1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-25 11:37:56 +00:00
freebsd/contrib/bind/bin/named-xfer/named-xfer.c
Jeroen Ruigrok van der Werven 98ff752a5e Virgin import of BIND v8.2.3-REL
2001-01-28 23:00:22 +00:00

3363 lines
82 KiB
C

/*
* The original version of named-xfer by Kevin Dunlap.
* Completed and integrated with named by David Waitzman
* (dwaitzman@bbn.com) 3/14/88.
* Modified by M. Karels and O. Kure 10-88.
* Modified extensively since then by just about everybody.
*/
/*
* Copyright (c) 1988, 1990
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/*
* Portions Copyright (c) 1993 by Digital Equipment Corporation.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies, and that
* the name of Digital Equipment Corporation not be used in advertising or
* publicity pertaining to distribution of the document or software without
* specific, written prior permission.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
* WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
* CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/
/*
* Portions Copyright (c) 1995 by International Business Machines, Inc.
*
* International Business Machines, Inc. (hereinafter called IBM) grants
* permission under its copyrights to use, copy, modify, and distribute this
* Software with or without fee, provided that the above copyright notice and
* all paragraphs of this notice appear in all copies, and that the name of IBM
* not be used in connection with the marketing of any product incorporating
* the Software or modifications thereof, without specific, written prior
* permission.
*
* To the extent it has a right to do so, IBM grants an immunity from suit
* under its patents, if any, for the use, sale or manufacture of products to
* the extent that such products are used for performing Domain Name System
* dynamic updates in TCP/IP networks by means of the Software. No immunity is
* granted for any product per se or for any other function of any product.
*
* THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
* DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
* IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
*/
/*
* Portions Copyright (c) 1996-1999 by Internet Software Consortium.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/
/*
* Portions Copyright (c) 1998 by MetaInfo, Incorporated.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies, and that
* the name of MetaInfo Incorporated not be used in advertising or
* publicity pertaining to distribution of the document or software without
* specific, written prior permission.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND METAINFO INCORPORATED DISCLAIMS ALL
* WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL METAINFO INCORPRATED
* BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR
* ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER
* IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
* OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#if !defined(lint) && !defined(SABER)
char copyright[] =
"@(#) Copyright (c) 1988, 1990 The Regents of the University of California.\n\
portions Copyright (c) 1993 Digital Equipment Corporation\n\
portions Copyright (c) 1998 MetaInfo, Inc.\n\
portions Copyright (c) 1995, 1996 Internet Software Consorium\n\
All rights reserved.\n";
#endif /* not lint */
#if !defined(lint) && !defined(SABER)
static const char sccsid[] = "@(#)named-xfer.c 4.18 (Berkeley) 3/7/91";
static const char rcsid[] = "$Id: named-xfer.c,v 8.104 2000/12/23 08:14:44 vixie Exp $";
#endif /* not lint */
#include "port_before.h"
#include <sys/types.h>
#include <sys/param.h>
#include <sys/file.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <netinet/in.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <arpa/nameser.h>
#include <limits.h>
#include <ctype.h>
#include <errno.h>
#include <math.h>
#include <resolv.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <unistd.h>
#include <stdarg.h>
#include <isc/eventlib.h>
#include <isc/list.h>
#include <isc/logging.h>
#include <isc/memcluster.h>
#include <isc/dst.h>
#include <isc/misc.h>
#include "port_after.h"
#define MAIN_PROGRAM
#include "../named/named.h"
#undef MAIN_PROGRAM
#define MAX_XFER_RESTARTS 2
#define ENABLE_IXFR 1
# ifdef SHORT_FNAMES
extern long pathconf __P((const char *path, int name)); /* XXX */
# endif
static struct zoneinfo zone; /* zone information */
static char *ddtfilename = NULL,
*ddtfile = NULL;
static char *tmpname = NULL,
*tmpiname = NULL, /* temporary file name for ixfr transaction file */
*domain; /* domain being xfered */
static int quiet = 0,
read_interrupted = 0,
curclass,
domain_len; /* strlen(domain) */
static FILE *fp = NULL,
*dbfp = NULL,
*ixfp = NULL;
static char *ProgName;
static void usage(const char *);
static int tsig_init(const char *);
static int getzone(struct zoneinfo *, u_int32_t, int),
print_output(struct zoneinfo *, u_int32_t,
u_char *, int, u_char *, int),
netread(int, char *, int, int),
writemsg(int, const u_char *, int);
static int ixfr_log(const u_char *msg, int len, int *delete,
FILE *file, struct sockaddr_in *sin,
char *domain, u_int32_t *serial_no, int *);
static SIG_FN read_alarm(void);
static SIG_FN term_handler(void);
static const char *soa_zinfo(struct zoneinfo *, u_char *, u_char*),
*tsig_rcode(int);
struct zoneinfo zp_start, zp_finish;
static int restarts = 0;
static int check_serial = 0;
static int xfr_qtype = T_AXFR;
FILE *ddt = NULL;
int servermethode[NSMAX];
char *soa_buf;
typedef struct _tsig_node {
struct in_addr addr;
DST_KEY *dst_key;
LINK(struct _tsig_node) link;
} tsig_node;
LIST(tsig_node) tsig_list;
/*
* Debugging printf.
*/
void
dprintf(int level, const char *format, ...) {
va_list ap;
va_start(ap, format);
if (ddt != NULL && debug >= level)
(void) vfprintf(ddt, format, ap);
va_end(ap);
}
static int
init_xfer_logging() {
log_channel chan;
if (log_new_context(ns_log_max_category, NULL, &log_ctx) < 0) {
perror("log_new_context");
return (0);
}
log_option(log_ctx, LOG_OPTION_DEBUG, debug);
log_option(log_ctx, LOG_OPTION_LEVEL, debug);
log_ctx_valid = 1;
chan = log_new_syslog_channel(0, 0, ISC_FACILITY);
if (chan == NULL)
return (0);
if (log_add_channel(log_ctx, ns_log_default, chan) < 0) {
perror("log_add_channel syslog");
return (0);
}
if (debug) {
unsigned int flags = LOG_USE_CONTEXT_LEVEL|LOG_REQUIRE_DEBUG;
chan = log_new_file_channel(flags, 0, NULL, ddt, 0, ULONG_MAX);
if (chan == NULL)
return (0);
if (log_add_channel(log_ctx, ns_log_default, chan) < 0) {
perror("log_add_channel debug");
return (0);
}
}
return (1);
}
void cleanup_for_exit(void) {
#ifdef DEBUG
if (!debug)
#endif
{
(void) unlink(tmpname);
if (tmpiname != NULL)
(void) unlink(tmpiname);
}
if(tmpiname)
free(tmpiname);
tmpiname = NULL;
if (ddtfilename != NULL) {
free(ddtfilename);
if (ddtfilename == ddtfile)
ddtfile = NULL;
ddtfilename = NULL;
}
if(tmpname)
free(tmpname);
tmpname = NULL;
if(ddtfile)
free(ddtfile);
ddtfile = NULL;
}
int
main(int argc, char *argv[]) {
struct zoneinfo *zp;
struct hostent *hp;
struct in_addr axfr_src;
char *dbfile = NULL, *tracefile = NULL, *tm = NULL, *tsigfile = NULL;
char *ixfrfile = NULL;
int dbfd, ddtd, result, c, ixfd;
u_int32_t serial_no = 0;
u_int port = htons(NAMESERVER_PORT);
struct stat statbuf;
int stub_only = 0;
int class = C_IN;
int n;
#ifdef _AUX_SOURCE
set42sig();
#endif
memset(&axfr_src, 0, sizeof axfr_src);
ProgName = strrchr(argv[0], '/');
if (ProgName != NULL)
ProgName++;
else
ProgName = argv[0];
(void) umask(022);
ddtfilename = (char *)malloc(strlen(_PATH_TMPXFER) + 1);
strcpy(ddtfilename, _PATH_TMPXFER);
ddtfile = ddtfilename;
#ifdef RENICE
nice(-40); /* this is the recommended procedure to */
nice(20); /* reset the priority of the current process */
nice(0); /* to "normal" (== 0) - see nice(3) */
#endif
n = LOG_PID;
#ifdef LOG_PERROR
n |= LOG_PERROR;
#endif
#if defined(LOG_CONS) && defined(USE_LOG_CONS)
n |= LOG_CONS;
#endif
#ifdef SYSLOG_42BSD
openlog(ProgName, n);
#else
openlog(ProgName, n, ISC_FACILITY);
#endif
while ((c = getopt(argc, argv, "C:d:l:s:t:z:f:i:p:P:qx:ST:Z")) != -1)
switch (c) {
case 'C':
class = get_class(optarg);
break;
case 'd':
#ifdef DEBUG
debug = atoi(optarg);
#endif
break;
case 'l':
ddtfile = (char *)malloc(strlen(optarg) +
sizeof(".XXXXXX") + 1);
if (!ddtfile)
panic("malloc(ddtfile)", NULL);
#ifdef SHORT_FNAMES
filenamecpy(ddtfile, optarg);
#else
(void) strcpy(ddtfile, optarg);
#endif /* SHORT_FNAMES */
(void) strcat(ddtfile, ".XXXXXX");
break;
case 's':
serial_no = strtoul(optarg, (char **)NULL, 10);
check_serial++;
break;
case 't':
tracefile = optarg;
break;
case 'z': /* zone == domain */
domain = optarg;
domain_len = strlen(domain);
while ((domain_len > 0) &&
(domain[domain_len-1] == '.'))
