Coverage Report

Created: 2025-08-29 06:30

/src/unbound/validator/val_nsec3.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * validator/val_nsec3.c - validator NSEC3 denial of existence functions.
3
 *
4
 * Copyright (c) 2007, NLnet Labs. All rights reserved.
5
 *
6
 * This software is open source.
7
 * 
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 * 
12
 * Redistributions of source code must retain the above copyright notice,
13
 * this list of conditions and the following disclaimer.
14
 * 
15
 * Redistributions in binary form must reproduce the above copyright notice,
16
 * this list of conditions and the following disclaimer in the documentation
17
 * and/or other materials provided with the distribution.
18
 * 
19
 * Neither the name of the NLNET LABS nor the names of its contributors may
20
 * be used to endorse or promote products derived from this software without
21
 * specific prior written permission.
22
 * 
23
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26
 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27
 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29
 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30
 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31
 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32
 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33
 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34
 */
35
36
/**
37
 * \file
38
 *
39
 * This file contains helper functions for the validator module.
40
 * The functions help with NSEC3 checking, the different NSEC3 proofs
41
 * for denial of existence, and proofs for presence of types.
42
 */
43
#include "config.h"
44
#include <ctype.h>
45
#include "validator/val_nsec3.h"
46
#include "validator/val_secalgo.h"
47
#include "validator/validator.h"
48
#include "validator/val_kentry.h"
49
#include "services/cache/rrset.h"
50
#include "util/regional.h"
51
#include "util/rbtree.h"
52
#include "util/module.h"
53
#include "util/net_help.h"
54
#include "util/data/packed_rrset.h"
55
#include "util/data/dname.h"
56
#include "util/data/msgreply.h"
57
/* we include nsec.h for the bitmap_has_type function */
58
#include "validator/val_nsec.h"
59
#include "sldns/sbuffer.h"
60
#include "util/config_file.h"
61
62
/**
63
 * Max number of NSEC3 calculations at once, suspend query for later.
64
 * 8 is low enough and allows for cases where multiple proofs are needed.
65
 */
66
0
#define MAX_NSEC3_CALCULATIONS 8
67
/**
68
 * When all allowed NSEC3 calculations at once resulted in error treat as
69
 * bogus. NSEC3 hash errors are not cached and this helps breaks loops with
70
 * erroneous data.
71
 */
72
0
#define MAX_NSEC3_ERRORS -1
73
74
/** 
75
 * This function we get from ldns-compat or from base system 
76
 * it returns the number of data bytes stored at the target, or <0 on error.
77
 */
78
int sldns_b32_ntop_extended_hex(uint8_t const *src, size_t srclength,
79
  char *target, size_t targsize);
80
/** 
81
 * This function we get from ldns-compat or from base system 
82
 * it returns the number of data bytes stored at the target, or <0 on error.
83
 */
84
int sldns_b32_pton_extended_hex(char const *src, size_t hashed_owner_str_len, 
85
  uint8_t *target, size_t targsize);
86
87
/**
88
 * Closest encloser (ce) proof results
89
 * Contains the ce and the next-closer (nc) proof.
90
 */
91
struct ce_response {
92
  /** the closest encloser name */
93
  uint8_t* ce;
94
  /** length of ce */
95
  size_t ce_len;
96
  /** NSEC3 record that proved ce. rrset */
97
  struct ub_packed_rrset_key* ce_rrset;
98
  /** NSEC3 record that proved ce. rr number */
99
  int ce_rr;
100
  /** NSEC3 record that proved nc. rrset */
101
  struct ub_packed_rrset_key* nc_rrset;
102
  /** NSEC3 record that proved nc. rr*/
103
  int nc_rr;
104
};
105
106
/**
107
 * Filter conditions for NSEC3 proof
108
 * Used to iterate over the applicable NSEC3 RRs.
109
 */
110
struct nsec3_filter {
111
  /** Zone name, only NSEC3 records for this zone are considered */
112
  uint8_t* zone;
113
  /** length of the zonename */
114
  size_t zone_len;
115
  /** the list of NSEC3s to filter; array */
116
  struct ub_packed_rrset_key** list;
117
  /** number of rrsets in list */
118
  size_t num;
119
  /** class of records for the NSEC3, only this class applies */
120
  uint16_t fclass;
121
};
122
123
/** return number of rrs in an rrset */
124
static size_t
125
rrset_get_count(struct ub_packed_rrset_key* rrset)
126
0
{
127
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
128
0
          rrset->entry.data;
129
0
        if(!d) return 0;
130
0
        return d->count;
131
0
}
132
133
/** return if nsec3 RR has unknown flags */
134
static int
135
nsec3_unknown_flags(struct ub_packed_rrset_key* rrset, int r)
136
0
{
137
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
138
0
          rrset->entry.data;
139
0
  log_assert(d && r < (int)d->count);
140
0
  if(d->rr_len[r] < 2+2)
141
0
    return 0; /* malformed */
142
0
  return (int)(d->rr_data[r][2+1] & NSEC3_UNKNOWN_FLAGS);
143
0
}
144
145
int
146
nsec3_has_optout(struct ub_packed_rrset_key* rrset, int r)
147
0
{
148
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
149
0
          rrset->entry.data;
150
0
  log_assert(d && r < (int)d->count);
151
0
  if(d->rr_len[r] < 2+2)
152
0
    return 0; /* malformed */
153
0
  return (int)(d->rr_data[r][2+1] & NSEC3_OPTOUT);
154
0
}
155
156
/** return nsec3 RR algorithm */
157
static int
158
nsec3_get_algo(struct ub_packed_rrset_key* rrset, int r)
159
0
{
160
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
161
0
          rrset->entry.data;
162
0
  log_assert(d && r < (int)d->count);
163
0
  if(d->rr_len[r] < 2+1)
164
0
    return 0; /* malformed */
165
0
  return (int)(d->rr_data[r][2+0]);
166
0
}
167
168
/** return if nsec3 RR has known algorithm */
169
static int
170
nsec3_known_algo(struct ub_packed_rrset_key* rrset, int r)
171
0
{
172
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
173
0
          rrset->entry.data;
174
0
  log_assert(d && r < (int)d->count);
175
0
  if(d->rr_len[r] < 2+1)
176
0
    return 0; /* malformed */
177
0
  switch(d->rr_data[r][2+0]) {
178
0
    case NSEC3_HASH_SHA1:
179
0
      return 1;
180
0
  }
181
0
  return 0;
182
0
}
183
184
/** return nsec3 RR iteration count */
185
static size_t
186
nsec3_get_iter(struct ub_packed_rrset_key* rrset, int r)
187
0
{
188
0
  uint16_t i;
189
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
190
0
          rrset->entry.data;
191
0
  log_assert(d && r < (int)d->count);
192
0
  if(d->rr_len[r] < 2+4)
193
0
    return 0; /* malformed */
194
0
  memmove(&i, d->rr_data[r]+2+2, sizeof(i));
195
0
  i = ntohs(i);
196
0
  return (size_t)i;
197
0
}
198
199
/** return nsec3 RR salt */
200
static int
201
nsec3_get_salt(struct ub_packed_rrset_key* rrset, int r,
202
  uint8_t** salt, size_t* saltlen)
203
0
{
204
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
205
0
          rrset->entry.data;
206
0
  log_assert(d && r < (int)d->count);
207
0
  if(d->rr_len[r] < 2+5) {
208
0
    *salt = 0;
209
0
    *saltlen = 0;
210
0
    return 0; /* malformed */
211
0
  }
212
0
  *saltlen = (size_t)d->rr_data[r][2+4];
213
0
  if(d->rr_len[r] < 2+5+(size_t)*saltlen) {
214
0
    *salt = 0;
215
0
    *saltlen = 0;
216
0
    return 0; /* malformed */
217
0
  }
218
0
  *salt = d->rr_data[r]+2+5;
219
0
  return 1;
220
0
}
221
222
int nsec3_get_params(struct ub_packed_rrset_key* rrset, int r,
223
  int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
224
0
{
225
0
  if(!nsec3_known_algo(rrset, r) || nsec3_unknown_flags(rrset, r))
226
0
    return 0;
227
0
  if(!nsec3_get_salt(rrset, r, salt, saltlen))
228
0
    return 0;
229
0
  *algo = nsec3_get_algo(rrset, r);
230
0
  *iter = nsec3_get_iter(rrset, r);
231
0
  return 1;
232
0
}
233
234
int
235
nsec3_get_nextowner(struct ub_packed_rrset_key* rrset, int r,
236
  uint8_t** next, size_t* nextlen)
237
0
{
238
0
  size_t saltlen;
239
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
240
0
          rrset->entry.data;
241
0
  log_assert(d && r < (int)d->count);
242
0
  if(d->rr_len[r] < 2+5) {
243
0
    *next = 0;
244
0
    *nextlen = 0;
245
0
    return 0; /* malformed */
246
0
  }
247
0
  saltlen = (size_t)d->rr_data[r][2+4];
