File: | build-scan/../src/resolve/resolved-dns-trust-anchor.c |
Warning: | line 370, column 9 Value stored to 'old_answer' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2 | |
3 | #include "sd-messages.h" |
4 | |
5 | #include "alloc-util.h" |
6 | #include "conf-files.h" |
7 | #include "def.h" |
8 | #include "dns-domain.h" |
9 | #include "fd-util.h" |
10 | #include "fileio.h" |
11 | #include "hexdecoct.h" |
12 | #include "parse-util.h" |
13 | #include "resolved-dns-trust-anchor.h" |
14 | #include "resolved-dns-dnssec.h" |
15 | #include "set.h" |
16 | #include "string-util.h" |
17 | #include "strv.h" |
18 | |
19 | static const char trust_anchor_dirs[] = CONF_PATHS_NULSTR("dnssec-trust-anchors.d")"/etc/" "dnssec-trust-anchors.d" "\0" "/run/" "dnssec-trust-anchors.d" "\0" "/usr/local/lib/" "dnssec-trust-anchors.d" "\0" "/usr/lib/" "dnssec-trust-anchors.d" "\0"; |
20 | |
21 | /* The first DS RR from https://data.iana.org/root-anchors/root-anchors.xml, retrieved December 2015 */ |
22 | static const uint8_t root_digest1[] = |
23 | { 0x49, 0xAA, 0xC1, 0x1D, 0x7B, 0x6F, 0x64, 0x46, 0x70, 0x2E, 0x54, 0xA1, 0x60, 0x73, 0x71, 0x60, |
24 | 0x7A, 0x1A, 0x41, 0x85, 0x52, 0x00, 0xFD, 0x2C, 0xE1, 0xCD, 0xDE, 0x32, 0xF2, 0x4E, 0x8F, 0xB5 }; |
25 | |
26 | /* The second DS RR from https://data.iana.org/root-anchors/root-anchors.xml, retrieved February 2017 */ |
27 | static const uint8_t root_digest2[] = |
28 | { 0xE0, 0x6D, 0x44, 0xB8, 0x0B, 0x8F, 0x1D, 0x39, 0xA9, 0x5C, 0x0B, 0x0D, 0x7C, 0x65, 0xD0, 0x84, |
29 | 0x58, 0xE8, 0x80, 0x40, 0x9B, 0xBC, 0x68, 0x34, 0x57, 0x10, 0x42, 0x37, 0xC7, 0xF8, 0xEC, 0x8D }; |
30 | |
31 | static bool_Bool dns_trust_anchor_knows_domain_positive(DnsTrustAnchor *d, const char *name) { |
32 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 32, __PRETTY_FUNCTION__); } while (0); |
33 | |
34 | /* Returns true if there's an entry for the specified domain |
35 | * name in our trust anchor */ |
36 | |
37 | return |
38 | hashmap_contains(d->positive_by_key, &DNS_RESOURCE_KEY_CONST(DNS_CLASS_IN, DNS_TYPE_DNSKEY, name)((DnsResourceKey) { .n_ref = (unsigned) -1, .class = DNS_CLASS_IN , .type = DNS_TYPE_DNSKEY, ._name = (char*) name, })) || |
39 | hashmap_contains(d->positive_by_key, &DNS_RESOURCE_KEY_CONST(DNS_CLASS_IN, DNS_TYPE_DS, name)((DnsResourceKey) { .n_ref = (unsigned) -1, .class = DNS_CLASS_IN , .type = DNS_TYPE_DS, ._name = (char*) name, })); |
40 | } |
41 | |
42 | static int add_root_ksk( |
43 | DnsAnswer *answer, |
44 | DnsResourceKey *key, |
45 | uint16_t key_tag, |
46 | uint8_t algorithm, |
47 | uint8_t digest_type, |
48 | const void *digest, |
49 | size_t digest_size) { |
50 | |
51 | _cleanup_(dns_resource_record_unrefp)__attribute__((cleanup(dns_resource_record_unrefp))) DnsResourceRecord *rr = NULL((void*)0); |
52 | int r; |
53 | |
54 | rr = dns_resource_record_new(key); |
55 | if (!rr) |
56 | return -ENOMEM12; |
57 | |
58 | rr->ds.key_tag = key_tag; |
59 | rr->ds.algorithm = algorithm; |
60 | rr->ds.digest_type = digest_type; |
61 | rr->ds.digest_size = digest_size; |
62 | rr->ds.digest = memdup(digest, rr->ds.digest_size); |
63 | if (!rr->ds.digest) |
64 | return -ENOMEM12; |
65 | |
66 | r = dns_answer_add(answer, rr, 0, DNS_ANSWER_AUTHENTICATED); |
67 | if (r < 0) |
68 | return r; |
69 | |
70 | return 0; |
71 | } |
72 | |
73 | static int dns_trust_anchor_add_builtin_positive(DnsTrustAnchor *d) { |
74 | _cleanup_(dns_answer_unrefp)__attribute__((cleanup(dns_answer_unrefp))) DnsAnswer *answer = NULL((void*)0); |
75 | _cleanup_(dns_resource_key_unrefp)__attribute__((cleanup(dns_resource_key_unrefp))) DnsResourceKey *key = NULL((void*)0); |
76 | int r; |
77 | |
78 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 78, __PRETTY_FUNCTION__); } while (0); |
79 | |
80 | r = hashmap_ensure_allocated(&d->positive_by_key, &dns_resource_key_hash_ops)internal_hashmap_ensure_allocated(&d->positive_by_key, &dns_resource_key_hash_ops ); |
81 | if (r < 0) |
82 | return r; |
83 | |
84 | /* Only add the built-in trust anchor if there's neither a DS nor a DNSKEY defined for the root domain. That |
85 | * way users have an easy way to override the root domain DS/DNSKEY data. */ |
86 | if (dns_trust_anchor_knows_domain_positive(d, ".")) |
87 | return 0; |
88 | |
89 | key = dns_resource_key_new(DNS_CLASS_IN, DNS_TYPE_DS, ""); |
90 | if (!key) |
91 | return -ENOMEM12; |
92 | |
93 | answer = dns_answer_new(2); |
94 | if (!answer) |
95 | return -ENOMEM12; |
96 | |
97 | /* Add the two RRs from https://data.iana.org/root-anchors/root-anchors.xml */ |
98 | r = add_root_ksk(answer, key, 19036, DNSSEC_ALGORITHM_RSASHA256, DNSSEC_DIGEST_SHA256, root_digest1, sizeof(root_digest1)); |
99 | if (r < 0) |
100 | return r; |
101 | |
102 | r = add_root_ksk(answer, key, 20326, DNSSEC_ALGORITHM_RSASHA256, DNSSEC_DIGEST_SHA256, root_digest2, sizeof(root_digest2)); |
103 | if (r < 0) |
104 | return r; |
105 | |
106 | r = hashmap_put(d->positive_by_key, key, answer); |
107 | if (r < 0) |
108 | return r; |
109 | |
110 | answer = NULL((void*)0); |
111 | return 0; |
112 | } |
113 | |
114 | static int dns_trust_anchor_add_builtin_negative(DnsTrustAnchor *d) { |
115 | |
116 | static const char private_domains[] = |
117 | /* RFC 6761 says that .test is a special domain for |
118 | * testing and not to be installed in the root zone */ |
119 | "test\0" |
120 | |
121 | /* RFC 6761 says that these reverse IP lookup ranges |
122 | * are for private addresses, and hence should not |
123 | * show up in the root zone */ |
124 | "10.in-addr.arpa\0" |
125 | "16.172.in-addr.arpa\0" |
126 | "17.172.in-addr.arpa\0" |
127 | "18.172.in-addr.arpa\0" |
128 | "19.172.in-addr.arpa\0" |
129 | "20.172.in-addr.arpa\0" |
130 | "21.172.in-addr.arpa\0" |
131 | "22.172.in-addr.arpa\0" |
132 | "23.172.in-addr.arpa\0" |
133 | "24.172.in-addr.arpa\0" |
134 | "25.172.in-addr.arpa\0" |
135 | "26.172.in-addr.arpa\0" |
136 | "27.172.in-addr.arpa\0" |
137 | "28.172.in-addr.arpa\0" |
138 | "29.172.in-addr.arpa\0" |
139 | "30.172.in-addr.arpa\0" |
140 | "31.172.in-addr.arpa\0" |
141 | "168.192.in-addr.arpa\0" |
142 | |
143 | /* The same, but for IPv6. */ |
144 | "d.f.ip6.arpa\0" |
145 | |
146 | /* RFC 6762 reserves the .local domain for Multicast |
147 | * DNS, it hence cannot appear in the root zone. (Note |
148 | * that we by default do not route .local traffic to |
149 | * DNS anyway, except when a configured search domain |
150 | * suggests so.) */ |
151 | "local\0" |
152 | |
153 | /* These two are well known, popular private zone |
154 | * TLDs, that are blocked from delegation, according |
155 | * to: |
156 | * http://icannwiki.com/Name_Collision#NGPC_Resolution |
157 | * |
158 | * There's also ongoing work on making this official |
159 | * in an RRC: |
160 | * https://www.ietf.org/archive/id/draft-chapin-additional-reserved-tlds-02.txt */ |
161 | "home\0" |
162 | "corp\0" |
163 | |
164 | /* The following four TLDs are suggested for private |
165 | * zones in RFC 6762, Appendix G, and are hence very |
166 | * unlikely to be made official TLDs any day soon */ |
167 | "lan\0" |
168 | "intranet\0" |
169 | "internal\0" |
170 | "private\0"; |
171 | |
172 | const char *name; |
173 | int r; |
174 | |
175 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 175, __PRETTY_FUNCTION__); } while (0); |
176 | |
177 | /* Only add the built-in trust anchor if there's no negative |
178 | * trust anchor defined at all. This enables easy overriding |
179 | * of negative trust anchors. */ |
180 | |
181 | if (set_size(d->negative_by_name) > 0) |
182 | return 0; |
183 | |
184 | r = set_ensure_allocated(&d->negative_by_name, &dns_name_hash_ops)internal_set_ensure_allocated(&d->negative_by_name, & dns_name_hash_ops ); |
185 | if (r < 0) |
186 | return r; |
187 | |
188 | /* We add a couple of domains as default negative trust |
189 | * anchors, where it's very unlikely they will be installed in |
190 | * the root zone. If they exist they must be private, and thus |
191 | * unsigned. */ |
192 | |
193 | NULSTR_FOREACH(name, private_domains)for ((name) = (private_domains); (name) && *(name); ( name) = strchr((name), 0)+1) { |
194 | |
195 | if (dns_trust_anchor_knows_domain_positive(d, name)) |
196 | continue; |
197 | |
198 | r = set_put_strdup(d->negative_by_name, name); |
199 | if (r < 0) |
200 | return r; |
201 | } |
202 | |
203 | return 0; |
204 | } |
205 | |
206 | static int dns_trust_anchor_load_positive(DnsTrustAnchor *d, const char *path, unsigned line, const char *s) { |
207 | _cleanup_(dns_resource_record_unrefp)__attribute__((cleanup(dns_resource_record_unrefp))) DnsResourceRecord *rr = NULL((void*)0); |
208 | _cleanup_free___attribute__((cleanup(freep))) char *domain = NULL((void*)0), *class = NULL((void*)0), *type = NULL((void*)0); |
209 | _cleanup_(dns_answer_unrefp)__attribute__((cleanup(dns_answer_unrefp))) DnsAnswer *answer = NULL((void*)0); |
210 | DnsAnswer *old_answer = NULL((void*)0); |
211 | const char *p = s; |
212 | int r; |
213 | |
214 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 214, __PRETTY_FUNCTION__); } while (0); |
215 | assert(line)do { if ((__builtin_expect(!!(!(line)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("line"), "../src/resolve/resolved-dns-trust-anchor.c" , 215, __PRETTY_FUNCTION__); } while (0); |
216 | |
217 | r = extract_first_word(&p, &domain, NULL((void*)0), EXTRACT_QUOTES); |
218 | if (r < 0) |
219 | return log_warning_errno(r, "Unable to parse domain in line %s:%u: %m", path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 219, __func__ , "Unable to parse domain in line %s:%u: %m", path, line) : - abs(_e); }); |
220 | |
221 | if (!dns_name_is_valid(domain)) { |
222 | log_warning("Domain name %s is invalid, at line %s:%u, ignoring line.", domain, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 222, __func__ , "Domain name %s is invalid, at line %s:%u, ignoring line.", domain, path, line) : -abs(_e); }); |
223 | return -EINVAL22; |
224 | } |
225 | |
226 | r = extract_many_words(&p, NULL((void*)0), 0, &class, &type, NULL((void*)0)); |
227 | if (r < 0) |
