bogus) |
1476 | 0 | *reason_bogus = LDNS_EDE_SIGNATURE_EXPIRED; |
1477 | 0 | return 0; |
1478 | 0 | } |
1479 | 0 | sigdate_error("verify warning suspicious signature expiration " |
1480 | 0 | " or bad local clock", expi, incep, now); |
1481 | 0 | } |
1482 | 0 | return 1; |
1483 | 0 | } |
1484 | | |
1485 | | /** adjust rrset TTL for verified rrset, compare to original TTL and expi */ |
1486 | | static void |
1487 | | adjust_ttl(struct val_env* ve, uint32_t unow, |
1488 | | struct ub_packed_rrset_key* rrset, uint8_t* orig_p, |
1489 | | uint8_t* expi_p, uint8_t* incep_p) |
1490 | 0 | { |
1491 | 0 | struct packed_rrset_data* d = |
1492 | 0 | (struct packed_rrset_data*)rrset->entry.data; |
1493 | | /* read out the dates */ |
1494 | 0 | int32_t origttl, expittl, expi, incep, now; |
1495 | 0 | memmove(&origttl, orig_p, sizeof(origttl)); |
1496 | 0 | memmove(&expi, expi_p, sizeof(expi)); |
1497 | 0 | memmove(&incep, incep_p, sizeof(incep)); |
1498 | 0 | expi = ntohl(expi); |
1499 | 0 | incep = ntohl(incep); |
1500 | 0 | origttl = ntohl(origttl); |
1501 | | |
1502 | | /* get current date */ |
1503 | 0 | if(ve->date_override) { |
1504 | 0 | now = ve->date_override; |
1505 | 0 | } else now = (int32_t)unow; |
1506 | 0 | expittl = (int32_t)((uint32_t)expi - (uint32_t)now); |
1507 | | |
1508 | | /* so now: |
1509 | | * d->ttl: rrset ttl read from message or cache. May be reduced |
1510 | | * origttl: original TTL from signature, authoritative TTL max. |
1511 | | * MIN_TTL: minimum TTL from config. |
1512 | | * expittl: TTL until the signature expires. |
1513 | | * |
1514 | | * Use the smallest of these, but don't let origttl set the TTL |
1515 | | * below the minimum. |
1516 | | */ |
1517 | 0 | if(MIN_TTL > (time_t)origttl && d->ttl > MIN_TTL) { |
1518 | 0 | verbose(VERB_QUERY, "rrset TTL larger than original and minimum" |
1519 | 0 | " TTL, adjusting TTL downwards to minimum ttl"); |
1520 | 0 | d->ttl = MIN_TTL; |
1521 | 0 | } |
1522 | 0 | else if(MIN_TTL <= origttl && d->ttl > (time_t)origttl) { |
1523 | 0 | verbose(VERB_QUERY, "rrset TTL larger than original TTL, " |
1524 | 0 | "adjusting TTL downwards to original ttl"); |
1525 | 0 | d->ttl = origttl; |
1526 | 0 | } |
1527 | |
|
1528 | 0 | if(expittl > 0 && d->ttl > (time_t)expittl) { |
1529 | 0 | verbose(VERB_ALGO, "rrset TTL larger than sig expiration ttl," |
1530 | 0 | " adjusting TTL downwards"); |
1531 | 0 | d->ttl = expittl; |
1532 | 0 | } |
1533 | 0 | } |
1534 | | |
1535 | | enum sec_status |
1536 | | dnskey_verify_rrset_sig(struct regional* region, sldns_buffer* buf, |
1537 | | struct val_env* ve, time_t now, |
1538 | | struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, |
1539 | | size_t dnskey_idx, size_t sig_idx, |
1540 | | struct rbtree_type** sortree, int* buf_canon, |
1541 | | char** reason, sldns_ede_code *reason_bogus, |
1542 | | sldns_pkt_section section, struct module_qstate* qstate) |
1543 | 0 | { |
1544 | 0 | enum sec_status sec; |
1545 | 0 | uint8_t* sig; /* RRSIG rdata */ |
1546 | 0 | size_t siglen; |
1547 | 0 | size_t rrnum = rrset_get_count(rrset); |
1548 | 0 | uint8_t* signer; /* rrsig signer name */ |
1549 | 0 | size_t signer_len; |