248
0
  if(d->rr_len[r] < 2+5+saltlen+1) {
249
0
    *next = 0;
250
0
    *nextlen = 0;
251
0
    return 0; /* malformed */
252
0
  }
253
0
  *nextlen = (size_t)d->rr_data[r][2+5+saltlen];
254
0
  if(d->rr_len[r] < 2+5+saltlen+1+*nextlen) {
255
0
    *next = 0;
256
0
    *nextlen = 0;
257
0
    return 0; /* malformed */
258
0
  }
259
0
  *next = d->rr_data[r]+2+5+saltlen+1;
260
0
  return 1;
261
0
}
262
263
size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone,
264
  size_t zonelen, uint8_t* buf, size_t max)
265
0
{
266
  /* write b32 of name, leave one for length */
267
0
  int ret;
268
0
  if(max < hashlen*2+1) /* quick approx of b32, as if hexb16 */
269
0
    return 0;
270
0
  ret = sldns_b32_ntop_extended_hex(hash, hashlen, (char*)buf+1, max-1);
271
0
  if(ret < 1) 
272
0
    return 0;
273
0
  buf[0] = (uint8_t)ret; /* length of b32 label */
274
0
  ret++;
275
0
  if(max - ret < zonelen)
276
0
    return 0;
277
0
  memmove(buf+ret, zone, zonelen);
278
0
  return zonelen+(size_t)ret;
279
0
}
280
281
size_t nsec3_get_nextowner_b32(struct ub_packed_rrset_key* rrset, int r,
282
  uint8_t* buf, size_t max)
283
0
{
284
0
  uint8_t* nm, *zone;
285
0
  size_t nmlen, zonelen;
286
0
  if(!nsec3_get_nextowner(rrset, r, &nm, &nmlen))
287
0
    return 0;
288
  /* append zone name; the owner name must be <b32>.zone */
289
0
  zone = rrset->rk.dname;
290
0
  zonelen = rrset->rk.dname_len;
291
0
  dname_remove_label(&zone, &zonelen);
292
0
  return nsec3_hash_to_b32(nm, nmlen, zone, zonelen, buf, max);
293
0
}
294
295
int
296
nsec3_has_type(struct ub_packed_rrset_key* rrset, int r, uint16_t type)
297
0
{
298
0
  uint8_t* bitmap;
299
0
  size_t bitlen, skiplen;
300
0
        struct packed_rrset_data* d = (struct packed_rrset_data*)
301
0
          rrset->entry.data;
302
0
  log_assert(d && r < (int)d->count);
303
0
  skiplen = 2+4;
304
  /* skip salt */
305
0
  if(d->rr_len[r] < skiplen+1)
306
0
    return 0; /* malformed, too short */
307
0
  skiplen += 1+(size_t)d->rr_data[r][skiplen]; 
308
  /* skip next hashed owner */
309
0
  if(d->rr_len[r] < skiplen+1)
310
0
    return 0; /* malformed, too short */
311
0
  skiplen += 1+(size_t)d->rr_data[r][skiplen]; 
312
0
  if(d->rr_len[r] < skiplen)
313
0
    return 0; /* malformed, too short */
314
0
  bitlen = d->rr_len[r] - skiplen;
315
0
  bitmap = d->rr_data[r]+skiplen;
316
0
  return nsecbitmap_has_type_rdata(bitmap, bitlen, type);
317
0
}
318
  
319
/** 
320
 * Iterate through NSEC3 list, per RR 
321
 * This routine gives the next RR in the list (or sets rrset null). 
322
 * Usage:
323
 *
324
 * size_t rrsetnum;
325
 * int rrnum;
326
 * struct ub_packed_rrset_key* rrset;
327
 * for(rrset=filter_first(filter, &rrsetnum, &rrnum); rrset; 
328
 *  rrset=filter_next(filter, &rrsetnum, &rrnum))
329
 *    do_stuff;
330
 * 
331
 * Also filters out 
332
 *  o unknown flag NSEC3s
333
 *  o unknown algorithm NSEC3s.
334
 * @param filter: nsec3 filter structure.
335
 * @param rrsetnum: in/out rrset number to look at.
336
 * @param rrnum: in/out rr number in rrset to look at.
337
 * @returns ptr to the next rrset (or NULL at end).
338
 */
339
static struct ub_packed_rrset_key*
340
filter_next(struct nsec3_filter* filter, size_t* rrsetnum, int* rrnum)
341
0
{
342
0
  size_t i;
343
0
  int r;
344
0
  uint8_t* nm;
345
0
  size_t nmlen;
346
0
  if(!filter->zone) /* empty list */
347
0
    return NULL;
348
0
  for(i=*rrsetnum; i<filter->num; i++) {
349
    /* see if RRset qualifies */
350
0
    if(ntohs(filter->list[i]->rk.type) != LDNS_RR_TYPE_NSEC3 ||
351
0
      ntohs(filter->list[i]->rk.rrset_class) != 
352
0
      filter->fclass) 
353
0
      continue;
354
    /* check RRset zone */
355
0
    nm = filter->list[i]->rk.dname;
356
0
    nmlen = filter->list[i]->rk.dname_len;
357
0
    dname_remove_label(&nm, &nmlen);
358
0
    if(query_dname_compare(nm, filter->zone) != 0)
359
0
      continue;
360
0
    if(i == *rrsetnum)
361
0
      r = (*rrnum) + 1; /* continue at next RR */
362
0
    else  r = 0;   /* new RRset start at first RR */
363
0
    for(; r < (int)rrset_get_count(filter->list[i]); r++) {
364
      /* skip unknown flags, algo */
365
0
      if(nsec3_unknown_flags(filter->list[i], r) ||
366
0
        !nsec3_known_algo(filter->list[i], r))
367
0
        continue;
368
      /* this one is a good target */
369
0
      *rrsetnum = i;
370
0
      *rrnum = r;
371
0
      return filter->list[i];
372
0
    }
373
0
  }
374
0
  return NULL;
375
0
}
376
377
/**
378
 * Start iterating over NSEC3 records.
379
 * @param filter: the filter structure, must have been filter_init-ed.
380
 * @param rrsetnum: can be undefined on call, initialised.
381
 * @param rrnum: can be undefined on call, initialised.
382
 * @return first rrset of an NSEC3, together with rrnum this points to
383
 *  the first RR to examine. Is NULL on empty list.
384
 */
385
static struct ub_packed_rrset_key*
386
filter_first(struct nsec3_filter* filter, size_t* rrsetnum, int* rrnum)
387
0
{
388
0
  *rrsetnum = 0;
389
0
  *rrnum = -1;
390
0
  return filter_next(filter, rrsetnum, rrnum);
391
0
}
392
393
/** see if at least one RR is known (flags, algo) */
394
static int
395
nsec3_rrset_has_known(struct ub_packed_rrset_key* s)
396
0
{
397
0
  int r;
398
0
  for(r=0; r < (int)rrset_get_count(s); r++) {
399
0
    if(!nsec3_unknown_flags(s, r) && nsec3_known_algo(s, r))
400
0
      return 1;
401
0
  }
402
0
  return 0;
403
0
}
404
405
/** 
406
 * Initialize the filter structure.
407
 * Finds the zone by looking at available NSEC3 records and best match.
408
 *  (skips the unknown flag and unknown algo NSEC3s).
409
 *
410
 * @param filter: nsec3 filter structure.
411
 * @param list: list of rrsets, an array of them.
412
 * @param num: number of rrsets in list.
413
 * @param qinfo: 
414
 *  query name to match a zone for.
415
 *  query type (if DS a higher zone must be chosen)
416
 *  qclass, to filter NSEC3s with.
417
 */
418
static void
419
filter_init(struct nsec3_filter* filter, struct ub_packed_rrset_key** list,
420
  size_t num, struct query_info* qinfo)
421
0
{
422
0
  size_t i;
423
0
  uint8_t* nm;
424
0
  size_t nmlen;
425
0
  filter->zone = NULL;
426
0
  filter->zone_len = 0;
427
0
  filter->list = list;
428
0
  filter->num = num;
429
0
  filter->fclass = qinfo->qclass;
430
0
  for(i=0; i<num; i++) {
431
    /* ignore other stuff in the list */
432
0
    if(ntohs(list[i]->rk.type) != LDNS_RR_TYPE_NSEC3 ||
433
0
      ntohs(list[i]->rk.rrset_class) != qinfo->qclass) 
434
0
      continue;
435
    /* skip unknown flags, algo */
436
0
    if(!nsec3_rrset_has_known(list[i]))
437
0
      continue;
438
439
    /* since NSEC3s are base32.zonename, we can find the zone
440
     * name by stripping off the first label of the record */
441
0
    nm = list[i]->rk.dname;
442
0
    nmlen = list[i]->rk.dname_len;
443
0
    dname_remove_label(&nm, &nmlen);
444
    /* if we find a domain that can prove about the qname,
445
     * and if this domain is closer to the qname */
446
0
    if(dname_subdomain_c(qinfo->qname, nm) && (!filter->zone ||
447
0
      dname_subdomain_c(nm, filter->zone))) {
448
      /* for a type DS do not accept a zone equal to qname*/
449
0
      if(qinfo->qtype == LDNS_RR_TYPE_DS && 
450
0
        query_dname_compare(qinfo->qname, nm) == 0 &&
451
0
        !dname_is_root(qinfo->qname))
452
0
        continue;
453
0
      filter->zone = nm;
454
0
      filter->zone_len = nmlen;
455
0
    }
456
0
  }
457
0
}
458
459
/**
460
 * Find max iteration count using config settings and key size
461
 * @param ve: validator environment with iteration count config settings.
462
 * @param bits: key size
463
 * @return max iteration count
464
 */
465
static size_t
466
get_max_iter(struct val_env* ve, size_t bits)
467
0
{
468
0
  int i;
469
0
  log_assert(ve->nsec3_keyiter_count > 0);
470
  /* round up to nearest config keysize, linear search, keep it small */
471
0
  for(i=0; i<ve->nsec3_keyiter_count; i++) {
472
0
    if(bits <= ve->nsec3_keysize[i])
473
0
      return ve->nsec3_maxiter[i];
474
0
  }
475
  /* else, use value for biggest key */
476
0
  return ve->nsec3_maxiter[ve->nsec3_keyiter_count-1];
477
0
}
478
479
/** 
480
 * Determine if any of the NSEC3 rrs iteration count is too high, from key.