228 | return log_warning_errno(r, "Unable to parse class and type in line %s:%u: %m", path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 228, __func__ , "Unable to parse class and type in line %s:%u: %m", path, line ) : -abs(_e); }); |
229 | if (r != 2) { |
230 | log_warning("Missing class or type in line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 230, __func__ , "Missing class or type in line %s:%u", path, line) : -abs(_e ); }); |
231 | return -EINVAL22; |
232 | } |
233 | |
234 | if (!strcaseeq(class, "IN")(strcasecmp((class),("IN")) == 0)) { |
235 | log_warning("RR class %s is not supported, ignoring line %s:%u.", class, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 235, __func__ , "RR class %s is not supported, ignoring line %s:%u.", class , path, line) : -abs(_e); }); |
236 | return -EINVAL22; |
237 | } |
238 | |
239 | if (strcaseeq(type, "DS")(strcasecmp((type),("DS")) == 0)) { |
240 | _cleanup_free___attribute__((cleanup(freep))) char *key_tag = NULL((void*)0), *algorithm = NULL((void*)0), *digest_type = NULL((void*)0); |
241 | _cleanup_free___attribute__((cleanup(freep))) void *dd = NULL((void*)0); |
242 | uint16_t kt; |
243 | int a, dt; |
244 | size_t l; |
245 | |
246 | r = extract_many_words(&p, NULL((void*)0), 0, &key_tag, &algorithm, &digest_type, NULL((void*)0)); |
247 | if (r < 0) { |
248 | log_warning_errno(r, "Failed to parse DS parameters on line %s:%u: %m", path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 248, __func__ , "Failed to parse DS parameters on line %s:%u: %m", path, line ) : -abs(_e); }); |
249 | return -EINVAL22; |
250 | } |
251 | if (r != 3) { |
252 | log_warning("Missing DS parameters on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 252, __func__ , "Missing DS parameters on line %s:%u", path, line) : -abs(_e ); }); |
253 | return -EINVAL22; |
254 | } |
255 | |
256 | r = safe_atou16(key_tag, &kt); |
257 | if (r < 0) |
258 | return log_warning_errno(r, "Failed to parse DS key tag %s on line %s:%u: %m", key_tag, path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 258, __func__ , "Failed to parse DS key tag %s on line %s:%u: %m", key_tag, path, line) : -abs(_e); }); |
259 | |
260 | a = dnssec_algorithm_from_string(algorithm); |
261 | if (a < 0) { |
262 | log_warning("Failed to parse DS algorithm %s on line %s:%u", algorithm, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 262, __func__ , "Failed to parse DS algorithm %s on line %s:%u", algorithm, path, line) : -abs(_e); }); |
263 | return -EINVAL22; |
264 | } |
265 | |
266 | dt = dnssec_digest_from_string(digest_type); |
267 | if (dt < 0) { |
268 | log_warning("Failed to parse DS digest type %s on line %s:%u", digest_type, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 268, __func__ , "Failed to parse DS digest type %s on line %s:%u", digest_type , path, line) : -abs(_e); }); |
269 | return -EINVAL22; |
270 | } |
271 | |
272 | if (isempty(p)) { |
273 | log_warning("Missing DS digest on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 273, __func__ , "Missing DS digest on line %s:%u", path, line) : -abs(_e); } ); |
274 | return -EINVAL22; |
275 | } |
276 | |
277 | r = unhexmem(p, strlen(p), &dd, &l); |
278 | if (r < 0) { |
279 | log_warning("Failed to parse DS digest %s on line %s:%u", p, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 279, __func__ , "Failed to parse DS digest %s on line %s:%u", p, path, line ) : -abs(_e); }); |
280 | return -EINVAL22; |
281 | } |
282 | |
283 | rr = dns_resource_record_new_full(DNS_CLASS_IN, DNS_TYPE_DS, domain); |
284 | if (!rr) |
285 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 285, __func__); |
286 | |
287 | rr->ds.key_tag = kt; |
288 | rr->ds.algorithm = a; |
289 | rr->ds.digest_type = dt; |
290 | rr->ds.digest_size = l; |
291 | rr->ds.digest = TAKE_PTR(dd)({ typeof(dd) _ptr_ = (dd); (dd) = ((void*)0); _ptr_; }); |
292 | |
293 | } else if (strcaseeq(type, "DNSKEY")(strcasecmp((type),("DNSKEY")) == 0)) { |
294 | _cleanup_free___attribute__((cleanup(freep))) char *flags = NULL((void*)0), *protocol = NULL((void*)0), *algorithm = NULL((void*)0); |
295 | _cleanup_free___attribute__((cleanup(freep))) void *k = NULL((void*)0); |
296 | uint16_t f; |
297 | size_t l; |
298 | int a; |
299 | |
300 | r = extract_many_words(&p, NULL((void*)0), 0, &flags, &protocol, &algorithm, NULL((void*)0)); |
301 | if (r < 0) |
302 | return log_warning_errno(r, "Failed to parse DNSKEY parameters on line %s:%u: %m", path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 302, __func__ , "Failed to parse DNSKEY parameters on line %s:%u: %m", path , line) : -abs(_e); }); |
303 | if (r != 3) { |
304 | log_warning("Missing DNSKEY parameters on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 304, __func__ , "Missing DNSKEY parameters on line %s:%u", path, line) : -abs (_e); }); |
305 | return -EINVAL22; |
306 | } |
307 | |
308 | if (!streq(protocol, "3")(strcmp((protocol),("3")) == 0)) { |
309 | log_warning("DNSKEY Protocol is not 3 on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 309, __func__ , "DNSKEY Protocol is not 3 on line %s:%u", path, line) : -abs (_e); }); |