1550 | 0 | unsigned char* sigblock; /* signature rdata field */ |
1551 | 0 | unsigned int sigblock_len; |
1552 | 0 | uint16_t ktag; /* DNSKEY key tag */ |
1553 | 0 | unsigned char* key; /* public key rdata field */ |
1554 | 0 | unsigned int keylen; |
1555 | 0 | rrset_get_rdata(rrset, rrnum + sig_idx, &sig, &siglen); |
1556 | | /* min length of rdatalen, fixed rrsig, root signer, 1 byte sig */ |
1557 | 0 | if(siglen < 2+20) { |
1558 | 0 | verbose(VERB_QUERY, "verify: signature too short"); |
1559 | 0 | *reason = "signature too short"; |
1560 | 0 | if(reason_bogus) |
1561 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1562 | 0 | return sec_status_bogus; |
1563 | 0 | } |
1564 | | |
1565 | 0 | if(!(dnskey_get_flags(dnskey, dnskey_idx) & DNSKEY_BIT_ZSK)) { |
1566 | 0 | verbose(VERB_QUERY, "verify: dnskey without ZSK flag"); |
1567 | 0 | *reason = "dnskey without ZSK flag"; |
1568 | 0 | if(reason_bogus) |
1569 | 0 | *reason_bogus = LDNS_EDE_NO_ZONE_KEY_BIT_SET; |
1570 | 0 | return sec_status_bogus; |
1571 | 0 | } |
1572 | | |
1573 | 0 | if(dnskey_get_protocol(dnskey, dnskey_idx) != LDNS_DNSSEC_KEYPROTO) { |
1574 | | /* RFC 4034 says DNSKEY PROTOCOL MUST be 3 */ |
1575 | 0 | verbose(VERB_QUERY, "verify: dnskey has wrong key protocol"); |
1576 | 0 | *reason = "dnskey has wrong protocolnumber"; |
1577 | 0 | if(reason_bogus) |
1578 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1579 | 0 | return sec_status_bogus; |
1580 | 0 | } |
1581 | | |
1582 | | /* verify as many fields in rrsig as possible */ |
1583 | 0 | signer = sig+2+18; |
1584 | 0 | signer_len = dname_valid(signer, siglen-2-18); |
1585 | 0 | if(!signer_len) { |
1586 | 0 | verbose(VERB_QUERY, "verify: malformed signer name"); |
1587 | 0 | *reason = "signer name malformed"; |
1588 | 0 | if(reason_bogus) |
1589 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1590 | 0 | return sec_status_bogus; /* signer name invalid */ |
1591 | 0 | } |
1592 | 0 | if(!dname_subdomain_c(rrset->rk.dname, signer)) { |
1593 | 0 | verbose(VERB_QUERY, "verify: signer name is off-tree"); |
1594 | 0 | *reason = "signer name off-tree"; |
1595 | 0 | if(reason_bogus) |
1596 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1597 | 0 | return sec_status_bogus; /* signer name offtree */ |
1598 | 0 | } |
1599 | 0 | sigblock = (unsigned char*)signer+signer_len; |
1600 | 0 | if(siglen < 2+18+signer_len+1) { |
1601 | 0 | verbose(VERB_QUERY, "verify: too short, no signature data"); |
1602 | 0 | *reason = "signature too short, no signature data"; |
1603 | 0 | if(reason_bogus) |
1604 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1605 | 0 | return sec_status_bogus; /* sig rdf is < 1 byte */ |
1606 | 0 | } |
1607 | 0 | sigblock_len = (unsigned int)(siglen - 2 - 18 - signer_len); |
1608 | | |
1609 | | /* verify key dname == sig signer name */ |
1610 | 0 | if(query_dname_compare(signer, dnskey->rk.dname) != 0) { |
1611 | 0 | verbose(VERB_QUERY, "verify: wrong key for rrsig"); |
1612 | 0 | log_nametypeclass(VERB_QUERY, "RRSIG signername is", |
1613 | 0 | signer, 0, 0); |
1614 | 0 | log_nametypeclass(VERB_QUERY, "the key name is", |
1615 | 0 | dnskey->rk.dname, 0, 0); |
1616 | 0 | *reason = "signer name mismatches key name"; |
