mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-20 11:11:24 +00:00
986ba33c7a
I've been holding back on this because 1.7.0 requires OpenSSL 1.1.0 or newer for full DANE support. But we can't wait forever, and nothing in base uses DANE anyway, so here we go.
326 lines
7.5 KiB
C
326 lines
7.5 KiB
C
/* update.c
|
|
*
|
|
* Functions for RFC 2136 Dynamic Update
|
|
*
|
|
* Copyright (c) 2005-2008, NLnet Labs. All rights reserved.
|
|
*
|
|
* See LICENSE for the license.
|
|
*/
|
|
|
|
#include <ldns/config.h>
|
|
|
|
#include <ldns/ldns.h>
|
|
|
|
#include <strings.h>
|
|
#include <stdlib.h>
|
|
#include <limits.h>
|
|
|
|
/*
|
|
* RFC 2136 sections mapped to RFC 1035:
|
|
* zone/ZO -- QD/question
|
|
* prerequisites/PR -- AN/answers
|
|
* updates/UP -- NS/authority records
|
|
* additional data/AD -- AR/additional records
|
|
*/
|
|
|
|
ldns_pkt *
|
|
ldns_update_pkt_new(ldns_rdf *zone_rdf, ldns_rr_class c,
|
|
const ldns_rr_list *pr_rrlist, const ldns_rr_list *up_rrlist, const ldns_rr_list *ad_rrlist)
|
|
{
|
|
ldns_pkt *p;
|
|
|
|
if (!zone_rdf || !up_rrlist) {
|
|
return NULL;
|
|
}
|
|
|
|
if (c == 0) {
|
|
c = LDNS_RR_CLASS_IN;
|
|
}
|
|
|
|
/* Create packet, fill in Zone Section. */
|
|
p = ldns_pkt_query_new(zone_rdf, LDNS_RR_TYPE_SOA, c, LDNS_RD);
|
|
if (!p) {
|
|
return NULL;
|
|
}
|
|
zone_rdf = NULL; /* No longer safe to use. */
|
|
|
|
ldns_pkt_set_opcode(p, LDNS_PACKET_UPDATE);
|
|
|
|
ldns_rr_list_deep_free(p->_authority);
|
|
|
|
ldns_pkt_set_authority(p, ldns_rr_list_clone(up_rrlist));
|
|
|
|
ldns_update_set_upcount(p, ldns_rr_list_rr_count(up_rrlist));
|
|
|
|
if (pr_rrlist) {
|
|
ldns_rr_list_deep_free(p->_answer); /*XXX access function */
|
|
ldns_pkt_set_answer(p, ldns_rr_list_clone(pr_rrlist));
|
|
ldns_update_set_prcount(p, ldns_rr_list_rr_count(pr_rrlist));
|
|
}
|
|
|
|
if (ad_rrlist) {
|
|
ldns_rr_list_deep_free(p->_additional);
|
|
ldns_pkt_set_additional(p, ldns_rr_list_clone(ad_rrlist));
|
|
ldns_update_set_adcount(p, ldns_rr_list_rr_count(ad_rrlist));
|
|
}
|
|
return p;
|
|
}
|
|
|
|
ldns_status
|
|
ldns_update_pkt_tsig_add(ldns_pkt *p, const ldns_resolver *r)
|
|
{
|
|
#ifdef HAVE_SSL
|
|
uint16_t fudge = 300; /* Recommended fudge. [RFC2845 6.4] */
|
|
if (ldns_resolver_tsig_keyname(r) && ldns_resolver_tsig_keydata(r))
|
|
return ldns_pkt_tsig_sign(p, ldns_resolver_tsig_keyname(r),
|
|
ldns_resolver_tsig_keydata(r), fudge,
|
|
ldns_resolver_tsig_algorithm(r), NULL);
|
|
#else
|
|
/* do nothing */
|
|
(void)p;
|
|
(void)r;
|
|
#endif /* HAVE_SSL */
|
|
/* No TSIG to do. */
|
|
return LDNS_STATUS_OK;
|
|
}
|
|
|
|
/* Move to higher.c or similar? */
|
|
/* XXX doc */
|
|
ldns_status
|
|
ldns_update_soa_mname(ldns_rdf *zone, ldns_resolver *r,
|
|
ldns_rr_class c, ldns_rdf **mname)
|
|
{
|
|
ldns_rr *soa_rr;
|
|
ldns_pkt *query, *resp;
|
|
|
|
/* Nondestructive, so clone 'zone' here */
|
|
query = ldns_pkt_query_new(ldns_rdf_clone(zone), LDNS_RR_TYPE_SOA,
|
|
c, LDNS_RD);
|
|
if (!query) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
ldns_pkt_set_random_id(query);
