1 1.16 christos /* $NetBSD: rpz.c,v 1.17 2026/01/29 18:37:50 christos Exp $ */ 2 1.1 christos 3 1.1 christos /* 4 1.1 christos * Copyright (C) Internet Systems Consortium, Inc. ("ISC") 5 1.1 christos * 6 1.11 christos * SPDX-License-Identifier: MPL-2.0 7 1.11 christos * 8 1.1 christos * This Source Code Form is subject to the terms of the Mozilla Public 9 1.1 christos * License, v. 2.0. If a copy of the MPL was not distributed with this 10 1.9 christos * file, you can obtain one at https://mozilla.org/MPL/2.0/. 11 1.1 christos * 12 1.1 christos * See the COPYRIGHT file distributed with this work for additional 13 1.1 christos * information regarding copyright ownership. 14 1.1 christos */ 15 1.1 christos 16 1.1 christos /*! \file */ 17 1.1 christos 18 1.3 christos #include <inttypes.h> 19 1.3 christos #include <stdbool.h> 20 1.16 christos #include <stdint.h> 21 1.3 christos #include <stdlib.h> 22 1.3 christos 23 1.16 christos #include <isc/async.h> 24 1.1 christos #include <isc/buffer.h> 25 1.16 christos #include <isc/loop.h> 26 1.15 christos #include <isc/magic.h> 27 1.1 christos #include <isc/mem.h> 28 1.1 christos #include <isc/net.h> 29 1.1 christos #include <isc/netaddr.h> 30 1.16 christos #include <isc/refcount.h> 31 1.15 christos #include <isc/result.h> 32 1.1 christos #include <isc/rwlock.h> 33 1.1 christos #include <isc/string.h> 34 1.1 christos #include <isc/util.h> 35 1.17 christos #include <isc/uv.h> 36 1.16 christos #include <isc/work.h> 37 1.1 christos 38 1.1 christos #include <dns/db.h> 39 1.1 christos #include <dns/dbiterator.h> 40 1.1 christos #include <dns/dnsrps.h> 41 1.1 christos #include <dns/fixedname.h> 42 1.1 christos #include <dns/log.h> 43 1.16 christos #include <dns/qp.h> 44 1.1 christos #include <dns/rdata.h> 45 1.1 christos #include <dns/rdataset.h> 46 1.7 christos #include <dns/rdatasetiter.h> 47 1.1 christos #include <dns/rdatastruct.h> 48 1.1 christos #include <dns/rpz.h> 49 1.1 christos #include <dns/view.h> 50 1.1 christos 51 1.15 christos #define DNS_RPZ_ZONE_MAGIC ISC_MAGIC('r', 'p', 'z', ' ') 52 1.15 christos #define DNS_RPZ_ZONES_MAGIC ISC_MAGIC('r', 'p', 'z', 's') 53 1.15 christos 54 1.15 christos #define DNS_RPZ_ZONE_VALID(rpz) ISC_MAGIC_VALID(rpz, DNS_RPZ_ZONE_MAGIC) 55 1.15 christos #define DNS_RPZ_ZONES_VALID(rpzs) ISC_MAGIC_VALID(rpzs, DNS_RPZ_ZONES_MAGIC) 56 1.15 christos 57 1.1 christos /* 58 1.1 christos * Parallel radix trees for databases of response policy IP addresses 59 1.1 christos * 60 1.1 christos * The radix or patricia trees are somewhat specialized to handle response 61 1.1 christos * policy addresses by representing the two sets of IP addresses and name 62 1.1 christos * server IP addresses in a single tree. One set of IP addresses is 63 1.1 christos * for rpz-ip policies or policies triggered by addresses in A or 64 1.1 christos * AAAA records in responses. 65 1.1 christos * The second set is for rpz-nsip policies or policies triggered by addresses 66 1.1 christos * in A or AAAA records for NS records that are authorities for responses. 67 1.1 christos * 68 1.1 christos * Each leaf indicates that an IP address is listed in the IP address or the 69 1.1 christos * name server IP address policy sub-zone (or both) of the corresponding 70 1.1 christos * response policy zone. The policy data such as a CNAME or an A record 71 1.1 christos * is kept in the policy zone. After an IP address has been found in a radix 72 1.1 christos * tree, the node in the policy zone's database is found by converting 73 1.1 christos * the IP address to a domain name in a canonical form. 74 1.1 christos * 75 1.1 christos * 76 1.1 christos * The response policy zone canonical form of an IPv6 address is one of: 77 1.1 christos * prefix.W.W.W.W.W.W.W.W 78 1.1 christos * prefix.WORDS.zz 79 1.1 christos * prefix.WORDS.zz.WORDS 80 1.1 christos * prefix.zz.WORDS 81 1.1 christos * where 82 1.1 christos * prefix is the prefix length of the IPv6 address between 1 and 128 83 1.1 christos * W is a number between 0 and 65535 84 1.1 christos * WORDS is one or more numbers W separated with "." 85 1.1 christos * zz corresponds to :: in the standard IPv6 text representation 86 1.1 christos * 87 1.1 christos * The canonical form of IPv4 addresses is: 88 1.1 christos * prefix.B.B.B.B 89 1.1 christos * where 90 1.1 christos * prefix is the prefix length of the address between 1 and 32 91 1.1 christos * B is a number between 0 and 255 92 1.1 christos * 93 1.1 christos * Names for IPv4 addresses are distinguished from IPv6 addresses by having 94 1.1 christos * 5 labels all of which are numbers, and a prefix between 1 and 32. 95 1.1 christos */ 96 1.1 christos 97 1.1 christos /* 98 1.1 christos * Nodes hashtable calculation parameters 99 1.1 christos */ 100 1.7 christos #define DNS_RPZ_HTSIZE_MAX 24 101 1.7 christos #define DNS_RPZ_HTSIZE_DIV 3 102 1.1 christos 103 1.15 christos static isc_result_t 104 1.15 christos dns__rpz_shuttingdown(dns_rpz_zones_t *rpzs); 105 1.1 christos static void 106 1.16 christos dns__rpz_timer_cb(void *); 107 1.16 christos static void 108 1.16 christos dns__rpz_timer_start(dns_rpz_zone_t *rpz); 109 1.1 christos 110 1.1 christos /* 111 1.1 christos * Use a private definition of IPv6 addresses because s6_addr32 is not 112 1.1 christos * always defined and our IPv6 addresses are in non-standard byte order 113 1.1 christos */ 114 1.7 christos typedef uint32_t dns_rpz_cidr_word_t; 115 1.7 christos #define DNS_RPZ_CIDR_WORD_BITS ((int)sizeof(dns_rpz_cidr_word_t) * 8) 116 1.7 christos #define DNS_RPZ_CIDR_KEY_BITS ((int)sizeof(dns_rpz_cidr_key_t) * 8) 117 1.7 christos #define DNS_RPZ_CIDR_WORDS (128 / DNS_RPZ_CIDR_WORD_BITS) 118 1.1 christos typedef struct { 119 1.7 christos dns_rpz_cidr_word_t w[DNS_RPZ_CIDR_WORDS]; 120 1.1 christos } dns_rpz_cidr_key_t; 121 1.1 christos 122 1.7 christos #define ADDR_V4MAPPED 0xffff 123 1.7 christos #define KEY_IS_IPV4(prefix, ip) \ 124 1.7 christos ((prefix) >= 96 && (ip)->w[0] == 0 && (ip)->w[1] == 0 && \ 125 1.7 christos (ip)->w[2] == ADDR_V4MAPPED) 126 1.7 christos 127 1.7 christos #define DNS_RPZ_WORD_MASK(b) \ 128 1.7 christos ((b) == 0 ? (dns_rpz_cidr_word_t)(-1) \ 129 1.7 christos : ((dns_rpz_cidr_word_t)(-1) \ 130 1.7 christos << (DNS_RPZ_CIDR_WORD_BITS - (b)))) 131 1.1 christos 132 1.1 christos /* 133 1.1 christos * Get bit #n from the array of words of an IP address. 134 1.1 christos */ 135 1.7 christos #define DNS_RPZ_IP_BIT(ip, n) \ 136 1.7 christos (1 & ((ip)->w[(n) / DNS_RPZ_CIDR_WORD_BITS] >> \ 137 1.7 christos (DNS_RPZ_CIDR_WORD_BITS - 1 - ((n) % DNS_RPZ_CIDR_WORD_BITS)))) 138 1.1 christos 139 1.1 christos /* 140 1.1 christos * A triplet of arrays of bits flagging the existence of 141 1.1 christos * client-IP, IP, and NSIP policy triggers. 142 1.1 christos */ 143 1.1 christos typedef struct dns_rpz_addr_zbits dns_rpz_addr_zbits_t; 144 1.1 christos struct dns_rpz_addr_zbits { 145 1.7 christos dns_rpz_zbits_t client_ip; 146 1.7 christos dns_rpz_zbits_t ip; 147 1.7 christos dns_rpz_zbits_t nsip; 148 1.1 christos }; 149 1.1 christos 150 1.1 christos /* 151 1.1 christos * A CIDR or radix tree node. 152 1.1 christos */ 153 1.1 christos struct dns_rpz_cidr_node { 154 1.7 christos dns_rpz_cidr_node_t *parent; 155 1.7 christos dns_rpz_cidr_node_t *child[2]; 156 1.7 christos dns_rpz_cidr_key_t ip; 157 1.7 christos dns_rpz_prefix_t prefix; 158 1.7 christos dns_rpz_addr_zbits_t set; 159 1.7 christos dns_rpz_addr_zbits_t sum; 160 1.1 christos }; 161 1.1 christos 162 1.1 christos /* 163 1.1 christos * A pair of arrays of bits flagging the existence of 164 1.1 christos * QNAME and NSDNAME policy triggers. 165 1.1 christos */ 166 1.1 christos typedef struct dns_rpz_nm_zbits dns_rpz_nm_zbits_t; 167 1.1 christos struct dns_rpz_nm_zbits { 168 1.7 christos dns_rpz_zbits_t qname; 169 1.7 christos dns_rpz_zbits_t ns; 170 1.1 christos }; 171 1.1 christos 172 1.1 christos /* 173 1.16 christos * The data for a name in the summary database. This has two pairs of bits 174 1.16 christos * for policy zones: one pair is for the exact name of the node, such as 175 1.16 christos * example.com, and the other pair is for a wildcard child such as 176 1.16 christos * *.example.com. 177 1.16 christos */ 178 1.16 christos typedef struct nmdata nmdata_t; 179 1.16 christos struct nmdata { 180 1.16 christos dns_name_t name; 181 1.16 christos isc_mem_t *mctx; 182 1.16 christos isc_refcount_t references; 183 1.7 christos dns_rpz_nm_zbits_t set; 184 1.7 christos dns_rpz_nm_zbits_t wild; 185 1.1 christos }; 186 1.1 christos 187 1.16 christos #ifdef DNS_RPZ_TRACE 188 1.16 christos #define nmdata_ref(ptr) nmdata__ref(ptr, __func__, __FILE__, __LINE__) 189 1.16 christos #define nmdata_unref(ptr) nmdata__unref(ptr, __func__, __FILE__, __LINE__) 190 1.16 christos #define nmdata_attach(ptr, ptrp) \ 191 1.16 christos nmdata__attach(ptr, ptrp, __func__, __FILE__, __LINE__) 192 1.16 christos #define nmdata_detach(ptrp) nmdata__detach(ptrp, __func__, __FILE__, __LINE__) 193 1.16 christos ISC_REFCOUNT_TRACE_DECL(nmdata); 194 1.16 christos #else 195 1.16 christos ISC_REFCOUNT_DECL(nmdata); 196 1.16 christos #endif 197 1.16 christos 198 1.15 christos static isc_result_t 199 1.15 christos rpz_add(dns_rpz_zone_t *rpz, const dns_name_t *src_name); 200 1.5 christos static void 201 1.15 christos rpz_del(dns_rpz_zone_t *rpz, const dns_name_t *src_name); 202 1.1 christos 203 1.16 christos static nmdata_t * 204 1.16 christos new_nmdata(isc_mem_t *mctx, const dns_name_t *name, const nmdata_t *data); 205 1.16 christos 206 1.16 christos /* QP trie methods */ 207 1.16 christos static void 208 1.16 christos qp_attach(void *uctx, void *pval, uint32_t ival); 209 1.16 christos static void 210 1.16 christos qp_detach(void *uctx, void *pval, uint32_t ival); 211 1.16 christos static size_t 212 1.16 christos qp_makekey(dns_qpkey_t key, void *uctx, void *pval, uint32_t ival); 213 1.16 christos static void 214 1.16 christos qp_triename(void *uctx, char *buf, size_t size); 215 1.16 christos 216 1.16 christos static dns_qpmethods_t qpmethods = { 217 1.16 christos qp_attach, 218 1.16 christos qp_detach, 219 1.16 christos qp_makekey, 220 1.16 christos qp_triename, 221 1.16 christos }; 222 1.16 christos 223 1.1 christos const char * 224 1.1 christos dns_rpz_type2str(dns_rpz_type_t type) { 225 1.1 christos switch (type) { 226 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 227 1.16 christos return "CLIENT-IP"; 228 1.1 christos case DNS_RPZ_TYPE_QNAME: 229 1.16 christos return "QNAME"; 230 1.1 christos case DNS_RPZ_TYPE_IP: 231 1.16 christos return "IP"; 232 1.1 christos case DNS_RPZ_TYPE_NSIP: 233 1.16 christos return "NSIP"; 234 1.1 christos case DNS_RPZ_TYPE_NSDNAME: 235 1.16 christos return "NSDNAME"; 236 1.1 christos case DNS_RPZ_TYPE_BAD: 237 1.1 christos break; 238 1.1 christos } 239 1.15 christos FATAL_ERROR("impossible rpz type %d", type); 240 1.16 christos return "impossible"; 241 1.1 christos } 242 1.1 christos 243 1.1 christos dns_rpz_policy_t 244 1.1 christos dns_rpz_str2policy(const char *str) { 245 1.1 christos static struct { 246 1.1 christos const char *str; 247 1.1 christos dns_rpz_policy_t policy; 248 1.1 christos } tbl[] = { 249 1.7 christos { "given", DNS_RPZ_POLICY_GIVEN }, 250 1.7 christos { "disabled", DNS_RPZ_POLICY_DISABLED }, 251 1.7 christos { "passthru", DNS_RPZ_POLICY_PASSTHRU }, 252 1.7 christos { "drop", DNS_RPZ_POLICY_DROP }, 253 1.7 christos { "tcp-only", DNS_RPZ_POLICY_TCP_ONLY }, 254 1.7 christos { "nxdomain", DNS_RPZ_POLICY_NXDOMAIN }, 255 1.7 christos { "nodata", DNS_RPZ_POLICY_NODATA }, 256 1.7 christos { "cname", DNS_RPZ_POLICY_CNAME }, 257 1.7 christos { "no-op", DNS_RPZ_POLICY_PASSTHRU }, /* old passthru */ 258 1.1 christos }; 259 1.1 christos unsigned int n; 260 1.1 christos 261 1.7 christos if (str == NULL) { 262 1.16 christos return DNS_RPZ_POLICY_ERROR; 263 1.7 christos } 264 1.7 christos for (n = 0; n < sizeof(tbl) / sizeof(tbl[0]); ++n) { 265 1.7 christos if (!strcasecmp(tbl[n].str, str)) { 266 1.16 christos return tbl[n].policy; 267 1.7 christos } 268 1.1 christos } 269 1.16 christos return DNS_RPZ_POLICY_ERROR; 270 1.1 christos } 271 1.1 christos 272 1.1 christos const char * 273 1.1 christos dns_rpz_policy2str(dns_rpz_policy_t policy) { 274 1.15 christos const char *str = NULL; 275 1.1 christos 276 1.1 christos switch (policy) { 277 1.1 christos case DNS_RPZ_POLICY_PASSTHRU: 278 1.1 christos str = "PASSTHRU"; 279 1.1 christos break; 280 1.1 christos case DNS_RPZ_POLICY_DROP: 281 1.1 christos str = "DROP"; 282 1.1 christos break; 283 1.1 christos case DNS_RPZ_POLICY_TCP_ONLY: 284 1.1 christos str = "TCP-ONLY"; 285 1.1 christos break; 286 1.1 christos case DNS_RPZ_POLICY_NXDOMAIN: 287 1.1 christos str = "NXDOMAIN"; 288 1.1 christos break; 289 1.1 christos case DNS_RPZ_POLICY_NODATA: 290 1.1 christos str = "NODATA"; 291 1.1 christos break; 292 1.1 christos case DNS_RPZ_POLICY_RECORD: 293 1.1 christos str = "Local-Data"; 294 1.1 christos break; 295 1.1 christos case DNS_RPZ_POLICY_CNAME: 296 1.1 christos case DNS_RPZ_POLICY_WILDCNAME: 297 1.1 christos str = "CNAME"; 298 1.1 christos break; 299 1.1 christos case DNS_RPZ_POLICY_MISS: 300 1.1 christos str = "MISS"; 301 1.1 christos break; 302 1.5 christos case DNS_RPZ_POLICY_DNS64: 303 1.5 christos str = "DNS64"; 304 1.5 christos break; 305 1.11 christos case DNS_RPZ_POLICY_ERROR: 306 1.11 christos str = "ERROR"; 307 1.11 christos break; 308 1.1 christos default: 309 1.11 christos UNREACHABLE(); 310 1.1 christos } 311 1.16 christos return str; 312 1.16 christos } 313 1.16 christos 314 1.16 christos uint16_t 315 1.16 christos dns_rpz_str2ede(const char *str) { 316 1.16 christos static struct { 317 1.16 christos const char *str; 318 1.16 christos uint16_t ede; 319 1.16 christos } tbl[] = { 320 1.16 christos { "none", 0 }, 321 1.16 christos { "forged", DNS_EDE_FORGEDANSWER }, 322 1.16 christos { "blocked", DNS_EDE_BLOCKED }, 323 1.16 christos { "censored", DNS_EDE_CENSORED }, 324 1.16 christos { "filtered", DNS_EDE_FILTERED }, 325 1.16 christos { "prohibited", DNS_EDE_PROHIBITED }, 326 1.16 christos }; 327 1.16 christos unsigned int n; 328 1.16 christos 329 1.16 christos if (str == NULL) { 330 1.16 christos return UINT16_MAX; 331 1.16 christos } 332 1.16 christos for (n = 0; n < sizeof(tbl) / sizeof(tbl[0]); ++n) { 333 1.16 christos if (!strcasecmp(tbl[n].str, str)) { 334 1.16 christos return tbl[n].ede; 335 1.16 christos } 336 1.16 christos } 337 1.16 christos return UINT16_MAX; 338 1.1 christos } 339 1.1 christos 340 1.1 christos /* 341 1.1 christos * Return the bit number of the highest set bit in 'zbit'. 342 1.1 christos * (for example, 0x01 returns 0, 0xFF returns 7, etc.) 343 1.1 christos */ 344 1.1 christos static int 345 1.1 christos zbit_to_num(dns_rpz_zbits_t zbit) { 346 1.1 christos dns_rpz_num_t rpz_num; 347 1.1 christos 348 1.1 christos REQUIRE(zbit != 0); 349 1.1 christos rpz_num = 0; 350 1.3 christos if ((zbit & 0xffffffff00000000ULL) != 0) { 351 1.1 christos zbit >>= 32; 352 1.1 christos rpz_num += 32; 353 1.1 christos } 354 1.1 christos if ((zbit & 0xffff0000) != 0) { 355 1.1 christos zbit >>= 16; 356 1.1 christos rpz_num += 16; 357 1.1 christos } 358 1.1 christos if ((zbit & 0xff00) != 0) { 359 1.1 christos zbit >>= 8; 360 1.1 christos rpz_num += 8; 361 1.1 christos } 362 1.1 christos if ((zbit & 0xf0) != 0) { 363 1.1 christos zbit >>= 4; 364 1.1 christos rpz_num += 4; 365 1.1 christos } 366 1.1 christos if ((zbit & 0xc) != 0) { 367 1.1 christos zbit >>= 2; 368 1.1 christos rpz_num += 2; 369 1.1 christos } 370 1.7 christos if ((zbit & 2) != 0) { 371 1.1 christos ++rpz_num; 372 1.7 christos } 373 1.16 christos return rpz_num; 374 1.1 christos } 375 1.1 christos 376 1.1 christos /* 377 1.1 christos * Make a set of bit masks given one or more bits and their type. 378 1.1 christos */ 379 1.1 christos static void 380 1.1 christos make_addr_set(dns_rpz_addr_zbits_t *tgt_set, dns_rpz_zbits_t zbits, 381 1.7 christos dns_rpz_type_t type) { 382 1.1 christos switch (type) { 383 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 384 1.1 christos tgt_set->client_ip = zbits; 385 1.1 christos tgt_set->ip = 0; 386 1.1 christos tgt_set->nsip = 0; 387 1.1 christos break; 388 1.1 christos case DNS_RPZ_TYPE_IP: 389 1.1 christos tgt_set->client_ip = 0; 390 1.1 christos tgt_set->ip = zbits; 391 1.1 christos tgt_set->nsip = 0; 392 1.1 christos break; 393 1.1 christos case DNS_RPZ_TYPE_NSIP: 394 1.1 christos tgt_set->client_ip = 0; 395 1.1 christos tgt_set->ip = 0; 396 1.1 christos tgt_set->nsip = zbits; 397 1.1 christos break; 398 1.1 christos default: 399 1.11 christos UNREACHABLE(); 400 1.1 christos } 401 1.1 christos } 402 1.1 christos 403 1.1 christos static void 404 1.7 christos make_nm_set(dns_rpz_nm_zbits_t *tgt_set, dns_rpz_num_t rpz_num, 405 1.7 christos dns_rpz_type_t type) { 406 1.1 christos switch (type) { 407 1.1 christos case DNS_RPZ_TYPE_QNAME: 408 1.1 christos tgt_set->qname = DNS_RPZ_ZBIT(rpz_num); 409 1.1 christos tgt_set->ns = 0; 410 1.1 christos break; 411 1.1 christos case DNS_RPZ_TYPE_NSDNAME: 412 1.1 christos tgt_set->qname = 0; 413 1.1 christos tgt_set->ns = DNS_RPZ_ZBIT(rpz_num); 414 1.1 christos break; 415 1.1 christos default: 416 1.11 christos UNREACHABLE(); 417 1.1 christos } 418 1.1 christos } 419 1.1 christos 420 1.1 christos /* 421 1.1 christos * Mark a node and all of its parents as having client-IP, IP, or NSIP data 422 1.1 christos */ 423 1.1 christos static void 424 1.1 christos set_sum_pair(dns_rpz_cidr_node_t *cnode) { 425 1.1 christos dns_rpz_addr_zbits_t sum; 426 1.1 christos 427 1.1 christos do { 428 1.15 christos dns_rpz_cidr_node_t *child = cnode->child[0]; 429 1.1 christos sum = cnode->set; 430 1.1 christos 431 1.1 christos if (child != NULL) { 432 1.1 christos sum.client_ip |= child->sum.client_ip; 433 1.1 christos sum.ip |= child->sum.ip; 434 1.1 christos sum.nsip |= child->sum.nsip; 435 1.1 christos } 436 1.1 christos 437 1.1 christos child = cnode->child[1]; 438 1.1 christos if (child != NULL) { 439 1.1 christos sum.client_ip |= child->sum.client_ip; 440 1.1 christos sum.ip |= child->sum.ip; 441 1.1 christos sum.nsip |= child->sum.nsip; 442 1.1 christos } 443 1.1 christos 444 1.1 christos if (cnode->sum.client_ip == sum.client_ip && 445 1.7 christos cnode->sum.ip == sum.ip && cnode->sum.nsip == sum.nsip) 446 1.7 christos { 447 1.1 christos break; 448 1.7 christos } 449 1.1 christos cnode->sum = sum; 450 1.1 christos cnode = cnode->parent; 451 1.1 christos } while (cnode != NULL); 452 1.1 christos } 453 1.1 christos 454 1.1 christos /* Caller must hold rpzs->maint_lock */ 455 1.1 christos static void 456 1.1 christos fix_qname_skip_recurse(dns_rpz_zones_t *rpzs) { 457 1.1 christos dns_rpz_zbits_t mask; 458 1.1 christos 459 1.1 christos /* 460 1.1 christos * qname_wait_recurse and qname_skip_recurse are used to 461 1.1 christos * implement the "qname-wait-recurse" config option. 462 1.1 christos * 463 1.1 christos * When "qname-wait-recurse" is yes, no processing happens without 464 1.1 christos * recursion. In this case, qname_wait_recurse is true, and 465 1.1 christos * qname_skip_recurse (a bit field indicating which policy zones 466 1.1 christos * can be processed without recursion) is set to all 0's by 467 1.1 christos * fix_qname_skip_recurse(). 468 1.1 christos * 469 1.1 christos * When "qname-wait-recurse" is no, qname_skip_recurse may be 470 1.1 christos * set to a non-zero value by fix_qname_skip_recurse(). The mask 471 1.1 christos * has to have bits set for the policy zones for which 472 1.1 christos * processing may continue without recursion, and bits cleared 473 1.1 christos * for the rest. 474 1.1 christos * 475 1.1 christos * (1) The ARM says: 476 1.1 christos * 477 1.1 christos * The "qname-wait-recurse no" option overrides that default 478 1.1 christos * behavior when recursion cannot change a non-error 479 1.1 christos * response. The option does not affect QNAME or client-IP 480 1.1 christos * triggers in policy zones listed after other zones 481 1.1 christos * containing IP, NSIP and NSDNAME triggers, because those may 482 1.1 christos * depend on the A, AAAA, and NS records that would be found 483 1.1 christos * during recursive resolution. 484 1.1 christos * 485 1.1 christos * Let's consider the following: 486 1.1 christos * 487 1.1 christos * zbits_req = (rpzs->have.ipv4 | rpzs->have.ipv6 | 488 1.1 christos * rpzs->have.nsdname | 489 1.1 christos * rpzs->have.nsipv4 | rpzs->have.nsipv6); 490 1.1 christos * 491 1.1 christos * zbits_req now contains bits set for zones which require 492 1.1 christos * recursion. 493 1.1 christos * 494 1.1 christos * But going by the description in the ARM, if the first policy 495 1.1 christos * zone requires recursion, then all zones after that (higher 496 1.1 christos * order bits) have to wait as well. If the Nth zone requires 497 1.1 christos * recursion, then (N+1)th zone onwards all need to wait. 498 1.1 christos * 499 1.1 christos * So mapping this, examples: 500 1.1 christos * 501 1.1 christos * zbits_req = 0b000 mask = 0xffffffff (no zones have to wait for 502 1.1 christos * recursion) 503 1.1 christos * zbits_req = 0b001 mask = 0x00000000 (all zones have to wait) 504 1.1 christos * zbits_req = 0b010 mask = 0x00000001 (the first zone doesn't have to 505 1.1 christos * wait, second zone onwards need 506 1.1 christos * to wait) 507 1.1 christos * zbits_req = 0b011 mask = 0x00000000 (all zones have to wait) 508 1.1 christos * zbits_req = 0b100 mask = 0x00000011 (the 1st and 2nd zones don't 509 1.1 christos * have to wait, third zone 510 1.1 christos * onwards need to wait) 511 1.1 christos * 512 1.1 christos * More generally, we have to count the number of trailing 0 513 1.1 christos * bits in zbits_req and only these can be processed without 514 1.1 christos * recursion. All the rest need to wait. 515 1.1 christos * 516 1.1 christos * (2) The ARM says that "qname-wait-recurse no" option 517 1.1 christos * overrides the default behavior when recursion cannot change a 518 1.1 christos * non-error response. So, in the order of listing of policy 519 1.1 christos * zones, within the first policy zone where recursion may be 520 1.1 christos * required, we should first allow CLIENT-IP and QNAME policy 521 1.1 christos * records to be attempted without recursion. 522 1.1 christos */ 523 1.1 christos 524 1.1 christos /* 525 1.1 christos * Get a mask covering all policy zones that are not subordinate to 526 1.1 christos * other policy zones containing triggers that require that the 527 1.1 christos * qname be resolved before they can be checked. 528 1.1 christos */ 529 1.1 christos rpzs->have.client_ip = rpzs->have.client_ipv4 | rpzs->have.client_ipv6; 530 1.1 christos rpzs->have.ip = rpzs->have.ipv4 | rpzs->have.ipv6; 531 1.1 christos rpzs->have.nsip = rpzs->have.nsipv4 | rpzs->have.nsipv6; 532 1.1 christos 533 1.1 christos if (rpzs->p.qname_wait_recurse) { 534 1.1 christos mask = 0; 535 1.1 christos } else { 536 1.1 christos dns_rpz_zbits_t zbits_req; 537 1.1 christos dns_rpz_zbits_t zbits_notreq; 538 1.1 christos dns_rpz_zbits_t mask2; 539 1.1 christos dns_rpz_zbits_t req_mask; 540 1.1 christos 541 1.1 christos /* 542 1.1 christos * Get the masks of zones with policies that 543 1.1 christos * do/don't require recursion 544 1.1 christos */ 545 1.1 christos 546 1.1 christos zbits_req = (rpzs->have.ipv4 | rpzs->have.ipv6 | 547 1.7 christos rpzs->have.nsdname | rpzs->have.nsipv4 | 548 1.7 christos rpzs->have.nsipv6); 549 1.1 christos zbits_notreq = (rpzs->have.client_ip | rpzs->have.qname); 550 1.1 christos 551 1.1 christos if (zbits_req == 0) { 552 1.1 christos mask = DNS_RPZ_ALL_ZBITS; 553 1.1 christos goto set; 554 1.1 christos } 555 1.1 christos 556 1.1 christos /* 557 1.1 christos * req_mask is a mask covering used bits in 558 1.1 christos * zbits_req. (For instance, 0b1 => 0b1, 0b101 => 0b111, 559 1.1 christos * 0b11010101 => 0b11111111). 560 1.1 christos */ 561 1.1 christos req_mask = zbits_req; 562 1.1 christos req_mask |= req_mask >> 1; 563 1.1 christos req_mask |= req_mask >> 2; 564 1.1 christos req_mask |= req_mask >> 4; 565 1.1 christos req_mask |= req_mask >> 8; 566 1.1 christos req_mask |= req_mask >> 16; 567 1.1 christos req_mask |= req_mask >> 32; 568 1.1 christos 569 1.1 christos /* 570 1.1 christos * There's no point in skipping recursion for a later 571 1.1 christos * zone if it is required in a previous zone. 572 1.1 christos */ 573 1.1 christos if ((zbits_notreq & req_mask) == 0) { 574 1.1 christos mask = 0; 575 1.1 christos goto set; 576 1.1 christos } 577 1.1 christos 578 1.1 christos /* 579 1.1 christos * This bit arithmetic creates a mask of zones in which 580 1.1 christos * it is okay to skip recursion. After the first zone 581 1.1 christos * that has to wait for recursion, all the others have 582 1.1 christos * to wait as well, so we want to create a mask in which 583 1.1 christos * all the trailing zeroes in zbits_req are are 1, and 584 1.1 christos * more significant bits are 0. (For instance, 585 1.1 christos * 0x0700 => 0x00ff, 0x0007 => 0x0000) 586 1.1 christos */ 587 1.1 christos mask = ~(zbits_req | ((~zbits_req) + 1)); 588 1.1 christos 589 1.1 christos /* 590 1.1 christos * As mentioned in (2) above, the zone corresponding to 591 1.1 christos * the least significant zero could have its CLIENT-IP 592 1.1 christos * and QNAME policies checked before recursion, if it 593 1.1 christos * has any of those policies. So if it does, we 594 1.1 christos * can set its 0 to 1. 595 1.1 christos * 596 1.1 christos * Locate the least significant 0 bit in the mask (for 597 1.1 christos * instance, 0xff => 0x100)... 598 1.1 christos */ 599 1.1 christos mask2 = (mask << 1) & ~mask; 600 1.1 christos 601 1.1 christos /* 602 1.1 christos * Also set the bit for zone 0, because if it's in 603 1.1 christos * zbits_notreq then it's definitely okay to attempt to 604 1.1 christos * skip recursion for zone 0... 605 1.1 christos */ 606 1.1 christos mask2 |= 1; 607 1.1 christos 608 1.1 christos /* Clear any bits *not* in zbits_notreq... */ 609 1.1 christos mask2 &= zbits_notreq; 610 1.1 christos 611 1.1 christos /* And merge the result into the skip-recursion mask */ 612 1.1 christos mask |= mask2; 613 1.1 christos } 614 1.1 christos 615 1.7 christos set: 616 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, DNS_LOGMODULE_RBTDB, 617 1.1 christos DNS_RPZ_DEBUG_QUIET, 618 1.3 christos "computed RPZ qname_skip_recurse mask=0x%" PRIx64, 619 1.7 christos (uint64_t)mask); 620 1.1 christos rpzs->have.qname_skip_recurse = mask; 621 1.1 christos } 622 1.1 christos 623 1.1 christos static void 624 1.15 christos adj_trigger_cnt(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 625 1.15 christos const dns_rpz_cidr_key_t *tgt_ip, dns_rpz_prefix_t tgt_prefix, 626 1.15 christos bool inc) { 627 1.3 christos dns_rpz_trigger_counter_t *cnt = NULL; 628 1.3 christos dns_rpz_zbits_t *have = NULL; 629 1.1 christos 630 1.1 christos switch (rpz_type) { 631 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 632 1.1 christos REQUIRE(tgt_ip != NULL); 633 1.1 christos if (KEY_IS_IPV4(tgt_prefix, tgt_ip)) { 634 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].client_ipv4; 635 1.15 christos have = &rpz->rpzs->have.client_ipv4; 636 1.1 christos } else { 637 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].client_ipv6; 638 1.15 christos have = &rpz->rpzs->have.client_ipv6; 639 1.1 christos } 640 1.1 christos break; 641 1.1 christos case DNS_RPZ_TYPE_QNAME: 642 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].qname; 643 1.15 christos have = &rpz->rpzs->have.qname; 644 1.1 christos break; 645 1.1 christos case DNS_RPZ_TYPE_IP: 646 1.1 christos REQUIRE(tgt_ip != NULL); 647 1.1 christos if (KEY_IS_IPV4(tgt_prefix, tgt_ip)) { 648 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].ipv4; 649 1.15 christos have = &rpz->rpzs->have.ipv4; 650 1.1 christos } else { 651 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].ipv6; 652 1.15 christos have = &rpz->rpzs->have.ipv6; 653 1.1 christos } 654 1.1 christos break; 655 1.1 christos case DNS_RPZ_TYPE_NSDNAME: 656 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].nsdname; 657 1.15 christos have = &rpz->rpzs->have.nsdname; 658 1.1 christos break; 659 1.1 christos case DNS_RPZ_TYPE_NSIP: 660 1.1 christos REQUIRE(tgt_ip != NULL); 661 1.1 christos if (KEY_IS_IPV4(tgt_prefix, tgt_ip)) { 662 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].nsipv4; 663 1.15 christos have = &rpz->rpzs->have.nsipv4; 664 1.1 christos } else { 665 1.15 christos cnt = &rpz->rpzs->triggers[rpz->num].nsipv6; 666 1.15 christos have = &rpz->rpzs->have.nsipv6; 667 1.1 christos } 668 1.1 christos break; 669 1.1 christos default: 670 1.11 christos UNREACHABLE(); 671 1.1 christos } 672 1.1 christos 673 1.1 christos if (inc) { 674 1.1 christos if (++*cnt == 1U) { 675 1.15 christos *have |= DNS_RPZ_ZBIT(rpz->num); 676 1.15 christos fix_qname_skip_recurse(rpz->rpzs); 677 1.1 christos } 678 1.1 christos } else { 679 1.1 christos REQUIRE(*cnt != 0U); 680 1.1 christos if (--*cnt == 0U) { 681 1.15 christos *have &= ~DNS_RPZ_ZBIT(rpz->num); 682 1.15 christos fix_qname_skip_recurse(rpz->rpzs); 683 1.1 christos } 684 1.1 christos } 685 1.1 christos } 686 1.1 christos 687 1.1 christos static dns_rpz_cidr_node_t * 688 1.7 christos new_node(dns_rpz_zones_t *rpzs, const dns_rpz_cidr_key_t *ip, 689 1.7 christos dns_rpz_prefix_t prefix, const dns_rpz_cidr_node_t *child) { 690 1.15 christos dns_rpz_cidr_node_t *node = NULL; 691 1.1 christos int i, words, wlen; 692 1.1 christos 693 1.1 christos node = isc_mem_get(rpzs->mctx, sizeof(*node)); 694 1.15 christos *node = (dns_rpz_cidr_node_t){ 695 1.15 christos .prefix = prefix, 696 1.15 christos }; 697 1.1 christos 698 1.7 christos if (child != NULL) { 699 1.1 christos node->sum = child->sum; 700 1.7 christos } 701 1.1 christos 702 1.1 christos words = prefix / DNS_RPZ_CIDR_WORD_BITS; 703 1.1 christos wlen = prefix % DNS_RPZ_CIDR_WORD_BITS; 704 1.1 christos i = 0; 705 1.1 christos while (i < words) { 706 1.1 christos node->ip.w[i] = ip->w[i]; 707 1.1 christos ++i; 708 1.1 christos } 709 1.1 christos if (wlen != 0) { 710 1.1 christos node->ip.w[i] = ip->w[i] & DNS_RPZ_WORD_MASK(wlen); 711 1.1 christos ++i; 712 1.1 christos } 713 1.7 christos while (i < DNS_RPZ_CIDR_WORDS) { 714 1.1 christos node->ip.w[i++] = 0; 715 1.7 christos } 716 1.1 christos 717 1.16 christos return node; 718 1.1 christos } 719 1.1 christos 720 1.1 christos static void 721 1.1 christos badname(int level, const dns_name_t *name, const char *str1, const char *str2) { 722 1.1 christos /* 723 1.1 christos * bin/tests/system/rpz/tests.sh looks for "invalid rpz". 724 1.1 christos */ 725 1.7 christos if (level < DNS_RPZ_DEBUG_QUIET && isc_log_wouldlog(dns_lctx, level)) { 726 1.15 christos char namebuf[DNS_NAME_FORMATSIZE]; 727 1.1 christos dns_name_format(name, namebuf, sizeof(namebuf)); 728 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 729 1.1 christos DNS_LOGMODULE_RBTDB, level, 730 1.7 christos "invalid rpz IP address \"%s\"%s%s", namebuf, 731 1.7 christos str1, str2); 732 1.1 christos } 733 1.1 christos } 734 1.1 christos 735 1.1 christos /* 736 1.1 christos * Convert an IP address from radix tree binary (host byte order) to 737 1.1 christos * to its canonical response policy domain name without the origin of the 738 1.1 christos * policy zone. 739 1.1 christos * 740 1.1 christos * Generate a name for an IPv6 address that fits RFC 5952, except that our 741 1.1 christos * reversed format requires that when the length of the consecutive 16-bit 742 1.1 christos * 0 fields are equal (e.g., 1.0.0.1.0.0.db8.2001 corresponding to 743 1.1 christos * 2001:db8:0:0:1:0:0:1), we shorted the last instead of the first 744 1.1 christos * (e.g., 1.0.0.1.zz.db8.2001 corresponding to 2001:db8::1:0:0:1). 745 1.1 christos */ 746 1.1 christos static isc_result_t 747 1.1 christos ip2name(const dns_rpz_cidr_key_t *tgt_ip, dns_rpz_prefix_t tgt_prefix, 748 1.7 christos const dns_name_t *base_name, dns_name_t *ip_name) { 749 1.1 christos #ifndef INET6_ADDRSTRLEN 750 1.1 christos #define INET6_ADDRSTRLEN 46 751 1.7 christos #endif /* ifndef INET6_ADDRSTRLEN */ 752 1.7 christos char str[1 + 8 + 1 + INET6_ADDRSTRLEN + 1]; 753 1.1 christos isc_buffer_t buffer; 754 1.1 christos isc_result_t result; 755 1.15 christos int len; 756 1.1 christos 757 1.1 christos if (KEY_IS_IPV4(tgt_prefix, tgt_ip)) { 758 1.1 christos len = snprintf(str, sizeof(str), "%u.%u.%u.%u.%u", 759 1.7 christos tgt_prefix - 96U, tgt_ip->w[3] & 0xffU, 760 1.7 christos (tgt_ip->w[3] >> 8) & 0xffU, 761 1.7 christos (tgt_ip->w[3] >> 16) & 0xffU, 762 1.7 christos (tgt_ip->w[3] >> 24) & 0xffU); 763 1.7 christos if (len < 0 || (size_t)len >= sizeof(str)) { 764 1.16 christos return ISC_R_FAILURE; 765 1.1 christos } 766 1.1 christos } else { 767 1.15 christos int w[DNS_RPZ_CIDR_WORDS * 2]; 768 1.15 christos int best_first, best_len, cur_first, cur_len; 769 1.15 christos 770 1.1 christos len = snprintf(str, sizeof(str), "%d", tgt_prefix); 771 1.7 christos if (len < 0 || (size_t)len >= sizeof(str)) { 772 1.16 christos return ISC_R_FAILURE; 773 1.1 christos } 774 1.1 christos 775 1.15 christos for (int n = 0; n < DNS_RPZ_CIDR_WORDS; n++) { 776 1.15 christos w[n * 2 + 1] = 777 1.15 christos ((tgt_ip->w[DNS_RPZ_CIDR_WORDS - 1 - n] >> 16) & 778 1.7 christos 0xffff); 779 1.15 christos w[n * 2] = tgt_ip->w[DNS_RPZ_CIDR_WORDS - 1 - n] & 780 1.7 christos 0xffff; 781 1.1 christos } 782 1.1 christos /* 783 1.1 christos * Find the start and length of the first longest sequence 784 1.1 christos * of zeros in the address. 785 1.1 christos */ 786 1.1 christos best_first = -1; 787 1.1 christos best_len = 0; 788 1.1 christos cur_first = -1; 789 1.1 christos cur_len = 0; 790 1.15 christos for (int n = 0; n <= 7; ++n) { 791 1.1 christos if (w[n] != 0) { 792 1.1 christos cur_len = 0; 793 1.1 christos cur_first = -1; 794 1.1 christos } else { 795 1.1 christos ++cur_len; 796 1.1 christos if (cur_first < 0) { 797 1.1 christos cur_first = n; 798 1.1 christos } else if (cur_len >= best_len) { 799 1.1 christos best_first = cur_first; 800 1.1 christos best_len = cur_len; 801 1.1 christos } 802 1.1 christos } 803 1.1 christos } 804 1.1 christos 805 1.15 christos for (int n = 0; n <= 7; ++n) { 806 1.15 christos int i; 807 1.15 christos 808 1.7 christos INSIST(len > 0 && (size_t)len < sizeof(str)); 809 1.1 christos if (n == best_first) { 810 1.7 christos i = snprintf(str + len, sizeof(str) - len, 811 1.7 christos ".zz"); 812 1.1 christos n += best_len - 1; 813 1.1 christos } else { 814 1.7 christos i = snprintf(str + len, sizeof(str) - len, 815 1.7 christos ".%x", w[n]); 816 1.7 christos } 817 1.7 christos if (i < 0 || (size_t)i >= (size_t)(sizeof(str) - len)) { 818 1.16 christos return ISC_R_FAILURE; 819 1.1 christos } 820 1.7 christos len += i; 821 1.1 christos } 822 1.1 christos } 823 1.1 christos 824 1.1 christos isc_buffer_init(&buffer, str, sizeof(str)); 825 1.1 christos isc_buffer_add(&buffer, len); 826 1.1 christos result = dns_name_fromtext(ip_name, &buffer, base_name, 0, NULL); 827 1.16 christos return result; 828 1.1 christos } 829 1.1 christos 830 1.1 christos /* 831 1.1 christos * Determine the type of a name in a response policy zone. 832 1.1 christos */ 833 1.1 christos static dns_rpz_type_t 834 1.7 christos type_from_name(const dns_rpz_zones_t *rpzs, dns_rpz_zone_t *rpz, 835 1.7 christos const dns_name_t *name) { 836 1.1 christos if (dns_name_issubdomain(name, &rpz->ip)) { 837 1.16 christos return DNS_RPZ_TYPE_IP; 838 1.1 christos } 839 1.1 christos 840 1.1 christos if (dns_name_issubdomain(name, &rpz->client_ip)) { 841 1.16 christos return DNS_RPZ_TYPE_CLIENT_IP; 842 1.1 christos } 843 1.1 christos 844 1.1 christos if ((rpzs->p.nsip_on & DNS_RPZ_ZBIT(rpz->num)) != 0 && 845 1.1 christos dns_name_issubdomain(name, &rpz->nsip)) 846 1.1 christos { 847 1.16 christos return DNS_RPZ_TYPE_NSIP; 848 1.1 christos } 849 1.1 christos 850 1.1 christos if ((rpzs->p.nsdname_on & DNS_RPZ_ZBIT(rpz->num)) != 0 && 851 1.1 christos dns_name_issubdomain(name, &rpz->nsdname)) 852 1.1 christos { 853 1.16 christos return DNS_RPZ_TYPE_NSDNAME; 854 1.1 christos } 855 1.1 christos 856 1.16 christos return DNS_RPZ_TYPE_QNAME; 857 1.1 christos } 858 1.1 christos 859 1.1 christos /* 860 1.1 christos * Convert an IP address from canonical response policy domain name form 861 1.1 christos * to radix tree binary (host byte order) for adding or deleting IP or NSIP 862 1.1 christos * data. 863 1.1 christos */ 864 1.1 christos static isc_result_t 865 1.15 christos name2ipkey(int log_level, dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 866 1.15 christos const dns_name_t *src_name, dns_rpz_cidr_key_t *tgt_ip, 867 1.15 christos dns_rpz_prefix_t *tgt_prefix, dns_rpz_addr_zbits_t *new_set) { 868 1.15 christos char ip_str[DNS_NAME_FORMATSIZE]; 869 1.1 christos dns_offsets_t ip_name_offsets; 870 1.1 christos dns_fixedname_t ip_name2f; 871 1.15 christos dns_name_t ip_name; 872 1.15 christos const char *prefix_str = NULL, *cp = NULL, *end = NULL; 873 1.17 christos char *prefix_end, *cp2; 874 1.1 christos int ip_labels; 875 1.1 christos dns_rpz_prefix_t prefix; 876 1.1 christos unsigned long prefix_num, l; 877 1.1 christos isc_result_t result; 878 1.1 christos int i; 879 1.1 christos 880 1.1 christos REQUIRE(rpz != NULL); 881 1.15 christos REQUIRE(rpz->rpzs != NULL && rpz->num < rpz->rpzs->p.num_zones); 882 1.1 christos 883 1.15 christos make_addr_set(new_set, DNS_RPZ_ZBIT(rpz->num), rpz_type); 884 1.1 christos 885 1.1 christos ip_labels = dns_name_countlabels(src_name); 886 1.7 christos if (rpz_type == DNS_RPZ_TYPE_QNAME) { 887 1.1 christos ip_labels -= dns_name_countlabels(&rpz->origin); 888 1.7 christos } else { 889 1.1 christos ip_labels -= dns_name_countlabels(&rpz->nsdname); 890 1.7 christos } 891 1.1 christos if (ip_labels < 2) { 892 1.1 christos badname(log_level, src_name, "; too short", ""); 893 1.16 christos return ISC_R_FAILURE; 894 1.1 christos } 895 1.1 christos dns_name_init(&ip_name, ip_name_offsets); 896 1.1 christos dns_name_getlabelsequence(src_name, 0, ip_labels, &ip_name); 897 1.1 christos 898 1.1 christos /* 899 1.1 christos * Get text for the IP address 900 1.1 christos */ 901 1.1 christos dns_name_format(&ip_name, ip_str, sizeof(ip_str)); 902 1.7 christos end = &ip_str[strlen(ip_str) + 1]; 903 1.1 christos prefix_str = ip_str; 904 1.1 christos 905 1.1 christos prefix_num = strtoul(prefix_str, &cp2, 10); 906 1.1 christos if (*cp2 != '.') { 907 1.7 christos badname(log_level, src_name, "; invalid leading prefix length", 908 1.7 christos ""); 909 1.16 christos return ISC_R_FAILURE; 910 1.1 christos } 911 1.17 christos prefix_end = cp2; 912 1.1 christos if (prefix_num < 1U || prefix_num > 128U) { 913 1.17 christos *prefix_end = '\0'; 914 1.7 christos badname(log_level, src_name, "; invalid prefix length of ", 915 1.7 christos prefix_str); 916 1.16 christos return ISC_R_FAILURE; 917 1.1 christos } 918 1.7 christos cp = cp2 + 1; 919 1.1 christos 920 1.1 christos if (--ip_labels == 4 && !strchr(cp, 'z')) { 921 1.1 christos /* 922 1.1 christos * Convert an IPv4 address 923 1.1 christos * from the form "prefix.z.y.x.w" 924 1.1 christos */ 925 1.1 christos if (prefix_num > 32U) { 926 1.17 christos *prefix_end = '\0'; 927 1.1 christos badname(log_level, src_name, 928 1.1 christos "; invalid IPv4 prefix length of ", prefix_str); 929 1.16 christos return ISC_R_FAILURE; 930 1.1 christos } 931 1.1 christos prefix_num += 96; 932 1.1 christos *tgt_prefix = (dns_rpz_prefix_t)prefix_num; 933 1.1 christos tgt_ip->w[0] = 0; 934 1.1 christos tgt_ip->w[1] = 0; 935 1.1 christos tgt_ip->w[2] = ADDR_V4MAPPED; 936 1.1 christos tgt_ip->w[3] = 0; 937 1.1 christos for (i = 0; i < 32; i += 8) { 938 1.1 christos l = strtoul(cp, &cp2, 10); 939 1.1 christos if (l > 255U || (*cp2 != '.' && *cp2 != '\0')) { 940 1.7 christos if (*cp2 == '.') { 941 1.1 christos *cp2 = '\0'; 942 1.7 christos } 943 1.1 christos badname(log_level, src_name, 944 1.1 christos "; invalid IPv4 octet ", cp); 945 1.16 christos return ISC_R_FAILURE; 946 1.1 christos } 947 1.1 christos tgt_ip->w[3] |= l << i; 948 1.1 christos cp = cp2 + 1; 949 1.1 christos } 950 1.1 christos } else { 951 1.1 christos /* 952 1.1 christos * Convert a text IPv6 address. 953 1.1 christos */ 954 1.1 christos *tgt_prefix = (dns_rpz_prefix_t)prefix_num; 955 1.7 christos for (i = 0; ip_labels > 0 && i < DNS_RPZ_CIDR_WORDS * 2; 956 1.12 christos ip_labels--) 957 1.12 christos { 958 1.1 christos if (cp[0] == 'z' && cp[1] == 'z' && 959 1.12 christos (cp[2] == '.' || cp[2] == '\0') && i <= 6) 960 1.12 christos { 961 1.1 christos do { 962 1.7 christos if ((i & 1) == 0) { 963 1.7 christos tgt_ip->w[3 - i / 2] = 0; 964 1.7 christos } 965 1.1 christos ++i; 966 1.1 christos } while (ip_labels + i <= 8); 967 1.1 christos cp += 3; 968 1.1 christos } else { 969 1.1 christos l = strtoul(cp, &cp2, 16); 970 1.1 christos if (l > 0xffffu || 971 1.12 christos (*cp2 != '.' && *cp2 != '\0')) 972 1.12 christos { 973 1.7 christos if (*cp2 == '.') { 974 1.7 christos *cp2 = '\0'; 975 1.7 christos } 976 1.1 christos badname(log_level, src_name, 977 1.1 christos "; invalid IPv6 word ", cp); 978 1.16 christos return ISC_R_FAILURE; 979 1.1 christos } 980 1.7 christos if ((i & 1) == 0) { 981 1.7 christos tgt_ip->w[3 - i / 2] = l; 982 1.7 christos } else { 983 1.7 christos tgt_ip->w[3 - i / 2] |= l << 16; 984 1.7 christos } 985 1.1 christos i++; 986 1.1 christos cp = cp2 + 1; 987 1.1 christos } 988 1.1 christos } 989 1.1 christos } 990 1.1 christos if (cp != end) { 991 1.1 christos badname(log_level, src_name, "", ""); 992 1.16 christos return ISC_R_FAILURE; 993 1.1 christos } 994 1.1 christos 995 1.1 christos /* 996 1.1 christos * Check for 1s after the prefix length. 997 1.1 christos */ 998 1.1 christos prefix = (dns_rpz_prefix_t)prefix_num; 999 1.1 christos while (prefix < DNS_RPZ_CIDR_KEY_BITS) { 1000 1.1 christos dns_rpz_cidr_word_t aword; 1001 1.1 christos 1002 1.1 christos i = prefix % DNS_RPZ_CIDR_WORD_BITS; 1003 1.1 christos aword = tgt_ip->w[prefix / DNS_RPZ_CIDR_WORD_BITS]; 1004 1.1 christos if ((aword & ~DNS_RPZ_WORD_MASK(i)) != 0) { 1005 1.17 christos *prefix_end = '\0'; 1006 1.1 christos badname(log_level, src_name, 1007 1.1 christos "; too small prefix length of ", prefix_str); 1008 1.16 christos return ISC_R_FAILURE; 1009 1.1 christos } 1010 1.1 christos prefix -= i; 1011 1.1 christos prefix += DNS_RPZ_CIDR_WORD_BITS; 1012 1.1 christos } 1013 1.1 christos 1014 1.1 christos /* 1015 1.1 christos * Complain about bad names but be generous and accept them. 1016 1.1 christos */ 1017 1.1 christos if (log_level < DNS_RPZ_DEBUG_QUIET && 1018 1.12 christos isc_log_wouldlog(dns_lctx, log_level)) 1019 1.12 christos { 1020 1.1 christos /* 1021 1.1 christos * Convert the address back to a canonical domain name 1022 1.1 christos * to ensure that the original name is in canonical form. 1023 1.1 christos */ 1024 1.15 christos dns_name_t *ip_name2 = dns_fixedname_initname(&ip_name2f); 1025 1.7 christos result = ip2name(tgt_ip, (dns_rpz_prefix_t)prefix_num, NULL, 1026 1.7 christos ip_name2); 1027 1.1 christos if (result != ISC_R_SUCCESS || 1028 1.12 christos !dns_name_equal(&ip_name, ip_name2)) 1029 1.12 christos { 1030 1.15 christos char ip2_str[DNS_NAME_FORMATSIZE]; 1031 1.1 christos dns_name_format(ip_name2, ip2_str, sizeof(ip2_str)); 1032 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 1033 1.1 christos DNS_LOGMODULE_RBTDB, log_level, 1034 1.1 christos "rpz IP address \"%s\"" 1035 1.1 christos " is not the canonical \"%s\"", 1036 1.1 christos ip_str, ip2_str); 1037 1.1 christos } 1038 1.1 christos } 1039 1.1 christos 1040 1.16 christos return ISC_R_SUCCESS; 1041 1.1 christos } 1042 1.1 christos 1043 1.1 christos /* 1044 1.1 christos * Get trigger name and data bits for adding or deleting summary NSDNAME 1045 1.1 christos * or QNAME data. 1046 1.1 christos */ 1047 1.1 christos static void 1048 1.15 christos name2data(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 1049 1.7 christos const dns_name_t *src_name, dns_name_t *trig_name, 1050 1.16 christos nmdata_t *new_data) { 1051 1.1 christos dns_offsets_t tmp_name_offsets; 1052 1.1 christos dns_name_t tmp_name; 1053 1.1 christos unsigned int prefix_len, n; 1054 1.1 christos 1055 1.1 christos REQUIRE(rpz != NULL); 1056 1.15 christos REQUIRE(rpz->rpzs != NULL && rpz->num < rpz->rpzs->p.num_zones); 1057 1.1 christos 1058 1.1 christos /* 1059 1.1 christos * Handle wildcards by putting only the parent into the 1060 1.16 christos * summary database. The database only causes a check of the 1061 1.1 christos * real policy zone where wildcards will be handled. 1062 1.1 christos */ 1063 1.1 christos if (dns_name_iswildcard(src_name)) { 1064 1.1 christos prefix_len = 1; 1065 1.1 christos memset(&new_data->set, 0, sizeof(new_data->set)); 1066 1.15 christos make_nm_set(&new_data->wild, rpz->num, rpz_type); 1067 1.1 christos } else { 1068 1.1 christos prefix_len = 0; 1069 1.15 christos make_nm_set(&new_data->set, rpz->num, rpz_type); 1070 1.1 christos memset(&new_data->wild, 0, sizeof(new_data->wild)); 1071 1.1 christos } 1072 1.1 christos 1073 1.1 christos dns_name_init(&tmp_name, tmp_name_offsets); 1074 1.1 christos n = dns_name_countlabels(src_name); 1075 1.1 christos n -= prefix_len; 1076 1.7 christos if (rpz_type == DNS_RPZ_TYPE_QNAME) { 1077 1.1 christos n -= dns_name_countlabels(&rpz->origin); 1078 1.7 christos } else { 1079 1.1 christos n -= dns_name_countlabels(&rpz->nsdname); 1080 1.7 christos } 1081 1.1 christos dns_name_getlabelsequence(src_name, prefix_len, n, &tmp_name); 1082 1.1 christos (void)dns_name_concatenate(&tmp_name, dns_rootname, trig_name, NULL); 1083 1.1 christos } 1084 1.1 christos 1085 1.1 christos #ifndef HAVE_BUILTIN_CLZ 1086 1.1 christos /** 1087 1.1 christos * \brief Count Leading Zeros: Find the location of the left-most set 1088 1.1 christos * bit. 1089 1.1 christos */ 1090 1.11 christos static unsigned int 1091 1.1 christos clz(dns_rpz_cidr_word_t w) { 1092 1.1 christos unsigned int bit; 1093 1.1 christos 1094 1.7 christos bit = DNS_RPZ_CIDR_WORD_BITS - 1; 1095 1.1 christos 1096 1.1 christos if ((w & 0xffff0000) != 0) { 1097 1.1 christos w >>= 16; 1098 1.1 christos bit -= 16; 1099 1.1 christos } 1100 1.1 christos 1101 1.1 christos if ((w & 0xff00) != 0) { 1102 1.1 christos w >>= 8; 1103 1.1 christos bit -= 8; 1104 1.1 christos } 1105 1.1 christos 1106 1.1 christos if ((w & 0xf0) != 0) { 1107 1.1 christos w >>= 4; 1108 1.1 christos bit -= 4; 1109 1.1 christos } 1110 1.1 christos 1111 1.1 christos if ((w & 0xc) != 0) { 1112 1.1 christos w >>= 2; 1113 1.1 christos bit -= 2; 1114 1.1 christos } 1115 1.1 christos 1116 1.7 christos if ((w & 2) != 0) { 1117 1.1 christos --bit; 1118 1.7 christos } 1119 1.1 christos 1120 1.16 christos return bit; 1121 1.1 christos } 1122 1.7 christos #endif /* ifndef HAVE_BUILTIN_CLZ */ 1123 1.1 christos 1124 1.1 christos /* 1125 1.1 christos * Find the first differing bit in two keys (IP addresses). 1126 1.1 christos */ 1127 1.1 christos static int 1128 1.1 christos diff_keys(const dns_rpz_cidr_key_t *key1, dns_rpz_prefix_t prefix1, 1129 1.7 christos const dns_rpz_cidr_key_t *key2, dns_rpz_prefix_t prefix2) { 1130 1.1 christos dns_rpz_cidr_word_t delta; 1131 1.1 christos dns_rpz_prefix_t maxbit, bit; 1132 1.1 christos int i; 1133 1.1 christos 1134 1.1 christos bit = 0; 1135 1.1 christos maxbit = ISC_MIN(prefix1, prefix2); 1136 1.1 christos 1137 1.1 christos /* 1138 1.1 christos * find the first differing words 1139 1.1 christos */ 1140 1.1 christos for (i = 0; bit < maxbit; i++, bit += DNS_RPZ_CIDR_WORD_BITS) { 1141 1.1 christos delta = key1->w[i] ^ key2->w[i]; 1142 1.15 christos if (delta != 0) { 1143 1.1 christos #ifdef HAVE_BUILTIN_CLZ 1144 1.1 christos bit += __builtin_clz(delta); 1145 1.7 christos #else /* ifdef HAVE_BUILTIN_CLZ */ 1146 1.1 christos bit += clz(delta); 1147 1.7 christos #endif /* ifdef HAVE_BUILTIN_CLZ */ 1148 1.1 christos break; 1149 1.1 christos } 1150 1.1 christos } 1151 1.16 christos return ISC_MIN(bit, maxbit); 1152 1.1 christos } 1153 1.1 christos 1154 1.1 christos /* 1155 1.1 christos * Given a hit while searching the radix trees, 1156 1.1 christos * clear all bits for higher numbered zones. 1157 1.1 christos */ 1158 1.11 christos static dns_rpz_zbits_t 1159 1.1 christos trim_zbits(dns_rpz_zbits_t zbits, dns_rpz_zbits_t found) { 1160 1.1 christos dns_rpz_zbits_t x; 1161 1.1 christos 1162 1.1 christos /* 1163 1.1 christos * Isolate the first or smallest numbered hit bit. 1164 1.1 christos * Make a mask of that bit and all smaller numbered bits. 1165 1.1 christos */ 1166 1.1 christos x = zbits & found; 1167 1.1 christos x &= (~x + 1); 1168 1.1 christos x = (x << 1) - 1; 1169 1.7 christos zbits &= x; 1170 1.16 christos return zbits; 1171 1.1 christos } 1172 1.1 christos 1173 1.1 christos /* 1174 1.1 christos * Search a radix tree for an IP address for ordinary lookup 1175 1.1 christos * or for a CIDR block adding or deleting an entry 1176 1.1 christos * 1177 1.1 christos * Return ISC_R_SUCCESS, DNS_R_PARTIALMATCH, ISC_R_NOTFOUND, 1178 1.1 christos * and *found=longest match node 1179 1.16 christos * or with create==true, ISC_R_EXISTS 1180 1.1 christos */ 1181 1.1 christos static isc_result_t 1182 1.7 christos search(dns_rpz_zones_t *rpzs, const dns_rpz_cidr_key_t *tgt_ip, 1183 1.7 christos dns_rpz_prefix_t tgt_prefix, const dns_rpz_addr_zbits_t *tgt_set, 1184 1.7 christos bool create, dns_rpz_cidr_node_t **found) { 1185 1.16 christos dns_rpz_cidr_node_t *cur = rpzs->cidr; 1186 1.16 christos dns_rpz_cidr_node_t *parent = NULL, *child = NULL; 1187 1.15 christos dns_rpz_cidr_node_t *new_parent = NULL, *sibling = NULL; 1188 1.16 christos dns_rpz_addr_zbits_t set = *tgt_set; 1189 1.16 christos int cur_num = 0, child_num; 1190 1.16 christos isc_result_t find_result = ISC_R_NOTFOUND; 1191 1.1 christos 1192 1.1 christos *found = NULL; 1193 1.1 christos for (;;) { 1194 1.15 christos dns_rpz_prefix_t dbit; 1195 1.1 christos if (cur == NULL) { 1196 1.1 christos /* 1197 1.1 christos * No child so we cannot go down. 1198 1.1 christos * Quit with whatever we already found 1199 1.1 christos * or add the target as a child of the current parent. 1200 1.1 christos */ 1201 1.7 christos if (!create) { 1202 1.16 christos return find_result; 1203 1.7 christos } 1204 1.1 christos child = new_node(rpzs, tgt_ip, tgt_prefix, NULL); 1205 1.7 christos if (parent == NULL) { 1206 1.1 christos rpzs->cidr = child; 1207 1.7 christos } else { 1208 1.1 christos parent->child[cur_num] = child; 1209 1.7 christos } 1210 1.1 christos child->parent = parent; 1211 1.1 christos child->set.client_ip |= tgt_set->client_ip; 1212 1.1 christos child->set.ip |= tgt_set->ip; 1213 1.1 christos child->set.nsip |= tgt_set->nsip; 1214 1.1 christos set_sum_pair(child); 1215 1.1 christos *found = child; 1216 1.16 christos return ISC_R_SUCCESS; 1217 1.1 christos } 1218 1.1 christos 1219 1.1 christos if ((cur->sum.client_ip & set.client_ip) == 0 && 1220 1.1 christos (cur->sum.ip & set.ip) == 0 && 1221 1.7 christos (cur->sum.nsip & set.nsip) == 0) 1222 1.7 christos { 1223 1.1 christos /* 1224 1.1 christos * This node has no relevant data 1225 1.1 christos * and is in none of the target trees. 1226 1.1 christos * Pretend it does not exist if we are not adding. 1227 1.1 christos * 1228 1.1 christos * If we are adding, continue down to eventually add 1229 1.1 christos * a node and mark/put this node in the correct tree. 1230 1.1 christos */ 1231 1.7 christos if (!create) { 1232 1.16 christos return find_result; 1233 1.7 christos } 1234 1.1 christos } 1235 1.1 christos 1236 1.1 christos dbit = diff_keys(tgt_ip, tgt_prefix, &cur->ip, cur->prefix); 1237 1.1 christos /* 1238 1.1 christos * dbit <= tgt_prefix and dbit <= cur->prefix always. 1239 1.1 christos * We are finished searching if we matched all of the target. 1240 1.1 christos */ 1241 1.1 christos if (dbit == tgt_prefix) { 1242 1.1 christos if (tgt_prefix == cur->prefix) { 1243 1.1 christos /* 1244 1.1 christos * The node's key matches the target exactly. 1245 1.1 christos */ 1246 1.1 christos if ((cur->set.client_ip & set.client_ip) != 0 || 1247 1.1 christos (cur->set.ip & set.ip) != 0 || 1248 1.7 christos (cur->set.nsip & set.nsip) != 0) 1249 1.7 christos { 1250 1.1 christos /* 1251 1.1 christos * It is the answer if it has data. 1252 1.1 christos */ 1253 1.1 christos *found = cur; 1254 1.1 christos if (create) { 1255 1.7 christos find_result = ISC_R_EXISTS; 1256 1.1 christos } else { 1257 1.7 christos find_result = ISC_R_SUCCESS; 1258 1.1 christos } 1259 1.1 christos } else if (create) { 1260 1.1 christos /* 1261 1.1 christos * The node lacked relevant data, 1262 1.1 christos * but will have it now. 1263 1.1 christos */ 1264 1.1 christos cur->set.client_ip |= 1265 1.1 christos tgt_set->client_ip; 1266 1.1 christos cur->set.ip |= tgt_set->ip; 1267 1.1 christos cur->set.nsip |= tgt_set->nsip; 1268 1.1 christos set_sum_pair(cur); 1269 1.1 christos *found = cur; 1270 1.1 christos find_result = ISC_R_SUCCESS; 1271 1.1 christos } 1272 1.16 christos return find_result; 1273 1.1 christos } 1274 1.1 christos 1275 1.1 christos /* 1276 1.1 christos * We know tgt_prefix < cur->prefix which means that 1277 1.1 christos * the target is shorter than the current node. 1278 1.1 christos * Add the target as the current node's parent. 1279 1.1 christos */ 1280 1.7 christos if (!create) { 1281 1.16 christos return find_result; 1282 1.7 christos } 1283 1.1 christos 1284 1.1 christos new_parent = new_node(rpzs, tgt_ip, tgt_prefix, cur); 1285 1.1 christos new_parent->parent = parent; 1286 1.7 christos if (parent == NULL) { 1287 1.1 christos rpzs->cidr = new_parent; 1288 1.7 christos } else { 1289 1.1 christos parent->child[cur_num] = new_parent; 1290 1.7 christos } 1291 1.1 christos child_num = DNS_RPZ_IP_BIT(&cur->ip, tgt_prefix); 1292 1.1 christos new_parent->child[child_num] = cur; 1293 1.1 christos cur->parent = new_parent; 1294 1.1 christos new_parent->set = *tgt_set; 1295 1.1 christos set_sum_pair(new_parent); 1296 1.1 christos *found = new_parent; 1297 1.16 christos return ISC_R_SUCCESS; 1298 1.1 christos } 1299 1.1 christos 1300 1.1 christos if (dbit == cur->prefix) { 1301 1.1 christos if ((cur->set.client_ip & set.client_ip) != 0 || 1302 1.1 christos (cur->set.ip & set.ip) != 0 || 1303 1.7 christos (cur->set.nsip & set.nsip) != 0) 1304 1.7 christos { 1305 1.1 christos /* 1306 1.1 christos * We have a partial match between of all of the 1307 1.1 christos * current node but only part of the target. 1308 1.1 christos * Continue searching for other hits in the 1309 1.1 christos * same or lower numbered trees. 1310 1.1 christos */ 1311 1.1 christos find_result = DNS_R_PARTIALMATCH; 1312 1.1 christos *found = cur; 1313 1.1 christos set.client_ip = trim_zbits(set.client_ip, 1314 1.1 christos cur->set.client_ip); 1315 1.7 christos set.ip = trim_zbits(set.ip, cur->set.ip); 1316 1.7 christos set.nsip = trim_zbits(set.nsip, cur->set.nsip); 1317 1.1 christos } 1318 1.1 christos parent = cur; 1319 1.1 christos cur_num = DNS_RPZ_IP_BIT(tgt_ip, dbit); 1320 1.1 christos cur = cur->child[cur_num]; 1321 1.1 christos continue; 1322 1.1 christos } 1323 1.1 christos 1324 1.1 christos /* 1325 1.1 christos * dbit < tgt_prefix and dbit < cur->prefix, 1326 1.1 christos * so we failed to match both the target and the current node. 1327 1.1 christos * Insert a fork of a parent above the current node and 1328 1.1 christos * add the target as a sibling of the current node 1329 1.1 christos */ 1330 1.7 christos if (!create) { 1331 1.16 christos return find_result; 1332 1.7 christos } 1333 1.1 christos 1334 1.1 christos sibling = new_node(rpzs, tgt_ip, tgt_prefix, NULL); 1335 1.1 christos new_parent = new_node(rpzs, tgt_ip, dbit, cur); 1336 1.1 christos new_parent->parent = parent; 1337 1.7 christos if (parent == NULL) { 1338 1.1 christos rpzs->cidr = new_parent; 1339 1.7 christos } else { 1340 1.1 christos parent->child[cur_num] = new_parent; 1341 1.7 christos } 1342 1.1 christos child_num = DNS_RPZ_IP_BIT(tgt_ip, dbit); 1343 1.1 christos new_parent->child[child_num] = sibling; 1344 1.7 christos new_parent->child[1 - child_num] = cur; 1345 1.1 christos cur->parent = new_parent; 1346 1.1 christos sibling->parent = new_parent; 1347 1.1 christos sibling->set = *tgt_set; 1348 1.1 christos set_sum_pair(sibling); 1349 1.1 christos *found = sibling; 1350 1.16 christos return ISC_R_SUCCESS; 1351 1.1 christos } 1352 1.1 christos } 1353 1.1 christos 1354 1.1 christos /* 1355 1.1 christos * Add an IP address to the radix tree. 1356 1.1 christos */ 1357 1.1 christos static isc_result_t 1358 1.15 christos add_cidr(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 1359 1.7 christos const dns_name_t *src_name) { 1360 1.1 christos dns_rpz_cidr_key_t tgt_ip; 1361 1.1 christos dns_rpz_prefix_t tgt_prefix; 1362 1.1 christos dns_rpz_addr_zbits_t set; 1363 1.15 christos dns_rpz_cidr_node_t *found = NULL; 1364 1.1 christos isc_result_t result; 1365 1.1 christos 1366 1.15 christos result = name2ipkey(DNS_RPZ_ERROR_LEVEL, rpz, rpz_type, src_name, 1367 1.15 christos &tgt_ip, &tgt_prefix, &set); 1368 1.1 christos /* 1369 1.1 christos * Log complaints about bad owner names but let the zone load. 1370 1.1 christos */ 1371 1.7 christos if (result != ISC_R_SUCCESS) { 1372 1.16 christos return ISC_R_SUCCESS; 1373 1.7 christos } 1374 1.1 christos 1375 1.16 christos RWLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 1376 1.15 christos result = search(rpz->rpzs, &tgt_ip, tgt_prefix, &set, true, &found); 1377 1.1 christos if (result != ISC_R_SUCCESS) { 1378 1.1 christos char namebuf[DNS_NAME_FORMATSIZE]; 1379 1.1 christos 1380 1.1 christos /* 1381 1.1 christos * Do not worry if the radix tree already exists, 1382 1.1 christos * because diff_apply() likes to add nodes before deleting. 1383 1.1 christos */ 1384 1.7 christos if (result == ISC_R_EXISTS) { 1385 1.16 christos result = ISC_R_SUCCESS; 1386 1.16 christos goto done; 1387 1.7 christos } 1388 1.1 christos 1389 1.1 christos /* 1390 1.1 christos * bin/tests/system/rpz/tests.sh looks for "rpz.*failed". 1391 1.1 christos */ 1392 1.1 christos dns_name_format(src_name, namebuf, sizeof(namebuf)); 1393 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 1394 1.1 christos DNS_LOGMODULE_RBTDB, DNS_RPZ_ERROR_LEVEL, 1395 1.7 christos "rpz add_cidr(%s) failed: %s", namebuf, 1396 1.7 christos isc_result_totext(result)); 1397 1.16 christos goto done; 1398 1.1 christos } 1399 1.1 christos 1400 1.15 christos adj_trigger_cnt(rpz, rpz_type, &tgt_ip, tgt_prefix, true); 1401 1.16 christos done: 1402 1.16 christos RWUNLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 1403 1.16 christos return result; 1404 1.16 christos } 1405 1.16 christos 1406 1.16 christos static nmdata_t * 1407 1.16 christos new_nmdata(isc_mem_t *mctx, const dns_name_t *name, const nmdata_t *data) { 1408 1.16 christos nmdata_t *newdata = isc_mem_get(mctx, sizeof(*newdata)); 1409 1.16 christos *newdata = (nmdata_t){ 1410 1.16 christos .set = data->set, 1411 1.16 christos .wild = data->wild, 1412 1.16 christos .name = DNS_NAME_INITEMPTY, 1413 1.16 christos .references = ISC_REFCOUNT_INITIALIZER(1), 1414 1.16 christos }; 1415 1.16 christos dns_name_dupwithoffsets(name, mctx, &newdata->name); 1416 1.16 christos isc_mem_attach(mctx, &newdata->mctx); 1417 1.16 christos 1418 1.16 christos #ifdef DNS_RPZ_TRACE 1419 1.16 christos fprintf(stderr, "new_nmdata:%s:%s:%d:%p->references = 1\n", __func__, 1420 1.16 christos __FILE__, __LINE__ + 1, name); 1421 1.16 christos #endif 1422 1.16 christos 1423 1.16 christos return newdata; 1424 1.1 christos } 1425 1.1 christos 1426 1.1 christos static isc_result_t 1427 1.16 christos add_nm(dns_rpz_zones_t *rpzs, dns_name_t *trig_name, const nmdata_t *new_data) { 1428 1.1 christos isc_result_t result; 1429 1.16 christos nmdata_t *data = NULL; 1430 1.16 christos dns_qp_t *qp = NULL; 1431 1.1 christos 1432 1.16 christos dns_qpmulti_write(rpzs->table, &qp); 1433 1.16 christos result = dns_qp_getname(qp, trig_name, (void **)&data, NULL); 1434 1.16 christos if (result != ISC_R_SUCCESS) { 1435 1.16 christos INSIST(data == NULL); 1436 1.16 christos data = new_nmdata(rpzs->mctx, trig_name, new_data); 1437 1.16 christos result = dns_qp_insert(qp, data, 0); 1438 1.16 christos nmdata_detach(&data); 1439 1.16 christos goto done; 1440 1.1 christos } 1441 1.1 christos 1442 1.1 christos /* 1443 1.1 christos * Do not count bits that are already present 1444 1.1 christos */ 1445 1.16 christos if ((data->set.qname & new_data->set.qname) != 0 || 1446 1.16 christos (data->set.ns & new_data->set.ns) != 0 || 1447 1.16 christos (data->wild.qname & new_data->wild.qname) != 0 || 1448 1.16 christos (data->wild.ns & new_data->wild.ns) != 0) 1449 1.7 christos { 1450 1.16 christos result = ISC_R_EXISTS; 1451 1.7 christos } 1452 1.1 christos 1453 1.16 christos /* copy in the bits from the new data */ 1454 1.16 christos data->set.qname |= new_data->set.qname; 1455 1.16 christos data->set.ns |= new_data->set.ns; 1456 1.16 christos data->wild.qname |= new_data->wild.qname; 1457 1.16 christos data->wild.ns |= new_data->wild.ns; 1458 1.16 christos 1459 1.16 christos done: 1460 1.16 christos dns_qp_compact(qp, DNS_QPGC_MAYBE); 1461 1.16 christos dns_qpmulti_commit(rpzs->table, &qp); 1462 1.16 christos 1463 1.16 christos return result; 1464 1.1 christos } 1465 1.1 christos 1466 1.1 christos static isc_result_t 1467 1.15 christos add_name(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 1468 1.7 christos const dns_name_t *src_name) { 1469 1.16 christos nmdata_t new_data; 1470 1.1 christos dns_fixedname_t trig_namef; 1471 1.15 christos dns_name_t *trig_name = NULL; 1472 1.1 christos isc_result_t result; 1473 1.1 christos 1474 1.1 christos /* 1475 1.1 christos * We need a summary database of names even with 1 policy zone, 1476 1.1 christos * because wildcard triggers are handled differently. 1477 1.1 christos */ 1478 1.1 christos 1479 1.1 christos trig_name = dns_fixedname_initname(&trig_namef); 1480 1.15 christos name2data(rpz, rpz_type, src_name, trig_name, &new_data); 1481 1.1 christos 1482 1.15 christos result = add_nm(rpz->rpzs, trig_name, &new_data); 1483 1.1 christos 1484 1.1 christos /* 1485 1.1 christos * Do not worry if the node already exists, 1486 1.1 christos * because diff_apply() likes to add nodes before deleting. 1487 1.1 christos */ 1488 1.7 christos if (result == ISC_R_EXISTS) { 1489 1.16 christos return ISC_R_SUCCESS; 1490 1.7 christos } 1491 1.7 christos if (result == ISC_R_SUCCESS) { 1492 1.16 christos RWLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 1493 1.15 christos adj_trigger_cnt(rpz, rpz_type, NULL, 0, true); 1494 1.16 christos RWUNLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 1495 1.7 christos } 1496 1.16 christos return result; 1497 1.1 christos } 1498 1.1 christos 1499 1.1 christos /* 1500 1.1 christos * Get ready for a new set of policy zones for a view. 1501 1.1 christos */ 1502 1.1 christos isc_result_t 1503 1.16 christos dns_rpz_new_zones(dns_view_t *view, isc_loopmgr_t *loopmgr, char *rps_cstr, 1504 1.17 christos size_t rps_cstr_size, dns_rpz_zones_t **rpzsp, 1505 1.17 christos bool first_time) { 1506 1.15 christos dns_rpz_zones_t *rpzs = NULL; 1507 1.16 christos isc_mem_t *mctx = NULL; 1508 1.16 christos #ifdef USE_DNSRPS 1509 1.10 christos isc_result_t result = ISC_R_SUCCESS; 1510 1.16 christos #endif 1511 1.1 christos 1512 1.1 christos REQUIRE(rpzsp != NULL && *rpzsp == NULL); 1513 1.16 christos REQUIRE(view != NULL); 1514 1.16 christos 1515 1.16 christos mctx = view->mctx; 1516 1.1 christos 1517 1.15 christos rpzs = isc_mem_get(mctx, sizeof(*rpzs)); 1518 1.15 christos *rpzs = (dns_rpz_zones_t){ 1519 1.15 christos .rps_cstr = rps_cstr, 1520 1.15 christos .rps_cstr_size = rps_cstr_size, 1521 1.16 christos .loopmgr = loopmgr, 1522 1.15 christos .magic = DNS_RPZ_ZONES_MAGIC, 1523 1.17 christos .first_time = first_time, 1524 1.15 christos }; 1525 1.1 christos 1526 1.16 christos isc_rwlock_init(&rpzs->search_lock); 1527 1.15 christos isc_mutex_init(&rpzs->maint_lock); 1528 1.15 christos isc_refcount_init(&rpzs->references, 1); 1529 1.1 christos 1530 1.1 christos #ifdef USE_DNSRPS 1531 1.1 christos if (rps_cstr != NULL) { 1532 1.15 christos result = dns_dnsrps_view_init(rpzs, rps_cstr); 1533 1.15 christos if (result != ISC_R_SUCCESS) { 1534 1.16 christos goto cleanup; 1535 1.15 christos } 1536 1.1 christos } 1537 1.7 christos #else /* ifdef USE_DNSRPS */ 1538 1.15 christos INSIST(!rpzs->p.dnsrps_enabled); 1539 1.7 christos #endif /* ifdef USE_DNSRPS */ 1540 1.15 christos if (!rpzs->p.dnsrps_enabled) { 1541 1.16 christos dns_qpmulti_create(mctx, &qpmethods, view, &rpzs->table); 1542 1.7 christos } 1543 1.1 christos 1544 1.15 christos isc_mem_attach(mctx, &rpzs->mctx); 1545 1.1 christos 1546 1.15 christos *rpzsp = rpzs; 1547 1.16 christos return ISC_R_SUCCESS; 1548 1.1 christos 1549 1.16 christos #ifdef USE_DNSRPS 1550 1.16 christos /* Only if DNSRPS is in use can this function fail */ 1551 1.16 christos cleanup: 1552 1.15 christos isc_refcount_decrementz(&rpzs->references); 1553 1.15 christos isc_refcount_destroy(&rpzs->references); 1554 1.15 christos isc_mutex_destroy(&rpzs->maint_lock); 1555 1.15 christos isc_rwlock_destroy(&rpzs->search_lock); 1556 1.15 christos isc_mem_put(mctx, rpzs, sizeof(*rpzs)); 1557 1.1 christos 1558 1.16 christos return result; 1559 1.16 christos #endif /* ifdef USE_DNSRPS */ 1560 1.1 christos } 1561 1.1 christos 1562 1.1 christos isc_result_t 1563 1.1 christos dns_rpz_new_zone(dns_rpz_zones_t *rpzs, dns_rpz_zone_t **rpzp) { 1564 1.1 christos isc_result_t result; 1565 1.15 christos dns_rpz_zone_t *rpz = NULL; 1566 1.1 christos 1567 1.15 christos REQUIRE(DNS_RPZ_ZONES_VALID(rpzs)); 1568 1.1 christos REQUIRE(rpzp != NULL && *rpzp == NULL); 1569 1.15 christos 1570 1.1 christos if (rpzs->p.num_zones >= DNS_RPZ_MAX_ZONES) { 1571 1.16 christos return ISC_R_NOSPACE; 1572 1.1 christos } 1573 1.1 christos 1574 1.15 christos result = dns__rpz_shuttingdown(rpzs); 1575 1.15 christos if (result != ISC_R_SUCCESS) { 1576 1.16 christos return result; 1577 1.15 christos } 1578 1.1 christos 1579 1.15 christos rpz = isc_mem_get(rpzs->mctx, sizeof(*rpz)); 1580 1.15 christos *rpz = (dns_rpz_zone_t){ 1581 1.15 christos .addsoa = true, 1582 1.15 christos .magic = DNS_RPZ_ZONE_MAGIC, 1583 1.15 christos .rpzs = rpzs, 1584 1.15 christos }; 1585 1.1 christos 1586 1.1 christos /* 1587 1.1 christos * This will never be used, but costs us nothing and 1588 1.16 christos * simplifies update_from_db(). 1589 1.1 christos */ 1590 1.1 christos 1591 1.15 christos isc_ht_init(&rpz->nodes, rpzs->mctx, 1, ISC_HT_CASE_SENSITIVE); 1592 1.15 christos 1593 1.15 christos dns_name_init(&rpz->origin, NULL); 1594 1.15 christos dns_name_init(&rpz->client_ip, NULL); 1595 1.15 christos dns_name_init(&rpz->ip, NULL); 1596 1.15 christos dns_name_init(&rpz->nsdname, NULL); 1597 1.15 christos dns_name_init(&rpz->nsip, NULL); 1598 1.15 christos dns_name_init(&rpz->passthru, NULL); 1599 1.15 christos dns_name_init(&rpz->drop, NULL); 1600 1.15 christos dns_name_init(&rpz->tcp_only, NULL); 1601 1.15 christos dns_name_init(&rpz->cname, NULL); 1602 1.1 christos 1603 1.15 christos isc_time_settoepoch(&rpz->lastupdated); 1604 1.1 christos 1605 1.15 christos rpz->num = rpzs->p.num_zones++; 1606 1.15 christos rpzs->zones[rpz->num] = rpz; 1607 1.15 christos 1608 1.15 christos *rpzp = rpz; 1609 1.1 christos 1610 1.16 christos return ISC_R_SUCCESS; 1611 1.1 christos } 1612 1.1 christos 1613 1.1 christos isc_result_t 1614 1.1 christos dns_rpz_dbupdate_callback(dns_db_t *db, void *fn_arg) { 1615 1.15 christos dns_rpz_zone_t *rpz = (dns_rpz_zone_t *)fn_arg; 1616 1.1 christos isc_result_t result = ISC_R_SUCCESS; 1617 1.1 christos 1618 1.1 christos REQUIRE(DNS_DB_VALID(db)); 1619 1.15 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1620 1.1 christos 1621 1.15 christos LOCK(&rpz->rpzs->maint_lock); 1622 1.15 christos 1623 1.15 christos if (rpz->rpzs->shuttingdown) { 1624 1.15 christos result = ISC_R_SHUTTINGDOWN; 1625 1.15 christos goto unlock; 1626 1.15 christos } 1627 1.1 christos 1628 1.1 christos /* New zone came as AXFR */ 1629 1.15 christos if (rpz->db != NULL && rpz->db != db) { 1630 1.1 christos /* We need to clean up the old DB */ 1631 1.15 christos if (rpz->dbversion != NULL) { 1632 1.15 christos dns_db_closeversion(rpz->db, &rpz->dbversion, false); 1633 1.7 christos } 1634 1.15 christos dns_db_updatenotify_unregister(rpz->db, 1635 1.15 christos dns_rpz_dbupdate_callback, rpz); 1636 1.15 christos dns_db_detach(&rpz->db); 1637 1.1 christos } 1638 1.1 christos 1639 1.15 christos if (rpz->db == NULL) { 1640 1.15 christos RUNTIME_CHECK(rpz->dbversion == NULL); 1641 1.15 christos dns_db_attach(db, &rpz->db); 1642 1.1 christos } 1643 1.1 christos 1644 1.15 christos if (!rpz->updatepending && !rpz->updaterunning) { 1645 1.15 christos rpz->updatepending = true; 1646 1.15 christos 1647 1.16 christos dns_db_currentversion(rpz->db, &rpz->dbversion); 1648 1.16 christos dns__rpz_timer_start(rpz); 1649 1.1 christos } else { 1650 1.16 christos char dname[DNS_NAME_FORMATSIZE]; 1651 1.15 christos rpz->updatepending = true; 1652 1.16 christos 1653 1.16 christos dns_name_format(&rpz->origin, dname, DNS_NAME_FORMATSIZE); 1654 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1655 1.1 christos DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), 1656 1.6 christos "rpz: %s: update already queued or running", 1657 1.6 christos dname); 1658 1.15 christos if (rpz->dbversion != NULL) { 1659 1.15 christos dns_db_closeversion(rpz->db, &rpz->dbversion, false); 1660 1.6 christos } 1661 1.15 christos dns_db_currentversion(rpz->db, &rpz->dbversion); 1662 1.1 christos } 1663 1.1 christos 1664 1.15 christos unlock: 1665 1.15 christos UNLOCK(&rpz->rpzs->maint_lock); 1666 1.1 christos 1667 1.16 christos return result; 1668 1.1 christos } 1669 1.1 christos 1670 1.16 christos void 1671 1.16 christos dns_rpz_dbupdate_unregister(dns_db_t *db, dns_rpz_zone_t *rpz) { 1672 1.16 christos REQUIRE(DNS_DB_VALID(db)); 1673 1.15 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1674 1.1 christos 1675 1.17 christos LOCK(&rpz->rpzs->maint_lock); 1676 1.16 christos dns_db_updatenotify_unregister(db, dns_rpz_dbupdate_callback, rpz); 1677 1.17 christos if (rpz->processed) { 1678 1.17 christos rpz->processed = false; 1679 1.17 christos INSIST(atomic_fetch_sub_acq_rel(&rpz->rpzs->zones_processed, 1680 1.17 christos 1) > 0); 1681 1.17 christos } 1682 1.17 christos if (rpz->dbregistered) { 1683 1.17 christos rpz->dbregistered = false; 1684 1.17 christos INSIST(atomic_fetch_sub_acq_rel(&rpz->rpzs->zones_registered, 1685 1.17 christos 1) > 0); 1686 1.17 christos } 1687 1.17 christos UNLOCK(&rpz->rpzs->maint_lock); 1688 1.16 christos } 1689 1.1 christos 1690 1.16 christos void 1691 1.16 christos dns_rpz_dbupdate_register(dns_db_t *db, dns_rpz_zone_t *rpz) { 1692 1.16 christos REQUIRE(DNS_DB_VALID(db)); 1693 1.16 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1694 1.7 christos 1695 1.17 christos LOCK(&rpz->rpzs->maint_lock); 1696 1.17 christos if (!rpz->dbregistered) { 1697 1.17 christos rpz->dbregistered = true; 1698 1.17 christos atomic_fetch_add_acq_rel(&rpz->rpzs->zones_registered, 1); 1699 1.17 christos } 1700 1.16 christos dns_db_updatenotify_register(db, dns_rpz_dbupdate_callback, rpz); 1701 1.17 christos UNLOCK(&rpz->rpzs->maint_lock); 1702 1.16 christos } 1703 1.17 christos 1704 1.16 christos static void 1705 1.16 christos dns__rpz_timer_start(dns_rpz_zone_t *rpz) { 1706 1.16 christos uint64_t tdiff; 1707 1.16 christos isc_interval_t interval; 1708 1.16 christos isc_time_t now; 1709 1.7 christos 1710 1.16 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1711 1.7 christos 1712 1.16 christos now = isc_time_now(); 1713 1.16 christos tdiff = isc_time_microdiff(&now, &rpz->lastupdated) / 