1
0
Fork 0
knot-resolver/lib/dnssec.c
Daniel Baumann fbc604e215
Adding upstream version 5.7.5.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-21 13:56:17 +02:00

632 lines
19 KiB
C

/* Copyright (C) CZ.NIC, z.s.p.o. <knot-resolver@labs.nic.cz>
* SPDX-License-Identifier: GPL-3.0-or-later
*/
#include <libdnssec/binary.h>
#include <libdnssec/crypto.h>
#include <libdnssec/error.h>
#include <libdnssec/key.h>
#include <libdnssec/sign.h>
#include <libknot/descriptor.h>
#include <libknot/packet/wire.h>
#include <libknot/rdataset.h>
#include <libknot/rrset.h>
#include <libknot/rrtype/dnskey.h>
#include <libknot/rrtype/nsec.h>
#include <libknot/rrtype/rrsig.h>
#include "contrib/cleanup.h"
#include "lib/defines.h"
#include "lib/dnssec/nsec.h"
#include "lib/dnssec/nsec3.h"
#include "lib/dnssec/signature.h"
#include "lib/dnssec.h"
#include "lib/resolve.h"
/* forward */
static int kr_rrset_validate_with_key(kr_rrset_validation_ctx_t *vctx,
knot_rrset_t *covered, size_t key_pos, const struct dnssec_key *key);
void kr_crypto_init(void)
{
dnssec_crypto_init();
}
void kr_crypto_cleanup(void)
{
dnssec_crypto_cleanup();
}
void kr_crypto_reinit(void)
{
dnssec_crypto_reinit();
}
#define FLG_WILDCARD_EXPANSION 0x01 /**< Possibly generated by using wildcard expansion. */
/**
* Check the RRSIG RR validity according to RFC4035 5.3.1 .
* @param flags The flags are going to be set according to validation result.
* @param cov_labels Covered RRSet owner label count.
* @param rrsigs rdata containing the signatures.
* @param key_alg DNSKEY's algorithm.
* @param keytag Used key tag.
* @param vctx->zone_name The name of the zone cut (and the DNSKEY).
* @param vctx->timestamp Validation time.
*/
static int validate_rrsig_rr(int *flags, int cov_labels,
const knot_rdata_t *rrsigs,
uint8_t key_alg,
uint16_t keytag,
kr_rrset_validation_ctx_t *vctx)
{
if (kr_fails_assert(flags && rrsigs && vctx && vctx->zone_name)) {
return kr_error(EINVAL);
}
/* bullet 5 */
if (knot_rrsig_sig_expiration(rrsigs) < vctx->timestamp) {
vctx->rrs_counters.expired++;
return kr_error(EINVAL);
}
/* bullet 6 */
if (knot_rrsig_sig_inception(rrsigs) > vctx->timestamp) {
vctx->rrs_counters.notyet++;
return kr_error(EINVAL);
}
/* bullet 2 */
const knot_dname_t *signer_name = knot_rrsig_signer_name(rrsigs);
if (!signer_name || !knot_dname_is_equal(signer_name, vctx->zone_name)) {
vctx->rrs_counters.signer_invalid++;
return kr_error(EAGAIN);
}
/* bullet 4 */
{
int rrsig_labels = knot_rrsig_labels(rrsigs);
if (rrsig_labels > cov_labels) {
vctx->rrs_counters.labels_invalid++;
return kr_error(EINVAL);
}
if (rrsig_labels < cov_labels) {
*flags |= FLG_WILDCARD_EXPANSION;
}
}
/* bullet 7
* Part checked elsewhere: key owner matching the zone_name. */
if (key_alg != knot_rrsig_alg(rrsigs) || keytag != knot_rrsig_key_tag(rrsigs)) {
vctx->rrs_counters.key_invalid++;
return kr_error(EINVAL);
}
/* bullet 8 */
/* Checked somewhere else. */
/* bullet 9 and 10 */
/* One of the requirements should be always fulfilled. */
return kr_ok();
}
/**
* Returns the number of labels that have been added by wildcard expansion.
* @param expanded Expanded wildcard.
* @param rrsigs RRSet containing the signatures.
* @param sig_pos Specifies the signature within the RRSIG RRSet.
* @return Number of added labels, -1 on error.
*/
static inline int wildcard_radix_len_diff(const knot_dname_t *expanded,
const knot_rdata_t *rrsig)
{
if (!expanded || !rrsig) {
return -1;
}
return knot_dname_labels(expanded, NULL) - knot_rrsig_labels(rrsig);
}
int kr_rrset_validate(kr_rrset_validation_ctx_t *vctx, knot_rrset_t *covered)
{
if (!vctx) {
return kr_error(EINVAL);
}
if (!vctx->pkt || !covered || !vctx->keys || !vctx->zone_name) {
return kr_error(EINVAL);
}
memset(&vctx->rrs_counters, 0, sizeof(vctx->rrs_counters));
for (unsigned i = 0; i < vctx->keys->rrs.count; ++i) {
int ret = kr_rrset_validate_with_key(vctx, covered, i, NULL);
if (ret == 0 || ret == kr_error(E2BIG)) {
return ret;
}
}
return kr_error(ENOENT);
}
/** Assuming `rrs` was validated with `sig`, trim its TTL in case it's over-extended. */
static bool trim_ttl(knot_rrset_t *rrs, const knot_rdata_t *sig,
const kr_rrset_validation_ctx_t *vctx)
{
/* The trimming logic is a bit complicated.
*
* We respect configured ttl_min over the (signed) original TTL,
* but we very much want to avoid TTLs over signature expiration,
* as that could cause serious issues with downstream validators.
*/
const uint32_t ttl_max = MIN(
MAX(knot_rrsig_original_ttl(sig), vctx->ttl_min),
knot_rrsig_sig_expiration(sig) - vctx->timestamp
);
if (likely(rrs->ttl <= ttl_max))
return false;
if (kr_log_is_debug_qry(VALIDATOR, vctx->log_qry)) {
auto_free char *name_str = kr_dname_text(rrs->owner),
*type_str = kr_rrtype_text(rrs->type);
kr_log_q(vctx->log_qry, VALIDATOR, "trimming TTL of %s %s: %d -> %d\n",
name_str, type_str, (int)rrs->ttl, (int)ttl_max);
}
rrs->ttl = ttl_max;
return true;
}
typedef struct {
struct dnssec_key *key;
uint8_t alg;
uint16_t tag;
} kr_svldr_key_t;
struct kr_svldr_ctx {
kr_rrset_validation_ctx_t vctx;
array_t(kr_svldr_key_t) keys; // owned(malloc), also insides via svldr_key_*
};
static int svldr_key_new(const knot_rdata_t *rdata, const knot_dname_t *owner,
kr_svldr_key_t *result)
{
result->alg = knot_dnskey_alg(rdata);
result->key = NULL; // just silence analyzers
int ret = kr_dnssec_key_from_rdata(&result->key, owner, rdata->data, rdata->len);
if (likely(ret == 0))
result->tag = dnssec_key_get_keytag(result->key);
return ret;
}
static inline void svldr_key_del(kr_svldr_key_t *skey)
{
kr_dnssec_key_free(&skey->key);
}
void kr_svldr_free_ctx(struct kr_svldr_ctx *ctx)
{
if (!ctx) return;
for (ssize_t i = 0; i < ctx->keys.len; ++i)
svldr_key_del(&ctx->keys.at[i]);
array_clear(ctx->keys);
free_const(ctx->vctx.zone_name);
free(ctx);
}
struct kr_svldr_ctx * kr_svldr_new_ctx(const knot_rrset_t *ds, knot_rrset_t *dnskey,
const knot_rdataset_t *dnskey_sigs, uint32_t timestamp,
kr_rrset_validation_ctx_t *err_ctx)
{
// Basic init.
struct kr_svldr_ctx *ctx = calloc(1, sizeof(*ctx));
if (unlikely(!ctx))
return NULL;
ctx->vctx.timestamp = timestamp; // .ttl_min is implicitly zero
ctx->vctx.zone_name = knot_dname_copy(ds->owner, NULL);
if (unlikely(!ctx->vctx.zone_name))
goto fail;
// Validate the DNSKEY set.