481
 * @param ve: validator environment with iteration count config settings.
482
 * @param filter: what NSEC3s to loop over.
483
 * @param kkey: key entry used for verification; used for iteration counts.
484
 * @return 1 if some nsec3s are above the max iteration count.
485
 */
486
static int
487
nsec3_iteration_count_high(struct val_env* ve, struct nsec3_filter* filter, 
488
  struct key_entry_key* kkey)
489
0
{
490
0
  size_t rrsetnum;
491
0
  int rrnum;
492
0
  struct ub_packed_rrset_key* rrset;
493
  /* first determine the max number of iterations */
494
0
  size_t bits = key_entry_keysize(kkey);
495
0
  size_t max_iter = get_max_iter(ve, bits);
496
0
  verbose(VERB_ALGO, "nsec3: keysize %d bits, max iterations %d",
497
0
    (int)bits, (int)max_iter);
498
499
0
  for(rrset=filter_first(filter, &rrsetnum, &rrnum); rrset; 
500
0
    rrset=filter_next(filter, &rrsetnum, &rrnum)) {
501
0
    if(nsec3_get_iter(rrset, rrnum) > max_iter)
502
0
      return 1;
503
0
  }
504
0
  return 0;
505
0
}
506
507
/* nsec3_cache_compare for rbtree */
508
int
509
nsec3_hash_cmp(const void* c1, const void* c2) 
510
0
{
511
0
  struct nsec3_cached_hash* h1 = (struct nsec3_cached_hash*)c1;
512
0
  struct nsec3_cached_hash* h2 = (struct nsec3_cached_hash*)c2;
513
0
  uint8_t* s1, *s2;
514
0
  size_t s1len, s2len;
515
0
  int c = query_dname_compare(h1->dname, h2->dname);
516
0
  if(c != 0)
517
0
    return c;
518
  /* compare parameters */
519
  /* if both malformed, its equal, robustness */
520
0
  if(nsec3_get_algo(h1->nsec3, h1->rr) !=
521
0
    nsec3_get_algo(h2->nsec3, h2->rr)) {
522
0
    if(nsec3_get_algo(h1->nsec3, h1->rr) <
523
0
      nsec3_get_algo(h2->nsec3, h2->rr))
524
0
      return -1;
525
0
    return 1;
526
0
  }
527
0
  if(nsec3_get_iter(h1->nsec3, h1->rr) !=
528
0
    nsec3_get_iter(h2->nsec3, h2->rr)) {
529
0
    if(nsec3_get_iter(h1->nsec3, h1->rr) <
530
0
      nsec3_get_iter(h2->nsec3, h2->rr))
531
0
      return -1;
532
0
    return 1;
533
0
  }
534
0
  (void)nsec3_get_salt(h1->nsec3, h1->rr, &s1, &s1len);
535
0
  (void)nsec3_get_salt(h2->nsec3, h2->rr, &s2, &s2len);
536
0
  if(s1len == 0 && s2len == 0)
537
0
    return 0;
538
0
  if(!s1) return -1;
539
0
  if(!s2) return 1;
540
0
  if(s1len != s2len) {
541
0
    if(s1len < s2len)
542
0
      return -1;
543
0
    return 1;
544
0
  }
545
0
  return memcmp(s1, s2, s1len);
546
0
}
547
548
int
549
nsec3_cache_table_init(struct nsec3_cache_table* ct, struct regional* region)
550
0
{
551
0
  if(ct->ct) return 1;
552
0
  ct->ct = (rbtree_type*)regional_alloc(region, sizeof(*ct->ct));
553
0
  if(!ct->ct) return 0;
554
0
  ct->region = region;
555
0
  rbtree_init(ct->ct, &nsec3_hash_cmp);
556
0
  return 1;
557
0
}
558
559
size_t
560
nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, 
561
  size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res, size_t max)
562
0
{
563
0
  size_t i, hash_len;
564
  /* prepare buffer for first iteration */
565
0
  sldns_buffer_clear(buf);
566
0
  sldns_buffer_write(buf, nm, nmlen);
567
0
  query_dname_tolower(sldns_buffer_begin(buf));
568
0
  if(saltlen != 0)
569
0
    sldns_buffer_write(buf, salt, saltlen);
570
0
  sldns_buffer_flip(buf);
571
0
  hash_len = nsec3_hash_algo_size_supported(algo);
572
0
  if(hash_len == 0) {
573
0
    log_err("nsec3 hash of unknown algo %d", algo);
574
0
    return 0;
575
0
  }
576
0
  if(hash_len > max)
577
0
    return 0;
578
0
  if(!secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf),
579
0
    sldns_buffer_limit(buf), (unsigned char*)res))
580
0
    return 0;
581
0
  for(i=0; i<iter; i++) {
582
0
    sldns_buffer_clear(buf);
583
0
    sldns_buffer_write(buf, res, hash_len);
584
0
    if(saltlen != 0)
585
0
      sldns_buffer_write(buf, salt, saltlen);
586
0
    sldns_buffer_flip(buf);
587
0
    if(!secalgo_nsec3_hash(algo,
588
0
      (unsigned char*)sldns_buffer_begin(buf),
589
0
      sldns_buffer_limit(buf), (unsigned char*)res))
590
0
      return 0;
591
0
  }
592
0
  return hash_len;
593
0
}
594
595
/** perform hash of name */
596
static int
597
nsec3_calc_hash(struct regional* region, sldns_buffer* buf, 
598
  struct nsec3_cached_hash* c)
599
0
{
600
0
  int algo = nsec3_get_algo(c->nsec3, c->rr);
601
0
  size_t iter = nsec3_get_iter(c->nsec3, c->rr);
602
0
  uint8_t* salt;
603
0
  size_t saltlen, i;
604
0
  if(!nsec3_get_salt(c->nsec3, c->rr, &salt, &saltlen))
605
0
    return -1;
606
  /* prepare buffer for first iteration */
607
0
  sldns_buffer_clear(buf);
608
0
  sldns_buffer_write(buf, c->dname, c->dname_len);
609
0
  query_dname_tolower(sldns_buffer_begin(buf));
610
0
  sldns_buffer_write(buf, salt, saltlen);
611
0
  sldns_buffer_flip(buf);
612
0
  c->hash_len = nsec3_hash_algo_size_supported(algo);
613
0
  if(c->hash_len == 0) {
614
0
    log_err("nsec3 hash of unknown algo %d", algo);
615
0
    return -1;
616
0
  }
617
0
  c->hash = (uint8_t*)regional_alloc(region, c->hash_len);
618
0
  if(!c->hash)
619
0
    return 0;
620
0
  (void)secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf),
621
0
    sldns_buffer_limit(buf), (unsigned char*)c->hash);
622
0
  for(i=0; i<iter; i++) {
623
0
    sldns_buffer_clear(buf);
624
0
    sldns_buffer_write(buf, c->hash, c->hash_len);
625
0
    sldns_buffer_write(buf, salt, saltlen);
626
0
    sldns_buffer_flip(buf);
627
0
    (void)secalgo_nsec3_hash(algo,
628
0
      (unsigned char*)sldns_buffer_begin(buf),
629
0
      sldns_buffer_limit(buf), (unsigned char*)c->hash);
630
0
  }
631
0
  return 1;
632
0
}
633
634
/** perform b32 encoding of hash */
635
static int
636
nsec3_calc_b32(struct regional* region, sldns_buffer* buf, 
637
  struct nsec3_cached_hash* c)
638
0
{
639
0
  int r;
640
0
  sldns_buffer_clear(buf);
641
0
  r = sldns_b32_ntop_extended_hex(c->hash, c->hash_len,
642
0
    (char*)sldns_buffer_begin(buf), sldns_buffer_limit(buf));
643
0
  if(r < 1) {
644
0
    log_err("b32_ntop_extended_hex: error in encoding: %d", r);
645
0
    return 0;
646
0
  }
647
0
  c->b32_len = (size_t)r;
648
0
  c->b32 = regional_alloc_init(region, sldns_buffer_begin(buf), 
649
0
    c->b32_len);
650
0
  if(!c->b32)
651
0
    return 0;
652
0
  return 1;
653
0
}
654
655
int
656
nsec3_hash_name(rbtree_type* table, struct regional* region, sldns_buffer* buf,
657
  struct ub_packed_rrset_key* nsec3, int rr, uint8_t* dname, 
658
  size_t dname_len, struct nsec3_cached_hash** hash)
659
0
{
660
0
  struct nsec3_cached_hash* c;
661
0
  struct nsec3_cached_hash looki;
662
#ifdef UNBOUND_DEBUG
663
  rbnode_type* n;
664
#endif
665
0
  int r;
666
0
  looki.node.key = &looki;
667
0
  looki.nsec3 = nsec3;
668
0
  looki.rr = rr;
669
0
  looki.dname = dname;
670
0
  looki.dname_len = dname_len;
671
  /* lookup first in cache */
672
0
  c = (struct nsec3_cached_hash*)rbtree_search(table, &looki);
673
0
  if(c) {
674
0
    *hash = c;
675
0
    return 2;
676
0
  }
677
  /* create a new entry */
678
0
  c = (struct nsec3_cached_hash*)regional_alloc(region, sizeof(*c));
679
0
  if(!c) return 0;
680
0
  c->node.key = c;
681
0
  c->nsec3 = nsec3;
682
0
  c->rr = rr;
683
0
  c->dname = dname;
684
0
  c->dname_len = dname_len;
685
0
  r = nsec3_calc_hash(region, buf, c);
686
0
  if(r != 1)
687
0
    return r;  /* returns -1 or 0 */
688
0
  r = nsec3_calc_b32(region, buf, c);
689
0
  if(r != 1)
690
0
    return r;  /* returns 0 */
691
#ifdef UNBOUND_DEBUG
692
  n =
693
#else
694
0
  (void)
695
0
#endif
696
0
  rbtree_insert(table, &c->node);
697
0
  log_assert(n); /* cannot be duplicate, just did lookup */
698
0
  *hash = c;
699
0
  return 1;
700
0
}
701
702
/**
703
 * compare a label lowercased
704
 */
705
static int
706
label_compare_lower(uint8_t* lab1, uint8_t* lab2, size_t lablen)
707
0
{
708
0
  size_t i;
709
0
  for(i=0; i<lablen; i++) {
710
0
    if(tolower((unsigned char)*lab1) != tolower((unsigned char)*lab2)) {
711
0
      if(tolower((unsigned char)*lab1) < tolower((unsigned char)*lab2))
712
0
        return -1;
713
0
      return 1;
714
0
    }
715
0
    lab1++;
716
0
    lab2++;
717
0
  }
718
0
  return 0;
719
0
}
720
721
/**
722
 * Compare a hashed name with the owner name of an NSEC3 RRset.