310 | return -EINVAL22; |
311 | } |
312 | |
313 | r = safe_atou16(flags, &f); |
314 | if (r < 0) |
315 | return log_warning_errno(r, "Failed to parse DNSKEY flags field %s on line %s:%u", flags, path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 315, __func__ , "Failed to parse DNSKEY flags field %s on line %s:%u", flags , path, line) : -abs(_e); }); |
316 | if ((f & DNSKEY_FLAG_ZONE_KEY(1 << 8)) == 0) { |
317 | log_warning("DNSKEY lacks zone key bit set on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 317, __func__ , "DNSKEY lacks zone key bit set on line %s:%u", path, line) : -abs(_e); }); |
318 | return -EINVAL22; |
319 | } |
320 | if ((f & DNSKEY_FLAG_REVOKE(1 << 7))) { |
321 | log_warning("DNSKEY is already revoked on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 321, __func__ , "DNSKEY is already revoked on line %s:%u", path, line) : -abs (_e); }); |
322 | return -EINVAL22; |
323 | } |
324 | |
325 | a = dnssec_algorithm_from_string(algorithm); |
326 | if (a < 0) { |
327 | log_warning("Failed to parse DNSKEY algorithm %s on line %s:%u", algorithm, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 327, __func__ , "Failed to parse DNSKEY algorithm %s on line %s:%u", algorithm , path, line) : -abs(_e); }); |
328 | return -EINVAL22; |
329 | } |
330 | |
331 | if (isempty(p)) { |
332 | log_warning("Missing DNSKEY key on line %s:%u", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 332, __func__ , "Missing DNSKEY key on line %s:%u", path, line) : -abs(_e); }); |
333 | return -EINVAL22; |
334 | } |
335 | |
336 | r = unbase64mem(p, strlen(p), &k, &l); |
337 | if (r < 0) |
338 | return log_warning_errno(r, "Failed to parse DNSKEY key data %s on line %s:%u", p, path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 338, __func__ , "Failed to parse DNSKEY key data %s on line %s:%u", p, path , line) : -abs(_e); }); |
339 | |
340 | rr = dns_resource_record_new_full(DNS_CLASS_IN, DNS_TYPE_DNSKEY, domain); |
341 | if (!rr) |
342 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 342, __func__); |
343 | |
344 | rr->dnskey.flags = f; |
345 | rr->dnskey.protocol = 3; |
346 | rr->dnskey.algorithm = a; |
347 | rr->dnskey.key_size = l; |
348 | rr->dnskey.key = TAKE_PTR(k)({ typeof(k) _ptr_ = (k); (k) = ((void*)0); _ptr_; }); |
349 | |
350 | } else { |
351 | log_warning("RR type %s is not supported, ignoring line %s:%u.", type, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 351, __func__ , "RR type %s is not supported, ignoring line %s:%u.", type, path , line) : -abs(_e); }); |
352 | return -EINVAL22; |
353 | } |
354 | |
355 | r = hashmap_ensure_allocated(&d->positive_by_key, &dns_resource_key_hash_ops)internal_hashmap_ensure_allocated(&d->positive_by_key, &dns_resource_key_hash_ops ); |
356 | if (r < 0) |
357 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 357, __func__); |
358 | |
359 | old_answer = hashmap_get(d->positive_by_key, rr->key); |
360 | answer = dns_answer_ref(old_answer); |
361 | |
362 | r = dns_answer_add_extend(&answer, rr, 0, DNS_ANSWER_AUTHENTICATED); |
363 | if (r < 0) |
364 | return log_error_errno(r, "Failed to add trust anchor RR: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 364, __func__ , "Failed to add trust anchor RR: %m") : -abs(_e); }); |
365 | |
366 | r = hashmap_replace(d->positive_by_key, rr->key, answer); |
367 | if (r < 0) |
368 | return log_error_errno(r, "Failed to add answer to trust anchor: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 368, __func__ , "Failed to add answer to trust anchor: %m") : -abs(_e); }); |
369 | |
370 | old_answer = dns_answer_unref(old_answer); |
Value stored to 'old_answer' is never read | |
371 | answer = NULL((void*)0); |
372 | |
373 | return 0; |
374 | } |
375 | |
376 | static int dns_trust_anchor_load_negative(DnsTrustAnchor *d, const char *path, unsigned line, const char *s) { |
377 | _cleanup_free___attribute__((cleanup(freep))) char *domain = NULL((void*)0); |
378 | const char *p = s; |
379 | int r; |
380 | |
381 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 381, __PRETTY_FUNCTION__); } while (0); |
382 | assert(line)do { if ((__builtin_expect(!!(!(line)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("line"), "../src/resolve/resolved-dns-trust-anchor.c" , 382, __PRETTY_FUNCTION__); } while (0); |
383 | |
384 | r = extract_first_word(&p, &domain, NULL((void*)0), EXTRACT_QUOTES); |
385 | if (r < 0) |
386 | return log_warning_errno(r, "Unable to parse line %s:%u: %m", path, line)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 386, __func__ , "Unable to parse line %s:%u: %m", path, line) : -abs(_e); } ); |
387 | |
388 | if (!dns_name_is_valid(domain)) { |
389 | log_warning("Domain name %s is invalid, at line %s:%u, ignoring line.", domain, path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 389, __func__ , "Domain name %s is invalid, at line %s:%u, ignoring line.", domain, path, line) : -abs(_e); }); |
390 | return -EINVAL22; |
391 | } |
392 | |
393 | if (!isempty(p)) { |
394 | log_warning("Trailing garbage at line %s:%u, ignoring line.", path, line)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 394, __func__ , "Trailing garbage at line %s:%u, ignoring line.", path, line ) : -abs(_e); }); |
395 | return -EINVAL22; |
396 | } |
397 | |
398 | r = set_ensure_allocated(&d->negative_by_name, &dns_name_hash_ops)internal_set_ensure_allocated(&d->negative_by_name, & dns_name_hash_ops ); |
399 | if (r < 0) |
400 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 400, __func__); |
401 | |
402 | r = set_put(d->negative_by_name, domain); |
403 | if (r < 0) |
404 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 404, __func__); |
405 | if (r > 0) |
406 | domain = NULL((void*)0); |
407 | |
408 | return 0; |
409 | } |
410 | |
411 | static int dns_trust_anchor_load_files( |
412 | DnsTrustAnchor *d, |
413 | const char *suffix, |
414 | int (*loader)(DnsTrustAnchor *d, const char *path, unsigned n, const char *line)) { |
415 | |
416 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **files = NULL((void*)0); |
417 | char **f; |
418 | int r; |
419 | |
420 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 420, __PRETTY_FUNCTION__); } while (0); |
421 | assert(suffix)do { if ((__builtin_expect(!!(!(suffix)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("suffix"), "../src/resolve/resolved-dns-trust-anchor.c" , 421, __PRETTY_FUNCTION__); } while (0); |
422 | assert(loader)do { if ((__builtin_expect(!!(!(loader)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("loader"), "../src/resolve/resolved-dns-trust-anchor.c" , 422, __PRETTY_FUNCTION__); } while (0); |
423 | |
424 | r = conf_files_list_nulstr(&files, suffix, NULL((void*)0), 0, trust_anchor_dirs); |
425 | if (r < 0) |
426 | return log_error_errno(r, "Failed to enumerate %s trust anchor files: %m", suffix)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 426, __func__ , "Failed to enumerate %s trust anchor files: %m", suffix) : - abs(_e); }); |
427 | |
428 | STRV_FOREACH(f, files)for ((f) = (files); (f) && *(f); (f)++) { |
429 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *g = NULL((void*)0); |
430 | char line[LINE_MAX2048]; |
431 | unsigned n = 0; |
432 | |
433 | g = fopen(*f, "r"); |
434 | if (!g) { |
435 | if (errno(*__errno_location ()) == ENOENT2) |
436 | continue; |
437 | |
438 | log_warning_errno(errno, "Failed to open %s: %m", *f)({ int _level = ((4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-dns-trust-anchor.c" , 438, __func__, "Failed to open %s: %m", *f) : -abs(_e); }); |
439 | continue; |
440 | } |
441 | |
442 | FOREACH_LINE(line, g, log_warning_errno(errno, "Failed to read %s, ignoring: %m", *f))for (;;) if (!fgets(line, sizeof(line), g)) { if (ferror(g)) { ({ int _level = ((4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-dns-trust-anchor.c" , 442, __func__, "Failed to read %s, ignoring: %m", *f) : -abs (_e); }); } break; } else { |
443 | char *l; |
444 | |
445 | n++; |
446 | |
447 | l = strstrip(line); |
448 | if (isempty(l)) |
449 | continue; |
450 | |
451 | if (*l == ';') |
452 | continue; |
453 | |
454 | (void) loader(d, *f, n, l); |
455 | } |
456 | } |
457 | |
458 | return 0; |
459 | } |
460 | |
461 | static int domain_name_cmp(const void *a, const void *b) { |
462 | char **x = (char**) a, **y = (char**) b; |
463 | |
464 | return dns_name_compare_func(*x, *y); |
465 | } |
466 | |
467 | static int dns_trust_anchor_dump(DnsTrustAnchor *d) { |
468 | DnsAnswer *a; |
469 | Iterator i; |
470 | |
471 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 471, __PRETTY_FUNCTION__); } while (0); |
472 | |
473 | if (hashmap_isempty(d->positive_by_key)) |
474 | log_info("No positive trust anchors defined.")({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 474, __func__ , "No positive trust anchors defined.") : -abs(_e); }); |
475 | else { |
476 | log_info("Positive Trust Anchors:")({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 476, __func__ , "Positive Trust Anchors:") : -abs(_e); }); |
477 | HASHMAP_FOREACH(a, d->positive_by_key, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((d->positive_by_key ), &(i), (void**)&(a), ((void*)0)); ) { |
478 | DnsResourceRecord *rr; |
479 | |
480 | DNS_ANSWER_FOREACH(rr, a)for (size_t __unique_prefix_i15 = ({ (rr) = ((a) && ( a)->n_rrs > 0) ? (a)->items[0].rr : ((void*)0); 0; } ); (a) && (__unique_prefix_i15 < (a)->n_rrs); __unique_prefix_i15 ++, (rr) = (__unique_prefix_i15 < (a)->n_rrs ? (a)-> items[__unique_prefix_i15].rr : ((void*)0))) |
481 | log_info("%s", dns_resource_record_to_string(rr))({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 481, __func__ , "%s", dns_resource_record_to_string(rr)) : -abs(_e); }); |
482 | } |
483 | } |
484 | |
485 | if (set_isempty(d->negative_by_name)) |
486 | log_info("No negative trust anchors defined.")({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 486, __func__ , "No negative trust anchors defined.") : -abs(_e); }); |
487 | else { |
488 | _cleanup_free___attribute__((cleanup(freep))) char **l = NULL((void*)0), *j = NULL((void*)0); |
489 | |
490 | l = set_get_strv(d->negative_by_name); |