ctx->vctx.keys = dnskey;
if (kr_dnskeys_trusted(&ctx->vctx, dnskey_sigs, ds) != 0)
goto fail;
// Put usable DNSKEYs into ctx->keys. (Some duplication of work happens, but OK.)
array_init(ctx->keys);
array_reserve(ctx->keys, dnskey->rrs.count);
knot_rdata_t *krr = dnskey->rrs.rdata;
for (int i = 0; i < dnskey->rrs.count; ++i, krr = knot_rdataset_next(krr)) {
if (!kr_dnssec_key_zsk(krr->data) || kr_dnssec_key_revoked(krr->data))
continue; // key not usable for this
kr_svldr_key_t key;
if (unlikely(svldr_key_new(krr, NULL/*seems OK here*/, &key) != 0))
goto fail;
array_push(ctx->keys, key);
}
return ctx;
fail:
if (err_ctx)
memcpy(err_ctx, &ctx->vctx, sizeof(*err_ctx));
kr_svldr_free_ctx(ctx);
return NULL;
}
/** Checks whether we want to allow yet another crypto-validation and if yes,
* decrements the remaining number of allowed validations.
*
* Returns `true` if the crypto-validation is allowed; otherwise false */
static bool account_crypto_limit(kr_rrset_validation_ctx_t *vctx)
{
if (vctx->limit_crypto_remains == NULL)
return true; // no limiting
if (*vctx->limit_crypto_remains > 0) {
--*vctx->limit_crypto_remains;
return true;
}
// We got over limit. There are optional actions to do.
if (vctx->log_qry && kr_log_is_debug_qry(VALIDATOR, vctx->log_qry)) {
auto_free char *name_str = kr_dname_text(vctx->zone_name);
kr_log_q(vctx->log_qry, VALIDATOR,
"expensive crypto limited, mitigating CVE-2023-50387, current zone: %s\n",
name_str);
}
if (vctx->log_qry && vctx->log_qry->request) {
kr_request_set_extended_error(vctx->log_qry->request, KNOT_EDNS_EDE_BOGUS,
"EAIE: expensive crypto limited, mitigating CVE-2023-50387");
}
return false;
}
static int kr_svldr_rrset_with_key(knot_rrset_t *rrs, const knot_rdataset_t *rrsigs,
kr_rrset_validation_ctx_t *vctx, const kr_svldr_key_t *key)
{
const int covered_labels = knot_dname_labels(rrs->owner, NULL)
- knot_dname_is_wildcard(rrs->owner);
knot_rdata_t *rdata_j = rrsigs->rdata;
for (uint16_t j = 0; j < rrsigs->count; ++j, rdata_j = knot_rdataset_next(rdata_j)) {
if (kr_fails_assert(knot_rrsig_type_covered(rdata_j) == rrs->type))
continue; //^^ not a problem but no reason to allow them in the API
int val_flgs = 0;
int retv = validate_rrsig_rr(&val_flgs, covered_labels, rdata_j,
key->alg, key->tag, vctx);
if (retv == kr_error(EAGAIN)) {
vctx->result = retv;
return vctx->result;
} else if (retv != 0) {
continue;
}
if (!account_crypto_limit(vctx))
return vctx->result = kr_error(E2BIG);
// We only expect non-expanded wildcard records in input;
// that also means we don't need to perform non-existence proofs.
const int trim_labels = (val_flgs & FLG_WILDCARD_EXPANSION) ? 1 : 0;
if (kr_check_signature(rdata_j, key->key, rrs, trim_labels) == 0) {
trim_ttl(rrs, rdata_j, vctx);
vctx->result = kr_ok();
return vctx->result;
} else {
vctx->rrs_counters.crypto_invalid++;
}
}
vctx->result = kr_error(ENOENT);
return vctx->result;
}
/* The implementation basically performs "parts of" kr_rrset_validate(). */
int kr_svldr_rrset(knot_rrset_t *rrs, const knot_rdataset_t *rrsigs,
struct kr_svldr_ctx *ctx)
{
if (knot_dname_in_bailiwick(rrs->owner, ctx->vctx.zone_name) < 0) {
ctx->vctx.result = kr_error(EAGAIN);
return ctx->vctx.result;
}
for (ssize_t i = 0; i < ctx->keys.len; ++i) {
kr_svldr_rrset_with_key(rrs, rrsigs, &ctx->vctx, &ctx->keys.at[i]);
if (ctx->vctx.result == 0 || ctx->vctx.result == kr_error(E2BIG))
break;
}
return ctx->vctx.result;
}
/**
* Validate RRSet using a specific key.