723
 * @param flt: filter with zone name.
724
 * @param hash: the hashed name.
725
 * @param s: rrset with owner name.
726
 * @return true if matches exactly, false if not.
727
 */
728
static int
729
nsec3_hash_matches_owner(struct nsec3_filter* flt, 
730
  struct nsec3_cached_hash* hash, struct ub_packed_rrset_key* s)
731
0
{
732
0
  uint8_t* nm = s->rk.dname;
733
0
  if(!hash) return 0; /* please clang */
734
  /* compare, does hash of name based on params in this NSEC3
735
   * match the owner name of this NSEC3? 
736
   * name must be: <hashlength>base32 . zone name 
737
   * so; first label must not be root label (not zero length),
738
   * and match the b32 encoded hash length, 
739
   * and the label content match the b32 encoded hash
740
   * and the rest must be the zone name.
741
   */
742
0
  if(hash->b32_len != 0 && (size_t)nm[0] == hash->b32_len &&
743
0
    label_compare_lower(nm+1, hash->b32, hash->b32_len) == 0 &&
744
0
    query_dname_compare(nm+(size_t)nm[0]+1, flt->zone) == 0) {
745
0
    return 1;
746
0
  }
747
0
  return 0;
748
0
}
749
750
/**
751
 * Find matching NSEC3
752
 * Find the NSEC3Record that matches a hash of a name.
753
 * @param env: module environment with temporary region and buffer.
754
 * @param flt: the NSEC3 RR filter, contains zone name and RRs.
755
 * @param ct: cached hashes table.
756
 * @param nm: name to look for.
757
 * @param nmlen: length of name.
758
 * @param rrset: nsec3 that matches is returned here.
759
 * @param rr: rr number in nsec3 rrset that matches.
760
 * @param calculations: current hash calculations.
761
 * @return true if a matching NSEC3 is found, false if not.
762
 */
763
static int
764
find_matching_nsec3(struct module_env* env, struct nsec3_filter* flt,
765
  struct nsec3_cache_table* ct, uint8_t* nm, size_t nmlen,
766
  struct ub_packed_rrset_key** rrset, int* rr,
767
  int* calculations)
768
0
{
769
0
  size_t i_rs;
770
0
  int i_rr;
771
0
  struct ub_packed_rrset_key* s;
772
0
  struct nsec3_cached_hash* hash = NULL;
773
0
  int r;
774
0
  int calc_errors = 0;
775
776
  /* this loop skips other-zone and unknown NSEC3s, also non-NSEC3 RRs */
777
0
  for(s=filter_first(flt, &i_rs, &i_rr); s; 
778
0
    s=filter_next(flt, &i_rs, &i_rr)) {
779
    /* check if we are allowed more calculations */
780
0
    if(*calculations >= MAX_NSEC3_CALCULATIONS) {
781
0
      if(calc_errors == *calculations) {
782
0
        *calculations = MAX_NSEC3_ERRORS;
783
0
      }
784
0
      break;
785
0
    }
786
    /* get name hashed for this NSEC3 RR */
787
0
    r = nsec3_hash_name(ct->ct, ct->region, env->scratch_buffer,
788
0
      s, i_rr, nm, nmlen, &hash);
789
0
    if(r == 0) {
790
0
      log_err("nsec3: malloc failure");
791
0
      break; /* alloc failure */
792
0
    } else if(r < 0) {
793
      /* malformed NSEC3 */
794
0
      calc_errors++;
795
0
      (*calculations)++;
796
0
      continue;
797
0
    } else {
798
0
      if(r == 1) (*calculations)++;
799
0
      if(nsec3_hash_matches_owner(flt, hash, s)) {
800
0
        *rrset = s; /* rrset with this name */
801
0
        *rr = i_rr; /* matches hash with these parameters */
802
0
        return 1;
803
0
      }
804
0
    }
805
0
  }
806
0
  *rrset = NULL;
807
0
  *rr = 0;
808
0
  return 0;
809
0
}
810
811
int
812
nsec3_covers(uint8_t* zone, struct nsec3_cached_hash* hash,
813
  struct ub_packed_rrset_key* rrset, int rr, sldns_buffer* buf)
814
0
{
815
0
  uint8_t* next, *owner;
816
0
  size_t nextlen;
817
0
  int len;
818
0
  if(!nsec3_get_nextowner(rrset, rr, &next, &nextlen))
819
0
    return 0; /* malformed RR proves nothing */
820
821
0
  if(!hash) return 0; /* please clang */
822
  /* check the owner name is a hashed value . apex
823
   * base32 encoded values must have equal length. 
824
   * hash_value and next hash value must have equal length. */
825
0
  if(nextlen != hash->hash_len || hash->hash_len==0||hash->b32_len==0|| 
826
0
    (size_t)*rrset->rk.dname != hash->b32_len ||
827
0
    query_dname_compare(rrset->rk.dname+1+
828
0
      (size_t)*rrset->rk.dname, zone) != 0)
829
0
    return 0; /* bad lengths or owner name */
830
831
  /* This is the "normal case: owner < next and owner < hash < next */
832
0
  if(label_compare_lower(rrset->rk.dname+1, hash->b32, 
833
0
    hash->b32_len) < 0 && 
834
0
    memcmp(hash->hash, next, nextlen) < 0)
835
0
    return 1;
836
837
  /* convert owner name from text to binary */
838
0
  sldns_buffer_clear(buf);
839
0
  owner = sldns_buffer_begin(buf);
840
0
  len = sldns_b32_pton_extended_hex((char*)rrset->rk.dname+1, 
841
0
    hash->b32_len, owner, sldns_buffer_limit(buf));
842
0
  if(len<1)
843
0
    return 0; /* bad owner name in some way */
844
0
  if((size_t)len != hash->hash_len || (size_t)len != nextlen)
845
0
    return 0; /* wrong length */
846
847
  /* this is the end of zone case: next <= owner && 
848
   *  (hash > owner || hash < next) 
849
   * this also covers the only-apex case of next==owner.
850
   */
851
0
  if(memcmp(next, owner, nextlen) <= 0 &&
852
0
    ( memcmp(hash->hash, owner, nextlen) > 0 ||
853
0
      memcmp(hash->hash, next, nextlen) < 0)) {
854
0
    return 1;
855
0
  }
856
0
  return 0;
857
0
}
858
859
/**
860
 * findCoveringNSEC3
861
 * Given a name, find a covering NSEC3 from among a list of NSEC3s.
862
 *
863
 * @param env: module environment with temporary region and buffer.
864
 * @param flt: the NSEC3 RR filter, contains zone name and RRs.
865
 * @param ct: cached hashes table.
866
 * @param nm: name to check if covered.
867
 * @param nmlen: length of name.
868
 * @param rrset: covering NSEC3 rrset is returned here.
869
 * @param rr: rr of cover is returned here.
870
 * @param calculations: current hash calculations.
871
 * @return true if a covering NSEC3 is found, false if not.