491 | if (!l) |
492 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 492, __func__); |
493 | |
494 | qsort_safe(l, set_size(d->negative_by_name), sizeof(char*), domain_name_cmp); |
495 | |
496 | j = strv_join(l, " "); |
497 | if (!j) |
498 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-dns-trust-anchor.c" , 498, __func__); |
499 | |
500 | log_info("Negative trust anchors: %s", j)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 500, __func__ , "Negative trust anchors: %s", j) : -abs(_e); }); |
501 | } |
502 | |
503 | return 0; |
504 | } |
505 | |
506 | int dns_trust_anchor_load(DnsTrustAnchor *d) { |
507 | int r; |
508 | |
509 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 509, __PRETTY_FUNCTION__); } while (0); |
510 | |
511 | /* If loading things from disk fails, we don't consider this fatal */ |
512 | (void) dns_trust_anchor_load_files(d, ".positive", dns_trust_anchor_load_positive); |
513 | (void) dns_trust_anchor_load_files(d, ".negative", dns_trust_anchor_load_negative); |
514 | |
515 | /* However, if the built-in DS fails, then we have a problem. */ |
516 | r = dns_trust_anchor_add_builtin_positive(d); |
517 | if (r < 0) |
518 | return log_error_errno(r, "Failed to add built-in positive trust anchor: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 518, __func__ , "Failed to add built-in positive trust anchor: %m") : -abs( _e); }); |
519 | |
520 | r = dns_trust_anchor_add_builtin_negative(d); |
521 | if (r < 0) |
522 | return log_error_errno(r, "Failed to add built-in negative trust anchor: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-trust-anchor.c", 522, __func__ , "Failed to add built-in negative trust anchor: %m") : -abs( _e); }); |
523 | |
524 | dns_trust_anchor_dump(d); |
525 | |
526 | return 0; |
527 | } |
528 | |
529 | void dns_trust_anchor_flush(DnsTrustAnchor *d) { |
530 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 530, __PRETTY_FUNCTION__); } while (0); |
531 | |
532 | d->positive_by_key = hashmap_free_with_destructor(d->positive_by_key, dns_answer_unref)({ ({ void *_item; while ((_item = hashmap_steal_first(d-> positive_by_key))) dns_answer_unref(_item); }); hashmap_free( d->positive_by_key); }); |
533 | d->revoked_by_rr = set_free_with_destructor(d->revoked_by_rr, dns_resource_record_unref)({ ({ void *_item; while ((_item = set_steal_first(d->revoked_by_rr ))) dns_resource_record_unref(_item); }); set_free(d->revoked_by_rr ); }); |
534 | d->negative_by_name = set_free_free(d->negative_by_name); |
535 | } |
536 | |
537 | int dns_trust_anchor_lookup_positive(DnsTrustAnchor *d, const DnsResourceKey *key, DnsAnswer **ret) { |
538 | DnsAnswer *a; |
539 | |
540 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 540, __PRETTY_FUNCTION__); } while (0); |
541 | assert(key)do { if ((__builtin_expect(!!(!(key)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("key"), "../src/resolve/resolved-dns-trust-anchor.c" , 541, __PRETTY_FUNCTION__); } while (0); |
542 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/resolve/resolved-dns-trust-anchor.c" , 542, __PRETTY_FUNCTION__); } while (0); |
543 | |
544 | /* We only serve DS and DNSKEY RRs. */ |
545 | if (!IN_SET(key->type, DNS_TYPE_DS, DNS_TYPE_DNSKEY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){DNS_TYPE_DS, DNS_TYPE_DNSKEY})/sizeof(int )]; switch(key->type) { case DNS_TYPE_DS: case DNS_TYPE_DNSKEY : _found = 1; break; default: break; } _found; })) |
546 | return 0; |
547 | |
548 | a = hashmap_get(d->positive_by_key, key); |
549 | if (!a) |
550 | return 0; |
551 | |
552 | *ret = dns_answer_ref(a); |
553 | return 1; |
554 | } |
555 | |
556 | int dns_trust_anchor_lookup_negative(DnsTrustAnchor *d, const char *name) { |
557 | int r; |
558 | |
559 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 559, __PRETTY_FUNCTION__); } while (0); |
560 | assert(name)do { if ((__builtin_expect(!!(!(name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("name"), "../src/resolve/resolved-dns-trust-anchor.c" , 560, __PRETTY_FUNCTION__); } while (0); |
561 | |
562 | for (;;) { |
563 | /* If the domain is listed as-is in the NTA database, then that counts */ |
564 | if (set_contains(d->negative_by_name, name)) |
565 | return true1; |
566 | |
567 | /* If the domain isn't listed as NTA, but is listed as positive trust anchor, then that counts. See RFC |
568 | * 7646, section 1.1 */ |
569 | if (hashmap_contains(d->positive_by_key, &DNS_RESOURCE_KEY_CONST(DNS_CLASS_IN, DNS_TYPE_DS, name)((DnsResourceKey) { .n_ref = (unsigned) -1, .class = DNS_CLASS_IN , .type = DNS_TYPE_DS, ._name = (char*) name, }))) |
570 | return false0; |
571 | |
572 | if (hashmap_contains(d->positive_by_key, &DNS_RESOURCE_KEY_CONST(DNS_CLASS_IN, DNS_TYPE_KEY, name)((DnsResourceKey) { .n_ref = (unsigned) -1, .class = DNS_CLASS_IN , .type = DNS_TYPE_KEY, ._name = (char*) name, }))) |
573 | return false0; |
574 | |
575 | /* And now, let's look at the parent, and check that too */ |
576 | r = dns_name_parent(&name); |
577 | if (r < 0) |
578 | return r; |
579 | if (r == 0) |
580 | break; |
581 | } |
582 | |
583 | return false0; |
584 | } |
585 | |
586 | static int dns_trust_anchor_revoked_put(DnsTrustAnchor *d, DnsResourceRecord *rr) { |
587 | int r; |
588 | |
589 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 589, __PRETTY_FUNCTION__); } while (0); |
590 | |
591 | r = set_ensure_allocated(&d->revoked_by_rr, &dns_resource_record_hash_ops)internal_set_ensure_allocated(&d->revoked_by_rr, & dns_resource_record_hash_ops ); |
592 | if (r < 0) |
593 | return r; |
594 | |
595 | r = set_put(d->revoked_by_rr, rr); |
596 | if (r < 0) |
597 | return r; |
598 | if (r > 0) |
599 | dns_resource_record_ref(rr); |
600 | |
601 | return r; |
602 | } |
603 | |
604 | static int dns_trust_anchor_remove_revoked(DnsTrustAnchor *d, DnsResourceRecord *rr) { |
605 | _cleanup_(dns_answer_unrefp)__attribute__((cleanup(dns_answer_unrefp))) DnsAnswer *new_answer = NULL((void*)0); |
606 | DnsAnswer *old_answer; |
607 | int r; |
608 | |
609 | /* Remember that this is a revoked trust anchor RR */ |
610 | r = dns_trust_anchor_revoked_put(d, rr); |
611 | if (r < 0) |
612 | return r; |
613 | |
614 | /* Remove this from the positive trust anchor */ |
615 | old_answer = hashmap_get(d->positive_by_key, rr->key); |
616 | if (!old_answer) |
617 | return 0; |
618 | |
619 | new_answer = dns_answer_ref(old_answer); |
620 | |
621 | r = dns_answer_remove_by_rr(&new_answer, rr); |
622 | if (r <= 0) |
623 | return r; |
624 | |
625 | /* We found the key! Warn the user */ |
626 | log_struct(LOG_WARNING,log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)) |
627 | "MESSAGE_ID=" SD_MESSAGE_DNSSEC_TRUST_ANCHOR_REVOKED_STR,log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)) |
628 | LOG_MESSAGE("DNSSEC trust anchor %s has been revoked.\n"log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)) |
629 | "Please update the trust anchor, or upgrade your operating system.",log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)) |
630 | strna(dns_resource_record_to_string(rr))),log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)) |
631 | "TRUST_ANCHOR=%s", dns_resource_record_to_string(rr))log_struct_internal(((LOG_REALM_SYSTEMD) << 10 | (4)), 0 , "../src/resolve/resolved-dns-trust-anchor.c", 631, __func__ , "MESSAGE_ID=" "4d" "44" "08" "cf" "d0" "d1" "44" "85" "91" "84" "d1" "e6" "5d" "7c" "8a" "65", "MESSAGE=" "DNSSEC trust anchor %s has been revoked.\n" "Please update the trust anchor, or upgrade your operating system." , strna(dns_resource_record_to_string(rr)), "TRUST_ANCHOR=%s" , dns_resource_record_to_string(rr), ((void*)0)); |
632 | |
633 | if (dns_answer_size(new_answer) <= 0) { |
634 | assert_se(hashmap_remove(d->positive_by_key, rr->key) == old_answer)do { if ((__builtin_expect(!!(!(hashmap_remove(d->positive_by_key , rr->key) == old_answer)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("hashmap_remove(d->positive_by_key, rr->key) == old_answer" ), "../src/resolve/resolved-dns-trust-anchor.c", 634, __PRETTY_FUNCTION__ ); } while (0); |
635 | dns_answer_unref(old_answer); |
636 | return 1; |
637 | } |
638 | |
639 | r = hashmap_replace(d->positive_by_key, new_answer->items[0].rr->key, new_answer); |
640 | if (r < 0) |
641 | return r; |
642 | |
643 | new_answer = NULL((void*)0); |
644 | dns_answer_unref(old_answer); |
645 | return 1; |
646 | } |
647 | |
648 | static int dns_trust_anchor_check_revoked_one(DnsTrustAnchor *d, DnsResourceRecord *revoked_dnskey) { |
649 | DnsAnswer *a; |
650 | int r; |
651 | |
652 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 652, __PRETTY_FUNCTION__); } while (0); |
653 | assert(revoked_dnskey)do { if ((__builtin_expect(!!(!(revoked_dnskey)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("revoked_dnskey"), "../src/resolve/resolved-dns-trust-anchor.c" , 653, __PRETTY_FUNCTION__); } while (0); |
654 | assert(revoked_dnskey->key->type == DNS_TYPE_DNSKEY)do { if ((__builtin_expect(!!(!(revoked_dnskey->key->type == DNS_TYPE_DNSKEY)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("revoked_dnskey->key->type == DNS_TYPE_DNSKEY"), "../src/resolve/resolved-dns-trust-anchor.c" , 654, __PRETTY_FUNCTION__); } while (0); |
655 | assert(revoked_dnskey->dnskey.flags & DNSKEY_FLAG_REVOKE)do { if ((__builtin_expect(!!(!(revoked_dnskey->dnskey.flags & (1 << 7))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("revoked_dnskey->dnskey.flags & DNSKEY_FLAG_REVOKE" ), "../src/resolve/resolved-dns-trust-anchor.c", 655, __PRETTY_FUNCTION__ ); } while (0); |
656 | |
657 | a = hashmap_get(d->positive_by_key, revoked_dnskey->key); |
658 | if (a) { |
659 | DnsResourceRecord *anchor; |
660 | |
661 | /* First, look for the precise DNSKEY in our trust anchor database */ |
662 | |
663 | DNS_ANSWER_FOREACH(anchor, a)for (size_t __unique_prefix_i16 = ({ (anchor) = ((a) && (a)->n_rrs > 0) ? (a)->items[0].rr : ((void*)0); 0; }); (a) && (__unique_prefix_i16 < (a)->n_rrs); __unique_prefix_i16++, (anchor) = (__unique_prefix_i16 < ( a)->n_rrs ? (a)->items[__unique_prefix_i16].rr : ((void *)0))) { |
664 | |
665 | if (anchor->dnskey.protocol != revoked_dnskey->dnskey.protocol) |
666 | continue; |
667 | |
668 | if (anchor->dnskey.algorithm != revoked_dnskey->dnskey.algorithm) |
669 | continue; |
670 | |
671 | if (anchor->dnskey.key_size != revoked_dnskey->dnskey.key_size) |
672 | continue; |
673 | |
674 | /* Note that we allow the REVOKE bit to be |
675 | * different! It will be set in the revoked |
676 | * key, but unset in our version of it */ |
677 | if (((anchor->dnskey.flags ^ revoked_dnskey->dnskey.flags) | DNSKEY_FLAG_REVOKE(1 << 7)) != DNSKEY_FLAG_REVOKE(1 << 7)) |
678 | continue; |
679 | |
680 | if (memcmp(anchor->dnskey.key, revoked_dnskey->dnskey.key, anchor->dnskey.key_size) != 0) |
681 | continue; |
682 | |
683 | dns_trust_anchor_remove_revoked(d, anchor); |
684 | break; |
685 | } |
686 | } |
687 | |
688 | a = hashmap_get(d->positive_by_key, &DNS_RESOURCE_KEY_CONST(revoked_dnskey->key->class, DNS_TYPE_DS, dns_resource_key_name(revoked_dnskey->key))((DnsResourceKey) { .n_ref = (unsigned) -1, .class = revoked_dnskey ->key->class, .type = DNS_TYPE_DS, ._name = (char*) dns_resource_key_name (revoked_dnskey->key), })); |
689 | if (a) { |
690 | DnsResourceRecord *anchor; |
691 | |
692 | /* Second, look for DS RRs matching this DNSKEY in our trust anchor database */ |
693 | |
694 | DNS_ANSWER_FOREACH(anchor, a)for (size_t __unique_prefix_i17 = ({ (anchor) = ((a) && (a)->n_rrs > 0) ? (a)->items[0].rr : ((void*)0); 0; }); (a) && (__unique_prefix_i17 < (a)->n_rrs); __unique_prefix_i17++, (anchor) = (__unique_prefix_i17 < ( a)->n_rrs ? (a)->items[__unique_prefix_i17].rr : ((void *)0))) { |
695 | |
696 | /* We set mask_revoke to true here, since our |
697 | * DS fingerprint will be the one of the |
698 | * unrevoked DNSKEY, but the one we got passed |
699 | * here has the bit set. */ |
700 | r = dnssec_verify_dnskey_by_ds(revoked_dnskey, anchor, true1); |
701 | if (r < 0) |
702 | return r; |
703 | if (r == 0) |
704 | continue; |
705 | |
706 | dns_trust_anchor_remove_revoked(d, anchor); |
707 | break; |
708 | } |
709 | } |
710 | |
711 | return 0; |
712 | } |
713 | |
714 | int dns_trust_anchor_check_revoked(DnsTrustAnchor *d, DnsResourceRecord *dnskey, DnsAnswer *rrs) { |
715 | DnsResourceRecord *rrsig; |
716 | int r; |
717 | |
718 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 718, __PRETTY_FUNCTION__); } while (0); |
719 | assert(dnskey)do { if ((__builtin_expect(!!(!(dnskey)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("dnskey"), "../src/resolve/resolved-dns-trust-anchor.c" , 719, __PRETTY_FUNCTION__); } while (0); |
720 | |
721 | /* Looks if "dnskey" is a self-signed RR that has been revoked |
722 | * and matches one of our trust anchor entries. If so, removes |
723 | * it from the trust anchor and returns > 0. */ |
724 | |
725 | if (dnskey->key->type != DNS_TYPE_DNSKEY) |
726 | return 0; |
727 | |
728 | /* Is this DNSKEY revoked? */ |
729 | if ((dnskey->dnskey.flags & DNSKEY_FLAG_REVOKE(1 << 7)) == 0) |
730 | return 0; |
731 | |
732 | /* Could this be interesting to us at all? If not, |
733 | * there's no point in looking for and verifying a |
734 | * self-signed RRSIG. */ |
735 | if (!dns_trust_anchor_knows_domain_positive(d, dns_resource_key_name(dnskey->key))) |
736 | return 0; |
737 | |
738 | /* Look for a self-signed RRSIG in the other rrs belonging to this DNSKEY */ |
739 | DNS_ANSWER_FOREACH(rrsig, rrs)for (size_t __unique_prefix_i18 = ({ (rrsig) = ((rrs) && (rrs)->n_rrs > 0) ? (rrs)->items[0].rr : ((void*)0) ; 0; }); (rrs) && (__unique_prefix_i18 < (rrs)-> n_rrs); __unique_prefix_i18++, (rrsig) = (__unique_prefix_i18 < (rrs)->n_rrs ? (rrs)->items[__unique_prefix_i18]. rr : ((void*)0))) { |
740 | DnssecResult result; |
741 | |
742 | if (rrsig->key->type != DNS_TYPE_RRSIG) |
743 | continue; |
744 | |
745 | r = dnssec_rrsig_match_dnskey(rrsig, dnskey, true1); |
746 | if (r < 0) |
747 | return r; |
748 | if (r == 0) |
749 | continue; |
750 | |
751 | r = dnssec_verify_rrset(rrs, dnskey->key, rrsig, dnskey, USEC_INFINITY((usec_t) -1), &result); |
752 | if (r < 0) |
753 | return r; |
754 | if (result != DNSSEC_VALIDATED) |
755 | continue; |
756 | |
757 | /* Bingo! This is a revoked self-signed DNSKEY. Let's |
758 | * see if this precise one exists in our trust anchor |
759 | * database, too. */ |
760 | r = dns_trust_anchor_check_revoked_one(d, dnskey); |
761 | if (r < 0) |
762 | return r; |
763 | |
764 | return 1; |
765 | } |
766 | |
767 | return 0; |
768 | } |
769 | |
770 | int dns_trust_anchor_is_revoked(DnsTrustAnchor *d, DnsResourceRecord *rr) { |
771 | assert(d)do { if ((__builtin_expect(!!(!(d)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("d"), "../src/resolve/resolved-dns-trust-anchor.c" , 771, __PRETTY_FUNCTION__); } while (0); |
772 | |
773 | if (!IN_SET(rr->key->type, DNS_TYPE_DS, DNS_TYPE_DNSKEY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){DNS_TYPE_DS, DNS_TYPE_DNSKEY})/sizeof(int )]; switch(rr->key->type) { case DNS_TYPE_DS: case DNS_TYPE_DNSKEY : _found = 1; break; default: break; } _found; })) |
774 | return 0; |
775 | |
776 | return set_contains(d->revoked_by_rr, rr); |
777 | } |