* @param vctx Pointer to validation context.
* @param covered RRSet covered by a signature. It must be in canonical format.
* TTL may get lowered.
* @param key_pos Position of the key to be validated with.
* @param key Key to be used to validate.
* If NULL, then key from DNSKEY RRSet is used.
* @return 0 or error code, same as vctx->result.
*/
static int kr_rrset_validate_with_key(kr_rrset_validation_ctx_t *vctx,
knot_rrset_t *covered,
size_t key_pos, const struct dnssec_key *key)
{
const knot_pkt_t *pkt = vctx->pkt;
const knot_rrset_t *keys = vctx->keys;
const knot_dname_t *zone_name = vctx->zone_name;
bool has_nsec3 = vctx->has_nsec3;
struct dnssec_key *created_key = NULL;
if (!knot_dname_is_equal(keys->owner, zone_name)
/* It's just caller's approximation that the RR is in that particular zone,
* so we verify that in the following condition.
* We MUST guard against attempts of zones signing out-of-bailiwick records. */
|| knot_dname_in_bailiwick(covered->owner, zone_name) < 0) {
vctx->result = kr_error(ENOENT);
return vctx->result;
}
const knot_rdata_t *key_rdata = knot_rdataset_at(&keys->rrs, key_pos);
if (key == NULL) {
int ret = kr_dnssec_key_from_rdata(&created_key, keys->owner,
key_rdata->data, key_rdata->len);
if (ret != 0) {
vctx->result = ret;
return vctx->result;
}
key = created_key;
}
uint16_t keytag = dnssec_key_get_keytag(key);
const uint8_t key_alg = knot_dnskey_alg(key_rdata);
/* The asterisk does not count, RFC4034 3.1.3, paragraph 3. */
const int covered_labels = knot_dname_labels(covered->owner, NULL)
- knot_dname_is_wildcard(covered->owner);
for (size_t i = 0; i < vctx->rrs->len; ++i) {
/* Consider every RRSIG that matches and comes from the same query. */
const knot_rrset_t *rrsig = vctx->rrs->at[i]->rr;
const bool ok = vctx->rrs->at[i]->qry_uid == vctx->qry_uid
&& rrsig->type == KNOT_RRTYPE_RRSIG
&& rrsig->rclass == covered->rclass
&& knot_dname_is_equal(rrsig->owner, covered->owner);
if (!ok)
continue;
knot_rdata_t *rdata_j = rrsig->rrs.rdata;
for (uint16_t j = 0; j < rrsig->rrs.count; ++j, rdata_j = knot_rdataset_next(rdata_j)) {
int val_flgs = 0;
int trim_labels = 0;
if (knot_rrsig_type_covered(rdata_j) != covered->type) {
continue;
}
kr_rank_set(&vctx->rrs->at[i]->rank, KR_RANK_BOGUS); /* defensive style */
vctx->rrs_counters.matching_name_type++;
int retv = validate_rrsig_rr(&val_flgs, covered_labels, rdata_j,
key_alg, keytag, vctx);
if (retv == kr_error(EAGAIN)) {
vctx->result = retv;
goto finish;
} else if (retv != 0) {
continue;
}
if (val_flgs & FLG_WILDCARD_EXPANSION) {
trim_labels = wildcard_radix_len_diff(covered->owner, rdata_j);
if (trim_labels < 0) {
break;
}
}
if (!account_crypto_limit(vctx)) {
vctx->result = kr_error(E2BIG);
goto finish;
}
if (kr_check_signature(rdata_j, key, covered, trim_labels) != 0) {
vctx->rrs_counters.crypto_invalid++;
continue;
}
if (val_flgs & FLG_WILDCARD_EXPANSION) {
int ret = 0;
if (!has_nsec3) {
ret = kr_nsec_wildcard_answer_response_check(pkt, KNOT_AUTHORITY, covered->owner);
} else {
ret = kr_nsec3_wildcard_answer_response_check(pkt, KNOT_AUTHORITY, covered->owner, trim_labels - 1);
if (ret == kr_error(KNOT_ERANGE)) {
ret = 0;
vctx->flags |= KR_DNSSEC_VFLG_OPTOUT;
}
}
if (ret != 0) {
vctx->rrs_counters.nsec_invalid++;
continue;
}
vctx->flags |= KR_DNSSEC_VFLG_WEXPAND;
}
trim_ttl(covered, rdata_j, vctx);
kr_rank_set(&vctx->rrs->at[i]->rank, KR_RANK_SECURE); /* upgrade from bogus */
vctx->result = kr_ok();
goto finish;
}
}
/* No applicable key found, cannot be validated. */
vctx->result = kr_error(ENOENT);
finish:
kr_dnssec_key_free(&created_key);
return vctx->result;
}
bool kr_ds_algo_support(const knot_rrset_t *ta)
{
if (kr_fails_assert(ta && ta->type == KNOT_RRTYPE_DS && ta->rclass == KNOT_CLASS_IN))
return false;
/* Check if at least one DS has a usable algorithm pair. */
knot_rdata_t *rdata_i = ta->rrs.rdata;
for (uint16_t i = 0; i < ta->rrs.count;
++i, rdata_i = knot_rdataset_next(rdata_i)) {
if (dnssec_algorithm_digest_support(knot_ds_digest_type(rdata_i))
&& dnssec_algorithm_key_support(knot_ds_alg(rdata_i))) {
return true;
}
}
return false;
}
int kr_dnskeys_trusted(kr_rrset_validation_ctx_t *vctx, const knot_rdataset_t *sigs,
const knot_rrset_t *ta)
{
knot_rrset_t *keys = vctx->keys;
const bool ok = keys && ta && ta->rrs.count && ta->rrs.rdata
&& ta->type == KNOT_RRTYPE_DS
&& knot_dname_is_equal(ta->owner, keys->owner);
if (kr_fails_assert(ok))
return kr_error(EINVAL);
/* RFC4035 5.2, bullet 1
* The supplied DS record has been authenticated.
* It has been validated or is part of a configured trust anchor.
*/
knot_rdata_t *krr = keys->rrs.rdata;
for (int i = 0; i < keys->rrs.count; ++i, krr = knot_rdataset_next(krr)) {
/* RFC4035 5.3.1, bullet 8 */ /* ZSK */
if (!kr_dnssec_key_zsk(krr->data) || kr_dnssec_key_revoked(krr->data))
continue;
kr_svldr_key_t key;
if (svldr_key_new(krr, keys->owner, &key) != 0)
continue; // it might e.g. be malformed
int ret = kr_authenticate_referral(ta, key.key);
if (ret == 0)
ret = kr_svldr_rrset_with_key(keys, sigs, vctx, &key);
svldr_key_del(&key);
if (ret == 0 || ret == kr_error(E2BIG)) {
kr_assert(vctx->result == ret);
return vctx->result;
}
}
/* No useable key found */
vctx->result = kr_error(ENOENT);
return vctx->result;
}
bool kr_dnssec_key_zsk(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0100;
}
bool kr_dnssec_key_ksk(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0001;
}
/** Return true if the DNSKEY is revoked. */
bool kr_dnssec_key_revoked(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0080;
}
int kr_dnssec_key_tag(uint16_t rrtype, const uint8_t *rdata, size_t rdlen)
{
if (!rdata || rdlen == 0 || (rrtype != KNOT_RRTYPE_DS && rrtype != KNOT_RRTYPE_DNSKEY)) {
return kr_error(EINVAL);
