xfrd.c revision 1.1.1.6 1 /*
2 * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates.
3 *
4 * Copyright (c) 2001-2006, NLnet Labs. All rights reserved.
5 *
6 * See LICENSE for the license.
7 *
8 */
9
10 #include "config.h"
11 #include <assert.h>
12 #include <string.h>
13 #include <unistd.h>
14 #include <stdlib.h>
15 #include <errno.h>
16 #include <sys/types.h>
17 #include <sys/wait.h>
18 #include "xfrd.h"
19 #include "xfrd-tcp.h"
20 #include "xfrd-disk.h"
21 #include "xfrd-notify.h"
22 #include "options.h"
23 #include "util.h"
24 #include "netio.h"
25 #include "region-allocator.h"
26 #include "nsd.h"
27 #include "packet.h"
28 #include "rdata.h"
29 #include "difffile.h"
30 #include "ipc.h"
31 #include "remote.h"
32 #include "rrl.h"
33 #ifdef USE_DNSTAP
34 #include "dnstap/dnstap_collector.h"
35 #endif
36
37 #ifdef HAVE_SYSTEMD
38 #include <systemd/sd-daemon.h>
39 #endif
40
41 #define XFRD_UDP_TIMEOUT 10 /* seconds, before a udp request times out */
42 #define XFRD_NO_IXFR_CACHE 172800 /* 48h before retrying ixfr's after notimpl */
43 #define XFRD_MAX_ROUNDS 1 /* max number of rounds along the masters */
44 #define XFRD_TSIG_MAX_UNSIGNED 103 /* max number of packets without tsig in a tcp stream. */
45 /* rfc recommends 100, +3 for offbyone errors/interoperability. */
46 #define XFRD_CHILD_REAP_TIMEOUT 60 /* seconds to wakeup and reap lost children */
47 /* these are reload processes that SIGCHILDed but the signal
48 * was lost, and need waitpid to remove their process entry. */
49
50 /* the daemon state */
51 xfrd_state_type* xfrd = 0;
52
53 /* main xfrd loop */
54 static void xfrd_main(void);
55 /* shut down xfrd, close sockets. */
56 static void xfrd_shutdown(void);
57 /* delete pending task xfr files in tmp */
58 static void xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u);
59 /* create zone rbtree at start */
60 static void xfrd_init_zones(void);
61 /* initial handshake with SOAINFO from main and send expire to main */
62 static void xfrd_receive_soa(int socket, int shortsoa);
63
64 /* handle incoming notification message. soa can be NULL. true if transfer needed. */
65 static int xfrd_handle_incoming_notify(xfrd_zone_type* zone,
66 xfrd_soa_type* soa);
67
68 /* call with buffer just after the soa dname. returns 0 on error. */
69 static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa);
70 /* set the zone state to a new state (takes care of expiry messages) */
71 static void xfrd_set_zone_state(xfrd_zone_type* zone,
72 enum xfrd_zone_state new_zone_state);
73 /* set timer for retry amount (depends on zone_state) */
74 static void xfrd_set_timer_retry(xfrd_zone_type* zone);
75 /* set timer for refresh timeout (depends on zone_state) */
76 static void xfrd_set_timer_refresh(xfrd_zone_type* zone);
77
78 /* set reload timeout */
79 static void xfrd_set_reload_timeout(void);
80 /* handle reload timeout */
81 static void xfrd_handle_reload(int fd, short event, void* arg);
82 /* handle child timeout */
83 static void xfrd_handle_child_timer(int fd, short event, void* arg);
84
85 /* send ixfr request, returns fd of connection to read on */
86 static int xfrd_send_ixfr_request_udp(xfrd_zone_type* zone);
87 /* obtain udp socket slot */
88 static void xfrd_udp_obtain(xfrd_zone_type* zone);
89
90 /* read data via udp */
91 static void xfrd_udp_read(xfrd_zone_type* zone);
92
93 /* find master by notify number */
94 static int find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy);
95
96 /* set the write timer to activate */
97 static void xfrd_write_timer_set(void);
98
99 static void
100 xfrd_signal_callback(int sig, short event, void* ATTR_UNUSED(arg))
101 {
102 if(!(event & EV_SIGNAL))
103 return;
104 sig_handler(sig);
105 }
106
107 static struct event* xfrd_sig_evs[10];
108 static int xfrd_sig_num = 0;
109
110 static void
111 xfrd_sigsetup(int sig)
112 {
113 struct event *ev = xalloc_zero(sizeof(*ev));
114 assert(xfrd_sig_num <= (int)(sizeof(xfrd_sig_evs)/sizeof(ev)));
115 xfrd_sig_evs[xfrd_sig_num++] = ev;
116 signal_set(ev, sig, xfrd_signal_callback, NULL);
117 if(event_base_set(xfrd->event_base, ev) != 0) {
118 log_msg(LOG_ERR, "xfrd sig handler: event_base_set failed");
119 }
120 if(signal_add(ev, NULL) != 0) {
121 log_msg(LOG_ERR, "xfrd sig handler: signal_add failed");
122 }
123 }
124
125 void
126 xfrd_init(int socket, struct nsd* nsd, int shortsoa, int reload_active,
127 pid_t nsd_pid)
128 {
129 region_type* region;
130
131 assert(xfrd == 0);
132 /* to setup signalhandling */
133 nsd->server_kind = NSD_SERVER_MAIN;
134
135 region = region_create_custom(xalloc, free, DEFAULT_CHUNK_SIZE,
136 DEFAULT_LARGE_OBJECT_SIZE, DEFAULT_INITIAL_CLEANUP_SIZE, 1);
137 xfrd = (xfrd_state_type*)region_alloc(region, sizeof(xfrd_state_type));
138 memset(xfrd, 0, sizeof(xfrd_state_type));
139 xfrd->region = region;
140 xfrd->xfrd_start_time = time(0);
141 xfrd->event_base = nsd_child_event_base();
142 if(!xfrd->event_base) {
143 log_msg(LOG_ERR, "xfrd: cannot create event base");
144 exit(1);
145 }
146 xfrd->nsd = nsd;
147 xfrd->packet = buffer_create(xfrd->region, QIOBUFSZ);
148 xfrd->udp_waiting_first = NULL;
149 xfrd->udp_waiting_last = NULL;
150 xfrd->udp_use_num = 0;
151 xfrd->got_time = 0;
152 xfrd->xfrfilenumber = 0;
153 #ifdef USE_ZONE_STATS
154 xfrd->zonestat_safe = nsd->zonestatdesired;
155 #endif
156 xfrd->activated_first = NULL;
157 xfrd->ipc_pass = buffer_create(xfrd->region, QIOBUFSZ);
158 xfrd->last_task = region_alloc(xfrd->region, sizeof(*xfrd->last_task));
159 udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
160 assert(shortsoa || udb_base_get_userdata(xfrd->nsd->task[xfrd->nsd->mytask])->data == 0);
161
162 xfrd->reload_handler.ev_fd = -1;
163 xfrd->reload_added = 0;
164 xfrd->reload_timeout.tv_sec = 0;
165 xfrd->reload_cmd_last_sent = xfrd->xfrd_start_time;
166 xfrd->can_send_reload = !reload_active;
167 xfrd->reload_pid = nsd_pid;
168 xfrd->child_timer_added = 0;
169
170 xfrd->ipc_send_blocked = 0;
171 memset(&xfrd->ipc_handler, 0, sizeof(xfrd->ipc_handler));
172 event_set(&xfrd->ipc_handler, socket, EV_PERSIST|EV_READ,
173 xfrd_handle_ipc, xfrd);
174 if(event_base_set(xfrd->event_base, &xfrd->ipc_handler) != 0)
175 log_msg(LOG_ERR, "xfrd ipc handler: event_base_set failed");
176 if(event_add(&xfrd->ipc_handler, NULL) != 0)
177 log_msg(LOG_ERR, "xfrd ipc handler: event_add failed");
178 xfrd->ipc_handler_flags = EV_PERSIST|EV_READ;
179 xfrd->ipc_conn = xfrd_tcp_create(xfrd->region, QIOBUFSZ);
180 /* not reading using ipc_conn yet */
181 xfrd->ipc_conn->is_reading = 0;
182 xfrd->ipc_conn->fd = socket;
183 xfrd->need_to_send_reload = 0;
184 xfrd->need_to_send_shutdown = 0;
185 xfrd->need_to_send_stats = 0;
186
187 xfrd->write_zonefile_needed = 0;
188 if(nsd->options->zonefiles_write)
189 xfrd_write_timer_set();
190
191 xfrd->notify_waiting_first = NULL;
192 xfrd->notify_waiting_last = NULL;
193 xfrd->notify_udp_num = 0;
194
195 #ifdef HAVE_SSL
196 daemon_remote_attach(xfrd->nsd->rc, xfrd);
197 #endif
198
199 xfrd->tcp_set = xfrd_tcp_set_create(xfrd->region);
200 xfrd->tcp_set->tcp_timeout = nsd->tcp_timeout;
201 #if !defined(HAVE_ARC4RANDOM) && !defined(HAVE_GETRANDOM)
202 srandom((unsigned long) getpid() * (unsigned long) time(NULL));
203 #endif
204
205 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd pre-startup"));
206 xfrd_init_zones();
207 xfrd_receive_soa(socket, shortsoa);
208 if(nsd->options->xfrdfile != NULL && nsd->options->xfrdfile[0]!=0)
209 xfrd_read_state(xfrd);
210
211 /* did we get killed before startup was successful? */
212 if(nsd->signal_hint_shutdown) {
213 kill(nsd_pid, SIGTERM);
214 xfrd_shutdown();
215 return;
216 }
217
218 /* init libevent signals now, so that in the previous init scripts
219 * the normal sighandler is called, and can set nsd->signal_hint..