domain[--domain_len] = '\0';
break;
case 'f':
dbfile = optarg;
tmpname = (char *)malloc((unsigned)strlen(optarg) +
sizeof(".XXXXXX") + 1);
if (!tmpname)
panic("malloc(tmpname)", NULL);
#ifdef SHORT_FNAMES
filenamecpy(tmpname, optarg);
#else
(void) strcpy(tmpname, optarg);
#endif /* SHORT_FNAMES */
break;
case 'i':
#if ENABLE_IXFR
ixfrfile = optarg;
tmpiname = (char *) malloc(strlen(optarg) +
sizeof(".XXXXXX") + 1);
if (!tmpiname)
panic("malloc(tmpiname)", NULL);
#ifdef SHORT_FNAMES
filenamecpy(tmpiname, optarg);
#else
(void) strcpy(tmpiname, optarg);
#endif /* SHORT_FNAMES */
#endif /* ENABLE_IXFR */
break;
case 'p':
port = htons((u_int16_t)atoi(optarg));
break;
case 'P':
port = (u_int16_t)atoi(optarg);
break;
case 'S':
stub_only = 1;
break;
case 'q':
quiet++;
break;
case 'x':
if (!inet_aton(optarg, &axfr_src))
panic("bad -x addr: %s", optarg);
break;
case 'T':
tsigfile = optarg;
break;
case 'Z':
xfr_qtype = ns_t_zxfr;
break;
case '?':
default:
usage("unrecognized argument");
/* NOTREACHED */
}
if (!domain || ((!dbfile) && (!ixfrfile)) || optind >= argc) {
if (!domain)
usage("no domain");
if (!dbfile)
usage("no dbfile");
if (optind >= argc)
usage("not enough arguments");
/* NOTREACHED */
}
if (stat(dbfile, &statbuf) != -1 &&
!S_ISREG(statbuf.st_mode) &&
!S_ISFIFO(statbuf.st_mode))
usage("dbfile must be a regular file or FIFO");
if (ixfrfile && (stat(ixfrfile, &statbuf) != -1 &&
!S_ISREG(statbuf.st_mode) &&
!S_ISFIFO(statbuf.st_mode)))
usage("ixfrfile must be a regular file or FIFO");
if (tsigfile && stat(tsigfile, &statbuf) != -1 &&
!S_ISREG(statbuf.st_mode) &&
!S_ISFIFO(statbuf.st_mode))
usage("tsigfile must be a regular file or FIFO");
if (tracefile && (fp = fopen(tracefile, "w")) == NULL)
perror(tracefile);
(void) strcat(tmpname, ".XXXXXX");
/* tmpname is now something like "/etc/named/named.bu.db.XXXXXX" */
if ((dbfd = mkstemp(tmpname)) == -1) {
perror(tmpname);
if (!quiet)
syslog(LOG_ERR, "can't make tmpfile (%s): %s\n",
tmpname, strerror(errno));
exit(XFER_FAIL);
}
#ifdef HAVE_FCHMOD /* XXX */
if (fchmod(dbfd, 0644) == -1)
#else
if (chmod(tmpname, 0644) == -1)
#endif
{
perror(tmpname);
if (!quiet)
syslog(LOG_ERR, "can't [f]chmod tmpfile (%s): %s\n",
tmpname, strerror(errno));
exit(XFER_FAIL);
}
if ((dbfp = fdopen(dbfd, "r+")) == NULL) {
perror(tmpname);
if (!quiet)
syslog(LOG_ERR, "can't fdopen tmpfile (%s)", tmpname);
exit(XFER_FAIL);
}
if (ixfrfile) {
(void) strcat(tmpiname, ".XXXXXX");
if ((ixfd = mkstemp(tmpiname)) == -1) {
perror(tmpiname);
if (!quiet)
syslog(LOG_ERR,
"can't make tmpifile (%s): %s\n",
tmpiname, strerror(errno));
(void) fclose(dbfp);
(void) close(dbfd);
exit(XFER_FAIL);
}
#ifdef HAVE_FCHMOD /* XXX */
if (fchmod(ixfd, 0644) == -1)
#else
if (chmod(tmpiname, 0644) == -1)
#endif
{
perror(tmpiname);
if (!quiet)
syslog(LOG_ERR,
"can't [f]chmod tmpifile (%s): %s\n",
tmpiname, strerror(errno));
(void) fclose(dbfp);
(void) close(dbfd);
(void) close(ixfd);
exit(XFER_FAIL);
}
close(ixfd);
}
#ifdef DEBUG
if (debug) {
/* ddtfile is now something like "/usr/tmp/xfer.ddt.XXXXXX" */
if ((ddtd = mkstemp(ddtfile)) == -1) {
perror(ddtfile);
debug = 0;
}
#ifdef HAVE_FCHMOD
else if (fchmod(ddtd, 0644) == -1)
#else
else if (chmod(ddtfile, 0644) == -1)
#endif
{
perror(ddtfile);
debug = 0;
} else if ((ddt = fdopen(ddtd, "w")) == NULL) {
perror(ddtfile);
debug = 0;
} else
setvbuf(ddt, NULL, _IOLBF, 0);
}
#endif
if (!init_xfer_logging()) {
cleanup_for_exit();
perror("init_xfer_logging");
}
/*
* Ignore many types of signals that named (assumed to be our parent)
* considers important- if not, the user controlling named with
* signals usually kills us.
*/
(void) signal(SIGHUP, SIG_IGN);
#ifdef SIGSYS
(void) signal(SIGSYS, SIG_IGN);
#endif
#ifdef DEBUG
if (debug == 0)
#endif
{
(void) signal(SIGINT, SIG_IGN);
(void) signal(SIGQUIT, SIG_IGN);
}
(void) signal(SIGILL, SIG_IGN);
#if defined(SIGUSR1) && defined(SIGUSR2)
(void) signal(SIGUSR1, SIG_IGN);
(void) signal(SIGUSR2, SIG_IGN);
#else /* SIGUSR1&&SIGUSR2 */
(void) signal(SIGEMT, SIG_IGN);
(void) signal(SIGFPE, SIG_IGN);
#endif /* SIGUSR1&&SIGUSR2 */
if (dbfile)
dprintf(1, "domain `%s'; file `%s'; serial %u\n",
domain, dbfile, serial_no);
if (ixfrfile)
dprintf(1, "domain `%s'; ixfrfile `%s'; serial %u\n",
domain, ixfrfile, serial_no);
if (tsigfile)
dprintf(1, "tsigfile `%s'\n", tsigfile);
buildservicelist();
buildprotolist();
if (tsig_init(tsigfile) == -1) {
cleanup_for_exit();
return (XFER_FAIL);
}
/* init zone data */
zp = &zone;
if (stub_only)
zp->z_type = Z_STUB;
else
zp->z_type = Z_SECONDARY;
zp->z_class = class;
zp->z_origin = domain;
zp->z_source = dbfile;
zp->z_axfr_src = axfr_src;
zp->z_addrcnt = 0;
dprintf(1, "zone found (%d): \"%s\", source = %s\n",
zp->z_type,
(zp->z_origin[0] == '\0') ? "." : zp->z_origin,
zp->z_source);
for (; optind != argc; optind++) {
int tmpsupportixfr;
tm = argv[optind];
tmpsupportixfr = ISNOTIXFR;
if ((optind+1) != argc) {
if (strcasecmp("ixfr", argv[optind+1]) == 0) {
#if ENABLE_IXFR
tmpsupportixfr = ISIXFR;
servermethode[zp->z_addrcnt] = tmpsupportixfr;
#endif
optind++;
} else if (strcasecmp("axfr", argv[optind+1]) == 0) {
tmpsupportixfr = ISNOTIXFR;
optind++;
}
}
if (!inet_aton(tm, &zp->z_addr[zp->z_addrcnt])) {
if (strcmp("-ixfr",tm)==0) {
#if ENABLE_IXFR
tmpsupportixfr = ISIXFR;
servermethode[zp->z_addrcnt-1] = tmpsupportixfr;
#endif
continue;
} else
if (strcmp("-axfr",tm)==0) {
tmpsupportixfr = ISNOTIXFR;
continue;
}
hp = gethostbyname(tm);
if (hp == NULL) {
syslog(LOG_NOTICE,
"uninterpretable server (%s) for %s\n",
tm, zp->z_origin);
continue;
}
memcpy(&zp->z_addr[zp->z_addrcnt],
hp->h_addr,
INADDRSZ);
dprintf(1, "Arg: \"%s\" %s\n", tm,((tmpsupportixfr) ? "IXFR":"AXFR"));
}
if (++zp->z_addrcnt >= NSMAX) {
zp->z_addrcnt = NSMAX;
dprintf(1, "NSMAX reached\n");
break;
}
}
dprintf(1, "addrcnt = %d\n", zp->z_addrcnt);
res_ninit(&res);
res.options &= ~(RES_DEFNAMES | RES_DNSRCH | RES_RECURSE);
result = getzone(zp, serial_no, port);
(void) fclose(dbfp);
(void) close(dbfd);
if (ixfp)
(void) my_fclose(ixfp);
else
close(ixfd);
switch (result) {
case XFER_SUCCESSAXFR: /* ok exit */
if (tmpiname != NULL)
unlink(tmpiname);
if (ixfrfile) {
/*
* An IXFR was requested but we performed an
* AXFR. Rename the temporary file to the IXFR
* name, named will rename it again to the dbname.
*/
if (isc_movefile(tmpname, ixfrfile) == -1) {
perror("isc_movefile");
#ifdef DEBUG
if (debug)
(void) unlink(ddtfile);
#endif
if (!quiet)
syslog(LOG_ERR,
"rename %s to %s: %s",
tmpname, ixfrfile, strerror(errno));
cleanup_for_exit();
exit(XFER_FAIL);
};
exit(XFER_SUCCESSAXFRIXFRFILE);
}
if (isc_movefile(tmpname, dbfile) == -1) {
perror("isc_movefile");
if (!quiet)
syslog(LOG_ERR, "isc_movefile %s to %s: %m",
tmpname, dbfile);
cleanup_for_exit();
exit(XFER_FAIL);
}
exit(XFER_SUCCESSAXFR);
case XFER_SUCCESSIXFR:
unlink(tmpname);
if (isc_movefile(tmpiname, ixfrfile) == -1) {
perror("isc_movefile");
if (!quiet)
syslog(LOG_ERR, "isc_movefile %s to %s: %m",
tmpiname, ixfrfile);
cleanup_for_exit();
exit(XFER_FAIL);
}
cleanup_for_exit();
exit(XFER_SUCCESSIXFR);
case XFER_UPTODATE: /* the zone was already uptodate */
(void) unlink(tmpname);
if (tmpiname != NULL)
(void) unlink(tmpiname);
cleanup_for_exit();
exit(XFER_UPTODATE);
default:
result = XFER_FAIL;
/* fall through */
case XFER_TIMEOUT:
case XFER_FAIL:
(void) unlink(tmpname);
cleanup_for_exit();
exit(result); /* error or timeout */
}
/*NOTREACHED*/
return (0); /* Make gcc happy. */
}
static char *UsageText[] = {
"\t-z zone_to_transfer\n",
"\t-f db_file\n",
"\t[-i ixfr_file]\n",
"\t[-s serial_no]\n",
"\t[-d debug_level]\n",
"\t[-l debug_log_file]\n",
"\t[-t trace_file]\n",
"\t[-p port]\n",
"\t[-S] [-Z]\n",
"\t[-C class]\n",
"\t[-x axfr-src]\n",
"\t[-T tsig_info_file]\n",
"\tservers [-ixfr|-axfr]...\n",
NULL
};
static void
usage(const char *msg) {
char * const *line;
fprintf(stderr, "Usage error: %s\n", msg);
fprintf(stderr, "Usage: %s\n", ProgName);
for (line = UsageText; *line; line++)
fputs(*line, stderr);
exit(XFER_FAIL);
}
static int
tsig_init(const char *file) {
char buf[1024];
FILE *fp;
char *s;
if (file == NULL)
return (0);
fp = fopen(file, "r");
if (fp == NULL)
return (-1);
dst_init();
INIT_LIST(tsig_list);
while (1) {
tsig_node *n = malloc(sizeof(tsig_node));
int alg, secret_len;
char *cp;
u_char secret[128];
char *name;
if (n == NULL)
return (-1);
s = fgets(buf, sizeof(buf), fp);
if (s == NULL)
break;
buf[strlen(buf)-1] = 0;
inet_aton(buf, &n->addr);
fgets(buf, sizeof(buf), fp);
buf[strlen(buf)-1] = 0;
name = strdup(buf);
if (name == NULL)
return (-1);
fscanf(fp, "%d", &alg);
fgets(buf, sizeof(buf), fp);
fgets(buf, sizeof(buf), fp);
buf[strlen(buf)-1] = 0;
cp = buf;
while (isspace(*cp))
cp++;
secret_len = b64_pton(cp, secret, sizeof(secret));
n->dst_key = dst_buffer_to_key(name, alg, 0, 0,
secret, secret_len);
free(name);
INIT_LINK(n, link);
APPEND(tsig_list, n, link);
}
fclose(fp);
unlink(file);
return (0);
}
#define DEF_DNAME '\001' /* '\0' means the root domain */
/* XXX: The following variables should probably all be "static" */
u_int32_t minimum_ttl = 0;
int soa_cnt = 0, scdsoa = 0, methode = ISNOTIXFR;
int delete_soa = 1;
int ixfr_single_answer_mode = 0;
u_int32_t final_serial = 0;
int ixfr_soa = 0;
int ns_cnt = 0;
int query_type = 0;
int prev_comment = 0; /* was previous record a comment? */
char zone_top[MAXDNAME]; /* the top of the zone */
char prev_origin[MAXDNAME]; /* from most recent $ORIGIN line */
char prev_dname[MAXDNAME] = { DEF_DNAME }; /* from previous record */
char prev_ns_dname[MAXDNAME] = { DEF_DNAME }; /* from most recent NS record */
static int
getzone(struct zoneinfo *zp, u_int32_t serial_no, int port) {
HEADER *hp;
u_int len;
int s, n, l, error = 0;
int was_ixfr = 0;
u_int cnt;
u_char *cp, *nmp, *eom, *tmp ;
u_char *buf = NULL, *cpp = NULL;
u_char *bp;
u_int bufsize = 0;
u_char *buf2 = NULL;
u_int buf2size = 0;
char name2[MAXDNAME];
struct sockaddr_in sin;
struct sockaddr_in local;
int locallen;
#ifdef POSIX_SIGNALS
struct sigaction sv, osv;
#else
struct sigvec sv, osv;
#endif
int qdcount, ancount, aucount, arcount, class, type;
const char *badsoa_msg = "Nil";
struct sockaddr_in my_addr;
char my_addr_text[30];
int alen, ret, tsig_req;
DST_KEY *tsig_key;
ns_tcp_tsig_state tsig_state;
int tsig_signed = 0;
u_char sig[64];
int siglen;
int ixfr_first = 1;
int loop_cnt = 0;
time_t timesigned;
u_int32_t query_serial = serial_no;
#ifdef DEBUG
if (debug) {
(void)fprintf(ddt,"getzone() %s ", zp->z_origin);
switch (zp->z_type) {
case Z_STUB:
fprintf(ddt,"stub\n");
break;
case Z_SECONDARY:
fprintf(ddt,"secondary\n");
break;
default:
fprintf(ddt,"unknown type\n");
}
}
#endif
#ifdef POSIX_SIGNALS
memset(&sv, 0, sizeof sv);
sv.sa_handler = (SIG_FN (*)()) read_alarm;
/* SA_ONSTACK isn't recommended for strict POSIX code */
/* is it absolutely necessary? */
/* sv.sa_flags = SA_ONSTACK; */
sigfillset(&sv.sa_mask);
(void) sigaction(SIGALRM, &sv, &osv);
memset(&sv, 0, sizeof sv);
sv.sa_handler = (SIG_FN (*)()) term_handler;
sigfillset(&sv.sa_mask);
(void) sigaction(SIGTERM, &sv, &osv);
#else
memset(&sv, 0, sizeof sv);
sv.sv_handler = read_alarm;
sv.sv_mask = ~0;
(void) sigvec(SIGALRM, &sv, &osv);
memset(&sv, 0, sizeof sv);
sv.sv_handler = term_handler;
sv.sv_mask = ~0;
(void) sigvec(SIGTERM, &sv, &osv);
#endif
strcpy(zone_top, zp->z_origin);
if ((l = strlen(zone_top)) != 0 && zone_top[l - 1] == '.')
