1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315
|
/*
* This file is part of PowerDNS or dnsdist.
* Copyright -- PowerDNS.COM B.V. and its contributors
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of version 2 of the GNU General Public License as
* published by the Free Software Foundation.
*
* In addition, for the avoidance of any doubt, permission is granted to
* link this program with OpenSSL and to (re)distribute the binaries
* produced as the result of such linking.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#pragma once
#include <string>
#include <string.h>
#include <vector>
#include <boost/logic/tribool.hpp>
#include <boost/multi_index_container.hpp>
#include <boost/multi_index/hashed_index.hpp>
#include <boost/multi_index/ordered_index.hpp>
#include <boost/multi_index/key_extractors.hpp>
#include <boost/multi_index/sequenced_index.hpp>
#include "dnssecinfra.hh"
#include "dnsrecords.hh"
#include "dnspacket.hh"
#include "ueberbackend.hh"
#include "lock.hh"
using namespace ::boost::multi_index;
class DNSSECKeeper : public boost::noncopyable
{
public:
enum keytype_t { KSK, ZSK, CSK };
enum keyalgorithm_t : uint8_t {
RSAMD5=1,
DH=2,
DSA=3,
RSASHA1=5,
DSANSEC3SHA1=6,
RSASHA1NSEC3SHA1=7,
RSASHA256=8,
RSASHA512=10,
ECCGOST=12,
ECDSA256=13,
ECDSA384=14,
ED25519=15,
ED448=16
};
enum dsdigestalgorithm_t : uint8_t {
DIGEST_SHA1=1,
DIGEST_SHA256=2,
DIGEST_GOST=3,
DIGEST_SHA384=4
};
struct KeyMetaData
{
string fname;
unsigned int id;
bool active;
keytype_t keyType;
bool hasSEPBit;
bool published;
};
typedef std::pair<DNSSECPrivateKey, KeyMetaData> keymeta_t;
typedef std::vector<keymeta_t > keyset_t;
static string keyTypeToString(const keytype_t &keyType)
{
switch(keyType) {
case DNSSECKeeper::KSK:
return("KSK");
case DNSSECKeeper::ZSK:
return("ZSK");
case DNSSECKeeper::CSK:
return("CSK");
default:
return("UNKNOWN");
}
}
/*
* Returns the algorithm number based on the mnemonic (or old PowerDNS value of) a string.
* See https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml for the mapping
*/
static int shorthand2algorithm(const string &algorithm)
{
if (pdns_iequals(algorithm, "rsamd5")) return RSAMD5;
if (pdns_iequals(algorithm, "dh")) return DH;
if (pdns_iequals(algorithm, "dsa")) return DSA;
if (pdns_iequals(algorithm, "rsasha1")) return RSASHA1;
if (pdns_iequals(algorithm, "dsa-nsec3-sha1")) return DSANSEC3SHA1;
if (pdns_iequals(algorithm, "rsasha1-nsec3-sha1")) return RSASHA1NSEC3SHA1;
if (pdns_iequals(algorithm, "rsasha256")) return RSASHA256;
if (pdns_iequals(algorithm, "rsasha512")) return RSASHA512;
if (pdns_iequals(algorithm, "ecc-gost")) return ECCGOST;
if (pdns_iequals(algorithm, "gost")) return ECCGOST;
if (pdns_iequals(algorithm, "ecdsa256")) return ECDSA256;
if (pdns_iequals(algorithm, "ecdsap256sha256")) return ECDSA256;
if (pdns_iequals(algorithm, "ecdsa384")) return ECDSA384;
if (pdns_iequals(algorithm, "ecdsap384sha384")) return ECDSA384;
if (pdns_iequals(algorithm, "ed25519")) return ED25519;
if (pdns_iequals(algorithm, "ed448")) return ED448;
if (pdns_iequals(algorithm, "indirect")) return 252;
if (pdns_iequals(algorithm, "privatedns")) return 253;
if (pdns_iequals(algorithm, "privateoid")) return 254;
return -1;
}
/*
* Returns the mnemonic from https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml
*/
static string algorithm2name(uint8_t algo) {
switch(algo) {
case 0:
case 4:
case 9:
case 11:
return "Reserved";
case RSAMD5:
return "RSAMD5";
case DH:
return "DH";
case DSA:
return "DSA";
case RSASHA1:
return "RSASHA1";
case DSANSEC3SHA1:
return "DSA-NSEC3-SHA1";
case RSASHA1NSEC3SHA1:
return "RSASHA1-NSEC3-SHA1";
case RSASHA256:
return "RSASHA256";
case RSASHA512:
return "RSASHA512";
case ECCGOST:
return "ECC-GOST";
case ECDSA256:
return "ECDSAP256SHA256";
case ECDSA384:
return "ECDSAP384SHA384";
case ED25519:
return "ED25519";
case ED448:
return "ED448";
case 252:
return "INDIRECT";
case 253:
return "PRIVATEDNS";
case 254:
return "PRIVATEOID";
default:
return "Unallocated/Reserved";
}
}
private:
UeberBackend* d_keymetadb;
bool d_ourDB;
public:
DNSSECKeeper() : d_keymetadb( new UeberBackend("key-only")), d_ourDB(true)
{
}
DNSSECKeeper(UeberBackend* db) : d_keymetadb(db), d_ourDB(false)
{
}
~DNSSECKeeper()
{
if(d_ourDB)
delete d_keymetadb;
}
static uint64_t dbdnssecCacheSizes(const std::string& str);
static void clearAllCaches();
static bool clearKeyCache(const ZoneName& name);
static bool clearMetaCache(const ZoneName& name);
static void clearCaches(const ZoneName& name);
bool doesDNSSEC();
bool isSecuredZone(const ZoneName& zone, bool useCache=true);
keyset_t getEntryPoints(const ZoneName& zname);
keyset_t getKeys(const ZoneName& zone, bool useCache = true);
DNSSECPrivateKey getKeyById(const ZoneName& zname, unsigned int keyId);
bool addKey(const ZoneName& zname, bool setSEPBit, int algorithm, int64_t& keyId, int bits=0, bool active=true, bool published=true);
bool addKey(const ZoneName& zname, const DNSSECPrivateKey& dpk, int64_t& keyId, bool active=true, bool published=true);
bool removeKey(const ZoneName& zname, unsigned int keyId);
bool activateKey(const ZoneName& zname, unsigned int keyId);
bool deactivateKey(const ZoneName& zname, unsigned int keyId);
bool publishKey(const ZoneName& zname, unsigned int keyId);
bool unpublishKey(const ZoneName& zname, unsigned int keyId);
bool checkKeys(const ZoneName& zone, std::optional<std::reference_wrapper<std::vector<std::string>>> errorMessages);
bool getNSEC3PARAM(const ZoneName& zname, NSEC3PARAMRecordContent* ns3p=nullptr, bool* narrow=nullptr, bool useCache=true);
bool checkNSEC3PARAM(const NSEC3PARAMRecordContent& ns3p, string& msg);
bool setNSEC3PARAM(const ZoneName& zname, const NSEC3PARAMRecordContent& ns3p, const bool& narrow=false);
bool unsetNSEC3PARAM(const ZoneName& zname);
void getPreRRSIGs(UeberBackend& db, vector<DNSZoneRecord>& rrs, uint32_t signTTL, DNSPacket* p=nullptr);
bool isPresigned(const ZoneName& zname, bool useCache=true);
bool setPresigned(const ZoneName& zname);
bool unsetPresigned(const ZoneName& zname);
bool isSignalingZone(const ZoneName& zname, bool useCache=true);
bool setPublishCDNSKEY(const ZoneName& zname, bool deleteAlg);
void getPublishCDNSKEY(const ZoneName& zname, std::string& value);
bool unsetPublishCDNSKEY(const ZoneName& zname);
bool setPublishCDS(const ZoneName& zname, const string& digestAlgos);
void getPublishCDS(const ZoneName& zname, std::string& value);
bool unsetPublishCDS(const ZoneName& zname);
bool TSIGGrantsAccess(const ZoneName& zone, const DNSName& keyname);
bool getTSIGForAccess(const ZoneName& zone, const ComboAddress& primary, DNSName* keyname);
void startTransaction(const ZoneName& zone)
{
(*d_keymetadb->backends.begin())->startTransaction(zone);
}
void commitTransaction()
{
(*d_keymetadb->backends.begin())->commitTransaction();
}
void getFromMetaOrDefault(const ZoneName& zname, const std::string& key, std::string& value, const std::string& defaultvalue);
bool getFromMeta(const ZoneName& zname, const std::string& key, std::string& value);
void getSoaEdit(const ZoneName& zname, std::string& value, bool useCache=true);
bool unSecureZone(const ZoneName& zone, std::string& error);
bool rectifyZone(const ZoneName& zone, std::string& error, std::string& info, bool doTransaction);
static void setMaxEntries(size_t maxEntries);
typedef std::map<std::string, std::vector<std::string> > METAValues;
private:
bool getFromMetaNoCache(const ZoneName& name, const std::string& kind, std::string& value);
int64_t d_metaCacheCleanAction{0};
bool d_metaUpdate{false};
struct KeyCacheEntry
{
typedef vector<DNSSECKeeper::keymeta_t> keys_t;
uint32_t isStale(time_t now) const
{
return d_ttd < now;
}
ZoneName d_domain;
mutable keys_t d_keys;
unsigned int d_ttd;
};
struct METACacheEntry
{
time_t isStale(time_t now) const
{
return d_ttd < now;
}
ZoneName d_domain;
mutable METAValues d_value;
time_t d_ttd;
};
struct KeyCacheTag{};
struct CompositeTag{};
struct SequencedTag{};
typedef multi_index_container<
KeyCacheEntry,
indexed_by<
hashed_unique<tag<KeyCacheTag>,member<KeyCacheEntry, ZoneName, &KeyCacheEntry::d_domain> >,
sequenced<tag<SequencedTag>>
>
> keycache_t;
typedef multi_index_container<
METACacheEntry,
indexed_by<
ordered_unique<member<METACacheEntry, ZoneName, &METACacheEntry::d_domain> >,
sequenced<tag<SequencedTag>>
>
> metacache_t;
void cleanup();
static SharedLockGuarded<keycache_t> s_keycache;
static SharedLockGuarded<metacache_t> s_metacache;
static int64_t s_metaCacheCleanActions;
static AtomicCounter s_ops;
static time_t s_last_prune;
static size_t s_maxEntries;
};
uint32_t localtime_format_YYYYMMDDSS(time_t t, uint32_t seq);
// for SOA-EDIT
uint32_t calculateEditSOA(uint32_t old_serial, DNSSECKeeper& dsk, const ZoneName& zonename);
uint32_t calculateEditSOA(uint32_t old_serial, const string& kind, const ZoneName& zonename);
// for SOA-EDIT-DNSUPDATE/API
bool increaseSOARecord(DNSResourceRecord& rr, const string& increaseKind, const string& editKind, const ZoneName& zonename);
bool makeIncreasedSOARecord(SOAData& sd, const string& increaseKind, const string& editKind, DNSResourceRecord& rrout);
DNSZoneRecord makeEditedDNSZRFromSOAData(DNSSECKeeper& dk, const SOAData& sd, DNSResourceRecord::Place place=DNSResourceRecord::ANSWER);
|