872
 */
873
static int
874
find_covering_nsec3(struct module_env* env, struct nsec3_filter* flt,
875
  struct nsec3_cache_table* ct, uint8_t* nm, size_t nmlen,
876
  struct ub_packed_rrset_key** rrset, int* rr,
877
  int* calculations)
878
0
{
879
0
  size_t i_rs;
880
0
  int i_rr;
881
0
  struct ub_packed_rrset_key* s;
882
0
  struct nsec3_cached_hash* hash = NULL;
883
0
  int r;
884
0
  int calc_errors = 0;
885
886
  /* this loop skips other-zone and unknown NSEC3s, also non-NSEC3 RRs */
887
0
  for(s=filter_first(flt, &i_rs, &i_rr); s; 
888
0
    s=filter_next(flt, &i_rs, &i_rr)) {
889
    /* check if we are allowed more calculations */
890
0
    if(*calculations >= MAX_NSEC3_CALCULATIONS) {
891
0
      if(calc_errors == *calculations) {
892
0
        *calculations = MAX_NSEC3_ERRORS;
893
0
      }
894
0
      break;
895
0
    }
896
    /* get name hashed for this NSEC3 RR */
897
0
    r = nsec3_hash_name(ct->ct, ct->region, env->scratch_buffer,
898
0
      s, i_rr, nm, nmlen, &hash);
899
0
    if(r == 0) {
900
0
      log_err("nsec3: malloc failure");
901
0
      break; /* alloc failure */
902
0
    } else if(r < 0) {
903
      /* malformed NSEC3 */
904
0
      calc_errors++;
905
0
      (*calculations)++;
906
0
      continue;
907
0
    } else {
908
0
      if(r == 1) (*calculations)++;
909
0
      if(nsec3_covers(flt->zone, hash, s, i_rr,
910
0
        env->scratch_buffer)) {
911
0
        *rrset = s; /* rrset with this name */
912
0
        *rr = i_rr; /* covers hash with these parameters */
913
0
        return 1;
914
0
      }
915
0
    }
916
0
  }
917
0
  *rrset = NULL;
918
0
  *rr = 0;
919
0
  return 0;
920
0
}
921
922
/**
923
 * findClosestEncloser
924
 * Given a name and a list of NSEC3s, find the candidate closest encloser.
925
 * This will be the first ancestor of 'name' (including itself) to have a
926
 * matching NSEC3 RR.
927
 * @param env: module environment with temporary region and buffer.
928
 * @param flt: the NSEC3 RR filter, contains zone name and RRs.
929
 * @param ct: cached hashes table.
930
 * @param qinfo: query that is verified for.
931
 * @param ce: closest encloser information is returned in here.
932
 * @param calculations: current hash calculations.
933
 * @return true if a closest encloser candidate is found, false if not.
934
 */
935
static int
936
nsec3_find_closest_encloser(struct module_env* env, struct nsec3_filter* flt,
937
  struct nsec3_cache_table* ct, struct query_info* qinfo,
938
  struct ce_response* ce, int* calculations)
939
0
{
940
0
  uint8_t* nm = qinfo->qname;
941
0
  size_t nmlen = qinfo->qname_len;
942
943
  /* This scans from longest name to shortest, so the first match 
944
   * we find is the only viable candidate. */
945
946
  /* (David:) FIXME: modify so that the NSEC3 matching the zone apex need 
947
   * not be present. (Mark Andrews idea).
948
   * (Wouter:) But make sure you check for DNAME bit in zone apex,
949
   * if the NSEC3 you find is the only NSEC3 in the zone, then this
950
   * may be the case. */
951
952
0
  while(dname_subdomain_c(nm, flt->zone)) {
953
0
    if(*calculations >= MAX_NSEC3_CALCULATIONS ||
954
0
      *calculations == MAX_NSEC3_ERRORS) {
955
0
      return 0;
956
0
    }
957
0
    if(find_matching_nsec3(env, flt, ct, nm, nmlen, 
958
0
      &ce->ce_rrset, &ce->ce_rr, calculations)) {
959
0
      ce->ce = nm;
960
0
      ce->ce_len = nmlen;
961
0
      return 1;
962
0
    }
963
0
    dname_remove_label(&nm, &nmlen);
964
0
  }
965
0
  return 0;
966
0
}
967
968
/**
969
 * Given a qname and its proven closest encloser, calculate the "next
970
 * closest" name. Basically, this is the name that is one label longer than
971
 * the closest encloser that is still a subdomain of qname.
972
 *
973
 * @param qname: query name.
974
 * @param qnamelen: length of qname.
975
 * @param ce: closest encloser
976
 * @param nm: result name.
977
 * @param nmlen: length of nm.
978
 */
979
static void
980
next_closer(uint8_t* qname, size_t qnamelen, uint8_t* ce, 
981
  uint8_t** nm, size_t* nmlen)
982
0
{
983
0
  int strip = dname_count_labels(qname) - dname_count_labels(ce) -1;
984
0
  *nm = qname;
985
0
  *nmlen = qnamelen;
986
0
  if(strip>0)
987
0
    dname_remove_labels(nm, nmlen, strip);
988
0
}
989
990
/**
991
 * proveClosestEncloser
992
 * Given a List of nsec3 RRs, find and prove the closest encloser to qname.
993
 * @param env: module environment with temporary region and buffer.
994
 * @param flt: the NSEC3 RR filter, contains zone name and RRs.
995
 * @param ct: cached hashes table.
996
 * @param qinfo: query that is verified for.
997
 * @param prove_does_not_exist: If true, then if the closest encloser 
998
 *  turns out to be qname, then null is returned.
999
 *  If set true, and the return value is true, then you can be 
1000
 *  certain that the ce.nc_rrset and ce.nc_rr are set properly.
1001
 * @param ce: closest encloser information is returned in here.
1002
 * @param calculations: pointer to the current NSEC3 hash calculations.
1003
 * @return bogus if no closest encloser could be proven.
1004
 *  secure if a closest encloser could be proven, ce is set.
1005
 *  insecure if the closest-encloser candidate turns out to prove
1006
 *    that an insecure delegation exists above the qname.
1007
 *  unchecked if no more hash calculations are allowed at this point.
1008
 */
1009
static enum sec_status
1010
nsec3_prove_closest_encloser(struct module_env* env, struct nsec3_filter* flt,
1011
  struct nsec3_cache_table* ct, struct query_info* qinfo,
1012
  int prove_does_not_exist, struct ce_response* ce, int* calculations)
1013
0
{
1014
0
  uint8_t* nc;
1015
0
  size_t nc_len;
1016
  /* robust: clean out ce, in case it gets abused later */
1017
0
  memset(ce, 0, sizeof(*ce));
1018
1019
0
  if(!nsec3_find_closest_encloser(env, flt, ct, qinfo, ce, calculations)) {
1020
0
    if(*calculations == MAX_NSEC3_ERRORS) {
1021
0
      verbose(VERB_ALGO, "nsec3 proveClosestEncloser: could "
1022
0
        "not find a candidate for the closest "
1023
0
        "encloser; all attempted hash calculations "
1024
0
        "were erroneous; bogus");
1025
0
      return sec_status_bogus;
1026
0
    } else if(*calculations >= MAX_NSEC3_CALCULATIONS) {
1027
0
      verbose(VERB_ALGO, "nsec3 proveClosestEncloser: could "
1028
0
        "not find a candidate for the closest "
1029
0
        "encloser; reached MAX_NSEC3_CALCULATIONS "
1030
0
        "(%d); unchecked still",
1031
0
        MAX_NSEC3_CALCULATIONS);
1032
0
      return sec_status_unchecked;
1033
0
    }
1034
0
    verbose(VERB_ALGO, "nsec3 proveClosestEncloser: could "
1035
0
      "not find a candidate for the closest encloser.");
1036
0
    return sec_status_bogus;
1037
0
  }
1038
0
  log_nametypeclass(VERB_ALGO, "ce candidate", ce->ce, 0, 0);
1039
1040
0
  if(query_dname_compare(ce->ce, qinfo->qname) == 0) {
1041
0
    if(prove_does_not_exist) {
1042
0
      verbose(VERB_ALGO, "nsec3 proveClosestEncloser: "
1043
0
        "proved that qname existed, bad");
1044
0
      return sec_status_bogus;
1045
0
    }
1046
    /* otherwise, we need to nothing else to prove that qname 
1047
     * is its own closest encloser. */
1048
0
    return sec_status_secure;
1049
0
  }
1050
1051
  /* If the closest encloser is actually a delegation, then the 
1052
   * response should have been a referral. If it is a DNAME, then 
1053
   * it should have been a DNAME response. */
1054
0
  if(nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_NS) &&
1055
0
    !nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_SOA)) {
1056
0
    if(!nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_DS)) {
1057
0
      verbose(VERB_ALGO, "nsec3 proveClosestEncloser: "
1058
0
        "closest encloser is insecure delegation");
1059
0
      return sec_status_insecure;