}
if (rrtype == KNOT_RRTYPE_DS) {
return knot_wire_read_u16(rdata);
} else if (rrtype == KNOT_RRTYPE_DNSKEY) {
struct dnssec_key *key = NULL;
int ret = kr_dnssec_key_from_rdata(&key, NULL, rdata, rdlen);
if (ret != 0) {
return ret;
}
uint16_t keytag = dnssec_key_get_keytag(key);
kr_dnssec_key_free(&key);
return keytag;
} else {
return kr_error(EINVAL);
}
}
int kr_dnssec_key_match(const uint8_t *key_a_rdata, size_t key_a_rdlen,
const uint8_t *key_b_rdata, size_t key_b_rdlen)
{
dnssec_key_t *key_a = NULL, *key_b = NULL;
int ret = kr_dnssec_key_from_rdata(&key_a, NULL, key_a_rdata, key_a_rdlen);
if (ret != 0) {
return ret;
}
ret = kr_dnssec_key_from_rdata(&key_b, NULL, key_b_rdata, key_b_rdlen);
if (ret != 0) {
dnssec_key_free(key_a);
return ret;
}
/* If the algorithm and the public key match, we can be sure
* that they are the same key. */
ret = kr_error(ENOENT);
dnssec_binary_t pk_a, pk_b;
if (dnssec_key_get_algorithm(key_a) == dnssec_key_get_algorithm(key_b) &&
dnssec_key_get_pubkey(key_a, &pk_a) == DNSSEC_EOK &&
dnssec_key_get_pubkey(key_b, &pk_b) == DNSSEC_EOK) {
if (pk_a.size == pk_b.size && memcmp(pk_a.data, pk_b.data, pk_a.size) == 0) {
ret = 0;
}
}
dnssec_key_free(key_a);
dnssec_key_free(key_b);
return ret;
}
int kr_dnssec_key_from_rdata(struct dnssec_key **key, const knot_dname_t *kown, const uint8_t *rdata, size_t rdlen)
{
if (!key || !rdata || rdlen == 0) {
return kr_error(EINVAL);
}
dnssec_key_t *new_key = NULL;
const dnssec_binary_t binary_key = {
.size = rdlen,
.data = (uint8_t *)rdata
};
int ret = dnssec_key_new(&new_key);
if (ret != DNSSEC_EOK) {
return kr_error(ENOMEM);
}
ret = dnssec_key_set_rdata(new_key, &binary_key);
if (ret != DNSSEC_EOK) {
dnssec_key_free(new_key);
return kr_error(ret);
}
if (kown) {
ret = dnssec_key_set_dname(new_key, kown);
if (ret != DNSSEC_EOK) {
dnssec_key_free(new_key);
return kr_error(ENOMEM);
}
}
*key = new_key;
return kr_ok();
}
void kr_dnssec_key_free(struct dnssec_key **key)
{
if (kr_fails_assert(key))
return;
dnssec_key_free(*key);
*key = NULL;
}
int kr_dnssec_matches_name_and_type(const ranked_rr_array_t *rrs, uint32_t qry_uid,
const knot_dname_t *name, uint16_t type)
{
int ret = kr_error(ENOENT);
for (size_t i = 0; i < rrs->len; ++i) {
const ranked_rr_array_entry_t *entry = rrs->at[i];
if (kr_fails_assert(!entry->in_progress))
return kr_error(EINVAL);
const knot_rrset_t *nsec = entry->rr;
if (entry->qry_uid != qry_uid || entry->yielded) {
continue;
}
if (nsec->type != KNOT_RRTYPE_NSEC &&
nsec->type != KNOT_RRTYPE_NSEC3) {
continue;
}
if (!kr_rank_test(entry->rank, KR_RANK_SECURE)) {
continue;
}
if (nsec->type == KNOT_RRTYPE_NSEC) {
ret = kr_nsec_matches_name_and_type(nsec, name, type);
} else {
ret = kr_nsec3_matches_name_and_type(nsec, name, type);
}
if (ret == kr_ok()) {
return kr_ok();
} else if (ret != kr_error(ENOENT)) {
return ret;
}
}
return ret;
}