nsec3.c revision 1.4 1 1.4 christos /* $NetBSD: nsec3.c,v 1.4 2019/02/24 20:01:30 christos Exp $ */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
5 1.1 christos *
6 1.1 christos * This Source Code Form is subject to the terms of the Mozilla Public
7 1.1 christos * License, v. 2.0. If a copy of the MPL was not distributed with this
8 1.1 christos * file, You can obtain one at http://mozilla.org/MPL/2.0/.
9 1.1 christos *
10 1.1 christos * See the COPYRIGHT file distributed with this work for additional
11 1.1 christos * information regarding copyright ownership.
12 1.1 christos */
13 1.1 christos
14 1.1 christos
15 1.1 christos #include <config.h>
16 1.1 christos
17 1.3 christos #include <inttypes.h>
18 1.3 christos #include <stdbool.h>
19 1.3 christos
20 1.1 christos #include <isc/base32.h>
21 1.1 christos #include <isc/buffer.h>
22 1.1 christos #include <isc/hex.h>
23 1.1 christos #include <isc/iterated_hash.h>
24 1.1 christos #include <isc/log.h>
25 1.3 christos #include <isc/md.h>
26 1.1 christos #include <isc/string.h>
27 1.1 christos #include <isc/util.h>
28 1.1 christos #include <isc/safe.h>
29 1.1 christos
30 1.1 christos #include <dst/dst.h>
31 1.1 christos
32 1.1 christos #include <dns/db.h>
33 1.1 christos #include <dns/zone.h>
34 1.1 christos #include <dns/compress.h>
35 1.1 christos #include <dns/dbiterator.h>
36 1.1 christos #include <dns/diff.h>
37 1.1 christos #include <dns/fixedname.h>
38 1.1 christos #include <dns/nsec.h>
39 1.1 christos #include <dns/nsec3.h>
40 1.1 christos #include <dns/rdata.h>
41 1.1 christos #include <dns/rdatalist.h>
42 1.1 christos #include <dns/rdataset.h>
43 1.1 christos #include <dns/rdatasetiter.h>
44 1.1 christos #include <dns/rdatastruct.h>
45 1.1 christos #include <dns/result.h>
46 1.1 christos
47 1.1 christos #define CHECK(x) do { \
48 1.1 christos result = (x); \
49 1.1 christos if (result != ISC_R_SUCCESS) \
50 1.1 christos goto failure; \
51 1.2 christos } while (/*CONSTCOND*/0)
52 1.1 christos
53 1.1 christos #define OPTOUT(x) (((x) & DNS_NSEC3FLAG_OPTOUT) != 0)
54 1.1 christos #define CREATE(x) (((x) & DNS_NSEC3FLAG_CREATE) != 0)
55 1.1 christos #define INITIAL(x) (((x) & DNS_NSEC3FLAG_INITIAL) != 0)
56 1.1 christos #define REMOVE(x) (((x) & DNS_NSEC3FLAG_REMOVE) != 0)
57 1.1 christos
58 1.1 christos isc_result_t
59 1.1 christos dns_nsec3_buildrdata(dns_db_t *db, dns_dbversion_t *version,
60 1.1 christos dns_dbnode_t *node, unsigned int hashalg,
61 1.1 christos unsigned int flags, unsigned int iterations,
62 1.1 christos const unsigned char *salt, size_t salt_length,
63 1.1 christos const unsigned char *nexthash, size_t hash_length,
64 1.1 christos unsigned char *buffer, dns_rdata_t *rdata)
65 1.1 christos {
66 1.1 christos isc_result_t result;
67 1.1 christos dns_rdataset_t rdataset;
68 1.1 christos isc_region_t r;
69 1.1 christos unsigned int i;
70 1.3 christos bool found;
71 1.3 christos bool found_ns;
72 1.3 christos bool need_rrsig;
73 1.1 christos
74 1.1 christos unsigned char *nsec_bits, *bm;
75 1.1 christos unsigned int max_type;
76 1.1 christos dns_rdatasetiter_t *rdsiter;
77 1.1 christos unsigned char *p;
78 1.1 christos
79 1.1 christos REQUIRE(salt_length < 256U);
80 1.1 christos REQUIRE(hash_length < 256U);
81 1.1 christos REQUIRE(flags <= 0xffU);
82 1.1 christos REQUIRE(hashalg <= 0xffU);
83 1.1 christos REQUIRE(iterations <= 0xffffU);
84 1.1 christos
85 1.1 christos switch (hashalg) {
86 1.1 christos case dns_hash_sha1:
87 1.1 christos REQUIRE(hash_length == ISC_SHA1_DIGESTLENGTH);
88 1.1 christos break;
89 1.1 christos }
90 1.1 christos
91 1.1 christos memset(buffer, 0, DNS_NSEC3_BUFFERSIZE);
92 1.1 christos
93 1.1 christos p = buffer;
94 1.1 christos
95 1.1 christos *p++ = hashalg;
96 1.1 christos *p++ = flags;
97 1.1 christos
98 1.1 christos *p++ = iterations >> 8;
99 1.1 christos *p++ = iterations;
100 1.1 christos
101 1.1 christos *p++ = (unsigned char)salt_length;
102 1.1 christos memmove(p, salt, salt_length);
103 1.1 christos p += salt_length;
104 1.1 christos
105 1.1 christos *p++ = (unsigned char)hash_length;
106 1.1 christos memmove(p, nexthash, hash_length);
107 1.1 christos p += hash_length;
108 1.1 christos
109 1.1 christos r.length = (unsigned int)(p - buffer);
110 1.1 christos r.base = buffer;
111 1.1 christos
112 1.1 christos /*
113 1.1 christos * Use the end of the space for a raw bitmap leaving enough
114 1.1 christos * space for the window identifiers and length octets.
115 1.1 christos */
116 1.1 christos bm = r.base + r.length + 512;
117 1.1 christos nsec_bits = r.base + r.length;
118 1.1 christos max_type = 0;
119 1.1 christos if (node == NULL)
120 1.1 christos goto collapse_bitmap;
121 1.1 christos dns_rdataset_init(&rdataset);
122 1.1 christos rdsiter = NULL;
123 1.1 christos result = dns_db_allrdatasets(db, node, version, 0, &rdsiter);
124 1.1 christos if (result != ISC_R_SUCCESS)
125 1.1 christos return (result);
126 1.3 christos found = found_ns = need_rrsig = false;
127 1.1 christos for (result = dns_rdatasetiter_first(rdsiter);
128 1.1 christos result == ISC_R_SUCCESS;
129 1.1 christos result = dns_rdatasetiter_next(rdsiter))
130 1.1 christos {
131 1.1 christos dns_rdatasetiter_current(rdsiter, &rdataset);
132 1.1 christos if (rdataset.type != dns_rdatatype_nsec &&
133 1.1 christos rdataset.type != dns_rdatatype_nsec3 &&
134 1.1 christos rdataset.type != dns_rdatatype_rrsig) {
135 1.1 christos if (rdataset.type > max_type)
136 1.1 christos max_type = rdataset.type;
137 1.1 christos dns_nsec_setbit(bm, rdataset.type, 1);
138 1.1 christos /*
139 1.1 christos * Work out if we need to set the RRSIG bit for
140 1.1 christos * this node. We set the RRSIG bit if either of
141 1.1 christos * the following conditions are met:
142 1.1 christos * 1) We have a SOA or DS then we need to set
143 1.1 christos * the RRSIG bit as both always will be signed.
144 1.1 christos * 2) We set the RRSIG bit if we don't have
145 1.1 christos * a NS record but do have other data.
146 1.1 christos */
147 1.1 christos if (rdataset.type == dns_rdatatype_soa ||
148 1.1 christos rdataset.type == dns_rdatatype_ds)
149 1.3 christos need_rrsig = true;
150 1.1 christos else if (rdataset.type == dns_rdatatype_ns)
151 1.3 christos found_ns = true;
152 1.1 christos else
153 1.3 christos found = true;
154 1.1 christos }
155 1.1 christos dns_rdataset_disassociate(&rdataset);
156 1.1 christos }
157 1.1 christos if ((found && !found_ns) || need_rrsig) {
158 1.1 christos if (dns_rdatatype_rrsig > max_type)
159 1.1 christos max_type = dns_rdatatype_rrsig;
160 1.1 christos dns_nsec_setbit(bm, dns_rdatatype_rrsig, 1);
161 1.1 christos }
162 1.1 christos
163 1.1 christos /*
164 1.1 christos * At zone cuts, deny the existence of glue in the parent zone.
165 1.1 christos */
166 1.1 christos if (dns_nsec_isset(bm, dns_rdatatype_ns) &&
167 1.1 christos ! dns_nsec_isset(bm, dns_rdatatype_soa)) {
168 1.1 christos for (i = 0; i <= max_type; i++) {
169 1.1 christos if (dns_nsec_isset(bm, i) &&
170 1.1 christos ! dns_rdatatype_iszonecutauth((dns_rdatatype_t)i))
171 1.1 christos dns_nsec_setbit(bm, i, 0);
172 1.1 christos }
173 1.1 christos }
174 1.1 christos
175 1.1 christos dns_rdatasetiter_destroy(&rdsiter);
176 1.1 christos if (result != ISC_R_NOMORE)
177 1.1 christos return (result);
178 1.1 christos
179 1.1 christos collapse_bitmap:
180 1.1 christos nsec_bits += dns_nsec_compressbitmap(nsec_bits, bm, max_type);
181 1.1 christos r.length = (unsigned int)(nsec_bits - r.base);
182 1.1 christos INSIST(r.length <= DNS_NSEC3_BUFFERSIZE);
183 1.1 christos dns_rdata_fromregion(rdata, dns_db_class(db), dns_rdatatype_nsec3, &r);
184 1.1 christos
185 1.1 christos return (ISC_R_SUCCESS);
186 1.1 christos }
187 1.1 christos
188 1.3 christos bool
189 1.1 christos dns_nsec3_typepresent(dns_rdata_t *rdata, dns_rdatatype_t type) {
190 1.1 christos dns_rdata_nsec3_t nsec3;
191 1.1 christos isc_result_t result;
192 1.3 christos bool present;
193 1.1 christos unsigned int i, len, window;
194 1.1 christos
195 1.1 christos REQUIRE(rdata != NULL);
196 1.1 christos REQUIRE(rdata->type == dns_rdatatype_nsec3);
197 1.1 christos
198 1.1 christos /* This should never fail */
199 1.1 christos result = dns_rdata_tostruct(rdata, &nsec3, NULL);
200 1.1 christos INSIST(result == ISC_R_SUCCESS);
201 1.1 christos
202 1.3 christos present = false;
203 1.1 christos for (i = 0; i < nsec3.len; i += len) {
204 1.1 christos INSIST(i + 2 <= nsec3.len);
205 1.1 christos window = nsec3.typebits[i];
206 1.1 christos len = nsec3.typebits[i + 1];
207 1.1 christos INSIST(len > 0 && len <= 32);
208 1.1 christos i += 2;
209 1.1 christos INSIST(i + len <= nsec3.len);
210 1.1 christos if (window * 256 > type)
211 1.1 christos break;
212 1.1 christos if ((window + 1) * 256 <= type)
213 1.1 christos continue;
214 1.3 christos if (type < (window * 256) + len * 8) {
215 1.3 christos present = dns_nsec_isset(&nsec3.typebits[i],
216 1.3 christos type % 256);
217 1.3 christos }
218 1.1 christos break;
219 1.1 christos }
220 1.1 christos dns_rdata_freestruct(&nsec3);
221 1.1 christos return (present);
222 1.1 christos }
223 1.1 christos
224 1.1 christos isc_result_t
225 1.1 christos dns_nsec3_hashname(dns_fixedname_t *result,
226 1.1 christos unsigned char rethash[NSEC3_MAX_HASH_LENGTH],
227 1.1 christos size_t *hash_length, const dns_name_t *name,
228 1.1 christos const dns_name_t *origin,
229 1.1 christos dns_hash_t hashalg, unsigned int iterations,
230 1.1 christos const unsigned char *salt, size_t saltlength)
231 1.1 christos {
232 1.1 christos unsigned char hash[NSEC3_MAX_HASH_LENGTH];
233 1.1 christos unsigned char nametext[DNS_NAME_FORMATSIZE];
234 1.1 christos dns_fixedname_t fixed;
235 1.1 christos dns_name_t *downcased;
236 1.1 christos isc_buffer_t namebuffer;
237 1.1 christos isc_region_t region;
238 1.1 christos size_t len;
239 1.1 christos
240 1.1 christos if (rethash == NULL)
241 1.1 christos rethash = hash;
242 1.1 christos
243 1.1 christos memset(rethash, 0, NSEC3_MAX_HASH_LENGTH);
244 1.1 christos
245 1.1 christos downcased = dns_fixedname_initname(&fixed);
246 1.1 christos dns_name_downcase(name, downcased, NULL);
247 1.1 christos
248 1.1 christos /* hash the node name */
249 1.1 christos len = isc_iterated_hash(rethash, hashalg, iterations,
250 1.1 christos salt, (int)saltlength,
251 1.1 christos downcased->ndata, downcased->length);
252 1.1 christos if (len == 0U)
253 1.1 christos return (DNS_R_BADALG);
254 1.1 christos
255 1.1 christos if (hash_length != NULL)
256 1.1 christos *hash_length = len;
257 1.1 christos
258 1.1 christos /* convert the hash to base32hex non-padded */
259 1.1 christos region.base = rethash;
260 1.1 christos region.length = (unsigned int)len;
261 1.1 christos isc_buffer_init(&namebuffer, nametext, sizeof nametext);
262 1.1 christos isc_base32hexnp_totext(®ion, 1, "", &namebuffer);
263 1.1 christos
264 1.1 christos /* convert the hex to a domain name */
265 1.1 christos dns_fixedname_init(result);
266 1.1 christos return (dns_name_fromtext(dns_fixedname_name(result), &namebuffer,
267 1.1 christos origin, 0, NULL));
268 1.1 christos }
269 1.1 christos
270 1.1 christos unsigned int
271 1.1 christos dns_nsec3_hashlength(dns_hash_t hash) {
272 1.1 christos
273 1.1 christos switch (hash) {
274 1.1 christos case dns_hash_sha1:
275 1.1 christos return(ISC_SHA1_DIGESTLENGTH);
276 1.1 christos }
277 1.1 christos return (0);
278 1.1 christos }
279 1.1 christos
280 1.3 christos bool
281 1.1 christos dns_nsec3_supportedhash(dns_hash_t hash) {
282 1.1 christos switch (hash) {
283 1.1 christos case dns_hash_sha1:
284 1.3 christos return (true);
285 1.1 christos }
286 1.3 christos return (false);
287 1.1 christos }
288 1.1 christos
289 1.1 christos /*%
290 1.1 christos * Update a single RR in version 'ver' of 'db' and log the
291 1.1 christos * update in 'diff'.
292 1.1 christos *
293 1.1 christos * Ensures:
294 1.1 christos * \li '*tuple' == NULL. Either the tuple is freed, or its
295 1.1 christos * ownership has been transferred to the diff.
296 1.1 christos */
297 1.1 christos static isc_result_t
298 1.1 christos do_one_tuple(dns_difftuple_t **tuple, dns_db_t *db, dns_dbversion_t *ver,
299 1.1 christos dns_diff_t *diff)
300 1.1 christos {
301 1.1 christos dns_diff_t temp_diff;
302 1.1 christos isc_result_t result;
303 1.1 christos
304 1.1 christos /*
305 1.1 christos * Create a singleton diff.
306 1.1 christos */
307 1.1 christos dns_diff_init(diff->mctx, &temp_diff);
308 1.1 christos ISC_LIST_APPEND(temp_diff.tuples, *tuple, link);
309 1.1 christos
310 1.1 christos /*
311 1.1 christos * Apply it to the database.
312 1.1 christos */
313 1.1 christos result = dns_diff_apply(&temp_diff, db, ver);
314 1.1 christos ISC_LIST_UNLINK(temp_diff.tuples, *tuple, link);
315 1.1 christos if (result != ISC_R_SUCCESS) {
316 1.1 christos dns_difftuple_free(tuple);
317 1.1 christos return (result);
318 1.1 christos }
319 1.1 christos
320 1.1 christos /*
321 1.1 christos * Merge it into the current pending journal entry.
322 1.1 christos */
323 1.1 christos dns_diff_appendminimal(diff, tuple);
324 1.1 christos
325 1.1 christos /*
326 1.1 christos * Do not clear temp_diff.
327 1.1 christos */
328 1.1 christos return (ISC_R_SUCCESS);
329 1.1 christos }
330 1.1 christos
331 1.1 christos /*%
332 1.1 christos * Set '*exists' to true iff the given name exists, to false otherwise.
333 1.1 christos */
334 1.1 christos static isc_result_t
335 1.1 christos name_exists(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
336 1.3 christos bool *exists)
337 1.1 christos {
338 1.1 christos isc_result_t result;
339 1.1 christos dns_dbnode_t *node = NULL;
340 1.1 christos dns_rdatasetiter_t *iter = NULL;
341 1.1 christos
342 1.3 christos result = dns_db_findnode(db, name, false, &node);
343 1.1 christos if (result == ISC_R_NOTFOUND) {
344 1.3 christos *exists = false;
345 1.1 christos return (ISC_R_SUCCESS);
346 1.1 christos }
347 1.1 christos if (result != ISC_R_SUCCESS)
348 1.1 christos return (result);
349 1.1 christos
350 1.1 christos result = dns_db_allrdatasets(db, node, version,
351 1.1 christos (isc_stdtime_t) 0, &iter);
352 1.1 christos if (result != ISC_R_SUCCESS)
353 1.1 christos goto cleanup_node;
354 1.1 christos
355 1.1 christos result = dns_rdatasetiter_first(iter);
356 1.1 christos if (result == ISC_R_SUCCESS) {
357 1.3 christos *exists = true;
358 1.1 christos } else if (result == ISC_R_NOMORE) {
359 1.3 christos *exists = false;
360 1.1 christos result = ISC_R_SUCCESS;
361 1.1 christos } else
362 1.3 christos *exists = false;
363 1.1 christos dns_rdatasetiter_destroy(&iter);
364 1.1 christos
365 1.1 christos cleanup_node:
366 1.1 christos dns_db_detachnode(db, &node);
367 1.1 christos return (result);
368 1.1 christos }
369 1.1 christos
370 1.3 christos static bool
371 1.1 christos match_nsec3param(const dns_rdata_nsec3_t *nsec3,
372 1.1 christos const dns_rdata_nsec3param_t *nsec3param)
373 1.1 christos {
374 1.1 christos if (nsec3->hash == nsec3param->hash &&
375 1.1 christos nsec3->iterations == nsec3param->iterations &&
376 1.1 christos nsec3->salt_length == nsec3param->salt_length &&
377 1.1 christos !memcmp(nsec3->salt, nsec3param->salt, nsec3->salt_length))
378 1.3 christos return (true);
379 1.3 christos return (false);
380 1.1 christos }
381 1.1 christos
382 1.1 christos /*%
383 1.1 christos * Delete NSEC3 records at "name" which match "param", recording the
384 1.1 christos * change in "diff".
385 1.1 christos */
386 1.1 christos static isc_result_t
387 1.1 christos delnsec3(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
388 1.1 christos const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff)
389 1.1 christos {
390 1.1 christos dns_dbnode_t *node = NULL ;
391 1.1 christos dns_difftuple_t *tuple = NULL;
392 1.1 christos dns_rdata_nsec3_t nsec3;
393 1.1 christos dns_rdataset_t rdataset;
394 1.1 christos isc_result_t result;
395 1.1 christos
396 1.3 christos result = dns_db_findnsec3node(db, name, false, &node);
397 1.1 christos if (result == ISC_R_NOTFOUND)
398 1.1 christos return (ISC_R_SUCCESS);
399 1.1 christos if (result != ISC_R_SUCCESS)
400 1.1 christos return (result);
401 1.1 christos
402 1.1 christos dns_rdataset_init(&rdataset);
403 1.1 christos result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3, 0,
404 1.1 christos (isc_stdtime_t) 0, &rdataset, NULL);
405 1.1 christos
406 1.1 christos if (result == ISC_R_NOTFOUND) {
407 1.1 christos result = ISC_R_SUCCESS;
408 1.1 christos goto cleanup_node;
409 1.1 christos }
410 1.1 christos if (result != ISC_R_SUCCESS)
411 1.1 christos goto cleanup_node;
412 1.1 christos
413 1.1 christos for (result = dns_rdataset_first(&rdataset);
414 1.1 christos result == ISC_R_SUCCESS;
415 1.1 christos result = dns_rdataset_next(&rdataset))
416 1.1 christos {
417 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
418 1.1 christos dns_rdataset_current(&rdataset, &rdata);
419 1.1 christos CHECK(dns_rdata_tostruct(&rdata, &nsec3, NULL));
420 1.1 christos
421 1.1 christos if (!match_nsec3param(&nsec3, nsec3param))
422 1.1 christos continue;
423 1.1 christos
424 1.1 christos result = dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, name,
425 1.1 christos rdataset.ttl, &rdata, &tuple);
426 1.1 christos if (result != ISC_R_SUCCESS)
427 1.1 christos goto failure;
428 1.1 christos result = do_one_tuple(&tuple, db, version, diff);
429 1.1 christos if (result != ISC_R_SUCCESS)
430 1.1 christos goto failure;
431 1.1 christos }
432 1.1 christos if (result != ISC_R_NOMORE)
433 1.1 christos goto failure;
434 1.1 christos result = ISC_R_SUCCESS;
435 1.1 christos
436 1.1 christos failure:
437 1.1 christos dns_rdataset_disassociate(&rdataset);
438 1.1 christos cleanup_node:
439 1.1 christos dns_db_detachnode(db, &node);
440 1.1 christos
441 1.1 christos return (result);
442 1.1 christos }
443 1.1 christos
444 1.3 christos static bool
445 1.1 christos better_param(dns_rdataset_t *nsec3paramset, dns_rdata_t *param) {
446 1.1 christos dns_rdataset_t rdataset;
447 1.1 christos isc_result_t result;
448 1.1 christos
449 1.1 christos if (REMOVE(param->data[1]))
450 1.3 christos return (true);
451 1.1 christos
452 1.1 christos dns_rdataset_init(&rdataset);
453 1.1 christos dns_rdataset_clone(nsec3paramset, &rdataset);
454 1.1 christos for (result = dns_rdataset_first(&rdataset);
455 1.1 christos result == ISC_R_SUCCESS;
456 1.1 christos result = dns_rdataset_next(&rdataset)) {
457 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
458 1.1 christos unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
459 1.1 christos
460 1.1 christos if (rdataset.type != dns_rdatatype_nsec3param) {
461 1.1 christos dns_rdata_t tmprdata = DNS_RDATA_INIT;
462 1.1 christos dns_rdataset_current(&rdataset, &tmprdata);
463 1.1 christos if (!dns_nsec3param_fromprivate(&tmprdata, &rdata,
464 1.1 christos buf, sizeof(buf)))
465 1.1 christos continue;
466 1.1 christos } else
467 1.1 christos dns_rdataset_current(&rdataset, &rdata);
468 1.1 christos
469 1.1 christos if (rdata.length != param->length)
470 1.1 christos continue;
471 1.1 christos if (rdata.data[0] != param->data[0] ||
472 1.1 christos REMOVE(rdata.data[1]) ||
473 1.1 christos rdata.data[2] != param->data[2] ||
474 1.1 christos rdata.data[3] != param->data[3] ||
475 1.1 christos rdata.data[4] != param->data[4] ||
476 1.1 christos memcmp(&rdata.data[5], ¶m->data[5], param->data[4]))
477 1.1 christos continue;
478 1.1 christos if (CREATE(rdata.data[1]) && !CREATE(param->data[1])) {
479 1.1 christos dns_rdataset_disassociate(&rdataset);
480 1.3 christos return (true);
481 1.1 christos }
482 1.1 christos }
483 1.1 christos dns_rdataset_disassociate(&rdataset);
484 1.3 christos return (false);
485 1.1 christos }
486 1.1 christos
487 1.1 christos static isc_result_t
488 1.1 christos find_nsec3(dns_rdata_nsec3_t *nsec3, dns_rdataset_t *rdataset,
489 1.1 christos const dns_rdata_nsec3param_t *nsec3param)
490 1.1 christos {
491 1.1 christos isc_result_t result;
492 1.1 christos for (result = dns_rdataset_first(rdataset);
493 1.1 christos result == ISC_R_SUCCESS;
494 1.1 christos result = dns_rdataset_next(rdataset)) {
495 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
496 1.1 christos
497 1.1 christos dns_rdataset_current(rdataset, &rdata);
498 1.1 christos CHECK(dns_rdata_tostruct(&rdata, nsec3, NULL));
499 1.1 christos dns_rdata_reset(&rdata);
500 1.1 christos if (match_nsec3param(nsec3, nsec3param))
501 1.1 christos break;
502 1.1 christos }
503 1.1 christos failure:
504 1.1 christos return (result);
505 1.1 christos }
506 1.1 christos
507 1.1 christos isc_result_t
508 1.1 christos dns_nsec3_addnsec3(dns_db_t *db, dns_dbversion_t *version,
509 1.1 christos const dns_name_t *name,
510 1.1 christos const dns_rdata_nsec3param_t *nsec3param,
511 1.3 christos dns_ttl_t nsecttl, bool unsecure, dns_diff_t *diff)
512 1.1 christos {
513 1.1 christos dns_dbiterator_t *dbit = NULL;
514 1.1 christos dns_dbnode_t *node = NULL;
515 1.1 christos dns_dbnode_t *newnode = NULL;
516 1.1 christos dns_difftuple_t *tuple = NULL;
517 1.1 christos dns_fixedname_t fixed;
518 1.1 christos dns_fixedname_t fprev;
519 1.1 christos dns_hash_t hash;
520 1.1 christos dns_name_t *hashname;
521 1.1 christos dns_name_t *origin;
522 1.1 christos dns_name_t *prev;
523 1.1 christos dns_name_t empty;
524 1.1 christos dns_rdata_nsec3_t nsec3;
525 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
526 1.1 christos dns_rdataset_t rdataset;
527 1.1 christos int pass;
528 1.3 christos bool exists = false;
529 1.3 christos bool maybe_remove_unsecure = false;
530 1.3 christos uint8_t flags;
531 1.1 christos isc_buffer_t buffer;
532 1.1 christos isc_result_t result;
533 1.1 christos unsigned char *old_next;
534 1.1 christos unsigned char *salt;
535 1.1 christos unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
536 1.1 christos unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
537 1.1 christos unsigned int iterations;
538 1.1 christos unsigned int labels;
539 1.1 christos size_t next_length;
540 1.1 christos unsigned int old_length;
541 1.1 christos unsigned int salt_length;
542 1.1 christos
543 1.1 christos hashname = dns_fixedname_initname(&fixed);
544 1.1 christos prev = dns_fixedname_initname(&fprev);
545 1.1 christos
546 1.1 christos dns_rdataset_init(&rdataset);
547 1.1 christos
548 1.1 christos origin = dns_db_origin(db);
549 1.1 christos
550 1.1 christos /*
551 1.1 christos * Chain parameters.
552 1.1 christos */
553 1.1 christos hash = nsec3param->hash;
554 1.1 christos iterations = nsec3param->iterations;
555 1.1 christos salt_length = nsec3param->salt_length;
556 1.1 christos salt = nsec3param->salt;
557 1.1 christos
558 1.1 christos /*
559 1.1 christos * Default flags for a new chain.
560 1.1 christos */
561 1.1 christos flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
562 1.1 christos
563 1.1 christos /*
564 1.1 christos * If this is the first NSEC3 in the chain nexthash will
565 1.1 christos * remain pointing to itself.
566 1.1 christos */
567 1.1 christos next_length = sizeof(nexthash);
568 1.1 christos CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length,
569 1.1 christos name, origin, hash, iterations,
570 1.1 christos salt, salt_length));
571 1.1 christos INSIST(next_length <= sizeof(nexthash));
572 1.1 christos
573 1.1 christos /*
574 1.1 christos * Create the node if it doesn't exist and hold
575 1.1 christos * a reference to it until we have added the NSEC3.
576 1.1 christos */
577 1.3 christos CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
578 1.1 christos
579 1.1 christos /*
580 1.1 christos * Seek the iterator to the 'newnode'.
581 1.1 christos */
582 1.1 christos CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
583 1.1 christos CHECK(dns_dbiterator_seek(dbit, hashname));
584 1.1 christos CHECK(dns_dbiterator_pause(dbit));
585 1.1 christos result = dns_db_findrdataset(db, newnode, version, dns_rdatatype_nsec3,
586 1.1 christos 0, (isc_stdtime_t) 0, &rdataset, NULL);
587 1.1 christos /*
588 1.1 christos * If we updating a existing NSEC3 then find its
589 1.1 christos * next field.
590 1.1 christos */
591 1.1 christos if (result == ISC_R_SUCCESS) {
592 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
593 1.1 christos if (result == ISC_R_SUCCESS) {
594 1.1 christos if (!CREATE(nsec3param->flags))
595 1.1 christos flags = nsec3.flags;
596 1.1 christos next_length = nsec3.next_length;
597 1.1 christos INSIST(next_length <= sizeof(nexthash));
598 1.1 christos memmove(nexthash, nsec3.next, next_length);
599 1.1 christos dns_rdataset_disassociate(&rdataset);
600 1.1 christos /*
601 1.1 christos * If the NSEC3 is not for a unsecure delegation then
602 1.1 christos * we are just updating it. If it is for a unsecure
603 1.1 christos * delegation then we need find out if we need to
604 1.1 christos * remove the NSEC3 record or not by examining the
605 1.1 christos * previous NSEC3 record.
606 1.1 christos */
607 1.1 christos if (!unsecure)
608 1.1 christos goto addnsec3;
609 1.1 christos else if (CREATE(nsec3param->flags) && OPTOUT(flags)) {
610 1.1 christos result = dns_nsec3_delnsec3(db, version, name,
611 1.1 christos nsec3param, diff);
612 1.1 christos goto failure;
613 1.1 christos } else
614 1.3 christos maybe_remove_unsecure = true;
615 1.1 christos } else {
616 1.1 christos dns_rdataset_disassociate(&rdataset);
617 1.1 christos if (result != ISC_R_NOMORE)
618 1.1 christos goto failure;
619 1.1 christos }
620 1.1 christos }
621 1.1 christos
622 1.1 christos /*
623 1.1 christos * Find the previous NSEC3 (if any) and update it if required.
624 1.1 christos */
625 1.1 christos pass = 0;
626 1.1 christos do {
627 1.1 christos result = dns_dbiterator_prev(dbit);
628 1.1 christos if (result == ISC_R_NOMORE) {
629 1.1 christos pass++;
630 1.1 christos CHECK(dns_dbiterator_last(dbit));
631 1.1 christos }
632 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, prev));
633 1.1 christos CHECK(dns_dbiterator_pause(dbit));
634 1.1 christos result = dns_db_findrdataset(db, node, version,
635 1.1 christos dns_rdatatype_nsec3, 0,
636 1.1 christos (isc_stdtime_t) 0, &rdataset,
637 1.1 christos NULL);
638 1.1 christos dns_db_detachnode(db, &node);
639 1.1 christos if (result != ISC_R_SUCCESS)
640 1.1 christos continue;
641 1.1 christos
642 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
643 1.1 christos if (result == ISC_R_NOMORE) {
644 1.1 christos dns_rdataset_disassociate(&rdataset);
645 1.1 christos continue;
646 1.1 christos }
647 1.1 christos if (result != ISC_R_SUCCESS)
648 1.1 christos goto failure;
649 1.1 christos
650 1.1 christos if (maybe_remove_unsecure) {
651 1.1 christos dns_rdataset_disassociate(&rdataset);
652 1.1 christos /*
653 1.1 christos * If we have OPTOUT set in the previous NSEC3 record
654 1.1 christos * we actually need to delete the NSEC3 record.
655 1.1 christos * Otherwise we just need to replace the NSEC3 record.
656 1.1 christos */
657 1.1 christos if (OPTOUT(nsec3.flags)) {
658 1.1 christos result = dns_nsec3_delnsec3(db, version, name,
659 1.1 christos nsec3param, diff);
660 1.1 christos goto failure;
661 1.1 christos }
662 1.1 christos goto addnsec3;
663 1.1 christos } else {
664 1.1 christos /*
665 1.1 christos * Is this is a unsecure delegation we are adding?
666 1.1 christos * If so no change is required.
667 1.1 christos */
668 1.1 christos if (OPTOUT(nsec3.flags) && unsecure) {
669 1.1 christos dns_rdataset_disassociate(&rdataset);
670 1.1 christos goto failure;
671 1.1 christos }
672 1.1 christos }
673 1.1 christos
674 1.1 christos old_next = nsec3.next;
675 1.1 christos old_length = nsec3.next_length;
676 1.1 christos
677 1.1 christos /*
678 1.1 christos * Delete the old previous NSEC3.
679 1.1 christos */
680 1.1 christos CHECK(delnsec3(db, version, prev, nsec3param, diff));
681 1.1 christos
682 1.1 christos /*
683 1.1 christos * Fixup the previous NSEC3.
684 1.1 christos */
685 1.1 christos nsec3.next = nexthash;
686 1.1 christos nsec3.next_length = (unsigned char)next_length;
687 1.1 christos isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
688 1.1 christos CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
689 1.1 christos dns_rdatatype_nsec3, &nsec3,
690 1.1 christos &buffer));
691 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
692 1.1 christos rdataset.ttl, &rdata, &tuple));
693 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
694 1.1 christos INSIST(old_length <= sizeof(nexthash));
695 1.1 christos memmove(nexthash, old_next, old_length);
696 1.1 christos if (!CREATE(nsec3param->flags))
697 1.1 christos flags = nsec3.flags;
698 1.1 christos dns_rdata_reset(&rdata);
699 1.1 christos dns_rdataset_disassociate(&rdataset);
700 1.1 christos break;
701 1.1 christos } while (pass < 2);
702 1.1 christos
703 1.1 christos addnsec3:
704 1.1 christos /*
705 1.1 christos * Create the NSEC3 RDATA.
706 1.1 christos */
707 1.3 christos CHECK(dns_db_findnode(db, name, false, &node));
708 1.1 christos CHECK(dns_nsec3_buildrdata(db, version, node, hash, flags, iterations,
709 1.1 christos salt, salt_length, nexthash, next_length,
710 1.1 christos nsec3buf, &rdata));
711 1.1 christos dns_db_detachnode(db, &node);
712 1.1 christos
713 1.1 christos /*
714 1.1 christos * Delete the old NSEC3 and record the change.
715 1.1 christos */
716 1.1 christos CHECK(delnsec3(db, version, hashname, nsec3param, diff));
717 1.1 christos /*
718 1.1 christos * Add the new NSEC3 and record the change.
719 1.1 christos */
720 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
721 1.1 christos hashname, nsecttl, &rdata, &tuple));
722 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
723 1.1 christos INSIST(tuple == NULL);
724 1.1 christos dns_rdata_reset(&rdata);
725 1.1 christos dns_db_detachnode(db, &newnode);
726 1.1 christos
727 1.1 christos /*
728 1.1 christos * Add missing NSEC3 records for empty nodes
729 1.1 christos */
730 1.1 christos dns_name_init(&empty, NULL);
731 1.1 christos dns_name_clone(name, &empty);
732 1.1 christos do {
733 1.1 christos labels = dns_name_countlabels(&empty) - 1;
734 1.1 christos if (labels <= dns_name_countlabels(origin))
735 1.1 christos break;
736 1.1 christos dns_name_getlabelsequence(&empty, 1, labels, &empty);
737 1.1 christos CHECK(name_exists(db, version, &empty, &exists));
738 1.1 christos if (exists)
739 1.1 christos break;
740 1.1 christos CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length,
741 1.1 christos &empty, origin, hash, iterations,
742 1.1 christos salt, salt_length));
743 1.1 christos
744 1.1 christos /*
745 1.1 christos * Create the node if it doesn't exist and hold
746 1.1 christos * a reference to it until we have added the NSEC3
747 1.1 christos * or we discover we don't need to add make a change.
748 1.1 christos */
749 1.3 christos CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
750 1.1 christos result = dns_db_findrdataset(db, newnode, version,
751 1.1 christos dns_rdatatype_nsec3, 0,
752 1.1 christos (isc_stdtime_t) 0, &rdataset,
753 1.1 christos NULL);
754 1.1 christos if (result == ISC_R_SUCCESS) {
755 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
756 1.1 christos dns_rdataset_disassociate(&rdataset);
757 1.1 christos if (result == ISC_R_SUCCESS) {
758 1.1 christos dns_db_detachnode(db, &newnode);
759 1.1 christos break;
760 1.1 christos }
761 1.1 christos if (result != ISC_R_NOMORE)
762 1.1 christos goto failure;
763 1.1 christos }
764 1.1 christos
765 1.1 christos /*
766 1.1 christos * Find the previous NSEC3 and update it.
767 1.1 christos */
768 1.1 christos CHECK(dns_dbiterator_seek(dbit, hashname));
769 1.1 christos pass = 0;
770 1.1 christos do {
771 1.1 christos result = dns_dbiterator_prev(dbit);
772 1.1 christos if (result == ISC_R_NOMORE) {
773 1.1 christos pass++;
774 1.1 christos CHECK(dns_dbiterator_last(dbit));
775 1.1 christos }
776 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, prev));
777 1.1 christos CHECK(dns_dbiterator_pause(dbit));
778 1.1 christos result = dns_db_findrdataset(db, node, version,
779 1.1 christos dns_rdatatype_nsec3, 0,
780 1.1 christos (isc_stdtime_t) 0,
781 1.1 christos &rdataset, NULL);
782 1.1 christos dns_db_detachnode(db, &node);
783 1.1 christos if (result != ISC_R_SUCCESS)
784 1.1 christos continue;
785 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
786 1.1 christos if (result == ISC_R_NOMORE) {
787 1.1 christos dns_rdataset_disassociate(&rdataset);
788 1.1 christos continue;
789 1.1 christos }
790 1.1 christos if (result != ISC_R_SUCCESS)
791 1.1 christos goto failure;
792 1.1 christos
793 1.1 christos old_next = nsec3.next;
794 1.1 christos old_length = nsec3.next_length;
795 1.1 christos
796 1.1 christos /*
797 1.1 christos * Delete the old previous NSEC3.
798 1.1 christos */
799 1.1 christos CHECK(delnsec3(db, version, prev, nsec3param, diff));
800 1.1 christos
801 1.1 christos /*
802 1.1 christos * Fixup the previous NSEC3.
803 1.1 christos */
804 1.1 christos nsec3.next = nexthash;
805 1.1 christos nsec3.next_length = (unsigned char)next_length;
806 1.1 christos isc_buffer_init(&buffer, nsec3buf,
807 1.1 christos sizeof(nsec3buf));
808 1.1 christos CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
809 1.1 christos dns_rdatatype_nsec3, &nsec3,
810 1.1 christos &buffer));
811 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
812 1.1 christos prev, rdataset.ttl, &rdata,
813 1.1 christos &tuple));
814 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
815 1.1 christos INSIST(old_length <= sizeof(nexthash));
816 1.1 christos memmove(nexthash, old_next, old_length);
817 1.1 christos if (!CREATE(nsec3param->flags))
818 1.1 christos flags = nsec3.flags;
819 1.1 christos dns_rdata_reset(&rdata);
820 1.1 christos dns_rdataset_disassociate(&rdataset);
821 1.1 christos break;
822 1.1 christos } while (pass < 2);
823 1.1 christos
824 1.1 christos INSIST(pass < 2);
825 1.1 christos
826 1.1 christos /*
827 1.1 christos * Create the NSEC3 RDATA for the empty node.
828 1.1 christos */
829 1.1 christos CHECK(dns_nsec3_buildrdata(db, version, NULL, hash, flags,
830 1.1 christos iterations, salt, salt_length,
831 1.1 christos nexthash, next_length, nsec3buf,
832 1.1 christos &rdata));
833 1.1 christos /*
834 1.1 christos * Delete the old NSEC3 and record the change.
835 1.1 christos */
836 1.1 christos CHECK(delnsec3(db, version, hashname, nsec3param, diff));
837 1.1 christos
838 1.1 christos /*
839 1.1 christos * Add the new NSEC3 and record the change.
840 1.1 christos */
841 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
842 1.1 christos hashname, nsecttl, &rdata, &tuple));
843 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
844 1.1 christos INSIST(tuple == NULL);
845 1.1 christos dns_rdata_reset(&rdata);
846 1.1 christos dns_db_detachnode(db, &newnode);
847 1.1 christos } while (1);
848 1.1 christos
849 1.1 christos /* result cannot be ISC_R_NOMORE here */
850 1.1 christos INSIST(result != ISC_R_NOMORE);
851 1.1 christos
852 1.1 christos failure:
853 1.1 christos if (dbit != NULL)
854 1.1 christos dns_dbiterator_destroy(&dbit);
855 1.1 christos if (dns_rdataset_isassociated(&rdataset))
856 1.1 christos dns_rdataset_disassociate(&rdataset);
857 1.1 christos if (node != NULL)
858 1.1 christos dns_db_detachnode(db, &node);
859 1.1 christos if (newnode != NULL)
860 1.1 christos dns_db_detachnode(db, &newnode);
861 1.1 christos return (result);
862 1.1 christos }
863 1.1 christos
864 1.1 christos /*%
865 1.1 christos * Add NSEC3 records for "name", recording the change in "diff".
866 1.1 christos * The existing NSEC3 records are removed.
867 1.1 christos */
868 1.1 christos isc_result_t
869 1.1 christos dns_nsec3_addnsec3s(dns_db_t *db, dns_dbversion_t *version,
870 1.1 christos const dns_name_t *name, dns_ttl_t nsecttl,
871 1.3 christos bool unsecure, dns_diff_t *diff)
872 1.1 christos {
873 1.1 christos dns_dbnode_t *node = NULL;
874 1.1 christos dns_rdata_nsec3param_t nsec3param;
875 1.1 christos dns_rdataset_t rdataset;
876 1.1 christos isc_result_t result;
877 1.1 christos
878 1.1 christos dns_rdataset_init(&rdataset);
879 1.1 christos
880 1.1 christos /*
881 1.1 christos * Find the NSEC3 parameters for this zone.
882 1.1 christos */
883 1.1 christos result = dns_db_getoriginnode(db, &node);
884 1.1 christos if (result != ISC_R_SUCCESS)
885 1.1 christos return (result);
886 1.1 christos
887 1.1 christos result = dns_db_findrdataset(db, node, version,
888 1.1 christos dns_rdatatype_nsec3param, 0, 0,
889 1.1 christos &rdataset, NULL);
890 1.1 christos dns_db_detachnode(db, &node);
891 1.1 christos if (result == ISC_R_NOTFOUND)
892 1.1 christos return (ISC_R_SUCCESS);
893 1.1 christos if (result != ISC_R_SUCCESS)
894 1.1 christos return (result);
895 1.1 christos
896 1.1 christos /*
897 1.1 christos * Update each active NSEC3 chain.
898 1.1 christos */
899 1.1 christos for (result = dns_rdataset_first(&rdataset);
900 1.1 christos result == ISC_R_SUCCESS;
901 1.1 christos result = dns_rdataset_next(&rdataset)) {
902 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
903 1.1 christos
904 1.1 christos dns_rdataset_current(&rdataset, &rdata);
905 1.1 christos CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
906 1.1 christos
907 1.1 christos if (nsec3param.flags != 0)
908 1.1 christos continue;
909 1.1 christos /*
910 1.1 christos * We have a active chain. Update it.
911 1.1 christos */
912 1.1 christos CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
913 1.1 christos nsecttl, unsecure, diff));
914 1.1 christos }
915 1.1 christos if (result == ISC_R_NOMORE)
916 1.1 christos result = ISC_R_SUCCESS;
917 1.1 christos
918 1.1 christos failure:
919 1.1 christos if (dns_rdataset_isassociated(&rdataset))
920 1.1 christos dns_rdataset_disassociate(&rdataset);
921 1.1 christos if (node != NULL)
922 1.1 christos dns_db_detachnode(db, &node);
923 1.1 christos
924 1.1 christos return (result);
925 1.1 christos }
926 1.1 christos
927 1.3 christos bool
928 1.1 christos dns_nsec3param_fromprivate(dns_rdata_t *src, dns_rdata_t *target,
929 1.1 christos unsigned char *buf, size_t buflen)
930 1.1 christos {
931 1.1 christos dns_decompress_t dctx;
932 1.1 christos isc_result_t result;
933 1.1 christos isc_buffer_t buf1;
934 1.1 christos isc_buffer_t buf2;
935 1.1 christos
936 1.1 christos /*
937 1.1 christos * Algorithm 0 (reserved by RFC 4034) is used to identify
938 1.1 christos * NSEC3PARAM records from DNSKEY pointers.
939 1.1 christos */
940 1.1 christos if (src->length < 1 || src->data[0] != 0)
941 1.3 christos return (false);
942 1.1 christos
943 1.1 christos isc_buffer_init(&buf1, src->data + 1, src->length - 1);
944 1.1 christos isc_buffer_add(&buf1, src->length - 1);
945 1.1 christos isc_buffer_setactive(&buf1, src->length - 1);
946 1.1 christos isc_buffer_init(&buf2, buf, (unsigned int)buflen);
947 1.1 christos dns_decompress_init(&dctx, -1, DNS_DECOMPRESS_NONE);
948 1.1 christos result = dns_rdata_fromwire(target, src->rdclass,
949 1.1 christos dns_rdatatype_nsec3param,
950 1.1 christos &buf1, &dctx, 0, &buf2);
951 1.1 christos dns_decompress_invalidate(&dctx);
952 1.1 christos
953 1.3 christos return (result == ISC_R_SUCCESS);
954 1.1 christos }
955 1.1 christos
956 1.1 christos void
957 1.1 christos dns_nsec3param_toprivate(dns_rdata_t *src, dns_rdata_t *target,
958 1.1 christos dns_rdatatype_t privatetype,
959 1.1 christos unsigned char *buf, size_t buflen)
960 1.1 christos {
961 1.1 christos REQUIRE(buflen >= src->length + 1);
962 1.1 christos
963 1.1 christos REQUIRE(DNS_RDATA_INITIALIZED(target));
964 1.1 christos
965 1.1 christos memmove(buf + 1, src->data, src->length);
966 1.1 christos buf[0] = 0;
967 1.1 christos target->data = buf;
968 1.1 christos target->length = src->length + 1;
969 1.1 christos target->type = privatetype;
970 1.1 christos target->rdclass = src->rdclass;
971 1.1 christos target->flags = 0;
972 1.1 christos ISC_LINK_INIT(target, link);
973 1.1 christos }
974 1.1 christos
975 1.1 christos static isc_result_t
976 1.1 christos rr_exists(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
977 1.3 christos const dns_rdata_t *rdata, bool *flag)
978 1.1 christos {
979 1.1 christos dns_rdataset_t rdataset;
980 1.1 christos dns_dbnode_t *node = NULL;
981 1.1 christos isc_result_t result;
982 1.1 christos
983 1.1 christos dns_rdataset_init(&rdataset);
984 1.1 christos if (rdata->type == dns_rdatatype_nsec3)
985 1.3 christos CHECK(dns_db_findnsec3node(db, name, false, &node));
986 1.1 christos else
987 1.3 christos CHECK(dns_db_findnode(db, name, false, &node));
988 1.1 christos result = dns_db_findrdataset(db, node, ver, rdata->type, 0,
989 1.1 christos (isc_stdtime_t) 0, &rdataset, NULL);
990 1.1 christos if (result == ISC_R_NOTFOUND) {
991 1.3 christos *flag = false;
992 1.1 christos result = ISC_R_SUCCESS;
993 1.1 christos goto failure;
994 1.1 christos }
995 1.1 christos
996 1.1 christos for (result = dns_rdataset_first(&rdataset);
997 1.1 christos result == ISC_R_SUCCESS;
998 1.1 christos result = dns_rdataset_next(&rdataset)) {
999 1.1 christos dns_rdata_t myrdata = DNS_RDATA_INIT;
1000 1.1 christos dns_rdataset_current(&rdataset, &myrdata);
1001 1.1 christos if (!dns_rdata_casecompare(&myrdata, rdata))
1002 1.1 christos break;
1003 1.1 christos }
1004 1.1 christos dns_rdataset_disassociate(&rdataset);
1005 1.1 christos if (result == ISC_R_SUCCESS) {
1006 1.3 christos *flag = true;
1007 1.1 christos } else if (result == ISC_R_NOMORE) {
1008 1.3 christos *flag = false;
1009 1.1 christos result = ISC_R_SUCCESS;
1010 1.1 christos }
1011 1.1 christos
1012 1.1 christos failure:
1013 1.1 christos if (node != NULL)
1014 1.1 christos dns_db_detachnode(db, &node);
1015 1.1 christos return (result);
1016 1.1 christos }
1017 1.1 christos
1018 1.1 christos isc_result_t
1019 1.1 christos dns_nsec3param_salttotext(dns_rdata_nsec3param_t *nsec3param, char *dst,
1020 1.1 christos size_t dstlen)
1021 1.1 christos {
1022 1.1 christos isc_result_t result;
1023 1.1 christos isc_region_t r;
1024 1.1 christos isc_buffer_t b;
1025 1.1 christos
1026 1.1 christos REQUIRE(nsec3param != NULL);
1027 1.1 christos REQUIRE(dst != NULL);
1028 1.1 christos
1029 1.1 christos if (nsec3param->salt_length == 0) {
1030 1.1 christos if (dstlen < 2U) {
1031 1.1 christos return (ISC_R_NOSPACE);
1032 1.1 christos }
1033 1.1 christos strlcpy(dst, "-", dstlen);
1034 1.1 christos return (ISC_R_SUCCESS);
1035 1.1 christos }
1036 1.1 christos
1037 1.1 christos r.base = nsec3param->salt;
1038 1.1 christos r.length = nsec3param->salt_length;
1039 1.1 christos isc_buffer_init(&b, dst, (unsigned int)dstlen);
1040 1.1 christos
1041 1.1 christos result = isc_hex_totext(&r, 2, "", &b);
1042 1.1 christos if (result != ISC_R_SUCCESS) {
1043 1.1 christos return (result);
1044 1.1 christos }
1045 1.1 christos
1046 1.1 christos if (isc_buffer_availablelength(&b) < 1) {
1047 1.1 christos return (ISC_R_NOSPACE);
1048 1.1 christos }
1049 1.1 christos isc_buffer_putuint8(&b, 0);
1050 1.1 christos
1051 1.1 christos return (ISC_R_SUCCESS);
1052 1.1 christos }
1053 1.1 christos
1054 1.1 christos isc_result_t
1055 1.1 christos dns_nsec3param_deletechains(dns_db_t *db, dns_dbversion_t *ver,
1056 1.3 christos dns_zone_t *zone, bool nonsec,
1057 1.1 christos dns_diff_t *diff)
1058 1.1 christos {
1059 1.1 christos dns_dbnode_t *node = NULL;
1060 1.1 christos dns_difftuple_t *tuple = NULL;
1061 1.1 christos dns_name_t next;
1062 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1063 1.1 christos dns_rdataset_t rdataset;
1064 1.3 christos bool flag;
1065 1.1 christos isc_result_t result = ISC_R_SUCCESS;
1066 1.1 christos unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE + 1];
1067 1.1 christos dns_name_t *origin = dns_zone_getorigin(zone);
1068 1.1 christos dns_rdatatype_t privatetype = dns_zone_getprivatetype(zone);
1069 1.1 christos
1070 1.1 christos dns_name_init(&next, NULL);
1071 1.1 christos dns_rdataset_init(&rdataset);
1072 1.1 christos
1073 1.1 christos result = dns_db_getoriginnode(db, &node);
1074 1.1 christos if (result != ISC_R_SUCCESS)
1075 1.1 christos return (result);
1076 1.1 christos
1077 1.1 christos /*
1078 1.1 christos * Cause all NSEC3 chains to be deleted.
1079 1.1 christos */
1080 1.1 christos result = dns_db_findrdataset(db, node, ver, dns_rdatatype_nsec3param,
1081 1.1 christos 0, (isc_stdtime_t) 0, &rdataset, NULL);
1082 1.1 christos if (result == ISC_R_NOTFOUND)
1083 1.1 christos goto try_private;
1084 1.1 christos if (result != ISC_R_SUCCESS)
1085 1.1 christos goto failure;
1086 1.1 christos
1087 1.1 christos for (result = dns_rdataset_first(&rdataset);
1088 1.1 christos result == ISC_R_SUCCESS;
1089 1.1 christos result = dns_rdataset_next(&rdataset)) {
1090 1.1 christos dns_rdata_t private = DNS_RDATA_INIT;
1091 1.1 christos
1092 1.1 christos dns_rdataset_current(&rdataset, &rdata);
1093 1.1 christos
1094 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, origin,
1095 1.1 christos rdataset.ttl, &rdata, &tuple));
1096 1.1 christos CHECK(do_one_tuple(&tuple, db, ver, diff));
1097 1.1 christos INSIST(tuple == NULL);
1098 1.1 christos
1099 1.1 christos dns_nsec3param_toprivate(&rdata, &private, privatetype,
1100 1.1 christos buf, sizeof(buf));
1101 1.1 christos buf[2] = DNS_NSEC3FLAG_REMOVE;
1102 1.1 christos if (nonsec)
1103 1.1 christos buf[2] |= DNS_NSEC3FLAG_NONSEC;
1104 1.1 christos
1105 1.1 christos CHECK(rr_exists(db, ver, origin, &private, &flag));
1106 1.1 christos
1107 1.1 christos if (!flag) {
1108 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
1109 1.1 christos origin, 0, &private,
1110 1.1 christos &tuple));
1111 1.1 christos CHECK(do_one_tuple(&tuple, db, ver, diff));
1112 1.1 christos INSIST(tuple == NULL);
1113 1.1 christos }
1114 1.1 christos dns_rdata_reset(&rdata);
1115 1.1 christos }
1116 1.1 christos if (result != ISC_R_NOMORE)
1117 1.1 christos goto failure;
1118 1.1 christos
1119 1.1 christos dns_rdataset_disassociate(&rdataset);
1120 1.1 christos
1121 1.1 christos try_private:
1122 1.1 christos if (privatetype == 0)
1123 1.1 christos goto success;
1124 1.1 christos result = dns_db_findrdataset(db, node, ver, privatetype, 0,
1125 1.1 christos (isc_stdtime_t) 0, &rdataset, NULL);
1126 1.1 christos if (result == ISC_R_NOTFOUND)
1127 1.1 christos goto success;
1128 1.1 christos if (result != ISC_R_SUCCESS)
1129 1.1 christos goto failure;
1130 1.1 christos
1131 1.1 christos for (result = dns_rdataset_first(&rdataset);
1132 1.1 christos result == ISC_R_SUCCESS;
1133 1.1 christos result = dns_rdataset_next(&rdataset)) {
1134 1.1 christos dns_rdata_reset(&rdata);
1135 1.1 christos dns_rdataset_current(&rdataset, &rdata);
1136 1.1 christos INSIST(rdata.length <= sizeof(buf));
1137 1.1 christos memmove(buf, rdata.data, rdata.length);
1138 1.1 christos
1139 1.1 christos /*
1140 1.1 christos * Private NSEC3 record length >= 6.
1141 1.1 christos * <0(1), hash(1), flags(1), iterations(2), saltlen(1)>
1142 1.1 christos */
1143 1.1 christos if (rdata.length < 6 || buf[0] != 0 ||
1144 1.1 christos (buf[2] & DNS_NSEC3FLAG_REMOVE) != 0 ||
1145 1.1 christos (nonsec && (buf[2] & DNS_NSEC3FLAG_NONSEC) != 0))
1146 1.1 christos continue;
1147 1.1 christos
1148 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, origin,
1149 1.1 christos 0, &rdata, &tuple));
1150 1.1 christos CHECK(do_one_tuple(&tuple, db, ver, diff));
1151 1.1 christos INSIST(tuple == NULL);
1152 1.1 christos
1153 1.1 christos rdata.data = buf;
1154 1.1 christos buf[2] = DNS_NSEC3FLAG_REMOVE;
1155 1.1 christos if (nonsec)
1156 1.1 christos buf[2] |= DNS_NSEC3FLAG_NONSEC;
1157 1.1 christos
1158 1.1 christos CHECK(rr_exists(db, ver, origin, &rdata, &flag));
1159 1.1 christos
1160 1.1 christos if (!flag) {
1161 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
1162 1.1 christos origin, 0, &rdata, &tuple));
1163 1.1 christos CHECK(do_one_tuple(&tuple, db, ver, diff));
1164 1.1 christos INSIST(tuple == NULL);
1165 1.1 christos }
1166 1.1 christos }
1167 1.1 christos if (result != ISC_R_NOMORE)
1168 1.1 christos goto failure;
1169 1.1 christos success:
1170 1.1 christos result = ISC_R_SUCCESS;
1171 1.1 christos
1172 1.1 christos failure:
1173 1.1 christos if (dns_rdataset_isassociated(&rdataset))
1174 1.1 christos dns_rdataset_disassociate(&rdataset);
1175 1.1 christos dns_db_detachnode(db, &node);
1176 1.1 christos return (result);
1177 1.1 christos }
1178 1.1 christos
1179 1.1 christos isc_result_t
1180 1.1 christos dns_nsec3_addnsec3sx(dns_db_t *db, dns_dbversion_t *version,
1181 1.1 christos const dns_name_t *name, dns_ttl_t nsecttl,
1182 1.3 christos bool unsecure, dns_rdatatype_t type,
1183 1.1 christos dns_diff_t *diff)
1184 1.1 christos {
1185 1.1 christos dns_dbnode_t *node = NULL;
1186 1.1 christos dns_rdata_nsec3param_t nsec3param;
1187 1.1 christos dns_rdataset_t rdataset;
1188 1.1 christos dns_rdataset_t prdataset;
1189 1.1 christos isc_result_t result;
1190 1.1 christos
1191 1.1 christos dns_rdataset_init(&rdataset);
1192 1.1 christos dns_rdataset_init(&prdataset);
1193 1.1 christos
1194 1.1 christos /*
1195 1.1 christos * Find the NSEC3 parameters for this zone.
1196 1.1 christos */
1197 1.1 christos result = dns_db_getoriginnode(db, &node);
1198 1.1 christos if (result != ISC_R_SUCCESS)
1199 1.1 christos return (result);
1200 1.1 christos
1201 1.1 christos result = dns_db_findrdataset(db, node, version, type, 0, 0,
1202 1.1 christos &prdataset, NULL);
1203 1.1 christos if (result != ISC_R_SUCCESS && result != ISC_R_NOTFOUND)
1204 1.1 christos goto failure;
1205 1.1 christos
1206 1.1 christos result = dns_db_findrdataset(db, node, version,
1207 1.1 christos dns_rdatatype_nsec3param, 0, 0,
1208 1.1 christos &rdataset, NULL);
1209 1.1 christos if (result == ISC_R_NOTFOUND)
1210 1.1 christos goto try_private;
1211 1.1 christos if (result != ISC_R_SUCCESS)
1212 1.1 christos goto failure;
1213 1.1 christos
1214 1.1 christos /*
1215 1.1 christos * Update each active NSEC3 chain.
1216 1.1 christos */
1217 1.1 christos for (result = dns_rdataset_first(&rdataset);
1218 1.1 christos result == ISC_R_SUCCESS;
1219 1.1 christos result = dns_rdataset_next(&rdataset)) {
1220 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1221 1.1 christos
1222 1.1 christos dns_rdataset_current(&rdataset, &rdata);
1223 1.1 christos CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
1224 1.1 christos
1225 1.1 christos if (nsec3param.flags != 0)
1226 1.1 christos continue;
1227 1.1 christos
1228 1.1 christos /*
1229 1.1 christos * We have a active chain. Update it.
1230 1.1 christos */
1231 1.1 christos CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
1232 1.1 christos nsecttl, unsecure, diff));
1233 1.1 christos }
1234 1.1 christos if (result != ISC_R_NOMORE)
1235 1.1 christos goto failure;
1236 1.1 christos
1237 1.1 christos dns_rdataset_disassociate(&rdataset);
1238 1.1 christos
1239 1.1 christos try_private:
1240 1.1 christos if (!dns_rdataset_isassociated(&prdataset))
1241 1.1 christos goto success;
1242 1.1 christos /*
1243 1.1 christos * Update each active NSEC3 chain.
1244 1.1 christos */
1245 1.1 christos for (result = dns_rdataset_first(&prdataset);
1246 1.1 christos result == ISC_R_SUCCESS;
1247 1.1 christos result = dns_rdataset_next(&prdataset)) {
1248 1.1 christos dns_rdata_t rdata1 = DNS_RDATA_INIT;
1249 1.1 christos dns_rdata_t rdata2 = DNS_RDATA_INIT;
1250 1.1 christos unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
1251 1.1 christos
1252 1.1 christos dns_rdataset_current(&prdataset, &rdata1);
1253 1.1 christos if (!dns_nsec3param_fromprivate(&rdata1, &rdata2,
1254 1.1 christos buf, sizeof(buf)))
1255 1.1 christos continue;
1256 1.1 christos CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
1257 1.1 christos
1258 1.1 christos if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0)
1259 1.1 christos continue;
1260 1.1 christos if (better_param(&prdataset, &rdata2))
1261 1.1 christos continue;
1262 1.1 christos
1263 1.1 christos /*
1264 1.1 christos * We have a active chain. Update it.
1265 1.1 christos */
1266 1.1 christos CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
1267 1.1 christos nsecttl, unsecure, diff));
1268 1.1 christos }
1269 1.1 christos if (result == ISC_R_NOMORE)
1270 1.1 christos success:
1271 1.1 christos result = ISC_R_SUCCESS;
1272 1.1 christos failure:
1273 1.1 christos if (dns_rdataset_isassociated(&rdataset))
1274 1.1 christos dns_rdataset_disassociate(&rdataset);
1275 1.1 christos if (dns_rdataset_isassociated(&prdataset))
1276 1.1 christos dns_rdataset_disassociate(&prdataset);
1277 1.1 christos if (node != NULL)
1278 1.1 christos dns_db_detachnode(db, &node);
1279 1.1 christos
1280 1.1 christos return (result);
1281 1.1 christos }
1282 1.1 christos
1283 1.1 christos /*%
1284 1.1 christos * Determine whether any NSEC3 records that were associated with
1285 1.1 christos * 'name' should be deleted or if they should continue to exist.
1286 1.3 christos * true indicates they should be deleted.
1287 1.3 christos * false indicates they should be retained.
1288 1.1 christos */
1289 1.1 christos static isc_result_t
1290 1.1 christos deleteit(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
1291 1.3 christos bool *yesno)
1292 1.1 christos {
1293 1.1 christos isc_result_t result;
1294 1.1 christos dns_fixedname_t foundname;
1295 1.1 christos dns_fixedname_init(&foundname);
1296 1.1 christos
1297 1.1 christos result = dns_db_find(db, name, ver, dns_rdatatype_any,
1298 1.1 christos DNS_DBFIND_GLUEOK | DNS_DBFIND_NOWILD,
1299 1.1 christos (isc_stdtime_t) 0, NULL,
1300 1.1 christos dns_fixedname_name(&foundname),
1301 1.1 christos NULL, NULL);
1302 1.1 christos if (result == DNS_R_EMPTYNAME || result == ISC_R_SUCCESS ||
1303 1.1 christos result == DNS_R_ZONECUT) {
1304 1.3 christos *yesno = false;
1305 1.1 christos return (ISC_R_SUCCESS);
1306 1.1 christos }
1307 1.1 christos if (result == DNS_R_GLUE || result == DNS_R_DNAME ||
1308 1.1 christos result == DNS_R_DELEGATION || result == DNS_R_NXDOMAIN) {
1309 1.3 christos *yesno = true;
1310 1.1 christos return (ISC_R_SUCCESS);
1311 1.1 christos }
1312 1.1 christos /*
1313 1.1 christos * Silence compiler.
1314 1.1 christos */
1315 1.3 christos *yesno = true;
1316 1.1 christos return (result);
1317 1.1 christos }
1318 1.1 christos
1319 1.1 christos isc_result_t
1320 1.1 christos dns_nsec3_delnsec3(dns_db_t *db, dns_dbversion_t *version,
1321 1.1 christos const dns_name_t *name,
1322 1.1 christos const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff)
1323 1.1 christos {
1324 1.1 christos dns_dbiterator_t *dbit = NULL;
1325 1.1 christos dns_dbnode_t *node = NULL;
1326 1.1 christos dns_difftuple_t *tuple = NULL;
1327 1.1 christos dns_fixedname_t fixed;
1328 1.1 christos dns_fixedname_t fprev;
1329 1.1 christos dns_hash_t hash;
1330 1.1 christos dns_name_t *hashname;
1331 1.1 christos dns_name_t *origin;
1332 1.1 christos dns_name_t *prev;
1333 1.1 christos dns_name_t empty;
1334 1.1 christos dns_rdata_nsec3_t nsec3;
1335 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1336 1.1 christos dns_rdataset_t rdataset;
1337 1.1 christos int pass;
1338 1.3 christos bool yesno;
1339 1.1 christos isc_buffer_t buffer;
1340 1.1 christos isc_result_t result;
1341 1.1 christos unsigned char *salt;
1342 1.1 christos unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
1343 1.1 christos unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
1344 1.1 christos unsigned int iterations;
1345 1.1 christos unsigned int labels;
1346 1.1 christos size_t next_length;
1347 1.1 christos unsigned int salt_length;
1348 1.1 christos
1349 1.1 christos hashname = dns_fixedname_initname(&fixed);
1350 1.1 christos prev = dns_fixedname_initname(&fprev);
1351 1.1 christos
1352 1.1 christos dns_rdataset_init(&rdataset);
1353 1.1 christos
1354 1.1 christos origin = dns_db_origin(db);
1355 1.1 christos
1356 1.1 christos /*
1357 1.1 christos * Chain parameters.
1358 1.1 christos */
1359 1.1 christos hash = nsec3param->hash;
1360 1.1 christos iterations = nsec3param->iterations;
1361 1.1 christos salt_length = nsec3param->salt_length;
1362 1.1 christos salt = nsec3param->salt;
1363 1.1 christos
1364 1.1 christos /*
1365 1.1 christos * If this is the first NSEC3 in the chain nexthash will
1366 1.1 christos * remain pointing to itself.
1367 1.1 christos */
1368 1.1 christos next_length = sizeof(nexthash);
1369 1.1 christos CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length,
1370 1.1 christos name, origin, hash, iterations,
1371 1.1 christos salt, salt_length));
1372 1.1 christos
1373 1.1 christos CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
1374 1.1 christos
1375 1.1 christos result = dns_dbiterator_seek(dbit, hashname);
1376 1.1 christos if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH)
1377 1.1 christos goto success;
1378 1.1 christos if (result != ISC_R_SUCCESS)
1379 1.1 christos goto failure;
1380 1.1 christos
1381 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, NULL));
1382 1.1 christos CHECK(dns_dbiterator_pause(dbit));
1383 1.1 christos result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3,
1384 1.1 christos 0, (isc_stdtime_t) 0, &rdataset, NULL);
1385 1.1 christos dns_db_detachnode(db, &node);
1386 1.1 christos if (result == ISC_R_NOTFOUND)
1387 1.1 christos goto success;
1388 1.1 christos if (result != ISC_R_SUCCESS)
1389 1.1 christos goto failure;
1390 1.1 christos
1391 1.1 christos /*
1392 1.1 christos * If we find a existing NSEC3 for this chain then save the
1393 1.1 christos * next field.
1394 1.1 christos */
1395 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
1396 1.1 christos if (result == ISC_R_SUCCESS) {
1397 1.1 christos next_length = nsec3.next_length;
1398 1.1 christos INSIST(next_length <= sizeof(nexthash));
1399 1.1 christos memmove(nexthash, nsec3.next, next_length);
1400 1.1 christos }
1401 1.1 christos dns_rdataset_disassociate(&rdataset);
1402 1.1 christos if (result == ISC_R_NOMORE)
1403 1.1 christos goto success;
1404 1.1 christos if (result != ISC_R_SUCCESS)
1405 1.1 christos goto failure;
1406 1.1 christos
1407 1.1 christos /*
1408 1.1 christos * Find the previous NSEC3 and update it.
1409 1.1 christos */
1410 1.1 christos pass = 0;
1411 1.1 christos do {
1412 1.1 christos result = dns_dbiterator_prev(dbit);
1413 1.1 christos if (result == ISC_R_NOMORE) {
1414 1.1 christos pass++;
1415 1.1 christos CHECK(dns_dbiterator_last(dbit));
1416 1.1 christos }
1417 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, prev));
1418 1.1 christos CHECK(dns_dbiterator_pause(dbit));
1419 1.1 christos result = dns_db_findrdataset(db, node, version,
1420 1.1 christos dns_rdatatype_nsec3, 0,
1421 1.1 christos (isc_stdtime_t) 0, &rdataset,
1422 1.1 christos NULL);
1423 1.1 christos dns_db_detachnode(db, &node);
1424 1.1 christos if (result != ISC_R_SUCCESS)
1425 1.1 christos continue;
1426 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
1427 1.1 christos if (result == ISC_R_NOMORE) {
1428 1.1 christos dns_rdataset_disassociate(&rdataset);
1429 1.1 christos continue;
1430 1.1 christos }
1431 1.1 christos if (result != ISC_R_SUCCESS)
1432 1.1 christos goto failure;
1433 1.1 christos
1434 1.1 christos /*
1435 1.1 christos * Delete the old previous NSEC3.
1436 1.1 christos */
1437 1.1 christos CHECK(delnsec3(db, version, prev, nsec3param, diff));
1438 1.1 christos
1439 1.1 christos /*
1440 1.1 christos * Fixup the previous NSEC3.
1441 1.1 christos */
1442 1.1 christos nsec3.next = nexthash;
1443 1.1 christos nsec3.next_length = (unsigned char)next_length;
1444 1.1 christos if (CREATE(nsec3param->flags))
1445 1.1 christos nsec3.flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
1446 1.1 christos isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
1447 1.1 christos CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
1448 1.1 christos dns_rdatatype_nsec3, &nsec3,
1449 1.1 christos &buffer));
1450 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
1451 1.1 christos rdataset.ttl, &rdata, &tuple));
1452 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
1453 1.1 christos dns_rdata_reset(&rdata);
1454 1.1 christos dns_rdataset_disassociate(&rdataset);
1455 1.1 christos break;
1456 1.1 christos } while (pass < 2);
1457 1.1 christos
1458 1.1 christos /*
1459 1.1 christos * Delete the old NSEC3 and record the change.
1460 1.1 christos */
1461 1.1 christos CHECK(delnsec3(db, version, hashname, nsec3param, diff));
1462 1.1 christos
1463 1.1 christos /*
1464 1.1 christos * Delete NSEC3 records for now non active nodes.
1465 1.1 christos */
1466 1.1 christos dns_name_init(&empty, NULL);
1467 1.1 christos dns_name_clone(name, &empty);
1468 1.1 christos do {
1469 1.1 christos labels = dns_name_countlabels(&empty) - 1;
1470 1.1 christos if (labels <= dns_name_countlabels(origin))
1471 1.1 christos break;
1472 1.1 christos dns_name_getlabelsequence(&empty, 1, labels, &empty);
1473 1.1 christos CHECK(deleteit(db, version, &empty, &yesno));
1474 1.1 christos if (!yesno)
1475 1.1 christos break;
1476 1.1 christos
1477 1.1 christos CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length,
1478 1.1 christos &empty, origin, hash, iterations,
1479 1.1 christos salt, salt_length));
1480 1.1 christos result = dns_dbiterator_seek(dbit, hashname);
1481 1.1 christos if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH)
1482 1.1 christos goto success;
1483 1.1 christos if (result != ISC_R_SUCCESS)
1484 1.1 christos goto failure;
1485 1.1 christos
1486 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, NULL));
1487 1.1 christos CHECK(dns_dbiterator_pause(dbit));
1488 1.1 christos result = dns_db_findrdataset(db, node, version,
1489 1.1 christos dns_rdatatype_nsec3, 0,
1490 1.1 christos (isc_stdtime_t) 0, &rdataset,
1491 1.1 christos NULL);
1492 1.1 christos dns_db_detachnode(db, &node);
1493 1.1 christos if (result == ISC_R_NOTFOUND)
1494 1.1 christos goto success;
1495 1.1 christos if (result != ISC_R_SUCCESS)
1496 1.1 christos goto failure;
1497 1.1 christos
1498 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
1499 1.1 christos if (result == ISC_R_SUCCESS) {
1500 1.1 christos next_length = nsec3.next_length;
1501 1.1 christos INSIST(next_length <= sizeof(nexthash));
1502 1.1 christos memmove(nexthash, nsec3.next, next_length);
1503 1.1 christos }
1504 1.1 christos dns_rdataset_disassociate(&rdataset);
1505 1.1 christos if (result == ISC_R_NOMORE)
1506 1.1 christos goto success;
1507 1.1 christos if (result != ISC_R_SUCCESS)
1508 1.1 christos goto failure;
1509 1.1 christos
1510 1.1 christos pass = 0;
1511 1.1 christos do {
1512 1.1 christos result = dns_dbiterator_prev(dbit);
1513 1.1 christos if (result == ISC_R_NOMORE) {
1514 1.1 christos pass++;
1515 1.1 christos CHECK(dns_dbiterator_last(dbit));
1516 1.1 christos }
1517 1.1 christos CHECK(dns_dbiterator_current(dbit, &node, prev));
1518 1.1 christos CHECK(dns_dbiterator_pause(dbit));
1519 1.1 christos result = dns_db_findrdataset(db, node, version,
1520 1.1 christos dns_rdatatype_nsec3, 0,
1521 1.1 christos (isc_stdtime_t) 0,
1522 1.1 christos &rdataset, NULL);
1523 1.1 christos dns_db_detachnode(db, &node);
1524 1.1 christos if (result != ISC_R_SUCCESS)
1525 1.1 christos continue;
1526 1.1 christos result = find_nsec3(&nsec3, &rdataset, nsec3param);
1527 1.1 christos if (result == ISC_R_NOMORE) {
1528 1.1 christos dns_rdataset_disassociate(&rdataset);
1529 1.1 christos continue;
1530 1.1 christos }
1531 1.1 christos if (result != ISC_R_SUCCESS)
1532 1.1 christos goto failure;
1533 1.1 christos
1534 1.1 christos /*
1535 1.1 christos * Delete the old previous NSEC3.
1536 1.1 christos */
1537 1.1 christos CHECK(delnsec3(db, version, prev, nsec3param, diff));
1538 1.1 christos
1539 1.1 christos /*
1540 1.1 christos * Fixup the previous NSEC3.
1541 1.1 christos */
1542 1.1 christos nsec3.next = nexthash;
1543 1.1 christos nsec3.next_length = (unsigned char)next_length;
1544 1.1 christos isc_buffer_init(&buffer, nsec3buf,
1545 1.1 christos sizeof(nsec3buf));
1546 1.1 christos CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
1547 1.1 christos dns_rdatatype_nsec3, &nsec3,
1548 1.1 christos &buffer));
1549 1.1 christos CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
1550 1.1 christos prev, rdataset.ttl, &rdata,
1551 1.1 christos &tuple));
1552 1.1 christos CHECK(do_one_tuple(&tuple, db, version, diff));
1553 1.1 christos dns_rdata_reset(&rdata);
1554 1.1 christos dns_rdataset_disassociate(&rdataset);
1555 1.1 christos break;
1556 1.1 christos } while (pass < 2);
1557 1.1 christos
1558 1.1 christos INSIST(pass < 2);
1559 1.1 christos
1560 1.1 christos /*
1561 1.1 christos * Delete the old NSEC3 and record the change.
1562 1.1 christos */
1563 1.1 christos CHECK(delnsec3(db, version, hashname, nsec3param, diff));
1564 1.1 christos } while (1);
1565 1.1 christos
1566 1.1 christos success:
1567 1.1 christos result = ISC_R_SUCCESS;
1568 1.1 christos
1569 1.1 christos failure:
1570 1.1 christos if (dbit != NULL)
1571 1.1 christos dns_dbiterator_destroy(&dbit);
1572 1.1 christos if (dns_rdataset_isassociated(&rdataset))
1573 1.1 christos dns_rdataset_disassociate(&rdataset);
1574 1.1 christos if (node != NULL)
1575 1.1 christos dns_db_detachnode(db, &node);
1576 1.1 christos return (result);
1577 1.1 christos }
1578 1.1 christos
1579 1.1 christos isc_result_t
1580 1.1 christos dns_nsec3_delnsec3s(dns_db_t *db, dns_dbversion_t *version,
1581 1.1 christos const dns_name_t *name,
1582 1.1 christos dns_diff_t *diff)
1583 1.1 christos {
1584 1.1 christos return (dns_nsec3_delnsec3sx(db, version, name, 0, diff));
1585 1.1 christos }
1586 1.1 christos
1587 1.1 christos isc_result_t
1588 1.1 christos dns_nsec3_delnsec3sx(dns_db_t *db, dns_dbversion_t *version,
1589 1.1 christos const dns_name_t *name,
1590 1.1 christos dns_rdatatype_t privatetype, dns_diff_t *diff)
1591 1.1 christos {
1592 1.1 christos dns_dbnode_t *node = NULL;
1593 1.1 christos dns_rdata_nsec3param_t nsec3param;
1594 1.1 christos dns_rdataset_t rdataset;
1595 1.1 christos isc_result_t result;
1596 1.1 christos
1597 1.1 christos dns_rdataset_init(&rdataset);
1598 1.1 christos
1599 1.1 christos /*
1600 1.1 christos * Find the NSEC3 parameters for this zone.
1601 1.1 christos */
1602 1.1 christos result = dns_db_getoriginnode(db, &node);
1603 1.1 christos if (result != ISC_R_SUCCESS)
1604 1.1 christos return (result);
1605 1.1 christos
1606 1.1 christos result = dns_db_findrdataset(db, node, version,
1607 1.1 christos dns_rdatatype_nsec3param, 0, 0,
1608 1.1 christos &rdataset, NULL);
1609 1.1 christos if (result == ISC_R_NOTFOUND)
1610 1.1 christos goto try_private;
1611 1.1 christos if (result != ISC_R_SUCCESS)
1612 1.1 christos goto failure;
1613 1.1 christos
1614 1.1 christos /*
1615 1.1 christos * Update each active NSEC3 chain.