zone_top[l - 1] = '\0';
strcpy(prev_origin, zone_top);
for (cnt = 0; cnt < zp->z_addrcnt; cnt++) {
methode = servermethode[cnt];
sin.sin_addr = zp->z_addr[cnt];
dprintf(3, "address [%s] %s\n",
inet_ntoa(sin.sin_addr),
(methode == ISIXFR) ? "IXFR":"AXFR");
}
for (cnt = 0; cnt < zp->z_addrcnt; cnt++) {
methode = ISNOTIXFR;
curclass = zp->z_class;
/*
* If we have been given a serial number and a ixfr log
* file name then set methode.
*/
if (check_serial && tmpiname != NULL)
methode = servermethode[cnt];
error = 0;
if (buf == NULL) {
if ((buf = (u_char *)malloc(2 * PACKETSZ)) == NULL) {
syslog(LOG_INFO, "malloc(%u) failed",
2 * PACKETSZ);
error++;
break;
}
bufsize = 2 * PACKETSZ;
}
try_again:
if ((s = socket(AF_INET, SOCK_STREAM, PF_UNSPEC)) < 0) {
syslog(LOG_INFO, "socket: %m");
error++;
break;
}
if (zp->z_axfr_src.s_addr != 0) {
memset(&sin, 0, sizeof sin);
sin.sin_family = AF_INET;
sin.sin_port = 0; /* "ANY" */
sin.sin_addr = zp->z_axfr_src;
dprintf(2, "binding to address [%s]\n",
inet_ntoa(sin.sin_addr));
if (bind(s, (struct sockaddr *)&sin, sizeof sin) < 0)
syslog(LOG_INFO, "warning: bind(%s) failed",
inet_ntoa(zp->z_axfr_src));
}
memset(&sin, 0, sizeof sin);
sin.sin_family = AF_INET;
sin.sin_port = port;
sin.sin_addr = zp->z_addr[cnt];
dprintf(2, "connecting to server #%d [%s].%d\n",
cnt+1, inet_ntoa(sin.sin_addr), ntohs(sin.sin_port));
if (connect(s, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
if (zp->z_axfr_src.s_addr != 0) {
dprintf(2, "connect failed, trying w/o -x");
zp->z_axfr_src.s_addr = 0;
(void) my_close(s);
goto try_again;
}
if (!quiet)
syslog(LOG_INFO,
"connect(%s) for zone %s failed: %s",
inet_ntoa(sin.sin_addr), zp->z_origin, strerror(errno));
error++;
(void) my_close(s);
continue;
}
if (methode == ISIXFR && was_ixfr == 0) {
hp = (HEADER *) buf;
cpp = buf;
n = res_nmkquery(&res, QUERY, zp->z_origin, curclass,
T_IXFR, NULL, 0, NULL, buf, bufsize);
dprintf(1, "len = %d\n", n);
if (n < 0) {
if (!quiet)
syslog(LOG_INFO,
"zone %s: dn_comp for ixfr failed",
zp->z_origin);
(void) my_close(s);
#ifdef POSIX_SIGNALS
sigaction(SIGALRM,
&osv,
(struct sigaction*)0);
#else
sigvec(SIGALRM,
&osv,
(struct sigvec *)0);
#endif
return (XFER_FAIL);
}
hp->nscount = htons(1+ntohs(hp->nscount));
cpp += n;
n = dn_comp(zp->z_origin, cpp, bufsize-(cpp-buf),
NULL, NULL);
if (n > 0)
cpp += n;
PUTSHORT(T_SOA, cpp); /* type */
PUTSHORT(C_IN, cpp); /* class */
PUTLONG(0, cpp); /* ttl */
PUTSHORT(22, cpp); /* dlen */
*cpp++ = 0; /* mname */
*cpp++ = 0; /* rname */
PUTLONG(serial_no, cpp);
PUTLONG(0xDEAD, cpp); /* Refresh */
PUTLONG(0xBEEF, cpp); /* Retry */
PUTLONG(0xABCD, cpp); /* Expire */
PUTLONG(0x1776, cpp); /* Min TTL */
n = cpp-buf;
dprintf(1, "len = %d\n", cpp-buf);
if (debug)
res_pquery(&res, buf, n, ddt);
}
else {
n = res_nmkquery(&res, QUERY, zp->z_origin, curclass,
T_SOA, NULL, 0, NULL, buf, bufsize);
if (n < 0) {
if (!quiet)
syslog(LOG_INFO,
"zone %s: res_nmkquery T_SOA failed",
zp->z_origin);
(void) my_close(s);
#ifdef POSIX_SIGNALS
(void) sigaction(SIGALRM, &osv, (struct sigaction *)0);
#else
(void) sigvec(SIGALRM, &osv, (struct sigvec *)0);
#endif
return (XFER_FAIL);
}
}
/*
* Append TSIG to SOA query if desired
*/
tsig_key = tsig_key_from_addr(sin.sin_addr);
if (tsig_key != NULL) {
siglen = sizeof(sig);
ret = ns_sign(buf, &n, bufsize, NOERROR, tsig_key,
NULL, 0, sig, &siglen, timesigned);
if (ret == 0)
tsig_signed = 1;
}
/*
* Send length & message for SOA query
*/
if (writemsg(s, buf, n) < 0) {
syslog(LOG_INFO, "writemsg: %m");
error++;
(void) my_close(s);
continue;
}
/*
* Get out your butterfly net and catch the SOA
*/
if (netread(s, (char *)buf, INT16SZ,
(soa_cnt == 0) ?400 :XFER_TIMER) < 0) {
(void) my_close(s);
error++;
continue;
}
if ((len = ns_get16(buf)) == 0) {
(void) my_close(s);
continue;
}
if (len > bufsize) {
if ((buf = (u_char *)realloc(buf, len)) == NULL) {
syslog(LOG_INFO,
"malloc(%u) failed for SOA from server [%s], zone %s\n",
len,
inet_ntoa(sin.sin_addr),
zp->z_origin);
(void) my_close(s);
continue;
}
bufsize = len;
}
if (netread(s, (char *)buf, len, XFER_TIMER) < 0) {
error++;
(void) my_close(s);
continue;
}
/*
* Verify the TSIG if expected
*/
if (tsig_signed != 0) {
ret = ns_verify(buf, (int *)&len, tsig_key, sig, siglen,
NULL, NULL, &timesigned, 0);
if (ret != 0) {
syslog(LOG_NOTICE,
"SOA TSIG verification from server [%s], zone %s: %s (%d)\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
tsig_rcode(ret), ret);
error++;
continue;
}
}
#ifdef DEBUG
if (debug >= 3) {
(void)fprintf(ddt,"len = %d\n", len);
res_pquery(&res, buf, len, ddt);
}
#endif
if (((methode == ISIXFR) && (ixfp == NULL)) && was_ixfr == 0) {
delete_soa = 1;
ixfr_soa = 0;
if ((ixfp = fopen(tmpiname, "w+")) == NULL) {
perror(tmpiname);
if (!quiet)
syslog(LOG_ERR,
"can't fdopen ixfr log (%s)",
tmpname);
exit(XFER_FAIL);
}
}
hp = (HEADER *) buf;
qdcount = ntohs(hp->qdcount);
ancount = ntohs(hp->ancount);
aucount = ntohs(hp->nscount);
arcount = ntohs(hp->arcount);
/*
* close socket if any of these apply:
* 1) rcode != NOERROR
* 2) not an authority response
* 3) not an answer to our question
* 4) both the number of answers and authority count < 1)
*/
if (hp->rcode != NOERROR || !hp->aa || qdcount != 1 ||
(ancount < 1 && aucount < 1)) {
#ifndef SYSLOG_42BSD
syslog(LOG_NOTICE,
"[%s] %s for %s, SOA query got rcode %d, aa %d, ancount %d, aucount %d",
inet_ntoa(sin.sin_addr),
(hp->aa
? (qdcount==1 ?"no SOA found" :"bad response")
: "not authoritative"),
zp->z_origin[0] != '\0' ? zp->z_origin : ".",
hp->rcode, hp->aa, ancount, aucount);
#endif
error++;
(void) my_close(s);
continue;
}
zp_start = *zp;
if ((int)len < HFIXEDSZ + QFIXEDSZ) {
badsoa_msg = "too short";
badsoa:
syslog(LOG_INFO,
"malformed SOA from [%s], zone %s: %s",
inet_ntoa(sin.sin_addr), zp->z_origin,
badsoa_msg);
error++;
(void) my_close(s);
continue;
}
/*
* Step through response.
*/
tmp = buf + HFIXEDSZ;
eom = buf + len;
/* Query Section. */
if (qdcount > 1) {
badsoa_msg = "question error";
goto badsoa;
}
if (qdcount < 1)
goto no_question;
n = dn_expand(buf, eom, tmp, name2, sizeof name2);
if (n < 0) {
badsoa_msg = "qname error";
goto badsoa;
}
tmp += n;
if (tmp + 2 * INT16SZ > eom) {
badsoa_msg = "query error";
goto badsoa;
}
NS_GET16(type, tmp);
NS_GET16(class, tmp);
if (class != curclass ||
((type != T_SOA) && (type != T_IXFR) && (type != T_AXFR)) ||
ns_samename(zp->z_origin, name2) != 1)
{
syslog(LOG_INFO,
"wrong query in resp from [%s], zone %s: [%s %s %s]\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
name2, p_class(class), p_type(type));
error++;
(void) my_close(s);
continue;
}
no_question:
/* ... Answer Section.
* We may have to loop a little, to bypass SIG SOA's in
* the response.
*/
loop_cnt = 0;
bp = NULL;
do {
u_char *cp4, *ocp = tmp;
u_short type, class, dlen, olen = len;
u_int32_t ttl;
n = dn_expand(buf, eom, tmp, name2, sizeof name2);
if (n < 0) {
badsoa_msg = "aname error";
goto badsoa;
}
tmp += n;
if (loop_cnt == 0)
bp = tmp;
/* Are type, class, and ttl OK? */
cp4 = tmp; /* Leave tmp pointing to type field */
if (eom - cp4 < 3 * INT16SZ + INT32SZ) {
badsoa_msg = "zinfo too short";
goto badsoa;
}
NS_GET16(type, cp4);
NS_GET16(class, cp4);
NS_GET32(ttl, cp4);
NS_GET16(dlen, cp4);
if (cp4 + dlen > eom) {
badsoa_msg = "zinfo dlen too big";
goto badsoa;
}
if (type == T_SOA) {
if (was_ixfr) {
methode = ISNOTIXFR;
break;
}
if ((methode == ISIXFR) && (loop_cnt == 0)) {
soa_cnt++;
badsoa_msg = soa_zinfo(&zp_finish, tmp, eom);
if (badsoa_msg)
goto badsoa;
if (ixfp)
if (ixfr_log(buf, len, &delete_soa, ixfp,
&sin, domain, &serial_no,
&ixfr_first) < 0) {
error++;
break;
}
} else {
if (methode == ISIXFR) {
check_serial = 0;
soa_cnt++;
break;
}
break;
}
}
if ((loop_cnt >= 1) && (soa_cnt < 2)) {
dprintf(1,
"server %s %d rejected IXFR and responded with AXFR\n",
inet_ntoa(sin.sin_addr), soa_cnt);
methode = ISNOTIXFR;
check_serial = 0;
was_ixfr++;
tmp = bp;
break;
}
/* Skip to next record, if any. */
dprintf(1, "skipping %s %s RR in response\n",
name2, p_type(type));
tmp = cp4 + dlen;
loop_cnt++;
if (ancount == 1 && loop_cnt == 1)
{
badsoa_msg = soa_zinfo(&zp_start, bp, eom);
if (badsoa_msg)
goto badsoa;
if (zp_start.z_serial == serial_no) {
(void) my_close(s);
dprintf(1, "zone up-to-date, serial %u\n",
zp_start.z_serial);
if (ixfp) {
(void) unlink (tmpiname);
(void) fclose(ixfp);
ixfp = NULL;
}
return (XFER_UPTODATE);
}
if (buf2 == NULL) {
if ((buf2 = (u_char *)malloc(2 * PACKETSZ)) == NULL) {
syslog(LOG_INFO, "malloc(%u) failed", 2 * PACKETSZ);
error++;
break;
}
buf2size = 2 * PACKETSZ;
}
if (netread(s, (char *)buf2, INT16SZ, XFER_TIMER) < 0) {
(void) my_close(s);
error++;
tmp = bp;
check_serial = 0;
break;
}
if ((len = ns_get16(buf2)) == 0) {
(void) my_close(s);
tmp = bp;
check_serial = 0;
break;
}
if (len > buf2size) {
if ((buf2 = (u_char *)realloc(buf2, len)) == NULL) {
syslog(LOG_INFO,
"malloc(%u) failed for SOA from server [%s], zone %s\n",
len,
inet_ntoa(sin.sin_addr),
zp->z_origin);
(void) my_close(s);
tmp = bp;
check_serial = 0;
break;
}
buf2size = len;
}
if (netread(s, (char *)buf2, len, XFER_TIMER) < 0) {
error++;
(void) my_close(s);
tmp = bp;
check_serial = 0;
break;
}
/*
* Verify the TSIG if expected
*/
if (tsig_signed != 0) {
ret = ns_verify(buf, (int *)&len, tsig_key, sig, siglen,
NULL, NULL, &timesigned, 0);
if (ret != 0) {
syslog(LOG_NOTICE,
"SOA TSIG verification from server [%s], zone %s: %s (%d)\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
tsig_rcode(ret), ret);
error++;
(void) my_close(s);
tmp = bp;
check_serial = 0;
break;
}
}
#ifdef DEBUG
if (debug >= 3) {
(void)fprintf(ddt,"len = %d\n", len);
res_pquery(&res, buf2, len, ddt);
}
#endif
hp = (HEADER *) buf2;
qdcount = ntohs(hp->qdcount);
ancount = ntohs(hp->ancount);
aucount = ntohs(hp->nscount);
arcount = ntohs(hp->arcount);
tmp = buf2 + HFIXEDSZ;
eom = buf2 + len;
/* Query Section. */
if (qdcount > 1) {
badsoa_msg = "question error";
goto badsoa;
}
n = dn_expand(buf2, eom, tmp, name2, sizeof name2);
if (n < 0) {
badsoa_msg = "qname error";
goto badsoa;
}
tmp += n;
bp = tmp;
if (tmp + 2 * INT16SZ > eom) {
badsoa_msg = "query error";
goto badsoa;
}
NS_GET16(type, tmp);
NS_GET16(class, tmp);
if (class != curclass ||
ns_samename(zp->z_origin, name2) != 1)
{
syslog(LOG_INFO,
"wrong query in resp from [%s], zone %s: [%s %s %s]\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
name2, p_class(class), p_type(type));
error++;
(void) my_close(s);
tmp = bp;
check_serial = 0;
break;
}
if (type == T_SOA) {
ixfr_single_answer_mode = 1;
if (ixfp)
if (ixfr_log(buf2, len, &delete_soa, ixfp,
&sin, domain, &serial_no,
&ixfr_first) < 0) {
error++;
break;
}
free(buf);
buf = buf2;
bufsize = buf2size;
break;
}
else {
methode = ISNOTIXFR;
was_ixfr++;
check_serial = 0;
cp = buf + HFIXEDSZ;
n = print_output(zp, serial_no, buf, olen, ocp, 3);
buf = buf2;
bufsize = buf2size;
break;
}
}
if (loop_cnt > 1) {
tmp = bp;
check_serial = 0;
break;
}
} while (1);
if (error != 0) {
return (XFER_FAIL);
}
if (ns_samename(zp->z_origin, name2) != 1) {
syslog(LOG_INFO,
"wrong answer in resp from [%s], zone %s: [%s %s %s]\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
name2, p_class(class), p_type(type));
error++;
(void) my_close(s);
continue;
}
if (loop_cnt < 1) {
badsoa_msg = soa_zinfo(&zp_start, tmp, eom);
if (badsoa_msg)
goto badsoa;
}
if (methode == ISNOTIXFR) {
if (SEQ_GT(zp_start.z_serial, serial_no) || !check_serial) {
const char *l, *nl, *t;
if (soa_cnt) {
goto axfr_response;
}
dprintf(1, "need update, serial %u\n",
zp_start.z_serial);
soa_cnt = 0;
hp = (HEADER *) buf;
ns_cnt = 0;
gettime(&tt);
locallen = sizeof local;
if (getsockname(s, (struct sockaddr *)&local,
&locallen) < 0) {
memset(&local, 0, sizeof local);
}
for (l = Version; l; l = nl) {
size_t len;
if ((nl = strchr(l, '\n')) != NULL) {
len = nl - l;
nl = nl + 1;
} else {
len = strlen(l);
nl = NULL;
}
while (isspace((unsigned char) *l))
l++;
if (*l)
fprintf(dbfp, "; BIND version %.*s\n",
(int)len, l);
}
fprintf(dbfp, check_serial?
"; zone '%s' last serial %u\n":
"; zone '%s' first transfer\n",
domain, serial_no);
t = strdup(inet_ntoa(sin.sin_addr));
if (t == NULL)
return (XFER_FAIL);
fprintf(dbfp, "; from %s:%d (local %s) using %s at %s",
t, ntohs(sin.sin_port),
inet_ntoa(local.sin_addr),
(methode == ISIXFR) ? "IXFR":"AXFR",
ctimel(tt.tv_sec));
free((void *)t);
for (;;) {
if ((soa_cnt == 0) || (zp->z_type == Z_STUB)) {
if (zp->z_type == Z_STUB) {
if (soa_cnt == 1 &&
ns_cnt == 0)
query_type = T_NS;
else
query_type = T_SOA;
} else if (methode == ISIXFR)
query_type = T_IXFR;
else
query_type = xfr_qtype;
n = res_nmkquery(&res, QUERY,
zp->z_origin,
curclass, query_type,
NULL, 0,
NULL, buf, bufsize);
syslog(LOG_INFO,
"send %s query %d to %s",
(query_type == T_IXFR) ? "IXFR" :
(query_type == T_AXFR) ? "AXFR" :
(query_type == ns_t_zxfr) ? "ZXFR" :
(query_type == T_SOA) ? "SOA" : "NS",
cnt, inet_ntoa(sin.sin_addr));
dprintf(1,
"send %s query to %s\n",
(query_type == T_IXFR) ? "IXFR" :
(query_type == T_AXFR) ? "AXFR" :
(query_type == ns_t_zxfr) ? "ZXFR" :
(query_type == T_SOA) ? "SOA" : "NS",
inet_ntoa(sin.sin_addr));
dprintf(1,"bufsize = %d\n", bufsize);
if (n < 0) {
if (!quiet) {
if (zp->z_type == Z_STUB)
syslog(LOG_INFO,
(query_type == T_SOA)
? "zone %s: res_nmkquery T_SOA failed"
: "zone %s: res_nmkquery T_NS failed",
zp->z_origin);
else
syslog(LOG_INFO,
"zone %s: res_nmkquery %s failed",
zp->z_origin,
p_type(query_type));
}
(void) my_close(s);
#ifdef POSIX_SIGNALS
sigaction(SIGALRM, &osv,
(struct sigaction *)0);
#else
sigvec(SIGALRM, &osv,
(struct sigvec *)0);
#endif
return (XFER_FAIL);
}
cpp = buf + n;
/*
* Append TSIG to AXFR query if desired
*/
if (tsig_signed != 0) {
siglen = sizeof(sig);
ns_sign(buf, &n, bufsize,
NOERROR, tsig_key,
NULL, 0, sig, &siglen,
timesigned);
cpp = buf + n;
ns_verify_tcp_init(tsig_key,
sig, siglen,
&tsig_state);
}
/*
* Send length & msg for zone transfer
*/
if (writemsg(s, buf, cpp - buf) < 0) {
syslog(LOG_INFO,
"writemsg: %m");
error++;
(void) my_close(s);
break;
}
}
/*XXX ZXFR*/
receive:
/*
* Receive length & response
*/
if (netread(s, (char *)buf, INT16SZ,
(soa_cnt == 0) ?300 :XFER_TIMER)
< 0) {
error++;
break;
}
if ((len = ns_get16(buf)) == 0)
break;
if (len > bufsize) {
buf = (u_char *)realloc(buf, len);
if (buf == NULL) {
syslog(LOG_INFO,
"malloc(%u) failed for packet from server [%s], zone %s\n",
len,
inet_ntoa(sin.sin_addr),
zp->z_origin);
error++;
break;
}
bufsize = len;
}
hp = (HEADER *)buf;
eom = buf + len;
if (netread(s, (char *)buf, len, XFER_TIMER)
< 0) {
error++;
break;
}
#ifdef DEBUG
if (debug >= 3) {
(void)fprintf(ddt,"len = %d\n", len);
res_pquery(&res, buf, len, ddt);
}
if (fp)
res_pquery(&res, buf, len, fp);
#endif
/*
* Verify the TSIG if expected
*/
if (tsig_signed != 0) {
tsig_req = (soa_cnt == 0);
ret = ns_verify_tcp(buf, (int *)&len,
&tsig_state,
tsig_req);
eom = buf + len;
if (ret != 0) {
syslog(LOG_NOTICE,
"TSIG verification from server [%s], zone %s: %s (%d)\n",
inet_ntoa(sin.sin_addr),
zp->z_origin,
tsig_rcode(ret), ret);
error++;
break;
}
}
if (len < HFIXEDSZ) {
badrec:
error++;
alen = sizeof my_addr;
if (getsockname(s, (struct sockaddr *)
&my_addr, &alen) < 0)
sprintf(my_addr_text,
"[errno %d]", errno);
else
sprintf(my_addr_text,
"[%s].%u",
inet_ntoa(my_addr.
sin_addr),
ntohs(my_addr.sin_port)
);
if ((hp->rcode == REFUSED) &&
(len >= HFIXEDSZ)) {
syslog(LOG_INFO,
"[%s] transfer refused from [%s], zone %s\n",
my_addr_text,
inet_ntoa(sin.sin_addr),
zp->z_origin);
} else {
syslog(LOG_INFO,
"[%s] record too short from [%s], zone %s\n",
my_addr_text,
inet_ntoa(sin.sin_addr),
zp->z_origin);
}
break;
}
axfr_response:
if (query_type == T_IXFR)
if (hp->rcode != NOERROR) {
dprintf(1,
"server %s did not support IXFR\n",
inet_ntoa(sin.sin_addr));
methode = ISNOTIXFR;
continue;
};
cp = buf + HFIXEDSZ;
if (ntohs(hp->qdcount) == 1) {
if ((query_type == T_IXFR) && (methode == ISIXFR)) {
dprintf(1,
"server %s rejected IXFR and responded with AXFR\n",
inet_ntoa(sin.sin_addr));
methode = ISNOTIXFR;
}
n = dn_skipname(cp, eom);
if ((n == -1) ||
((n + QFIXEDSZ) >= (eom - cp)))
goto badrec;
cp += n + QFIXEDSZ;
}
nmp = cp;
if ((n = dn_skipname(cp, eom)) == -1)
goto badrec;
tmp = cp + n;
if (zp->z_type == Z_STUB) {
ancount = ntohs(hp->ancount);
n = 0;
for (cnt = 0;
cnt < (u_int)ancount;
cnt++) {
n = print_output(zp,
serial_no,
buf, len, cp,
0);
if (n < 0)
break;
cp += n;
}
/*
* If we've processed the answer
* section and didn't get any useful
* answers, bail out.
*/
if (query_type == T_SOA &&
soa_cnt == 0) {
syslog(LOG_ERR,
"stubs: no SOA in answer");
error++;
break;
}
if (query_type == T_NS &&
ns_cnt == 0) {
syslog(LOG_ERR,
"stubs: no NS in answer");
error++;
break;
}
if (n >= 0 && hp->nscount) {
ancount = ntohs(hp->nscount);
for (cnt = 0;
cnt < (u_int)ancount;
cnt++) {
n = print_output(zp,
serial_no,
buf,
len,
cp,
0);
if (n < 0)
break;
cp += n;
}
}
ancount = ntohs(hp->arcount);
for (cnt = 0;
n > 0 && cnt < (u_int)ancount;
cnt++) {
n = print_output(zp, serial_no,
buf, len, cp,
0);
cp += n;
}
if (n < 0) {
syslog(LOG_INFO,
"print_output: unparseable answer (%d), zone %s",
hp->rcode,
zp->z_origin);
error++;
break;
}
if (cp != eom) {
syslog(LOG_INFO,
"print_output: short answer (%d, %d), zone %s",
cp - buf, eom - buf,
zp->z_origin);
error++;
break;
}
} else {
ancount = ntohs(hp->ancount);
if (query_type == T_IXFR &&
methode == ISIXFR) {
if (ixfr_log(buf, len,
&delete_soa, ixfp,
&sin, domain,
&serial_no,
&ixfr_first) < 0){
error++;
break;
}
}
for (n = cnt = 0;
cnt < (u_int)ancount;
cnt++) {
n = print_output(zp, serial_no,
buf, len, cp,
0);
if (n < 0)
break;
cp += n;
}
if (n < 0) {
syslog(LOG_INFO,
"print_output: unparseable answer (%d), zone %s",
hp->rcode,
zp->z_origin);
error++;
break;
}
if (cp != eom) {
syslog(LOG_INFO,
"print_output: short answer (%d, %d), zone %s",
cp - buf, eom - buf,
zp->z_origin);
error++;
break;
}
}
if ((soa_cnt >= 2) && (methode == ISNOTIXFR))
break;
if ((soa_cnt == -1) && (methode == ISIXFR))
break;
}
(void) my_close(s);
if (error == 0) {
#ifdef POSIX_SIGNALS
(void) sigaction(SIGALRM, &osv,
(struct sigaction *)0);
#else
(void) sigvec(SIGALRM, &osv,
(struct sigvec *)0);
#endif
if (ixfp) {
(void) fclose(ixfp);
ixfp = NULL;
}
return (XFER_SUCCESSAXFR);
}
if (ixfp) {
(void) fclose(ixfp);
ixfp = NULL;
}
dprintf(2, "error receiving zone transfer\n");
} else if (zp_start.z_serial == serial_no) {
(void) my_close(s);
dprintf(1, "zone up-to-date, serial %u\n",
zp_start.z_serial);
if (ixfp) {
(void) unlink (tmpiname);
(void) fclose(ixfp);
ixfp = NULL;
}
return (XFER_UPTODATE);
} else {
(void) my_close(s);
if (!quiet)
syslog(LOG_NOTICE,
"serial from [%s], zone %s: %u lower than current: %u\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
zp_start.z_serial, serial_no);
return (XFER_FAIL);
}
} else {
if (zp_finish.z_serial == query_serial) {
(void) my_close(s);
dprintf(1, "zone up-to-date, serial %u\n",
zp_start.z_serial);
if (ixfp) {
(void) unlink (tmpiname);
(void) fclose(ixfp);
ixfp = NULL;
}
return (XFER_UPTODATE);
}
if (SEQ_GT(query_serial, zp_finish.z_serial)) {
if (!quiet)
syslog(LOG_NOTICE,
"serial from [%s], zone %s: %u lower than current: %u\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
zp_finish.z_serial, query_serial);
dprintf(1,
"serial from [%s], zone %s: %u lower than current: %u\n",
inet_ntoa(sin.sin_addr), zp->z_origin,
zp_finish.z_serial, query_serial);
if (ixfp) {
(void) fclose(ixfp);
ixfp = NULL;
(void) unlink (tmpiname);
}
if (was_ixfr == 0) {
was_ixfr++;
n = res_nmkquery(&res, QUERY,
zp->z_origin,
curclass, T_AXFR,
NULL, 0,
NULL, buf, bufsize);
if (n < 0) {
if (!quiet)
syslog(LOG_INFO,
"zone %s: res_nmkquery T_SOA failed",
zp->z_origin);
(void) my_close(s);
#ifdef POSIX_SIGNALS
(void) sigaction(SIGALRM, &osv,
(struct sigaction *)0);
#else
(void) sigvec(SIGALRM, &osv,
(struct sigvec *)0);
#endif
return (XFER_FAIL);
}
/*
* Append TSIG to SOA query if desired
*/
tsig_key = tsig_key_from_addr(sin.sin_addr);
if (tsig_key != NULL) {
siglen = sizeof(sig);
ret = ns_sign(buf, &n, bufsize,
NOERROR,
tsig_key, NULL,
0, sig, &siglen,
timesigned);
if (ret == 0)
tsig_signed = 1;
}
/*
* Send length & message for AXFR query
*/
if (writemsg(s, buf, n) < 0)
syslog(LOG_INFO,
"writemsg: %m");
else {
methode = ISNOTIXFR;
check_serial = 0;
soa_cnt = 0;
was_ixfr = 0;
goto receive;
}
}
(void) my_close(s);
return (XFER_FAIL);
}
if (soa_cnt > 2) {
methode = ISNOTIXFR;
check_serial = 0;
soa_cnt = 0;
goto axfr_response;
}
dprintf(1, "We have an IXFR\n");
loop_cnt = 0;
while (SEQ_GT(zp_finish.z_serial, serial_no)) {
/*
* Receive length & response
*/
if (netread(s, (char *)buf, INT16SZ,
(soa_cnt == 0) ?300 :XFER_TIMER)
< 0) {
error++;
break;
}
if ((len = ns_get16(buf)) == 0)
break;
if (len > bufsize) {
buf = (u_char *)realloc(buf, len);
if (buf == NULL) {
syslog(LOG_INFO,
"malloc(%u) failed for packet from server [%s], zone %s\n",
len,
inet_ntoa(sin.sin_addr),
zp->z_origin);
error++;
break;
}
bufsize = len;
}
hp = (HEADER *)buf;
eom = buf + len;
if (netread(s, (char *)buf, len, XFER_TIMER)
< 0) {
error++;
break;
}
#ifdef DEBUG
if (debug >= 3) {
(void)fprintf(ddt,"len = %d\n", len);
res_pquery(&res, buf, len, ddt);
}
if (fp)
res_pquery(&res, buf, len, fp);
#endif
/*
* Verify the TSIG if expected
*/
if (tsig_signed != 0) {
tsig_req = (soa_cnt == 0);
ret = ns_verify_tcp(buf, (int *)&len,
&tsig_state,
tsig_req);
eom = buf + len;
if (ret != 0) {
syslog(LOG_NOTICE,
"TSIG verification from server [%s], zone %s: %s (%d)\n",
inet_ntoa(sin.sin_addr),
zp->z_origin,
tsig_rcode(ret), ret);
error++;
break;
}
}
if (len < HFIXEDSZ) {
error++;
alen = sizeof my_addr;
if (getsockname(s, (struct sockaddr *)
&my_addr, &alen) < 0)
sprintf(my_addr_text, "[errno %d]", errno);
else
sprintf(my_addr_text, "[%s].%u",
inet_ntoa(my_addr. sin_addr),
ntohs(my_addr.sin_port));
if ((hp->rcode == REFUSED) &&
(len >= HFIXEDSZ)) {
syslog(LOG_INFO,
"[%s] transfer refused from [%s], zone %s\n",
my_addr_text,
inet_ntoa(sin.sin_addr),
zp->z_origin);
} else {
syslog(LOG_INFO,
"[%s] record too short from [%s], zone %s\n",
my_addr_text,
inet_ntoa(sin.sin_addr),
zp->z_origin);
}
break;
}
if (ixfp) {
if (ixfr_log(buf, len, &delete_soa, ixfp,
&sin, domain, &serial_no,
&ixfr_first) < 0) {
error++;
break;
}
}
}
(void) my_close(s);
if (!error) {
fprintf(ixfp, "update:\t{add} ");
if (soa_buf)
fputs(soa_buf, ixfp);
fprintf(ixfp, "[END_DELTA]\n");
return (XFER_SUCCESSIXFR);
}
}
}
#ifdef POSIX_SIGNALS
(void) sigaction(SIGALRM, &osv, (struct sigaction *)0);
#else
(void) sigvec(SIGALRM, &osv, (struct sigvec *)0);
#endif
if (ixfp) {
(void) unlink (tmpiname);
(void) my_fclose(ixfp);
ixfp = 0;
}
if (!error)
return (XFER_TIMEOUT);
return (XFER_FAIL);
}
static SIG_FN
term_handler() {
cleanup_for_exit();
_exit(XFER_FAIL); /* not safe to call exit() from a signal handler */
}
/*
* Set flag saying to read was interrupted
* used for a read timer
*/
static SIG_FN
read_alarm() {
read_interrupted = 1;
}
static int
netread(int fd, char *buf, int len, int timeout) {
static const char setitimerStr[] = "setitimer: %m";
struct itimerval ival, zeroival;
struct sockaddr_in sa;
int n, salen;
#if defined(NETREAD_BROKEN)
int retries = 0;
#endif
memset(&zeroival, 0, sizeof zeroival);
ival = zeroival;
ival.it_value.tv_sec = timeout;
while (len > 0) {
#ifndef WINNT
if (setitimer(ITIMER_REAL, &ival, NULL) < 0) {
syslog(LOG_INFO, setitimerStr);
return (-1);
}
#endif
errno = 0;
salen = sizeof sa;
n = recvfrom(fd, buf, len, 0, (struct sockaddr *)&sa, &salen);
if (n == 0 && errno == 0) {
#if defined(NETREAD_BROKEN)
if (++retries < 42) /* doug adams */
continue;
#endif
syslog(LOG_INFO, "premature EOF, fetching \"%s\"",
domain);
return (-1);
}
if (n < 0) {
if (errno == 0) {
#if defined(NETREAD_BROKEN)
if (++retries < 42) /* doug adams */
continue;
#endif
syslog(LOG_INFO,
"recv(len=%d): n=%d && !errno",
len, n);
return (-1);
}
if (errno == EINTR) {
if (!read_interrupted) {
/* It wasn't a timeout; ignore it. */
continue;
}
errno = ETIMEDOUT;
}
syslog(LOG_INFO, "recv(len=%d): %m", len);
return (-1);
}
buf += n;
len -= n;
}
#ifndef WINNT
if (setitimer(ITIMER_REAL, &zeroival, NULL) < 0) {
syslog(LOG_INFO, setitimerStr);
return (-1);
}
#endif
return (0);
}
/*
* Write a counted buffer to a file descriptor preceded by a length word.
*/
static int
writemsg(int rfd, const u_char *msg, int msglen) {
struct iovec iov[2];
u_char len[INT16SZ];
int ret;
__putshort(msglen, len);
iov[0].iov_base = (char *)len;
iov[0].iov_len = INT16SZ;
iov[1].iov_base = (char *)msg;
iov[1].iov_len = msglen;
ret = writev(rfd, iov, 2);
if (ret != INT16SZ + msglen) {
syslog(LOG_DEBUG, "writemsg(%d,%p,%d) failed: %s",
rfd, msg, msglen, strerror(errno));
return (-1);
}
return (ret);
}
static const char *
soa_zinfo(struct zoneinfo *zp, u_char *cp, u_char *eom) {
int n, type, class;
u_int32_t ttl;
u_int16_t dlen;
u_char *rdatap;
/* Are type, class, and ttl OK? */
if (eom - cp < 3 * INT16SZ + INT32SZ)
return ("zinfo too short");
NS_GET16(type, cp);
NS_GET16(class, cp);
NS_GET32(ttl, cp);
NS_GET16(dlen, cp);
rdatap = cp;
if (type != T_SOA || class != curclass)
return ("zinfo wrong typ/cla/ttl");
/* Skip master name and contact name, we can't validate them. */
if ((n = dn_skipname(cp, eom)) == -1)
return ("zinfo mname");
cp += n;
if ((n = dn_skipname(cp, eom)) == -1)
return ("zinfo hname");
cp += n;
/* Grab the data fields. */
if (eom - cp < 5 * INT32SZ)
return ("zinfo dlen");
NS_GET32(zp->z_serial, cp);
NS_GET32(zp->z_refresh, cp);
NS_GET32(zp->z_retry, cp);
NS_GET32(zp->z_expire, cp);
NS_GET32(zp->z_minimum, cp);
if (cp != rdatap + dlen)
return ("bad soa dlen");
return (NULL);
}
#define BOUNDS_CHECK(ptr, count) \
do { \
if ((ptr) + (count) > eom) { \
hp->rcode = FORMERR; \
return (-1); \
} \
} while (0)
/*
* Parse the message, determine if it should be printed, and if so, print it
* in .db file form. Does minimal error checking on the message content.
*
* XXX why aren't we using ns_sprintrr() ?
*/
static int
print_output(struct zoneinfo *zp, u_int32_t serial_no, u_char *msg,
int msglen, u_char *rrp, int xfr_detect) {
u_char *cp;
HEADER *hp = (HEADER *) msg;
u_int32_t ttl, tmpnum;
int i, j, tab, result, n1, n;
u_int class, type, dlen;
char data[MAXDATA];
u_char *cp1, *cp2, *temp_ptr, *eom, *rr_type_ptr;
u_char *cdata, *rdatap;
char *origin, dname[MAXDNAME];
const char *proto;
const char *ignore = "";
const char *badsoa_msg;
int escaped = 0;
eom = msg + msglen;
cp = rrp;
n = dn_expand(msg, msg + msglen, cp, dname, sizeof dname);
if (n < 0) {
hp->rcode = FORMERR;
return (-1);
}
cp += n;
BOUNDS_CHECK(cp, 3 * INT16SZ + INT32SZ);
rr_type_ptr = cp;
NS_GET16(type, cp);
NS_GET16(class, cp);
NS_GET32(ttl, cp);
/*
* Following the Clarification draft's direction, we treat TTLs with
* the MSB set as if they were 0.
*/
if (ttl > MAXIMUM_TTL) {
syslog(LOG_INFO, "%s: TTL > %u, converted to 0", dname,
MAXIMUM_TTL);
ttl = 0;
}
NS_GET16(dlen, cp);
BOUNDS_CHECK(cp, dlen);
rdatap = cp;
origin = dname;
while (*origin) {
if (!escaped && *origin == '.') {
origin++; /* skip over '.' */
break;
}
escaped = (*origin++ == '\\') && !escaped;
}
dprintf(3, "print_output: dname %s type %d class %d ttl %u\n",
dname, type, class, ttl);
/*
* Convert the resource record data into the internal database format.
* CP points to the raw resource record.
* After this switch:
* CP has been updated to point past the RR.
* CP1 points to the internal database version.
* N is the length of the internal database version.
*/
switch (type) {
case T_A:
case T_WKS:
case T_HINFO:
case T_TXT:
case T_X25:
case T_ISDN:
case T_LOC:
case T_NSAP:
case T_AAAA:
case T_KEY:
case ns_t_cert:
cp1 = cp;
n = dlen;
cp += n;
break;
case T_CNAME:
case T_MB:
case T_MG:
case T_MR:
case T_NS:
case T_PTR:
n = dn_expand(msg, msg + msglen, cp, data, sizeof data);
if (n < 0) {
hp->rcode = FORMERR;
return (-1);
}
cp += n;
cp1 = (u_char *)data;
n = strlen(data) + 1;
break;
case T_MINFO:
case T_SOA:
case T_RP:
n = dn_expand(msg, msg + msglen, cp, data, sizeof data);
if (n < 0) {
hp->rcode = FORMERR;
return (-1);
}
cp += n;
n = strlen(data) + 1;
cp1 = (u_char *)data + n;
n1 = sizeof data - n;
if (type == T_SOA)
n1 -= 5 * INT32SZ;
n = dn_expand(msg, msg + msglen, cp, (char *)cp1, n1);
if (n < 0) {
hp->rcode = FORMERR;
return (-1);
}
cp += n;
cp1 += strlen((char *) cp1) + 1;
if (type == T_SOA) {
BOUNDS_CHECK(cp, 5 * INT32SZ);
temp_ptr = cp + 4 * INT32SZ;
NS_GET32(minimum_ttl, temp_ptr);
/*
* Following the Clarification draft's direction,
* we treat TTLs with the MSB set as if they were 0.
*/
if (minimum_ttl > MAXIMUM_TTL) {
syslog(LOG_INFO,
"%s: SOA minimum TTL > %u, converted to 0",
dname, MAXIMUM_TTL);
minimum_ttl = 0;
}
n = 5 * INT32SZ;
memcpy(cp1, cp, n);
cp += n;
cp1 += n;
}
n = cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
case T_NAPTR:
/* Grab weight and port. */
BOUNDS_CHECK(cp, INT16SZ*2);
memcpy(data, cp, INT16SZ*2);
cp1 = (u_char *)data + INT16SZ*2;
cp += INT16SZ*2;
/* Flags */
BOUNDS_CHECK(cp, 1);
n = *cp++;
BOUNDS_CHECK(cp, n);
*cp1++ = n;
memcpy(cp1, cp, n);
cp += n; cp1 += n;
/* Service */
BOUNDS_CHECK(cp, 1);
n = *cp++;
BOUNDS_CHECK(cp, n);
*cp1++ = n;
memcpy(cp1, cp, n);
cp += n; cp1 += n;
/* Regexp */
BOUNDS_CHECK(cp, 1);
n = *cp++;
BOUNDS_CHECK(cp, n);
*cp1++ = n;
memcpy(cp1, cp, n);
cp += n; cp1 += n;
/* Replacement */
n = dn_expand(msg, msg + msglen, cp, (char *)cp1,
sizeof data - ((char *)cp1 - data));
if (n < 0)
return (-1);
cp += n;
/* compute end of data */
cp1 += strlen((char *)cp1) + 1;
/* compute size of data */
n = cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
case T_MX:
case T_AFSDB:
case T_RT:
case T_SRV:
/* grab preference */
BOUNDS_CHECK(cp, INT16SZ);
memcpy(data, cp, INT16SZ);
cp1 = (u_char *)data + INT16SZ;
cp += INT16SZ;
if (type == T_SRV) {
BOUNDS_CHECK(cp, INT16SZ*2);
memcpy(cp1, cp, INT16SZ*2);
cp1 += INT16SZ*2;
cp += INT16SZ*2;
}
/* get name */
n = dn_expand(msg, msg + msglen, cp,
(char *)cp1,
sizeof data - (cp1 - (u_char *)data));
if (n < 0)
return (-1);
cp += n;
/* compute end of data */
cp1 += strlen((char *) cp1) + 1;
/* compute size of data */
n = cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
case T_PX:
/* grab preference */
BOUNDS_CHECK(cp, INT16SZ);
memcpy(data, cp, INT16SZ);
cp1 = (u_char *)data + INT16SZ;
cp += INT16SZ;
/* get MAP822 name */
n = dn_expand(msg, msg + msglen, cp,
(char *)cp1, sizeof data - INT16SZ);
if (n < 0)
return (-1);
cp += n;
cp1 += (n = (strlen((char *) cp1) + 1));
n1 = sizeof data - n;
/* get MAPX400 name */
n = dn_expand(msg, msg + msglen, cp, (char *)cp1, n1);
if (n < 0)
return (-1);
cp += n;
cp1 += strlen((char *) cp1) + 1;
n = cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
case T_SIG:
/* CP is the raw resource record as it arrived.
* CP1, after this switch, points to the internal database version. */
cp1 = (u_char *)data;
/* first just copy over the type_covered, algorithm, */
/* labels, orig ttl, two timestamps, and the footprint */
BOUNDS_CHECK(cp, NS_SIG_SIGNER);
memcpy(cp1, cp, NS_SIG_SIGNER);
cp += NS_SIG_SIGNER;
cp1 += NS_SIG_SIGNER;
/* then the signer's name */
n = dn_expand(msg, msg + msglen, cp,
(char *)cp1, (sizeof data) - 18);
if (n < 0)
return (-1);
cp += n;
cp1 += strlen((char*)cp1)+1;
/* finally, we copy over the variable-length signature.
Its size is the total data length, minus what we copied. */
n = dlen - (NS_SIG_SIGNER + n);
if (n > ((int)(sizeof data) - (int)(cp1 - (u_char *)data))) {
hp->rcode = FORMERR;
return (-1); /* out of room! */
}
memcpy(cp1, cp, n);
cp += n;
cp1 += n;
/* compute size of data */
n = cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
case T_NXT:
n = dn_expand(msg, msg + msglen, cp,
(char *)data, sizeof data);
if (n < 0) {
hp->rcode = FORMERR;
return (-1);
}
cp += n;
cp1 = (u_char *)data + strlen(data) + 1;
n = dlen - n;
if (n > ((int)(sizeof data) - (int)(cp1 - (u_char *)data))) {
hp->rcode = FORMERR;
return (-1); /* out of room! */
}
if (n > 0) { /* Actually, n should never be less than 4 */
memcpy(cp1, cp, n);
cp += n;
} else {
hp->rcode = FORMERR;
return (-1);
}
n += cp1 - (u_char *)data;
cp1 = (u_char *)data;
break;
default:
syslog(LOG_INFO, "\"%s %s %s\" - unknown type (%d)",
dname, p_class(class), p_type(type), type);
hp->rcode = NOTIMP;
return (-1);
}
if (n > MAXDATA) {
dprintf(1, "update type %d: %d bytes is too much data\n",
type, n);
hp->rcode = FORMERR;
return (-1);
}
if (cp != rdatap + dlen) {
dprintf(1,
"encoded rdata length is %u, but actual length was %u\n",
dlen, (u_int)(cp - rdatap));
hp->rcode = FORMERR;
return (-1);
}
cdata = cp1;
result = cp - rrp;
/*
* Special handling for SOA records.
*/
if (type == T_SOA) {
if (ns_samename(dname, zp->z_origin) != 1) {
syslog(LOG_INFO,
"wrong zone name in XFR (wanted \"%s\", got \"%s\")",
zp->z_origin, dname);
hp->rcode = FORMERR;
return (-1);
}
if (soa_cnt == 0) {
badsoa_msg = soa_zinfo(&zp_start, rr_type_ptr, eom);
if (badsoa_msg) {
syslog(LOG_INFO,
"malformed SOA for zone %s: %s",
zp->z_origin, badsoa_msg);
hp->rcode = FORMERR;
return (-1);
}
if (SEQ_GT(zp_start.z_serial, serial_no) ||
!check_serial) {
soa_cnt++;
} else {
syslog(LOG_INFO,
"serial went backwards after transfer started");
return (-1);
}
} else if (soa_cnt == 1) {
badsoa_msg = soa_zinfo(&zp_finish, rr_type_ptr, eom);
if (badsoa_msg) {
syslog(LOG_INFO,
"malformed SOA for zone %s: %s",
zp->z_origin, badsoa_msg);
hp->rcode = FORMERR;
return (-1);
}
if (zp_start.z_serial == zp_finish.z_serial) {
methode = ISNOTIXFR;
if (xfr_detect == 3)
soa_cnt = 0;
} else if (zp_finish.z_serial != serial_no) {
syslog(LOG_INFO,
"Unexpected serial number for zone %s: %u",
zp->z_origin, zp_finish.z_serial);
}
soa_cnt++;
if (methode == ISIXFR)
return (result);
} else {
badsoa_msg = soa_zinfo(&zp_finish, rr_type_ptr, eom);
if (badsoa_msg) {
syslog(LOG_INFO,
"malformed SOA for zone %s: %s",
zp->z_origin, badsoa_msg);
hp->rcode = FORMERR;
return (-1);
}
if (methode == ISIXFR) {
if (zp_start.z_serial == zp_finish.z_serial) {
if (scdsoa) {
soa_cnt = -1;
return (result);
} else {
scdsoa = 1;
soa_cnt++;
};
} else
soa_cnt++;
} else {
dprintf(2, "SOA, serial %u\n",
zp_finish.z_serial);
if (zp_start.z_serial != zp_finish.z_serial) {
dprintf(1, "serial changed, restart\n");
restarts++;
if (restarts > MAX_XFER_RESTARTS) {
syslog(LOG_INFO,
"too many transfer restarts for zone %s",
zp->z_origin);
hp->rcode = FORMERR;
return (-1);
}
soa_cnt = 0;
ns_cnt = 0;
minimum_ttl = 0;
strcpy(prev_origin, zp->z_origin);
prev_dname[0] = DEF_DNAME;
/*
* Flush buffer, truncate file
* and seek to beginning to restart.
*/
fflush(dbfp);
if (ftruncate(fileno(dbfp), 0) != 0) {
if (!quiet)
syslog(LOG_INFO,
"ftruncate %s: %m\n",
tmpname);
return (-1);
}
fseek(dbfp, 0L, 0);
return (result);
}
soa_cnt++;
return (result);
}
}
if (soa_cnt == 2)
return (result);
}
if (zp->z_type == Z_STUB) {
if (query_type == T_NS && type == T_NS)
ns_cnt++;
/*
* If we're processing a response to an SOA query, we don't
* want to print anything from the response except for the SOA.
* We do want to check everything in the packet, which is
* why we do this check now instead of earlier.
*/
if (query_type == T_SOA && type != T_SOA)
return (result);
}
if ((!soa_cnt || soa_cnt > 2) && methode == ISNOTIXFR) {
char *gripe;
if (!soa_cnt)
gripe = "got RR before first SOA";
else
gripe = "got RR after second SOA";
syslog(LOG_INFO, "%s in zone %s", gripe, zp->z_origin);
hp->rcode = FORMERR;
return (-1);
}
/*
* If they are trying to tell us info about something that is
* not in the zone that we are transfering, then ignore it!
* They don't have the authority to tell us this info.
*
* We have to do a bit of checking here - the name that we are
* checking is is fully qualified & may be in a subdomain of the
* zone in question. We also need to ignore any final dots.
*
* If a domain has both NS records and non-NS records, (for
* example, NS and MX records), then we should ignore the non-NS
* records (except that we should not ignore glue A records).
* XXX: It is difficult to do this properly, so we just compare
* the current dname with that in the most recent NS record.
* This defends against the most common error case,
* where the remote server sends MX records soon after the
* NS records for a particular domain. If sent earlier, we lose. XXX
*/
if (!ns_samedomain(dname, domain)) {
(void) fprintf(dbfp, "; Ignoring info about %s, not in zone %s.\n",
dname, domain);
ignore = "; ";
} else if (type != T_NS && type != T_A &&
ns_samename(zone_top, dname) != 1 &&
ns_samename(prev_ns_dname, dname) == 1)
{
(void) fprintf(dbfp, "; Ignoring extra info about %s, invalid after NS delegation.\n",
dname);
ignore = "; ";
} else if (class != zp->z_class) {
(void) fprintf(dbfp, "; Ignoring info about %s, not class %s\n",
dname, p_class(zp->z_class));
ignore = "; ";
}
/*
* If the current record is not being ignored, but the
* previous record was ignored, then we invalidate information
* that might have been altered by ignored records.
* (This means that we sometimes output unnecessary $ORIGIN
* lines, but that is harmless.)
*
* Also update prev_comment now.
*/
if (prev_comment && ignore[0] == '\0') {
prev_dname[0] = DEF_DNAME;
prev_origin[0] = DEF_DNAME;
}
prev_comment = (ignore[0] != '\0');
/*
* set prev_ns_dname if necessary
*/
if (type == T_NS) {
(void) strcpy(prev_ns_dname, dname);
}
/*
* If the origin has changed, print the new origin
*/
if (ns_samename(prev_origin, origin) != 1) {
(void) strcpy(prev_origin, origin);
(void) fprintf(dbfp, "%s$ORIGIN %s.\n", ignore, origin);
}
tab = 0;
if (ns_samename(prev_dname, dname) != 1) {
/*
* set the prev_dname to be the current dname, then cut off all
* characters of dname after (and including) the first '.'
*/
char *cutp;
(void) strcpy(prev_dname, dname);
escaped = 0;
cutp = dname;
while (*cutp) {
if (!escaped && *cutp == '.')
break;
escaped = (*cutp++ == '\\') && !escaped;
}
*cutp = '\0';
if (dname[0] == 0) {
if (origin[0] == 0)
(void) fprintf(dbfp, "%s.\t", ignore);
else
(void) fprintf(dbfp, "%s.%s.\t",
ignore, origin); /* ??? */
} else {
char *backslash;
backslash = (*dname == '@' || *dname == '$') ?
"\\" : "";
(void) fprintf(dbfp, "%s%s%s\t", ignore,
backslash, dname);
}
if (strlen(dname) < (size_t)8)
tab = 1;
} else {
(void) fprintf(dbfp, "%s\t", ignore);
tab = 1;
}
(void) fprintf(dbfp, "%d\t", (int) ttl);
(void) fprintf(dbfp, "%s\t%s\t", p_class(class), p_type(type));
cp = cdata;
/*
* Print type specific data
*/
switch (type) {
case T_A:
switch (class) {
case C_IN:
case C_HS:
fputs(inet_ntoa(ina_get(cp)), dbfp);
break;
}
(void) fprintf(dbfp, "\n");
break;
case T_CNAME:
case T_MB:
case T_MG:
case T_MR:
case T_PTR:
if (cp[0] == '\0')
(void) fprintf(dbfp, ".\n");
else
(void) fprintf(dbfp, "%s.\n", cp);
break;
case T_NS:
cp = cdata;
if (cp[0] == '\0')
(void) fprintf(dbfp, ".\t");
else
(void) fprintf(dbfp, "%s.", cp);
(void) fprintf(dbfp, "\n");
break;
case T_HINFO:
case T_ISDN:
cp2 = cp + n;
for (i = 0; i < 2; i++) {
if (i != 0)
(void) putc(' ', dbfp);
n = *cp++;
cp1 = cp + n;
if (cp1 > cp2)
cp1 = cp2;
(void) putc('"', dbfp);
j = 0;
while (cp < cp1) {
if (*cp == '\0') {
cp = cp1;
break;
}
if (strchr("\n\"\\", *cp))
(void) putc('\\', dbfp);
(void) putc(*cp++, dbfp);
j++;
}
if (j == 0 && (type != T_ISDN || i == 0))
(void) putc('?', dbfp);
(void) putc('"', dbfp);
}
(void) putc('\n', dbfp);
break;
case T_SOA:
(void) fprintf(dbfp, "%s.", cp);
cp += strlen((char *) cp) + 1;
(void) fprintf(dbfp, " %s. (\n", cp);
cp += strlen((char *) cp) + 1;
NS_GET32(tmpnum, cp);
(void) fprintf(dbfp, "%s\t\t%u", ignore, tmpnum);
NS_GET32(tmpnum, cp);
(void) fprintf(dbfp, " %u", tmpnum);
NS_GET32(tmpnum, cp);
(void) fprintf(dbfp, " %u", tmpnum);
NS_GET32(tmpnum, cp);
(void) fprintf(dbfp, " %u", tmpnum);
NS_GET32(tmpnum, cp);
(void) fprintf(dbfp, " %u )\n", tmpnum);
break;
case T_MX:
case T_AFSDB:
case T_RT:
NS_GET16(tmpnum, cp);
(void) fprintf(dbfp, "%u", tmpnum);
(void) fprintf(dbfp, " %s.\n", cp);
break;
case T_PX:
NS_GET16(tmpnum, cp);
(void) fprintf(dbfp, "%u", tmpnum);
(void) fprintf(dbfp, " %s.", cp);
cp += strlen((char *) cp) + 1;
(void) fprintf(dbfp, " %s.\n", cp);
break;
case T_TXT:
case T_X25:
cp1 = cp + n;
while (cp < cp1) {
(void) putc('"', dbfp);
if ((i = *cp++) != 0) {
for (j = i; j > 0 && cp < cp1; j--) {
if (strchr("\n\"\\", *cp))
(void) putc('\\', dbfp);
(void) putc(*cp++, dbfp);
}
}
(void) putc('"', dbfp);
if (cp < cp1)
(void) putc(' ', dbfp);
}
(void) putc('\n', dbfp);
break;
case T_NSAP:
fprintf(dbfp, "%s\n", inet_nsap_ntoa(n, cp, NULL));
break;
case T_AAAA: {
char t[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255"];
fprintf(dbfp, "%s\n", inet_ntop(AF_INET6, cp, t, sizeof t));
break;
}
case T_LOC: {
char t[255];
(void) fprintf(dbfp, "%s\n", loc_ntoa(cp, t));
break;
}
case T_NAPTR: {
u_int32_t order, preference;
/* Order */
NS_GET16(order, cp);
fprintf(dbfp, "%u", order);
/* Preference */
NS_GET16(preference, cp);
fprintf(dbfp, " %u", preference);
/* Flags */
n = *cp++;
fprintf(dbfp, " \"%.*s\"", (int)n, cp);
cp += n;
/* Service */
n = *cp++;
fprintf(dbfp, " \"%.*s\"", (int)n, cp);
cp += n;
/* Regexp */
n = *cp++;
fprintf(dbfp, " \"%.*s\"", (int)n, cp);
cp += n;
/* Replacement */
fprintf(dbfp, " %s.\n", cp);
break;
}
case T_SRV: {
u_int priority, weight, port;
NS_GET16(priority, cp);
NS_GET16(weight, cp);
NS_GET16(port, cp);
fprintf(dbfp, "\t%u %u %u %s.\n",
priority, weight, port, cp);
break;
}
case T_WKS:
fputs(inet_ntoa(ina_get(cp)), dbfp);
cp += INADDRSZ;
fputc(' ', dbfp);
proto = protocolname(*cp);
cp += sizeof(char);
(void) fprintf(dbfp, "%s ", proto);
i = 0;
while (cp < cdata + n) {
j = *cp++;
do {
if (j & 0200)
(void) fprintf(dbfp, " %s",
servicename(i, proto));
j <<= 1;
} while (++i & 07);
}
(void) fprintf(dbfp, "\n");
break;
case T_MINFO:
case T_RP:
(void) fprintf(dbfp, "%s.", cp);
cp += strlen((char *) cp) + 1;
(void) fprintf(dbfp, " %s.\n", cp);
break;
case T_KEY: {
char databuf[16+NS_MD5RSA_MAX_BASE64]; /* 16 for slop */
u_int keyflags;
/* get & format key flags */
keyflags = ns_get16(cp);
(void) fprintf(dbfp, "0x%04x ", keyflags);
cp += INT16SZ;
/* protocol id */
(void) fprintf(dbfp, " %u", *cp++);
/* algorithm id */
(void) fprintf(dbfp, " %u ", *cp++);
/* key itself (which may have zero length) */
n = b64_ntop(cp, (cp1 + n) - cp, databuf, sizeof databuf);
if (n < 0)
fprintf(dbfp, "; BAD BASE64\n");
else
fprintf(dbfp, "%s\n", databuf);
break;
}
case T_SIG: {
char databuf[16+NS_MD5RSA_MAX_BASE64]; /* 16 for slop */
/* get & format rr type which signature covers */
(void) fprintf(dbfp,"%s", p_type(ns_get16((u_char*)cp)));
cp += INT16SZ;
/* algorithm id */
(void) fprintf(dbfp," %d",*cp++);
/* labels (# of labels in name) */
(void) fprintf(dbfp," %d",*cp++);
/* orig time to live (TTL)) */
(void) fprintf(dbfp," %u", (u_int32_t)ns_get32((u_char*)cp));
cp += INT32SZ;
/* expiration time */
(void) fprintf(dbfp," %s", p_secstodate(ns_get32((u_char*)cp)));
cp += INT32SZ;
/* time signed */
(void) fprintf(dbfp," %s", p_secstodate(ns_get32((u_char*)cp)));
cp += INT32SZ;
/* Key footprint */
(void) fprintf(dbfp," %d", ns_get16((u_char*)cp));
cp += INT16SZ;
/* signer's name */
(void) fprintf(dbfp, " %s. ", cp);
cp += strlen((char *) cp) + 1;
/* signature itself */
n = b64_ntop(cp, (cdata + n) - cp, databuf, sizeof databuf);
if (n < 0)
fprintf (dbfp, "; BAD BASE64\n");
else
fprintf (dbfp, "%s\n", databuf);
break;
}
case T_NXT:
fprintf(dbfp, "%s.", (char *)cp);
i = strlen((char *)cp)+1;
cp += i;
n -= i;
for (i=0; i < n*NS_NXT_BITS; i++)
if (NS_NXT_BIT_ISSET (i, cp))
fprintf(dbfp, " %s", p_type(i));
fprintf(dbfp,"\n");
break;
case ns_t_cert: {
int databufsize = n * 4 / 3 + 4;
char *databuf = malloc(databufsize);
if (databuf == NULL)
panic("cert malloc failed", NULL);
/* Object id */
(void) fprintf(dbfp,"%d ", ns_get16((u_char*)cp));
cp += INT16SZ;
/* Key tag */
(void) fprintf(dbfp,"%d ", ns_get16((u_char*)cp));
cp += INT16SZ;
/* Algorithm id */
(void) fprintf(dbfp,"%d ", (u_char)*cp);
cp += 1;
n = b64_ntop(cp, n - 2 * INT16SZ - 1, databuf, databufsize);
if (n < 0)
panic ("cert b64_ntop failed", NULL);
fprintf (dbfp, "%s\n", databuf);
free(databuf);
break;
}
default:
cp1 = cp + n;
while (cp < cp1)
fprintf(dbfp, "0x%02X ", *cp++ & 0xFF);
(void) fprintf(dbfp, "???\n");
}
if (ferror(dbfp)) {
syslog(LOG_ERR, "%s: %m", tmpname);
cleanup_for_exit();
exit(XFER_FAIL);
}
return (result);
}
#ifdef SHORT_FNAMES
/*
** This routine handles creating temporary files with mkstemp
** in the presence of a 14 char filename system. Pathconf()
** does not work over NFS.
*/
filenamecpy(char *ddtfile, char *optarg) {
int namelen, extra, len;
char *dirname, *filename;
/* determine the length of filename allowed */
if((dirname = strrchr(optarg, '/')) == NULL){
filename = optarg;
} else {
*dirname++ = '\0';
filename = dirname;
}
namelen = pathconf(dirname == NULL? "." : optarg, _PC_NAME_MAX);
if(namelen <= 0)
namelen = 255; /* length could not be determined */
if(dirname != NULL)
*--dirname = '/';
/* copy a shorter name if it will be longer than allowed */
extra = (strlen(filename)+strlen(".XXXXXX")) - namelen;
if(extra > 0){
len = strlen(optarg) - extra;
(void) strncpy(ddtfile, optarg, len);
ddtfile[len] = '\0';
} else
(void) strcpy(ddtfile, optarg);
}
#endif /* SHORT_FNAMES */
DST_KEY *
tsig_key_from_addr(struct in_addr addr) {
tsig_node *n;
for (n = HEAD(tsig_list); n != NULL; n = NEXT(n, link))
if (memcpy(&addr, &n->addr, sizeof(struct in_addr)))
return n->dst_key;
return NULL;
}
static u_int32_t
do_section(ns_msg *handle, ns_sect section, int pflag, FILE *file, int *delete) {
int n, sflag, rrnum;
char buf[2048]; /* XXX need to malloc */
ns_opcode opcode;
ns_rr rr;
const unsigned char *cp;
const unsigned char *eom;
u_int32_t serial;
time_t now;
time(&now);
/*
* Print answer records.
*/
sflag = (_res.pfcode & pflag);
if (_res.pfcode && !sflag)
return (-1);
opcode = (ns_opcode)ns_msg_getflag(*handle, ns_f_opcode);
rrnum = 0;
for (;;) {
if (ns_parserr(handle, section, rrnum, &rr)) {
if (errno != ENODEV) {
fprintf(file, ";; ns_parserr: %s\n",
strerror(errno));
return (-1);
} else if (rrnum > 0 && sflag != 0 &&
(_res.pfcode & RES_PRF_HEAD1))
putc('\n', file);
return (serial);
}
if (rrnum == 0 && sflag != 0 && (_res.pfcode & RES_PRF_HEAD1))
fprintf(file, ";; %s SECTION:\n",
p_section(section, opcode));
if (section == ns_s_qd)
fprintf(file, ";;\t%s, type = %s, class = %s\n",
ns_rr_name(rr),
p_type(ns_rr_type(rr)),
p_class(ns_rr_class(rr)));
else {
int print_record = 1;
if (rr.type == ns_t_soa) {
print_record = 0;
*delete = !*delete;
cp = ns_rr_rdata(rr);
eom = cp + ns_rr_rdlen(rr);
if ((n = dn_skipname(cp, eom)) < 0) {
rrnum++;
continue;
}
cp += n;
if ((n = dn_skipname(cp, eom)) < 0) {
rrnum++;
continue;
}
cp += n;
NS_GET32(serial, cp);
switch (++ixfr_soa) {
case 1:
final_serial = serial;
if (soa_buf == NULL) {
if ((soa_buf = (char *)malloc(2 * PACKETSZ)) == NULL) {
syslog(LOG_INFO, "malloc(%u) failed", 2 * PACKETSZ);
return(-1);
}
n = ns_sprintrr(handle, &rr, NULL, NULL,
soa_buf, 2*PACKETSZ);
if (n < 0) {
fprintf(file, ";; ns_sprintrr: %s\n",
strerror(errno));
return (-1);
}
}
print_record = 0;
break;
case 2:
fprintf(file,
"zone:\torigin %s class %s serial %u\n",
ns_rr_name(rr),
p_class(ns_rr_class(rr)),
serial);
print_record = 0;
break;
default:
print_record = 0;
break;
}
}
if (print_record) {
if (rr.type != ns_t_soa) {
fprintf(file, "update:\t{%s} ",
*delete ? "delete" : "add");
n = ns_sprintrr(handle, &rr, NULL, NULL,
buf, sizeof buf);
if (n < 0) {
fprintf(file, ";; ns_sprintrr: %s\n",
strerror(errno));
return(-1);
}
fputs(buf, file);
fputc('\n', file);
}
}
}
rrnum++;
}
return (serial);
}
static int
ixfr_log(const u_char *msg, int len, int *delete, FILE *file,
struct sockaddr_in *sin, char *domain, u_int32_t *serial_no,
int *first_rr)
{
ns_msg handle;
ns_type type;
ns_class class;
ns_opcode opcode;
ns_rcode rcode;
u_int id;
u_int32_t new_serial = 0;
char time[25];
ns_rr rr;
if ((_res.options & RES_INIT) == 0 && res_init() == -1) {
dprintf(1, "ixfr_log() failed\n");
return (-1);
}
if (ns_initparse(msg, len, &handle) < 0) {
fprintf(file, ";; ns_initparse: %s\n", strerror(errno));
dprintf(1, "ixfr_log() failed\n");
return (-1);
}
opcode = (ns_opcode) ns_msg_getflag(handle, ns_f_opcode);
rcode = (ns_rcode) ns_msg_getflag(handle, ns_f_rcode);
id = ns_msg_id(handle);
if (ns_parserr(&handle, ns_s_an, 0, &rr))
{
(void) fprintf(file,"ns_parserr() failed");
dprintf(1, "ixfr_log() failed\n");
return (-1);
}
type = (ns_type)rr.type;
class = (ns_class)rr.rr_class;
if (*first_rr == 1) {
gettime(&tt);
(void) fprintf(file,"%s", LogSignature);
sprintf(time, "at %lu", (u_long)tt.tv_sec);
fprintf(file,
"[IXFR_UPDATE] id %u from [%s].%d %s (named-xfer pid %ld):\n",
id, inet_ntoa(sin->sin_addr),
ntohs(sin->sin_port), time, (long)getpid());
(*first_rr)++;
}
new_serial = do_section(&handle, ns_s_an, RES_PRF_ANS, file, delete);
if (type == T_SOA && SEQ_GT(new_serial, *serial_no) && (*delete))
*serial_no = new_serial;
return (1);
}
static const char *
tsig_rcode(int rcode) {
static char buffer[64];
switch (rcode) {
case ns_r_badkey:
case ns_r_badsig:
case ns_r_badtime:
sprintf(buffer, "message had %s set", p_rcode(rcode));
return (buffer);
case -ns_r_badkey:
case -ns_r_badsig:
case -ns_r_badtime:
return (p_rcode(-rcode));
case NS_TSIG_ERROR_NO_TSIG:
return ("no TSIG present");
default:
break;
}
return ("FORMERR");
}