1060
0
    }
1061
0
    verbose(VERB_ALGO, "nsec3 proveClosestEncloser: closest "
1062
0
      "encloser was a delegation, bad");
1063
0
    return sec_status_bogus;
1064
0
  }
1065
0
  if(nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_DNAME)) {
1066
0
    verbose(VERB_ALGO, "nsec3 proveClosestEncloser: closest "
1067
0
      "encloser was a DNAME, bad");
1068
0
    return sec_status_bogus;
1069
0
  }
1070
  
1071
  /* Otherwise, we need to show that the next closer name is covered. */
1072
0
  next_closer(qinfo->qname, qinfo->qname_len, ce->ce, &nc, &nc_len);
1073
0
  if(!find_covering_nsec3(env, flt, ct, nc, nc_len, 
1074
0
    &ce->nc_rrset, &ce->nc_rr, calculations)) {
1075
0
    if(*calculations == MAX_NSEC3_ERRORS) {
1076
0
      verbose(VERB_ALGO, "nsec3: Could not find proof that the "
1077
0
        "candidate encloser was the closest encloser; "
1078
0
        "all attempted hash calculations were "
1079
0
        "erroneous; bogus");
1080
0
      return sec_status_bogus;
1081
0
    } else if(*calculations >= MAX_NSEC3_CALCULATIONS) {
1082
0
      verbose(VERB_ALGO, "nsec3: Could not find proof that the "
1083
0
        "candidate encloser was the closest encloser; "
1084
0
        "reached MAX_NSEC3_CALCULATIONS (%d); "
1085
0
        "unchecked still",
1086
0
        MAX_NSEC3_CALCULATIONS);
1087
0
      return sec_status_unchecked;
1088
0
    }
1089
0
    verbose(VERB_ALGO, "nsec3: Could not find proof that the "
1090
0
      "candidate encloser was the closest encloser");
1091
0
    return sec_status_bogus;
1092
0
  }
1093
0
  return sec_status_secure;
1094
0
}
1095
1096
/** allocate a wildcard for the closest encloser */
1097
static uint8_t*
1098
nsec3_ce_wildcard(struct regional* region, uint8_t* ce, size_t celen,
1099
  size_t* len)
1100
0
{
1101
0
  uint8_t* nm;
1102
0
  if(celen > LDNS_MAX_DOMAINLEN - 2)
1103
0
    return 0; /* too long */
1104
0
  nm = (uint8_t*)regional_alloc(region, celen+2);
1105
0
  if(!nm) {
1106
0
    log_err("nsec3 wildcard: out of memory");
1107
0
    return 0; /* alloc failure */
1108
0
  }
1109
0
  nm[0] = 1;
1110
0
  nm[1] = (uint8_t)'*'; /* wildcard label */
1111
0
  memmove(nm+2, ce, celen);
1112
0
  *len = celen+2;
1113
0
  return nm;
1114
0
}
1115
1116
/** Do the name error proof */
1117
static enum sec_status
1118
nsec3_do_prove_nameerror(struct module_env* env, struct nsec3_filter* flt,
1119
  struct nsec3_cache_table* ct, struct query_info* qinfo, int* calc)
1120
0
{
1121
0
  struct ce_response ce;
1122
0
  uint8_t* wc;
1123
0
  size_t wclen;
1124
0
  struct ub_packed_rrset_key* wc_rrset;
1125
0
  int wc_rr;
1126
0
  enum sec_status sec;
1127
1128
  /* First locate and prove the closest encloser to qname. We will 
1129
   * use the variant that fails if the closest encloser turns out 
1130
   * to be qname. */
1131
0
  sec = nsec3_prove_closest_encloser(env, flt, ct, qinfo, 1, &ce, calc);
1132
0
  if(sec != sec_status_secure) {
1133
0
    if(sec == sec_status_bogus)
1134
0
      verbose(VERB_ALGO, "nsec3 nameerror proof: failed "
1135
0
        "to prove a closest encloser");
1136
0
    else if(sec == sec_status_unchecked)
1137
0
      verbose(VERB_ALGO, "nsec3 nameerror proof: will "
1138
0
        "continue proving closest encloser after "
1139
0
        "suspend");
1140
0
    else  verbose(VERB_ALGO, "nsec3 nameerror proof: closest "
1141
0
        "nsec3 is an insecure delegation");
1142
0
    return sec;
1143
0
  }
1144
0
  log_nametypeclass(VERB_ALGO, "nsec3 nameerror: proven ce=", ce.ce,0,0);
1145
1146
  /* At this point, we know that qname does not exist. Now we need 
1147
   * to prove that the wildcard does not exist. */
1148
0
  log_assert(ce.ce);
1149
0
  wc = nsec3_ce_wildcard(ct->region, ce.ce, ce.ce_len, &wclen);
1150
0
  if(!wc) {
1151
0
    verbose(VERB_ALGO, "nsec3 nameerror proof: could not prove "
1152
0
      "that the applicable wildcard did not exist.");
1153
0
    return sec_status_bogus;
1154
0
  }
1155
0
  if(!find_covering_nsec3(env, flt, ct, wc, wclen, &wc_rrset, &wc_rr, calc)) {
1156
0
    if(*calc == MAX_NSEC3_ERRORS) {
1157
0
      verbose(VERB_ALGO, "nsec3 nameerror proof: could not prove "
1158
0
        "that the applicable wildcard did not exist; "
1159
0
        "all attempted hash calculations were "
1160
0
        "erroneous; bogus");
1161
0
      return sec_status_bogus;
1162
0
    } else if(*calc >= MAX_NSEC3_CALCULATIONS) {
1163
0
      verbose(VERB_ALGO, "nsec3 nameerror proof: could not prove "
1164
0
        "that the applicable wildcard did not exist; "
1165
0
        "reached MAX_NSEC3_CALCULATIONS (%d); "
1166
0
        "unchecked still",
1167
0
        MAX_NSEC3_CALCULATIONS);
1168
0
      return sec_status_unchecked;
1169
0
    }
1170
0
    verbose(VERB_ALGO, "nsec3 nameerror proof: could not prove "
1171
0
      "that the applicable wildcard did not exist.");
1172
0
    return sec_status_bogus;
1173
0
  }
1174
1175
0
  if(ce.nc_rrset && nsec3_has_optout(ce.nc_rrset, ce.nc_rr)) {
1176
0
    verbose(VERB_ALGO, "nsec3 nameerror proof: nc has optout");
1177
0
    return sec_status_insecure;
1178
0
  }
1179
0
  return sec_status_secure;
1180
0
}
1181
1182
enum sec_status
1183
nsec3_prove_nameerror(struct module_env* env, struct val_env* ve,
1184
  struct ub_packed_rrset_key** list, size_t num,
1185
  struct query_info* qinfo, struct key_entry_key* kkey,
1186
  struct nsec3_cache_table* ct, int* calc)
1187
0
{
1188
0
  struct nsec3_filter flt;
1189
1190
0
  if(!list || num == 0 || !kkey || !key_entry_isgood(kkey))
1191
0
    return sec_status_bogus; /* no valid NSEC3s, bogus */
1192
0
  filter_init(&flt, list, num, qinfo); /* init RR iterator */
1193
0
  if(!flt.zone)
1194
0
    return sec_status_bogus; /* no RRs */
1195
0
  if(nsec3_iteration_count_high(ve, &flt, kkey))
1196
0
    return sec_status_insecure; /* iteration count too high */
1197
0
  log_nametypeclass(VERB_ALGO, "start nsec3 nameerror proof, zone", 
1198
0
    flt.zone, 0, 0);
1199
0
  return nsec3_do_prove_nameerror(env, &flt, ct, qinfo, calc);
1200
0
}
1201
1202
/* 
1203
 * No code to handle qtype=NSEC3 specially. 
1204
 * This existed in early drafts, but was later (-05) removed.
1205
 */
1206
1207
/** Do the nodata proof */
1208
static enum sec_status
1209
nsec3_do_prove_nodata(struct module_env* env, struct nsec3_filter* flt,
1210
  struct nsec3_cache_table* ct, struct query_info* qinfo,
1211
  int* calc)
1212
0
{
1213
0
  struct ce_response ce;
1214
0
  uint8_t* wc;
1215
0
  size_t wclen;
1216
0
  struct ub_packed_rrset_key* rrset;
1217
0
  int rr;
1218
0
  enum sec_status sec;
1219
1220
0
  if(find_matching_nsec3(env, flt, ct, qinfo->qname, qinfo->qname_len, 
1221
0
    &rrset, &rr, calc)) {
1222
    /* cases 1 and 2 */
1223
0
    if(nsec3_has_type(rrset, rr, qinfo->qtype)) {
1224
0
      verbose(VERB_ALGO, "proveNodata: Matching NSEC3 "
1225
0
        "proved that type existed, bogus");
1226
0
      return sec_status_bogus;
1227
0
    } else if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_CNAME)) {
1228
0
      verbose(VERB_ALGO, "proveNodata: Matching NSEC3 "
1229
0
        "proved that a CNAME existed, bogus");
1230
0
      return sec_status_bogus;
1231
0
    }
1232
1233
    /* 
1234
     * If type DS: filter_init zone find already found a parent
1235
     *   zone, so this nsec3 is from a parent zone. 
1236
     *   o can be not a delegation (unusual query for normal name,
1237
     *    no DS anyway, but we can verify that).
1238
     *   o can be a delegation (which is the usual DS check).
1239
     *   o may not have the SOA bit set (only the top of the
1240
     *    zone, which must have been above the name, has that).
1241
     *    Except for the root; which is checked by itself.
1242
     *
1243
     * If not type DS: matching nsec3 must not be a delegation.