220 * these are also looked at in sig_process before we run the main loop*/
221 xfrd_sigsetup(SIGHUP);
222 xfrd_sigsetup(SIGTERM);
223 xfrd_sigsetup(SIGQUIT);
224 xfrd_sigsetup(SIGCHLD);
225 xfrd_sigsetup(SIGALRM);
226 xfrd_sigsetup(SIGILL);
227 xfrd_sigsetup(SIGUSR1);
228 xfrd_sigsetup(SIGINT);
229
230 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd startup"));
231 #ifdef HAVE_SYSTEMD
232 sd_notify(0, "READY=1");
233 #endif
234 xfrd_main();
235 }
236
237 static void
238 xfrd_process_activated(void)
239 {
240 xfrd_zone_type* zone;
241 while((zone = xfrd->activated_first)) {
242 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s activation",
243 zone->apex_str));
244 /* pop zone from activated list */
245 xfrd->activated_first = zone->activated_next;
246 if(zone->activated_next)
247 zone->activated_next->activated_prev = NULL;
248 zone->is_activated = 0;
249 /* run it : no events, specifically not the TIMEOUT event,
250 * so that running zone transfers are not interrupted */
251 xfrd_handle_zone(zone->zone_handler.ev_fd, 0, zone);
252 }
253 }
254
255 static void
256 xfrd_sig_process(void)
257 {
258 int status;
259 pid_t child_pid;
260
261 if(xfrd->nsd->signal_hint_quit || xfrd->nsd->signal_hint_shutdown) {
262 xfrd->nsd->signal_hint_quit = 0;
263 xfrd->nsd->signal_hint_shutdown = 0;
264 xfrd->need_to_send_shutdown = 1;
265 if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
266 ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
267 }
268 } else if(xfrd->nsd->signal_hint_reload_hup) {
269 log_msg(LOG_WARNING, "SIGHUP received, reloading...");
270 xfrd->nsd->signal_hint_reload_hup = 0;
271 if(xfrd->nsd->options->zonefiles_check) {
272 task_new_check_zonefiles(xfrd->nsd->task[
273 xfrd->nsd->mytask], xfrd->last_task, NULL);
274 }
275 xfrd_set_reload_now(xfrd);
276 } else if(xfrd->nsd->signal_hint_statsusr) {
277 xfrd->nsd->signal_hint_statsusr = 0;
278 xfrd->need_to_send_stats = 1;
279 if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
280 ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
281 }
282 }
283
284 /* collect children that exited. */
285 xfrd->nsd->signal_hint_child = 0;
286 while((child_pid = waitpid(-1, &status, WNOHANG)) != -1 && child_pid != 0) {
287 if(status != 0) {
288 log_msg(LOG_ERR, "process %d exited with status %d",
289 (int)child_pid, status);
290 }
291 }
292 if(!xfrd->child_timer_added) {
293 struct timeval tv;
294 tv.tv_sec = XFRD_CHILD_REAP_TIMEOUT;
295 tv.tv_usec = 0;
296 memset(&xfrd->child_timer, 0, sizeof(xfrd->child_timer));
297 event_set(&xfrd->child_timer, -1, EV_TIMEOUT,
298 xfrd_handle_child_timer, xfrd);
299 if(event_base_set(xfrd->event_base, &xfrd->child_timer) != 0)
300 log_msg(LOG_ERR, "xfrd child timer: event_base_set failed");
301 if(event_add(&xfrd->child_timer, &tv) != 0)
302 log_msg(LOG_ERR, "xfrd child timer: event_add failed");
303 xfrd->child_timer_added = 1;
304 }
305 }
306
307 static void
308 xfrd_main(void)
309 {
310 /* we may have signals from the startup period, process them */
311 xfrd_sig_process();
312 xfrd->shutdown = 0;
313 while(!xfrd->shutdown)
314 {
315 /* process activated zones before blocking in select again */
316 xfrd_process_activated();
317 /* dispatch may block for a longer period, so current is gone */
318 xfrd->got_time = 0;
319 if(event_base_loop(xfrd->event_base, EVLOOP_ONCE) == -1) {
320 if (errno != EINTR) {
321 log_msg(LOG_ERR,
322 "xfrd dispatch failed: %s",
323 strerror(errno));
324 }
325 }
326 xfrd_sig_process();
327 }
328 xfrd_shutdown();
329 }
330
331 static void
332 xfrd_shutdown()
333 {
334 xfrd_zone_type* zone;
335
336 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown"));
337 #ifdef HAVE_SYSTEMD
338 sd_notify(0, "STOPPING=1");
339 #endif
340 event_del(&xfrd->ipc_handler);
341 close(xfrd->ipc_handler.ev_fd); /* notifies parent we stop */
342 zone_list_close(nsd.options);
343 if(xfrd->nsd->options->xfrdfile != NULL && xfrd->nsd->options->xfrdfile[0]!=0)
344 xfrd_write_state(xfrd);
345 if(xfrd->reload_added) {
346 event_del(&xfrd->reload_handler);
347 xfrd->reload_added = 0;
348 }
349 if(xfrd->child_timer_added) {
350 event_del(&xfrd->child_timer);
351 xfrd->child_timer_added = 0;
352 }
353 if(xfrd->nsd->options->zonefiles_write) {
354 event_del(&xfrd->write_timer);
355 }
356 #ifdef HAVE_SSL
357 daemon_remote_close(xfrd->nsd->rc); /* close sockets of rc */
358 #endif
359 /* close sockets */
360 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
361 {
362 if(zone->event_added) {
363 event_del(&zone->zone_handler);
364 if(zone->zone_handler.ev_fd != -1) {
365 close(zone->zone_handler.ev_fd);
366 zone->zone_handler.ev_fd = -1;
367 }
368 zone->event_added = 0;
369 }
370 }
371 close_notify_fds(xfrd->notify_zones);
372
373 /* wait for server parent (if necessary) */
374 if(xfrd->reload_pid != -1) {
375 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd wait for servermain %d",
376 (int)xfrd->reload_pid));
377 while(1) {
378 if(waitpid(xfrd->reload_pid, NULL, 0) == -1) {
379 if(errno == EINTR) continue;
380 if(errno == ECHILD) break;
381 log_msg(LOG_ERR, "xfrd: waitpid(%d): %s",
382 (int)xfrd->reload_pid, strerror(errno));
383 }
384 break;
385 }
386 }
387
388 /* if we are killed past this point this is not a problem,
389 * some files left in /tmp are cleaned by the OS, but it is neater
390 * to clean them out */
391
392 /* unlink xfr files for running transfers */
393 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
394 {
395 if(zone->msg_seq_nr)
396 xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
397 }
398 /* unlink xfr files in not-yet-done task file */
399 xfrd_clean_pending_tasks(xfrd->nsd, xfrd->nsd->task[xfrd->nsd->mytask]);
400 xfrd_del_tempdir(xfrd->nsd);
401 #ifdef HAVE_SSL
402 daemon_remote_delete(xfrd->nsd->rc); /* ssl-delete secret keys */
403 if (xfrd->nsd->tls_ctx)
404 SSL_CTX_free(xfrd->nsd->tls_ctx);
405 #endif
406 #ifdef USE_DNSTAP
407 dt_collector_close(nsd.dt_collector, &nsd);
408 #endif
409
410 /* process-exit cleans up memory used by xfrd process */
411 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown complete"));
412 #ifdef MEMCLEAN /* OS collects memory pages */
413 if(xfrd->zones) {
414 xfrd_zone_type* z;
415 RBTREE_FOR(z, xfrd_zone_type*, xfrd->zones) {
416 tsig_delete_record(&z->tsig, NULL);
417 }
418 }
419 if(xfrd->notify_zones) {
420 struct notify_zone* n;
421 RBTREE_FOR(n, struct notify_zone*, xfrd->notify_zones) {
422 tsig_delete_record(&n->notify_tsig, NULL);
423 }
424 }
425 if(xfrd_sig_num > 0) {
426 int i;
427 for(i=0; i<xfrd_sig_num; i++) {
428 signal_del(xfrd_sig_evs[i]);
429 free(xfrd_sig_evs[i]);
430 }
431 }
432 #ifdef RATELIMIT
433 rrl_mmap_deinit();
434 #endif
435 #ifdef USE_DNSTAP
436 dt_collector_destroy(nsd.dt_collector, &nsd);
437 #endif
438 udb_base_free(nsd.task[0]);
439 udb_base_free(nsd.task[1]);
440 event_base_free(xfrd->event_base);
441 region_destroy(xfrd->region);
442 nsd_options_destroy(nsd.options);
443 region_destroy(nsd.region);
444 log_finalize();
445 #endif
446
447 exit(0);
448 }
449
450 static void
451 xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u)
452 {
453 udb_ptr t;
454 udb_ptr_new(&t, u, udb_base_get_userdata(u));
455 /* no dealloc of entries, we delete the entire file when done */
456 while(!udb_ptr_is_null(&t)) {
457 if(TASKLIST(&t)->task_type == task_apply_xfr) {
458 xfrd_unlink_xfrfile(nsd, TASKLIST(&t)->yesno);
459 }
460 udb_ptr_set_rptr(&t, u, &TASKLIST(&t)->next);
461 }
462 udb_ptr_unlink(&t, u);
463 }
464
465 void
466 xfrd_init_slave_zone(xfrd_state_type* xfrd, struct zone_options* zone_opt)
467 {
468 xfrd_zone_type *xzone;
469 xzone = (xfrd_zone_type*)region_alloc(xfrd->region,
470 sizeof(xfrd_zone_type));
471 memset(xzone, 0, sizeof(xfrd_zone_type));
472 xzone->apex = zone_opt->node.key;
473 xzone->apex_str = zone_opt->name;
474 xzone->state = xfrd_zone_refreshing;
475 xzone->zone_options = zone_opt;
476 /* first retry will use first master */
477 xzone->master = xzone->zone_options->pattern->request_xfr;
478 xzone->master_num = 0;
479 xzone->next_master = 0;
480 xzone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
481
482 xzone->soa_nsd_acquired = 0;
483 xzone->soa_disk_acquired = 0;
484 xzone->soa_notified_acquired = 0;
485 /* [0]=1, [1]=0; "." domain name */
486 xzone->soa_nsd.prim_ns[0] = 1;
487 xzone->soa_nsd.email[0] = 1;
488 xzone->soa_disk.prim_ns[0]=1;
489 xzone->soa_disk.email[0]=1;
490 xzone->soa_notified.prim_ns[0]=1;
491 xzone->soa_notified.email[0]=1;
492
493 xzone->zone_handler.ev_fd = -1;
494 xzone->zone_handler_flags = 0;
495 xzone->event_added = 0;
496
497 xzone->tcp_conn = -1;
498 xzone->tcp_waiting = 0;
499 xzone->udp_waiting = 0;
500 xzone->is_activated = 0;
501
502 xzone->multi_master_first_master = -1;
503 xzone->multi_master_update_check = -1;
504 tsig_create_record_custom(&xzone->tsig, NULL, 0, 0, 4);
505
506 /* set refreshing anyway, if we have data it may be old */
507 xfrd_set_refresh_now(xzone);
508
509 xzone->node.key = xzone->apex;
510 rbtree_insert(xfrd->zones, (rbnode_type*)xzone);
511 }
512
513 static void
514 xfrd_init_zones()
515 {
516 struct zone_options *zone_opt;
517 assert(xfrd->zones == 0);
518
519 xfrd->zones = rbtree_create(xfrd->region,
520 (int (*)(const void *, const void *)) dname_compare);
521 xfrd->notify_zones = rbtree_create(xfrd->region,
522 (int (*)(const void *, const void *)) dname_compare);
523
524 RBTREE_FOR(zone_opt, struct zone_options*, xfrd->nsd->options->zone_options)
525 {
526 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: adding %s zone",
527 zone_opt->name));
528
529 init_notify_send(xfrd->notify_zones, xfrd->region, zone_opt);
530 if(!zone_is_slave(zone_opt)) {
531 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, "
532 "master zone has no outgoing xfr requests",
533 zone_opt->name));
534 continue;
535 }
536 xfrd_init_slave_zone(xfrd, zone_opt);
537 }
538 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: started server %d "
539 "secondary zones", (int)xfrd->zones->count));
540 }
541
542 static void
543 xfrd_process_soa_info_task(struct task_list_d* task)
544 {
545 xfrd_soa_type soa;
546 xfrd_soa_type* soa_ptr = &soa;
547 xfrd_zone_type* zone;
548 DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: process SOAINFO %s",
549 dname_to_string(task->zname, 0)));
550 zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, task->zname);
551 if(task->size <= sizeof(struct task_list_d)+dname_total_size(
552 task->zname)+sizeof(uint32_t)*6 + sizeof(uint8_t)*2) {
553 /* NSD has zone without any info */
554 DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s lost zone",
555 dname_to_string(task->zname,0)));
556 soa_ptr = NULL;
557 } else {
558 uint8_t* p = (uint8_t*)task->zname + dname_total_size(
559 task->zname);
560 /* read the soa info */
561 memset(&soa, 0, sizeof(soa));
562 /* left out type, klass, count for speed */
563 soa.type = htons(TYPE_SOA);
564 soa.klass = htons(CLASS_IN);
565 memmove(&soa.ttl, p, sizeof(uint32_t));
566 p += sizeof(uint32_t);
567 soa.rdata_count = htons(7);
568 memmove(soa.prim_ns, p, sizeof(uint8_t));
569 p += sizeof(uint8_t);
570 memmove(soa.prim_ns+1, p, soa.prim_ns[0]);
571 p += soa.prim_ns[0];
572 memmove(soa.email, p, sizeof(uint8_t));
573 p += sizeof(uint8_t);
574 memmove(soa.email+1, p, soa.email[0]);
575 p += soa.email[0];
576 memmove(&soa.serial, p, sizeof(uint32_t));
577 p += sizeof(uint32_t);
578 memmove(&soa.refresh, p, sizeof(uint32_t));
579 p += sizeof(uint32_t);
580 memmove(&soa.retry, p, sizeof(uint32_t));
581 p += sizeof(uint32_t);
582 memmove(&soa.expire, p, sizeof(uint32_t));
583 p += sizeof(uint32_t);
584 memmove(&soa.minimum, p, sizeof(uint32_t));
585 /* p += sizeof(uint32_t); if we wanted to read further */
586 DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s %u",
587 dname_to_string(task->zname,0),
588 (unsigned)ntohl(soa.serial)));
589 }
590
591 if(!zone) {
592 DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: zone %s master zone updated",
593 dname_to_string(task->zname,0)));
594 notify_handle_master_zone_soainfo(xfrd->notify_zones,
595 task->zname, soa_ptr);
596 return;
597 }
598 xfrd_handle_incoming_soa(zone, soa_ptr, xfrd_time());
599 }
600
601 static void
602 xfrd_receive_soa(int socket, int shortsoa)
603 {
604 sig_atomic_t cmd;
605 struct udb_base* xtask = xfrd->nsd->task[xfrd->nsd->mytask];
606 udb_ptr last_task, t;
607 xfrd_zone_type* zone;
608
609 if(!shortsoa) {
610 /* put all expired zones into mytask */
611 udb_ptr_init(&last_task, xtask);
612 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
613 if(zone->state == xfrd_zone_expired) {
614 task_new_expire(xtask, &last_task, zone->apex, 1);
615 }
616 }
617 udb_ptr_unlink(&last_task, xtask);
618
619 /* send RELOAD to main to give it this tasklist */
620 task_process_sync(xtask);
621 cmd = NSD_RELOAD;
622 if(!write_socket(socket, &cmd, sizeof(cmd))) {
623 log_msg(LOG_ERR, "problems sending reload xfrdtomain: %s",
624 strerror(errno));
625 }
626 }
627
628 /* receive RELOAD_DONE to get SOAINFO tasklist */
629 if(block_read(&nsd, socket, &cmd, sizeof(cmd), -1) != sizeof(cmd) ||
630 cmd != NSD_RELOAD_DONE) {
631 if(nsd.signal_hint_shutdown)
632 return;
633 log_msg(LOG_ERR, "did not get start signal from main");
634 exit(1);
635 }
636 if(block_read(NULL, socket, &xfrd->reload_pid, sizeof(pid_t), -1)
637 != sizeof(pid_t)) {
638 log_msg(LOG_ERR, "xfrd cannot get reload_pid");
639 }
640
641 /* process tasklist (SOAINFO data) */
642 udb_ptr_unlink(xfrd->last_task, xtask);
643 /* if shortsoa: then use my own taskdb that nsdparent filled */
644 if(!shortsoa)
645 xfrd->nsd->mytask = 1 - xfrd->nsd->mytask;
646 xtask = xfrd->nsd->task[xfrd->nsd->mytask];
647 task_remap(xtask);
648 udb_ptr_new(&t, xtask, udb_base_get_userdata(xtask));
649 while(!udb_ptr_is_null(&t)) {
650 xfrd_process_soa_info_task(TASKLIST(&t));
651 udb_ptr_set_rptr(&t, xtask, &TASKLIST(&t)->next);
652 }
653 udb_ptr_unlink(&t, xtask);
654 task_clear(xtask);
655 udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
656
657 if(!shortsoa) {
658 /* receive RELOAD_DONE that signals the other tasklist is
659 * empty, and thus xfrd can operate (can call reload and swap
660 * to the other, empty, tasklist) */
661 if(block_read(NULL, socket, &cmd, sizeof(cmd), -1) !=
662 sizeof(cmd) ||
663 cmd != NSD_RELOAD_DONE) {
664 log_msg(LOG_ERR, "did not get start signal 2 from "
665 "main");
666 exit(1);
667 }
668 } else {
669 /* for shortsoa version, do expire later */
670 /* if expire notifications, put in my task and
671 * schedule a reload to make sure they are processed */
672 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
673 if(zone->state == xfrd_zone_expired) {
674 xfrd_send_expire_notification(zone);
675 }
676 }
677 }
678 }
679
680 void
681 xfrd_reopen_logfile(void)
682 {
683 if (xfrd->nsd->file_rotation_ok)
684 log_reopen(xfrd->nsd->log_filename, 0);
685 }
686
687 void
688 xfrd_deactivate_zone(xfrd_zone_type* z)
689 {
690 if(z->is_activated) {
691 /* delete from activated list */
692 if(z->activated_prev)
693 z->activated_prev->activated_next = z->activated_next;
694 else xfrd->activated_first = z->activated_next;
695 if(z->activated_next)
696 z->activated_next->activated_prev = z->activated_prev;
697 z->is_activated = 0;
698 }
699 }
700
701 void
702 xfrd_del_slave_zone(xfrd_state_type* xfrd, const dname_type* dname)
703 {
704 xfrd_zone_type* z = (xfrd_zone_type*)rbtree_delete(xfrd->zones, dname);
705 if(!z) return;
706
707 /* io */
708 if(z->tcp_waiting) {
709 /* delete from tcp waiting list */
710 if(z->tcp_waiting_prev)
711 z->tcp_waiting_prev->tcp_waiting_next =
712 z->tcp_waiting_next;
713 else xfrd->tcp_set->tcp_waiting_first = z->tcp_waiting_next;
714 if(z->tcp_waiting_next)
715 z->tcp_waiting_next->tcp_waiting_prev =
716 z->tcp_waiting_prev;
717 else xfrd->tcp_set->tcp_waiting_last = z->tcp_waiting_prev;
718 z->tcp_waiting = 0;
719 }
720 if(z->udp_waiting) {
721 /* delete from udp waiting list */
722 if(z->udp_waiting_prev)
723 z->udp_waiting_prev->udp_waiting_next =
724 z->udp_waiting_next;
725 else xfrd->udp_waiting_first = z->udp_waiting_next;
726 if(z->udp_waiting_next)
727 z->udp_waiting_next->udp_waiting_prev =
728 z->udp_waiting_prev;
729 else xfrd->udp_waiting_last = z->udp_waiting_prev;
730 z->udp_waiting = 0;
731 }
732 xfrd_deactivate_zone(z);
733 if(z->tcp_conn != -1) {
734 xfrd_tcp_release(xfrd->tcp_set, z);
735 } else if(z->zone_handler.ev_fd != -1 && z->event_added) {
736 xfrd_udp_release(z);
737 } else if(z->event_added)
738 event_del(&z->zone_handler);
739 if(z->msg_seq_nr)
740 xfrd_unlink_xfrfile(xfrd->nsd, z->xfrfilenumber);
741
742 /* tsig */
743 tsig_delete_record(&z->tsig, NULL);
744
745 /* z->dname is recycled when the zone_options is removed */
746 region_recycle(xfrd->region, z, sizeof(*z));
747 }
748
749 void
750 xfrd_free_namedb(struct nsd* nsd)
751 {
752 namedb_close_udb(nsd->db);
753 namedb_close(nsd->db);
754 nsd->db = 0;
755 }
756
757 static void
758 xfrd_set_timer_refresh(xfrd_zone_type* zone)
759 {
760 time_t set_refresh;
761 time_t set_expire;
762 time_t set;
763 if(zone->soa_disk_acquired == 0 || zone->state != xfrd_zone_ok) {
764 xfrd_set_timer_retry(zone);
765 return;
766 }
767 /* refresh or expire timeout, whichever is earlier */
768 set_refresh = bound_soa_disk_refresh(zone);
769 set_expire = bound_soa_disk_expire(zone);
770 set = zone->soa_disk_acquired + ( set_refresh < set_expire
771 ? set_refresh : set_expire );
772
773 /* set point in time to period for xfrd_set_timer() */
774 xfrd_set_timer(zone, within_refresh_bounds(zone,
775 set > xfrd_time()
776 ? set - xfrd_time() : XFRD_LOWERBOUND_REFRESH));
777 }
778
779 static void
780 xfrd_set_timer_retry(xfrd_zone_type* zone)
781 {
782 time_t set_retry;
783 time_t set_expire;
784 int mult;
785 /* perform exponential backoff in all the cases */
786 if(zone->fresh_xfr_timeout == 0)
787 zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
788 else {
789 /* exponential backoff - some master data in zones is paid-for
790 but non-working, and will not get fixed. */
791 zone->fresh_xfr_timeout *= 2;
792 if(zone->fresh_xfr_timeout > XFRD_TRANSFER_TIMEOUT_MAX)
793 zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_MAX;
794 }
795 /* exponential backoff multiplier, starts at 1, backs off */
796 mult = zone->fresh_xfr_timeout / XFRD_TRANSFER_TIMEOUT_START;
797 if(mult == 0) mult = 1;
798
799 /* set timer for next retry or expire timeout if earlier. */
800 if(zone->soa_disk_acquired == 0) {
801 /* if no information, use reasonable timeout
802 * within configured and defined bounds
803 */
804 xfrd_set_timer(zone,
805 within_retry_bounds(zone, zone->fresh_xfr_timeout
806 + random_generate(zone->fresh_xfr_timeout)));
807 return;
808 }
809 /* exponential backoff within configured and defined bounds */
810 set_retry = within_retry_bounds(zone,
811 ntohl(zone->soa_disk.retry) * mult);
812 if(zone->state == xfrd_zone_expired) {
813 xfrd_set_timer(zone, set_retry);
814 return;
815 }
816 /* retry or expire timeout, whichever is earlier */
817 set_expire = zone->soa_disk_acquired + bound_soa_disk_expire(zone);
818 if(xfrd_time() + set_retry < set_expire) {
819 xfrd_set_timer(zone, set_retry);
820 return;
821 }
822 /* Not expired, but next retry will be > than expire timeout.
823 * Retry when the expire timeout runs out.
824 * set_expire is below retry upper bounds (if statement above),
825 * but not necessarily above lower bounds,
826 * so use within_retry_bounds() again.
827 */
828 xfrd_set_timer(zone, within_retry_bounds(zone,
829 set_expire > xfrd_time()
830 ? set_expire - xfrd_time() : XFRD_LOWERBOUND_RETRY));
831 }
832
833 void
834 xfrd_handle_zone(int ATTR_UNUSED(fd), short event, void* arg)
835 {
836 xfrd_zone_type* zone = (xfrd_zone_type*)arg;
837
838 if(zone->tcp_conn != -1) {
839 if(event == 0) /* activated, but already in TCP, nothing to do*/
840 return;
841 /* busy in tcp transaction: an internal error */
842 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event tcp", zone->apex_str));
843 xfrd_tcp_release(xfrd->tcp_set, zone);
844 /* continue to retry; as if a timeout happened */
845 event = EV_TIMEOUT;
846 }
847
848 if((event & EV_READ)) {
849 /* busy in udp transaction */
850 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event udp read", zone->apex_str));
851 xfrd_udp_read(zone);
852 return;
853 }
854
855 /* timeout */
856 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s timeout", zone->apex_str));
857 if(zone->zone_handler.ev_fd != -1 && zone->event_added &&
858 (event & EV_TIMEOUT)) {
859 assert(zone->tcp_conn == -1);
860 xfrd_udp_release(zone);
861 }
862
863 if(zone->tcp_waiting) {
864 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, TCP connections full",
865 zone->apex_str));
866 xfrd_unset_timer(zone);
867 return;
868 }
869 if(zone->udp_waiting) {
870 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, UDP connections full",
871 zone->apex_str));
872 xfrd_unset_timer(zone);
873 return;
874 }
875
876 if(zone->soa_disk_acquired)
877 {
878 if (zone->state != xfrd_zone_expired &&
879 xfrd_time() >= zone->soa_disk_acquired
880 + bound_soa_disk_expire(zone)) {
881 /* zone expired */
882 log_msg(LOG_ERR, "xfrd: zone %s has expired", zone->apex_str);
883 xfrd_set_zone_state(zone, xfrd_zone_expired);
884 }
885 else if(zone->state == xfrd_zone_ok &&
886 xfrd_time() >= zone->soa_disk_acquired
887 + bound_soa_disk_refresh(zone)) {
888 /* zone goes to refreshing state. */
889 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is refreshing", zone->apex_str));
890 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
891 }
892 }
893
894 /* only make a new request if no request is running (UDPorTCP) */
895 if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1) {
896 /* make a new request */
897 xfrd_make_request(zone);
898 }
899 }
900
901 void
902 xfrd_make_request(xfrd_zone_type* zone)
903 {
904 if(zone->next_master != -1) {
905 /* we are told to use this next master */
906 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
907 "xfrd zone %s use master %i",
908 zone->apex_str, zone->next_master));
909 zone->master_num = zone->next_master;
910 zone->master = acl_find_num(zone->zone_options->pattern->
911 request_xfr, zone->master_num);
912 /* if there is no next master, fallback to use the first one */
913 if(!zone->master) {
914 zone->master = zone->zone_options->pattern->request_xfr;
915 zone->master_num = 0;
916 }
917 /* fallback to cycle master */
918 zone->next_master = -1;
919 zone->round_num = 0; /* fresh set of retries after notify */
920 } else {
921 /* cycle master */
922
923 if(zone->round_num != -1 && zone->master && zone->master->next)
924 {
925 /* try the next master */
926 zone->master = zone->master->next;
927 zone->master_num++;
928 } else {
929 /* start a new round */
930 zone->master = zone->zone_options->pattern->request_xfr;
931 zone->master_num = 0;
932 zone->round_num++;
933 }
934 if(zone->round_num >= XFRD_MAX_ROUNDS) {
935 /* tried all servers that many times, wait */
936 zone->round_num = -1;
937 xfrd_set_timer_retry(zone);
938 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
939 "xfrd zone %s makereq wait_retry, rd %d mr %d nx %d",
940 zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
941 zone->multi_master_first_master = -1;
942 return;
943 }
944 }
945
946 /* multi-master-check */
947 if(zone->zone_options->pattern->multi_master_check) {
948 if(zone->multi_master_first_master == zone->master_num &&
949 zone->round_num > 0 &&
950 zone->state != xfrd_zone_expired) {
951 /* tried all servers and update zone */
952 if(zone->multi_master_update_check >= 0) {
953 VERBOSITY(2, (LOG_INFO, "xfrd: multi master "
954 "check: zone %s completed transfers",
955 zone->apex_str));
956 }
957 zone->round_num = -1; /* next try start anew */
958 zone->multi_master_first_master = -1;
959 xfrd_set_timer_refresh(zone);
960 return;
961 }
962 if(zone->multi_master_first_master < 0) {
963 zone->multi_master_first_master = zone->master_num;
964 zone->multi_master_update_check = -1;
965 }
966 }
967
968 /* cache ixfr_disabled only for XFRD_NO_IXFR_CACHE time */
969 if (zone->master->ixfr_disabled &&
970 (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL)) {
971 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "clear negative caching ixfr "
972 "disabled for master %s num "
973 "%d ",
974 zone->master->ip_address_spec, zone->master_num));
975 zone->master->ixfr_disabled = 0;
976 }
977
978 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s make request round %d mr %d nx %d",
979 zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
980 /* perform xfr request */
981 if (!zone->master->use_axfr_only && zone->soa_disk_acquired > 0 &&
982 !zone->master->ixfr_disabled) {
983
984 if (zone->master->allow_udp) {
985 xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
986 xfrd_udp_obtain(zone);
987 }
988 else { /* doing 3 rounds of IXFR/TCP might not be useful */
989 xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
990 xfrd_tcp_obtain(xfrd->tcp_set, zone);
991 }
992 }
993 else if (zone->master->use_axfr_only || zone->soa_disk_acquired <= 0) {
994 xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
995 xfrd_tcp_obtain(xfrd->tcp_set, zone);
996 }
997 else if (zone->master->ixfr_disabled) {
998 if (zone->zone_options->pattern->allow_axfr_fallback) {
999 xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1000 xfrd_tcp_obtain(xfrd->tcp_set, zone);
1001 } else {
1002 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s axfr "
1003 "fallback not allowed, skipping master %s.",
1004 zone->apex_str, zone->master->ip_address_spec));
1005 }
1006 }
1007 }
1008
1009 static void
1010 xfrd_udp_obtain(xfrd_zone_type* zone)
1011 {
1012 assert(zone->udp_waiting == 0);
1013 if(zone->tcp_conn != -1) {
1014 /* no tcp and udp at the same time */
1015 xfrd_tcp_release(xfrd->tcp_set, zone);
1016 }
1017 if(xfrd->udp_use_num < XFRD_MAX_UDP) {
1018 int fd;
1019 xfrd->udp_use_num++;
1020 fd = xfrd_send_ixfr_request_udp(zone);
1021 if(fd == -1)
1022 xfrd->udp_use_num--;
1023 else {
1024 if(zone->event_added)
1025 event_del(&zone->zone_handler);
1026 memset(&zone->zone_handler, 0,
1027 sizeof(zone->zone_handler));
1028 event_set(&zone->zone_handler, fd,
1029 EV_PERSIST|EV_READ|EV_TIMEOUT,
1030 xfrd_handle_zone, zone);
1031 if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1032 log_msg(LOG_ERR, "xfrd udp: event_base_set failed");
1033 if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1034 log_msg(LOG_ERR, "xfrd udp: event_add failed");
1035 zone->zone_handler_flags=EV_PERSIST|EV_READ|EV_TIMEOUT;
1036 zone->event_added = 1;
1037 }
1038 return;
1039 }
1040 /* queue the zone as last */
1041 zone->udp_waiting = 1;
1042 zone->udp_waiting_next = NULL;
1043 zone->udp_waiting_prev = xfrd->udp_waiting_last;
1044 if(!xfrd->udp_waiting_first)
1045 xfrd->udp_waiting_first = zone;
1046 if(xfrd->udp_waiting_last)
1047 xfrd->udp_waiting_last->udp_waiting_next = zone;
1048 xfrd->udp_waiting_last = zone;
1049 xfrd_unset_timer(zone);
1050 }
1051
1052 time_t
1053 xfrd_time()
1054 {
1055 if(!xfrd->got_time) {
1056 xfrd->current_time = time(0);
1057 xfrd->got_time = 1;
1058 }
1059 return xfrd->current_time;
1060 }
1061
1062 void
1063 xfrd_copy_soa(xfrd_soa_type* soa, rr_type* rr)
1064 {
1065 const uint8_t* rr_ns_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[0])));
1066 uint8_t rr_ns_len = domain_dname(rdata_atom_domain(rr->rdatas[0]))->name_size;
1067 const uint8_t* rr_em_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[1])));
1068 uint8_t rr_em_len = domain_dname(rdata_atom_domain(rr->rdatas[1]))->name_size;
1069
1070 if(rr->type != TYPE_SOA || rr->rdata_count != 7) {
1071 log_msg(LOG_ERR, "xfrd: copy_soa called with bad rr, type %d rrs %u.",
1072 rr->type, rr->rdata_count);
1073 return;
1074 }
1075 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: copy_soa rr, type %d rrs %u, ttl %u.",
1076 (int)rr->type, (unsigned)rr->rdata_count, (unsigned)rr->ttl));
1077 soa->type = htons(rr->type);
1078 soa->klass = htons(rr->klass);
1079 soa->ttl = htonl(rr->ttl);
1080 soa->rdata_count = htons(rr->rdata_count);
1081
1082 /* copy dnames */
1083 soa->prim_ns[0] = rr_ns_len;
1084 memcpy(soa->prim_ns+1, rr_ns_wire, rr_ns_len);
1085 soa->email[0] = rr_em_len;
1086 memcpy(soa->email+1, rr_em_wire, rr_em_len);
1087
1088 /* already in network format */
1089 memcpy(&soa->serial, rdata_atom_data(rr->rdatas[2]), sizeof(uint32_t));
1090 memcpy(&soa->refresh, rdata_atom_data(rr->rdatas[3]), sizeof(uint32_t));
1091 memcpy(&soa->retry, rdata_atom_data(rr->rdatas[4]), sizeof(uint32_t));
1092 memcpy(&soa->expire, rdata_atom_data(rr->rdatas[5]), sizeof(uint32_t));
1093 memcpy(&soa->minimum, rdata_atom_data(rr->rdatas[6]), sizeof(uint32_t));
1094 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1095 "xfrd: copy_soa rr, serial %u refresh %u retry %u expire %u",
1096 (unsigned)ntohl(soa->serial), (unsigned)ntohl(soa->refresh),
1097 (unsigned)ntohl(soa->retry), (unsigned)ntohl(soa->expire)));
1098 }
1099
1100 static void
1101 xfrd_set_zone_state(xfrd_zone_type* zone, enum xfrd_zone_state s)
1102 {
1103 if(s != zone->state) {
1104 enum xfrd_zone_state old = zone->state;
1105 zone->state = s;
1106 if((s == xfrd_zone_expired || old == xfrd_zone_expired)
1107 && s!=old) {
1108 xfrd_send_expire_notification(zone);
1109 }
1110 }
1111 }
1112
1113 void
1114 xfrd_set_refresh_now(xfrd_zone_type* zone)
1115 {
1116 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s is activated, state %d",
1117 zone->apex_str, zone->state));
1118 if(!zone->is_activated) {
1119 /* push onto list */
1120 zone->activated_prev = 0;
1121 zone->activated_next = xfrd->activated_first;
1122 if(xfrd->activated_first)
1123 xfrd->activated_first->activated_prev = zone;
1124 xfrd->activated_first = zone;
1125 zone->is_activated = 1;
1126 }
1127 }
1128
1129 void
1130 xfrd_unset_timer(xfrd_zone_type* zone)
1131 {
1132 assert(zone->zone_handler.ev_fd == -1);
1133 if(zone->event_added)
1134 event_del(&zone->zone_handler);
1135 zone->zone_handler_flags = 0;
1136 zone->event_added = 0;
1137 }
1138
1139 void
1140 xfrd_set_timer(xfrd_zone_type* zone, time_t t)
1141 {
1142 int fd = zone->zone_handler.ev_fd;
1143 int fl = ((fd == -1)?EV_TIMEOUT:zone->zone_handler_flags);
1144 if(t > XFRD_TRANSFER_TIMEOUT_MAX)
1145 t = XFRD_TRANSFER_TIMEOUT_MAX;
1146 /* randomize the time, within 90%-100% of original */
1147 /* not later so zones cannot expire too late */
1148 /* only for times far in the future */
1149 if(t > 10) {
1150 time_t base = t*9/10;
1151 t = base + random_generate(t-base);
1152 }
1153
1154 /* keep existing flags and fd, but re-add with timeout */
1155 if(zone->event_added)
1156 event_del(&zone->zone_handler);
1157 else fd = -1;
1158 zone->timeout.tv_sec = t;
1159 zone->timeout.tv_usec = 0;
1160 memset(&zone->zone_handler, 0, sizeof(zone->zone_handler));
1161 event_set(&zone->zone_handler, fd, fl, xfrd_handle_zone, zone);
1162 if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1163 log_msg(LOG_ERR, "xfrd timer: event_base_set failed");
1164 if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1165 log_msg(LOG_ERR, "xfrd timer: event_add failed");
1166 zone->zone_handler_flags = fl;
1167 zone->event_added = 1;
1168 }
1169
1170 void
1171 xfrd_handle_incoming_soa(xfrd_zone_type* zone,
1172 xfrd_soa_type* soa, time_t acquired)
1173 {
1174 time_t seconds_since_acquired;
1175 if(soa == NULL) {
1176 /* nsd no longer has a zone in memory */
1177 zone->soa_nsd_acquired = 0;
1178 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1179 xfrd_set_refresh_now(zone);
1180 return;
1181 }
1182 if(zone->soa_nsd_acquired && soa->serial == zone->soa_nsd.serial)
1183 return;
1184
1185 if(zone->soa_disk_acquired && soa->serial == zone->soa_disk.serial)
1186 {
1187 /* soa in disk has been loaded in memory */
1188 log_msg(LOG_INFO, "zone %s serial %u is updated to %u",
1189 zone->apex_str, (unsigned)ntohl(zone->soa_nsd.serial),
1190 (unsigned)ntohl(soa->serial));
1191 zone->soa_nsd = zone->soa_disk;
1192 zone->soa_nsd_acquired = zone->soa_disk_acquired;
1193 xfrd->write_zonefile_needed = 1;
1194 /* reset exponential backoff, we got a normal timer now */
1195 zone->fresh_xfr_timeout = 0;
1196 seconds_since_acquired =
1197 xfrd_time() > zone->soa_disk_acquired
1198 ? xfrd_time() - zone->soa_disk_acquired : 0;
1199 if(seconds_since_acquired < bound_soa_disk_refresh(zone))
1200 {
1201 /* zone ok, wait for refresh time */
1202 xfrd_set_zone_state(zone, xfrd_zone_ok);
1203 zone->round_num = -1;
1204 xfrd_set_timer_refresh(zone);
1205 } else if(seconds_since_acquired < bound_soa_disk_expire(zone))
1206 {
1207 /* zone refreshing */
1208 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1209 xfrd_set_refresh_now(zone);
1210 }
1211 if(seconds_since_acquired >= bound_soa_disk_expire(zone)) {
1212 /* zone expired */
1213 xfrd_set_zone_state(zone, xfrd_zone_expired);
1214 xfrd_set_refresh_now(zone);
1215 }
1216
1217 if(zone->soa_notified_acquired != 0 &&
1218 (zone->soa_notified.serial == 0 ||
1219 compare_serial(ntohl(zone->soa_disk.serial),
1220 ntohl(zone->soa_notified.serial)) >= 0))
1221 { /* read was in response to this notification */
1222 zone->soa_notified_acquired = 0;
1223 }
1224 if(zone->soa_notified_acquired && zone->state == xfrd_zone_ok)
1225 {
1226 /* refresh because of notification */
1227 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1228 xfrd_set_refresh_now(zone);
1229 }
1230 xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1231 return;
1232 }
1233
1234 /* user must have manually provided zone data */
1235 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1236 "xfrd: zone %s serial %u from zonefile. refreshing",
1237 zone->apex_str, (unsigned)ntohl(soa->serial)));
1238 zone->soa_nsd = *soa;
1239 zone->soa_disk = *soa;
1240 zone->soa_nsd_acquired = acquired;
1241 zone->soa_disk_acquired = acquired;
1242 if(zone->soa_notified_acquired != 0 &&
1243 (zone->soa_notified.serial == 0 ||
1244 compare_serial(ntohl(zone->soa_disk.serial),
1245 ntohl(zone->soa_notified.serial)) >= 0))
1246 { /* user provided in response to this notification */
1247 zone->soa_notified_acquired = 0;
1248 }
1249 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1250 xfrd_set_refresh_now(zone);
1251 xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1252 }
1253
1254 void
1255 xfrd_send_expire_notification(xfrd_zone_type* zone)
1256 {
1257 task_new_expire(xfrd->nsd->task[xfrd->nsd->mytask], xfrd->last_task,
1258 zone->apex, zone->state == xfrd_zone_expired);
1259 xfrd_set_reload_timeout();
1260 }
1261
1262 int
1263 xfrd_udp_read_packet(buffer_type* packet, int fd, struct sockaddr* src,
1264 socklen_t* srclen)
1265 {
1266 ssize_t received;
1267
1268 /* read the data */
1269 buffer_clear(packet);