|
|
if (ldns_resolver_send_pkt(&resp, r, query) != LDNS_STATUS_OK) {
|
|
ldns_pkt_free(query);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_pkt_free(query);
|
|
if (!resp) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* Expect a SOA answer. */
|
|
*mname = NULL;
|
|
while ((soa_rr = ldns_rr_list_pop_rr(ldns_pkt_answer(resp)))) {
|
|
if (ldns_rr_get_type(soa_rr) != LDNS_RR_TYPE_SOA
|
|
|| ldns_rr_rdf(soa_rr, 0) == NULL)
|
|
continue;
|
|
/* [RFC1035 3.3.13] */
|
|
*mname = ldns_rdf_clone(ldns_rr_rdf(soa_rr, 0));
|
|
break;
|
|
}
|
|
ldns_pkt_free(resp);
|
|
|
|
return *mname ? LDNS_STATUS_OK : LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* Try to get zone and MNAME from SOA queries. */
|
|
ldns_status
|
|
ldns_update_soa_zone_mname(const char *fqdn, ldns_resolver *r,
|
|
ldns_rr_class c, ldns_rdf **zone_rdf, ldns_rdf **mname_rdf)
|
|
{
|
|
ldns_rr *soa_rr, *rr;
|
|
ldns_rdf *soa_zone = NULL, *soa_mname = NULL;
|
|
ldns_rdf *ipaddr, *fqdn_rdf, *tmp;
|
|
ldns_rdf **nslist;
|
|
ldns_pkt *query, *resp;
|
|
ldns_resolver *tmp_r;
|
|
size_t i;
|
|
|
|
/*
|
|
* XXX Ok, this cannot be the best way to find this...?
|
|
* XXX (I run into weird cache-related stuff here)
|
|
*/
|
|
|
|
/* Step 1 - first find a nameserver that should know *something* */
|
|
fqdn_rdf = ldns_dname_new_frm_str(fqdn);
|
|
query = ldns_pkt_query_new(fqdn_rdf, LDNS_RR_TYPE_SOA, c, LDNS_RD);
|
|
if (!query) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
fqdn_rdf = NULL;
|
|
|
|
ldns_pkt_set_random_id(query);
|
|
if (ldns_resolver_send_pkt(&resp, r, query) != LDNS_STATUS_OK) {
|
|
ldns_pkt_free(query);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_pkt_free(query);
|
|
if (!resp) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* XXX Is it safe to only look in authority section here? */
|
|
while ((soa_rr = ldns_rr_list_pop_rr(ldns_pkt_authority(resp)))) {
|
|
if (ldns_rr_get_type(soa_rr) != LDNS_RR_TYPE_SOA
|
|
|| ldns_rr_rdf(soa_rr, 0) == NULL)
|
|
continue;
|
|
/* [RFC1035 3.3.13] */
|
|
soa_mname = ldns_rdf_clone(ldns_rr_rdf(soa_rr, 0));
|
|
break;
|
|
}
|
|
ldns_pkt_free(resp);
|
|
if (!soa_rr) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* Step 2 - find SOA MNAME IP address, add to resolver */
|
|
query = ldns_pkt_query_new(soa_mname, LDNS_RR_TYPE_A, c, LDNS_RD);
|
|
if (!query) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
soa_mname = NULL;
|
|
|
|
ldns_pkt_set_random_id(query);
|
|
if (ldns_resolver_send_pkt(&resp, r, query) != LDNS_STATUS_OK) {
|
|
ldns_pkt_free(query);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_pkt_free(query);
|
|
if (!resp) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
if (ldns_pkt_ancount(resp) == 0) {
|
|
ldns_pkt_free(resp);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* XXX There may be more than one answer RR here. */
|
|
rr = ldns_rr_list_pop_rr(ldns_pkt_answer(resp));
|
|
ipaddr = ldns_rr_rdf(rr, 0);
|
|
|
|
/* Put the SOA mname IP first in the nameserver list. */
|
|
if (!(tmp_r = ldns_resolver_clone(r))) {