1244
     */
1245
0
    if(qinfo->qtype == LDNS_RR_TYPE_DS && qinfo->qname_len != 1 
1246
0
      && nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) &&
1247
0
      !dname_is_root(qinfo->qname)) {
1248
0
      verbose(VERB_ALGO, "proveNodata: apex NSEC3 "
1249
0
        "abused for no DS proof, bogus");
1250
0
      return sec_status_bogus;
1251
0
    } else if(qinfo->qtype != LDNS_RR_TYPE_DS && 
1252
0
      nsec3_has_type(rrset, rr, LDNS_RR_TYPE_NS) &&
1253
0
      !nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
1254
0
      if(!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_DS)) {
1255
0
        verbose(VERB_ALGO, "proveNodata: matching "
1256
0
          "NSEC3 is insecure delegation");
1257
0
        return sec_status_insecure;
1258
0
      }
1259
0
      verbose(VERB_ALGO, "proveNodata: matching "
1260
0
        "NSEC3 is a delegation, bogus");
1261
0
      return sec_status_bogus;
1262
0
    }
1263
0
    return sec_status_secure;
1264
0
  }
1265
0
  if(*calc == MAX_NSEC3_ERRORS) {
1266
0
    verbose(VERB_ALGO, "proveNodata: all attempted hash "
1267
0
      "calculations were erroneous while finding a matching "
1268
0
      "NSEC3, bogus");
1269
0
    return sec_status_bogus;
1270
0
  } else if(*calc >= MAX_NSEC3_CALCULATIONS) {
1271
0
    verbose(VERB_ALGO, "proveNodata: reached "
1272
0
      "MAX_NSEC3_CALCULATIONS (%d) while finding a "
1273
0
      "matching NSEC3; unchecked still",
1274
0
      MAX_NSEC3_CALCULATIONS);
1275
0
    return sec_status_unchecked;
1276
0
  }
1277
1278
  /* For cases 3 - 5, we need the proven closest encloser, and it 
1279
   * can't match qname. Although, at this point, we know that it 
1280
   * won't since we just checked that. */
1281
0
  sec = nsec3_prove_closest_encloser(env, flt, ct, qinfo, 1, &ce, calc);
1282
0
  if(sec == sec_status_bogus) {
1283
0
    verbose(VERB_ALGO, "proveNodata: did not match qname, "
1284
0
              "nor found a proven closest encloser.");
1285
0
    return sec_status_bogus;
1286
0
  } else if(sec==sec_status_insecure && qinfo->qtype!=LDNS_RR_TYPE_DS){
1287
0
    verbose(VERB_ALGO, "proveNodata: closest nsec3 is insecure "
1288
0
              "delegation.");
1289
0
    return sec_status_insecure;
1290
0
  } else if(sec==sec_status_unchecked) {
1291
0
    return sec_status_unchecked;
1292
0
  }
1293
1294
  /* Case 3: removed */
1295
1296
  /* Case 4: */
1297
0
  log_assert(ce.ce);
1298
0
  wc = nsec3_ce_wildcard(ct->region, ce.ce, ce.ce_len, &wclen);
1299
0
  if(wc && find_matching_nsec3(env, flt, ct, wc, wclen, &rrset, &rr,
1300
0
    calc)) {
1301
    /* found wildcard */
1302
0
    if(nsec3_has_type(rrset, rr, qinfo->qtype)) {
1303
0
      verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1304
0
        "wildcard had qtype, bogus");
1305
0
      return sec_status_bogus;
1306
0
    } else if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_CNAME)) {
1307
0
      verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1308
0
        "wildcard had a CNAME, bogus");
1309
0
      return sec_status_bogus;
1310
0
    }
1311
0
    if(qinfo->qtype == LDNS_RR_TYPE_DS && qinfo->qname_len != 1 
1312
0
      && nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
1313
0
      verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1314
0
        "wildcard for no DS proof has a SOA, bogus");
1315
0
      return sec_status_bogus;
1316
0
    } else if(qinfo->qtype != LDNS_RR_TYPE_DS && 
1317
0
      nsec3_has_type(rrset, rr, LDNS_RR_TYPE_NS) &&
1318
0
      !nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
1319
0
      verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1320
0
        "wildcard is a delegation, bogus");
1321
0
      return sec_status_bogus;
1322
0
    }
1323
    /* everything is peachy keen, except for optout spans */
1324
0
    if(ce.nc_rrset && nsec3_has_optout(ce.nc_rrset, ce.nc_rr)) {
1325
0
      verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1326
0
        "wildcard is in optout range, insecure");
1327
0
      return sec_status_insecure;
1328
0
    }
1329
0
    return sec_status_secure;
1330
0
  }
1331
0
  if(*calc == MAX_NSEC3_ERRORS) {
1332
0
    verbose(VERB_ALGO, "nsec3 nodata proof: all attempted hash "
1333
0
      "calculations were erroneous while matching "
1334
0
      "wildcard, bogus");
1335
0
    return sec_status_bogus;
1336
0
  } else if(*calc >= MAX_NSEC3_CALCULATIONS) {
1337
0
    verbose(VERB_ALGO, "nsec3 nodata proof: reached "
1338
0
      "MAX_NSEC3_CALCULATIONS (%d) while matching "
1339
0
      "wildcard, unchecked still",
1340
0
      MAX_NSEC3_CALCULATIONS);
1341
0
    return sec_status_unchecked;
1342
0
  }
1343
1344
  /* Case 5: */
1345
  /* Due to forwarders, cnames, and other collating effects, we
1346
   * can see the ordinary unsigned data from a zone beneath an
1347
   * insecure delegation under an optout here */
1348
0
  if(!ce.nc_rrset) {
1349
0
    verbose(VERB_ALGO, "nsec3 nodata proof: no next closer nsec3");
1350
0
    return sec_status_bogus;
1351
0
  }
1352
1353
  /* We need to make sure that the covering NSEC3 is opt-out. */
1354
0
  log_assert(ce.nc_rrset);
1355
0
  if(!nsec3_has_optout(ce.nc_rrset, ce.nc_rr)) {
1356
0
    if(qinfo->qtype == LDNS_RR_TYPE_DS)
1357
0
      verbose(VERB_ALGO, "proveNodata: covering NSEC3 was not "
1358
0
      "opt-out in an opt-out DS NOERROR/NODATA case.");
1359
0
    else verbose(VERB_ALGO, "proveNodata: could not find matching "
1360
0
      "NSEC3, nor matching wildcard, nor optout NSEC3 "
1361
0
      "-- no more options, bogus.");
1362
0
    return sec_status_bogus;
1363
0
  }
1364
  /* RFC5155 section 9.2: if nc has optout then no AD flag set */
1365
0
  return sec_status_insecure;
1366
0
}
1367
1368
enum sec_status
1369
nsec3_prove_nodata(struct module_env* env, struct val_env* ve,
1370
  struct ub_packed_rrset_key** list, size_t num,
1371
  struct query_info* qinfo, struct key_entry_key* kkey,
1372
  struct nsec3_cache_table* ct, int* calc)
1373
0
{
1374
0
  struct nsec3_filter flt;
1375
1376
0
  if(!list || num == 0 || !kkey || !key_entry_isgood(kkey))
1377
0
    return sec_status_bogus; /* no valid NSEC3s, bogus */
1378
0
  filter_init(&flt, list, num, qinfo); /* init RR iterator */
1379
0
  if(!flt.zone)
1380
0
    return sec_status_bogus; /* no RRs */
1381
0
  if(nsec3_iteration_count_high(ve, &flt, kkey))
1382
0
    return sec_status_insecure; /* iteration count too high */
1383
0
  return nsec3_do_prove_nodata(env, &flt, ct, qinfo, calc);
1384
0
}
1385
1386
enum sec_status
1387
nsec3_prove_wildcard(struct module_env* env, struct val_env* ve,
1388
        struct ub_packed_rrset_key** list, size_t num,
1389
  struct query_info* qinfo, struct key_entry_key* kkey, uint8_t* wc,
1390
  struct nsec3_cache_table* ct, int* calc)
1391
0
{
1392
0
  struct nsec3_filter flt;
1393
0
  struct ce_response ce;
1394
0
  uint8_t* nc;
1395
0
  size_t nc_len;
1396
0
  size_t wclen;
1397
0
  (void)dname_count_size_labels(wc, &wclen);
1398
1399
0
  if(!list || num == 0 || !kkey || !key_entry_isgood(kkey))
1400
0
    return sec_status_bogus; /* no valid NSEC3s, bogus */
1401
0
  filter_init(&flt, list, num, qinfo); /* init RR iterator */
1402
0
  if(!flt.zone)
1403
0
    return sec_status_bogus; /* no RRs */
1404
0
  if(nsec3_iteration_count_high(ve, &flt, kkey))
1405
0
    return sec_status_insecure; /* iteration count too high */
1406
1407
  /* We know what the (purported) closest encloser is by just 
1408
   * looking at the supposed generating wildcard. 
1409
   * The *. has already been removed from the wc name.
1410
   */
1411
0
  memset(&ce, 0, sizeof(ce));
1412
0
  ce.ce = wc;
1413
0
  ce.ce_len = wclen;
1414
1415
  /* Now we still need to prove that the original data did not exist.
