xfrd.c revision 1.1.1.5 1 1.1 christos /*
2 1.1 christos * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates.
3 1.1 christos *
4 1.1 christos * Copyright (c) 2001-2006, NLnet Labs. All rights reserved.
5 1.1 christos *
6 1.1 christos * See LICENSE for the license.
7 1.1 christos *
8 1.1 christos */
9 1.1 christos
10 1.1 christos #include "config.h"
11 1.1 christos #include <assert.h>
12 1.1 christos #include <string.h>
13 1.1 christos #include <unistd.h>
14 1.1 christos #include <stdlib.h>
15 1.1 christos #include <errno.h>
16 1.1 christos #include <sys/types.h>
17 1.1 christos #include <sys/wait.h>
18 1.1 christos #include "xfrd.h"
19 1.1 christos #include "xfrd-tcp.h"
20 1.1 christos #include "xfrd-disk.h"
21 1.1 christos #include "xfrd-notify.h"
22 1.1 christos #include "options.h"
23 1.1 christos #include "util.h"
24 1.1 christos #include "netio.h"
25 1.1 christos #include "region-allocator.h"
26 1.1 christos #include "nsd.h"
27 1.1 christos #include "packet.h"
28 1.1 christos #include "rdata.h"
29 1.1 christos #include "difffile.h"
30 1.1 christos #include "ipc.h"
31 1.1 christos #include "remote.h"
32 1.1.1.3 christos #include "rrl.h"
33 1.1.1.4 prlw1 #ifdef USE_DNSTAP
34 1.1.1.4 prlw1 #include "dnstap/dnstap_collector.h"
35 1.1.1.4 prlw1 #endif
36 1.1.1.3 christos
37 1.1.1.3 christos #ifdef HAVE_SYSTEMD
38 1.1.1.3 christos #include <systemd/sd-daemon.h>
39 1.1.1.3 christos #endif
40 1.1 christos
41 1.1 christos #define XFRD_UDP_TIMEOUT 10 /* seconds, before a udp request times out */
42 1.1 christos #define XFRD_NO_IXFR_CACHE 172800 /* 48h before retrying ixfr's after notimpl */
43 1.1 christos #define XFRD_LOWERBOUND_REFRESH 1 /* seconds, smallest refresh timeout */
44 1.1 christos #define XFRD_LOWERBOUND_RETRY 1 /* seconds, smallest retry timeout */
45 1.1 christos #define XFRD_MAX_ROUNDS 1 /* max number of rounds along the masters */
46 1.1 christos #define XFRD_TSIG_MAX_UNSIGNED 103 /* max number of packets without tsig in a tcp stream. */
47 1.1 christos /* rfc recommends 100, +3 for offbyone errors/interoperability. */
48 1.1 christos #define XFRD_CHILD_REAP_TIMEOUT 60 /* seconds to wakeup and reap lost children */
49 1.1 christos /* these are reload processes that SIGCHILDed but the signal
50 1.1 christos * was lost, and need waitpid to remove their process entry. */
51 1.1 christos
52 1.1 christos /* the daemon state */
53 1.1.1.2 christos xfrd_state_type* xfrd = 0;
54 1.1 christos
55 1.1 christos /* main xfrd loop */
56 1.1 christos static void xfrd_main(void);
57 1.1 christos /* shut down xfrd, close sockets. */
58 1.1 christos static void xfrd_shutdown(void);
59 1.1 christos /* delete pending task xfr files in tmp */
60 1.1 christos static void xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u);
61 1.1 christos /* create zone rbtree at start */
62 1.1 christos static void xfrd_init_zones(void);
63 1.1 christos /* initial handshake with SOAINFO from main and send expire to main */
64 1.1 christos static void xfrd_receive_soa(int socket, int shortsoa);
65 1.1 christos
66 1.1 christos /* handle incoming notification message. soa can be NULL. true if transfer needed. */
67 1.1.1.2 christos static int xfrd_handle_incoming_notify(xfrd_zone_type* zone,
68 1.1.1.2 christos xfrd_soa_type* soa);
69 1.1 christos
70 1.1 christos /* call with buffer just after the soa dname. returns 0 on error. */
71 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa);
72 1.1 christos /* set the zone state to a new state (takes care of expiry messages) */
73 1.1.1.2 christos static void xfrd_set_zone_state(xfrd_zone_type* zone,
74 1.1.1.2 christos enum xfrd_zone_state new_zone_state);
75 1.1 christos /* set timer for retry amount (depends on zone_state) */
76 1.1.1.2 christos static void xfrd_set_timer_retry(xfrd_zone_type* zone);
77 1.1 christos /* set timer for refresh timeout (depends on zone_state) */
78 1.1.1.2 christos static void xfrd_set_timer_refresh(xfrd_zone_type* zone);
79 1.1 christos
80 1.1 christos /* set reload timeout */
81 1.1 christos static void xfrd_set_reload_timeout(void);
82 1.1 christos /* handle reload timeout */
83 1.1 christos static void xfrd_handle_reload(int fd, short event, void* arg);
84 1.1 christos /* handle child timeout */
85 1.1 christos static void xfrd_handle_child_timer(int fd, short event, void* arg);
86 1.1 christos
87 1.1 christos /* send ixfr request, returns fd of connection to read on */
88 1.1.1.2 christos static int xfrd_send_ixfr_request_udp(xfrd_zone_type* zone);
89 1.1 christos /* obtain udp socket slot */
90 1.1.1.2 christos static void xfrd_udp_obtain(xfrd_zone_type* zone);
91 1.1 christos
92 1.1 christos /* read data via udp */
93 1.1.1.2 christos static void xfrd_udp_read(xfrd_zone_type* zone);
94 1.1 christos
95 1.1 christos /* find master by notify number */
96 1.1.1.2 christos static int find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy);
97 1.1 christos
98 1.1 christos /* set the write timer to activate */
99 1.1 christos static void xfrd_write_timer_set(void);
100 1.1 christos
101 1.1 christos static void
102 1.1 christos xfrd_signal_callback(int sig, short event, void* ATTR_UNUSED(arg))
103 1.1 christos {
104 1.1 christos if(!(event & EV_SIGNAL))
105 1.1 christos return;
106 1.1 christos sig_handler(sig);
107 1.1 christos }
108 1.1 christos
109 1.1.1.3 christos static struct event* xfrd_sig_evs[10];
110 1.1.1.3 christos static int xfrd_sig_num = 0;
111 1.1.1.3 christos
112 1.1 christos static void
113 1.1 christos xfrd_sigsetup(int sig)
114 1.1 christos {
115 1.1 christos struct event *ev = xalloc_zero(sizeof(*ev));
116 1.1.1.3 christos assert(xfrd_sig_num <= (int)(sizeof(xfrd_sig_evs)/sizeof(ev)));
117 1.1.1.3 christos xfrd_sig_evs[xfrd_sig_num++] = ev;
118 1.1 christos signal_set(ev, sig, xfrd_signal_callback, NULL);
119 1.1 christos if(event_base_set(xfrd->event_base, ev) != 0) {
120 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: event_base_set failed");
121 1.1 christos }
122 1.1 christos if(signal_add(ev, NULL) != 0) {
123 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: signal_add failed");
124 1.1 christos }
125 1.1 christos }
126 1.1 christos
127 1.1 christos void
128 1.1 christos xfrd_init(int socket, struct nsd* nsd, int shortsoa, int reload_active,
129 1.1 christos pid_t nsd_pid)
130 1.1 christos {
131 1.1 christos region_type* region;
132 1.1 christos
133 1.1 christos assert(xfrd == 0);
134 1.1 christos /* to setup signalhandling */
135 1.1 christos nsd->server_kind = NSD_SERVER_MAIN;
136 1.1 christos
137 1.1 christos region = region_create_custom(xalloc, free, DEFAULT_CHUNK_SIZE,
138 1.1 christos DEFAULT_LARGE_OBJECT_SIZE, DEFAULT_INITIAL_CLEANUP_SIZE, 1);
139 1.1.1.2 christos xfrd = (xfrd_state_type*)region_alloc(region, sizeof(xfrd_state_type));
140 1.1.1.2 christos memset(xfrd, 0, sizeof(xfrd_state_type));
141 1.1 christos xfrd->region = region;
142 1.1 christos xfrd->xfrd_start_time = time(0);
143 1.1 christos xfrd->event_base = nsd_child_event_base();
144 1.1 christos if(!xfrd->event_base) {
145 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create event base");
146 1.1 christos exit(1);
147 1.1 christos }
148 1.1 christos xfrd->nsd = nsd;
149 1.1 christos xfrd->packet = buffer_create(xfrd->region, QIOBUFSZ);
150 1.1 christos xfrd->udp_waiting_first = NULL;
151 1.1 christos xfrd->udp_waiting_last = NULL;
152 1.1 christos xfrd->udp_use_num = 0;
153 1.1 christos xfrd->got_time = 0;
154 1.1 christos xfrd->xfrfilenumber = 0;
155 1.1 christos #ifdef USE_ZONE_STATS
156 1.1 christos xfrd->zonestat_safe = nsd->zonestatdesired;
157 1.1 christos #endif
158 1.1 christos xfrd->activated_first = NULL;
159 1.1 christos xfrd->ipc_pass = buffer_create(xfrd->region, QIOBUFSZ);
160 1.1 christos xfrd->last_task = region_alloc(xfrd->region, sizeof(*xfrd->last_task));
161 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
162 1.1 christos assert(shortsoa || udb_base_get_userdata(xfrd->nsd->task[xfrd->nsd->mytask])->data == 0);
163 1.1 christos
164 1.1 christos xfrd->reload_handler.ev_fd = -1;
165 1.1 christos xfrd->reload_added = 0;
166 1.1 christos xfrd->reload_timeout.tv_sec = 0;
167 1.1 christos xfrd->reload_cmd_last_sent = xfrd->xfrd_start_time;
168 1.1 christos xfrd->can_send_reload = !reload_active;
169 1.1 christos xfrd->reload_pid = nsd_pid;
170 1.1 christos xfrd->child_timer_added = 0;
171 1.1 christos
172 1.1 christos xfrd->ipc_send_blocked = 0;
173 1.1.1.5 christos memset(&xfrd->ipc_handler, 0, sizeof(xfrd->ipc_handler));
174 1.1 christos event_set(&xfrd->ipc_handler, socket, EV_PERSIST|EV_READ,
175 1.1 christos xfrd_handle_ipc, xfrd);
176 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->ipc_handler) != 0)
177 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_base_set failed");
178 1.1 christos if(event_add(&xfrd->ipc_handler, NULL) != 0)
179 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_add failed");
180 1.1 christos xfrd->ipc_handler_flags = EV_PERSIST|EV_READ;
181 1.1 christos xfrd->ipc_conn = xfrd_tcp_create(xfrd->region, QIOBUFSZ);
182 1.1 christos /* not reading using ipc_conn yet */
183 1.1 christos xfrd->ipc_conn->is_reading = 0;
184 1.1 christos xfrd->ipc_conn->fd = socket;
185 1.1 christos xfrd->need_to_send_reload = 0;
186 1.1 christos xfrd->need_to_send_shutdown = 0;
187 1.1 christos xfrd->need_to_send_stats = 0;
188 1.1 christos
189 1.1 christos xfrd->write_zonefile_needed = 0;
190 1.1 christos if(nsd->options->zonefiles_write)
191 1.1 christos xfrd_write_timer_set();
192 1.1 christos
193 1.1 christos xfrd->notify_waiting_first = NULL;
194 1.1 christos xfrd->notify_waiting_last = NULL;
195 1.1 christos xfrd->notify_udp_num = 0;
196 1.1 christos
197 1.1 christos #ifdef HAVE_SSL
198 1.1 christos daemon_remote_attach(xfrd->nsd->rc, xfrd);
199 1.1 christos #endif
200 1.1 christos
201 1.1 christos xfrd->tcp_set = xfrd_tcp_set_create(xfrd->region);
202 1.1 christos xfrd->tcp_set->tcp_timeout = nsd->tcp_timeout;
203 1.1 christos #ifndef HAVE_ARC4RANDOM
204 1.1 christos srandom((unsigned long) getpid() * (unsigned long) time(NULL));
205 1.1 christos #endif
206 1.1 christos
207 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd pre-startup"));
208 1.1 christos xfrd_init_zones();
209 1.1 christos xfrd_receive_soa(socket, shortsoa);
210 1.1 christos if(nsd->options->xfrdfile != NULL && nsd->options->xfrdfile[0]!=0)
211 1.1 christos xfrd_read_state(xfrd);
212 1.1 christos
213 1.1 christos /* did we get killed before startup was successful? */
214 1.1 christos if(nsd->signal_hint_shutdown) {
215 1.1 christos kill(nsd_pid, SIGTERM);
216 1.1 christos xfrd_shutdown();
217 1.1 christos return;
218 1.1 christos }
219 1.1 christos
220 1.1 christos /* init libevent signals now, so that in the previous init scripts
221 1.1 christos * the normal sighandler is called, and can set nsd->signal_hint..
222 1.1 christos * these are also looked at in sig_process before we run the main loop*/
223 1.1 christos xfrd_sigsetup(SIGHUP);
224 1.1 christos xfrd_sigsetup(SIGTERM);
225 1.1 christos xfrd_sigsetup(SIGQUIT);
226 1.1 christos xfrd_sigsetup(SIGCHLD);
227 1.1 christos xfrd_sigsetup(SIGALRM);
228 1.1 christos xfrd_sigsetup(SIGILL);
229 1.1 christos xfrd_sigsetup(SIGUSR1);
230 1.1 christos xfrd_sigsetup(SIGINT);
231 1.1 christos
232 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd startup"));
233 1.1.1.3 christos #ifdef HAVE_SYSTEMD
234 1.1.1.4 prlw1 sd_notify(0, "READY=1");
235 1.1.1.3 christos #endif
236 1.1 christos xfrd_main();
237 1.1 christos }
238 1.1 christos
239 1.1 christos static void
240 1.1 christos xfrd_process_activated(void)
241 1.1 christos {
242 1.1.1.2 christos xfrd_zone_type* zone;
243 1.1 christos while((zone = xfrd->activated_first)) {
244 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s activation",
245 1.1 christos zone->apex_str));
246 1.1 christos /* pop zone from activated list */
247 1.1 christos xfrd->activated_first = zone->activated_next;
248 1.1 christos if(zone->activated_next)
249 1.1 christos zone->activated_next->activated_prev = NULL;
250 1.1 christos zone->is_activated = 0;
251 1.1 christos /* run it : no events, specifically not the TIMEOUT event,
252 1.1 christos * so that running zone transfers are not interrupted */
253 1.1 christos xfrd_handle_zone(zone->zone_handler.ev_fd, 0, zone);
254 1.1 christos }
255 1.1 christos }
256 1.1 christos
257 1.1 christos static void
258 1.1 christos xfrd_sig_process(void)
259 1.1 christos {
260 1.1 christos int status;
261 1.1 christos pid_t child_pid;
262 1.1 christos
263 1.1 christos if(xfrd->nsd->signal_hint_quit || xfrd->nsd->signal_hint_shutdown) {
264 1.1 christos xfrd->nsd->signal_hint_quit = 0;
265 1.1 christos xfrd->nsd->signal_hint_shutdown = 0;
266 1.1 christos xfrd->need_to_send_shutdown = 1;
267 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
268 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
269 1.1 christos }
270 1.1 christos } else if(xfrd->nsd->signal_hint_reload_hup) {
271 1.1 christos log_msg(LOG_WARNING, "SIGHUP received, reloading...");
272 1.1 christos xfrd->nsd->signal_hint_reload_hup = 0;
273 1.1 christos if(xfrd->nsd->options->zonefiles_check) {
274 1.1 christos task_new_check_zonefiles(xfrd->nsd->task[
275 1.1 christos xfrd->nsd->mytask], xfrd->last_task, NULL);
276 1.1 christos }
277 1.1 christos xfrd_set_reload_now(xfrd);
278 1.1 christos } else if(xfrd->nsd->signal_hint_statsusr) {
279 1.1 christos xfrd->nsd->signal_hint_statsusr = 0;
280 1.1 christos xfrd->need_to_send_stats = 1;
281 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
282 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
283 1.1 christos }
284 1.1 christos }
285 1.1 christos
286 1.1 christos /* collect children that exited. */
287 1.1 christos xfrd->nsd->signal_hint_child = 0;
288 1.1 christos while((child_pid = waitpid(-1, &status, WNOHANG)) != -1 && child_pid != 0) {
289 1.1 christos if(status != 0) {
290 1.1 christos log_msg(LOG_ERR, "process %d exited with status %d",
291 1.1 christos (int)child_pid, status);
292 1.1 christos }
293 1.1 christos }
294 1.1 christos if(!xfrd->child_timer_added) {
295 1.1 christos struct timeval tv;
296 1.1 christos tv.tv_sec = XFRD_CHILD_REAP_TIMEOUT;
297 1.1 christos tv.tv_usec = 0;
298 1.1.1.5 christos memset(&xfrd->child_timer, 0, sizeof(xfrd->child_timer));
299 1.1 christos event_set(&xfrd->child_timer, -1, EV_TIMEOUT,
300 1.1 christos xfrd_handle_child_timer, xfrd);
301 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->child_timer) != 0)
302 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_base_set failed");
303 1.1 christos if(event_add(&xfrd->child_timer, &tv) != 0)
304 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_add failed");
305 1.1 christos xfrd->child_timer_added = 1;
306 1.1 christos }
307 1.1 christos }
308 1.1 christos
309 1.1 christos static void
310 1.1 christos xfrd_main(void)
311 1.1 christos {
312 1.1 christos /* we may have signals from the startup period, process them */
313 1.1 christos xfrd_sig_process();
314 1.1 christos xfrd->shutdown = 0;
315 1.1 christos while(!xfrd->shutdown)
316 1.1 christos {
317 1.1 christos /* process activated zones before blocking in select again */
318 1.1 christos xfrd_process_activated();
319 1.1 christos /* dispatch may block for a longer period, so current is gone */
320 1.1 christos xfrd->got_time = 0;
321 1.1 christos if(event_base_loop(xfrd->event_base, EVLOOP_ONCE) == -1) {
322 1.1 christos if (errno != EINTR) {
323 1.1 christos log_msg(LOG_ERR,
324 1.1 christos "xfrd dispatch failed: %s",
325 1.1 christos strerror(errno));
326 1.1 christos }
327 1.1 christos }
328 1.1 christos xfrd_sig_process();
329 1.1 christos }
330 1.1 christos xfrd_shutdown();
331 1.1 christos }
332 1.1 christos
333 1.1 christos static void
334 1.1 christos xfrd_shutdown()
335 1.1 christos {
336 1.1.1.2 christos xfrd_zone_type* zone;
337 1.1 christos
338 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown"));
339 1.1.1.3 christos #ifdef HAVE_SYSTEMD
340 1.1.1.4 prlw1 sd_notify(0, "STOPPING=1");
341 1.1.1.3 christos #endif
342 1.1 christos event_del(&xfrd->ipc_handler);
343 1.1 christos close(xfrd->ipc_handler.ev_fd); /* notifies parent we stop */
344 1.1.1.3 christos zone_list_close(nsd.options);
345 1.1 christos if(xfrd->nsd->options->xfrdfile != NULL && xfrd->nsd->options->xfrdfile[0]!=0)
346 1.1 christos xfrd_write_state(xfrd);
347 1.1 christos if(xfrd->reload_added) {
348 1.1 christos event_del(&xfrd->reload_handler);
349 1.1 christos xfrd->reload_added = 0;
350 1.1 christos }
351 1.1 christos if(xfrd->child_timer_added) {
352 1.1 christos event_del(&xfrd->child_timer);
353 1.1 christos xfrd->child_timer_added = 0;
354 1.1 christos }
355 1.1 christos if(xfrd->nsd->options->zonefiles_write) {
356 1.1 christos event_del(&xfrd->write_timer);
357 1.1 christos }
358 1.1 christos #ifdef HAVE_SSL
359 1.1 christos daemon_remote_close(xfrd->nsd->rc); /* close sockets of rc */
360 1.1 christos #endif
361 1.1 christos /* close sockets */
362 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
363 1.1 christos {
364 1.1 christos if(zone->event_added) {
365 1.1 christos event_del(&zone->zone_handler);
366 1.1 christos if(zone->zone_handler.ev_fd != -1) {
367 1.1 christos close(zone->zone_handler.ev_fd);
368 1.1 christos zone->zone_handler.ev_fd = -1;
369 1.1 christos }
370 1.1 christos zone->event_added = 0;
371 1.1 christos }
372 1.1 christos }
373 1.1 christos close_notify_fds(xfrd->notify_zones);
374 1.1 christos
375 1.1 christos /* wait for server parent (if necessary) */
376 1.1 christos if(xfrd->reload_pid != -1) {
377 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd wait for servermain %d",
378 1.1 christos (int)xfrd->reload_pid));
379 1.1 christos while(1) {
380 1.1 christos if(waitpid(xfrd->reload_pid, NULL, 0) == -1) {
381 1.1 christos if(errno == EINTR) continue;
382 1.1 christos if(errno == ECHILD) break;
383 1.1 christos log_msg(LOG_ERR, "xfrd: waitpid(%d): %s",
384 1.1 christos (int)xfrd->reload_pid, strerror(errno));
385 1.1 christos }
386 1.1 christos break;
387 1.1 christos }
388 1.1 christos }
389 1.1 christos
390 1.1 christos /* if we are killed past this point this is not a problem,
391 1.1 christos * some files left in /tmp are cleaned by the OS, but it is neater
392 1.1 christos * to clean them out */
393 1.1 christos
394 1.1 christos /* unlink xfr files for running transfers */
395 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
396 1.1 christos {
397 1.1 christos if(zone->msg_seq_nr)
398 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
399 1.1 christos }
400 1.1 christos /* unlink xfr files in not-yet-done task file */
401 1.1 christos xfrd_clean_pending_tasks(xfrd->nsd, xfrd->nsd->task[xfrd->nsd->mytask]);
402 1.1 christos xfrd_del_tempdir(xfrd->nsd);
403 1.1.1.3 christos #ifdef HAVE_SSL
404 1.1.1.3 christos daemon_remote_delete(xfrd->nsd->rc); /* ssl-delete secret keys */
405 1.1.1.5 christos if (xfrd->nsd->tls_ctx)
406 1.1.1.5 christos SSL_CTX_free(xfrd->nsd->tls_ctx);
407 1.1.1.3 christos #endif
408 1.1.1.4 prlw1 #ifdef USE_DNSTAP
409 1.1.1.4 prlw1 dt_collector_close(nsd.dt_collector, &nsd);
410 1.1.1.4 prlw1 #endif
411 1.1 christos
412 1.1 christos /* process-exit cleans up memory used by xfrd process */
413 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown complete"));
414 1.1.1.3 christos #ifdef MEMCLEAN /* OS collects memory pages */
415 1.1.1.3 christos if(xfrd->zones) {
416 1.1.1.3 christos xfrd_zone_type* z;
417 1.1.1.3 christos RBTREE_FOR(z, xfrd_zone_type*, xfrd->zones) {
418 1.1.1.3 christos tsig_delete_record(&z->tsig, NULL);
419 1.1.1.3 christos }
420 1.1.1.3 christos }
421 1.1.1.3 christos if(xfrd->notify_zones) {
422 1.1.1.3 christos struct notify_zone* n;
423 1.1.1.3 christos RBTREE_FOR(n, struct notify_zone*, xfrd->notify_zones) {
424 1.1.1.3 christos tsig_delete_record(&n->notify_tsig, NULL);
425 1.1.1.3 christos }
426 1.1.1.3 christos }
427 1.1.1.3 christos if(xfrd_sig_num > 0) {
428 1.1.1.3 christos int i;
429 1.1.1.3 christos for(i=0; i<xfrd_sig_num; i++) {
430 1.1.1.3 christos signal_del(xfrd_sig_evs[i]);
431 1.1.1.3 christos free(xfrd_sig_evs[i]);
432 1.1.1.3 christos }
433 1.1.1.3 christos }
434 1.1.1.3 christos #ifdef RATELIMIT
435 1.1.1.3 christos rrl_mmap_deinit();
436 1.1.1.3 christos #endif
437 1.1.1.4 prlw1 #ifdef USE_DNSTAP
438 1.1.1.4 prlw1 dt_collector_destroy(nsd.dt_collector, &nsd);
439 1.1.1.4 prlw1 #endif
440 1.1.1.3 christos udb_base_free(nsd.task[0]);
441 1.1.1.3 christos udb_base_free(nsd.task[1]);
442 1.1.1.3 christos event_base_free(xfrd->event_base);
443 1.1.1.3 christos region_destroy(xfrd->region);
444 1.1.1.3 christos nsd_options_destroy(nsd.options);
445 1.1.1.3 christos region_destroy(nsd.region);
446 1.1.1.3 christos log_finalize();
447 1.1.1.3 christos #endif
448 1.1 christos
449 1.1 christos exit(0);
450 1.1 christos }
451 1.1 christos
452 1.1 christos static void
453 1.1 christos xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u)
454 1.1 christos {
455 1.1 christos udb_ptr t;
456 1.1 christos udb_ptr_new(&t, u, udb_base_get_userdata(u));
457 1.1 christos /* no dealloc of entries, we delete the entire file when done */
458 1.1 christos while(!udb_ptr_is_null(&t)) {
459 1.1 christos if(TASKLIST(&t)->task_type == task_apply_xfr) {
460 1.1 christos xfrd_unlink_xfrfile(nsd, TASKLIST(&t)->yesno);
461 1.1 christos }
462 1.1 christos udb_ptr_set_rptr(&t, u, &TASKLIST(&t)->next);
463 1.1 christos }
464 1.1 christos udb_ptr_unlink(&t, u);
465 1.1 christos }
466 1.1 christos
467 1.1 christos void
468 1.1.1.2 christos xfrd_init_slave_zone(xfrd_state_type* xfrd, struct zone_options* zone_opt)
469 1.1 christos {
470 1.1.1.2 christos xfrd_zone_type *xzone;
471 1.1.1.2 christos xzone = (xfrd_zone_type*)region_alloc(xfrd->region,
472 1.1.1.2 christos sizeof(xfrd_zone_type));
473 1.1.1.2 christos memset(xzone, 0, sizeof(xfrd_zone_type));
474 1.1 christos xzone->apex = zone_opt->node.key;
475 1.1 christos xzone->apex_str = zone_opt->name;
476 1.1 christos xzone->state = xfrd_zone_refreshing;
477 1.1 christos xzone->zone_options = zone_opt;
478 1.1 christos /* first retry will use first master */
479 1.1 christos xzone->master = xzone->zone_options->pattern->request_xfr;
480 1.1 christos xzone->master_num = 0;
481 1.1 christos xzone->next_master = 0;
482 1.1 christos xzone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
483 1.1 christos
484 1.1 christos xzone->soa_nsd_acquired = 0;
485 1.1 christos xzone->soa_disk_acquired = 0;
486 1.1 christos xzone->soa_notified_acquired = 0;
487 1.1 christos /* [0]=1, [1]=0; "." domain name */
488 1.1 christos xzone->soa_nsd.prim_ns[0] = 1;
489 1.1 christos xzone->soa_nsd.email[0] = 1;
490 1.1 christos xzone->soa_disk.prim_ns[0]=1;
491 1.1 christos xzone->soa_disk.email[0]=1;
492 1.1 christos xzone->soa_notified.prim_ns[0]=1;
493 1.1 christos xzone->soa_notified.email[0]=1;
494 1.1 christos
495 1.1 christos xzone->zone_handler.ev_fd = -1;
496 1.1 christos xzone->zone_handler_flags = 0;
497 1.1 christos xzone->event_added = 0;
498 1.1 christos
499 1.1 christos xzone->tcp_conn = -1;
500 1.1 christos xzone->tcp_waiting = 0;
501 1.1 christos xzone->udp_waiting = 0;
502 1.1 christos xzone->is_activated = 0;
503 1.1 christos
504 1.1 christos xzone->multi_master_first_master = -1;
505 1.1 christos xzone->multi_master_update_check = -1;
506 1.1 christos tsig_create_record_custom(&xzone->tsig, NULL, 0, 0, 4);
507 1.1 christos
508 1.1 christos /* set refreshing anyway, if we have data it may be old */
509 1.1 christos xfrd_set_refresh_now(xzone);
510 1.1 christos
511 1.1 christos xzone->node.key = xzone->apex;
512 1.1.1.2 christos rbtree_insert(xfrd->zones, (rbnode_type*)xzone);
513 1.1 christos }
514 1.1 christos
515 1.1 christos static void
516 1.1 christos xfrd_init_zones()
517 1.1 christos {
518 1.1.1.2 christos struct zone_options *zone_opt;
519 1.1 christos assert(xfrd->zones == 0);
520 1.1 christos
521 1.1 christos xfrd->zones = rbtree_create(xfrd->region,
522 1.1 christos (int (*)(const void *, const void *)) dname_compare);
523 1.1 christos xfrd->notify_zones = rbtree_create(xfrd->region,
524 1.1 christos (int (*)(const void *, const void *)) dname_compare);
525 1.1 christos
526 1.1.1.2 christos RBTREE_FOR(zone_opt, struct zone_options*, xfrd->nsd->options->zone_options)
527 1.1 christos {
528 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: adding %s zone",
529 1.1 christos zone_opt->name));
530 1.1 christos
531 1.1 christos init_notify_send(xfrd->notify_zones, xfrd->region, zone_opt);
532 1.1 christos if(!zone_is_slave(zone_opt)) {
533 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, "
534 1.1 christos "master zone has no outgoing xfr requests",
535 1.1 christos zone_opt->name));
536 1.1 christos continue;
537 1.1 christos }
538 1.1 christos xfrd_init_slave_zone(xfrd, zone_opt);
539 1.1 christos }
540 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: started server %d "
541 1.1 christos "secondary zones", (int)xfrd->zones->count));
542 1.1 christos }
543 1.1 christos
544 1.1 christos static void
545 1.1 christos xfrd_process_soa_info_task(struct task_list_d* task)
546 1.1 christos {
547 1.1.1.2 christos xfrd_soa_type soa;
548 1.1.1.2 christos xfrd_soa_type* soa_ptr = &soa;
549 1.1.1.2 christos xfrd_zone_type* zone;
550 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: process SOAINFO %s",
551 1.1 christos dname_to_string(task->zname, 0)));
552 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, task->zname);
553 1.1 christos if(task->size <= sizeof(struct task_list_d)+dname_total_size(
554 1.1 christos task->zname)+sizeof(uint32_t)*6 + sizeof(uint8_t)*2) {
555 1.1 christos /* NSD has zone without any info */
556 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s lost zone",
557 1.1 christos dname_to_string(task->zname,0)));
558 1.1 christos soa_ptr = NULL;
559 1.1 christos } else {
560 1.1 christos uint8_t* p = (uint8_t*)task->zname + dname_total_size(
561 1.1 christos task->zname);
562 1.1 christos /* read the soa info */
563 1.1 christos memset(&soa, 0, sizeof(soa));
564 1.1 christos /* left out type, klass, count for speed */
565 1.1 christos soa.type = htons(TYPE_SOA);
566 1.1 christos soa.klass = htons(CLASS_IN);
567 1.1 christos memmove(&soa.ttl, p, sizeof(uint32_t));
568 1.1 christos p += sizeof(uint32_t);
569 1.1 christos soa.rdata_count = htons(7);
570 1.1 christos memmove(soa.prim_ns, p, sizeof(uint8_t));
571 1.1 christos p += sizeof(uint8_t);
572 1.1 christos memmove(soa.prim_ns+1, p, soa.prim_ns[0]);
573 1.1 christos p += soa.prim_ns[0];
574 1.1 christos memmove(soa.email, p, sizeof(uint8_t));
575 1.1 christos p += sizeof(uint8_t);
576 1.1 christos memmove(soa.email+1, p, soa.email[0]);
577 1.1 christos p += soa.email[0];
578 1.1 christos memmove(&soa.serial, p, sizeof(uint32_t));
579 1.1 christos p += sizeof(uint32_t);
580 1.1 christos memmove(&soa.refresh, p, sizeof(uint32_t));
581 1.1 christos p += sizeof(uint32_t);
582 1.1 christos memmove(&soa.retry, p, sizeof(uint32_t));
583 1.1 christos p += sizeof(uint32_t);
584 1.1 christos memmove(&soa.expire, p, sizeof(uint32_t));
585 1.1 christos p += sizeof(uint32_t);
586 1.1 christos memmove(&soa.minimum, p, sizeof(uint32_t));
587 1.1.1.3 christos /* p += sizeof(uint32_t); if we wanted to read further */
588 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s %u",
589 1.1 christos dname_to_string(task->zname,0),
590 1.1 christos (unsigned)ntohl(soa.serial)));
591 1.1 christos }
592 1.1 christos
593 1.1 christos if(!zone) {
594 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: zone %s master zone updated",
595 1.1 christos dname_to_string(task->zname,0)));
596 1.1 christos notify_handle_master_zone_soainfo(xfrd->notify_zones,
597 1.1 christos task->zname, soa_ptr);
598 1.1 christos return;
599 1.1 christos }
600 1.1 christos xfrd_handle_incoming_soa(zone, soa_ptr, xfrd_time());
601 1.1 christos }
602 1.1 christos
603 1.1 christos static void
604 1.1 christos xfrd_receive_soa(int socket, int shortsoa)
605 1.1 christos {
606 1.1 christos sig_atomic_t cmd;
607 1.1 christos struct udb_base* xtask = xfrd->nsd->task[xfrd->nsd->mytask];
608 1.1 christos udb_ptr last_task, t;
609 1.1.1.2 christos xfrd_zone_type* zone;
610 1.1 christos
611 1.1 christos if(!shortsoa) {
612 1.1 christos /* put all expired zones into mytask */
613 1.1 christos udb_ptr_init(&last_task, xtask);
614 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
615 1.1 christos if(zone->state == xfrd_zone_expired) {
616 1.1 christos task_new_expire(xtask, &last_task, zone->apex, 1);
617 1.1 christos }
618 1.1 christos }
619 1.1 christos udb_ptr_unlink(&last_task, xtask);
620 1.1 christos
621 1.1 christos /* send RELOAD to main to give it this tasklist */
622 1.1 christos task_process_sync(xtask);
623 1.1 christos cmd = NSD_RELOAD;
624 1.1 christos if(!write_socket(socket, &cmd, sizeof(cmd))) {
625 1.1 christos log_msg(LOG_ERR, "problems sending reload xfrdtomain: %s",
626 1.1 christos strerror(errno));
627 1.1 christos }
628 1.1 christos }
629 1.1 christos
630 1.1 christos /* receive RELOAD_DONE to get SOAINFO tasklist */
631 1.1 christos if(block_read(&nsd, socket, &cmd, sizeof(cmd), -1) != sizeof(cmd) ||
632 1.1 christos cmd != NSD_RELOAD_DONE) {
633 1.1 christos if(nsd.signal_hint_shutdown)
634 1.1 christos return;
635 1.1 christos log_msg(LOG_ERR, "did not get start signal from main");
636 1.1 christos exit(1);
637 1.1 christos }
638 1.1 christos if(block_read(NULL, socket, &xfrd->reload_pid, sizeof(pid_t), -1)
639 1.1 christos != sizeof(pid_t)) {
640 1.1 christos log_msg(LOG_ERR, "xfrd cannot get reload_pid");
641 1.1 christos }
642 1.1 christos
643 1.1 christos /* process tasklist (SOAINFO data) */
644 1.1 christos udb_ptr_unlink(xfrd->last_task, xtask);
645 1.1 christos /* if shortsoa: then use my own taskdb that nsdparent filled */
646 1.1 christos if(!shortsoa)
647 1.1 christos xfrd->nsd->mytask = 1 - xfrd->nsd->mytask;
648 1.1 christos xtask = xfrd->nsd->task[xfrd->nsd->mytask];
649 1.1 christos task_remap(xtask);
650 1.1 christos udb_ptr_new(&t, xtask, udb_base_get_userdata(xtask));
651 1.1 christos while(!udb_ptr_is_null(&t)) {
652 1.1 christos xfrd_process_soa_info_task(TASKLIST(&t));
653 1.1 christos udb_ptr_set_rptr(&t, xtask, &TASKLIST(&t)->next);
654 1.1 christos }
655 1.1 christos udb_ptr_unlink(&t, xtask);
656 1.1 christos task_clear(xtask);
657 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
658 1.1 christos
659 1.1 christos if(!shortsoa) {
660 1.1 christos /* receive RELOAD_DONE that signals the other tasklist is
661 1.1 christos * empty, and thus xfrd can operate (can call reload and swap
662 1.1 christos * to the other, empty, tasklist) */
663 1.1 christos if(block_read(NULL, socket, &cmd, sizeof(cmd), -1) !=
664 1.1 christos sizeof(cmd) ||
665 1.1 christos cmd != NSD_RELOAD_DONE) {
666 1.1 christos log_msg(LOG_ERR, "did not get start signal 2 from "
667 1.1 christos "main");
668 1.1 christos exit(1);
669 1.1 christos }
670 1.1 christos } else {
671 1.1 christos /* for shortsoa version, do expire later */
672 1.1 christos /* if expire notifications, put in my task and
673 1.1 christos * schedule a reload to make sure they are processed */
674 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
675 1.1 christos if(zone->state == xfrd_zone_expired) {
676 1.1 christos xfrd_send_expire_notification(zone);
677 1.1 christos }
678 1.1 christos }
679 1.1 christos }
680 1.1 christos }
681 1.1 christos
682 1.1 christos void
683 1.1 christos xfrd_reopen_logfile(void)
684 1.1 christos {
685 1.1 christos if (xfrd->nsd->file_rotation_ok)
686 1.1 christos log_reopen(xfrd->nsd->log_filename, 0);
687 1.1 christos }
688 1.1 christos
689 1.1 christos void
690 1.1.1.2 christos xfrd_deactivate_zone(xfrd_zone_type* z)
691 1.1 christos {
692 1.1 christos if(z->is_activated) {
693 1.1 christos /* delete from activated list */
694 1.1 christos if(z->activated_prev)
695 1.1 christos z->activated_prev->activated_next = z->activated_next;
696 1.1 christos else xfrd->activated_first = z->activated_next;
697 1.1 christos if(z->activated_next)
698 1.1 christos z->activated_next->activated_prev = z->activated_prev;
699 1.1 christos z->is_activated = 0;
700 1.1 christos }
701 1.1 christos }
702 1.1 christos
703 1.1 christos void
704 1.1.1.2 christos xfrd_del_slave_zone(xfrd_state_type* xfrd, const dname_type* dname)
705 1.1 christos {
706 1.1.1.2 christos xfrd_zone_type* z = (xfrd_zone_type*)rbtree_delete(xfrd->zones, dname);
707 1.1 christos if(!z) return;
708 1.1 christos
709 1.1 christos /* io */
710 1.1 christos if(z->tcp_waiting) {
711 1.1 christos /* delete from tcp waiting list */
712 1.1 christos if(z->tcp_waiting_prev)
713 1.1 christos z->tcp_waiting_prev->tcp_waiting_next =
714 1.1 christos z->tcp_waiting_next;
715 1.1 christos else xfrd->tcp_set->tcp_waiting_first = z->tcp_waiting_next;
716 1.1 christos if(z->tcp_waiting_next)
717 1.1 christos z->tcp_waiting_next->tcp_waiting_prev =
718 1.1 christos z->tcp_waiting_prev;
719 1.1 christos else xfrd->tcp_set->tcp_waiting_last = z->tcp_waiting_prev;
720 1.1 christos z->tcp_waiting = 0;
721 1.1 christos }
722 1.1 christos if(z->udp_waiting) {
723 1.1 christos /* delete from udp waiting list */
724 1.1 christos if(z->udp_waiting_prev)
725 1.1 christos z->udp_waiting_prev->udp_waiting_next =
726 1.1 christos z->udp_waiting_next;
727 1.1 christos else xfrd->udp_waiting_first = z->udp_waiting_next;
728 1.1 christos if(z->udp_waiting_next)
729 1.1 christos z->udp_waiting_next->udp_waiting_prev =
730 1.1 christos z->udp_waiting_prev;
731 1.1 christos else xfrd->udp_waiting_last = z->udp_waiting_prev;
732 1.1 christos z->udp_waiting = 0;
733 1.1 christos }
734 1.1 christos xfrd_deactivate_zone(z);
735 1.1 christos if(z->tcp_conn != -1) {
736 1.1 christos xfrd_tcp_release(xfrd->tcp_set, z);
737 1.1 christos } else if(z->zone_handler.ev_fd != -1 && z->event_added) {
738 1.1 christos xfrd_udp_release(z);
739 1.1 christos } else if(z->event_added)
740 1.1 christos event_del(&z->zone_handler);
741 1.1 christos if(z->msg_seq_nr)
742 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, z->xfrfilenumber);
743 1.1 christos
744 1.1 christos /* tsig */
745 1.1 christos tsig_delete_record(&z->tsig, NULL);
746 1.1 christos
747 1.1 christos /* z->dname is recycled when the zone_options is removed */
748 1.1 christos region_recycle(xfrd->region, z, sizeof(*z));
749 1.1 christos }
750 1.1 christos
751 1.1 christos void
752 1.1 christos xfrd_free_namedb(struct nsd* nsd)
753 1.1 christos {
754 1.1 christos namedb_close_udb(nsd->db);
755 1.1 christos namedb_close(nsd->db);
756 1.1 christos nsd->db = 0;
757 1.1 christos }
758 1.1 christos
759 1.1 christos static void
760 1.1.1.2 christos xfrd_set_timer_refresh(xfrd_zone_type* zone)
761 1.1 christos {
762 1.1 christos time_t set_refresh;
763 1.1 christos time_t set_expire;
764 1.1 christos time_t set_min;
765 1.1 christos time_t set;
766 1.1 christos if(zone->soa_disk_acquired == 0 || zone->state != xfrd_zone_ok) {
767 1.1 christos xfrd_set_timer_retry(zone);
768 1.1 christos return;
769 1.1 christos }
770 1.1 christos /* refresh or expire timeout, whichever is earlier */
771 1.1 christos set_refresh = ntohl(zone->soa_disk.refresh);
772 1.1 christos if (set_refresh > (time_t)zone->zone_options->pattern->max_refresh_time)
773 1.1 christos set_refresh = zone->zone_options->pattern->max_refresh_time;
774 1.1 christos else if (set_refresh < (time_t)zone->zone_options->pattern->min_refresh_time)
775 1.1 christos set_refresh = zone->zone_options->pattern->min_refresh_time;
776 1.1 christos set_refresh += zone->soa_disk_acquired;
777 1.1 christos set_expire = zone->soa_disk_acquired + ntohl(zone->soa_disk.expire);
778 1.1 christos if(set_refresh < set_expire)
779 1.1 christos set = set_refresh;
780 1.1 christos else set = set_expire;
781 1.1 christos set_min = zone->soa_disk_acquired + XFRD_LOWERBOUND_REFRESH;
782 1.1 christos if(set < set_min)
783 1.1 christos set = set_min;
784 1.1 christos if(set < xfrd_time())
785 1.1 christos set = 0;
786 1.1 christos else set -= xfrd_time();
787 1.1 christos xfrd_set_timer(zone, set);
788 1.1 christos }
789 1.1 christos
790 1.1 christos static void
791 1.1.1.2 christos xfrd_set_timer_retry(xfrd_zone_type* zone)
792 1.1 christos {
793 1.1 christos time_t set_retry;
794 1.1 christos int mult;
795 1.1 christos /* perform exponential backoff in all the cases */
796 1.1 christos if(zone->fresh_xfr_timeout == 0)
797 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
798 1.1 christos else {
799 1.1 christos /* exponential backoff - some master data in zones is paid-for
800 1.1 christos but non-working, and will not get fixed. */
801 1.1 christos zone->fresh_xfr_timeout *= 2;
802 1.1 christos if(zone->fresh_xfr_timeout > XFRD_TRANSFER_TIMEOUT_MAX)
803 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_MAX;
804 1.1 christos }
805 1.1 christos /* exponential backoff multiplier, starts at 1, backs off */
806 1.1 christos mult = zone->fresh_xfr_timeout / XFRD_TRANSFER_TIMEOUT_START;
807 1.1 christos if(mult == 0) mult = 1;
808 1.1 christos
809 1.1 christos /* set timer for next retry or expire timeout if earlier. */
810 1.1 christos if(zone->soa_disk_acquired == 0) {
811 1.1 christos /* if no information, use reasonable timeout */
812 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
813 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
814 1.1 christos + arc4random_uniform(zone->fresh_xfr_timeout));
815 1.1 christos #elif HAVE_ARC4RANDOM
816 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
817 1.1 christos + arc4random() % zone->fresh_xfr_timeout);
818 1.1 christos #else
819 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
820 1.1 christos + random()%zone->fresh_xfr_timeout);
821 1.1 christos #endif
822 1.1 christos } else if(zone->state == xfrd_zone_expired ||
823 1.1 christos xfrd_time() + (time_t)ntohl(zone->soa_disk.retry)*mult <
824 1.1 christos zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire))
825 1.1 christos {
826 1.1 christos set_retry = ntohl(zone->soa_disk.retry);
827 1.1 christos set_retry *= mult;
828 1.1 christos if(set_retry > (time_t)zone->zone_options->pattern->max_retry_time)
829 1.1 christos set_retry = zone->zone_options->pattern->max_retry_time;
830 1.1 christos else if(set_retry < (time_t)zone->zone_options->pattern->min_retry_time)
831 1.1 christos set_retry = zone->zone_options->pattern->min_retry_time;
832 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
833 1.1.1.2 christos set_retry = XFRD_LOWERBOUND_RETRY;
834 1.1 christos xfrd_set_timer(zone, set_retry);
835 1.1 christos } else {
836 1.1 christos set_retry = ntohl(zone->soa_disk.expire);
837 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
838 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
839 1.1 christos else {
840 1.1 christos if(zone->soa_disk_acquired + set_retry < xfrd_time())
841 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
842 1.1 christos else xfrd_set_timer(zone, zone->soa_disk_acquired +
843 1.1 christos set_retry - xfrd_time());
844 1.1 christos }
845 1.1 christos }
846 1.1 christos }
847 1.1 christos
848 1.1 christos void
849 1.1 christos xfrd_handle_zone(int ATTR_UNUSED(fd), short event, void* arg)
850 1.1 christos {
851 1.1.1.2 christos xfrd_zone_type* zone = (xfrd_zone_type*)arg;
852 1.1 christos
853 1.1 christos if(zone->tcp_conn != -1) {
854 1.1 christos if(event == 0) /* activated, but already in TCP, nothing to do*/
855 1.1 christos return;
856 1.1 christos /* busy in tcp transaction: an internal error */
857 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event tcp", zone->apex_str));
858 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
859 1.1 christos /* continue to retry; as if a timeout happened */
860 1.1 christos event = EV_TIMEOUT;
861 1.1 christos }
862 1.1 christos
863 1.1 christos if((event & EV_READ)) {
864 1.1 christos /* busy in udp transaction */
865 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event udp read", zone->apex_str));
866 1.1 christos xfrd_udp_read(zone);
867 1.1 christos return;
868 1.1 christos }
869 1.1 christos
870 1.1 christos /* timeout */
871 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s timeout", zone->apex_str));
872 1.1 christos if(zone->zone_handler.ev_fd != -1 && zone->event_added &&
873 1.1 christos (event & EV_TIMEOUT)) {
874 1.1 christos assert(zone->tcp_conn == -1);
875 1.1 christos xfrd_udp_release(zone);
876 1.1 christos }
877 1.1 christos
878 1.1 christos if(zone->tcp_waiting) {
879 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, TCP connections full",
880 1.1 christos zone->apex_str));
881 1.1 christos xfrd_unset_timer(zone);
882 1.1 christos return;
883 1.1 christos }
884 1.1 christos if(zone->udp_waiting) {
885 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, UDP connections full",
886 1.1 christos zone->apex_str));
887 1.1 christos xfrd_unset_timer(zone);
888 1.1 christos return;
889 1.1 christos }
890 1.1 christos
891 1.1 christos if(zone->soa_disk_acquired)
892 1.1 christos {
893 1.1 christos if (zone->state != xfrd_zone_expired &&
894 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire)) {
895 1.1 christos /* zone expired */
896 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s has expired", zone->apex_str);
897 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
898 1.1 christos }
899 1.1 christos else if(zone->state == xfrd_zone_ok &&
900 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.refresh)) {
901 1.1 christos /* zone goes to refreshing state. */
902 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is refreshing", zone->apex_str));
903 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
904 1.1 christos }
905 1.1 christos }
906 1.1 christos
907 1.1 christos /* only make a new request if no request is running (UDPorTCP) */
908 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1) {
909 1.1 christos /* make a new request */
910 1.1 christos xfrd_make_request(zone);
911 1.1 christos }
912 1.1 christos }
913 1.1 christos
914 1.1 christos void
915 1.1.1.2 christos xfrd_make_request(xfrd_zone_type* zone)
916 1.1 christos {
917 1.1 christos if(zone->next_master != -1) {
918 1.1 christos /* we are told to use this next master */
919 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
920 1.1 christos "xfrd zone %s use master %i",
921 1.1 christos zone->apex_str, zone->next_master));
922 1.1 christos zone->master_num = zone->next_master;
923 1.1 christos zone->master = acl_find_num(zone->zone_options->pattern->
924 1.1 christos request_xfr, zone->master_num);
925 1.1 christos /* if there is no next master, fallback to use the first one */
926 1.1 christos if(!zone->master) {
927 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
928 1.1 christos zone->master_num = 0;
929 1.1 christos }
930 1.1 christos /* fallback to cycle master */
931 1.1 christos zone->next_master = -1;
932 1.1 christos zone->round_num = 0; /* fresh set of retries after notify */
933 1.1 christos } else {
934 1.1 christos /* cycle master */
935 1.1 christos
936 1.1 christos if(zone->round_num != -1 && zone->master && zone->master->next)
937 1.1 christos {
938 1.1 christos /* try the next master */
939 1.1 christos zone->master = zone->master->next;
940 1.1 christos zone->master_num++;
941 1.1 christos } else {
942 1.1 christos /* start a new round */
943 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
944 1.1 christos zone->master_num = 0;
945 1.1 christos zone->round_num++;
946 1.1 christos }
947 1.1 christos if(zone->round_num >= XFRD_MAX_ROUNDS) {
948 1.1 christos /* tried all servers that many times, wait */
949 1.1 christos zone->round_num = -1;
950 1.1 christos xfrd_set_timer_retry(zone);
951 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
952 1.1 christos "xfrd zone %s makereq wait_retry, rd %d mr %d nx %d",
953 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
954 1.1 christos zone->multi_master_first_master = -1;
955 1.1 christos return;
956 1.1 christos }
957 1.1 christos }
958 1.1 christos
959 1.1 christos /* multi-master-check */
960 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
961 1.1 christos if(zone->multi_master_first_master == zone->master_num &&
962 1.1 christos zone->round_num > 0 &&
963 1.1 christos zone->state != xfrd_zone_expired) {
964 1.1 christos /* tried all servers and update zone */
965 1.1 christos if(zone->multi_master_update_check >= 0) {
966 1.1 christos VERBOSITY(2, (LOG_INFO, "xfrd: multi master "
967 1.1 christos "check: zone %s completed transfers",
968 1.1 christos zone->apex_str));
969 1.1 christos }
970 1.1 christos zone->round_num = -1; /* next try start anew */
971 1.1 christos zone->multi_master_first_master = -1;
972 1.1 christos xfrd_set_timer_refresh(zone);
973 1.1 christos return;
974 1.1 christos }
975 1.1 christos if(zone->multi_master_first_master < 0) {
976 1.1 christos zone->multi_master_first_master = zone->master_num;
977 1.1 christos zone->multi_master_update_check = -1;
978 1.1 christos }
979 1.1 christos }
980 1.1 christos
981 1.1 christos /* cache ixfr_disabled only for XFRD_NO_IXFR_CACHE time */
982 1.1 christos if (zone->master->ixfr_disabled &&
983 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL)) {
984 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "clear negative caching ixfr "
985 1.1 christos "disabled for master %s num "
986 1.1 christos "%d ",
987 1.1 christos zone->master->ip_address_spec, zone->master_num));
988 1.1 christos zone->master->ixfr_disabled = 0;
989 1.1 christos }
990 1.1 christos
991 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s make request round %d mr %d nx %d",
992 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
993 1.1 christos /* perform xfr request */
994 1.1 christos if (!zone->master->use_axfr_only && zone->soa_disk_acquired > 0 &&
995 1.1 christos !zone->master->ixfr_disabled) {
996 1.1 christos
997 1.1 christos if (zone->master->allow_udp) {
998 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
999 1.1 christos xfrd_udp_obtain(zone);
1000 1.1 christos }
1001 1.1 christos else { /* doing 3 rounds of IXFR/TCP might not be useful */
1002 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1003 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1004 1.1 christos }
1005 1.1 christos }
1006 1.1 christos else if (zone->master->use_axfr_only || zone->soa_disk_acquired <= 0) {
1007 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1008 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1009 1.1 christos }
1010 1.1 christos else if (zone->master->ixfr_disabled) {
1011 1.1 christos if (zone->zone_options->pattern->allow_axfr_fallback) {
1012 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1013 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1014 1.1 christos } else {
1015 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s axfr "
1016 1.1 christos "fallback not allowed, skipping master %s.",
1017 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1018 1.1 christos }
1019 1.1 christos }
1020 1.1 christos }
1021 1.1 christos
1022 1.1 christos static void
1023 1.1.1.2 christos xfrd_udp_obtain(xfrd_zone_type* zone)
1024 1.1 christos {
1025 1.1 christos assert(zone->udp_waiting == 0);
1026 1.1 christos if(zone->tcp_conn != -1) {
1027 1.1 christos /* no tcp and udp at the same time */
1028 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
1029 1.1 christos }
1030 1.1 christos if(xfrd->udp_use_num < XFRD_MAX_UDP) {
1031 1.1 christos int fd;
1032 1.1 christos xfrd->udp_use_num++;
1033 1.1 christos fd = xfrd_send_ixfr_request_udp(zone);
1034 1.1 christos if(fd == -1)
1035 1.1 christos xfrd->udp_use_num--;
1036 1.1 christos else {
1037 1.1 christos if(zone->event_added)
1038 1.1 christos event_del(&zone->zone_handler);
1039 1.1.1.5 christos memset(&zone->zone_handler, 0,
1040 1.1.1.5 christos sizeof(zone->zone_handler));
1041 1.1 christos event_set(&zone->zone_handler, fd,
1042 1.1 christos EV_PERSIST|EV_READ|EV_TIMEOUT,
1043 1.1 christos xfrd_handle_zone, zone);
1044 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1045 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_base_set failed");
1046 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1047 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_add failed");
1048 1.1 christos zone->zone_handler_flags=EV_PERSIST|EV_READ|EV_TIMEOUT;
1049 1.1 christos zone->event_added = 1;
1050 1.1 christos }
1051 1.1 christos return;
1052 1.1 christos }
1053 1.1 christos /* queue the zone as last */
1054 1.1 christos zone->udp_waiting = 1;
1055 1.1 christos zone->udp_waiting_next = NULL;
1056 1.1 christos zone->udp_waiting_prev = xfrd->udp_waiting_last;
1057 1.1 christos if(!xfrd->udp_waiting_first)
1058 1.1 christos xfrd->udp_waiting_first = zone;
1059 1.1 christos if(xfrd->udp_waiting_last)
1060 1.1 christos xfrd->udp_waiting_last->udp_waiting_next = zone;
1061 1.1 christos xfrd->udp_waiting_last = zone;
1062 1.1 christos xfrd_unset_timer(zone);
1063 1.1 christos }
1064 1.1 christos
1065 1.1 christos time_t
1066 1.1 christos xfrd_time()
1067 1.1 christos {
1068 1.1 christos if(!xfrd->got_time) {
1069 1.1 christos xfrd->current_time = time(0);
1070 1.1 christos xfrd->got_time = 1;
1071 1.1 christos }
1072 1.1 christos return xfrd->current_time;
1073 1.1 christos }
1074 1.1 christos
1075 1.1 christos void
1076 1.1.1.2 christos xfrd_copy_soa(xfrd_soa_type* soa, rr_type* rr)
1077 1.1 christos {
1078 1.1 christos const uint8_t* rr_ns_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[0])));
1079 1.1 christos uint8_t rr_ns_len = domain_dname(rdata_atom_domain(rr->rdatas[0]))->name_size;
1080 1.1 christos const uint8_t* rr_em_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[1])));
1081 1.1 christos uint8_t rr_em_len = domain_dname(rdata_atom_domain(rr->rdatas[1]))->name_size;
1082 1.1 christos
1083 1.1 christos if(rr->type != TYPE_SOA || rr->rdata_count != 7) {
1084 1.1 christos log_msg(LOG_ERR, "xfrd: copy_soa called with bad rr, type %d rrs %u.",
1085 1.1 christos rr->type, rr->rdata_count);
1086 1.1 christos return;
1087 1.1 christos }
1088 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: copy_soa rr, type %d rrs %u, ttl %u.",
1089 1.1 christos (int)rr->type, (unsigned)rr->rdata_count, (unsigned)rr->ttl));
1090 1.1 christos soa->type = htons(rr->type);
1091 1.1 christos soa->klass = htons(rr->klass);
1092 1.1 christos soa->ttl = htonl(rr->ttl);
1093 1.1 christos soa->rdata_count = htons(rr->rdata_count);
1094 1.1 christos
1095 1.1 christos /* copy dnames */
1096 1.1 christos soa->prim_ns[0] = rr_ns_len;
1097 1.1 christos memcpy(soa->prim_ns+1, rr_ns_wire, rr_ns_len);
1098 1.1 christos soa->email[0] = rr_em_len;
1099 1.1 christos memcpy(soa->email+1, rr_em_wire, rr_em_len);
1100 1.1 christos
1101 1.1 christos /* already in network format */
1102 1.1 christos memcpy(&soa->serial, rdata_atom_data(rr->rdatas[2]), sizeof(uint32_t));
1103 1.1 christos memcpy(&soa->refresh, rdata_atom_data(rr->rdatas[3]), sizeof(uint32_t));
1104 1.1 christos memcpy(&soa->retry, rdata_atom_data(rr->rdatas[4]), sizeof(uint32_t));
1105 1.1 christos memcpy(&soa->expire, rdata_atom_data(rr->rdatas[5]), sizeof(uint32_t));
1106 1.1 christos memcpy(&soa->minimum, rdata_atom_data(rr->rdatas[6]), sizeof(uint32_t));
1107 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1108 1.1 christos "xfrd: copy_soa rr, serial %u refresh %u retry %u expire %u",
1109 1.1 christos (unsigned)ntohl(soa->serial), (unsigned)ntohl(soa->refresh),
1110 1.1 christos (unsigned)ntohl(soa->retry), (unsigned)ntohl(soa->expire)));
1111 1.1 christos }
1112 1.1 christos
1113 1.1 christos static void
1114 1.1.1.2 christos xfrd_set_zone_state(xfrd_zone_type* zone, enum xfrd_zone_state s)
1115 1.1 christos {
1116 1.1 christos if(s != zone->state) {
1117 1.1 christos enum xfrd_zone_state old = zone->state;
1118 1.1 christos zone->state = s;
1119 1.1 christos if((s == xfrd_zone_expired || old == xfrd_zone_expired)
1120 1.1 christos && s!=old) {
1121 1.1 christos xfrd_send_expire_notification(zone);
1122 1.1 christos }
1123 1.1 christos }
1124 1.1 christos }
1125 1.1 christos
1126 1.1 christos void
1127 1.1.1.2 christos xfrd_set_refresh_now(xfrd_zone_type* zone)
1128 1.1 christos {
1129 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s is activated, state %d",
1130 1.1 christos zone->apex_str, zone->state));
1131 1.1 christos if(!zone->is_activated) {
1132 1.1 christos /* push onto list */
1133 1.1 christos zone->activated_prev = 0;
1134 1.1 christos zone->activated_next = xfrd->activated_first;
1135 1.1 christos if(xfrd->activated_first)
1136 1.1 christos xfrd->activated_first->activated_prev = zone;
1137 1.1 christos xfrd->activated_first = zone;
1138 1.1 christos zone->is_activated = 1;
1139 1.1 christos }
1140 1.1 christos }
1141 1.1 christos
1142 1.1 christos void
1143 1.1.1.2 christos xfrd_unset_timer(xfrd_zone_type* zone)
1144 1.1 christos {
1145 1.1 christos assert(zone->zone_handler.ev_fd == -1);
1146 1.1 christos if(zone->event_added)
1147 1.1 christos event_del(&zone->zone_handler);
1148 1.1 christos zone->zone_handler_flags = 0;
1149 1.1 christos zone->event_added = 0;
1150 1.1 christos }
1151 1.1 christos
1152 1.1 christos void
1153 1.1.1.2 christos xfrd_set_timer(xfrd_zone_type* zone, time_t t)
1154 1.1 christos {
1155 1.1 christos int fd = zone->zone_handler.ev_fd;
1156 1.1 christos int fl = ((fd == -1)?EV_TIMEOUT:zone->zone_handler_flags);
1157 1.1 christos /* randomize the time, within 90%-100% of original */
1158 1.1 christos /* not later so zones cannot expire too late */
1159 1.1 christos /* only for times far in the future */
1160 1.1 christos if(t > 10) {
1161 1.1 christos time_t base = t*9/10;
1162 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
1163 1.1 christos t = base + arc4random_uniform(t-base);
1164 1.1 christos #elif HAVE_ARC4RANDOM
1165 1.1 christos t = base + arc4random() % (t-base);
1166 1.1 christos #else
1167 1.1 christos t = base + random()%(t-base);
1168 1.1 christos #endif
1169 1.1 christos }
1170 1.1 christos
1171 1.1 christos /* keep existing flags and fd, but re-add with timeout */
1172 1.1 christos if(zone->event_added)
1173 1.1 christos event_del(&zone->zone_handler);
1174 1.1 christos else fd = -1;
1175 1.1 christos zone->timeout.tv_sec = t;
1176 1.1 christos zone->timeout.tv_usec = 0;
1177 1.1.1.5 christos memset(&zone->zone_handler, 0, sizeof(zone->zone_handler));
1178 1.1 christos event_set(&zone->zone_handler, fd, fl, xfrd_handle_zone, zone);
1179 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1180 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_base_set failed");
1181 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1182 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_add failed");
1183 1.1 christos zone->zone_handler_flags = fl;
1184 1.1 christos zone->event_added = 1;
1185 1.1 christos }
1186 1.1 christos
1187 1.1 christos void
1188 1.1.1.2 christos xfrd_handle_incoming_soa(xfrd_zone_type* zone,
1189 1.1.1.2 christos xfrd_soa_type* soa, time_t acquired)
1190 1.1 christos {
1191 1.1 christos if(soa == NULL) {
1192 1.1 christos /* nsd no longer has a zone in memory */
1193 1.1 christos zone->soa_nsd_acquired = 0;
1194 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1195 1.1 christos xfrd_set_refresh_now(zone);
1196 1.1 christos return;
1197 1.1 christos }
1198 1.1 christos if(zone->soa_nsd_acquired && soa->serial == zone->soa_nsd.serial)
1199 1.1 christos return;
1200 1.1 christos
1201 1.1 christos if(zone->soa_disk_acquired && soa->serial == zone->soa_disk.serial)
1202 1.1 christos {
1203 1.1 christos /* soa in disk has been loaded in memory */
1204 1.1.1.5 christos log_msg(LOG_INFO, "zone %s serial %u is updated to %u",
1205 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_nsd.serial),
1206 1.1 christos (unsigned)ntohl(soa->serial));
1207 1.1 christos zone->soa_nsd = zone->soa_disk;
1208 1.1 christos zone->soa_nsd_acquired = zone->soa_disk_acquired;
1209 1.1 christos xfrd->write_zonefile_needed = 1;
1210 1.1 christos /* reset exponential backoff, we got a normal timer now */
1211 1.1 christos zone->fresh_xfr_timeout = 0;
1212 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1213 1.1 christos < (time_t)ntohl(zone->soa_disk.refresh))
1214 1.1 christos {
1215 1.1 christos /* zone ok, wait for refresh time */
1216 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1217 1.1 christos zone->round_num = -1;
1218 1.1 christos xfrd_set_timer_refresh(zone);
1219 1.1 christos } else if(xfrd_time() - zone->soa_disk_acquired
1220 1.1 christos < (time_t)ntohl(zone->soa_disk.expire))
1221 1.1 christos {
1222 1.1 christos /* zone refreshing */
1223 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1224 1.1 christos xfrd_set_refresh_now(zone);
1225 1.1 christos }
1226 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1227 1.1 christos >= (time_t)ntohl(zone->soa_disk.expire)) {
1228 1.1 christos /* zone expired */
1229 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
1230 1.1 christos xfrd_set_refresh_now(zone);
1231 1.1 christos }
1232 1.1 christos
1233 1.1 christos if(zone->soa_notified_acquired != 0 &&
1234 1.1 christos (zone->soa_notified.serial == 0 ||
1235 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1236 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1237 1.1 christos { /* read was in response to this notification */
1238 1.1 christos zone->soa_notified_acquired = 0;
1239 1.1 christos }
1240 1.1 christos if(zone->soa_notified_acquired && zone->state == xfrd_zone_ok)
1241 1.1 christos {
1242 1.1 christos /* refresh because of notification */
1243 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1244 1.1 christos xfrd_set_refresh_now(zone);
1245 1.1 christos }
1246 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1247 1.1 christos return;
1248 1.1 christos }
1249 1.1 christos
1250 1.1 christos /* user must have manually provided zone data */
1251 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1252 1.1 christos "xfrd: zone %s serial %u from zonefile. refreshing",
1253 1.1 christos zone->apex_str, (unsigned)ntohl(soa->serial)));
1254 1.1 christos zone->soa_nsd = *soa;
1255 1.1 christos zone->soa_disk = *soa;
1256 1.1 christos zone->soa_nsd_acquired = acquired;
1257 1.1 christos zone->soa_disk_acquired = acquired;
1258 1.1 christos if(zone->soa_notified_acquired != 0 &&
1259 1.1 christos (zone->soa_notified.serial == 0 ||
1260 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1261 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1262 1.1 christos { /* user provided in response to this notification */
1263 1.1 christos zone->soa_notified_acquired = 0;
1264 1.1 christos }
1265 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1266 1.1 christos xfrd_set_refresh_now(zone);
1267 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1268 1.1 christos }
1269 1.1 christos
1270 1.1 christos void
1271 1.1.1.2 christos xfrd_send_expire_notification(xfrd_zone_type* zone)
1272 1.1 christos {
1273 1.1 christos task_new_expire(xfrd->nsd->task[xfrd->nsd->mytask], xfrd->last_task,
1274 1.1 christos zone->apex, zone->state == xfrd_zone_expired);
1275 1.1 christos xfrd_set_reload_timeout();
1276 1.1 christos }
1277 1.1 christos
1278 1.1 christos int
1279 1.1.1.2 christos xfrd_udp_read_packet(buffer_type* packet, int fd, struct sockaddr* src,
1280 1.1.1.2 christos socklen_t* srclen)
1281 1.1 christos {
1282 1.1 christos ssize_t received;
1283 1.1 christos
1284 1.1 christos /* read the data */
1285 1.1 christos buffer_clear(packet);
1286 1.1 christos received = recvfrom(fd, buffer_begin(packet), buffer_remaining(packet),
1287 1.1.1.2 christos 0, src, srclen);
1288 1.1 christos if(received == -1) {
1289 1.1 christos log_msg(LOG_ERR, "xfrd: recvfrom failed: %s",
1290 1.1 christos strerror(errno));
1291 1.1 christos return 0;
1292 1.1 christos }
1293 1.1 christos buffer_set_limit(packet, received);
1294 1.1 christos return 1;
1295 1.1 christos }
1296 1.1 christos
1297 1.1 christos void
1298 1.1.1.2 christos xfrd_udp_release(xfrd_zone_type* zone)
1299 1.1 christos {
1300 1.1 christos assert(zone->udp_waiting == 0);
1301 1.1 christos if(zone->event_added)
1302 1.1 christos event_del(&zone->zone_handler);
1303 1.1 christos if(zone->zone_handler.ev_fd != -1) {
1304 1.1 christos close(zone->zone_handler.ev_fd);
1305 1.1 christos }
1306 1.1 christos zone->zone_handler.ev_fd = -1;
1307 1.1 christos zone->zone_handler_flags = 0;
1308 1.1 christos zone->event_added = 0;
1309 1.1 christos /* see if there are waiting zones */
1310 1.1 christos if(xfrd->udp_use_num == XFRD_MAX_UDP)
1311 1.1 christos {
1312 1.1 christos while(xfrd->udp_waiting_first) {
1313 1.1 christos /* snip off waiting list */
1314 1.1.1.2 christos xfrd_zone_type* wz = xfrd->udp_waiting_first;
1315 1.1 christos assert(wz->udp_waiting);
1316 1.1 christos wz->udp_waiting = 0;
1317 1.1 christos xfrd->udp_waiting_first = wz->udp_waiting_next;
1318 1.1 christos if(wz->udp_waiting_next)
1319 1.1 christos wz->udp_waiting_next->udp_waiting_prev = NULL;
1320 1.1 christos if(xfrd->udp_waiting_last == wz)
1321 1.1 christos xfrd->udp_waiting_last = NULL;
1322 1.1 christos /* see if this zone needs udp connection */
1323 1.1 christos if(wz->tcp_conn == -1) {
1324 1.1 christos int fd = xfrd_send_ixfr_request_udp(wz);
1325 1.1 christos if(fd != -1) {
1326 1.1 christos if(wz->event_added)
1327 1.1 christos event_del(&wz->zone_handler);
1328 1.1.1.5 christos memset(&wz->zone_handler, 0,
1329 1.1.1.5 christos sizeof(wz->zone_handler));
1330 1.1 christos event_set(&wz->zone_handler, fd,
1331 1.1 christos EV_READ|EV_TIMEOUT|EV_PERSIST,
1332 1.1 christos xfrd_handle_zone, wz);
1333 1.1 christos if(event_base_set(xfrd->event_base,
1334 1.1 christos &wz->zone_handler) != 0)
1335 1.1 christos log_msg(LOG_ERR, "cannot set event_base for ixfr");
1336 1.1 christos if(event_add(&wz->zone_handler, &wz->timeout) != 0)
1337 1.1 christos log_msg(LOG_ERR, "cannot add event for ixfr");
1338 1.1 christos wz->zone_handler_flags = EV_READ|EV_TIMEOUT|EV_PERSIST;
1339 1.1 christos wz->event_added = 1;
1340 1.1 christos return;
1341 1.1 christos } else {
1342 1.1 christos /* make this zone do something with
1343 1.1 christos * this failure to act */
1344 1.1 christos xfrd_set_refresh_now(wz);
1345 1.1 christos }
1346 1.1 christos }
1347 1.1 christos }
1348 1.1 christos }
1349 1.1 christos /* no waiting zones */
1350 1.1 christos if(xfrd->udp_use_num > 0)
1351 1.1 christos xfrd->udp_use_num--;
1352 1.1 christos }
1353 1.1 christos
1354 1.1 christos /** disable ixfr for master */
1355 1.1 christos void
1356 1.1.1.2 christos xfrd_disable_ixfr(xfrd_zone_type* zone)
1357 1.1 christos {
1358 1.1 christos if(!(zone->master->ixfr_disabled &&
1359 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL))) {
1360 1.1 christos /* start new round, with IXFR disabled */
1361 1.1 christos zone->round_num = 0;
1362 1.1 christos zone->next_master = zone->master_num;
1363 1.1 christos }
1364 1.1 christos zone->master->ixfr_disabled = time(NULL);
1365 1.1 christos }
1366 1.1 christos
1367 1.1 christos static void
1368 1.1.1.2 christos xfrd_udp_read(xfrd_zone_type* zone)
1369 1.1 christos {
1370 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s read udp data", zone->apex_str));
1371 1.1.1.2 christos if(!xfrd_udp_read_packet(xfrd->packet, zone->zone_handler.ev_fd,
1372 1.1.1.2 christos NULL, NULL)) {
1373 1.1 christos zone->master->bad_xfr_count++;
1374 1.1 christos if (zone->master->bad_xfr_count > 2) {
1375 1.1 christos xfrd_disable_ixfr(zone);
1376 1.1 christos zone->master->bad_xfr_count = 0;
1377 1.1 christos }
1378 1.1 christos /* drop packet */
1379 1.1 christos xfrd_udp_release(zone);
1380 1.1 christos /* query next server */
1381 1.1 christos xfrd_make_request(zone);
1382 1.1 christos return;
1383 1.1 christos }
1384 1.1 christos switch(xfrd_handle_received_xfr_packet(zone, xfrd->packet)) {
1385 1.1 christos case xfrd_packet_tcp:
1386 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1387 1.1 christos xfrd_udp_release(zone);
1388 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1389 1.1 christos break;
1390 1.1 christos case xfrd_packet_transfer:
1391 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1392 1.1 christos xfrd_udp_release(zone);
1393 1.1 christos xfrd_make_request(zone);
1394 1.1 christos break;
1395 1.1 christos }
1396 1.1.1.2 christos /* fallthrough */
1397 1.1 christos case xfrd_packet_newlease:
1398 1.1 christos /* nothing more to do */
1399 1.1 christos assert(zone->round_num == -1);
1400 1.1 christos xfrd_udp_release(zone);
1401 1.1 christos break;
1402 1.1 christos case xfrd_packet_notimpl:
1403 1.1 christos xfrd_disable_ixfr(zone);
1404 1.1 christos /* drop packet */
1405 1.1 christos xfrd_udp_release(zone);
1406 1.1 christos /* query next server */
1407 1.1 christos xfrd_make_request(zone);
1408 1.1 christos break;
1409 1.1 christos case xfrd_packet_more:
1410 1.1 christos case xfrd_packet_drop:
1411 1.1 christos /* drop packet */
1412 1.1 christos xfrd_udp_release(zone);
1413 1.1 christos /* query next server */
1414 1.1 christos xfrd_make_request(zone);
1415 1.1 christos break;
1416 1.1 christos case xfrd_packet_bad:
1417 1.1 christos default:
1418 1.1 christos zone->master->bad_xfr_count++;
1419 1.1 christos if (zone->master->bad_xfr_count > 2) {
1420 1.1 christos xfrd_disable_ixfr(zone);
1421 1.1 christos zone->master->bad_xfr_count = 0;
1422 1.1 christos }
1423 1.1 christos /* drop packet */
1424 1.1 christos xfrd_udp_release(zone);
1425 1.1 christos /* query next server */
1426 1.1 christos xfrd_make_request(zone);
1427 1.1 christos break;
1428 1.1 christos }
1429 1.1 christos }
1430 1.1 christos
1431 1.1 christos int
1432 1.1.1.2 christos xfrd_send_udp(struct acl_options* acl, buffer_type* packet,
1433 1.1.1.2 christos struct acl_options* ifc)
1434 1.1 christos {
1435 1.1 christos #ifdef INET6
1436 1.1 christos struct sockaddr_storage to;
1437 1.1 christos #else
1438 1.1 christos struct sockaddr_in to;
1439 1.1 christos #endif /* INET6 */
1440 1.1 christos int fd, family;
1441 1.1 christos
1442 1.1 christos /* this will set the remote port to acl->port or TCP_PORT */
1443 1.1 christos socklen_t to_len = xfrd_acl_sockaddr_to(acl, &to);
1444 1.1 christos
1445 1.1 christos /* get the address family of the remote host */
1446 1.1 christos if(acl->is_ipv6) {
1447 1.1 christos #ifdef INET6
1448 1.1 christos family = PF_INET6;
1449 1.1 christos #else
1450 1.1 christos return -1;
1451 1.1 christos #endif /* INET6 */
1452 1.1 christos } else {
1453 1.1 christos family = PF_INET;
1454 1.1 christos }
1455 1.1 christos
1456 1.1 christos fd = socket(family, SOCK_DGRAM, IPPROTO_UDP);
1457 1.1 christos if(fd == -1) {
1458 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create udp socket to %s: %s",
1459 1.1 christos acl->ip_address_spec, strerror(errno));
1460 1.1 christos return -1;
1461 1.1 christos }
1462 1.1 christos
1463 1.1 christos /* bind it */
1464 1.1 christos if (!xfrd_bind_local_interface(fd, ifc, acl, 0)) {
1465 1.1 christos log_msg(LOG_ERR, "xfrd: cannot bind outgoing interface '%s' to "
1466 1.1 christos "udp socket: No matching ip addresses found",
1467 1.1 christos ifc->ip_address_spec);
1468 1.1 christos close(fd);
1469 1.1 christos return -1;
1470 1.1 christos }
1471 1.1 christos
1472 1.1 christos /* send it (udp) */
1473 1.1 christos if(sendto(fd,
1474 1.1 christos buffer_current(packet),
1475 1.1 christos buffer_remaining(packet), 0,
1476 1.1 christos (struct sockaddr*)&to, to_len) == -1)
1477 1.1 christos {
1478 1.1 christos log_msg(LOG_ERR, "xfrd: sendto %s failed %s",
1479 1.1 christos acl->ip_address_spec, strerror(errno));
1480 1.1 christos close(fd);
1481 1.1 christos return -1;
1482 1.1 christos }
1483 1.1 christos return fd;
1484 1.1 christos }
1485 1.1 christos
1486 1.1 christos int
1487 1.1.1.2 christos xfrd_bind_local_interface(int sockd, struct acl_options* ifc,
1488 1.1.1.2 christos struct acl_options* acl, int tcp)
1489 1.1 christos {
1490 1.1 christos #ifdef SO_LINGER
1491 1.1 christos struct linger linger = {1, 0};
1492 1.1 christos #endif
1493 1.1 christos socklen_t frm_len;
1494 1.1 christos #ifdef INET6
1495 1.1 christos struct sockaddr_storage frm;
1496 1.1 christos #else
1497 1.1 christos struct sockaddr_in frm;
1498 1.1 christos #endif /* INET6 */
1499 1.1 christos int ret = 1;
1500 1.1 christos
1501 1.1 christos if (!ifc) /* no outgoing interface set */
1502 1.1 christos return 1;
1503 1.1 christos
1504 1.1 christos while (ifc) {
1505 1.1 christos if (ifc->is_ipv6 != acl->is_ipv6) {
1506 1.1 christos /* check if we have a matching address family */
1507 1.1 christos ifc = ifc->next;
1508 1.1 christos continue;
1509 1.1 christos }
1510 1.1 christos
1511 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: bind() %s to %s socket",
1512 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1513 1.1 christos ret = 0;
1514 1.1 christos frm_len = xfrd_acl_sockaddr_frm(ifc, &frm);
1515 1.1 christos
1516 1.1 christos if (tcp) {
1517 1.1 christos #ifdef SO_REUSEADDR
1518 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_REUSEADDR, &frm,
1519 1.1 christos frm_len) < 0) {
1520 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1521 1.1 christos "SO_REUSEADDR failed: %s", strerror(errno)));
1522 1.1 christos }
1523 1.1 christos #else
1524 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_REUSEADDR "
1525 1.1 christos "failed: SO_REUSEADDR not defined"));
1526 1.1 christos #endif /* SO_REUSEADDR */
1527 1.1 christos
1528 1.1 christos if (ifc->port != 0) {
1529 1.1 christos #ifdef SO_LINGER
1530 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_LINGER,
1531 1.1 christos &linger, sizeof(linger)) < 0) {
1532 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1533 1.1 christos "SO_LINGER failed: %s", strerror(errno)));
1534 1.1 christos }
1535 1.1 christos #else
1536 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_LINGER "
1537 1.1 christos "failed: SO_LINGER not defined"));
1538 1.1 christos #endif /* SO_LINGER */
1539 1.1 christos }
1540 1.1 christos }
1541 1.1 christos
1542 1.1 christos /* found one */
1543 1.1 christos if(bind(sockd, (struct sockaddr*)&frm, frm_len) >= 0) {
1544 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s "
1545 1.1 christos "socket was successful",
1546 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1547 1.1 christos return 1;
1548 1.1 christos }
1549 1.1 christos
1550 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s socket"
1551 1.1 christos "failed: %s",
1552 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp",
1553 1.1 christos strerror(errno)));
1554 1.1 christos
1555 1.1 christos log_msg(LOG_WARNING, "xfrd: could not bind source address:port to "
1556 1.1 christos "socket: %s", strerror(errno));
1557 1.1 christos /* try another */
1558 1.1 christos ifc = ifc->next;
1559 1.1 christos }
1560 1.1 christos return ret;
1561 1.1 christos }
1562 1.1 christos
1563 1.1 christos void
1564 1.1 christos xfrd_tsig_sign_request(buffer_type* packet, tsig_record_type* tsig,
1565 1.1.1.2 christos struct acl_options* acl)
1566 1.1 christos {
1567 1.1 christos tsig_algorithm_type* algo;
1568 1.1 christos assert(acl->key_options && acl->key_options->tsig_key);
1569 1.1 christos algo = tsig_get_algorithm_by_name(acl->key_options->algorithm);
1570 1.1 christos if(!algo) {
1571 1.1 christos log_msg(LOG_ERR, "tsig unknown algorithm %s",
1572 1.1 christos acl->key_options->algorithm);
1573 1.1 christos return;
1574 1.1 christos }
1575 1.1 christos assert(algo);
1576 1.1 christos tsig_init_record(tsig, algo, acl->key_options->tsig_key);
1577 1.1 christos tsig_init_query(tsig, ID(packet));
1578 1.1 christos tsig_prepare(tsig);
1579 1.1 christos tsig_update(tsig, packet, buffer_position(packet));
1580 1.1 christos tsig_sign(tsig);
1581 1.1 christos tsig_append_rr(tsig, packet);
1582 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) + 1);
1583 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "appending tsig to packet"));
1584 1.1 christos /* prepare for validating tsigs */
1585 1.1 christos tsig_prepare(tsig);
1586 1.1 christos }
1587 1.1 christos
1588 1.1 christos static int
1589 1.1.1.2 christos xfrd_send_ixfr_request_udp(xfrd_zone_type* zone)
1590 1.1 christos {
1591 1.1 christos int fd;
1592 1.1 christos
1593 1.1 christos /* make sure we have a master to query the ixfr request to */
1594 1.1 christos assert(zone->master);
1595 1.1 christos
1596 1.1 christos if(zone->tcp_conn != -1) {
1597 1.1 christos /* tcp is using the zone_handler.fd */
1598 1.1 christos log_msg(LOG_ERR, "xfrd: %s tried to send udp whilst tcp engaged",
1599 1.1 christos zone->apex_str);
1600 1.1 christos return -1;
1601 1.1 christos }
1602 1.1 christos xfrd_setup_packet(xfrd->packet, TYPE_IXFR, CLASS_IN, zone->apex,
1603 1.1 christos qid_generate());
1604 1.1 christos zone->query_id = ID(xfrd->packet);
1605 1.1 christos /* delete old xfr file? */
1606 1.1 christos if(zone->msg_seq_nr)
1607 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
1608 1.1 christos zone->msg_seq_nr = 0;
1609 1.1 christos zone->msg_rr_count = 0;
1610 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent query with ID %d", zone->query_id));
1611 1.1 christos NSCOUNT_SET(xfrd->packet, 1);
1612 1.1 christos xfrd_write_soa_buffer(xfrd->packet, zone->apex, &zone->soa_disk);
1613 1.1 christos /* if we have tsig keys, sign the ixfr query */
1614 1.1 christos if(zone->master->key_options && zone->master->key_options->tsig_key) {
1615 1.1 christos xfrd_tsig_sign_request(xfrd->packet, &zone->tsig, zone->master);
1616 1.1 christos }
1617 1.1 christos buffer_flip(xfrd->packet);
1618 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
1619 1.1 christos
1620 1.1 christos if((fd = xfrd_send_udp(zone->master, xfrd->packet,
1621 1.1 christos zone->zone_options->pattern->outgoing_interface)) == -1)
1622 1.1 christos return -1;
1623 1.1 christos
1624 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1625 1.1 christos "xfrd sent udp request for ixfr=%u for zone %s to %s",
1626 1.1 christos (unsigned)ntohl(zone->soa_disk.serial),
1627 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1628 1.1 christos return fd;
1629 1.1 christos }
1630 1.1 christos
1631 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa)
1632 1.1 christos {
1633 1.1 christos if(!buffer_available(packet, 10))
1634 1.1 christos return 0;
1635 1.1 christos soa->type = htons(buffer_read_u16(packet));
1636 1.1 christos soa->klass = htons(buffer_read_u16(packet));
1637 1.1 christos soa->ttl = htonl(buffer_read_u32(packet));
1638 1.1 christos if(ntohs(soa->type) != TYPE_SOA || ntohs(soa->klass) != CLASS_IN)
1639 1.1 christos {
1640 1.1 christos return 0;
1641 1.1 christos }
1642 1.1 christos
1643 1.1 christos if(!buffer_available(packet, buffer_read_u16(packet)) /* rdata length */ ||
1644 1.1 christos !(soa->prim_ns[0] = dname_make_wire_from_packet(soa->prim_ns+1, packet, 1)) ||
1645 1.1 christos !(soa->email[0] = dname_make_wire_from_packet(soa->email+1, packet, 1)))
1646 1.1 christos {
1647 1.1 christos return 0;
1648 1.1 christos }
1649 1.1 christos soa->rdata_count = 7; /* rdata in SOA */
1650 1.1 christos soa->serial = htonl(buffer_read_u32(packet));
1651 1.1 christos soa->refresh = htonl(buffer_read_u32(packet));
1652 1.1 christos soa->retry = htonl(buffer_read_u32(packet));
1653 1.1 christos soa->expire = htonl(buffer_read_u32(packet));
1654 1.1 christos soa->minimum = htonl(buffer_read_u32(packet));
1655 1.1 christos
1656 1.1 christos return 1;
1657 1.1 christos }
1658 1.1 christos
1659 1.1 christos
1660 1.1 christos /*
1661 1.1 christos * Check the RRs in an IXFR/AXFR reply.
1662 1.1 christos * returns 0 on error, 1 on correct parseable packet.
1663 1.1 christos * done = 1 if the last SOA in an IXFR/AXFR has been seen.
1664 1.1 christos * soa then contains that soa info.
1665 1.1 christos * (soa contents is modified by the routine)
1666 1.1 christos */
1667 1.1 christos static int
1668 1.1.1.2 christos xfrd_xfr_check_rrs(xfrd_zone_type* zone, buffer_type* packet, size_t count,
1669 1.1.1.2 christos int *done, xfrd_soa_type* soa, region_type* temp)
1670 1.1 christos {
1671 1.1 christos /* first RR has already been checked */
1672 1.1 christos uint32_t tmp_serial = 0;
1673 1.1 christos uint16_t type, rrlen;
1674 1.1 christos size_t i, soapos, mempos;
1675 1.1 christos const dname_type* dname;
1676 1.1 christos domain_table_type* owners;
1677 1.1 christos rdata_atom_type* rdatas;
1678 1.1 christos
1679 1.1 christos for(i=0; i<count; ++i,++zone->msg_rr_count)
1680 1.1 christos {
1681 1.1 christos if (*done) {
1682 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr has "
1683 1.1 christos "trailing garbage", zone->apex_str));
1684 1.1 christos return 0;
1685 1.1 christos }
1686 1.1 christos region_free_all(temp);
1687 1.1 christos owners = domain_table_create(temp);
1688 1.1 christos /* check the dname for errors */
1689 1.1 christos dname = dname_make_from_packet(temp, packet, 1, 1);
1690 1.1 christos if(!dname) {
1691 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1692 1.1 christos "to parse owner name", zone->apex_str));
1693 1.1 christos return 0;
1694 1.1 christos }
1695 1.1 christos if(!buffer_available(packet, 10)) {
1696 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr hdr "
1697 1.1 christos "too small", zone->apex_str));
1698 1.1 christos return 0;
1699 1.1 christos }
1700 1.1 christos soapos = buffer_position(packet);
1701 1.1 christos type = buffer_read_u16(packet);
1702 1.1 christos (void)buffer_read_u16(packet); /* class */
1703 1.1 christos (void)buffer_read_u32(packet); /* ttl */
1704 1.1 christos rrlen = buffer_read_u16(packet);
1705 1.1 christos if(!buffer_available(packet, rrlen)) {
1706 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr pkt "
1707 1.1 christos "too small", zone->apex_str));
1708 1.1 christos return 0;
1709 1.1 christos }
1710 1.1 christos mempos = buffer_position(packet);
1711 1.1 christos if(rdata_wireformat_to_rdata_atoms(temp, owners, type, rrlen,
1712 1.1 christos packet, &rdatas) == -1) {
1713 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1714 1.1 christos "to parse rdata", zone->apex_str));
1715 1.1 christos return 0;
1716 1.1 christos }
1717 1.1 christos if(type == TYPE_SOA) {
1718 1.1 christos /* check the SOAs */
1719 1.1 christos buffer_set_position(packet, soapos);
1720 1.1 christos if(!xfrd_parse_soa_info(packet, soa)) {
1721 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1722 1.1 christos "unable to parse soainfo", zone->apex_str));
1723 1.1 christos return 0;
1724 1.1 christos }
1725 1.1 christos if(zone->msg_rr_count == 1 &&
1726 1.1 christos ntohl(soa->serial) != zone->msg_new_serial) {
1727 1.1 christos /* 2nd RR is SOA with lower serial, this is an IXFR */
1728 1.1 christos zone->msg_is_ixfr = 1;
1729 1.1 christos if(!zone->soa_disk_acquired) {
1730 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1731 1.1 christos "got ixfr but need axfr", zone->apex_str));
1732 1.1 christos return 0; /* got IXFR but need AXFR */
1733 1.1 christos }
1734 1.1 christos if(ntohl(soa->serial) != ntohl(zone->soa_disk.serial)) {
1735 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1736 1.1 christos "bad start serial", zone->apex_str));
1737 1.1 christos return 0; /* bad start serial in IXFR */
1738 1.1 christos }
1739 1.1 christos zone->msg_old_serial = ntohl(soa->serial);
1740 1.1 christos tmp_serial = ntohl(soa->serial);
1741 1.1 christos }
1742 1.1 christos else if(ntohl(soa->serial) == zone->msg_new_serial) {
1743 1.1 christos /* saw another SOA of new serial. */
1744 1.1 christos if(zone->msg_is_ixfr == 1) {
1745 1.1 christos zone->msg_is_ixfr = 2; /* seen middle SOA in ixfr */
1746 1.1 christos } else {
1747 1.1 christos /* 2nd SOA for AXFR or 3rd newSOA for IXFR */
1748 1.1 christos *done = 1;
1749 1.1 christos }
1750 1.1 christos }
1751 1.1 christos else if (zone->msg_is_ixfr) {
1752 1.1 christos /* some additional checks */
1753 1.1 christos if(ntohl(soa->serial) > zone->msg_new_serial) {
1754 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1755 1.1 christos "bad middle serial", zone->apex_str));
1756 1.1 christos return 0; /* bad middle serial in IXFR */
1757 1.1 christos }
1758 1.1 christos if(ntohl(soa->serial) < tmp_serial) {
1759 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1760 1.1 christos "serial decreasing not allowed", zone->apex_str));
1761 1.1 christos return 0; /* middle serial decreases in IXFR */
1762 1.1 christos }
1763 1.1 christos /* serial ok, update tmp serial */
1764 1.1 christos tmp_serial = ntohl(soa->serial);
1765 1.1 christos }
1766 1.1 christos }
1767 1.1 christos buffer_set_position(packet, mempos);
1768 1.1 christos buffer_skip(packet, rrlen);
1769 1.1 christos }
1770 1.1 christos /* packet seems to have a valid DNS RR structure */
1771 1.1 christos return 1;
1772 1.1 christos }
1773 1.1 christos
1774 1.1 christos static int
1775 1.1.1.2 christos xfrd_xfr_process_tsig(xfrd_zone_type* zone, buffer_type* packet)
1776 1.1 christos {
1777 1.1 christos int have_tsig = 0;
1778 1.1 christos assert(zone && zone->master && zone->master->key_options
1779 1.1 christos && zone->master->key_options->tsig_key && packet);
1780 1.1 christos if(!tsig_find_rr(&zone->tsig, packet)) {
1781 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: malformed tsig RR",
1782 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1783 1.1 christos return 0;
1784 1.1 christos }
1785 1.1 christos if(zone->tsig.status == TSIG_OK) {
1786 1.1 christos have_tsig = 1;
1787 1.1 christos if (zone->tsig.error_code != TSIG_ERROR_NOERROR) {
1788 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: tsig error "
1789 1.1 christos "(%s)", zone->apex_str,
1790 1.1 christos zone->master->ip_address_spec,
1791 1.1 christos tsig_error(zone->tsig.error_code));
1792 1.1 christos }
1793 1.1 christos }
1794 1.1 christos if(have_tsig) {
1795 1.1 christos /* strip the TSIG resource record off... */
1796 1.1 christos buffer_set_limit(packet, zone->tsig.position);
1797 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) - 1);
1798 1.1 christos }
1799 1.1 christos
1800 1.1 christos /* keep running the TSIG hash */
1801 1.1 christos tsig_update(&zone->tsig, packet, buffer_limit(packet));
1802 1.1 christos if(have_tsig) {
1803 1.1 christos if (!tsig_verify(&zone->tsig)) {
1804 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad tsig signature",
1805 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1806 1.1 christos return 0;
1807 1.1 christos }
1808 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, from %s: good tsig signature",
1809 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1810 1.1 christos /* prepare for next tsigs */
1811 1.1 christos tsig_prepare(&zone->tsig);
1812 1.1 christos }
1813 1.1 christos else if(zone->tsig.updates_since_last_prepare > XFRD_TSIG_MAX_UNSIGNED) {
1814 1.1 christos /* we allow a number of non-tsig signed packets */
1815 1.1 christos log_msg(LOG_INFO, "xfrd: zone %s, from %s: too many consecutive "
1816 1.1 christos "packets without TSIG", zone->apex_str,
1817 1.1 christos zone->master->ip_address_spec);
1818 1.1 christos return 0;
1819 1.1 christos }
1820 1.1 christos
1821 1.1 christos if(!have_tsig && zone->msg_seq_nr == 0) {
1822 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: no tsig in first packet of reply",
1823 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1824 1.1 christos return 0;
1825 1.1 christos }
1826 1.1 christos return 1;
1827 1.1 christos }
1828 1.1 christos
1829 1.1 christos /* parse the received packet. returns xfrd packet result code. */
1830 1.1 christos static enum xfrd_packet_result
1831 1.1.1.2 christos xfrd_parse_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet,
1832 1.1.1.2 christos xfrd_soa_type* soa)
1833 1.1 christos {
1834 1.1 christos size_t rr_count;
1835 1.1 christos size_t qdcount = QDCOUNT(packet);
1836 1.1 christos size_t ancount = ANCOUNT(packet), ancount_todo;
1837 1.1 christos size_t nscount = NSCOUNT(packet);
1838 1.1 christos int done = 0;
1839 1.1 christos region_type* tempregion = NULL;
1840 1.1.1.5 christos assert(zone->master);
1841 1.1 christos
1842 1.1 christos /* has to be axfr / ixfr reply */
1843 1.1 christos if(!buffer_available(packet, QHEADERSZ)) {
1844 1.1 christos log_msg(LOG_INFO, "packet too small");
1845 1.1 christos return xfrd_packet_bad;
1846 1.1 christos }
1847 1.1 christos
1848 1.1 christos /* only check ID in first response message. Could also check that
1849 1.1 christos * AA bit and QR bit are set, but not needed.
1850 1.1 christos */
1851 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO,
1852 1.1 christos "got query with ID %d and %d needed", ID(packet), zone->query_id));
1853 1.1 christos if(ID(packet) != zone->query_id) {
1854 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s received bad query id from %s, "
1855 1.1 christos "dropped",
1856 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1857 1.1 christos return xfrd_packet_bad;
1858 1.1 christos }
1859 1.1 christos /* check RCODE in all response messages */
1860 1.1 christos if(RCODE(packet) != RCODE_OK) {
1861 1.1.1.5 christos /* for IXFR failures, do not log unless higher verbosity */
1862 1.1.1.5 christos if(!(verbosity < 3 && (RCODE(packet) == RCODE_IMPL ||
1863 1.1.1.5 christos RCODE(packet) == RCODE_FORMAT) &&
1864 1.1.1.5 christos !zone->master->ixfr_disabled &&
1865 1.1.1.5 christos !zone->master->use_axfr_only)) {
1866 1.1.1.5 christos log_msg(LOG_ERR, "xfrd: zone %s received error code %s from "
1867 1.1.1.5 christos "%s",
1868 1.1.1.5 christos zone->apex_str, rcode2str(RCODE(packet)),
1869 1.1.1.5 christos zone->master->ip_address_spec);
1870 1.1.1.5 christos }
1871 1.1 christos if (RCODE(packet) == RCODE_IMPL ||
1872 1.1 christos RCODE(packet) == RCODE_FORMAT) {
1873 1.1 christos return xfrd_packet_notimpl;
1874 1.1 christos }
1875 1.1 christos if (RCODE(packet) != RCODE_NOTAUTH) {
1876 1.1 christos /* RFC 2845: If NOTAUTH, client should do TSIG checking */
1877 1.1 christos return xfrd_packet_drop;
1878 1.1 christos }
1879 1.1 christos }
1880 1.1 christos /* check TSIG */
1881 1.1 christos if(zone->master->key_options) {
1882 1.1 christos if(!xfrd_xfr_process_tsig(zone, packet)) {
1883 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "dropping xfr reply due "
1884 1.1 christos "to bad TSIG"));
1885 1.1 christos return xfrd_packet_bad;
1886 1.1 christos }
1887 1.1 christos }
1888 1.1 christos if (RCODE(packet) == RCODE_NOTAUTH) {
1889 1.1 christos return xfrd_packet_drop;
1890 1.1 christos }
1891 1.1 christos
1892 1.1 christos buffer_skip(packet, QHEADERSZ);
1893 1.1 christos
1894 1.1 christos /* skip question section */
1895 1.1 christos for(rr_count = 0; rr_count < qdcount; ++rr_count) {
1896 1.1 christos if (!packet_skip_rr(packet, 1)) {
1897 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad RR in "
1898 1.1 christos "question section",
1899 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1900 1.1 christos return xfrd_packet_bad;
1901 1.1 christos }
1902 1.1 christos }
1903 1.1 christos if(zone->msg_rr_count == 0 && ancount == 0) {
1904 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
1905 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: TC flagged"));
1906 1.1 christos return xfrd_packet_tcp;
1907 1.1 christos }
1908 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: too short xfr packet: no "
1909 1.1 christos "answer"));
1910 1.1 christos /* if IXFR is unknown, fallback to AXFR (if allowed) */
1911 1.1 christos if (nscount == 1) {
1912 1.1 christos if(!packet_skip_dname(packet) || !xfrd_parse_soa_info(packet, soa)) {
1913 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1914 1.1 christos "no SOA begins authority section",
1915 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1916 1.1 christos return xfrd_packet_bad;
1917 1.1 christos }
1918 1.1 christos return xfrd_packet_notimpl;
1919 1.1 christos }
1920 1.1 christos return xfrd_packet_bad;
1921 1.1 christos }
1922 1.1 christos ancount_todo = ancount;
1923 1.1 christos
1924 1.1 christos tempregion = region_create(xalloc, free);
1925 1.1 christos if(zone->msg_rr_count == 0) {
1926 1.1 christos const dname_type* soaname = dname_make_from_packet(tempregion,
1927 1.1 christos packet, 1, 1);
1928 1.1 christos if(!soaname) { /* parse failure */