|
|
return LDNS_STATUS_MEM_ERR;
|
|
}
|
|
nslist = ldns_resolver_nameservers(tmp_r);
|
|
for (i = 0; i < ldns_resolver_nameserver_count(tmp_r); i++) {
|
|
if (ldns_rdf_compare(ipaddr, nslist[i]) == 0) {
|
|
if (i) {
|
|
tmp = nslist[0];
|
|
nslist[0] = nslist[i];
|
|
nslist[i] = tmp;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
if (i >= ldns_resolver_nameserver_count(tmp_r)) {
|
|
/* SOA mname was not part of the resolver so add it first. */
|
|
(void) ldns_resolver_push_nameserver(tmp_r, ipaddr);
|
|
nslist = ldns_resolver_nameservers(tmp_r);
|
|
i = ldns_resolver_nameserver_count(tmp_r) - 1;
|
|
tmp = nslist[0];
|
|
nslist[0] = nslist[i];
|
|
nslist[i] = tmp;
|
|
}
|
|
ldns_pkt_free(resp);
|
|
|
|
/* Make sure to ask the first in the list, i.e SOA mname */
|
|
ldns_resolver_set_random(tmp_r, false);
|
|
|
|
/* Step 3 - Redo SOA query, sending to SOA MNAME directly. */
|
|
fqdn_rdf = ldns_dname_new_frm_str(fqdn);
|
|
query = ldns_pkt_query_new(fqdn_rdf, LDNS_RR_TYPE_SOA, c, LDNS_RD);
|
|
if (!query) {
|
|
ldns_resolver_free(tmp_r);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
fqdn_rdf = NULL;
|
|
|
|
ldns_pkt_set_random_id(query);
|
|
if (ldns_resolver_send_pkt(&resp, tmp_r, query) != LDNS_STATUS_OK) {
|
|
ldns_pkt_free(query);
|
|
ldns_resolver_free(tmp_r);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_resolver_free(tmp_r);
|
|
ldns_pkt_free(query);
|
|
if (!resp) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* XXX Is it safe to only look in authority section here, too? */
|
|
while ((soa_rr = ldns_rr_list_pop_rr(ldns_pkt_authority(resp)))) {
|
|
if (ldns_rr_get_type(soa_rr) != LDNS_RR_TYPE_SOA
|
|
|| ldns_rr_rdf(soa_rr, 0) == NULL)
|
|
continue;
|
|
/* [RFC1035 3.3.13] */
|
|
soa_mname = ldns_rdf_clone(ldns_rr_rdf(soa_rr, 0));
|
|
soa_zone = ldns_rdf_clone(ldns_rr_owner(soa_rr));
|
|
break;
|
|
}
|
|
ldns_pkt_free(resp);
|
|
if (!soa_rr) {
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
/* That seems to have worked, pass results to caller. */
|
|
*zone_rdf = soa_zone;
|
|
*mname_rdf = soa_mname;
|
|
return LDNS_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
* ldns_update_{get,set}_{zo,pr,up,ad}count
|
|
*/
|
|
|
|
uint16_t
|
|
ldns_update_zocount(const ldns_pkt *p)
|
|
{
|
|
return ldns_pkt_qdcount(p);
|
|
}
|
|
|
|
uint16_t
|
|
ldns_update_prcount(const ldns_pkt *p)
|
|
{
|
|
return ldns_pkt_ancount(p);
|
|
}
|
|
|
|
uint16_t
|
|
ldns_update_upcount(const ldns_pkt *p)
|
|
{
|
|
return ldns_pkt_nscount(p);
|
|
}
|
|
|
|
uint16_t
|
|
ldns_update_ad(const ldns_pkt *p)
|
|
{
|
|
return ldns_pkt_arcount(p);
|
|
}
|
|
|
|
void
|
|
ldns_update_set_zo(ldns_pkt *p, uint16_t v)
|
|
{
|
|
ldns_pkt_set_qdcount(p, v);
|
|
}
|
|
|
|
void
|
|
ldns_update_set_prcount(ldns_pkt *p, uint16_t v)
|
|
{
|
|
ldns_pkt_set_ancount(p, v);
|
|
}
|
|
|
|
void
|
|
ldns_update_set_upcount(ldns_pkt *p, uint16_t v)
|
|
{
|
|
ldns_pkt_set_nscount(p, v);
|
|
}
|
|
|
|
void
|
|
ldns_update_set_adcount(ldns_pkt *p, uint16_t v)
|
|
{
|
|
ldns_pkt_set_arcount(p, v);
|
|
}
|