1616 1.1 christos */
1617 1.1 christos for (result = dns_rdataset_first(&rdataset);
1618 1.1 christos result == ISC_R_SUCCESS;
1619 1.1 christos result = dns_rdataset_next(&rdataset)) {
1620 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1621 1.1 christos
1622 1.1 christos dns_rdataset_current(&rdataset, &rdata);
1623 1.1 christos CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
1624 1.1 christos
1625 1.1 christos if (nsec3param.flags != 0)
1626 1.1 christos continue;
1627 1.1 christos /*
1628 1.1 christos * We have a active chain. Update it.
1629 1.1 christos */
1630 1.1 christos CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
1631 1.1 christos }
1632 1.1 christos dns_rdataset_disassociate(&rdataset);
1633 1.1 christos
1634 1.1 christos try_private:
1635 1.1 christos if (privatetype == 0)
1636 1.1 christos goto success;
1637 1.1 christos result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
1638 1.1 christos &rdataset, NULL);
1639 1.1 christos if (result == ISC_R_NOTFOUND)
1640 1.1 christos goto success;
1641 1.1 christos if (result != ISC_R_SUCCESS)
1642 1.1 christos goto failure;
1643 1.1 christos
1644 1.1 christos /*
1645 1.1 christos * Update each NSEC3 chain being built.
1646 1.1 christos */
1647 1.1 christos for (result = dns_rdataset_first(&rdataset);
1648 1.1 christos result == ISC_R_SUCCESS;
1649 1.1 christos result = dns_rdataset_next(&rdataset)) {
1650 1.1 christos dns_rdata_t rdata1 = DNS_RDATA_INIT;
1651 1.1 christos dns_rdata_t rdata2 = DNS_RDATA_INIT;
1652 1.1 christos unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
1653 1.1 christos
1654 1.1 christos dns_rdataset_current(&rdataset, &rdata1);
1655 1.1 christos if (!dns_nsec3param_fromprivate(&rdata1, &rdata2,
1656 1.1 christos buf, sizeof(buf)))
1657 1.1 christos continue;
1658 1.1 christos CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
1659 1.1 christos
1660 1.1 christos if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0)
1661 1.1 christos continue;
1662 1.1 christos if (better_param(&rdataset, &rdata2))
1663 1.1 christos continue;
1664 1.1 christos
1665 1.1 christos /*
1666 1.1 christos * We have a active chain. Update it.
1667 1.1 christos */
1668 1.1 christos CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
1669 1.1 christos }
1670 1.1 christos if (result == ISC_R_NOMORE)
1671 1.1 christos success:
1672 1.1 christos result = ISC_R_SUCCESS;
1673 1.1 christos
1674 1.1 christos failure:
1675 1.1 christos if (dns_rdataset_isassociated(&rdataset))
1676 1.1 christos dns_rdataset_disassociate(&rdataset);
1677 1.1 christos if (node != NULL)
1678 1.1 christos dns_db_detachnode(db, &node);
1679 1.1 christos
1680 1.1 christos return (result);
1681 1.1 christos }
1682 1.1 christos
1683 1.1 christos isc_result_t
1684 1.1 christos dns_nsec3_active(dns_db_t *db, dns_dbversion_t *version,
1685 1.3 christos bool complete, bool *answer)
1686 1.1 christos {
1687 1.1 christos return (dns_nsec3_activex(db, version, complete, 0, answer));
1688 1.1 christos }
1689 1.1 christos
1690 1.1 christos isc_result_t
1691 1.1 christos dns_nsec3_activex(dns_db_t *db, dns_dbversion_t *version,
1692 1.3 christos bool complete, dns_rdatatype_t privatetype,
1693 1.3 christos bool *answer)
1694 1.1 christos {
1695 1.1 christos dns_dbnode_t *node = NULL;
1696 1.1 christos dns_rdataset_t rdataset;
1697 1.1 christos dns_rdata_nsec3param_t nsec3param;
1698 1.1 christos isc_result_t result;
1699 1.1 christos
1700 1.1 christos REQUIRE(answer != NULL);
1701 1.1 christos
1702 1.1 christos dns_rdataset_init(&rdataset);
1703 1.1 christos
1704 1.1 christos result = dns_db_getoriginnode(db, &node);
1705 1.1 christos if (result != ISC_R_SUCCESS)
1706 1.1 christos return (result);
1707 1.1 christos
1708 1.1 christos result = dns_db_findrdataset(db, node, version,
1709 1.1 christos dns_rdatatype_nsec3param, 0, 0,
1710 1.1 christos &rdataset, NULL);
1711 1.1 christos
1712 1.1 christos if (result == ISC_R_NOTFOUND)
1713 1.1 christos goto try_private;
1714 1.1 christos
1715 1.1 christos if (result != ISC_R_SUCCESS) {
1716 1.1 christos dns_db_detachnode(db, &node);
1717 1.1 christos return (result);
1718 1.1 christos }
1719 1.1 christos for (result = dns_rdataset_first(&rdataset);
1720 1.1 christos result == ISC_R_SUCCESS;
1721 1.1 christos result = dns_rdataset_next(&rdataset)) {
1722 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1723 1.1 christos
1724 1.1 christos dns_rdataset_current(&rdataset, &rdata);
1725 1.1 christos result = dns_rdata_tostruct(&rdata, &nsec3param, NULL);
1726 1.1 christos RUNTIME_CHECK(result == ISC_R_SUCCESS);
1727 1.1 christos
1728 1.1 christos if (nsec3param.flags == 0)
1729 1.1 christos break;
1730 1.1 christos }
1731 1.1 christos dns_rdataset_disassociate(&rdataset);
1732 1.1 christos if (result == ISC_R_SUCCESS) {
1733 1.1 christos dns_db_detachnode(db, &node);
1734 1.3 christos *answer = true;
1735 1.1 christos return (ISC_R_SUCCESS);
1736 1.1 christos }
1737 1.1 christos if (result == ISC_R_NOMORE)
1738 1.3 christos *answer = false;
1739 1.1 christos
1740 1.1 christos try_private:
1741 1.1 christos if (privatetype == 0 || complete) {
1742 1.3 christos *answer = false;
1743 1.1 christos return (ISC_R_SUCCESS);
1744 1.1 christos }
1745 1.1 christos result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
1746 1.1 christos &rdataset, NULL);
1747 1.1 christos
1748 1.1 christos dns_db_detachnode(db, &node);
1749 1.1 christos if (result == ISC_R_NOTFOUND) {
1750 1.3 christos *answer = false;
1751 1.1 christos return (ISC_R_SUCCESS);
1752 1.1 christos }
1753 1.1 christos if (result != ISC_R_SUCCESS)
1754 1.1 christos return (result);
1755 1.1 christos
1756 1.1 christos for (result = dns_rdataset_first(&rdataset);
1757 1.1 christos result == ISC_R_SUCCESS;
1758 1.1 christos result = dns_rdataset_next(&rdataset)) {
1759 1.1 christos dns_rdata_t rdata1 = DNS_RDATA_INIT;
1760 1.1 christos dns_rdata_t rdata2 = DNS_RDATA_INIT;
1761 1.1 christos unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
1762 1.1 christos
1763 1.1 christos dns_rdataset_current(&rdataset, &rdata1);
1764 1.1 christos if (!dns_nsec3param_fromprivate(&rdata1, &rdata2,
1765 1.1 christos buf, sizeof(buf)))
1766 1.1 christos continue;
1767 1.1 christos result = dns_rdata_tostruct(&rdata2, &nsec3param, NULL);
1768 1.1 christos RUNTIME_CHECK(result == ISC_R_SUCCESS);
1769 1.1 christos
1770 1.1 christos if (!complete && CREATE(nsec3param.flags))
1771 1.1 christos break;
1772 1.1 christos }
1773 1.1 christos dns_rdataset_disassociate(&rdataset);
1774 1.1 christos if (result == ISC_R_SUCCESS) {
1775 1.3 christos *answer = true;
1776 1.1 christos result = ISC_R_SUCCESS;
1777 1.1 christos }
1778 1.1 christos if (result == ISC_R_NOMORE) {
1779 1.3 christos *answer = false;
1780 1.1 christos result = ISC_R_SUCCESS;
1781 1.1 christos }
1782 1.1 christos
1783 1.1 christos return (result);
1784 1.1 christos }
1785 1.1 christos
1786 1.1 christos isc_result_t
1787 1.1 christos dns_nsec3_maxiterations(dns_db_t *db, dns_dbversion_t *version,
1788 1.1 christos isc_mem_t *mctx, unsigned int *iterationsp)
1789 1.1 christos {
1790 1.1 christos dns_dbnode_t *node = NULL;
1791 1.1 christos dns_rdataset_t rdataset;
1792 1.1 christos dst_key_t *key = NULL;
1793 1.1 christos isc_buffer_t buffer;
1794 1.1 christos isc_result_t result;
1795 1.1 christos unsigned int bits, minbits = 4096;
1796 1.1 christos
1797 1.1 christos result = dns_db_getoriginnode(db, &node);
1798 1.1 christos if (result != ISC_R_SUCCESS)
1799 1.1 christos return (result);
1800 1.1 christos
1801 1.1 christos dns_rdataset_init(&rdataset);
1802 1.1 christos result = dns_db_findrdataset(db, node, version, dns_rdatatype_dnskey,
1803 1.1 christos 0, 0, &rdataset, NULL);
1804 1.1 christos dns_db_detachnode(db, &node);
1805 1.1 christos if (result == ISC_R_NOTFOUND) {
1806 1.1 christos *iterationsp = 0;
1807 1.1 christos return (ISC_R_SUCCESS);
1808 1.1 christos }
1809 1.1 christos if (result != ISC_R_SUCCESS)
1810 1.1 christos goto failure;
1811 1.1 christos
1812 1.1 christos for (result = dns_rdataset_first(&rdataset);
1813 1.1 christos result == ISC_R_SUCCESS;
1814 1.1 christos result = dns_rdataset_next(&rdataset)) {
1815 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1816 1.4 christos dns_rdataset_current(&rdataset, &rdata);
1817 1.4 christos
1818 1.4 christos REQUIRE(rdata.type == dns_rdatatype_key ||
1819 1.4 christos rdata.type == dns_rdatatype_dnskey);
1820 1.4 christos REQUIRE(rdata.length > 3);
1821 1.4 christos
1822 1.4 christos /* Skip unsupported algorithms when
1823 1.4 christos * calculating the maximum iterations.
1824 1.4 christos */
1825 1.4 christos if (!dst_algorithm_supported(rdata.data[3]))
1826 1.4 christos continue;
1827 1.1 christos
1828 1.1 christos isc_buffer_init(&buffer, rdata.data, rdata.length);
1829 1.1 christos isc_buffer_add(&buffer, rdata.length);
1830 1.1 christos CHECK(dst_key_fromdns(dns_db_origin(db), rdataset.rdclass,
1831 1.1 christos &buffer, mctx, &key));
1832 1.1 christos bits = dst_key_size(key);
1833 1.1 christos dst_key_free(&key);
1834 1.1 christos if (minbits > bits)
1835 1.1 christos minbits = bits;
1836 1.1 christos }
1837 1.1 christos if (result != ISC_R_NOMORE)
1838 1.1 christos goto failure;
1839 1.1 christos
1840 1.1 christos if (minbits <= 1024)
1841 1.1 christos *iterationsp = 150;
1842 1.1 christos else if (minbits <= 2048)
1843 1.1 christos *iterationsp = 500;
1844 1.1 christos else
1845 1.1 christos *iterationsp = 2500;
1846 1.1 christos result = ISC_R_SUCCESS;
1847 1.1 christos
1848 1.1 christos failure:
1849 1.1 christos if (dns_rdataset_isassociated(&rdataset))
1850 1.1 christos dns_rdataset_disassociate(&rdataset);
1851 1.1 christos return (result);
1852 1.1 christos }
1853 1.1 christos
1854 1.1 christos isc_result_t
1855 1.1 christos dns_nsec3_noexistnodata(dns_rdatatype_t type, const dns_name_t *name,
1856 1.1 christos const dns_name_t *nsec3name, dns_rdataset_t *nsec3set,
1857 1.3 christos dns_name_t *zonename, bool *exists,
1858 1.3 christos bool *data, bool *optout,
1859 1.3 christos bool *unknown, bool *setclosest,
1860 1.3 christos bool *setnearest, dns_name_t *closest,
1861 1.1 christos dns_name_t *nearest, dns_nseclog_t logit, void *arg)
1862 1.1 christos {
1863 1.1 christos char namebuf[DNS_NAME_FORMATSIZE];
1864 1.1 christos dns_fixedname_t fzone;
1865 1.1 christos dns_fixedname_t qfixed;
1866 1.1 christos dns_label_t hashlabel;
1867 1.1 christos dns_name_t *qname;
1868 1.1 christos dns_name_t *zone;
1869 1.1 christos dns_rdata_nsec3_t nsec3;
1870 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT;
1871 1.1 christos int order;
1872 1.1 christos int scope;
1873 1.3 christos bool atparent;
1874 1.3 christos bool first;
1875 1.3 christos bool ns;
1876 1.3 christos bool soa;
1877 1.1 christos isc_buffer_t buffer;
1878 1.1 christos isc_result_t answer = ISC_R_IGNORE;
1879 1.1 christos isc_result_t result;
1880 1.1 christos unsigned char hash[NSEC3_MAX_HASH_LENGTH];
1881 1.1 christos unsigned char owner[NSEC3_MAX_HASH_LENGTH];
1882 1.1 christos unsigned int length;
1883 1.1 christos unsigned int qlabels;
1884 1.1 christos unsigned int zlabels;
1885 1.1 christos
1886 1.1 christos REQUIRE((exists == NULL && data == NULL) ||
1887 1.1 christos (exists != NULL && data != NULL));
1888 1.1 christos REQUIRE(nsec3set != NULL && nsec3set->type == dns_rdatatype_nsec3);
1889 1.1 christos REQUIRE((setclosest == NULL && closest == NULL) ||
1890 1.1 christos (setclosest != NULL && closest != NULL));
1891 1.1 christos REQUIRE((setnearest == NULL && nearest == NULL) ||
1892 1.1 christos (setnearest != NULL && nearest != NULL));
1893 1.1 christos
1894 1.1 christos result = dns_rdataset_first(nsec3set);
1895 1.1 christos if (result != ISC_R_SUCCESS) {
1896 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3), "failure processing NSEC3 set");
1897 1.1 christos return (result);
1898 1.1 christos }
1899 1.1 christos
1900 1.1 christos dns_rdataset_current(nsec3set, &rdata);
1901 1.1 christos
1902 1.1 christos result = dns_rdata_tostruct(&rdata, &nsec3, NULL);
1903 1.1 christos if (result != ISC_R_SUCCESS)
1904 1.1 christos return (result);
1905 1.1 christos
1906 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3), "looking for relevant NSEC3");
1907 1.1 christos
1908 1.1 christos zone = dns_fixedname_initname(&fzone);
1909 1.1 christos zlabels = dns_name_countlabels(nsec3name);
1910 1.1 christos
1911 1.1 christos /*
1912 1.1 christos * NSEC3 records must have two or more labels to be valid.
1913 1.1 christos */
1914 1.1 christos if (zlabels < 2)
1915 1.1 christos return (ISC_R_IGNORE);
1916 1.1 christos
1917 1.1 christos /*
1918 1.1 christos * Strip off the NSEC3 hash to get the zone.
1919 1.1 christos */
1920 1.1 christos zlabels--;
1921 1.1 christos dns_name_split(nsec3name, zlabels, NULL, zone);
1922 1.1 christos
1923 1.1 christos /*
1924 1.1 christos * If not below the zone name we can ignore this record.
1925 1.1 christos */
1926 1.1 christos if (!dns_name_issubdomain(name, zone))
1927 1.1 christos return (ISC_R_IGNORE);
1928 1.1 christos
1929 1.1 christos /*
1930 1.1 christos * Is this zone the same or deeper than the current zone?
1931 1.1 christos */
1932 1.1 christos if (dns_name_countlabels(zonename) == 0 ||
1933 1.1 christos dns_name_issubdomain(zone, zonename))
1934 1.1 christos dns_name_copy(zone, zonename, NULL);
1935 1.1 christos
1936 1.1 christos if (!dns_name_equal(zone, zonename))
1937 1.1 christos return (ISC_R_IGNORE);
1938 1.1 christos
1939 1.1 christos /*
1940 1.1 christos * Are we only looking for the most enclosing zone?
1941 1.1 christos */
1942 1.1 christos if (exists == NULL || data == NULL)
1943 1.1 christos return (ISC_R_SUCCESS);
1944 1.1 christos
1945 1.1 christos /*
1946 1.1 christos * Only set unknown once we are sure that this NSEC3 is from
1947 1.1 christos * the deepest covering zone.
1948 1.1 christos */
1949 1.1 christos if (!dns_nsec3_supportedhash(nsec3.hash)) {
1950 1.1 christos if (unknown != NULL)
1951 1.3 christos *unknown = true;
1952 1.1 christos return (ISC_R_IGNORE);
1953 1.1 christos }
1954 1.1 christos
1955 1.1 christos /*
1956 1.1 christos * Recover the hash from the first label.
1957 1.1 christos */
1958 1.1 christos dns_name_getlabel(nsec3name, 0, &hashlabel);
1959 1.1 christos isc_region_consume(&hashlabel, 1);
1960 1.1 christos isc_buffer_init(&buffer, owner, sizeof(owner));
1961 1.1 christos result = isc_base32hex_decoderegion(&hashlabel, &buffer);
1962 1.1 christos if (result != ISC_R_SUCCESS)
1963 1.1 christos return (result);
1964 1.1 christos
1965 1.1 christos /*
1966 1.1 christos * The hash lengths should match. If not ignore the record.
1967 1.1 christos */
1968 1.1 christos if (isc_buffer_usedlength(&buffer) != nsec3.next_length)
1969 1.1 christos return (ISC_R_IGNORE);
1970 1.1 christos
1971 1.1 christos /*
1972 1.1 christos * Work out what this NSEC3 covers.
1973 1.1 christos * Inside (<0) or outside (>=0).
1974 1.1 christos */
1975 1.3 christos scope = memcmp(owner, nsec3.next, nsec3.next_length);
1976 1.1 christos
1977 1.1 christos /*
1978 1.1 christos * Prepare to compute all the hashes.
1979 1.1 christos */
1980 1.1 christos qname = dns_fixedname_initname(&qfixed);
1981 1.1 christos dns_name_downcase(name, qname, NULL);
1982 1.1 christos qlabels = dns_name_countlabels(qname);
1983 1.3 christos first = true;
1984 1.1 christos
1985 1.1 christos while (qlabels >= zlabels) {
1986 1.1 christos length = isc_iterated_hash(hash, nsec3.hash, nsec3.iterations,
1987 1.1 christos nsec3.salt, nsec3.salt_length,
1988 1.1 christos qname->ndata, qname->length);
1989 1.1 christos /*
1990 1.1 christos * The computed hash length should match.
1991 1.1 christos */
1992 1.1 christos if (length != nsec3.next_length) {
1993 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
1994 1.1 christos "ignoring NSEC bad length %u vs %u",
1995 1.1 christos length, nsec3.next_length);
1996 1.1 christos return (ISC_R_IGNORE);
1997 1.1 christos }
1998 1.1 christos
1999 1.3 christos order = memcmp(hash, owner, length);
2000 1.1 christos if (first && order == 0) {
2001 1.1 christos /*
2002 1.1 christos * The hashes are the same.
2003 1.1 christos */
2004 1.1 christos atparent = dns_rdatatype_atparent(type);
2005 1.1 christos ns = dns_nsec3_typepresent(&rdata, dns_rdatatype_ns);
2006 1.1 christos soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa);
2007 1.1 christos if (ns && !soa) {
2008 1.1 christos if (!atparent) {
2009 1.1 christos /*
2010 1.1 christos * This NSEC3 record is from somewhere
2011 1.1 christos * higher in the DNS, and at the
2012 1.1 christos * parent of a delegation. It can not
2013 1.1 christos * be legitimately used here.
2014 1.1 christos */
2015 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2016 1.1 christos "ignoring parent NSEC3");
2017 1.1 christos return (ISC_R_IGNORE);
2018 1.1 christos }
2019 1.1 christos } else if (atparent && ns && soa) {
2020 1.1 christos /*
2021 1.1 christos * This NSEC3 record is from the child.
2022 1.1 christos * It can not be legitimately used here.
2023 1.1 christos */
2024 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2025 1.1 christos "ignoring child NSEC3");
2026 1.1 christos return (ISC_R_IGNORE);
2027 1.1 christos }
2028 1.1 christos if (type == dns_rdatatype_cname ||
2029 1.1 christos type == dns_rdatatype_nxt ||
2030 1.1 christos type == dns_rdatatype_nsec ||
2031 1.1 christos type == dns_rdatatype_key ||
2032 1.1 christos !dns_nsec3_typepresent(&rdata, dns_rdatatype_cname)) {
2033 1.3 christos *exists = true;
2034 1.1 christos *data = dns_nsec3_typepresent(&rdata, type);
2035 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2036 1.1 christos "NSEC3 proves name exists (owner) "
2037 1.1 christos "data=%d", *data);
2038 1.1 christos return (ISC_R_SUCCESS);
2039 1.1 christos }
2040 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2041 1.1 christos "NSEC3 proves CNAME exists");
2042 1.1 christos return (ISC_R_IGNORE);
2043 1.1 christos }
2044 1.1 christos
2045 1.1 christos if (order == 0 &&
2046 1.1 christos dns_nsec3_typepresent(&rdata, dns_rdatatype_ns) &&
2047 1.1 christos !dns_nsec3_typepresent(&rdata, dns_rdatatype_soa))
2048 1.1 christos {
2049 1.1 christos /*
2050 1.1 christos * This NSEC3 record is from somewhere higher in
2051 1.1 christos * the DNS, and at the parent of a delegation.
2052 1.1 christos * It can not be legitimately used here.
2053 1.1 christos */
2054 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2055 1.1 christos "ignoring parent NSEC3");
2056 1.1 christos return (ISC_R_IGNORE);
2057 1.1 christos }
2058 1.1 christos
2059 1.1 christos /*
2060 1.1 christos * Potential closest encloser.
2061 1.1 christos */
2062 1.1 christos if (order == 0) {
2063 1.1 christos if (closest != NULL &&
2064 1.1 christos (dns_name_countlabels(closest) == 0 ||
2065 1.1 christos dns_name_issubdomain(qname, closest)) &&
2066 1.1 christos !dns_nsec3_typepresent(&rdata, dns_rdatatype_ds) &&
2067 1.1 christos !dns_nsec3_typepresent(&rdata, dns_rdatatype_dname) &&
2068 1.1 christos (dns_nsec3_typepresent(&rdata, dns_rdatatype_soa) ||
2069 1.1 christos !dns_nsec3_typepresent(&rdata, dns_rdatatype_ns)))
2070 1.1 christos {
2071 1.1 christos
2072 1.1 christos dns_name_format(qname, namebuf,
2073 1.1 christos sizeof(namebuf));
2074 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2075 1.1 christos "NSEC3 indicates potential closest "
2076 1.1 christos "encloser: '%s'", namebuf);
2077 1.1 christos dns_name_copy(qname, closest, NULL);
2078 1.3 christos *setclosest = true;
2079 1.1 christos }
2080 1.1 christos dns_name_format(qname, namebuf, sizeof(namebuf));
2081 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2082 1.1 christos "NSEC3 at super-domain %s", namebuf);
2083 1.1 christos return (answer);
2084 1.1 christos }
2085 1.1 christos
2086 1.1 christos /*
2087 1.1 christos * Find if the name does not exist.
2088 1.1 christos *
2089 1.1 christos * We continue as we need to find the name closest to the
2090 1.1 christos * closest encloser that doesn't exist.
2091 1.1 christos *
2092 1.1 christos * We also need to continue to ensure that we are not
2093 1.1 christos * proving the non-existence of a record in a sub-zone.
2094 1.1 christos * If that would be the case we will return ISC_R_IGNORE
2095 1.1 christos * above.
2096 1.1 christos */
2097 1.1 christos if ((scope < 0 && order > 0 &&
2098 1.1 christos memcmp(hash, nsec3.next, length) < 0) ||
2099 1.1 christos (scope >= 0 && (order > 0 ||
2100 1.1 christos memcmp(hash, nsec3.next, length) < 0)))
2101 1.1 christos {
2102 1.1 christos dns_name_format(qname, namebuf, sizeof(namebuf));
2103 1.1 christos (*logit)(arg, ISC_LOG_DEBUG(3), "NSEC3 proves "
2104 1.1 christos "name does not exist: '%s'", namebuf);
2105 1.1 christos if (nearest != NULL &&
2106 1.1 christos (dns_name_countlabels(nearest) == 0 ||
2107 1.1 christos dns_name_issubdomain(nearest, qname))) {
2108 1.1 christos dns_name_copy(qname, nearest, NULL);
2109 1.3 christos *setnearest = true;
2110 1.1 christos }
2111 1.1 christos
2112 1.3 christos *exists = false;
2113 1.3 christos *data = false;
2114 1.1 christos if (optout != NULL) {
2115 1.3 christos *optout = ((nsec3.flags & DNS_NSEC3FLAG_OPTOUT)
2116 1.3 christos != 0);
2117 1.3 christos (*logit)(arg, ISC_LOG_DEBUG(3),
2118 1.3 christos (*optout
2119 1.3 christos ? "NSEC3 indicates optout"
2120 1.3 christos : "NSEC3 indicates secure range"));
2121 1.1 christos }
2122 1.1 christos answer = ISC_R_SUCCESS;
2123 1.1 christos }
2124 1.1 christos
2125 1.1 christos qlabels--;
2126 1.1 christos if (qlabels > 0)
2127 1.1 christos dns_name_split(qname, qlabels, NULL, qname);
2128 1.3 christos first = false;
2129 1.1 christos }
2130 1.1 christos return (answer);
2131 1.1 christos }
2132