Commit c8ca33f8 authored by Simon Kelley's avatar Simon Kelley

Fix DNSSEC caching problems: incomplete RRSIG RRsets.

parent e243c072
...@@ -460,7 +460,7 @@ struct crec *cache_insert(char *name, struct all_addr *addr, ...@@ -460,7 +460,7 @@ struct crec *cache_insert(char *name, struct all_addr *addr,
return NULL; return NULL;
/* First remove any expired entries and entries for the name/address we /* First remove any expired entries and entries for the name/address we
are currently inserting. Fail is we attempt to delete a name from are currently inserting. Fail if we attempt to delete a name from
/etc/hosts or DHCP. */ /etc/hosts or DHCP. */
if (!cache_scan_free(name, addr, now, flags)) if (!cache_scan_free(name, addr, now, flags))
{ {
......
...@@ -1168,6 +1168,7 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch ...@@ -1168,6 +1168,7 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch
type_covered == T_DNSKEY || type_covered == T_PTR)) type_covered == T_DNSKEY || type_covered == T_PTR))
{ {
a.addr.dnssec.type = type_covered; a.addr.dnssec.type = type_covered;
a.addr.dnssec.class = class1;
algo = *p2++; algo = *p2++;
p2 += 13; /* labels, orig_ttl, expiration, inception */ p2 += 13; /* labels, orig_ttl, expiration, inception */
......
...@@ -1551,33 +1551,29 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen, ...@@ -1551,33 +1551,29 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen,
} }
#ifdef HAVE_DNSSEC #ifdef HAVE_DNSSEC
if (option_bool(OPT_DNSSEC_VALID) && (qtype == T_DNSKEY || qtype == T_DS || qtype == T_RRSIG)) if (option_bool(OPT_DNSSEC_VALID) && (qtype == T_DNSKEY || qtype == T_DS))
{ {
int gotone = 0, have_rrsig = 0; int gotone = 0;
struct blockdata *keydata; struct blockdata *keydata;
/* Do we have RRSIG? Can't do DS or DNSKEY otherwise. */ /* Do we have RRSIG? Can't do DS or DNSKEY otherwise. */
if (sec_reqd)
{
crecp = NULL; crecp = NULL;
while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY | F_DS))) while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY | F_DS)))
if (crecp->uid == qclass && (qtype == T_RRSIG || crecp->addr.sig.type_covered == qtype)) if (crecp->uid == qclass && crecp->addr.sig.type_covered == qtype)
{
have_rrsig = 1;
break; break;
} }
if (qtype == T_RRSIG && have_rrsig) if (!sec_reqd || crecp)
{ {
ans = gotone = 1; if (qtype == T_DS)
auth = 0;
}
else if (qtype == T_DS && have_rrsig)
{ {
auth = 0;
crecp = NULL; crecp = NULL;
while ((crecp = cache_find_by_name(crecp, name, now, F_DS))) while ((crecp = cache_find_by_name(crecp, name, now, F_DS)))
if (crecp->uid == qclass) if (crecp->uid == qclass)
{ {
ans = gotone = 1; gotone = 1;
if (!dryrun && (keydata = blockdata_retrieve(crecp->addr.ds.keydata, crecp->addr.ds.keylen, NULL))) if (!dryrun && (keydata = blockdata_retrieve(crecp->addr.ds.keydata, crecp->addr.ds.keylen, NULL)))
{ {
struct all_addr a; struct all_addr a;
...@@ -1592,17 +1588,15 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen, ...@@ -1592,17 +1588,15 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen,
} }
} }
} }
else if (qtype == T_DNSKEY) else /* DNSKEY */
{ {
crecp = NULL; crecp = NULL;
while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY))) while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY)))
if (crecp->uid == qclass) if (crecp->uid == qclass)
{ {
if ((crecp->flags & F_CONFIG) || have_rrsig) /* Return configured keys without an RRISG */ if (!(crecp->flags & F_CONFIG)) /* Don't return configured keys - send upstream instead */
{ {
if (!(crecp->flags & F_CONFIG)) gotone = 1;
auth = 0, gotone = 1;
ans = 1;
if (!dryrun && (keydata = blockdata_retrieve(crecp->addr.key.keydata, crecp->addr.key.keylen, NULL))) if (!dryrun && (keydata = blockdata_retrieve(crecp->addr.key.keydata, crecp->addr.key.keylen, NULL)))
{ {
struct all_addr a; struct all_addr a;
...@@ -1617,26 +1611,28 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen, ...@@ -1617,26 +1611,28 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen,
} }
} }
} }
}
/* Now do RRSIGs */ /* Now do RRSIGs */
if (gotone) if (gotone)
{
ans = 1;
auth = 0;
if (!dryrun && sec_reqd)
{ {
crecp = NULL; crecp = NULL;
while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY | F_DS))) while ((crecp = cache_find_by_name(crecp, name, now, F_DNSKEY | F_DS)))
if (crecp->uid == qclass && (qtype == T_RRSIG || (sec_reqd && crecp->addr.sig.type_covered == qtype)) && if (crecp->uid == qclass && crecp->addr.sig.type_covered == qtype &&
!dryrun &&
(keydata = blockdata_retrieve(crecp->addr.sig.keydata, crecp->addr.sig.keylen, NULL))) (keydata = blockdata_retrieve(crecp->addr.sig.keydata, crecp->addr.sig.keylen, NULL)))
{ {
if (qtype == T_RRSIG)
log_query(F_RRNAME, name, NULL, querystr("rrsig", crecp->addr.sig.type_covered));
if ((keydata = blockdata_retrieve(crecp->addr.sig.keydata, crecp->addr.sig.keylen, NULL)) &&
add_resource_record(header, limit, &trunc, nameoffset, &ansp, add_resource_record(header, limit, &trunc, nameoffset, &ansp,
crec_ttl(crecp, now), &nameoffset, crec_ttl(crecp, now), &nameoffset,
T_RRSIG, qclass, "t", crecp->addr.sig.keylen, keydata)) T_RRSIG, qclass, "t", crecp->addr.sig.keylen, keydata);
anscount++; anscount++;
} }
} }
} }
}
#endif #endif
if (qclass == C_IN) if (qclass == C_IN)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment