diff options
Diffstat (limited to 'contrib/unbound/validator/validator.h')
| -rw-r--r-- | contrib/unbound/validator/validator.h | 306 | 
1 files changed, 306 insertions, 0 deletions
diff --git a/contrib/unbound/validator/validator.h b/contrib/unbound/validator/validator.h new file mode 100644 index 000000000000..e04fad572770 --- /dev/null +++ b/contrib/unbound/validator/validator.h @@ -0,0 +1,306 @@ +/* + * validator/validator.h - secure validator DNS query response module + * + * Copyright (c) 2007, NLnet Labs. All rights reserved. + * + * This software is open source. + *  + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + *  + * Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + *  + * Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + *  + * Neither the name of the NLNET LABS nor the names of its contributors may + * be used to endorse or promote products derived from this software without + * specific prior written permission. + *  + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED + * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING + * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +/** + * \file + * + * This file contains a module that performs validation of DNS queries. + * According to RFC 4034. + */ + +#ifndef VALIDATOR_VALIDATOR_H +#define VALIDATOR_VALIDATOR_H +#include "util/module.h" +#include "util/data/msgreply.h" +#include "validator/val_utils.h" +#include "validator/val_nsec3.h" +struct val_anchors; +struct key_cache; +struct key_entry_key; +struct val_neg_cache; +struct config_strlist; +struct comm_timer; +struct config_file; + +/** + * This is the TTL to use when a trust anchor fails to prime. A trust anchor + * will be primed no more often than this interval.  Used when harden- + * dnssec-stripped is off and the trust anchor fails. + */ +#define NULL_KEY_TTL	60 /* seconds */ + +/** + * TTL for bogus key entries.  When a DS or DNSKEY fails in the chain of + * trust the entire zone for that name is blacked out for this TTL. + */ +#define BOGUS_KEY_TTL	60 /* seconds */ + +/** Root key sentinel is ta preamble */ +#define SENTINEL_IS		"root-key-sentinel-is-ta-" +/** Root key sentinel is not ta preamble */ +#define SENTINEL_NOT		"root-key-sentinel-not-ta-" +/** Root key sentinel keytag length */ +#define SENTINEL_KEYTAG_LEN	5 + +/** + * Global state for the validator.  + */ +struct val_env { +	/** key cache; these are validated keys. trusted keys only +	 * end up here after being primed. */ +	struct key_cache* kcache; + +	/** aggressive negative cache. index into NSECs in rrset cache. */ +	struct val_neg_cache* neg_cache; + +	/** for debug testing a fixed validation date can be entered. +	 * if 0, current time is used for rrsig validation */ +	int32_t date_override; + +	/** clock skew min for signatures */ +	int32_t skew_min; + +	/** clock skew max for signatures */ +	int32_t skew_max; + +	/** max number of query restarts, number of IPs to probe */ +	int max_restart; + +	/** TTL for bogus data; used instead of untrusted TTL from data. +	 * Bogus data will not be verified more often than this interval.  +	 * seconds. */ +	uint32_t bogus_ttl; + +	/** +	 * Number of entries in the NSEC3 maximum iteration count table. +	 * Keep this table short, and sorted by size +	 */ +	int nsec3_keyiter_count; + +	/** +	 * NSEC3 maximum iteration count per signing key size. +	 * This array contains key size values (in increasing order) +	 */ +	size_t* nsec3_keysize; + +	/** +	 * NSEC3 maximum iteration count per signing key size. +	 * This array contains the maximum iteration count for the keysize +	 * in the keysize array. +	 */ +	size_t* nsec3_maxiter; + +	/** lock on bogus counter */ +	lock_basic_type bogus_lock; +	/** number of times rrsets marked bogus */ +	size_t num_rrset_bogus; +}; + +/** + * State of the validator for a query. + */ +enum val_state { +	/** initial state for validation */ +	VAL_INIT_STATE = 0, +	/** find the proper keys for validation, follow trust chain */ +	VAL_FINDKEY_STATE, +	/** validate the answer, using found key entry */ +	VAL_VALIDATE_STATE, +	/** finish up */ +	VAL_FINISHED_STATE, +}; + +/** + * Per query state for the validator module. + */ +struct val_qstate { +	/**  +	 * State of the validator module. +	 */ +	enum val_state state; + +	/** +	 * The original message we have been given to validate. +	 */ +	struct dns_msg* orig_msg; + +	/** +	 * The query restart count +	 */ +	int restart_count; +	/** The blacklist saved for chain of trust elements */ +	struct sock_list* chain_blacklist; + +	/** +	 * The query name we have chased to; qname after following CNAMEs +	 */ +	struct query_info qchase; + +	/** +	 * The chased reply, extract from original message. Can be: +	 * 	o CNAME +	 * 	o DNAME + CNAME +	 * 	o answer  +	 * 	plus authority, additional (nsecs) that have same signature. +	 */ +	struct reply_info* chase_reply; + +	/** +	 * The cname skip value; the number of rrsets that have been skipped +	 * due to chasing cnames. This is the offset into the  +	 * orig_msg->rep->rrsets array, into the answer section. +	 * starts at 0 - for the full original message. +	 * if it is >0 - qchase followed the cname, chase_reply setup to be +	 * that message and relevant authority rrsets. +	 * +	 * The skip is also used for referral messages, where it will +	 * range from 0, over the answer, authority and additional sections. +	 */ +	size_t rrset_skip; + +	/** trust anchor name */ +	uint8_t* trust_anchor_name; +	/** trust anchor labels */ +	int trust_anchor_labs; +	/** trust anchor length */ +	size_t trust_anchor_len; + +	/** the DS rrset */ +	struct ub_packed_rrset_key* ds_rrset; + +	/** domain name for empty nonterminal detection */ +	uint8_t* empty_DS_name; +	/** length of empty_DS_name */ +	size_t empty_DS_len; + +	/** the current key entry */ +	struct key_entry_key* key_entry; + +	/** subtype */ +	enum val_classification subtype; + +	/** signer name */ +	uint8_t* signer_name; +	/** length of signer_name */ +	size_t signer_len; + +	/** true if this state is waiting to prime a trust anchor */ +	int wait_prime_ta; + +	/** State to continue with RRSIG validation in a message later */ +	int msg_signatures_state; +	/** The rrset index for the msg signatures to continue from */ +	size_t msg_signatures_index; +	/** Cache table for NSEC3 hashes */ +	struct nsec3_cache_table nsec3_cache_table; +	/** DS message from sub if it got suspended from NSEC3 calculations */ +	struct dns_msg* sub_ds_msg; +	/** The timer to resume processing msg signatures */ +	struct comm_timer* suspend_timer; +	/** Number of suspends */ +	int suspend_count; +}; + +/** + * Get the validator function block. + * @return: function block with function pointers to validator methods. + */ +struct module_func_block* val_get_funcblock(void); + +/** + * Get validator state as a string + * @param state: to convert + * @return constant string that is printable. + */ +const char* val_state_to_string(enum val_state state); + +/** validator init */ +int val_init(struct module_env* env, int id); + +/** validator deinit */ +void val_deinit(struct module_env* env, int id); + +/** validator operate on a query */ +void val_operate(struct module_qstate* qstate, enum module_ev event, int id, +        struct outbound_entry* outbound); + +/**  + * inform validator super. + *  + * @param qstate: query state that finished. + * @param id: module id. + * @param super: the qstate to inform. + */ +void val_inform_super(struct module_qstate* qstate, int id, +	struct module_qstate* super); + +/** validator cleanup query state */ +void val_clear(struct module_qstate* qstate, int id); + +/** + * Debug helper routine that assists worker in determining memory in  + * use. + * @param env: module environment  + * @param id: module id. + * @return memory in use in bytes. + */ +size_t val_get_mem(struct module_env* env, int id); + +/** Timer callback for msg signatures continue timer */ +void validate_suspend_timer_cb(void* arg); + +/** + * Parse the val_nsec3_key_iterations string. + * @param val_nsec3_key_iterations: the string with nsec3 iterations config. + * @param keysize: returns malloced key size array on success. + * @param maxiter: returns malloced max iterations array on success. + * @param keyiter_count: returns size of keysize and maxiter arrays. + * @return false if it does not parse correctly. + */ +int val_env_parse_key_iter(char* val_nsec3_key_iterations, size_t** keysize, +	size_t** maxiter, int* keyiter_count); + +/** + * Apply config to validator env + * @param val_env: validator env. + * @param cfg: config + * @param keysize: nsec3 key size array. + * @param maxiter: nsec3 max iterations array. + * @param keyiter_count: size of keysize and maxiter arrays. + */ +void val_env_apply_cfg(struct val_env* val_env, struct config_file* cfg, +	size_t* keysize, size_t* maxiter, int keyiter_count); + +#endif /* VALIDATOR_VALIDATOR_H */  | 