1617 | 0 | if(reason_bogus) |
1618 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1619 | 0 | return sec_status_bogus; |
1620 | 0 | } |
1621 | | |
1622 | | /* verify covered type */ |
1623 | | /* memcmp works because type is in network format for rrset */ |
1624 | 0 | if(memcmp(sig+2, &rrset->rk.type, 2) != 0) { |
1625 | 0 | verbose(VERB_QUERY, "verify: wrong type covered"); |
1626 | 0 | *reason = "signature covers wrong type"; |
1627 | 0 | if(reason_bogus) |
1628 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1629 | 0 | return sec_status_bogus; |
1630 | 0 | } |
1631 | | /* verify keytag and sig algo (possibly again) */ |
1632 | 0 | if((int)sig[2+2] != dnskey_get_algo(dnskey, dnskey_idx)) { |
1633 | 0 | verbose(VERB_QUERY, "verify: wrong algorithm"); |
1634 | 0 | *reason = "signature has wrong algorithm"; |
1635 | 0 | if(reason_bogus) |
1636 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1637 | 0 | return sec_status_bogus; |
1638 | 0 | } |
1639 | 0 | ktag = htons(dnskey_calc_keytag(dnskey, dnskey_idx)); |
1640 | 0 | if(memcmp(sig+2+16, &ktag, 2) != 0) { |
1641 | 0 | verbose(VERB_QUERY, "verify: wrong keytag"); |
1642 | 0 | *reason = "signature has wrong keytag"; |
1643 | 0 | if(reason_bogus) |
1644 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1645 | 0 | return sec_status_bogus; |
1646 | 0 | } |
1647 | | |
1648 | | /* verify labels is in a valid range */ |
1649 | 0 | if((int)sig[2+3] > dname_signame_label_count(rrset->rk.dname)) { |
1650 | 0 | verbose(VERB_QUERY, "verify: labelcount out of range"); |
1651 | 0 | *reason = "signature labelcount out of range"; |
1652 | 0 | if(reason_bogus) |
1653 | 0 | *reason_bogus = LDNS_EDE_DNSSEC_BOGUS; |
1654 | 0 | return sec_status_bogus; |
1655 | 0 | } |
1656 | | |
1657 | | /* original ttl, always ok */ |
1658 | | |
1659 | 0 | if(!*buf_canon) { |
1660 | | /* create rrset canonical format in buffer, ready for |
1661 | | * signature */ |
1662 | 0 | if(!rrset_canonical(region, buf, rrset, sig+2, |
1663 | 0 | 18 + signer_len, sortree, section, qstate)) { |
1664 | 0 | log_err("verify: failed due to alloc error"); |
1665 | 0 | return sec_status_unchecked; |
1666 | 0 | } |
1667 | 0 | *buf_canon = 1; |
1668 | 0 | } |
1669 | | |
1670 | | /* check that dnskey is available */ |
1671 | 0 | dnskey_get_pubkey(dnskey, dnskey_idx, &key, &keylen); |
1672 | 0 | if(!key) { |
1673 | 0 | verbose(VERB_QUERY, "verify: short DNSKEY RR"); |
1674 | 0 | return sec_status_unchecked; |
1675 | 0 | } |
1676 | | |
1677 | | /* verify */ |
1678 | 0 | sec = verify_canonrrset(buf, (int)sig[2+2], |
1679 | 0 | sigblock, sigblock_len, key, keylen, reason); |
1680 | | |
1681 | 0 | if(sec == sec_status_secure) { |
1682 | | /* check if TTL is too high - reduce if so */ |
1683 | 0 | adjust_ttl(ve, now, rrset, sig+2+4, sig+2+8, sig+2+12); |
1684 | | |
1685 | | /* verify inception, expiration dates |
1686 | | * Do this last so that if you ignore expired-sigs the |
1687 | | * rest is sure to be OK. */ |
1688 | 0 | if(!check_dates(ve, now, sig+2+8, sig+2+12, |
1689 | 0 | reason, reason_bogus)) { |
1690 | 0 | return sec_status_bogus; |
1691 | 0 | } |
1692 | 0 | } |
1693 | | |
1694 | 0 | return sec; |
1695 | 0 | } |