1929 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1930 1.1 christos "parse error in SOA record",
1931 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1932 1.1 christos region_destroy(tempregion);
1933 1.1 christos return xfrd_packet_bad;
1934 1.1 christos }
1935 1.1 christos if(dname_compare(soaname, zone->apex) != 0) { /* wrong name */
1936 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1937 1.1 christos "wrong SOA record",
1938 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1939 1.1 christos region_destroy(tempregion);
1940 1.1 christos return xfrd_packet_bad;
1941 1.1 christos }
1942 1.1 christos
1943 1.1 christos /* parse the first RR, see if it is a SOA */
1944 1.1 christos if(!xfrd_parse_soa_info(packet, soa))
1945 1.1 christos {
1946 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1947 1.1 christos "bad SOA rdata",
1948 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1949 1.1 christos region_destroy(tempregion);
1950 1.1 christos return xfrd_packet_bad;
1951 1.1 christos }
1952 1.1 christos if(zone->soa_disk_acquired != 0 &&
1953 1.1 christos zone->state != xfrd_zone_expired /* if expired - accept anything */ &&
1954 1.1 christos compare_serial(ntohl(soa->serial), ntohl(zone->soa_disk.serial)) < 0) {
1955 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1956 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1957 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1958 1.1 christos VERBOSITY(1, (LOG_INFO,
1959 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1960 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1961 1.1 christos region_destroy(tempregion);
1962 1.1 christos return xfrd_packet_bad;
1963 1.1 christos }
1964 1.1 christos if(zone->soa_disk_acquired != 0 && zone->soa_disk.serial == soa->serial) {
1965 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s got "
1966 1.1 christos "update indicating "
1967 1.1 christos "current serial",
1968 1.1 christos zone->apex_str));
1969 1.1 christos /* (even if notified) the lease on the current soa is renewed */
1970 1.1 christos zone->soa_disk_acquired = xfrd_time();
1971 1.1 christos if(zone->soa_nsd.serial == soa->serial)
1972 1.1 christos zone->soa_nsd_acquired = xfrd_time();
1973 1.1.1.2 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1974 1.1.1.2 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is ok",
1975 1.1.1.2 christos zone->apex_str));
1976 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1977 1.1 christos region_destroy(tempregion);
1978 1.1 christos return xfrd_packet_drop;
1979 1.1 christos }
1980 1.1 christos if(zone->soa_notified_acquired == 0) {
1981 1.1 christos /* not notified or anything, so stop asking around */
1982 1.1 christos zone->round_num = -1; /* next try start a new round */
1983 1.1 christos xfrd_set_timer_refresh(zone);
1984 1.1 christos region_destroy(tempregion);
1985 1.1 christos return xfrd_packet_newlease;
1986 1.1 christos }
1987 1.1 christos /* try next master */
1988 1.1 christos region_destroy(tempregion);
1989 1.1 christos return xfrd_packet_drop;
1990 1.1 christos }
1991 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "IXFR reply has ok serial (have \
1992 1.1 christos %u, reply %u).", (unsigned)ntohl(zone->soa_disk.serial), (unsigned)ntohl(soa->serial)));
1993 1.1 christos /* serial is newer than soa_disk */
1994 1.1 christos if(ancount == 1) {
1995 1.1 christos /* single record means it is like a notify */
1996 1.1 christos (void)xfrd_handle_incoming_notify(zone, soa);
1997 1.1 christos }
1998 1.1 christos else if(zone->soa_notified_acquired && zone->soa_notified.serial &&
1999 1.1 christos compare_serial(ntohl(zone->soa_notified.serial), ntohl(soa->serial)) < 0) {
2000 1.1 christos /* this AXFR/IXFR notifies me that an even newer serial exists */
2001 1.1 christos zone->soa_notified.serial = soa->serial;
2002 1.1 christos }
2003 1.1 christos zone->msg_new_serial = ntohl(soa->serial);
2004 1.1 christos zone->msg_rr_count = 1;
2005 1.1 christos zone->msg_is_ixfr = 0;
2006 1.1 christos if(zone->soa_disk_acquired)
2007 1.1 christos zone->msg_old_serial = ntohl(zone->soa_disk.serial);
2008 1.1 christos else zone->msg_old_serial = 0;
2009 1.1 christos ancount_todo = ancount - 1;
2010 1.1 christos }
2011 1.1 christos
2012 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
2013 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2014 1.1 christos "xfrd: zone %s received TC from %s. retry tcp.",
2015 1.1 christos zone->apex_str, zone->master->ip_address_spec));
2016 1.1 christos region_destroy(tempregion);
2017 1.1 christos return xfrd_packet_tcp;
2018 1.1 christos }
2019 1.1 christos
2020 1.1 christos if(zone->tcp_conn == -1 && ancount < 2) {
2021 1.1 christos /* too short to be a real ixfr/axfr data transfer: need at */
2022 1.1 christos /* least two RRs in the answer section. */
2023 1.1 christos /* The serial is newer, so try tcp to this master. */
2024 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply is short. Try "
2025 1.1 christos "tcp anyway."));
2026 1.1 christos region_destroy(tempregion);
2027 1.1 christos return xfrd_packet_tcp;
2028 1.1 christos }
2029 1.1 christos
2030 1.1 christos if(!xfrd_xfr_check_rrs(zone, packet, ancount_todo, &done, soa,
2031 1.1 christos tempregion))
2032 1.1 christos {
2033 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s sent bad xfr "
2034 1.1 christos "reply.", zone->apex_str));
2035 1.1 christos region_destroy(tempregion);
2036 1.1 christos return xfrd_packet_bad;
2037 1.1 christos }
2038 1.1 christos region_destroy(tempregion);
2039 1.1 christos if(zone->tcp_conn == -1 && done == 0) {
2040 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply incomplete"));
2041 1.1 christos return xfrd_packet_bad;
2042 1.1 christos }
2043 1.1 christos if(done == 0)
2044 1.1 christos return xfrd_packet_more;
2045 1.1 christos if(zone->master->key_options) {
2046 1.1 christos if(zone->tsig.updates_since_last_prepare != 0) {
2047 1.1 christos log_msg(LOG_INFO, "xfrd: last packet of reply has no "
2048 1.1 christos "TSIG");
2049 1.1 christos return xfrd_packet_bad;
2050 1.1 christos }
2051 1.1 christos }
2052 1.1 christos return xfrd_packet_transfer;
2053 1.1 christos }
2054 1.1 christos
2055 1.1 christos const char*
2056 1.1 christos xfrd_pretty_time(time_t v)
2057 1.1 christos {
2058 1.1 christos struct tm* tm = localtime(&v);
2059 1.1 christos static char buf[64];
2060 1.1 christos if(!strftime(buf, sizeof(buf), "%Y-%m-%dT%H:%M:%S", tm))
2061 1.1 christos snprintf(buf, sizeof(buf), "strftime-err-%u", (unsigned)v);
2062 1.1 christos return buf;
2063 1.1 christos }
2064 1.1 christos
2065 1.1 christos enum xfrd_packet_result
2066 1.1.1.2 christos xfrd_handle_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet)
2067 1.1 christos {
2068 1.1.1.2 christos xfrd_soa_type soa;
2069 1.1 christos enum xfrd_packet_result res;
2070 1.1 christos uint64_t xfrfile_size;
2071 1.1 christos
2072 1.1 christos /* parse and check the packet - see if it ends the xfr */
2073 1.1 christos switch((res=xfrd_parse_received_xfr_packet(zone, packet, &soa)))
2074 1.1 christos {
2075 1.1 christos case xfrd_packet_more:
2076 1.1 christos case xfrd_packet_transfer:
2077 1.1 christos /* continue with commit */
2078 1.1 christos break;
2079 1.1 christos case xfrd_packet_newlease:
2080 1.1 christos return xfrd_packet_newlease;
2081 1.1 christos case xfrd_packet_tcp:
2082 1.1 christos return xfrd_packet_tcp;
2083 1.1 christos case xfrd_packet_notimpl:
2084 1.1 christos case xfrd_packet_bad:
2085 1.1 christos case xfrd_packet_drop:
2086 1.1 christos default:
2087 1.1 christos {
2088 1.1 christos /* rollback */
2089 1.1 christos if(zone->msg_seq_nr > 0) {
2090 1.1 christos /* do not process xfr - if only one part simply ignore it. */
2091 1.1 christos /* delete file with previous parts of commit */
2092 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2093 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2094 1.1 christos "reverted transfer %u from %s",
2095 1.1 christos zone->apex_str, zone->msg_rr_count?
2096 1.1 christos (int)zone->msg_new_serial:0,
2097 1.1 christos zone->master->ip_address_spec));
2098 1.1 christos zone->msg_seq_nr = 0;
2099 1.1 christos } else if (res == xfrd_packet_bad) {
2100 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2101 1.1 christos "bad transfer %u from %s",
2102 1.1 christos zone->apex_str, zone->msg_rr_count?
2103 1.1 christos (int)zone->msg_new_serial:0,
2104 1.1 christos zone->master->ip_address_spec));
2105 1.1 christos }
2106 1.1 christos if (res == xfrd_packet_notimpl)
2107 1.1 christos return res;
2108 1.1 christos else
2109 1.1 christos return xfrd_packet_bad;
2110 1.1 christos }
2111 1.1 christos }
2112 1.1 christos
2113 1.1 christos /* dump reply on disk to diff file */
2114 1.1 christos /* if first part, get new filenumber. Numbers can wrap around, 64bit
2115 1.1 christos * is enough so we do not collide with older-transfers-in-progress */
2116 1.1 christos if(zone->msg_seq_nr == 0)
2117 1.1 christos zone->xfrfilenumber = xfrd->xfrfilenumber++;
2118 1.1 christos diff_write_packet(dname_to_string(zone->apex,0),
2119 1.1 christos zone->zone_options->pattern->pname,
2120 1.1 christos zone->msg_old_serial, zone->msg_new_serial, zone->msg_seq_nr,
2121 1.1 christos buffer_begin(packet), buffer_limit(packet), xfrd->nsd,
2122 1.1 christos zone->xfrfilenumber);
2123 1.1 christos VERBOSITY(3, (LOG_INFO,
2124 1.1 christos "xfrd: zone %s written received XFR packet from %s with serial %u to "
2125 1.1 christos "disk", zone->apex_str, zone->master->ip_address_spec,
2126 1.1 christos (int)zone->msg_new_serial));
2127 1.1 christos zone->msg_seq_nr++;
2128 1.1 christos
2129 1.1 christos xfrfile_size = xfrd_get_xfrfile_size(xfrd->nsd, zone->xfrfilenumber);
2130 1.1 christos if( zone->zone_options->pattern->size_limit_xfr != 0 &&
2131 1.1 christos xfrfile_size > zone->zone_options->pattern->size_limit_xfr ) {
2132 1.1 christos /* xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2133 1.1 christos xfrd_set_reload_timeout(); */
2134 1.1 christos log_msg(LOG_INFO, "xfrd : transferred zone data was too large %llu", (long long unsigned)xfrfile_size);
2135 1.1 christos return xfrd_packet_bad;
2136 1.1 christos }
2137 1.1 christos if(res == xfrd_packet_more) {
2138 1.1 christos /* wait for more */
2139 1.1 christos return xfrd_packet_more;
2140 1.1 christos }
2141 1.1 christos
2142 1.1 christos /* done. we are completely sure of this */
2143 1.1 christos buffer_clear(packet);
2144 1.1 christos buffer_printf(packet, "received update to serial %u at %s from %s",
2145 1.1 christos (unsigned)zone->msg_new_serial, xfrd_pretty_time(xfrd_time()),
2146 1.1 christos zone->master->ip_address_spec);
2147 1.1 christos if(zone->master->key_options) {
2148 1.1 christos buffer_printf(packet, " TSIG verified with key %s",
2149 1.1 christos zone->master->key_options->name);
2150 1.1 christos }
2151 1.1 christos buffer_flip(packet);
2152 1.1 christos diff_write_commit(zone->apex_str, zone->msg_old_serial,
2153 1.1 christos zone->msg_new_serial, zone->msg_seq_nr, 1,
2154 1.1 christos (char*)buffer_begin(packet), xfrd->nsd, zone->xfrfilenumber);
2155 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s committed \"%s\"",
2156 1.1 christos zone->apex_str, (char*)buffer_begin(packet)));
2157 1.1 christos /* reset msg seq nr, so if that is nonnull we know xfr file exists */
2158 1.1 christos zone->msg_seq_nr = 0;
2159 1.1 christos /* now put apply_xfr task on the tasklist */
2160 1.1 christos if(!task_new_apply_xfr(xfrd->nsd->task[xfrd->nsd->mytask],
2161 1.1 christos xfrd->last_task, zone->apex, zone->msg_old_serial,
2162 1.1 christos zone->msg_new_serial, zone->xfrfilenumber)) {
2163 1.1 christos /* delete the file and pretend transfer was bad to continue */
2164 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2165 1.1 christos xfrd_set_reload_timeout();
2166 1.1 christos return xfrd_packet_bad;
2167 1.1 christos }
2168 1.1 christos /* update the disk serial no. */
2169 1.1 christos zone->soa_disk_acquired = xfrd_time();
2170 1.1 christos zone->soa_disk = soa;
2171 1.1 christos if(zone->soa_notified_acquired && (
2172 1.1 christos zone->soa_notified.serial == 0 ||
2173 1.1 christos compare_serial(htonl(zone->soa_disk.serial),
2174 1.1 christos htonl(zone->soa_notified.serial)) >= 0))
2175 1.1 christos {
2176 1.1 christos zone->soa_notified_acquired = 0;
2177 1.1 christos }
2178 1.1 christos if(!zone->soa_notified_acquired) {
2179 1.1 christos /* do not set expired zone to ok:
2180 1.1 christos * it would cause nsd to start answering
2181 1.1 christos * bad data, since the zone is not loaded yet.
2182 1.1 christos * if nsd does not reload < retry time, more
2183 1.1 christos * queries (for even newer versions) are made.