1270 received = recvfrom(fd, buffer_begin(packet), buffer_remaining(packet),
1271 0, src, srclen);
1272 if(received == -1) {
1273 log_msg(LOG_ERR, "xfrd: recvfrom failed: %s",
1274 strerror(errno));
1275 return 0;
1276 }
1277 buffer_set_limit(packet, received);
1278 return 1;
1279 }
1280
1281 void
1282 xfrd_udp_release(xfrd_zone_type* zone)
1283 {
1284 assert(zone->udp_waiting == 0);
1285 if(zone->event_added)
1286 event_del(&zone->zone_handler);
1287 if(zone->zone_handler.ev_fd != -1) {
1288 close(zone->zone_handler.ev_fd);
1289 }
1290 zone->zone_handler.ev_fd = -1;
1291 zone->zone_handler_flags = 0;
1292 zone->event_added = 0;
1293 /* see if there are waiting zones */
1294 if(xfrd->udp_use_num == XFRD_MAX_UDP)
1295 {
1296 while(xfrd->udp_waiting_first) {
1297 /* snip off waiting list */
1298 xfrd_zone_type* wz = xfrd->udp_waiting_first;
1299 assert(wz->udp_waiting);
1300 wz->udp_waiting = 0;
1301 xfrd->udp_waiting_first = wz->udp_waiting_next;
1302 if(wz->udp_waiting_next)
1303 wz->udp_waiting_next->udp_waiting_prev = NULL;
1304 if(xfrd->udp_waiting_last == wz)
1305 xfrd->udp_waiting_last = NULL;
1306 /* see if this zone needs udp connection */
1307 if(wz->tcp_conn == -1) {
1308 int fd = xfrd_send_ixfr_request_udp(wz);
1309 if(fd != -1) {
1310 if(wz->event_added)
1311 event_del(&wz->zone_handler);
1312 memset(&wz->zone_handler, 0,
1313 sizeof(wz->zone_handler));
1314 event_set(&wz->zone_handler, fd,
1315 EV_READ|EV_TIMEOUT|EV_PERSIST,
1316 xfrd_handle_zone, wz);
1317 if(event_base_set(xfrd->event_base,
1318 &wz->zone_handler) != 0)
1319 log_msg(LOG_ERR, "cannot set event_base for ixfr");
1320 if(event_add(&wz->zone_handler, &wz->timeout) != 0)
1321 log_msg(LOG_ERR, "cannot add event for ixfr");
1322 wz->zone_handler_flags = EV_READ|EV_TIMEOUT|EV_PERSIST;
1323 wz->event_added = 1;
1324 return;
1325 } else {
1326 /* make this zone do something with
1327 * this failure to act */
1328 xfrd_set_refresh_now(wz);
1329 }
1330 }
1331 }
1332 }
1333 /* no waiting zones */
1334 if(xfrd->udp_use_num > 0)
1335 xfrd->udp_use_num--;
1336 }
1337
1338 /** disable ixfr for master */
1339 void
1340 xfrd_disable_ixfr(xfrd_zone_type* zone)
1341 {
1342 if(!(zone->master->ixfr_disabled &&
1343 (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL))) {
1344 /* start new round, with IXFR disabled */
1345 zone->round_num = 0;
1346 zone->next_master = zone->master_num;
1347 }
1348 zone->master->ixfr_disabled = time(NULL);
1349 }
1350
1351 static void
1352 xfrd_udp_read(xfrd_zone_type* zone)
1353 {
1354 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s read udp data", zone->apex_str));
1355 if(!xfrd_udp_read_packet(xfrd->packet, zone->zone_handler.ev_fd,
1356 NULL, NULL)) {
1357 zone->master->bad_xfr_count++;
1358 if (zone->master->bad_xfr_count > 2) {
1359 xfrd_disable_ixfr(zone);
1360 zone->master->bad_xfr_count = 0;
1361 }
1362 /* drop packet */
1363 xfrd_udp_release(zone);
1364 /* query next server */
1365 xfrd_make_request(zone);
1366 return;
1367 }
1368 switch(xfrd_handle_received_xfr_packet(zone, xfrd->packet)) {
1369 case xfrd_packet_tcp:
1370 xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1371 xfrd_udp_release(zone);
1372 xfrd_tcp_obtain(xfrd->tcp_set, zone);
1373 break;
1374 case xfrd_packet_transfer:
1375 if(zone->zone_options->pattern->multi_master_check) {
1376 xfrd_udp_release(zone);
1377 xfrd_make_request(zone);
1378 break;
1379 }
1380 /* fallthrough */
1381 case xfrd_packet_newlease:
1382 /* nothing more to do */
1383 assert(zone->round_num == -1);
1384 xfrd_udp_release(zone);
1385 break;
1386 case xfrd_packet_notimpl:
1387 xfrd_disable_ixfr(zone);
1388 /* drop packet */
1389 xfrd_udp_release(zone);
1390 /* query next server */
1391 xfrd_make_request(zone);
1392 break;
1393 case xfrd_packet_more:
1394 case xfrd_packet_drop:
1395 /* drop packet */
1396 xfrd_udp_release(zone);
1397 /* query next server */
1398 xfrd_make_request(zone);
1399 break;
1400 case xfrd_packet_bad:
1401 default:
1402 zone->master->bad_xfr_count++;
1403 if (zone->master->bad_xfr_count > 2) {
1404 xfrd_disable_ixfr(zone);
1405 zone->master->bad_xfr_count = 0;
1406 }
1407 /* drop packet */
1408 xfrd_udp_release(zone);
1409 /* query next server */
1410 xfrd_make_request(zone);
1411 break;
1412 }
1413 }
1414
1415 int
1416 xfrd_send_udp(struct acl_options* acl, buffer_type* packet,
1417 struct acl_options* ifc)
1418 {
1419 #ifdef INET6
1420 struct sockaddr_storage to;
1421 #else
1422 struct sockaddr_in to;
1423 #endif /* INET6 */
1424 int fd, family;
1425
1426 /* this will set the remote port to acl->port or TCP_PORT */
1427 socklen_t to_len = xfrd_acl_sockaddr_to(acl, &to);
1428
1429 /* get the address family of the remote host */
1430 if(acl->is_ipv6) {
1431 #ifdef INET6
1432 family = PF_INET6;
1433 #else
1434 return -1;
1435 #endif /* INET6 */
1436 } else {
1437 family = PF_INET;
1438 }
1439
1440 fd = socket(family, SOCK_DGRAM, IPPROTO_UDP);
1441 if(fd == -1) {
1442 log_msg(LOG_ERR, "xfrd: cannot create udp socket to %s: %s",
1443 acl->ip_address_spec, strerror(errno));
1444 return -1;
1445 }
1446
1447 /* bind it */
1448 if (!xfrd_bind_local_interface(fd, ifc, acl, 0)) {
1449 log_msg(LOG_ERR, "xfrd: cannot bind outgoing interface '%s' to "
1450 "udp socket: No matching ip addresses found",
1451 ifc->ip_address_spec);
1452 close(fd);
1453 return -1;
1454 }
1455
1456 /* send it (udp) */
1457 if(sendto(fd,
1458 buffer_current(packet),
1459 buffer_remaining(packet), 0,
1460 (struct sockaddr*)&to, to_len) == -1)
1461 {
1462 log_msg(LOG_ERR, "xfrd: sendto %s failed %s",
1463 acl->ip_address_spec, strerror(errno));
1464 close(fd);
1465 return -1;
1466 }
1467 return fd;
1468 }
1469
1470 int
1471 xfrd_bind_local_interface(int sockd, struct acl_options* ifc,
1472 struct acl_options* acl, int tcp)
1473 {
1474 #ifdef SO_LINGER
1475 struct linger linger = {1, 0};
1476 #endif
1477 socklen_t frm_len;
1478 #ifdef INET6
1479 struct sockaddr_storage frm;
1480 #else
1481 struct sockaddr_in frm;
1482 #endif /* INET6 */
1483 int ret = 1;
1484
1485 if (!ifc) /* no outgoing interface set */
1486 return 1;
1487
1488 while (ifc) {
1489 if (ifc->is_ipv6 != acl->is_ipv6) {
1490 /* check if we have a matching address family */
1491 ifc = ifc->next;
1492 continue;
1493 }
1494
1495 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: bind() %s to %s socket",
1496 ifc->ip_address_spec, tcp? "tcp":"udp"));
1497 ret = 0;
1498 frm_len = xfrd_acl_sockaddr_frm(ifc, &frm);
1499
1500 if (tcp) {
1501 #ifdef SO_REUSEADDR
1502 if (setsockopt(sockd, SOL_SOCKET, SO_REUSEADDR, &frm,
1503 frm_len) < 0) {
1504 VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1505 "SO_REUSEADDR failed: %s", strerror(errno)));
1506 }
1507 #else
1508 VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_REUSEADDR "
1509 "failed: SO_REUSEADDR not defined"));
1510 #endif /* SO_REUSEADDR */
1511
1512 if (ifc->port != 0) {
1513 #ifdef SO_LINGER
1514 if (setsockopt(sockd, SOL_SOCKET, SO_LINGER,
1515 &linger, sizeof(linger)) < 0) {
1516 VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1517 "SO_LINGER failed: %s", strerror(errno)));
1518 }
1519 #else
1520 VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_LINGER "
1521 "failed: SO_LINGER not defined"));
1522 #endif /* SO_LINGER */
1523 }
1524 }
1525
1526 /* found one */
1527 if(bind(sockd, (struct sockaddr*)&frm, frm_len) >= 0) {
1528 DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s "
1529 "socket was successful",
1530 ifc->ip_address_spec, tcp? "tcp":"udp"));
1531 return 1;
1532 }
1533
1534 DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s socket"
1535 "failed: %s",
1536 ifc->ip_address_spec, tcp? "tcp":"udp",
1537 strerror(errno)));
1538
1539 log_msg(LOG_WARNING, "xfrd: could not bind source address:port to "
1540 "socket: %s", strerror(errno));
1541 /* try another */
1542 ifc = ifc->next;
1543 }
1544 return ret;
1545 }
1546
1547 void
1548 xfrd_tsig_sign_request(buffer_type* packet, tsig_record_type* tsig,
1549 struct acl_options* acl)
1550 {
1551 tsig_algorithm_type* algo;
1552 assert(acl->key_options && acl->key_options->tsig_key);
1553 algo = tsig_get_algorithm_by_name(acl->key_options->algorithm);
1554 if(!algo) {
1555 log_msg(LOG_ERR, "tsig unknown algorithm %s",
1556 acl->key_options->algorithm);
1557 return;
1558 }
1559 assert(algo);
1560 tsig_init_record(tsig, algo, acl->key_options->tsig_key);
1561 tsig_init_query(tsig, ID(packet));
1562 tsig_prepare(tsig);
1563 tsig_update(tsig, packet, buffer_position(packet));
1564 tsig_sign(tsig);
1565 tsig_append_rr(tsig, packet);
1566 ARCOUNT_SET(packet, ARCOUNT(packet) + 1);
1567 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "appending tsig to packet"));
1568 /* prepare for validating tsigs */
1569 tsig_prepare(tsig);
1570 }
1571
1572 static int
1573 xfrd_send_ixfr_request_udp(xfrd_zone_type* zone)
1574 {
1575 int fd;
1576
1577 /* make sure we have a master to query the ixfr request to */
1578 assert(zone->master);
1579
1580 if(zone->tcp_conn != -1) {
1581 /* tcp is using the zone_handler.fd */
1582 log_msg(LOG_ERR, "xfrd: %s tried to send udp whilst tcp engaged",
1583 zone->apex_str);
1584 return -1;
1585 }
1586 xfrd_setup_packet(xfrd->packet, TYPE_IXFR, CLASS_IN, zone->apex,
1587 qid_generate());
1588 zone->query_id = ID(xfrd->packet);
1589 zone->query_type = TYPE_IXFR;
1590 /* delete old xfr file? */
1591 if(zone->msg_seq_nr)
1592 xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
1593 zone->msg_seq_nr = 0;
1594 zone->msg_rr_count = 0;
1595 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent query with ID %d", zone->query_id));
1596 NSCOUNT_SET(xfrd->packet, 1);
1597 xfrd_write_soa_buffer(xfrd->packet, zone->apex, &zone->soa_disk);
1598 /* if we have tsig keys, sign the ixfr query */
1599 if(zone->master->key_options && zone->master->key_options->tsig_key) {
1600 xfrd_tsig_sign_request(xfrd->packet, &zone->tsig, zone->master);
1601 }
1602 buffer_flip(xfrd->packet);
1603 xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
1604
1605 if((fd = xfrd_send_udp(zone->master, xfrd->packet,
1606 zone->zone_options->pattern->outgoing_interface)) == -1)
1607 return -1;
1608
1609 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1610 "xfrd sent udp request for ixfr=%u for zone %s to %s",
1611 (unsigned)ntohl(zone->soa_disk.serial),
1612 zone->apex_str, zone->master->ip_address_spec));
1613 return fd;
1614 }
1615
1616 static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa)
1617 {
1618 if(!buffer_available(packet, 10))
1619 return 0;
1620 soa->type = htons(buffer_read_u16(packet));
1621 soa->klass = htons(buffer_read_u16(packet));
1622 soa->ttl = htonl(buffer_read_u32(packet));
1623 if(ntohs(soa->type) != TYPE_SOA || ntohs(soa->klass) != CLASS_IN)
1624 {
1625 return 0;
1626 }
1627
1628 if(!buffer_available(packet, buffer_read_u16(packet)) /* rdata length */ ||
1629 !(soa->prim_ns[0] = dname_make_wire_from_packet(soa->prim_ns+1, packet, 1)) ||
1630 !(soa->email[0] = dname_make_wire_from_packet(soa->email+1, packet, 1)))
1631 {
1632 return 0;
1633 }
1634 soa->rdata_count = 7; /* rdata in SOA */
1635 soa->serial = htonl(buffer_read_u32(packet));
1636 soa->refresh = htonl(buffer_read_u32(packet));
1637 soa->retry = htonl(buffer_read_u32(packet));
1638 soa->expire = htonl(buffer_read_u32(packet));
1639 soa->minimum = htonl(buffer_read_u32(packet));
1640
1641 return 1;
1642 }
1643
1644
1645 /*
1646 * Check the RRs in an IXFR/AXFR reply.
1647 * returns 0 on error, 1 on correct parseable packet.
1648 * done = 1 if the last SOA in an IXFR/AXFR has been seen.
1649 * soa then contains that soa info.