1416
   * Otherwise, we need to show that the next closer name is covered. */
1417
0
  next_closer(qinfo->qname, qinfo->qname_len, ce.ce, &nc, &nc_len);
1418
0
  if(!find_covering_nsec3(env, &flt, ct, nc, nc_len,
1419
0
    &ce.nc_rrset, &ce.nc_rr, calc)) {
1420
0
    if(*calc == MAX_NSEC3_ERRORS) {
1421
0
      verbose(VERB_ALGO, "proveWildcard: did not find a "
1422
0
        "covering NSEC3 that covered the next closer "
1423
0
        "name; all attempted hash calculations were "
1424
0
        "erroneous; bogus");
1425
0
      return sec_status_bogus;
1426
0
    } else if(*calc >= MAX_NSEC3_CALCULATIONS) {
1427
0
      verbose(VERB_ALGO, "proveWildcard: did not find a "
1428
0
        "covering NSEC3 that covered the next closer "
1429
0
        "name; reached MAX_NSEC3_CALCULATIONS "
1430
0
        "(%d); unchecked still",
1431
0
        MAX_NSEC3_CALCULATIONS);
1432
0
      return sec_status_unchecked;
1433
0
    }
1434
0
    verbose(VERB_ALGO, "proveWildcard: did not find a covering "
1435
0
      "NSEC3 that covered the next closer name.");
1436
0
    return sec_status_bogus;
1437
0
  }
1438
0
  if(ce.nc_rrset && nsec3_has_optout(ce.nc_rrset, ce.nc_rr)) {
1439
0
    verbose(VERB_ALGO, "proveWildcard: NSEC3 optout");
1440
0
    return sec_status_insecure;
1441
0
  }
1442
0
  return sec_status_secure;
1443
0
}
1444
1445
/** test if list is all secure */
1446
static int
1447
list_is_secure(struct module_env* env, struct val_env* ve, 
1448
  struct ub_packed_rrset_key** list, size_t num,
1449
  struct key_entry_key* kkey, char** reason, sldns_ede_code *reason_bogus,
1450
  struct module_qstate* qstate, char* reasonbuf, size_t reasonlen)
1451
0
{
1452
0
  struct packed_rrset_data* d;
1453
0
  size_t i;
1454
0
  int verified = 0;
1455
0
  for(i=0; i<num; i++) {
1456
0
    d = (struct packed_rrset_data*)list[i]->entry.data;
1457
0
    if(list[i]->rk.type != htons(LDNS_RR_TYPE_NSEC3))
1458
0
      continue;
1459
0
    if(d->security == sec_status_secure)
1460
0
      continue;
1461
0
    rrset_check_sec_status(env->rrset_cache, list[i], *env->now);
1462
0
    if(d->security == sec_status_secure)
1463
0
      continue;
1464
0
    d->security = val_verify_rrset_entry(env, ve, list[i], kkey,
1465
0
      reason, reason_bogus, LDNS_SECTION_AUTHORITY, qstate,
1466
0
      &verified, reasonbuf, reasonlen);
1467
0
    if(d->security != sec_status_secure) {
1468
0
      verbose(VERB_ALGO, "NSEC3 did not verify");
1469
0
      return 0;
1470
0
    }
1471
0
    rrset_update_sec_status(env->rrset_cache, list[i], *env->now);
1472
0
  }
1473
0
  return 1;
1474
0
}
1475
1476
enum sec_status
1477
nsec3_prove_nods(struct module_env* env, struct val_env* ve,
1478
  struct ub_packed_rrset_key** list, size_t num,
1479
  struct query_info* qinfo, struct key_entry_key* kkey, char** reason,
1480
  sldns_ede_code* reason_bogus, struct module_qstate* qstate,
1481
  struct nsec3_cache_table* ct, char* reasonbuf, size_t reasonlen)
1482
0
{
1483
0
  struct nsec3_filter flt;
1484
0
  struct ce_response ce;
1485
0
  struct ub_packed_rrset_key* rrset;
1486
0
  int rr;
1487
0
  int calc = 0;
1488
0
  enum sec_status sec;
1489
1490
0
  log_assert(qinfo->qtype == LDNS_RR_TYPE_DS);
1491
1492
0
  if(!list || num == 0 || !kkey || !key_entry_isgood(kkey)) {
1493
0
    *reason = "no valid NSEC3s";
1494
0
    return sec_status_bogus; /* no valid NSEC3s, bogus */
1495
0
  }
1496
0
  if(!list_is_secure(env, ve, list, num, kkey, reason, reason_bogus,
1497
0
    qstate, reasonbuf, reasonlen)) {
1498
0
    *reason = "not all NSEC3 records secure";
1499
0
    return sec_status_bogus; /* not all NSEC3 records secure */
1500
0
  }
1501
0
  filter_init(&flt, list, num, qinfo); /* init RR iterator */
1502
0
  if(!flt.zone) {
1503
0
    *reason = "no NSEC3 records";
1504
0
    return sec_status_bogus; /* no RRs */
1505
0
  }
1506
0
  if(nsec3_iteration_count_high(ve, &flt, kkey))
1507
0
    return sec_status_insecure; /* iteration count too high */
1508
1509
  /* Look for a matching NSEC3 to qname -- this is the normal 
1510
   * NODATA case. */
1511
0
  if(find_matching_nsec3(env, &flt, ct, qinfo->qname, qinfo->qname_len,
1512
0
    &rrset, &rr, &calc)) {
1513
    /* If the matching NSEC3 has the SOA bit set, it is from 
1514
     * the wrong zone (the child instead of the parent). If 
1515
     * it has the DS bit set, then we were lied to. */
1516
0
    if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) && 
1517
0
      qinfo->qname_len != 1) {
1518
0
      verbose(VERB_ALGO, "nsec3 provenods: NSEC3 is from"
1519
0
        " child zone, bogus");
1520
0
      *reason = "NSEC3 from child zone";
1521
0
      return sec_status_bogus;
1522
0
    } else if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_DS)) {
1523
0
      verbose(VERB_ALGO, "nsec3 provenods: NSEC3 has qtype"
1524
0
        " DS, bogus");
1525
0
      *reason = "NSEC3 has DS in bitmap";
1526
0
      return sec_status_bogus;
1527
0
    }
1528
    /* If the NSEC3 RR doesn't have the NS bit set, then 
1529
     * this wasn't a delegation point. */
1530
0
    if(!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_NS))
1531
0
      return sec_status_indeterminate;
1532
    /* Otherwise, this proves no DS. */
1533
0
    return sec_status_secure;
1534
0
  }
1535
0
  if(calc == MAX_NSEC3_ERRORS) {
1536
0
    verbose(VERB_ALGO, "nsec3 provenods: all attempted hash "
1537
0
      "calculations were erroneous while finding a matching "
1538
0
      "NSEC3, bogus");
1539
0
    return sec_status_bogus;
1540
0
  } else if(calc >= MAX_NSEC3_CALCULATIONS) {
1541
0
    verbose(VERB_ALGO, "nsec3 provenods: reached "
1542
0
      "MAX_NSEC3_CALCULATIONS (%d) while finding a "
1543
0
      "matching NSEC3, unchecked still",
1544
0
      MAX_NSEC3_CALCULATIONS);
1545
0
    return sec_status_unchecked;
1546
0
  }
1547
1548
  /* Otherwise, we are probably in the opt-out case. */
1549
0
  sec = nsec3_prove_closest_encloser(env, &flt, ct, qinfo, 1, &ce, &calc);
1550
0
  if(sec == sec_status_unchecked) {
1551
0
    return sec_status_unchecked;
1552
0
  } else if(sec != sec_status_secure) {
1553
    /* an insecure delegation *above* the qname does not prove
1554
     * anything about this qname exactly, and bogus is bogus */
1555
0
    verbose(VERB_ALGO, "nsec3 provenods: did not match qname, "
1556
0
              "nor found a proven closest encloser.");
1557
0
    *reason = "no NSEC3 closest encloser";
1558
0
    return sec_status_bogus;
1559
0
  }
1560
1561
  /* robust extra check */
1562
0
  if(!ce.nc_rrset) {
1563
0
    verbose(VERB_ALGO, "nsec3 nods proof: no next closer nsec3");
1564
0
    *reason = "no NSEC3 next closer";
1565
0
    return sec_status_bogus;
1566
0
  }
1567
1568
  /* we had the closest encloser proof, then we need to check that the
1569
   * covering NSEC3 was opt-out -- the proveClosestEncloser step already
1570
   * checked to see if the closest encloser was a delegation or DNAME.
1571
   */
1572
0
  log_assert(ce.nc_rrset);
1573
0
  if(!nsec3_has_optout(ce.nc_rrset, ce.nc_rr)) {
1574
0
    verbose(VERB_ALGO, "nsec3 provenods: covering NSEC3 was not "
1575
0
      "opt-out in an opt-out DS NOERROR/NODATA case.");
1576
0
    *reason = "covering NSEC3 was not opt-out in an opt-out "
1577
0
      "DS NOERROR/NODATA case";
1578
0
    return sec_status_bogus;
1579
0
  }
1580
  /* RFC5155 section 9.2: if nc has optout then no AD flag set */
1581
0
  return sec_status_insecure;
1582
0
}
1583
1584
enum sec_status
1585
nsec3_prove_nxornodata(struct module_env* env, struct val_env* ve,
1586
  struct ub_packed_rrset_key** list, size_t num,
1587
  struct query_info* qinfo, struct key_entry_key* kkey, int* nodata,
1588
  struct  nsec3_cache_table* ct, int* calc)
1589
0
{
1590
0
  enum sec_status sec, secnx;
1591
0
  struct nsec3_filter flt;
1592
0
  *nodata = 0;
1593
1594
0
  if(!list || num == 0 || !kkey || !key_entry_isgood(kkey))
1595
0
    return sec_status_bogus; /* no valid NSEC3s, bogus */
1596
0
  filter_init(&flt, list, num, qinfo); /* init RR iterator */
1597
0
  if(!flt.zone)
1598
0
    return sec_status_bogus; /* no RRs */
1599
0
  if(nsec3_iteration_count_high(ve, &flt, kkey))
1600
0
    return sec_status_insecure; /* iteration count too high */
1601
1602
  /* try nxdomain and nodata after another, while keeping the
1603
   * hash cache intact */
1604
1605
0
  secnx = nsec3_do_prove_nameerror(env, &flt, ct, qinfo, calc);
1606
0
  if(secnx==sec_status_secure)
1607
0
    return sec_status_secure;
1608
0
  else if(secnx == sec_status_unchecked)
1609
0
    return sec_status_unchecked;
1610
0
  sec = nsec3_do_prove_nodata(env, &flt, ct, qinfo, calc);
1611
0
  if(sec==sec_status_secure) {
1612
0
    *nodata = 1;
1613
0
  } else if(sec == sec_status_insecure) {
1614
0
    *nodata = 1;
1615
0
  } else if(secnx == sec_status_insecure) {
1616
0
    sec = sec_status_insecure;
1617
0
  } else if(sec == sec_status_unchecked) {
1618
0
    return sec_status_unchecked;
1619
0
  }
1620
0
  return sec;
1621
0
}