2184 1.1 christos * For expired zone after reload it is set ok (SOAINFO ipc). */
2185 1.1 christos if(zone->state != xfrd_zone_expired)
2186 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
2187 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2188 1.1 christos "xfrd: zone %s is waiting for reload",
2189 1.1 christos zone->apex_str));
2190 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
2191 1.1 christos zone->multi_master_update_check = zone->master_num;
2192 1.1 christos xfrd_set_reload_timeout();
2193 1.1 christos return xfrd_packet_transfer;
2194 1.1 christos }
2195 1.1 christos zone->round_num = -1; /* next try start anew */
2196 1.1 christos xfrd_set_timer_refresh(zone);
2197 1.1 christos xfrd_set_reload_timeout();
2198 1.1 christos return xfrd_packet_transfer;
2199 1.1 christos } else {
2200 1.1 christos /* try to get an even newer serial */
2201 1.1 christos /* pretend it was bad to continue queries */
2202 1.1 christos xfrd_set_reload_timeout();
2203 1.1 christos return xfrd_packet_bad;
2204 1.1 christos }
2205 1.1 christos }
2206 1.1 christos
2207 1.1 christos static void
2208 1.1 christos xfrd_set_reload_timeout()
2209 1.1 christos {
2210 1.1 christos if(xfrd->nsd->options->xfrd_reload_timeout == -1)
2211 1.1 christos return; /* automatic reload disabled. */
2212 1.1 christos if(xfrd->reload_timeout.tv_sec == 0 ||
2213 1.1 christos xfrd_time() >= (time_t)xfrd->reload_timeout.tv_sec ) {
2214 1.1 christos /* no reload wait period (or it passed), do it right away */
2215 1.1 christos xfrd_set_reload_now(xfrd);
2216 1.1 christos /* start reload wait period */
2217 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2218 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2219 1.1 christos xfrd->reload_timeout.tv_usec = 0;
2220 1.1 christos return;
2221 1.1 christos }
2222 1.1 christos /* cannot reload now, set that after the timeout a reload has to happen */
2223 1.1 christos if(xfrd->reload_added == 0) {
2224 1.1 christos struct timeval tv;
2225 1.1 christos tv.tv_sec = xfrd->reload_timeout.tv_sec - xfrd_time();
2226 1.1 christos tv.tv_usec = 0;
2227 1.1 christos if(tv.tv_sec > xfrd->nsd->options->xfrd_reload_timeout)
2228 1.1 christos tv.tv_sec = xfrd->nsd->options->xfrd_reload_timeout;
2229 1.1.1.5 christos memset(&xfrd->reload_handler, 0, sizeof(xfrd->reload_handler));
2230 1.1 christos event_set(&xfrd->reload_handler, -1, EV_TIMEOUT,
2231 1.1 christos xfrd_handle_reload, xfrd);
2232 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->reload_handler) != 0)
2233 1.1 christos log_msg(LOG_ERR, "cannot set reload event base");
2234 1.1 christos if(event_add(&xfrd->reload_handler, &tv) != 0)
2235 1.1 christos log_msg(LOG_ERR, "cannot add reload event");
2236 1.1 christos xfrd->reload_added = 1;
2237 1.1 christos }
2238 1.1 christos }
2239 1.1 christos
2240 1.1 christos static void
2241 1.1 christos xfrd_handle_reload(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2242 1.1 christos {
2243 1.1 christos /* reload timeout */
2244 1.1 christos assert(event & EV_TIMEOUT);
2245 1.1 christos (void)event;
2246 1.1 christos /* timeout wait period after this request is sent */
2247 1.1 christos xfrd->reload_added = 0;
2248 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2249 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2250 1.1 christos xfrd_set_reload_now(xfrd);
2251 1.1 christos }
2252 1.1 christos
2253 1.1 christos void
2254 1.1.1.2 christos xfrd_handle_notify_and_start_xfr(xfrd_zone_type* zone, xfrd_soa_type* soa)
2255 1.1 christos {
2256 1.1 christos if(xfrd_handle_incoming_notify(zone, soa)) {
2257 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1 &&
2258 1.1 christos !zone->tcp_waiting && !zone->udp_waiting) {
2259 1.1 christos xfrd_set_refresh_now(zone);
2260 1.1 christos }
2261 1.1 christos /* zones with no content start expbackoff again; this is also
2262 1.1 christos * for nsd-control started transfer commands, and also when
2263 1.1 christos * the master apparently sends notifies (is back up) */
2264 1.1 christos if(zone->soa_disk_acquired == 0)
2265 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
2266 1.1 christos }
2267 1.1 christos }
2268 1.1 christos
2269 1.1 christos void
2270 1.1 christos xfrd_handle_passed_packet(buffer_type* packet,
2271 1.1 christos int acl_num, int acl_num_xfr)
2272 1.1 christos {
2273 1.1 christos uint8_t qnamebuf[MAXDOMAINLEN];
2274 1.1 christos uint16_t qtype, qclass;
2275 1.1 christos const dname_type* dname;
2276 1.1 christos region_type* tempregion = region_create(xalloc, free);
2277 1.1.1.2 christos xfrd_zone_type* zone;
2278 1.1 christos
2279 1.1 christos buffer_skip(packet, QHEADERSZ);
2280 1.1 christos if(!packet_read_query_section(packet, qnamebuf, &qtype, &qclass)) {
2281 1.1 christos region_destroy(tempregion);
2282 1.1 christos return; /* drop bad packet */
2283 1.1 christos }
2284 1.1 christos
2285 1.1 christos dname = dname_make(tempregion, qnamebuf, 1);
2286 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: got passed packet for %s, acl "
2287 1.1 christos "%d", dname_to_string(dname,0), acl_num));
2288 1.1 christos
2289 1.1 christos /* find the zone */
2290 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, dname);
2291 1.1 christos if(!zone) {
2292 1.1 christos /* this could be because the zone has been deleted meanwhile */
2293 1.1 christos DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "xfrd: incoming packet for "
2294 1.1 christos "unknown zone %s", dname_to_string(dname,0)));
2295 1.1 christos region_destroy(tempregion);
2296 1.1 christos return; /* drop packet for unknown zone */
2297 1.1 christos }
2298 1.1 christos region_destroy(tempregion);
2299 1.1 christos
2300 1.1 christos /* handle */
2301 1.1 christos if(OPCODE(packet) == OPCODE_NOTIFY) {
2302 1.1.1.2 christos xfrd_soa_type soa;
2303 1.1 christos int have_soa = 0;
2304 1.1 christos int next;
2305 1.1 christos /* get serial from a SOA */
2306 1.1 christos if(ANCOUNT(packet) == 1 && packet_skip_dname(packet) &&
2307 1.1 christos xfrd_parse_soa_info(packet, &soa)) {
2308 1.1 christos have_soa = 1;
2309 1.1 christos }
2310 1.1 christos xfrd_handle_notify_and_start_xfr(zone, have_soa?&soa:NULL);
2311 1.1 christos /* First, see if our notifier has a match in provide-xfr */
2312 1.1 christos if (acl_find_num(zone->zone_options->pattern->request_xfr,
2313 1.1 christos acl_num_xfr))
2314 1.1 christos next = acl_num_xfr;
2315 1.1 christos else /* If not, find master that matches notifiers ACL entry */
2316 1.1 christos next = find_same_master_notify(zone, acl_num);
2317 1.1 christos if(next != -1) {
2318 1.1 christos zone->next_master = next;
2319 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2320 1.1 christos "xfrd: notify set next master to query %d",
2321 1.1 christos next));
2322 1.1 christos }
2323 1.1 christos }
2324 1.1 christos else {
2325 1.1 christos /* ignore other types of messages */
2326 1.1 christos }
2327 1.1 christos }
2328 1.1 christos
2329 1.1 christos static int
2330 1.1.1.2 christos xfrd_handle_incoming_notify(xfrd_zone_type* zone, xfrd_soa_type* soa)
2331 1.1 christos {
2332 1.1 christos if(soa && zone->soa_disk_acquired && zone->state != xfrd_zone_expired &&
2333 1.1 christos compare_serial(ntohl(soa->serial),ntohl(zone->soa_disk.serial)) <= 0)
2334 1.1 christos {
2335 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2336 1.1 christos "xfrd: ignored notify %s %u old serial, zone valid "
2337 1.1 christos "(soa disk serial %u)", zone->apex_str,
2338 1.1 christos (unsigned)ntohl(soa->serial),
2339 1.1 christos (unsigned)ntohl(zone->soa_disk.serial)));
2340 1.1 christos return 0; /* ignore notify with old serial, we have a valid zone */
2341 1.1 christos }
2342 1.1 christos if(soa == 0) {
2343 1.1 christos zone->soa_notified.serial = 0;
2344 1.1 christos }
2345 1.1 christos else if (zone->soa_notified_acquired == 0 ||
2346 1.1 christos zone->soa_notified.serial == 0 ||
2347 1.1 christos compare_serial(ntohl(soa->serial),
2348 1.1 christos ntohl(zone->soa_notified.serial)) > 0)
2349 1.1 christos {
2350 1.1 christos zone->soa_notified = *soa;
2351 1.1 christos }
2352 1.1 christos zone->soa_notified_acquired = xfrd_time();
2353 1.1 christos if(zone->state == xfrd_zone_ok) {
2354 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
2355 1.1 christos }
2356 1.1 christos /* transfer right away */
2357 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "Handle incoming notify for zone %s",
2358 1.1 christos zone->apex_str));
2359 1.1 christos return 1;
2360 1.1 christos }
2361 1.1 christos
2362 1.1 christos static int
2363 1.1.1.2 christos find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy)
2364 1.1 christos {
2365 1.1.1.2 christos struct acl_options* nfy_acl = acl_find_num(zone->zone_options->pattern->
2366 1.1 christos allow_notify, acl_num_nfy);
2367 1.1 christos int num = 0;
2368 1.1.1.2 christos struct acl_options* master = zone->zone_options->pattern->request_xfr;
2369 1.1 christos if(!nfy_acl)
2370 1.1 christos return -1;
2371 1.1 christos while(master)
2372 1.1 christos {
2373 1.1 christos if(acl_addr_matches_host(nfy_acl, master))
2374 1.1 christos return num;
2375 1.1 christos master = master->next;
2376 1.1 christos num++;
2377 1.1 christos }
2378 1.1 christos return -1;
2379 1.1 christos }
2380 1.1 christos
2381 1.1 christos void
2382 1.1 christos xfrd_check_failed_updates()
2383 1.1 christos {
2384 1.1 christos /* see if updates have not come through */
2385 1.1.1.2 christos xfrd_zone_type* zone;
2386 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2387 1.1 christos {
2388 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2389 1.1 christos if(zone->soa_disk_acquired != 0 &&
2390 1.1 christos (zone->soa_nsd_acquired == 0 ||
2391 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2392 1.1 christos {
2393 1.1 christos if(zone->soa_disk_acquired <
2394 1.1 christos xfrd->reload_cmd_last_sent)
2395 1.1 christos {
2396 1.1 christos /* this zone should have been loaded, since its disk
2397 1.1 christos soa time is before the time of the reload cmd. */
2398 1.1.1.2 christos xfrd_soa_type dumped_soa = zone->soa_disk;
2399 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: soa serial %u "
2400 1.1 christos "update failed, restarting "
2401 1.1 christos "transfer (notified zone)",
2402 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_disk.serial));
2403 1.1 christos /* revert the soa; it has not been acquired properly */
2404 1.1 christos if(zone->soa_disk_acquired == zone->soa_nsd_acquired) {
2405 1.1 christos /* this was the same as served,
2406 1.1 christos * perform force_axfr , re-download
2407 1.1 christos * same serial from master */
2408 1.1 christos zone->soa_disk_acquired = 0;
2409 1.1 christos zone->soa_nsd_acquired = 0;
2410 1.1 christos } else {
2411 1.1 christos /* revert soa to the one in server */
2412 1.1 christos zone->soa_disk_acquired = zone->soa_nsd_acquired;
2413 1.1 christos zone->soa_disk = zone->soa_nsd;
2414 1.1 christos }
2415 1.1 christos /* pretend we are notified with disk soa.
2416 1.1 christos This will cause a refetch of the data, and reload. */
2417 1.1 christos xfrd_handle_incoming_notify(zone, &dumped_soa);
2418 1.1 christos xfrd_set_timer_refresh(zone);
2419 1.1 christos } else if(zone->soa_disk_acquired >= xfrd->reload_cmd_last_sent) {
2420 1.1 christos /* this zone still has to be loaded,
2421 1.1 christos make sure reload is set to be sent. */
2422 1.1 christos if(xfrd->need_to_send_reload == 0 &&
2423 1.1 christos xfrd->reload_added == 0) {
2424 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: needs "
2425 1.1 christos "to be loaded. reload lost? "
2426 1.1 christos "try again", zone->apex_str);
2427 1.1 christos xfrd_set_reload_timeout();
2428 1.1 christos }
2429 1.1 christos }
2430 1.1 christos }
2431 1.1 christos }
2432 1.1 christos }
2433 1.1 christos
2434 1.1 christos void
2435 1.1 christos xfrd_prepare_zones_for_reload()
2436 1.1 christos {
2437 1.1.1.2 christos xfrd_zone_type* zone;
2438 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2439 1.1 christos {
2440 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2441 1.1 christos if(zone->soa_disk_acquired != 0 &&
2442 1.1 christos (zone->soa_nsd_acquired == 0 ||
2443 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2444 1.1 christos {
2445 1.1 christos if(zone->soa_disk_acquired == xfrd_time()) {
2446 1.1 christos /* antedate by one second.
2447 1.1 christos * this makes sure that the zone time is before
2448 1.1 christos * reload, so that check_failed_zones() is
2449 1.1 christos * certain of the result.
2450 1.1 christos */
2451 1.1 christos zone->soa_disk_acquired--;
2452 1.1 christos }
2453 1.1 christos }
2454 1.1 christos }
2455 1.1 christos }
2456 1.1 christos
2457 1.1 christos struct buffer*
2458 1.1 christos xfrd_get_temp_buffer()
2459 1.1 christos {
2460 1.1 christos return xfrd->packet;
2461 1.1 christos }
2462 1.1 christos
2463 1.1 christos #ifdef BIND8_STATS
2464 1.1 christos /** process stat info task */
2465 1.1 christos static void
2466 1.1.1.2 christos xfrd_process_stat_info_task(xfrd_state_type* xfrd, struct task_list_d* task)
2467 1.1 christos {
2468 1.1 christos size_t i;
2469 1.1.1.2 christos stc_type* p = (void*)task->zname + sizeof(struct nsdst);
2470 1.1 christos stats_add(&xfrd->nsd->st, (struct nsdst*)task->zname);
2471 1.1 christos for(i=0; i<xfrd->nsd->child_count; i++) {
2472 1.1 christos xfrd->nsd->children[i].query_count += *p++;
2473 1.1 christos }
2474 1.1 christos /* got total, now see if users are interested in these statistics */
2475 1.1 christos #ifdef HAVE_SSL
2476 1.1 christos daemon_remote_process_stats(xfrd->nsd->rc);
2477 1.1 christos #endif
2478 1.1 christos }
2479 1.1 christos #endif /* BIND8_STATS */
2480 1.1 christos
2481 1.1 christos #ifdef USE_ZONE_STATS
2482 1.1 christos /** process zonestat inc task */
2483 1.1 christos static void
2484 1.1.1.2 christos xfrd_process_zonestat_inc_task(xfrd_state_type* xfrd, struct task_list_d* task)
2485 1.1 christos {
2486 1.1 christos xfrd->zonestat_safe = (unsigned)task->oldserial;
2487 1.1 christos zonestat_remap(xfrd->nsd, 0, xfrd->zonestat_safe*sizeof(struct nsdst));
2488 1.1 christos xfrd->nsd->zonestatsize[0] = xfrd->zonestat_safe;
2489 1.1 christos zonestat_remap(xfrd->nsd, 1, xfrd->zonestat_safe*sizeof(struct nsdst));
2490 1.1 christos xfrd->nsd->zonestatsize[1] = xfrd->zonestat_safe;
2491 1.1 christos }
2492 1.1 christos #endif /* USE_ZONE_STATS */
2493 1.1 christos
2494 1.1 christos static void
2495 1.1.1.2 christos xfrd_handle_taskresult(xfrd_state_type* xfrd, struct task_list_d* task)
2496 1.1 christos {
2497 1.1 christos #ifndef BIND8_STATS
2498 1.1 christos (void)xfrd;
2499 1.1 christos #endif
2500 1.1 christos switch(task->task_type) {
2501 1.1 christos case task_soa_info:
2502 1.1 christos xfrd_process_soa_info_task(task);
2503 1.1 christos break;
2504 1.1 christos #ifdef BIND8_STATS
2505 1.1 christos case task_stat_info:
2506 1.1 christos xfrd_process_stat_info_task(xfrd, task);
2507 1.1 christos break;
2508 1.1 christos #endif /* BIND8_STATS */
2509 1.1 christos #ifdef USE_ZONE_STATS
2510 1.1 christos case task_zonestat_inc:
2511 1.1 christos xfrd_process_zonestat_inc_task(xfrd, task);
2512 1.1 christos break;
2513 1.1 christos #endif
2514 1.1 christos default:
2515 1.1 christos log_msg(LOG_WARNING, "unhandled task result in xfrd from "
2516 1.1 christos "reload type %d", (int)task->task_type);
2517 1.1 christos }
2518 1.1 christos }
2519 1.1 christos
2520 1.1.1.2 christos void xfrd_process_task_result(xfrd_state_type* xfrd, struct udb_base* taskudb)
2521 1.1 christos {
2522 1.1 christos udb_ptr t;
2523 1.1 christos /* remap it for usage */
2524 1.1 christos task_remap(taskudb);
2525 1.1 christos /* process the task-results in the taskudb */
2526 1.1 christos udb_ptr_new(&t, taskudb, udb_base_get_userdata(taskudb));
2527 1.1 christos while(!udb_ptr_is_null(&t)) {
2528 1.1 christos xfrd_handle_taskresult(xfrd, TASKLIST(&t));
2529 1.1 christos udb_ptr_set_rptr(&t, taskudb, &TASKLIST(&t)->next);
2530 1.1 christos }
2531 1.1 christos udb_ptr_unlink(&t, taskudb);
2532 1.1 christos /* clear the udb so it can be used by xfrd to make new tasks for
2533 1.1 christos * reload, this happens when the reload signal is sent, and thus
2534 1.1 christos * the taskudbs are swapped */
2535 1.1 christos task_clear(taskudb);
2536 1.1.1.3 christos #ifdef HAVE_SYSTEMD
2537 1.1.1.4 prlw1 sd_notify(0, "READY=1");
2538 1.1.1.3 christos #endif
2539 1.1 christos }
2540 1.1 christos
2541 1.1.1.2 christos void xfrd_set_reload_now(xfrd_state_type* xfrd)
2542 1.1 christos {
2543 1.1.1.3 christos #ifdef HAVE_SYSTEMD
2544 1.1.1.4 prlw1 sd_notify(0, "RELOADING=1");
2545 1.1.1.3 christos #endif
2546 1.1 christos xfrd->need_to_send_reload = 1;
2547 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
2548 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
2549 1.1 christos }
2550 1.1 christos }
2551 1.1 christos
2552 1.1 christos static void
2553 1.1 christos xfrd_handle_write_timer(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2554 1.1 christos {
2555 1.1 christos /* timeout for write events */
2556 1.1 christos assert(event & EV_TIMEOUT);
2557 1.1 christos (void)event;
2558 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2559 1.1 christos return;
2560 1.1 christos /* call reload to write changed zonefiles */
2561 1.1 christos if(!xfrd->write_zonefile_needed) {
2562 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "zonefiles write timer (nothing)"));
2563 1.1 christos xfrd_write_timer_set();
2564 1.1 christos return;
2565 1.1 christos }
2566 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "zonefiles write timer"));
2567 1.1 christos task_new_write_zonefiles(xfrd->nsd->task[xfrd->nsd->mytask],
2568 1.1 christos xfrd->last_task, NULL);
2569 1.1 christos xfrd_set_reload_now(xfrd);
2570 1.1 christos xfrd->write_zonefile_needed = 0;
2571 1.1 christos xfrd_write_timer_set();
2572 1.1 christos }
2573 1.1 christos
2574 1.1 christos static void xfrd_write_timer_set()
2575 1.1 christos {
2576 1.1 christos struct timeval tv;
2577 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2578 1.1 christos return;
2579 1.1 christos tv.tv_sec = xfrd->nsd->options->zonefiles_write;
2580 1.1 christos tv.tv_usec = 0;
2581 1.1.1.5 christos memset(&xfrd->write_timer, 0, sizeof(xfrd->write_timer));
2582 1.1 christos event_set(&xfrd->write_timer, -1, EV_TIMEOUT,
2583 1.1 christos xfrd_handle_write_timer, xfrd);
2584 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->write_timer) != 0)
2585 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_base_set failed");
2586 1.1 christos if(event_add(&xfrd->write_timer, &tv) != 0)
2587 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_add failed");
2588 1.1 christos }
2589 1.1 christos
2590 1.1 christos static void xfrd_handle_child_timer(int ATTR_UNUSED(fd), short event,
2591 1.1 christos void* ATTR_UNUSED(arg))
2592 1.1 christos {
2593 1.1 christos assert(event & EV_TIMEOUT);
2594 1.1 christos (void)event;
2595 1.1 christos /* only used to wakeup the process to reap children, note the
2596 1.1 christos * event is no longer registered */
2597 1.1 christos xfrd->child_timer_added = 0;
2598 1.1 christos }
2599