1000000; 1714 1.16 christos if (tdiff < rpz->min_update_interval) { 1715 1.16 christos uint64_t defer = rpz->min_update_interval - tdiff; 1716 1.16 christos char dname[DNS_NAME_FORMATSIZE]; 1717 1.7 christos 1718 1.16 christos dns_name_format(&rpz->origin, dname, DNS_NAME_FORMATSIZE); 1719 1.7 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1720 1.7 christos DNS_LOGMODULE_MASTER, ISC_LOG_INFO, 1721 1.15 christos "rpz: %s: new zone version came " 1722 1.15 christos "too soon, deferring update for " 1723 1.15 christos "%" PRIu64 " seconds", 1724 1.15 christos dname, defer); 1725 1.15 christos isc_interval_set(&interval, (unsigned int)defer, 0); 1726 1.7 christos } else { 1727 1.16 christos isc_interval_set(&interval, 0, 0); 1728 1.16 christos } 1729 1.16 christos 1730 1.16 christos rpz->loop = isc_loop(); 1731 1.16 christos 1732 1.16 christos isc_timer_create(rpz->loop, dns__rpz_timer_cb, rpz, &rpz->updatetimer); 1733 1.16 christos isc_timer_start(rpz->updatetimer, isc_timertype_once, &interval); 1734 1.16 christos } 1735 1.16 christos 1736 1.16 christos static void 1737 1.16 christos dns__rpz_timer_stop(void *arg) { 1738 1.16 christos dns_rpz_zone_t *rpz = arg; 1739 1.16 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1740 1.16 christos 1741 1.16 christos isc_timer_stop(rpz->updatetimer); 1742 1.16 christos isc_timer_destroy(&rpz->updatetimer); 1743 1.16 christos rpz->loop = NULL; 1744 1.16 christos 1745 1.16 christos dns_rpz_zones_unref(rpz->rpzs); 1746 1.16 christos } 1747 1.16 christos 1748 1.16 christos static void 1749 1.16 christos update_rpz_done_cb(void *data) { 1750 1.16 christos dns_rpz_zone_t *rpz = (dns_rpz_zone_t *)data; 1751 1.16 christos char dname[DNS_NAME_FORMATSIZE]; 1752 1.16 christos 1753 1.16 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 1754 1.16 christos 1755 1.16 christos LOCK(&rpz->rpzs->maint_lock); 1756 1.16 christos rpz->updaterunning = false; 1757 1.16 christos 1758 1.16 christos dns_name_format(&rpz->origin, dname, DNS_NAME_FORMATSIZE); 1759 1.16 christos 1760 1.16 christos if (rpz->updatepending && !rpz->rpzs->shuttingdown) { 1761 1.16 christos /* Restart the timer */ 1762 1.16 christos dns__rpz_timer_start(rpz); 1763 1.7 christos } 1764 1.7 christos 1765 1.7 christos dns_db_closeversion(rpz->updb, &rpz->updbversion, false); 1766 1.7 christos dns_db_detach(&rpz->updb); 1767 1.1 christos 1768 1.17 christos if (rpz->dbregistered && !rpz->processed) { 1769 1.17 christos rpz->processed = true; 1770 1.17 christos atomic_fetch_add_acq_rel(&rpz->rpzs->zones_processed, 1); 1771 1.17 christos } 1772 1.17 christos 1773 1.15 christos UNLOCK(&rpz->rpzs->maint_lock); 1774 1.1 christos 1775 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, 1776 1.15 christos ISC_LOG_INFO, "rpz: %s: reload done: %s", dname, 1777 1.16 christos isc_result_totext(rpz->updateresult)); 1778 1.1 christos 1779 1.16 christos dns_rpz_zones_unref(rpz->rpzs); 1780 1.15 christos } 1781 1.1 christos 1782 1.15 christos static isc_result_t 1783 1.15 christos update_nodes(dns_rpz_zone_t *rpz, isc_ht_t *newnodes) { 1784 1.15 christos isc_result_t result; 1785 1.15 christos dns_dbiterator_t *updbit = NULL; 1786 1.15 christos dns_name_t *name = NULL; 1787 1.15 christos dns_fixedname_t fixname; 1788 1.15 christos char domain[DNS_NAME_FORMATSIZE]; 1789 1.17 christos bool slow_mode; 1790 1.1 christos 1791 1.15 christos dns_name_format(&rpz->origin, domain, DNS_NAME_FORMATSIZE); 1792 1.1 christos 1793 1.1 christos name = dns_fixedname_initname(&fixname); 1794 1.1 christos 1795 1.15 christos result = dns_db_createiterator(rpz->updb, DNS_DB_NONSEC3, &updbit); 1796 1.15 christos if (result != ISC_R_SUCCESS) { 1797 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1798 1.15 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1799 1.15 christos "rpz: %s: failed to create DB iterator - %s", 1800 1.15 christos domain, isc_result_totext(result)); 1801 1.16 christos return result; 1802 1.15 christos } 1803 1.1 christos 1804 1.15 christos result = dns_dbiterator_first(updbit); 1805 1.15 christos if (result != ISC_R_SUCCESS && result != ISC_R_NOMORE) { 1806 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1807 1.15 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1808 1.15 christos "rpz: %s: failed to get db iterator - %s", domain, 1809 1.15 christos isc_result_totext(result)); 1810 1.7 christos goto cleanup; 1811 1.7 christos } 1812 1.7 christos 1813 1.17 christos LOCK(&rpz->rpzs->maint_lock); 1814 1.17 christos slow_mode = rpz->rpzs->p.slow_mode; 1815 1.17 christos UNLOCK(&rpz->rpzs->maint_lock); 1816 1.17 christos 1817 1.15 christos while (result == ISC_R_SUCCESS) { 1818 1.1 christos char namebuf[DNS_NAME_FORMATSIZE]; 1819 1.1 christos dns_rdatasetiter_t *rdsiter = NULL; 1820 1.15 christos dns_dbnode_t *node = NULL; 1821 1.15 christos 1822 1.15 christos result = dns__rpz_shuttingdown(rpz->rpzs); 1823 1.15 christos if (result != ISC_R_SUCCESS) { 1824 1.15 christos goto cleanup; 1825 1.15 christos } 1826 1.1 christos 1827 1.15 christos result = dns_dbiterator_current(updbit, &node, name); 1828 1.1 christos if (result != ISC_R_SUCCESS) { 1829 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1830 1.1 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1831 1.1 christos "rpz: %s: failed to get dbiterator - %s", 1832 1.1 christos domain, isc_result_totext(result)); 1833 1.15 christos goto cleanup; 1834 1.1 christos } 1835 1.1 christos 1836 1.15 christos result = dns_dbiterator_pause(updbit); 1837 1.15 christos RUNTIME_CHECK(result == ISC_R_SUCCESS); 1838 1.15 christos 1839 1.1 christos result = dns_db_allrdatasets(rpz->updb, node, rpz->updbversion, 1840 1.12 christos 0, 0, &rdsiter); 1841 1.1 christos if (result != ISC_R_SUCCESS) { 1842 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1843 1.1 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1844 1.1 christos "rpz: %s: failed to fetch " 1845 1.1 christos "rrdatasets - %s", 1846 1.1 christos domain, isc_result_totext(result)); 1847 1.1 christos dns_db_detachnode(rpz->updb, &node); 1848 1.15 christos goto cleanup; 1849 1.1 christos } 1850 1.1 christos 1851 1.1 christos result = dns_rdatasetiter_first(rdsiter); 1852 1.15 christos 1853 1.1 christos dns_rdatasetiter_destroy(&rdsiter); 1854 1.15 christos dns_db_detachnode(rpz->updb, &node); 1855 1.15 christos 1856 1.15 christos if (result != ISC_R_SUCCESS) { /* skip empty non-terminal */ 1857 1.7 christos if (result != ISC_R_NOMORE) { 1858 1.7 christos isc_log_write( 1859 1.7 christos dns_lctx, DNS_LOGCATEGORY_GENERAL, 1860 1.7 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1861 1.7 christos "rpz: %s: error %s while creating " 1862 1.7 christos "rdatasetiter", 1863 1.7 christos domain, isc_result_totext(result)); 1864 1.7 christos } 1865 1.15 christos goto next; 1866 1.1 christos } 1867 1.1 christos 1868 1.9 christos dns_name_downcase(name, name, NULL); 1869 1.15 christos 1870 1.15 christos /* Add entry to the new nodes table */ 1871 1.15 christos result = isc_ht_add(newnodes, name->ndata, name->length, rpz); 1872 1.1 christos if (result != ISC_R_SUCCESS) { 1873 1.1 christos dns_name_format(name, namebuf, sizeof(namebuf)); 1874 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1875 1.1 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1876 1.1 christos "rpz: %s, adding node %s to HT error %s", 1877 1.1 christos domain, namebuf, 1878 1.1 christos isc_result_totext(result)); 1879 1.15 christos goto next; 1880 1.1 christos } 1881 1.1 christos 1882 1.15 christos /* Does the entry exist in the old nodes table? */ 1883 1.7 christos result = isc_ht_find(rpz->nodes, name->ndata, name->length, 1884 1.7 christos NULL); 1885 1.15 christos if (result == ISC_R_SUCCESS) { /* found */ 1886 1.1 christos isc_ht_delete(rpz->nodes, name->ndata, name->length); 1887 1.15 christos goto next; 1888 1.15 christos } 1889 1.15 christos 1890 1.15 christos /* 1891 1.15 christos * Only the single rpz updates are serialized, so we need to 1892 1.15 christos * lock here because we can be processing more updates to 1893 1.15 christos * different rpz zones at the same time 1894 1.15 christos */ 1895 1.15 christos LOCK(&rpz->rpzs->maint_lock); 1896 1.15 christos result = rpz_add(rpz, name); 1897 1.15 christos UNLOCK(&rpz->rpzs->maint_lock); 1898 1.15 christos 1899 1.15 christos if (result != ISC_R_SUCCESS) { 1900 1.15 christos dns_name_format(name, namebuf, sizeof(namebuf)); 1901 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1902 1.15 christos DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, 1903 1.15 christos "rpz: %s: adding node %s " 1904 1.15 christos "to RPZ error %s", 1905 1.15 christos domain, namebuf, 1906 1.15 christos isc_result_totext(result)); 1907 1.15 christos } else if (isc_log_wouldlog(dns_lctx, ISC_LOG_DEBUG(3))) { 1908 1.15 christos dns_name_format(name, namebuf, sizeof(namebuf)); 1909 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, 1910 1.15 christos DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), 1911 1.15 christos "rpz: %s: adding node %s", domain, 1912 1.15 christos namebuf); 1913 1.1 christos } 1914 1.1 christos 1915 1.15 christos next: 1916 1.15 christos result = dns_dbiterator_next(updbit); 1917 1.17 christos 1918 1.17 christos if (slow_mode) { 1919 1.17 christos uv_sleep(100); 1920 1.17 christos } 1921 1.15 christos } 1922 1.15 christos INSIST(result != ISC_R_SUCCESS); 1923 1.15 christos if (result == ISC_R_NOMORE) { 1924 1.15 christos result = ISC_R_SUCCESS; 1925 1.1 christos } 1926 1.1 christos 1927 1.15 christos cleanup: 1928 1.15 christos dns_dbiterator_destroy(&updbit); 1929 1.15 christos 1930 1.16 christos return result; 1931 1.15 christos } 1932 1.15 christos 1933 1.15 christos static isc_result_t 1934 1.15 christos cleanup_nodes(dns_rpz_zone_t *rpz) { 1935 1.15 christos isc_result_t result; 1936 1.15 christos isc_ht_iter_t *iter = NULL; 1937 1.15 christos dns_name_t *name = NULL; 1938 1.15 christos dns_fixedname_t fixname; 1939 1.15 christos 1940 1.15 christos name = dns_fixedname_initname(&fixname); 1941 1.15 christos 1942 1.15 christos isc_ht_iter_create(rpz->nodes, &iter); 1943 1.15 christos 1944 1.15 christos for (result = isc_ht_iter_first(iter); result == ISC_R_SUCCESS; 1945 1.15 christos result = isc_ht_iter_delcurrent_next(iter)) 1946 1.15 christos { 1947 1.15 christos isc_region_t region; 1948 1.15 christos unsigned char *key = NULL; 1949 1.15 christos size_t keysize; 1950 1.15 christos 1951 1.15 christos result = dns__rpz_shuttingdown(rpz->rpzs); 1952 1.15 christos if (result != ISC_R_SUCCESS) { 1953 1.15 christos break; 1954 1.15 christos } 1955 1.15 christos 1956 1.15 christos isc_ht_iter_currentkey(iter, &key, &keysize); 1957 1.15 christos region.base = key; 1958 1.15 christos region.length = (unsigned int)keysize; 1959 1.15 christos dns_name_fromregion(name, ®ion); 1960 1.7 christos 1961 1.15 christos LOCK(&rpz->rpzs->maint_lock); 1962 1.15 christos rpz_del(rpz, name); 1963 1.7 christos UNLOCK(&rpz->rpzs->maint_lock); 1964 1.15 christos } 1965 1.15 christos INSIST(result != ISC_R_SUCCESS); 1966 1.15 christos if (result == ISC_R_NOMORE) { 1967 1.15 christos result = ISC_R_SUCCESS; 1968 1.15 christos } 1969 1.15 christos 1970 1.15 christos isc_ht_iter_destroy(&iter); 1971 1.15 christos 1972 1.16 christos return result; 1973 1.15 christos } 1974 1.15 christos 1975 1.15 christos static isc_result_t 1976 1.15 christos dns__rpz_shuttingdown(dns_rpz_zones_t *rpzs) { 1977 1.15 christos bool shuttingdown = false; 1978 1.15 christos 1979 1.15 christos LOCK(&rpzs->maint_lock); 1980 1.15 christos shuttingdown = rpzs->shuttingdown; 1981 1.15 christos UNLOCK(&rpzs->maint_lock); 1982 1.15 christos 1983 1.15 christos if (shuttingdown) { 1984 1.16 christos return ISC_R_SHUTTINGDOWN; 1985 1.15 christos } 1986 1.15 christos 1987 1.16 christos return ISC_R_SUCCESS; 1988 1.15 christos } 1989 1.15 christos 1990 1.15 christos static void 1991 1.15 christos update_rpz_cb(void *data) { 1992 1.15 christos dns_rpz_zone_t *rpz = (dns_rpz_zone_t *)data; 1993 1.15 christos isc_result_t result = ISC_R_SUCCESS; 1994 1.15 christos isc_ht_t *newnodes = NULL; 1995 1.15 christos 1996 1.15 christos REQUIRE(rpz->nodes != NULL); 1997 1.7 christos 1998 1.15 christos result = dns__rpz_shuttingdown(rpz->rpzs); 1999 1.15 christos if (result != ISC_R_SUCCESS) { 2000 1.15 christos goto shuttingdown; 2001 1.1 christos } 2002 1.1 christos 2003 1.15 christos isc_ht_init(&newnodes, rpz->rpzs->mctx, 1, ISC_HT_CASE_SENSITIVE); 2004 1.7 christos 2005 1.15 christos result = update_nodes(rpz, newnodes); 2006 1.15 christos if (result != ISC_R_SUCCESS) { 2007 1.15 christos goto cleanup; 2008 1.7 christos } 2009 1.15 christos 2010 1.15 christos result = cleanup_nodes(rpz); 2011 1.15 christos if (result != ISC_R_SUCCESS) { 2012 1.15 christos goto cleanup; 2013 1.7 christos } 2014 1.15 christos 2015 1.15 christos /* Finalize the update */ 2016 1.15 christos ISC_SWAP(rpz->nodes, newnodes); 2017 1.15 christos 2018 1.15 christos cleanup: 2019 1.15 christos isc_ht_destroy(&newnodes); 2020 1.15 christos 2021 1.15 christos shuttingdown: 2022 1.15 christos rpz->updateresult = result; 2023 1.1 christos } 2024 1.1 christos 2025 1.1 christos static void 2026 1.16 christos dns__rpz_timer_cb(void *arg) { 2027 1.15 christos char domain[DNS_NAME_FORMATSIZE]; 2028 1.16 christos dns_rpz_zone_t *rpz = (dns_rpz_zone_t *)arg; 2029 1.15 christos 2030 1.15 christos REQUIRE(DNS_RPZ_ZONE_VALID(rpz)); 2031 1.16 christos REQUIRE(DNS_DB_VALID(rpz->db)); 2032 1.16 christos REQUIRE(rpz->updb == NULL); 2033 1.16 christos REQUIRE(rpz->updbversion == NULL); 2034 1.15 christos 2035 1.15 christos LOCK(&rpz->rpzs->maint_lock); 2036 1.1 christos 2037 1.15 christos if (rpz->rpzs->shuttingdown) { 2038 1.15 christos goto unlock; 2039 1.15 christos } 2040 1.1 christos 2041 1.15 christos rpz->updatepending = false; 2042 1.15 christos rpz->updaterunning = true; 2043 1.15 christos rpz->updateresult = ISC_R_UNSET; 2044 1.15 christos 2045 1.16 christos dns_db_attach(rpz->db, &rpz->updb); 2046 1.15 christos INSIST(rpz->dbversion != NULL); 2047 1.1 christos rpz->updbversion = rpz->dbversion; 2048 1.1 christos rpz->dbversion = NULL; 2049 1.1 christos 2050 1.15 christos dns_name_format(&rpz->origin, domain, DNS_NAME_FORMATSIZE); 2051 1.15 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, 2052 1.15 christos ISC_LOG_INFO, "rpz: %s: reload start", domain); 2053 1.15 christos 2054 1.16 christos dns_rpz_zones_ref(rpz->rpzs); 2055 1.16 christos isc_work_enqueue(rpz->loop, update_rpz_cb, update_rpz_done_cb, rpz); 2056 1.1 christos 2057 1.16 christos isc_timer_destroy(&rpz->updatetimer); 2058 1.16 christos rpz->loop = NULL; 2059 1.1 christos 2060 1.16 christos rpz->lastupdated = isc_time_now(); 2061 1.15 christos unlock: 2062 1.15 christos UNLOCK(&rpz->rpzs->maint_lock); 2063 1.1 christos } 2064 1.1 christos 2065 1.1 christos /* 2066 1.1 christos * Free the radix tree of a response policy database. 2067 1.1 christos */ 2068 1.1 christos static void 2069 1.1 christos cidr_free(dns_rpz_zones_t *rpzs) { 2070 1.15 christos dns_rpz_cidr_node_t *cur = NULL, *child = NULL, *parent = NULL; 2071 1.1 christos 2072 1.1 christos cur = rpzs->cidr; 2073 1.1 christos while (cur != NULL) { 2074 1.1 christos /* Depth first. */ 2075 1.1 christos child = cur->child[0]; 2076 1.1 christos if (child != NULL) { 2077 1.1 christos cur = child; 2078 1.1 christos continue; 2079 1.1 christos } 2080 1.1 christos child = cur->child[1]; 2081 1.1 christos if (child != NULL) { 2082 1.1 christos cur = child; 2083 1.1 christos continue; 2084 1.1 christos } 2085 1.1 christos 2086 1.1 christos /* Delete this leaf and go up. */ 2087 1.1 christos parent = cur->parent; 2088 1.7 christos if (parent == NULL) { 2089 1.1 christos rpzs->cidr = NULL; 2090 1.7 christos } else { 2091 1.1 christos parent->child[parent->child[1] == cur] = NULL; 2092 1.7 christos } 2093 1.1 christos isc_mem_put(rpzs->mctx, cur, sizeof(*cur)); 2094 1.1 christos cur = parent; 2095 1.1 christos } 2096 1.1 christos } 2097 1.1 christos 2098 1.1 christos static void 2099 1.15 christos dns__rpz_shutdown(dns_rpz_zone_t *rpz) { 2100 1.15 christos /* maint_lock must be locked */ 2101 1.15 christos if (rpz->updatetimer != NULL) { 2102 1.16 christos /* Don't wait for timer to trigger for shutdown */ 2103 1.16 christos INSIST(rpz->loop != NULL); 2104 1.15 christos 2105 1.16 christos dns_rpz_zones_ref(rpz->rpzs); 2106 1.16 christos isc_async_run(rpz->loop, dns__rpz_timer_stop, rpz); 2107 1.15 christos } 2108 1.15 christos } 2109 1.15 christos 2110 1.15 christos static void 2111 1.15 christos dns_rpz_zone_destroy(dns_rpz_zone_t **rpzp) { 2112 1.15 christos dns_rpz_zone_t *rpz = NULL; 2113 1.5 christos dns_rpz_zones_t *rpzs; 2114 1.3 christos 2115 1.1 christos rpz = *rpzp; 2116 1.1 christos *rpzp = NULL; 2117 1.3 christos 2118 1.15 christos rpzs = rpz->rpzs; 2119 1.15 christos rpz->rpzs = NULL; 2120 1.3 christos 2121 1.15 christos if (dns_name_dynamic(&rpz->origin)) { 2122 1.15 christos dns_name_free(&rpz->origin, rpzs->mctx); 2123 1.15 christos } 2124 1.15 christos if (dns_name_dynamic(&rpz->client_ip)) { 2125 1.15 christos dns_name_free(&rpz->client_ip, rpzs->mctx); 2126 1.15 christos } 2127 1.15 christos if (dns_name_dynamic(&rpz->ip)) { 2128 1.15 christos dns_name_free(&rpz->ip, rpzs->mctx); 2129 1.15 christos } 2130 1.15 christos if (dns_name_dynamic(&rpz->nsdname)) { 2131 1.15 christos dns_name_free(&rpz->nsdname, rpzs->mctx); 2132 1.15 christos } 2133 1.15 christos if (dns_name_dynamic(&rpz->nsip)) { 2134 1.15 christos dns_name_free(&rpz->nsip, rpzs->mctx); 2135 1.15 christos } 2136 1.15 christos if (dns_name_dynamic(&rpz->passthru)) { 2137 1.15 christos dns_name_free(&rpz->passthru, rpzs->mctx); 2138 1.15 christos } 2139 1.15 christos if (dns_name_dynamic(&rpz->drop)) { 2140 1.15 christos dns_name_free(&rpz->drop, rpzs->mctx); 2141 1.15 christos } 2142 1.15 christos if (dns_name_dynamic(&rpz->tcp_only)) { 2143 1.15 christos dns_name_free(&rpz->tcp_only, rpzs->mctx); 2144 1.15 christos } 2145 1.15 christos if (dns_name_dynamic(&rpz->cname)) { 2146 1.15 christos dns_name_free(&rpz->cname, rpzs->mctx); 2147 1.15 christos } 2148 1.15 christos if (rpz->db != NULL) { 2149 1.15 christos if (rpz->dbversion != NULL) { 2150 1.15 christos dns_db_closeversion(rpz->db, &rpz->dbversion, false); 2151 1.3 christos } 2152 1.15 christos dns_db_updatenotify_unregister(rpz->db, 2153 1.15 christos dns_rpz_dbupdate_callback, rpz); 2154 1.15 christos dns_db_detach(&rpz->db); 2155 1.15 christos } 2156 1.15 christos INSIST(!rpz->updaterunning); 2157 1.3 christos 2158 1.15 christos isc_ht_destroy(&rpz->nodes); 2159 1.5 christos 2160 1.15 christos isc_mem_put(rpzs->mctx, rpz, sizeof(*rpz)); 2161 1.1 christos } 2162 1.1 christos 2163 1.15 christos static void 2164 1.15 christos dns__rpz_zones_destroy(dns_rpz_zones_t *rpzs) { 2165 1.15 christos REQUIRE(rpzs->shuttingdown); 2166 1.1 christos 2167 1.15 christos for (dns_rpz_num_t rpz_num = 0; rpz_num < DNS_RPZ_MAX_ZONES; ++rpz_num) 2168 1.15 christos { 2169 1.15 christos if (rpzs->zones[rpz_num] == NULL) { 2170 1.15 christos continue; 2171 1.1 christos } 2172 1.15 christos 2173 1.15 christos dns_rpz_zone_destroy(&rpzs->zones[rpz_num]); 2174 1.5 christos } 2175 1.5 christos 2176 1.15 christos if (rpzs->rps_cstr_size != 0) { 2177 1.1 christos #ifdef USE_DNSRPS 2178 1.15 christos librpz->client_detach(&rpzs->rps_client); 2179 1.7 christos #endif /* ifdef USE_DNSRPS */ 2180 1.15 christos isc_mem_put(rpzs->mctx, rpzs->rps_cstr, rpzs->rps_cstr_size); 2181 1.15 christos } 2182 1.3 christos 2183 1.15 christos cidr_free(rpzs); 2184 1.16 christos if (rpzs->table != NULL) { 2185 1.16 christos dns_qpmulti_destroy(&rpzs->table); 2186 1.1 christos } 2187 1.16 christos 2188 1.15 christos isc_mutex_destroy(&rpzs->maint_lock); 2189 1.15 christos isc_rwlock_destroy(&rpzs->search_lock); 2190 1.15 christos isc_mem_putanddetach(&rpzs->mctx, rpzs, sizeof(*rpzs)); 2191 1.1 christos } 2192 1.1 christos 2193 1.15 christos void 2194 1.15 christos dns_rpz_zones_shutdown(dns_rpz_zones_t *rpzs) { 2195 1.15 christos REQUIRE(DNS_RPZ_ZONES_VALID(rpzs)); 2196 1.15 christos /* 2197 1.15 christos * Forget the last of the view's rpz machinery when shutting down. 2198 1.15 christos */ 2199 1.15 christos 2200 1.15 christos LOCK(&rpzs->maint_lock); 2201 1.15 christos if (rpzs->shuttingdown) { 2202 1.15 christos UNLOCK(&rpzs->maint_lock); 2203 1.15 christos return; 2204 1.15 christos } 2205 1.1 christos 2206 1.15 christos rpzs->shuttingdown = true; 2207 1.1 christos 2208 1.15 christos for (dns_rpz_num_t rpz_num = 0; rpz_num < DNS_RPZ_MAX_ZONES; ++rpz_num) 2209 1.15 christos { 2210 1.15 christos if (rpzs->zones[rpz_num] == NULL) { 2211 1.15 christos continue; 2212 1.15 christos } 2213 1.1 christos 2214 1.15 christos dns__rpz_shutdown(rpzs->zones[rpz_num]); 2215 1.15 christos } 2216 1.15 christos UNLOCK(&rpzs->maint_lock); 2217 1.1 christos } 2218 1.1 christos 2219 1.15 christos #ifdef DNS_RPZ_TRACE 2220 1.15 christos ISC_REFCOUNT_TRACE_IMPL(dns_rpz_zones, dns__rpz_zones_destroy); 2221 1.15 christos #else 2222 1.15 christos ISC_REFCOUNT_IMPL(dns_rpz_zones, dns__rpz_zones_destroy); 2223 1.15 christos #endif 2224 1.15 christos 2225 1.1 christos /* 2226 1.1 christos * Add an IP address to the radix tree or a name to the summary database. 2227 1.1 christos */ 2228 1.15 christos static isc_result_t 2229 1.15 christos rpz_add(dns_rpz_zone_t *rpz, const dns_name_t *src_name) { 2230 1.1 christos dns_rpz_type_t rpz_type; 2231 1.1 christos isc_result_t result = ISC_R_FAILURE; 2232 1.15 christos dns_rpz_zones_t *rpzs = NULL; 2233 1.15 christos dns_rpz_num_t rpz_num; 2234 1.15 christos 2235 1.15 christos REQUIRE(rpz != NULL); 2236 1.15 christos 2237 1.15 christos rpzs = rpz->rpzs; 2238 1.15 christos rpz_num = rpz->num; 2239 1.1 christos 2240 1.1 christos REQUIRE(rpzs != NULL && rpz_num < rpzs->p.num_zones); 2241 1.15 christos 2242 1.1 christos rpz_type = type_from_name(rpzs, rpz, src_name); 2243 1.1 christos switch (rpz_type) { 2244 1.1 christos case DNS_RPZ_TYPE_QNAME: 2245 1.1 christos case DNS_RPZ_TYPE_NSDNAME: 2246 1.15 christos result = add_name(rpz, rpz_type, src_name); 2247 1.1 christos break; 2248 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 2249 1.1 christos case DNS_RPZ_TYPE_IP: 2250 1.1 christos case DNS_RPZ_TYPE_NSIP: 2251 1.15 christos result = add_cidr(rpz, rpz_type, src_name); 2252 1.1 christos break; 2253 1.1 christos case DNS_RPZ_TYPE_BAD: 2254 1.1 christos break; 2255 1.1 christos } 2256 1.1 christos 2257 1.16 christos return result; 2258 1.1 christos } 2259 1.1 christos 2260 1.1 christos /* 2261 1.1 christos * Remove an IP address from the radix tree. 2262 1.1 christos */ 2263 1.1 christos static void 2264 1.15 christos del_cidr(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 2265 1.7 christos const dns_name_t *src_name) { 2266 1.1 christos isc_result_t result; 2267 1.1 christos dns_rpz_cidr_key_t tgt_ip; 2268 1.1 christos dns_rpz_prefix_t tgt_prefix; 2269 1.1 christos dns_rpz_addr_zbits_t tgt_set; 2270 1.15 christos dns_rpz_cidr_node_t *tgt = NULL, *parent = NULL, *child = NULL; 2271 1.1 christos 2272 1.1 christos /* 2273 1.1 christos * Do not worry about invalid rpz IP address names. If we 2274 1.1 christos * are here, then something relevant was added and so was 2275 1.16 christos * valid. 2276 1.1 christos */ 2277 1.15 christos result = name2ipkey(DNS_RPZ_DEBUG_QUIET, rpz, rpz_type, src_name, 2278 1.15 christos &tgt_ip, &tgt_prefix, &tgt_set); 2279 1.7 christos if (result != ISC_R_SUCCESS) { 2280 1.1 christos return; 2281 1.7 christos } 2282 1.1 christos 2283 1.16 christos RWLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 2284 1.15 christos result = search(rpz->rpzs, &tgt_ip, tgt_prefix, &tgt_set, false, &tgt); 2285 1.1 christos if (result != ISC_R_SUCCESS) { 2286 1.16 christos goto done; 2287 1.1 christos } 2288 1.1 christos 2289 1.1 christos /* 2290 1.1 christos * Mark the node and its parents to reflect the deleted IP address. 2291 1.1 christos */ 2292 1.1 christos tgt_set.client_ip &= tgt->set.client_ip; 2293 1.1 christos tgt_set.ip &= tgt->set.ip; 2294 1.1 christos tgt_set.nsip &= tgt->set.nsip; 2295 1.1 christos tgt->set.client_ip &= ~tgt_set.client_ip; 2296 1.1 christos tgt->set.ip &= ~tgt_set.ip; 2297 1.1 christos tgt->set.nsip &= ~tgt_set.nsip; 2298 1.1 christos set_sum_pair(tgt); 2299 1.1 christos 2300 1.15 christos adj_trigger_cnt(rpz, rpz_type, &tgt_ip, tgt_prefix, false); 2301 1.1 christos 2302 1.1 christos /* 2303 1.1 christos * We might need to delete 2 nodes. 2304 1.1 christos */ 2305 1.1 christos do { 2306 1.1 christos /* 2307 1.1 christos * The node is now useless if it has no data of its own 2308 1.15 christos * and 0 or 1 children. We are finished if it is not 2309 1.15 christos * useless. 2310 1.1 christos */ 2311 1.1 christos if ((child = tgt->child[0]) != NULL) { 2312 1.7 christos if (tgt->child[1] != NULL) { 2313 1.1 christos break; 2314 1.7 christos } 2315 1.1 christos } else { 2316 1.1 christos child = tgt->child[1]; 2317 1.1 christos } 2318 1.7 christos if (tgt->set.client_ip != 0 || tgt->set.ip != 0 || 2319 1.12 christos tgt->set.nsip != 0) 2320 1.12 christos { 2321 1.1 christos break; 2322 1.7 christos } 2323 1.1 christos 2324 1.1 christos /* 2325 1.1 christos * Replace the pointer to this node in the parent with 2326 1.1 christos * the remaining child or NULL. 2327 1.1 christos */ 2328 1.1 christos parent = tgt->parent; 2329 1.1 christos if (parent == NULL) { 2330 1.15 christos rpz->rpzs->cidr = child; 2331 1.1 christos } else { 2332 1.1 christos parent->child[parent->child[1] == tgt] = child; 2333 1.1 christos } 2334 1.15 christos 2335 1.1 christos /* 2336 1.1 christos * If the child exists fix up its parent pointer. 2337 1.1 christos */ 2338 1.7 christos if (child != NULL) { 2339 1.1 christos child->parent = parent; 2340 1.7 christos } 2341 1.15 christos isc_mem_put(rpz->rpzs->mctx, tgt, sizeof(*tgt)); 2342 1.1 christos 2343 1.1 christos tgt = parent; 2344 1.1 christos } while (tgt != NULL); 2345 1.16 christos 2346 1.16 christos done: 2347 1.16 christos RWUNLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 2348 1.1 christos } 2349 1.1 christos 2350 1.1 christos static void 2351 1.15 christos del_name(dns_rpz_zone_t *rpz, dns_rpz_type_t rpz_type, 2352 1.7 christos const dns_name_t *src_name) { 2353 1.16 christos isc_result_t result; 2354 1.1 christos char namebuf[DNS_NAME_FORMATSIZE]; 2355 1.1 christos dns_fixedname_t trig_namef; 2356 1.15 christos dns_name_t *trig_name = NULL; 2357 1.16 christos dns_rpz_zones_t *rpzs = rpz->rpzs; 2358 1.16 christos nmdata_t *data = NULL; 2359 1.16 christos nmdata_t del_data; 2360 1.16 christos dns_qp_t *qp = NULL; 2361 1.3 christos bool exists; 2362 1.1 christos 2363 1.16 christos dns_qpmulti_write(rpzs->table, &qp); 2364 1.16 christos 2365 1.1 christos /* 2366 1.1 christos * We need a summary database of names even with 1 policy zone, 2367 1.1 christos * because wildcard triggers are handled differently. 2368 1.1 christos */ 2369 1.1 christos 2370 1.1 christos trig_name = dns_fixedname_initname(&trig_namef); 2371 1.15 christos name2data(rpz, rpz_type, src_name, trig_name, &del_data); 2372 1.1 christos 2373 1.16 christos result = dns_qp_getname(qp, trig_name, (void **)&data, NULL); 2374 1.1 christos if (result != ISC_R_SUCCESS) { 2375 1.1 christos return; 2376 1.1 christos } 2377 1.1 christos 2378 1.16 christos INSIST(data != NULL); 2379 1.1 christos 2380 1.16 christos del_data.set.qname &= data->set.qname; 2381 1.16 christos del_data.set.ns &= data->set.ns; 2382 1.16 christos del_data.wild.qname &= data->wild.qname; 2383 1.16 christos del_data.wild.ns &= data->wild.ns; 2384 1.1 christos 2385 1.3 christos exists = (del_data.set.qname != 0 || del_data.set.ns != 0 || 2386 1.3 christos del_data.wild.qname != 0 || del_data.wild.ns != 0); 2387 1.1 christos 2388 1.16 christos data->set.qname &= ~del_data.set.qname; 2389 1.16 christos data->set.ns &= ~del_data.set.ns; 2390 1.16 christos data->wild.qname &= ~del_data.wild.qname; 2391 1.16 christos data->wild.ns &= ~del_data.wild.ns; 2392 1.1 christos 2393 1.16 christos if (data->set.qname == 0 && data->set.ns == 0 && 2394 1.16 christos data->wild.qname == 0 && data->wild.ns == 0) 2395 1.7 christos { 2396 1.16 christos result = dns_qp_deletename(qp, trig_name, NULL, NULL); 2397 1.1 christos if (result != ISC_R_SUCCESS) { 2398 1.1 christos /* 2399 1.1 christos * bin/tests/system/rpz/tests.sh looks for 2400 1.1 christos * "rpz.*failed". 2401 1.1 christos */ 2402 1.1 christos dns_name_format(src_name, namebuf, sizeof(namebuf)); 2403 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 2404 1.1 christos DNS_LOGMODULE_RBTDB, DNS_RPZ_ERROR_LEVEL, 2405 1.15 christos "rpz del_name(%s) node delete " 2406 1.15 christos "failed: %s", 2407 1.1 christos namebuf, isc_result_totext(result)); 2408 1.1 christos } 2409 1.1 christos } 2410 1.1 christos 2411 1.7 christos if (exists) { 2412 1.16 christos RWLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 2413 1.15 christos adj_trigger_cnt(rpz, rpz_type, NULL, 0, false); 2414 1.16 christos RWUNLOCK(&rpz->rpzs->search_lock, isc_rwlocktype_write); 2415 1.7 christos } 2416 1.16 christos 2417 1.16 christos dns_qp_compact(qp, DNS_QPGC_MAYBE); 2418 1.16 christos dns_qpmulti_commit(rpzs->table, &qp); 2419 1.1 christos } 2420 1.1 christos 2421 1.1 christos /* 2422 1.1 christos * Remove an IP address from the radix tree or a name from the summary database. 2423 1.1 christos */ 2424 1.15 christos static void 2425 1.15 christos rpz_del(dns_rpz_zone_t *rpz, const dns_name_t *src_name) { 2426 1.1 christos dns_rpz_type_t rpz_type; 2427 1.15 christos dns_rpz_zones_t *rpzs = NULL; 2428 1.15 christos dns_rpz_num_t rpz_num; 2429 1.15 christos 2430 1.15 christos REQUIRE(rpz != NULL); 2431 1.15 christos 2432 1.15 christos rpzs = rpz->rpzs; 2433 1.15 christos rpz_num = rpz->num; 2434 1.1 christos 2435 1.1 christos REQUIRE(rpzs != NULL && rpz_num < rpzs->p.num_zones); 2436 1.1 christos 2437 1.1 christos rpz_type = type_from_name(rpzs, rpz, src_name); 2438 1.1 christos switch (rpz_type) { 2439 1.1 christos case DNS_RPZ_TYPE_QNAME: 2440 1.1 christos case DNS_RPZ_TYPE_NSDNAME: 2441 1.15 christos del_name(rpz, rpz_type, src_name); 2442 1.1 christos break; 2443 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 2444 1.1 christos case DNS_RPZ_TYPE_IP: 2445 1.1 christos case DNS_RPZ_TYPE_NSIP: 2446 1.15 christos del_cidr(rpz, rpz_type, src_name); 2447 1.1 christos break; 2448 1.1 christos case DNS_RPZ_TYPE_BAD: 2449 1.1 christos break; 2450 1.1 christos } 2451 1.1 christos } 2452 1.1 christos 2453 1.1 christos /* 2454 1.1 christos * Search the summary radix tree to get a relative owner name in a 2455 1.1 christos * policy zone relevant to a triggering IP address. 2456 1.1 christos * rpz_type and zbits limit the search for IP address netaddr 2457 1.1 christos * return the policy zone's number or DNS_RPZ_INVALID_NUM 2458 1.1 christos * ip_name is the relative owner name found and 2459 1.1 christos * *prefixp is its prefix length. 2460 1.1 christos */ 2461 1.1 christos dns_rpz_num_t 2462 1.1 christos dns_rpz_find_ip(dns_rpz_zones_t *rpzs, dns_rpz_type_t rpz_type, 2463 1.1 christos dns_rpz_zbits_t zbits, const isc_netaddr_t *netaddr, 2464 1.7 christos dns_name_t *ip_name, dns_rpz_prefix_t *prefixp) { 2465 1.1 christos dns_rpz_cidr_key_t tgt_ip; 2466 1.1 christos dns_rpz_addr_zbits_t tgt_set; 2467 1.15 christos dns_rpz_cidr_node_t *found = NULL; 2468 1.1 christos isc_result_t result; 2469 1.3 christos dns_rpz_num_t rpz_num = 0; 2470 1.1 christos dns_rpz_have_t have; 2471 1.1 christos int i; 2472 1.1 christos 2473 1.1 christos RWLOCK(&rpzs->search_lock, isc_rwlocktype_read); 2474 1.1 christos have = rpzs->have; 2475 1.1 christos RWUNLOCK(&rpzs->search_lock, isc_rwlocktype_read); 2476 1.1 christos 2477 1.1 christos /* 2478 1.1 christos * Convert IP address to CIDR tree key. 2479 1.1 christos */ 2480 1.1 christos if (netaddr->family == AF_INET) { 2481 1.1 christos tgt_ip.w[0] = 0; 2482 1.1 christos tgt_ip.w[1] = 0; 2483 1.1 christos tgt_ip.w[2] = ADDR_V4MAPPED; 2484 1.1 christos tgt_ip.w[3] = ntohl(netaddr->type.in.s_addr); 2485 1.1 christos switch (rpz_type) { 2486 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 2487 1.1 christos zbits &= have.client_ipv4; 2488 1.1 christos break; 2489 1.1 christos case DNS_RPZ_TYPE_IP: 2490 1.1 christos zbits &= have.ipv4; 2491 1.1 christos break; 2492 1.1 christos case DNS_RPZ_TYPE_NSIP: 2493 1.1 christos zbits &= have.nsipv4; 2494 1.1 christos break; 2495 1.1 christos default: 2496 1.11 christos UNREACHABLE(); 2497 1.15 christos break; 2498 1.1 christos } 2499 1.1 christos } else if (netaddr->family == AF_INET6) { 2500 1.1 christos dns_rpz_cidr_key_t src_ip6; 2501 1.1 christos 2502 1.1 christos /* 2503 1.1 christos * Given the int aligned struct in_addr member of netaddr->type 2504 1.1 christos * one could cast netaddr->type.in6 to dns_rpz_cidr_key_t *, 2505 1.1 christos * but some people object. 2506 1.1 christos */ 2507 1.1 christos memmove(src_ip6.w, &netaddr->type.in6, sizeof(src_ip6.w)); 2508 1.1 christos for (i = 0; i < 4; i++) { 2509 1.1 christos tgt_ip.w[i] = ntohl(src_ip6.w[i]); 2510 1.1 christos } 2511 1.1 christos switch (rpz_type) { 2512 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 2513 1.1 christos zbits &= have.client_ipv6; 2514 1.1 christos break; 2515 1.1 christos case DNS_RPZ_TYPE_IP: 2516 1.1 christos zbits &= have.ipv6; 2517 1.1 christos break; 2518 1.1 christos case DNS_RPZ_TYPE_NSIP: 2519 1.1 christos zbits &= have.nsipv6; 2520 1.1 christos break; 2521 1.1 christos default: 2522 1.11 christos UNREACHABLE(); 2523 1.15 christos break; 2524 1.1 christos } 2525 1.1 christos } else { 2526 1.16 christos return DNS_RPZ_INVALID_NUM; 2527 1.1 christos } 2528 1.1 christos 2529 1.7 christos if (zbits == 0) { 2530 1.16 christos return DNS_RPZ_INVALID_NUM; 2531 1.7 christos } 2532 1.1 christos make_addr_set(&tgt_set, zbits, rpz_type); 2533 1.1 christos 2534 1.1 christos RWLOCK(&rpzs->search_lock, isc_rwlocktype_read); 2535 1.3 christos result = search(rpzs, &tgt_ip, 128, &tgt_set, false, &found); 2536 1.1 christos if (result == ISC_R_NOTFOUND) { 2537 1.1 christos /* 2538 1.1 christos * There are no eligible zones for this IP address. 2539 1.1 christos */ 2540 1.1 christos RWUNLOCK(&rpzs->search_lock, isc_rwlocktype_read); 2541 1.16 christos return DNS_RPZ_INVALID_NUM; 2542 1.1 christos } 2543 1.1 christos 2544 1.1 christos /* 2545 1.1 christos * Construct the trigger name for the longest matching trigger 2546 1.1 christos * in the first eligible zone with a match. 2547 1.1 christos */ 2548 1.1 christos *prefixp = found->prefix; 2549 1.1 christos switch (rpz_type) { 2550 1.1 christos case DNS_RPZ_TYPE_CLIENT_IP: 2551 1.1 christos rpz_num = zbit_to_num(found->set.client_ip & tgt_set.client_ip); 2552 1.1 christos break; 2553 1.1 christos case DNS_RPZ_TYPE_IP: 2554 1.1 christos rpz_num = zbit_to_num(found->set.ip & tgt_set.ip); 2555 1.1 christos break; 2556 1.1 christos case DNS_RPZ_TYPE_NSIP: 2557 1.1 christos rpz_num = zbit_to_num(found->set.nsip & tgt_set.nsip); 2558 1.1 christos break; 2559 1.1 christos default: 2560 1.11 christos UNREACHABLE(); 2561 1.1 christos } 2562 1.1 christos result = ip2name(&found->ip, found->prefix, dns_rootname, ip_name); 2563 1.1 christos RWUNLOCK(&rpzs->search_lock, isc_rwlocktype_read); 2564 1.1 christos if (result != ISC_R_SUCCESS) { 2565 1.1 christos /* 2566 1.1 christos * bin/tests/system/rpz/tests.sh looks for "rpz.*failed". 2567 1.1 christos */ 2568 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 2569 1.1 christos DNS_LOGMODULE_RBTDB, DNS_RPZ_ERROR_LEVEL, 2570 1.1 christos "rpz ip2name() failed: %s", 2571 1.1 christos isc_result_totext(result)); 2572 1.16 christos return DNS_RPZ_INVALID_NUM; 2573 1.1 christos } 2574 1.16 christos return rpz_num; 2575 1.1 christos } 2576 1.1 christos 2577 1.1 christos /* 2578 1.1 christos * Search the summary radix tree for policy zones with triggers matching 2579 1.1 christos * a name. 2580 1.1 christos */ 2581 1.1 christos dns_rpz_zbits_t 2582 1.1 christos dns_rpz_find_name(dns_rpz_zones_t *rpzs, dns_rpz_type_t rpz_type, 2583 1.7 christos dns_rpz_zbits_t zbits, dns_name_t *trig_name) { 2584 1.16 christos isc_result_t result; 2585 1.1 christos char namebuf[DNS_NAME_FORMATSIZE]; 2586 1.16 christos nmdata_t *data = NULL; 2587 1.16 christos dns_rpz_zbits_t found_zbits = 0; 2588 1.16 christos dns_qpchain_t chain; 2589 1.16 christos dns_qpread_t qpr; 2590 1.6 christos int i; 2591 1.1 christos 2592 1.6 christos if (zbits == 0) { 2593 1.16 christos return 0; 2594 1.6 christos } 2595 1.1 christos 2596 1.16 christos dns_qpmulti_query(rpzs->table, &qpr); 2597 1.16 christos dns_qpchain_init(&qpr, &chain); 2598 1.9 christos 2599 1.16 christos result = dns_qp_lookup(&qpr, trig_name, NULL, NULL, &chain, 2600 1.16 christos (void **)&data, NULL); 2601 1.1 christos switch (result) { 2602 1.1 christos case ISC_R_SUCCESS: 2603 1.16 christos INSIST(data != NULL); 2604 1.16 christos if (rpz_type == DNS_RPZ_TYPE_QNAME) { 2605 1.16 christos found_zbits = data->set.qname; 2606 1.16 christos } else { 2607 1.16 christos found_zbits = data->set.ns; 2608 1.1 christos } 2609 1.11 christos FALLTHROUGH; 2610 1.6 christos 2611 1.1 christos case DNS_R_PARTIALMATCH: 2612 1.16 christos i = dns_qpchain_length(&chain); 2613 1.16 christos while (i-- > 0) { 2614 1.16 christos dns_qpchain_node(&chain, i, NULL, (void **)&data, NULL); 2615 1.16 christos INSIST(data != NULL); 2616 1.16 christos if (rpz_type == DNS_RPZ_TYPE_QNAME) { 2617 1.16 christos found_zbits |= data->wild.qname; 2618 1.9 christos } else { 2619 1.16 christos found_zbits |= data->wild.ns; 2620 1.9 christos } 2621 1.1 christos } 2622 1.1 christos break; 2623 1.1 christos 2624 1.1 christos case ISC_R_NOTFOUND: 2625 1.1 christos break; 2626 1.1 christos 2627 1.1 christos default: 2628 1.1 christos /* 2629 1.1 christos * bin/tests/system/rpz/tests.sh looks for "rpz.*failed". 2630 1.1 christos */ 2631 1.1 christos dns_name_format(trig_name, namebuf, sizeof(namebuf)); 2632 1.1 christos isc_log_write(dns_lctx, DNS_LOGCATEGORY_RPZ, 2633 1.1 christos DNS_LOGMODULE_RBTDB, DNS_RPZ_ERROR_LEVEL, 2634 1.7 christos "dns_rpz_find_name(%s) failed: %s", namebuf, 2635 1.7 christos isc_result_totext(result)); 2636 1.1 christos break; 2637 1.1 christos } 2638 1.1 christos 2639 1.16 christos dns_qpread_destroy(rpzs->table, &qpr); 2640 1.16 christos return zbits & found_zbits; 2641 1.1 christos } 2642 1.1 christos 2643 1.1 christos /* 2644 1.1 christos * Translate CNAME rdata to a QNAME response policy action. 2645 1.1 christos */ 2646 1.1 christos dns_rpz_policy_t 2647 1.1 christos dns_rpz_decode_cname(dns_rpz_zone_t *rpz, dns_rdataset_t *rdataset, 2648 1.7 christos dns_name_t *selfname) { 2649 1.1 christos dns_rdata_t rdata = DNS_RDATA_INIT; 2650 1.1 christos dns_rdata_cname_t cname; 2651 1.1 christos isc_result_t result; 2652 1.1 christos 2653 1.1 christos result = dns_rdataset_first(rdataset); 2654 1.1 christos INSIST(result == ISC_R_SUCCESS); 2655 1.1 christos dns_rdataset_current(rdataset, &rdata); 2656 1.1 christos result = dns_rdata_tostruct(&rdata, &cname, NULL); 2657 1.1 christos INSIST(result == ISC_R_SUCCESS); 2658 1.1 christos dns_rdata_reset(&rdata); 2659 1.1 christos 2660 1.1 christos /* 2661 1.1 christos * CNAME . means NXDOMAIN 2662 1.1 christos */ 2663 1.7 christos if (dns_name_equal(&cname.cname, dns_rootname)) { 2664 1.16 christos return DNS_RPZ_POLICY_NXDOMAIN; 2665 1.7 christos } 2666 1.1 christos 2667 1.1 christos if (dns_name_iswildcard(&cname.cname)) { 2668 1.1 christos /* 2669 1.1 christos * CNAME *. means NODATA 2670 1.1 christos */ 2671 1.7 christos if (dns_name_countlabels(&cname.cname) == 2) { 2672 1.16 christos return DNS_RPZ_POLICY_NODATA; 2673 1.7 christos } 2674 1.1 christos 2675 1.1 christos /* 2676 1.1 christos * A qname of www.evil.com and a policy of 2677 1.1 christos * *.evil.com CNAME *.garden.net 2678 1.1 christos * gives a result of 2679 1.1 christos * evil.com CNAME evil.com.garden.net 2680 1.1 christos */ 2681 1.7 christos if (dns_name_countlabels(&cname.cname) > 2) { 2682 1.16 christos return DNS_RPZ_POLICY_WILDCNAME; 2683 1.7 christos } 2684 1.1 christos } 2685 1.1 christos 2686 1.1 christos /* 2687 1.1 christos * CNAME rpz-tcp-only. means "send truncated UDP responses." 2688 1.1 christos */ 2689 1.7 christos if (dns_name_equal(&cname.cname, &rpz->tcp_only)) { 2690 1.16 christos return DNS_RPZ_POLICY_TCP_ONLY; 2691 1.7 christos } 2692 1.1 christos 2693 1.1 christos /* 2694 1.1 christos * CNAME rpz-drop. means "do not respond." 2695 1.1 christos */ 2696 1.7 christos if (dns_name_equal(&cname.cname, &rpz->drop)) { 2697 1.16 christos return DNS_RPZ_POLICY_DROP; 2698 1.7 christos } 2699 1.1 christos 2700 1.1 christos /* 2701 1.1 christos * CNAME rpz-passthru. means "do not rewrite." 2702 1.1 christos */ 2703 1.7 christos if (dns_name_equal(&cname.cname, &rpz->passthru)) { 2704 1.16 christos return DNS_RPZ_POLICY_PASSTHRU; 2705 1.7 christos } 2706 1.1 christos 2707 1.1 christos /* 2708 1.1 christos * 128.1.0.127.rpz-ip CNAME 128.1.0.0.127. is obsolete PASSTHRU 2709 1.1 christos */ 2710 1.7 christos if (selfname != NULL && dns_name_equal(&cname.cname, selfname)) { 2711 1.16 christos return DNS_RPZ_POLICY_PASSTHRU; 2712 1.7 christos } 2713 1.1 christos 2714 1.1 christos /* 2715 1.1 christos * Any other rdata gives a response consisting of the rdata. 2716 1.1 christos */ 2717 1.16 christos return DNS_RPZ_POLICY_RECORD; 2718 1.16 christos } 2719 1.16 christos 2720 1.16 christos static void 2721 1.16 christos destroy_nmdata(nmdata_t *data) { 2722 1.16 christos dns_name_free(&data->name, data->mctx); 2723 1.16 christos isc_mem_putanddetach(&data->mctx, data, sizeof(nmdata_t)); 2724 1.16 christos } 2725 1.16 christos 2726 1.16 christos #ifdef DNS_RPZ_TRACE 2727 1.16 christos ISC_REFCOUNT_TRACE_IMPL(nmdata, destroy_nmdata); 2728 1.16 christos #else 2729 1.16 christos ISC_REFCOUNT_IMPL(nmdata, destroy_nmdata); 2730 1.16 christos #endif 2731 1.16 christos 2732 1.16 christos static void 2733 1.16 christos qp_attach(void *uctx ISC_ATTR_UNUSED, void *pval, 2734 1.16 christos uint32_t ival ISC_ATTR_UNUSED) { 2735 1.16 christos nmdata_t *data = pval; 2736 1.16 christos nmdata_ref(data); 2737 1.16 christos } 2738 1.16 christos 2739 1.16 christos static void 2740 1.16 christos qp_detach(void *uctx ISC_ATTR_UNUSED, void *pval, 2741 1.16 christos uint32_t ival ISC_ATTR_UNUSED) { 2742 1.16 christos nmdata_t *data = pval; 2743 1.16 christos nmdata_detach(&data); 2744 1.16 christos } 2745 1.16 christos 2746 1.16 christos static size_t 2747 1.16 christos qp_makekey(dns_qpkey_t key, void *uctx ISC_ATTR_UNUSED, void *pval, 2748 1.16 christos uint32_t ival ISC_ATTR_UNUSED) { 2749 1.16 christos nmdata_t *data = pval; 2750 1.16 christos return dns_qpkey_fromname(key, &data->name); 2751 1.16 christos } 2752 1.16 christos 2753 1.16 christos static void 2754 1.16 christos qp_triename(void *uctx, char *buf, size_t size) { 2755 1.16 christos dns_view_t *view = uctx; 2756 1.16 christos snprintf(buf, size, "view %s RPZs", view->name); 2757 1.1 christos } 2758