Skip to content
GitLab
Projects
Groups
Snippets
Help
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
BIND
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
603
Issues
603
List
Boards
Labels
Service Desk
Milestones
Merge Requests
114
Merge Requests
114
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Incidents
Environments
Packages & Registries
Packages & Registries
Container Registry
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
ISC Open Source Projects
BIND
Commits
79de6edd
Commit
79de6edd
authored
Jul 03, 2019
by
Mark Andrews
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
allow grant rules to be retrieved
parent
361ec726
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
41 additions
and
18 deletions
+41
-18
lib/dns/include/dns/ssu.h
lib/dns/include/dns/ssu.h
+1
-1
lib/dns/ssu.c
lib/dns/ssu.c
+10
-8
lib/ns/update.c
lib/ns/update.c
+30
-9
No files found.
lib/dns/include/dns/ssu.h
View file @
79de6edd
...
...
@@ -141,7 +141,7 @@ bool
dns_ssutable_checkrules
(
dns_ssutable_t
*
table
,
const
dns_name_t
*
signer
,
const
dns_name_t
*
name
,
const
isc_netaddr_t
*
addr
,
bool
tcp
,
const
dns_aclenv_t
*
env
,
dns_rdatatype_t
type
,
const
dst_key_t
*
key
);
const
dst_key_t
*
key
,
const
dns_ssurule_t
**
rulep
);
/*%<
* Checks that the attempted update of (name, type) is allowed according
* to the rules specified in the simple-secure-update rule table. If
...
...
lib/dns/ssu.c
View file @
79de6edd
...
...
@@ -39,8 +39,7 @@
struct
dns_ssurule
{
unsigned
int
magic
;
bool
grant
;
/*%< is this a grant or a deny? */
dns_ssumatchtype_t
matchtype
;
/*%< which type of pattern match?
* */
dns_ssumatchtype_t
matchtype
;
/*%< which type of pattern match? */
dns_name_t
*
identity
;
/*%< the identity to match */
dns_name_t
*
name
;
/*%< the name being updated */
unsigned
int
ntypes
;
/*%< number of data types covered */
...
...
@@ -284,15 +283,15 @@ bool
dns_ssutable_checkrules
(
dns_ssutable_t
*
table
,
const
dns_name_t
*
signer
,
const
dns_name_t
*
name
,
const
isc_netaddr_t
*
addr
,
bool
tcp
,
const
dns_aclenv_t
*
env
,
dns_rdatatype_t
type
,
const
dst_key_t
*
key
)
{
dns_ssurule_t
*
rule
;
unsigned
int
i
;
const
dst_key_t
*
key
,
const
dns_ssurule_t
**
rulep
)
{
dns_fixedname_t
fixed
;
dns_name_t
*
wildcard
;
dns_name_t
*
tcpself
;
dns_name_t
*
stfself
;
isc_result_t
result
;
dns_name_t
*
tcpself
;
dns_name_t
*
wildcard
;
dns_ssurule_t
*
rule
;
int
match
;
isc_result_t
result
;
unsigned
int
i
;
REQUIRE
(
VALID_SSUTABLE
(
table
));
REQUIRE
(
signer
==
NULL
||
dns_name_isabsolute
(
signer
));
...
...
@@ -522,6 +521,9 @@ dns_ssutable_checkrules(dns_ssutable_t *table, const dns_name_t *signer,
continue
;
}
}
if
(
rule
->
grant
&&
rulep
!=
NULL
)
{
*
rulep
=
rule
;
}
return
(
rule
->
grant
);
}
...
...
lib/ns/update.c
View file @
79de6edd
...
...
@@ -899,8 +899,9 @@ typedef struct {
static
isc_result_t
ssu_checkrule
(
void
*
data
,
dns_rdataset_t
*
rrset
)
{
ssu_check_t
*
ssuinfo
=
data
;
bool
result
;
const
dns_ssurule_t
*
rule
=
NULL
;
ssu_check_t
*
ssuinfo
=
data
;
/*
* If we're deleting all records, it's ok to delete RRSIG and NSEC even
...
...
@@ -910,9 +911,10 @@ ssu_checkrule(void *data, dns_rdataset_t *rrset) {
rrset
->
type
==
dns_rdatatype_nsec
)
{
return
(
ISC_R_SUCCESS
);
}
result
=
dns_ssutable_checkrules
(
ssuinfo
->
table
,
ssuinfo
->
signer
,
ssuinfo
->
name
,
ssuinfo
->
addr
,
ssuinfo
->
tcp
,
ssuinfo
->
aclenv
,
rrset
->
type
,
ssuinfo
->
key
);
result
=
dns_ssutable_checkrules
(
ssuinfo
->
table
,
ssuinfo
->
signer
,
ssuinfo
->
name
,
ssuinfo
->
addr
,
ssuinfo
->
tcp
,
ssuinfo
->
aclenv
,
rrset
->
type
,
ssuinfo
->
key
,
&
rule
);
return
(
result
==
true
?