1650 * (soa contents is modified by the routine)
1651 */
1652 static int
1653 xfrd_xfr_check_rrs(xfrd_zone_type* zone, buffer_type* packet, size_t count,
1654 int *done, xfrd_soa_type* soa, region_type* temp)
1655 {
1656 /* first RR has already been checked */
1657 uint32_t tmp_serial = 0;
1658 uint16_t type, rrlen;
1659 size_t i, soapos, mempos;
1660 const dname_type* dname;
1661 domain_table_type* owners;
1662 rdata_atom_type* rdatas;
1663
1664 for(i=0; i<count; ++i,++zone->msg_rr_count)
1665 {
1666 if (*done) {
1667 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr has "
1668 "trailing garbage", zone->apex_str));
1669 return 0;
1670 }
1671 region_free_all(temp);
1672 owners = domain_table_create(temp);
1673 /* check the dname for errors */
1674 dname = dname_make_from_packet(temp, packet, 1, 1);
1675 if(!dname) {
1676 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1677 "to parse owner name", zone->apex_str));
1678 return 0;
1679 }
1680 if(!buffer_available(packet, 10)) {
1681 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr hdr "
1682 "too small", zone->apex_str));
1683 return 0;
1684 }
1685 soapos = buffer_position(packet);
1686 type = buffer_read_u16(packet);
1687 (void)buffer_read_u16(packet); /* class */
1688 (void)buffer_read_u32(packet); /* ttl */
1689 rrlen = buffer_read_u16(packet);
1690 if(!buffer_available(packet, rrlen)) {
1691 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr pkt "
1692 "too small", zone->apex_str));
1693 return 0;
1694 }
1695 mempos = buffer_position(packet);
1696 if(rdata_wireformat_to_rdata_atoms(temp, owners, type, rrlen,
1697 packet, &rdatas) == -1) {
1698 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1699 "to parse rdata", zone->apex_str));
1700 return 0;
1701 }
1702 if(type == TYPE_SOA) {
1703 /* check the SOAs */
1704 buffer_set_position(packet, soapos);
1705 if(!xfrd_parse_soa_info(packet, soa)) {
1706 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1707 "unable to parse soainfo", zone->apex_str));
1708 return 0;
1709 }
1710 if(zone->msg_rr_count == 1 &&
1711 ntohl(soa->serial) != zone->msg_new_serial) {
1712 /* 2nd RR is SOA with lower serial, this is an IXFR */
1713 zone->msg_is_ixfr = 1;
1714 if(!zone->soa_disk_acquired) {
1715 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1716 "got ixfr but need axfr", zone->apex_str));
1717 return 0; /* got IXFR but need AXFR */
1718 }
1719 if(ntohl(soa->serial) != ntohl(zone->soa_disk.serial)) {
1720 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1721 "bad start serial", zone->apex_str));
1722 return 0; /* bad start serial in IXFR */
1723 }
1724 zone->msg_old_serial = ntohl(soa->serial);
1725 tmp_serial = ntohl(soa->serial);
1726 }
1727 else if(ntohl(soa->serial) == zone->msg_new_serial) {
1728 /* saw another SOA of new serial. */
1729 if(zone->msg_is_ixfr == 1) {
1730 zone->msg_is_ixfr = 2; /* seen middle SOA in ixfr */
1731 } else {
1732 /* 2nd SOA for AXFR or 3rd newSOA for IXFR */
1733 *done = 1;
1734 }
1735 }
1736 else if (zone->msg_is_ixfr) {
1737 /* some additional checks */
1738 if(ntohl(soa->serial) > zone->msg_new_serial) {
1739 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1740 "bad middle serial", zone->apex_str));
1741 return 0; /* bad middle serial in IXFR */
1742 }
1743 if(ntohl(soa->serial) < tmp_serial) {
1744 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1745 "serial decreasing not allowed", zone->apex_str));
1746 return 0; /* middle serial decreases in IXFR */
1747 }
1748 /* serial ok, update tmp serial */
1749 tmp_serial = ntohl(soa->serial);
1750 }
1751 }
1752 buffer_set_position(packet, mempos);
1753 buffer_skip(packet, rrlen);
1754 }
1755 /* packet seems to have a valid DNS RR structure */
1756 return 1;
1757 }
1758
1759 static int
1760 xfrd_xfr_process_tsig(xfrd_zone_type* zone, buffer_type* packet)
1761 {
1762 int have_tsig = 0;
1763 assert(zone && zone->master && zone->master->key_options
1764 && zone->master->key_options->tsig_key && packet);
1765 if(!tsig_find_rr(&zone->tsig, packet)) {
1766 log_msg(LOG_ERR, "xfrd: zone %s, from %s: malformed tsig RR",
1767 zone->apex_str, zone->master->ip_address_spec);
1768 return 0;
1769 }
1770 if(zone->tsig.status == TSIG_OK) {
1771 have_tsig = 1;
1772 if (zone->tsig.error_code != TSIG_ERROR_NOERROR) {
1773 log_msg(LOG_ERR, "xfrd: zone %s, from %s: tsig error "
1774 "(%s)", zone->apex_str,
1775 zone->master->ip_address_spec,
1776 tsig_error(zone->tsig.error_code));
1777 }
1778 }
1779 if(have_tsig) {
1780 /* strip the TSIG resource record off... */
1781 buffer_set_limit(packet, zone->tsig.position);
1782 ARCOUNT_SET(packet, ARCOUNT(packet) - 1);
1783 }
1784
1785 /* keep running the TSIG hash */
1786 tsig_update(&zone->tsig, packet, buffer_limit(packet));
1787 if(have_tsig) {
1788 if (!tsig_verify(&zone->tsig)) {
1789 log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad tsig signature",
1790 zone->apex_str, zone->master->ip_address_spec);
1791 return 0;
1792 }
1793 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, from %s: good tsig signature",
1794 zone->apex_str, zone->master->ip_address_spec));
1795 /* prepare for next tsigs */
1796 tsig_prepare(&zone->tsig);
1797 }
1798 else if(zone->tsig.updates_since_last_prepare > XFRD_TSIG_MAX_UNSIGNED) {
1799 /* we allow a number of non-tsig signed packets */
1800 log_msg(LOG_INFO, "xfrd: zone %s, from %s: too many consecutive "
1801 "packets without TSIG", zone->apex_str,
1802 zone->master->ip_address_spec);
1803 return 0;
1804 }
1805
1806 if(!have_tsig && zone->msg_seq_nr == 0) {
1807 log_msg(LOG_ERR, "xfrd: zone %s, from %s: no tsig in first packet of reply",
1808 zone->apex_str, zone->master->ip_address_spec);
1809 return 0;
1810 }
1811 return 1;
1812 }
1813
1814 /* parse the received packet. returns xfrd packet result code. */
1815 static enum xfrd_packet_result
1816 xfrd_parse_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet,
1817 xfrd_soa_type* soa)
1818 {
1819 size_t rr_count;
1820 size_t qdcount = QDCOUNT(packet);
1821 size_t ancount = ANCOUNT(packet), ancount_todo;
1822 size_t nscount = NSCOUNT(packet);
1823 int done = 0;
1824 region_type* tempregion = NULL;
1825 assert(zone->master);
1826
1827 /* has to be axfr / ixfr reply */
1828 if(!buffer_available(packet, QHEADERSZ)) {
1829 log_msg(LOG_INFO, "packet too small");
1830 return xfrd_packet_bad;
1831 }
1832
1833 /* only check ID in first response message. Could also check that
1834 * AA bit and QR bit are set, but not needed.
1835 */
1836 DEBUG(DEBUG_XFRD,2, (LOG_INFO,
1837 "got query with ID %d and %d needed", ID(packet), zone->query_id));
1838 if(ID(packet) != zone->query_id) {
1839 log_msg(LOG_ERR, "xfrd: zone %s received bad query id from %s, "
1840 "dropped",
1841 zone->apex_str, zone->master->ip_address_spec);
1842 return xfrd_packet_bad;
1843 }
1844 /* check RCODE in all response messages */
1845 if(RCODE(packet) != RCODE_OK) {
1846 /* for IXFR failures, do not log unless higher verbosity */
1847 if(!(verbosity < 3 && (RCODE(packet) == RCODE_IMPL ||
1848 RCODE(packet) == RCODE_FORMAT) &&
1849 !zone->master->ixfr_disabled &&
1850 !zone->master->use_axfr_only)) {
1851 log_msg(LOG_ERR, "xfrd: zone %s received error code %s from "
1852 "%s",
1853 zone->apex_str, rcode2str(RCODE(packet)),
1854 zone->master->ip_address_spec);
1855 }
1856 if (RCODE(packet) == RCODE_IMPL ||
1857 RCODE(packet) == RCODE_FORMAT) {
1858 return xfrd_packet_notimpl;
1859 }
1860 if (RCODE(packet) != RCODE_NOTAUTH) {
1861 /* RFC 2845: If NOTAUTH, client should do TSIG checking */
1862 return xfrd_packet_drop;
1863 }
1864 }
1865 /* check TSIG */
1866 if(zone->master->key_options) {
1867 if(!xfrd_xfr_process_tsig(zone, packet)) {
1868 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "dropping xfr reply due "
1869 "to bad TSIG"));
1870 return xfrd_packet_bad;
1871 }
1872 }
1873 if (RCODE(packet) == RCODE_NOTAUTH) {
1874 return xfrd_packet_drop;
1875 }
1876
1877 buffer_skip(packet, QHEADERSZ);
1878 if(qdcount > 64 || ancount > 65530 || nscount > 65530) {
1879 /* 0 or 1 question section rr, and 64k limits other counts */
1880 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "dropping xfr reply, impossibly "
1881 "high record count"));
1882 return xfrd_packet_bad;
1883 }
1884
1885 /* skip question section */
1886 for(rr_count = 0; rr_count < qdcount; ++rr_count) {
1887 if (!packet_skip_rr(packet, 1)) {
1888 log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad RR in "
1889 "question section",
1890 zone->apex_str, zone->master->ip_address_spec);
1891 return xfrd_packet_bad;
1892 }
1893 }
1894 if(zone->msg_rr_count == 0 && ancount == 0) {
1895 if(zone->tcp_conn == -1 && TC(packet)) {
1896 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: TC flagged"));
1897 return xfrd_packet_tcp;
1898 }
1899 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: too short xfr packet: no "
1900 "answer"));
1901 /* if IXFR is unknown, fallback to AXFR (if allowed) */
1902 if (nscount == 1) {
1903 if(!packet_skip_dname(packet) || !xfrd_parse_soa_info(packet, soa)) {
1904 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1905 "no SOA begins authority section",
1906 zone->apex_str, zone->master->ip_address_spec));
1907 return xfrd_packet_bad;
1908 }
1909 return xfrd_packet_notimpl;
1910 }
1911 return xfrd_packet_bad;
1912 }
1913 ancount_todo = ancount;
1914
1915 tempregion = region_create(xalloc, free);
1916 if(zone->msg_rr_count == 0) {
1917 const dname_type* soaname = dname_make_from_packet(tempregion,
1918 packet, 1, 1);
1919 if(!soaname) { /* parse failure */
1920 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1921 "parse error in SOA record",
1922 zone->apex_str, zone->master->ip_address_spec));
1923 region_destroy(tempregion);
1924 return xfrd_packet_bad;
1925 }
1926 if(dname_compare(soaname, zone->apex) != 0) { /* wrong name */
1927 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1928 "wrong SOA record",
1929 zone->apex_str, zone->master->ip_address_spec));
1930 region_destroy(tempregion);
1931 return xfrd_packet_bad;
1932 }
1933
1934 /* parse the first RR, see if it is a SOA */
1935 if(!xfrd_parse_soa_info(packet, soa))
1936 {
1937 DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1938 "bad SOA rdata",
1939 zone->apex_str, zone->master->ip_address_spec));
1940 region_destroy(tempregion);
1941 return xfrd_packet_bad;
1942 }
1943 if(zone->soa_disk_acquired != 0 &&
1944 zone->state != xfrd_zone_expired /* if expired - accept anything */ &&
1945 compare_serial(ntohl(soa->serial), ntohl(zone->soa_disk.serial)) < 0) {
1946 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1947 "xfrd: zone %s ignoring old serial (%u/%u) from %s",
1948 zone->apex_str, ntohl(zone->soa_disk.serial), ntohl(soa->serial), zone->master->ip_address_spec));
1949 VERBOSITY(1, (LOG_INFO,
1950 "xfrd: zone %s ignoring old serial (%u/%u) from %s",
1951 zone->apex_str, ntohl(zone->soa_disk.serial), ntohl(soa->serial), zone->master->ip_address_spec));
1952 region_destroy(tempregion);
1953 return xfrd_packet_bad;
1954 }
1955 if(zone->soa_disk_acquired != 0 && zone->soa_disk.serial == soa->serial) {
1956 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s got "
1957 "update indicating "
1958 "current serial",
1959 zone->apex_str));
1960 /* (even if notified) the lease on the current soa is renewed */
1961 zone->soa_disk_acquired = xfrd_time();
1962 if(zone->soa_nsd.serial == soa->serial)
1963 zone->soa_nsd_acquired = xfrd_time();
1964 xfrd_set_zone_state(zone, xfrd_zone_ok);
1965 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is ok",
1966 zone->apex_str));
1967 if(zone->zone_options->pattern->multi_master_check) {
1968 region_destroy(tempregion);
1969 return xfrd_packet_drop;
1970 }
1971 if(zone->soa_notified_acquired == 0) {
1972 /* not notified or anything, so stop asking around */
1973 zone->round_num = -1; /* next try start a new round */
1974 xfrd_set_timer_refresh(zone);
1975 region_destroy(tempregion);
1976 return xfrd_packet_newlease;
1977 }
1978 /* try next master */
1979 region_destroy(tempregion);
1980 return xfrd_packet_drop;
1981 }
1982 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "IXFR reply has ok serial (have \
1983 %u, reply %u).", (unsigned)ntohl(zone->soa_disk.serial), (unsigned)ntohl(soa->serial)));
1984 /* serial is newer than soa_disk */
1985 if(ancount == 1) {
1986 /* single record means it is like a notify */
1987 (void)xfrd_handle_incoming_notify(zone, soa);
1988 }
1989 else if(zone->soa_notified_acquired && zone->soa_notified.serial &&
1990 compare_serial(ntohl(zone->soa_notified.serial), ntohl(soa->serial)) < 0) {
1991 /* this AXFR/IXFR notifies me that an even newer serial exists */
1992 zone->soa_notified.serial = soa->serial;
1993 }
1994 zone->msg_new_serial = ntohl(soa->serial);
1995 zone->msg_rr_count = 1;
1996 zone->msg_is_ixfr = 0;
1997 if(zone->soa_disk_acquired)
1998 zone->msg_old_serial = ntohl(zone->soa_disk.serial);
1999 else zone->msg_old_serial = 0;
2000 ancount_todo = ancount - 1;
2001 }
2002
2003 if(zone->tcp_conn == -1 && TC(packet)) {
2004 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2005 "xfrd: zone %s received TC from %s. retry tcp.",
2006 zone->apex_str, zone->master->ip_address_spec));
2007 region_destroy(tempregion);
2008 return xfrd_packet_tcp;
2009 }
2010
2011 if(zone->tcp_conn == -1 && ancount < 2) {
2012 /* too short to be a real ixfr/axfr data transfer: need at */
2013 /* least two RRs in the answer section. */
2014 /* The serial is newer, so try tcp to this master. */
2015 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply is short. Try "
2016 "tcp anyway."));
2017 region_destroy(tempregion);
2018 return xfrd_packet_tcp;
2019 }
2020
2021 if(!xfrd_xfr_check_rrs(zone, packet, ancount_todo, &done, soa,
2022 tempregion))
2023 {
2024 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s sent bad xfr "
2025 "reply.", zone->apex_str));
2026 region_destroy(tempregion);
2027 return xfrd_packet_bad;
2028 }
2029 region_destroy(tempregion);
2030 if(zone->tcp_conn == -1 && done == 0) {
2031 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply incomplete"));
2032 return xfrd_packet_bad;
2033 }
2034 if(done == 0)
2035 return xfrd_packet_more;
2036 if(zone->master->key_options) {
2037 if(zone->tsig.updates_since_last_prepare != 0) {
2038 log_msg(LOG_INFO, "xfrd: last packet of reply has no "
2039 "TSIG");
2040 return xfrd_packet_bad;
2041 }
2042 }
2043 return xfrd_packet_transfer;
2044 }
2045
2046 const char*
2047 xfrd_pretty_time(time_t v)
2048 {
2049 struct tm* tm = localtime(&v);
2050 static char buf[64];
2051 if(!strftime(buf, sizeof(buf), "%Y-%m-%dT%H:%M:%S", tm))
2052 snprintf(buf, sizeof(buf), "strftime-err-%u", (unsigned)v);
2053 return buf;
2054 }
2055
2056 enum xfrd_packet_result
2057 xfrd_handle_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet)
2058 {
2059 xfrd_soa_type soa;
2060 enum xfrd_packet_result res;
2061 uint64_t xfrfile_size;
2062
2063 /* parse and check the packet - see if it ends the xfr */
2064 switch((res=xfrd_parse_received_xfr_packet(zone, packet, &soa)))
2065 {
2066 case xfrd_packet_more:
2067 case xfrd_packet_transfer:
2068 /* continue with commit */
2069 break;
2070 case xfrd_packet_newlease:
2071 return xfrd_packet_newlease;
2072 case xfrd_packet_tcp:
2073 return xfrd_packet_tcp;
2074 case xfrd_packet_notimpl:
2075 case xfrd_packet_bad:
2076 case xfrd_packet_drop:
2077 default:
2078 {
2079 /* rollback */
2080 if(zone->msg_seq_nr > 0) {
2081 /* do not process xfr - if only one part simply ignore it. */
2082 /* delete file with previous parts of commit */
2083 xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2084 VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2085 "reverted transfer %u from %s",
2086 zone->apex_str, zone->msg_rr_count?
2087 (int)zone->msg_new_serial:0,
2088 zone->master->ip_address_spec));
2089 zone->msg_seq_nr = 0;
2090 } else if (res == xfrd_packet_bad) {
2091 VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2092 "bad transfer %u from %s",
2093 zone->apex_str, zone->msg_rr_count?
2094 (int)zone->msg_new_serial:0,
2095 zone->master->ip_address_spec));
2096 }
2097 if (res == xfrd_packet_notimpl
2098 && zone->query_type == TYPE_IXFR)
2099 return res;
2100 else
2101 return xfrd_packet_bad;
2102 }
2103 }
2104
2105 /* dump reply on disk to diff file */
2106 /* if first part, get new filenumber. Numbers can wrap around, 64bit
2107 * is enough so we do not collide with older-transfers-in-progress */
2108 if(zone->msg_seq_nr == 0)
2109 zone->xfrfilenumber = xfrd->xfrfilenumber++;
2110 diff_write_packet(dname_to_string(zone->apex,0),
2111 zone->zone_options->pattern->pname,
2112 zone->msg_old_serial, zone->msg_new_serial, zone->msg_seq_nr,
2113 buffer_begin(packet), buffer_limit(packet), xfrd->nsd,
2114 zone->xfrfilenumber);
2115 VERBOSITY(3, (LOG_INFO,
2116 "xfrd: zone %s written received XFR packet from %s with serial %u to "
2117 "disk", zone->apex_str, zone->master->ip_address_spec,
2118 (int)zone->msg_new_serial));
2119 zone->msg_seq_nr++;
2120
2121 xfrfile_size = xfrd_get_xfrfile_size(xfrd->nsd, zone->xfrfilenumber);
2122 if( zone->zone_options->pattern->size_limit_xfr != 0 &&
2123 xfrfile_size > zone->zone_options->pattern->size_limit_xfr ) {
2124 /* xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2125 xfrd_set_reload_timeout(); */
2126 log_msg(LOG_INFO, "xfrd : transferred zone data was too large %llu", (long long unsigned)xfrfile_size);
2127 return xfrd_packet_bad;
2128 }
2129 if(res == xfrd_packet_more) {
2130 /* wait for more */
2131 return xfrd_packet_more;
2132 }
2133
2134 /* done. we are completely sure of this */
2135 buffer_clear(packet);
2136 buffer_printf(packet, "received update to serial %u at %s from %s",
2137 (unsigned)zone->msg_new_serial, xfrd_pretty_time(xfrd_time()),
2138 zone->master->ip_address_spec);
2139 if(zone->master->key_options) {
2140 buffer_printf(packet, " TSIG verified with key %s",
2141 zone->master->key_options->name);
2142 }
2143 buffer_flip(packet);
2144 diff_write_commit(zone->apex_str, zone->msg_old_serial,
2145 zone->msg_new_serial, zone->msg_seq_nr, 1,
2146 (char*)buffer_begin(packet), xfrd->nsd, zone->xfrfilenumber);
2147 VERBOSITY(1, (LOG_INFO, "xfrd: zone %s committed \"%s\"",
2148 zone->apex_str, (char*)buffer_begin(packet)));
2149 /* reset msg seq nr, so if that is nonnull we know xfr file exists */
2150 zone->msg_seq_nr = 0;
2151 /* now put apply_xfr task on the tasklist */
2152 if(!task_new_apply_xfr(xfrd->nsd->task[xfrd->nsd->mytask],
2153 xfrd->last_task, zone->apex, zone->msg_old_serial,
2154 zone->msg_new_serial, zone->xfrfilenumber)) {
2155 /* delete the file and pretend transfer was bad to continue */
2156 xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2157 xfrd_set_reload_timeout();
2158 return xfrd_packet_bad;
2159 }
2160 /* update the disk serial no. */
2161 zone->soa_disk_acquired = xfrd_time();
2162 zone->soa_disk = soa;
2163 if(zone->soa_notified_acquired && (
2164 zone->soa_notified.serial == 0 ||
2165 compare_serial(htonl(zone->soa_disk.serial),
2166 htonl(zone->soa_notified.serial)) >= 0))
2167 {
2168 zone->soa_notified_acquired = 0;
2169 }
2170 if(!zone->soa_notified_acquired) {
2171 /* do not set expired zone to ok:
2172 * it would cause nsd to start answering
2173 * bad data, since the zone is not loaded yet.
2174 * if nsd does not reload < retry time, more
2175 * queries (for even newer versions) are made.
2176 * For expired zone after reload it is set ok (SOAINFO ipc). */
2177 if(zone->state != xfrd_zone_expired)
2178 xfrd_set_zone_state(zone, xfrd_zone_ok);
2179 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2180 "xfrd: zone %s is waiting for reload",
2181 zone->apex_str));
2182 if(zone->zone_options->pattern->multi_master_check) {
2183 zone->multi_master_update_check = zone->master_num;
2184 xfrd_set_reload_timeout();
2185 return xfrd_packet_transfer;
2186 }
2187 zone->round_num = -1; /* next try start anew */
2188 xfrd_set_timer_refresh(zone);
2189 xfrd_set_reload_timeout();
2190 return xfrd_packet_transfer;
2191 } else {
2192 /* try to get an even newer serial */
2193 /* pretend it was bad to continue queries */
2194 xfrd_set_reload_timeout();
2195 return xfrd_packet_bad;
2196 }
2197 }
2198
2199 static void
2200 xfrd_set_reload_timeout()
2201 {
2202 if(xfrd->nsd->options->xfrd_reload_timeout == -1)
2203 return; /* automatic reload disabled. */
2204 if(xfrd->reload_timeout.tv_sec == 0 ||
2205 xfrd_time() >= (time_t)xfrd->reload_timeout.tv_sec ) {
2206 /* no reload wait period (or it passed), do it right away */
2207 xfrd_set_reload_now(xfrd);
2208 /* start reload wait period */
2209 xfrd->reload_timeout.tv_sec = xfrd_time() +
2210 xfrd->nsd->options->xfrd_reload_timeout;
2211 xfrd->reload_timeout.tv_usec = 0;
2212 return;
2213 }
2214 /* cannot reload now, set that after the timeout a reload has to happen */
2215 if(xfrd->reload_added == 0) {
2216 struct timeval tv;
2217 tv.tv_sec = xfrd->reload_timeout.tv_sec - xfrd_time();
2218 tv.tv_usec = 0;
2219 if(tv.tv_sec > xfrd->nsd->options->xfrd_reload_timeout)
2220 tv.tv_sec = xfrd->nsd->options->xfrd_reload_timeout;
2221 memset(&xfrd->reload_handler, 0, sizeof(xfrd->reload_handler));
2222 event_set(&xfrd->reload_handler, -1, EV_TIMEOUT,
2223 xfrd_handle_reload, xfrd);
2224 if(event_base_set(xfrd->event_base, &xfrd->reload_handler) != 0)
2225 log_msg(LOG_ERR, "cannot set reload event base");
2226 if(event_add(&xfrd->reload_handler, &tv) != 0)
2227 log_msg(LOG_ERR, "cannot add reload event");
2228 xfrd->reload_added = 1;
2229 }
2230 }
2231
2232 static void
2233 xfrd_handle_reload(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2234 {
2235 /* reload timeout */
2236 assert(event & EV_TIMEOUT);
2237 (void)event;
2238 /* timeout wait period after this request is sent */
2239 xfrd->reload_added = 0;
2240 xfrd->reload_timeout.tv_sec = xfrd_time() +
2241 xfrd->nsd->options->xfrd_reload_timeout;
2242 xfrd_set_reload_now(xfrd);
2243 }
2244
2245 void
2246 xfrd_handle_notify_and_start_xfr(xfrd_zone_type* zone, xfrd_soa_type* soa)
2247 {
2248 if(xfrd_handle_incoming_notify(zone, soa)) {
2249 if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1 &&
2250 !zone->tcp_waiting && !zone->udp_waiting) {
2251 xfrd_set_refresh_now(zone);
2252 }
2253 /* zones with no content start expbackoff again; this is also
2254 * for nsd-control started transfer commands, and also when
2255 * the master apparently sends notifies (is back up) */
2256 if(zone->soa_disk_acquired == 0)
2257 zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
2258 }
2259 }
2260
2261 void
2262 xfrd_handle_passed_packet(buffer_type* packet,
2263 int acl_num, int acl_num_xfr)
2264 {
2265 uint8_t qnamebuf[MAXDOMAINLEN];
2266 uint16_t qtype, qclass;
2267 const dname_type* dname;
2268 region_type* tempregion = region_create(xalloc, free);
2269 xfrd_zone_type* zone;
2270
2271 buffer_skip(packet, QHEADERSZ);
2272 if(!packet_read_query_section(packet, qnamebuf, &qtype, &qclass)) {
2273 region_destroy(tempregion);
2274 return; /* drop bad packet */
2275 }
2276
2277 dname = dname_make(tempregion, qnamebuf, 1);
2278 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: got passed packet for %s, acl "
2279 "%d", dname_to_string(dname,0), acl_num));
2280
2281 /* find the zone */
2282 zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, dname);
2283 if(!zone) {
2284 /* this could be because the zone has been deleted meanwhile */
2285 DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "xfrd: incoming packet for "
2286 "unknown zone %s", dname_to_string(dname,0)));
2287 region_destroy(tempregion);
2288 return; /* drop packet for unknown zone */
2289 }
2290 region_destroy(tempregion);
2291
2292 /* handle */
2293 if(OPCODE(packet) == OPCODE_NOTIFY) {
2294 xfrd_soa_type soa;
2295 int have_soa = 0;
2296 int next;
2297 /* get serial from a SOA */
2298 if(ANCOUNT(packet) == 1 && packet_skip_dname(packet) &&
2299 xfrd_parse_soa_info(packet, &soa)) {
2300 have_soa = 1;
2301 }
2302 xfrd_handle_notify_and_start_xfr(zone, have_soa?&soa:NULL);
2303 /* First, see if our notifier has a match in provide-xfr */
2304 if (acl_find_num(zone->zone_options->pattern->request_xfr,
2305 acl_num_xfr))
2306 next = acl_num_xfr;
2307 else /* If not, find master that matches notifiers ACL entry */
2308 next = find_same_master_notify(zone, acl_num);
2309 if(next != -1) {
2310 zone->next_master = next;
2311 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2312 "xfrd: notify set next master to query %d",
2313 next));
2314 }
2315 }
2316 else {
2317 /* ignore other types of messages */
2318 }
2319 }
2320
2321 static int
2322 xfrd_handle_incoming_notify(xfrd_zone_type* zone, xfrd_soa_type* soa)
2323 {
2324 if(soa && zone->soa_disk_acquired && zone->state != xfrd_zone_expired &&
2325 compare_serial(ntohl(soa->serial),ntohl(zone->soa_disk.serial)) <= 0)
2326 {
2327 DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2328 "xfrd: ignored notify %s %u old serial, zone valid "
2329 "(soa disk serial %u)", zone->apex_str,
2330 (unsigned)ntohl(soa->serial),
2331 (unsigned)ntohl(zone->soa_disk.serial)));
2332 return 0; /* ignore notify with old serial, we have a valid zone */
2333 }
2334 if(soa == 0) {
2335 zone->soa_notified.serial = 0;
2336 }
2337 else if (zone->soa_notified_acquired == 0 ||
2338 zone->soa_notified.serial == 0 ||
2339 compare_serial(ntohl(soa->serial),
2340 ntohl(zone->soa_notified.serial)) > 0)
2341 {
2342 zone->soa_notified = *soa;
2343 }
2344 zone->soa_notified_acquired = xfrd_time();
2345 if(zone->state == xfrd_zone_ok) {
2346 xfrd_set_zone_state(zone, xfrd_zone_refreshing);
2347 }
2348 /* transfer right away */
2349 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "Handle incoming notify for zone %s",
2350 zone->apex_str));
2351 return 1;
2352 }
2353
2354 static int
2355 find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy)
2356 {
2357 struct acl_options* nfy_acl = acl_find_num(zone->zone_options->pattern->
2358 allow_notify, acl_num_nfy);
2359 int num = 0;
2360 struct acl_options* master = zone->zone_options->pattern->request_xfr;
2361 if(!nfy_acl)
2362 return -1;
2363 while(master)
2364 {
2365 if(acl_addr_matches_host(nfy_acl, master))
2366 return num;
2367 master = master->next;
2368 num++;
2369 }
2370 return -1;
2371 }
2372
2373 void
2374 xfrd_check_failed_updates()
2375 {
2376 /* see if updates have not come through */
2377 xfrd_zone_type* zone;
2378 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2379 {
2380 /* zone has a disk soa, and no nsd soa or a different nsd soa */
2381 if(zone->soa_disk_acquired != 0 &&
2382 (zone->soa_nsd_acquired == 0 ||
2383 zone->soa_disk.serial != zone->soa_nsd.serial))
2384 {
2385 if(zone->soa_disk_acquired <
2386 xfrd->reload_cmd_last_sent)
2387 {
2388 /* this zone should have been loaded, since its disk
2389 soa time is before the time of the reload cmd. */
2390 xfrd_soa_type dumped_soa = zone->soa_disk;
2391 log_msg(LOG_ERR, "xfrd: zone %s: soa serial %u "
2392 "update failed, restarting "
2393 "transfer (notified zone)",
2394 zone->apex_str, (unsigned)ntohl(zone->soa_disk.serial));
2395 /* revert the soa; it has not been acquired properly */
2396 if(zone->soa_disk_acquired == zone->soa_nsd_acquired) {
2397 /* this was the same as served,
2398 * perform force_axfr , re-download
2399 * same serial from master */
2400 zone->soa_disk_acquired = 0;
2401 zone->soa_nsd_acquired = 0;
2402 } else {
2403 /* revert soa to the one in server */
2404 zone->soa_disk_acquired = zone->soa_nsd_acquired;
2405 zone->soa_disk = zone->soa_nsd;
2406 }
2407 /* pretend we are notified with disk soa.
2408 This will cause a refetch of the data, and reload. */
2409 xfrd_handle_incoming_notify(zone, &dumped_soa);
2410 xfrd_set_timer_refresh(zone);
2411 } else if(zone->soa_disk_acquired >= xfrd->reload_cmd_last_sent) {
2412 /* this zone still has to be loaded,
2413 make sure reload is set to be sent. */
2414 if(xfrd->need_to_send_reload == 0 &&
2415 xfrd->reload_added == 0) {
2416 log_msg(LOG_ERR, "xfrd: zone %s: needs "
2417 "to be loaded. reload lost? "
2418 "try again", zone->apex_str);
2419 xfrd_set_reload_timeout();
2420 }
2421 }
2422 }
2423 }
2424 }
2425
2426 void
2427 xfrd_prepare_zones_for_reload()
2428 {
2429 xfrd_zone_type* zone;
2430 RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2431 {
2432 /* zone has a disk soa, and no nsd soa or a different nsd soa */
2433 if(zone->soa_disk_acquired != 0 &&
2434 (zone->soa_nsd_acquired == 0 ||
2435 zone->soa_disk.serial != zone->soa_nsd.serial))
2436 {
2437 if(zone->soa_disk_acquired == xfrd_time()) {
2438 /* antedate by one second.
2439 * this makes sure that the zone time is before
2440 * reload, so that check_failed_zones() is
2441 * certain of the result.
2442 */
2443 zone->soa_disk_acquired--;
2444 }
2445 }
2446 }
2447 }
2448
2449 struct buffer*
2450 xfrd_get_temp_buffer()
2451 {
2452 return xfrd->packet;
2453 }
2454
2455 #ifdef BIND8_STATS
2456 /** process stat info task */
2457 static void
2458 xfrd_process_stat_info_task(xfrd_state_type* xfrd, struct task_list_d* task)
2459 {
2460 size_t i;
2461 stc_type* p = (void*)((char*)task->zname + sizeof(struct nsdst));
2462 stats_add(&xfrd->nsd->st, (struct nsdst*)task->zname);
2463 for(i=0; i<xfrd->nsd->child_count; i++) {
2464 xfrd->nsd->children[i].query_count += *p++;
2465 }
2466 /* got total, now see if users are interested in these statistics */
2467 #ifdef HAVE_SSL
2468 daemon_remote_process_stats(xfrd->nsd->rc);
2469 #endif
2470 }
2471 #endif /* BIND8_STATS */
2472
2473 #ifdef USE_ZONE_STATS
2474 /** process zonestat inc task */
2475 static void
2476 xfrd_process_zonestat_inc_task(xfrd_state_type* xfrd, struct task_list_d* task)
2477 {
2478 xfrd->zonestat_safe = (unsigned)task->oldserial;
2479 zonestat_remap(xfrd->nsd, 0, xfrd->zonestat_safe*sizeof(struct nsdst));
2480 xfrd->nsd->zonestatsize[0] = xfrd->zonestat_safe;
2481 zonestat_remap(xfrd->nsd, 1, xfrd->zonestat_safe*sizeof(struct nsdst));
2482 xfrd->nsd->zonestatsize[1] = xfrd->zonestat_safe;
2483 }
2484 #endif /* USE_ZONE_STATS */
2485
2486 static void
2487 xfrd_handle_taskresult(xfrd_state_type* xfrd, struct task_list_d* task)
2488 {
2489 #ifndef BIND8_STATS
2490 (void)xfrd;
2491 #endif
2492 switch(task->task_type) {
2493 case task_soa_info:
2494 xfrd_process_soa_info_task(task);
2495 break;
2496 #ifdef BIND8_STATS
2497 case task_stat_info:
2498 xfrd_process_stat_info_task(xfrd, task);
2499 break;
2500 #endif /* BIND8_STATS */
2501 #ifdef USE_ZONE_STATS
2502 case task_zonestat_inc:
2503 xfrd_process_zonestat_inc_task(xfrd, task);
2504 break;
2505 #endif
2506 default:
2507 log_msg(LOG_WARNING, "unhandled task result in xfrd from "
2508 "reload type %d", (int)task->task_type);
2509 }
2510 }
2511
2512 void xfrd_process_task_result(xfrd_state_type* xfrd, struct udb_base* taskudb)
2513 {
2514 udb_ptr t;
2515 /* remap it for usage */
2516 task_remap(taskudb);
2517 /* process the task-results in the taskudb */
2518 udb_ptr_new(&t, taskudb, udb_base_get_userdata(taskudb));
2519 while(!udb_ptr_is_null(&t)) {
2520 xfrd_handle_taskresult(xfrd, TASKLIST(&t));
2521 udb_ptr_set_rptr(&t, taskudb, &TASKLIST(&t)->next);
2522 }
2523 udb_ptr_unlink(&t, taskudb);
2524 /* clear the udb so it can be used by xfrd to make new tasks for
2525 * reload, this happens when the reload signal is sent, and thus
2526 * the taskudbs are swapped */
2527 task_clear(taskudb);
2528 #ifdef HAVE_SYSTEMD
2529 sd_notify(0, "READY=1");
2530 #endif
2531 }
2532
2533 void xfrd_set_reload_now(xfrd_state_type* xfrd)
2534 {
2535 #ifdef HAVE_SYSTEMD
2536 sd_notify(0, "RELOADING=1");
2537 #endif
2538 xfrd->need_to_send_reload = 1;
2539 if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
2540 ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
2541 }
2542 }
2543
2544 static void
2545 xfrd_handle_write_timer(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2546 {
2547 /* timeout for write events */
2548 assert(event & EV_TIMEOUT);
2549 (void)event;
2550 if(xfrd->nsd->options->zonefiles_write == 0)
2551 return;
2552 /* call reload to write changed zonefiles */
2553 if(!xfrd->write_zonefile_needed) {
2554 DEBUG(DEBUG_XFRD,2, (LOG_INFO, "zonefiles write timer (nothing)"));
2555 xfrd_write_timer_set();
2556 return;
2557 }
2558 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "zonefiles write timer"));
2559 task_new_write_zonefiles(xfrd->nsd->task[xfrd->nsd->mytask],
2560 xfrd->last_task, NULL);
2561 xfrd_set_reload_now(xfrd);
2562 xfrd->write_zonefile_needed = 0;
2563 xfrd_write_timer_set();
2564 }
2565
2566 static void xfrd_write_timer_set()
2567 {
2568 struct timeval tv;
2569 if(xfrd->nsd->options->zonefiles_write == 0)
2570 return;
2571 tv.tv_sec = xfrd->nsd->options->zonefiles_write;
2572 tv.tv_usec = 0;
2573 memset(&xfrd->write_timer, 0, sizeof(xfrd->write_timer));
2574 event_set(&xfrd->write_timer, -1, EV_TIMEOUT,
2575 xfrd_handle_write_timer, xfrd);
2576 if(event_base_set(xfrd->event_base, &xfrd->write_timer) != 0)
2577 log_msg(LOG_ERR, "xfrd write timer: event_base_set failed");
2578 if(event_add(&xfrd->write_timer, &tv) != 0)
2579 log_msg(LOG_ERR, "xfrd write timer: event_add failed");
2580 }
2581
2582 static void xfrd_handle_child_timer(int ATTR_UNUSED(fd), short event,
2583 void* ATTR_UNUSED(arg))
2584 {
2585 assert(event & EV_TIMEOUT);
2586 (void)event;
2587 /* only used to wakeup the process to reap children, note the
2588 * event is no longer registered */
2589 xfrd->child_timer_added = 0;
2590 }
2591