ISC_R_SUCCESS
:
ISC_R_FAILURE
);
}
...
...
@@ -2565,6 +2567,9 @@ update_action(isc_task_t *task, isc_event_t *event) {
uint64_t
records
;
dns_aclenv_t
*
env
=
ns_interfacemgr_getaclenv
(
client
->
manager
->
interface
->
mgr
);
size_t
ruleslen
=
0
;
size_t
rule
;
const
dns_ssurule_t
**
rules
=
NULL
;
INSIST
(
event
->
ev_type
==
DNS_EVENT_UPDATE
);
...
...
@@ -2739,15 +2744,24 @@ update_action(isc_task_t *task, isc_event_t *event) {
/*
* Perform the Update Section Prescan.
*/
if
(
ssutable
!=
NULL
)
{
ruleslen
=
request
->
counts
[
DNS_SECTION_UPDATE
];
rules
=
isc_mem_get
(
mctx
,
sizeof
(
*
rules
)
*
ruleslen
);
memset
(
rules
,
0
,
sizeof
(
*
rules
)
*
ruleslen
);
}
for
(
result
=
dns_message_firstname
(
request
,
DNS_SECTION_UPDATE
);
for
(
rule
=
0
,
result
=
dns_message_firstname
(
request
,
DNS_SECTION_UPDATE
);
result
==
ISC_R_SUCCESS
;
result
=
dns_message_nextname
(
request
,
DNS_SECTION_UPDATE
))
r
ule
++
,
r
esult
=
dns_message_nextname
(
request
,
DNS_SECTION_UPDATE
))
{
dns_name_t
*
name
=
NULL
;
dns_rdata_t
rdata
=
DNS_RDATA_INIT
;
dns_ttl_t
ttl
;
dns_rdataclass_t
update_class
;
INSIST
(
ssutable
==
NULL
||
rule
<
ruleslen
);
get_current_rr
(
request
,
DNS_SECTION_UPDATE
,
zoneclass
,
&
name
,
&
rdata
,
&
covers
,
&
ttl
,
&
update_class
);
...
...
@@ -2820,7 +2834,7 @@ update_action(isc_task_t *task, isc_event_t *event) {
if
(
!
dns_ssutable_checkrules
(
ssutable
,
client
->
signer
,
name
,
&
netaddr
,
TCPCLIENT
(
client
),
env
,
rdata
.
type
,
tsigkey
))
rdata
.
type
,
tsigkey
,
&
rules
[
rule
]
))
{
FAILC
(
DNS_R_REFUSED
,
"rejected by "
"secure update"
);
...
...
@@ -2847,9 +2861,10 @@ update_action(isc_task_t *task, isc_event_t *event) {
*/
options
=
dns_zone_getoptions
(
zone
);
for
(
result
=
dns_message_firstname
(
request
,
DNS_SECTION_UPDATE
);
for
(
rule
=
0
,
result
=
dns_message_firstname
(
request
,
DNS_SECTION_UPDATE
);
result
==
ISC_R_SUCCESS
;
result
=
dns_message_nextname
(
request
,
DNS_SECTION_UPDATE
))
r
ule
++
,
r
esult
=
dns_message_nextname
(
request
,
DNS_SECTION_UPDATE
))
{
dns_name_t
*
name
=
NULL
;
dns_rdata_t
rdata
=
DNS_RDATA_INIT
;
...
...
@@ -2857,6 +2872,8 @@ update_action(isc_task_t *task, isc_event_t *event) {
dns_rdataclass_t
update_class
;
bool
flag
;
INSIST
(
ssutable
==
NULL
||
rule
<
ruleslen
);
get_current_rr
(
request
,
DNS_SECTION_UPDATE
,
zoneclass
,
&
name
,
&
rdata
,
&
covers
,
&
ttl
,
&
update_class
);
...
...
@@ -3420,6 +3437,10 @@ common:
dns_db_detach
(
&
db
);
}
if
(
rules
!=
NULL
)
{
isc_mem_put
(
mctx
,
rules
,
sizeof
(
*
rules
)
*
ruleslen
);
}
if
(
ssutable
!=
NULL
)
{
dns_ssutable_detach
(
&
ssutable
);
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment